Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- West Virginia University (3)
- Chapman University (2)
- Michigan Technological University (2)
- University of Nebraska - Lincoln (2)
- Association of Arab Universities (1)
-
- Ateneo de Manila University (1)
- Embry-Riddle Aeronautical University (1)
- Karbala International Journal of Modern Science (1)
- Louisiana State University (1)
- Mississippi State University (1)
- Missouri State University (1)
- Murray State University (1)
- Penn State Dickinson Law (1)
- Technological University Dublin (1)
- The University of Akron (1)
- University of Kentucky (1)
- University of Massachusetts Amherst (1)
- University of New Hampshire (1)
- Western University (1)
- Keyword
-
- Machine learning (5)
- Random forest (2)
- 3D Printing (1)
- 3D real-time positioning method (1)
- 3D small cells (1)
-
- Adaptive Cruise Control (1)
- Additive Manufacturing (1)
- Alleles (1)
- Analog circuits (1)
- App (1)
- Audio (1)
- Automation (1)
- Automotive (1)
- Biomedical circuits (1)
- Bottom up (1)
- CIR data set (1)
- Chunk Gap Length (CGL) (1)
- Civil remedy (1)
- Classification (1)
- Codes (symbols) (1)
- Complex programs (1)
- Computed tomography (1)
- Conditional GAN (1)
- Credit card fraud detection (1)
- Criminal liability (1)
- DICOM (1)
- DNA (1)
- DNA Analysis (1)
- Data augmentation (1)
- Data point (1)
- Publication
-
- Graduate Theses, Dissertations, and Problem Reports (3)
- Dissertations, Master's Theses and Master's Reports (2)
- Engineering Faculty Articles and Research (2)
- Articles (1)
- Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research (1)
-
- Department of Information Systems & Computer Science Faculty Publications (1)
- Dickinson Law Review (2017-Present) (1)
- Doctoral Dissertations (1)
- Electronic Thesis and Dissertation Repository (1)
- Future Computing and Informatics Journal (1)
- Honors Theses (1)
- Honors Theses and Capstones (1)
- Karbala International Journal of Modern Science (1)
- LSU Master's Theses (1)
- MSU Graduate Theses (1)
- Posters-at-the-Capitol (1)
- Publications (1)
- Theses and Dissertations (1)
- Theses and Dissertations--Electrical and Computer Engineering (1)
- Williams Honors College, Honors Research Projects (1)
- Publication Type
Articles 1 - 24 of 24
Full-Text Articles in Computer Engineering
Low Power Multi-Channel Interface For Charge Based Tactile Sensors, Samuel Hansen
Low Power Multi-Channel Interface For Charge Based Tactile Sensors, Samuel Hansen
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
Analog front end electronics are designed in 65 nm CMOS technology to process charge pulses arriving from a tactile sensor array. This is accomplished through the use of charge sensitive amplifiers and discrete time filters with tunable clock signals located in each of the analog front ends. Sensors were emulated using Gaussian pulses during simulation. The digital side of the system uses SAR (successive approximation register) ADCs for sampling of the processed sensor signals.
Adviser: Sina Balkır
Rdlnn-Based Image Forgery Detection And Forged Region Detection Using Mot, Akram Hatem Saber, Mohd Ayyub Khan, Basim Galeb Mejbel
Rdlnn-Based Image Forgery Detection And Forged Region Detection Using Mot, Akram Hatem Saber, Mohd Ayyub Khan, Basim Galeb Mejbel
Karbala International Journal of Modern Science
Image forgery detection TEMPhas become an emerging research area due to the increasing number of forged images circulating on the internet and other social media, which leads to legal and social issues. Image forgery detection includes the classification of an image as forged or authentic and as well as localizing the forgery wifin the image. In this paper, we propose a Regression Deep Learning Neural Network (RDLNN) based image forgery detection followed by Modified Otsu Thresholding (MOT) algorithm to detect the forged region. The proposed model comprises five steps that are preprocessing, image decomposition, feature extraction, classification and block matching. …
Device Free Indoor Localization Of Human Target Using Wifi Fingerprinting, Prasanga Neupane
Device Free Indoor Localization Of Human Target Using Wifi Fingerprinting, Prasanga Neupane
LSU Master's Theses
Indoor localization of human objects has many important applications nowadays. Proposed here is a new device free approach where all the transceiver devices are fixed in an indoor environment so that the human target doesn't need to carry any transceiver device with them. This work proposes radio-frequency fingerprinting for the localization of human targets which makes this even more convenient as radio-frequency wireless signals can be easily acquired using an existing wireless network in an indoor environment. This work explores different avenues for optimal and effective placement of transmitter devices for better localization. In this work, an experimental environment is …
Enabling Daily Tracking Of Individual’S Cognitive State With Eyewear, Soha Rostaminia
Enabling Daily Tracking Of Individual’S Cognitive State With Eyewear, Soha Rostaminia
Doctoral Dissertations
Research studies show that sleep deprivation causes severe fatigue, impairs attention and decision making, and affects our emotional interpretation of events, which makes it a big threat to public safety, and mental and physical well-being. Hence, it would be most desired if we could continuously measure one’s drowsiness and fatigue level, their emotion while making decisions, and assess their sleep quality in order to provide personalized feedback or actionable behavioral suggestions to modulate sleep pattern and alertness levels with the aim of enhancing performance, well-being, and quality of life. While there have been decades of studies on wearable devices, we …
Height Information Aided 3d Real-Time Large-Scale Underground User Positioning, Houbing Song, Chengkai Tang, Cunle Zhang, Lingling Zhang, Yi Zhang
Height Information Aided 3d Real-Time Large-Scale Underground User Positioning, Houbing Song, Chengkai Tang, Cunle Zhang, Lingling Zhang, Yi Zhang
Publications
Due to the cost of inertial navigation and visual navigation equipment and lake of satellite navigation signals, they cannot be used in large‐scale underground mining environment. To solve this problem, this study proposes large‐scale underground 3D real‐time positioning method with seam height assistance. This method uses the ultrawide band positioning base station as the core and is combined with seam height information to build a factor graph confidence transfer model to realise3D positioning. The simulation results show that the proposed real‐time method is superior to the existing algorithms in positioning accuracy and can meet the needs of large‐scale underground users.
Efficient Discovery And Utilization Of Radio Information In Ultra-Dense Heterogeneous 3d Wireless Networks, Mattaka Gamage Samantha Sriyananda
Efficient Discovery And Utilization Of Radio Information In Ultra-Dense Heterogeneous 3d Wireless Networks, Mattaka Gamage Samantha Sriyananda
Electronic Thesis and Dissertation Repository
Emergence of new applications, industrial automation and the explosive boost of smart concepts have led to an environment with rapidly increasing device densification and service diversification. This revolutionary upward trend has led the upcoming 6th-Generation (6G) and beyond communication systems to be globally available communication, computing and intelligent systems seamlessly connecting devices, services and infrastructure facilities. In this kind of environment, scarcity of radio resources would be upshot to an unimaginably high level compelling them to be very efficiently utilized. In this case, timely action is taken to deviate from approximate site-specific 2-Dimensional (2D) network concepts in radio resource utilization …
Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami
Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami
Future Computing and Informatics Journal
This is a systematic literature review to reflect the previous studies that dealt with credit card fraud detection and highlight the different machine learning techniques to deal with this problem. Credit cards are now widely utilized daily. The globe has just begun to shift toward financial inclusion, with marginalized people being introduced to the financial sector. As a result of the high volume of e-commerce, there has been a significant increase in credit card fraud. One of the most important parts of today's banking sector is fraud detection. Fraud is one of the most serious concerns in terms of monetary …
Ml-Based Online Traffic Classification For Sdns, Mohammed Nsaif, Gergely Kovasznai, Mohammed Abboosh, Ali Malik, Ruairí De Fréin
Ml-Based Online Traffic Classification For Sdns, Mohammed Nsaif, Gergely Kovasznai, Mohammed Abboosh, Ali Malik, Ruairí De Fréin
Articles
Traffic classification is a crucial aspect for Software-Defined Networking functionalities. This paper is a part of an on-going project aiming at optimizing power consumption in the environment of software-defined datacenter networks. We have developed a novel routing strategy that can blindly balance between the power consumption and the quality of service for the incoming traffic flows. In this paper, we demonstrate how to classify the network traffic flows so that the quality of service of each flow-class can be guaranteed efficiently. This is achieved by creating a dataset that encompasses different types of network traffic such as video, VoIP, game …
Automotive Sensor Fusion Systems For Traffic Aware Adaptive Cruise Control, Jonah T. Gandy
Automotive Sensor Fusion Systems For Traffic Aware Adaptive Cruise Control, Jonah T. Gandy
Theses and Dissertations
The autonomous driving (AD) industry is advancing at a rapid pace. New sensing technology for tracking vehicles, controlling vehicle behavior, and communicating with infrastructure are being added to commercial vehicles. These new automotive technologies reduce on road fatalities, improve ride quality, and improve vehicle fuel economy. This research explores two types of automotive sensor fusion systems: a novel radar/camera sensor fusion system using a long shortterm memory (LSTM) neural network (NN) to perform data fusion improving tracking capabilities in a simulated environment and a traditional radar/camera sensor fusion system that is deployed in Mississippi State’s entry in the EcoCAR Mobility …
Design Of Hardware To Aid Smartphone-Based Oscilloscope App, Riddock Moran
Design Of Hardware To Aid Smartphone-Based Oscilloscope App, Riddock Moran
Honors Theses
A smartphone-based oscilloscope improves on traditional lab oscilloscopes in accessibility and portability but faces several performance limitations compared to traditional oscilloscopes. Among these, an oscilloscope app that uses the phone’s audio to read voltage signals will have a sampling rate and voltage bottlenecked by the capabilities of the audio codec, which will rarely exceed a rate of 48 kHz and 1 volt, respectively. Additionally, smartphones lack the ability to read line-in audio, allowing only one channel input through the microphone. Direct connections to an audio source may not be possible due to requiring an audio jack connection, and different poles …
Machine Learning Based Medical Image Deepfake Detection: A Comparative Study, Siddharth Solaiyappan, Yuxin Wen
Machine Learning Based Medical Image Deepfake Detection: A Comparative Study, Siddharth Solaiyappan, Yuxin Wen
Engineering Faculty Articles and Research
Deep generative networks in recent years have reinforced the need for caution while consuming various modalities of digital information. One avenue of deepfake creation is aligned with injection and removal of tumors from medical scans. Failure to detect medical deepfakes can lead to large setbacks on hospital resources or even loss of life. This paper attempts to address the detection of such attacks with a structured case study. Specifically, we evaluate eight different machine learning algorithms, which include three conventional machine learning methods (Support Vector Machine, Random Forest, Decision Tree) and five deep learning models (DenseNet121, DenseNet201, ResNet50, ResNet101, VGG19) …
Three Wave Mixing In Epsilon-Near-Zero Plasmonic Waveguides For Signal Regeneration, Nicholas Mirchandani, Mark C. Harrison
Three Wave Mixing In Epsilon-Near-Zero Plasmonic Waveguides For Signal Regeneration, Nicholas Mirchandani, Mark C. Harrison
Engineering Faculty Articles and Research
Vast improvements in communications technology are possible if the conversion of digital information from optical to electric and back can be removed. Plasmonic devices offer one solution due to optical computing’s potential for increased bandwidth, which would enable increased throughput and enhanced security. Plasmonic devices have small footprints and interface with electronics easily, but these potential improvements are offset by the large device footprints of conventional signal regeneration schemes, since surface plasmon polaritons (SPPs) are incredibly lossy. As such, there is a need for novel regeneration schemes. The continuous, uniform, and unambiguous digital information encoding method is phase-shift-keying (PSK), so …
Physiological Signal Analysis For Emotion Estimation Of Children With Autism Spectrum Disorder, Janet Pulgares Soriano, Karla Conn Welch Phd
Physiological Signal Analysis For Emotion Estimation Of Children With Autism Spectrum Disorder, Janet Pulgares Soriano, Karla Conn Welch Phd
Posters-at-the-Capitol
The diagnosis of Autism Spectrum Disorder (ASD) in children is based on human observations by a clinician. The medical evaluation assesses deficits in social communication, social interaction, and restricted, repetitive behaviors. Robotic technology can assist in quantitatively measuring the observations to be used as a future tool for autism diagnosis and intervention. The project explores this technology to produce robotic partners that can adapt to the needs of the ASD population. This way, such robots could serve as instructors or learning peers. A friendly, partner robot, specifically designed for children with ASD could be used to investigate the effect of …
Synthesizing Dysarthric Speech Using Multi-Speaker Tts For Dsyarthric Speech Recognition, Mohammad Soleymanpour
Synthesizing Dysarthric Speech Using Multi-Speaker Tts For Dsyarthric Speech Recognition, Mohammad Soleymanpour
Theses and Dissertations--Electrical and Computer Engineering
Dysarthria is a motor speech disorder often characterized by reduced speech intelligibility through slow, uncoordinated control of speech production muscles. Automatic Speech recognition (ASR) systems may help dysarthric talkers communicate more effectively. However, robust dysarthria-specific ASR requires a significant amount of training speech is required, which is not readily available for dysarthric talkers.
In this dissertation, we investigate dysarthric speech augmentation and synthesis methods. To better understand differences in prosodic and acoustic characteristics of dysarthric spontaneous speech at varying severity levels, a comparative study between typical and dysarthric speech was conducted. These characteristics are important components for dysarthric speech modeling, …
Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire
Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire
Graduate Theses, Dissertations, and Problem Reports
Facial recognition systems play a vital role in our everyday lives. We rely on this technology from menial tasks to issues as vital as national security. While strides have been made over the past ten years to improve facial recognition systems, morphed face images are a viable threat to the reliability of these systems. Morphed images are generated by combining the face images of two subjects. The resulting morphed face shares the likeness of the contributing subjects, confusing both humans and face verification algorithms. This vulnerability has grave consequences for facial recognition systems used on international borders or for law …
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Dickinson Law Review (2017-Present)
For nearly as long as there have been photographs and videos, people have been editing and manipulating them to make them appear to be something they are not. Usually edited or manipulated photographs are relatively easy to detect, but those days are numbered. Technology has no morality; as it advances, so do the ways it can be misused. The lack of morality is no clearer than with deepfake technology.
People create deepfakes by inputting data sets, most often pictures or videos into a computer. A series of neural networks attempt to mimic the original data set until they are nearly …
Design Project: 3d Printer/Injection Molder Hybrid, Lee Paolucci, Luke Everhart, Brandon Leap, Karson Lorey
Design Project: 3d Printer/Injection Molder Hybrid, Lee Paolucci, Luke Everhart, Brandon Leap, Karson Lorey
Williams Honors College, Honors Research Projects
In the realm of rapid, small-scale prototyping, there are a few main factors that drive decisions to invest resources in technology to make that prototyping possible. Cost and ease of use are two of the most influential when looking at most SMEs (Small to Medium-sized Enterprises). The U.S. Small Business Administration defines an SME as smaller than 1,250 employees. According to An Assessment of Implementation of Entry-Level 3D Printers from the Perspective of Small Businesses, 59% of small manufacturers had implemented 3D printers as of 2014. However, no matter what technology is used in rapid prototyping, there are common …
Adapting Deep Learning For Underwater Acoustic Communication Channel Modeling, Li Wei
Adapting Deep Learning For Underwater Acoustic Communication Channel Modeling, Li Wei
Dissertations, Master's Theses and Master's Reports
The recent emerging applications of novel underwater systems lead to increasing demand for underwater acoustic (UWA) communication and networking techniques. However, due to the challenging UWA channel characteristics, conventional wireless techniques are rarely applicable to UWA communication and networking. The cognitive and software-defined communication and networking are considered promising architecture of a novel UWA system design. As an essential component of a cognitive communication system, the modeling and prediction of the UWA channel impulse response (CIR) with deep generative models are studied in this work.
Firstly, an underwater acoustic communication and networking testbed is developed for conducting various simulations and …
An Experimental Study Towards Underwater Propulsion System Using Structure Borne Traveling Waves, Shreyas Suhas Gadekar
An Experimental Study Towards Underwater Propulsion System Using Structure Borne Traveling Waves, Shreyas Suhas Gadekar
Dissertations, Master's Theses and Master's Reports
The method of generating steady-state structure-borne traveling waves underwater in an infinite media creates abundant opportunities in the field of propulsive applications, and they are gaining attention from several researchers. This experimental study provides a framework for harnessing traveling waves in a 1D beam immersed under quiescent water using two force input methods and providing a motion to an object floating on the surface of the water.
In this study, underwater traveling waves are tailored using structural vibrations at five different frequencies in the range of 10Hz to 300Hz. The resulting fluid motion provides a propulsive thrust that moves a …
Multimodal Adversarial Learning, Uche Osahor
Multimodal Adversarial Learning, Uche Osahor
Graduate Theses, Dissertations, and Problem Reports
Deep Convolutional Neural Networks (DCNN) have proven to be an exceptional tool for object recognition, generative modelling, and multi-modal learning in various computer vision applications. However, recent findings have shown that such state-of-the-art models can be easily deceived by inserting slight imperceptible perturbations to key pixels in the input. A good target detection systems can accurately identify targets by localizing their coordinates on the input image of interest. This is ideally achieved by labeling each pixel in an image as a background or a potential target pixel. However, prior research still confirms that such state of the art targets models …
A Tool For Biometric Interpretation Of Forensic Str Dna Profiles, Ahmad Jamal Baroudi
A Tool For Biometric Interpretation Of Forensic Str Dna Profiles, Ahmad Jamal Baroudi
Graduate Theses, Dissertations, and Problem Reports
Rapid DNA biometric identification applications are becoming more essential and widely used in human identity validation processes. Despite their powerful identification capabilities, processing a sample to generate a forensic DNA profile still takes longer compared with other rapid biometric technologies. Methods used to speed up the analysis could lead to signal artifacts similar to those arising from low copy or degraded DNA samples, making the electropherogram unsuitable for forensic interpretation and analysis. The goal of this research effort is to apply biometrics and mathematical approaches to forensic STR (Short Tandem Repeat) profiles. To accomplish this goal, a multi-function software tool …
Detecting User Emotions From Audio Conversations With The Smart Assistants, Sunanda Guha
Detecting User Emotions From Audio Conversations With The Smart Assistants, Sunanda Guha
MSU Graduate Theses
With the proliferation of smart home devices like Google Home or Amazon Alexa, significant research endeavors are being carried out to improve the user experience while interacting with these smart assistants. One such dimension in this endeavor is ongoing research on successful emotion detection from short voice commands used in smart home environment. Besides facial expression and body language, etc., speech plays a pivotal role in the classification of emotions when it comes to smart home application. Upon successful implementation of accurate emotion recognition, the smart devices will be able to intelligently and empathetically suggest appropriate actions based on the …
Identifying Code Reading Strategies In Debugging Using Sta With A Tolerance Algorithm, Christine Lourrine S. Tablatin, Ma. Mercedes T. Rodrigo
Identifying Code Reading Strategies In Debugging Using Sta With A Tolerance Algorithm, Christine Lourrine S. Tablatin, Ma. Mercedes T. Rodrigo
Department of Information Systems & Computer Science Faculty Publications
The purpose of this study was to identify the common code reading strategies of the high and low performing students engaged in a debugging task. Using Scanpath Trend Analysis (STA) with a tolerance on eye tracking data, common scanpaths of high and low performing students were generated. The common scanpaths revealed differences in the code reading patterns and code reading strategies of high and low performing students. High performing students follow a bottom-up code reading strategy when debugging complex programs with logical and semantic errors. A top-down code reading strategy is employed when debugging programs with simple control structures, few …
Removing Physical Presence Requirements For A Remote And Automated World - Api Controlled Patch Panel For Conformance Testing, Hunter George Wells
Removing Physical Presence Requirements For A Remote And Automated World - Api Controlled Patch Panel For Conformance Testing, Hunter George Wells
Honors Theses and Capstones
Quality assurance test engineers at the UNH-InterOperability Lab must run tests that require driving and monitoring a selection of DC signals. While the number of signals is numerous, there are limited ports on the test equipment, and only a few signals need patching for any given test. The selection of signals may vary between the 209 different tests and must be re-routed frequently. Currently, testers must leave their desk to manually modify the test setup in another room. This posed a considerable issue at the onset of the COVID-19 Pandemic when physical access was not possible. In order to enable …