Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Florida Institute of Technology

2019

Articles 1 - 10 of 10

Full-Text Articles in Computer Engineering

Home Automation System By Voice Commands, Noor Kamil Abdalhameed Dec 2019

Home Automation System By Voice Commands, Noor Kamil Abdalhameed

Theses and Dissertations

The Home Automation System is one of the most important technologies that are used by humans for controlling electrical devices to reduce manual efforts in their daily tasks. The home automation system by voice has the ability to understand thousands of voice commands and perform the required action to control various electrical devices. The voice recognition is a bit complex and challenging task since each person has his accent. Therefore, Bitvoicer Server used in the home automation system in this thesis since it supports 17 languages from 26 countries and regions, and has the ability to recognize an unlimited number …


Mitigating Pilot Contamination Through Optimizing Pilot Allocation In Massive Mimo Systems, Rand Abdul Hussain Dec 2019

Mitigating Pilot Contamination Through Optimizing Pilot Allocation In Massive Mimo Systems, Rand Abdul Hussain

Theses and Dissertations

This dissertation has proposed several algorithms to optimize the allocation of pilots to the users’ equipment (UEs) to mitigate the effect of the pilot contamination problem in the massive MIMO systems. Pilot contamination reduces the performance of massive MIMO systems due to the reduction in the quality of the estimated channel between a UE and the serving base station (BS). The limitation of the number of samples in a coherence block limits the number of unique mutually orthogonal pilots, and hence, reusing the set of pilots across the cells causes inter-cell interference during pilot transmission, which is called pilot contamination. …


Socialization Of Veterans Using Virtual Reality, Joan M. Savage Dec 2019

Socialization Of Veterans Using Virtual Reality, Joan M. Savage

Theses and Dissertations

Virtual reality, augmented reality, mixed reality, and video games are growing in popularity and fulfilling genuine human needs that the real world is currently unable to satisfy. Games are providing rewards that reality is not. They are teaching and inspiring and engaging us in ways that reality is not (McGonigal, 2011). The purpose of this study was to capture the essence of socialization in virtual reality as a Ph.D. dissertation topic at Florida Institute of Technology - Human-Centered Design. This study used a phenomenology methodology to capture the experiences of beneficial features of players who use virtual reality. The study …


Machine Learning In The State Design Pattern, Timothy Matthew Von Friesen Dec 2019

Machine Learning In The State Design Pattern, Timothy Matthew Von Friesen

Theses and Dissertations

As the Internet of Things revolution continues to become more prevalent in humanity's daily routine, securing these devices is paramount. Society has seen a substantial increase in activity in the cyber-warfare battle space, resulting in an increasing amount of security breaches every year. The responsibility of securing our devices can no longer rely solely on cyber-security engineers keeping systems hardened through Security Technical Implementation Guides and vulnerability scans; it must shift towards the developer. Previous research has been done in this area of securing our devices. However, these solutions rely heavily on cloud computing resources to perform computationally expensive algorithms. …


Survival Theory Modelling For Information Diffusion, Akshay Aravamudan Jul 2019

Survival Theory Modelling For Information Diffusion, Akshay Aravamudan

Theses and Dissertations

Information diffusion is the spread of information within a network. In this thesis, we model information diffusion as a survival process. We have adopted an existing algorithm called NetRate for modelling information diffusion. This model involves finding the distribution of trasmission time between two nodes in the network. We modify NetRate’s concave-down log-likelihood expression by adding partial parentage information and formulate an Expectation-Minimization (EM) algorithm to learn the parameters. We also describe a simulation scheme for NetRate inspired by point process simulation strategies. Using the assumptions of the NetRate model, we derive a a method to model popularity as a …


Formal Trust Architecture For Assuring Trusted Interactions In The Internet Of Things, Milankumar Patel May 2019

Formal Trust Architecture For Assuring Trusted Interactions In The Internet Of Things, Milankumar Patel

Theses and Dissertations

The Internet of Things (IoT) has provided a flexible platform for a large number of heterogeneous devices to dynamically join and leave the network. This enhances the availability of a diverse range of services provided by a network. However, this dynamic expansion of the network with mobile IoT devices introduces a major challenge to security especially related to management of trust across the IoT platforms. Furthermore, IoT is open and distributed in nature, which allows the integration and registration of diverse entities. Thus arises the necessity for a mechanism that can ensure the selection of secure and trusted devices as …


Drone Path Scheduling For Data Gathering In Disaster Effected Environments, James Bologna May 2019

Drone Path Scheduling For Data Gathering In Disaster Effected Environments, James Bologna

Theses and Dissertations

Creative networks in a disaster effected area have been a concern for a long time. With the innovation of flying ad hoc networks the problem can be tackled from a more practical standpoint. The use of low altitude drones equipped with wireless transmission and receiving capability can be used under the circumstances to enable ad-hoc communication. Drone coordination and route planning is a critical consideration when determining how to gather data from ground nodes, since the drones are constrained by limited battery capacity. In this research, we set out to explore a wide range of policies for determining the trajectories …


Wavelet–Based Functional Data Analysis For Classification And Change Point Detection, Nenad Mijatovic May 2019

Wavelet–Based Functional Data Analysis For Classification And Change Point Detection, Nenad Mijatovic

Theses and Dissertations

Data collection and analysis, performed close to the source and transferred to other devices for different analysis, are the major paradigms of the Internet of Things (IoT). Usually, the raw data comes in the form of a time-series sequence that can be considered as functions, and as such can be examined by the functional analysis apparatus. Among others, the two major tasks in data analysis are (1) categorical signal classification and (2) change detection in signal statistical parameters. Here, we study both problems: featureless signal classification using discriminative interpolation regularized with the ℓ1 norm is performed using Classification by Discriminative …


Characterization Of Rf Signal Propagation For Wireless Sensor Network Deployed In Mountainous Environment, Bandar Mohammad Alshawi May 2019

Characterization Of Rf Signal Propagation For Wireless Sensor Network Deployed In Mountainous Environment, Bandar Mohammad Alshawi

Theses and Dissertations

Wireless sensor network (WSN) nodes, in mountainous forests, report real-time data to base stations concerning events, in which researchers and decision makers are interested in. A thorough research reveals the deficiency of any study modeling radio frequency (RF) in that environment. The lack of accurately modeling RF signal propagation in any environment can have a great impact on the network life, connectivity, and coverage. This dissertation models the loss of RF signal in the mountainous environment and demonstrates the inconsistency of theoretical models, compared to actual measurements. The models proposed in this research yield satisfactory results, and the theoretical models …


Human-Centered Enterprise Resource Maintenance Management, Sharon Sue Chinoy Mar 2019

Human-Centered Enterprise Resource Maintenance Management, Sharon Sue Chinoy

Theses and Dissertations

In complex domains, maintenance personnel may be required to use multiple software tools for receiving status information and controlling resources across the enterprise. These tools have evolved to be effective for collecting status, but often lack integrated contextual information for personnel to understand failure event impact to the enterprise and operational mission. Through a human-centered design approach, salient concepts and semantically relevant maintenance information can be captured within a domain. This research will show that an ontology can be a useful method to establish a common frame of reference to promote better situation awareness and more effective decision-making and collaboration …