Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

2018

Discipline
Institution
Keyword
Publication
File Type

Articles 121 - 150 of 384

Full-Text Articles in Computer Engineering

Cmos Radioactive Isotope Identification With Multichannel Analyzer And Embedded Neural Network, Samuel Murray Jul 2018

Cmos Radioactive Isotope Identification With Multichannel Analyzer And Embedded Neural Network, Samuel Murray

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

A radiation detection and identification system is designed and implemented to perform gamma ray spectroscopy on radioactive sources and identify which isotopes are present in the sources. A multichannel analyzer is implemented on an ASIC to process the signal produced from gamma rays detected by a scintillator and photomultiplier tube and to quantize the gamma ray energies to build a histogram. A fast, low memory embedded neural network is implemented on a microcontroller ASIC to identify the isotopes present in the gamma ray histogram produced by the multichannel analyzer in real time.

Advisors: Sina Balkir and Michael Hoffman


Chaotic Phase-Coded Waveforms With Space-Time Complementary Coding For Mimo Radar Applications, Sheng Hong, Fuhui Zhou, Yantao Dong, Zhixin Zhao, Yuhao Wang, Maosong Yan Jul 2018

Chaotic Phase-Coded Waveforms With Space-Time Complementary Coding For Mimo Radar Applications, Sheng Hong, Fuhui Zhou, Yantao Dong, Zhixin Zhao, Yuhao Wang, Maosong Yan

Electrical and Computer Engineering Faculty Publications

A framework for designing orthogonal chaotic phase-coded waveforms with space-time complementary coding (STCC) is proposed for multiple-input multiple-output (MIMO) radar applications. The phase-coded waveform set to be transmitted is generated with an arbitrary family size and an arbitrary code length by using chaotic sequences. Due to the properties of chaos, this chaotic waveform set has many advantages in performance, such as anti-interference and low probability of intercept. However, it cannot be directly exploited due to the high range sidelobes, mutual interferences, and Doppler intolerance. In order to widely implement it in practice, we optimize the chaotic phase-coded waveform set from …


An Application Of Game Theory In Distributed Collaborative Decision Making, Angran Xiao Jul 2018

An Application Of Game Theory In Distributed Collaborative Decision Making, Angran Xiao

Publications and Research

In a distributed product realization environment, new paradigms and accompanying software systems are necessary to support the collaborative work of geographically dispersed engineering teams from different disciplines who have different knowledge, experience, tools and resources. To verify the concept of collaboration by separation, we propose a generic information communication medium to enable knowledge representation and exchange between engineering teams, a digital interface. Across digital interfaces, each engineering team maintains its own perspective towards the product realization problem, and each controls a subset of design variables and seeks to maximize its own payoff function subject to individual constraints. Hence, we postulate …


Advanced Recurrent Network-Based Hybrid Acoustic Models For Low Resource Speech Recognition, Jian Kang, Wei-Qiang Zhang, Wei-Wei Liu, Jia Liu, Michael T. Johnson Jul 2018

Advanced Recurrent Network-Based Hybrid Acoustic Models For Low Resource Speech Recognition, Jian Kang, Wei-Qiang Zhang, Wei-Wei Liu, Jia Liu, Michael T. Johnson

Electrical and Computer Engineering Faculty Publications

Recurrent neural networks (RNNs) have shown an ability to model temporal dependencies. However, the problem of exploding or vanishing gradients has limited their application. In recent years, long short-term memory RNNs (LSTM RNNs) have been proposed to solve this problem and have achieved excellent results. Bidirectional LSTM (BLSTM), which uses both preceding and following context, has shown particularly good performance. However, the computational requirements of BLSTM approaches are quite heavy, even when implemented efficiently with GPU-based high performance computers. In addition, because the output of LSTM units is bounded, there is often still a vanishing gradient issue over multiple layers. …


Tunable Plasmonic Resonances In Highly Porous Nano-Bamboo Si-Au Superlattice-Type Thin Films, Ufuk Kılıç, Alyssa Mock, René Feder, Derek Sekora, Matthew J. Hilfiker, Rafal Korlacki, Eva Schubert, Christos Argyropoulos, Mathias Schubert Jul 2018

Tunable Plasmonic Resonances In Highly Porous Nano-Bamboo Si-Au Superlattice-Type Thin Films, Ufuk Kılıç, Alyssa Mock, René Feder, Derek Sekora, Matthew J. Hilfiker, Rafal Korlacki, Eva Schubert, Christos Argyropoulos, Mathias Schubert

Department of Electrical and Computer Engineering: Faculty Publications

We report on fabrication of spatially-coherent columnar plasmonic nanostructure superlattice-type thin films with high porosity and strong optical anisotropy using glancing angle deposition. Subsequent and repeated depositions of silicon and gold lead to nanometer-dimension subcolumns with controlled lengths. The superlattice-type columns resemble bamboo structures where smaller column sections of gold form junctions sandwiched between larger silicon column sections (“nano-bamboo”). We perform generalized spectroscopic ellipsometry measurements and finite element method computations to elucidate the strongly anisotropic optical properties of the highly-porous nano-bamboo structures. The occurrence of a strongly localized plasmonic mode with displacement pattern reminiscent of a dark quadrupole mode is …


An Ensemble Stacked Convolutional Neural Network Model For Environmental Event Sound Recognition, Shaobo Li, Yong Yao, Jie Hu, Guokai Liu, Xuemei Yao, Jianjun Hu Jul 2018

An Ensemble Stacked Convolutional Neural Network Model For Environmental Event Sound Recognition, Shaobo Li, Yong Yao, Jie Hu, Guokai Liu, Xuemei Yao, Jianjun Hu

Faculty Publications

Convolutional neural networks (CNNs) with log-mel audio representation and CNN-based end-to-end learning have both been used for environmental event sound recognition (ESC). However, log-mel features can be complemented by features learned from the raw audio waveform with an effective fusion method. In this paper, we first propose a novel stacked CNN model with multiple convolutional layers of decreasing filter sizes to improve the performance of CNN models with either log-mel feature input or raw waveform input. These two models are then combined using the Dempster–Shafer (DS) evidence theory to build the ensemble DS-CNN model for ESC. Our experiments over three …


Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally Jul 2018

Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally

Information Science Faculty Publications

One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments of small scale smart sensors in WBSNs, security, and privacy guarantees (e.g., security and safety-critical data, sensitive private information) are becoming a challenging issue because these sensor nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious tampering) using the secure hash algorithm 3 (SHA-3) when smart sensors in WBSNs communicate with each other using the Internet. Due to the limited resources (i.e., storage, …


Survey Results On Adults And Cybersecurity Education, Frank Breitinger, Joseph Ricci, Ibrahim Baggili Jul 2018

Survey Results On Adults And Cybersecurity Education, Frank Breitinger, Joseph Ricci, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Cyberattacks and identity theft are common problems nowadays where researchers often say that humans are the weakest link in the security chain. Therefore, this survey focused on analyzing the interest for adults for ‘cyber threat education seminars’, e.g., how to project themselves and their loved ones. Specifically, we asked questions to understand a possible audience, willingness for paying / time commitment, or fields of interest as well as background and previous training experience. The survey was conducted in late 2016 and taken by 233 participants. The results show that many are worried about cyber threats and about their children exploring …


Adaptive Virtual Impedance Droop Control Based On Consensus Control Of Reactive Current, Zhilin Lu, Qing Wei, Yiyi Zhang, Junhui Zhao, Emad Manla Jul 2018

Adaptive Virtual Impedance Droop Control Based On Consensus Control Of Reactive Current, Zhilin Lu, Qing Wei, Yiyi Zhang, Junhui Zhao, Emad Manla

Electrical & Computer Engineering and Computer Science Faculty Publications

It is difficult to achieve accurate distribution of reactive power based on conventional droop control due to the line impedance mismatch in an islanded microgrid. An adaptive virtual impendence method based on consensus control of reactive current is proposed in this paper. A distributed control structure without the central controller has been established. In this structure, each distributed generation unit (DG) is an independent agent, one-way communication is used between the adjacent DGs, and the reactive power sharing is equivalent to a problem of reactive power current consensus. It has been proven that the system is asymptotically stable under the …


Prototype Of A Fish Inspired Swimming Silk Robot, Cassandra M. Donatelli, Sarah A. Bradner, Juanita Mathews, Erin Sanders, Casey R. Culligan, David Kaplan, Eric D. Tytell Jul 2018

Prototype Of A Fish Inspired Swimming Silk Robot, Cassandra M. Donatelli, Sarah A. Bradner, Juanita Mathews, Erin Sanders, Casey R. Culligan, David Kaplan, Eric D. Tytell

Engineering Faculty Articles and Research

Elongate fishes have evolved hundreds of times throughout the tree of life. They occupy many aquatic environments, from streams and ponds to the deepest parts of the ocean. Due to their long body and numerous vertebrae, they are also highly flexible animals, which makes them useful as bioinspiration for designs in the field of soft robotics. We present a biodegradable soft robot prototype, inspired by elongate fishes. The robot's body is primarily composed of a silk hydrogel with embedded fibers to mimic the structure of natural fish skin. When actuated at the front, the flexible gel prototype mimics the undulatory …


Moving Target Defense For Securing Scada Communications, Vahid Heydari Jul 2018

Moving Target Defense For Securing Scada Communications, Vahid Heydari

Faculty Scholarship for the College of Science & Mathematics

In this paper, we introduce a framework for building a secure and private peer to peer communication used in supervisory control and data acquisition networks with a novel Mobile IPv6-based moving target defense strategy. Our approach aids in combating remote cyber-attacks against peer hosts by thwarting any potential attacks at their reconnaissance stage. The IP address of each host is randomly changed at a certain interval creating a moving target to make it difficult for an attacker to find the host. At the same time, the peer host is updated through the use of the binding update procedure (standard Mobile …


The Technology Tide: Has It Hit The Shores Of Social Innovation?, Andrew Koh Jul 2018

The Technology Tide: Has It Hit The Shores Of Social Innovation?, Andrew Koh

Social Space

“We want a nice colour and it must look modern.”

That was the feedback some villagers gave during a design-thinking exercise regarding sanitation facilities. Although this took place several years ago, as part of my previous work in the international development sector, I remember the experience vividly. It struck me that most people—village-dwellers or Singaporeans alike—have similar aspirations for a better quality of living.


Surgical And Medical Applications Of Drones: A Comprehensive Review, Brent Terwilliger, James C. Rosser Jr., Vudatha Vignesh, Brett C. Parker Jul 2018

Surgical And Medical Applications Of Drones: A Comprehensive Review, Brent Terwilliger, James C. Rosser Jr., Vudatha Vignesh, Brett C. Parker

Publications

Drones have the ability to gather real time data cost effectively, to deliver payloads and have initiated the rapid evolution of many industrial, commercial, and recreational applications. Unfortunately, there has been a slower expansion in the field of medicine. This article provides a comprehensive review of current and future drone applications in medicine, in hopes of empowering and inspiring more aggressive investigation.


Experience Constructing The Artifact Genome Project (Agp): Managing The Domain's Knowledge One Artifact At A Time, Cinthya Grajeda, Laura Sanchez, Ibrahim Baggili, Devon R. Clark, Frank Breitinger Jul 2018

Experience Constructing The Artifact Genome Project (Agp): Managing The Domain's Knowledge One Artifact At A Time, Cinthya Grajeda, Laura Sanchez, Ibrahim Baggili, Devon R. Clark, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

While various tools have been created to assist the digital forensics community with acquiring, processing, and organizing evidence and indicating the existence of artifacts, very few attempts have been made to establish a centralized system for archiving artifacts. The Artifact Genome Project (AGP) has aimed to create the largest vetted and freely available digital forensics repository for Curated Forensic Artifacts (CuFAs). This paper details the experience of building, implementing, and maintaining such a system by sharing design decisions, lessons learned, and future work. We also discuss the impact of AGP in both the professional and academic realms of digital forensics. …


A Half- Yearly E-Newsletter Of The Department Of Computer Science And Engineering, Manipal Institute Of Technology -Jul 2018, Ashalatha Nayak Jul 2018

A Half- Yearly E-Newsletter Of The Department Of Computer Science And Engineering, Manipal Institute Of Technology -Jul 2018, Ashalatha Nayak

Faculty work

No abstract provided.


Towards Domain-Specific Modeling Methodology For Avionic Safety-Critical Systems, Emanuel S. Grant Jul 2018

Towards Domain-Specific Modeling Methodology For Avionic Safety-Critical Systems, Emanuel S. Grant

Computer Science Faculty Publications

The use of domain-specific modeling languages and associated methodologies, provide support in application domain where the safe and reliable operations of the systems are of paramount importance to the users and organizations, and wherein the domains are well understood and documented. One such area of domain-specific modeling application is in the field of avionic systems. For software systems to be used onboard aircrafts they must be certified, and as such certification protocols have been established for developing these safety-critical systems. These established protocols are usually represented as textual documents and inherently are difficult to apply directly in software development environments. …


A Building Permit System For Smart Cities: A Cloud-Based Framework, Magdalini Eirinaki, Subhankar Dhar, Shishir Mathur, Adwait Kaley, Arpit Patel, Akshar Joshi, Dhvani Shah Jul 2018

A Building Permit System For Smart Cities: A Cloud-Based Framework, Magdalini Eirinaki, Subhankar Dhar, Shishir Mathur, Adwait Kaley, Arpit Patel, Akshar Joshi, Dhvani Shah

Faculty Publications

In this paper we propose a novel, cloud-based framework to support citizens and city officials in the building permit process. The proposed framework is efficient, user-friendly, and transparent with a quick turn-around time for homeowners. Compared to existing permit systems, the proposed smart city permit framework provides a pre-permitting decision workflow, and incorporates a data analytics and mining module that enables the continuous improvement of both the end user experience and the permitting and urban planning processes. This is enabled through a data mining-powered permit recommendation engine as well as a data analytics process that allow a gleaning of key …


Grasp Synthesis For Purposeful Fracturing Of Object, Mahyar Abdeetedal, Mehrdad Kermani Ph.D., P.Eng. Jul 2018

Grasp Synthesis For Purposeful Fracturing Of Object, Mahyar Abdeetedal, Mehrdad Kermani Ph.D., P.Eng.

Electrical and Computer Engineering Publications

No abstract provided.


Enginews, July 2018, School Of Computer Science & Engineering Jul 2018

Enginews, July 2018, School Of Computer Science & Engineering

News, Magazines and Reports

The Rube Goldberg Machine: The 90 year old concept’s lessons for the engineering student --Solar Power!? Solar Powered Charging comes to Sacred Heart.


Performance Comparison Of Support Vector Machine, Random Forest, And Extreme Learning Machine For Intrusion Detection, Iftikhar Ahmad, Muhammad Javed Iqbal, Mohammad Basheri, Aneel Rahim Jul 2018

Performance Comparison Of Support Vector Machine, Random Forest, And Extreme Learning Machine For Intrusion Detection, Iftikhar Ahmad, Muhammad Javed Iqbal, Mohammad Basheri, Aneel Rahim

Articles

Intrusion detection is a fundamental part of security tools, such as adaptive security appliances, intrusion detection systems, intrusion prevention systems, and firewalls. Various intrusion detection techniques are used, but their performance is an issue. Intrusion detection performance depends on accuracy, which needs to improve to decrease false alarms and to increase the detection rate. To resolve concerns on performance, multilayer perceptron, support vector machine (SVM), and other techniques have been used in recent work. Such techniques indicate limitations and are not efficient for use in large data sets, such as system and network data. The intrusion detection system is used …


Soa Maturity Influence On Digital Banking Transformation, Alan Megargel, Venky Shankararaman, Terence P. C. Fan Jul 2018

Soa Maturity Influence On Digital Banking Transformation, Alan Megargel, Venky Shankararaman, Terence P. C. Fan

Research Collection School Of Computing and Information Systems

Digital Banking is an evolution of online banking, where the banks attempt to further enhance customer experience by integrating digital technologies such as mobile technology, social media and analytics. Traditional banks have the highest barriers to entry into the digital banking market due to the presence of legacy core banking systems. These legacy systems while still high performing and reliable, are inflexible to change and are not easily integrated to the modern application systems needed for delivering digital banking services across multiple online banking channels. One solution that is widely adopted in the industry to overcome this obstacle is the …


Compositional Reasoning For Shared-Variable Concurrent Programs, Fuyuan Zhang, Yongwang Zhao, David Sanan, Yang Liu, Alwen Tiu, Shang-Wei Lin, Jun Sun Jul 2018

Compositional Reasoning For Shared-Variable Concurrent Programs, Fuyuan Zhang, Yongwang Zhao, David Sanan, Yang Liu, Alwen Tiu, Shang-Wei Lin, Jun Sun

Research Collection School Of Computing and Information Systems

Scalable and automatic formal verification for concurrent systems is always demanding. In this paper, we propose a verification framework to support automated compositional reasoning for concurrent programs with shared variables. Our framework models concurrent programs as succinct automata and supports the verification of multiple important properties. Safety verification and simulations of succinct automata are parallel compositional, and safety properties of succinct automata are preserved under refinements. We generate succinct automata from infinite state concurrent programs in an automated manner. Furthermore, we propose the first automated approach to checking rely-guarantee based simulations between infinite state concurrent programs. We have prototyped our …


A Unified Approach To Route Planning For Shared Mobility, Yongxin Tong, Yuxiang Zeng, Zimu Zhou, Lei Chen, Jieping Ye, Ke Xu Jul 2018

A Unified Approach To Route Planning For Shared Mobility, Yongxin Tong, Yuxiang Zeng, Zimu Zhou, Lei Chen, Jieping Ye, Ke Xu

Research Collection School Of Computing and Information Systems

There has been a dramatic growth of shared mobility applications such as ride-sharing, food delivery and crowdsourced parcel delivery. Shared mobility refers to transportation services that are shared among users, where a central issue is route planning. Given a set of workers and requests, route planning finds for each worker a route, i.e., a sequence of locations to pick up and drop off passengers/parcels that arrive from time to time, with different optimization objectives. Previous studies lack practicability due to their conflicted objectives and inefficiency in inserting a new request into a route, a basic operation called insertion. In this …


Easy Does It: Blockchain-Based Solutions For The Future, David Wong, Freddy Setiawan, Alvin Yong Jul 2018

Easy Does It: Blockchain-Based Solutions For The Future, David Wong, Freddy Setiawan, Alvin Yong

Social Space

y now, most people are aware of Bitcoin and its meteoric rise in value. What is less known, however, is its underpinning technology, blockchain. Blockchain is a distributed ledger that records virtually all types of transactions.This distributed nature is reflected in itsphysical architecture, and is one of the main reasons for its strong resistance to hacking and its immutable nature.


All Systems Go: Building An Internet For Good, Sylvia Cadena Jul 2018

All Systems Go: Building An Internet For Good, Sylvia Cadena

Social Space

The Internet has supercharged our ability to achieve development targets. Digital solutions, from both the public and private sectors, can facilitate unprecedented access to government and social services, banking andfinance, telehealth and well-being,education and training, employment opportunities, as well as create business opportunities.


Multiuser Coding And Signal Processing In A Low Power Sensor Network, Dongqi Lai Jul 2018

Multiuser Coding And Signal Processing In A Low Power Sensor Network, Dongqi Lai

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Backscatter communication system is a wireless communication system that is used by both academic community and industry circles in recent years. This communication system only requires ultra-low power usage and simple design of the sensors. This project is using backscatter communication system to transmit data with backscatter tags. The method we used is semi-passive backscatter communication. This project focuses on transmitting signals with multiple sensors so there is a problem about distinguishing the signal reflected by different nodes. We modulated the transmitting digital signal with Walsh function to solve the problem of separating the signals between different nodes. By using …


A Neuromorphic Quadratic, Integrate, And Fire Silicon Neuron With Adaptive Gain, David Parent, Eric Basham Jul 2018

A Neuromorphic Quadratic, Integrate, And Fire Silicon Neuron With Adaptive Gain, David Parent, Eric Basham

Faculty Publications

An integrated circuit implementation of a silicon neuron was designed, manufactured, and tested. The circuit was designed using the Quadratic, Integrate, and Fire (QIF) neuron model in 0.5 µm silicon technology. The neuron implementation was optimized for low current consumption, drawing only 1.56 mA per QIF circuit and utilized hysteretic reset, non-inverting integrator, and voltage-squarer circuits. The final area of each circuit in silicon was 268 µm height × 400 µm width. This design is the first IC of its kind for this neuron model and is successfully able to output true spiking that follows the behaviors of bistability, monotonic, …


Implementation Of Vision Processing Tasks On A Smart Camera Platform Using Neighborhood Processors, Dingyi Hong Jul 2018

Implementation Of Vision Processing Tasks On A Smart Camera Platform Using Neighborhood Processors, Dingyi Hong

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Two applications of vision processing on a smart camera platform using neighborhood processors are presented. A smart camera application of real-time trajectory calculation for tracking objects and predicting their path of motion by using a single intelligent camera or a dual camera system are designed, simulated and implemented. Another application of object recognition with a key points algorithm for detecting simple shaped objects and locating the camera position within a 3-D coordinate system via imaging by using artificial neural network is applied to provide quick and accurate processing on a neighborhood-level parallel processor or other limited vision chip. For all …


Privacy-Preserving Mining Of Association Rule On Outsourced Cloud Data From Multiple Parties, Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen, Ho-Fung Fung Leung Jul 2018

Privacy-Preserving Mining Of Association Rule On Outsourced Cloud Data From Multiple Parties, Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen, Ho-Fung Fung Leung

Research Collection School Of Computing and Information Systems

It has been widely recognized as a challenge to carry out data analysis and meanwhile preserve its privacy in the cloud. In this work, we mainly focus on a well-known data analysis approach namely association rule mining. We found that the data privacy in this mining approach have not been well considered so far. To address this problem, we propose a scheme for privacy-preserving association rule mining on outsourced cloud data which are uploaded from multiple parties in a twin-cloud architecture. In particular, we mainly consider the scenario where the data owners and miners have different encryption keys that are …


A Simplified Secure Programming Platform For Internet Of Things Devices, Halim Burak Yesilyurt Jun 2018

A Simplified Secure Programming Platform For Internet Of Things Devices, Halim Burak Yesilyurt

FIU Electronic Theses and Dissertations

The emerging Internet of Things (IoT) revolution has introduced many useful applications that are utilized in our daily lives. Users can program these devices in order to develop their own IoT applications; however, the platforms and languages that are used during development are abounding, complicated, and time-consuming. The software solution provided in this thesis, PROVIZ+, is a secure sensor application development software suite that helps users create sophisticated and secure IoT applications with little software and hardware experience. Moreover, a simple and efficient domain-specific programming language, namely Panther language, was designed for IoT application development to unify existing programming languages. …