Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Engineering

A Tool For Biometric Interpretation Of Forensic Str Dna Profiles, Ahmad Jamal Baroudi Jan 2022

A Tool For Biometric Interpretation Of Forensic Str Dna Profiles, Ahmad Jamal Baroudi

Graduate Theses, Dissertations, and Problem Reports

Rapid DNA biometric identification applications are becoming more essential and widely used in human identity validation processes. Despite their powerful identification capabilities, processing a sample to generate a forensic DNA profile still takes longer compared with other rapid biometric technologies. Methods used to speed up the analysis could lead to signal artifacts similar to those arising from low copy or degraded DNA samples, making the electropherogram unsuitable for forensic interpretation and analysis. The goal of this research effort is to apply biometrics and mathematical approaches to forensic STR (Short Tandem Repeat) profiles. To accomplish this goal, a multi-function software tool …


Modeling, Simulation, And Hardware-In-The-Loop Implementation Of Distributed Voltage Control In Power Systems With Renewable Energy Sources, Ali Dehghan Banadaki Jan 2022

Modeling, Simulation, And Hardware-In-The-Loop Implementation Of Distributed Voltage Control In Power Systems With Renewable Energy Sources, Ali Dehghan Banadaki

Graduate Theses, Dissertations, and Problem Reports

This dissertation develops and analyzes distributed controllers for power systems with renewable energy sources. A comprehensive state space modeling of voltage source inverters (VSIs) is developed specifically to address the secondary voltage control. This model can be used for simulation and control design. Unlike frequency, voltage is a local phenomenon, meaning that it cannot be controlled from a far distance. Therefore, a voltage zoning matrix that relates the sensitivity of the loads to the sources is proposed. The secondary voltage control is designed by applying the eigenvalue decomposition of the voltage zoning matrix to obtain the reference generators voltages. The …


Multimodal Adversarial Learning, Uche Osahor Jan 2022

Multimodal Adversarial Learning, Uche Osahor

Graduate Theses, Dissertations, and Problem Reports

Deep Convolutional Neural Networks (DCNN) have proven to be an exceptional tool for object recognition, generative modelling, and multi-modal learning in various computer vision applications. However, recent findings have shown that such state-of-the-art models can be easily deceived by inserting slight imperceptible perturbations to key pixels in the input. A good target detection systems can accurately identify targets by localizing their coordinates on the input image of interest. This is ideally achieved by labeling each pixel in an image as a background or a potential target pixel. However, prior research still confirms that such state of the art targets models …


Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire Jan 2022

Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire

Graduate Theses, Dissertations, and Problem Reports

Facial recognition systems play a vital role in our everyday lives. We rely on this technology from menial tasks to issues as vital as national security. While strides have been made over the past ten years to improve facial recognition systems, morphed face images are a viable threat to the reliability of these systems. Morphed images are generated by combining the face images of two subjects. The resulting morphed face shares the likeness of the contributing subjects, confusing both humans and face verification algorithms. This vulnerability has grave consequences for facial recognition systems used on international borders or for law …


Landmark Enforcement And Principal Component Analysis For Improving Gan-Based Morphing, Samuel W. Price Jan 2022

Landmark Enforcement And Principal Component Analysis For Improving Gan-Based Morphing, Samuel W. Price

Graduate Theses, Dissertations, and Problem Reports

Facial Recognition Systems (FRSs) are a key target for adversaries determined to circumvent security checkpoints. Morph images threaten FRS by presenting as multiple individuals, allowing an adversary to swap identities with another subject. Although morph generation using generative adversarial networks (GANs) results in high-quality morphs without possessing the spatial artifacts caused by landmarkbased methods, there is an apparent loss in identity with standard GAN-based morphing methods. In this thesis, we examine landmark-based and GAN-based morphing methods to fuse the advantages of both methodologies. We propose a novel StyleGAN2 morph generation technique by introducing a landmark enforcement method. Considering this method, …


Modeling Of Inverter-Based Microgrid For Small-Signal And Large-Signal Stability Analysis, Vishal Verma Jan 2022

Modeling Of Inverter-Based Microgrid For Small-Signal And Large-Signal Stability Analysis, Vishal Verma

Graduate Theses, Dissertations, and Problem Reports

Integration of inverter-based resources (IBRs) such as solar photovoltaic, wind, and battery storage, is both a boon and a bane for electric power systems. On one hand, IBRs have helped in making electrical energy a clean (carbon-free) source of energy. On other hand, the dynamics of IBRs have changed the way power system studies have been carried out. With the advantages IBRs offer over conventional resources, it is assumed that a small distribution power system (microgrid) will have a 100% IBRs penetration in the future. Such a microgrid can operate in grid-connected mode or in an islanded mode. Both modes …


Inferential Statistics And Information Theoretical Measures: An Approach To Interference Detection In Radio Astronomy, Morgan R. Dameron Jan 2022

Inferential Statistics And Information Theoretical Measures: An Approach To Interference Detection In Radio Astronomy, Morgan R. Dameron

Graduate Theses, Dissertations, and Problem Reports

In a time when technology is rapidly growing, radio observatories are now able to expand their computational power to achieve higher receiver sensitivity power and a more flexible realtime computing approach to probe the universe for its composition and study new astronomical phenomena. This allows searches to go deeper into the universe, and results in the recording of massive quantities of observed data. At the same time, this increases the amount of radio frequency interference (RFI) found in the obtained observatory data. The high power of RFI easily masks the low power of extraterrestrial signals, making them hard to detect …


Performance Enhancement Of Organic Light-Emitting Diodes By Electronic Doping, David A. Shelhammer Jan 2022

Performance Enhancement Of Organic Light-Emitting Diodes By Electronic Doping, David A. Shelhammer

Graduate Theses, Dissertations, and Problem Reports

Since the invention of organic light-emitting diodes (OLEDs) nearly 40 years ago, significant effort has been put into realizing their full potential. OLEDs exhibit several properties that make them ideal candidates for applications in displays as well as solid-state lighting: low power consumption, high contrast ratios, mechanical flexibility, and wide viewing angles. However, the low electrical conductivity and poor stability of organic materials remain critical factors that limit device performance. The focus of this work is OLED performance improvement through the introduction of novel inorganic dopants into organic charge transport layers. The results show a significant reduction in operating voltage …


An Efficient Ar Model-Based Method For The Detection Of Forced Oscillations In Power Networks: Implementation And Analysis, Maria Waleska Suarez Jan 2022

An Efficient Ar Model-Based Method For The Detection Of Forced Oscillations In Power Networks: Implementation And Analysis, Maria Waleska Suarez

Graduate Theses, Dissertations, and Problem Reports

An active research topic is the detection of various oscillations that may lead to instability and potential disruption in the operation of a power network. Forced Oscillations (FOs) play a unique role in power system stability among various oscillations. They are perturbances that change the system’s state and are caused for many reasons, including but not limited to persistent load changes and oscillatory load or generation, fault, triplane, and other mechanical anomalies. These factors can hugely affect the power grid by either increasing or decreasing the amplitude, causing corrupt modes leading to blackouts, affecting the equipment involved, delivering poor power …


Information Theoretical Analysis Of The Uniqueness Of Iris Biometrics, Katelyn M. Hampel Jan 2022

Information Theoretical Analysis Of The Uniqueness Of Iris Biometrics, Katelyn M. Hampel

Graduate Theses, Dissertations, and Problem Reports

With the rapid globalization of technology in the world, the need for a more reliable and secure online method of authentication is required. This can be achieved by using each individual’s distinctive biometric identifiers, such as the face, iris, fingerprint, palmprint, etc.; however, there is a bound to the uniqueness of each identifier and consequently, a limit to the capacity that a biometric recognition system can sustain before false matches occur. Therefore, knowing the limitations on the maximum population that a biometric modality can uniquely represent is essential now more than ever. In an effort to address the general problem, …


An Analysis On Adversarial Machine Learning: Methods And Applications, Ali Dabouei Jan 2022

An Analysis On Adversarial Machine Learning: Methods And Applications, Ali Dabouei

Graduate Theses, Dissertations, and Problem Reports

Deep learning has witnessed astonishing advancement in the last decade and revolutionized many fields ranging from computer vision to natural language processing. A prominent field of research that enabled such achievements is adversarial learning, investigating the behavior and functionality of a learning model in presence of an adversary. Adversarial learning consists of two major trends. The first trend analyzes the susceptibility of machine learning models to manipulation in the decision-making process and aims to improve the robustness to such manipulations. The second trend exploits adversarial games between components of the model to enhance the learning process. This dissertation aims to …


Performance Of Sensor Fusion For Vehicular Applications, Nikola Janevski Jan 2022

Performance Of Sensor Fusion For Vehicular Applications, Nikola Janevski

Graduate Theses, Dissertations, and Problem Reports

Sensor fusion is a key system in Advanced Driver Assistance Systems, ADAS. The perfor-
mance of the sensor fusion depends on many factors such as the sensors used, the kinematic
model used in the Extended Kalman Filter, EKF, the motion of the vehicles, the type of
road, the density of vehicles, and the gating methods. The interactions between parameters
and the extent to which individual parameters contribute to the overall accuracy of a sensor
fusion system can be difficult to assess.
In this study, a full-factorial experimental evaluation of a sensor fusion system based
on a real vehicle was performed. …


Air-Assisted Communications Using Line-Of-Sight Links, Shaikha A. Alkandari Jan 2022

Air-Assisted Communications Using Line-Of-Sight Links, Shaikha A. Alkandari

Graduate Theses, Dissertations, and Problem Reports

Recently, there has been a rapid increase in the use of air-assisted communications involv-
ing the use of airborne platforms such as unmanned aerial vehicles (UAVs). In air-assisted
networks, the UAVs can act like base stations in a traditional cellular network as long as an
appropriate backhaul is available. Alternatively, the UAVs could serve as relays, for instance,
connecting two ground-based users who are within range of the UAV. UAVs have the benefit
of being deployed and reconfigured rapidly and on demand.
Meanwhile, there has been a trend towards the use of higher and higher frequencies,
including those in millimeter-wave …


Network Slicing In 5g: Admission, Scheduling, And Security, Raneem Jassim Alghawi Jan 2022

Network Slicing In 5g: Admission, Scheduling, And Security, Raneem Jassim Alghawi

Graduate Theses, Dissertations, and Problem Reports

In the past few decades, there was an increase in the number of devices that have wireless capabilities such as phones, televisions, and home appliances. With the high demand for wireless networking, the fifth generation (5G) of mobile networks was designed to support the different services of new applications. In addition, one of the technical issues that 5G would evolve is the increase in traffic and the need to satisfy the user’s experience. With the evolution of wireless networking and 5G, Network Slicing has been introduced to accommodate the diverse requirements of the applications. Thus, network slicing is the concept …


Modeling, Fabrication, And Characterization Of Rf-Based Passive Wireless Sensors Composed Of Refractory Semiconducting Ceramics For High Temperature Applications, Kavin Sivaneri Varadharajan Idhaiam Jan 2022

Modeling, Fabrication, And Characterization Of Rf-Based Passive Wireless Sensors Composed Of Refractory Semiconducting Ceramics For High Temperature Applications, Kavin Sivaneri Varadharajan Idhaiam

Graduate Theses, Dissertations, and Problem Reports

Real-time health monitoring of high temperature systems (>500oC) in harsh environments is necessary to prevent catastrophic events caused by structural failures, varying pressure, and chemical reactions. Conventional solid-state temperature sensors such as resistance temperature detectors (RTDs) and thermocouples are restricted by their operating environments, sensor dimensions and often require external power sources for their operation. The current work presents the research and development of RF-based passive wireless sensing technology targeting high temperatures and harsh environmental conditions. Passive wireless devices are generally classified as near-field and far-field devices based on the interrogation distance. Near-field sensors are placed at …