Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

SVM

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 60

Full-Text Articles in Physical Sciences and Mathematics

Evaluating Neuroimaging Modalities In The A/T/N Framework: Single And Combined Fdg-Pet And T1-Weighted Mri For Alzheimer’S Diagnosis, Peiwang Liu May 2024

Evaluating Neuroimaging Modalities In The A/T/N Framework: Single And Combined Fdg-Pet And T1-Weighted Mri For Alzheimer’S Diagnosis, Peiwang Liu

McKelvey School of Engineering Theses & Dissertations

With the escalating prevalence of dementia, particularly Alzheimer's Disease (AD), the need for early and precise diagnostic techniques is rising. This study delves into the comparative efficacy of Fluorodeoxyglucose Positron Emission Tomography (FDG-PET) and T1-weighted Magnetic Resonance Imaging (MRI) in diagnosing AD, where the integration of multimodal models is becoming a trend. Leveraging data from the Alzheimer's Disease Neuroimaging Initiative (ADNI), we employed linear Support Vector Machines (SVM) to assess the diagnostic potential of these modalities, both individually and in combination, within the AD continuum. Our analysis, under the A/T/N framework's 'N' category, reveals that FDG-PET consistently outperforms T1w-MRI across …


Comparison Of Support Vector Machine (Svm), K-Nearest Neighbor (K-Nn), And Stochastic Gradient Descent (Sgd) For Classifying Corn Leaf Disease Based On Histogram Of Oriented Gradients (Hog) Feature Extraction, Firdaus Solihin, Muhammad Syarief, Eka Mala Sari Rochman, Aeri Rachmad Dec 2023

Comparison Of Support Vector Machine (Svm), K-Nearest Neighbor (K-Nn), And Stochastic Gradient Descent (Sgd) For Classifying Corn Leaf Disease Based On Histogram Of Oriented Gradients (Hog) Feature Extraction, Firdaus Solihin, Muhammad Syarief, Eka Mala Sari Rochman, Aeri Rachmad

Elinvo (Electronics, Informatics, and Vocational Education)

Image classification involves categorizing an image's pixels into specific classes based on their unique characteristics. It has diverse applications in everyday life. One such application is the classification of diseases on corn leaves. Corn is a widely consumed staple food in Indonesia, and healthy corn plants are crucial for meeting market demands. Currently, disease identification in corn plants relies on manual checks, which are time-consuming and less effective. This research aims to automate disease identification on corn leaves using the Support Vector Machine (SVM), K-Nearest Neighbor (K-NN) with K=2, and Stochastic Gradient Descent (SGD) algorithms. The classification process utilizes the …


Malware Classification Using Api Call Information And Word Embeddings, Sahil Aggarwal Jan 2023

Malware Classification Using Api Call Information And Word Embeddings, Sahil Aggarwal

Master's Projects

Malware classification is the process of classifying malware into recognizable categories and is an integral part of implementing computer security. In recent times, machine learning has emerged as one of the most suitable techniques to perform this task. Models can be trained on various malware features such as opcodes, and API calls among many others to deduce information that would be helpful in the classification.

Word embeddings are a key part of natural language processing and can be seen as a representation of text wherein similar words will have closer representations. These embeddings can be used to discover a quantifiable …


Spam Comments Detection In Youtube Videos, Priyusha Kotta Jan 2023

Spam Comments Detection In Youtube Videos, Priyusha Kotta

Master's Projects

This paper suggests an innovative way for finding spam or ham comments on the video- sharing website YouTube. Comments that are contextually irrelevant for a particular video or have a commercial motive constitute as spam. In the past few years, with the advent of advertisements spreading to new arenas such as the social media has created a lucrative platform for many. Today, it is being widely used by everyone. But this innovation comes with its own impediments. We can see how malicious users have taken over these platforms with the aid of automated bots that can deploy a well-coordinated spam …


Web Page Multiclass Classification, Brian Gaither, Antonio Debouse, Catherine Huang Jun 2022

Web Page Multiclass Classification, Brian Gaither, Antonio Debouse, Catherine Huang

SMU Data Science Review

As the internet age evolves, the volume of content hosted on the Web is rapidly expanding. With this ever-expanding content, the capability to accurately categorize web pages is a current challenge to serve many use cases. This paper proposes a variation in the approach to text preprocessing pipeline whereby noun phrase extraction is performed first followed by lemmatization, contraction expansion, removing special characters, removing extra white space, lower casing, and removal of stop words. The first step of noun phrase extraction is aimed at reducing the set of terms to those that best describe what the web pages are about …


A Novel Approach To Face Pattern Analysis, Shashi Bhushan, Mohammed Alshehri, Neha Agarwal, Ismail Keshta, Jitendra Rajpurohit, Ahed Abugabah Feb 2022

A Novel Approach To Face Pattern Analysis, Shashi Bhushan, Mohammed Alshehri, Neha Agarwal, Ismail Keshta, Jitendra Rajpurohit, Ahed Abugabah

All Works

Recognizing facial expressions is a major challenge and will be required in the latest fields of research such as the industrial Internet of Things. Currently, the available methods are useful for detecting singular facial images, but they are very hard to extract. The main aim of face detection is to capture an image in real‐time and search for the image in the available dataset. So, by using this biometric feature, one can recognize and verify the person’s image by their facial features. Many researchers have used Principal Component Analysis (PCA), Support Vector Machine (SVM), a combination of PCA and SVM, …


Using Drones To Evaluate Revegetation Success On Natural Gas Pipelines, Anthony Nelson Mesa Jan 2022

Using Drones To Evaluate Revegetation Success On Natural Gas Pipelines, Anthony Nelson Mesa

Graduate Theses, Dissertations, and Problem Reports

The Appalachian region of the United States has significant growth in the production of natural gas. Developing the infrastructure required for this resource creates significant disturbances across the landscape, as both well pads and transportation pipelines must be created in this mountainous terrain. Midstream infrastructure, which includes pipeline rights-of-way and associated infrastructure, can cause significant environmental degradation, especially in the form of sedimentation. The introduction of this non-point source pollutant can be detrimental to freshwater ecosystems found throughout this region. This ecological risk has necessitated the enactment of regulations related to midstream infrastructure development. Weekly, inspectors travel afoot along pipeline …


Prediction Of Remaining Useful Life Of Wind Turbine Shaft Bearings Using Machine Learning, Jinsiang Shaw, Bingjie Wu Nov 2021

Prediction Of Remaining Useful Life Of Wind Turbine Shaft Bearings Using Machine Learning, Jinsiang Shaw, Bingjie Wu

Journal of Marine Science and Technology

Wind turbines are a major trend in the current green energy market. Wind energy is abundant, and if utilized properly, can result in significant reductions in carbon emissions. Therefore, the development of wind power systems is urgently required. However, wind turbines are mainly built in unmanned areas. Regular inspections require substantial manpower and material resources, and doubts regarding the accuracy of the inspected data may occur. Therefore, it is necessary to establish an automatic diagnostic method for determining the remaining useful life (RUL) of a wind turbine to facilitate predictive maintenance. In this study, a multi-class support vector machine (SVM) …


Experimental Analysis Of Gbm To Expand The Time Horizon Of Irish Electricity Price Forecasts, Conor Lynch, Christian O'Leary, Preetham Goving Kolar Sundareshan, Yavuz Akin Nov 2021

Experimental Analysis Of Gbm To Expand The Time Horizon Of Irish Electricity Price Forecasts, Conor Lynch, Christian O'Leary, Preetham Goving Kolar Sundareshan, Yavuz Akin

NIMBUS Articles

In response to the inherent challenges of generating cost-effective electricity consumption schedules for dynamic systems, this paper espouses the use of GBM or Gradient Boosting Machine-based models for electricity price forecasting. These models are applied to data streams from the Irish electricity market and achieve favorable results, relative to the current state-of-the-art. Presently, electricity prices are published 10 h in advance of the trade day of interest. Using the forecasting methodology outlined in this paper, an estimation of these prices can be made available one day in advance of the official price publication, thus extending the time available to plan …


Cloud Model Pid Control Of Pmsm Based On Svm Inverse System, Li Hui, Yun Hao, Hongli Yue Aug 2021

Cloud Model Pid Control Of Pmsm Based On Svm Inverse System, Li Hui, Yun Hao, Hongli Yue

Journal of System Simulation

Abstract: Aiming at the problem of multivariable, nonlinearity and strong coupling of the permanent magnet synchronous motor(PMSM), a strategy of inverse system identification which is independent of precise mathematical model and parameters based on support vector machines(SVM) is proposed. The dynamic decoupling control of PMSM is researched based on multivariable nonlinear control inverse system theory. To deal with direct inverse control open-loop system with poor robustness and inverse modeling error of SVM, a parameter self-tuning PID(Proportional Integral Differential) closed-loop controller based on cloud model rule inference is designed. The simulation results confirm that the cloud model PID control based on …


A Survey On Securing Iot Ecosystems And Adaptive Network Vision, Tejaswini Goli, Yoohwan Kim Jun 2021

A Survey On Securing Iot Ecosystems And Adaptive Network Vision, Tejaswini Goli, Yoohwan Kim

Computer Science Faculty Research

The rapid growth of Internet-of-Things (IoT) devices and the large network of interconnected devices pose new security challenges and privacy threats that would put those devices at high risk and cause harm to the affiliated users. This paper emphasizes such potential security challenges and proposes possible solutions in the field of IoT Security, mostly focusing on automated or adaptive networks. Considering the fact that IoT became widely adopted, the intricacies in the security field tend to grow expeditiously. Therefore, it is necessary for businesses to adopt new security protocols and to the notion of automated network security practices driven by …


Choice Of Feature Space For Classification Of Network Ip-Traffic By Machine Learning Methods, Avazjon Marakhimov, Ulugbek Ohundadaev Jun 2021

Choice Of Feature Space For Classification Of Network Ip-Traffic By Machine Learning Methods, Avazjon Marakhimov, Ulugbek Ohundadaev

Bulletin of National University of Uzbekistan: Mathematics and Natural Sciences

IP-protocol and transport layer protocols (TCP, UDP) have many different parameters and characteristics, which can be obtained both directly from packet headers and statistical observations of the flows. To solve the problem of classification of network traffc by methods of machine learning, it is necessary to determine a set of data (attributes), which it is reasonable to use for solving the classification problem.


Advancing The Ability To Predict Cognitive Decline And Alzheimer’S Disease Based On Genetic Variants Beyond Amyloid-Beta And Tau, Naveen Rawat Jun 2021

Advancing The Ability To Predict Cognitive Decline And Alzheimer’S Disease Based On Genetic Variants Beyond Amyloid-Beta And Tau, Naveen Rawat

Master's Projects

A growing amount of neurodegenerative R&D is focused on identifying genomic- based explanations of AD that are beyond Amyloid-b and Tau. The proposed effort involves identifying some of the genomic variations, such as single nucleotide polymorphisms (SNPs), allele , chromosome, epigenetic contributors to MCI and AD that are beyond Aβ and Tau.

The project involves building a prediction model based on a support vector machine (SVM) classifier that takes into account the genomic variations and epigenetic factors to predict the early stage of mild cognitive impairment (MCI) and Alzheimer disease (AD). To achieve this, picking up important feature sets which …


Scale-Invariant Histogram Of Oriented Gradients: Novel Approach For Pedestriandetection In Multiresolution Image Dataset, Sweta Panigrahi, Surya Narayana Raju Undi Jan 2021

Scale-Invariant Histogram Of Oriented Gradients: Novel Approach For Pedestriandetection In Multiresolution Image Dataset, Sweta Panigrahi, Surya Narayana Raju Undi

Turkish Journal of Electrical Engineering and Computer Sciences

This paper proposes a scale-invariant histogram of oriented gradients (SI-HOG) for pedestrian detection. Most of the algorithms for pedestrian detection use the HOG as the basic feature and combine other features with the HOG to form the feature set, which is usually applied with a support vector machine (SVM). Hence, the HOG feature is the most efficient and fundamental feature for pedestrian detection. However, the HOG feature produces feature vectors of different lengths for different image resolutions; thus, the feature vectors are incomparable for the SVM. The proposed method forms a scale-space pyramid wherein the histogram bin is calculated. Thus, …


Study On Combat Effectiveness Prediction Model Using Elman Feedback Network, Xiaoxi Li, Haoguang Chen, Daxi Li, Jiangping Chen Sep 2020

Study On Combat Effectiveness Prediction Model Using Elman Feedback Network, Xiaoxi Li, Haoguang Chen, Daxi Li, Jiangping Chen

Journal of System Simulation

Abstract: To deal with combat effectiveness prediction of the military system, a SVR-based crucial evaluation indexes mining method was carefully investigated. The key indexes in the effectiveness evaluation were found by comparing partial derivatives. The model of efficiency prediction based on Elman neural networks, which used effective optimized indexs and values as input and output, was exerted to combat effectiveness prediction of C4ISR. The results show that the method can reduce the complexity of prediction model, and avoid uncertain factors existing in system, which provide effective technical support for the combat effectiveness prediction scientifically.


Wood Structure Nondestructive Detection Based On Singular Spectrum Analysis And Svm, Guoxiong Zhou, Aibin Chen, Xianyan Zhou Aug 2020

Wood Structure Nondestructive Detection Based On Singular Spectrum Analysis And Svm, Guoxiong Zhou, Aibin Chen, Xianyan Zhou

Journal of System Simulation

Abstract: In view of unknown defect of wood component defect, a method of wood structure nondestructive recognition based on Singular spectrum analysis and SVM was proposed. The wood specimen was tested to obtain the test signal by ultrasonic testing instrument. In order to eliminate the testing effect of the tester gain control and defect size, angle variation on the test defect echo amplitude, the abnormal fluctuation was to filter and characteristic of the original signal was extracted by singular spectrum analysis, and SVM could train the parameters and distinguish the wood defects. Simulation results show that the proposed method …


Research Of Remote Sensing Image Classification Technology Based On Multi-Feature Combining And Bow Model, Li Ke, You Xiong, Du Lin Jun 2020

Research Of Remote Sensing Image Classification Technology Based On Multi-Feature Combining And Bow Model, Li Ke, You Xiong, Du Lin

Journal of System Simulation

Abstract: A new algorithm of image classification of multi feature combination and BoW model was proposed. SIFT, GIST, Census and Gabor color, and many other types of features were extracted from the images, and then through the experimental analysis to determine the best feature combination. According to the general K-means algorithm which did not consider the weight of each features, different feature component was put forward by using automatic weighted k-means algorithm, respectively SIFT, GIST, Gabor feature construct weights based on image features of vocabulary, using the soft coding algorithm for image coding, and using the SVM algorithm …


Evaluation And Analysis Of Land Intensive Utilization Based On Parameters Optimization Of Svm, Chen Li, Jiaojiao Li, Shulu Xiao Jun 2020

Evaluation And Analysis Of Land Intensive Utilization Based On Parameters Optimization Of Svm, Chen Li, Jiaojiao Li, Shulu Xiao

Journal of System Simulation

Abstract: Based on relevant literature research of evaluation on intensive land-use both at home and abroad, the theory of Support Vector Machine (SVM) and Ant Colony Algorithm (ACO) was discussed. A new method of Correlation Coefficient, the Ant Colony Algorithm and Support Vector Machine (cACO-SVM) was proposed, which analyzed the relevant indicators to determine index set, using ACO, optimization of SVM parameters to draw a good penalty factor C and kernel function sigma and epsilon insensitive coefficient and training SVM, the method improved the training accuracy. Optimization of the land intensive utilization evaluation based on cACO-SVM was put forward, comparing …


Forestry Fire Spatial Diffusion Model Based On Integration Of Multi-Agent Algorithm With Cellular Automata, Zhao Di, Zhisheng Xu Jun 2020

Forestry Fire Spatial Diffusion Model Based On Integration Of Multi-Agent Algorithm With Cellular Automata, Zhao Di, Zhisheng Xu

Journal of System Simulation

Abstract: In view of the existing ultrasonic detection signal attenuation, directional difference, complex propagation paths, and characteristics of the components of complex, a kind of intelligent concrete defect nondestructive detection algorithm based on multi resolution singular entropy was put forward. By using the wavelet algorithm, the ultrasonic signal was decomposed into high, low frequency components of multi scales for each component, then each component was decomposed by singular spectrum analysis, at the same time using the information entropy theory, the calculation of singular entropy as the characteristic defect detection value, using the GA-SVM algorithm was used to train the singular …


Malware Classification Based On Hidden Markov Model And Word2vec Features, Aparna Sunil Kale May 2020

Malware Classification Based On Hidden Markov Model And Word2vec Features, Aparna Sunil Kale

Master's Projects

Malware classification is an important and challenging problem in information security. Modern malware classification techniques rely on machine learning models that can be trained on a wide variety of features, including opcode sequences, API calls, and byte ��-grams, among many others. In this research, we implement hybrid machine learning techniques, where we train hidden Markov models (HMM) and compute Word2Vec encodings based on opcode sequences. The resulting trained HMMs and Word2Vec embedding vectors are then used as features for classification algorithms. Specifically, we consider support vector machine (SVM), ��-nearest neighbor

(��-NN), random forest (RF), and deep neural network (DNN) classifiers. …


Comparative Analysis Of Classification Techniques For Network Fault Management, Mohammed Madi, Fidaa Jarghon, Yousef Fazea, Omar Almomani, Adeeb Saaidah Jan 2020

Comparative Analysis Of Classification Techniques For Network Fault Management, Mohammed Madi, Fidaa Jarghon, Yousef Fazea, Omar Almomani, Adeeb Saaidah

Turkish Journal of Electrical Engineering and Computer Sciences

Network troubleshooting is a significant process. Many studies were conducted about it. The first step in the troubleshooting procedures is represented in collecting information. It's collected in order to identify the problems. Syslog messages which are sent by almost all network devices include a massive amount of data that concern the network problems. Based on several studies, it was found that analyzing syslog data (which) can be a guideline for network problems and their causes. The detection of network problems can become more efficient if the detected problems have been classified based on the network layers. Classifying syslog data requires …


Flood Detection Using Multi-Modal And Multi-Temporal Images: A Comparative Study, Kazi Aminul Islam, Mohammad Shahab Uddin, Chiman Kwan, Jiang Li Jan 2020

Flood Detection Using Multi-Modal And Multi-Temporal Images: A Comparative Study, Kazi Aminul Islam, Mohammad Shahab Uddin, Chiman Kwan, Jiang Li

Electrical & Computer Engineering Faculty Publications

Natural disasters such as flooding can severely affect human life and property. To provide rescue through an emergency response team, we need an accurate flooding assessment of the affected area after the event. Traditionally, it requires a lot of human resources to obtain an accurate estimation of a flooded area. In this paper, we compared several traditional machine-learning approaches for flood detection including multi-layer perceptron (MLP), support vector machine (SVM), deep convolutional neural network (DCNN) with recent domain adaptation-based approaches, based on a multi-modal and multi-temporal image dataset. Specifically, we used SPOT-5 and RADAR images from the flood event that …


Bringing Statistical Learning Machines Together For Hydro-Climatological Predictions - Case Study For Sacramento San Joaquin River Basin, California, Balbhadra Thakur, Ajay Kalra, Sajjad Ahmad, Kenneth W. Lamb, Venkat Lakshmi Dec 2019

Bringing Statistical Learning Machines Together For Hydro-Climatological Predictions - Case Study For Sacramento San Joaquin River Basin, California, Balbhadra Thakur, Ajay Kalra, Sajjad Ahmad, Kenneth W. Lamb, Venkat Lakshmi

Civil and Environmental Engineering and Construction Faculty Research

Study region: Sacramento San Joaquin River Basin, California Study focus: The study forecasts the streamflow at a regional scale within SSJ river basin with largescale climate variables. The proposed approach eliminates the bias resulting from predefined indices at regional scale. The study was performed for eight unimpaired streamflow stations from 1962–2016. First, the Singular Valued Decomposition (SVD) teleconnections of the streamflow corresponding to 500 mbar geopotential height, sea surface temperature, 500 mbar specific humidity (SHUM500), and 500 mbar U-wind (U500) were obtained. Second, the skillful SVD teleconnections were screened non-parametrically. Finally, the screened teleconnections were used as the streamflow predictors …


Probabilistic Modeling Of Democracy, Corruption, Hemophilia A And Prediabetes Data, A. K. M. Raquibul Bashar Sep 2019

Probabilistic Modeling Of Democracy, Corruption, Hemophilia A And Prediabetes Data, A. K. M. Raquibul Bashar

USF Tampa Graduate Theses and Dissertations

Parametric analysis of any real-world data is the most powerful tool to characterize the probabilistic behavior in social, economic, medical, epidemiological, and other areas of study. In the present study, we identify the theoretical Probability Distribution Function(PDF) for Democracy Index Scores (DIS) from the Economist Intelligence Unit (EIU) database and estimate the maximum likelihood estimates of the theoretical PDFS. We also identify the individual PDFs for each of the clusters, Full Democracy, Flawed Democracy, Hybrid Regime, and Authoritarian Regime defined by the Economist Intelligence Unit (EIU).

A statistical model is a convenient instrument to predict the future value of any …


Coral Reef Change Detection In Remote Pacific Islands Using Support Vector Machine Classifiers, Justin J. Gapper, Hesham El-Askary, Erik Linstead, Thomas Piechota Jun 2019

Coral Reef Change Detection In Remote Pacific Islands Using Support Vector Machine Classifiers, Justin J. Gapper, Hesham El-Askary, Erik Linstead, Thomas Piechota

Mathematics, Physics, and Computer Science Faculty Articles and Research

Despite the abundance of research on coral reef change detection, few studies have been conducted to assess the spatial generalization principles of a live coral cover classifier trained using remote sensing data from multiple locations. The aim of this study is to develop a machine learning classifier for coral dominated benthic cover-type class (CDBCTC) based on ground truth observations and Landsat images, evaluate the performance of this classifier when tested against new data, then deploy the classifier to perform CDBCTC change analysis of multiple locations. The proposed framework includes image calibration, support vector machine (SVM) training and tuning, statistical assessment …


Topic Classification Using Hybrid Of Unsupervised And Supervised Learning, Jayant Shelke May 2019

Topic Classification Using Hybrid Of Unsupervised And Supervised Learning, Jayant Shelke

Master's Projects

There has been research around the idea of representing words in text as vectors and many models proposed that vary in performance as well as applications. Text processing is used for content recommendation, sentiment analysis, plagiarism detection, content creation, language translation, etc. to name a few. Specifically, we want to look at the problem of topic detection in text content of articles/blogs/summaries. With the humungous amount of text content published each and every minute on the internet, it is imperative that we have very good algorithms and approaches to analyze all the content and be able to classify most of …


Classification Of Malware Models, Akriti Sethi May 2019

Classification Of Malware Models, Akriti Sethi

Master's Projects

Automatically classifying similar malware families is a challenging problem. In this research, we attempt to classify malware families by applying machine learning to machine learning models. Specifically, we train hidden Markov models (HMM) for each malware family in our dataset. The resulting models are then compared in two ways. First, we treat the HMM matrices as images and experiment with convolutional neural networks (CNN) for image classification. Second, we apply support vector machines (SVM) to classify the HMMs. We analyze the results and discuss the relative advantages and disadvantages of each approach.


Javascript Metamorphic Malware Detection Using Machine Learning Techniques, Aakash Wadhwani May 2019

Javascript Metamorphic Malware Detection Using Machine Learning Techniques, Aakash Wadhwani

Master's Projects

Various factors like defects in the operating system, email attachments from unknown sources, downloading and installing a software from non-trusted sites make computers vulnerable to malware attacks. Current antivirus techniques lack the ability to detect metamorphic viruses, which vary the internal structure of the original malware code across various versions, but still have the exact same behavior throughout. Antivirus software typically relies on signature detection for identifying a virus, but code morphing evades signature detection quite effectively.

JavaScript is used to generate metamorphic malware by changing the code’s Abstract Syntax Tree without changing the actual functionality, making it very difficult …


An Improved Tree Model Based On Ensemble Feature Selection For Classification, Chandralekha M, Shenbagavadivu N Jan 2019

An Improved Tree Model Based On Ensemble Feature Selection For Classification, Chandralekha M, Shenbagavadivu N

Turkish Journal of Electrical Engineering and Computer Sciences

Researchers train and build specific models to classify the presence and absence of a disease and the accuracy of such classification models is continuously improved. The process of building a model and training depends on the medical data utilized. Various machine learning techniques and tools are used to handle different data with respect to disease types and their clinical conditions. Classification is the most widely used technique to classify disease and the accuracy of the classifier largely depends on the attributes. The choice of the attribute largely affects the diagnosis and performance of the classifier. Due to growing large volumes …


Improving Ultra-Wideband Localization By Detecting Radio Misclassification, Cory A. Mayer Dec 2018

Improving Ultra-Wideband Localization By Detecting Radio Misclassification, Cory A. Mayer

Master's Theses

The Global Positioning System (GPS) and other satellite-based positioning systems are often a key component in applications requiring localization. However, accurate positioning in areas with poor GPS coverage, such as inside buildings and in dense cities, is in increasing demand for many modern applications. Fortunately, recent developments in ultra-wideband (UWB) radio technology have enabled precise positioning in places where it was not previously possible by utilizing multipath-resistant wide band pulses.

Although ultra-wideband signals are less prone to multipath interference, it is still a bottleneck as increasingly ambitious projects continue to demand higher precision. Some UWB radios include on-board detection of …