Open Access. Powered by Scholars. Published by Universities.®

Digital Circuits Commons

Open Access. Powered by Scholars. Published by Universities.®

224 Full-Text Articles 337 Authors 228,947 Downloads 49 Institutions

All Articles in Digital Circuits

Faceted Search

224 full-text articles. Page 1 of 11.

Classification Of Internet Advertisement, Biswajit Biswal, Banasmita Subhadarshini, Sasmita Jena, Binita Kumari 2022 Department of Computer Application, Institute of Technical Education and Research, Siksha ‘O’ Anusandhan Deemed to be University, Odisha, India

Classification Of Internet Advertisement, Biswajit Biswal, Banasmita Subhadarshini, Sasmita Jena, Binita Kumari

Graduate Research in Engineering and Technology (GRET)

The investigation of web ad is vital now daily in human existence. Commercial and their connected regions are economy concern business has become an outstanding field in the wide spread region. Publicizing area are producing part of data and information which help to comprehend and should be examination, propositions information are should change over into significant information. To utilize these clients' data, settle on future choice and accomplish powerful choices, these choices help to comprehend client's need and utilization of the labour and products. Utilize client's information and carry out information mining strategies to get familiar with clients ...


Speech Emotion Recognition System Using Librosa For Better Customer Experience, Subhadarshini Mohanty, Subasish Mohapatra, Amlan Sahoo 2022 Odisha University of Technology and Research, Bhubaneswar, Odisha, India

Speech Emotion Recognition System Using Librosa For Better Customer Experience, Subhadarshini Mohanty, Subasish Mohapatra, Amlan Sahoo

Graduate Research in Engineering and Technology (GRET)

Call center employees usually depend on instinct to judge a potential customer and how to pitch to them. In this paper, we pitch a more effective way for call center employees to generate more leads and engagement to generate higher revenue by analyzing the speech of the target customer by using machine learning practices and depending on data to make data-driven decisions rather than intuition. Speech Emotion Recognition otherwise known as SER is the demonstration of aspiring to perceive human inclination along with the behavior. Normally voice reflects basic feeling through tone and pitch. According to human behavior, many creatures ...


Forecasting The Time Delay In Delivery Of Pharmaceutical Products, Subhalaxmi Hotta, Sonali Sahoo, Tripti Swarnkar 2022 Department of Computer Application Siksha ‘O’ Anusandhan Deemed to be University, Bhubaneswar, India-75103

Forecasting The Time Delay In Delivery Of Pharmaceutical Products, Subhalaxmi Hotta, Sonali Sahoo, Tripti Swarnkar

Graduate Research in Engineering and Technology (GRET)

Supply chain management system is a centralized system which controls and plans the activities involved from production to delivery of a product. Disruption in treatment and loss of life occurs due to delay in delivery of pharmaceutical products. The objective is to do a model using Machine learning algorithms to determine: Classification to predict which product will be delayed and Regression shows how much time it will be delayed exactly. This study will use publicly available supply chain data which helps to identify primary aspect of predicting whether HIV drugs are delivered in time or not. It will then use ...


Iot In Healthcare Domain, Manisha Banka, Ankita Mishra, Sushreeta Tripathy 2022 Institute of Technical Education and Research, Bhubaneswar, Odisha, India

Iot In Healthcare Domain, Manisha Banka, Ankita Mishra, Sushreeta Tripathy

Graduate Research in Engineering and Technology (GRET)

In the current scenario, the Internet of Things (IoT) is an emerging technology. IoT is a new pattern that has changed the long-established way of living into a modernistic life style. IoT is the network of physical objects, which enables to collect data and exchange it without human intervention. In general, IoT has been established to interlink the latest healthcare resources and to provide smart and efficient healthcare facilities to the people. IoT allows objects to be sensed and controlled remotely across existing network infrastructure. Health maintenance has become a considerable socio-economic concern when it comes to health expenses, need ...


Automated Robotic Light Bulb Testing Platform, Agha I. Akram, Muhammad Ali Ummy 2022 CUNY New York City College of Technology

Automated Robotic Light Bulb Testing Platform, Agha I. Akram, Muhammad Ali Ummy

Publications and Research

The main purpose of this project is to create a functional prototype of a multilayered system that incorporates aspects of electrical, mechanical, and computer engineering technology. The main objective of the system is to be able to determine whether a light bulb is working or not. The building blocks of this system are a robotic arm that is able to slide along a rail (for added mobility), a conveyor belt, and an electromechanical device that holds and tests light bulbs. Initially, the robot arm picks up a light bulb and places it into the holder which then tests it. A ...


Unconventional Computation Including Quantum Computation, Bruce J. MacLennan 2022 University of Tennessee, Knoxville

Unconventional Computation Including Quantum Computation, Bruce J. Maclennan

Faculty Publications and Other Works -- EECS

Unconventional computation (or non-standard computation) refers to the use of non-traditional technologies and computing paradigms. As we approach the limits of Moore’s Law, progress in computation will depend on going beyond binary electronics and on exploring new paradigms and technologies for information processing and control. This book surveys some topics relevant to unconventional computation, including the definition of unconventional computations, the physics of computation, quantum computation, DNA and molecular computation, and analog computation. This book is the content of a course taught at UTK.


Design Project: 3d Printer/Injection Molder Hybrid, Lee Paolucci, Luke Everhart, Brandon Leap, Karson Lorey 2022 The University of Akron

Design Project: 3d Printer/Injection Molder Hybrid, Lee Paolucci, Luke Everhart, Brandon Leap, Karson Lorey

Williams Honors College, Honors Research Projects

In the realm of rapid, small-scale prototyping, there are a few main factors that drive decisions to invest resources in technology to make that prototyping possible. Cost and ease of use are two of the most influential when looking at most SMEs (Small to Medium-sized Enterprises). The U.S. Small Business Administration defines an SME as smaller than 1,250 employees. According to An Assessment of Implementation of Entry-Level 3D Printers from the Perspective of Small Businesses, 59% of small manufacturers had implemented 3D printers as of 2014. However, no matter what technology is used in rapid prototyping, there are ...


Garden Bot: Autonomous Home Garden Weed Removal Robot, Brendon Lovejoy, Robert Connolly, Isaac Lucas, Stevan Veselinov 2022 The University of Akron

Garden Bot: Autonomous Home Garden Weed Removal Robot, Brendon Lovejoy, Robert Connolly, Isaac Lucas, Stevan Veselinov

Williams Honors College, Honors Research Projects

With frequent weeding being a tedious chore and an essential task for a successful garden, there is need for an automated method of handling this routine. Existing technologies utilize computer vision, GPS, multiple units and other tools to remove weeds from garden plots. However, these solutions are often complex and expensive, suited for large agricultural plots in contrast to small-scale home gardens. In addition, many of these technologies, along with manual tillers and cultivators suited for home use, are unable to perform weeding within rows of crops in a process known as intra-row weeding. The Garden Bot is an autonomous ...


Removing Physical Presence Requirements For A Remote And Automated World - Api Controlled Patch Panel For Conformance Testing, Hunter George Wells 2022 University of New Hampshire, Durham

Removing Physical Presence Requirements For A Remote And Automated World - Api Controlled Patch Panel For Conformance Testing, Hunter George Wells

Honors Theses and Capstones

Quality assurance test engineers at the UNH-InterOperability Lab must run tests that require driving and monitoring a selection of DC signals. While the number of signals is numerous, there are limited ports on the test equipment, and only a few signals need patching for any given test. The selection of signals may vary between the 209 different tests and must be re-routed frequently. Currently, testers must leave their desk to manually modify the test setup in another room. This posed a considerable issue at the onset of the COVID-19 Pandemic when physical access was not possible. In order to enable ...


3d Bionic Arm, Anny Baez Silfa 2021 CUNY New York City College of Technology

3d Bionic Arm, Anny Baez Silfa

Publications and Research

Previous work had been done on what was an adaptation of a robotic arm for Roboqueen, which is a persistent research project of the Department of Computer Engineering Technology. This robotic arm consisted of removing the cardboard hands from the Roboqueen and being replaced by 3D printed fingers and wrists to add functionality that did not exist before. Servo motors connected to Arduinos hidden in the forearm will be used to move the fingers and pick up and hold objects in the hand. Currently, the Finger Myoware is an update of the robotic arm in order to understand how prosthetic ...


On Improving Robustness Of Hardware Security Primitives And Resistance To Reverse Engineering Attacks, Vinay C. Patil 2021 University of Massachusetts Amherst

On Improving Robustness Of Hardware Security Primitives And Resistance To Reverse Engineering Attacks, Vinay C. Patil

Doctoral Dissertations

The continued growth of information technology (IT) industry and proliferation of interconnected devices has aggravated the problem of ensuring security and necessitated the need for novel, robust solutions. Physically unclonable functions (PUFs) have emerged as promising secure hardware primitives that can utilize the disorder introduced during manufacturing process to generate unique keys. They can be utilized as \textit{lightweight} roots-of-trust for use in authentication and key generation systems. Unlike insecure non-volatile memory (NVM) based key storage systems, PUFs provide an advantage -- no party, including the manufacturer, should be able to replicate the physical disorder and thus, effectively clone the PUF ...


Using A Light-Based Power Source To Defeat Power Analysis Attacks, Remus Valentin Tumac 2021 Southern Methodist University

Using A Light-Based Power Source To Defeat Power Analysis Attacks, Remus Valentin Tumac

Computer Science and Engineering Theses and Dissertations

Power analysis attacks exploit the correlation between the information processed by an electronic system and the power consumption of the system. By powering an electronic system with an optical power source, we can prevent meaningful information from being leaked to the power pins and captured in power traces. The relatively constant current draw of the optical power source hides any variability in the power consumption of the target system caused by the logic gates' switching activity of the system as observed at the power pins. This thesis will provide evidence to show that using an optical power source should make ...


Malicious Hardware & Its Effects On Industry, Gustavo Perez 2021 University of Arkansas, Fayetteville

Malicious Hardware & Its Effects On Industry, Gustavo Perez

Computer Science and Computer Engineering Undergraduate Honors Theses

In recent years advancements have been made in computer hardware security to circumnavigate the threat of malicious hardware. Threats come in several forms during the development and overall life cycle of computer hardware and I aim to highlight those key points. I will illustrate the various ways in which attackers exploit flaws in a chip design, or how malicious parties take advantage of the many steps required to design and fabricate hardware. Due to these exploits, the industry and consumers have suffered damages in the form of financial loss, physical harm, breaches of personal data, and a multitude of other ...


Low-Power And Reconfigurable Asynchronous Asic Design Implementing Recurrent Neural Networks, Spencer Nelson 2021 University of Arkansas, Fayetteville

Low-Power And Reconfigurable Asynchronous Asic Design Implementing Recurrent Neural Networks, Spencer Nelson

Graduate Theses and Dissertations

Artificial intelligence (AI) has experienced a tremendous surge in recent years, resulting in high demand for a wide array of implementations of algorithms in the field. With the rise of Internet-of-Things devices, the need for artificial intelligence algorithms implemented in hardware with tight design restrictions has become even more prevalent. In terms of low power and area, ASIC implementations have the best case. However, these implementations suffer from high non-recurring engineering costs, long time-to-market, and a complete lack of flexibility, which significantly hurts their appeal in an environment where time-to-market is so critical. The time-to-market gap can be shortened through ...


Addressing Security Challenges In Embedded Systems And Multi-Tenant Fpgas, Georgios Provelengios 2021 University of Massachusetts Amherst

Addressing Security Challenges In Embedded Systems And Multi-Tenant Fpgas, Georgios Provelengios

Doctoral Dissertations

Embedded systems and field-programmable gate arrays (FPGAs) have become crucial parts of the infrastructure that supports our modern technological world. Given the multitude of threats that are present, the need for secure computing systems is undeniably greater than ever. Embedded systems and FPGAs are governed by characteristics that create unique security challenges and vulnerabilities.

Despite their array of uses, embedded systems are often built with modest microprocessors that do not support the conventional security solutions used by workstations, such as virus scanners. In the first part of this dissertation, a microprocessor defense mechanism that uses a hardware monitor to protect ...


Development Of A Reference Design For Intrusion Detection Using Neural Networks For A Smart Inverter, Ammar Mohammad Khan 2021 University of Arkansas, Fayetteville

Development Of A Reference Design For Intrusion Detection Using Neural Networks For A Smart Inverter, Ammar Mohammad Khan

Graduate Theses and Dissertations

The purpose of this thesis is to develop a reference design for a base level implementation of an intrusion detection module using artificial neural networks that is deployed onto an inverter and runs on live data for cybersecurity purposes, leveraging the latest deep learning algorithms and tools. Cybersecurity in the smart grid industry focuses on maintaining optimal standards of security in the system and a key component of this is being able to detect cyberattacks. Although researchers and engineers aim to design such devices with embedded security, attacks can and do still occur. The foundation for eventually mitigating these attacks ...


Analog & Digital Remote Synthesizer, Adam Brunner, Andrew Cihon-Scott, Scott Grisso, Linus Wright 2021 The University of Akron

Analog & Digital Remote Synthesizer, Adam Brunner, Andrew Cihon-Scott, Scott Grisso, Linus Wright

Williams Honors College, Honors Research Projects

The purpose of this project is to develop and design an analog synthesizer musical instrument that integrates embedded digital hardware into the design to enable control from a remote source. The use of digital hardware enables the potential for a wide range of convenient features such as sound profile saving and loading, output recording functionality, and the ability to accept digital input from another musical instrument utilizing the Musical Instrument Digital Interface (MIDI). In addition to the synthesizer itself, this project also includes the design of a companion application that can be hosted on a wide variety of consumer computing ...


Light Loaded Automated Guided Vehicle, Marcus Radtka, Nazar Paramashchuk, Lawrence Shevock 2021 The University of Akron

Light Loaded Automated Guided Vehicle, Marcus Radtka, Nazar Paramashchuk, Lawrence Shevock

Williams Honors College, Honors Research Projects

The objective of the locomotion system was to design and implement the mechanical, electrical, and software related functions to ensure the LLAGV had the capability of maneuvering its surroundings. The LLAGV’s motors were represented in an open loop transfer function to utilize RPM feedback and a compensator when needed. The modeled compensator helped control the LLAGV’s speed and acceleration, enabling further control of the LLAGV. The internal circuitry has the means to properly distributed power to all components and allowed the user to control the LLAGV to their desire. The application software within the LLAGV locomotion system (LLAGV-LS ...


Improve The Prototype Of Low-Cost Near-Infrared Diffuse Optical Imaging System, Chen Xu, Mohammed Z. Shakil 2020 CUNY New York City College of Technology

Improve The Prototype Of Low-Cost Near-Infrared Diffuse Optical Imaging System, Chen Xu, Mohammed Z. Shakil

Publications and Research

Diffuse Optical Tomography (DOT) and Optical Spectroscopy using near-infrared (NIR) diffused light has demonstrated great potential for the initial diagnosis of tumors and in the assessment of tumor vasculature response to neoadjuvant chemotherapy. The aims of this project are 1) to test the different types of LEDs in the near-infrared range, and design the driving circuit, and test the modulation of LEDs at different frequencies; 2) to test the APDs as a detector, and build the receiver system and compare efficiency with pre-built systems. In this project, we are focusing on creating a low-cost infrared transmission system for tumor and ...


Digital And Mixed Domain Hardware Reduction Algorithms And Implementations For Massive Mimo, Najath A. Mohomed 2020 Florida International University

Digital And Mixed Domain Hardware Reduction Algorithms And Implementations For Massive Mimo, Najath A. Mohomed

FIU Electronic Theses and Dissertations

Emerging 5G and 6G based wireless communications systems largely rely on multiple-input-multiple-output (MIMO) systems to reduce inherently extensive path losses, facilitate high data rates, and high spatial diversity. Massive MIMO systems used in mmWave and sub-THz applications consists of hundreds perhaps thousands of antenna elements at base stations. Digital beamforming techniques provide the highest flexibility and better degrees of freedom for phased antenna arrays as compared to its analog and hybrid alternatives but has the highest hardware complexity.

Conventional digital beamformers at the receiver require a dedicated analog to digital converter (ADC) for every antenna element, leading to ADCs for ...


Digital Commons powered by bepress