Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Michigan Tech Publications

2018

Department of Computer Science

Articles 1 - 3 of 3

Full-Text Articles in Physical Sciences and Mathematics

Target Localization And Tracking By Fusing Doppler Differentials From Cellular Emanations With A Multi-Spectral Video Tracker, Casey D. Demars, Michael Roggemann, Adam Webb, Timothy C. Havens Oct 2018

Target Localization And Tracking By Fusing Doppler Differentials From Cellular Emanations With A Multi-Spectral Video Tracker, Casey D. Demars, Michael Roggemann, Adam Webb, Timothy C. Havens

Michigan Tech Publications

We present an algorithm for fusing data from a constellation of RF sensors detecting cellular emanations with the output of a multi-spectral video tracker to localize and track a target with a specific cell phone. The RF sensors measure the Doppler shift caused by the moving cellular emanation and then Doppler differentials between all sensor pairs are calculated. The multi-spectral video tracker uses a Gaussian mixture model to detect foreground targets and SIFT features to track targets through the video sequence. The data is fused by associating the Doppler differential from the RF sensors with the theoretical Doppler differential computed …


Ensuring Data Confidentiality Via Plausibly Deniable Encryption And Secure Deletion – A Survey, Qionglu Zhang, Shijie Jia, Bing Chang, Bo Chen Jun 2018

Ensuring Data Confidentiality Via Plausibly Deniable Encryption And Secure Deletion – A Survey, Qionglu Zhang, Shijie Jia, Bing Chang, Bo Chen

Michigan Tech Publications

Ensuring confidentiality of sensitive data is of paramount importance, since data leakage may not only endanger dataowners’ privacy, but also ruin reputation of businesses as well as violate various regulations like HIPPA andSarbanes-Oxley Act. To provide confidentiality guarantee, the data should be protected when they are preserved inthe personal computing devices (i.e.,confidentiality duringtheirlifetime); and also, they should be rendered irrecoverableafter they are removed from the devices (i.e.,confidentiality after their lifetime). Encryption and secure deletion are usedto ensure data confidentiality during and after their lifetime, respectively.This work aims to perform a thorough literature review on the techniques being used to protect …


Examining The Learnability Of Auditory Displays: Music, Earcons, Spearcons, And Lyricons, Kay Tislar, Zackery Duford, Brittany Nelson, Madeline Peabody, Myounghoon Jeon Jun 2018

Examining The Learnability Of Auditory Displays: Music, Earcons, Spearcons, And Lyricons, Kay Tislar, Zackery Duford, Brittany Nelson, Madeline Peabody, Myounghoon Jeon

Michigan Tech Publications

Auditory displays are a useful platform to convey information to users for a variety of reasons. The present study sought to examine the use of different types of sounds that can be used in auditory displays—music, earcons, spearcons, and lyricons—to determine which sounds have the highest learnability when presented in sequences. Participants were self-trained on sound meanings and then asked to recall meanings after listening to sequences of varying lengths. The relatedness of sounds and their attributed meanings, or the intuitiveness of the sounds, was also examined. The results show that participants were able to learn and recall lyricons and …