Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Physical Sciences and Mathematics
Target Localization And Tracking By Fusing Doppler Differentials From Cellular Emanations With A Multi-Spectral Video Tracker, Casey D. Demars, Michael Roggemann, Adam Webb, Timothy C. Havens
Target Localization And Tracking By Fusing Doppler Differentials From Cellular Emanations With A Multi-Spectral Video Tracker, Casey D. Demars, Michael Roggemann, Adam Webb, Timothy C. Havens
Michigan Tech Publications
We present an algorithm for fusing data from a constellation of RF sensors detecting cellular emanations with the output of a multi-spectral video tracker to localize and track a target with a specific cell phone. The RF sensors measure the Doppler shift caused by the moving cellular emanation and then Doppler differentials between all sensor pairs are calculated. The multi-spectral video tracker uses a Gaussian mixture model to detect foreground targets and SIFT features to track targets through the video sequence. The data is fused by associating the Doppler differential from the RF sensors with the theoretical Doppler differential computed …
Ensuring Data Confidentiality Via Plausibly Deniable Encryption And Secure Deletion – A Survey, Qionglu Zhang, Shijie Jia, Bing Chang, Bo Chen
Ensuring Data Confidentiality Via Plausibly Deniable Encryption And Secure Deletion – A Survey, Qionglu Zhang, Shijie Jia, Bing Chang, Bo Chen
Michigan Tech Publications
Ensuring confidentiality of sensitive data is of paramount importance, since data leakage may not only endanger dataowners’ privacy, but also ruin reputation of businesses as well as violate various regulations like HIPPA andSarbanes-Oxley Act. To provide confidentiality guarantee, the data should be protected when they are preserved inthe personal computing devices (i.e.,confidentiality duringtheirlifetime); and also, they should be rendered irrecoverableafter they are removed from the devices (i.e.,confidentiality after their lifetime). Encryption and secure deletion are usedto ensure data confidentiality during and after their lifetime, respectively.This work aims to perform a thorough literature review on the techniques being used to protect …
Examining The Learnability Of Auditory Displays: Music, Earcons, Spearcons, And Lyricons, Kay Tislar, Zackery Duford, Brittany Nelson, Madeline Peabody, Myounghoon Jeon
Examining The Learnability Of Auditory Displays: Music, Earcons, Spearcons, And Lyricons, Kay Tislar, Zackery Duford, Brittany Nelson, Madeline Peabody, Myounghoon Jeon
Michigan Tech Publications
Auditory displays are a useful platform to convey information to users for a variety of reasons. The present study sought to examine the use of different types of sounds that can be used in auditory displays—music, earcons, spearcons, and lyricons—to determine which sounds have the highest learnability when presented in sequences. Participants were self-trained on sound meanings and then asked to recall meanings after listening to sequences of varying lengths. The relatedness of sounds and their attributed meanings, or the intuitiveness of the sounds, was also examined. The results show that participants were able to learn and recall lyricons and …