Search results
(41 - 60 of 392)
Pages
- Title
- DEPTH MAP PROCESSING FOR MULTI-VIEW VIDEO PLUS DEPTH
- Creator
- Vijayanagar, Krisha Rao
- Date
- 2014, 2014-05
- Description
-
The world of multimedia and visual entertainment has grown in leaps and bounds in the past decade with 3-D television being one of the biggest...
Show moreThe world of multimedia and visual entertainment has grown in leaps and bounds in the past decade with 3-D television being one of the biggest technologies. Amongst several formats proposed for representing 3-D content, multi- view video plus depth (MVD) format has gained a lot of interest in the past few years. MVD requires that each view of a particular scene be accompanied by a per-pixel depth. This introduces new problems for compression and transmission of MVD content because a depth map has di erent characteristics from a color image. Keeping the MVD format and depth map characteristics in mind, we highlight three majors problems that plague the MVD format, namely, 1. depth map re nement. 2. depth map compression. 3. novel view synthesis using the depth map at the decoder side. In order to re ne a depth map, we propose a multi-resolution anisotropic di usion algorithm that is optimized to run in real-time thus ensuring that the encoder does not su er from additional latency. Next, we propose two unique solutions for compressing them. We rst propose a solution using the Layered Depth Video (LDV) concept using a rate-distortion optimized quadtree decomposition of the LDV using a novel two-mode block truncation code with improved prediction. We also propose a compression solution using compressive sensing (CS) concepts by creating a hybrid rate-optimized CS codec. This codec achieves two goals:- rstly, block classi cation to ensure lower decoder complexity and secondly, rate-distortion optimization of the measurement rate for each block that is to be compressively sensed. We then look at the view synthesis component of the MVD tool-chain which x is a time-sensitive process. Keeping decoding latency in mind, we propose a lookup- table based approach to the 3-D warping process with a simpli ed hole- lling algorithm that is not only competitive quality-wise with other schemes but is several times faster too. It is hopeful that the presented techniques can be used successfully to create MVD architectures for applications that need low-complexity encoding solutions.
PH.D in Electrical Engineering, May 2014
Show less
- Title
- COMPUTER MODELING OF BREAST LESIONS AND STUDIES OF ANALYZER-BASED X-RAY IMAGING
- Creator
- Garcia, Luis De Sisternes
- Date
- 2011-11, 2011-12
- Description
-
Phase-contrast x-ray imaging is an emerging technique that promises to yield highly sensitive medical images of soft tissue, which is...
Show morePhase-contrast x-ray imaging is an emerging technique that promises to yield highly sensitive medical images of soft tissue, which is difficult to observe via conventional radiography given its low X-ray attenuation differences. One of these phase-contrast techniques, known as analyzer-based imaging, has demonstrated that highly detailed breast tissue images can be obtained using synchrotron radiation. However, synchrotron facilities are impractical for clinical use. This thesis introduces studies and exposure consideration towards the application of analyzer-based imaging in a clinical environment, particularly in the context of breast imaging. It also introduces a computational breast lesion model that generates randomized three-dimensional phantoms which follow realistically the characteristics observed in real lesions. Moving analyzer-based imaging to clinical application requires the consideration of photon noise, inherent from the use of a photon-limited conventional source. We summarize the statistical properties in the presence of photon noise of two popular analyzer-based imaging techniques, known as diffraction-enhanced imaging (DEI) and multiple-image radiography (MIR). The statistics for MIR have not been previously derived and are introduced in this thesis. Comparison of the resulting statistical predictions with results obtained by Monte Carlo simulation validated the analysis. An expression for the maximum-likelihood (ML) solution for analyzer-based imaging is presented as a way of minimizing the effects of photon noise in the reconstruction of the object’s absorption, refraction and ultra-small angle scattering properties, and more practical maximum-likelihood expectation-maximization (ML-EM) and maximum-a-posteriori expectation-maximization (MAP-EM) solutions are also introduced. The behavior of the ML-EM and MAP-EM solutions was compared to the results produced by the five best-known analyzer-based reconstruction methods using computer simulations. The ML-EM and MAP-EM reconstructions proved closer to the theoretical values as they do not rely on commonly known limitations and approximations introduced by the other techniques. We introduce the development and evaluation of a new computational breast lesion phantom model that can simulate either massess or microcalcifications. The proposed tool allows the generation of a large number of randomized three-dimensional breast lesion simulations following desired characteristics normally used to describe breast lesions in clinical practice. The initial motivation for the development of this new phantom model was to enable the proposed evaluations of analyzer-based imaging to be achieved. However, the model became a major focus of this thesis because it improves significantly upon those that can be found in previous literature. The proposed lesion model can be used for evaluation studies across different breast imaging techniques, as well as for training purposes, so it is our hope that it could become an important resource for the broader mammography research community. As part of the lesion modeling research, we also introduce methods to computationally modify experimental mammography and analyzer-based images of breast tissue so that they present the generated tumor simulations embedded within their parenchyma realistically. The realism of the simulated lesion images was evaluated by comparison of 83 real tumor cases observed in mammograms with 83 constructed hybrid images in which simulated tumors matching the characteristics observed in the real cases were embedded, with healthy tissue acting as background. As a quantitative comparison, extracted features describing tumor shape and density showed no statistically significant differences between real and simulated tumors. A known computational tumor classification technique based on their shape observed in mammography was implemented and showed no significant performance differences between real and simulated cases, as well as showing good correlation with previously published performance results in real tumors. To measure the realism for use in human observer studies, we conducted a reader study in which 5 experienced radiologists were asked to judge whether each of the 166 images was real or simulated by assigning a score on a 7-point scale. The results were analyzed in a multiple-reader multiple-case statistical framework. The conclusion of the study was that the readers’ accuracy in assessing whether the lesions were real or simulated was not significantly better than random chance. This thesis also incorporates a reader study to evaluate the degree to which photon-limited analyzer-based images may be effective for visualization of breast cancer features. Our motivation was to establish the x-ray intensity that would be required to make these methods feasible, the purpose being to serve as a guide in parameter selection for future design of imaging hardware. We conducted a series of observer studies that quantify the performance of analyzer-based refraction images at different noise levels for the task of identifying subtle details present in breast tumors which are relevant to clinical diagnosis. The cases shown to the readers consisted of hybrid images where simulated lesions of known characteristics were computationally embedded in real breast analyzer-based background images. The original phase-contrast data was obtained using synchrotron radiation and was later modified to simulate the noise and blurring effects produced from a photon-limited source with a 300μm aperture size, similar to those used in a laboratory environment. Results showed that the analyzer-based imaging techniques statistically outperformed conventional mammography for the given task with an average of just 128 recorded photons per pixel in background image regions
Ph.D. in Electrical Engineering, December 2011
Show less
- Title
- Variable speed motor control
- Creator
- Fry, August, Baker, Charles
- Date
- 2009, 1906
- Publisher
- Armour Institute of Technology
- Description
-
http://www.archive.org/details/variablespeedmot00frya
Thesis (B.S.)--Armour Institute of Technology
- Title
- SPECTRUM OBSERVATORY BASED TRAFFIC MODELING AND CHANNEL SELECTION IN SUPPORT OF DYNAMIC SPECTRUM ACCESS
- Creator
- Bacchus, Brent Roger
- Date
- 2015, 2015-05
- Description
-
It is well known that the exponential growth in popularity of wireless devices has created a demand for radio spectrum that cannot be met with...
Show moreIt is well known that the exponential growth in popularity of wireless devices has created a demand for radio spectrum that cannot be met with current regulatory policies. Despite the difficulty in procuring access to new spectrum resources, many empirical studies have indicated that the majority of spectrum is in-fact unused in the temporal, spatial and/or spectral domains, representing an untapped wealth that must be exploited. Dynamic Spectrum Access (DSA) is a promising technology which aims to improve the efficiency of future radios and alleviate the issue of spectrum under-utilization. This dissertation utilizes the data from the IIT Spectrum Observatory to develop models of channel activity on the Land Mobile Radio (LMR) band (used for critical communication by organizations such as public safety) and shows how such models can be applied to improve the performance of DSA. We demonstrate that LMR traffic may possess multi-timescale behavior – such as clustering and dispersion over different time periods – and propose a novel statistical model to account for these observations based on a multiple emission hidden Markov model. We then used this model to design a collision constrained channel selection algorithm that can permit the re-use of licensed spectrum while minimizing interference with incumbent users. The findings in this work are primarily developed for public safety, however the techniques developed are general enough to be applied to other types of traffic possessing similar characteristics. The proposed model, in particular, is well suited for further analytic work and simulations studies in this area.
Ph.D. in Electrical and Computer Engineering, May 2015
Show less
- Title
- HIGH PERFORMANCE LOGIC DESIGN FOR ADAPTIVE FIR FETAL ECG ESTIMATION
- Creator
- Wang, Sizhou
- Date
- 2014, 2014-05
- Description
-
This thesis presents realizations of IEEE-754 single precision floating point non-invasive fetal ECG estimation based on QR Decomposition...
Show moreThis thesis presents realizations of IEEE-754 single precision floating point non-invasive fetal ECG estimation based on QR Decomposition Recursive Least Square algorithm (QRD-RLS). Experiments of the system, which is implemented on Xilinx Zynq SoC platform, are carried out with electrocardiogram (ECG) data and the results with analysis are presented. The embedded system design aims for saving resources, streaming pipeline performance and software-aid computation and integration. The challenge of exploiting the system full potential with pseudo-parallel computation on multiple fetal ECG data packets is also examined.
M.S. in Computer and Electrical Engineering, May 2014
Show less
- Title
- TRANSMISSION RESERVE DESIGN IN ELECTRICITY MARKETS CONSIDERING RAMPING CONSTRAINTS AND LOAD UNCERTAINTY
- Creator
- Xiao, Xuli
- Date
- 2016, 2016-12
- Description
-
With increasing penetration of renewable energy, uncertainty challenges ISOs to keep power balance in real-time. As ramping issues draw public...
Show moreWith increasing penetration of renewable energy, uncertainty challenges ISOs to keep power balance in real-time. As ramping issues draw public attention, many ISOs have instituted flexible ramping products to ensure ramping reserve at generation side. However, not all the ramping reserves are deliverable when a transmission line is already congested. In the real-time market, if an uncertain load estimation is known at peak time t+10mins previously, SCUC/SCED is able to spare transmission reserve by changing the dispatch at time t with additional uncertain load constraints at t. To spare transmission reserve under uncertainty, this research proposes an uncertain load estimation to generate an estimated uncertain load and uncertainty constraints at t+10 in SCUC/SCED: with the help of a stochastic optimization model, uncertainties are quantified as a random actual load y and utilized in a modified stochastic model for undeliverable ramping reserve issues; once the optimal total system generation x is obtained, treated as an estimated uncertain load, uncertainty constraints are added at t+10mins in SCUC/SCED to obtain a secure dispatch at t. Therefore, transmission ramping reserve is ensured by a change in dispatch at t. Numerical results show that this design enhances the economy and scalability of power systems. In addition, scalability analysis proves it works for any scale of power systems with multiple local peak loads.
M.S. in Electrical Engineering, December 2016
Show less
- Title
- PARADIGM SHIFT IN REMOTE EDUCATION FOR THE LABORATORY: A SOCIAL APPROACH TO DISTANCE LEARNING
- Creator
- Hanley, Richard
- Date
- 2011-12, 2011-12
- Description
-
With modern telecommunication tools the ability for two individuals to work together remotely has greatly improved. Moreover, there have been...
Show moreWith modern telecommunication tools the ability for two individuals to work together remotely has greatly improved. Moreover, there have been great strides made to improve handling medium to large groups of people in real time in remote settings, viz. the teleconference and webinar. However, the status of remote tools for laboratory environments where there is significant hardware and the individuals are more likely to talk amongst themselves in irregular patterns is not nearly as well studied. This thesis examines the way most laboratories in electrical engineering are setup, and creates a model for how to create a remote environment for distance learning. It then discusses the current state of the art, and how such an implementation of the model can be made with such tools. Finally a usability study of the implementation is examined. The primary result of the usability study is that when moving to a remote environment the social paradigm that students and instructors use is likely to change, and simply working on creating a virtual mirror to the laboratory may not work in the future.
M.S. in Electrical Engineering, December 2011
Show less
- Title
- DEVELOPMENT OF A TESTBED FOR STUDYING SECURITY ISSUES IN VOIP NETWORKS
- Creator
- Olawoye, Oladeji
- Date
- 2011-12-06, 2011-12
- Description
-
VoIP is increasingly becoming an alternative to the traditional PSTN for Telephony this is as a result of certain advantages and services...
Show moreVoIP is increasingly becoming an alternative to the traditional PSTN for Telephony this is as a result of certain advantages and services offered by VoIP. VoIP will be considered able to fully replace PSTN if it can provide same or better Quality of Service and Security guaranty as PSTN. Delivering telephony services over (best-effort and connectionless) IP data network faces two main issues not experienced in PSTN, security and quality of service; security in the sense that telephone calls will be susceptible to attacks that are known in the Internet, quality of service in the sense that voice packets now have to compete with packets of other traffic for a limited bandwidth. Researches are ongoing in these two fields to make experience on VoIP similar to the traditional telephone. The focus of this thesis work is in the security aspect. SIP protocol has become one of the most popular signaling protocols used for VoIP, SIP architecture is an open architecture originally developed for trusted communications among trusted partners, and therefore much thought was not given to security. Adopting SIP as a main protocol used in VoIP in the Internet where there are where there are lots of hostile users calls for more ways to properly secure its use. The thesis work involves setting up of a SIP based VoIP network based on open source SIP telephony platforms to study various security issues in a SIP-Based VoIP network and experiment some proposed detection mechanism. The contribution of this work is to develop a graphical user interface in the UNIX environment using Java that makes the execution of the attack scenarios easy to carry out and observe.
M.S. in Electrical Engineering, December 2011
Show less
- Title
- LOG ANALYSIS FOR RELIABILITY MANAGEMENT IN LARGE-SCALE SYSTEMS
- Creator
- Zheng, Ziming
- Date
- 2012-07-16, 2012-07
- Description
-
With the increasing scale and complexity of high performance computing (HPC) systems, reliability management is becoming a major concern....
Show moreWith the increasing scale and complexity of high performance computing (HPC) systems, reliability management is becoming a major concern. System logs are the primary source of information to understand and analyze system problems. Nevertheless, manual log processing is time-consuming, error-prone, and not scalable. Currently little study has been done on automated log analysis for practical use in HPC systems. In this thesis, we present a log analysis infrastructure by exploiting data mining and machine learning technologies. Our work can be broadly divided into four parts: log pre-processing, online failure prediction, automatic root cause diagnosis, and reliability modeling. We evaluate our results by means of system logs collected from production HPC systems. This work can greatly improve our understanding of faults and failures arising from hardware/software components and their interactions. It can further facilitate the reliability management for HPC systems.
Ph.D. in Computer Science, July 2012
Show less
- Title
- APPLICATION OF SPECTRUM OBSERVATORY MEASUREMENTS TO SUPPORT TRAFFIC MODEL-BASED DYNAMIC SPECTRUM ACCESS
- Creator
- Taher, Tanim Mohammed
- Date
- 2014, 2014-07
- Description
-
In a 2012 report, the President’s Council of Advisors in Science and Technology (PCAST) published a memorandum that calls for the...
Show moreIn a 2012 report, the President’s Council of Advisors in Science and Technology (PCAST) published a memorandum that calls for the identification of 1000 MHz of Federal Spectrum to be shared with private (commercial) users. This dissertation proposes a system that employs RF measurements for spectrum usage modeling and Dynamic Spectrum Access (DSA) methodologies that utilize the modeling information to permit sharing of wireless resources. A procedure called the Comprehensive Band Modeling (CBM) procedure is developed that automatically models measured RF data from any band of interest and identifies the locations of signals and holes present in the band. The output of the CBM procedure is summarized in a compact versatile format that makes DSA applications feasible. The research primarily focuses on the 450-474 MHz land mobile radio (LMR) band, and several additional bands like the TV band and the 2.5-2.7 GHz band. However, the research methodology and techniques are broadly applicable to many more frequency ranges. The research has four main areas: (a) spectrum sensor design and measurements, (b) occupancy modeling, (c) communicating the modeling information in a compact form to secondary users to support DSA algorithms and protocols, and (d) tools and metrics for spectrum sharing favorability analysis. Three spectrum sensor platforms were employed in measurements – (1) a spectrum analyzer based Spectrum Observatory (SO) that was developed earlier, (2) a specially purposed software-defined radio (SDR) for measuring LMR channels, (3) and a high-speed and portable SO system based on a sensor called the RFeye. An SO continually measures RF data in a band at a high temporal resolution such that the channel switching activity is seen – like, transmitters turning on and off. Spectrum measurements of the individual RF channels in the 450-474 MHz LMR band and the two commercial bands are used to generate statistical traffic and occupancy models. Long-term measurement data is used to assess how stationary the channel is, and how often the model parameters need to be updated. The spectrum observatory supports a network of Secondary Users (SU) by communicating the traffic model parameters in a compact format to the SUs. The SUs share Primary User (PU) channels via DSA techniques. The DSA algorithms take advantage of the model parameters provided by the SO to maximize SU throughput with limited interference on the PU. The DSA coexistence techniques are evaluated via simulation. The simulation results including Spectrum Opportunity Accessed (SOA), SU throughput, and collision rates are then analyzed to provide an assessment of DSA-based spectrum sharing in that band. The main contribution of this dissertation is the aforementioned CBM procedure. The white spaces in the frequency and time domains, that is, the underutilized spectrum opportunities available for possible secondary use via DSA are automatically identified, as well as the frequency locations that are not conducive to DSA due to the presence of frequent primary licensee transmissions. In CBM, white spaces are referred to as ‘Holes’, and the licensed primary transmission frequencies as ‘Signals’. Useful information about the duty cycles and traffic patterns of incumbent users’ activity within possible secondary use channels is extracted and modeled. The model enables prospective secondary users of white spaces to predict the expected level of interference in any channel, which allows for channel ranking and optimal selection of DSA transmission parameters. The CBM model is describable by a tiered structure, where the first tier identifies the holes and signals; the second tier ranks the holes in terms of available bandwidth and incumbent duty cycle; and the third tier models the infrequent incumbent transmissions. With the three tiers of information, an SU can readily identify all the suitable DSA channels within the entire spectrum band. This essential summary information is retrieved as a “Hole Descriptor Object” (HDO) that is both compact and tractable. Empirical spectrum measurement data obtained from the three different SO platforms is used to test the performance of the CBM procedure in the 2500-2700 MHz frequency range that currently has WiMAX deployments, the TV white space band, and the 450-474 MHz LMR band in Chicago. Spectrum measurement data runs into hundreds of megabytes or gigabytes. As such, the raw information is not very applicable in practical wireless networks. The HDO objects on the other hand are compact and only kilobytes in size. The HDO objects contain all the useful and applicable information necessary for any smart radio (primary or secondary) to select transmission parameters like frequency of operation and bandwidth, so that it can efficiently operate. Thus, the advantage of the CBM procedure is that it summarizes gigabytes of raw spectrum measurements in a usable compact format that can be directly used by practical smart radios to operate using DSA paradigms. Another advantage of CBM is that it is comprehensive and automatically identifies all holes and signals. The research findings are of interest and value to a variety of Federal and Commercial entities. The models and relevant model parameters for public safety radio in the LMR band have been provided on request to the Public Safety and Homeland Security Bureau of the Federal Communications Commission (FCC). The DSA feasibility analysis methodology is of great national economic interest based on the contents of the PCAST report. The PCAST report recommends finding 1000 MHz of federal frequencies to be allocated for shared commercial and federal use. However, the technology for doing so and identifying the suitable bands requires measurements of actual spectrum usage, modeling the occupancy and existing traffic activity, and assessing DSA feasibility – these are important research aspects, and all of which are addressed in this dissertation. The results are of crucial importance to policy makers like the FCC and NTIA who will ultimately make the spectrum allocations decisions. A future network of commercial DSA SU radios operating in a shared band is likely to need access to a system to obtain live information about PU activity to optimally operate in the band with high throughput and low interference. The overall system, based on the CBM procedure and HDO objects, proposed in this thesis describes a framework for providing this information as a service to DSA networks, and hence the work is also of practical relevance to radio system designers.
Ph.D. in Electrical Engineering, July 2014
Show less
- Title
- Study of electric rates and ratemaking
- Creator
- Barrer, Glen A, Shaffer, Sydney
- Date
- 2009, 1915
- Publisher
- Armour Institute of Technology
- Description
-
http://www.archive.org/details/studyofelectricr00barr
Thesis (B.S.)--Armour Institute of Technology, 1915 Bibliography: leaves 43-47 B.S. in...
Show morehttp://www.archive.org/details/studyofelectricr00barr
Thesis (B.S.)--Armour Institute of Technology, 1915 Bibliography: leaves 43-47 B.S. in Electrical Engineering, 1915
Show less
- Title
- SECURITY-CONSTRAINED UNIT COMMITMENT RESERVE DETERMINATION IN JOINT ENERGY AND ANCILLARY SERVICES AUCTION
- Creator
- Ganji Tanha, Mohammad Mahdi
- Date
- 2012-07-25, 2012-07
- Description
-
This study presents the method in which the energy and ancillary services auction is simultaneously cleared in electricity market. By the...
Show moreThis study presents the method in which the energy and ancillary services auction is simultaneously cleared in electricity market. By the security-constraint unit commitment model proposed in this study Independent System Operators (ISO) can determines the sufficient amount of reserve which is necessary to maintain security and reliability of the system. Before the fixed reserve requirement either equal to a percentage of the system peak load or a thermal unit with highest capacity is considered in energy and ancillary service auction in market clearing. The disadvantage of this method is high cost and insufficiency. When it is insufficient the system operator needs to committee more thermal units or does the load curtailment. At the time the fixed quantity is more than needed customers pay more although it is not necessary. Here the sufficient amount of reserve is determined based on the contingency which has been simulated. Contingencies include thermal unit outage and line outage is considered. The amount of reserves is obtained based on thermal units’ physical constraints and the rate offered in the electricity market. Then the integration of wind generation and its effects on the quantity of the reserve determination is considered. Since the wind power generation brings uncertainties to the power system we need to consider scenarios. In order to generate wind power generation scenarios we use Monte Carlo simulation. Since the number of scenarios are too much and increase the problem complexity we use Fast backward/forward scenario reduction. This problem is solved through direct optimization problem including the minimization of the operational cost as well as satisfying the network security constraints when contingency happens.
M.S. in Electrical Engineering, July 2012
Show less
- Title
- COMMUNICATION AND COMPUTATION ARCHITECTURES FOR DISTRIBUTED WIRELESS SENSOR NETWORKS AND INTERNET OF THINGS
- Creator
- Yi, Won-jae
- Date
- 2017, 2017-07
- Description
-
Real-time data communication has been viral since the era of the smartphone rose to prominence in this decade. All communications from human...
Show moreReal-time data communication has been viral since the era of the smartphone rose to prominence in this decade. All communications from human to human, from device to human, and from device to device are handled over the Internet connection either through a mobile Internet service provider or Wi-Fi, which enables information exchange including weather service, road traffic conditions, news alerts, package tracking notifications. By looking at different perspectives of the role of a smartphone, it reveals itself as an ideal device to mobilize critical user data to construct a real-time monitoring application such as in remote healthcare and home automation systems. Not only can the smartphone handle real-time data transmissions, but it can also handle real-time computations on the device itself by utilizing its embedded CPU. This dissertation is a comprehensive study of the investigation, exploration and experimentation on a real-time health monitoring system where quality of life can be improved when the conventional system may affect and hamper regular daily activities. The design flow of this system is based on the Internet connection where any device that is communicatively associated with the smartphone can be connected to the Internet. By utilizing the Android smartphone, not only does the system gain real-time data transmission capability, but it also obtains flexibility to communicate with different types of sensors and platforms through multiple wireless protocols. This system is highly adaptable to the currently trending Internet of Things (IoT) standards, where significantly increasing anticipation over its social impact, where it can assist populations in rural and distant areas for healthcare, day-to-day activity monitoring, and prevention against hazardous conditions for workers. The system architecture introduced in this research is focused on reconfigurability and compatibility of wireless sensors where they are independent from a certain platform in which sensors are not limited to medical devices but also detect movement, location, climate condition and any other sensor for analyzing the environment. Four major components are introduced in this research including wireless sensor nodes, a central sensor data processing and communication node, an Android application, and a central database server. They are discussed and explored to seek for solutions to improve and enhance features in the fundamental system design. Communication and computation processing capabilities are evaluated for all major components for practical usage of the system for different case studies. Also as a quantitative case study, a posture and fall detection system is presented which determines the patient's activities, medical conditions and the cause of an emergency event through the integration of all system architecture components. Adapting the IoT system is also explored in this dissertation by introducing a protocol standard to improve data transmission efficiency and to enable cross-platform compatibility of wireless devices. In addition to improving system efficiency, a study on data security issues and assessment on sensor data has been explored by implementing a proposed security scheme to each major component within the real-time mobile monitoring system. Also, a concept of Quality-of-Service (QoS) for mobile monitoring system using a wireless sensor network has been investigated to provide a solution to prioritize sensor data transmissions based on the results obtained from the sensor data assessment application. The proposed solutions can be either implemented on or under the application layer.
Ph.D. in Computer Engineering, July 2017
Show less
- Title
- REAL-TIME TRAFFIC SIGN RECOGNITION WITH RECONFIGURABLE HARDWARE
- Creator
- Waite, Sheldon
- Date
- 2012-07-12, 2012-07
- Description
-
This work describes an implementation of a system that recognizes tra c signs within an image or video frame. In addition it covers a brief...
Show moreThis work describes an implementation of a system that recognizes tra c signs within an image or video frame. In addition it covers a brief history of automotive technology and the safety motivations for the technology presented here. An algo- rithm is presented that takes RGB image data, extracts relevant pixels, lters the image, labels prospective tra c signs and evaluates them against template tra c sign images. Furthermore a system is described that uses a Virtex 5 Xilinx FPGA and the EDK tool kit to create an embedded processor and a hardware IP periph- eral that together implement the algorithm. This implementation is shown to have positive results both in terms of timing performance and accuracy.
M.S. in Computer Engineering, July 2012
Show less
- Title
- Optimal Behavior Modeling and Analysis of Electricity Market Participants
- Creator
- Li, Jie
- Date
- 2012-04-27, 2012-05
- Description
-
n restructured electricity power markets, competition among market participants is a key issue of concern for both the ISO (Independent System...
Show moren restructured electricity power markets, competition among market participants is a key issue of concern for both the ISO (Independent System Operator) and the market participants themselves. This dissertation analyzes the market behavior of both the generation side and demand side participants, and provides solution guidelines for devising effective competition strategies for market players’ profit maximization objectives. Generation side is the most competitive part in the electricity market with the unbundling of generation, transmission and distribution. Acting as self-interested entities, GENCOs (Generation Companies) are seeking effective and computationally efficient methodology for generation resource scheduling, while keeping its financial risks at acceptable levels when constituting bidding strategies. To help GENCOs achieve such goal, this dissertation propose a game theory based supply function like bidding model to construct the optimal bidding strategies for GENCOs in both energy and ancillary service markets. On the demand side, demand participation in the electricity market has already been advocated for a long time for its benefit to the entire market and the society as a whole. This dissertation focuses on a specific large electricity consumer type – Internet Data Center (IDC). By analyzing the unique energy consumption pattern for different IDC applications, this dissertation devises effective electric demand management solution for IDCs to conserve electricity energy consumption and cut electric bill, and quantifies the demand response effect of IDC on the electricity market.
Ph.D. in Electrical Engineering, May 2012
Show less
- Title
- Tests on a Martin rotatory converter
- Creator
- Bacon, M. F., Rensch, R. H.
- Date
- 2009, 1919
- Publisher
- Armour Institute of Technology
- Description
-
http://www.archive.org/details/testsonmartinrot00baco
Thesis (B.S.)--Armour Institute of Technology; Bibliography: leaves i-ii
- Title
- LICENSE PLATE RECOGNITION SYSTEM USING K NEAREST NEIGHBOR ALGORITHM
- Creator
- Xia, Yong
- Date
- 2012-12-03, 2012-12
- Description
-
License Plate Recognition (LPR) is an image-processing technology, also known as Automatic Number Plate Recognition (ANPR). This technology is...
Show moreLicense Plate Recognition (LPR) is an image-processing technology, also known as Automatic Number Plate Recognition (ANPR). This technology is very popular in fighting crime, locating stolen car, identifying parking-ticket and so on. In LPR system, the image is taken of the front or rear of the car and its quality needs to be enhanced for further process. With this enhanced image, first license plate region is located and extracted. Then character segmentation is performed on extracted license plate image. In this thesis, we use K Nearest Neighbor (KNN) algorithm to recognize these segmented characters. Keywords: LPR, Plate location, character segmentation, Image Processing, KNN
M.S.in Electrical Engineering, December 2012
Show less
- Title
- ULTRASONIC RANGING AND INFRARED DEPTH PROFILING FOR 3D IMAGE RECOl'STRUCTION AND SCENE ANALYSIS
- Creator
- Jia, Weldi
- Date
- 2013, 2013-07
- Description
-
This doctoral work cannot be done without the help, support and dedication of numerous people. First of all, I will give my great thanks to my...
Show moreThis doctoral work cannot be done without the help, support and dedication of numerous people. First of all, I will give my great thanks to my advisor Dr. Jafar Saniie, who is patient, fundamental and knowledgeable in providing advices, suggestions and guidance to all my six years' study. I would like to express my sincere thanks for his encouragement and nancial support during my study. I will never forget the days and nights he spent with me doing research work in the ECASP research lab. His spirit of carefully searching, friendly talking and knowledgeably thinking stays in my mind forever. My gratitude extends to my committee members, Dr. Anjali, Dr. Moderes and Dr. Oruklu. Also, I would like to give my thanks to my colleagues and friends, especially the people in ECASP research lab, Won-Jae, Sufeng, Thomas, Spenser and Pramod. Their kindness and powerful knowledge in di erent elds help me enhance my work so much. I will never forget the days debugging programs with them and the days we cheered for our success. I would like to dedicate this thesis to my family, especially to my grandfather who just passed away but gave me nancial support and advices from childhood till now, my father who is not able to speak after an accident during my study, my mother who is taking care of my father herself during the past six years, and my wife Wenhui Liu, who encouraged and helped me living in the United States. I promise that I will use what I learned from here to change the world and their constant support of my academic ventures from the beginning to the present would be valuable. Thank you Grandpa, rest in peace in heaven.
PH.D in Electrical Engineering, July 2013
Show less
- Title
- ANTENNA LOCATION DESIGN IN DOWNLINK DISTRIBUTED ANTENNA SYSTEM
- Creator
- Zhang, Peng
- Date
- 2015, 2015-07
- Description
-
In recent years, Wireless cellular network design with distributed antenna system (DAS) has received much attention for its ability to extend...
Show moreIn recent years, Wireless cellular network design with distributed antenna system (DAS) has received much attention for its ability to extend the cell coverage, improve spectral efficiency and increase the system capacity. Instead of locating all antennas at the cell center in the centralized antenna systems (CAS), distributed antenna basements in the DAS are separated geographically, which has been wide implemented to cover the dead spots and improve the system efficiency in wireless communication systems The mainly purpose of this research is to find optimal antenna locations that maximize the cell average ergodic capacity for the distributed-antenna system in downlink applied condition. Squared distance criterion (SDC) will be considered to offer an object function to maximize the lower bound of the cell average ergodic capacity. Existed analyses for location design in distributed antenna system are based on the uniform distribution without considering other cell interference. Considering other cell interference, I derive the analytical antenna location position for the infinite uniform distribution linear cell. For multi-cell applied condition implementation, I get reasonable locations of the applied condition by applying K-means algorithm to generating the initial values and find the optimal location. In order to solve the multi-cell scenario considering other-cell interference, I change the existed algorithm and simulation results show the performance of the obtained antenna location with changed algorithm offer a higher performance than the original one. I propose a circle initial setup to generate the initial points for relative location and converge fitting. The simulation has showed the initial setup I proposed significant reduce the computation in the antenna location design in applied downlink scenario.
M.S. in Electrical Engineering, July 2015
Show less
- Title
- EFFICIENT AND FAIR RESOURCE ALLOCATION FOR OFDMA NETWORKS
- Creator
- Alavi, Seyed Mohamad
- Date
- 2012-11-26, 2012-12
- Description
-
In Orthogonal Frequency Division Multiple Access (OFDMA) systems, resources, including subcarriers, bits and power, need to be adaptively...
Show moreIn Orthogonal Frequency Division Multiple Access (OFDMA) systems, resources, including subcarriers, bits and power, need to be adaptively allocated to users in order to improve spectral efficiency, increase capacity, and reduce power consumption, while satisfying the Quality of Service (QoS) requirements for users. Most of the previous works concentrate on satisfying rate and power requirements, however providing delay requirement is also necessary, especially with increasing demand on delay-sensitive applications. We first model the resource allocation problem as a cross-layer optimization problem considering the constraints on bit error rate (BER), data rate, total power, as well as delay. We first develop a nonlinear optimization model, which generally requires high computation complexity. To consider a more realistic scenario, we take into account imperfect Channel State Information (CSI) due to estimation errors or channel feedback delay, and incorporate the imperfect CSI into the optimization problem formulation. We then derive the solution through a dual decomposition method. Due to the duality gap between the original and dual optimizations, we convert the non-linear optimization to an equivalent linear formulation so that an exact solution can be obtained. To further reduce the complexity, we develop a heuristic algorithm to provide a solution close to the optimum. Then, we study the notion of fairness in the context of resource allocation. In particular, cooperative game theory can be applied to OFDMA networks for fair resource allocation. We apply two cooperative games, Non-Transferable Utility (NTU) game and Transferable Utility (TU) game, to provide fairness in OFDMA networks. In NTU game, fairness is achieved by defining appropriate objective function, while in TU game, fairness is provided by forming the appropriate network structure. For NTU game, we analyze the Nash Bargaining Solution (NBS) as a solution of NTU game taking into account CSI and Queue State Information (QSI). In a TU game, we show that coalition among subcarriers to jointly provide rate requirements leads to better performance in terms of power consumpviii tion. We show that although NTU and TU games are modeled as rate adaptive and margin adaptive problems, respectively, but both solutions provide a fair distribution of resources with minimum fairness index of 0.8. Although NBS can provide fairness, the fairness is not from user perspective. In competitive fairness, which is based on auction theory, each user is responsible for his/her own action. A distributed allocation of resources in OFDMA networks is studied through auction theory. A combinatorial auction is formulated in which the users’ utility enforce the truthful resource demands. Since the original problem is NP hard, a method based on simulated annealing applied to find near-optimum results. Then, we turn our attention toward a more complicated scenario of multicell OFDMA networks. A combinatorial auction, which takes into account the interference from adjacent cells is presented. Auction objective is to minimize the interference, while power of users is limited. Due to the complexity of original problem, we apply a heuristic approach, in which the bids are ordered based on the linear programming approximation of combinatorial auction, and then local improvements are made in the order of bids. Our iterative approach along with the proposed load control scheme provides fair distribution of resources to the users, regardless of their position in the cell. Finally, we propose a comprehensive auction in OFDMA network. We present an auction framework for allocation of subcarriers, in which winner pays monitoring and entry fees, in addition to the price which he is paying for the allocated subcarrier. We prove that in our framework users will avoid bidding for the subcarriers where they have a relatively low chance of winning. We obtain optimal bidding strategy based on Bayesian Nash Equilibrium (BNE) in which users are maximizing their net profit. In a Fractional Frequency Reuse (FFR) implementation of frequency planning, we will find a focal distance which classifies the users into cell-center and cell-edge users. It is shown that the focal distance increases as the interference decreases.
PH.D in Electrical Engineering, December 2012
Show less