Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Association of Arab Universities (8)
- California Polytechnic State University, San Luis Obispo (7)
- University of Tennessee, Knoxville (7)
- Louisiana State University (3)
- University of Massachusetts Amherst (3)
-
- Air Force Institute of Technology (2)
- Chapman University (2)
- Kennesaw State University (2)
- Michigan Technological University (2)
- Southern Methodist University (2)
- University of Kentucky (2)
- University of Nebraska - Lincoln (2)
- Embry-Riddle Aeronautical University (1)
- Florida International University (1)
- Penn State Dickinson Law (1)
- Purdue University (1)
- Selected Works (1)
- SelectedWorks (1)
- Technological University Dublin (1)
- The University of Akron (1)
- University of Dayton (1)
- University of New Mexico (1)
- University of North Florida (1)
- Virginia Commonwealth University (1)
- West Virginia University (1)
- Western University (1)
- Keyword
-
- Machine learning (4)
- Computer Vision (3)
- Deep Learning (3)
- Machine Learning (3)
- Security (3)
-
- Computer Engineering (2)
- Deep learning (2)
- Image Processing (2)
- Random forest (2)
- Signal Processing (2)
- 3D Printing (1)
- AUV (1)
- Academic -- UNF -- Engineering; Blockchain (1)
- Academic -- UNF -- Master of Science in Electrical Engineering; Dissertations (1)
- Accessibility (1)
- Adaptive Learning Environment (1)
- Adaptive Learning System (1)
- Adaptive OFDM (1)
- Additive Manufacturing (1)
- Adversarial machine learning (1)
- Analyzer (1)
- Angular-axes features (1)
- Animal (1)
- Arduino (1)
- Artificial Intelligence (AI) (1)
- Audio (1)
- Augmented (1)
- Benefits of AI (1)
- Bias in AI Systems (1)
- Big Data (1)
- Publication Year
- Publication
-
- Future Computing and Informatics Journal (8)
- Doctoral Dissertations (7)
- Computer Engineering (4)
- Masters Theses (3)
- Theses and Dissertations (3)
-
- Dissertations, Master's Theses and Master's Reports (2)
- Electrical Engineering (2)
- Engineering Faculty Articles and Research (2)
- LSU Doctoral Dissertations (2)
- Library Philosophy and Practice (e-journal) (2)
- Symposium of Student Scholars (2)
- Theses and Dissertations--Electrical and Computer Engineering (2)
- Annual ADFSL Conference on Digital Forensics, Security and Law (1)
- Articles (1)
- Computer Science and Engineering Theses and Dissertations (1)
- Dickinson Law Review (2017-Present) (1)
- Electrical Engineering Theses and Dissertations (1)
- Electrical and Computer Engineering ETDs (1)
- Electrical and Computer Engineering Faculty Publications (1)
- Electronic Thesis and Dissertation Repository (1)
- Emmanouil Alexander Zografakis EZ (1)
- FIU Electronic Theses and Dissertations (1)
- Graduate Theses, Dissertations, and Problem Reports (1)
- LSU Master's Theses (1)
- Master's Theses (1)
- Russell C. Hardie (1)
- The Summer Undergraduate Research Fellowship (SURF) Symposium (1)
- UNF Graduate Theses and Dissertations (1)
- Williams Honors College, Honors Research Projects (1)
- Publication Type
- File Type
Articles 1 - 30 of 56
Full-Text Articles in Signal Processing
Cyberinet: Integrated Semi-Modular Sensors For The Computer-Augmented Clarinet, Matthew Bardin
Cyberinet: Integrated Semi-Modular Sensors For The Computer-Augmented Clarinet, Matthew Bardin
LSU Doctoral Dissertations
The Cyberinet is a new Augmented instrument designed to easily and intuitively provide a method of computer-enhanced performance to the Clarinetist to allow for greater control and expressiveness in a performance. A performer utilizing the Cyberinet is able to seamlessly switch between a traditional performance setting and an augmented one. Towards this, the Cyberinet is a hardware replacement for a portion of a Clarinet containing a variety of sensors embedded within the unit. These sensors collect various real time data motion data of the performer and air fow within the instrument. Additional sensors can be connected to the Cyberinet to …
An Enhanced Adaptive Learning System Based On Microservice Architecture, Abdelsalam Helmy Ibrahim, Mohamed Eliemy, Aliaa Abdelhalim Youssif
An Enhanced Adaptive Learning System Based On Microservice Architecture, Abdelsalam Helmy Ibrahim, Mohamed Eliemy, Aliaa Abdelhalim Youssif
Future Computing and Informatics Journal
This study aims to enhance Adaptive Learning Systems (ALS) in Petroleum Sector in Egypt by using the Microservice Architecture and measure the impact of enhancing ALS by participating ALS users through a statistical study and questionnaire directed to them if they accept to apply the Cloud Computing Service “Microservices” to enhance the ALS performance, quality and cost value or not. The study also aims to confirm that there is a statistically significant relationship between ALS and Cloud Computing Service “Microservices” and prove the impact of enhancing the ALS by using Microservices in the cloud in Adaptive Learning in the Egyptian …
Visual Question Answering: A Survey, Gehad Assem El-Naggar
Visual Question Answering: A Survey, Gehad Assem El-Naggar
Future Computing and Informatics Journal
Visual Question Answering (VQA) has been an emerging field in computer vision and natural language processing that aims to enable machines to understand the content of images and answer natural language questions about them. Recently, there has been increasing interest in integrating Semantic Web technologies into VQA systems to enhance their performance and scalability. In this context, knowledge graphs, which represent structured knowledge in the form of entities and their relationships, have shown great potential in providing rich semantic information for VQA. This paper provides an abstract overview of the state-of-the-art research on VQA using Semantic Web technologies, including knowledge …
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Library Philosophy and Practice (e-journal)
Abstract
Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …
Device Free Indoor Localization Of Human Target Using Wifi Fingerprinting, Prasanga Neupane
Device Free Indoor Localization Of Human Target Using Wifi Fingerprinting, Prasanga Neupane
LSU Master's Theses
Indoor localization of human objects has many important applications nowadays. Proposed here is a new device free approach where all the transceiver devices are fixed in an indoor environment so that the human target doesn't need to carry any transceiver device with them. This work proposes radio-frequency fingerprinting for the localization of human targets which makes this even more convenient as radio-frequency wireless signals can be easily acquired using an existing wireless network in an indoor environment. This work explores different avenues for optimal and effective placement of transmitter devices for better localization. In this work, an experimental environment is …
Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami
Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami
Future Computing and Informatics Journal
This is a systematic literature review to reflect the previous studies that dealt with credit card fraud detection and highlight the different machine learning techniques to deal with this problem. Credit cards are now widely utilized daily. The globe has just begun to shift toward financial inclusion, with marginalized people being introduced to the financial sector. As a result of the high volume of e-commerce, there has been a significant increase in credit card fraud. One of the most important parts of today's banking sector is fraud detection. Fraud is one of the most serious concerns in terms of monetary …
Machine Learning Based Medical Image Deepfake Detection: A Comparative Study, Siddharth Solaiyappan, Yuxin Wen
Machine Learning Based Medical Image Deepfake Detection: A Comparative Study, Siddharth Solaiyappan, Yuxin Wen
Engineering Faculty Articles and Research
Deep generative networks in recent years have reinforced the need for caution while consuming various modalities of digital information. One avenue of deepfake creation is aligned with injection and removal of tumors from medical scans. Failure to detect medical deepfakes can lead to large setbacks on hospital resources or even loss of life. This paper attempts to address the detection of such attacks with a structured case study. Specifically, we evaluate eight different machine learning algorithms, which include three conventional machine learning methods (Support Vector Machine, Random Forest, Decision Tree) and five deep learning models (DenseNet121, DenseNet201, ResNet50, ResNet101, VGG19) …
Three Wave Mixing In Epsilon-Near-Zero Plasmonic Waveguides For Signal Regeneration, Nicholas Mirchandani, Mark C. Harrison
Three Wave Mixing In Epsilon-Near-Zero Plasmonic Waveguides For Signal Regeneration, Nicholas Mirchandani, Mark C. Harrison
Engineering Faculty Articles and Research
Vast improvements in communications technology are possible if the conversion of digital information from optical to electric and back can be removed. Plasmonic devices offer one solution due to optical computing’s potential for increased bandwidth, which would enable increased throughput and enhanced security. Plasmonic devices have small footprints and interface with electronics easily, but these potential improvements are offset by the large device footprints of conventional signal regeneration schemes, since surface plasmon polaritons (SPPs) are incredibly lossy. As such, there is a need for novel regeneration schemes. The continuous, uniform, and unambiguous digital information encoding method is phase-shift-keying (PSK), so …
Synthesizing Dysarthric Speech Using Multi-Speaker Tts For Dsyarthric Speech Recognition, Mohammad Soleymanpour
Synthesizing Dysarthric Speech Using Multi-Speaker Tts For Dsyarthric Speech Recognition, Mohammad Soleymanpour
Theses and Dissertations--Electrical and Computer Engineering
Dysarthria is a motor speech disorder often characterized by reduced speech intelligibility through slow, uncoordinated control of speech production muscles. Automatic Speech recognition (ASR) systems may help dysarthric talkers communicate more effectively. However, robust dysarthria-specific ASR requires a significant amount of training speech is required, which is not readily available for dysarthric talkers.
In this dissertation, we investigate dysarthric speech augmentation and synthesis methods. To better understand differences in prosodic and acoustic characteristics of dysarthric spontaneous speech at varying severity levels, a comparative study between typical and dysarthric speech was conducted. These characteristics are important components for dysarthric speech modeling, …
Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire
Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire
Graduate Theses, Dissertations, and Problem Reports
Facial recognition systems play a vital role in our everyday lives. We rely on this technology from menial tasks to issues as vital as national security. While strides have been made over the past ten years to improve facial recognition systems, morphed face images are a viable threat to the reliability of these systems. Morphed images are generated by combining the face images of two subjects. The resulting morphed face shares the likeness of the contributing subjects, confusing both humans and face verification algorithms. This vulnerability has grave consequences for facial recognition systems used on international borders or for law …
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Dickinson Law Review (2017-Present)
For nearly as long as there have been photographs and videos, people have been editing and manipulating them to make them appear to be something they are not. Usually edited or manipulated photographs are relatively easy to detect, but those days are numbered. Technology has no morality; as it advances, so do the ways it can be misused. The lack of morality is no clearer than with deepfake technology.
People create deepfakes by inputting data sets, most often pictures or videos into a computer. A series of neural networks attempt to mimic the original data set until they are nearly …
Design Project: 3d Printer/Injection Molder Hybrid, Lee Paolucci, Luke Everhart, Brandon Leap, Karson Lorey
Design Project: 3d Printer/Injection Molder Hybrid, Lee Paolucci, Luke Everhart, Brandon Leap, Karson Lorey
Williams Honors College, Honors Research Projects
In the realm of rapid, small-scale prototyping, there are a few main factors that drive decisions to invest resources in technology to make that prototyping possible. Cost and ease of use are two of the most influential when looking at most SMEs (Small to Medium-sized Enterprises). The U.S. Small Business Administration defines an SME as smaller than 1,250 employees. According to An Assessment of Implementation of Entry-Level 3D Printers from the Perspective of Small Businesses, 59% of small manufacturers had implemented 3D printers as of 2014. However, no matter what technology is used in rapid prototyping, there are common …
Adapting Deep Learning For Underwater Acoustic Communication Channel Modeling, Li Wei
Adapting Deep Learning For Underwater Acoustic Communication Channel Modeling, Li Wei
Dissertations, Master's Theses and Master's Reports
The recent emerging applications of novel underwater systems lead to increasing demand for underwater acoustic (UWA) communication and networking techniques. However, due to the challenging UWA channel characteristics, conventional wireless techniques are rarely applicable to UWA communication and networking. The cognitive and software-defined communication and networking are considered promising architecture of a novel UWA system design. As an essential component of a cognitive communication system, the modeling and prediction of the UWA channel impulse response (CIR) with deep generative models are studied in this work.
Firstly, an underwater acoustic communication and networking testbed is developed for conducting various simulations and …
An Experimental Study Towards Underwater Propulsion System Using Structure Borne Traveling Waves, Shreyas Suhas Gadekar
An Experimental Study Towards Underwater Propulsion System Using Structure Borne Traveling Waves, Shreyas Suhas Gadekar
Dissertations, Master's Theses and Master's Reports
The method of generating steady-state structure-borne traveling waves underwater in an infinite media creates abundant opportunities in the field of propulsive applications, and they are gaining attention from several researchers. This experimental study provides a framework for harnessing traveling waves in a 1D beam immersed under quiescent water using two force input methods and providing a motion to an object floating on the surface of the water.
In this study, underwater traveling waves are tailored using structural vibrations at five different frequencies in the range of 10Hz to 300Hz. The resulting fluid motion provides a propulsive thrust that moves a …
Enhanced Security Utilizing Side Channel Data Analysis, Michael Taylor
Enhanced Security Utilizing Side Channel Data Analysis, Michael Taylor
Computer Science and Engineering Theses and Dissertations
The physical state of a system is affected by the activities and processes in which it is tasked with carrying out. In the past there have been many instances where such physical changes have been exploited by bad actors in order to gain insight into the operational state and even the data being held on a system. This method of side channel exploitation is very often effective due to the relative difficulty of obfuscating activity on a physical level. However, in order to take advantage of side channel data streams one must have a detailed working knowledge of how a …
The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami
The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami
Future Computing and Informatics Journal
It is possible to learn more quickly and effectively with e-learning software development because it provides learners with convenient and flexible learning environments. This allows them to progress further in their careers. Reports on web-based e-learning systems for in-service education have frequently neglected to include the viewpoint of the instructor. In order to conduct quantitative research, a sample of 50 academic staff members was selected. The purpose of this study was to investigate various factors that influence the intention to use web-based e-learning, with the theoretical foundation being provided by university lecturers. According to the findings of the study, the …
Image Hiding Using Qr Factorization And Discrete Wavelet Transform Techniques, Reham Ahmed El-Shahed, Maryam Al-Berry, Hala Ebied, Howida Shedeed
Image Hiding Using Qr Factorization And Discrete Wavelet Transform Techniques, Reham Ahmed El-Shahed, Maryam Al-Berry, Hala Ebied, Howida Shedeed
Future Computing and Informatics Journal
Steganography is one of the most important tools in the data security field as there is a huge amount of data transferred each moment over the internet. Hiding secret messages in an image has been widely used because the images are mostly used in social media applications. The proposed algorithm is a simple algorithm for hiding an image in another image. The proposed technique uses QR factorization to conceal the secret image. The technique successfully hid a gray and color image in another one and the performance of the algorithm was measured by PSNR, SSIM and NCC. The PSNR for …
Review Of Data Mining Techniques For Detecting Churners In The Telecommunication Industry, Mahmoud Ewieda, Mohamed Ismail Roushdy, Essam Shaaban
Review Of Data Mining Techniques For Detecting Churners In The Telecommunication Industry, Mahmoud Ewieda, Mohamed Ismail Roushdy, Essam Shaaban
Future Computing and Informatics Journal
The telecommunication sector has been developed rapidly and with large amounts of data obtained as a result of increasing in the number of subscribers, modern techniques, data-based applications, and services. As well as better awareness of customer requirements and excellent quality that meets their satisfaction. This satisfaction raises rivalry between firms to maintain the quality of their services and upgrade them. These data can be helpfully extracted for analysis and used for predicting churners. Researchers around the world have conducted important research to understand the uses of Data mining (DM) that can be used to predict customers' churn. This …
Framework For Collecting Data From Iot Device, Md Saiful Islam
Framework For Collecting Data From Iot Device, Md Saiful Islam
Symposium of Student Scholars
The Internet of Things (IoT) is the most significant and blooming technology in the 21st century. IoT has rapidly developed by covering hundreds of applications in the civil, health, military, and agriculture areas. IoT is based on the collection of sensor data through an embedded system, and this embedded system uploads the data on the internet. Devices and sensor technologies connected over a network can monitor and measure data in real-time. The main challenge is to collect data from IoT devices, transmit them to store in the Cloud, and later retrieve them at any time for visualization and data analysis. …
Data Analysis Methods For Health Monitoring Sensors, Shahriar Sobhan
Data Analysis Methods For Health Monitoring Sensors, Shahriar Sobhan
Symposium of Student Scholars
Innovations in health monitoring systems are fundamental for the continuous improvement of remote healthcare. With the current presence of SARS-CoV-2, better known as COVID-19, in people’s daily lives, solutions for monitoring heart and especially respiration and pulmonary functions are more needed than ever. Besides, health monitoring systems are widely used for patients who need isolated care, unconscious patients who cannot get medical attention for themselves. As it is well-known, monitoring systems rely on sensor technologies. Currently, there are multiple research studies for remote monitoring using different types of sensors. In this effort, we survey the current approaches that utilize the …
Multilayer Perceptron With Auto Encoder Enabled Deep Learning Model For Recommender Systems, Subhashini Narayan
Multilayer Perceptron With Auto Encoder Enabled Deep Learning Model For Recommender Systems, Subhashini Narayan
Future Computing and Informatics Journal
In this modern world of ever-increasing one-click purchases, movie bookings, music, health- care, fashion, the need for recommendations have increased the more. Google, Netflix, Spotify, Amazon and other tech giants use recommendations to customize and tailor their search engines to suit the user’s interests. Many of the existing systems are based on older algorithms which although have decent accuracies, require large training and testing datasets and with the emergence of deep learning, the accuracy of algorithms has further improved, and error rates have reduced due to the use of multiple layers. The need for large datasets has declined as well. …
Deep Feature Learning For Fog Episodes Prediction In Patients With Pd, Hadeer Elziaat, Nashwa El-Bendary, Ramdan Mowad
Deep Feature Learning For Fog Episodes Prediction In Patients With Pd, Hadeer Elziaat, Nashwa El-Bendary, Ramdan Mowad
Future Computing and Informatics Journal
A common symptom of Parkinson's Disease is Freezing of Gait (FoG) that causes an interrupt of the forward progression of the patient’s feet while walking. Therefore, Freezing of Gait episodes is always engaged to the patient's falls. This paper proposes a model for Freezing of Gait episodes detection and prediction in patients with Parkinson's Disease. Predicting Freezing of Gait in this paper considers as a multi-class classification problem with 3 classes namely, FoG, pre-FoG, and walking episodes. In this paper, the extracted feature scheme applied for the detection and the prediction of FoG is Convolutional Neural Network (CNN) spectrogram time-frequency …
Towards Secure Deep Neural Networks For Cyber-Physical Systems, Jiangnan Li
Towards Secure Deep Neural Networks For Cyber-Physical Systems, Jiangnan Li
Doctoral Dissertations
In recent years, deep neural networks (DNNs) are increasingly investigated in the literature to be employed in cyber-physical systems (CPSs). DNNs own inherent advantages in complex pattern identifying and achieve state-of-the-art performances in many important CPS applications. However, DNN-based systems usually require large datasets for model training, which introduces new data management issues. Meanwhile, research in the computer vision domain demonstrated that the DNNs are highly vulnerable to adversarial examples. Therefore, the security risks of employing DNNs in CPSs applications are of concern.
In this dissertation, we study the security of employing DNNs in CPSs from both the data domain …
Time Series Data Analysis Using Machine Learning-(Ml) Approach, Mvv Prasad Kantipudi Dr., Pradeep Kumar N.S Dr., S.Sreenath Kashyap Dr., Ss Anusha Vemuri Ms
Time Series Data Analysis Using Machine Learning-(Ml) Approach, Mvv Prasad Kantipudi Dr., Pradeep Kumar N.S Dr., S.Sreenath Kashyap Dr., Ss Anusha Vemuri Ms
Library Philosophy and Practice (e-journal)
Healthcare benefits related to continuous monitoring of human movement and physical activity can potentially reduce the risk of accidents associated with elderly living alone at home. Based on the literature review, it is found that many studies focus on human activity recognition and are still active towards achieving practical solutions to support the elderly care system. The proposed system has introduced a joint approach of machine learning and signal processing technology for the recognition of human's physical movements using signal data generated by accelerometer sensors. The framework adopts the concept of DSP to select very descriptive feature sets and uses …
Energy Considerations In Blockchain-Enabled Applications, Cesar Enrique Castellon Escobar
Energy Considerations In Blockchain-Enabled Applications, Cesar Enrique Castellon Escobar
UNF Graduate Theses and Dissertations
Blockchain-powered smart systems deployed in different industrial applications promise operational efficiencies and improved yields, while mitigating significant cybersecurity risks pertaining to the main application. Associated tradeoffs between availability and security arise at implementation, however, triggered by the additional resources (e.g., memory, computation) required by each blockchain-enabled host. This thesis applies an energy-reducing algorithmic engineering technique for Merkle Tree root and Proof of Work calculations, two principal elements of blockchain computations, as a means to preserve the promised security benefits but with less compromise to system availability. Using pyRAPL, a python library to measure computational energy, we experiment with both the …
A Comparative Evaluation Of The Detection And Tracking Capability Between Novel Event-Based And Conventional Frame-Based Sensors, James P. Boettiger
A Comparative Evaluation Of The Detection And Tracking Capability Between Novel Event-Based And Conventional Frame-Based Sensors, James P. Boettiger
Theses and Dissertations
Traditional frame-based technology continues to suffer from motion blur, low dynamic range, speed limitations and high data storage requirements. Event-based sensors offer a potential solution to these challenges. This research centers around a comparative assessment of frame and event-based object detection and tracking. A basic frame-based algorithm is used to compare against two different event-based algorithms. First event-based pseudo-frames were parsed through standard frame-based algorithms and secondly, target tracks were constructed directly from filtered events. The findings show there is significant value in pursuing the technology further.
Classifying Appliances Operation Modes Using Dynamic Time Warping (Dtw) And K Nearest Neighbors (Knn), Abdelkareem M. Jaradat
Classifying Appliances Operation Modes Using Dynamic Time Warping (Dtw) And K Nearest Neighbors (Knn), Abdelkareem M. Jaradat
Electronic Thesis and Dissertation Repository
In the Smart Grid environment, the advent of intelligent measuring devices facilitates monitoring appliance electricity consumption. This data can be used in applying Demand Response (DR) in residential houses through data analytics, and developing data mining techniques. In this research, we introduce a smart system approach that is applied to user's disaggregated power consumption data. This system encourages the users to apply DR by changing their behaviour of using heavier operation modes to lighter modes, and by encouraging users to shift their usages to off-peak hours. First, we apply Cross Correlation to detect times of the occurrences when an appliance …
Sparsity In Machine Learning: An Information Selecting Perspective, Siwei Feng
Sparsity In Machine Learning: An Information Selecting Perspective, Siwei Feng
Doctoral Dissertations
Today we are living in a world awash with data. Large volumes of data are acquired, analyzed and applied to tasks through machine learning algorithms in nearly every area of science, business, and industry. For example, medical scientists analyze the gene expression data from a single specimen to learn the underlying causes of disease (e.g. cancer) and choose the best treatment; retailers can know more about customers' shopping habits from retail data to adjust their business strategies to better appeal to customers; suppliers can enhance supply chain success through supply chain systems built on knowledge sharing. However, it is also …
A Novel Indoor Positioning System For Firefighters In Unprepared Scenarios, Vamsi Karthik Vadlamani
A Novel Indoor Positioning System For Firefighters In Unprepared Scenarios, Vamsi Karthik Vadlamani
Electrical and Computer Engineering ETDs
Situational awareness and indoor positioning of firefighters are types of information of paramount importance to the success of search and rescue operations. GPS units are undependable for use in Indoor Positioning Systems due to their associated mar- gins of error in position and their reliance on satellite communication that can be interrupted inside large structures. There are few other techniques like dead reck- oning, Wifi and bluetooth based triangulation, Structure from Motion (SFM) based scene reconstruction for Indoor positioning system. However due to high temper- atures, the rapidly changing environment of fires, and low parallax in the thermal images, the …
Investigating The Effect Of Detecting And Mitigating A Ring Oscillator-Based Hardware Trojan, Lakshmi Ramakrishnan
Investigating The Effect Of Detecting And Mitigating A Ring Oscillator-Based Hardware Trojan, Lakshmi Ramakrishnan
Electrical Engineering Theses and Dissertations
The outsourcing of the manufacturing process of integrated circuits to fabrications plants all over the world has exposed these chips to several security threats, especially at the hardware level. There have been instances of malicious circuitry, such as backdoors, being added to circuits without the knowledge of the chip designers or vendors. Such threats could be immensely powerful and dangerous against confidentiality, among other vulnerabilities.
Defense mechanisms against such attacks have been probed and defense techniques have been developed. But with the passage of time, attack techniques have improved immensely as well. From directly observing the inputs or outputs, adversaries …