Open Access. Powered by Scholars. Published by Universities.®
Electrical and Computer Engineering Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Chapman University (8)
- Michigan Technological University (2)
- Penn State Dickinson Law (2)
- West Virginia University (2)
- Western University (2)
-
- Association of Arab Universities (1)
- California Polytechnic State University, San Luis Obispo (1)
- Louisiana State University (1)
- Marshall University (1)
- Mississippi State University (1)
- Purdue University (1)
- Southern Methodist University (1)
- The University of Akron (1)
- University of Kentucky (1)
- University of Massachusetts Amherst (1)
- University of Windsor (1)
- Keyword
-
- Cybersecurity (2)
- Deep learning (2)
- Machine learning (2)
- Random forest (2)
- Smartphone (2)
-
- U.S. government (2)
- USG (2)
- 3D Printing (1)
- <p>Carbon nanotubes – Mechanical properties.</p> <p>Temperature – Analysis.</p> <p>Quantum dots.</p> <p>DNA – Structure.</p> <p>Electrical engineering.</p> <p>Electrical engineering – Materials.</p> (1)
- Ad hoc network (1)
- Ad hoc networks (1)
- Additive Manufacturing (1)
- Anonymization (1)
- App (1)
- Aramco (1)
- Arms race (1)
- Aurora (1)
- Auto-regressive process (1)
- Automated Quality Inspection (1)
- Automotive (1)
- Aviation UI (1)
- Awareness (1)
- Best heel strike (BHS) (1)
- Black energy (1)
- Black hat worlds (1)
- Black market (1)
- Bluetooth (1)
- Boomerang effect (1)
- Burg estimation method (1)
- Bush administration (1)
- Publication
-
- Engineering Faculty Articles and Research (7)
- Dickinson Law Review (2017-Present) (2)
- Dissertations, Master's Theses and Master's Reports (2)
- Electronic Thesis and Dissertation Repository (2)
- Graduate Theses, Dissertations, and Problem Reports (2)
-
- Computer Science and Engineering Theses and Dissertations (1)
- Doctoral Dissertations (1)
- Electrical Engineering (1)
- Future Computing and Informatics Journal (1)
- Journal of Aviation Technology and Engineering (1)
- LSU Master's Theses (1)
- Major Papers (1)
- Physical Therapy Faculty Articles and Research (1)
- Theses and Dissertations (1)
- Theses and Dissertations--Electrical and Computer Engineering (1)
- Theses, Dissertations and Capstones (1)
- Williams Honors College, Honors Research Projects (1)
- Publication Type
Articles 1 - 27 of 27
Full-Text Articles in Electrical and Computer Engineering
Machine Learning Approach To Investigate Ev Battery Characteristics, Shayan Falahatdoost
Machine Learning Approach To Investigate Ev Battery Characteristics, Shayan Falahatdoost
Major Papers
The main factor influencing an electric vehicle’s range is its battery. Battery electric vehicles experience driving range reduction in low temperatures. This range reduction results from the heating demand for the cabin and recuperation limits by the braking system. Due to the lack of an internal combustion engine-style heat source, electric vehicles' heating system demands a significant amount of energy. This energy is supplied by the battery and results in driving range reduction. Moreover, Due to the battery's low temperature in cold weather, the charging process through recuperation is limited. This limitation of recuperation is caused by the low reaction …
Towards Multipronged On-Chip Memory And Data Protection From Verification To Design And Test, Senwen Kan, Jennifer Dworak
Towards Multipronged On-Chip Memory And Data Protection From Verification To Design And Test, Senwen Kan, Jennifer Dworak
Computer Science and Engineering Theses and Dissertations
Modern System on Chips (SoCs) generally include embedded memories, and these memories may be vulnerable to malicious attacks such as hardware trojan horses (HTHs), test access port exploitation, and malicious software. This dissertation contributes verification as well as design obfuscation solutions aimed at design level detection of memory HTH circuits as well as obfuscation to prevent HTH triggering for embedded memory during functional operation. For malicious attack vectors stemming from test/debug interfaces, this dissertation presents novel solutions that enhance design verification and securitization of an IJTAG based test access interface. Such solutions can enhance SoC protection by preventing memory test …
Comparing Importance Of Knowledge And Professional Skill Areas For Engineering Programming Utilizing A Two Group Delphi Survey, John F. Hutton
Comparing Importance Of Knowledge And Professional Skill Areas For Engineering Programming Utilizing A Two Group Delphi Survey, John F. Hutton
Theses and Dissertations
All engineering careers require some level of programming proficiency. However, beginning programming classes are challenging for many students. Difficulties have been well-documented and contribute to high drop-out rates which prevent students from pursuing engineering. While many approaches have been tried to improve the performance of students and reduce the dropout rate, continued work is needed. This research seeks to re-examine what items are critical for programming education and how those might inform what is taught in introductory programming classes (CS1). Following trends coming from accreditation and academic boards on the importance of professional skills, we desire to rank knowledge and …
Device Free Indoor Localization Of Human Target Using Wifi Fingerprinting, Prasanga Neupane
Device Free Indoor Localization Of Human Target Using Wifi Fingerprinting, Prasanga Neupane
LSU Master's Theses
Indoor localization of human objects has many important applications nowadays. Proposed here is a new device free approach where all the transceiver devices are fixed in an indoor environment so that the human target doesn't need to carry any transceiver device with them. This work proposes radio-frequency fingerprinting for the localization of human targets which makes this even more convenient as radio-frequency wireless signals can be easily acquired using an existing wireless network in an indoor environment. This work explores different avenues for optimal and effective placement of transmitter devices for better localization. In this work, an experimental environment is …
Anonymization & Generation Of Network Packet Datasets Using Deep Learning, Spencer K. Vecile
Anonymization & Generation Of Network Packet Datasets Using Deep Learning, Spencer K. Vecile
Electronic Thesis and Dissertation Repository
Corporate networks are constantly bombarded by malicious actors trying to gain access. The current state of the art in protecting networks is deep learning-based intrusion detection systems (IDS). However, for an IDS to be effective it needs to be trained on a good dataset. The best datasets for training an IDS are real data captured from large corporate networks. Unfortunately, companies cannot release their network data due to privacy concerns creating a lack of public cybersecurity data. In this thesis I take a novel approach to network dataset anonymization using character-level LSTM models to learn the characteristics of a dataset; …
Classifying Toe Walking Gait Patterns Among Children Diagnosed With Idiopathic Toe Walking Using Wearable Sensors And Machine Learning Algorithms, Rahul Soangra, Yuxin Wen, Hualin Yang, Marybeth Grant-Beuttler
Classifying Toe Walking Gait Patterns Among Children Diagnosed With Idiopathic Toe Walking Using Wearable Sensors And Machine Learning Algorithms, Rahul Soangra, Yuxin Wen, Hualin Yang, Marybeth Grant-Beuttler
Physical Therapy Faculty Articles and Research
Idiopathic toe walking (ITW) is a gait abnormality in which children’s toes touch at initial contact and demonstrate limited or no heel contact throughout the gait cycle. Toe walking results in poor balance, increased risk of falling, and developmental delays among children. Identifying toe walking steps during walking can facilitate targeted intervention among children diagnosed with ITW. With recent advances in wearable sensing, communication technologies, and machine learning, new avenues of managing toe walking behavior among children are feasible. In this study, we investigate the capabilities of Machine Learning (ML) algorithms in identifying initial foot contact (heel strike versus toe …
Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami
Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami
Future Computing and Informatics Journal
This is a systematic literature review to reflect the previous studies that dealt with credit card fraud detection and highlight the different machine learning techniques to deal with this problem. Credit cards are now widely utilized daily. The globe has just begun to shift toward financial inclusion, with marginalized people being introduced to the financial sector. As a result of the high volume of e-commerce, there has been a significant increase in credit card fraud. One of the most important parts of today's banking sector is fraud detection. Fraud is one of the most serious concerns in terms of monetary …
Improving The Programmability Of Networked Energy Systems, Noman Bashir
Improving The Programmability Of Networked Energy Systems, Noman Bashir
Doctoral Dissertations
Global warming and climate change have underscored the need for designing sustainable energy systems. Sustainable energy systems, e.g., smart grids, green data centers, differ from the traditional systems in significant ways and present unique challenges to system designers and operators. First, intermittent renewable energy resources power these systems, which break the notion of infinite, reliable, and controllable power supply. Second, these systems come in varying sizes, spanning over large geographical regions. The control of these dispersed and diverse systems raises scalability challenges. Third, the performance modeling and fault detection in sustainable energy systems is still an active research area. Finally, …
Smartphone Control Of Rc Cars, Weston R. Fitzgerald
Smartphone Control Of Rc Cars, Weston R. Fitzgerald
Electrical Engineering
The smartphone-controlled RC (remote-controlled) car is an inexpensive remote-controlled car designed to be fast and portable. Instead of manufacturing, packaging, and shipping a separate controller, the remote control is implemented in a phone application, which saves time and money in both the design process and the manufacturing process. Utilizing the user’s smartphone is more cost-effective since mobile devices are a common recurrence, and packaging fewer devices results in overall better portability of the product.
This smartphone-controlled car is speedy and intuitive to learn for typical smartphone users. The user can change the car’s speed and direction wirelessly using their phone; …
Project Metamorphosis: Designing A Dynamic Framework For Converting Musical Compositions Into Paintings, Rao Hamza Ali, Grace Fong, Erik Linstead
Project Metamorphosis: Designing A Dynamic Framework For Converting Musical Compositions Into Paintings, Rao Hamza Ali, Grace Fong, Erik Linstead
Engineering Faculty Articles and Research
The authors present an automated, rule-based system for converting piano compositions into paintings. Using a color-note association scale presented by Edward Maryon in 1919, which correlates 12-tone scale with 12 hues of the color circle, the authors present a simple approach for extracting colors associated with each note played in a piano composition. The authors also describe the color extraction and art generation process in detail, as well as the process for creating “moving art,” which imitates the progression of a musical piece in real time. They share and discuss artworks generated for four well-known piano compositions.
Cognality Vr: Exploring A Mobile Vr App With Multiple Stakeholders To Reduce Meltdowns In Autistic Children, Louanne E. Boyd, Espen Garner, Ian Kim, Gianna Valencia
Cognality Vr: Exploring A Mobile Vr App With Multiple Stakeholders To Reduce Meltdowns In Autistic Children, Louanne E. Boyd, Espen Garner, Ian Kim, Gianna Valencia
Engineering Faculty Articles and Research
Many autistic children can have difficulty communicating, understanding others, and interacting with new and unfamiliar environments. At times they may suffer from a meltdown. The major contributing factor to meltdowns is sensory overwhelm. Technological solutions have shown promise in improving the quality of life for autistic children-however little exists to manage meltdowns. In this work with stakeholders, we design and deploy a low cost, mobile VR application to provide relief during sensory discomfort. Through the analysis of surveys from 88 stakeholders from a variety of groups (i.e., autistic adults, children with autism, parents of autistic individuals, and medical practitioners), we …
Deep Learning For Load Forecasting With Smart Meter Data: Online And Federated Learning, Mohammad Navid Fekri
Deep Learning For Load Forecasting With Smart Meter Data: Online And Federated Learning, Mohammad Navid Fekri
Electronic Thesis and Dissertation Repository
Electricity load forecasting has been attracting increasing attention because of its importance for energy management, infrastructure planning, and budgeting. In recent years, the proliferation of smart meters has created new opportunities for forecasting on the building and even individual household levels. Machine learning (ML) has achieved great successes in this domain; however, conventional ML techniques require data transfer to a centralized location for model training, therefore, increasing network traffic and exposing data to privacy and security risks. Also, traditional approaches employ offline learning, which means that they are only trained once and miss out on the possibility to learn from …
Machine Learning Based Medical Image Deepfake Detection: A Comparative Study, Siddharth Solaiyappan, Yuxin Wen
Machine Learning Based Medical Image Deepfake Detection: A Comparative Study, Siddharth Solaiyappan, Yuxin Wen
Engineering Faculty Articles and Research
Deep generative networks in recent years have reinforced the need for caution while consuming various modalities of digital information. One avenue of deepfake creation is aligned with injection and removal of tumors from medical scans. Failure to detect medical deepfakes can lead to large setbacks on hospital resources or even loss of life. This paper attempts to address the detection of such attacks with a structured case study. Specifically, we evaluate eight different machine learning algorithms, which include three conventional machine learning methods (Support Vector Machine, Random Forest, Decision Tree) and five deep learning models (DenseNet121, DenseNet201, ResNet50, ResNet101, VGG19) …
Manipulating Image Luminance To Improve Eye Gaze And Verbal Behavior In Autistic Children, Louanne Boyd, Vincent Berardi, Deanna Hughes, Franceli L. Cibrian, Jazette Johnson, Viseth Sean, Eliza Delpizzo-Cheng, Brandon Mackin, Ayra Tusneem, Riya Mody, Sara Jones, Karen Lotich
Manipulating Image Luminance To Improve Eye Gaze And Verbal Behavior In Autistic Children, Louanne Boyd, Vincent Berardi, Deanna Hughes, Franceli L. Cibrian, Jazette Johnson, Viseth Sean, Eliza Delpizzo-Cheng, Brandon Mackin, Ayra Tusneem, Riya Mody, Sara Jones, Karen Lotich
Engineering Faculty Articles and Research
Autism has been characterized by a tendency to attend to the local visual details over surveying an image to understand the gist–a phenomenon called local interference. This sensory processing trait has been found to negatively impact social communication. Although much work has been conducted to understand these traits, little to no work has been conducted to intervene to provide support for local interference. Additionally, recent understanding of autism now introduces the core role of sensory processing and its impact on social communication. However, no interventions to the end of our knowledge have been explored to leverage this relationship. This work …
A Deep Learning-Based Approach To Extraction Of Filler Morphology In Sem Images With The Application Of Automated Quality Inspection, Md. Fashiar Rahman, Tzu-Liang Bill Tseng, Jianguo Wu, Yuxin Wen, Yirong Lin
A Deep Learning-Based Approach To Extraction Of Filler Morphology In Sem Images With The Application Of Automated Quality Inspection, Md. Fashiar Rahman, Tzu-Liang Bill Tseng, Jianguo Wu, Yuxin Wen, Yirong Lin
Engineering Faculty Articles and Research
Automatic extraction of filler morphology (size, orientation, and spatial distribution) in Scanning Electron Microscopic (SEM) images is essential in many applications such as automatic quality inspection in composite manufacturing. Extraction of filler morphology greatly depends on accurate segmentation of fillers (fibers and particles), which is a challenging task due to the overlap of fibers and particles and their obscure presence in SEM images. Convolution Neural Networks (CNNs) have been shown to be very effective at object recognition in digital images. This paper proposes an automatic filler detection system in SEM images, utilizing a Mask Region-based CNN architecture. The proposed system …
Three Wave Mixing In Epsilon-Near-Zero Plasmonic Waveguides For Signal Regeneration, Nicholas Mirchandani, Mark C. Harrison
Three Wave Mixing In Epsilon-Near-Zero Plasmonic Waveguides For Signal Regeneration, Nicholas Mirchandani, Mark C. Harrison
Engineering Faculty Articles and Research
Vast improvements in communications technology are possible if the conversion of digital information from optical to electric and back can be removed. Plasmonic devices offer one solution due to optical computing’s potential for increased bandwidth, which would enable increased throughput and enhanced security. Plasmonic devices have small footprints and interface with electronics easily, but these potential improvements are offset by the large device footprints of conventional signal regeneration schemes, since surface plasmon polaritons (SPPs) are incredibly lossy. As such, there is a need for novel regeneration schemes. The continuous, uniform, and unambiguous digital information encoding method is phase-shift-keying (PSK), so …
A Neural Network Based Proportional Hazard Model For Iot Signal Fusion And Failure Prediction, Yuxin Wen, Xingxin Guo, Junbo Son, Jianguo Wu
A Neural Network Based Proportional Hazard Model For Iot Signal Fusion And Failure Prediction, Yuxin Wen, Xingxin Guo, Junbo Son, Jianguo Wu
Engineering Faculty Articles and Research
Accurate prediction of remaining useful life (RUL) plays a critical role in optimizing condition-based maintenance decisions. In this paper, a novel joint prognostic modeling framework that simultaneously combines both time-to-event data and multi-sensor degradation signals is proposed. With the increasing use of IoT devices, unprecedented amounts of diverse signals associated with the underlying health condition of in-situ units have become easily accessible. To take full advantage of the modern IoT-enabled engineering systems, we propose a specialized framework for RUL prediction at the level of individual units. Specifically, a Bayesian linear regression model is developed for the multi-sensor degradation signals and …
Eye-Gaze-Controlled Hmds And Mfd For Military Aircraft, Lrd Murthy, Abhishek Mukhopadhyay, Somnath Arjun, Varshith Yelleti, Peter Thomas, Dilli Babu Mohan, Pradipta Biswas
Eye-Gaze-Controlled Hmds And Mfd For Military Aircraft, Lrd Murthy, Abhishek Mukhopadhyay, Somnath Arjun, Varshith Yelleti, Peter Thomas, Dilli Babu Mohan, Pradipta Biswas
Journal of Aviation Technology and Engineering
Eye-gaze-controlled interfaces allow the direct manipulation of a graphical user interface by looking at it. This technology has great potential in military aviation, in particular, operating different displays in situations where pilots’ hands are occupied with flying the aircraft. This paper reports studies on analyzing the accuracy of eye-gaze-controlled interfaces inside aircraft undertaking representative flying missions. We report that using eye-gaze-controlled interfaces, pilots can undertake representative pointing and selection tasks at less than two seconds on average in a transport aircraft. Further, we analyzed the accuracy of eye-gaze-tracking glasses under various G load factors and analyzed the failure modes. We …
Dielectrophoretic Trapping Of Carbon Nanotubes For Temperature Sensing, Kaylee Burdette
Dielectrophoretic Trapping Of Carbon Nanotubes For Temperature Sensing, Kaylee Burdette
Theses, Dissertations and Capstones
Conventional sensors are rapidly approaching efficiency limitations at their current size. In designing more efficient sensors, low dimensional materials such as carbon nanotubes (CNTs), quantum dots, and DNA origami can be used to enable higher degrees of sensitivity. Because of the high atomic surface to core ratio, these materials can be used to detect slight changes in chemical composition, strain, and temperature. CNTs offer unique advantages in different types of sensors due to their electromechanical properties. In temperature sensing, the high responsiveness to temperature and durability can be used to produce an accurate, reliable sensor in even extreme temperatures. This …
Design Project: 3d Printer/Injection Molder Hybrid, Lee Paolucci, Luke Everhart, Brandon Leap, Karson Lorey
Design Project: 3d Printer/Injection Molder Hybrid, Lee Paolucci, Luke Everhart, Brandon Leap, Karson Lorey
Williams Honors College, Honors Research Projects
In the realm of rapid, small-scale prototyping, there are a few main factors that drive decisions to invest resources in technology to make that prototyping possible. Cost and ease of use are two of the most influential when looking at most SMEs (Small to Medium-sized Enterprises). The U.S. Small Business Administration defines an SME as smaller than 1,250 employees. According to An Assessment of Implementation of Entry-Level 3D Printers from the Perspective of Small Businesses, 59% of small manufacturers had implemented 3D printers as of 2014. However, no matter what technology is used in rapid prototyping, there are common …
An Experimental Study Towards Underwater Propulsion System Using Structure Borne Traveling Waves, Shreyas Suhas Gadekar
An Experimental Study Towards Underwater Propulsion System Using Structure Borne Traveling Waves, Shreyas Suhas Gadekar
Dissertations, Master's Theses and Master's Reports
The method of generating steady-state structure-borne traveling waves underwater in an infinite media creates abundant opportunities in the field of propulsive applications, and they are gaining attention from several researchers. This experimental study provides a framework for harnessing traveling waves in a 1D beam immersed under quiescent water using two force input methods and providing a motion to an object floating on the surface of the water.
In this study, underwater traveling waves are tailored using structural vibrations at five different frequencies in the range of 10Hz to 300Hz. The resulting fluid motion provides a propulsive thrust that moves a …
Synthesizing Dysarthric Speech Using Multi-Speaker Tts For Dsyarthric Speech Recognition, Mohammad Soleymanpour
Synthesizing Dysarthric Speech Using Multi-Speaker Tts For Dsyarthric Speech Recognition, Mohammad Soleymanpour
Theses and Dissertations--Electrical and Computer Engineering
Dysarthria is a motor speech disorder often characterized by reduced speech intelligibility through slow, uncoordinated control of speech production muscles. Automatic Speech recognition (ASR) systems may help dysarthric talkers communicate more effectively. However, robust dysarthria-specific ASR requires a significant amount of training speech is required, which is not readily available for dysarthric talkers.
In this dissertation, we investigate dysarthric speech augmentation and synthesis methods. To better understand differences in prosodic and acoustic characteristics of dysarthric spontaneous speech at varying severity levels, a comparative study between typical and dysarthric speech was conducted. These characteristics are important components for dysarthric speech modeling, …
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Dickinson Law Review (2017-Present)
No abstract provided.
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Dickinson Law Review (2017-Present)
For nearly as long as there have been photographs and videos, people have been editing and manipulating them to make them appear to be something they are not. Usually edited or manipulated photographs are relatively easy to detect, but those days are numbered. Technology has no morality; as it advances, so do the ways it can be misused. The lack of morality is no clearer than with deepfake technology.
People create deepfakes by inputting data sets, most often pictures or videos into a computer. A series of neural networks attempt to mimic the original data set until they are nearly …
An Efficient Ar Model-Based Method For The Detection Of Forced Oscillations In Power Networks: Implementation And Analysis, Maria Waleska Suarez
An Efficient Ar Model-Based Method For The Detection Of Forced Oscillations In Power Networks: Implementation And Analysis, Maria Waleska Suarez
Graduate Theses, Dissertations, and Problem Reports
An active research topic is the detection of various oscillations that may lead to instability and potential disruption in the operation of a power network. Forced Oscillations (FOs) play a unique role in power system stability among various oscillations. They are perturbances that change the system’s state and are caused for many reasons, including but not limited to persistent load changes and oscillatory load or generation, fault, triplane, and other mechanical anomalies. These factors can hugely affect the power grid by either increasing or decreasing the amplitude, causing corrupt modes leading to blackouts, affecting the equipment involved, delivering poor power …
Adapting Deep Learning For Underwater Acoustic Communication Channel Modeling, Li Wei
Adapting Deep Learning For Underwater Acoustic Communication Channel Modeling, Li Wei
Dissertations, Master's Theses and Master's Reports
The recent emerging applications of novel underwater systems lead to increasing demand for underwater acoustic (UWA) communication and networking techniques. However, due to the challenging UWA channel characteristics, conventional wireless techniques are rarely applicable to UWA communication and networking. The cognitive and software-defined communication and networking are considered promising architecture of a novel UWA system design. As an essential component of a cognitive communication system, the modeling and prediction of the UWA channel impulse response (CIR) with deep generative models are studied in this work.
Firstly, an underwater acoustic communication and networking testbed is developed for conducting various simulations and …
Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire
Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire
Graduate Theses, Dissertations, and Problem Reports
Facial recognition systems play a vital role in our everyday lives. We rely on this technology from menial tasks to issues as vital as national security. While strides have been made over the past ten years to improve facial recognition systems, morphed face images are a viable threat to the reliability of these systems. Morphed images are generated by combining the face images of two subjects. The resulting morphed face shares the likeness of the contributing subjects, confusing both humans and face verification algorithms. This vulnerability has grave consequences for facial recognition systems used on international borders or for law …