Open Access. Powered by Scholars. Published by Universities.®

Systems and Communications Commons

Open Access. Powered by Scholars. Published by Universities.®

2,300 Full-Text Articles 3,313 Authors 1,139,168 Downloads 99 Institutions

All Articles in Systems and Communications

Faceted Search

2,300 full-text articles. Page 2 of 100.

Design, Implementation, And Test Of Spacecraft Antennae And A Ground Station For Mesat1, Travis Russell 2022 University of Maine

Design, Implementation, And Test Of Spacecraft Antennae And A Ground Station For Mesat1, Travis Russell

Electronic Theses and Dissertations

MESAT1 is a CubeSat that was proposed by the University of Maine in response to NASA's CubeSat Launch Initiative, and in early 2020 was selected by NASA to be launched into a Low Earth Orbit (LEO) in June of 2022. The satellite will carry four low-cost complementary metal–oxide–semiconductor (CMOS) cameras which serve as sensing instruments for three science missions proposed by K-12 schools in Maine. The cameras will periodically take pictures of Earth to analyze water turbidity, identify urban heat islands, and predict harmful algal blooms. The multi-spectral image data is packed into frames and downlinked as ...


State Estimation—Beyond Gaussian Filtering, Haozhan Meng 2022 University of New Orleans

State Estimation—Beyond Gaussian Filtering, Haozhan Meng

University of New Orleans Theses and Dissertations

This dissertation considers the state estimation problems with symmetric Gaussian/asymmetric skew-Gaussian assumption under linear/nonlinear systems. It consists of three parts. The first part proposes a new recursive finite-dimensional exact density filter based on the linear skew-Gaussian system. The second part adopts a skew-symmetric representation (SSR) of distribution for nonlinear skew-Gaussian estimation. The third part gives an optimized Gauss-Hermite quadrature (GHQ) rule for numerical integration with respect to Gaussian integrals and applies it to nonlinear Gaussian filters.

We first develop a linear system model driven by skew-Gaussian processes and present the exact filter for the posterior density with fixed ...


Locating Unknown Interference Sources With Time Difference Of Arrival Estimates, Chia Ying Kuo 2022 Washington University in St. Louis

Locating Unknown Interference Sources With Time Difference Of Arrival Estimates, Chia Ying Kuo

McKelvey School of Engineering Theses & Dissertations

Adaptive spectrum sharing between different systems and operators is being deployed in order to make use of the wireless spectrum more efficiently. However, when the spectrum is shared, it can create situations in which an operator is unable to determine the identity of an interferer transmitting an unknown signal. This is the situation in which the POWDER testbed found itself in, starting in late 2021. This thesis provides general-purpose tools for operators to locate an unknown signal source in real-world outdoor environments. We used cross-correlation between the signals measured at multiple time-synchronized base stations to estimate the time difference of ...


Structural Checking Tool Restructure And Matching Improvements, Derek Taylor 2022 University of Arkansas, Fayetteville

Structural Checking Tool Restructure And Matching Improvements, Derek Taylor

Graduate Theses and Dissertations

With the rising complexity and size of hardware designs, saving development time and cost by employing third-party intellectual property (IP) into various first-party designs has become a necessity. However, using third-party IPs introduces the risk of adding malicious behavior to the design, including hardware Trojans. Different from software Trojan detection, the detection of hardware Trojans in an efficient and cost-effective manner is an ongoing area of study and has significant complexities depending on the development stage where Trojan detection is leveraged. Therefore, this thesis research proposes improvements to various components of the soft IP analysis methodology utilized by the Structural ...


Live Access Control Policy Error Detection Through Hardware, Bryce Mendenhall 2022 University of Arkansas, Fayetteville

Live Access Control Policy Error Detection Through Hardware, Bryce Mendenhall

Graduate Theses and Dissertations

Access Control (AC) is a widely used security measure designed to protect resources and infrastructure in an information system. The integrity of the AC policy is crucial to the protection of the system. Errors within an AC policy may cause many vulnerabilities such as information leaks, information loss, and malicious activities. Thus, such errors must be detected and promptly fixed. However, current AC error detection models do not allow for real-time error detection, nor do they provide the source of errors. This thesis presents a live error detection model called LogicDetect which utilizes emulated Boolean digital logic circuits to provide ...


A Novel Data Lineage Model For Critical Infrastructure And A Solution To A Special Case Of The Temporal Graph Reachability Problem, Ian Moncur 2022 University of Arkansas, Fayetteville

A Novel Data Lineage Model For Critical Infrastructure And A Solution To A Special Case Of The Temporal Graph Reachability Problem, Ian Moncur

Graduate Theses and Dissertations

Rapid and accurate damage assessment is crucial to minimize downtime in critical infrastructure. Dependency on modern technology requires fast and consistent techniques to prevent damage from spreading while also minimizing the impact of damage on system users. One technique to assist in assessment is data lineage, which involves tracing a history of dependencies for data items. The goal of this thesis is to present one novel model and an algorithm that uses data lineage with the goal of being fast and accurate. In function this model operates as a directed graph, with the vertices being data items and edges representing ...


Multicarrier Modulation Using Discrete Fractional Fourier Transform, Amir Raeisi Nafchi 2022 University of New Mexico - Main Campus

Multicarrier Modulation Using Discrete Fractional Fourier Transform, Amir Raeisi Nafchi

Electrical and Computer Engineering ETDs

The focus of the research was to investigate the application of the discrete fractional Fourier transform (DFRFT) in communication systems. We investigated the compactness of the Gauss-Hermite like eigenvectors of the DFRFT and showed how a multi-carrier modulation system could benefit from it. This led to identifying an affine DFRFT. We proved the circular convolution property for the proposed DFRFT. Using this affine transform, we were able to design an orthogonal frequency division multiplexer (OFDM) communication system. In the process of implementing the OFDM, we developed a method for fast computation of the DFRFT using the chirp-z transform. Using the ...


Cognality Vr: Exploring A Mobile Vr App With Multiple Stakeholders To Reduce Meltdowns In Autistic Children, LouAnne E. Boyd, Espen Garner, Ian Kim, Gianna Valencia 2022 Chapman University

Cognality Vr: Exploring A Mobile Vr App With Multiple Stakeholders To Reduce Meltdowns In Autistic Children, Louanne E. Boyd, Espen Garner, Ian Kim, Gianna Valencia

Engineering Faculty Articles and Research

Many autistic children can have difficulty communicating, understanding others, and interacting with new and unfamiliar environments. At times they may suffer from a meltdown. The major contributing factor to meltdowns is sensory overwhelm. Technological solutions have shown promise in improving the quality of life for autistic children-however little exists to manage meltdowns. In this work with stakeholders, we design and deploy a low cost, mobile VR application to provide relief during sensory discomfort. Through the analysis of surveys from 88 stakeholders from a variety of groups (i.e., autistic adults, children with autism, parents of autistic individuals, and medical practitioners ...


A Low-Cost, Arduino-Based Platform For Emulating Energy Harvesting In Wireless Sensor Networks, Braden A. Miller 2022 Ohio Northern University

A Low-Cost, Arduino-Based Platform For Emulating Energy Harvesting In Wireless Sensor Networks, Braden A. Miller

ONU Student Research Colloquium

This paper presents an Arduino-based platform for emulating energy harvesting in Wireless Sensor Networks (WSNs) as a form of hardware-in-the-loop simulation. The platform makes use of a battery monitoring circuit and code implemented on the Arduino as an alternative to using significantly more expensive fully equipped energy harvesting nodes. Using embedded code to emulate the energy harvesting process allows for various energy harvesting models and processes to be tested using the same platform. The main contributions of this paper are the experimental data and analyses demonstrating the energy use characterization of the Arduino-based platform in a three-node relay network using ...


Distributed Control And Learning Of Connected And Autonomous Vehicles Approaching And Departing Signalized Intersections, Joshua Onyeka Ogbebor 2022 Louisiana State University and Agricultural and Mechanical College

Distributed Control And Learning Of Connected And Autonomous Vehicles Approaching And Departing Signalized Intersections, Joshua Onyeka Ogbebor

LSU Master's Theses

This thesis outlines methods for achieving energy-optimal control policies for autonomous vehicles approaching and departing a signalized traffic intersection. Connected and autonomous vehicle technology has gained wide interest from both research institutions and government agencies because it offers immense promise in advancing efficient energy usage and abating hazards that beset the current transportation system. Energy minimization is itself crucial in reducing the greenhouse emissions from fossil-fuel-powered vehicles and extending the battery life of electric vehicles which are presently the major alternative to fossil-fuel-powered vehicles. Two major forms of fuel minimization are studied. First, the eco-driving problem is solved for a ...


Representing And Analyzing The Dynamics Of An Agent-Based Adaptive Social Network Model With Partial Integro-Differential Equations, Hiroki Sayama 2022 Binghamton University, SUNY

Representing And Analyzing The Dynamics Of An Agent-Based Adaptive Social Network Model With Partial Integro-Differential Equations, Hiroki Sayama

Northeast Journal of Complex Systems (NEJCS)

We formulated and analyzed a set of partial integro-differential equations that capture the dynamics of our adaptive network model of social fragmentation involving behavioral diversity of agents. Previous results showed that, if the agents’ cultural tolerance levels were diversified, the social network could remain connected while maintaining cultural diversity. Here we converted the original agent-based model into a continuous equation-based one so we can gain more theoretical insight into the model dynamics. We restricted the node states to 1-D continuous values and assumed the network size was very large. As a result, we represented the whole system as a set ...


Toward Suicidal Ideation Detection With Lexical Network Features And Machine Learning, Ulya Bayram, William Lee, Daniel Santel, Ali Minai, Peggy Clark, Tracy Glauser, John Pestian 2022 Çanakkale Onsekiz Mart University

Toward Suicidal Ideation Detection With Lexical Network Features And Machine Learning, Ulya Bayram, William Lee, Daniel Santel, Ali Minai, Peggy Clark, Tracy Glauser, John Pestian

Northeast Journal of Complex Systems (NEJCS)

In this study, we introduce a new network feature for detecting suicidal ideation from clinical texts and conduct various additional experiments to enrich the state of knowledge. We evaluate statistical features with and without stopwords, use lexical networks for feature extraction and classification, and compare the results with standard machine learning methods using a logistic classifier, a neural network, and a deep learning method. We utilize three text collections. The first two contain transcriptions of interviews conducted by experts with suicidal (n=161 patients that experienced severe ideation) and control subjects (n=153). The third collection consists of interviews conducted ...


Bistability And Switching Behavior In Moving Animal Groups, Daniel Strömbom, Stephanie Nickerson, Catherine Futterman, Alyssa DiFazio, Cameron Costello, Kolbjørn Tunstrøm 2022 Lafayette College

Bistability And Switching Behavior In Moving Animal Groups, Daniel Strömbom, Stephanie Nickerson, Catherine Futterman, Alyssa Difazio, Cameron Costello, Kolbjørn Tunstrøm

Northeast Journal of Complex Systems (NEJCS)

Moving animal groups such as schools of fish and flocks of birds frequently switch between different group structures. Standard models of collective motion have been used successfully to explain how stable groups form via local interactions between individuals, but they are typically unable to produce groups that exhibit spontaneous switching. We are only aware of one model, constructed for barred flagtail fish that are known to rely on alignment and attraction to organize their collective motion, that has been shown to generate this type of behavior in 2D (or 3D). Interestingly, another species of fish, golden shiners, do exhibit switching ...


Detecting Iot Attacks Using An Ensemble Machine Learning Model, Vikas Tomar, Sachin Sharma 2022 Graphic Era Deemed to be University

Detecting Iot Attacks Using An Ensemble Machine Learning Model, Vikas Tomar, Sachin Sharma

Articles

Malicious attacks are becoming more prevalent due to the growing use of Internet of Things (IoT) devices in homes, offices, transportation, healthcare, and other locations. By incorporating fog computing into IoT, attacks can be detected in a short amount of time, as the distance between IoT devices and fog devices is smaller than the distance between IoT devices and the cloud. Machine learning is frequently used for the detection of attacks due to the huge amount of data available from IoT devices. However, the problem is that fog devices may not have enough resources, such as processing power and memory ...


An Optimized Machine Learing Framework For Extracting Suicide Factors Using K-Means++ Clustering, Naren S R Mr., Thirumal P C Dr., Sudharson D Dr. 2022 Kumaraguru College of Technology, Coimbatore, India

An Optimized Machine Learing Framework For Extracting Suicide Factors Using K-Means++ Clustering, Naren S R Mr., Thirumal P C Dr., Sudharson D Dr.

International Journal of Computer Science and Informatics

Suicide has emerged as one of the serious problems which should be eradicated from the society. People with suicidal thoughts restrict themselves by not expressing thoughts to the people around them. Studies have shown that people show more interest in expressing their thoughts over social media platforms. So, research has been conducted to identify people with suicidal ideation by analyzing the posts which they posted in social media platforms. Certain studies mined out new factors which influenced people to commit suicide, but those factors had certain drawbacks in it. This paper mainly focuses on overcoming those drawbacks in the factors ...


Faster Multidimensional Data Queries On Infrastructure Monitoring Systems, Yinghua Qin, Gheorghi Guzun 2022 San Jose State University

Faster Multidimensional Data Queries On Infrastructure Monitoring Systems, Yinghua Qin, Gheorghi Guzun

Faculty Research, Scholarly, and Creative Activity

The analytics in online performance monitoring systems have often been limited due to the query performance of large scale multidimensional data. In this paper, we introduce a faster query approach using the bit-sliced index (BSI). Our study covers multidimensional grouping and preference top-k queries with the BSI, algorithms design, time complexity evaluation, and the query time comparison on a real-time production performance monitoring system. Our research work extended the BSI algorithms to cover attributes filtering and multidimensional grouping. We evaluated the query time with the single attribute, multiple attributes, feature filtering, and multidimensional grouping. To compare with the existing prior ...


Tourism Decision Making System & Auto Guidance Technique Using Data Analytics, Asik Rahaman Jamader Mr., Puja Das Ms., Biswaranjan Acharya Mr., Sandhya Makkar Dr. 2022 Dept. of Tourism & Hotel Management , Penguin School of Hotel Management, Kolkata, India

Tourism Decision Making System & Auto Guidance Technique Using Data Analytics, Asik Rahaman Jamader Mr., Puja Das Ms., Biswaranjan Acharya Mr., Sandhya Makkar Dr.

International Journal of Computer Science and Informatics

A unique Tourism Decision Making System TDMS) describes and evaluates the evaluation of research and developments in information technology meant for pronouncement sustain as well as examination during the sector of visiting the attractions. Individuals in the tourism sector are classified according to their decision-making technologies. The current trends and growth directions of choice help technologies were analysed for visitors from various advertising categories. The potential to provide customising, augmentation, and help for visitors at all phases of their trips by integrating modern automated approaches with GIS capabilities demonstrates the need for breakthroughs in digital advanced analytics.


Smart Hospitality And Secure Tourism Management Using Blockchain Technology: Beshostm Approach, Asik Rahaman Jamader Mr, Puja Das Ms., Biswaranjan Acharya Mr., Sandhya Makkar Dr. 2022 Dept. of Tourism & Hotel Management, Penguin School of Hotel Management, Kolkata, India

Smart Hospitality And Secure Tourism Management Using Blockchain Technology: Beshostm Approach, Asik Rahaman Jamader Mr, Puja Das Ms., Biswaranjan Acharya Mr., Sandhya Makkar Dr.

International Journal of Computer Science and Informatics

Throughout the age of 5G technology, the majority of contactless banking is made via software that is enabled by a wide range of financial platforms. Several alternative financing channels provide access to a variety of services. The opportunity for hackers to engage in nefarious behaviour such as payment account hacking, identity theft, and payment system assaults stages of clearances with e-tourism, monetary information is kept in a database. Payment issues can be caused by a centralised cloud server. Throughout the periods of heavy congestion, the abovementioned problems are solvable by utilising a decentralised system like blockchain, it allows for the ...


Diabetes Prediction: A Study Of Various Classification Based Data Mining Techniques, Sipra Sahoo, Tushar Mitra, Arup Kumar Mohanty, Bharat Jyoti Ranjan Sahoo, Smita Rath 2022 Siksha O Anusandhan Deemed to be University

Diabetes Prediction: A Study Of Various Classification Based Data Mining Techniques, Sipra Sahoo, Tushar Mitra, Arup Kumar Mohanty, Bharat Jyoti Ranjan Sahoo, Smita Rath

International Journal of Computer Science and Informatics

Data Mining is an integral part of KDD (Knowledge Discovery in Databases) process. It deals with discovering unknown patterns and knowledge hidden in data. Classification is a pivotal data mining technique with a very wide range of applications. Now a day’s diabetic has become a major disease which has almost crippled people across the globe. It is a medical condition that causes the metabolism to become dysfunctional and increases the blood sugar level in the body and it becomes a major concern for medical practitioner and people at large. An early diagnosis is the starting point for living well ...


“Fame”: Fspying & Solving Firewall Anomalies, B LAKSHIMIBHARGAVI, V MARUTI PRASAD 2022 MITS, MADANAPALLE ,A.P,India

“Fame”: Fspying & Solving Firewall Anomalies, B Lakshimibhargavi, V Maruti Prasad

International Journal of Communication Networks and Security

No abstract provided.


Digital Commons powered by bepress