Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Engineering

A Portable, Low Power Radiation Detection And Identification System For High Count Rate, Long Term Monitoring, Samuel J. Murray Aug 2023

A Portable, Low Power Radiation Detection And Identification System For High Count Rate, Long Term Monitoring, Samuel J. Murray

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

This dissertation presents the design of a novel radiation detection and identification system that can operate continuously over a period of 8 days while detecting at 30,000 counts per second, consuming a total of 11 mW. The entire system is highly integrated, containing a gamma ray detector, a high voltage detector power supply, and a multichannel analyzer (MCA) system-on-a-chip (SoC), which are all combined into a compact form using a multi-level, configurable printed circuit board design. The MCA SoC, fabricated using a 65 nm CMOS technology, features two enabling resources to allow low power detections at high count rates for …


Security Of Hardware Accelerators In Multi-Tenant Fpga Environments, Shayan Moini Feb 2023

Security Of Hardware Accelerators In Multi-Tenant Fpga Environments, Shayan Moini

Doctoral Dissertations

Field-programmable gate arrays (FPGAs) play an important role in the acceleration of computationally expensive algorithms for machine learning, aerospace, and ASIC prototyping. The emergence of FPGAs in the cloud (cloud FPGAs) has accelerated FPGA adoption in various applications due to their low initial cost and the ability to quickly prototype a design. Multi-tenancy, in which multiple users execute circuitry in the same FPGAs simultaneously with logical isolation, reduces cloud FPGA usage cost and increases FPGA utilization. Multi-tenancy introduces new security challenges, such as remote side-channel and fault injection attacks, that cannot be addressed with traditional countermeasures against attacks. In this …