Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Auto-regressive process (1)
- Biosensors (1)
- Burg estimation method (1)
- CACC (1)
- Convolutional Neural Network (1)
-
- Deep Learning (1)
- Face Recognition (1)
- Gender Classification (1)
- Generalized likelihood ratio test (1)
- Integrated Biosensors (1)
- Internal (1)
- Local (1)
- Machine Learning (1)
- Morph Attacks (1)
- Morph Generation (1)
- Palmprint (1)
- Power spectral density (1)
- Power systems (1)
- Security (1)
- Threats (1)
- V2X (1)
- Wavelet Sub-bands (1)
- Wearable Sensors (1)
Articles 1 - 5 of 5
Full-Text Articles in Other Computer Engineering
Machine Learning For Biosensors, Gayathri Anapanani
Machine Learning For Biosensors, Gayathri Anapanani
Graduate Theses, Dissertations, and Problem Reports
Biosensors have become increasingly popular as diagnostic tools due to their ability to detect and quantify biological analytes in a wide range of applications. With the growing demand for faster and more reliable biosensing devices, machine learning has become a valuable tool in enhancing biosensor performance. In this report, we review recent progress in the application of machine learning to biosensors. We discuss the potential benefits of using machine learning in biosensors, including improved sensitivity, selectivity, and accuracy. We also discuss the various machine learning techniques that have been applied to biosensors, including data preprocessing, feature extraction, and classification and …
Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire
Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire
Graduate Theses, Dissertations, and Problem Reports
Facial recognition systems play a vital role in our everyday lives. We rely on this technology from menial tasks to issues as vital as national security. While strides have been made over the past ten years to improve facial recognition systems, morphed face images are a viable threat to the reliability of these systems. Morphed images are generated by combining the face images of two subjects. The resulting morphed face shares the likeness of the contributing subjects, confusing both humans and face verification algorithms. This vulnerability has grave consequences for facial recognition systems used on international borders or for law …
An Efficient Ar Model-Based Method For The Detection Of Forced Oscillations In Power Networks: Implementation And Analysis, Maria Waleska Suarez
An Efficient Ar Model-Based Method For The Detection Of Forced Oscillations In Power Networks: Implementation And Analysis, Maria Waleska Suarez
Graduate Theses, Dissertations, and Problem Reports
An active research topic is the detection of various oscillations that may lead to instability and potential disruption in the operation of a power network. Forced Oscillations (FOs) play a unique role in power system stability among various oscillations. They are perturbances that change the system’s state and are caused for many reasons, including but not limited to persistent load changes and oscillatory load or generation, fault, triplane, and other mechanical anomalies. These factors can hugely affect the power grid by either increasing or decreasing the amplitude, causing corrupt modes leading to blackouts, affecting the equipment involved, delivering poor power …
Mitigating Insider Threats In A Cooperative Adaptive Cruise Control System Using Local Intra-Vehicle Data, Alexander Francis Colon
Mitigating Insider Threats In A Cooperative Adaptive Cruise Control System Using Local Intra-Vehicle Data, Alexander Francis Colon
Graduate Theses, Dissertations, and Problem Reports
With the rise of Connected-and-Automated-Vehicle (CAV) technologies on roadways, transportation networks have become increasingly connected through Vehicle-to-Everything (V2X) systems. With access to the additional data from V2X, modern cruise control systems like Adaptive Cruise Control (ACC) are further improved upon to develop systems like Cooperative ACC (CACC) which reduces traffic congestion and increases driver safety and energy efficiency. With that increased connectivity, previously closed vehicle systems are now vulnerable to new security threats which pose new technical challenges. Significant research has been done to strengthen the network against external threats such as denial-of-service attacks (DoS) or passive eavesdropping attacks using …
Palmprint Gender Classification Using Deep Learning Methods, Minou Khayami
Palmprint Gender Classification Using Deep Learning Methods, Minou Khayami
Graduate Theses, Dissertations, and Problem Reports
Gender identification is an important technique that can improve the performance of authentication systems by reducing searching space and speeding up the matching process. Several biometric traits have been used to ascertain human gender. Among them, the human palmprint possesses several discriminating features such as principal-lines, wrinkles, ridges, and minutiae features and that offer cues for gender identification. The goal of this work is to develop novel deep-learning techniques to determine gender from palmprint images. PolyU and CASIA palmprint databases with 90,000 and 5502 images respectively were used for training and testing purposes in this research. After ROI extraction and …