Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cognitive radio (4)
- Spectrum sensing (4)
- Machine learning (3)
- Spectrum sharing (3)
- Wireless sensor networks (3)
-
- Cognitive radio networks (2)
- Computer vision (2)
- Deep learning (2)
- Energy detection (2)
- Face recognition (2)
- Multicast (2)
- Scheduling (2)
- Security (2)
- Sensor networks (2)
- Super-resolution (2)
- Wireless communications (2)
- 3D (1)
- 5G networks (1)
- AVISPA (1)
- Ab initio electronic structure calculations (1)
- Accelerator physics (1)
- Accuracy (1)
- Actuators (1)
- Adiabatic circuits (1)
- Adjacent quadratic shortest path (1)
- Airborne vehicle (1)
- Aircraft control (1)
- Analytical models (1)
- Architecture software (1)
- Artificial neural networks (1)
- Publication Year
- Publication
-
- Electrical & Computer Engineering Theses & Dissertations (36)
- Electrical & Computer Engineering Faculty Publications (7)
- Computational Modeling & Simulation Engineering Faculty Publications (3)
- Computational Modeling & Simulation Engineering Theses & Dissertations (3)
- Computer Science Theses & Dissertations (3)
-
- Engineering Management & Systems Engineering Faculty Publications (3)
- Engineering Technology Faculty Publications (3)
- Information Technology & Decision Sciences Faculty Publications (2)
- Modeling, Simulation and Visualization Student Capstone Conference (2)
- VMASC Publications (2)
- Mechanical & Aerospace Engineering Theses & Dissertations (1)
- Physics Faculty Publications (1)
- Publication Type
Articles 1 - 30 of 66
Full-Text Articles in Computer Engineering
Framework For Implementing Advanced Radar Plotting Aid Capability For Small Maritime Vessels, Jason Stark Harris
Framework For Implementing Advanced Radar Plotting Aid Capability For Small Maritime Vessels, Jason Stark Harris
Electrical & Computer Engineering Theses & Dissertations
Every year in the United States many people are killed or injured when maritime vessels collide with other vessels or fixed objects. According to the United States Coast Guard, the top contributing factors to these collisions are operator inattention, operator inexperience and an improper lookout. Larger commercial vessels are required to have RADAR systems which support Automatic RADAR Plotting Aid (ARPA) which can automatically detect collisions and alert an operator to change course. These systems can be very expensive which put them out of reach of the average recreational boater. It is however possible to implement a low cost ARPA …
Towards A Robust Defense: A Multifaceted Approach To The Detection And Mitigation Of Neural Backdoor Attacks Through Feature Space Exploration And Analysis, Liuwan Zhu
Electrical & Computer Engineering Theses & Dissertations
From voice assistants to self-driving vehicles, machine learning(ML), especially deep learning, revolutionizes the way we work and live, through the wide adoption in a broad range of applications. Unfortunately, this widespread use makes deep learning-based systems a desirable target for cyberattacks, such as generating adversarial examples to fool a deep learning system to make wrong decisions. In particular, many recent studies have revealed that attackers can corrupt the training of a deep learning model, e.g., through data poisoning, or distribute a deep learning model they created with “backdoors” planted, e.g., distributed as part of a software library, so that the …
Automatic Generation Of Virtual Work Guide For Complex Procedures: A Case, Shan Liu, Yuzhong Shen
Automatic Generation Of Virtual Work Guide For Complex Procedures: A Case, Shan Liu, Yuzhong Shen
Modeling, Simulation and Visualization Student Capstone Conference
Practical work guides for complex procedures are significant and highly affect the efficiency and accuracy of on-site users. This paper presents a technique to generate virtual work guides automatically for complex procedures. Firstly, the procedure information is extracted from the electronic manual in PDF format. And then, the extracted procedure steps are mapped to the virtual model parts in preparation for animation between adjacent steps. Next, smooth animations of the procedure are generated based on a 3D natural cubic spline curve to improve the spatial ability of the work guide. In addition, each step's annotation is automatically adjusted to improve …
Gpu Utilization: Predictive Sarimax Time Series Analysis, Dorothy Dorie Parry
Gpu Utilization: Predictive Sarimax Time Series Analysis, Dorothy Dorie Parry
Modeling, Simulation and Visualization Student Capstone Conference
This work explores collecting performance metrics and leveraging the output for prediction on a memory-intensive parallel image classification algorithm - Inception v3 (or "Inception3"). Experimental results were collected by nvidia-smi on a computational node DGX-1, equipped with eight Tesla V100 Graphic Processing Units (GPUs). Time series analysis was performed on the GPU utilization data taken, for multiple runs, of Inception3’s image classification algorithm (see Figure 1). The time series model applied was Seasonal Autoregressive Integrated Moving Average Exogenous (SARIMAX).
An Overview Of Bidirectional Electric Vehicles Charging System As A Vehicle To Anything (V2x) Under Cyber–Physical Power System (Cpps), Onur Elma, Umit Cali, Murat Kuzlu
An Overview Of Bidirectional Electric Vehicles Charging System As A Vehicle To Anything (V2x) Under Cyber–Physical Power System (Cpps), Onur Elma, Umit Cali, Murat Kuzlu
Engineering Technology Faculty Publications
Nowadays, EVs are rapidly increasing in popularity, and are accepted as the vehicles of the future all over the world. The most important components are their battery and charging systems. The energy capacity of EVs’ batteries has a significant potential to supply different energy requirements. Therefore, EVs must be designed in accordance with bidirectional power flow, and Electric Vehicle Supply Equipment (EVSE) should be upgraded as Electric Vehicle Power Exchange Equipment (EVPE). This power exchange infrastructure can be called Vehicle-to-Anything (V2X). V2X will also be the key solution for energy grids of the future that will turn into a much …
Monocular Camera Viewpoint-Invariant Vehicular Traffic Segmentation And Classification Utilizing Small Datasets, Amr Yousef, Jeff Flora, Khan Iftekharuddin
Monocular Camera Viewpoint-Invariant Vehicular Traffic Segmentation And Classification Utilizing Small Datasets, Amr Yousef, Jeff Flora, Khan Iftekharuddin
Electrical & Computer Engineering Faculty Publications
The work presented here develops a computer vision framework that is view angle independent for vehicle segmentation and classification from roadway traffic systems installed by the Virginia Department of Transportation (VDOT). An automated technique for extracting a region of interest is discussed to speed up the processing. The VDOT traffic videos are analyzed for vehicle segmentation using an improved robust low-rank matrix decomposition technique. It presents a new and effective thresholding method that improves segmentation accuracy and simultaneously speeds up the segmentation processing. Size and shape physical descriptors from morphological properties and textural features from the Histogram of Oriented Gradients …
Integrating Plcs With Robot Motion Control In Engineering Capstone Courses, Sanjeevi Chitikeshi, Shirshak K. Dhali, Vukica Jovanovic
Integrating Plcs With Robot Motion Control In Engineering Capstone Courses, Sanjeevi Chitikeshi, Shirshak K. Dhali, Vukica Jovanovic
Engineering Technology Faculty Publications
Robotic motion control methods and Programmable Logic Controllers (PLCs) are critical in engineering automation and process control applications. In most manufacturing and automation processes, robots are used for moving parts and are controlled by industrial PLCs. Proper integration of external I/O devices, sensors and actuating motors with PLC input and output cards is very important to run the process smoothly without any faults and/or safety concerns. Most traditional electrical and computer engineering (ECE) programs offer high level of motion theory and controls but little hands-on exposure to PLCs which are the main industrial controllers. This paper provides a framework for …
Collaborative Robotics Strategies For Handling Non-Repetitive Micro-Drilling Tasks Characterized By Low Structural Mechanical Impedance, Xiangyu Wang
Mechanical & Aerospace Engineering Theses & Dissertations
Mechanical micro-drilling finds widespread use in diverse applications ranging from advanced manufacturing to medical surgery. This dissertation aims to develop techniques that allow programming of robots to perform effective micro-drilling tasks. Accomplishing this goal is faced with several challenges. Micro-drills suffer from frequent breakage caused from variations in drill process parameters. Micro-drilling tasks afford extremely low feed rates and almost zero tolerance for any feed rate variations. The accompanying robot programming task is made difficult as mathematical models that capture the micro-drilling process complexities and sensitive variations in micro-drill parameters are highly difficult to obtain. Therefore, an experimental approach is …
Applied Deep Learning: Case Studies In Computer Vision And Natural Language Processing, Md Reshad Ul Hoque
Applied Deep Learning: Case Studies In Computer Vision And Natural Language Processing, Md Reshad Ul Hoque
Electrical & Computer Engineering Theses & Dissertations
Deep learning has proved to be successful for many computer vision and natural language processing applications. In this dissertation, three studies have been conducted to show the efficacy of deep learning models for computer vision and natural language processing. In the first study, an efficient deep learning model was proposed for seagrass scar detection in multispectral images which produced robust, accurate scars mappings. In the second study, an arithmetic deep learning model was developed to fuse multi-spectral images collected at different times with different resolutions to generate high-resolution images for downstream tasks including change detection, object detection, and land cover …
Measuring The Rol Of Digital Engineering: It's A Journey, Not A Number, Tom Mcdermott, Kaitlin Henderson, Eileen Van Aken, Alejandro Salado, Joseph Bradley
Measuring The Rol Of Digital Engineering: It's A Journey, Not A Number, Tom Mcdermott, Kaitlin Henderson, Eileen Van Aken, Alejandro Salado, Joseph Bradley
Engineering Management & Systems Engineering Faculty Publications
Systems engineering as a discipline has long had difficulty providing quantifiable evidence of its value (Honour 2004); DE transformation provides an opportunity to better measure its value. Transitioning from a document-based to a model-based approach is expensive, and organizations want to know if the effort and cost to adopt MBSE is worth it.
Runtime Energy Savings Based On Machine Learning Models For Multicore Applications, Vaibhav Sundriyal, Masha Sosonkina
Runtime Energy Savings Based On Machine Learning Models For Multicore Applications, Vaibhav Sundriyal, Masha Sosonkina
Electrical & Computer Engineering Faculty Publications
To improve the power consumption of parallel applications at the runtime, modern processors provide frequency scaling and power limiting capabilities. In this work, a runtime strategy is proposed to maximize energy savings under a given performance degradation. Machine learning techniques were utilized to develop performance models which would provide accurate performance prediction with change in operating core-uncore frequency. Experiments, performed on a node (28 cores) of a modern computing platform showed significant energy savings of as much as 26% with performance degradation of as low as 5% under the proposed strategy compared with the execution in the unlimited power case.
Spectrum Sensing With Energy Detection In Multiple Alternating Time Slots, Călin Vlădeanu, Alexandru Marţian, Dimitrie C. Popescu
Spectrum Sensing With Energy Detection In Multiple Alternating Time Slots, Călin Vlădeanu, Alexandru Marţian, Dimitrie C. Popescu
Electrical & Computer Engineering Faculty Publications
Energy detection (ED) represents a low complexity approach used by secondary users (SU) to sense spectrum occupancy by primary users (PU) in cognitive radio (CR) systems. In this paper, we present a new algorithm that senses the spectrum occupancy by performing ED in K consecutive sensing time slots starting from the current slot and continuing by alternating before and after the current slot. We consider a PU traffic model specified in terms of an average duty cycle value, and derive analytical expressions for the false alarm probability (FAP) and correct detection probability (CDP) for any value of K . Our …
Electrostatic Design And Characterization Of A 200 Kev Photogun And Wien Spin Rotator, Gabriel G. Palacios Serrano
Electrostatic Design And Characterization Of A 200 Kev Photogun And Wien Spin Rotator, Gabriel G. Palacios Serrano
Electrical & Computer Engineering Theses & Dissertations
High-energy nuclear physics experiments at the Jefferson Lab Continuous Electron Beam Accelerator Facility (CEBAF) require high spin-polarization electron beams produced from strained super-lattice GaAs photocathodes activated to negative electron affinity in a high voltage photogun operating at 130 kV dc. A pair of Wien filter spin rotators in the injector provides precise control of the electron beam polarization at the end station target. An upgrade of the CEBAF injector to better support the upcoming Moller experiment requires increasing the electron beam energy to 200 keV, resulting in better transmission through injector apertures and improved photocathode lifetime. In addition, the energy …
Cyber Defense Remediation In Energy Delivery Systems, Kamrul Hasan
Cyber Defense Remediation In Energy Delivery Systems, Kamrul Hasan
Computational Modeling & Simulation Engineering Theses & Dissertations
The integration of Information Technology (IT) and Operational Technology (OT) in Cyber-Physical Systems (CPS) has resulted in increased efficiency and facilitated real-time information acquisition, processing, and decision making. However, the increase in automation technology and the use of the internet for connecting, remote controlling, and supervising systems and facilities has also increased the likelihood of cybersecurity threats that can impact safety of humans and property. There is a need to assess cybersecurity risks in the power grid, nuclear plants, chemical factories, etc. to gain insight into the likelihood of safety hazards. Quantitative cybersecurity risk assessment will lead to informed cyber …
Work-In-Progress: Augmented Reality System For Vehicle Health Diagnostics And Maintenance, Yuzhong Shen, Anthony W. Dean, Rafael Landaeta
Work-In-Progress: Augmented Reality System For Vehicle Health Diagnostics And Maintenance, Yuzhong Shen, Anthony W. Dean, Rafael Landaeta
Electrical & Computer Engineering Faculty Publications
This paper discusses undergraduate research to develop an augmented reality (AR) system for diagnostics and maintenance of the Joint Light Tactical Vehicle (JLTV) employed by U.S. Army and U.S. Marine Corps. The JLTV’s diagnostic information will be accessed by attaching a Bluetooth adaptor (Ford Reference Vehicle Interface) to JLTV’s On-board diagnostics (OBD) system. The proposed AR system will be developed for mobile devices (Android and iOS tablets and phones) and it communicates with the JLTV’s OBD via Bluetooth. The AR application will contain a simplistic user interface that reads diagnostic data from the JLTV, shows vehicle sensors, and allows users …
Upgrading Of A Data Communication And Computer Networks Course In Engineering Technology Program, Murat Kuzlu, Otilia Popescu
Upgrading Of A Data Communication And Computer Networks Course In Engineering Technology Program, Murat Kuzlu, Otilia Popescu
Engineering Technology Faculty Publications
Data network communications is traditionally a course offered by computer engineering technology curricula, with the primary objective to introduce to the fundamental concepts in data communication and computer networks, as well as some level of hands-on component related to this area. Typical topics in such courses are the layered model of data communication, specifically the OSI seven-layered model, Internet routing, communication standards, protocols and technologies, and learning methods used to design the network and send data over the network in a secure manner. In the last decades, the data communication and applications have grown and become ubiquitous in both industry …
Virtual Satcom, Long Range Broadband Digital Communications, Dennis George Watson
Virtual Satcom, Long Range Broadband Digital Communications, Dennis George Watson
Electrical & Computer Engineering Theses & Dissertations
The current naval strategy is based on a distributed force, networked together with high-speed communications that enable operations as an intelligent, fast maneuvering force. Satellites, the existing network connector, are weak and vulnerable to attack. HF is an alternative, but it does not have the information throughput to meet the distributed warfighting need. The US Navy does not have a solution to reduce dependency on space-based communication systems while providing the warfighter with the required information speed.
Virtual SATCOM is a solution that can match satellite communications (SATCOM) data speed without the vulnerable satellite. It is wireless communication on a …
Deep Cellular Recurrent Neural Architecture For Efficient Multidimensional Time-Series Data Processing, Lasitha S. Vidyaratne
Deep Cellular Recurrent Neural Architecture For Efficient Multidimensional Time-Series Data Processing, Lasitha S. Vidyaratne
Electrical & Computer Engineering Theses & Dissertations
Efficient processing of time series data is a fundamental yet challenging problem in pattern recognition. Though recent developments in machine learning and deep learning have enabled remarkable improvements in processing large scale datasets in many application domains, most are designed and regulated to handle inputs that are static in time. Many real-world data, such as in biomedical, surveillance and security, financial, manufacturing and engineering applications, are rarely static in time, and demand models able to recognize patterns in both space and time. Current machine learning (ML) and deep learning (DL) models adapted for time series processing tend to grow in …
Longitudinal Brain Tumor Tracking, Tumor Grading, And Patient Survival Prediction Using Mri, Linmin Pei
Longitudinal Brain Tumor Tracking, Tumor Grading, And Patient Survival Prediction Using Mri, Linmin Pei
Electrical & Computer Engineering Theses & Dissertations
This work aims to develop novel methods for brain tumor classification, longitudinal brain tumor tracking, and patient survival prediction. Consequently, this dissertation proposes three tasks. First, we develop a framework for brain tumor segmentation prediction in longitudinal multimodal magnetic resonance imaging (mMRI) scans, comprising two methods: feature fusion and joint label fusion (JLF). The first method fuses stochastic multi-resolution texture features with tumor cell density features, in order to obtain tumor segmentation predictions in follow-up scans from a baseline pre-operative timepoint. The second method utilizes JLF to combine segmentation labels obtained from (i) the stochastic texture feature-based and Random Forest …
Topology Control, Scheduling, And Spectrum Sensing In 5g Networks, Prosanta Paul
Topology Control, Scheduling, And Spectrum Sensing In 5g Networks, Prosanta Paul
Electrical & Computer Engineering Theses & Dissertations
The proliferation of intelligent wireless devices is remarkable. To address phenomenal traffic growth, a key objective of next-generation wireless networks such as 5G is to provide significantly larger bandwidth. To this end, the millimeter wave (mmWave) band (20 GHz -300 GHz) has been identified as a promising candidate for 5G and WiFi networks to support user data rates of multi-gigabits per second. However, path loss at mmWave is significantly higher than today's cellular bands. Fortunately, this higher path loss can be compensated through the antenna beamforming technique-a transmitter focuses a signal towards a specific direction to achieve high signal gain …
Recent Developments In The General Atomic And Molecular Electronic Structure System, Guiseppe M.J. Barca, Colleen Bertoni, Laura Carrington, Dipayan Datta, Nuwan De Silva, J. Emillano Deustua, Dmitri G. Fedorov, Jeffrey R. Cour, Anastasia O. Gunina, Emilie Guidez, Taylor Harville, Stephan Irle, Joe Ivanic, Karol Kowalski, Sarom S. Leang, Wei Li, Jesse J. Lutz, Ilias Magoulas, Joani Mato, Vladimir Mironov, Hiroya Nakata, Buu Q. Pham, Piotr Piecuch, David Poole, Spencer R. Pruitt, Alistair P. Rendell, Luke B. Roskop, Klaus Ruedenberg, Tosaporn Sattasathuchana, Michael W. Schmidt, Jun Shen, Lyudmila Slipchenko, Masha Sosonkina, Vaibhav Sundriyal, Ananta Tiwari, Jorge L. Galvez Vallejo, Bryce Westheimer, Marta Włoch, Peng Xu, Federico Zahariev, Mark S. Gordon
Recent Developments In The General Atomic And Molecular Electronic Structure System, Guiseppe M.J. Barca, Colleen Bertoni, Laura Carrington, Dipayan Datta, Nuwan De Silva, J. Emillano Deustua, Dmitri G. Fedorov, Jeffrey R. Cour, Anastasia O. Gunina, Emilie Guidez, Taylor Harville, Stephan Irle, Joe Ivanic, Karol Kowalski, Sarom S. Leang, Wei Li, Jesse J. Lutz, Ilias Magoulas, Joani Mato, Vladimir Mironov, Hiroya Nakata, Buu Q. Pham, Piotr Piecuch, David Poole, Spencer R. Pruitt, Alistair P. Rendell, Luke B. Roskop, Klaus Ruedenberg, Tosaporn Sattasathuchana, Michael W. Schmidt, Jun Shen, Lyudmila Slipchenko, Masha Sosonkina, Vaibhav Sundriyal, Ananta Tiwari, Jorge L. Galvez Vallejo, Bryce Westheimer, Marta Włoch, Peng Xu, Federico Zahariev, Mark S. Gordon
Computational Modeling & Simulation Engineering Faculty Publications
A discussion of many of the recently implemented features of GAMESS (General Atomic and Molecular Electronic Structure System) and LibCChem (the C++ CPU/GPU library associated with GAMESS) is presented. These features include fragmentation methods such as the fragment molecular orbital, effective fragment potential and effective fragment molecular orbital methods, hybrid MPI/OpenMP approaches to Hartree-Fock, and resolution of the identity second order perturbation theory. Many new coupled cluster theory methods have been implemented in GAMESS, as have multiple levels of density functional/tight binding theory. The role of accelerators, especially graphical processing units, is discussed in the context of the new features …
Ldakm-Eiot: Lightweight Device Authentication And Key Management Mechanism For Edge-Based Iot Deployment, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park
Ldakm-Eiot: Lightweight Device Authentication And Key Management Mechanism For Edge-Based Iot Deployment, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park
VMASC Publications
In recent years, edge computing has emerged as a new concept in the computing paradigm that empowers several future technologies, such as 5G, vehicle-to-vehicle communications, and the Internet of Things (IoT), by providing cloud computing facilities, as well as services to the end users. However, open communication among the entities in an edge based IoT environment makes it vulnerable to various potential attacks that are executed by an adversary. Device authentication is one of the prominent techniques in security that permits an IoT device to authenticate mutually with a cloud server with the help of an edge node. If authentication …
Iomt Malware Detection Approaches: Analysis And Research Challenges, Mohammad Wazid, Ashok Kumar Das, Joel J.P.C. Rodrigues, Sachin Shetty, Youngho Park
Iomt Malware Detection Approaches: Analysis And Research Challenges, Mohammad Wazid, Ashok Kumar Das, Joel J.P.C. Rodrigues, Sachin Shetty, Youngho Park
VMASC Publications
The advancement in Information and Communications Technology (ICT) has changed the entire paradigm of computing. Because of such advancement, we have new types of computing and communication environments, for example, Internet of Things (IoT) that is a collection of smart IoT devices. The Internet of Medical Things (IoMT) is a specific type of IoT communication environment which deals with communication through the smart healthcare (medical) devices. Though IoT communication environment facilitates and supports our day-to-day activities, but at the same time it has also certain drawbacks as it suffers from several security and privacy issues, such as replay, man-in-the-middle, impersonation, …
A Multi-Agent Systems Approach For Analysis Of Stepping Stone Attacks, Marco Antonio Gamarra
A Multi-Agent Systems Approach For Analysis Of Stepping Stone Attacks, Marco Antonio Gamarra
Electrical & Computer Engineering Theses & Dissertations
Stepping stone attacks are one of the most sophisticated cyber-attacks, in which attackers make a chain of compromised hosts to reach a victim target. In this Dissertation, an analytic model with Multi-Agent systems approach has been proposed to analyze the propagation of stepping stones attacks in dynamic vulnerability graphs. Because the vulnerability configuration in a network is inherently dynamic, in this Dissertation a biased min-consensus technique for dynamic graphs with fixed and switching topology is proposed as a distributed technique to calculate the most vulnerable path for stepping stones attacks in dynamic vulnerability graphs. We use min-plus algebra to analyze …
Wireless Sensor Networks For Smart Communications, Mu Zhou, Qilian Liang, Hongyi Wu, Weixiao Meng, Kunjie Xu
Wireless Sensor Networks For Smart Communications, Mu Zhou, Qilian Liang, Hongyi Wu, Weixiao Meng, Kunjie Xu
Electrical & Computer Engineering Faculty Publications
(First paragraph) In the first edition of the special issue titled “Wireless Sensor Networks for Smart Communications”, a total of 22 manuscripts were received and 6 of these were accepted. This issue demonstrated that network congestion, user mobility, and adjacent spectrum interference are the main reasons for the degradation ofcommunication quality inWireless Sensor Networks (WSNs).
Analysis Of Bulk Power System Resilience Using Vulnerability Graph, Md Ariful Haque
Analysis Of Bulk Power System Resilience Using Vulnerability Graph, Md Ariful Haque
Computational Modeling & Simulation Engineering Theses & Dissertations
Critical infrastructure such as a Bulk Power System (BPS) should have some quantifiable measure of resiliency and definite rule-sets to achieve a certain resilience value. Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA) networks are integral parts of BPS. BPS or ICS are themselves not vulnerable because of their proprietary technology, but when the control network and the corporate network need to have communications for performance measurements and reporting, the ICS or BPS become vulnerable to cyber-attacks. Thus, a systematic way of quantifying resiliency and identifying crucial nodes in the network is critical for addressing the cyber …
Coexistence And Secure Communication In Wireless Networks, Saygin Bakşi
Coexistence And Secure Communication In Wireless Networks, Saygin Bakşi
Electrical & Computer Engineering Theses & Dissertations
In a wireless system, transmitted electromagnetic waves can propagate in all directions and can be received by other users in the system. The signals received by unintended receivers pose two problems; increased interference causing lower system throughput or successful decoding of the information which removes secrecy of the communication. Radio frequency spectrum is a scarce resource and it is allocated by technologies already in use. As a result, many communication systems use the spectrum opportunistically whenever it is available in cognitive radio setting or use unlicensed bands. Hence, efficient use of spectrum by sharing users is crucial to increase maximize …
Speech Based Machine Learning Models For Emotional State Recognition And Ptsd Detection, Debrup Banerjee
Speech Based Machine Learning Models For Emotional State Recognition And Ptsd Detection, Debrup Banerjee
Electrical & Computer Engineering Theses & Dissertations
Recognition of emotional state and diagnosis of trauma related illnesses such as posttraumatic stress disorder (PTSD) using speech signals have been active research topics over the past decade. A typical emotion recognition system consists of three components: speech segmentation, feature extraction and emotion identification. Various speech features have been developed for emotional state recognition which can be divided into three categories, namely, excitation, vocal tract and prosodic. However, the capabilities of different feature categories and advanced machine learning techniques have not been fully explored for emotion recognition and PTSD diagnosis. For PTSD assessment, clinical diagnosis through structured interviews is a …
Industrial Wireless Sensor Networks 2016, Qindong Sun, Schancang Li, Shanshan Zhao, Hongjian Sun, Li Xu, Arumugam Nallamathan
Industrial Wireless Sensor Networks 2016, Qindong Sun, Schancang Li, Shanshan Zhao, Hongjian Sun, Li Xu, Arumugam Nallamathan
Information Technology & Decision Sciences Faculty Publications
The industrial wireless sensor network (IWSN) is the next frontier in the Industrial Internet of Things (IIoT), which is able to help industrial organizations to gain competitive advantages in industrial manufacturing markets by increasing productivity, reducing the costs, developing new products and services, and deploying new business models.
Qos Recommendation In Cloud Services, Xianrong Zheng, Li Da Xu, Sheng Chai
Qos Recommendation In Cloud Services, Xianrong Zheng, Li Da Xu, Sheng Chai
Information Technology & Decision Sciences Faculty Publications
As cloud computing becomes increasingly popular, cloud providers compete to offer the same or similar services over the Internet. Quality of service (QoS), which describes how well a service is performed, is an important differentiator among functionally equivalent services. It can help a firm to satisfy and win its customers. As a result, how to assist cloud providers to promote their services and cloud consumers to identify services that meet their QoS requirements becomes an important problem. In this paper, we argue for QoS-based cloud service recommendation, and propose a collaborative filtering approach using the Spearman coefficient to recommend cloud …