Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Signal Processing

2021

Institution
Keyword
Publication
Publication Type

Articles 1 - 24 of 24

Full-Text Articles in Computer Engineering

Machine Learning Techniques For Network Analysis, Irfan Lateef Dec 2021

Machine Learning Techniques For Network Analysis, Irfan Lateef

Dissertations

The network's size and the traffic on it are both increasing exponentially, making it difficult to look at its behavior holistically and address challenges by looking at link level behavior. It is possible that there are casual relationships between links of a network that are not directly connected and which may not be obvious to observe. The goal of this dissertation is to study and characterize the behavior of the entire network by using eigensubspace based techniques and apply them to network traffic engineering applications.

A new method that uses the joint time-frequency interpretation of eigensubspace representation for network statistics …


Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao Dec 2021

Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao

Posters-at-the-Capitol

Gaze tracking has become an established technology that enables using an individual’s gaze as an input signal to support a variety of applications in the context of Human-Computer Interaction. Gaze tracking primarily relies on sensing devices such as infrared (IR) cameras. Nevertheless, in the recent years, several attempts have been realized at detecting gaze by acquiring and processing images acquired from standard RGB cameras. Nowadays, there are only a few publicly available open-source libraries and they have not been tested extensively. In this paper, we present the result of a comparative analysis that studied a commercial eye-tracking device using IR …


Enhanced Security Utilizing Side Channel Data Analysis, Michael Taylor Dec 2021

Enhanced Security Utilizing Side Channel Data Analysis, Michael Taylor

Computer Science and Engineering Theses and Dissertations

The physical state of a system is affected by the activities and processes in which it is tasked with carrying out. In the past there have been many instances where such physical changes have been exploited by bad actors in order to gain insight into the operational state and even the data being held on a system. This method of side channel exploitation is very often effective due to the relative difficulty of obfuscating activity on a physical level. However, in order to take advantage of side channel data streams one must have a detailed working knowledge of how a …


Network Management, Optimization And Security With Machine Learning Applications In Wireless Networks, Mariam Nabil Dec 2021

Network Management, Optimization And Security With Machine Learning Applications In Wireless Networks, Mariam Nabil

Theses and Dissertations

Wireless communication networks are emerging fast with a lot of challenges and ambitions. Requirements that are expected to be delivered by modern wireless networks are complex, multi-dimensional, and sometimes contradicting. In this thesis, we investigate several types of emerging wireless networks and tackle some challenges of these various networks. We focus on three main challenges. Those are Resource Optimization, Network Management, and Cyber Security. We present multiple views of these three aspects and propose solutions to probable scenarios. The first challenge (Resource Optimization) is studied in Wireless Powered Communication Networks (WPCNs). WPCNs are considered a very promising approach towards sustainable, …


Deep Learning Based Speech Enhancement And Its Application To Speech Recognition, Ju Lin Dec 2021

Deep Learning Based Speech Enhancement And Its Application To Speech Recognition, Ju Lin

All Dissertations

Speech enhancement is the task that aims to improve the quality and the intelligibility of a speech signal that is degraded by ambient noise and room reverberation. Speech enhancement algorithms are used extensively in many audio- and communication systems, including mobile handsets, speech recognition, speaker verification systems and hearing aids. Recently, deep learning has achieved great success in many applications, such as computer vision, nature language processing and speech recognition. Speech enhancement methods have been introduced that use deep-learning techniques, as these techniques are capable of learning complex hierarchical functions using large-scale training data. This dissertation investigates the deep learning …


The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami Nov 2021

The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami

Future Computing and Informatics Journal

It is possible to learn more quickly and effectively with e-learning software development because it provides learners with convenient and flexible learning environments. This allows them to progress further in their careers. Reports on web-based e-learning systems for in-service education have frequently neglected to include the viewpoint of the instructor. In order to conduct quantitative research, a sample of 50 academic staff members was selected. The purpose of this study was to investigate various factors that influence the intention to use web-based e-learning, with the theoretical foundation being provided by university lecturers. According to the findings of the study, the …


Image Hiding Using Qr Factorization And Discrete Wavelet Transform Techniques, Reham Ahmed El-Shahed, Maryam Al-Berry, Hala Ebied, Howida Shedeed Nov 2021

Image Hiding Using Qr Factorization And Discrete Wavelet Transform Techniques, Reham Ahmed El-Shahed, Maryam Al-Berry, Hala Ebied, Howida Shedeed

Future Computing and Informatics Journal

Steganography is one of the most important tools in the data security field as there is a huge amount of data transferred each moment over the internet. Hiding secret messages in an image has been widely used because the images are mostly used in social media applications. The proposed algorithm is a simple algorithm for hiding an image in another image. The proposed technique uses QR factorization to conceal the secret image. The technique successfully hid a gray and color image in another one and the performance of the algorithm was measured by PSNR, SSIM and NCC. The PSNR for …


Signal Fingerprinting And Machine Learning Framework For Uav Detection And Identification., Olusiji Oloruntobi Medaiyese Aug 2021

Signal Fingerprinting And Machine Learning Framework For Uav Detection And Identification., Olusiji Oloruntobi Medaiyese

Electronic Theses and Dissertations

Advancement in technology has led to creative and innovative inventions. One such invention includes unmanned aerial vehicles (UAVs). UAVs (also known as drones) are now an intrinsic part of our society because their application is becoming ubiquitous in every industry ranging from transportation and logistics to environmental monitoring among others. With the numerous benign applications of UAVs, their emergence has added a new dimension to privacy and security issues. There are little or no strict regulations on the people that can purchase or own a UAV. For this reason, nefarious actors can take advantage of these aircraft to intrude into …


Review Of Data Mining Techniques For Detecting Churners In The Telecommunication Industry, Mahmoud Ewieda, Mohamed Ismail Roushdy, Essam Shaaban Jul 2021

Review Of Data Mining Techniques For Detecting Churners In The Telecommunication Industry, Mahmoud Ewieda, Mohamed Ismail Roushdy, Essam Shaaban

Future Computing and Informatics Journal

The telecommunication sector has been developed rapidly and with large amounts of data obtained as a result of increasing in the number of subscribers, modern techniques, data-based applications, and services. As well as better awareness of customer requirements and excellent quality that meets their satisfaction. This satisfaction raises rivalry between firms to maintain the quality of their services and upgrade them. These data can be helpfully extracted for analysis and used for predicting churners. Researchers around the world have conducted important research to understand the uses of Data mining (DM) that can be used to predict customers' churn. This …


Development Of A Wearable Haptic Feedback Device For Upper Limb Prosthetics Through Sensory Substitution, Marco B.S. Gallone May 2021

Development Of A Wearable Haptic Feedback Device For Upper Limb Prosthetics Through Sensory Substitution, Marco B.S. Gallone

Electronic Thesis and Dissertation Repository

Haptics can enable a direct communication pipeline between the artificial limb and the brain; adding haptic sensory feedback for prosthesis wearers is believed to improve operation without drawing too much of the user's attention. Through neuroplasticity, the brain can become more cognizant of the information delivered through the skin and may eventually interpret it as inherently as other natural senses. In this thesis, a wearable haptic feedback device (WHFD) is developed to communicate prosthesis sensory information. A 14-week, 6-stage, between subjects study was created to investigate the learning trajectory as participants were stimulated with haptic patterns conveying joint proprioception. 37 …


Framework For Collecting Data From Iot Device, Md Saiful Islam May 2021

Framework For Collecting Data From Iot Device, Md Saiful Islam

Symposium of Student Scholars

The Internet of Things (IoT) is the most significant and blooming technology in the 21st century. IoT has rapidly developed by covering hundreds of applications in the civil, health, military, and agriculture areas. IoT is based on the collection of sensor data through an embedded system, and this embedded system uploads the data on the internet. Devices and sensor technologies connected over a network can monitor and measure data in real-time. The main challenge is to collect data from IoT devices, transmit them to store in the Cloud, and later retrieve them at any time for visualization and data analysis. …


Data Analysis Methods For Health Monitoring Sensors, Shahriar Sobhan May 2021

Data Analysis Methods For Health Monitoring Sensors, Shahriar Sobhan

Symposium of Student Scholars

Innovations in health monitoring systems are fundamental for the continuous improvement of remote healthcare. With the current presence of SARS-CoV-2, better known as COVID-19, in people’s daily lives, solutions for monitoring heart and especially respiration and pulmonary functions are more needed than ever. Besides, health monitoring systems are widely used for patients who need isolated care, unconscious patients who cannot get medical attention for themselves. As it is well-known, monitoring systems rely on sensor technologies. Currently, there are multiple research studies for remote monitoring using different types of sensors. In this effort, we survey the current approaches that utilize the …


Multilayer Perceptron With Auto Encoder Enabled Deep Learning Model For Recommender Systems, Subhashini Narayan May 2021

Multilayer Perceptron With Auto Encoder Enabled Deep Learning Model For Recommender Systems, Subhashini Narayan

Future Computing and Informatics Journal

In this modern world of ever-increasing one-click purchases, movie bookings, music, health- care, fashion, the need for recommendations have increased the more. Google, Netflix, Spotify, Amazon and other tech giants use recommendations to customize and tailor their search engines to suit the user’s interests. Many of the existing systems are based on older algorithms which although have decent accuracies, require large training and testing datasets and with the emergence of deep learning, the accuracy of algorithms has further improved, and error rates have reduced due to the use of multiple layers. The need for large datasets has declined as well. …


Deep Feature Learning For Fog Episodes Prediction In Patients With Pd, Hadeer Elziaat, Nashwa El-Bendary, Ramdan Mowad May 2021

Deep Feature Learning For Fog Episodes Prediction In Patients With Pd, Hadeer Elziaat, Nashwa El-Bendary, Ramdan Mowad

Future Computing and Informatics Journal

A common symptom of Parkinson's Disease is Freezing of Gait (FoG) that causes an interrupt of the forward progression of the patient’s feet while walking. Therefore, Freezing of Gait episodes is always engaged to the patient's falls. This paper proposes a model for Freezing of Gait episodes detection and prediction in patients with Parkinson's Disease. Predicting Freezing of Gait in this paper considers as a multi-class classification problem with 3 classes namely, FoG, pre-FoG, and walking episodes. In this paper, the extracted feature scheme applied for the detection and the prediction of FoG is Convolutional Neural Network (CNN) spectrogram time-frequency …


Towards Secure Deep Neural Networks For Cyber-Physical Systems, Jiangnan Li May 2021

Towards Secure Deep Neural Networks For Cyber-Physical Systems, Jiangnan Li

Doctoral Dissertations

In recent years, deep neural networks (DNNs) are increasingly investigated in the literature to be employed in cyber-physical systems (CPSs). DNNs own inherent advantages in complex pattern identifying and achieve state-of-the-art performances in many important CPS applications. However, DNN-based systems usually require large datasets for model training, which introduces new data management issues. Meanwhile, research in the computer vision domain demonstrated that the DNNs are highly vulnerable to adversarial examples. Therefore, the security risks of employing DNNs in CPSs applications are of concern.

In this dissertation, we study the security of employing DNNs in CPSs from both the data domain …


Data Forgery Detection In Automatic Generation Control: Exploration Of Automated Parameter Generation And Low-Rate Attacks, Yatish R. Dubasi May 2021

Data Forgery Detection In Automatic Generation Control: Exploration Of Automated Parameter Generation And Low-Rate Attacks, Yatish R. Dubasi

Computer Science and Computer Engineering Undergraduate Honors Theses

Automatic Generation Control (AGC) is a key control system utilized in electric power systems. AGC uses frequency and tie-line power flow measurements to determine the Area Control Error (ACE). ACE is then used by the AGC to adjust power generation and maintain an acceptable power system frequency. Attackers might inject false frequency and/or tie-line power flow measurements to mislead AGC into falsely adjusting power generation, which can harm power system operations. Various data forgery detection models are studied in this thesis. First, to make the use of predictive detection models easier for users, we propose a method for automated generation …


Distance-Based Formation Control Using Decentralized Sensing With Infrared Photodiodes, Steven Williams Mar 2021

Distance-Based Formation Control Using Decentralized Sensing With Infrared Photodiodes, Steven Williams

LSU Master's Theses

This study presents an onboard sensor system for determining the relative positions of mobile robots, which is used in decentralized distance-based formation controllers for multi-agent systems. This sensor system uses infrared photodiodes and LEDs; its effective use requires coordination between the emitting and detecting robots. A technique is introduced for calculating the relative positions based on photodiode readings, and an automated calibration system is designed for future maintenance. By measuring the relative positions of their neighbors, each robot is capable of running an onboard formation controller, which is independent of both a centralized controller and a global positioning-like system (e.g., …


Simulating A Mobile Wireless Sensor Network Monitoring The Air Force Marathon, Matthew D. Eilertson Mar 2021

Simulating A Mobile Wireless Sensor Network Monitoring The Air Force Marathon, Matthew D. Eilertson

Theses and Dissertations

This thesis explores the feasibility of deploying a mobile Wireless Sensor Networks (WSN) to the Air Force (AF) Marathon in support of Air Force Research Laboratory (AFRL) research of sensor and networking infrastructure in denied or degraded environments. A simulation called MarathonSim is developed in the Objective Modular Network Testbed in C++ (OMNeT++) Discrete Event Simulator to test the performance of a mobile WSN. A full factorial design using numbers of runners, transmission powers, and routing protocols is executed to measure Packet Delivery Ratio (PDR) to a central database, average end-to-end delay of application packets, and average power consumed per …


Time Series Data Analysis Using Machine Learning-(Ml) Approach, Mvv Prasad Kantipudi Dr., Pradeep Kumar N.S Dr., S.Sreenath Kashyap Dr., Ss Anusha Vemuri Ms Jan 2021

Time Series Data Analysis Using Machine Learning-(Ml) Approach, Mvv Prasad Kantipudi Dr., Pradeep Kumar N.S Dr., S.Sreenath Kashyap Dr., Ss Anusha Vemuri Ms

Library Philosophy and Practice (e-journal)

Healthcare benefits related to continuous monitoring of human movement and physical activity can potentially reduce the risk of accidents associated with elderly living alone at home. Based on the literature review, it is found that many studies focus on human activity recognition and are still active towards achieving practical solutions to support the elderly care system. The proposed system has introduced a joint approach of machine learning and signal processing technology for the recognition of human's physical movements using signal data generated by accelerometer sensors. The framework adopts the concept of DSP to select very descriptive feature sets and uses …


Artificial Intelligence Aided Receiver Design For Wireless Communication Systems, Wenjie Xu Jan 2021

Artificial Intelligence Aided Receiver Design For Wireless Communication Systems, Wenjie Xu

Theses, Dissertations and Capstones

Physical layer (PHY) design in the wireless communication field realizes gratifying achievements in the past few decades, especially in the emerging cellular communication systems starting from the first generation to the fifth generation (5G). With the gradual increase in technical requirements of large data processing and end-to-end system optimization, introducing artificial intelligence (AI) in PHY design has cautiously become a trend. A deep neural network (DNN), one of the population techniques of AI, enables the utilization of its ‘learnable’ feature to handle big data and establish a global system model. In this thesis, we exploited this characteristic of DNN as …


Deep Learning Assisted Intelligent Visual And Vehicle Tracking Systems, Liang Xu Jan 2021

Deep Learning Assisted Intelligent Visual And Vehicle Tracking Systems, Liang Xu

Theses and Dissertations

Sensor fusion and tracking is the ability to bring together measurements from multiple sensors of the current and past time to estimate the current state of a system. The resulting state estimate is more accurate compared with the direct sensor measurement because it balances between the state prediction based on the assumed motion model and the noisy sensor measurement. Systems can then use the information provided by the sensor fusion and tracking process to support more-intelligent actions and achieve autonomy in a system like an autonomous vehicle. In the past, widely used sensor data are structured, which can be directly …


Energy Considerations In Blockchain-Enabled Applications, Cesar Enrique Castellon Escobar Jan 2021

Energy Considerations In Blockchain-Enabled Applications, Cesar Enrique Castellon Escobar

UNF Graduate Theses and Dissertations

Blockchain-powered smart systems deployed in different industrial applications promise operational efficiencies and improved yields, while mitigating significant cybersecurity risks pertaining to the main application. Associated tradeoffs between availability and security arise at implementation, however, triggered by the additional resources (e.g., memory, computation) required by each blockchain-enabled host. This thesis applies an energy-reducing algorithmic engineering technique for Merkle Tree root and Proof of Work calculations, two principal elements of blockchain computations, as a means to preserve the promised security benefits but with less compromise to system availability. Using pyRAPL, a python library to measure computational energy, we experiment with both the …


Analog & Digital Remote Synthesizer, Adam Brunner, Andrew Cihon-Scott, Scott Grisso, Linus Wright Jan 2021

Analog & Digital Remote Synthesizer, Adam Brunner, Andrew Cihon-Scott, Scott Grisso, Linus Wright

Williams Honors College, Honors Research Projects

The purpose of this project is to develop and design an analog synthesizer musical instrument that integrates embedded digital hardware into the design to enable control from a remote source. The use of digital hardware enables the potential for a wide range of convenient features such as sound profile saving and loading, output recording functionality, and the ability to accept digital input from another musical instrument utilizing the Musical Instrument Digital Interface (MIDI). In addition to the synthesizer itself, this project also includes the design of a companion application that can be hosted on a wide variety of consumer computing …


Light Loaded Automated Guided Vehicle, Marcus Radtka, Nazar Paramashchuk, Lawrence Shevock Jan 2021

Light Loaded Automated Guided Vehicle, Marcus Radtka, Nazar Paramashchuk, Lawrence Shevock

Williams Honors College, Honors Research Projects

The objective of the locomotion system was to design and implement the mechanical, electrical, and software related functions to ensure the LLAGV had the capability of maneuvering its surroundings. The LLAGV’s motors were represented in an open loop transfer function to utilize RPM feedback and a compensator when needed. The modeled compensator helped control the LLAGV’s speed and acceleration, enabling further control of the LLAGV. The internal circuitry has the means to properly distributed power to all components and allowed the user to control the LLAGV to their desire. The application software within the LLAGV locomotion system (LLAGV-LS) had consideration …