Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer engineering

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 13 of 13

Full-Text Articles in Electrical and Computer Engineering

Deep Learning Methods For Fingerprint-Based Indoor And Outdoor Positioning, Fahad Alhomayani Jan 2021

Deep Learning Methods For Fingerprint-Based Indoor And Outdoor Positioning, Fahad Alhomayani

Electronic Theses and Dissertations

Outdoor positioning systems based on the Global Navigation Satellite System have several shortcomings that have deemed their use for indoor positioning impractical. Location fingerprinting, which utilizes machine learning, has emerged as a viable method and solution for indoor positioning due to its simple concept and accurate performance. In the past, shallow learning algorithms were traditionally used in location fingerprinting. Recently, the research community started utilizing deep learning methods for fingerprinting after witnessing the great success and superiority these methods have over traditional/shallow machine learning algorithms. The contribution of this dissertation is fourfold:

First, a Convolutional Neural Network (CNN)-based method for …


Approximate Pattern Matching Using Hierarchical Graph Construction And Sparse Distributed Representation, Aakanksha Mathuria Sep 2020

Approximate Pattern Matching Using Hierarchical Graph Construction And Sparse Distributed Representation, Aakanksha Mathuria

Dissertations and Theses

With recent developments in deep networks, there have been significant advances in visual object detection and recognition. However, some of these networks are still easily fooled/hacked and have shown "bag of features" kinds of failures. Some of this is due to the fact that even deep networks make only marginal use of the complex structure that exists in real-world images. Primate visual systems appear to capture the structure in images, but how?

In the research presented here, we are studying approaches for robust pattern matching using static, 2D Blocks World images based on graphical representations of the various components of …


A Comprehensive Security Framework For Securing Sensors In Smart Devices And Applications, Amit Kumar Sikder Jul 2020

A Comprehensive Security Framework For Securing Sensors In Smart Devices And Applications, Amit Kumar Sikder

FIU Electronic Theses and Dissertations

This doctoral dissertation introduces novel security frameworks to detect sensor-based threats on smart devices and applications in smart settings such as smart home, smart office, etc. First, we present a formal taxonomy and in-depth impact analysis of existing sensor-based threats to smart devices and applications based on attack characteristics, targeted components, and capabilities. Then, we design a novel context-aware intrusion detection system, 6thSense, to detect sensor-based threats in standalone smart devices (e.g., smartphone, smart watch, etc.). 6thSense considers user activity-sensor co-dependence in standalone smart devices to learn the ongoing user activity contexts and builds a context-aware model to distinguish malicious …


Cloud Workload Allocation Approaches For Quality Of Service Guarantee And Cybersecurity Risk Management, Soamar Homsi Mar 2019

Cloud Workload Allocation Approaches For Quality Of Service Guarantee And Cybersecurity Risk Management, Soamar Homsi

FIU Electronic Theses and Dissertations

It has become a dominant trend in industry to adopt cloud computing --thanks to its unique advantages in flexibility, scalability, elasticity and cost efficiency -- for providing online cloud services over the Internet using large-scale data centers. In the meantime, the relentless increase in demand for affordable and high-quality cloud-based services, for individuals and businesses, has led to tremendously high power consumption and operating expense and thus has posed pressing challenges on cloud service providers in finding efficient resource allocation policies.

Allowing several services or Virtual Machines (VMs) to commonly share the cloud's infrastructure enables cloud providers to optimize resource …


Development Of The Codebase For Ece Design: Smartwatch Device And App For Continuous Glucose Monitoring, Keelin J. Becker-Wheeler May 2018

Development Of The Codebase For Ece Design: Smartwatch Device And App For Continuous Glucose Monitoring, Keelin J. Becker-Wheeler

Honors Scholar Theses

This honors thesis describes the development of the codebase for the 2018 University of Connecticut ECE Senior Design project titled "Smartwatch Device and App for Continuous Glucose Monitoring''. The goal for the senior design project is to remove the dependencies imposed by a previously-designed prototype of a glucose-monitoring smartwatch, by creating a new custom device without those dependencies. Development of the new codebase involves splitting the tasks of an Arduino codebase into a number of logical components that are then implemented in C. This new codebase makes substantial improvements to the overall program structure and organization, as well as numerous …


A Comparative Study Of Bagging And Boosting Of Supervised And Unsupervised Classifiers For Outliers Detection, Yue Dang Jan 2017

A Comparative Study Of Bagging And Boosting Of Supervised And Unsupervised Classifiers For Outliers Detection, Yue Dang

Browse all Theses and Dissertations

The problem of outlier detection has received increasing attention recently because it plays a great role in many fields such as credit fraud detection, cyber security, etc. Machine Learning approach is an excellent choice for outlier detection due to its accuracy and efficiency. Outlier detection problem is unique due to the so-called classes imbalance: the inliers are extreme majority and the outliers are minority. Ensemble methods are popular in classification and regression task in practice to improve the performance of machine learning algorithms. Bagging and boosting are two common methods of them. In this thesis, we want to show the …


Adaptive Graph Construction For Isomap Manifold Learning, Loc Tran, Zezhong Zheng, Guoquing Zhou, Jiang Li, Karen O. Egiazarian (Ed.), Sos S. Agaian (Ed.), Atanas P. Gotchev (Ed.) Jan 2015

Adaptive Graph Construction For Isomap Manifold Learning, Loc Tran, Zezhong Zheng, Guoquing Zhou, Jiang Li, Karen O. Egiazarian (Ed.), Sos S. Agaian (Ed.), Atanas P. Gotchev (Ed.)

Electrical & Computer Engineering Faculty Publications

Isomap is a classical manifold learning approach that preserves geodesic distance of nonlinear data sets. One of the main drawbacks of this method is that it is susceptible to leaking, where a shortcut appears between normally separated portions of a manifold. We propose an adaptive graph construction approach that is based upon the sparsity property of the ℓ1 norm. The ℓ1 enhanced graph construction method replaces k-nearest neighbors in the classical approach. The proposed algorithm is first tested on the data sets from the UCI data base repository which showed that the proposed approach performs better than …


Application Aware For Byzantine Fault Tolerance, Hua Chai Jan 2014

Application Aware For Byzantine Fault Tolerance, Hua Chai

ETD Archive

Driven by the need for higher reliability of many distributed systems, various replication-based fault tolerance technologies have been widely studied. A prominent technology is Byzantine fault tolerance (BFT). BFT can help achieve high availability and trustworthiness by ensuring replica consistency despite the presence of hardware failures and malicious faults on a small portion of the replicas. However, most state-of-the-art BFT algorithms are designed for generic stateful applications that require the total ordering of all incoming requests and the sequential execution of such requests. In this dissertation research, we recognize that a straightforward application of existing BFT algorithms is often inappropriate …


Wireless Impact Detection System, Shawno Auwae, Kyle Terriere Jun 2013

Wireless Impact Detection System, Shawno Auwae, Kyle Terriere

Interdisciplinary Design Senior Theses

Recently, brain trauma caused by multiple concussions has become a pressing issue for contact sports, mainly American football players. The severity of the impacts in these sports have led to discussion concerning the standard safety equipment used, as well as the rules enforcing a certain style of play. Multiple studies have shown that concussions have damaging long-term effects, including dementia and memory loss. The dominant professional football organization, the National Football League (NFL), employs qualified athletic trainers to diagnose and treat players with concussions, but many incidents still go undetected. This problem is magnified at the youth level, where the …


Multi-Label Segmentation Propagation For Materials Science Images Incorporating Topology And Interactivity, Jarrell Waggoner Jan 2013

Multi-Label Segmentation Propagation For Materials Science Images Incorporating Topology And Interactivity, Jarrell Waggoner

Theses and Dissertations

Segmentation propagation is the problem of transferring the segmentation of an image to a neighboring image in a sequence. This problem is of particular importance to materials science, where the accurate segmentation of a series of 2D serial-sectioned images of multiple, contiguous 3D structures has important applications. Such structures may have prior-known shape, appearance, and/or topology among the underlying structures which can be considered to improve segmentation accuracy. For example, some materials images may have structures with a specific shape or appearance in each serial section slice, which only changes minimally from slice to slice; and some materials may exhibit …


Precise Measurement Of The Neutron Magnetic Form Factor Gnm In The Few-Gev² Region, Clas Collaboration, J. Lachniet, H. Bagdasaryan, S. Bültmann, N. Kalantarians, G. E. Dodge, T. A. Forest, G. Gavalian, C. E. Hyde-Wright, A. Klien, S. E. Kuhn, M. R. Niroula, R. A. Niyazov, L. M. Qin, L. B. Weinstein, J. Zhang Jan 2009

Precise Measurement Of The Neutron Magnetic Form Factor Gnm In The Few-Gev² Region, Clas Collaboration, J. Lachniet, H. Bagdasaryan, S. Bültmann, N. Kalantarians, G. E. Dodge, T. A. Forest, G. Gavalian, C. E. Hyde-Wright, A. Klien, S. E. Kuhn, M. R. Niroula, R. A. Niyazov, L. M. Qin, L. B. Weinstein, J. Zhang

Physics Faculty Publications

The neutron elastic magnetic form factor was extracted from quasielastic electron scattering on deuterium over the range Q2 = 1.0–4.8  GeV2 with the CLAS detector at Jefferson Lab. High precision was achieved with a ratio technique and a simultaneous in situ calibration of the neutron detection efficiency. Neutrons were detected with electromagnetic calorimeters and time-of-flight scintillators at two beam energies. The dipole parametrization gives a good description of the data


Teaching Asynchronous Digital Design In The Undergraduate Computer Engineering Curriculum, Scott C. Smith, Waleed K. Al-Assadi Apr 2007

Teaching Asynchronous Digital Design In The Undergraduate Computer Engineering Curriculum, Scott C. Smith, Waleed K. Al-Assadi

Electrical and Computer Engineering Faculty Research & Creative Works

As demand continues for circuits with higher performance, higher complexity, and decreased feature size, asynchronous (clockless) paradigms will become more widely used in the semiconductor industry, as evidenced by the International Technology Roadmap for Semiconductors' (ITRS) prediction of a likely shift from synchronous to asynchronous design styles in order to increase circuit robustness, decrease power, and alleviate many clock-related issues. ITRS predicts that asynchronous circuits will account for 19% of chip area within the next 5 years, and 30% of chip area within the next 10 years. To meet this growing industry need, students in Computer Engineering should be introduced …


Simulink Implementation Of A Cdma Transmitter, Visalakshi Ramakonar Jan 1996

Simulink Implementation Of A Cdma Transmitter, Visalakshi Ramakonar

Theses : Honours

An implementation of a Code Division Multiple Access (CDMA) transmitter has been developed using SIMULINK and MATLAB. This transmitter uses a modified carrier in modulation. This modified carrier, which is frequency modulated, has been shown to reduce intersymbol interference (ISI) and multiple access interference (MAl). These two types of interference are caused by multipath propagation which results in delayed versions of the original signal. The benefits of this modified modulation technique are apparent when there are delays involved. The spreading sequences used are 7- bit Gold codes which allow a maximum of nine users. The initial trials of the transmitter …