Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Engineering

Remodel-Fpga: Reconfigurable Memory-Centric Array Processor Architecture For Deep-Learning Acceleration On Fpga, Md Arafat Kabir Aug 2024

Remodel-Fpga: Reconfigurable Memory-Centric Array Processor Architecture For Deep-Learning Acceleration On Fpga, Md Arafat Kabir

Graduate Theses and Dissertations

Deep-Learning has become a dominant computing paradigm across a broad range of application domains. Different architectures of Deep-Networks like CNN, MLP, and RNN have emerged as the prominent machine-learning approaches for today’s application domains. These architectures are heavily data-dependent, requiring frequent access to memory. As a result, these applications suffer the most from the memory bottleneck of the von Neumann architectures. There is an imminent need for memory-centric architectures for deep-learning and big-data analytic applications that are memory intensive. Modern Field Programmable Gate Arrays (FPGAs) are ideal programmable substrates for creating customized Processor in/near Memory (PIM) accelerators. Modern FPGAs contain …


Investigating Autonomous Ground Vehicles For Weed Elimination, Abraham Mitchell May 2024

Investigating Autonomous Ground Vehicles For Weed Elimination, Abraham Mitchell

Computer Science and Computer Engineering Undergraduate Honors Theses

The management of weeds in crop fields is a continuous agricultural problem. The use of herbicides is the most common solution, but herbicidal resistance decreases effectiveness, and the use of herbicides has been found to have severe adverse effects on human health and the environment. The use of autonomous drone systems for weed elimination is an emerging solution, but challenges in GPS-based localization and navigation can impact the effectiveness of these systems. The goal of this thesis is to evaluate techniques for minimizing localization errors of drones as they attempt to eliminate weeds. A simulation environment was created to model …


Hardware Trojan Detection Utilizing Graph Neural Networks And Structural Checking, Hunter James Nauman May 2024

Hardware Trojan Detection Utilizing Graph Neural Networks And Structural Checking, Hunter James Nauman

Graduate Theses and Dissertations

The integrated circuit (IC) industry has experienced exponential growth, particularly in the complexity and scale of hardware designs. To sustain this growth, faster development cycles and cost-effective solutions have been the focus for many companies. One strategy to maintain this growth is through the incorporation of third-party intellectual property (IP) into the IC design process. Outsourcing the production of sub-components reduces development time and enables faster time-to-market, however, this approach also introduces the threat of Hardware Trojans. Hardware Trojans, defined as any malicious modification or addition to an IC, pose significant security risks due to their small size, low activation …


Towards Side-Channel Infrastructure For Software Implementations Of Pqc Algorithms, Tristen Teague May 2024

Towards Side-Channel Infrastructure For Software Implementations Of Pqc Algorithms, Tristen Teague

Graduate Theses and Dissertations

Post-Quantum Cryptography (PQC) is a new class of asymmetric cryptography algorithms that are supposed to be secure against both classical computers and quantum computers through Shor’s algorithm. Since PQC algorithms are currently being standardized, they will replace older standardized asymmetric algorithms (such as RSA) and will be deployed within the digital infrastructure. Before implementations of the PQC algorithms are placed into the infrastructure, they must undergo evaluation of both performance and security. One such security issue that needs large investigation before deployment are side-channels. Side-channel attacks (SCA) are a method of gathering information from the implementation, such as power-consumption and …


The Aim To Decentralize Economic Systems With Blockchains And Crypto, Mary Lacity Jan 2024

The Aim To Decentralize Economic Systems With Blockchains And Crypto, Mary Lacity

Arkansas Law Review

As an information systems (“IS”) professor, I wrote this Article for legal professionals new to blockchains and crypto. This target audience likely is most interested in crypto for its legal implications—depending on whether it functions as currencies, securities, commodities, or properties; however, legal professionals also need to understand crypto’s origin, how transactions work, and how they are governed.