Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Algorithms

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 124

Full-Text Articles in Electrical and Computer Engineering

Toward Real-Time, Robust Wearable Sensor Fall Detection Using Deep Learning Methods: A Feasibility Study, Haben Yhdego, Christopher Paolini, Michel Audette Jan 2023

Toward Real-Time, Robust Wearable Sensor Fall Detection Using Deep Learning Methods: A Feasibility Study, Haben Yhdego, Christopher Paolini, Michel Audette

Electrical & Computer Engineering Faculty Publications

Real-time fall detection using a wearable sensor remains a challenging problem due to high gait variability. Furthermore, finding the type of sensor to use and the optimal location of the sensors are also essential factors for real-time fall-detection systems. This work presents real-time fall-detection methods using deep learning models. Early detection of falls, followed by pneumatic protection, is one of the most effective means of ensuring the safety of the elderly. First, we developed and compared different data-segmentation techniques for sliding windows. Next, we implemented various techniques to balance the datasets because collecting fall datasets in the real-time setting has …


Acm Web Conference 2023, Usha Lokala, Kaushik Roy, Utkarshani Jaimini, Amit Sheth Jan 2023

Acm Web Conference 2023, Usha Lokala, Kaushik Roy, Utkarshani Jaimini, Amit Sheth

Publications

Improving the performance and explanations of ML algorithms is a priority for adoption by humans in the real world. In critical domains such as healthcare, such technology has significant potential to reduce the burden on humans and considerably reduce manual assessments by providing quality assistance at scale. In today’s data-driven world, artificial intelligence (AI) systems are still experiencing issues with bias, explainability, and human-like reasoning and interpretability. Causal AI is the technique that can reason and make human-like choices making it possible to go beyond narrow Machine learning-based techniques and can be integrated into human decision-making. It also offers intrinsic …


Atlas-Based Shared-Boundary Deformable Multi-Surface Models Through Multi-Material And Two-Manifold Dual Contouring, Tanweer Rashid, Sharmin Sultana, Mallar Chakravarty, Michel Albert Audette Jan 2023

Atlas-Based Shared-Boundary Deformable Multi-Surface Models Through Multi-Material And Two-Manifold Dual Contouring, Tanweer Rashid, Sharmin Sultana, Mallar Chakravarty, Michel Albert Audette

Electrical & Computer Engineering Faculty Publications

This paper presents a multi-material dual “contouring” method used to convert a digital 3D voxel-based atlas of basal ganglia to a deformable discrete multi-surface model that supports surgical navigation for an intraoperative MRI-compatible surgical robot, featuring fast intraoperative deformation computation. It is vital that the final surface model maintain shared boundaries where appropriate so that even as the deep-brain model deforms to reflect intraoperative changes encoded in ioMRI, the subthalamic nucleus stays in contact with the substantia nigra, for example, while still providing a significantly sparser representation than the original volumetric atlas consisting of hundreds of millions of voxels. The …


A Survey Of Using Machine Learning In Iot Security And The Challenges Faced By Researchers, Khawlah M. Harahsheh, Chung-Hao Chen Jan 2023

A Survey Of Using Machine Learning In Iot Security And The Challenges Faced By Researchers, Khawlah M. Harahsheh, Chung-Hao Chen

Electrical & Computer Engineering Faculty Publications

The Internet of Things (IoT) has become more popular in the last 15 years as it has significantly improved and gained control in multiple fields. We are nowadays surrounded by billions of IoT devices that directly integrate with our lives, some of them are at the center of our homes, and others control sensitive data such as military fields, healthcare, and datacenters, among others. This popularity makes factories and companies compete to produce and develop many types of those devices without caring about how secure they are. On the other hand, IoT is considered a good insecure environment for cyber …


Control Implemented On Quantum Computers: Effects Of Noise, Nondeterminism, And Entanglement, Kip Nieman, Keshav Kasturi Rangan, Helen Durand Jul 2022

Control Implemented On Quantum Computers: Effects Of Noise, Nondeterminism, And Entanglement, Kip Nieman, Keshav Kasturi Rangan, Helen Durand

Chemical Engineering and Materials Science Faculty Research Publications

Quantum computing has advanced in recent years to the point that there are now some quantum computers and quantum simulators available to the public for use. In addition, quantum computing is beginning to receive attention within the process systems engineering community for directions such as machine learning and optimization. A logical next step for its evaluation within process systems engineering is for control, specifically for computing control actions to be applied to process systems. In this work, we provide some initial studies regarding the implementation of control on quantum computers, including the implementation of a single-input/single-output proportional control law on …


Practical Considerations And Applications For Autonomous Robot Swarms, Rory Alan Hector Apr 2022

Practical Considerations And Applications For Autonomous Robot Swarms, Rory Alan Hector

LSU Doctoral Dissertations

In recent years, the study of autonomous entities such as unmanned vehicles has begun to revolutionize both military and civilian devices. One important research focus of autonomous entities has been coordination problems for autonomous robot swarms. Traditionally, robot models are used for algorithms that account for the minimum specifications needed to operate the swarm. However, these theoretical models also gloss over important practical details. Some of these details, such as time, have been considered before (as epochs of execution). In this dissertation, we examine these details in the context of several problems and introduce new performance measures to capture practical …


Extending Instantaneous De-Mixing Algorithms To Anechoic Mixtures, Swarnadeep Bagchi, Ruairí De Fréin Jun 2021

Extending Instantaneous De-Mixing Algorithms To Anechoic Mixtures, Swarnadeep Bagchi, Ruairí De Fréin

Conference papers

The AdRess algorithm separates sources that are mixed using stereo, pan-mixing in a computationally efficient way. Pan-mixing gives the sources a location in the stereo field by introducing a relative attenuation between the versions of the sources that appear on each channel. AdRess achieves separation by constructing only a frequency-attenuation matrix. We introduce a new algorithm called Delayed-AdRess (D-AdRess), where, in addition to the frequency-attenuation matrix, two other matrices namely, frequency-delay and time-delay are used to separate sources from anechoic mixtures. By anechoic mixtures, we mean mixing scenarios where both attenuation and delays are experienced by the source signals.


Methods For Object Tracking With Machine Vision, Zachary Simon Stamler Jan 2021

Methods For Object Tracking With Machine Vision, Zachary Simon Stamler

Dissertations and Theses

As machine learning and deep learning systems continue to find applications in science and engineering, the problem of providing these systems with high-quality data continues to increase in importance. Many of these systems utilize machine vision as their primary source of information, and in order to maximally leverage their abilities it is important to be able to provide them with high quality, accurate data. Unfortunately, many sets of tracking data extracted from video suffer from the problem of missing frames, which can arise from a multitude of causes depending on the system. These missing frames can result in confusion between …


Analysis Of Power Quality Constrained Consumer-Friendly Demand Response In Low Voltage Distributions Network, Chittesh Veni Chandran Jan 2021

Analysis Of Power Quality Constrained Consumer-Friendly Demand Response In Low Voltage Distributions Network, Chittesh Veni Chandran

Dissertations

Load management using demand response (DR) in a low voltage distribution network (LVDN) offers an economically profitable business platform with peak load management. However, the inconvenience caused to the consumer in depriving their devices and the low levels of associated incentive have contributed to lower consumer acceptance for DR programs in the community. However, with the increasing number of controllable consumer loads, a residential-level DR program is highly plausible in the short to medium term. Further, additional DR capabilities (including ancillary services) are likely to improve the remuneration potential for participants in DR. Considering the perspective of a distribution network …


Clustered Hyperspectral Target Detection, Sean Onufer Stalley Dec 2020

Clustered Hyperspectral Target Detection, Sean Onufer Stalley

Dissertations and Theses

Aerial target detection is often used to search for relatively small things over large areas of land. Depending on the size and signature of the target, detection can be a very easy or very difficult task. By capturing images with several hundred color channels, hyperspectral sensors provide a new way of looking at this task, both literally and figuratively. Hyperspectral sensors can be used in many aerial target detection tasks such as identifying unhealthy trees in a forest, searching for minerals at a mining site, or finding the sources of chemical leaks at a factory. The high spectral resolution of …


Cyber-Physical Security With Rf Fingerprint Classification Through Distance Measure Extensions Of Generalized Relevance Learning Vector Quantization, Trevor J. Bihl, Todd J. Paciencia, Kenneth W. Bauer Jr., Michael A. Temple Feb 2020

Cyber-Physical Security With Rf Fingerprint Classification Through Distance Measure Extensions Of Generalized Relevance Learning Vector Quantization, Trevor J. Bihl, Todd J. Paciencia, Kenneth W. Bauer Jr., Michael A. Temple

Faculty Publications

Radio frequency (RF) fingerprinting extracts fingerprint features from RF signals to protect against masquerade attacks by enabling reliable authentication of communication devices at the “serial number” level. Facilitating the reliable authentication of communication devices are machine learning (ML) algorithms which find meaningful statistical differences between measured data. The Generalized Relevance Learning Vector Quantization-Improved (GRLVQI) classifier is one ML algorithm which has shown efficacy for RF fingerprinting device discrimination. GRLVQI extends the Learning Vector Quantization (LVQ) family of “winner take all” classifiers that develop prototype vectors (PVs) which represent data. In LVQ algorithms, distances are computed between exemplars and PVs, and …


Relational Sequential Decision Making, Kaushik Roy Jan 2020

Relational Sequential Decision Making, Kaushik Roy

Publications

Markov Decision Processes(MDPs) are the standard for sequential decision making. Comprehensive theory and methods have been developed to deal with solving MDPs in the propositional setting. Real world domains however are naturally represented using objects and relationships. To this effect, relational adaptations of algorithms to solve MDPs have been proposed in recent years. This paper presents a study of these techniques both in the model based and model free setting.


An Integrated Approach For Remanufacturing Job Shop Scheduling With Routing Alternatives., Ling Ling Li, Cong Bo Li, Li Li, Ying Tang, Qing Shan Yang Mar 2019

An Integrated Approach For Remanufacturing Job Shop Scheduling With Routing Alternatives., Ling Ling Li, Cong Bo Li, Li Li, Ying Tang, Qing Shan Yang

Henry M. Rowan College of Engineering Faculty Scholarship

Remanufacturing is a practice of growing importance due to increasing environmental awareness and regulations. However, the stochastic natures inherent in the remanufacturing processes complicate its scheduling. This paper undertakes the challenge and presents a remanufacturing job shop scheduling approach by integrating alternative routing assignment and machine resource dispatching. A colored timed Petri net is introduced to model the dynamics of remanufacturing process, such as various process routings, uncertain operation times for cores, and machine resource conflicts. With the color attributes in Petri nets, two types of decision points, recovery routing selection and resource dispatching, are introduced and linked with places …


Icdar 2019 Time-Quality Binarization Competition, Rafael Dueire Lins, Ergina Kavallieratou, Elisa Barney Smith, Rodrigo Barros Bernardino, Darlisson Marinho De Jesus Jan 2019

Icdar 2019 Time-Quality Binarization Competition, Rafael Dueire Lins, Ergina Kavallieratou, Elisa Barney Smith, Rodrigo Barros Bernardino, Darlisson Marinho De Jesus

Electrical and Computer Engineering Faculty Publications and Presentations

The ICDAR 2019 Time-Quality Binarization Competition assessed the performance of seventeen new together with thirty previously published binarization algorithms. The quality of the resulting two-tone image and the execution time were assessed. Comparisons were on both in "real-world" and synthetic scanned images, and in documents photographed with four models of widely used portable phones. Most of the submitted algorithms employed machine learning techniques and performed best on the most complex images. Traditional algorithms provided very good results at a fraction of the time.


An Investigation Of The Cortical Learning Algorithm, Anthony C. Samaritano May 2018

An Investigation Of The Cortical Learning Algorithm, Anthony C. Samaritano

Theses and Dissertations

Pattern recognition and machine learning fields have revolutionized countless industries and applications from biometric security to modern industrial assembly lines. The fields continue to accelerate as faster, more efficient processing hardware becomes commercially available. Despite the accelerated growth of the pattern recognition and machine learning fields, computers still are unable to learn, reason, and perform rudimentary tasks that humans and animals find routine. Animals are able to move fluidly, understand their environment, and maximize their chances of survival through adaptation - animals demonstrate intelligence. A primary argument in this thesis that we have not yet achieved a level of intelligence …


Single-Layer Channel Routing And Placement With Single-Sided Nets, Ronald I. Greenberg, Jau-Der Shih Jan 2018

Single-Layer Channel Routing And Placement With Single-Sided Nets, Ronald I. Greenberg, Jau-Der Shih

Ronald Greenberg

This paper considers the optimal offset, feasible offset, and optimal placement problems for a more general form of single-layer VLSI channel routing than has usually been considered in the past. Most prior works require that every net has exactly one terminal on each side of the channel. As long as only one side of the channel contains multiple terminals of the same net, we provide linear-time solutions to all three problems. Such results are implausible if the placement of terminals is entirely unrestricted; in fact, the size of the output for the feasible offset problem may be Ω(n^2). The linear-time …


Minimum Separation For Single-Layer Channel Routing, Ronald I. Greenberg, F. Miller Maley Jan 2018

Minimum Separation For Single-Layer Channel Routing, Ronald I. Greenberg, F. Miller Maley

Ronald Greenberg

We present a linear-time algorithm for determining the minimum height of a single-layer routing channel. The algorithm handles single-sided connections and multiterminal nets. It yields a simple routability test for single-layer switchboxes, correcting an error in the literature.


Pursuit Evasion With Multiple Pursuers : Capturing A Ground Vehicle On A Road Network With Multiple Drones, Blake Wilson, Shreyas Sundaram, Amritha Prasad Aug 2017

Pursuit Evasion With Multiple Pursuers : Capturing A Ground Vehicle On A Road Network With Multiple Drones, Blake Wilson, Shreyas Sundaram, Amritha Prasad

The Summer Undergraduate Research Fellowship (SURF) Symposium

Unmanned Aerial Vehicles (UAV) have many military and civilian applications, one of which is monitoring a given area (such as a road network) for threats. An important question in this application is to determine the latest time to dispatch UAVs for the guaranteed capture of threats attempting to travel through the network. In this work, we consider a pursuit evasion scenario with multiple pursuers (UAVs) trying to catch a single evader (ground vehicle), where information about the evader’s path is provided by ground sensors. In this scenario, we consider the problem of finding the maximum delay with which the pursuers …


Academic Packing For Commercial Fpga Architectures, Travis D. Haroldsen Jul 2017

Academic Packing For Commercial Fpga Architectures, Travis D. Haroldsen

Theses and Dissertations

With a few exceptions, academic packing algorithms for FPGAs are typically applied solely to theoretical architectures. This has allowed the algorithms to focus on the basic components of packing while abstracting away many of the details dictated by real hardware. As commercially available FPGAs have advanced, however, the academic algorithms and architectures have diverged significantly from their commercial counterparts. In this dissertation, the RapidSmith 2 framework is presented. This framework accurately reflects the architecture of Xilinx FPGAs and provides support for integrating custom tools into the commercial CAD tools. Using this framework, the RSVPack packing algorithm is implemented. The RSVPack …


Generalized Differential Calculus And Applications To Optimization, R. Blake Rector Jun 2017

Generalized Differential Calculus And Applications To Optimization, R. Blake Rector

Dissertations and Theses

This thesis contains contributions in three areas: the theory of generalized calculus, numerical algorithms for operations research, and applications of optimization to problems in modern electric power systems. A geometric approach is used to advance the theory and tools used for studying generalized notions of derivatives for nonsmooth functions. These advances specifically pertain to methods for calculating subdifferentials and to expanding our understanding of a certain notion of derivative of set-valued maps, called the coderivative, in infinite dimensions. A strong understanding of the subdifferential is essential for numerical optimization algorithms, which are developed and applied to nonsmooth problems in operations …


Algorithm For Premature Ventricular Contraction Detection From A Subcutaneous Electrocardiogram Signal, Iris Lynn Shelly Dec 2016

Algorithm For Premature Ventricular Contraction Detection From A Subcutaneous Electrocardiogram Signal, Iris Lynn Shelly

Dissertations and Theses

Cardiac arrhythmias occur when the normal pattern of electrical signals in the heart breaks down. A premature ventricular contraction (PVC) is a common type of arrhythmia that occurs when a heartbeat originates from an ectopic focus within the ventricles rather than from the sinus node in the right atrium. This and other arrhythmias are often diagnosed with the help of an electrocardiogram, or ECG, which records the electrical activity of the heart using electrodes placed on the skin. In an ECG signal, a PVC is characterized by both timing and morphological differences from a normal sinus beat.

An implantable cardiac …


Task And Participant Scheduling Of Trading Platforms In Vehicular Participatory Sensing Networks, Heyuan Shi, Xiaoyu Song, Ming Gu, Jiaguang Sun Dec 2016

Task And Participant Scheduling Of Trading Platforms In Vehicular Participatory Sensing Networks, Heyuan Shi, Xiaoyu Song, Ming Gu, Jiaguang Sun

Electrical and Computer Engineering Faculty Publications and Presentations

The vehicular participatory sensing network (VPSN) is now becoming more and more prevalent, and additionally has shown its great potential in various applications. A general VPSN consists of many tasks from task, publishers, trading platforms and a crowd of participants. Some literature treats publishers and the trading platform as a whole, which is impractical since they are two independent economic entities with respective purposes. For a trading platform in markets, its purpose is to maximize the profit by selecting tasks and recruiting participants who satisfy the requirements of accepted tasks, rather than to improve the quality of each task. This …


Characterizing Package/Pcb Pdn Interactions From A Full-Wave Finite-Difference Formulation, Shishuang Sun, David Pommerenke, James L. Drewniak, Kai Xiao, Sin-Ting Chen, Tzong-Lin Wu Jul 2016

Characterizing Package/Pcb Pdn Interactions From A Full-Wave Finite-Difference Formulation, Shishuang Sun, David Pommerenke, James L. Drewniak, Kai Xiao, Sin-Ting Chen, Tzong-Lin Wu

James K. Wu, M.D.

A novel approach of equivalent circuit model extraction is developed for modeling of integrated package and PCB power distribution networks (PDN). The integrated PDNs are formulated from a full-wave finite-difference algorithm, and the resulting matrix equations are converted to equivalent circuits. The equivalent circuits, as well as the decoupling capacitors and the attached circuit components, can be analyzed with a SPICE-like solver in both the time and frequency domains. The modeling of dielectric loss is also addressed. The method is used to model three PDN problems including a simple power bus, a BGA package mounting on a PCB, and a …


Multi-Sensor Integration To Map Odor Distribution For The Detection Of Chemical Sources, Xiang Gao, Levent Acar Jul 2016

Multi-Sensor Integration To Map Odor Distribution For The Detection Of Chemical Sources, Xiang Gao, Levent Acar

Electrical and Computer Engineering Faculty Research & Creative Works

This paper addresses the problem of mapping odor distribution derived from a chemical source using multi-sensor integration and reasoning system design. Odor localization is the problem of finding the source of an odor or other volatile chemical. Most localization methods require a mobile vehicle to follow an odor plume along its entire path, which is time consuming and may be especially difficult in a cluttered environment. To solve both of the above challenges, this paper proposes a novel algorithm that combines data from odor and anemometer sensors, and combine sensors' data at different positions. Initially, a multi-sensor integration method, together …


Fizzy: Feature Subset Selection For Metagenomics., Gregory Ditzler, J Calvin Morrison, Yemin Lan, Gail L Rosen Nov 2015

Fizzy: Feature Subset Selection For Metagenomics., Gregory Ditzler, J Calvin Morrison, Yemin Lan, Gail L Rosen

Henry M. Rowan College of Engineering Faculty Scholarship

BACKGROUND: Some of the current software tools for comparative metagenomics provide ecologists with the ability to investigate and explore bacterial communities using α- & β-diversity. Feature subset selection--a sub-field of machine learning--can also provide a unique insight into the differences between metagenomic or 16S phenotypes. In particular, feature subset selection methods can obtain the operational taxonomic units (OTUs), or functional features, that have a high-level of influence on the condition being studied. For example, in a previous study we have used information-theoretic feature selection to understand the differences between protein family abundances that best discriminate between age groups in the …


Filters And Matrix Factorization, Myung-Sin Song, Palle E. T. Jorgensen Nov 2015

Filters And Matrix Factorization, Myung-Sin Song, Palle E. T. Jorgensen

SIUE Faculty Research, Scholarship, and Creative Activity

We give a number of explicit matrix-algorithms for analysis/synthesis

in multi-phase filtering; i.e., the operation on discrete-time signals which

allow a separation into frequency-band components, one for each of the

ranges of bands, say N , starting with low-pass, and then corresponding

filtering in the other band-ranges. If there are N bands, the individual

filters will be combined into a single matrix action; so a representation of

the combined operation on all N bands by an N x N matrix, where the

corresponding matrix-entries are periodic functions; or their extensions to

functions of a complex variable. Hence our setting entails …


Evaluation Of Data-Path Topologies For Self-Timed Conditional Statements, Navaneeth Prasannakumar Jamadagni Aug 2015

Evaluation Of Data-Path Topologies For Self-Timed Conditional Statements, Navaneeth Prasannakumar Jamadagni

Dissertations and Theses

This research presents a methodology to evaluate data path topologies that implement a conditional statement for an average-case performance that is better than the worst-case performance. A conditional statement executes one of many alternatives depending on how Boolean conditions evaluate to true or false. Alternatives with simple computations take less time to execute. The self-timed designs can exploit the faster executing alternatives and provide an average-case behavior, where the average depends on the frequency of simple and complex computations, and the difference in the completion times of simple and complex computations. The frequency of simple and complex computations depends on …


Identifying Image Manipulation Software From Image Features, Devlin T. Boyter Mar 2015

Identifying Image Manipulation Software From Image Features, Devlin T. Boyter

Theses and Dissertations

As technology steadily increases in the field of image manipulation, determining which software was used to manipulate an image becomes increasingly complex for law enforcement and intelligence agencies. To combat this difficult problem, new techniques that examine the artifacts left behind by a specific manipulation are converted to features for classification. This research implemented four preexisting image manipulation detection techniques into a framework of modules: Two-Dimensional Second Derivative, One-Dimensional Zero Crossings, Quantization Matrices Identification, and File Metadata analysis. The intent is the creation of a framework to develop a capability to determine which specific image manipulation software program manipulated an …


A Distributed Particle Filtering Approach For Multiple Acoustic Source Tracking Using An Acoustic Vector Sensor Network Mar 2015

A Distributed Particle Filtering Approach For Multiple Acoustic Source Tracking Using An Acoustic Vector Sensor Network

Faculty of Engineering University of Malaya

Different centralized approaches such as least-squares (LS) and particle filtering (PF) algorithms have been developed to localize an acoustic source by using a distributed acoustic vector sensor (AVS) array. However, such algorithms are either not applicable for multiple sources or rely heavily on sensor-processor communication. In this paper, a distributed unscented PF (DUPF) approach is proposed for multiple acoustic source tracking. At each distributed AVS node, the first-order and the second-order statistics of the local state are estimated by using an unscented information filter (UIF) based PF. The UIF is employed to approximate the optimum importance function due to its …


Snail Algorithm For Task Allocation In Mesh Networks, Bartosz Duszel Dec 2013

Snail Algorithm For Task Allocation In Mesh Networks, Bartosz Duszel

UNLV Theses, Dissertations, Professional Papers, and Capstones

Topic of this master's thesis is connected with task allocation algorithms and mesh networks. Author of this work has already graduated from Wroclaw, University of Technology (Poland) where during his studies he created software simulation environment for two different task allocation algorithms for mesh networks:Adaptive ScanandFrame Sliding. Those algorithms were compared by two, main parame- ters: simulation time and average mesh fulfillment (utilization level). All simulations were done in software environment which was developed specially for that research. This application was based on few, different types of objects: task (width, height, processing time), task queue (different number of tasks), task …