Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Arkansas, Fayetteville (4)
- Association of Arab Universities (3)
- West Virginia University (3)
- City University of New York (CUNY) (2)
- Louisiana State University (2)
-
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (2)
- American University in Cairo (1)
- California Polytechnic State University, San Luis Obispo (1)
- Claremont Colleges (1)
- Clemson University (1)
- Florida International University (1)
- Michigan Technological University (1)
- Southern Methodist University (1)
- Tashkent State Technical University (1)
- The University of Akron (1)
- Union College (1)
- University of Massachusetts Amherst (1)
- University of Nebraska - Lincoln (1)
- Keyword
-
- Machine Learning (3)
- Reliability (3)
- Algorithm. (2)
- Battery (2)
- Controller (2)
-
- Cybersecurity (2)
- Deep Learning (2)
- Diesel generator (2)
- Energy converter (2)
- Lattices (2)
- Radar (2)
- Signal processing (2)
- Solar panel (2)
- Supercapacitor (2)
- Wind generator (2)
- 7 Hertz. (1)
- AGC (1)
- Adversarial Examples (1)
- Adversarial Learning (1)
- Amplifier (1)
- Autoencoders (1)
- Automatic Generation Control (1)
- Babai point (1)
- Backup (1)
- Base station controller (1)
- Base transceiver station (1)
- Bayesian Compressive Sensing (1)
- Bi-objective Dijkstra (1)
- Biometrics (1)
- Calibration (1)
- Publication
-
- Future Computing and Informatics Journal (3)
- Graduate Theses and Dissertations (3)
- Graduate Theses, Dissertations, and Problem Reports (3)
- Publications and Research (2)
- Scientific-technical journal (2)
-
- All Theses (1)
- Chemical Technology, Control and Management (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
- Dissertations, Master's Theses and Master's Reports (1)
- Electrical Engineering Theses and Dissertations (1)
- FIU Electronic Theses and Dissertations (1)
- Honors Theses (1)
- Journal of Humanistic Mathematics (1)
- LSU Doctoral Dissertations (1)
- LSU Master's Theses (1)
- Library Philosophy and Practice (e-journal) (1)
- Master's Theses (1)
- Masters Theses (1)
- Theses and Dissertations (1)
- Williams Honors College, Honors Research Projects (1)
- Publication Type
Articles 1 - 28 of 28
Full-Text Articles in Signal Processing
Network Management, Optimization And Security With Machine Learning Applications In Wireless Networks, Mariam Nabil
Network Management, Optimization And Security With Machine Learning Applications In Wireless Networks, Mariam Nabil
Theses and Dissertations
Wireless communication networks are emerging fast with a lot of challenges and ambitions. Requirements that are expected to be delivered by modern wireless networks are complex, multi-dimensional, and sometimes contradicting. In this thesis, we investigate several types of emerging wireless networks and tackle some challenges of these various networks. We focus on three main challenges. Those are Resource Optimization, Network Management, and Cyber Security. We present multiple views of these three aspects and propose solutions to probable scenarios. The first challenge (Resource Optimization) is studied in Wireless Powered Communication Networks (WPCNs). WPCNs are considered a very promising approach towards sustainable, …
Analysis Of Deep Learning Methods For Wired Ethernet Physical Layer Security Of Operational Technology, Lucas Torlay
Analysis Of Deep Learning Methods For Wired Ethernet Physical Layer Security Of Operational Technology, Lucas Torlay
All Theses
The cybersecurity of power systems is jeopardized by the threat of spoofing and man-in-the-middle style attacks due to a lack of physical layer device authentication techniques for operational technology (OT) communication networks. OT networks cannot support the active probing cybersecurity methods that are popular in information technology (IT) networks. Furthermore, both active and passive scanning techniques are susceptible to medium access control (MAC) address spoofing when operating at Layer 2 of the Open Systems Interconnection (OSI) model. This thesis aims to analyze the role of deep learning in passively authenticating Ethernet devices by their communication signals. This method operates at …
Indoor Positioning Using Synchronized Ultrasonic Ofdma Signals, Julian Bartolone
Indoor Positioning Using Synchronized Ultrasonic Ofdma Signals, Julian Bartolone
Master's Theses
This paper proposes a method of short-range indoor localization using differential phase measurements of synchronized two-tone ultrasonic signals in an Orthogonal Frequency Multiple Access (OFDMA) scheme. This indoor positioning system (IPS) operates at an ultrasonic frequency of approximately 40kHz and synchronizes using an infrared signal. The OFDMA scheme allows for a receiver to process the signals from multiple transmitters continuously without the signals interfering with each other. The phases of the signals are measured using Goertzel Filters, allowing for low-complexity frequency content analysis. A MATLAB simulation using the proposed localization method is performed using four transmitter nodes in the corners …
The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami
The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami
Future Computing and Informatics Journal
It is possible to learn more quickly and effectively with e-learning software development because it provides learners with convenient and flexible learning environments. This allows them to progress further in their careers. Reports on web-based e-learning systems for in-service education have frequently neglected to include the viewpoint of the instructor. In order to conduct quantitative research, a sample of 50 academic staff members was selected. The purpose of this study was to investigate various factors that influence the intention to use web-based e-learning, with the theoretical foundation being provided by university lecturers. According to the findings of the study, the …
Sonnet Ansi/Vita 49.2-2017, Sec. 9.13.3, Bruce Mcguffin
Sonnet Ansi/Vita 49.2-2017, Sec. 9.13.3, Bruce Mcguffin
Journal of Humanistic Mathematics
A discussion of the contents of the Data Packet Payload Format Field in an ANSI/VITA 49.2 compliant data packet in the form of a Sonnet.
On Communication For Distributed Babai Point Computation, Maiara F. Bollauf, Vinay A. Vaishampayan, Sueli I.R. Costa
On Communication For Distributed Babai Point Computation, Maiara F. Bollauf, Vinay A. Vaishampayan, Sueli I.R. Costa
Publications and Research
We present a communication-efficient distributed protocol for computing the Babai point, an approximate nearest point for a random vector X∈Rn in a given lattice. We show that the protocol is optimal in the sense that it minimizes the sum rate when the components of X are mutually independent. We then investigate the error probability, i.e. the probability that the Babai point does not coincide with the nearest lattice point, motivated by the fact that for some cases, a distributed algorithm for finding the Babai point is sufficient for finding the nearest lattice point itself. Two different probability models for X …
Review Of Data Mining Techniques For Detecting Churners In The Telecommunication Industry, Mahmoud Ewieda, Mohamed Ismail Roushdy, Essam Shaaban
Review Of Data Mining Techniques For Detecting Churners In The Telecommunication Industry, Mahmoud Ewieda, Mohamed Ismail Roushdy, Essam Shaaban
Future Computing and Informatics Journal
The telecommunication sector has been developed rapidly and with large amounts of data obtained as a result of increasing in the number of subscribers, modern techniques, data-based applications, and services. As well as better awareness of customer requirements and excellent quality that meets their satisfaction. This satisfaction raises rivalry between firms to maintain the quality of their services and upgrade them. These data can be helpfully extracted for analysis and used for predicting churners. Researchers around the world have conducted important research to understand the uses of Data mining (DM) that can be used to predict customers' churn. This …
Precoder Design For Communication-Efficient Distributed Mimo Receivers With Controlled Peak-Average Power Ratio, Vinay A. Vaishampayan
Precoder Design For Communication-Efficient Distributed Mimo Receivers With Controlled Peak-Average Power Ratio, Vinay A. Vaishampayan
Publications and Research
We consider the problem of communicating over a relay-assisted multiple-input multiple-output (MIMO) channel with additive noise, in which physically separated relays forward quantized information to a central decoder where the transmitted message is to be decoded. We assume that channel state information is available in the transmitter and show that the design of a rational-forcing precoder - a precoder which is matched to the quantizers used in the relays - is beneficial for reducing the symbol error probability. It turns out that for such rational-forcing precoder based systems, there is natural tradeoff between the peak to average power ratio in …
Efficiently Estimating Survival Signature And Two-Terminal Reliability Of Heterogeneous Networks Through Multi-Objective Optimization, Daniel Bruno Lopes Da Silva
Efficiently Estimating Survival Signature And Two-Terminal Reliability Of Heterogeneous Networks Through Multi-Objective Optimization, Daniel Bruno Lopes Da Silva
Graduate Theses and Dissertations
The two-terminal reliability problem is a classical reliability problem with applications in wired and wireless communication networks, electronic circuit design, computer networks, and electrical power distribution, among other systems. However, the two-terminal reliability problem is among the hardest combinatorial problems and is intractable for large, complex networks. Several exact methods to solve the two-terminal reliability problem have been proposed since the 1960s, but they have exponential time complexity in general. Hence, practical studies involving large network-type systems resort to approximation methods to estimate the system's reliability. One attractive approach for quantifying the reliability of complex systems is to use signatures, …
Reference Design Of An Online Emulation And Hot-Patching Approach For Power Electronic Controller Validation, Estefano Soria Pearson
Reference Design Of An Online Emulation And Hot-Patching Approach For Power Electronic Controller Validation, Estefano Soria Pearson
Graduate Theses and Dissertations
This thesis aims to develop a reference design of an online security system approach embedded in a power electronic controller for cybersecurity purposes. Cybersecurity in power electronics focuses on reducing vulnerabilities in the system, where most reside in the communication with the hardware devices. Although methods to secure communications lessen the probability and effects of cyber-attacks, discovering vulnerabilities is inevitable. This thesis attempts to provide a fail-safe approach to securing the system by targeting the safety of the power-electronic controller. This approach applies an additional security layer in case of a malicious or accidental controller firmware malfunction.
The online security …
Multilayer Perceptron With Auto Encoder Enabled Deep Learning Model For Recommender Systems, Subhashini Narayan
Multilayer Perceptron With Auto Encoder Enabled Deep Learning Model For Recommender Systems, Subhashini Narayan
Future Computing and Informatics Journal
In this modern world of ever-increasing one-click purchases, movie bookings, music, health- care, fashion, the need for recommendations have increased the more. Google, Netflix, Spotify, Amazon and other tech giants use recommendations to customize and tailor their search engines to suit the user’s interests. Many of the existing systems are based on older algorithms which although have decent accuracies, require large training and testing datasets and with the emergence of deep learning, the accuracy of algorithms has further improved, and error rates have reduced due to the use of multiple layers. The need for large datasets has declined as well. …
Context-Aware Sensing And Fusion For Structural Health Monitoring And Night Time Traffic Surveillance, Xinxiang Zhang
Context-Aware Sensing And Fusion For Structural Health Monitoring And Night Time Traffic Surveillance, Xinxiang Zhang
Electrical Engineering Theses and Dissertations
Rapid developments in computer vision technologies have been transforming many traditional fields in engineering and science in the last few decades, especially in terms of diagnosing problems from visual images. Leveraging computer vision technologies to inspect, monitor, assess infrastructure conditions, and analyze traffic dynamics, has gained significant increase in both effectiveness and efficiency, compared to the cost of traditional instrumentation arrays to monitor, and manually inspect civil infrastructures and traffic conditions. Therefore, to construct the next-generation intelligent civil and transportation infrastructures, this dissertation develops a comprehensive computer-vision based sensing and fusion framework for structural health monitoring and intelligent transportation systems. …
Design And Assembly Of High-Temperature Signal Conditioning System On Ltcc With Silicon Carbide Cmos Circuits, Sajib Roy
Graduate Theses and Dissertations
The objective of the work described in this dissertation paper is to develop a prototype electronic module on a low-temperature co-fired ceramic (LTCC) material. The electronic module would perform signal conditioning of sensor signals (thermocouples) operating under extreme conditions for applications like gas turbines to collect data on the health of the turbine blades during operation so that the turbines do not require shutdown for inspection to determine if maintenance is required. The collected data can indicate when such shutdowns, which cost $1M per day, should be scheduled and maintenance actually performed. The circuits for the signal conditioning system within …
Chaos-Based Coffee Can Radar System, Conor Willsie, Rong Chen
Chaos-Based Coffee Can Radar System, Conor Willsie, Rong Chen
Honors Theses
Linear frequency modulated (LFM) radar systems are simple and easy to implement, making them ideal for inexpensive undergraduate research projects. Unfortunately, LFM radar schemes have multiple limitations that make them unviable in many real-world applications. Given the limitations of LFM radar systems, we propose a chaos-based frequency modulated (CBFM) system. In this paper, we present the theory, design, and experimental verification of a CBFM radar system that has both ranging and synthetic aperture radar imaging capabilities. The performance of our CBFM system is compared to that of the LFM system designed by MIT. We document many challenges and unforeseen obstacles …
Data Forgery Detection In Automatic Generation Control: Exploration Of Automated Parameter Generation And Low-Rate Attacks, Yatish R. Dubasi
Data Forgery Detection In Automatic Generation Control: Exploration Of Automated Parameter Generation And Low-Rate Attacks, Yatish R. Dubasi
Computer Science and Computer Engineering Undergraduate Honors Theses
Automatic Generation Control (AGC) is a key control system utilized in electric power systems. AGC uses frequency and tie-line power flow measurements to determine the Area Control Error (ACE). ACE is then used by the AGC to adjust power generation and maintain an acceptable power system frequency. Attackers might inject false frequency and/or tie-line power flow measurements to mislead AGC into falsely adjusting power generation, which can harm power system operations. Various data forgery detection models are studied in this thesis. First, to make the use of predictive detection models easier for users, we propose a method for automated generation …
Correcting For Terrain Interference, Attenuation, And System Bias For A Dual Polarimetric, X-Band Radar, Casey Wolsieffer
Correcting For Terrain Interference, Attenuation, And System Bias For A Dual Polarimetric, X-Band Radar, Casey Wolsieffer
Masters Theses
This thesis outlines the procedure and theory used to calibrate the UMass eXperimental X-band Radar (UMAXX) for the purpose of monitoring meteorological events in the Pioneer Valley region. Due to the complex topography of the area, lower tilt angles are subject to partial or full beam blockage as well as ground clutter observed through the main beam or sidelobes. Additionally, there are biases internal and external to the system that impact the reflectivity and differential reflectivity measurements. These biases and corrections are addressed in this work. As the radar has been operational since September of 2018, there is ample data …
Distance-Based Formation Control Using Decentralized Sensing With Infrared Photodiodes, Steven Williams
Distance-Based Formation Control Using Decentralized Sensing With Infrared Photodiodes, Steven Williams
LSU Master's Theses
This study presents an onboard sensor system for determining the relative positions of mobile robots, which is used in decentralized distance-based formation controllers for multi-agent systems. This sensor system uses infrared photodiodes and LEDs; its effective use requires coordination between the emitting and detecting robots. A technique is introduced for calculating the relative positions based on photodiode readings, and an automated calibration system is designed for future maintenance. By measuring the relative positions of their neighbors, each robot is capable of running an onboard formation controller, which is independent of both a centralized controller and a global positioning-like system (e.g., …
Calculate The Reliability Of The Bts-Bsc Network With The Reserved Line Connection, Dilmurod Davronbekov, Utkir Karimovich Matyokubov
Calculate The Reliability Of The Bts-Bsc Network With The Reserved Line Connection, Dilmurod Davronbekov, Utkir Karimovich Matyokubov
Chemical Technology, Control and Management
The issue of reserving communication lines between the base station and the mobile network base station controller which are considered as one system is considered. Analytical expressions have been developed for calculating the reliability of the system for various options for backing up communication lines between the base station and the base station controller. The results of research and calculations of reliability for ten different types of backup communication lines of the base station and the base station controller are presented.
The Use Of Supercapacitors To Stabilize The Power Supply System Of The Base Station Of Mobile Communication, Dilmurod Abdujalilovich Davronbekov, Utkir Karimovich Matyokubov
The Use Of Supercapacitors To Stabilize The Power Supply System Of The Base Station Of Mobile Communication, Dilmurod Abdujalilovich Davronbekov, Utkir Karimovich Matyokubov
Scientific-technical journal
In this study, an analysis of the current status and available outages of the mobile communication base station power supply system was performed. The effects of these outages on the power supply system have been studied and it has been shown that batteries may not be an ideal solution as a backup source. Also, the issue of the introduction of renewable energy sources in the base station power supply system of the mobile communication system and its shortcomings are mentioned. In order to overcome these problems and stabilize the power changes in the battery auxiliary element and the power supply …
The Use Of Supercapacitors To Stabilize The Power Supply System Of The Base Station Of Mobile Communication, Dilmurod Abdujalilovich Davronbekov, Utkir Karimovich Matyokubov
The Use Of Supercapacitors To Stabilize The Power Supply System Of The Base Station Of Mobile Communication, Dilmurod Abdujalilovich Davronbekov, Utkir Karimovich Matyokubov
Scientific-technical journal
In this study, an analysis of the current status and available outages of the mobile communication base station power supply system was performed. The effects of these outages on the power supply system have been studied and it has been shown that batteries may not be an ideal solution as a backup source. Also, the issue of the introduction of renewable energy sources in the base station power supply system of the mobile communication system and its shortcomings are mentioned. In order to overcome these problems and stabilize the power changes in the battery auxiliary element and the power supply …
Design And Realization Of Fully-Digital Microwave And Mm-Wave Multi-Beam Arrays With Fpga/Rf-Soc Signal Processing, Sravan Kumar Pulipati
Design And Realization Of Fully-Digital Microwave And Mm-Wave Multi-Beam Arrays With Fpga/Rf-Soc Signal Processing, Sravan Kumar Pulipati
FIU Electronic Theses and Dissertations
There has been a constant increase in data-traffic and device-connections in mobile wireless communications, which led the fifth generation (5G) implementations to exploit mm-wave bands at 24/28 GHz. The next-generation wireless access point (6G and beyond) will need to adopt large-scale transceiver arrays with a combination of multi-input-multi-output (MIMO) theory and fully digital multi-beam beamforming. The resulting high gain array factors will overcome the high path losses at mm-wave bands, and the simultaneous multi-beams will exploit the multi-directional channels due to multi-path effects and improve the signal-to-noise ratio. Such access points will be based on electronic systems which heavily depend …
Channel Estimation In Multi-User Massive Mimo Systems By Expectation Propagation Based Algorithms, Mohammed Rashid
Channel Estimation In Multi-User Massive Mimo Systems By Expectation Propagation Based Algorithms, Mohammed Rashid
LSU Doctoral Dissertations
Massive multiple input multiple output (MIMO) technology uses large antenna arrays with tens or hundreds of antennas at the base station (BS) to achieve high spectral efficiency, high diversity, and high capacity. These benefits, however, rely on obtaining accurate channel state information (CSI) at the receiver for both uplink and downlink channels. Traditionally, pilot sequences are transmitted and used at the receiver to estimate the CSI. Since the length of the pilot sequences scale with the number of transmit antennas, for massive MIMO systems downlink channel estimation requires long pilot sequences resulting in reduced spectral efficiency and the so-called pilot …
Time Series Data Analysis Using Machine Learning-(Ml) Approach, Mvv Prasad Kantipudi Dr., Pradeep Kumar N.S Dr., S.Sreenath Kashyap Dr., Ss Anusha Vemuri Ms
Time Series Data Analysis Using Machine Learning-(Ml) Approach, Mvv Prasad Kantipudi Dr., Pradeep Kumar N.S Dr., S.Sreenath Kashyap Dr., Ss Anusha Vemuri Ms
Library Philosophy and Practice (e-journal)
Healthcare benefits related to continuous monitoring of human movement and physical activity can potentially reduce the risk of accidents associated with elderly living alone at home. Based on the literature review, it is found that many studies focus on human activity recognition and are still active towards achieving practical solutions to support the elderly care system. The proposed system has introduced a joint approach of machine learning and signal processing technology for the recognition of human's physical movements using signal data generated by accelerometer sensors. The framework adopts the concept of DSP to select very descriptive feature sets and uses …
Sensing Methods For Two-Target And Four-Target Detection In Time-Constrained Vector Poisson And Gaussian Channels, Muhammad Fahad
Sensing Methods For Two-Target And Four-Target Detection In Time-Constrained Vector Poisson And Gaussian Channels, Muhammad Fahad
Dissertations, Master's Theses and Master's Reports
In this dissertation we consider a sensor scheduling or resource management problem for a vector Poisson and Gaussian channels. The input is a binary random vector and the output is a set of conditionally independent Poisson or Gaussian random variables. The objective is to design a scaling matrix, which is a linear transformation whose purpose is to entangle the different inputs, under a total given energy/time constraint. The two metrics are adopted to quantify the performance of the designed scaling matrix: mutual information and Bayesian inference. In other words, it is an experimental design problem where the objective is to …
Hard Hat Ambient Liability Observer (Halo), Hunter Hykes, Nathan Kish, Brian Thomson
Hard Hat Ambient Liability Observer (Halo), Hunter Hykes, Nathan Kish, Brian Thomson
Williams Honors College, Honors Research Projects
Capturing workplace incident information is a growing area of concern for most companies. To assist with this, the design team proposed the H.A.L.O. This design uses time-of-flight sensors connected to LEDs to create a proximity-based hazard warning system. It also records incident data using an accelerometer and micro-SD card. This helps workers avoid some of the most common workplace injuries, slips, trips, and falls and accidental collisions.
Students have created a design with engineering, and marketing requirements that accomplish this task. The proposed design allows for this monitoring and mitigation systems to be attached to hard hats. Team members developed …
Analysis Of Millimeter-Wave Networks: Blockage, Antenna Directivity, Macrodiversity, And Interference, Enass Hriba
Analysis Of Millimeter-Wave Networks: Blockage, Antenna Directivity, Macrodiversity, And Interference, Enass Hriba
Graduate Theses, Dissertations, and Problem Reports
Due to its potential to support high data rates at low latency with reasonable interference isolation because of signal blockage at these frequencies, millimeter-wave (mmWave) communications has emerged as a promising solution for next-generation wireless networks. MmWave systems are characterized by the use of highly directional antennas and susceptibility to signal blockage by buildings and other obstructions, which significantly alter the propagation environment. The received power of each transmission depends on the direction the corresponding antennas point and whether the signal’s path is line-of-sight (LOS), non-LOS (i.e., partially blocked), or completely blocked. A key challenge in modeling blocking in mmWave …
Deep Models For Improving The Performance And Reliability Of Person Recognition, Sobhan Soleymani
Deep Models For Improving The Performance And Reliability Of Person Recognition, Sobhan Soleymani
Graduate Theses, Dissertations, and Problem Reports
Deep models have provided high accuracy for different applications such as person recognition, image segmentation, image captioning, scene description, and action recognition. In this dissertation, we study the deep learning models and their application in improving the performance and reliability of person recognition. This dissertation focuses on five aspects of person recognition: (1) multimodal person recognition, (2) quality-aware multi-sample person recognition, (3) text-independent speaker verification, (4) adversarial iris examples, and (5) morphed face images. First, we discuss the application of multimodal networks consisting of face, iris, fingerprint, and speech modalities in person recognition. We propose multi-stream convolutional neural network architectures …
Re-Design Of Precision Signal Conditioning Circuit For Detecting Schumann Resonance, Rohith Bikkina
Re-Design Of Precision Signal Conditioning Circuit For Detecting Schumann Resonance, Rohith Bikkina
Graduate Theses, Dissertations, and Problem Reports
Extremely low frequencies signals are waves between 3 to 30Hz and corresponding wavelengths between 10,000 to 100,000 kilometers. The specific signals used here are generated from lightning and are excited at frequencies around 8Hz, 14Hz, 20Hz. These are often called Schumann Resonance frequencies. Several stations have been built around the world for identifying ELF waves. All of those required a sparsely populated area that was far away from electric power lines because of interference from electric noise at 50 Hz and 60Hz. This project develops and tests an amplifier and filter circuit that should assist in identifying the Schumann Resonance …