Open Access. Powered by Scholars. Published by Universities.®

Hardware Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

527 Full-Text Articles 802 Authors 373,514 Downloads 89 Institutions

All Articles in Hardware Systems

Faceted Search

527 full-text articles. Page 13 of 23.

Transportation Engineering: Traffic Control Simulator, Sarah V. Hernandez, Karla Diaz-Corro, Taslima Akter, Magdalena Asborno, Fu Durandal 2017 University of Arkansas, Fayetteville

Transportation Engineering: Traffic Control Simulator, Sarah V. Hernandez, Karla Diaz-Corro, Taslima Akter, Magdalena Asborno, Fu Durandal

Civil Engineering Teaching and Learning

The purpose of these lesson plans is to introduce students to traffic signalization basics. Students will be lead through a series of mini-lectures on traffic control and signalization including a discussion on the limitations and benefits of traffic signalization. The lesson plans compliment a computer simulation “game” in which students act as manual operators for a single up to four by four gridded intersection. Students attempt to control the progression of signals to understand the relationship between signal timing and user delay. Through experimentation with the simulation, students generate a presentation discussing the benefits and drawbacks of signal timing and …


Network-On-Chip Based H.264 Video Decoder On A Field Programmable Gate Array, Ian Barge 2017 Marquette University

Network-On-Chip Based H.264 Video Decoder On A Field Programmable Gate Array, Ian Barge

Master's Theses (2009 -)

This thesis develops the first fully network-on-chip (NoC) based h.264 video decoder implemented in real hardware on a field programmable gate array (FPGA). This thesis starts with an overview of the h.264 video coding standard and an introduction to the NoC communication paradigm. Following this, a series of processing elements (PEs) are developed which implement the component algorithms making up the h.264 video decoder. These PEs, described primarily in VHDL with some Verilog and C, are then mapped to an NoC which is generated using the CONNECT NoC generation tool. To demonstrate the scalability of the proposed NoC based design, …


A Novel Approach To Complex Human Activity Recognition, Md Osman Gani 2017 Marquette University

A Novel Approach To Complex Human Activity Recognition, Md Osman Gani

Dissertations (1934 -)

Human activity recognition is a technology that offers automatic recognition of what a person is doing with respect to body motion and function. The main goal is to recognize a person's activity using different technologies such as cameras, motion sensors, location sensors, and time. Human activity recognition is important in many areas such as pervasive computing, artificial intelligence, human-computer interaction, health care, health outcomes, rehabilitation engineering, occupational science, and social sciences. There are numerous ubiquitous and pervasive computing systems where users' activities play an important role. The human activity carries a lot of information about the context and helps systems …


Related-Key Secure Key Encapsulation From Extended Computational Bilinear Diffie–Hellman, Brandon QIN, Shengli LIU, Shifeng SUN, Robert H. DENG, Dawu GU 2017 Singapore Management University

Related-Key Secure Key Encapsulation From Extended Computational Bilinear Diffie–Hellman, Brandon Qin, Shengli Liu, Shifeng Sun, Robert H. Deng, Dawu Gu

Research Collection School Of Computing and Information Systems

As a special type of fault injection attacks, Related-Key Attacks (RKAs) allow an adversary to manipulate a cryptographic key and subsequently observe the outcomes of the cryptographic scheme under these modified keys. In the real life, related-key attacks are already practical enough to be implemented on cryptographic devices. To avoid cryptographic devices suffering from related-key attacks, it is necessary to design a cryptographic scheme that resists against such attacks. This paper proposes an efficient RKA-secure Key Encapsulation Mechanism (KEM), in which the adversary can modify the secret key sk to any value f(sk), as long as, f is a polynomial …


A Framework For Understanding, Prioritizing, And Applying Systems Security Engineering Processes, Activities, And Tasks, Stephen Khou 2017 Air Force Institute of Technology

A Framework For Understanding, Prioritizing, And Applying Systems Security Engineering Processes, Activities, And Tasks, Stephen Khou

Theses and Dissertations

Current systems security practices lack an effective approach to prioritize and tailor systems security efforts to develop and field secure systems in challenging operational environments, which results in business and mission stakeholders becoming more susceptible to an array of disruptive events. This work informs Systems Engineers on recent developments in the field of system security engineering and provides a framework for more fully understanding the application of Systems Security Engineering (SSE) processes, activities, and tasks as described in the recently released National Institute of Standards and Technology (NIST) Special Publication 800-160. This SSE framework uniquely offers a repeatable and tailorable …


Evergreen: A Senior Project, Ashley Grover 2017 California Polytechnic State University, San Luis Obispo

Evergreen: A Senior Project, Ashley Grover

Computer Engineering

No abstract provided.


Design Automation For Carbon Nanotube Circuits Considering Performance And Security Optimization, Lin Liu 2017 Michigan Technological University

Design Automation For Carbon Nanotube Circuits Considering Performance And Security Optimization, Lin Liu

Dissertations, Master's Theses and Master's Reports

As prevailing copper interconnect technology advances to its fundamental physical limit, interconnect delay due to ever-increasing wire resistivity has greatly limited the circuit miniaturization. Carbon nanotube (CNT) interconnects have emerged as promising replacement materials for copper interconnects due to their superior conductivity. Buffer insertion for CNT interconnects is capable of improving circuit timing of signal nets with limited buffer deployment. However, due to the imperfection of fabricating long straight CNT, there exist significant unidimensional-spatially correlated variations on the critical CNT geometric parameters such as the diameter and density, which will affect the circuit performance.

This dissertation develops a novel timing …


Exploiting Hardware Abstraction For Parallel Programming Framework: Platform And Multitasking, Hongyuan Ding 2017 University of Arkansas, Fayetteville

Exploiting Hardware Abstraction For Parallel Programming Framework: Platform And Multitasking, Hongyuan Ding

Graduate Theses and Dissertations

With the help of the parallelism provided by the fine-grained architecture, hardware accelerators on Field Programmable Gate Arrays (FPGAs) can significantly improve the performance of many applications. However, designers are required to have excellent hardware programming skills and unique optimization techniques to explore the potential of FPGA resources fully. Intermediate frameworks above hardware circuits are proposed to improve either performance or productivity by leveraging parallel programming models beyond the multi-core era.

In this work, we propose the PolyPC (Polymorphic Parallel Computing) framework, which targets enhancing productivity without losing performance. It helps designers develop parallelized applications and implement them on FPGAs. …


Investigation Of The Use Of 3-D Printer Platform As Building Block For Rapid Design Of Research And Manufacturing Tool, Handy Chandra 2017 Michigan Technological University

Investigation Of The Use Of 3-D Printer Platform As Building Block For Rapid Design Of Research And Manufacturing Tool, Handy Chandra

Dissertations, Master's Theses and Master's Reports

This thesis attempts to show how an open source 3-D printer platform, the self replicating rapid prototype (RepRap), could be used to accelerate the development of research and manufacturing tools. Two projects are shown as examples, both utilizing components of the 3-D printer platform.

The first project is to develop an instrument capable of performing automated large-area four-point probe measurements. A modified RepRap 3-D Printer with a four-point probe in place of the 3-D printer head is utilized as a precision positioning platform. The printer together with custom designed measurement circuit and software performs automated measurement on multiple points on …


System For Workout Information Management, Mark Archual, Ethan E. Schweinsberg 2017 The University of Akron

System For Workout Information Management, Mark Archual, Ethan E. Schweinsberg

Williams Honors College, Honors Research Projects

Power racks are a weight machine used by swimmers to provide resistance while they swim away from a wall toward the center of the pool. The objective of this project is to build a modular data system that can be added to these machines to record and log quantitative information during their use. This information will be stored on a web server, and made available to the user for analysis and visualization through a web application. Workout data can also be downloaded and interpreted at a later time, independent of the web application. The data system should be water resistant, …


Analysis Of 3d Cone-Beam Ct Image Reconstruction Performance On A Fpga, Devin Held 2016 The University of Western Ontario

Analysis Of 3d Cone-Beam Ct Image Reconstruction Performance On A Fpga, Devin Held

Electronic Thesis and Dissertation Repository

Efficient and accurate tomographic image reconstruction has been an intensive topic of research due to the increasing everyday usage in areas such as radiology, biology, and materials science. Computed tomography (CT) scans are used to analyze internal structures through capture of x-ray images. Cone-beam CT scans project a cone-shaped x-ray to capture 2D image data from a single focal point, rotating around the object. CT scans are prone to multiple artifacts, including motion blur, streaks, and pixel irregularities, therefore must be run through image reconstruction software to reduce visual artifacts. The most common algorithm used is the Feldkamp, Davis, and …


Robostock: Autonomous Inventory Tracking, Drew Christian Balthazor 2016 California Polytechnic State University, San Luis Obispo

Robostock: Autonomous Inventory Tracking, Drew Christian Balthazor

Computer Engineering

No abstract provided.


Android Drone: Remote Quadcopter Control With A Phone, Aubrey John Russell 2016 California Polytechnic State University, San Luis Obispo

Android Drone: Remote Quadcopter Control With A Phone, Aubrey John Russell

Computer Engineering

The purpose of the “Android Drone” project was to create a quadcopter that can be controlled by user input sent over the phone’s Wi-Fi connection or 4G internet connection. Furthermore, the purpose was also to be able to receive live video feedback over the internet connection, thus making the drone an inexpensive option compared to other, equivalent drones that might cost thousands of dollars. Not only that, but the Android phone also has a host of other useful features that could be utilized by the drone: this includes GPS, pathing, picture taking, data storage, networking and TCP/IP, a Java software …


Teaching The Internet Of Things: Bridging A Path From Cpe329, Steven Han, Rafael Lopez 2016 California Polytechnic State University, San Luis Obispo

Teaching The Internet Of Things: Bridging A Path From Cpe329, Steven Han, Rafael Lopez

Computer Engineering

“The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices via the Internet is becoming pervasive, from the commercial kitchen to the residential basement room to the arm of the fitness buff.” - WSO2

In this report, we will investigate procedures and technologies used in IoT. A variety of cloud platforms will be described to demonstrate its strengths and usage on IoT applications. Furthermore, demonstrate the most popular hardware being used in several of these applications. This report is aimed to give a good understanding on what it takes to put together an IoT …


Autonomous Golf Cart Firmware, Gerik Kubiak 2016 California Polytechnic State University, San Luis Obispo

Autonomous Golf Cart Firmware, Gerik Kubiak

Computer Engineering

The Autonomous Golf Cart Project is a project sponsored by the Cal Poly Robotics Club. The multidisciplinary team is adding sensors and electronics to a regular golf cart with the goal to drive the golf cart around campus without and human input. This task requires a plethora of hardware and firmware to control that hardware. The firmware provides an interface for higher level software to then control the hardware and therefore drive the golf cart. This report is focused on the hardware modifications and the firmware used in order to drive the golf cart from a computer.


Intrinsic Functions For Securing Cmos Computation: Variability, Modeling And Noise Sensitivity, Xiaolin Xu 2016 University of Massachusetts Amherst

Intrinsic Functions For Securing Cmos Computation: Variability, Modeling And Noise Sensitivity, Xiaolin Xu

Doctoral Dissertations

A basic premise behind modern secure computation is the demand for lightweight cryptographic primitives, like identifier or key generator. From a circuit perspective, the development of cryptographic modules has also been driven by the aggressive scalability of complementary metal-oxide-semiconductor (CMOS) technology. While advancing into nano-meter regime, one significant characteristic of today's CMOS design is the random nature of process variability, which limits the nominal circuit design. With the continuous scaling of CMOS technology, instead of mitigating the physical variability, leveraging such properties becomes a promising way. One of the famous products adhering to this double-edged sword philosophy is the Physically …


Open Source Database And Website To Provide Free And Open Access To Inactive U.S. Patents In The Public Domain, Yuenyong Nilsiam, Joshua M. Pearce 2016 Michigan Technological University

Open Source Database And Website To Provide Free And Open Access To Inactive U.S. Patents In The Public Domain, Yuenyong Nilsiam, Joshua M. Pearce

Department of Materials Science and Engineering Publications

Although theoretically the patent system is meant to bolster innovation, the current United States Patent and Trademark Office (USPTO) is cumbersome and involves a significant time investment to locate inactive patents less than 20 years old. This article reports on the development of an open source database to find these public domain ideas. First, a search strategy is explained. Then the operation and use of free and open source software are detailed to meet the needs of open hardware innovators. Finally, a case study is presented to demonstrate the utility of the approach with 3-D printing. The results showed how …


Variation Aware Placement For Efficient Key Generation Using Physically Unclonable Functions In Reconfigurable Systems, Shrikant S. Vyas 2016 University of Massachusetts Amherst

Variation Aware Placement For Efficient Key Generation Using Physically Unclonable Functions In Reconfigurable Systems, Shrikant S. Vyas

Masters Theses

With the importance of data security at its peak today, many reconfigurable systems are used to provide security. This protection is often provided by FPGA-based encrypt/decrypt cores secured with secret keys. Physical unclonable functions (PUFs) use random manufacturing variations to generate outputs that can be used in keys. These outputs are specific to a chip and can be used to create device-tied secret keys. Due to reliability issues with PUFs, key generation with PUFs typically requires error correction techniques. This can result in substantial hardware costs. Thus, the total cost of a $n$-bit key far exceeds just the cost of …


The Legacy Computer Challenge, Matt Schultz 2016 Grand Valley State University

The Legacy Computer Challenge, Matt Schultz

Matt Schultz

In late 2016, the Special Collections & University Archives (SCUA) at GVSU LIbraries were approached by a faculty member with a request to help retrieve a series of important emails, journals, and film production notes that were stored electronically on two very old (legacy) Macintosh computers. This presentation was used to provide the Mid-Michigan Digital Practitioners community with an overview of the materials and the use case being presented. Attention was drawn to the challenges of connecting and retrieving data from obsolete computer technology and feedback was solicited for strategies and best practices to follow.


Studying The Effects Of Serpentine Soil On Adapted And Non-Adapted Species Using Arduino Technology, Kiana Saniee, Edward Himelblau, Brian Paavo 2016 California Polytechnic State University - San Luis Obispo

Studying The Effects Of Serpentine Soil On Adapted And Non-Adapted Species Using Arduino Technology, Kiana Saniee, Edward Himelblau, Brian Paavo

STAR Program Research Presentations

Abstract: Serpentine soils are formed from ultramafic rocks and are represent an extreme environment for plants. Serpentine soils are unique in that they carry high concentrations of heavy metals, are nutrient deficient, particularly in calcium, and have poor water retention capabilities. Although these soils constitute harsh conditions for plant growth, there are a number of species that are adapted and even endemic to serpentine soil. Water retention by commercial potting mix was compared with serpentine soil. Also, serpentine adapted and non-adapted species were grown in both soil treatments and physiological data were collected. We used the Arduino electronic platform to …


Digital Commons powered by bepress