Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Attitude determination and control system (ADCS) (1)
- Class scheduling (1)
- Cyber-attacks; cyber-attacks detection; cyber-attacks identification; cybersecurity; False Data Injection (FDI) attacks; cyber resilience; smart grid (1)
- Eye gaze classification (1)
- Eye-tracking (1)
-
- Fault detection and isolation (FDI) (1)
- Identification (1)
- Inventory control (1)
- Knowledge Graph (1)
- Knowledge Graph Completion (1)
- Link Prediction (1)
- Machine Learning (1)
- Metaheuristic algorithm (1)
- Optimal automated university course timetable (1)
- Reaction Wheel (1)
- Reading (1)
- Reading line classification algorithms (1)
- Satellite (1)
- Spacecraft (1)
- Subassembly tracking (1)
- Timing penalty (1)
- Work order identification (1)
- Publication
- Publication Type
Articles 1 - 6 of 6
Full-Text Articles in Engineering
Approaches For Eye-Tracking While Reading, Xiaohao Sun
Approaches For Eye-Tracking While Reading, Xiaohao Sun
Electronic Theses and Dissertations
In this thesis, we developed an algorithm to detect the correct line being read by participants. The comparisons of the reading line classification algorithms are demonstrated using eye-tracking data collected from a realistic reading experiment in front of a low-cost desktop-mounted eye-tracker. With the development of eye-tracking techniques, research begins to aim at trying to understand information from the eyes. However, state of the art in eye-tracking applications is affected by a large amount of measurement noise. Even the expensive eye-trackers still suffer significant noise. In addition, the inherent characteristics of gaze movement increase the difficulty of obtaining valuable information …
Reaction Wheels Fault Isolation Onboard 3-Axis Controlled Satellite Using Enhanced Random Forest With Multidomain Features, Mofiyinoluwa Oluwatobi Folami
Reaction Wheels Fault Isolation Onboard 3-Axis Controlled Satellite Using Enhanced Random Forest With Multidomain Features, Mofiyinoluwa Oluwatobi Folami
Electronic Theses and Dissertations
With the increasing number of satellite launches throughout the years, it is only natural that an interest in the safety and monitoring of these systems would increase as well. However, as a system becomes more complex it becomes difficult to generate a high-fidelity model that accurately describes all the system components. With such constraints using data-driven approaches becomes a more feasible option. One of the most commonly used actuators in spacecraft is known as the reaction wheel. If these reaction wheels are not maintained or monitored, it could result in mission failure and unwarranted costs. That is why fault detection …
Meta-Heuristic Approach For Course Scheduling Problem, Amanta Sunny
Meta-Heuristic Approach For Course Scheduling Problem, Amanta Sunny
Electronic Theses and Dissertations
Nowadays, much research is being carried out to find efficient algorithms for optimal automated university course timetable problems (UCTP). UCTP allocates the university's events like lectures, exams to the various resources, including instructors, students, lecture time and classrooms. Class scheduling is one of the biggest challenging problems of educational institutions. In this thesis, the aim is to improve the state-of-art for a class scheduling problem considering some hard and soft constraints. Hard constraints must be satisfied. Soft constraints need not be satisfied, but there is a penalty for each soft constraint violation. We also have a timing penalty for scheduling …
Hrotate: Hybrid Relational Rotation Embedding For Knowledge Graph, Akshay Mukundbhai Shah
Hrotate: Hybrid Relational Rotation Embedding For Knowledge Graph, Akshay Mukundbhai Shah
Electronic Theses and Dissertations
Knowledge Graph (KG) represents the real world's information in the form of triplets (head, relation, and tail). However, most KGs are generated manually or semi-automatically, which resulted in an enormous number of missing information in a KG. The goal of a Knowledge-Graph Completion task is to predict missing links in a given Knowledge Graph. Various approaches exist to predict a missing link in a KG. However, the most prominent approaches are based on tensor factorization and Knowledge-Graph embeddings, such as RotatE and SimplE. The RotatE model depicts each relation as a rotation from the source entity (Head) to the target …
Work Order And Subassembly Identification And Tracking System, Israa El-Sabbagh
Work Order And Subassembly Identification And Tracking System, Israa El-Sabbagh
Electronic Theses and Dissertations
The research encompassed in this thesis includes the development of a work order and subassembly identification and tracking software system created in-house and tested at SPM Automation (Canada) Inc. The research is motivated by the significant losses the company is enduring and the recurring problems occurring at the facility (i.e., excess inventory, late ordering, reordering, misplaced components, etc.). These problems are critical in the progress and profits of the company.
An extensive literature review was completed, and the research gaps were presented. The optimal work order and subassembly process was created using Process Mapping Methodology, Cause-and-Effect Diagrams, and 5Why Analysis. …
Emerging Challenges In Smart Grid Cybersecurity Enhancement: A Review, Fazel Mohammadi
Emerging Challenges In Smart Grid Cybersecurity Enhancement: A Review, Fazel Mohammadi
Electrical and Computer Engineering Publications
In this paper, a brief survey of measurable factors affecting the adoption of cybersecurity enhancement methods in the smart grid is provided. From a practical point of view, it is a key point to determine to what degree the cyber resilience of power systems can be improved using cost-effective resilience enhancement methods. Numerous attempts have been made to the vital resilience of the smart grid against cyber-attacks. The recently proposed cybersecurity methods are considered in this paper, and their accuracies, computational time, and robustness against external factors in detecting and identifying False Data Injection (FDI) attacks are evaluated. There is …