Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- 3D reconstruction (1)
- Biomedical monitoring (1)
- Body sensor network (1)
- Bystanders' privacy (1)
- Camera network calibration (1)
-
- Clustering (1)
- Communication system security (1)
- Cryptographic hash function (1)
- Data Mining (1)
- Distributed generation (1)
- Distribution system (1)
- Encryption (1)
- FPGA (1)
- Face detection (1)
- Face recognition (1)
- Fault location (1)
- Fault section identification (1)
- Field programmable gate arrays (1)
- Gated recurrent units (1)
- Google Chart Visualization Package (1)
- Hardware (1)
- Image Sensor (1)
- Internet of Things (1)
- Internet of things (1)
- IoT (1)
- Low resource speech recognition (1)
- Machine Vision (1)
- PCB Design (1)
- Privacy enhancing technology (1)
- RGB-D camera (1)
- Publication
- Publication Type
Articles 1 - 7 of 7
Full-Text Articles in Computer Engineering
Facepet: Enhancing Bystanders' Facial Privacy With Smart Wearables/Internet Of Things, Alfredo J. Perez, Sherali Zeadally, Luis Y. Matos Garcia, Jaouad A. Mouloud, Scott Griffith
Facepet: Enhancing Bystanders' Facial Privacy With Smart Wearables/Internet Of Things, Alfredo J. Perez, Sherali Zeadally, Luis Y. Matos Garcia, Jaouad A. Mouloud, Scott Griffith
Information Science Faculty Publications
Given the availability of cameras in mobile phones, drones and Internet-connected devices, facial privacy has become an area of major interest in the last few years, especially when photos are captured and can be used to identify bystanders’ faces who may have not given consent for these photos to be taken and be identified. Some solutions to protect facial privacy in photos currently exist. However, many of these solutions do not give a choice to bystanders because they rely on algorithms that de-identify photos or protocols to deactivate devices and systems not controlled by bystanders, thereby being dependent on the …
Advanced Recurrent Network-Based Hybrid Acoustic Models For Low Resource Speech Recognition, Jian Kang, Wei-Qiang Zhang, Wei-Wei Liu, Jia Liu, Michael T. Johnson
Advanced Recurrent Network-Based Hybrid Acoustic Models For Low Resource Speech Recognition, Jian Kang, Wei-Qiang Zhang, Wei-Wei Liu, Jia Liu, Michael T. Johnson
Electrical and Computer Engineering Faculty Publications
Recurrent neural networks (RNNs) have shown an ability to model temporal dependencies. However, the problem of exploding or vanishing gradients has limited their application. In recent years, long short-term memory RNNs (LSTM RNNs) have been proposed to solve this problem and have achieved excellent results. Bidirectional LSTM (BLSTM), which uses both preceding and following context, has shown particularly good performance. However, the computational requirements of BLSTM approaches are quite heavy, even when implemented efficiently with GPU-based high performance computers. In addition, because the output of LSTM units is bounded, there is often still a vanishing gradient issue over multiple layers. …
Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally
Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally
Information Science Faculty Publications
One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments of small scale smart sensors in WBSNs, security, and privacy guarantees (e.g., security and safety-critical data, sensitive private information) are becoming a challenging issue because these sensor nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious tampering) using the secure hash algorithm 3 (SHA-3) when smart sensors in WBSNs communicate with each other using the Internet. Due to the limited resources (i.e., storage, …
Fault Identification And Location For Distribution Network With Distributed Generations, Wen Fan, Yuan Liao
Fault Identification And Location For Distribution Network With Distributed Generations, Wen Fan, Yuan Liao
Electrical and Computer Engineering Faculty Publications
Power distribution networks with distributed generations may experience faults. It is essential to promptly locate the fault for fast repair and restoration. This paper presents a novel method for identifying the faulted section and accurate location of faults that occur on power distribution grid. Appropriate matrices are set up to represent meter locations on the grid and the topology of the grid. The voltage and current measurements obtained are utilized to decide the fault sections. Then fault location is determined by solving equations that link measurements and fault locations through bus impedance matrix. The method is applicable to both single …
A Fast And Robust Extrinsic Calibration For Rgb-D Camera Networks, Po-Chang Su, Ju Shen, Wanxin Xu, Sen-Ching S. Cheung, Ying Luo
A Fast And Robust Extrinsic Calibration For Rgb-D Camera Networks, Po-Chang Su, Ju Shen, Wanxin Xu, Sen-Ching S. Cheung, Ying Luo
Electrical and Computer Engineering Faculty Publications
From object tracking to 3D reconstruction, RGB-Depth (RGB-D) camera networks play an increasingly important role in many vision and graphics applications. Practical applications often use sparsely-placed cameras to maximize visibility, while using as few cameras as possible to minimize cost. In general, it is challenging to calibrate sparse camera networks due to the lack of shared scene features across different camera views. In this paper, we propose a novel algorithm that can accurately and rapidly calibrate the geometric relationships across an arbitrary number of RGB-D cameras on a network. Our work has a number of novel features. First, to cope …
Interactive Clinical Event Pattern Mining And Visualization Using Insurance Claims Data, Zhenhui Piao
Interactive Clinical Event Pattern Mining And Visualization Using Insurance Claims Data, Zhenhui Piao
Theses and Dissertations--Computer Science
With exponential growth on a daily basis, there is potentially valuable information hidden in complex electronic medical records (EMR) systems. In this thesis, several efficient data mining algorithms were explored to discover hidden knowledge in insurance claims data. The first aim was to cluster three levels of information overload(IO) groups among chronic rheumatic disease (CRD) patient groups based on their clinical events extracted from insurance claims data. The second aim was to discover hidden patterns using three renowned pattern mining algorithms: Apriori, frequent pattern growth(FP-Growth), and sequential pattern discovery using equivalence classes(SPADE). The SPADE algorithm was found to be the …
Design Of A Machine Vision Camera For Spatial Augmented Reality, Matt Phillip Ruffner
Design Of A Machine Vision Camera For Spatial Augmented Reality, Matt Phillip Ruffner
Theses and Dissertations--Electrical and Computer Engineering
Structured Light Imaging (SLI) is a means of digital reconstruction, or Three-Dimensional (3D) scanning, and has uses that span many disciplines. A projector, camera and Personal Computer (PC) are required to perform such 3D scans. Slight variances in synchronization between these three devices can cause malfunctions in the process due to the limitations of PC graphics processors as real-time systems. Previous work used a Field Programmable Gate Array (FPGA) to both drive the projector and trigger the camera, eliminating these timing issues, but still needing an external camera. This thesis proposes the incorporation of the camera with the FPGA SLI …