Open Access. Powered by Scholars. Published by Universities.®

Hardware Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

527 Full-Text Articles 802 Authors 344,893 Downloads 89 Institutions

All Articles in Hardware Systems

Faceted Search

527 full-text articles. Page 4 of 23.

Hardware-In-The-Loop Simulation To Evaluate The Performance And Constraints Of The Red-Light Violation Warning Application On Arterial Roads, Mahmoud Arafat 2022 Florida International University

Hardware-In-The-Loop Simulation To Evaluate The Performance And Constraints Of The Red-Light Violation Warning Application On Arterial Roads, Mahmoud Arafat

FIU Electronic Theses and Dissertations

Understanding the safety and mobility impacts of Connected Vehicle (CV) applications is critical for ensuring effective implementations of these applications. This dissertation provides an assessment of the safety and mobility impacts of the Red-Light Violation Warning (RLVW), a CV-based application at signalized intersections, under pre-timed signal control and semi-actuated signal control utilizing Emulator-in-the-loop (EILS), Software-in-the-loop (SILS), and Hardware-in-the-loop simulation (HILS) environments. Modern actuated traffic signal controllers contain several features with which controllers can provide varying green intervals for actuated phases, skip phases, and terminate phases depending on the traffic demand fluctuation from cycle to cycle. With actuated traffic signal operations, …


Implementation And Characterization Of Ahr On A Xilinx Fpga, Andrew J. Dittrich 2022 Air Force Institute of Technology

Implementation And Characterization Of Ahr On A Xilinx Fpga, Andrew J. Dittrich

Theses and Dissertations

A new version of the Adaptive-Hybrid Redundancy (AHR) architecture was developed to be implemented and tested in hardware using Commercial-Off-The-Shelf (COTS) Field-Programmable Gate Arrays (FPGAs). The AHR architecture was developed to mitigate the effects that the Single Event Upset (SEU) and Single Event Transient (SET) radiation effects have on processors and was tested on a Microprocessor without Interlocked Pipeline Stages (MIPS) architecture. The AHR MIPS architecture was implemented in hardware using two Xilinx FPGAs. A Universal Asynchronous Receiver Transmitter (UART) based serial communication network was added to the AHR MIPS design to enable inter-board communication between the two FPGAs. The …


Evaluating The Use Of Boot Image Encryption On Talos Ii Architecture, Calvin M. Muramoto 2022 Air Force Institute of Technology

Evaluating The Use Of Boot Image Encryption On Talos Ii Architecture, Calvin M. Muramoto

Theses and Dissertations

Sensitive devices operating in unprotected environments are vulnerable to hardware attacks like reverse engineering and side channel analysis. This represents a security concern because the root of trust can be invalidated through boot firmware manipulation. For example, boot data is rarely encrypted and typically travels across an accessible bus like the LPC bus, allowing data to be easily intercepted and possibly manipulated during system startup. The ash chip storing the boot data can also be removed from these devices and examined to reveal detailed boot information. This paper details an implementation of encrypting a section of the boot image and …


Securing Infiniband Networks With End-Point Encryption, Noah B. Diamond 2022 Air Force Institute of Technology

Securing Infiniband Networks With End-Point Encryption, Noah B. Diamond

Theses and Dissertations

The NVIDIA-Mellanox Bluefield-2 is a 100 Gbps high-performance network interface which offers hardware offload and acceleration features that can operate directly on network traffic without routine involvement from the ARM CPU. This allows the ARM multi-core CPU to orchestrate the hardware to perform operations on both Ethernet and RDMA traffic at high rates rather than processing all the traffic directly. A testbed called TNAP was created for performance testing and a MiTM verification process called MiTMVMP is used to ensure proper network configuration. The hardware accelerators of the Bluefield-2 support a throughput of nearly 86 Gbps when using IPsec to …


Design Project: 3d Printer/Injection Molder Hybrid, Lee Paolucci, Luke Everhart, Brandon Leap, Karson Lorey 2022 The University of Akron

Design Project: 3d Printer/Injection Molder Hybrid, Lee Paolucci, Luke Everhart, Brandon Leap, Karson Lorey

Williams Honors College, Honors Research Projects

In the realm of rapid, small-scale prototyping, there are a few main factors that drive decisions to invest resources in technology to make that prototyping possible. Cost and ease of use are two of the most influential when looking at most SMEs (Small to Medium-sized Enterprises). The U.S. Small Business Administration defines an SME as smaller than 1,250 employees. According to An Assessment of Implementation of Entry-Level 3D Printers from the Perspective of Small Businesses, 59% of small manufacturers had implemented 3D printers as of 2014. However, no matter what technology is used in rapid prototyping, there are common …


Adapting Deep Learning For Underwater Acoustic Communication Channel Modeling, Li Wei 2022 Michigan Technological University

Adapting Deep Learning For Underwater Acoustic Communication Channel Modeling, Li Wei

Dissertations, Master's Theses and Master's Reports

The recent emerging applications of novel underwater systems lead to increasing demand for underwater acoustic (UWA) communication and networking techniques. However, due to the challenging UWA channel characteristics, conventional wireless techniques are rarely applicable to UWA communication and networking. The cognitive and software-defined communication and networking are considered promising architecture of a novel UWA system design. As an essential component of a cognitive communication system, the modeling and prediction of the UWA channel impulse response (CIR) with deep generative models are studied in this work.

Firstly, an underwater acoustic communication and networking testbed is developed for conducting various simulations and …


Smart Bike Aftermarket System (Sbams), Noah Lamadanie, Jack Bullock, Dawson Beachy, John Albrecht 2022 The University of Akron

Smart Bike Aftermarket System (Sbams), Noah Lamadanie, Jack Bullock, Dawson Beachy, John Albrecht

Williams Honors College, Honors Research Projects

The Smart Bike Aftermarket System will be a set of connected modules, which, when installed on a standard bicycle, will allow it to mimic some of the safety and quality-of-life functionalities of an E-bike. The most notable of these safety features is an ability to detect vehicles approaching from behind and alert the user of potential collisions. The system will also implement lighting (Headlights, taillights, and turn signals), and a coupled application so a user can view more advanced information about their cycling. The primary advantage of this system over a standard E-bike is that it will have a lower …


Garden Bot: Autonomous Home Garden Weed Removal Robot, Brendon Lovejoy, Robert Connolly, Isaac Lucas, Stevan Veselinov 2022 The University of Akron

Garden Bot: Autonomous Home Garden Weed Removal Robot, Brendon Lovejoy, Robert Connolly, Isaac Lucas, Stevan Veselinov

Williams Honors College, Honors Research Projects

With frequent weeding being a tedious chore and an essential task for a successful garden, there is need for an automated method of handling this routine. Existing technologies utilize computer vision, GPS, multiple units and other tools to remove weeds from garden plots. However, these solutions are often complex and expensive, suited for large agricultural plots in contrast to small-scale home gardens. In addition, many of these technologies, along with manual tillers and cultivators suited for home use, are unable to perform weeding within rows of crops in a process known as intra-row weeding. The Garden Bot is an autonomous, …


Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao 2021 Northern Kentucky University

Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao

Posters-at-the-Capitol

Gaze tracking has become an established technology that enables using an individual’s gaze as an input signal to support a variety of applications in the context of Human-Computer Interaction. Gaze tracking primarily relies on sensing devices such as infrared (IR) cameras. Nevertheless, in the recent years, several attempts have been realized at detecting gaze by acquiring and processing images acquired from standard RGB cameras. Nowadays, there are only a few publicly available open-source libraries and they have not been tested extensively. In this paper, we present the result of a comparative analysis that studied a commercial eye-tracking device using IR …


Enhanced Security Utilizing Side Channel Data Analysis, Michael Taylor 2021 Southern Methodist University

Enhanced Security Utilizing Side Channel Data Analysis, Michael Taylor

Computer Science and Engineering Theses and Dissertations

The physical state of a system is affected by the activities and processes in which it is tasked with carrying out. In the past there have been many instances where such physical changes have been exploited by bad actors in order to gain insight into the operational state and even the data being held on a system. This method of side channel exploitation is very often effective due to the relative difficulty of obfuscating activity on a physical level. However, in order to take advantage of side channel data streams one must have a detailed working knowledge of how a …


Autonomous Control And Signal Acquisition System, Rion Cadell Krampe 2021 Murray State University

Autonomous Control And Signal Acquisition System, Rion Cadell Krampe

Honors College Theses

Our goal is to continue a previous teams project to build a NDE autonomous control and signal acquisition system that is more precise, more customizable with both code and mechanical parts, and cheaper than a similar system bought by the school. This goal has two stages to it. First, to repair the system from considerable damage it received during transportation. Secondly, to continue designing and developing the system to make considerable progress towards the goal of a fully functional NDE system. Along with making progress we must consider the team after us and create an easy stepping off point for …


Design, Development, And Testing Of Embedded Computing On Afit's Control & Autonomy Space Proximity Robot (Caspr), Collin A. Gwaltney 2021 Air Force Institute of Technology

Design, Development, And Testing Of Embedded Computing On Afit's Control & Autonomy Space Proximity Robot (Caspr), Collin A. Gwaltney

Theses and Dissertations

This thesis reviews RPO algorithm testbeds and discusses the development of the Control and Autonomy Space proximity Robot (CASpR) kinematic testbed housed at the Air Force Institute of Technology (AFIT). CASpR operates on a rail system to propagate the trajectories of two satellites using the Hill-Clohessy-Wiltshire (HCW) Equations of Motion (EOMs). In this study, the implementation of a Jetson TX2i as an onboard flight computer is discussed and accomplished. Each hardware component used in the process of adding embedded computing as well as the software and paths of communication are all discussed in detail. Tests are conducted to assess the …


Autonomous Control And Signal Acquisition System, Rion Krampe 2021 Murray State University

Autonomous Control And Signal Acquisition System, Rion Krampe

Scholars Week

Dr. Bunget has an autonomous control and signal acquisition system that he wants to be repaired and improved upon. This requires that we identify the current issues with the system and repair them as well as make innovations to the system to meet customer needs. The position control needs to be autonomous, and the acquisition of the oscilloscope signal and the transducer position needs to be synchronous. The user should be able to control the position, speed, and how often the signals are captured. The waveform of the scan should be appended into a spreadsheet. The system code also needs …


Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne 2021 University of North Georgia

Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

Everyone knows what package shipping is, but not everyone knows what warshipping is. Corporate mailrooms are rarely considered as part of the cybersecurity attack surface of most organizations, but they offer physical access to millions of uninspected packages daily. UPS shipped 5.5 billion items last year, with their daily average being 21.9 million items and operating through 1,800 locations in 2020. FedEx shipped 6.5 million packages daily and operates 2,150 locations. The United States Postal Service delivered 143 billion pieces of mail in 2019. Increasingly the world’s consumers are relying on e-commerce, and during the recent COVID-19 pandemic, package deliveries …


Using A Light-Based Power Source To Defeat Power Analysis Attacks, Remus Valentin Tumac 2021 Southern Methodist University

Using A Light-Based Power Source To Defeat Power Analysis Attacks, Remus Valentin Tumac

Computer Science and Engineering Theses and Dissertations

Power analysis attacks exploit the correlation between the information processed by an electronic system and the power consumption of the system. By powering an electronic system with an optical power source, we can prevent meaningful information from being leaked to the power pins and captured in power traces. The relatively constant current draw of the optical power source hides any variability in the power consumption of the target system caused by the logic gates' switching activity of the system as observed at the power pins. This thesis will provide evidence to show that using an optical power source should make …


Physically Unclonable Characteristics For Verification Of Transmon-Based Quantum Computers, Leleia A. Hsia 2021 Air Force Institute of Technology

Physically Unclonable Characteristics For Verification Of Transmon-Based Quantum Computers, Leleia A. Hsia

Theses and Dissertations

Future national security can be strengthened by verifying and securing the quantum computing supply chain. This dissertation proposes physically unclonable characteristics (PUCs), a method of quantum hardware verification inspired by classical physically unclonable functions, for future application to quantum processors implemented with transmon qubits. Qualitative and quantitative analysis is provided on the development of PUCs, including identifying qubit characteristics and qubit discrimination methods suitable for PUCs. Characteristics tested on IBM Quantum services include T1 and T2 coherence times, single-qubit and multi-qubit gate error rates, readout error rates, quantum process tomography metrics, and random benchmarking metrics. Results show that non-parametric qubit …


Toward Reliable And Efficient Message Passing Software For Hpc Systems: Fault Tolerance And Vector Extension, Dong Zhong 2021 University of Tennessee, Knoxville

Toward Reliable And Efficient Message Passing Software For Hpc Systems: Fault Tolerance And Vector Extension, Dong Zhong

Doctoral Dissertations

As the scale of High-performance Computing (HPC) systems continues to grow, researchers are devoted themselves to achieve the best performance of running long computing jobs on these systems. My research focus on reliability and efficiency study for HPC software.

First, as systems become larger, mean-time-to-failure (MTTF) of these HPC systems is negatively impacted and tends to decrease. Handling system failures becomes a prime challenge. My research aims to present a general design and implementation of an efficient runtime-level failure detection and propagation strategy targeting large-scale, dynamic systems that is able to detect both node and process failures. Using multiple overlapping …


Signal Fingerprinting And Machine Learning Framework For Uav Detection And Identification., Olusiji Oloruntobi Medaiyese 2021 University of Louisville

Signal Fingerprinting And Machine Learning Framework For Uav Detection And Identification., Olusiji Oloruntobi Medaiyese

Electronic Theses and Dissertations

Advancement in technology has led to creative and innovative inventions. One such invention includes unmanned aerial vehicles (UAVs). UAVs (also known as drones) are now an intrinsic part of our society because their application is becoming ubiquitous in every industry ranging from transportation and logistics to environmental monitoring among others. With the numerous benign applications of UAVs, their emergence has added a new dimension to privacy and security issues. There are little or no strict regulations on the people that can purchase or own a UAV. For this reason, nefarious actors can take advantage of these aircraft to intrude into …


Hardware Acceleration In Image Stitching: Gpu Vs Fpga, Joshua David Edgcombe 2021 Grand Valley State University

Hardware Acceleration In Image Stitching: Gpu Vs Fpga, Joshua David Edgcombe

Masters Theses

Image stitching is a process where two or more images with an overlapping field of view are combined. This process is commonly used to increase the field of view or image quality of a system. While this process is not particularly difficult for modern personal computers, hardware acceleration is often required to achieve real-time performance in low-power image stitching solutions. In this thesis, two separate hardware accelerated image stitching solutions are developed and compared. One solution is accelerated using a Xilinx Zynq UltraScale+ ZU3EG FPGA and the other solution is accelerated using an Nvidia RTX 2070 Super GPU. The image …


Inventory Locating With Quuppa: The Design And Development Of A Real-Time Process Monitoring Web Application Solution, Dylan C. Moreland, Trevor J. Howell, John W. Takiff, Patrick S. Dillon, Theo E. Fritz, William K. McIntyre 2021 California Polytechnic State University, San Luis Obispo

Inventory Locating With Quuppa: The Design And Development Of A Real-Time Process Monitoring Web Application Solution, Dylan C. Moreland, Trevor J. Howell, John W. Takiff, Patrick S. Dillon, Theo E. Fritz, William K. Mcintyre

Industrial and Manufacturing Engineering

Viasat, Inc. requires precise inventory tracking at their production facility in San Diego, CA. Viasat has installed the Quuppa indoor real-time locating system (RTLS), which it uses to track the real-time position of high-value work-in-process items. In its current state, the system only displays in-the-moment location information, with no available functionality for storing historical data for review, analysis, or visualization. In addition, the data displayed is noisy and prone to significant random error. This paper provides an overview of RTLS methods and technologies, assesses alternative solutions to Viasat’s issue, demonstrates our RTLS integrated web app solution, analyzes its impact, and …


Digital Commons powered by bepress