Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Florida Institute of Technology

2020

Articles 1 - 12 of 12

Full-Text Articles in Computer Engineering

Cloud Computing Service Interoperability And Architectural Concepts, Anmar Salih Dec 2020

Cloud Computing Service Interoperability And Architectural Concepts, Anmar Salih

Theses and Dissertations

Today’s market with a vast number of Cloud-computing providers creates a challenge for practical cooperation between the various provider cloud service platforms. Not only does Cloud interoperability provide this needed cooperation, but it also avoids vendor lock-in and, additionally, saves time and cost. Although there is no established definition for Cloud interoperability, most researchers agree on the purposes of Cloud interoperability. Research and literature have attempted to explain interoperability as transferring data, moving workloads, and migrating virtual machines between Cloud platforms. Transferring data between Clouds refers to objects migrating between provider-specific domains. In comparison, data migration is the most commonly …


Modern Standard Arabic Speech Recognition: Using Formants Measurements To Extract Vowels From Arabic Words’ Consonant-Vowel-Consonant-Vowel Structure, Mohamed Ali Alshaari Dec 2020

Modern Standard Arabic Speech Recognition: Using Formants Measurements To Extract Vowels From Arabic Words’ Consonant-Vowel-Consonant-Vowel Structure, Mohamed Ali Alshaari

Theses and Dissertations

Arabic texts suffer from missing diacritics (short vowels) which become obstacles for new learners. Speech Recognition is the translation of words spoken to text through intelligent computer programs. As of today, it has been integrated into many computer systems. Arabic Speech Recognition has made progress over the years, but it is still not as good as English speech recognition due to the problem of short vowels not being recognized. This is mainly because the Arabic language is unlike the English language in the nature because it is a Semitic language. This is reflected in different characteristics such as grammar, morphology, …


Correlation Between Air Quality Index And Traffic Volume Using Internet Of Things (Iot), Omar Sayah Alruwaili Dec 2020

Correlation Between Air Quality Index And Traffic Volume Using Internet Of Things (Iot), Omar Sayah Alruwaili

Theses and Dissertations

In highly populated world areas, such as metropolises, hazardous air pollution has been linked to the presence of damaging climate and health issues, which are becoming increasingly common. Indeed, a major problem facing urban areas today is air pollution. Gas emissions from vehicles can be seen as the most important source of this kind of pollution. Pollutant gases emitted as parts of car exhaust consist of chemicals such as carbon monoxide (CO), nitrogen dioxide (NO2), and sulphur dioxide (SO2), and ozone (O3), as well as particulate matter (PM). In some places in the world, non-governmental and foreign corporations have also …


Framework For Reasoning With Speech Processing, Ahmed Laarfi Dec 2020

Framework For Reasoning With Speech Processing, Ahmed Laarfi

Theses and Dissertations

It is known that programming languages are textual. We try here to take the advantages of Speech Recognition (SR) and employ them in creating a verbal Language, which takes its instruction from the voice. Because this work is a novel approach in the programming world, we could not find any resources. This dissertation aims to make essential developments in Speech Recognition (SR)and Artificial Intelligence by constructing a new compiler that receives commands verbally and executes them. That means entering data into the Computer by voice commands. This method of input means that we link several major computer topics with several …


Efficient Edge Analytics: Addressing Cyber-Physical Masint With Machine Learning On Audio At The Edge, David Elliott Dec 2020

Efficient Edge Analytics: Addressing Cyber-Physical Masint With Machine Learning On Audio At The Edge, David Elliott

Theses and Dissertations

With the growth of the Internet of Things and the rise of Big Data, data processing and machine learning applications are being moved to cheap and low size, weight, and power (SWaP) devices at the edge, often in the form of mobile phones, embedded systems, or microcontrollers. The field of Cyber-Physical Measurements and Signature Intelligence (MASINT) makes use of these devices to analyze and exploit data in ways not otherwise possible, which results in increased data quality, increased security, and decreased bandwidth. However, methods to train and deploy models at the edge are limited, and models with sufficient accuracy are …


Performance Analysis Of V2v And V2i Communications Using Empirical Path Loss Models Indicators And Embedded Iot Devices, Ibrahim Lateef Oraibi Al Kinoon Aug 2020

Performance Analysis Of V2v And V2i Communications Using Empirical Path Loss Models Indicators And Embedded Iot Devices, Ibrahim Lateef Oraibi Al Kinoon

Theses and Dissertations

Vehicle management technologies deals with the management of critical vehicle information, including location, idle time, speed, and mileage. Such information can always be transferred through a direct vehicle-to-vehicle communication among cars. However, the limitation of this type of design is that it is based on the assumption that vehicles are always served by cellular bases, which is not always the case. For the effective implementation of the Internet-of-Things (IoT) technology in this sector, it is critical to design vehicles with systems that enable them to transmit essential information in the absence of base stations. IoT technologies can then be used …


One Dimensional Neural Time Series Generation, Kaleb Earl Smith Aug 2020

One Dimensional Neural Time Series Generation, Kaleb Earl Smith

Theses and Dissertations

Time dependent data is a main source of information in today’s data driven world.Generating this type of data though has shown its challenges and made it an interesting research area in the field of generative machine learning. The challenge with this one-dimensional (1D) data has been for applications in machine learning to gain access to a considerable amount of quality data needed for algorithm development and analysis. Modeling synthetic data using a Generative Adversarial Network (GAN) has been at the heart of providing a viable solution. Our work focuses on one dimensional times series and explores the “few shot” generation …


On The Characterization Of Natural Language Structure And Literary Stylometry - A Network Science Approach, Younis Anas Younis Al Rozz May 2020

On The Characterization Of Natural Language Structure And Literary Stylometry - A Network Science Approach, Younis Anas Younis Al Rozz

Theses and Dissertations

Natural language processing (NLP) techniques have been through many advancements in recent years, linguistics and scientist utilized these techniques to solve many challenges related to written language and literary. Problems such as finding the genetic relationships among languages, attributing author of a text and categorizing text by genre have been treated throughout the years using conventional statistical methods, for instance, bag of words (BoW), N-gram, the frequency of words and the lexical distance between words. By considering written language as a complex system, network science tools and techniques can be used to address those problems. A unified methodology is proposed …


Revisiting Elliptic Curve Cryptography With Applications To Post-Quantum Sidh Ciphers, Wesam Nabil Eid May 2020

Revisiting Elliptic Curve Cryptography With Applications To Post-Quantum Sidh Ciphers, Wesam Nabil Eid

Theses and Dissertations

Elliptic Curve Cryptography (ECC) has positioned itself as one of the most promising candidates for various applications since its introduction by Miller and Kolbitz in 1985 [53, 44]. The core operation for ECC is the scalar multiplication [k]P where many efforts have addressed its computation speed. Here we introduce an efficient approach for calculating elliptic curve operations by a novel regrouping of terms and creating new projective representation operators and increasing parallelism. These operators and the corresponding projective coordinate representations are shown to lead to adjusted versions of scalar multiplication algorithms that are evaluated. These techniques enable more opportunities for …


Geolocation Based On Signal Level Measurement And Time Advance Inside The Network, Zaenab Shakir May 2020

Geolocation Based On Signal Level Measurement And Time Advance Inside The Network, Zaenab Shakir

Theses and Dissertations

The increasing demands for location-based services in recent years led to provide accurate location information inside the network. The applications for location-based service are assisting emergency request, fraud defense, social media, and marketing. All these demands make the position accuracy highly required. Various techniques and methods have been developed to estimate the position of mobile device inside the network such as RSS, TOA, AOA, and TDOA. In this work, a new method to estimate the accuracy of locating active LTE cellular subscribers. The proposed method is a network-based technique and relies on the Reference Signal Received Power (RSRP) measurements and …


Model Optimization For Edge Devices, Adolf Anthony D’Costa May 2020

Model Optimization For Edge Devices, Adolf Anthony D’Costa

Theses and Dissertations

Edge devices are undergoing groundbreaking computing transformation, which lets us tap into artificial intelligence, quantum computing, 5th generation network capability, fog networking, and computing complex algorithms. Edge systems have substantial advantages over the conventional system in terms of scalability, optimized resources, reliability, and security. The proliferation of such resource-constrained devices in recent years has resulted in the generation of a large quantity of data; these data-producing devices are attractive targets for applications of machine learning. Machine learning models, especially deep learning neural networks, produced models that have high accuracy and prediction capability, but it comes at the cost of computation …


Improving Wake-Up-Word And General Speech Recognition Systems, Gamal Mohamed Bohouta May 2020

Improving Wake-Up-Word And General Speech Recognition Systems, Gamal Mohamed Bohouta

Theses and Dissertations

Automatic Speech Recognition (ASR), a technology that allows a machine to recognize the utterances spoken into a microphone by a person and then converts it to text, is commonly used for different types of applications, such as command and control systems, personal assistant systems, medical systems, disabilities systems, dictation systems, telephony systems, and embedded applications. Due to its extensive use, interest in ASR technology has surged among inventors and researchers alike. They have worked diligently to improve the performance of the ASR systems by developing several techniques or approaches in different aspects,such as enhancing features, training an acoustic model, enhancing …