Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Electrical and Computer Engineering (139)
- Physical Sciences and Mathematics (130)
- Computer Sciences (118)
- Digital Communications and Networking (51)
- Computer and Systems Architecture (39)
-
- Social and Behavioral Sciences (27)
- Data Storage Systems (25)
- Information Security (23)
- Robotics (23)
- Software Engineering (23)
- Other Computer Engineering (21)
- Databases and Information Systems (14)
- Other Electrical and Computer Engineering (14)
- Business (12)
- Education (12)
- Artificial Intelligence and Robotics (11)
- Computational Engineering (10)
- Systems and Communications (10)
- Arts and Humanities (9)
- Electrical and Electronics (9)
- Higher Education (9)
- Medicine and Health Sciences (9)
- Digital Humanities (7)
- Forensic Science and Technology (7)
- Legal Studies (7)
- Life Sciences (7)
- Mathematics (7)
- OS and Networks (7)
- Institution
-
- University of Nebraska - Lincoln (78)
- Singapore Management University (49)
- Technological University Dublin (38)
- Marquette University (28)
- University of South Carolina (16)
-
- Florida International University (14)
- Portland State University (14)
- City University of New York (CUNY) (13)
- Nova Southeastern University (11)
- University of New Haven (11)
- San Jose State University (9)
- University of Kentucky (8)
- University of North Dakota (7)
- Old Dominion University (5)
- Sacred Heart University (5)
- University of New Mexico (5)
- University of Pennsylvania Carey Law School (5)
- Chapman University (4)
- Edith Cowan University (4)
- Embry-Riddle Aeronautical University (4)
- University of Louisville (4)
- Western University (4)
- Cedarville University (3)
- Dartmouth College (3)
- Southwestern Oklahoma State University (3)
- Utah State University (3)
- Brigham Young University (2)
- Jacksonville State University (2)
- Manipal Academy of Higher Education (2)
- Santa Clara University (2)
- Keyword
-
- Machine learning (12)
- Optimization (8)
- Computer Engineering (7)
- Deep learning (7)
- Security (6)
-
- Blockchain (5)
- IoT (5)
- Artificial intelligence (4)
- Forensics (4)
- Internet of things (4)
- Sacred Heart University (4)
- Software Engineering (4)
- Wireless sensor networks (4)
- Algorithms (3)
- Authentication (3)
- Big data (3)
- Cybersecurity (3)
- Data mining (3)
- Digital forensics (3)
- Energy efficiency (3)
- Engineering (3)
- Internet of Things (3)
- Machine Learning (3)
- Precision agriculture (3)
- Software architecture (3)
- Testing (3)
- Virtual reality (3)
- 5G (2)
- A Half-yearly e-newsletter (2)
- Active learning (2)
- Publication
-
- Research Collection School Of Computing and Information Systems (46)
- Department of Electrical and Computer Engineering: Faculty Publications (37)
- Electrical and Computer Engineering Faculty Research and Publications (28)
- Faculty Publications (19)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (18)
-
- Dissertations (15)
- FIU Electronic Theses and Dissertations (14)
- Conference papers (13)
- Publications (13)
- Publications and Research (12)
- College of Engineering and Computing Course Catalogs (11)
- Electrical & Computer Engineering and Computer Science Faculty Publications (11)
- Undergraduate Research & Mentoring Program (10)
- Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research (9)
- Computer Science Faculty Publications (7)
- Electrical and Computer Engineering Faculty Publications (7)
- All Faculty Scholarship (5)
- Branch Mathematics and Statistics Faculty and Staff Publications (5)
- Articles (4)
- Electrical and Computer Engineering Publications (4)
- Faculty Scholarship (4)
- News, Magazines and Reports (4)
- Research outputs 2014 to 2021 (4)
- School of Computing: Faculty Publications (4)
- Dartmouth Scholarship (3)
- Engineering Faculty Articles and Research (3)
- Honors Theses (3)
- Information Science Faculty Publications (3)
- Other resources (3)
- Social Space (3)
- File Type
Articles 121 - 150 of 384
Full-Text Articles in Computer Engineering
Cmos Radioactive Isotope Identification With Multichannel Analyzer And Embedded Neural Network, Samuel Murray
Cmos Radioactive Isotope Identification With Multichannel Analyzer And Embedded Neural Network, Samuel Murray
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
A radiation detection and identification system is designed and implemented to perform gamma ray spectroscopy on radioactive sources and identify which isotopes are present in the sources. A multichannel analyzer is implemented on an ASIC to process the signal produced from gamma rays detected by a scintillator and photomultiplier tube and to quantize the gamma ray energies to build a histogram. A fast, low memory embedded neural network is implemented on a microcontroller ASIC to identify the isotopes present in the gamma ray histogram produced by the multichannel analyzer in real time.
Advisors: Sina Balkir and Michael Hoffman
Chaotic Phase-Coded Waveforms With Space-Time Complementary Coding For Mimo Radar Applications, Sheng Hong, Fuhui Zhou, Yantao Dong, Zhixin Zhao, Yuhao Wang, Maosong Yan
Chaotic Phase-Coded Waveforms With Space-Time Complementary Coding For Mimo Radar Applications, Sheng Hong, Fuhui Zhou, Yantao Dong, Zhixin Zhao, Yuhao Wang, Maosong Yan
Electrical and Computer Engineering Faculty Publications
A framework for designing orthogonal chaotic phase-coded waveforms with space-time complementary coding (STCC) is proposed for multiple-input multiple-output (MIMO) radar applications. The phase-coded waveform set to be transmitted is generated with an arbitrary family size and an arbitrary code length by using chaotic sequences. Due to the properties of chaos, this chaotic waveform set has many advantages in performance, such as anti-interference and low probability of intercept. However, it cannot be directly exploited due to the high range sidelobes, mutual interferences, and Doppler intolerance. In order to widely implement it in practice, we optimize the chaotic phase-coded waveform set from …
An Application Of Game Theory In Distributed Collaborative Decision Making, Angran Xiao
An Application Of Game Theory In Distributed Collaborative Decision Making, Angran Xiao
Publications and Research
In a distributed product realization environment, new paradigms and accompanying software systems are necessary to support the collaborative work of geographically dispersed engineering teams from different disciplines who have different knowledge, experience, tools and resources. To verify the concept of collaboration by separation, we propose a generic information communication medium to enable knowledge representation and exchange between engineering teams, a digital interface. Across digital interfaces, each engineering team maintains its own perspective towards the product realization problem, and each controls a subset of design variables and seeks to maximize its own payoff function subject to individual constraints. Hence, we postulate …
Advanced Recurrent Network-Based Hybrid Acoustic Models For Low Resource Speech Recognition, Jian Kang, Wei-Qiang Zhang, Wei-Wei Liu, Jia Liu, Michael T. Johnson
Advanced Recurrent Network-Based Hybrid Acoustic Models For Low Resource Speech Recognition, Jian Kang, Wei-Qiang Zhang, Wei-Wei Liu, Jia Liu, Michael T. Johnson
Electrical and Computer Engineering Faculty Publications
Recurrent neural networks (RNNs) have shown an ability to model temporal dependencies. However, the problem of exploding or vanishing gradients has limited their application. In recent years, long short-term memory RNNs (LSTM RNNs) have been proposed to solve this problem and have achieved excellent results. Bidirectional LSTM (BLSTM), which uses both preceding and following context, has shown particularly good performance. However, the computational requirements of BLSTM approaches are quite heavy, even when implemented efficiently with GPU-based high performance computers. In addition, because the output of LSTM units is bounded, there is often still a vanishing gradient issue over multiple layers. …
Tunable Plasmonic Resonances In Highly Porous Nano-Bamboo Si-Au Superlattice-Type Thin Films, Ufuk Kılıç, Alyssa Mock, René Feder, Derek Sekora, Matthew J. Hilfiker, Rafal Korlacki, Eva Schubert, Christos Argyropoulos, Mathias Schubert
Tunable Plasmonic Resonances In Highly Porous Nano-Bamboo Si-Au Superlattice-Type Thin Films, Ufuk Kılıç, Alyssa Mock, René Feder, Derek Sekora, Matthew J. Hilfiker, Rafal Korlacki, Eva Schubert, Christos Argyropoulos, Mathias Schubert
Department of Electrical and Computer Engineering: Faculty Publications
We report on fabrication of spatially-coherent columnar plasmonic nanostructure superlattice-type thin films with high porosity and strong optical anisotropy using glancing angle deposition. Subsequent and repeated depositions of silicon and gold lead to nanometer-dimension subcolumns with controlled lengths. The superlattice-type columns resemble bamboo structures where smaller column sections of gold form junctions sandwiched between larger silicon column sections (“nano-bamboo”). We perform generalized spectroscopic ellipsometry measurements and finite element method computations to elucidate the strongly anisotropic optical properties of the highly-porous nano-bamboo structures. The occurrence of a strongly localized plasmonic mode with displacement pattern reminiscent of a dark quadrupole mode is …
An Ensemble Stacked Convolutional Neural Network Model For Environmental Event Sound Recognition, Shaobo Li, Yong Yao, Jie Hu, Guokai Liu, Xuemei Yao, Jianjun Hu
An Ensemble Stacked Convolutional Neural Network Model For Environmental Event Sound Recognition, Shaobo Li, Yong Yao, Jie Hu, Guokai Liu, Xuemei Yao, Jianjun Hu
Faculty Publications
Convolutional neural networks (CNNs) with log-mel audio representation and CNN-based end-to-end learning have both been used for environmental event sound recognition (ESC). However, log-mel features can be complemented by features learned from the raw audio waveform with an effective fusion method. In this paper, we first propose a novel stacked CNN model with multiple convolutional layers of decreasing filter sizes to improve the performance of CNN models with either log-mel feature input or raw waveform input. These two models are then combined using the Dempster–Shafer (DS) evidence theory to build the ensemble DS-CNN model for ESC. Our experiments over three …
Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally
Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally
Information Science Faculty Publications
One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments of small scale smart sensors in WBSNs, security, and privacy guarantees (e.g., security and safety-critical data, sensitive private information) are becoming a challenging issue because these sensor nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious tampering) using the secure hash algorithm 3 (SHA-3) when smart sensors in WBSNs communicate with each other using the Internet. Due to the limited resources (i.e., storage, …
Survey Results On Adults And Cybersecurity Education, Frank Breitinger, Joseph Ricci, Ibrahim Baggili
Survey Results On Adults And Cybersecurity Education, Frank Breitinger, Joseph Ricci, Ibrahim Baggili
Electrical & Computer Engineering and Computer Science Faculty Publications
Cyberattacks and identity theft are common problems nowadays where researchers often say that humans are the weakest link in the security chain. Therefore, this survey focused on analyzing the interest for adults for ‘cyber threat education seminars’, e.g., how to project themselves and their loved ones. Specifically, we asked questions to understand a possible audience, willingness for paying / time commitment, or fields of interest as well as background and previous training experience. The survey was conducted in late 2016 and taken by 233 participants. The results show that many are worried about cyber threats and about their children exploring …
Adaptive Virtual Impedance Droop Control Based On Consensus Control Of Reactive Current, Zhilin Lu, Qing Wei, Yiyi Zhang, Junhui Zhao, Emad Manla
Adaptive Virtual Impedance Droop Control Based On Consensus Control Of Reactive Current, Zhilin Lu, Qing Wei, Yiyi Zhang, Junhui Zhao, Emad Manla
Electrical & Computer Engineering and Computer Science Faculty Publications
It is difficult to achieve accurate distribution of reactive power based on conventional droop control due to the line impedance mismatch in an islanded microgrid. An adaptive virtual impendence method based on consensus control of reactive current is proposed in this paper. A distributed control structure without the central controller has been established. In this structure, each distributed generation unit (DG) is an independent agent, one-way communication is used between the adjacent DGs, and the reactive power sharing is equivalent to a problem of reactive power current consensus. It has been proven that the system is asymptotically stable under the …
Prototype Of A Fish Inspired Swimming Silk Robot, Cassandra M. Donatelli, Sarah A. Bradner, Juanita Mathews, Erin Sanders, Casey R. Culligan, David Kaplan, Eric D. Tytell
Prototype Of A Fish Inspired Swimming Silk Robot, Cassandra M. Donatelli, Sarah A. Bradner, Juanita Mathews, Erin Sanders, Casey R. Culligan, David Kaplan, Eric D. Tytell
Engineering Faculty Articles and Research
Elongate fishes have evolved hundreds of times throughout the tree of life. They occupy many aquatic environments, from streams and ponds to the deepest parts of the ocean. Due to their long body and numerous vertebrae, they are also highly flexible animals, which makes them useful as bioinspiration for designs in the field of soft robotics. We present a biodegradable soft robot prototype, inspired by elongate fishes. The robot's body is primarily composed of a silk hydrogel with embedded fibers to mimic the structure of natural fish skin. When actuated at the front, the flexible gel prototype mimics the undulatory …
Moving Target Defense For Securing Scada Communications, Vahid Heydari
Moving Target Defense For Securing Scada Communications, Vahid Heydari
Faculty Scholarship for the College of Science & Mathematics
In this paper, we introduce a framework for building a secure and private peer to peer communication used in supervisory control and data acquisition networks with a novel Mobile IPv6-based moving target defense strategy. Our approach aids in combating remote cyber-attacks against peer hosts by thwarting any potential attacks at their reconnaissance stage. The IP address of each host is randomly changed at a certain interval creating a moving target to make it difficult for an attacker to find the host. At the same time, the peer host is updated through the use of the binding update procedure (standard Mobile …
The Technology Tide: Has It Hit The Shores Of Social Innovation?, Andrew Koh
The Technology Tide: Has It Hit The Shores Of Social Innovation?, Andrew Koh
Social Space
“We want a nice colour and it must look modern.”
That was the feedback some villagers gave during a design-thinking exercise regarding sanitation facilities. Although this took place several years ago, as part of my previous work in the international development sector, I remember the experience vividly. It struck me that most people—village-dwellers or Singaporeans alike—have similar aspirations for a better quality of living.
Surgical And Medical Applications Of Drones: A Comprehensive Review, Brent Terwilliger, James C. Rosser Jr., Vudatha Vignesh, Brett C. Parker
Surgical And Medical Applications Of Drones: A Comprehensive Review, Brent Terwilliger, James C. Rosser Jr., Vudatha Vignesh, Brett C. Parker
Publications
Drones have the ability to gather real time data cost effectively, to deliver payloads and have initiated the rapid evolution of many industrial, commercial, and recreational applications. Unfortunately, there has been a slower expansion in the field of medicine. This article provides a comprehensive review of current and future drone applications in medicine, in hopes of empowering and inspiring more aggressive investigation.
Experience Constructing The Artifact Genome Project (Agp): Managing The Domain's Knowledge One Artifact At A Time, Cinthya Grajeda, Laura Sanchez, Ibrahim Baggili, Devon R. Clark, Frank Breitinger
Experience Constructing The Artifact Genome Project (Agp): Managing The Domain's Knowledge One Artifact At A Time, Cinthya Grajeda, Laura Sanchez, Ibrahim Baggili, Devon R. Clark, Frank Breitinger
Electrical & Computer Engineering and Computer Science Faculty Publications
While various tools have been created to assist the digital forensics community with acquiring, processing, and organizing evidence and indicating the existence of artifacts, very few attempts have been made to establish a centralized system for archiving artifacts. The Artifact Genome Project (AGP) has aimed to create the largest vetted and freely available digital forensics repository for Curated Forensic Artifacts (CuFAs). This paper details the experience of building, implementing, and maintaining such a system by sharing design decisions, lessons learned, and future work. We also discuss the impact of AGP in both the professional and academic realms of digital forensics. …
A Half- Yearly E-Newsletter Of The Department Of Computer Science And Engineering, Manipal Institute Of Technology -Jul 2018, Ashalatha Nayak
A Half- Yearly E-Newsletter Of The Department Of Computer Science And Engineering, Manipal Institute Of Technology -Jul 2018, Ashalatha Nayak
Faculty work
No abstract provided.
Towards Domain-Specific Modeling Methodology For Avionic Safety-Critical Systems, Emanuel S. Grant
Towards Domain-Specific Modeling Methodology For Avionic Safety-Critical Systems, Emanuel S. Grant
Computer Science Faculty Publications
The use of domain-specific modeling languages and associated methodologies, provide support in application domain where the safe and reliable operations of the systems are of paramount importance to the users and organizations, and wherein the domains are well understood and documented. One such area of domain-specific modeling application is in the field of avionic systems. For software systems to be used onboard aircrafts they must be certified, and as such certification protocols have been established for developing these safety-critical systems. These established protocols are usually represented as textual documents and inherently are difficult to apply directly in software development environments. …
A Building Permit System For Smart Cities: A Cloud-Based Framework, Magdalini Eirinaki, Subhankar Dhar, Shishir Mathur, Adwait Kaley, Arpit Patel, Akshar Joshi, Dhvani Shah
A Building Permit System For Smart Cities: A Cloud-Based Framework, Magdalini Eirinaki, Subhankar Dhar, Shishir Mathur, Adwait Kaley, Arpit Patel, Akshar Joshi, Dhvani Shah
Faculty Publications
In this paper we propose a novel, cloud-based framework to support citizens and city officials in the building permit process. The proposed framework is efficient, user-friendly, and transparent with a quick turn-around time for homeowners. Compared to existing permit systems, the proposed smart city permit framework provides a pre-permitting decision workflow, and incorporates a data analytics and mining module that enables the continuous improvement of both the end user experience and the permitting and urban planning processes. This is enabled through a data mining-powered permit recommendation engine as well as a data analytics process that allow a gleaning of key …
Grasp Synthesis For Purposeful Fracturing Of Object, Mahyar Abdeetedal, Mehrdad Kermani Ph.D., P.Eng.
Grasp Synthesis For Purposeful Fracturing Of Object, Mahyar Abdeetedal, Mehrdad Kermani Ph.D., P.Eng.
Electrical and Computer Engineering Publications
No abstract provided.
Enginews, July 2018, School Of Computer Science & Engineering
Enginews, July 2018, School Of Computer Science & Engineering
News, Magazines and Reports
The Rube Goldberg Machine: The 90 year old concept’s lessons for the engineering student --Solar Power!? Solar Powered Charging comes to Sacred Heart.
Performance Comparison Of Support Vector Machine, Random Forest, And Extreme Learning Machine For Intrusion Detection, Iftikhar Ahmad, Muhammad Javed Iqbal, Mohammad Basheri, Aneel Rahim
Performance Comparison Of Support Vector Machine, Random Forest, And Extreme Learning Machine For Intrusion Detection, Iftikhar Ahmad, Muhammad Javed Iqbal, Mohammad Basheri, Aneel Rahim
Articles
Intrusion detection is a fundamental part of security tools, such as adaptive security appliances, intrusion detection systems, intrusion prevention systems, and firewalls. Various intrusion detection techniques are used, but their performance is an issue. Intrusion detection performance depends on accuracy, which needs to improve to decrease false alarms and to increase the detection rate. To resolve concerns on performance, multilayer perceptron, support vector machine (SVM), and other techniques have been used in recent work. Such techniques indicate limitations and are not efficient for use in large data sets, such as system and network data. The intrusion detection system is used …
Soa Maturity Influence On Digital Banking Transformation, Alan Megargel, Venky Shankararaman, Terence P. C. Fan
Soa Maturity Influence On Digital Banking Transformation, Alan Megargel, Venky Shankararaman, Terence P. C. Fan
Research Collection School Of Computing and Information Systems
Digital Banking is an evolution of online banking, where the banks attempt to further enhance customer experience by integrating digital technologies such as mobile technology, social media and analytics. Traditional banks have the highest barriers to entry into the digital banking market due to the presence of legacy core banking systems. These legacy systems while still high performing and reliable, are inflexible to change and are not easily integrated to the modern application systems needed for delivering digital banking services across multiple online banking channels. One solution that is widely adopted in the industry to overcome this obstacle is the …
Compositional Reasoning For Shared-Variable Concurrent Programs, Fuyuan Zhang, Yongwang Zhao, David Sanan, Yang Liu, Alwen Tiu, Shang-Wei Lin, Jun Sun
Compositional Reasoning For Shared-Variable Concurrent Programs, Fuyuan Zhang, Yongwang Zhao, David Sanan, Yang Liu, Alwen Tiu, Shang-Wei Lin, Jun Sun
Research Collection School Of Computing and Information Systems
Scalable and automatic formal verification for concurrent systems is always demanding. In this paper, we propose a verification framework to support automated compositional reasoning for concurrent programs with shared variables. Our framework models concurrent programs as succinct automata and supports the verification of multiple important properties. Safety verification and simulations of succinct automata are parallel compositional, and safety properties of succinct automata are preserved under refinements. We generate succinct automata from infinite state concurrent programs in an automated manner. Furthermore, we propose the first automated approach to checking rely-guarantee based simulations between infinite state concurrent programs. We have prototyped our …
A Unified Approach To Route Planning For Shared Mobility, Yongxin Tong, Yuxiang Zeng, Zimu Zhou, Lei Chen, Jieping Ye, Ke Xu
A Unified Approach To Route Planning For Shared Mobility, Yongxin Tong, Yuxiang Zeng, Zimu Zhou, Lei Chen, Jieping Ye, Ke Xu
Research Collection School Of Computing and Information Systems
There has been a dramatic growth of shared mobility applications such as ride-sharing, food delivery and crowdsourced parcel delivery. Shared mobility refers to transportation services that are shared among users, where a central issue is route planning. Given a set of workers and requests, route planning finds for each worker a route, i.e., a sequence of locations to pick up and drop off passengers/parcels that arrive from time to time, with different optimization objectives. Previous studies lack practicability due to their conflicted objectives and inefficiency in inserting a new request into a route, a basic operation called insertion. In this …
Easy Does It: Blockchain-Based Solutions For The Future, David Wong, Freddy Setiawan, Alvin Yong
Easy Does It: Blockchain-Based Solutions For The Future, David Wong, Freddy Setiawan, Alvin Yong
Social Space
y now, most people are aware of Bitcoin and its meteoric rise in value. What is less known, however, is its underpinning technology, blockchain. Blockchain is a distributed ledger that records virtually all types of transactions.This distributed nature is reflected in itsphysical architecture, and is one of the main reasons for its strong resistance to hacking and its immutable nature.
All Systems Go: Building An Internet For Good, Sylvia Cadena
All Systems Go: Building An Internet For Good, Sylvia Cadena
Social Space
The Internet has supercharged our ability to achieve development targets. Digital solutions, from both the public and private sectors, can facilitate unprecedented access to government and social services, banking andfinance, telehealth and well-being,education and training, employment opportunities, as well as create business opportunities.
Multiuser Coding And Signal Processing In A Low Power Sensor Network, Dongqi Lai
Multiuser Coding And Signal Processing In A Low Power Sensor Network, Dongqi Lai
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
Backscatter communication system is a wireless communication system that is used by both academic community and industry circles in recent years. This communication system only requires ultra-low power usage and simple design of the sensors. This project is using backscatter communication system to transmit data with backscatter tags. The method we used is semi-passive backscatter communication. This project focuses on transmitting signals with multiple sensors so there is a problem about distinguishing the signal reflected by different nodes. We modulated the transmitting digital signal with Walsh function to solve the problem of separating the signals between different nodes. By using …
A Neuromorphic Quadratic, Integrate, And Fire Silicon Neuron With Adaptive Gain, David Parent, Eric Basham
A Neuromorphic Quadratic, Integrate, And Fire Silicon Neuron With Adaptive Gain, David Parent, Eric Basham
Faculty Publications
An integrated circuit implementation of a silicon neuron was designed, manufactured, and tested. The circuit was designed using the Quadratic, Integrate, and Fire (QIF) neuron model in 0.5 µm silicon technology. The neuron implementation was optimized for low current consumption, drawing only 1.56 mA per QIF circuit and utilized hysteretic reset, non-inverting integrator, and voltage-squarer circuits. The final area of each circuit in silicon was 268 µm height × 400 µm width. This design is the first IC of its kind for this neuron model and is successfully able to output true spiking that follows the behaviors of bistability, monotonic, …
Implementation Of Vision Processing Tasks On A Smart Camera Platform Using Neighborhood Processors, Dingyi Hong
Implementation Of Vision Processing Tasks On A Smart Camera Platform Using Neighborhood Processors, Dingyi Hong
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
Two applications of vision processing on a smart camera platform using neighborhood processors are presented. A smart camera application of real-time trajectory calculation for tracking objects and predicting their path of motion by using a single intelligent camera or a dual camera system are designed, simulated and implemented. Another application of object recognition with a key points algorithm for detecting simple shaped objects and locating the camera position within a 3-D coordinate system via imaging by using artificial neural network is applied to provide quick and accurate processing on a neighborhood-level parallel processor or other limited vision chip. For all …
Privacy-Preserving Mining Of Association Rule On Outsourced Cloud Data From Multiple Parties, Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen, Ho-Fung Fung Leung
Privacy-Preserving Mining Of Association Rule On Outsourced Cloud Data From Multiple Parties, Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen, Ho-Fung Fung Leung
Research Collection School Of Computing and Information Systems
It has been widely recognized as a challenge to carry out data analysis and meanwhile preserve its privacy in the cloud. In this work, we mainly focus on a well-known data analysis approach namely association rule mining. We found that the data privacy in this mining approach have not been well considered so far. To address this problem, we propose a scheme for privacy-preserving association rule mining on outsourced cloud data which are uploaded from multiple parties in a twin-cloud architecture. In particular, we mainly consider the scenario where the data owners and miners have different encryption keys that are …
A Simplified Secure Programming Platform For Internet Of Things Devices, Halim Burak Yesilyurt
A Simplified Secure Programming Platform For Internet Of Things Devices, Halim Burak Yesilyurt
FIU Electronic Theses and Dissertations
The emerging Internet of Things (IoT) revolution has introduced many useful applications that are utilized in our daily lives. Users can program these devices in order to develop their own IoT applications; however, the platforms and languages that are used during development are abounding, complicated, and time-consuming. The software solution provided in this thesis, PROVIZ+, is a secure sensor application development software suite that helps users create sophisticated and secure IoT applications with little software and hardware experience. Moreover, a simple and efficient domain-specific programming language, namely Panther language, was designed for IoT application development to unify existing programming languages. …