Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Systems and Communications (5)
- Computer Engineering (4)
- Electrical and Electronics (4)
- Physical Sciences and Mathematics (4)
- Artificial Intelligence and Robotics (2)
-
- Computer Sciences (2)
- Life Sciences (2)
- Other Electrical and Computer Engineering (2)
- Astrophysics and Astronomy (1)
- Biology (1)
- Ceramic Materials (1)
- Chemistry (1)
- Computational Engineering (1)
- Computational Neuroscience (1)
- Computer and Systems Architecture (1)
- Digital Communications and Networking (1)
- Electromagnetics and Photonics (1)
- Engineering Physics (1)
- Genetics and Genomics (1)
- Inorganic Chemistry (1)
- Instrumentation (1)
- Materials Science and Engineering (1)
- Neuroscience and Neurobiology (1)
- Other Astrophysics and Astronomy (1)
- Other Computer Engineering (1)
- Other Materials Science and Engineering (1)
- Physics (1)
- Keyword
-
- Deep Learning (5)
- Biometrics (3)
- Adversarial Learning (2)
- Deep learning (2)
- Face Recognition (2)
-
- Generative Adversarial Networks (2)
- 7 Hertz. (1)
- Adaptive Driver Assistance System (1)
- Adversarial Defense (1)
- Adversarial Example (1)
- Adversarial Examples (1)
- Alleles (1)
- Amplifier (1)
- Arrhythmia (1)
- Autism spectrum disorder (ASD) (1)
- Automated target recognition (1)
- Autoregressive process (1)
- Cellular Network (1)
- Channel Coding (1)
- Classification (1)
- Computer Vision (1)
- Correlated Blocking (1)
- Critical period (1)
- Cut-off frequency (1)
- DNA (1)
- DNA Analysis (1)
- Data Association (1)
- Data Augmentation (1)
- DeepFakes (1)
- Degraded DNA (1)
Articles 1 - 19 of 19
Full-Text Articles in Signal Processing
Computational Mechanisms Of Face Perception, Jinge Wang
Computational Mechanisms Of Face Perception, Jinge Wang
Graduate Theses, Dissertations, and Problem Reports
The intertwined history of artificial intelligence and neuroscience has significantly impacted their development, with AI arising from and evolving alongside neuroscience. The remarkable performance of deep learning has inspired neuroscientists to investigate and utilize artificial neural networks as computational models to address biological issues. Studying the brain and its operational mechanisms can greatly enhance our understanding of neural networks, which has crucial implications for developing efficient AI algorithms. Many of the advanced perceptual and cognitive skills of biological systems are now possible to achieve through artificial intelligence systems, which is transforming our knowledge of brain function. Thus, the need for …
Enhancing Vehicular Perception: A Comprehensive Analysis Of Sensor Fusion Performance Through Weighted Averages And Fuzzy C-Means For Optimal Data Association, Zachary Brian Flanigan
Enhancing Vehicular Perception: A Comprehensive Analysis Of Sensor Fusion Performance Through Weighted Averages And Fuzzy C-Means For Optimal Data Association, Zachary Brian Flanigan
Graduate Theses, Dissertations, and Problem Reports
This work explores the implementation of sensor fusion and data association for autonomous vehicle design. Advancements in Adaptive Driver Assistance System (ADAS) technology have driven the development of perception algorithms required for higher levels of autonomy in vehicles. Perception algorithms process data collected from radar, camera, and LiDAR sensors to generate a complete model of the ego vehicle’s surrounding environment. Fusion of data from these sensors is important for accurate measurement of longitudinal and lateral distances to surrounding objects. Sensor fusion associates sensor detections to each other through different data association techniques. Data association techniques can consist of independent assignment …
Simulations Of Implementation Of Advanced Communication Technologies, Ivy Yousuf Moutushi
Simulations Of Implementation Of Advanced Communication Technologies, Ivy Yousuf Moutushi
Graduate Theses, Dissertations, and Problem Reports
Wireless communication systems have seen significant advancements with the introduction of 3G, 4G, and 5G mobile standards. Since the simulation of entire systems is complex and may not allow evaluation of the impact of individual techniques, this thesis presents techniques and results for simulating the performance of advanced signaling techniques used in 3G, 4G, and 5G systems, including Code division multiple access (CDMA), Multiple Input Multiple Output (MIMO) systems, and Low-Density Parity Check (LDPC) codes. One implementation issue that is explored is the use of quantized Analog to Digital Converter (ADC) outputs and their impact on system performance.
Code division …
Object Detection And Classification In The Visible And Infrared Spectrums, Domenick D. Poster
Object Detection And Classification In The Visible And Infrared Spectrums, Domenick D. Poster
Graduate Theses, Dissertations, and Problem Reports
The over-arching theme of this dissertation is the development of automated detection and/or classification systems for challenging infrared scenarios. The six works presented herein can be categorized into four problem scenarios. In the first scenario, long-distance detection and classification of vehicles in thermal imagery, a custom convolutional network architecture is proposed for small thermal target detection. For the second scenario, thermal face landmark detection and thermal cross-spectral face verification, a publicly-available visible and thermal face dataset is introduced, along with benchmark results for several landmark detection and face verification algorithms. Furthermore, a novel visible-to-thermal transfer learning algorithm for face landmark …
An Analysis On Adversarial Machine Learning: Methods And Applications, Ali Dabouei
An Analysis On Adversarial Machine Learning: Methods And Applications, Ali Dabouei
Graduate Theses, Dissertations, and Problem Reports
Deep learning has witnessed astonishing advancement in the last decade and revolutionized many fields ranging from computer vision to natural language processing. A prominent field of research that enabled such achievements is adversarial learning, investigating the behavior and functionality of a learning model in presence of an adversary. Adversarial learning consists of two major trends. The first trend analyzes the susceptibility of machine learning models to manipulation in the decision-making process and aims to improve the robustness to such manipulations. The second trend exploits adversarial games between components of the model to enhance the learning process. This dissertation aims to …
Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire
Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire
Graduate Theses, Dissertations, and Problem Reports
Facial recognition systems play a vital role in our everyday lives. We rely on this technology from menial tasks to issues as vital as national security. While strides have been made over the past ten years to improve facial recognition systems, morphed face images are a viable threat to the reliability of these systems. Morphed images are generated by combining the face images of two subjects. The resulting morphed face shares the likeness of the contributing subjects, confusing both humans and face verification algorithms. This vulnerability has grave consequences for facial recognition systems used on international borders or for law …
Modeling, Fabrication, And Characterization Of Rf-Based Passive Wireless Sensors Composed Of Refractory Semiconducting Ceramics For High Temperature Applications, Kavin Sivaneri Varadharajan Idhaiam
Modeling, Fabrication, And Characterization Of Rf-Based Passive Wireless Sensors Composed Of Refractory Semiconducting Ceramics For High Temperature Applications, Kavin Sivaneri Varadharajan Idhaiam
Graduate Theses, Dissertations, and Problem Reports
Real-time health monitoring of high temperature systems (>500oC) in harsh environments is necessary to prevent catastrophic events caused by structural failures, varying pressure, and chemical reactions. Conventional solid-state temperature sensors such as resistance temperature detectors (RTDs) and thermocouples are restricted by their operating environments, sensor dimensions and often require external power sources for their operation. The current work presents the research and development of RF-based passive wireless sensing technology targeting high temperatures and harsh environmental conditions. Passive wireless devices are generally classified as near-field and far-field devices based on the interrogation distance. Near-field sensors are placed at …
Multimodal Adversarial Learning, Uche Osahor
Multimodal Adversarial Learning, Uche Osahor
Graduate Theses, Dissertations, and Problem Reports
Deep Convolutional Neural Networks (DCNN) have proven to be an exceptional tool for object recognition, generative modelling, and multi-modal learning in various computer vision applications. However, recent findings have shown that such state-of-the-art models can be easily deceived by inserting slight imperceptible perturbations to key pixels in the input. A good target detection systems can accurately identify targets by localizing their coordinates on the input image of interest. This is ideally achieved by labeling each pixel in an image as a background or a potential target pixel. However, prior research still confirms that such state of the art targets models …
A Tool For Biometric Interpretation Of Forensic Str Dna Profiles, Ahmad Jamal Baroudi
A Tool For Biometric Interpretation Of Forensic Str Dna Profiles, Ahmad Jamal Baroudi
Graduate Theses, Dissertations, and Problem Reports
Rapid DNA biometric identification applications are becoming more essential and widely used in human identity validation processes. Despite their powerful identification capabilities, processing a sample to generate a forensic DNA profile still takes longer compared with other rapid biometric technologies. Methods used to speed up the analysis could lead to signal artifacts similar to those arising from low copy or degraded DNA samples, making the electropherogram unsuitable for forensic interpretation and analysis. The goal of this research effort is to apply biometrics and mathematical approaches to forensic STR (Short Tandem Repeat) profiles. To accomplish this goal, a multi-function software tool …
Information Theoretical Analysis Of The Uniqueness Of Iris Biometrics, Katelyn M. Hampel
Information Theoretical Analysis Of The Uniqueness Of Iris Biometrics, Katelyn M. Hampel
Graduate Theses, Dissertations, and Problem Reports
With the rapid globalization of technology in the world, the need for a more reliable and secure online method of authentication is required. This can be achieved by using each individual’s distinctive biometric identifiers, such as the face, iris, fingerprint, palmprint, etc.; however, there is a bound to the uniqueness of each identifier and consequently, a limit to the capacity that a biometric recognition system can sustain before false matches occur. Therefore, knowing the limitations on the maximum population that a biometric modality can uniquely represent is essential now more than ever. In an effort to address the general problem, …
Inferential Statistics And Information Theoretical Measures: An Approach To Interference Detection In Radio Astronomy, Morgan R. Dameron
Inferential Statistics And Information Theoretical Measures: An Approach To Interference Detection In Radio Astronomy, Morgan R. Dameron
Graduate Theses, Dissertations, and Problem Reports
In a time when technology is rapidly growing, radio observatories are now able to expand their computational power to achieve higher receiver sensitivity power and a more flexible realtime computing approach to probe the universe for its composition and study new astronomical phenomena. This allows searches to go deeper into the universe, and results in the recording of massive quantities of observed data. At the same time, this increases the amount of radio frequency interference (RFI) found in the obtained observatory data. The high power of RFI easily masks the low power of extraterrestrial signals, making them hard to detect …
Analysis Of Millimeter-Wave Networks: Blockage, Antenna Directivity, Macrodiversity, And Interference, Enass Hriba
Analysis Of Millimeter-Wave Networks: Blockage, Antenna Directivity, Macrodiversity, And Interference, Enass Hriba
Graduate Theses, Dissertations, and Problem Reports
Due to its potential to support high data rates at low latency with reasonable interference isolation because of signal blockage at these frequencies, millimeter-wave (mmWave) communications has emerged as a promising solution for next-generation wireless networks. MmWave systems are characterized by the use of highly directional antennas and susceptibility to signal blockage by buildings and other obstructions, which significantly alter the propagation environment. The received power of each transmission depends on the direction the corresponding antennas point and whether the signal’s path is line-of-sight (LOS), non-LOS (i.e., partially blocked), or completely blocked. A key challenge in modeling blocking in mmWave …
Re-Design Of Precision Signal Conditioning Circuit For Detecting Schumann Resonance, Rohith Bikkina
Re-Design Of Precision Signal Conditioning Circuit For Detecting Schumann Resonance, Rohith Bikkina
Graduate Theses, Dissertations, and Problem Reports
Extremely low frequencies signals are waves between 3 to 30Hz and corresponding wavelengths between 10,000 to 100,000 kilometers. The specific signals used here are generated from lightning and are excited at frequencies around 8Hz, 14Hz, 20Hz. These are often called Schumann Resonance frequencies. Several stations have been built around the world for identifying ELF waves. All of those required a sparsely populated area that was far away from electric power lines because of interference from electric noise at 50 Hz and 60Hz. This project develops and tests an amplifier and filter circuit that should assist in identifying the Schumann Resonance …
Deep Models For Improving The Performance And Reliability Of Person Recognition, Sobhan Soleymani
Deep Models For Improving The Performance And Reliability Of Person Recognition, Sobhan Soleymani
Graduate Theses, Dissertations, and Problem Reports
Deep models have provided high accuracy for different applications such as person recognition, image segmentation, image captioning, scene description, and action recognition. In this dissertation, we study the deep learning models and their application in improving the performance and reliability of person recognition. This dissertation focuses on five aspects of person recognition: (1) multimodal person recognition, (2) quality-aware multi-sample person recognition, (3) text-independent speaker verification, (4) adversarial iris examples, and (5) morphed face images. First, we discuss the application of multimodal networks consisting of face, iris, fingerprint, and speech modalities in person recognition. We propose multi-stream convolutional neural network architectures …
Integration Of Deep Hashing And Channel Coding For Biometric Security And Biometric Retrieval, Veeru Talreja
Integration Of Deep Hashing And Channel Coding For Biometric Security And Biometric Retrieval, Veeru Talreja
Graduate Theses, Dissertations, and Problem Reports
In the last few years, the research growth in many research and commercial fields are due to the adoption of state of the art deep learning techniques. The same applies to even biometrics and biometric security. Additionally, there has been a rise in the development of deep learning techniques used for approximate nearest neighbor (ANN) search for retrieval on multi-modal datasets. These deep learning techniques knows as deep hashing (DH) integrate feature learning and hash coding into an end-to-end trainable framework. Motivated by these factors, this dissertation considers the integration of deep hashing and channel coding for biometric security and …
Real Vs Fake Faces: Deepfakes And Face Morphing, Jacob L. Dameron
Real Vs Fake Faces: Deepfakes And Face Morphing, Jacob L. Dameron
Graduate Theses, Dissertations, and Problem Reports
The ability to determine the legitimacy of a person’s face in images and video can be important for many applications ranging from social media to border security. From a biometrics perspective, altering one’s appearance to look like a target identity is a direct method of attack against the security of facial recognition systems. Defending against such attacks requires the ability to recognize them as a separate identity from their target. Alternatively, a forensics perspective may view this as a forgery of digital media. Detecting such forgeries requires the ability to detect artifacts not commonly seen in genuine media. This work …
Comparative Study Of Model-Based And Learning-Based Disparity Map Fusion Methods, Douglas E. Kerr Jr.
Comparative Study Of Model-Based And Learning-Based Disparity Map Fusion Methods, Douglas E. Kerr Jr.
Graduate Theses, Dissertations, and Problem Reports
Creating an accurate depth map has several, valuable applications including augmented/virtual reality, autonomous navigation, indoor/outdoor mapping, object segmentation, and aerial topography. Current hardware solutions for precise 3D scanning are relatively expensive. To combat hardware costs, software alternatives based on stereoscopic images have previously been proposed. However, software solutions are less accurate than hardware solutions, such as laser scanning, and are subject to a variety of irregularities. Notably, disparity maps generated from stereo images typically fall short in cases of occlusion, near object boundaries, and on repetitive texture regions or texture-less regions. Several post-processing methods are examined in an effort to …
Video And Image Super-Resolution Via Deep Learning With Attention Mechanism, Xuan Xu
Video And Image Super-Resolution Via Deep Learning With Attention Mechanism, Xuan Xu
Graduate Theses, Dissertations, and Problem Reports
Image demosaicing, image super-resolution and video super-resolution are three important tasks in color imaging pipeline. Demosaicing deals with the recovery of missing color information and generation of full-resolution color images from so-called Color filter Array (CFA) such as Bayer pattern. Image super-resolution aims at increasing the spatial resolution and enhance important structures (e.g., edges and textures) in super-resolved images. Both spatial and temporal dependency are important to the task of video super-resolution, which has received increasingly more attention in recent years. Traditional solutions to these three low-level vision tasks lack generalization capability especially for real-world data. Recently, deep learning methods …
On Designing An Ecg-Based Intelligent System: Utilizing The Heart’S Electrical Activity To Recognize Humans And Detect Arrhythmia, Sara Saeed Abdeldayem
On Designing An Ecg-Based Intelligent System: Utilizing The Heart’S Electrical Activity To Recognize Humans And Detect Arrhythmia, Sara Saeed Abdeldayem
Graduate Theses, Dissertations, and Problem Reports
The electrocardiogram (ECG) signal is the bioelectrical signal that reflects the heart's activity. It has been extensively used as a diagnostic tool since it holds information about the cardiac health condition. However, recent researches have shown that it exhibits an inter-subject variability property. Therefore, it can be used as a biometric-based modality for either identification or verification purposes. Nevertheless, some of the challenges are faced while employing such a signal. For instance, ECG signal is prone to noise, accordingly, noise filters should be designed to remove the noise while keeping the signal properties. Moreover, factors such as medications, health condition, …