Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 34

Full-Text Articles in Engineering

Sustainable Computing - Without The Hot Air, Noman Bashir, David Irwin, Prashant Shenoy, Abel Souza Jan 2022

Sustainable Computing - Without The Hot Air, Noman Bashir, David Irwin, Prashant Shenoy, Abel Souza

Publications

The demand for computing is continuing to grow exponentially. This growth will translate to exponential growth in computing's energy consumption unless improvements in its energy-efficiency can outpace increases in its demand. Yet, after decades of research, further improving energy-efficiency is becoming increasingly challenging, as it is already highly optimized. As a result, at some point, increases in computing demand are likely to outpace increases in its energy-efficiency, potentially by a wide margin. Such exponential growth, if left unchecked, will position computing as a substantial contributor to global carbon emissions. While prominent technology companies have recognized the problem and sought to …


Superhero Robotics, Frank Sup, Brian Umberger, Nick Sawyer Jan 2017

Superhero Robotics, Frank Sup, Brian Umberger, Nick Sawyer

Science and Engineering Saturday Seminars

No abstract provided.


Low Cost Dynamic Architecture Adaptation Schemes For Drowsy Cache Management, Nitin Prakash Jan 2013

Low Cost Dynamic Architecture Adaptation Schemes For Drowsy Cache Management, Nitin Prakash

Masters Theses 1911 - February 2014

Energy consumption and speed of execution have long been recognized as conflicting requirements for processor design. In this work, we have developed a low-cost dynamic architecture adaptation scheme to save leakage power in caches. This design uses voltage scaling to implement drowsy caches. The importance of a dynamic scheme for managing drowsy caches, arises from the fact that not only does cache behavior change from one application to the next, but also during different phases of execution within the same application. We discuss various implementations of our scheme that provide a tradeoff between granularity of control and design complexity. …


Activity Intent Recognition Of The Torso Based On Surface Electromyography And Inertial Measurement Units, Zhe Zhang Jan 2013

Activity Intent Recognition Of The Torso Based On Surface Electromyography And Inertial Measurement Units, Zhe Zhang

Masters Theses 1911 - February 2014

This thesis presents an activity mode intent recognition approach for safe, robust and reliable control of powered backbone exoskeleton. The thesis presents the background and a concept for a powered backbone exoskeleton that would work in parallel with a user. The necessary prerequisites for the thesis are presented, including the collection and processing of surface electromyography signals and inertial sensor data to recognize the user’s activity. The development of activity mode intent recognizer was described based on decision tree classification in order to leverage its computational efficiency. The intent recognizer is a high-level supervisory controller that belongs to a three-level …


A Dynamic Reconfiguration Framework To Maximize Performance/Power In Asymmetric Multicore Processors, Arunachalam Annamalai Jan 2013

A Dynamic Reconfiguration Framework To Maximize Performance/Power In Asymmetric Multicore Processors, Arunachalam Annamalai

Masters Theses 1911 - February 2014

Recent trends in technology scaling have shifted the processing paradigm to multicores. Depending on the characteristics of the cores, the multicores can be either symmetric or asymmetric. Prior research has shown that Asymmetric Multicore Processors (AMPs) outperform their symmetric (SMP) counterparts within a given resource and power budget. But, due to the heterogeneity in core-types and time-varying workload behavior, thread-to-core assignment is always a challenge in AMPs. As the computational requirements vary significantly across different applications and with time, there is a need to dynamically allocate appropriate computational resources on demand to suit the applications’ current needs, in order to …


Online Nbti Wear-Out Estimation, Mehernosh H. Dabhoiwala Jan 2013

Online Nbti Wear-Out Estimation, Mehernosh H. Dabhoiwala

Masters Theses 1911 - February 2014

CMOS feature size scaling has been a source of dramatic performance gains, but it has come at a cost of on-chip wear-out. Negative Bias Temperature Instability (NBTI) is one of the main on-chip wear-out problems which questions the reliability of a chip. To check the accuracy of Reaction-Diffusion (RD) model, this work first proposes to compare the NBTI wear-out data from the RD wear-out model and the reliability simulator - Ultrasim RelXpert, by monitoring the activity of the register file on a Leon3 processor. The simulator wear-out data obtained is considered to be the baseline data and is used to …


Design Of An Open-Source Sata Core For Virtex-4 Fpgas, Cory Gorman Jan 2013

Design Of An Open-Source Sata Core For Virtex-4 Fpgas, Cory Gorman

Masters Theses 1911 - February 2014

Many hard drives manufactured today use the Serial ATA (SATA) protocol to communicate with the host machine, typically a PC. SATA is a much faster and much more robust protocol than its predecessor, ATA (also referred to as Parallel ATA or IDE). Many hardware designs, including those using Field-Programmable Gate Arrays (FPGAs), have a need for a long-term storage solution, and a hard drive would be ideal. One such design is the high-speed Data Acquisition System (DAS) created for the NASA Surface Water and Ocean Topography mission. This system utilizes a Xilinx Virtex-4 FPGA. Although the DAS includes a SATA …


N3asics: Designing Nanofabrics With Fine-Grained Cmos Integration, Pavan Panchapakeshan Jan 2012

N3asics: Designing Nanofabrics With Fine-Grained Cmos Integration, Pavan Panchapakeshan

Masters Theses 1911 - February 2014

Nanoscale-computing fabrics based on novel materials such as semiconductor nanowires, carbon nanotubes, graphene, etc. have been proposed in recent years. These fabrics employ unconventional manufacturing techniques like Nano-imprint lithography or Super-lattice Nanowire Pattern Transfer to produce ultra-dense nano-structures. However, one key challenge that has received limited attention is the interfacing of unconventional/self-assembly based approaches with conventional CMOS manufacturing to build integrated systems.

We propose a novel nanofabric approach that mixes unconventional nanomanufacturing with CMOS manufacturing flow and design rules to build a reliable nanowire-CMOS 3-D integrated fabric called N3ASICs with no new manufacturing constraints. In N3ASICs …


A Study Of The Impact Of Computational Delays In Missile Interception Systems, Ye Xu Jan 2012

A Study Of The Impact Of Computational Delays In Missile Interception Systems, Ye Xu

Masters Theses 1911 - February 2014

Most publications discussing missile interception systems assume a zero computer response time. This thesis studies the impact of computer response time on single-missile single-target and multiple- missile multiple-target systems. Simulation results for the final miss distance as the computer response time increases are presented. A simple online cooperative adjustment model for multiple-missile multiple-target system is created for the purpose of studying the computer delay effect.


Scheduling Heuristics For Maximizing The Output Quality Of Iris Task Graphs In Multiprocessor Environment With Time And Energy Bounds, Rajeswaran Chockalingapuram Ravindran Jan 2012

Scheduling Heuristics For Maximizing The Output Quality Of Iris Task Graphs In Multiprocessor Environment With Time And Energy Bounds, Rajeswaran Chockalingapuram Ravindran

Masters Theses 1911 - February 2014

Embedded real time applications are often subject to time and energy constraints. Real time applications are usually characterized by logically separable set of tasks with precedence constraints. The computational effort behind each of the task in the system is responsible for a physical functionality of the embedded system. In this work we mainly define theoretical models for relating the quality of the physical func- tionality to the computational load of the tasks and develop optimization problems to maximize the quality of the system subject to various constraints like time and energy. Specifically, the novelties in this work are three fold. …


Techniques For Detection Of Malicious Packet Drops In Networks, Vikram R. Desai Jan 2012

Techniques For Detection Of Malicious Packet Drops In Networks, Vikram R. Desai

Masters Theses 1911 - February 2014

The introduction of programmability and dynamic protocol deployment in routers, there would be an increase in the potential vulnerabilities and attacks . The next- generation Internet promises to provide a fundamental shift in the underlying architecture to support dynamic deployment of network protocols. In this thesis, we consider the problem of detecting malicious packet drops in routers. Specifically, we focus on an attack scenario, where a router selectively drops packets destined for another node. Detecting such an attack is challenging since it requires differentiating malicious packet drops from congestion-based packet losses. We propose a controller- based malicious packet detection technique …


Heterogeneous Graphene Nanoribbon-Cmos Multi-State Volatile Random Access Memory Fabric, Santosh Khasanvis Jan 2012

Heterogeneous Graphene Nanoribbon-Cmos Multi-State Volatile Random Access Memory Fabric, Santosh Khasanvis

Masters Theses 1911 - February 2014

CMOS SRAM area scaling is slowing down due to several challenges faced by transistors at nanoscale such as increased leakage. This calls for new concepts and technologies to overcome CMOS scaling limitations. In this thesis, we propose a multi-state memory to store multiple bits in a single cell, enabled by graphene and graphene nanoribbon crossbar devices (xGNR). This could provide a new dimension for scaling. We present a new multi-state volatile memory fabric called Graphene Nanoribbon Tunneling Random Access Memory (GNTRAM) featuring a heterogeneous integration between graphene and CMOS. A latch based on the xGNR devices is used as the …


News Media Environment, Selective Perception, And The Survival Of Preference Diversity Within Communication Networks, Frank C.S. Liu, Paul E. Johnson May 2011

News Media Environment, Selective Perception, And The Survival Of Preference Diversity Within Communication Networks, Frank C.S. Liu, Paul E. Johnson

JITP 2011: The Future of Computational Social Science

There is a natural tension between the effects on public opinion of social networks and the news media. It is widely believed that social networks tend to harmonize opinions within them, but the presence of media may accentuate diversity by inserting discordant messages. On the other hand, in a totalitarian state where the government controls the media, social networks may mitigate the homogenizing pressure of a regime’s propaganda. The tendency of opinion to follow the “official line” may be mitigated because opponents of the government interact on a personal level and bolster one another’s views. This paper employs agent-based modeling—an …


Simulating A Universal Geocast Scheme For Vehicular Ad Hoc Networks, Benjamin L. Bovee Jan 2011

Simulating A Universal Geocast Scheme For Vehicular Ad Hoc Networks, Benjamin L. Bovee

Masters Theses 1911 - February 2014

Recently a number of communications schemes have been proposed for Vehicular Ad hoc Networks (VANETs). One of these, the Universal Geocast Scheme (UGS) proposed by Hossein Pishro-Nik and Mohammad Nekoui, provides for a diverse variety of VANET-specific characteristics such as time-varying topology, protocol variation based on road congestion, and support for non line-of-sight communication. In this research, the UGS protocol is extended to consider inter-vehicle multi-hop connections in intersections with surrounding obstructions along with single-hop communications in an open road scenario. Since UGS is a probabilistic, repetition-based scheme, it supports the capacity-delay tradeoffs crucial for periodic safety message exchange. The …


Addressing/Exploiting Transceiver Imperfections In Wireless Communication Systems, Lihao Wang Jan 2011

Addressing/Exploiting Transceiver Imperfections In Wireless Communication Systems, Lihao Wang

Masters Theses 1911 - February 2014

This thesis consists of two research projects on wireless communication systems. In the first project, we propose a fast inphase and quadrature (I/Q) imbalance compensation technique for the analog quadrature modulators in direct conversion transmitters. The method needs no training sequence, no extra background data gathering process and no prior perfect knowledge of the envelope detector characteristics. In contrast to previous approaches, it uses points from both the linear and predictable nonlinear regions of the envelope detector to hasten convergence. We provide a least mean square (LMS) version and demonstrate that the quadrature modulator compensator converges.

In the second project, …


A Real Time Web Based Electronic Triage, Resource Allocation And Hospital Dispatch System For Emergency Response, Venkata Srihari Inampudi Jan 2011

A Real Time Web Based Electronic Triage, Resource Allocation And Hospital Dispatch System For Emergency Response, Venkata Srihari Inampudi

Masters Theses 1911 - February 2014

Disasters are characterized by large numbers of victims and required resources, overwhelming the available resources. Disaster response involves various entities like Incident Commanders, dispatch centers, emergency operations centers, area command and hospitals. An effective emergency response system should facilitate coordination between these various entities. Victim triage, emergency resource allocation and victim dispatch to hospitals form an important part of an emergency response system. In this present research effort, an emergency response system with the aforementioned components is developed.

Triage is the process of prioritizing mass casualty victims based on severity of injuries. The system presented in this thesis is a …


Parallel Mesh Adaptation And Graph Analysis Using Graphics Processing Units, Timothy P. Mcguiness Jan 2011

Parallel Mesh Adaptation And Graph Analysis Using Graphics Processing Units, Timothy P. Mcguiness

Masters Theses 1911 - February 2014

In the field of Computational Fluid Dynamics, several types of mesh adaptation strategies are used to enhance a mesh’s quality, thereby improving simulation speed and accuracy. Mesh smoothing (r-refinement) is a simple and effective technique, where nodes are repositioned to increase or decrease local mesh resolution. Mesh partitioning divides a mesh into sections, for use on distributed-memory parallel machines. As a more abstract form of modeling, graph theory can be used to simulate many real-world problems, and has applications in the fields of computer science, sociology, engineering and transportation, to name a few. One of the more important graph analysis …


Leveraging Multi-Radio Communication For Mobile Wireless Sensor Networks, Jeremy J. Gummeson Jan 2011

Leveraging Multi-Radio Communication For Mobile Wireless Sensor Networks, Jeremy J. Gummeson

Masters Theses 1911 - February 2014

An important challenge in mobile sensor networks is to enable energy-efficient communication over a diversity of distances while being robust to wireless effects caused by node mobility. In this thesis, we argue that the pairing of two complementary radios with heterogeneous range characteristics enables greater range and interference diversity at lower energy cost than a single radio. We make three contributions towards the design of such multi-radio mobile sensor systems. First, we present the design of a novel reinforcement learning-based link layer algorithm that continually learns channel characteristics and dynamically decides when to switch between radios. Second, we describe a …


Hardware Implementation Of Queue Length Based Pacing On Netfpga, Abhishek Dwaraki Jan 2011

Hardware Implementation Of Queue Length Based Pacing On Netfpga, Abhishek Dwaraki

Masters Theses 1911 - February 2014

Optical packet switching networks are the foundation for next generation high speed Internet and are fast becoming the norm rather than an option. When such high speed optical networks are taken into account, one of the key considerations is packet buffering. The importance of packet buffering plays an even bigger role in optical networks because of the physical and technological constraints on the buffer sizes that can be implemented. Existing protocols, in many real world scenarios do not perform well in such networks. To eliminate such scenarios where there is a high possibility of packet loss, we use packet pacing. …


A Real Time Indoor Navigation And Monitoring System For Firefighters And Visually Impaired, Siddhesh R. Gandhi Jan 2011

A Real Time Indoor Navigation And Monitoring System For Firefighters And Visually Impaired, Siddhesh R. Gandhi

Masters Theses 1911 - February 2014

ABSTRACT

A REAL TIME INDOOR NAVIGATION AND MONITORING SYSTEM FOR FIREFIGHTERS AND VISUALLY IMPAIRED

MAY 2011

SIDDHESH RAJAN GANDHI

M.S. E.C.E, UNIVERSITY OF MASSACHUSETTS AMHERST

Directed by: Professor Aura Ganz

There has been a widespread growth of technology in almost every facet of day to day life. But there are still important application areas in which technology advancements have not been implemented in a cost effective and user friendly manner. Such applications which we will address in this proposal include: 1) indoor localization and navigation of firefighters during rescue operations and 2) indoor localization and navigation for the blind and …


Infoextractor – A Tool For Social Media Data Mining, Chirag Shah, Charles File Jan 2011

Infoextractor – A Tool For Social Media Data Mining, Chirag Shah, Charles File

JITP 2011: The Future of Computational Social Science

We present InfoExtractor, a web-based tool for collecting data and metadata from focused social media content. InfoExtractor then provides this data in various structured and unstructured formats for easy manipulation and analysis. The tool allows social science researchers to easily collect data for quantitative analysis, and is designed to deliver data from popular and influential social media sites in a useful and easy to access way. InfoExtractor was designed to replace traditional means of content aggregation, such as page scraping and brute- force copying.


Researching Real-World Web Use With Roxy, A Research Proxy, Ericka Menchen-Trevino, Chris Karr Jan 2011

Researching Real-World Web Use With Roxy, A Research Proxy, Ericka Menchen-Trevino, Chris Karr

JITP 2011: The Future of Computational Social Science

Outside of a lab environment, it has been difficult for researchers to collect both behavioral and self-reported Web-use data from the same participants. To address this challenge we created Roxy, open source software that collects real-world Web-use data with participants’ informed consent. Roxy gathers Web log data as well as the text and HTML code of each page visited by participants. We describe Roxy’s data gathering capabilities and search functions and then illustrate how we used the software in a multi-method study. The use case examines selective exposure to political communication during the November 2010 U.S. general election campaign.


Tradeoffs In Accuracy And Efficiency In Supervised Learning Methods, Loren Collingwood, John Wilkerson Jan 2011

Tradeoffs In Accuracy And Efficiency In Supervised Learning Methods, Loren Collingwood, John Wilkerson

JITP 2011: The Future of Computational Social Science

Text is becoming a central source of data for social science research. With advances in digitization and open records practices, the central challenge has in large part shifted away from availability to usability. Automated text classification methodologies are becoming increasingly important within political science because they hold the promise of substantially reducing the costs of converting text to data for a variety of tasks. In this paper, we consider a number of questions of interest to prospective users of supervised learning methods, which are appropriate to classification tasks where known categories are applied. For the right task, supervised learning methods …


Facilitating Encounters With Political Difference: Engaging Voters With The Living Voters Guide, Deen G. Freelon, Travis Kriplean, John Morgan, W. Lance Bennett, Alan Borning Jan 2011

Facilitating Encounters With Political Difference: Engaging Voters With The Living Voters Guide, Deen G. Freelon, Travis Kriplean, John Morgan, W. Lance Bennett, Alan Borning

JITP 2011: The Future of Computational Social Science

Unlike 20th-century mass media, the Internet requires self-selection of content by its very nature. This has raised the normative concern that users may opt to encounter only political information and perspectives that accord with their preexisting views. This study examines the different ways that voters appropriated a new, purpose-built online engagement platform to engage with a wide variety of political opinions and arguments. In a deployment aimed at helping Washington state citizens make their 2010 election decisions, we find that users take significant advantage of three key opportunities to engage with political diversity: reading, acknowledging, and writing arguments on both …


Politics 2.0 With Facebook – Collecting And Analyzing Public Comments On Facebook For Studying Political Discourses, Chirag Shah, Tayebeh Yazdani Nia Jan 2011

Politics 2.0 With Facebook – Collecting And Analyzing Public Comments On Facebook For Studying Political Discourses, Chirag Shah, Tayebeh Yazdani Nia

JITP 2011: The Future of Computational Social Science

Analyzing publicly available content on various social media sites such as YouTube and Twitter, as well as social network sites such as Facebook, has become an increasingly popular method for studying socio-political issues. Such public-contributed content, primarily available as comments, let people express their opinions and sentiments on a given topic, news-story, or post, while allowing social and political scientists to extend their analysis of a political discourse to social sphere. We recognize the importance of Facebook in such analysis and present several approaches and observations of collecting and analyzing public comments from it. In particular, we demonstrate what it …


An Automated Snowball Census Of The Political Web, Abe Gong Jan 2011

An Automated Snowball Census Of The Political Web, Abe Gong

JITP 2011: The Future of Computational Social Science

This paper solves a persistent methodological problem for social scientists studying the political web: representative sampling. Virtu- ally all existing studies of the political web are based on incomplete samples, and therefore lack generalizability. In this paper, I combine methods from computer science and sampling theory to conduct an automated snowball census of the political web and constructs an all- but-complete index of English political websites. I check the robust- ness of this index, use it to generate descriptive statistics for the entire political web, and demonstrate that studies based on ad hoc sampling strategies are likely to be biased …


Post Silicon Clock Tuning System To Mitigate The Impact Of Process Variation On Performance, Kelageri Nagaraj Jan 2010

Post Silicon Clock Tuning System To Mitigate The Impact Of Process Variation On Performance, Kelageri Nagaraj

Masters Theses 1911 - February 2014

Optical shrink for process migration, manufacturing process variation and dynamic voltage control leads to clock skew as well as path delay variation in a manufactured chip. Since such variations are difficult to predict in pre-silicon phase, tunable clock buffers have been used in several microprocessor designs. The buffer delays are tuned to improve maximum operating clock frequency of a design. This however shifts the burden of finding tuning settings for individual clock buffers to the test process. In this project, we describe a process of using tester measurements to determine the settings of the tunable buffers for recovery of performance …


Evaluating A New Mac For Current And Next Generation Rfid, Serge Zhilyaev Jan 2010

Evaluating A New Mac For Current And Next Generation Rfid, Serge Zhilyaev

Masters Theses 1911 - February 2014

We evaluate SQUASH, a new MAC for RFID, in hardware and software. A smaller hardware design for SQUASH is proposed which also reduces latency. Area and latency in hardware are reduced further with a new variant we call permuted SQUASH. We explore SQUASH on embedded microprocessors and propose a method to choose the optimal partial product ordering to reduce latency.


Web-Dinar: Web Based Diagnosis Of Network And Application Resources In Disaster Response Systems, Kartik Deshpande Jan 2010

Web-Dinar: Web Based Diagnosis Of Network And Application Resources In Disaster Response Systems, Kartik Deshpande

Masters Theses 1911 - February 2014

Disaster management and emergency response mechanisms are coming of age post 9/11. Paper based triaging and evacuation is slowly being replaced with much advanced mechanisms using remote clients (Laptops, Thin clients, PDAs), RFiDs etc. This reflects a modern trend to deploy Information Technology (IT) in disaster management. IT elements provide a great a deal of flexibility and seamlessness in the communication of information. The information flowing is so critical that, loss of data is not at all acceptable. Loss of data would mean loss of critical medical information portraying the disaster scenario. This would amount to a wrong picture being …


Application Specific Customization And Scalability Of Soft Multiprocessors, Deepak C. Unnikrishnan Jan 2009

Application Specific Customization And Scalability Of Soft Multiprocessors, Deepak C. Unnikrishnan

Masters Theses 1911 - February 2014

Soft multiprocessor systems exploit the plentiful computational resources available in field programmable devices. By virtue of their adaptability and ability to support coarse grained parallelism, they serve as excellent platforms for rapid prototyping and design space exploration of embedded multiprocessor applications. As complex applications emerge, careful mapping, processor and interconnect customization are critical to the overall performance of the multiprocessor system. In this thesis, we have developed an automated scalable framework to efficiently map applications written in a high-level programmer-friendly language to customizable soft-cores. The framework allows the user to specify the application in a high-level language called Streamit. After …