Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of South Carolina (4)
- California Polytechnic State University, San Luis Obispo (3)
- Murray State University (3)
- The University of Akron (3)
- Air Force Institute of Technology (2)
-
- Chapman University (2)
- Southern Methodist University (2)
- University of Arkansas, Fayetteville (2)
- University of Kentucky (2)
- University of Nebraska - Lincoln (2)
- University of Tennessee, Knoxville (2)
- Coastal Carolina University (1)
- DePaul University (1)
- Embry-Riddle Aeronautical University (1)
- Grand Valley State University (1)
- Kennesaw State University (1)
- Louisiana State University (1)
- Michigan Technological University (1)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (1)
- Minnesota State University Moorhead (1)
- University of Louisville (1)
- University of New Mexico (1)
- Virginia Commonwealth University (1)
- West Virginia University (1)
- Keyword
-
- Hardware Security (3)
- Application (2)
- Computer Engineering (2)
- FPGA (2)
- Industry 4.0 (2)
-
- Internet of Things (2)
- IoT (2)
- Offline Inference (2)
- Resource-Constrained Devices (2)
- 3D printing (1)
- AGV (1)
- Adiabatic Logic (1)
- Architecture (1)
- Artificial Intelligence, Embedded System, Internet of Things (1)
- Artificial Intelligence, Industry 4.0, Smart Manufacturing (1)
- Artificial Intelligence, Internet of Things, Embedded System (1)
- Artificial Intelligence, Internet of Things, Embedded System, Industry 4.0 (1)
- Artificial satellites (1)
- Asynchronous design (1)
- Attacker Model Ontology (1)
- Attacker Modeling (1)
- Automation (1)
- Autonomous Control (1)
- Big Data (1)
- Ble (1)
- Bluetooth low-energy (1)
- CFS (1)
- CPA (1)
- Cloud computing (1)
- Communication standards (1)
- Publication
-
- Publications (5)
- Theses and Dissertations (3)
- Williams Honors College, Honors Research Projects (3)
- Computer Science and Engineering Theses and Dissertations (2)
- Engineering Faculty Articles and Research (2)
-
- Master's Theses (2)
- Masters Theses (2)
- Theses and Dissertations--Electrical and Computer Engineering (2)
- Bulletin of TUIT: Management and Communication Technologies (1)
- CDM Annual Reports (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
- Department of Food Science and Technology: Faculty Publications (1)
- Dissertations, Master's Theses and Master's Reports (1)
- Doctoral Dissertations (1)
- Electrical and Computer Engineering ETDs (1)
- Electronic Theses and Dissertations (1)
- Graduate Theses and Dissertations (1)
- Graduate Theses, Dissertations, and Problem Reports (1)
- Honors College Theses (1)
- Honors Theses (1)
- Industrial and Manufacturing Engineering (1)
- KSU Proceedings on Cybersecurity Education, Research and Practice (1)
- LSU Master's Theses (1)
- Library Philosophy and Practice (e-journal) (1)
- Posters-at-the-Capitol (1)
- Scholars Week (1)
- Student Academic Conference (1)
- Publication Type
- File Type
Articles 1 - 30 of 40
Full-Text Articles in Engineering
Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao
Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao
Posters-at-the-Capitol
Gaze tracking has become an established technology that enables using an individual’s gaze as an input signal to support a variety of applications in the context of Human-Computer Interaction. Gaze tracking primarily relies on sensing devices such as infrared (IR) cameras. Nevertheless, in the recent years, several attempts have been realized at detecting gaze by acquiring and processing images acquired from standard RGB cameras. Nowadays, there are only a few publicly available open-source libraries and they have not been tested extensively. In this paper, we present the result of a comparative analysis that studied a commercial eye-tracking device using IR …
Enhanced Security Utilizing Side Channel Data Analysis, Michael Taylor
Enhanced Security Utilizing Side Channel Data Analysis, Michael Taylor
Computer Science and Engineering Theses and Dissertations
The physical state of a system is affected by the activities and processes in which it is tasked with carrying out. In the past there have been many instances where such physical changes have been exploited by bad actors in order to gain insight into the operational state and even the data being held on a system. This method of side channel exploitation is very often effective due to the relative difficulty of obfuscating activity on a physical level. However, in order to take advantage of side channel data streams one must have a detailed working knowledge of how a …
Autonomous Control And Signal Acquisition System, Rion Cadell Krampe
Autonomous Control And Signal Acquisition System, Rion Cadell Krampe
Honors College Theses
Our goal is to continue a previous teams project to build a NDE autonomous control and signal acquisition system that is more precise, more customizable with both code and mechanical parts, and cheaper than a similar system bought by the school. This goal has two stages to it. First, to repair the system from considerable damage it received during transportation. Secondly, to continue designing and developing the system to make considerable progress towards the goal of a fully functional NDE system. Along with making progress we must consider the team after us and create an easy stepping off point for …
Design, Development, And Testing Of Embedded Computing On Afit's Control & Autonomy Space Proximity Robot (Caspr), Collin A. Gwaltney
Design, Development, And Testing Of Embedded Computing On Afit's Control & Autonomy Space Proximity Robot (Caspr), Collin A. Gwaltney
Theses and Dissertations
This thesis reviews RPO algorithm testbeds and discusses the development of the Control and Autonomy Space proximity Robot (CASpR) kinematic testbed housed at the Air Force Institute of Technology (AFIT). CASpR operates on a rail system to propagate the trajectories of two satellites using the Hill-Clohessy-Wiltshire (HCW) Equations of Motion (EOMs). In this study, the implementation of a Jetson TX2i as an onboard flight computer is discussed and accomplished. Each hardware component used in the process of adding embedded computing as well as the software and paths of communication are all discussed in detail. Tests are conducted to assess the …
Autonomous Control And Signal Acquisition System, Rion Krampe
Autonomous Control And Signal Acquisition System, Rion Krampe
Scholars Week
Dr. Bunget has an autonomous control and signal acquisition system that he wants to be repaired and improved upon. This requires that we identify the current issues with the system and repair them as well as make innovations to the system to meet customer needs. The position control needs to be autonomous, and the acquisition of the oscilloscope signal and the transducer position needs to be synchronous. The user should be able to control the position, speed, and how often the signals are captured. The waveform of the scan should be appended into a spreadsheet. The system code also needs …
Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne
Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne
KSU Proceedings on Cybersecurity Education, Research and Practice
Everyone knows what package shipping is, but not everyone knows what warshipping is. Corporate mailrooms are rarely considered as part of the cybersecurity attack surface of most organizations, but they offer physical access to millions of uninspected packages daily. UPS shipped 5.5 billion items last year, with their daily average being 21.9 million items and operating through 1,800 locations in 2020. FedEx shipped 6.5 million packages daily and operates 2,150 locations. The United States Postal Service delivered 143 billion pieces of mail in 2019. Increasingly the world’s consumers are relying on e-commerce, and during the recent COVID-19 pandemic, package deliveries …
Using A Light-Based Power Source To Defeat Power Analysis Attacks, Remus Valentin Tumac
Using A Light-Based Power Source To Defeat Power Analysis Attacks, Remus Valentin Tumac
Computer Science and Engineering Theses and Dissertations
Power analysis attacks exploit the correlation between the information processed by an electronic system and the power consumption of the system. By powering an electronic system with an optical power source, we can prevent meaningful information from being leaked to the power pins and captured in power traces. The relatively constant current draw of the optical power source hides any variability in the power consumption of the target system caused by the logic gates' switching activity of the system as observed at the power pins. This thesis will provide evidence to show that using an optical power source should make …
Physically Unclonable Characteristics For Verification Of Transmon-Based Quantum Computers, Leleia A. Hsia
Physically Unclonable Characteristics For Verification Of Transmon-Based Quantum Computers, Leleia A. Hsia
Theses and Dissertations
Future national security can be strengthened by verifying and securing the quantum computing supply chain. This dissertation proposes physically unclonable characteristics (PUCs), a method of quantum hardware verification inspired by classical physically unclonable functions, for future application to quantum processors implemented with transmon qubits. Qualitative and quantitative analysis is provided on the development of PUCs, including identifying qubit characteristics and qubit discrimination methods suitable for PUCs. Characteristics tested on IBM Quantum services include T1 and T2 coherence times, single-qubit and multi-qubit gate error rates, readout error rates, quantum process tomography metrics, and random benchmarking metrics. Results show that non-parametric qubit …
Toward Reliable And Efficient Message Passing Software For Hpc Systems: Fault Tolerance And Vector Extension, Dong Zhong
Toward Reliable And Efficient Message Passing Software For Hpc Systems: Fault Tolerance And Vector Extension, Dong Zhong
Doctoral Dissertations
As the scale of High-performance Computing (HPC) systems continues to grow, researchers are devoted themselves to achieve the best performance of running long computing jobs on these systems. My research focus on reliability and efficiency study for HPC software.
First, as systems become larger, mean-time-to-failure (MTTF) of these HPC systems is negatively impacted and tends to decrease. Handling system failures becomes a prime challenge. My research aims to present a general design and implementation of an efficient runtime-level failure detection and propagation strategy targeting large-scale, dynamic systems that is able to detect both node and process failures. Using multiple overlapping …
Signal Fingerprinting And Machine Learning Framework For Uav Detection And Identification., Olusiji Oloruntobi Medaiyese
Signal Fingerprinting And Machine Learning Framework For Uav Detection And Identification., Olusiji Oloruntobi Medaiyese
Electronic Theses and Dissertations
Advancement in technology has led to creative and innovative inventions. One such invention includes unmanned aerial vehicles (UAVs). UAVs (also known as drones) are now an intrinsic part of our society because their application is becoming ubiquitous in every industry ranging from transportation and logistics to environmental monitoring among others. With the numerous benign applications of UAVs, their emergence has added a new dimension to privacy and security issues. There are little or no strict regulations on the people that can purchase or own a UAV. For this reason, nefarious actors can take advantage of these aircraft to intrude into …
Hardware Acceleration In Image Stitching: Gpu Vs Fpga, Joshua David Edgcombe
Hardware Acceleration In Image Stitching: Gpu Vs Fpga, Joshua David Edgcombe
Masters Theses
Image stitching is a process where two or more images with an overlapping field of view are combined. This process is commonly used to increase the field of view or image quality of a system. While this process is not particularly difficult for modern personal computers, hardware acceleration is often required to achieve real-time performance in low-power image stitching solutions. In this thesis, two separate hardware accelerated image stitching solutions are developed and compared. One solution is accelerated using a Xilinx Zynq UltraScale+ ZU3EG FPGA and the other solution is accelerated using an Nvidia RTX 2070 Super GPU. The image …
A Method For Monitoring Operating Equipment Effectiveness With The Internet Of Things And Big Data, Carl D. Hays Iii
A Method For Monitoring Operating Equipment Effectiveness With The Internet Of Things And Big Data, Carl D. Hays Iii
Master's Theses
The purpose of this paper was to use the Overall Equipment Effectiveness productivity formula in plant manufacturing and convert it to measuring productivity for forklifts. Productivity for a forklift was defined as being available and picking up and moving containers at port locations in Seattle and Alaska. This research uses performance measures in plant manufacturing and applies them to mobile equipment in order to establish the most effective means of analyzing reliability and productivity. Using the Internet of Things to collect data on fifteen forklift trucks in three different locations, this data was then analyzed over a six-month period to …
Online Laboratory Course Using Low Tech Supplies To Introduce Digital Logic Design Concepts, Dhanya Nair
Online Laboratory Course Using Low Tech Supplies To Introduce Digital Logic Design Concepts, Dhanya Nair
Engineering Faculty Articles and Research
This paper describes a Digital Logic Design Laboratory Course developed to engage students with hardware systems within an online setting. This is a junior level core course for students from Computer Science (CS), Computer Engineering (CE) and Electrical Engineering (EE). Hence, the laboratories are designed to provide the hands-on experience of breadboarding, testing and debugging essential to CE and EE while accommodating CS students with no prior hardware experience. Commercially available low-cost electronic trainers (portable workstations) are loaned to the students in addition to basic electronic components. To ensure a strong foundation in debugging, prior to utilizing these workstations, students …
Inventory Locating With Quuppa: The Design And Development Of A Real-Time Process Monitoring Web Application Solution, Dylan C. Moreland, Trevor J. Howell, John W. Takiff, Patrick S. Dillon, Theo E. Fritz, William K. Mcintyre
Inventory Locating With Quuppa: The Design And Development Of A Real-Time Process Monitoring Web Application Solution, Dylan C. Moreland, Trevor J. Howell, John W. Takiff, Patrick S. Dillon, Theo E. Fritz, William K. Mcintyre
Industrial and Manufacturing Engineering
Viasat, Inc. requires precise inventory tracking at their production facility in San Diego, CA. Viasat has installed the Quuppa indoor real-time locating system (RTLS), which it uses to track the real-time position of high-value work-in-process items. In its current state, the system only displays in-the-moment location information, with no available functionality for storing historical data for review, analysis, or visualization. In addition, the data displayed is noisy and prone to significant random error. This paper provides an overview of RTLS methods and technologies, assesses alternative solutions to Viasat’s issue, demonstrates our RTLS integrated web app solution, analyzes its impact, and …
Bibliometric Review On Iot Based System For Remote Downloading On Microcontroller, Arundhati Bandopadhyaya Ms., Diya Dodwad Ms., Diviyanshi Gupta Ms., Surya Koyyana Mr., Parag Narkhede Mr., Shripad Deshpande Mr.
Bibliometric Review On Iot Based System For Remote Downloading On Microcontroller, Arundhati Bandopadhyaya Ms., Diya Dodwad Ms., Diviyanshi Gupta Ms., Surya Koyyana Mr., Parag Narkhede Mr., Shripad Deshpande Mr.
Library Philosophy and Practice (e-journal)
Working with sensors has become an area of expertise within the domain of electronic engineering. On a day to day basis, thousands of sensors are put to use around us, for instance, in smoke alarms, speedometers, motors, computers, radiators etc. to accumulate sensor data, cables that connect the sensors to the bottom station after which the information is worked on. But cabling is often expensive especially when handling large scale industrial applications [5]. For an equivalent reason, low-cost wireless networks came into the picture recently and are in high demand. A research paper we found during our review of …
A Power System-Based Iot Network For Remote Sensing Applications, Dominic Gaiero
A Power System-Based Iot Network For Remote Sensing Applications, Dominic Gaiero
Master's Theses
Cities around the world are facing increasingly significant challenges, including rapid urbanization, resource management, and environmental threats. In California for example, wildfires present an ever-growing threat that gravely harms people, destroys communities, and causes billions of dollars in damages. The task of addressing these environmental threats and many other challenges is greatly aided with widespread data collection and real-time inference. However, as IoT networks scale and require more energy for near-data analytics, the IoT endpoints require more power and complexity, limiting their deployment. Additionally, deploying endpoints in remote locations creates further challenges with higher reliability and communication constraints. In this …
A Secure Architecture For Defense Against Return Address Corruption, Grayson J. Bruner
A Secure Architecture For Defense Against Return Address Corruption, Grayson J. Bruner
Masters Theses
The advent of the Internet of Things has brought about a staggering level of inter-connectivity between common devices used every day. Unfortunately, security is not a high priority for developers designing these IoT devices. Often times the trade-off of security comes at too high of a cost in other areas, such as performance or power consumption. This is especially prevalent in resource-constrained devices, which make up a large number of IoT devices. However, a lack of security could lead to a cascade of security breaches rippling through connected devices. One of the most common attacks used by hackers is return …
Non-Volatile Memory Adaptation In Asynchronous Microcontroller For Low Leakage Power And Fast Turn-On Time, Jean Pierre Thierry Habimana
Non-Volatile Memory Adaptation In Asynchronous Microcontroller For Low Leakage Power And Fast Turn-On Time, Jean Pierre Thierry Habimana
Graduate Theses and Dissertations
This dissertation presents an MSP430 microcontroller implementation using Multi-Threshold NULL Convention Logic (MTNCL) methodology combined with an asynchronous non-volatile magnetic random-access-memory (RAM) to achieve low leakage power and fast turn-on. This asynchronous non-volatile RAM is designed with a Spin-Transfer Torque (STT) memory device model and CMOS transistors in a 65 nm technology. A self-timed Quasi-Delay-Insensitive 1 KB STT RAM is designed with an MTNCL interface and handshaking protocol. A replica methodology is implemented to handle write operation completion detection for long state-switching delays of the STT memory device. The MTNCL MSP430 core is integrated with the STT RAM to create …
Demo Abstract: Porting And Execution Of Anomalies Detection Models On Embedded Systems In Iot, Bharath Sudharsan, Pankesh Patel, Abdul Wahid, Muhammad Yahya, John G. Breslin, Muhammad Intizar Ali
Demo Abstract: Porting And Execution Of Anomalies Detection Models On Embedded Systems In Iot, Bharath Sudharsan, Pankesh Patel, Abdul Wahid, Muhammad Yahya, John G. Breslin, Muhammad Intizar Ali
Publications
In the Industry 4.0 era, Microcontrollers (MCUs) based tiny embedded sensor systems have become the sensing paradigm to interact with the physical world. In 2020, 25.6 billion MCUs were shipped, and over 250 billion MCUs are already operating in the wild. Such low-power, low-cost MCUs are being used as the brain to control diverse applications and soon will become the global digital nervous system. In an Industrial IoT setup, such tiny MCU-based embedded systems are equipped with anomaly detection models and mounted on production plant machines for monitoring the machine’s health/condition. These models process the machine’s health data (from temperature, …
Malicious Hardware & Its Effects On Industry, Gustavo Perez
Malicious Hardware & Its Effects On Industry, Gustavo Perez
Computer Science and Computer Engineering Undergraduate Honors Theses
In recent years advancements have been made in computer hardware security to circumnavigate the threat of malicious hardware. Threats come in several forms during the development and overall life cycle of computer hardware and I aim to highlight those key points. I will illustrate the various ways in which attackers exploit flaws in a chip design, or how malicious parties take advantage of the many steps required to design and fabricate hardware. Due to these exploits, the industry and consumers have suffered damages in the form of financial loss, physical harm, breaches of personal data, and a multitude of other …
Student Academic Conference, Caitlin Brooks
Student Academic Conference, Caitlin Brooks
Student Academic Conference
No abstract provided.
Cognitive Digital Twins For Smart Manufacturing, Muhammad Intizar Ali, Pankesh Patel, John G. Breslin, Ramy Harik, Amit Sheth
Cognitive Digital Twins For Smart Manufacturing, Muhammad Intizar Ali, Pankesh Patel, John G. Breslin, Ramy Harik, Amit Sheth
Publications
Smart manufacturing or Industry 4.0, a trend initiated a decade ago, aims to revolutionize traditional manufacturing using technology-driven approaches. Modern digital technologies such as the Industrial Internet of Things (IIoT), Big Data Analytics, Augmented/Virtual Reality, and Artificial Intelligence (AI) are the key enablers of new smart manufacturing approaches. The digital twin is an emerging concept whereby a digital replica can be built of any physical object. Digital twins are becoming mainstream; many organizations have started to rely on digital twins to monitor, analyze, and simulate physical assets and processes. The current use of digital twins for smart manufacturing is largely …
Side Channel Attack Counter Measure Using A Moving Target Architecture, Jithin Joseph
Side Channel Attack Counter Measure Using A Moving Target Architecture, Jithin Joseph
Electrical and Computer Engineering ETDs
A novel countermeasure to side-channel power analysis attacks called Side-channel Power analysis Resistance for Encryption Algorithms using DPR or SPREAD is investigated in this thesis. The countermeasure leverages a strategy that is best characterized as a moving target architecture. Modern field programmable gate arrays (FPGA) architectures provide support for dynamic partial reconfiguration (DPR), a feature that allows real-time reconfiguration of the programmable logic (PL). The moving target architecture proposed in this work leverages DPR to implement a power analysis countermeasure to side-channel attacks, the most common of which are referred to as differential power analysis (DPA) and correlation power analysis …
Machine Learning Meets Internet Of Things: From Theory To Practice, Bharath Sudharsan, Pankesh Patel
Machine Learning Meets Internet Of Things: From Theory To Practice, Bharath Sudharsan, Pankesh Patel
Publications
Standalone execution of problem-solving Artificial Intelligence (AI) on IoT devices produces a higher level of autonomy and privacy. This is because the sensitive user data collected by the devices need not be transmitted to the cloud for inference. The chipsets used to design IoT devices are resource-constrained due to their limited memory footprint, fewer computation cores, and low clock speeds. These limitations constrain one from deploying and executing complex problem-solving AI (usually an ML model) on IoT devices. Since there is a high potential for building intelligent IoT devices, in this tutorial, we teach researchers and developers; (i) How to …
Modern Methods Of Testing And Information Security Problems In Iot, Halim Khujamatov, Ernazar Reypnazarov, Amir Lazarev
Modern Methods Of Testing And Information Security Problems In Iot, Halim Khujamatov, Ernazar Reypnazarov, Amir Lazarev
Bulletin of TUIT: Management and Communication Technologies
This article analyzes the technology of the internet of things, ie its architecture, communication standards, threats to security and safety, methods and types of testing devices of the internet of things. In short, the architectures proposed by ITU-T and IWF, IEEE standards for Internet of Things, LPWAN standards, four levels of security (devices/gateways, network/transport, services and applications), components according to test methods, performance, loading, security, etc.
Ez-Translate, Mason D. Beattie
Ez-Translate, Mason D. Beattie
Honors Theses
This report describes the EZ-Translate Software that was designed and developed by Mason Beattie for the CSCI495-D1 Honors Capstone Project and Course at Coastal Carolina University. This project is built from Java and is designed for the Windows 10 operating system. While running it displays or hides a translation menu when the designated key binds are pressed. Translations supported include select phrases from English, German, and Russian. The application also provides localization support for these three languages. The overall goal of this project to provide translation services while within another application was successfully achieved. The application utilizes an open-source Java …
Low-Cost Hardware-In-The-Loop (Hil) Simulator For Simulation And Analysis Of Embedded Systems With Non-Real-Time Applications, Chanuka S. Elvitigala
Low-Cost Hardware-In-The-Loop (Hil) Simulator For Simulation And Analysis Of Embedded Systems With Non-Real-Time Applications, Chanuka S. Elvitigala
LSU Master's Theses
Hardware-In-the-Loop (HIL) simulation is an approach that is used for embedded systems testing which was popular in the early days of embedded systems. This technology was wrapped and was stored away for a long time. One of the main reasons is that the less use of embedded systems in society. Recent developments in embedded systems, data science, and control systems lead to a focus on testing these systems. The earliest method of testing these systems was by doing destructive testing which is a waste of money, resources, and time. The HIL provided a safe and economical way of testing the …
On-Device Deep Learning Inference For System-On-Chip (Soc) Architectures, Tom Springer, Elia Eiroa-Lledo, Elizabeth Stevens, Erik Linstead
On-Device Deep Learning Inference For System-On-Chip (Soc) Architectures, Tom Springer, Elia Eiroa-Lledo, Elizabeth Stevens, Erik Linstead
Engineering Faculty Articles and Research
As machine learning becomes ubiquitous, the need to deploy models on real-time, embedded systems will become increasingly critical. This is especially true for deep learning solutions, whose large models pose interesting challenges for target architectures at the “edge” that are resource-constrained. The realization of machine learning, and deep learning, is being driven by the availability of specialized hardware, such as system-on-chip solutions, which provide some alleviation of constraints. Equally important, however, are the operating systems that run on this hardware, and specifically the ability to leverage commercial real-time operating systems which, unlike general purpose operating systems such as Linux, can …
3d Printing Of Human Microbiome Constituents To Understand Spatial Relationships And Shape Parameters In Bacteriology, Jacques Izard, Teklu Kuru Gerbaba, Shara R. P. Yumul
3d Printing Of Human Microbiome Constituents To Understand Spatial Relationships And Shape Parameters In Bacteriology, Jacques Izard, Teklu Kuru Gerbaba, Shara R. P. Yumul
Department of Food Science and Technology: Faculty Publications
Effective laboratory and classroom demonstration of microbiome size and shape, diversity, and ecological relationships is hampered by a lack of high-resolution, easy-to-use, readily accessible physical or digital models for use in teaching. Three-dimensional (3D) representations are, overall, more effective in communicating visuospatial information, allowing for a better understanding of concepts not directly observable with the unaided eye. Published morphology descriptions and microscopy images were used as the basis for designing 3D digital models, scaled at 20,000×, using computer-aided design software (CAD) and generating printed models of bacteria on mass-market 3D printers. Sixteen models are presented, including rod-shaped, spiral, flask-like, vibroid, …
Reduced Multiplicative Complexity Discrete Cosine Transform (Dct) Circuitry, Sirani Kanchana Mututhanthrige Perera
Reduced Multiplicative Complexity Discrete Cosine Transform (Dct) Circuitry, Sirani Kanchana Mututhanthrige Perera
Publications
System and techniques for reduced multiplicative complexity discrete cosine transform (DCT) circuitry are described herein. An input data set can be received and, upon the input data set, a self-recursive DCT technique can be performed to produce a transformed data set. Here, the self-recursive DCT technique is based on a product of factors of a specified type of DCT technique. Recursive components of the technique are of the same DCT type as that of the DCT technique. The transformed data set can then be produced to a data consumer.