Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

Formation Control With Bounded Controls And Collision Avoidance: Theory And Application To Quadrotor Unmanned Air Vehicles, Zachary S. Lippay Jan 2022

Formation Control With Bounded Controls And Collision Avoidance: Theory And Application To Quadrotor Unmanned Air Vehicles, Zachary S. Lippay

Theses and Dissertations--Mechanical Engineering

This dissertation presents new results on multi-agent formation control and applies the new control algorithms to quadrotor unmanned air vehicles. First, this dissertation presents a formation control algorithm for double-integrator agents, where the formation is time varying and the agents’ controls satisfy a priori bounds (e.g., the controls accommodate actuator saturation). The main analytic results provide sufficient conditions such that all agents converge to the desired time-varying relative positions with one another and the leader, and have a priori bounded controls (if applicable). We also present results from rotorcraft experiments that demonstrate the algorithm with time-varying formations and bounded controls. …


Synthesizing Dysarthric Speech Using Multi-Speaker Tts For Dsyarthric Speech Recognition, Mohammad Soleymanpour Jan 2022

Synthesizing Dysarthric Speech Using Multi-Speaker Tts For Dsyarthric Speech Recognition, Mohammad Soleymanpour

Theses and Dissertations--Electrical and Computer Engineering

Dysarthria is a motor speech disorder often characterized by reduced speech intelligibility through slow, uncoordinated control of speech production muscles. Automatic Speech recognition (ASR) systems may help dysarthric talkers communicate more effectively. However, robust dysarthria-specific ASR requires a significant amount of training speech is required, which is not readily available for dysarthric talkers.

In this dissertation, we investigate dysarthric speech augmentation and synthesis methods. To better understand differences in prosodic and acoustic characteristics of dysarthric spontaneous speech at varying severity levels, a comparative study between typical and dysarthric speech was conducted. These characteristics are important components for dysarthric speech modeling, …


Protocols And Architecture For Privacy-Preserving Authentication And Secure Message Dissemination In Vehicular Ad Hoc Networks, Shafika Showkat Moni Jan 2022

Protocols And Architecture For Privacy-Preserving Authentication And Secure Message Dissemination In Vehicular Ad Hoc Networks, Shafika Showkat Moni

Theses and Dissertations--Computer Science

The rapid development in the automotive industry and wireless communication technologies have enhanced the popularity of Vehicular ad hoc networks (VANETs). Today, the automobile industry is developing sophisticated sensors that can provide a wide range of assistive features, including accident avoidance, automatic lane tracking, semi-autonomous driving, suggested lane changes, and more. VANETs can provide drivers a safer and more comfortable driving experience, as well as many other useful services by leveraging such technological advancements. Even though this networking technology enables smart and autonomous driving, it also introduces a plethora of attack vectors. However, the main issues to be sorted out …


Improving Network Policy Enforcement Using Natural Language Processing And Programmable Networks, Pinyi Shi Jan 2022

Improving Network Policy Enforcement Using Natural Language Processing And Programmable Networks, Pinyi Shi

Theses and Dissertations--Computer Science

Computer networks are becoming more complex and challenging to operate, manage, and protect. As a result, Network policies that define how network operators should manage the network are becoming more complex and nuanced. Unfortunately, network policies are often an undervalued part of network design, leaving network operators to guess at the intent of policies that are written and fill in the gaps where policies don’t exist. Organizations typically designate Policy Committees to write down the network policies in the policy documents using high-level natural languages. The policy documents describe both the acceptable and unacceptable uses of the network. Network operators …