Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Electrical and Computer Engineering

Generalizable Deep-Learning-Based Wireless Indoor Localization, Ali Owfi Aug 2023

Generalizable Deep-Learning-Based Wireless Indoor Localization, Ali Owfi

All Theses

The growing interest in indoor localization has been driven by its wide range of applications in areas such as smart homes, industrial automation, and healthcare. With the increasing reliance on wireless devices for location-based services, accurate estimation of device positions within indoor environments has become crucial. Deep learning approaches have shown promise in leveraging wireless parameters like Channel State Information (CSI) and Received Signal Strength Indicator (RSSI) to achieve precise localization. However, despite their success in achieving high accuracy, these deep learning models suffer from limited generalizability, making them unsuitable for deployment in new or dynamic environments without retraining. To …


Digital Twins And Artificial Intelligence For Applications In Electric Power Distribution Systems, Deborah George Aug 2023

Digital Twins And Artificial Intelligence For Applications In Electric Power Distribution Systems, Deborah George

All Theses

As modern electric power distribution systems (MEPDS) continue to grow in complexity, largely due to the ever-increasing penetration of Distributed Energy Resources (DERs), particularly solar photovoltaics (PVs) at the distribution level, there is a need to facilitate advanced operational and management tasks in the system driven by this complexity, especially in systems with high renewable penetration dependent on complex weather phenomena.

Digital twins (DTs), or virtual replicas of the system and its assets, enhanced with AI paradigms can add enormous value to tasks performed by regulators, distribution system operators and energy market analysts, thereby providing cognition to the system. DTs …


Procedural City Generation With Combined Architectures For Real-Time Visualization, Griffin Poyck May 2023

Procedural City Generation With Combined Architectures For Real-Time Visualization, Griffin Poyck

All Theses

The work and research of this paper sought to build upon traditional city generation and simulation in creating a tool that both realistically simulates cities and their prominent features and also creates aesthetic and artistically rich cities using assets that combine several contemporary or near contemporary architectural styles. The major city features simulated are the surrounding terrain, road networks, individual buildings, and building placement. The tools used to both create and integrate these features were created in Houdini with Unreal Engine 5 as the intended final destination. This research was influenced by the city, town, and road networking of Ghost …


Soft Web-Based Continuum Robot Grippers, Anthony Carambia May 2022

Soft Web-Based Continuum Robot Grippers, Anthony Carambia

All Theses

We discuss the potential of soft webs to enhance robotic grasping. Specifically, we explore a novel combination of compliant continuum digits interspersed with a flexible material. The resulting webbed structure offers the potential for new modes of robust and adaptive object grasping. We introduce and describe two webbed grippers featuring alternate modes of actuation: pneumatic muscles and remotely actuated tendons. Experiments with the grippers demonstrate their ability to gently capture small, fragile, and non-cooperative objects.


Analysis Of Deep Learning Methods For Wired Ethernet Physical Layer Security Of Operational Technology, Lucas Torlay Dec 2021

Analysis Of Deep Learning Methods For Wired Ethernet Physical Layer Security Of Operational Technology, Lucas Torlay

All Theses

The cybersecurity of power systems is jeopardized by the threat of spoofing and man-in-the-middle style attacks due to a lack of physical layer device authentication techniques for operational technology (OT) communication networks. OT networks cannot support the active probing cybersecurity methods that are popular in information technology (IT) networks. Furthermore, both active and passive scanning techniques are susceptible to medium access control (MAC) address spoofing when operating at Layer 2 of the Open Systems Interconnection (OSI) model. This thesis aims to analyze the role of deep learning in passively authenticating Ethernet devices by their communication signals. This method operates at …