Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 720

Full-Text Articles in Engineering

Blind Source Separation Using Dictionary Learning Over Time-Varying Channels, Anushreya Ghosh May 2019

Blind Source Separation Using Dictionary Learning Over Time-Varying Channels, Anushreya Ghosh

Theses

Distributed sensors observe radio frequency (RF) sources over flat-fading channels. The activity pattern is sparse and intermittent in the sense that while the number of latent sources may be larger than the number of sensors, only a few of them may be active at any particular time instant. It is further assumed that the source activity is modeled by a Hidden Markov Model. In previous work, the Blind Source Separation (BSS) problem solved for stationary channels using Dictionary Learning (DL). This thesis studies the effect of time-varying channels on the performance of DL algorithms. The performance metric is the probability …


Wireless Coverage Using Unmanned Aerial Vehicles, Hazim Shakhatreh Dec 2018

Wireless Coverage Using Unmanned Aerial Vehicles, Hazim Shakhatreh

Dissertations

The use of unmanned aerial vehicles (UAVs) is growing rapidly across many civilian application domains including real-time monitoring, search and rescue, and wireless coverage. UAVs can be used to provide wireless coverage during emergency cases where each UAV serves as an aerial wireless base station when the cellular network goes down. They can also be used to supplement the ground base station in order to provide better coverage and higher data rates for the users. During such situations, the UAVs need to return periodically to a charging station for recharging, due to their limited battery capacity. Given the recharging requirements, …


Impairments In Ground Moving Target Indicator (Gmti) Radar, Phuoc Doan Huu Vu Dec 2018

Impairments In Ground Moving Target Indicator (Gmti) Radar, Phuoc Doan Huu Vu

Dissertations

Radars on multiple distributed airborne or ground based moving platforms are of increasing interest, since they can be deployed in close proximity to the event under investigation and thus offer remarkable sensing opportunities. Ground moving target indicator (GMTI) detects and localizes moving targets in the presence of ground clutter and other interference sources. Space-time adaptive processing (STAP) implemented with antenna arrays has been a classical approach to clutter cancellation in airborne radar. One of the challenges with STAP is that the minimum detectable velocity (MDV) of targets is a function of the baseline of the antenna array: the larger the …


Optimizing Resource Allocation In Eh-Enabled Internet Of Things, Ali Shahini Dec 2018

Optimizing Resource Allocation In Eh-Enabled Internet Of Things, Ali Shahini

Dissertations

Internet of Things (IoT) aims to bridge everyday physical objects via the Internet. Traditional energy-constrained wireless devices are powered by fixed energy sources like batteries, but they may require frequent battery replacements or recharging. Wireless Energy Harvesting (EH), as a promising solution, can potentially eliminate the need of recharging or replacing the batteries. Unlike other types of green energy sources, wireless EH does not depend on nature and is thus a reliable source of energy for charging devices. Meanwhile, the rapid growth of IoT devices and wireless applications is likely to demand for more operating frequency bands. Although the frequency …


Characterization Of Self-Heating Effects And Assessment Of Its Impact On Reliability In Finfet Technology, Peter Christopher Paliwoda Dec 2018

Characterization Of Self-Heating Effects And Assessment Of Its Impact On Reliability In Finfet Technology, Peter Christopher Paliwoda

Dissertations

The systematically growing power (heat) dissipation in CMOS transistors with each successive technology node is reaching levels which could impact its reliable operation. The emergence of technologies such as bulk/SOI FinFETs has dramatically confined the heat in the device channel due to its vertical geometry and it is expected to further exacerbate with gate-all-around transistors.

This work studies heat generation in the channel of semiconductor devices and measures its dissipation by means of wafer level characterization and predictive thermal simulation. The experimental work is based on several existing device thermometry techniques to which additional layout improvements are made in state …


Load Balancing And Scalable Clos-Network Packet Switches, Oladele Theophilus Sule Dec 2018

Load Balancing And Scalable Clos-Network Packet Switches, Oladele Theophilus Sule

Dissertations

In this dissertation three load-balancing Clos-network packet switches that attain 100% throughput and forward cells in sequence are introduced. The configuration schemes and the in-sequence forwarding mechanisms devised for these switches are also introduced. Also proposed is the use of matrix analysis as a tool for throughput analysis.

In Chapter 2, a configuration scheme for a load-balancing Clos-network packet switch that has split central modules and buffers in between the split modules is introduced. This switch is called split-central-buffered Load-Balancing Clos-network (LBC) switch and it is cell based. The switch has four stages, namely input, central-input, central-output, and output stages. …


Icing Thickness Prediction Model For Overhead Transmission Lines, Yue Ming Dec 2018

Icing Thickness Prediction Model For Overhead Transmission Lines, Yue Ming

Theses

Failures in a large electric power system are often inevitable. Severe weather conditions are one of the main causes of transmission line failures. Using the fault data of transmission lines of Shaanxi Power Grid from 2006 to 2016, in conjunction with meteorological information, this paper analyses the relationship between the temporal-spatial distribution characteristics of meteorological disasters and the fault of transmission lines in Shaanxi Province, China.

In order to analyze the influence of micro-meteorology on ice coating, a grey correlation analysis method is proposed. This thesis calculates the grey relational between ice thickness and micro-meteorological parameters such as ambient temperature, …


Amorphous Metal Oxide Semiconductor Thin Film Transistors For Printed Electronics, Mustafa Mohammad Yousef Dec 2018

Amorphous Metal Oxide Semiconductor Thin Film Transistors For Printed Electronics, Mustafa Mohammad Yousef

Theses

There is an acute market need for solution-processable semiconductor inks that can form the essential components of the printed analog and digital circuits. Currently, the industry is migrating beyond simply printing conductive metals for interconnects and embracing higher integration by printing transistors directly on the same substrate. This thesis focuses on investigating solution-processed amorphous indium gallium zinc oxide (IGZO) as a semiconducting channel layer of a field-effect transistor to enable low-cost, large-area printed electronics that are physically flexible and optically transparent. Specifically, we aim to achieve field-effect mobility exceeding 1 cm2/Vs, to overcome the limits faced in existing …


Practical Vortex Beam Generation, Nedime Pelin Mohamed Hassan Salem Jul 2018

Practical Vortex Beam Generation, Nedime Pelin Mohamed Hassan Salem

Dissertations

Vector vortex beams are monochromatic electromagnetic wave fields carrying spin angular momentum (SAM) and orbital angular momentum (OAM). Spin angular momentum is associated with the polarization of the field, whereas OAM yields an azimuthal field dependence of the form exp( jqφ), where φ is the azimuthal angle, and q is an integer designating the helicity order, which is also known as the topological charge of the vortex beam. Vortex beams owe their names to the characteristic on-axis phase singularity and amplitude null.

In this study, a new method to generate vector vortex beams in the microwave regime is devised …


Online Edge Caching And Wireless Delivery In Fog-Aided Networks, Seyyed Mohammadreza Azimi May 2018

Online Edge Caching And Wireless Delivery In Fog-Aided Networks, Seyyed Mohammadreza Azimi

Dissertations

Multimedia content is the significant fraction of transferred data over the wireless medium in the modern cellular and wireless communication networks. To improve the quality of experience perceived by users, one promising solution is to push the most popular contents as close as to users, also known as the "edge" of network. Storing content at the edge nodes (ENs) or base stations (BSs) is called "caching". In Fog Radio Access Network (F-RAN), each EN is equipped with a cache as well as a "fronthaul" connection to the content server. Among the new design problems raised by the outlined scenarios, two …


Borehole Communication Via Drill Strings In Oil Wells, Ali Hamdan Alenezi May 2018

Borehole Communication Via Drill Strings In Oil Wells, Ali Hamdan Alenezi

Dissertations

The performance of multichannel and single channel accelerometers used as uphole communication receivers is studied. Using measured channels from the drill string testbed, it is shown that one tri-axial accelerometer can provide nearly uncorrelated signals when compared to two single channel accelerometers. Having uncorrelated signals at the uphole receiver provides a diversity which in turn can lead to an increase in the communication system performance. The use of a strain sensor as a receiver in borehole communication is proposed. Using measured channels from the drill string testbed, the performance of a strain receiver with a single-accelerometer receiver is compared. The …


Secure Entity Authentication, Zuochao Dou May 2018

Secure Entity Authentication, Zuochao Dou

Dissertations

According to Wikipedia, authentication is the act of confirming the truth of an attribute of a single piece of a datum claimed true by an entity. Specifically, entity authentication is the process by which an agent in a distributed system gains confidence in the identity of a communicating partner (Bellare et al.). Legacy password authentication is still the most popular one, however, it suffers from many limitations, such as hacking through social engineering techniques, dictionary attack or database leak. To address the security concerns in legacy password-based authentication, many new authentication factors are introduced, such as PINs (Personal Identification Numbers) …


From Geographically Dispersed Data Centers Towards Hierarchical Edge Computing, Abbas Kiani May 2018

From Geographically Dispersed Data Centers Towards Hierarchical Edge Computing, Abbas Kiani

Dissertations

Internet scale data centers are generally dispersed in different geographical regions. While the main goal of deploying the geographically dispersed data centers is to provide redundancy, scalability and high availability, the geographic dispersity provides another opportunity for efficient employment of global resources, e.g., utilizing price-diversity in electricity markets or utilizing locational diversity in renewable power generation. In other words, an efficient approach for geographical load balancing (GLB) across geo-dispersed data centers not only can maximize the utilization of green energy but also can minimize the cost of electricity. However, due to the different costs and disparate environmental impacts of the …


On Distributed Mobile Edge Computing, Xiang Sun May 2018

On Distributed Mobile Edge Computing, Xiang Sun

Dissertations

Mobile Cloud Computing (MCC) has been proposed to offload the workloads of mobile applications from mobile devices to the cloud in order to not only reduce energy consumption of mobile devices but also accelerate the execution of mobile applications. Owing to the long End-to-End (E2E) delay between mobile devices and the cloud, offloading the workloads of many interactive mobile applications to the cloud may not be suitable. That is, these mobile applications require a huge amount of computing resources to process their workloads as well as a low E2E delay between mobile devices and computing resources, which cannot be satisfied …


Microfluidic Biosensor With Functionalized Gold Nano Particles On Interdigitated Electrodes, Bharath Babu Nunna May 2018

Microfluidic Biosensor With Functionalized Gold Nano Particles On Interdigitated Electrodes, Bharath Babu Nunna

Dissertations

The integration of the microfluidics to the biosensor has growing demand with favorable conditions such as reduced processing time and low reagent consumption. The immuno biosensing with the microfluidic platform helped to make the electrochemical biosensing assays portable due to which this sensing mechanism can be easily implemented in point of care devices. The implementation of the biosensing in the microchannels significantly reduces the sample requirement form milli liter (mL) to micro liter (uL), and thus leads to low volume sample requirement during the sensing. The primary factors contributing to the microfluidic biosensors performance are probe immobilization, specific binding and …


A Novel E-Voting System With Diverse Security Features, Haijun Pan Oct 2017

A Novel E-Voting System With Diverse Security Features, Haijun Pan

Dissertations

Internet-based E-voting systems can offer great benefits over traditional voting machines in areas, such as protecting voter and candidate privacy, providing accurate vote counting, preventing voter fraud, and shortening the time of vote counting. This dissertation introduces, establishes and improves Internet-based E-voting systems on various aspects of the voting procedure. In addition, our designs also enable voters to track their votes which is a very important element in any elections.

Our novel Internet-based E-voting system is based on the following realistic assumptions: (1) The election authorities are not 100% trustworthy; (2) The E-voting system itself is not 100% trustworthy; (3) …


Machine Learning Based Digital Image Forensics And Steganalysis, Guanshuo Xu Oct 2017

Machine Learning Based Digital Image Forensics And Steganalysis, Guanshuo Xu

Dissertations

The security and trustworthiness of digital images have become crucial issues due to the simplicity of malicious processing. Therefore, the research on image steganalysis (determining if a given image has secret information hidden inside) and image forensics (determining the origin and authenticity of a given image and revealing the processing history the image has gone through) has become crucial to the digital society.

In this dissertation, the steganalysis and forensics of digital images are treated as pattern classification problems so as to make advanced machine learning (ML) methods applicable. Three topics are covered: (1) architectural design of convolutional neural networks …


Silicon-Germanium Nanowire Heterojunctions: Optical And Electrical Properties, Xiaolu Wang Oct 2017

Silicon-Germanium Nanowire Heterojunctions: Optical And Electrical Properties, Xiaolu Wang

Dissertations

Semiconductor nanowires are quasi-one-dimensional objects with unique physical properties and strong potential in nanophotonics, nanoelectronics, biosensing, and solar cell devices. The next challenge in the development of nanowire functional structures is the nanowire axial heterojunctions, especially lattice mismatched heterojunctions. Si and Ge have a considerable lattice mismatch of ~ 4.2% as well as a mismatch in the coefficient of thermal expansion, and the formation of a Si1-xGex transition layer at the heterointerface creates a non-uniform strain and modifies the band structures of the adjacent Si and Ge nanowire segments. These nanostructures are produced by catalytic chemical …


Simulation, Performance And Interference Analysis Of Multi-User Visible Light Communication Systems, Adel Aldalbahi Oct 2017

Simulation, Performance And Interference Analysis Of Multi-User Visible Light Communication Systems, Adel Aldalbahi

Dissertations

The emergence of new physical media such as optical wireless, and the ability to aggregate these new media with legacy networks motivate the study of heterogeneous network performance, especially with respect to the design of protocols to best exploit the characteristics of each medium.

This study considers Visible Light Communications (VLC), which is expected to coexist with legacy and future radio frequency (RF) media. While most of the research on VLC has been done on optimizing the physical medium, research on higher network layers is only beginning to gain attention, requiring new analyses and tools for performance analysis.

The first …


Iterative Learning Control For Improved Tracking Of Fluid Percussion Injury Device, Steve Susanibar Aug 2017

Iterative Learning Control For Improved Tracking Of Fluid Percussion Injury Device, Steve Susanibar

Theses

Traumatic brain injury (TBI) afflicts over 10 million people around the world. Injury to the brain can occur from a variety of physical insults and the degree of disability can greatly vary from person to person. It is likely that the wide range of TBI outcomes may be due to the magnitude, direction, and forces of biomechanical insult acting on the head during such TBI events. Lateral Fluid Percussion (FPI) brain injury is one of the most commonly used and well-characterized experimental models of TBI. A Fluid Percussion Injury (FPI) device in the laboratory is used to replicate the injury …


Mobile Cloud Computing And Network Function Virtualization For 5g Systems, Ali Al-Shuwaili Jul 2017

Mobile Cloud Computing And Network Function Virtualization For 5g Systems, Ali Al-Shuwaili

Dissertations

The recent growth of the number of smart mobile devices and the emergence of complex multimedia mobile applications have brought new challenges to the design of wireless mobile networks. The envisioned Fifth-Generation (5G) systems are equipped with different technical solutions that can accommodate the increasing demands for high date rate, latency-limited, energy-efficient and reliable mobile communication networks.

Mobile Cloud Computing (MCC) is a key technology in 5G systems that enables the offloading of computationally heavy applications, such as for augmented or virtual reality, object recognition, or gaming from mobile devices to cloudlet or cloud servers, which are connected to wireless …


Undersampling Ga-Svm For Network Intrusion Detection, Zhenyu He May 2017

Undersampling Ga-Svm For Network Intrusion Detection, Zhenyu He

Theses

Network intrusion detection is one of the hottest issues in the world. An increasing number of researchers and engineers deal with this problem by using machine learning methods. However, how to improve the identification accuracy of all the attack classes remains unsolved since the dataset is an imbalanced one with high imbalance ratio. This thesis work intends to build a classifier to achieve high classification accuracy. It proposes an undersampling Genetic Algorithm-Support Vector Machine (GA-SVM) method to handle this problem. It applies an undersampling method in GA-SVM. To solve the multiclassification problem with a binary classifier, this work proposes to …


Field Oriented Control Of Permanent Magnet Synchronous Motor With Third-Harmonic Injection Pulse Width Modulation To Reduce Quadrotors’ Speed Ripples, Yuxi Shi May 2017

Field Oriented Control Of Permanent Magnet Synchronous Motor With Third-Harmonic Injection Pulse Width Modulation To Reduce Quadrotors’ Speed Ripples, Yuxi Shi

Theses

The world’s commercial unmanned aerial vehicle (UAV) industry has witnessed unprecedented boom in recent years. Delighted with an ample supply of this excellent high-tech product, global consumers are paying more attention on UAVs. Civilian UAVs now vastly outnumber military ones, with the estimate of over a million sold by 2016. An UAV has various degrees of autonomy as enabled by the use and precise control of motors. Traditional Direct Current (DC) motors are replaced by permanent magnet synchronous motors (PMSM) associated with the new power electronic inverters. Because of a PMSM’s higher power density than a DC motor, it reduces …


A Fuzzy Logic-Based Text Classification Method For Social Media, Keyuan Wu May 2017

A Fuzzy Logic-Based Text Classification Method For Social Media, Keyuan Wu

Theses

Social media offer abundant information for studying people’s behaviors, emotions and opinions during the evolution of various rare events such as natural disasters. It is useful to analyze the correlation between social media and human-affected events. This study uses Hurricane Sandy 2012 related Twitter text data to conduct information extraction and text classification. Considering that the original data contains different topics, we need to find the data related to Hurricane Sandy. A fuzzy logic-based approach is introduced to solve the problem of text classification. Inputs used in the proposed fuzzy logic-based model are multiple useful features extracted from each Twitter’s …


The Design And Optimization Of Cooperative Mobile Edge, Xueqing Huang Apr 2017

The Design And Optimization Of Cooperative Mobile Edge, Xueqing Huang

Dissertations

As the world is charging towards the Internet of Things (IoT) era, an enormous amount of sensors will be rapidly empowered with internet connectivity. Besides the fact that the end devices are getting more diverse, some of them are also becoming more powerful, such that they can function as standalone mobile computing units with multiple wireless network interfaces. At the network end, various facilities are also pushed to the mobile edge to foster internet connections. Distributed small scale cloud resources and green energy harvesters can be directly attached to the deployed heterogeneous base stations.

Different from the traditional wireless access …


Forensic Research On Detecting Seam Carving In Digital Images, Jingyu Ye Apr 2017

Forensic Research On Detecting Seam Carving In Digital Images, Jingyu Ye

Dissertations

Digital images have been playing an important role in our daily life for the last several decades. Naturally, image editing technologies have been tremendously developed due to the increasing demands. As a result, digital images can be easily manipulated on a personal computer or even a cellphone for many purposes nowadays, so that the authenticity of digital images becomes an important issue. In this dissertation research, four machine learning based forensic methods are presented to detect one of the popular image editing techniques, called ‘seam carving’.

To reveal seam carving applied to uncompressed images from the perspective of energy distribution …


Sparsity Based Methods For Target Localization In Multi-Sensor Radar, Haley H. Kim Jan 2017

Sparsity Based Methods For Target Localization In Multi-Sensor Radar, Haley H. Kim

Dissertations

In this dissertation, several sparsity-based methods for ground moving target indicator (GMTI) radar with multiple-input multiple-output (MIMO) random arrays are proposed. MIMO random arrays are large arrays that employ multiple transmitters and receivers, the positions of the transmitters and the receivers are randomly chosen. Since the resolution of the array depends on the size of the array, MIMO random arrays obtain a high resolution. However, since the positions of the sensors are randomly chosen, the array suffers from large sidelobes which may lead to an increased false alarm probability. The number of sensors of a MIMO random array required to …


Electrical Characterization Of High-K Gate Dielectrics For Advanced Cmos Gate Stacks, Yi Ming Ding Aug 2016

Electrical Characterization Of High-K Gate Dielectrics For Advanced Cmos Gate Stacks, Yi Ming Ding

Dissertations

The oxide/substrate interface quality and the dielectric quality of metal oxide semiconductor (MOS) gate stack structures are critical to future CMOS technology. As SiO2 was replaced by the high-k dielectric to further equivalent oxide thickness (EOT), high mobility substrates like Ge have attracted increasing in replacing Si substrate to further enhance devices performance. Precise control of the interface between high-k and the semiconductor substrate is the key of the high performance of future transistor. In this study, traditional electrical characterization methods are used on these novel MOS devices, prepared by advanced atomic layer deposition (ALD) process and with pre …


Vector Processor Virtualization: Distributed Memory Hierarchy And Simultaneous Multithreading, Seyedamin Rooholamin May 2016

Vector Processor Virtualization: Distributed Memory Hierarchy And Simultaneous Multithreading, Seyedamin Rooholamin

Dissertations

Taking advantage of DLP (Data-Level Parallelism) is indispensable in most data streaming and multimedia applications. Several architectures have been proposed to improve both the performance and energy consumption for such applications. Superscalar and VLIW (Very Long Instruction Word) processors, along with SIMD (Single-Instruction Multiple-Data) and vector processor (VP) accelerators, are among the available options for designers to accomplish their desired requirements. On the other hand, these choices turn out to be large resource and energy consumers, while also not being always used efficiently due to data dependencies among instructions and limited portion of vectorizable code in single applications that deploy …


Cloud-Aided Wireless Systems: Communications And Radar Applications, Shahrouz Khalili May 2016

Cloud-Aided Wireless Systems: Communications And Radar Applications, Shahrouz Khalili

Dissertations

This dissertation focuses on cloud-assisted radio technologies for communication, including mobile cloud computing and Cloud Radio Access Network (C-RAN), and for radar systems.

This dissertation first concentrates on cloud-aided communications. Mobile cloud computing, which allows mobile users to run computationally heavy applications on battery limited devices, such as cell phones, is considered initially. Mobile cloud computing enables the offloading of computation-intensive applications from a mobile device to a cloud processor via a wireless interface. The interplay between offloading decisions at the application layer and physical-layer parameters, which determine the energy and latency associated with the mobile-cloud communication, motivates the inter-layer …