Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Electrical and Computer Engineering

Generalizable Deep-Learning-Based Wireless Indoor Localization, Ali Owfi Aug 2023

Generalizable Deep-Learning-Based Wireless Indoor Localization, Ali Owfi

All Theses

The growing interest in indoor localization has been driven by its wide range of applications in areas such as smart homes, industrial automation, and healthcare. With the increasing reliance on wireless devices for location-based services, accurate estimation of device positions within indoor environments has become crucial. Deep learning approaches have shown promise in leveraging wireless parameters like Channel State Information (CSI) and Received Signal Strength Indicator (RSSI) to achieve precise localization. However, despite their success in achieving high accuracy, these deep learning models suffer from limited generalizability, making them unsuitable for deployment in new or dynamic environments without retraining. To …


A Novel Graph Neural Network-Based Framework For Automatic Modulation Classification In Mobile Environments, Pejman Ghasemzadeh May 2023

A Novel Graph Neural Network-Based Framework For Automatic Modulation Classification In Mobile Environments, Pejman Ghasemzadeh

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Automatic modulation classification (AMC) refers to a signal processing procedure through which the modulation type and order of an observed signal are identified without any prior information about the communications setup. AMC has been recognized as one of the essential measures in various communications research fields such as intelligent modem design, spectrum sensing and management, and threat detection. The research literature in AMC is limited to accounting only for the noise that affects the received signal, which makes their models applicable for stationary environments. However, a more practical and real-world application of AMC can be found in mobile environments where …


Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian) Mar 2023

Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)

Library Philosophy and Practice (e-journal)

Abstract

Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …


Machine Learning With Big Data For Electrical Load Forecasting, Alexandra L'Heureux Jun 2022

Machine Learning With Big Data For Electrical Load Forecasting, Alexandra L'Heureux

Electronic Thesis and Dissertation Repository

Today, the amount of data collected is exploding at an unprecedented rate due to developments in Web technologies, social media, mobile and sensing devices and the internet of things (IoT). Data is gathered in every aspect of our lives: from financial information to smart home devices and everything in between. The driving force behind these extensive data collections is the promise of increased knowledge. Therefore, the potential of Big Data relies on our ability to extract value from these massive data sets. Machine learning is central to this quest because of its ability to learn from data and provide data-driven …


Investigation Of Green Strawberry Detection Using R-Cnn With Various Architectures, Daniel W. Rivers Mar 2022

Investigation Of Green Strawberry Detection Using R-Cnn With Various Architectures, Daniel W. Rivers

Master's Theses

Traditional image processing solutions have been applied in the past to detect and count strawberries. These methods typically involve feature extraction followed by object detection using one or more features. Some object detection problems can be ambiguous as to what features are relevant and the solutions to many problems are only fully realized when the modern approach has been applied and tested, such as deep learning.

In this work, we investigate the use of R-CNN for green strawberry detection. The object detection involves finding regions of interest (ROIs) in field images using the selective segmentation algorithm and inputting these regions …


Smart City Management Using Machine Learning Techniques, Mostafa Zaman Jan 2022

Smart City Management Using Machine Learning Techniques, Mostafa Zaman

Theses and Dissertations

In response to the growing urban population, "smart cities" are designed to improve people's quality of life by implementing cutting-edge technologies. The concept of a "smart city" refers to an effort to enhance a city's residents' economic and environmental well-being via implementing a centralized management system. With the use of sensors and actuators, smart cities can collect massive amounts of data, which can improve people's quality of life and design cities' services. Although smart cities contain vast amounts of data, only a percentage is used due to the noise and variety of the data sources. Information and communication technology (ICT) …


Landmark Enforcement And Principal Component Analysis For Improving Gan-Based Morphing, Samuel W. Price Jan 2022

Landmark Enforcement And Principal Component Analysis For Improving Gan-Based Morphing, Samuel W. Price

Graduate Theses, Dissertations, and Problem Reports

Facial Recognition Systems (FRSs) are a key target for adversaries determined to circumvent security checkpoints. Morph images threaten FRS by presenting as multiple individuals, allowing an adversary to swap identities with another subject. Although morph generation using generative adversarial networks (GANs) results in high-quality morphs without possessing the spatial artifacts caused by landmarkbased methods, there is an apparent loss in identity with standard GAN-based morphing methods. In this thesis, we examine landmark-based and GAN-based morphing methods to fuse the advantages of both methodologies. We propose a novel StyleGAN2 morph generation technique by introducing a landmark enforcement method. Considering this method, …


Multimodal Adversarial Learning, Uche Osahor Jan 2022

Multimodal Adversarial Learning, Uche Osahor

Graduate Theses, Dissertations, and Problem Reports

Deep Convolutional Neural Networks (DCNN) have proven to be an exceptional tool for object recognition, generative modelling, and multi-modal learning in various computer vision applications. However, recent findings have shown that such state-of-the-art models can be easily deceived by inserting slight imperceptible perturbations to key pixels in the input. A good target detection systems can accurately identify targets by localizing their coordinates on the input image of interest. This is ideally achieved by labeling each pixel in an image as a background or a potential target pixel. However, prior research still confirms that such state of the art targets models …


Analysis Of Deep Learning Methods For Wired Ethernet Physical Layer Security Of Operational Technology, Lucas Torlay Dec 2021

Analysis Of Deep Learning Methods For Wired Ethernet Physical Layer Security Of Operational Technology, Lucas Torlay

All Theses

The cybersecurity of power systems is jeopardized by the threat of spoofing and man-in-the-middle style attacks due to a lack of physical layer device authentication techniques for operational technology (OT) communication networks. OT networks cannot support the active probing cybersecurity methods that are popular in information technology (IT) networks. Furthermore, both active and passive scanning techniques are susceptible to medium access control (MAC) address spoofing when operating at Layer 2 of the Open Systems Interconnection (OSI) model. This thesis aims to analyze the role of deep learning in passively authenticating Ethernet devices by their communication signals. This method operates at …


Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang Dec 2021

Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang

Doctoral Dissertations and Master's Theses

Fueled by the advancement of 5G new radio (5G NR), rapid development has occurred in many fields. Compared with the conventional approaches, beamforming and network slicing enable 5G NR to have ten times decrease in latency, connection density, and experienced throughput than 4G long term evolution (4G LTE). These advantages pave the way for the evolution of Cyber-physical Systems (CPS) on a large scale. The reduction of consumption, the advancement of control engineering, and the simplification of Unmanned Aircraft System (UAS) enable the UAS networking deployment on a large scale to become feasible. The UAS networking can finish multiple complex …


Deep Learning For High-Impedance Fault Detection And Classification, Khushwant Rai Aug 2021

Deep Learning For High-Impedance Fault Detection And Classification, Khushwant Rai

Electronic Thesis and Dissertation Repository

High-Impedance Faults (HIFs) are a hazard to public safety but are difficult to detect because of their low current amplitude and diverse characteristics. Supervised machine learning techniques have shown great success in HIF detection; however, these approaches rely on resource-intensive signal processing techniques and fail in presence of non-HIF disturbances and even for scenarios not included in training data. This thesis leverages unsupervised learning and proposes a Convolutional Autoencoder framework for HIF Detection (CAE-HIFD). In CAE-HIFD, Convolutional Autoencoder learns only from HIF signals by employing cross-correlation; consequently, eliminating the need for diverse non-HIF scenarios in training. Furthermore, this thesis proposes …


Pneumonia Radiograph Diagnosis Utilizing Deep Learning Network, Wesley O'Quinn Mar 2021

Pneumonia Radiograph Diagnosis Utilizing Deep Learning Network, Wesley O'Quinn

Honors College Theses

Pneumonia is a life-threatening respiratory disease caused by bacterial infection. The goal of this study is to develop an algorithm using Convolutional Neural Networks (CNNs) to detect visual signals for pneumonia in medical images and make a diagnosis. Although Pneumonia is prevalent, detection and diagnosis are challenging. The deep learning network AlexNet was utilized through transfer learning. A dataset consisting of 11,318 images was used for training, and a preliminary diagnosis accuracy of 72% was achieved.


Integration Of Deep Hashing And Channel Coding For Biometric Security And Biometric Retrieval, Veeru Talreja Jan 2021

Integration Of Deep Hashing And Channel Coding For Biometric Security And Biometric Retrieval, Veeru Talreja

Graduate Theses, Dissertations, and Problem Reports

In the last few years, the research growth in many research and commercial fields are due to the adoption of state of the art deep learning techniques. The same applies to even biometrics and biometric security. Additionally, there has been a rise in the development of deep learning techniques used for approximate nearest neighbor (ANN) search for retrieval on multi-modal datasets. These deep learning techniques knows as deep hashing (DH) integrate feature learning and hash coding into an end-to-end trainable framework. Motivated by these factors, this dissertation considers the integration of deep hashing and channel coding for biometric security and …


An End-To-End Trainable Method For Generating And Detecting Fiducial Markers, J Brennan Peace Aug 2020

An End-To-End Trainable Method For Generating And Detecting Fiducial Markers, J Brennan Peace

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Existing fiducial markers are designed for efficient detection and decoding. The methods are computationally efficient and capable of demonstrating impressive results, however, the markers are not explicitly designed to stand out in natural environments and their robustness is difficult to infer from relatively limited analysis. Worsening performance in challenging image capture scenarios - such as poorly exposed images, motion blur, and off-axis viewing - sheds light on their limitations. The method introduced in this work is an end-to-end trainable method for designing fiducial markers and a complimentary detector. By introducing back-propagatable marker augmentation and superimposition into training, the method learns …


Artificial Intelligent Based Energy And Demand Side Management For Microgrids And Smart Homes Considering Customer Privacy, Ahmed F. Ebrahim Mar 2020

Artificial Intelligent Based Energy And Demand Side Management For Microgrids And Smart Homes Considering Customer Privacy, Ahmed F. Ebrahim

FIU Electronic Theses and Dissertations

The rapid development of various power electronics applications facilitates the integration of many smart grid applications in recent years. However, integration of intermittent renewable energy sources, highly stochastic electric vehicles (EVs) activities on the grid and time-varying smart loads have increased the level of grid vulnerability to unusual and high complexity and quality-related problems. Among these problems is to accurately estimate the real contribution and consumption of household loads, in the era of smart appliances and interoperability operation, and its relative impact to the grid’s operation. Specifically, household loads represent a significant percentage of electrical energy consumption and, therefore, could …


Palmprint Gender Classification Using Deep Learning Methods, Minou Khayami Jan 2020

Palmprint Gender Classification Using Deep Learning Methods, Minou Khayami

Graduate Theses, Dissertations, and Problem Reports

Gender identification is an important technique that can improve the performance of authentication systems by reducing searching space and speeding up the matching process. Several biometric traits have been used to ascertain human gender. Among them, the human palmprint possesses several discriminating features such as principal-lines, wrinkles, ridges, and minutiae features and that offer cues for gender identification. The goal of this work is to develop novel deep-learning techniques to determine gender from palmprint images. PolyU and CASIA palmprint databases with 90,000 and 5502 images respectively were used for training and testing purposes in this research. After ROI extraction and …


Performance Comparison Of Binarized Neural Network With Convolutional Neural Network, Lopamudra Baruah Jan 2017

Performance Comparison Of Binarized Neural Network With Convolutional Neural Network, Lopamudra Baruah

Dissertations, Master's Theses and Master's Reports

Deep learning is a trending topic widely studied by researchers due to increase in the abundance of data and getting meaningful results with them. Convolutional Neural Networks (CNN) is one of the most popular architectures used in deep learning. Binarized Neural Network (BNN) is also a neural network which consists of binary weights and activations. Neural Networks has large number of parameters and overfitting is a common problem to these networks. To overcome the overfitting problem, dropout is a solution. Randomly dropping some neurons along with its connections helps to prevent co-adaptations which finally help in reducing overfitting. Many researchers …