Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Purdue University (4)
- University of Nebraska - Lincoln (3)
- Air Force Institute of Technology (2)
- California Polytechnic State University, San Luis Obispo (1)
- Dartmouth College (1)
-
- East Tennessee State University (1)
- Marquette University (1)
- Munster Technological University (1)
- Old Dominion University (1)
- Selected Works (1)
- University of Dayton (1)
- University of Massachusetts Amherst (1)
- University of Nevada, Las Vegas (1)
- University of New Mexico (1)
- University of South Carolina (1)
- Western Michigan University (1)
- Keyword
-
- Internet of Underground Things (2)
- Robotics (2)
- Underground Antenna (2)
- Underground Communications (2)
- Wireless Underground Channel (2)
-
- Advanced driver assistance (1)
- Ant algorithms (1)
- Artificial Intelligence (AI) (1)
- Base stations (1)
- Beamforming (1)
- Benefits of AI (1)
- Bias in AI Systems (1)
- Big Data Analytics (1)
- Blockchain (1)
- Boat (1)
- Buffer estimation (1)
- Cellular sensor networks (1)
- Channel capacity (1)
- Computational Design (1)
- Computer networks (1)
- Computer networks--Security measures (1)
- Conceptual Investigation (1)
- Consensus (1)
- Cyber-Physical Systems (1)
- Cyber-physical systems (1)
- Cybersecurity (1)
- DICOM (1)
- Decision making (1)
- Deep Learning (1)
- Digital Agriculture (1)
- Publication Year
- Publication
-
- Faculty Publications (5)
- Theses and Dissertations (2)
- Branch Mathematics and Statistics Faculty and Staff Publications (1)
- CSE Technical Reports (1)
- Computer Engineering (1)
-
- Computer and Electronics Engineering: Dissertations, Theses, and Student Research (1)
- Dartmouth Scholarship (1)
- Dissertations (1)
- Doctoral Dissertations (1)
- Electrical & Computer Engineering Faculty Research (1)
- Electrical and Computer Engineering Faculty Publications (1)
- Electronic Theses and Dissertations (1)
- Library Philosophy and Practice (e-journal) (1)
- Master's Theses (2009 -) (1)
- Theses (1)
- VMASC Publications (1)
- Vijayan K. Asari (1)
- Publication Type
Articles 1 - 22 of 22
Full-Text Articles in Systems and Communications
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Library Philosophy and Practice (e-journal)
Abstract
Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …
Reduced Fuel Emissions Through Connected Vehicles And Truck Platooning, Paul D. Brummitt
Reduced Fuel Emissions Through Connected Vehicles And Truck Platooning, Paul D. Brummitt
Electronic Theses and Dissertations
Vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) communication enable the sharing, in real time, of vehicular locations and speeds with other vehicles, traffic signals, and traffic control centers. This shared information can help traffic to better traverse intersections, road segments, and congested neighborhoods, thereby reducing travel times, increasing driver safety, generating data for traffic planning, and reducing vehicular pollution. This study, which focuses on vehicular pollution, used an analysis of data from NREL, BTS, and the EPA to determine that the widespread use of V2V-based truck platooning—the convoying of trucks in close proximity to one another so as to reduce air drag …
Developing A Miniature Smart Boat For Marine Research, Michael Isaac Eirinberg
Developing A Miniature Smart Boat For Marine Research, Michael Isaac Eirinberg
Computer Engineering
This project examines the development of a smart boat which could serve as a possible marine research apparatus. The smart boat consists of a miniature vessel containing a low-cost microcontroller to live stream a camera feed, GPS telemetry, and compass data through its own WiFi access point. The smart boat also has the potential for autonomous navigation. My project captivated the interest of several members of California Polytechnic State University, San Luis Obispo’s (Cal Poly SLO) Marine Science Department faculty, who proposed a variety of fascinating and valuable smart boat applications.
Detecting The Presence Of Electronic Devices In Smart Homes Using Harmonic Radar, Beatrice Perez, Gregory Mazzaro, Timothy J. Pierson, David Kotz
Detecting The Presence Of Electronic Devices In Smart Homes Using Harmonic Radar, Beatrice Perez, Gregory Mazzaro, Timothy J. Pierson, David Kotz
Dartmouth Scholarship
Data about users is collected constantly by phones, cameras, Internet websites, and others. The advent of so-called ‘Smart Things' now enable ever-more sensitive data to be collected inside that most private of spaces: the home. The first step in helping users regain control of their information (inside their home) is to alert them to the presence of potentially unwanted electronics. In this paper, we present a system that could help homeowners (or home dwellers) find electronic devices in their living space. Specifically, we demonstrate the use of harmonic radars (sometimes called nonlinear junction detectors), which have also been used in …
A Statistical Impulse Response Model Based On Empirical Characterization Of Wireless Underground Channel, Abdul Salam, Mehmet C. Vuran, Suat Irmak
A Statistical Impulse Response Model Based On Empirical Characterization Of Wireless Underground Channel, Abdul Salam, Mehmet C. Vuran, Suat Irmak
Faculty Publications
Wireless underground sensor networks (WUSNs) are becoming ubiquitous in many areas. The design of robust systems requires extensive understanding of the underground (UG) channel characteristics. In this paper, an UG channel impulse response is modeled and validated via extensive experiments in indoor and field testbed settings. The three distinct types of soils are selected with sand and clay contents ranging from $13\%$ to $86\%$ and $3\%$ to $32\%$, respectively. The impacts of changes in soil texture and soil moisture are investigated with more than $1,200$ measurements in a novel UG testbed that allows flexibility in soil moisture control. Moreover, the …
A Blockchain Simulator For Evaluating Consensus Algorithms In Diverse Networking Environments, Peter Foytik, Sachin Shetty, Sarada Prasad Gochhayat, Eranga Herath, Deepak Tosh, Laurent Njilla
A Blockchain Simulator For Evaluating Consensus Algorithms In Diverse Networking Environments, Peter Foytik, Sachin Shetty, Sarada Prasad Gochhayat, Eranga Herath, Deepak Tosh, Laurent Njilla
VMASC Publications
The massive scale, heterogeneity and distributed nature of Internet-of-Things (IoT) presents challenges in realizing a practical and effective security solution. Blockchain empowered platforms and technologies have been proposed to address aspects of this challenge. In order to realize a practical Blockchain deployment for IoT, there is a need for a testing and evaluation platform to evaluate performance and security of Blockchain applications and systems. In this paper, we present a Blockchain simulator that evaluates the consensus algorithms in a realistic and configurable network environment. Though, there are several Blockchain evaluation platforms, they are either wedded to a specific consensus protocol …
The Picture Fuzzy Distance Measure In Controlling Network Power Consumption, Florentin Smarandache, Ngan Thi Roan, Salvador Coll Arnau, Marina Alonso Diaz, Juan Miguel Martinez Rubio, Pedro Lopez, Fran Andujar, Son Hoang Lee, Manh Van Vu
The Picture Fuzzy Distance Measure In Controlling Network Power Consumption, Florentin Smarandache, Ngan Thi Roan, Salvador Coll Arnau, Marina Alonso Diaz, Juan Miguel Martinez Rubio, Pedro Lopez, Fran Andujar, Son Hoang Lee, Manh Van Vu
Branch Mathematics and Statistics Faculty and Staff Publications
In order to solve the complex decision making problems, there are many approaches and systems based on fuzzy theory were proposed.
Urban Underground Infrastructure Monitoring Iot: The Path Loss Analysis, Abdul Salam, Syed Shah
Urban Underground Infrastructure Monitoring Iot: The Path Loss Analysis, Abdul Salam, Syed Shah
Faculty Publications
The extra quantities of wastewater entering the pipes can cause backups that result in sanitary sewer overflows. Urban underground infrastructure monitoring is important for controlling the flow of extraneous water into the pipelines. By combining the wireless underground communications and sensor solutions, the urban underground IoT applications such as real time wastewater and storm water overflow monitoring can be developed. In this paper, the path loss analysis of wireless underground communications in urban underground IoT for wastewater monitoring has been presented. It has been shown that the communication range of up to 4 kilometers can be achieved from an underground …
Underground Environment Aware Mimo Design Using Transmit And Receive Beamforming In Internet Of Underground Things, Abdul Salam
Underground Environment Aware Mimo Design Using Transmit And Receive Beamforming In Internet Of Underground Things, Abdul Salam
Faculty Publications
In underground (UG) multiple-input and multiple-output (MIMO), the transmit beamforming is used to focus energy in the desired direction. There are three different paths in the underground soil medium through which the waves propagates to reach at the receiver. When the UG receiver receives a desired data stream only from the desired path, then the UG MIMO channel becomes three path (lateral, direct, and reflected) interference channel. Accordingly, the capacity region of the UG MIMO three path interference channel and degrees of freedom (multiplexing gain of this MIMO channel requires careful modeling). Therefore, expressions are required derived the degrees of …
A Theoretical Model Of Underground Dipole Antennas For Communications In Internet Of Underground Things, Abdul Salam, Mehmet C. Vuran, Xin Dong, Christos Argyropoulos, Suat Irmak
A Theoretical Model Of Underground Dipole Antennas For Communications In Internet Of Underground Things, Abdul Salam, Mehmet C. Vuran, Xin Dong, Christos Argyropoulos, Suat Irmak
Faculty Publications
The realization of Internet of Underground Things (IOUT) relies on the establishment of reliable communication links, where the antenna becomes a major design component due to the significant impacts of soil. In this paper, a theoretical model is developed to capture the impacts of change of soil moisture on the return loss, resonant frequency, and bandwidth of a buried dipole antenna. Experiments are conducted in silty clay loam, sandy, and silt loam soil, to characterize the effects of soil, in an indoor testbed and field testbeds. It is shown that at subsurface burial depths (0.1-0.4m), change in soil moisture impacts …
Hybrid Black-Box Solar Analytics And Their Privacy Implications, Dong Chen
Hybrid Black-Box Solar Analytics And Their Privacy Implications, Dong Chen
Doctoral Dissertations
The aggregate solar capacity in the U.S. is rising rapidly due to continuing decreases in the cost of solar modules. For example, the installed cost per Watt (W) for residential photovoltaics (PVs) decreased by 6X from 2009 to 2018 (from $8/W to $1.2/W), resulting in the installed aggregate solar capacity increasing 128X from 2009 to 2018 (from 435 megawatts to 55.9 gigawatts). This increasing solar capacity is imposing operational challenges on utilities in balancing electricity's real-time supply and demand, as solar generation is more stochastic and less predictable than aggregate demand. To address this problem, both academia and utilities have …
Java Server Reliability In The Presence Of Failures, Rich Coe
Java Server Reliability In The Presence Of Failures, Rich Coe
Master's Theses (2009 -)
A design for the separation of a server interface and work processing. Numerous sources, Tanenbaum (Tanenbaum Modern Operating Systems, 493), Goscinski (Goscinski Distributed operating systems, 203), and Birman (Birman Reliable distributed systems, 265), all discuss the concept of Two-Phase Commit, where a coordinator directs one or more processes to perform a transaction. If the transaction or any of the processes fail, the coordinator can decide how to proceed by either retrying or aborting the request. The popular web browser Chrome utilizes a separate process for each tab displayed. Should the rendering and display of a web page cause a crash, …
Smart Underground Antenna Arrays: A Soil Moisture Adaptive Beamforming Approach, Abdul Salam, Mehmet C. Vuran
Smart Underground Antenna Arrays: A Soil Moisture Adaptive Beamforming Approach, Abdul Salam, Mehmet C. Vuran
CSE Technical Reports
In this paper, a novel framework for underground beamforming using adaptive antenna arrays is presented. Based on the analysis of propagation in wireless underground channel, a theoretical model is developed which uses soil moisture information and feedback mechanism to improve performance wireless underground communications. Array element in soil has been analyzed empirically and impacts of soil type and soil moisture on return loss and resonant frequency are investigated. Beam patterns are investigated to communicate with both underground and above ground devices. Depending on the incident angle, refraction from soil-air interface has the adverse effects in the UG communications. It is …
Gaussian Weighted Neighborhood Connectivity Of Nonlinear Line Attractor For Learning Complex Manifolds, Theus H. Aspiras, Vijayan K. Asari, Wesam Sakla
Gaussian Weighted Neighborhood Connectivity Of Nonlinear Line Attractor For Learning Complex Manifolds, Theus H. Aspiras, Vijayan K. Asari, Wesam Sakla
Vijayan K. Asari
The human brain has the capability to process high quantities of data quickly for detection and recognition tasks. These tasks are made simpler by the understanding of data, which intentionally removes redundancies found in higher dimensional data and maps the data onto a lower dimensional space. The brain then encodes manifolds created in these spaces, which reveal a specific state of the system. We propose to use a recurrent neural network, the nonlinear line attractor (NLA) network, for the encoding of these manifolds as specific states, which will draw untrained data towards one of the specific states that the NLA …
Gaussian Weighted Neighborhood Connectivity Of Nonlinear Line Attractor For Learning Complex Manifolds, Theus H. Aspiras, Vijayan K. Asari, Wesam Sakla
Gaussian Weighted Neighborhood Connectivity Of Nonlinear Line Attractor For Learning Complex Manifolds, Theus H. Aspiras, Vijayan K. Asari, Wesam Sakla
Electrical and Computer Engineering Faculty Publications
The human brain has the capability to process high quantities of data quickly for detection and recognition tasks. These tasks are made simpler by the understanding of data, which intentionally removes redundancies found in higher dimensional data and maps the data onto a lower dimensional space. The brain then encodes manifolds created in these spaces, which reveal a specific state of the system. We propose to use a recurrent neural network, the nonlinear line attractor (NLA) network, for the encoding of these manifolds as specific states, which will draw untrained data towards one of the specific states that the NLA …
Adaptive Security-Aware Scheduling For Packet Switched Networks Using Real-Time Multi-Agent Systems, Ma'en Saleh Saleh
Adaptive Security-Aware Scheduling For Packet Switched Networks Using Real-Time Multi-Agent Systems, Ma'en Saleh Saleh
Dissertations
Conventional real-time scheduling algorithms are in care of timing constraints; they don’t pay any attention to enhance or optimize the real-time packet’s security performance. In this work, we propose an adaptive security-aware scheduling with congestion control mechanism for packet switching networks using real-time agentbased systems. The proposed system combines the functionality of real-time scheduling with the security service enhancement, where the real-time scheduling unit uses the differentiated-earliest-deadline-first (Diff-EDF) scheduler, while the security service enhancement scheme adopts a congestion control mechanism based on a resource estimation methodology.
The security service enhancement unit was designed based on two models: singlelayer and weighted …
A Multi-Modal Sensing And Communication Platform For Continental-Scale Migratory Bird Tracking, David J. Anthony
A Multi-Modal Sensing And Communication Platform For Continental-Scale Migratory Bird Tracking, David J. Anthony
Computer and Electronics Engineering: Dissertations, Theses, and Student Research
This thesis presents a novel platform for tracking migratory birds on a continental scale. Cellular technology is used to augment the short-range radios that have traditionally been used in wireless sensor networks. The platform utilizes multiple sensors, including a GPS and solid state compass. By using these sensors, the platform is capable of not only tracking a bird’s migration path, but also provides information on a bird’s behavior during its life-cycle. Testing methodology utilizing simulations and aspect-oriented programming is used to reveal faults in the platform prior to deployment on wild animals. In collaboration with the International Crane Foundation, and …
Development Of A Methodology For Customizing Insider Threat Auditing On A Linux Operating System, William T. Bai
Development Of A Methodology For Customizing Insider Threat Auditing On A Linux Operating System, William T. Bai
Theses and Dissertations
Insider threats can pose a great risk to organizations and by their very nature are difficult to protect against. Auditing and system logging are capabilities present in most operating systems and can be used for detecting insider activity. However, current auditing methods are typically applied in a haphazard way, if at all, and are not conducive to contributing to an effective insider threat security policy. This research develops a methodology for designing a customized auditing and logging template for a Linux operating system. An intent-based insider threat risk assessment methodology is presented to create use case scenarios tailored to address …
Dynamic Network Formation Using Ant Colony Optimization, Steven C. Oimoen
Dynamic Network Formation Using Ant Colony Optimization, Steven C. Oimoen
Theses and Dissertations
Military and industry are moving toward every device being network enabled and connected for reliable availability of communication and information. To make this type of system a reality, the devices must be capable of forming a network topology on their own in a dynamic environment to ensure that the correct information reaches a desired location and on-time. This research presents three contributions for solving highly dynamic (i.e. drastic change within the network) Multi-commodity Capacitated Network Design Problems (MCNDPs) resulting in a distributed multi-agent network design algorithm. The first contribution incorporates an Ant Colony Optimization (ACO) algorithm Ant Colony System (ACS) …
A Distributed Ai Approach For Large-Scale Wlan Design, Alan Mcgibney
A Distributed Ai Approach For Large-Scale Wlan Design, Alan Mcgibney
Theses
The recent dramatic trend towards always-on-connectivity has driven the need for mobile ubiquitous computing environments with the advent of the Wireless Local Area Network (WLAN) seeing a shift from traditional wired networks to wireless networking. A WLAN typically contains a number of access points that allow wireless enabled clients access information and network resources such as the internet without the need for wires, offering flexibility and mobility to the users. Initial wireless networks were convenience based allowing users access to the primary wired network, and involved little planning prior to roll-out. The proliferation of low cost wireless devices combined wdth …
3d Outside Cell Interference Factor For An Air-Ground Cdma ‘Cellular’ System, David W. Matolak
3d Outside Cell Interference Factor For An Air-Ground Cdma ‘Cellular’ System, David W. Matolak
Faculty Publications
We compute the outside-cell interference factor of a code-division multiple-access (CDMA) system for a three-dimensional (3-D) air-to-ground (AG) "cellular-like" network consisting of a set of uniformly distributed ground base stations and airborne mobile users. The CDMA capacity is roughly inversely proportional to the outside-cell interference factor. It is shown that for the nearly free-space propagation environment of these systems, the outside-cell interference factor can be larger than that for terrestrial propagation models (as expected) and depends approximately logarithmically upon both the cell height and cell radius.
Wide-Area Incident Management System On The Internet, Kaan Ozbay, Pushkin Kachroo
Wide-Area Incident Management System On The Internet, Kaan Ozbay, Pushkin Kachroo
Electrical & Computer Engineering Faculty Research
The incident management process consists of four sequential steps-incident detection, response, clearance and recovery. Each of these components comprises of a number of operations and coordinated decision-making between the agencies involved. The provision of computer based support tools for the personnel involved will help develop appropriate strategies and increase efficiency and expediency. Existing systems are developed on various traditional computing platforms. However, with the advent of World Wide Web and Internet based programming tools such as Java, it is now possible to develop platform independent decision support tools for the incident management agencies. Any agency will be able to use …