Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Engineering

Use Of Digital Twins To Mitigate Communication Failures In Microgrids, Andrew Eggebeen Dec 2023

Use Of Digital Twins To Mitigate Communication Failures In Microgrids, Andrew Eggebeen

Theses and Dissertations

This work investigates digital twin (DT) applications for electric power system (EPS) resilience. A novel DT architecture is proposed consisting of a physical twin, a virtual twin, an intelligent agent, and data communications. Requirements for the virtual twin are identified. Guidelines are provided for generating, capturing, and storing data to train the intelligent agent. The relationship between the DT development process and an existing controller hardware-in-the-loop (CHIL) process is discussed. To demonstrate the proposed DT architecture and development process, a DT for a battery energy storage system (BESS) is created based on the simulation of an industrial nanogrid. The creation …


A Design Strategy To Improve Machine Learning Resiliency Of Physically Unclonable Functions Using Modulus Process, Yuqiu Jiang Dec 2023

A Design Strategy To Improve Machine Learning Resiliency Of Physically Unclonable Functions Using Modulus Process, Yuqiu Jiang

Theses and Dissertations

Physically unclonable functions (PUFs) are hardware security primitives that utilize non-reproducible manufacturing variations to provide device-specific challenge-response pairs (CRPs). Such primitives are desirable for applications such as communication and intellectual property protection. PUFs have been gaining considerable interest from both the academic and industrial communities because of their simplicity and stability. However, many recent studies have exposed PUFs to machine-learning (ML) modeling attacks. To improve the resilience of a system to general ML attacks instead of a specific ML technique, a common solution is to improve the complexity of the system. Structures, such as XOR-PUFs, can significantly increase the nonlinearity …


Qasm-To-Hls: A Framework For Accelerating Quantum Circuit Emulation On High-Performance Reconfigurable Computers, Anshul Maurya Dec 2023

Qasm-To-Hls: A Framework For Accelerating Quantum Circuit Emulation On High-Performance Reconfigurable Computers, Anshul Maurya

Theses and Dissertations

High-performance reconfigurable computers (HPRCs) make use of Field-Programmable Gate Arrays (FPGAs) for efficient emulation of quantum algorithms. Generally, algorithm-specific architectures are implemented on the FPGAs and there is very little flexibility. Moreover, mapping a quantum algorithm onto its equivalent FPGA emulation architecture is challenging. In this work, we present an automation framework for converting quantum circuits to their equivalent FPGA emulation architectures. The framework processes quantum circuits represented in Quantum Assembly Language (QASM) and derives high-level descriptions of the hardware emulation architectures for High-Level Synthesis (HLS) on HPRCs. The framework generates the code for a heterogeneous architecture consisting of a …


Accelerating Machine Learning Inference For Satellite Component Feature Extraction Using Fpgas., Andrew Ekblad Dec 2023

Accelerating Machine Learning Inference For Satellite Component Feature Extraction Using Fpgas., Andrew Ekblad

Theses and Dissertations

Running computer vision algorithms requires complex devices with lots of computing power, these types of devices are not well suited for space deployment. The harsh radiation environment and limited power budgets have hindered the ability of running advanced computer vision algorithms in space. This problem makes running an on-orbit servicing detection algorithm very difficult. This work proposes using a low powered FPGA to accelerate the computer vision algorithms that enable satellite component feature extraction. This work uses AMD/Xilinx’s Zynq SoC and DPU IP to run model inference. Experiments in this work centered around improving model post processing by creating implementations …


Robust And Uncertainty-Aware Image Classification Using Bayesian Vision Transformer Model, Fazlur Rahman Bin Karim Dec 2023

Robust And Uncertainty-Aware Image Classification Using Bayesian Vision Transformer Model, Fazlur Rahman Bin Karim

Theses and Dissertations

Transformer Neural Networks have emerged as the predominant architecture for addressing a wide range of Natural Language Processing (NLP) applications such as machine translation, speech recognition, sentiment analysis, text anomaly detection, etc. This noteworthy achievement of Transformer Neural Networks in the NLP field has sparked a growing interest in integrating and utilizing Transformer models in computer vision tasks. The Vision Transformer (ViT) model efficiently captures long-range dependencies by employing a self-attention mechanism to transform different image data into meaningful, significant representations. Recently, the Vision Transformer (ViT) has exhibited incredible performance in solving image classification problems by utilizing ViT models, thereby …


Vertical Federated Learning Using Autoencoders With Applications In Electrocardiograms, Wesley William Chorney Aug 2023

Vertical Federated Learning Using Autoencoders With Applications In Electrocardiograms, Wesley William Chorney

Theses and Dissertations

Federated learning is a framework in machine learning that allows for training a model while maintaining data privacy. Moreover, it allows clients with their own data to collaborate in order to build a stronger, shared model. Federated learning is of particular interest to healthcare data, since it is of the utmost importance to respect patient privacy while still building useful diagnostic tools. However, healthcare data can be complicated — data format might differ across providers, leading to unexpected inputs and incompatibility between different providers. For example, electrocardiograms might differ in sampling rate or number of leads used, meaning that a …


Extending The Convolution In Graph Neural Networks To Solve Materials Science And Node Classification Problems, Steph-Yves Mike Louis Jul 2023

Extending The Convolution In Graph Neural Networks To Solve Materials Science And Node Classification Problems, Steph-Yves Mike Louis

Theses and Dissertations

The usage of graph to represent one's data in machine learning has grown in popularity in both academia and the industry due to its inherent benefits. With its flexible nature and immediate translation to real life observed objects, graph representation had a considerable contribution in advancing the state-of-the-art performance of machine learning in materials.

In this dissertation proposal, we discuss how machines can learn from graph encoded data and provide excellent results through graph neural networks (GNN). Notably, we focus our adaptation of graph neural networks on three tasks: predicting crystal materials properties, nullifying the negative impact of inferior graph …


Predicting Material Structures And Properties Using Deep Learning And Machine Learning Algorithms, Yuqi Song Jul 2023

Predicting Material Structures And Properties Using Deep Learning And Machine Learning Algorithms, Yuqi Song

Theses and Dissertations

Discovering new materials and understanding their crystal structures and chemical properties are critical tasks in the material sciences. Although computational methodologies such as Density Functional Theory (DFT), provide a convenient means for calculating certain properties of materials or predicting crystal structures when combined with search algorithms, DFT is computationally too demanding for structure prediction and property calculation for most material families, especially for those materials with a large number of atoms. This dissertation aims to address this limitation by developing novel deep learning and machine learning algorithms for effective prediction of material crystal structures and properties. Our data-driven machine learning …


Adversary Aware Continual Learning, Muhammad Umer Jun 2023

Adversary Aware Continual Learning, Muhammad Umer

Theses and Dissertations

Continual learning approaches are useful as they help the model to learn new information (classes) sequentially, while also retaining the previously acquired information (classes). However, these approaches are adversary agnostic, i.e., they do not consider the possibility of malicious attacks. In this dissertation, we have demonstrated that continual learning approaches are extremely vulnerable to the adversarial backdoor attacks, where an intelligent adversary can introduce small amount of misinformation to the model in the form of imperceptible backdoor pattern during training to cause deliberate forgetting of a specific class at test time. We then propose a novel defensive framework to counter …


Methodology For Designing Assistive Robots For Activities Of Daily Living Assistance, Javier Dario Sanjuan De Caro Jun 2023

Methodology For Designing Assistive Robots For Activities Of Daily Living Assistance, Javier Dario Sanjuan De Caro

Theses and Dissertations

The growing prevalence of Upper or Lower Extremities Dysfunctions (ULED), often linked to central nervous disorders such as stroke, Spinal Cord Injury (SCI), and Multiple Sclerosis (MS), underscores the urgent need for innovative support solutions. Over 5.35 million Americans currently live with ULED, a situation that places a significant socioeconomic burden on families and society. Despite invaluable support from caregivers and family members, the need for more scalable, practical solutions persists.

Wheelchair-mounted assistive robots emerge as a promising alternative in this context. These devices, offering continuous and reliable assistance, significantly alleviate caregiver fatigue and enhance the independence and quality of …


Secure And Efficient Federated Learning, Xingyu Li May 2023

Secure And Efficient Federated Learning, Xingyu Li

Theses and Dissertations

In the past 10 years, the growth of machine learning technology has been significant, largely due to the availability of large datasets for training. However, gathering a sufficient amount of data on a central server can be challenging. Additionally, with the rise of mobile networking and the large amounts of data generated by IoT devices, privacy and security issues have become a concern, resulting in government regulations such as GDPR, HIPAA, CCPA, and ADPPA. Under these circumstances, traditional centralized machine learning methods face a problem in that sensitive data must be kept locally for privacy reasons, making it difficult to …


Eddy Current Defect Response Analysis Using Sum Of Gaussian Methods, James William Earnest May 2023

Eddy Current Defect Response Analysis Using Sum Of Gaussian Methods, James William Earnest

Theses and Dissertations

This dissertation is a study of methods to automatedly detect and produce approximations of eddy current differential coil defect signatures in terms of a summed collection of Gaussian functions (SoG). Datasets consisting of varying material, defect size, inspection frequency, and coil diameter were investigated. Dimensionally reduced representations of the defect responses were obtained utilizing common existing reduction methods and novel enhancements to them utilizing SoG Representations. Efficacy of the SoG enhanced representations were studied utilizing common Machine Learning (ML) interpretable classifier designs with the SoG representations indicating significant improvement of common analysis metrics.


Utilizing Deep Learning Methods In The Identification And Synthesis Of Gene Regulations, Jiandong Wang Apr 2023

Utilizing Deep Learning Methods In The Identification And Synthesis Of Gene Regulations, Jiandong Wang

Theses and Dissertations

Gene expression is the fundamental differentiation and development process of life. Although all cells in an organism have essentially the same DNA, cell types and activities vary due to changes in gene expression. Gene expression can be influenced by many gene regulations. RNA editing contributes to the variety of RNA and proteins by allowing single nucleotide substitution. Reverse transcription can alter the expression status of genes by inducing genetic diversity and polymorphism via novel insertions, deletions, and recombination events. Gene regulation is critical to normal development because it enables cells to respond rapidly to environmental changes. However, identifying gene regulations …


Semantics-Based Data Security Models, Theppatorn Rhujittawiwat Apr 2023

Semantics-Based Data Security Models, Theppatorn Rhujittawiwat

Theses and Dissertations

In this dissertation, we studied how an adversary could attack databases and how the system could prevent or recover from such an attack. Our motivation to improve the current security capabilities of database management systems. We provided better recovery capabilities of database management systems by incorporating data provenance. We also expand our study to express security and privacy needs of data in the Internet of Things (IoT) environments such as a smart home environment. For this, we proposed a stream data security model to theoretically represent the data in the IoT network. We built a dynamic authorization model on our …


Material Extrusion-Based Additive Manufacturing: G-Code And Firmware Attacks And Defense Frameworks, Haris Rais Jan 2023

Material Extrusion-Based Additive Manufacturing: G-Code And Firmware Attacks And Defense Frameworks, Haris Rais

Theses and Dissertations

Additive Manufacturing (AM) refers to a group of manufacturing processes that create physical objects by sequentially depositing thin layers. AM enables highly customized production with minimal material wastage, rapid and inexpensive prototyping, and the production of complex assemblies as single parts in smaller production facilities. These features make AM an essential component of Industry 4.0 or Smart Manufacturing. It is now used to print functional components for aircraft, rocket engines, automobiles, medical implants, and more. However, the increased popularity of AM also raises concerns about cybersecurity. Researchers have demonstrated strength degradation attacks on printed objects by injecting cavities in the …