Creating A Power System For A Robot,
2023
Murray State University
Creating A Power System For A Robot, Nolan Hays
Scholars Week
I will be describing the process of creating the power system for the robot that will be competing in the 2023 IEEE Hardware Competition.
Pvpbc: Privacy- And Verifiability-Preserving E-Voting Based On Permissioned Blockchain,
2023
Bournemouth University
Pvpbc: Privacy- And Verifiability-Preserving E-Voting Based On Permissioned Blockchain, Muntadher Sallal, Ruairí De Fréin, Ali Malik
Articles
Privacy and verifiability are crucial security requirements in e-voting systems and combining them is considered to be a challenge given that they seem to be contradictory. On one hand, privacy means that cast votes cannot be traced to the corresponding voters. On the other hand, linkability of voters and their votes is a requirement of verifiability which has the consequence that a voter is able to check their vote in the election result. These two contradictory features can be addressed by adopting privacy-preserving cryptographic primitives, which at the same time as achieving privacy, achieve verifiability. Many end-to-end schemes that support …
Editorial,
2023
School of Information Technology, Illinois State University (ISU), Normal, IL.
Editorial, Sameeh Ullah Dr.
International Journal of Smart Sensor and Adhoc Network
This special issue seeks papers that provide a convergent research perspective on business futures, i.e., research that draws on many disciplinary views and strives to establish fresh integrative frameworks and vocabularies. Addressing the difficulty of work culture and intelligent machines in a broad sense necessitates grappling with complicated issues such as motivation, cognition, machine learning, human learning, and system design, among others.
State Of The Art In Drivers’ Attention Monitoring – A Systematic Literature Review,
2023
Department of Telecommunications University POLITEHNICA of Bucharest, Romania
State Of The Art In Drivers’ Attention Monitoring – A Systematic Literature Review, Sama Hussein Al-Gburi, Kanar Alaa Al-Sammak, Ion Marghescu, Claudia Cristina Oprea
Karbala International Journal of Modern Science
Recently, driver inattention has become the leading cause of automobile accidents. As a result, the driver's perception and decision-making abilities are diminished, and the driver can lose control of the car. To prevent accidents caused by driver inattention, it’s vital to continuously monitor the driver and his driving behaviour and inform him if he becomes distracted or sleepy. This topic has been the subject of study for decades. Whenever feasible to recognise unsafe driving in advance, accidents could be avoided. This document presents an overview of the existing driver alertness system and the various techniques for detecting driver attentiveness.
A Path Planning Framework For Multi-Agent Robotic Systems Based On Multivariate Skew-Normal Distributions,
2023
Marshall University
A Path Planning Framework For Multi-Agent Robotic Systems Based On Multivariate Skew-Normal Distributions, Peter Estephan
Theses, Dissertations and Capstones
This thesis presents a path planning framework for a very-large-scale robotic (VLSR) system in an known obstacle environment, where the time-varying distributions of agents are applied to represent the multi-agent robotic system (MARS). A novel family of the multivariate skew-normal (MVSN) distributions is proposed based on the Bernoulli random field (BRF) referred to as the Bernoulli-random-field based skew-normal (BRF-SN) distribution. The proposed distributions are applied to model the agents’ distributions in an obstacle-deployed environment, where the obstacle effect is represented by a skew function and separated from the no-obstacle agents’ distributions. First, the obstacle layout is represented by a Hilbert …
Wireless Kick Pedal,
2023
The University of Akron
Wireless Kick Pedal, Jacob Wise, Ryan Kinyo, Bradley Toth, Ian Zanath
Williams Honors College, Honors Research Projects
The goal of the project is to build a wireless kick pedal that allows accessibility to drummers that have leg or foot disabilities and add versatility to multi-instrumentalists looking to add percussion while playing another instrument. The proposed pedal is designed in two main parts, a wearable band that tracks the player’s movement, and a hammer mechanism that receives actuation commands from the wearable band to move the hammer and deliver a drumbeat. The band is designed to be worn on several parts of the body, including the ankle, knee, thigh, or even the arm depending on the user’s situation. …
Wireless Environmental Weather Monitor,
2023
The University of Akron
Wireless Environmental Weather Monitor, Joel Christie-Millett, Nathan Schroeder, Sylvester Wilson, Matthew Szijarto
Williams Honors College, Honors Research Projects
The goal of this senior design/honors project is to create a device that monitors environmental conditions in order to detect a wildfire. This device should notify a user of the status of the environment. The device should also last for 6 months without any human interaction. My role on the team is to design the power supply system that maximizes efficiency and uses renewable energy.
Red Comunitaria Bosachoque-Libre Ingeniería Al Servicio De La Brecha Digital Rural, Universidad De Cundinamarca Sede Fusagasugá,
2022
Universidad de Cundinamarca
Red Comunitaria Bosachoque-Libre Ingeniería Al Servicio De La Brecha Digital Rural, Universidad De Cundinamarca Sede Fusagasugá, Ángela Patricia Arenas Amado, Eva Patricia Vásquez Gómez, Marcia Catalina Pulido Córdoba, Wilson Daniel Gordillo Ochoa
Ingeniería
En materia de conectividad y accesibilidad digital la pandemia por COVID – 19 expuso la exclusión digital en la cual se encuentran sumidos los territorios rurales de Colombia y el mundo. Pese a los ingentes esfuerzos del gobierno nacional a través de procesos institucionalizados para garantizar la inclusión de la tecnología en zonas rurales, no se logra una cobertura óptima, lo cual genera una afectación tecnológica, educativa y de salud pública para comunidades en situación de desventaja social, como es el caso de la ruralidad.
En este documento se muestran los resultados del trabajo de investigación llevado a cabo en …
A Retrospective On 2022 Cyber Incidents In The Wind Energy Sector And Building Future Cyber Resilience,
2022
Boise State University
A Retrospective On 2022 Cyber Incidents In The Wind Energy Sector And Building Future Cyber Resilience, Megan Egan
Cyber Operations and Resilience Program Graduate Projects
Between February and June 2022, multiple wind energy sector companies were hit by cyber-attacks impacting their ability to monitor and control wind turbines. With projected growth in the United States of 110.66 GW from 2020 to 2030, wind energy will increasingly be a critical source of electricity for the United States and an increasingly valuable target for cyberattacks. This paper shows the importance of redundant remote communications, secure third-party providers, and improving response and recovery processes that would ensure this growth period fulfills its potential as a unique opportunity to build in cyber resilience from the outset of new installations …
Optical Control System For Atmospheric Turbulence Mitigation,
2022
Clemson University
Optical Control System For Atmospheric Turbulence Mitigation, Martyn Lemon
All Theses
Propagation of laser light is distorted in the presence of atmospheric turbulence. This poses an issue for sensing, free-space optical communications, and transmission of power. With an ever-increasing demand for high-speed data communications, particularly between satellites, unmanned vehicles, and other systems that benefit from a point-to-point link, this issue is critical for the field. A variety of methods have been proposed to circumvent this issue. Some major categories include the manipulation of the light’s structure, an adaptive scheme at the optical receiver, scanning mirror systems, or a transmission of simultaneous signals with a goal to improve robustness.
There is an …
Deepdemod: Bpsk Demodulation Using Deep Learning Over Software-Defined Radio,
2022
Indian Institute of Technology
Deepdemod: Bpsk Demodulation Using Deep Learning Over Software-Defined Radio, Arhum Ahmad, Satyam Agarwal, Sam Darshi, Sumit Chakravarty
Faculty Subvention Fund Collection
In wireless communication, signal demodulation under non-ideal conditions is one of the important research topic. In this paper, a novel non-coherent binary phase shift keying demodulator based on deep neural network, namely DeepDeMod, is proposed. The proposed scheme makes use of neural network to decode the symbols from the received sampled signal. The proposed scheme is developed to demodulate signal under fading channel with additive white Gaussian noise along with hardware imperfections, such as phase and frequency offset. The time varying nature of hardware imperfections and channel poses a additional challenge in signal demodulation. In order to address this issue, …
A Socio-Economic Analysis Of Automated Container Terminal (Act) Concept In Indonesia : Case Study : New Priok Container Terminal One,
2022
World Maritime University
A Socio-Economic Analysis Of Automated Container Terminal (Act) Concept In Indonesia : Case Study : New Priok Container Terminal One, Febri Triana Hartami Siagian
World Maritime University Dissertations
No abstract provided.
Device Free Indoor Localization Of Human Target Using Wifi Fingerprinting,
2022
Louisiana State University at Baton Rouge
Device Free Indoor Localization Of Human Target Using Wifi Fingerprinting, Prasanga Neupane
LSU Master's Theses
Indoor localization of human objects has many important applications nowadays. Proposed here is a new device free approach where all the transceiver devices are fixed in an indoor environment so that the human target doesn't need to carry any transceiver device with them. This work proposes radio-frequency fingerprinting for the localization of human targets which makes this even more convenient as radio-frequency wireless signals can be easily acquired using an existing wireless network in an indoor environment. This work explores different avenues for optimal and effective placement of transmitter devices for better localization. In this work, an experimental environment is …
Detection Of Data Over Wireless Mobile Channels Based On Maximum Likelihood Technique,
2022
Department of Physics, Swami Vivekanand Subharti University, Meerut, India
Detection Of Data Over Wireless Mobile Channels Based On Maximum Likelihood Technique, Mohd Israil
Al-Bahir Journal for Engineering and Pure Sciences
Next generation wireless systems are characterized by very high transmission bit rates which gives rise to severe Intersymbol interference (ISI) and this makes the detection process very challenging. Hence, assessment of performance of near-optimal detectors like Near Maximum Likelihood Detectors (NMLD) over such channels assumes great importance. This paper deals with the detection of data in the presence of Noise and ISI with NMLD. Performance improvement of NMLD, as compared to nonlinear equalization, has been assessed in terms of BER versus SNR curves obtained through computer simulation. A number of different cases of mobile radio channels have been simulated in …
Evaluating Large Delay Estimation Techniques For Assisted Living Environments,
2022
Technological University Dublin
Evaluating Large Delay Estimation Techniques For Assisted Living Environments, Swarnadeep Bagchi, Ruairí De Fréin
Articles
Abstract Phase wraparound due to large inter-sensor spacings in multi-channel demixing limits the range of relative delays that many time–frequency relative delay estimators can estimate. The performance of a large relative delay estimation method, called the elevatogram, is evaluated in the presence of significant phase wraparound. This paper compares the elevatogram with the popular relative delay estimator used in DUET and the brute-force approach in D-AdRess and analyses its computational efficiency. The elevatogram can accurately estimate relative delays of speech signals of up to 800 samples, whereas DUET and D-AdRess were limited to delays of 7 and 35 samples, given …
The Future Of Cyber-Enabled Influence Operations: Emergent Technologies, Disinformation, And The Destruction Of Democracy,
2022
United States Military Academy
The Future Of Cyber-Enabled Influence Operations: Emergent Technologies, Disinformation, And The Destruction Of Democracy, Joseph Littell
ACI Books & Book Chapters
Nation-states have been embracing online influence campaigns through disinformation at breakneck speeds. Countries such as China and Russia have completely revamped their military doctrine to information-first platforms [1, 2] (Mattis, Peter. (2018). China’s Three Warfares in Perspective. War on the Rocks. Special Series: Ministry of Truth. https://warontherocks.com/2018/01/chinas-three-warfares-perspective/, Cunningham, C. (2020). A Russian Federation Information Warfare Primer. Then Henry M. Jackson School of International Studies. Washington University. https://jsis.washington.edu/news/a-russian-federation-information-war fare-primer/.) to compete with the United States and the West. The Chinese principle of “Three Warfares” and Russian Hybrid Warfare have been used and tested across the spectrum of operations ranging from competition …
Importance Of Students’ Feedback For Modifying Course Syllabus And Revising Curriculum Of Ug Electronics And Telecommunication Engineering Programme,
2022
MKSSS’s Cummins College of Engineering for Women, Karvenagar, Pune
Importance Of Students’ Feedback For Modifying Course Syllabus And Revising Curriculum Of Ug Electronics And Telecommunication Engineering Programme, Prachi Mukherji, Vidya Sisale
Graduate Research in Engineering and Technology (GRET)
The goal of education is to create an environment that assists teaching and learning. Modification of courses, and Course Outcomes is necessary to cater to the changing needs of students and enhance their learning experience. Under academic, freedom to change the curriculum in resonance with industry needs and current trends makes the student more skilled, knowledgeable, and employable. Feedback is a traditional way of making improvements in the educational field. This paper gives direction on the use of Students’ feedback for revising the curriculum and modifying the Course Outcomes for the Undergraduate program in Electronics and Telecommunication Engineering. We have …
Development Of A Security-Focused Multi-Channel Communication Protocol And Associated Quality Of Secure Service (Qoss) Metrics,
2022
Air Force Institute of Technology
Development Of A Security-Focused Multi-Channel Communication Protocol And Associated Quality Of Secure Service (Qoss) Metrics, Paul M. Simon
Theses and Dissertations
The threat of eavesdropping, and the challenge of recognizing and correcting for corrupted or suppressed information in communication systems is a consistent challenge. Effectively managing protection mechanisms requires an ability to accurately gauge the likelihood or severity of a threat, and adapt the security features available in a system to mitigate the threat. This research focuses on the design and development of a security-focused communication protocol at the session-layer based on a re-prioritized communication architecture model and associated metrics. From a probabilistic model that considers data leakage and data corruption as surrogates for breaches of confidentiality and integrity, a set …
An Empirical Comparison Of The Security And Performance Characteristics Of Topology Formation Algorithms For Bitcoin Networks,
2022
University of Bournemouth
An Empirical Comparison Of The Security And Performance Characteristics Of Topology Formation Algorithms For Bitcoin Networks, Muntadher Sallal, Ruairí De Fréin, Ali Malik, Benjamin Aziz
Articles
There is an increasing demand for digital crypto-currencies to be more secure and robust to meet the following business requirements: (1) low transaction fees and (2) the privacy of users. Nowadays, Bitcoin is gaining traction and wide adoption. Many well-known businesses have begun accepting bitcoins as a means of making financial payments. However, the susceptibility of Bitcoin networks to information propagation delay, increases the vulnerability to attack of the Bitcoin network, and decreases its throughput performance. This paper introduces and critically analyses new network clustering methods, named Locality Based Clustering (LBC), Ping Time Based Approach (PTBC), Super Node Based Clustering …
Resource Allocation, User Association And Placement For Uav-Assisted Communications,
2022
New Jersey Institute of Technology
Resource Allocation, User Association And Placement For Uav-Assisted Communications, Shuai Zhang
Dissertations
In the past few years, unmanned aerial vehicle (UAV)-assisted heterogeneous network has attracted significant attention due to its wide range of applications, such as disaster rescue and recovery, ground macro base station (MBS) traffic offloading, communications for temporary events, and data collection for further processing in Internet of Things (IoT). A UAV can act as a flying base station (BS) to quickly recover the communication coverage in the disaster area when the regular terrestrial infrastructure is malfunctioned. The UAV-assisted heterogeneous network can effectively provision line of sight (LoS) communication links and therefore can mitigate potential signal shadowing and blockage. The …
