Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

    Esteban Rodriguez-Marek

    The 2011 IEEE International Symposium on Antennas and Propagation and USNC/URSI National Radio Science Meeting will be held jointly July 3-8, 2011, at the Spokane Convention Center and the Davenport Hotel in Spokane, Washington, USA. The... more
    The 2011 IEEE International Symposium on Antennas and Propagation and USNC/URSI National Radio Science Meeting will be held jointly July 3-8, 2011, at the Spokane Convention Center and the Davenport Hotel in Spokane, Washington, USA. The symposium and meeting are cosponsored by the IEEE Antennas and Propagation Society (AP-S) and the US National Committee of the International Union of Radio Science (USNC/URSI) Commissions A, B, C, D, E, F, G, and K. The joint meeting is intended to provide an ...
    f Graphical user interfaces (GUIs) have facilitated the work of engineers in using software packages. Simulation of various engineering models becomes much easier when modifying a variable in a GUI rather than running the program from a... more
    f Graphical user interfaces (GUIs) have facilitated the work of engineers in using software packages. Simulation of various engineering models becomes much easier when modifying a variable in a GUI rather than running the program from a command prompt. Typically GUIs have been implemented in languages such as C/C++ and/or JAVA. In line with this trend, these languages have been part of the Electrical Engineering (EE) curriculum at Eastern Washington University (EWU). However, the growth of Matlab in the recent years also makes it imperative for it to be embedded in different classes throughout the curriculum. Matlab is currently not only used as a mathematical manipulation tool, but also for the design and simulation of various dynamic systems. Similarly, hardware description languages (HDL) are ubiquitous in the design and simulation of integrated circuits. When combined, HDL and Matlab make a powerful team for designing, simulating, and implementing digital circuits into field pro...
    Traditional engineering programs are taught in a class setting, accompanied with laboratory exercises that complement lecture and reinforce theory. This is the ideal format, as students have easy access to both faculty and laboratories.... more
    Traditional engineering programs are taught in a class setting, accompanied with laboratory exercises that complement lecture and reinforce theory. This is the ideal format, as students have easy access to both faculty and laboratories. Many times, however, students are place-bound in locations where they do not have access to institutions offering engineering programs. Furthermore, engineering degrees are expensive degrees and opening one requires a significant investment from the organization and/or the state. On the other hand, many community colleges have laboratories that are highly underutilized despite being adequate for undergraduate instruction. Following this reasoning Eastern Washington University (EWU) extended its established Electrical Engineering (EE) program into the Seattle metro area by partnering with North Seattle Community College (NSCC). Upon finishing their two-year degree at the community college, students start taking classes imparted by EWU faculty both thr...
    Circuit theory, analog electronics and digital electronics are essential classes for EET/CET/EE curricula and require students to complete various labs in order to gain the necessary hands-on experience they need when entering the job... more
    Circuit theory, analog electronics and digital electronics are essential classes for EET/CET/EE curricula and require students to complete various labs in order to gain the necessary hands-on experience they need when entering the job market. In order to provide this hands-on experience, traditional labs for circuit theory, analog electronics, and digital electronics require a number of measuring and signal-generating instruments, such as power supplies, multi-meters, oscilloscopes, function generators, etc. Learning to use proficiently the many instruments found in a typical lab is both a time consuming and challenging task. Unfortunately, students who would like to spend time outside class working on labs and projects are restricted by the significant cost of the equipment. Furthermore, students enrolled in distance learning programs, due to their remote location, struggle even more to find the opportunity to gain the required hands-on experience. This paper is a case study to ana...
    Our work is focused on determining whether any correlation exists between preparatory classes taken by Electrical Engineering (EE) students at Eastern Washington University (EWU) early in their academic careers (e.g. Calculus and Physics... more
    Our work is focused on determining whether any correlation exists between preparatory classes taken by Electrical Engineering (EE) students at Eastern Washington University (EWU) early in their academic careers (e.g. Calculus and Physics sequences) and their departmental GPAs upon graduation. Using academic data from prior EE graduates, a machine learning algorithm was trained to predict with 85% certainty whether a student's GPA will fall above/below one standard deviation from the mean. This prediction can be used to channel university resources to support those students who need it the most. However, there is a significant prediction overlap for average students, i.e. those who fall within approximately one standard deviation around the mean. It is our conjecture that incorporating more major-specific data (e.g. grades in a set of core introductory level departmental courses) or a customized general aptitude test administered at the end of the sophomore year could improve the...
    Communication system classes have been traditionally taught with a lecture-only format. However, the proliferation of new concepts and algorithms in communication systems makes it increasingly hard for students to master them only through... more
    Communication system classes have been traditionally taught with a lecture-only format. However, the proliferation of new concepts and algorithms in communication systems makes it increasingly hard for students to master them only through mathematical derivations. Furthermore, without a hands-on demonstration of how the algorithm is used in real-life applications, students without strong mathematical skills can become frustrated and generate a retention problem in EET/CET/EE programs. To overcome this problem, the theory taught in lecture has been complemented with laboratory experiments and class projects. However, many traditional communication systems’ laboratory experiments are related to various hardware and software, many of which are not easily available outside of the lab environment. In this paper, we introduce a lab that allows students to experience real-time communication systems with a PC and the ubiquitous MATLAB package and, thus, can be done in the comfort of home. T...
    The Accreditation Board for Engineering and Technology (ABET) [5] documentation lists all essential criteria for Engineering Technology and Engineering programs to obtain pertinent accreditation. However, ABET does not specify any... more
    The Accreditation Board for Engineering and Technology (ABET) [5] documentation lists all essential criteria for Engineering Technology and Engineering programs to obtain pertinent accreditation. However, ABET does not specify any methodology or rubric on how to appropriately determine when achievement of a criterion has been met. Hence, each individual Engineering Technology and Engineering program must establish its own program objectives and corresponding program outcomes, ensuring coverage of all ABET criteria. Then, each program must establish a systematic way of demonstrating that its objectives and outcomes are being met, therefore meeting the ABET criteria as well. One way of doing this is incorporating the assessment into various (or all) courses in the program, a process tested and introduced by the authors in [1]. In that paper a holistic approach was used to meet ABET criteria based on course assessment. However, the details on how to exactly incorporate assessment into ...
    In the Fall of 2002, Eastern Washington University (EWU) received a call from the American Electronics Association (AeA) requesting our institution to initiate the process to open an Electrical Engineering program to fill an existing gap... more
    In the Fall of 2002, Eastern Washington University (EWU) received a call from the American Electronics Association (AeA) requesting our institution to initiate the process to open an Electrical Engineering program to fill an existing gap in the State’s labor force. The fact that our Department was exclusively dedicated to Engineering Technology put to the offer an even more exciting overtone, as we knew that it would not only be challenging, but that we would be walking on what for us was uncharted territory. On hindsight, the best thing that our Department had going in our favor is lacking the vision to anticipate the many hurdles that we would encounter. The first of these hurdles came in the form of state legislation. The State of Washington has a provision in its laws that precludes public comprehensive universities from offering engineering degrees, this privilege being reserved to public research institutions. After innumerable visits to the state capital and irrefutable evide...
    This paper puts forward a new method to fuse infrared images using empirical mode decomposition (EMD) and inpainting algorithms. EMD is a non-parametric, data-driven analysis tool that decomposes non-linear, non-stationary signals into a... more
    This paper puts forward a new method to fuse infrared images using empirical mode decomposition (EMD) and inpainting algorithms. EMD is a non-parametric, data-driven analysis tool that decomposes non-linear, non-stationary signals into a set of signals denominated intrinsic mode functions (IMFs) and a residual. Fusion rules are set up to fuse the corresponding IMFs and residual by designing for the
    Due to the attractive properties of the wavelet transform, wavelet filter banks are frequently used in areas such as signal processing and communication systems. Furthermore, the increasing computational power of microprocessors leads to... more
    Due to the attractive properties of the wavelet transform, wavelet filter banks are frequently used in areas such as signal processing and communication systems. Furthermore, the increasing computational power of microprocessors leads to a leap in the use of techniques such as parallel processing, concurrent programming, and VHDL design. However, the inherently sequential tree structure of the traditional wavelet theory
    This paper introduces a new speech enhancement algorithm, which is efficient for color noises such as pink and babble noises. The algorithm applies the minimum variance estimator (MVE) into each intrinsic mode function (IMF) obtained by... more
    This paper introduces a new speech enhancement algorithm, which is efficient for color noises such as pink and babble noises. The algorithm applies the minimum variance estimator (MVE) into each intrinsic mode function (IMF) obtained by the empirical mode decomposition (EMD). Typical signal subspace approaches to speech enhancement assume the corrupting noise is white, thereby making a pre-whitening step mandatory when faced with various color noises. The algorithm presented in this paper is applicable into color noises, such as pink and babble noises, without the need to apply the whitening process. This is a result of the noises' variances in each IMF signal showing smaller fluctuations than without the application of the EMD. Experimental data demonstrates the effectiveness of the algorithm to combat color noises.
    We present an algorithm which performs data encryption by serially concatenating two transform stages. The outer stage uses one of the orthogonal matrices obtained from the singular value decomposition (SVD) of an arbitrary signal, such... more
    We present an algorithm which performs data encryption by serially concatenating two transform stages. The outer stage uses one of the orthogonal matrices obtained from the singular value decomposition (SVD) of an arbitrary signal, such as white noise or the sum of cosines of different frequencies. The inner stage of encryption uses a fast, parallelized wavelet filter bank using our
    This paper presents a system level methodology for modeling, and analyzing the performance of system-on-chip (SOC) processors. The solution adopted focuses on minimizing assessment time by modeling processors behavior only in terms of the... more
    This paper presents a system level methodology for modeling, and analyzing the performance of system-on-chip (SOC) processors. The solution adopted focuses on minimizing assessment time by modeling processors behavior only in terms of the performance metrics of interest. Formally, the desired behavior is captured through a C/C++ executable model, which uses finite state machines (FSM) as the underlying model of
    This paper introduces a new inpainting technique denominated turbo inpainting. The algorithm modifies the K-clustering with singular value decomposition (K-SVD) inpainting method to allow for iterative, progressive improvement. Turbo... more
    This paper introduces a new inpainting technique denominated turbo inpainting. The algorithm modifies the K-clustering with singular value decomposition (K-SVD) inpainting method to allow for iterative, progressive improvement. Turbo inpainting is composed of two separate blocks: inner inpainting and outer inpainting. The outer inpainting block maintains the original K-SVD algorithm, and is used to find a good dictionary fit for
    Traditional two-dimensional empirical mode decomposition (2D-EMD) algorithms generate multiple subband signals, each having the same size of the original signal. Thus, huge amounts of data to be stored may be generated. Moreover, the... more
    Traditional two-dimensional empirical mode decomposition (2D-EMD) algorithms generate multiple subband signals, each having the same size of the original signal. Thus, huge amounts of data to be stored may be generated. Moreover, the computational load is massive as the decomposition levels increase. This paper introduces a method to reduce the data generated (i.e. reduce storage requirement) by incorporating decimation into the 2D-EMD, while maintaining perfect reconstruction. Furthermore, it is well established that traditional EMDs can be thought as having the structure of a single dyadic filter bank. The proposed algorithm is applicable into any arbitrary tree structures including octave filter banks, 2D-EMD packets when applied to a full binary tree, etc. The methodology hereby presented builds on the algorithm introduced by the authors in [8].
    Advancement in technology has seen correspondence education evolve into distance education and eLearning. A large number of universities across the United States of America have established some form of distance education and/or eLearning... more
    Advancement in technology has seen correspondence education evolve into distance education and eLearning. A large number of universities across the United States of America have established some form of distance education and/or eLearning in an effort to offer opportunities to many people aspiring to obtain an education, but with limitations when it comes to accessing institutions of higher learning. Most
    A novel encryption algorithm secure to chosen-plaintext attacks is presented. As opposed to traditional key algorithms, one of the keys in the algorithm presented depends on the message itself. Two encryption matrices are generated by... more
    A novel encryption algorithm secure to chosen-plaintext attacks is presented. As opposed to traditional key algorithms, one of the keys in the algorithm presented depends on the message itself. Two encryption matrices are generated by means of singular value decomposition (SVD), using a portion of the message. The two encryption matrices generated are further multiplied into the left and right sides of other data frames for encryption in the transmitter. Without additional information, except for a key and an integer for signs, the encryption matrices can be found and, thus, the original data obtained at the receiver. This is done by exploiting special properties of the SVD of real symmetric matrices. Hence, the algorithm performs time-varying encryption (and, thus, decryption), i.e. the algorithm generates time-varying ciphertexts depending on both the design parameters and the plaintext itself. Since the encryption depends on message data, it leads to a good solution to various kn...
    Research Interests:
    Spatial domain redundancy is studied for packet erasure recovery in a video coding system. The image is partitioned into a checkerboard pattern of white (W) and black (B) blocks. A subset of pixels in the B (W) blocks is selected to be... more
    Spatial domain redundancy is studied for packet erasure recovery in a video coding system. The image is partitioned into a checkerboard pattern of white (W) and black (B) blocks. A subset of pixels in the B (W) blocks is selected to be encoded as redundant information with the W(B) blocks. The Yu, Liu, and Marcellin (1996) approach is generalized and several different redundancy patterns are investigated. Significant improvement in interpolation performance is achieved with different redundancy patterns
    Research Interests:
    This paper presents a new strategy for design space exploration (DSE) of system-on-chip (SOC) platforms. The solution adopted uses a multi-objective optimization technique based on the concept of Pareto-optimality. The approach is purely... more
    This paper presents a new strategy for design space exploration (DSE) of system-on-chip (SOC) platforms. The solution adopted uses a multi-objective optimization technique based on the concept of Pareto-optimality. The approach is purely heuristic and is a ...
    ... Various combinations of the developed algorithms are possible. For example, e=1 implies encryption using Hankel matrix S alone. Hence, the raw data of length m2 are encrypted using a raw data matrix P such as SP C = and it is... more
    ... Various combinations of the developed algorithms are possible. For example, e=1 implies encryption using Hankel matrix S alone. Hence, the raw data of length m2 are encrypted using a raw data matrix P such as SP C = and it is decrypted at the receiver by CSP1 − = . ...
    This paper presents a hybrid approach for modeling and assessing the performance of embedded systems. Toward this objective, we pursue an implementation independent methodology where system behavior is represented by executable models... more
    This paper presents a hybrid approach for modeling and assessing the performance of embedded systems. Toward this objective, we pursue an implementation independent methodology where system behavior is represented by executable models that are based on both analytical ...
    (SNR) and root mean square error (RMSE) are used to evaluate the algorithm. The experimental results show that the developed algorithm is an efficient fusion algorithm.