Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 20 of 20

Full-Text Articles in Entire DC Network

Metric Learning Via Linear Embeddings For Human Motion Recognition, Byoungdoo Kong Dec 2020

Metric Learning Via Linear Embeddings For Human Motion Recognition, Byoungdoo Kong

Masters Theses

We consider the application of Few-Shot Learning (FSL) and dimensionality reduction to the problem of human motion recognition (HMR). The structure of human motion has unique characteristics such as its dynamic and high-dimensional nature. Recent research on human motion recognition uses deep neural networks with multiple layers. Most importantly, large datasets will need to be collected to use such networks to analyze human motion. This process is both time-consuming and expensive since a large motion capture database must be collected and labeled. Despite significant progress having been made in human motion recognition, state-of-the-art algorithms still misclassify actions because of characteristics …


System Design And Implementation For Hybrid Network Function Virtualization, Xuzhi Zhang Dec 2020

System Design And Implementation For Hybrid Network Function Virtualization, Xuzhi Zhang

Doctoral Dissertations

With the application of virtualization technology in computer networks, many new research areas and techniques have been explored, such as network function virtualization (NFV). A significant benefit of virtualization is that it reduces the cost of a network system and increases its flexibility. Due to the increasing complexity of the network environment and constantly improving network scale and bandwidth, it is imperative to aim for higher performance, extensibility, and flexibility in the future network systems. In this dissertation, hybrid NFV platforms applying virtualization technology are proposed. We further explore the techniques used to improve the performance, scalability and resilience of …


Robust And Sustainable Energy Pathways To Reach Mexico’S Climate Goals, Rodrigo Mercado Fernandez Sep 2020

Robust And Sustainable Energy Pathways To Reach Mexico’S Climate Goals, Rodrigo Mercado Fernandez

Doctoral Dissertations

As countries set climate change goals for adaptation and mitigation efforts, there are many questions regarding to how to reach these targets. These efforts will necessitate the transition of our electricity infrastructure from relying on conventional electricity generation technologies including natural gas, coal and oil, to clean energy generation with renewables. Through the three essays presented in this dissertation, we explore various pathways of development for the electricity system to reach long term climate change goals. We are interested in identifying: Is there a unique optimal development option or are there various? How do different mixes of electricity generation technologies …


Perception System: Object And Landmark Detection For Visually Impaired Users, Chenguang Zhang Sep 2020

Perception System: Object And Landmark Detection For Visually Impaired Users, Chenguang Zhang

Masters Theses

This paper introduces a system which enables visually impaired users to detect objects and landmarks within the line of sight. The system works in two modes: landmark mode, which detects predefined landmarks, and object mode, which detects objects for everyday use. Users can get audio announcement for the name of the detected object or landmark as well as its estimated distances. Landmark detection helps visually impaired users explore an unfamiliar environment and build a mental map.

The proposed system utilizes a deep learning system for detection, which is deployed on the mobile phone and optimized to run in real-time. Unlike …


Thermal Transport Modeling Of Semiconductor Materials From First Principles, Aliya Qureshi Aug 2020

Thermal Transport Modeling Of Semiconductor Materials From First Principles, Aliya Qureshi

Masters Theses

Over the past few years, the size of semiconductor devices has been shrinking whereas the density of transistors has exponentially increased. Thus, thermal management has become a serious concern as device performance and reliability is greatly affected by heat. An understanding of thermal transport properties at device level along with predictive modelling can lead us to design of new systems and materials tailored according to the thermal conductivity. In our work we first review different models used to calculate thermal conductivity and examine their accuracy using the experimentally measured thermal conductivity for Si. Our results suggest that empirically calculated rates …


Ultra-Wideband True-Time-Delay Beamforming Networks In A Compact Package, Chris Merola Jul 2020

Ultra-Wideband True-Time-Delay Beamforming Networks In A Compact Package, Chris Merola

Doctoral Dissertations

The push for commercial technologies such as 5G Massive MIMO, and consumer broadband internet via low-earth-orbit satellite, drive a need for low cost phased array antenna technologies. A major obstacle in bringing this technology to market is the cost and complexity of the phased array antenna aperture and the required beamforming or multi-beamforming network. This dissertation presents an efficient, reliable, low-cost and mass-manufacturable multi-beamforming network solution. In accomplishing this, a new class of cavity-based, true-time delay multi-beamformer was devised and investigated. Rotman lens optics are implemented for broadband and low phase-error response. The presented topology offers reduction in size and …


Formal Verification Of Divider And Square-Root Arithmetic Circuits Using Computer Algebra Methods, Atif Yasin Jul 2020

Formal Verification Of Divider And Square-Root Arithmetic Circuits Using Computer Algebra Methods, Atif Yasin

Doctoral Dissertations

A considerable progress has been made in recent years in verification of arithmetic circuits such as multipliers, fused multiply-adders, multiply-accumulate, and other components of arithmetic datapaths, both in integer and finite field domain. However, the verification of hardware dividers and square-root functions have received only a limited attention from the verification community, with a notable exception for theorem provers and other inductive, non-automated systems. Division, square root, and transcendental functions are all tied to the basic Intel architecture and proving correctness of such algorithms is of grave importance. Although belonging to the same iterative-subtract class of architectures, they widely differ …


Information-Theoretic Limits On Statistical Matching With Applications To Privacy, Nazanin Takbiri Jul 2020

Information-Theoretic Limits On Statistical Matching With Applications To Privacy, Nazanin Takbiri

Doctoral Dissertations

Modern applications significantly enhance the user experience by adapting to each user's individual condition and/or preferences. While this adaptation can greatly improve a user's experience or be essential for the application to work, the exposure of user data to the application presents a significant privacy threat to the users- even when the traces are anonymized (since the statistical matching of an anonymized trace to prior user behavior can identify a user and their habits). Because of the current and growing algorithmic and computational capabilities of adversaries, provable privacy guarantees as a function of the degree of anonymization and obfuscation of …


Numerical Simulation Of Thermoelectric Transport In Bulk And Nanostructured Sisn Alloys, Venkatakrishna Dusetty Jul 2020

Numerical Simulation Of Thermoelectric Transport In Bulk And Nanostructured Sisn Alloys, Venkatakrishna Dusetty

Masters Theses

The current high demand for sustainable and renewable energy sources to solve world energy crisis has enormously increased interest in looking at alternative sources of energy. All the machines used in manufacturing process, electricity generation, residential applications, transportation etc., rejects energy in the form of heat into environment. Thermoelectric materials can convert thermal-to-electrical and electrical-to-thermal energy and can be utilized in waste-heat harvesting, more efficient cooling to reduce energy usage and CO2 emissions. Significant research efforts have been devoted over the past decade to thermoelectric materials, with particular emphasis being placed on combining materials selection with nanostructuring. The overarching …


Compound Effects Of Clock And Voltage Based Power Side-Channel Countermeasures, Jacqueline Lagasse Jul 2020

Compound Effects Of Clock And Voltage Based Power Side-Channel Countermeasures, Jacqueline Lagasse

Masters Theses

The power side-channel attack, which allows an attacker to derive secret information from power traces, continues to be a major vulnerability in many critical systems. Numerous countermeasures have been proposed since its discovery as a serious vulnerability, including both hardware and software implementations. Each countermeasure has its own drawback, with some of the highly effective countermeasures incurring large overhead in area and power. In addition, many countermeasures are quite invasive to the design process, requiring modification of the design and therefore additional validation and testing to ensure its accuracy. Less invasive countermeasures that do not require directly modifying the system …


Accelerating Rsa Public Key Cryptography Via Hardware Acceleration, Pavithra Ramesh Apr 2020

Accelerating Rsa Public Key Cryptography Via Hardware Acceleration, Pavithra Ramesh

Masters Theses

A large number and a variety of sensors and actuators, also known as edge devices of the Internet of Things, belonging to various industries - health care monitoring, home automation, industrial automation, have become prevalent in today's world. These edge devices need to communicate data collected to the central system occasionally and often in burst mode which is then used for monitoring and control purposes. To ensure secure connections, Asymmetric or Public Key Cryptography (PKC) schemes are used in combination with Symmetric Cryptography schemes. RSA (Rivest - Shamir- Adleman) is one of the most prevalent public key cryptosystems, and has …


Crosstalk Based Side Channel Attacks In Fpgas, Chethan Ramesh Apr 2020

Crosstalk Based Side Channel Attacks In Fpgas, Chethan Ramesh

Masters Theses

As FPGA use becomes more diverse, the shared use of these devices becomes a security concern. Multi-tenant FPGAs that contain circuits from multiple independent sources or users will soon be prevalent in cloud and embedded computing environments. The recent discovery of a new attack vector using neighboring long wires in Xilinx SRAM FPGAs presents the possibility of covert information leakage from an unsuspecting user's circuit. The work makes two contributions that extend this finding. First, we rigorously evaluate several Intel SRAM FPGAs and confirm that long wire information leakage is also prevalent in these devices. Second, we present the first …


Compressive Parameter Estimation Via Approximate Message Passing, Shermin Hamzehei Apr 2020

Compressive Parameter Estimation Via Approximate Message Passing, Shermin Hamzehei

Masters Theses

The literature on compressive parameter estimation has been mostly focused on the use of sparsity dictionaries that encode a discretized sampling of the parameter space; these dictionaries, however, suffer from coherence issues that must be controlled for successful estimation. To bypass such issues with discretization, we propose the use of statistical parameter estimation methods within the Approximate Message Passing (AMP) algorithm for signal recovery. Our method leverages the recently proposed use of custom denoisers in place of the usual thresholding steps (which act as denoisers for sparse signals) in AMP. We introduce the design of analog denoisers that are based …


Analysis And Verification Of Arithmetic Circuits Using Computer Algebra Approach, Tiankai Su Mar 2020

Analysis And Verification Of Arithmetic Circuits Using Computer Algebra Approach, Tiankai Su

Doctoral Dissertations

Despite a considerable progress in verification of random and control logic, advances in formal verification of arithmetic designs have been lagging. This can be attributed mostly to the difficulty of efficient modeling of arithmetic circuits and data paths without resorting to computationally expensive Boolean methods, such as Binary Decision Diagrams (BDDs) and Boolean Satisfiability (SAT) that require ``bit blasting'', i.e., flattening the design to a bit-level netlist. Similarly, approaches that rely on computer algebra and Satisfiability Modulo Theories (SMT) methods are either too abstract to handle the bit-level complexity of arithmetic designs or require solving computationally expensive decision or satisfiability …


Trustworthy Systems And Protocols For The Internet Of Things, Arman Pouraghily Mar 2020

Trustworthy Systems And Protocols For The Internet Of Things, Arman Pouraghily

Doctoral Dissertations

Processor-based embedded systems are integrated into many aspects of everyday life such as industrial control, automotive systems, healthcare, the Internet of Things, etc. As Moore’s law progresses, these embedded systems have moved from simple microcontrollers to full-scale embedded computing systems with multiple processor cores and operating systems support. At the same time, the security of these devices has also become a key concern. Our main focus in this work is the security and privacy of the embedded systems used in IoT systems. In the first part of this work, we take a look at the security of embedded systems from …


Anti-Jam Gps Controlled Reception Pattern Antennas For Man-Portable Applications, Jeffrey A. Maloney Mar 2020

Anti-Jam Gps Controlled Reception Pattern Antennas For Man-Portable Applications, Jeffrey A. Maloney

Doctoral Dissertations

Military GPS receivers provide crucial information to soldiers in the field, however, the performance of these devices is degraded by in band RF interference, making GPS susceptible to jamming. Anti-jam techniques for aircraft and vehicular platforms have been developed, but at present there is no system for dismounted soldiers. There is a need for an anti-jam system which meets the demands of a dismounted soldier and conforms to the size, weight, and power requirements of a portable device. A controlled reception pattern antenna, or CRPA, is a potential solution for jammer mitigation. These devices work by steering reception pattern nulls …


Design Of Hardware With Quantifiable Security Against Reverse Engineering, Shahrzad Keshavarz Mar 2020

Design Of Hardware With Quantifiable Security Against Reverse Engineering, Shahrzad Keshavarz

Doctoral Dissertations

Semiconductors are a 412 billion dollar industry and integrated circuits take on important roles in human life, from everyday use in smart-devices to critical applications like healthcare and aviation. Saving today's hardware systems from attackers can be a huge concern considering the budget spent on designing these chips and the sensitive information they may contain. In particular, after fabrication, the chip can be subject to a malicious reverse engineer that tries to invasively figure out the function of the chip or other sensitive data. Subsequent to an attack, a system can be subject to cloning, counterfeiting, or IP theft. This …


Efficient Hardware Primitives For Securing Lightweight Systems, Siva Nishok Dhanuskodi Mar 2020

Efficient Hardware Primitives For Securing Lightweight Systems, Siva Nishok Dhanuskodi

Doctoral Dissertations

In the era of IoT and ubiquitous computing, the collection and communication of sensitive data is increasingly being handled by lightweight Integrated Circuits. Efficient hardware implementations of crytographic primitives for resource constrained applications have become critical, especially block ciphers which perform fundamental operations such as encryption, decryption, and even hashing. We study the efficiency of block ciphers under different implementation styles. For low latency applications that use unrolled block cipher implementations, we design a glitch filter to reduce energy consumption. For lightweight applications, we design a novel architecture for the widely used AES cipher. The design eliminates inefficiencies in data …


Molecular Design Of Organic Semiconductors For Interfacial And Emissive Material Applications, Marcus David Cole Mar 2020

Molecular Design Of Organic Semiconductors For Interfacial And Emissive Material Applications, Marcus David Cole

Doctoral Dissertations

This dissertation describes the synthesis and characterization of functional optoelectronically active materials. Synthetic techniques were used to prepare polymers containing perylene diimide (PDI) or tetraphenylethylene (TPE) moieties in the polymer backbone. PDI-based structures were prepared with embedded cationic or zwitterionic moieties intended to tailor organic/inorganic interfaces in thin film photovoltaic devices. The aggregation-induced emission (AIE)-active TPE polymers were synthesized to study how AIE properties evolve in π-conjugated polymers. The syntheses discussed here focused on modulation of molecular architecture to give rise to materials with tailored optoelectronic properties. Chapter 1 provides a brief overview of the field of organic electronics and …


Bandwidth Bounds Of Infinite Planar Array Elements, Hsieh-Chi Chang Mar 2020

Bandwidth Bounds Of Infinite Planar Array Elements, Hsieh-Chi Chang

Doctoral Dissertations

For elements of an infinite planar phased array in free space and an infinite conductor-backed free standing planar phased array, fundamental bandwidth bounds are derived from the optical theorem for periodic scatterers. The bounds are based on Gustafsson’s theory of fundamental bandwidth limits for electrically small antennas of arbitrary shape, but extended to periodic configurations. The element bandwidth bound is found to be a function of the strengths of the induced static dipole moments in constant background fields as well as the unit-cell dimensions and the scan angle. Explicit bandwidth bound expressions are found for narrowband and ultrawideband array cases. …