Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Electrical and Computer Engineering

Community And Key Player Detection For Disrupting Illicit Drug Supply Networks In Social Media Platforms – Especially On Instagram, Akassi Rachel Niamke Aman Jan 2023

Community And Key Player Detection For Disrupting Illicit Drug Supply Networks In Social Media Platforms – Especially On Instagram, Akassi Rachel Niamke Aman

Graduate Theses, Dissertations, and Problem Reports

This thesis focuses on the pressing issue of illicit drug trafficking and its impact on public health and safety at a global level. With the advent of digital technologies and social media platforms, combating drug trafficking has become increasingly challenging for law enforcement and researchers alike. Among these platforms, Instagram, a popular photo and video-sharing social networking platform, has emerged as a prominent hub for drug trafficking activities.

In this study, we delve into the effectiveness of community and key player detection algorithms in identifying and disrupting illicit drug supply networks on Instagram. To conduct our research, we collected real …


Investigating The Impact Of Demographic Factors On Contactless Fingerprint Interoperability, Aeddon David Berti Jan 2023

Investigating The Impact Of Demographic Factors On Contactless Fingerprint Interoperability, Aeddon David Berti

Graduate Theses, Dissertations, and Problem Reports

Improvements in contactless fingerprinting have resulted in contactless fingerprints becoming a faster and more convenient alternative to contact fingerprints. The interoperability between contactless fingerprints and contact fingerprints and how demographic factors can change interoperability has been challenging since COVID-19; the need for hygienic alternatives has only grown because of the sudden focus during the pandemic. Past work has shown issues with the interoperability of contactless prints from kiosk devices and phone fingerprint collection apps. Demographic bias in photography for facial recognition could affect photographed fingerprints. The paper focuses on evaluating match performance between contact and contactless fingerprints and evaluating match …


Landmark Enforcement And Principal Component Analysis For Improving Gan-Based Morphing, Samuel W. Price Jan 2022

Landmark Enforcement And Principal Component Analysis For Improving Gan-Based Morphing, Samuel W. Price

Graduate Theses, Dissertations, and Problem Reports

Facial Recognition Systems (FRSs) are a key target for adversaries determined to circumvent security checkpoints. Morph images threaten FRS by presenting as multiple individuals, allowing an adversary to swap identities with another subject. Although morph generation using generative adversarial networks (GANs) results in high-quality morphs without possessing the spatial artifacts caused by landmarkbased methods, there is an apparent loss in identity with standard GAN-based morphing methods. In this thesis, we examine landmark-based and GAN-based morphing methods to fuse the advantages of both methodologies. We propose a novel StyleGAN2 morph generation technique by introducing a landmark enforcement method. Considering this method, …


Multimodal Adversarial Learning, Uche Osahor Jan 2022

Multimodal Adversarial Learning, Uche Osahor

Graduate Theses, Dissertations, and Problem Reports

Deep Convolutional Neural Networks (DCNN) have proven to be an exceptional tool for object recognition, generative modelling, and multi-modal learning in various computer vision applications. However, recent findings have shown that such state-of-the-art models can be easily deceived by inserting slight imperceptible perturbations to key pixels in the input. A good target detection systems can accurately identify targets by localizing their coordinates on the input image of interest. This is ideally achieved by labeling each pixel in an image as a background or a potential target pixel. However, prior research still confirms that such state of the art targets models …


Identical Twins As A Facial Similarity Benchmark For Human Facial Recognition, John Andrew Mccauley Jan 2021

Identical Twins As A Facial Similarity Benchmark For Human Facial Recognition, John Andrew Mccauley

Graduate Theses, Dissertations, and Problem Reports

The problem of distinguishing identical twins and non-twin look-alikes in automated facial recognition (FR) applications has become increasingly important with the widespread adoption of facial biometrics. Due to the high facial similarity of both identical twins and look-alikes, these face pairs represent the hardest cases presented to facial recognition tools. This work presents an application of one of the largest twin datasets compiled to date to address two FR challenges: 1) determining a baseline measure of facial similarity between identical twins and 2) applying this similarity measure to determine the impact of doppelgangers, or look-alikes, on FR performance for large …


Weed Recognition In Agriculture: A Mask R-Cnn Approach, Sruthi Keerthi Valicharla Jan 2021

Weed Recognition In Agriculture: A Mask R-Cnn Approach, Sruthi Keerthi Valicharla

Graduate Theses, Dissertations, and Problem Reports

Recent interdisciplinary collaboration on deep learning has led to a growing interest in its application in the agriculture domain. Weed control and management are some of the crucial tasks in agriculture to maintain high crop productivity. The inception phase of weed control and management is to successfully recognize the weed plants, followed by providing a suitable management plan. Due to the complexities in agriculture images, such as similar colour and texture, we need to incorporate a deep neural network that uses pixel-wise grouping for identifying the plant species. In this thesis, we analysed the performance of one of the most …


Integration Of Deep Hashing And Channel Coding For Biometric Security And Biometric Retrieval, Veeru Talreja Jan 2021

Integration Of Deep Hashing And Channel Coding For Biometric Security And Biometric Retrieval, Veeru Talreja

Graduate Theses, Dissertations, and Problem Reports

In the last few years, the research growth in many research and commercial fields are due to the adoption of state of the art deep learning techniques. The same applies to even biometrics and biometric security. Additionally, there has been a rise in the development of deep learning techniques used for approximate nearest neighbor (ANN) search for retrieval on multi-modal datasets. These deep learning techniques knows as deep hashing (DH) integrate feature learning and hash coding into an end-to-end trainable framework. Motivated by these factors, this dissertation considers the integration of deep hashing and channel coding for biometric security and …


Interoperability Of Contact And Contactless Fingerprints Across Multiple Fingerprint Sensors, Brady M. Williams Jan 2021

Interoperability Of Contact And Contactless Fingerprints Across Multiple Fingerprint Sensors, Brady M. Williams

Graduate Theses, Dissertations, and Problem Reports

Contactless fingerprinting devices have grown in popularity in recent years due to speed and convenience of capture. Also, due to the global COID-19 pandemic, the need for safe and hygienic options for fingerprint capture are more pressing than ever. However, contactless systems face challenges in the areas of interoperability and matching performance as shown in other works. In this paper, we present a contactless vs. contact interoperability assessment of several contactless devices, including cellphone fingerphoto capture. During the interoperability assessment, the quality of the fingerprints was considered using the NBIS NFIQ software with the contact-based fingerprint performing the best overall …


An End-To-End Face Recognition System Evaluation Framework, James Andrew Duncan Jan 2021

An End-To-End Face Recognition System Evaluation Framework, James Andrew Duncan

Graduate Theses, Dissertations, and Problem Reports

The performance of face recognition system components is traditionally reported using metrics such as the Receiver Operating Characteristic (ROC), Cumulative Match Characteristic (CMC), and Identification Error Tradeoff (IET). Recently, new metrics have been published to take advantage of annotation-dense datasets such as IARPA Janus Benchmark-Surveillance and IARPA Janus Benchmark-Multi Domain Face to describe end-to-end face recognition system performance. Unlike traditional (component-level) analysis, end-to-end analysis of a system produces a metric proportional to the experience of a user of a face recognition system. The End-to-End Cumulative Match Characteristic (E2ECMC) summarizes detection, identity consolidation, and identity retrieval performance. The End-to-End Subject Cumulative …


Palmprint Gender Classification Using Deep Learning Methods, Minou Khayami Jan 2020

Palmprint Gender Classification Using Deep Learning Methods, Minou Khayami

Graduate Theses, Dissertations, and Problem Reports

Gender identification is an important technique that can improve the performance of authentication systems by reducing searching space and speeding up the matching process. Several biometric traits have been used to ascertain human gender. Among them, the human palmprint possesses several discriminating features such as principal-lines, wrinkles, ridges, and minutiae features and that offer cues for gender identification. The goal of this work is to develop novel deep-learning techniques to determine gender from palmprint images. PolyU and CASIA palmprint databases with 90,000 and 5502 images respectively were used for training and testing purposes in this research. After ROI extraction and …


Optimal Compression Of Point Clouds, Benjamin Robert Smith Jan 2019

Optimal Compression Of Point Clouds, Benjamin Robert Smith

Graduate Theses, Dissertations, and Problem Reports

Image-based localization is a crucial step in many 3D computer vision applications, e.g., self-driving cars, robotics, and augmented reality among others. Unfortunately, many image-based-localization applications require the storage of large scenes, and many camera pose estimators struggle to scale when the scene representation is large. To alleviate the aforementioned problems, many applications compress a scene representation by reducing the number of 3D points of a point cloud. The state-of-the-art compresses a scene representation by using a K-cover-based algorithm. While the state-of-the-art selects a subset of 3D points that maximizes the probability of accurately estimating the camera pose of a new …


Differentiating Human Populations Based On K-Mer Classification Of Hand Bacteria, Thrisha Doppala Jan 2018

Differentiating Human Populations Based On K-Mer Classification Of Hand Bacteria, Thrisha Doppala

Graduate Theses, Dissertations, and Problem Reports

Bacterial communities found in and on the human body are not only used in studying human health conditions but are also effective in differentiating individuals due to their distinct profiles. Human palm regions harbor relatively more diverse bacterial communities and are indicative of population groups, life styles, geographic locations, age groups and health conditions. Sequences extracted from hypervariable region V3 of the 16S rRNA bacterial gene of hand bacterial samples from 9 different population groups were classified into Operational Taxonomic Units (OTU) with GreenGenes reference taxonomy using RDP (Ribosomal Database Project) classifier. Frequencies of identified OTUs were used to study …