Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Authentication (1)
- Consensus (1)
- Data augmentation (1)
- Dysarthria (1)
- Leader-following (1)
-
- Multi-agent (1)
- Natural Language Processing (1)
- Network Policy (1)
- Policy Quality (1)
- Policy Violation (1)
- Privacy preservation. (1)
- Security (1)
- Software-Defined Network (1)
- Speech recognition (1)
- Speech-To-Text (1)
- Synthesized speech (1)
- Time-varying formation (1)
- Tracking (1)
- Unmanned Air Vehicle (1)
- Vehicular Ad Hoc Networks (1)
Articles 1 - 4 of 4
Full-Text Articles in Computer Engineering
Formation Control With Bounded Controls And Collision Avoidance: Theory And Application To Quadrotor Unmanned Air Vehicles, Zachary S. Lippay
Formation Control With Bounded Controls And Collision Avoidance: Theory And Application To Quadrotor Unmanned Air Vehicles, Zachary S. Lippay
Theses and Dissertations--Mechanical Engineering
This dissertation presents new results on multi-agent formation control and applies the new control algorithms to quadrotor unmanned air vehicles. First, this dissertation presents a formation control algorithm for double-integrator agents, where the formation is time varying and the agents’ controls satisfy a priori bounds (e.g., the controls accommodate actuator saturation). The main analytic results provide sufficient conditions such that all agents converge to the desired time-varying relative positions with one another and the leader, and have a priori bounded controls (if applicable). We also present results from rotorcraft experiments that demonstrate the algorithm with time-varying formations and bounded controls. …
Synthesizing Dysarthric Speech Using Multi-Speaker Tts For Dsyarthric Speech Recognition, Mohammad Soleymanpour
Synthesizing Dysarthric Speech Using Multi-Speaker Tts For Dsyarthric Speech Recognition, Mohammad Soleymanpour
Theses and Dissertations--Electrical and Computer Engineering
Dysarthria is a motor speech disorder often characterized by reduced speech intelligibility through slow, uncoordinated control of speech production muscles. Automatic Speech recognition (ASR) systems may help dysarthric talkers communicate more effectively. However, robust dysarthria-specific ASR requires a significant amount of training speech is required, which is not readily available for dysarthric talkers.
In this dissertation, we investigate dysarthric speech augmentation and synthesis methods. To better understand differences in prosodic and acoustic characteristics of dysarthric spontaneous speech at varying severity levels, a comparative study between typical and dysarthric speech was conducted. These characteristics are important components for dysarthric speech modeling, …
Protocols And Architecture For Privacy-Preserving Authentication And Secure Message Dissemination In Vehicular Ad Hoc Networks, Shafika Showkat Moni
Protocols And Architecture For Privacy-Preserving Authentication And Secure Message Dissemination In Vehicular Ad Hoc Networks, Shafika Showkat Moni
Theses and Dissertations--Computer Science
The rapid development in the automotive industry and wireless communication technologies have enhanced the popularity of Vehicular ad hoc networks (VANETs). Today, the automobile industry is developing sophisticated sensors that can provide a wide range of assistive features, including accident avoidance, automatic lane tracking, semi-autonomous driving, suggested lane changes, and more. VANETs can provide drivers a safer and more comfortable driving experience, as well as many other useful services by leveraging such technological advancements. Even though this networking technology enables smart and autonomous driving, it also introduces a plethora of attack vectors. However, the main issues to be sorted out …
Improving Network Policy Enforcement Using Natural Language Processing And Programmable Networks, Pinyi Shi
Improving Network Policy Enforcement Using Natural Language Processing And Programmable Networks, Pinyi Shi
Theses and Dissertations--Computer Science
Computer networks are becoming more complex and challenging to operate, manage, and protect. As a result, Network policies that define how network operators should manage the network are becoming more complex and nuanced. Unfortunately, network policies are often an undervalued part of network design, leaving network operators to guess at the intent of policies that are written and fill in the gaps where policies don’t exist. Organizations typically designate Policy Committees to write down the network policies in the policy documents using high-level natural languages. The policy documents describe both the acceptable and unacceptable uses of the network. Network operators …