Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture

Theses/Dissertations

2023

Institution
Keyword
Publication

Articles 1 - 30 of 47

Full-Text Articles in Engineering

Gen-Acceleration: Pioneering Work For Hardware Accelerator Generation Using Large Language Models, Durga Lakshmi Venkata Deepak Vungarala Dec 2023

Gen-Acceleration: Pioneering Work For Hardware Accelerator Generation Using Large Language Models, Durga Lakshmi Venkata Deepak Vungarala

Theses

Optimizing computational power is critical in the age of data-intensive applications and Artificial Intelligence (AI)/Machine Learning (ML). While facing challenging bottlenecks, conventional Von-Neumann architecture with implementing such huge tasks looks seemingly impossible. Hardware Accelerators are critical in efficiently deploying these technologies and have been vastly explored in edge devices. This study explores a state-of-the-art hardware accelerator; Gemmini is studied; we leveraged the open-sourced tool. Furthermore, we developed a Hardware Accelerator in the study we compared with the Non-Von-Neumann architecture. Gemmini is renowned for efficient matrix multiplication, but configuring it for specific tasks requires manual effort and expertise. We propose implementing …


Remote Side-Channel Disassembly On Field-Programmable Gate Arrays, Brandon R. Baggett Dec 2023

Remote Side-Channel Disassembly On Field-Programmable Gate Arrays, Brandon R. Baggett

<strong> Theses and Dissertations </strong>

Over the last two decades, side-channel vulnerabilities have shown to be a major threat to embedded devices. Most side-channel research has developed our understanding of the vulnerabilities to cryptographic devices due to their implementation and how we can protect them. However, side-channel leakage can yield useful information about many other processes that run on the device. One promising area that has received little attention is the side-channel leakage due to the execution of assembly instructions. There has been some work in this area that has demonstrated the idea’s potential, but so far, this research has assumed the adversary has physical …


Trojan Detection Expansion Of Structural Checking, Zachary Chapman Dec 2023

Trojan Detection Expansion Of Structural Checking, Zachary Chapman

Graduate Theses and Dissertations

With the growth of the integrated circuit (IC) market, there has also been a rise in demand for third-party soft intellectual properties (IPs). However, the growing use of such Ips makes it easier for adversaries to hide malicious code, like hardware Trojans, into these designs. Unlike software Trojan detection, hardware Trojan detection is still an active research area. One proposed approach to this problem is the Structural Checking tool, which can detect hardware Trojans using two methodologies. The first method is a matching process, which takes an unknown design and attempts to determine if it might contain a Trojan by …


Cybersecurity In Critical Infrastructure Systems: Emulated Protection Relay, Mitchell Bylak Dec 2023

Cybersecurity In Critical Infrastructure Systems: Emulated Protection Relay, Mitchell Bylak

Computer Science and Computer Engineering Undergraduate Honors Theses

Cyber-attacks on Critical Systems Infrastructure have been steadily increasing across the world as the capabilities of and reliance on technology have grown throughout the 21st century, and despite the influx of new cybersecurity practices and technologies, the industry faces challenges in its cooperation between the government that regulates law practices and the private sector that owns and operates critical infrastructure and security, which has directly led to an absence of eas- ily accessible information and learning resources on cybersecurity for use in public environments and educational settings. This honors research thesis addresses these challenges by submitting the development of an …


Deep Learning Frameworks For Accelerated Magnetic Resonance Image Reconstruction Without Ground Truths, Ibsa Kumara Jalata Dec 2023

Deep Learning Frameworks For Accelerated Magnetic Resonance Image Reconstruction Without Ground Truths, Ibsa Kumara Jalata

Graduate Theses and Dissertations

Magnetic Resonance Imaging (MRI) is typically a slow process because of its sequential data acquisition. To speed up this process, MR acquisition is often accelerated by undersampling k-space signals and solving an ill-posed problem through a constrained optimization process. Image reconstruction from under-sampled data is posed as an inverse problem in traditional model-based learning paradigms. While traditional methods use image priors as constraints, modern deep learning methods use supervised learning with ground truth images to learn image features and priors. However, in some cases, ground truth images are not available, making supervised learning impractical. Recent data-centric learning frameworks such as …


Towards Multi-Modal Interpretable Video Understanding, Quang Sang Truong Dec 2023

Towards Multi-Modal Interpretable Video Understanding, Quang Sang Truong

Graduate Theses and Dissertations

This thesis introduces an innovative approach to video comprehension, which simulates human perceptual mechanisms and establishes a comprehensible and coherent narrative representation of video content. At the core of this approach lies the creation of a Visual-Linguistic (VL) feature for an interpretable video portrayal and an adaptive attention mechanism (AAM) aimed at concentrating solely on principal actors or pertinent objects while modeling their interconnections. Taking cues from the way humans disassemble scenes into visual and non-visual constituents, the proposed VL feature characterizes a scene via three distinct modalities: (i) a global visual environment, providing a broad contextual comprehension of the …


Improving Credit Card Fraud Detection Using Transfer Learning And Data Resampling Techniques, Charmaine Eunice Mena Vinarta Dec 2023

Improving Credit Card Fraud Detection Using Transfer Learning And Data Resampling Techniques, Charmaine Eunice Mena Vinarta

Electronic Theses, Projects, and Dissertations

This Culminating Experience Project explores the use of machine learning algorithms to detect credit card fraud. The research questions are: Q1. What cross-domain techniques developed in other domains can be effectively adapted and applied to mitigate or eliminate credit card fraud, and how do these techniques compare in terms of fraud detection accuracy and efficiency? Q2. To what extent do synthetic data generation methods effectively mitigate the challenges posed by imbalanced datasets in credit card fraud detection, and how do these methods impact classification performance? Q3. To what extent can the combination of transfer learning and innovative data resampling techniques …


Enhancing Accident Investigation Using Traffic Cctv Footage, Aksharapriya Peddi Dec 2023

Enhancing Accident Investigation Using Traffic Cctv Footage, Aksharapriya Peddi

Electronic Theses, Projects, and Dissertations

This Culminating Experience Project investigated how the densenet-161 model will perform on accident severity prediction compared to proposed methods. The research questions are: (Q1) What is the impact of usage of augmentation techniques on imbalanced datasets? (Q2) How will the hyper parameter tuning affect the model performance? (Q3) How effective is the proposed model compared to existing work? The findings are: Q1. The effectiveness of our model depends on the implementation of augmentation techniques that pay attention to handling imbalanced datasets. Our dataset poses a challenge due to distribution of classes in terms of accident severity. To address this challenge …


Qasm-To-Hls: A Framework For Accelerating Quantum Circuit Emulation On High-Performance Reconfigurable Computers, Anshul Maurya Dec 2023

Qasm-To-Hls: A Framework For Accelerating Quantum Circuit Emulation On High-Performance Reconfigurable Computers, Anshul Maurya

Theses and Dissertations

High-performance reconfigurable computers (HPRCs) make use of Field-Programmable Gate Arrays (FPGAs) for efficient emulation of quantum algorithms. Generally, algorithm-specific architectures are implemented on the FPGAs and there is very little flexibility. Moreover, mapping a quantum algorithm onto its equivalent FPGA emulation architecture is challenging. In this work, we present an automation framework for converting quantum circuits to their equivalent FPGA emulation architectures. The framework processes quantum circuits represented in Quantum Assembly Language (QASM) and derives high-level descriptions of the hardware emulation architectures for High-Level Synthesis (HLS) on HPRCs. The framework generates the code for a heterogeneous architecture consisting of a …


Machine Learning For Kalman Filter Tuning Prediction In Gps/Ins Trajectory Estimation, Peter Wright Dec 2023

Machine Learning For Kalman Filter Tuning Prediction In Gps/Ins Trajectory Estimation, Peter Wright

Electronic Theses, Projects, and Dissertations

This project is an exploration and implementation of an application using Machine Learning (ML) and Artificial Intelligence (AI) techniques which would be capable of automatically tuning Kalman-Filter parameters used in post-flight trajectory estimation software at Edwards Air Force Base (EAFB), CA. The scope of the work in this paper is to design and develop a skeleton application with modular design, where various AI/ML modules could be developed to plug-in to the application for tuning-switch prediction.


Melanoma Detection Based On Deep Learning Networks, Sanjay Devaraneni Dec 2023

Melanoma Detection Based On Deep Learning Networks, Sanjay Devaraneni

Electronic Theses, Projects, and Dissertations

Our main objective is to develop a method for identifying melanoma enabling accurate assessments of patient’s health. Skin cancer, such as melanoma can be extremely dangerous if not detected and treated early. Detecting skin cancer accurately and promptly can greatly increase the chances of survival. To achieve this, it is important to develop a computer-aided diagnostic support system. In this study a research team introduces a sophisticated transfer learning model that utilizes Resnet50 to classify melanoma. Transfer learning is a machine learning technique that takes advantage of trained models, for similar tasks resulting in time saving and enhanced accuracy by …


Classification Of Large Scale Fish Dataset By Deep Neural Networks, Priyanka Adapa Dec 2023

Classification Of Large Scale Fish Dataset By Deep Neural Networks, Priyanka Adapa

Electronic Theses, Projects, and Dissertations

The development of robust and efficient fish classification systems has become essential to preventing the rapid depletion of aquatic resources and building conservation strategies. A deep learning approach is proposed here for the automated classification of fish species from underwater images. The proposed methodology leverages state-of-the-art deep neural networks by applying the compact convolutional transformer (CCT) architecture, which is famous for faster training and lower computational cost. In CCT, data augmentation techniques are employed to enhance the variability of the training data, reducing overfitting and improving generalization. The preliminary outcomes of our proposed method demonstrate a promising accuracy level of …


Decentralized Machine Learning On Blockchain: Developing A Federated Learning Based System, Nikhil Sridhar Dec 2023

Decentralized Machine Learning On Blockchain: Developing A Federated Learning Based System, Nikhil Sridhar

Master's Theses

Traditional Machine Learning (ML) methods usually rely on a central server to per-
form ML tasks. However, these methods have problems like security risks, data
storage issues, and high computational demands. Federated Learning (FL), on the
other hand, spreads out the ML process. It trains models on local devices and then
combines them centrally. While FL improves computing and customization, it still
faces the same challenges as centralized ML in security and data storage.


This thesis introduces a new approach combining Federated Learning and Decen-
tralized Machine Learning (DML), which operates on an Ethereum Virtual Machine
(EVM) compatible blockchain. The …


Assessing Blockchain’S Potential To Ensure Data Integrity And Security For Ai And Machine Learning Applications, Aiasha Siddika Dec 2023

Assessing Blockchain’S Potential To Ensure Data Integrity And Security For Ai And Machine Learning Applications, Aiasha Siddika

Master of Science in Information Technology Theses

The increasing use of data-centric approaches in the fields of Machine Learning and Artificial Intelligence (ML/AI) has raised substantial issues over the security, integrity, and trustworthiness of data. In response to this challenge, Blockchain technology offered a promising and practical solution, as its inherent characteristics as a decentralized distributed ledger, coupled with cryptographic processes, offer an unprecedented level of data confidentiality and immutability. This study examines the mutually beneficial connection between Blockchain technology and ML/AI, using Blockchain's inherent capacity to protect against unauthorized alterations of data during the training phase of ML models. The method involves building valid blocks of …


Screensafefuture: A Parent-Empathetic And Practical Mhealth Application For Toddlers' Brain Development Addressing Screen-Addiction Challenges, Nafisa Anjum Nov 2023

Screensafefuture: A Parent-Empathetic And Practical Mhealth Application For Toddlers' Brain Development Addressing Screen-Addiction Challenges, Nafisa Anjum

Master of Science in Information Technology Theses

The surging incidents of infants and toddlers screen addiction in the United States are becoming a pressing concern due to its detrimental and compound impact on cognitive development, mental health, and physical growth. To address this era's critical child health and human development problem, we propose an innovative mHealth application-- ScreenSafeFuture-- in this paper. ScreenSafeFuture provides practical and parent-friendly solutions that seamlessly fit into parents' busy lifestyles, also acknowledging the effectiveness and convenience of smartphones as a healthcare tool. Our offering includes essential features designed to enhance the experience between parents and their children under 3 years old. With an …


Enabling Intelligent Network Management Through Multi-Agent Systems: An Implementation Of Autonomous Network System, Petro Mushidi Tshakwanda Oct 2023

Enabling Intelligent Network Management Through Multi-Agent Systems: An Implementation Of Autonomous Network System, Petro Mushidi Tshakwanda

Electrical and Computer Engineering ETDs

This Ph.D. dissertation presents a pioneering Multi-Agent System (MAS) approach for intelligent network management, particularly suited for next-generation networks like 5G and 6G. The thesis is segmented into four critical parts. Firstly, it contrasts the benefits of agent-based design over traditional micro-service architectures. Secondly, it elaborates on the implementation of network service agents in Python Agent Development Environment (PADE), employing machine learning and deep learning algorithms for performance evaluation. Thirdly, a new scalable approach, Scalable and Efficient DevOps (SE-DO), is introduced to optimize agent performance in resource-constrained settings. Fourthly, the dissertation delves into Quality of Service (QoS) and Radio Resource …


Sel4 On Risc-V - Developing High Assurance Platforms With Modular Open-Source Architectures, Michael A. Doran Jr Aug 2023

Sel4 On Risc-V - Developing High Assurance Platforms With Modular Open-Source Architectures, Michael A. Doran Jr

Masters Theses

Virtualization is now becoming an industry standard for modern embedded systems. Modern embedded systems can now support multiple applications on a single hardware platform while meeting power and cost requirements. Virtualization on an embedded system is achieved through the design of the hardware-software interface. Instruction set architecture, ISA, defines the hardware-software interface for an embedded system. At the hardware level the ISA, provides extensions to support virtualization.

In addition to an ISA that supports hypervisor extensions it is equally important to provide a hypervisor completely capable of exploiting the benefits of virtualization for securing modern embedded systems. Currently there does …


Finserv Android Application, Harsh Piyushkumar Shah Aug 2023

Finserv Android Application, Harsh Piyushkumar Shah

Electronic Theses, Projects, and Dissertations

The FINSERV Android application is a mobile tool designed for individuals to manage and track their finances. In financially complex world, many people struggle to maintain a clear overview of their income, expenses, and financial goals. This application aims to bridge that gap by providing users with a powerful and user-friendly platform to efficiently monitor and optimize their personal finances.

With the Personal Finance Tracking Android Application, users can effortlessly track their income and expenses, categorize transactions, and gain valuable insights into their spending patterns. The application offers features such as expense categorization and real-time expense tracking.

To enhance usability …


Performance Modeling Of Inline Compression With Software Caching For Reducing The Memory Footprint In Pysdc, Sansriti Ranjan Aug 2023

Performance Modeling Of Inline Compression With Software Caching For Reducing The Memory Footprint In Pysdc, Sansriti Ranjan

All Theses

Modern HPC applications compute and analyze massive amounts of data. The data volume is growing faster than memory capabilities and storage improvements leading to performance bottlenecks. An example of this is pySDC, a framework for solving collocation problems iteratively using parallel-in-time methods. These methods require storing and exchanging 3D volume data for each parallel point in time. If a simulation consists of M parallel-in-time stages, where the full spatial problem has to be stored for the next iteration, the memory demand for a single state variable is M ×Nx ×Ny ×Nz per time-step. For an application simulation with many state …


Optimizing High-Performance Computing Design: The Impacts Of Bandwidth And Topology Across Workloads For Distributed Shared Memory Systems, Jonathan A. Milton Jul 2023

Optimizing High-Performance Computing Design: The Impacts Of Bandwidth And Topology Across Workloads For Distributed Shared Memory Systems, Jonathan A. Milton

Electrical and Computer Engineering ETDs

With the complexity of high-performance computing designs continuously increasing, the importance of evaluating with simulation also grows. One of the key design aspects is the network architecture; topology and bandwidth greatly influence the overall performance and should be optimized. This work uses simulations written to run in the Structural Simulation Toolkit software framework to evaluate a variety of architecture configurations, identify the optimal design point based on expected workload, and evaluate the changes with increased scale. The results show that advanced topologies outperform legacy architectures justifying the additional design complexity; and that after a certain point increasing the bandwidth provides …


Evaluating An Mhealth Application For Cancer Survivors With Disabilities Through Usability Testing, Kevin Baez Jul 2023

Evaluating An Mhealth Application For Cancer Survivors With Disabilities Through Usability Testing, Kevin Baez

University Honors Program Senior Projects

The effect of cancer treatment can cause difficulties in a cancer survivor's life due to the risk of attaining a long-term disability which has potential negative cognitive, psychological, physical, and social consequences. Furthermore, post-treatment support has been shown to be severely limited, leaving many to deal with new obstacles and struggles on their own. With no real support system in place, cancer survivors with disabilities can be lost during post-cancer transition. However, mHealth interventions have been proven to effectively aid users in dealing with various health issues. We aim to support and empower cancer survivors through an application called, WeCanManage. …


Polyflowbuilder: An Intuitive Tool For Academic Planning At Cal Poly San Luis Obispo, Duncan Thomas Applegarth Jun 2023

Polyflowbuilder: An Intuitive Tool For Academic Planning At Cal Poly San Luis Obispo, Duncan Thomas Applegarth

Computer Engineering

PolyFlowBuilder is a web application that lets users create visually intuitive flowcharts to aid in academic planning at Cal Poly. These flowcharts can be customized in a variety of ways to accurately represent complex academic plans, such as double majors, minors, taking courses out- of-order, etc. The original version of PolyFlowBuilder, released Summer 2020, was not written for continued expansion and growth. Therefore, a complete rewrite was determined to be necessary to enable the project to grow in the future. This report details the process to completely rewrite the existing version of PolyFlowBuilder over the course of six months, using …


Contextually Dynamic Quest Generation Using In-Session Player Information In Mmorpg, Shangwei Lin Jun 2023

Contextually Dynamic Quest Generation Using In-Session Player Information In Mmorpg, Shangwei Lin

Master's Theses

Massively multiplayer online role-playing games (MMORPGs) are one of the most

popular genres in video games that combine massively multiplayer online genres with

role-playing gameplay. MMORPGs’ featured social interaction and forms of level pro-

gression through quest completion are the core for gaining players’ attention. Varied

and challenging quests play an essential part in retaining that attention. However,

well-crafted content takes much longer to develop with human efforts than it does to

consume, and the dominant procedural content generation models for quests suffer

from the drawback of being incompatible with dynamic world changes and the feeling

of repetition over time. …


Adversarial Patch Attacks On Deep Reinforcement Learning Algorithms, Peizhen Tong May 2023

Adversarial Patch Attacks On Deep Reinforcement Learning Algorithms, Peizhen Tong

McKelvey School of Engineering Theses & Dissertations

Adversarial patch attack has demonstrated that it can cause the misclassification of deep neural networks to the target label when the size of patch is relatively small to the size of input image; however, the effectiveness of adversarial patch attack has never been experimented on deep reinforcement learning algorithms. We design algorithms to generate adversarial patches to attack two types of deep reinforcement learning algorithms, including deep Q-networks (DQN) and proximal policy optimization (PPO). Our algorithms of generating adversarial patch consist of two parts: choosing attack position and training adversarial patch on that position. Under the same bound of total …


Vi Energy-Efficient Memristor-Based Neuromorphic Computing Circuits And Systems For Radiation Detection Applications, Jorge Iván Canales Verdial May 2023

Vi Energy-Efficient Memristor-Based Neuromorphic Computing Circuits And Systems For Radiation Detection Applications, Jorge Iván Canales Verdial

Electrical and Computer Engineering ETDs

Radionuclide spectroscopic sensor data is analyzed with minimal power consumption through the use of neuromorphic computing architectures. Memristor crossbars are harnessed as the computational substrate in this non-conventional computing platform and integrated with CMOS-based neurons to mimic the computational dynamics observed in the mammalian brain’s visual cortex. Functional prototypes using spiking sparse locally competitive approximations are presented. The architectures are evaluated for classification accuracy and energy efficiency. The proposed systems achieve a 90% true positive accuracy with a high-resolution detector and 86% with a low-resolution detector.


Enabling Security Analysis And Education Of The Ethereum Platform: A Network Traffic Dissection Tool, Joshua Mason Kemp May 2023

Enabling Security Analysis And Education Of The Ethereum Platform: A Network Traffic Dissection Tool, Joshua Mason Kemp

Masters Theses, 2020-current

Ethereum, the decentralized global software platform powered by blockchain technology known for its native cryptocurrency, Ether (ETH), provides a technology stack for building apps, holding assets, transacting, and communicating without control by a central authority. At the core of Ethereum’s network is a suite of purpose-built protocols known as DEVP2P, which provides the underlying nodes in an Ethereum network the ability to discover, authenticate and communicate confidentiality. This document discusses the creation of a new Wireshark dissector for DEVP2P’s discovery protocols, DiscoveryV4 and DiscoveryV5, and a dissector for RLPx, an extensible TCP transport protocol for a range of Ethereum node …


Svar: A Virtual Machine For Portable Code On Reconfigurable Accelerators, Nathaniel Fredricks May 2023

Svar: A Virtual Machine For Portable Code On Reconfigurable Accelerators, Nathaniel Fredricks

Computer Science and Computer Engineering Undergraduate Honors Theses

The SPAR-2 array processor was designed as an overlay architecture for implementation on Xilinx Field Programmable Gate Arrays (FPGAs). As an overlay, the SPAR-2 array processor can be configured to take advantage of the specific resources available on different FPGAs. However once configured, the SPAR-2 requires programmer’s to have knowledge of the low level architecture, and write platform-specific code. In this thesis SVAR, a hardware/software co-designed virtual machine, is proposed that runs on the SPAR-2. SVAR allows programmers to write portable, platform-independent code once and have it interpreted for any specific configuration. Results are presented that verify the virtual machine …


Laying The Foundation For A Miniatuairzed Scada Testbed To Be Built At Csusb, Ryan Perera May 2023

Laying The Foundation For A Miniatuairzed Scada Testbed To Be Built At Csusb, Ryan Perera

Electronic Theses, Projects, and Dissertations

This culminating experience sought to lay the foundation for a miniaturized physical SCADA testbed to be built at California State University San Bernardino to enable students to apply the cybersecurity knowledge, skills and abilities in a fun and engaging environment while learning about what SCADA is, how it works, and how to improve the security of it. This project was conducted in response to a growing trend of cybersecurity attacks that have targeted our critical infrastructure systems through SCADA systems which are legacy systems that manage critical infrastructure systems within the past 10 years. Since SCADA systems require constant availability, …


Radic Voice Authentication: Replay Attack Detection Using Image Classification For Voice Authentication Systems, Hannah Taylor May 2023

Radic Voice Authentication: Replay Attack Detection Using Image Classification For Voice Authentication Systems, Hannah Taylor

Undergraduate Honors Theses

Systems like Google Home, Alexa, and Siri that use voice-based authentication to verify their users’ identities are vulnerable to voice replay attacks. These attacks gain unauthorized access to voice-controlled devices or systems by replaying recordings of passphrases and voice commands. This shows the necessity to develop more resilient voice-based authentication systems that can detect voice replay attacks.

This thesis implements a system that detects voice-based replay attacks by using deep learning and image classification of voice spectrograms to differentiate between live and recorded speech. Tests of this system indicate that the approach represents a promising direction for detecting voice-based replay …


Digital Simulations Of Memristors Towards Integration With Reconfigurable Computing, Ivris Raymond May 2023

Digital Simulations Of Memristors Towards Integration With Reconfigurable Computing, Ivris Raymond

Computer Science and Computer Engineering Undergraduate Honors Theses

The end of Moore’s Law has been predicted for decades. Demand for increased parallel computational performance has been increased by improvements in machine learning. This past decade has demonstrated the ever-increasing creativity and effort necessary to extract scaling improvements in CMOS fabrication processes. However, CMOS scaling is nearing its fundamental physical limits. A viable path for increasing performance is to break the von Neumann bottleneck. In-memory computing using emerging memory technologies (e.g. ReRam, STT, MRAM) offers a potential path beyond the end of Moore’s Law. However, there is currently very little support from industry tools for designers wishing to incorporate …