Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Correlation

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 15 of 15

Full-Text Articles in Computer Engineering

Exploring The Concept Of The Digital Educator During Covid-19, Fernando Jimenez, Gracia Sanchez, Jose Palma, Luis Miralles-Pechuán, Juan A. Botia Jan 2022

Exploring The Concept Of The Digital Educator During Covid-19, Fernando Jimenez, Gracia Sanchez, Jose Palma, Luis Miralles-Pechuán, Juan A. Botia

Articles

T In many machine learning classification problems, datasets are usually of high dimensionality and therefore require efficient and effective methods for identifying the relative importance of their attributes, eliminating the redundant and irrelevant ones. Due to the huge size of the search space of the possible solutions, the attribute subset evaluation feature selection methods are not very suitable, so in these scenarios feature ranking methods are used. Most of the feature ranking methods described in the literature are univariate methods, which do not detect interactions between factors. In this paper, we propose two new multivariate feature ranking methods based on …


Visual Analysis Method Of Tobacco Quality Data Based On Dimension Reduction, Tian Dong, Guihua Shan, Xuebin Chi, Yanling Zhang, Weihua Feng, Jianwei Wang, Aiguo Wang, Wang Rui Sep 2021

Visual Analysis Method Of Tobacco Quality Data Based On Dimension Reduction, Tian Dong, Guihua Shan, Xuebin Chi, Yanling Zhang, Weihua Feng, Jianwei Wang, Aiguo Wang, Wang Rui

Journal of System Simulation

Abstract: In order to meet the requirements of tobacco leaf matching across regions in tobacco material selection, a visual analysis method of tobacco leaf quality data that incorporating dimension reduction and correlation analysis methods is developed. Through the dimension reduction algorithm, the comparison algorithm and the visual interaction method based on the classification of aroma area for tobacco leaf quality data, a visual analysis method for exploring space division and correlation analysis of tobacco leaf quality data is provided. National tobacco leaf quality data analysis cases and expert demonstrations show that the method can carry out the tobacco leaf quality …


Keyless Anti-Jamming Communication Via Randomized Dsss, Ahmad Alagil Apr 2020

Keyless Anti-Jamming Communication Via Randomized Dsss, Ahmad Alagil

USF Tampa Graduate Theses and Dissertations

Nowadays, wireless networking is ubiquitous. In wireless communication systems, multiple nodes exchange data during the transmission time. Due to the natural use of the communication channel, it is crucial to protect the physical layer to make wireless channels between nodes more reliable. Jamming attacks consider one of the most significant threats on wireless communication. Spread spectrum techniques have been widely used to mitigate the effects of the jammer. Traditional anti-jamming approaches like Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS) require a sender and a receiver to share a secret key prior to their communication. If this …


Does The Age Of An It Executive Impact Adoption Levels Of Cloud Computing Services?, Marcus L. Smith Mar 2020

Does The Age Of An It Executive Impact Adoption Levels Of Cloud Computing Services?, Marcus L. Smith

Faculty Publications

This author researched previously the personal decision factors considered by information technology (IT) executives when making the cloud computing services adoptionchoice. The conclusions in that work (Smith, Jr., 2016) supported four hypotheses, namely, (a) advancement, recognition and satisfaction from accomplishments, (b) top management support, (c) diminishment of personal image, and (d) a pattern of technology readiness have a positive influence on business intentions to adopt cloud computing services. Interestingly, a fifth hypothesis, diminishment of personal image, was found to have a negative influence on business intentions. The relationship between age of the survey respondents and adoption levels was highlighted in …


Low-Rank Sparse Subspace For Spectral Clustering, Xiaofeng Zhu, Shichao Zhang, Yonggang Li, Jilian Zhang, Lifeng Yang, Yue Fang Aug 2019

Low-Rank Sparse Subspace For Spectral Clustering, Xiaofeng Zhu, Shichao Zhang, Yonggang Li, Jilian Zhang, Lifeng Yang, Yue Fang

Research Collection School Of Computing and Information Systems

The current two-step clustering methods separately learn the similarity matrix and conduct k means clustering. Moreover, the similarity matrix is learnt from the original data, which usually contain noise. As a consequence, these clustering methods cannot achieve good clustering results. To address these issues, this paper proposes a new graph clustering methods (namely Low-rank Sparse Subspace clustering (LSS)) to simultaneously learn the similarity matrix and conduct the clustering from the low-dimensional feature space of the original data. Specifically, the proposed LSS integrates the learning of similarity matrix of the original feature space, the learning of similarity matrix of the low-dimensional …


Accurate And Compact Stochastic Computations By Exploiting Correlation, Hamdan Abdellatef, Mohamed Khalil Hani, Nasir Shaikh-Husin Jan 2019

Accurate And Compact Stochastic Computations By Exploiting Correlation, Hamdan Abdellatef, Mohamed Khalil Hani, Nasir Shaikh-Husin

Turkish Journal of Electrical Engineering and Computer Sciences

Recent studies have shown, contrary to what was previously believed, that by exploiting correlation in stochastic computing (SC) designs, more accurate SC circuits with low area cost can be realized. However, if these basic SC circuits or blocks are cascaded in series to form a large complex system, correlation between stochastic numbers (SNs) from one block to the next would be lost; thus, inaccuracies are introduced. In this study, we propose correlating circuits to be used in building complex correlated SC systems. One of the circuits is the correlator that restores lost correlations between two SNs due to previous processing. …


Chaotic Phase-Coded Waveforms With Space-Time Complementary Coding For Mimo Radar Applications, Sheng Hong, Fuhui Zhou, Yantao Dong, Zhixin Zhao, Yuhao Wang, Maosong Yan Jul 2018

Chaotic Phase-Coded Waveforms With Space-Time Complementary Coding For Mimo Radar Applications, Sheng Hong, Fuhui Zhou, Yantao Dong, Zhixin Zhao, Yuhao Wang, Maosong Yan

Electrical and Computer Engineering Faculty Publications

A framework for designing orthogonal chaotic phase-coded waveforms with space-time complementary coding (STCC) is proposed for multiple-input multiple-output (MIMO) radar applications. The phase-coded waveform set to be transmitted is generated with an arbitrary family size and an arbitrary code length by using chaotic sequences. Due to the properties of chaos, this chaotic waveform set has many advantages in performance, such as anti-interference and low probability of intercept. However, it cannot be directly exploited due to the high range sidelobes, mutual interferences, and Doppler intolerance. In order to widely implement it in practice, we optimize the chaotic phase-coded waveform set from …


On The Independence Of Statistical Randomness Tests Included In The Nist Test Suite, Fati̇h Sulak, Muhi̇ddi̇n Uğuz, Onur Koçak, Ali̇ Doğanaksoy Jan 2017

On The Independence Of Statistical Randomness Tests Included In The Nist Test Suite, Fati̇h Sulak, Muhi̇ddi̇n Uğuz, Onur Koçak, Ali̇ Doğanaksoy

Turkish Journal of Electrical Engineering and Computer Sciences

Random numbers and random sequences are used to produce vital parts of cryptographic algorithms such as encryption keys and therefore the generation and evaluation of random sequences in terms of randomness are vital. Test suites consisting of a number of statistical randomness tests are used to detect the nonrandom characteristics of the sequences. Construction of a test suite is not an easy task. On one hand, the coverage of a suite should be wide; that is, it should compare the sequence under consideration from many different points of view with true random sequences. On the other hand, an overpopulated suite …


Mutual Correlation Of Nist Statistical Randomness Tests And Comparison Of Their Sensitivities On Transformed Sequences, Ali̇ Doğanaksoy, Fati̇h Sulak, Muhi̇ddi̇n Uğuz, Okan Şeker, Zi̇ya Akcengi̇z Jan 2017

Mutual Correlation Of Nist Statistical Randomness Tests And Comparison Of Their Sensitivities On Transformed Sequences, Ali̇ Doğanaksoy, Fati̇h Sulak, Muhi̇ddi̇n Uğuz, Okan Şeker, Zi̇ya Akcengi̇z

Turkish Journal of Electrical Engineering and Computer Sciences

Random sequences are widely used in many cryptographic applications and hence their generation is one of the main research areas in cryptography. Statistical randomness tests are introduced to detect the weaknesses or nonrandom characteristics that a sequence under consideration may have. In the literature, there exist various statistical randomness tests and test suites, defined as a collection of tests. An efficient test suite should consist of a number of uncorrelated statistical tests each of which measures randomness from another point of view. `Being uncorrelated' is not a well-defined or well-understood concept in the literature. In this work, we apply Pearson's …


Recursive Non-Local Means Filter For Video Denoising With Poisson-Gaussian Noise, Redha A. Almahdi, Russell C. Hardie Jul 2016

Recursive Non-Local Means Filter For Video Denoising With Poisson-Gaussian Noise, Redha A. Almahdi, Russell C. Hardie

Electrical and Computer Engineering Faculty Publications

In this paper, we describe a new recursive Non-Local means (RNLM) algorithm for video denoising that has been developed by the current authors. Furthermore, we extend this work by incorporating a Poisson-Gaussian noise model. Our new RNLM method provides a computationally efficient means for video denoising, and yields improved performance compared with the single frame NLM and BM3D benchmarks methods. Non-Local means (NLM) based methods of denoising have been applied successfully in various image and video sequence denoising applications. However, direct extension of this method from 2D to 3D for video processing can be computationally demanding. The RNLM approach takes …


A Hybrid Approach To Aerial Video Image Registration, Karol T. Salva Jan 2016

A Hybrid Approach To Aerial Video Image Registration, Karol T. Salva

Browse all Theses and Dissertations

Many video processing applications, such as motion detection and tracking, rely on accurate and robust alignment between consecutive video frames. Traditional approaches to video image registration, such as pyramidal Kanade-Lucas-Tomasi (KLT) feature detection and tracking are fast and subpixel accurate, but are not robust to large inter-frame displacements due to rotation, scale, or translation. This thesis presents an alternative hybrid approach using normalized gradient correlation (NGC) in the frequency domain and normalized cross-correlation (NCC) in the spatial domain that is fast, accurate, and robust to large displacements. A scale space search is incorporated into NGC to enable more consistent recovery …


Can Wikipedia Article Traffic Statistics Be Used To Verify A Technical Indicator? An Exploration Into The Correlation Between Wikipedia Article Traffic Statistics And The Coppock Technical Indicator., Cormac O'Connor Mar 2015

Can Wikipedia Article Traffic Statistics Be Used To Verify A Technical Indicator? An Exploration Into The Correlation Between Wikipedia Article Traffic Statistics And The Coppock Technical Indicator., Cormac O'Connor

Dissertations

Recent studies have shown that, through the quantification of Wikipedia Usage Patterns as a result of information gathering, stock market moves can be predicted (Moat et al 2013). There was also research performed to determine the predictive nature of Wikipedia Data to predict movie box office success (Mestyan et al. 2013). The goal of any investor, in order to maximize the return of their investments, is to have an edge over other participants in the markets. Several tools and techniques have been used over the years to fulfil this, some proving to generate a consistent stream of income (Gillen 2012). …


A User-Oriented Network Forensic Analyser: The Design Of A High-Level Protocol Analyser, D Joy, F Li, N L. Clarke, S M. Furnell Jan 2014

A User-Oriented Network Forensic Analyser: The Design Of A High-Level Protocol Analyser, D Joy, F Li, N L. Clarke, S M. Furnell

Australian Digital Forensics Conference

Network forensics is becoming an increasingly important tool in the investigation of cyber and computer-assisted crimes. Unfortunately, whilst much effort has been undertaken in developing computer forensic file system analysers (e.g. Encase and FTK), such focus has not been given to Network Forensic Analysis Tools (NFATs). The single biggest barrier to effective NFATs is the handling of large volumes of low-level traffic and being able to exact and interpret forensic artefacts and their context – for example, being able extract and render application-level objects (such as emails, web pages and documents) from the low-level TCP/IP traffic but also understand how …


Correlating Orphaned Windows Registry Data Structures, Damir Kahvedžić, Tahar Kechadi Jan 2009

Correlating Orphaned Windows Registry Data Structures, Damir Kahvedžić, Tahar Kechadi

Journal of Digital Forensics, Security and Law

Recently, it has been shown that deleted entries of the Microsoft Windows registry (keys) may still reside in the system files once the entries have been deleted from the active database. Investigating the complete keys in context may be extremely important from both a Forensic Investigation point of view and a legal point of view where a lack of context can bring doubt to an argument. In this paper we formalise the registry behaviour and show how a retrieved value may not maintain a relation to the part of the registry it belonged to and hence lose that context. We …


Modeling Correlation And Dependence Among Intervals, Scott Ferson, Vladik Kreinovich Jan 2006

Modeling Correlation And Dependence Among Intervals, Scott Ferson, Vladik Kreinovich

Departmental Technical Reports (CS)

This note introduces the notion of dependence among intervals to account for observed or theoretical constraints on the relationships among uncertain inputs in mathematical calculations. We define dependence as any restriction on the possible pairings of values within respective intervals and define nondependence as the degenerate case of no restrictions (which we carefully distinguish from independence in probability theory). Traditional interval calculations assume nondependence, but alternative assumptions are possible, including several which might be practical in engineering settings that would lead to tighter enclosures on arithmetic functions of intervals. We give best possible formulas for addition of intervals under several …