Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Electrical and Computer Engineering

Detection Of Stealthy False Data Injection Attacks Against State Estimation In Electric Power Grids Using Deep Learning Techniques, Qingyu Ge Aug 2020

Detection Of Stealthy False Data Injection Attacks Against State Estimation In Electric Power Grids Using Deep Learning Techniques, Qingyu Ge

Theses and Dissertations

Since communication technologies are being integrated into smart grid, its vulnerability to false data injection is increasing. State estimation is a critical component which is used for monitoring the operation of power grid. However, a tailored attack could circumvent bad data detection of the state estimation, thus disturb the stability of the grid. Such attacks are called stealthy false data injection attacks (FDIAs). This thesis proposed a prediction-based detector using deep learning techniques to detect injected measurements. The proposed detector adopts both Convolutional Neural Networks and Recurrent Neural Networks, making full use of the spatial-temporal correlations in the measurement data. …


An End-To-End Trainable Method For Generating And Detecting Fiducial Markers, J Brennan Peace Aug 2020

An End-To-End Trainable Method For Generating And Detecting Fiducial Markers, J Brennan Peace

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Existing fiducial markers are designed for efficient detection and decoding. The methods are computationally efficient and capable of demonstrating impressive results, however, the markers are not explicitly designed to stand out in natural environments and their robustness is difficult to infer from relatively limited analysis. Worsening performance in challenging image capture scenarios - such as poorly exposed images, motion blur, and off-axis viewing - sheds light on their limitations. The method introduced in this work is an end-to-end trainable method for designing fiducial markers and a complimentary detector. By introducing back-propagatable marker augmentation and superimposition into training, the method learns …


Optimizing Cluster Sets For The Scan Statistic Using Local Search, James Shulgan Jan 2020

Optimizing Cluster Sets For The Scan Statistic Using Local Search, James Shulgan

Graduate Research Theses & Dissertations

In recent years, scattering sensors to produce wireless sensor networks (WSN) has been proposed for detecting localized events in large areas. Because sensor measurements are noisy, the WSN needs to use statistical methods such as the scan statistic. The scan statistic groups measurements into various clusters, computes a cluster statistic for each cluster, and decides that an event has happened if any of the statistics exceeds a threshold. Previous researchers have investigated the performance of the scan statistic to detect events; however, little attention was given to the optimization of which clusters the scan statistic should use. Using the scan …


Two Novel Radar Detectors For Spiky Sea Clutter With The Presence Of Thermal Noise And Interfering Targets, Nouh Guidoum, Faouzi Soltani, Amar Mezache Jan 2020

Two Novel Radar Detectors For Spiky Sea Clutter With The Presence Of Thermal Noise And Interfering Targets, Nouh Guidoum, Faouzi Soltani, Amar Mezache

Turkish Journal of Electrical Engineering and Computer Sciences

In the context of noncoherent detection and high-resolution maritime radar system with low grazing angle, new Constant False Alarm Rate (CFAR) decision rules are suggested for two Compound Gaussian (CG) clutters namely: The K distribution and the Compound Inverse Gaussian (CIG) distribution, which are considered among the most appropriate models for sea clutter. The proposed decision rules are then modified to deal with the presence of thermal noise and interfering targets. The proposed detectors are investigated on the basis of synthetic data as well as real data of the IPIX radar database. The obtained results exhibit a high probability of …


Sketic: A Machine Learning-Based Digital Circuit Recognition Platform, Mohamamd Abdel Majeed, Tasneem Almousa, Maysaa Alsalman, Abeer Yosef Jan 2020

Sketic: A Machine Learning-Based Digital Circuit Recognition Platform, Mohamamd Abdel Majeed, Tasneem Almousa, Maysaa Alsalman, Abeer Yosef

Turkish Journal of Electrical Engineering and Computer Sciences

In digital system design, digital logic circuit diagrams are built using interconnects and symbolic representations of the basic logic gates. Constructing such diagrams using free sketches is the first step in the design process. After that the circuit schematic or code has to be generated before being able to simulate the design. While most of the mentioned steps are automated using design automation tools, drafting the schematic circuit and then converting it into a valid format that can be simulated are still done manually due to the lack of robust tools that can recognize the free sketches and incorporate them …