Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Electrical and Computer Engineering (8)
- Other Computer Engineering (6)
- Other Electrical and Computer Engineering (4)
- Digital Communications and Networking (3)
- Biomedical Devices and Instrumentation (2)
-
- Biomedical Engineering and Bioengineering (2)
- Computational Engineering (2)
- Controls and Control Theory (2)
- Robotics (2)
- Signal Processing (2)
- Systems and Integrative Engineering (2)
- Acoustics, Dynamics, and Controls (1)
- Aerospace Engineering (1)
- Computer and Systems Architecture (1)
- Computer-Aided Engineering and Design (1)
- Data Storage Systems (1)
- Electrical and Electronics (1)
- Industrial Engineering (1)
- Mechanical Engineering (1)
- Medicine and Health Sciences (1)
- Navigation, Guidance, Control and Dynamics (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Other Biomedical Engineering and Bioengineering (1)
- Physical Therapy (1)
- Physiotherapy (1)
- Rehabilitation and Therapy (1)
- Systems and Communications (1)
- Keyword
-
- Adaptive streaming (1)
- Adherence (1)
- Anomaly Detection (1)
- Anomaly detection (1)
- Assistive device (1)
-
- Attitude (1)
- Big Data (1)
- Big Data. (1)
- Blockchain (1)
- Cloud computing (1)
- Computational Path (1)
- Computer Vision (1)
- Convolutional Neural Network (1)
- DTW (1)
- Data mining (1)
- Deep learning (1)
- Dimensionality reduction (1)
- Dynamic Time Warping (1)
- Energy forecasting (1)
- Error (1)
- Estimate (1)
- Estimator (1)
- Gamification (1)
- Gaussian Distribution (1)
- Hand tremor (1)
- IMUs (1)
- Interdependency (1)
- Intrusion detection (1)
- Ito (1)
- K-means (1)
Articles 1 - 10 of 10
Full-Text Articles in Computer Engineering
Design And Implementation Of Anomaly Detections For User Authentication Framework, Iman Abu Sulayman
Design And Implementation Of Anomaly Detections For User Authentication Framework, Iman Abu Sulayman
Electronic Thesis and Dissertation Repository
Anomaly detection is quickly becoming a very significant tool for a variety of applications such as intrusion detection, fraud detection, fault detection, system health monitoring, and event detection in IoT devices. An application that lacks a strong implementation for anomaly detection is user trait modeling for user authentication purposes. User trait models expose up-to-date representation of the user so that changes in their interests, their learning progress or interactions with the system are noticed and interpreted. The reason behind the lack of adoption in user trait modeling arises from the need of a continuous flow of high-volume data, that is …
Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo
Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo
Electronic Thesis and Dissertation Repository
Network virtualization has become a key approach for Network Service Providers (NSPs) to mitigate the challenge of the continually increasing demands for network services. Tightly coupled with their software components, legacy network devices are difficult to upgrade or modify to meet the dynamically changing end-user needs. To virtualize their infrastructure and mitigate those challenges, NSPs have started to adopt Software Defined Networking (SDN) and Network Function Virtualization (NFV). To this end, this thesis addresses the challenges faced on the road of transforming the legacy networking infrastructure to a more dynamic and agile virtualized environment to meet the rapidly increasing demand …
Cluster-Based Chained Transfer Learning For Energy Forecasting With Big Data, Yifang Tian
Cluster-Based Chained Transfer Learning For Energy Forecasting With Big Data, Yifang Tian
Electronic Thesis and Dissertation Repository
Smart meter popularity has resulted in the ability to collect big energy data and has created opportunities for large-scale energy forecasting. Machine Learning (ML) techniques commonly used for forecasting, such as neural networks, involve computationally intensive training typically with data from a single building/group to predict future consumption for that same building/group. With hundreds of thousands of smart meters, it becomes impractical or even infeasible to individually train a model for each meter. Consequently, this paper proposes Cluster-Based Chained Transfer Learning (CBCTL), an approach for building neural network-based models for many meters by taking advantage of already trained models through …
A Wearable Mechatronic Device For Hand Tremor Monitoring And Suppression: Development And Evaluation, Yue Zhou
A Wearable Mechatronic Device For Hand Tremor Monitoring And Suppression: Development And Evaluation, Yue Zhou
Electronic Thesis and Dissertation Repository
Tremor, one of the most disabling symptoms of Parkinson's disease (PD), significantly affects the quality of life of the individuals who suffer from it. These people live with difficulties with fine motor tasks, such as eating and writing, and suffer from social embarrassment. Traditional medicines are often ineffective, and surgery is highly invasive and risky. The emergence of wearable technology facilitates an externally worn mechatronic tremor suppression device as a potential alternative approach for tremor management. However, no device has been developed for the suppression of finger tremor that has been validated on a human.
It has been reported in …
Classifying Appliances Operation Modes Using Dynamic Time Warping (Dtw) And K Nearest Neighbors (Knn), Abdelkareem M. Jaradat
Classifying Appliances Operation Modes Using Dynamic Time Warping (Dtw) And K Nearest Neighbors (Knn), Abdelkareem M. Jaradat
Electronic Thesis and Dissertation Repository
In the Smart Grid environment, the advent of intelligent measuring devices facilitates monitoring appliance electricity consumption. This data can be used in applying Demand Response (DR) in residential houses through data analytics, and developing data mining techniques. In this research, we introduce a smart system approach that is applied to user's disaggregated power consumption data. This system encourages the users to apply DR by changing their behaviour of using heavier operation modes to lighter modes, and by encouraging users to shift their usages to off-peak hours. First, we apply Cross Correlation to detect times of the occurrences when an appliance …
Quantifying The Outcomes Of A Virtual Reality (Vr)-Based Gamified Neck Rehabilitation, Shahan Salim
Quantifying The Outcomes Of A Virtual Reality (Vr)-Based Gamified Neck Rehabilitation, Shahan Salim
Electronic Thesis and Dissertation Repository
Neck pain is a major global public health concern and adds a significant financial burden to both the healthcare system as well as people suffering from it. Additionally, it presents measurement and evaluation challenges for clinicians as well as adherence challenges and treatment barriers for the patients. We have developed a virtual reality (VR)-based video game that can be used to capture outcomes that may aid in the assessment and treatment of neck pain. We investigated: (i) performance metrics of overall accuracy, accuracy based on movement difficulty, duration, and total envelope of movement; (ii) stability across sessions; (iii) accuracy across …
Adaptation Of A Deep Learning Algorithm For Traffic Sign Detection, Jose Luis Masache Narvaez
Adaptation Of A Deep Learning Algorithm For Traffic Sign Detection, Jose Luis Masache Narvaez
Electronic Thesis and Dissertation Repository
Traffic signs detection is becoming increasingly important as various approaches for automation using computer vision are becoming widely used in the industry. Typical applications include autonomous driving systems, mapping and cataloging traffic signs by municipalities. Convolutional neural networks (CNNs) have shown state of the art performances in classification tasks, and as a result, object detection algorithms based on CNNs have become popular in computer vision tasks. Two-stage detection algorithms like region proposal methods (R-CNN and Faster R-CNN) have better performance in terms of localization and recognition accuracy. However, these methods require high computational power for training and inference that make …
Nonlinear Attitude And Pose Filters With Superior Convergence Properties, Hashim Abdellah Hashim Mohamed
Nonlinear Attitude And Pose Filters With Superior Convergence Properties, Hashim Abdellah Hashim Mohamed
Electronic Thesis and Dissertation Repository
In this thesis, several deterministic and stochastic attitude filtering solutions on the special orthogonal group SO(3) are proposed. Firstly, the attitude estimation problem is approached on the basis of nonlinear deterministic filters on SO(3) with guaranteed transient and steady-state measures. The second solution to the attitude estimation problem considers nonlinear stochastic filters on SO(3) with superior convergence properties with two filters being developed in the sense of Ito, and one in the sense of Stratonovich.
This thesis also presents several deterministic and stochastic pose filtering solutions developed on the special Euclidean group SE(3). The first solution includes two nonlinear deterministic …
Enhanced Multimedia Exchanges Over The Internet, Fuad Shamieh
Enhanced Multimedia Exchanges Over The Internet, Fuad Shamieh
Electronic Thesis and Dissertation Repository
Although the Internet was not originally designed for exchanging multimedia streams, consumers heavily depend on it for audiovisual data delivery. The intermittent nature of multimedia traffic, the unguaranteed underlying communication infrastructure, and dynamic user behavior collectively result in the degradation of Quality-of-Service (QoS) and Quality-of-Experience (QoE) perceived by end-users. Consequently, the volume of signalling messages is inevitably increased to compensate for the degradation of the desired service qualities. Improved multimedia services could leverage adaptive streaming as well as blockchain-based solutions to enhance media-rich experiences over the Internet at the cost of increased signalling volume. Many recent studies in the literature …
Towards Efficient Intrusion Detection Using Hybrid Data Mining Techniques, Fadi Salo
Towards Efficient Intrusion Detection Using Hybrid Data Mining Techniques, Fadi Salo
Electronic Thesis and Dissertation Repository
The enormous development in the connectivity among different type of networks poses significant concerns in terms of privacy and security. As such, the exponential expansion in the deployment of cloud technology has produced a massive amount of data from a variety of applications, resources and platforms. In turn, the rapid rate and volume of data creation in high-dimension has begun to pose significant challenges for data management and security. Handling redundant and irrelevant features in high-dimensional space has caused a long-term challenge for network anomaly detection. Eliminating such features with spectral information not only speeds up the classification process, but …