Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (6)
- Physical Sciences and Mathematics (6)
- Digital Communications and Networking (3)
- Robotics (3)
- Artificial Intelligence and Robotics (2)
-
- Electrical and Computer Engineering (2)
- Mechanical Engineering (2)
- Aerospace Engineering (1)
- Biomedical Engineering and Bioengineering (1)
- Electromagnetics and Photonics (1)
- Information Security (1)
- Medical Sciences (1)
- Medicine and Health Sciences (1)
- Neurosciences (1)
- Systems and Communications (1)
- Theory and Algorithms (1)
- Keyword
-
- Machine learning (2)
- Artificial neural networks (1)
- Autonomous surface vehicle (1)
- Autonomous systems (1)
- Client-side rewriting (1)
-
- Cyber security (1)
- Decoding from brain signals (1)
- Deep learning (1)
- Denial of Service (DoS) (1)
- Distributed algorithm (1)
- Graph theory (1)
- High-fidelity replay (1)
- Image recognition (1)
- Intelligent control (1)
- Interference avoidance (1)
- JavaScript (1)
- Key generation (1)
- Key reconciliation (1)
- Learning from small data (1)
- Linear tracking control (1)
- Malware (1)
- Memento (1)
- Multi-objective genetic algorithm (1)
- Neural network (1)
- Node ranking (1)
- Nonlinear control (1)
- Observer Kalman filter identification (1)
- Physical layer security (1)
- Power system (1)
- Prosthesis (1)
Articles 1 - 9 of 9
Full-Text Articles in Computer Engineering
Analysis Of Bulk Power System Resilience Using Vulnerability Graph, Md Ariful Haque
Analysis Of Bulk Power System Resilience Using Vulnerability Graph, Md Ariful Haque
Computational Modeling & Simulation Engineering Theses & Dissertations
Critical infrastructure such as a Bulk Power System (BPS) should have some quantifiable measure of resiliency and definite rule-sets to achieve a certain resilience value. Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA) networks are integral parts of BPS. BPS or ICS are themselves not vulnerable because of their proprietary technology, but when the control network and the corporate network need to have communications for performance measurements and reporting, the ICS or BPS become vulnerable to cyber-attacks. Thus, a systematic way of quantifying resiliency and identifying crucial nodes in the network is critical for addressing the cyber …
Identification And Optimal Linear Tracking Control Of Odu Autonomous Surface Vehicle, Nadeem Khan
Identification And Optimal Linear Tracking Control Of Odu Autonomous Surface Vehicle, Nadeem Khan
Mechanical & Aerospace Engineering Theses & Dissertations
Autonomous surface vehicles (ASVs) are being used for diverse applications of civilian and military importance such as: military reconnaissance, sea patrol, bathymetry, environmental monitoring, and oceanographic research. Currently, these unmanned tasks can accurately be accomplished by ASVs due to recent advancements in computing, sensing, and actuating systems. For this reason, researchers around the world have been taking interest in ASVs for the last decade. Due to the ever-changing surface of water and stochastic disturbances such as wind and tidal currents that greatly affect the path-following ability of ASVs, identification of an accurate model of inherently nonlinear and stochastic ASV system …
Anthropomorphically Inspired Design Of A Tendon-Driven Robotic Prosthesis For Hand Impairments, Manali Bapurao Bhadugale
Anthropomorphically Inspired Design Of A Tendon-Driven Robotic Prosthesis For Hand Impairments, Manali Bapurao Bhadugale
Mechanical & Aerospace Engineering Theses & Dissertations
This thesis presents the design of a robotic prosthesis, which mimics the morphology of a human hand. The primary goal of this work is to develop a systematic methodology that allows a custom-build of the prosthesis to match the specific requirements of a person with hand impairments. Two principal research questions are addressed toward this goal: 1) How do we cater to the large variation in the distribution of overall hand-sizes in the human population? 2) How closely do we mimic the complex morphological aspects of a biological hand in order to maximize the anthropomorphism (human-like appearance) of the robotic …
To Relive The Web: A Framework For The Transformation And Archival Replay Of Web Pages, John Andrew Berlin
To Relive The Web: A Framework For The Transformation And Archival Replay Of Web Pages, John Andrew Berlin
Computer Science Theses & Dissertations
When replaying an archived web page (known as a memento), the fundamental expectation is that the page should be viewable and function exactly as it did at archival time. However, this expectation requires web archives to modify the page and its embedded resources, so that they no longer reference (link to) the original server(s) they were archived from but back to the archive. Although these modifications necessarily change the state of the representation, it is understood that without them the replay of mementos from the archive would not be possible. Unfortunately, because the replay of mementos and the modifications made …
Design And Implementation Of An Artificial Neural Network Controller For Quadrotor Flight In Confined Environment, Ahmed Mekky
Design And Implementation Of An Artificial Neural Network Controller For Quadrotor Flight In Confined Environment, Ahmed Mekky
Mechanical & Aerospace Engineering Theses & Dissertations
Quadrotors offer practical solutions for many applications, such as emergency rescue, surveillance, military operations, videography and many more. For this reason, they have recently attracted the attention of research and industry. Even though they have been intensively studied, quadrotors still suffer from some challenges that limit their use, such as trajectory measurement, attitude estimation, obstacle avoidance, safety precautions, and land cybersecurity. One major problem is flying in a confined environment, such as closed buildings and tunnels, where the aerodynamics around the quadrotor are affected by close proximity objects, which result in tracking performance deterioration, and sometimes instability. To address this …
Coexistence And Secure Communication In Wireless Networks, Saygin Bakşi
Coexistence And Secure Communication In Wireless Networks, Saygin Bakşi
Electrical & Computer Engineering Theses & Dissertations
In a wireless system, transmitted electromagnetic waves can propagate in all directions and can be received by other users in the system. The signals received by unintended receivers pose two problems; increased interference causing lower system throughput or successful decoding of the information which removes secrecy of the communication. Radio frequency spectrum is a scarce resource and it is allocated by technologies already in use. As a result, many communication systems use the spectrum opportunistically whenever it is available in cognitive radio setting or use unlicensed bands. Hence, efficient use of spectrum by sharing users is crucial to increase maximize …
Deep Recurrent Learning For Efficient Image Recognition Using Small Data, Mahbubul Alam
Deep Recurrent Learning For Efficient Image Recognition Using Small Data, Mahbubul Alam
Electrical & Computer Engineering Theses & Dissertations
Recognition is fundamental yet open and challenging problem in computer vision. Recognition involves the detection and interpretation of complex shapes of objects or persons from previous encounters or knowledge. Biological systems are considered as the most powerful, robust and generalized recognition models. The recent success of learning based mathematical models known as artificial neural networks, especially deep neural networks, have propelled researchers to utilize such architectures for developing bio-inspired computational recognition models. However, the computational complexity of these models increases proportionally to the challenges posed by the recognition problem, and more importantly, these models require a large amount of data …
Applying Machine Learning To Advance Cyber Security: Network Based Intrusion Detection Systems, Hassan Hadi Latheeth Al-Maksousy
Applying Machine Learning To Advance Cyber Security: Network Based Intrusion Detection Systems, Hassan Hadi Latheeth Al-Maksousy
Computer Science Theses & Dissertations
Many new devices, such as phones and tablets as well as traditional computer systems, rely on wireless connections to the Internet and are susceptible to attacks. Two important types of attacks are the use of malware and exploiting Internet protocol vulnerabilities in devices and network systems. These attacks form a threat on many levels and therefore any approach to dealing with these nefarious attacks will take several methods to counter. In this research, we utilize machine learning to detect and classify malware, visualize, detect and classify worms, as well as detect deauthentication attacks, a form of Denial of Service (DoS). …
Characterization Of Language Cortex Activity During Speech Production And Perception, Hassan Baker
Characterization Of Language Cortex Activity During Speech Production And Perception, Hassan Baker
Electrical & Computer Engineering Theses & Dissertations
Millions of people around the world suffer from severe neuromuscular disorders such as spinal cord injury, cerebral palsy, amyotrophic lateral sclerosis (ALS), and others. Many of these individuals cannot perform daily tasks without assistance and depend on caregivers, which adversely impacts their quality of life. A Brain-Computer Interface (BCI) is technology that aims to give these people the ability to interact with their environment and communicate with the outside world. Many recent studies have attempted to decode spoken and imagined speech directly from brain signals toward the development of a natural-speech BCI. However, the current progress has not reached practical …