Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Electrical and Computer Engineering (19)
- Computer Engineering (12)
- Computer and Systems Architecture (5)
- Computer Sciences (4)
- Physical Sciences and Mathematics (4)
-
- Digital Communications and Networking (3)
- Mechanical Engineering (3)
- Artificial Intelligence and Robotics (2)
- Biomedical Engineering and Bioengineering (2)
- Electrical and Electronics (2)
- Robotics (2)
- Bioimaging and Biomedical Optics (1)
- Bioinformatics (1)
- Biological Engineering (1)
- Controls and Control Theory (1)
- Data Storage Systems (1)
- Life Sciences (1)
- Nanoscience and Nanotechnology (1)
- Other Mechanical Engineering (1)
- Publication Year
- Publication
- Publication Type
Articles 1 - 30 of 33
Full-Text Articles in Engineering
Energy-Efficient Neuromorphic Architectures For Nuclear Radiation Detection Applications, Jorge I. Canales-Verdial, Jamison R. Wagner, Landon A. Schmucker, Mark Wetzel, Nathan J. Withers, Philippe Erol Proctor, Christof Teuscher, Multiple Additional Authors
Energy-Efficient Neuromorphic Architectures For Nuclear Radiation Detection Applications, Jorge I. Canales-Verdial, Jamison R. Wagner, Landon A. Schmucker, Mark Wetzel, Nathan J. Withers, Philippe Erol Proctor, Christof Teuscher, Multiple Additional Authors
Electrical and Computer Engineering Faculty Publications and Presentations
A comprehensive analysis and simulation of two memristor-based neuromorphic architectures for nuclear radiation detection is presented. Both scalable architectures retrofit a locally competitive algorithm to solve overcomplete sparse approximation problems by harnessing memristor crossbar execution of vector–matrix multiplications. The proposed systems demonstrate excellent accuracy and throughput while consuming minimal energy for radionuclide detection. To ensure that the simulation results of our proposed hardware are realistic, the memristor parameters are chosen from our own fabricated memristor devices. Based on these results, we conclude that memristor-based computing is the preeminent technology for a radiation detection platform.
Sequential Frame-Interpolation And Dct-Based Video Compression Framework, Yeganeh Jalalpour, Wu-Chi Feng, Feng Liu
Sequential Frame-Interpolation And Dct-Based Video Compression Framework, Yeganeh Jalalpour, Wu-Chi Feng, Feng Liu
Computer Science Faculty Publications and Presentations
Video data is ubiquitous; capturing, transferring, and storing even compressed video data is challenging because it requires substantial resources. With the large amount of video traffic being transmitted on the internet, any improvement in compressing such data, even small, can drastically impact resource consumption. In this paper, we present a hybrid video compression framework that unites the advantages of both DCT-based and interpolation-based video compression methods in a single framework. We show that our work can deliver the same visual quality or, in some cases, improve visual quality while reducing the bandwidth by 10--20%.
On The (Im)Practicality Of Adversarial Perturbation For Image Privacy, Arezoo Rajabi, Rakesh B. Bobba, Mike Rosulek, Charles Wright, Wu-Chi Feng
On The (Im)Practicality Of Adversarial Perturbation For Image Privacy, Arezoo Rajabi, Rakesh B. Bobba, Mike Rosulek, Charles Wright, Wu-Chi Feng
Computer Science Faculty Publications and Presentations
Image hosting platforms are a popular way to store and share images with family members and friends. However, such platforms typically have full access to images raising privacy concerns. These concerns are further exacerbated with the advent of Convolutional Neural Networks (CNNs) that can be trained on available images to automatically detect and recognize faces with high accuracy.
Recently, adversarial perturbations have been proposed as a potential defense against automated recognition and classification of images by CNNs. In this paper, we explore the practicality of adversarial perturbation based approaches as a privacy defense against automated face recognition. Specifically, we first …
Vessel Trajectory Prediction Using Historical Ais Data, Jagir Laxmichand Charla
Vessel Trajectory Prediction Using Historical Ais Data, Jagir Laxmichand Charla
Dissertations and Theses
Maritime vessel position coordinates are important information for maritime situational planning and organization. A better estimate of future locations of the maritime vessels, from their current locations, can help maritime authorities to make planned decisions, which can be helpful to avoid traffic congestion and longer waiting times. This thesis develops a method for estimating future locations of the vessels using their current and previous locations and other data.
The motivating scenario for this work is that of determining the future locations of the vessels based on their current location and previous locations for accurate modelling of underwater acoustic noise. As …
Extending The Functional Subnetwork Approach To A Generalized Linear Integrate-And-Fire Neuron Model, Nicholas Szczecinski, Roger Quinn, Alexander J. Hunt
Extending The Functional Subnetwork Approach To A Generalized Linear Integrate-And-Fire Neuron Model, Nicholas Szczecinski, Roger Quinn, Alexander J. Hunt
Mechanical and Materials Engineering Faculty Publications and Presentations
Engineering neural networks to perform specific tasks often represents a monumental challenge in determining network architecture and parameter values. In this work, we extend our previously-developed method for tuning networks of non-spiking neurons, the “Functional subnetwork approach” (FSA), to the tuning of networks composed of spiking neurons. This extension enables the direct assembly and tuning of networks of spiking neurons and synapses based on the network’s intended function, without the use of global optimization ormachine learning. To extend the FSA, we show that the dynamics of a generalized linear integrate and fire (GLIF) neuronmodel have fundamental similarities to those of …
Flight Simulator Modeling Using Recurrent Neural Networks, Nickolas Sabatini, Andreas Natsis
Flight Simulator Modeling Using Recurrent Neural Networks, Nickolas Sabatini, Andreas Natsis
Undergraduate Research & Mentoring Program
Recurrent neural networks (RNNs) are a form of machine learning used to predict future values. This project uses RNNs tor predict future values for a flight simulator. Coded in Python using the Keras library, the model demonstrates training loss and validation loss, referring to the error when training the model.
An Application Of Deep Learning Models To Automate Food Waste Classification, Alejandro Zachary Espinoza
An Application Of Deep Learning Models To Automate Food Waste Classification, Alejandro Zachary Espinoza
Dissertations and Theses
Food wastage is a problem that affects all demographics and regions of the world. Each year, approximately one-third of food produced for human consumption is thrown away. In an effort to track and reduce food waste in the commercial sector, some companies utilize third party devices which collect data to analyze individual contributions to the global problem. These devices track the type of food wasted (such as vegetables, fruit, boneless chicken, pasta) along with the weight. Some devices also allow the user to leave the food in a kitchen container while it is weighed, so the container weight must also …
Design Of A Canine Inspired Quadruped Robot As A Platform For Synthetic Neural Network Control, Cody Warren Scharzenberger
Design Of A Canine Inspired Quadruped Robot As A Platform For Synthetic Neural Network Control, Cody Warren Scharzenberger
Dissertations and Theses
Legged locomotion is a feat ubiquitous throughout the animal kingdom, but modern robots still fall far short of similar achievements. This paper presents the design of a canine-inspired quadruped robot named DoggyDeux as a platform for synthetic neural network (SNN) research that may be one avenue for robots to attain animal-like agility and adaptability. DoggyDeux features a fully 3D printed frame, 24 braided pneumatic actuators (BPAs) that drive four 3-DOF limbs in antagonistic extensor-flexor pairs, and an electrical system that allows it to respond to commands from a SNN comprised of central pattern generators (CPGs). Compared to the previous version …
Exploring And Expanding The One-Pixel Attack, Umairullah Khan, Walt Woods, Christof Teuscher
Exploring And Expanding The One-Pixel Attack, Umairullah Khan, Walt Woods, Christof Teuscher
Student Research Symposium
In machine learning research, adversarial examples are normal inputs to a classifier that have been specifically perturbed to cause the model to misclassify the input. These perturbations rarely affect the human readability of an input, even though the model’s output is drastically different. Recent work has demonstrated that image-classifying deep neural networks (DNNs) can be reliably fooled with the modification of a single pixel in the input image, without knowledge of a DNN’s internal parameters. This “one-pixel attack” utilizes an iterative evolutionary optimizer known as differential evolution (DE) to find the most effective pixel to perturb, via the evaluation of …
The Applications Of Grid Cells In Computer Vision, Keaton Kraiger
The Applications Of Grid Cells In Computer Vision, Keaton Kraiger
Undergraduate Research & Mentoring Program
In this study we present a novel method for position and scale invariant object representation based on a biologically-inspired framework. Grid cells are neurons in the entorhinal cortex whose multiple firing locations form a periodic triangular array, tiling the surface of an animal’s environment. We propose a model for simple object representation that maintains position and scale invariance, in which grid maps capture the fundamental structure and features of an object. The model provides a mechanism for identifying feature locations in a Cartesian plane and vectors between object features encoded by grid cells. It is shown that key object features …
Exploring And Expanding The One-Pixel Attack, Umairullah Khan, Walt Woods
Exploring And Expanding The One-Pixel Attack, Umairullah Khan, Walt Woods
Undergraduate Research & Mentoring Program
In machine learning research, adversarial examples are normal inputs to a classifier that have been specifically perturbed to cause the model to misclassify the input. These perturbations rarely affect the human readability of an input, even though the model’s output is drastically different. Recent work has demonstrated that image-classifying deep neural networks (DNNs) can be reliably fooled with the modification of a single pixel in the input image, without knowledge of a DNN’s internal parameters. This “one-pixel attack” utilizes an iterative evolutionary optimizer known as differential evolution (DE) to find the most effective pixel to perturb, via the evaluation of …
Emulating Balance Control Observed In Human Test Subjects With A Neural Network, Wade William Hilts
Emulating Balance Control Observed In Human Test Subjects With A Neural Network, Wade William Hilts
Dissertations and Theses
Human balance control is a complex feedback system that must be adaptable and robust in an infinitely varying external environment. It is probable that there are many concurrent control loops occurring in the central nervous system that achieve stability for a variety of postural perturbations. Though many engineering models of human balance control have been tested, no models of how these controllers might operate within the nervous system have yet been developed. We have focused on building a model of a proprioceptive feedback loop with simulated neurons. The proprioceptive referenced portion of human balance control has been successfully modeled by …
Combining Algorithms For More General Ai, Mark Robert Musil
Combining Algorithms For More General Ai, Mark Robert Musil
Undergraduate Research & Mentoring Program
Two decades since the first convolutional neural network was introduced the AI sub-domains of classification, regression and prediction still rely heavily on a few ML architectures despite their flaws of being hungry for data, time, and high-end hardware while still lacking generality. In order to achieve more general intelligence that can perform one-shot learning, create internal representations, and recognize subtle patterns it is necessary to look for new ML system frameworks. Research on the interface between neuroscience and computational statistics/machine learning has suggested that combined algorithms may increase AI robustness in the same way that separate brain regions specialize. In …
Radiation Source Localization By Using Backpropagation Neural Network, Jian Meng, Christof Teuscher, Walt Woods
Radiation Source Localization By Using Backpropagation Neural Network, Jian Meng, Christof Teuscher, Walt Woods
Student Research Symposium
The most difficult part of the radiation localization is that we cannot use the traditional acoustic localization method to determine where the radiation source is. It’s mainly because the electromagnetic waves are totally different with the sound wave. From the expression of the radioactive intensity, we can tell that the intensity of radiation not only depend on the distance from the radiation but also related to the type of the nuclide. In general, the relationship between the intensity and the distance satisfy the inverse-square law, which is a non-linear relationship. In other words, if we can use the measurement and …
Using Reservoir Computing To Build A Robust Interface With Dna Circuits In Determining Genetic Similarities Between Pathogens, Christopher Neighbor, Christof Teuscher
Using Reservoir Computing To Build A Robust Interface With Dna Circuits In Determining Genetic Similarities Between Pathogens, Christopher Neighbor, Christof Teuscher
Student Research Symposium
As computational power increases, the field of neural networks has advanced exponentially. In particular recurrent neural networks (RNNs) are being utilized to simulate dynamic systems and to learn to predict time series data. Reservoir computing is an architecture which has the potential to increase training speed while reducing computational costs. Reservoir computing consists of a RNN with a fixed connections “reservoir” while only the output layer is trained. The purpose of this research is to explore the effective use of reservoir computing networks with the eventual application towards use in a DNA based molecular computing reservoir for use in pathogen …
Early Emerging Pathogen Detection, Mackenzie Wangenstein
Early Emerging Pathogen Detection, Mackenzie Wangenstein
Undergraduate Research & Mentoring Program
A supervised learning technique was employed to identify emerging pathogen species. Portland State University has partnered with the University of New Mexico to take encodings of unknown pathogen molecular structures to determine emerging species.
Video Frame Interpolation Via Adaptive Separable Convolution, Simon Niklaus, Long Mai, Feng Liu
Video Frame Interpolation Via Adaptive Separable Convolution, Simon Niklaus, Long Mai, Feng Liu
Computer Science Faculty Publications and Presentations
Standard video frame interpolation methods first estimate optical flow between input frames and then synthesize an intermediate frame guided by motion. Recent approaches merge these two steps into a single convolution process by convolving input frames with spatially adaptive kernels that account for motion and re-sampling simultaneously. These methods require large kernels to handle large motion, which limits the number of pixels whose kernels can be estimated at once due to the large memory demand. To address this problem, this paper formulates frame interpolation as local separable convolution over input frames using pairs of 1D kernels. Compared to regular 2D …
Fast And Accurate Sparse Coding Of Visual Stimuli With A Simple, Ultra-Low-Energy Spiking Architecture, Walt Woods, Christof Teuscher
Fast And Accurate Sparse Coding Of Visual Stimuli With A Simple, Ultra-Low-Energy Spiking Architecture, Walt Woods, Christof Teuscher
Electrical and Computer Engineering Faculty Publications and Presentations
Memristive crossbars have become a popular means for realizing unsupervised and supervised learning techniques. Often, to preserve mathematical rigor, the crossbar itself is separated from the neuron capacitors. In this work, we sought to simplify the design, removing extraneous components to consume significantly lower power at a minimal cost of accuracy. This work provides derivations for the design of such a network, named the Simple Spiking Locally Competitive Algorithm, or SSLCA, as well as CMOS designs and results on the CIFAR and MNIST datasets. Compared to a non-spiking model which scored 33% on CIFAR-10 with a single-layer classifier, this hardware …
Architectures And Algorithms For Intrinsic Computation With Memristive Devices, Jens Bürger
Architectures And Algorithms For Intrinsic Computation With Memristive Devices, Jens Bürger
Dissertations and Theses
Neuromorphic engineering is the research field dedicated to the study and design of brain-inspired hardware and software tools. Recent advances in emerging nanoelectronics promote the implementation of synaptic connections based on memristive devices. Their non-volatile modifiable conductance was shown to exhibit the synaptic properties often used in connecting and training neural layers. With their nanoscale size and non-volatile memory property, they promise a next step in designing more area and energy efficient neuromorphic hardware.
My research deals with the challenges of harnessing memristive device properties that go beyond the behaviors utilized for synaptic weight storage. Based on devices that exhibit …
Memory And Information Processing In Recurrent Neural Networks, Alireza Goudarzi, Sarah Marzen, Peter Banda, Guy Feldman, Matthew R. Lakin, Christof Teuscher, Darko Stefanovic
Memory And Information Processing In Recurrent Neural Networks, Alireza Goudarzi, Sarah Marzen, Peter Banda, Guy Feldman, Matthew R. Lakin, Christof Teuscher, Darko Stefanovic
Electrical and Computer Engineering Faculty Publications and Presentations
Recurrent neural networks (RNN) are simple dynamical systems whose computational power has been attributed to their short-term memory. Short-term memory of RNNs has been previously studied analytically only for the case of orthogonal networks, and only under annealed approximation, and uncorrelated input. Here for the first time, we present an exact solution to the memory capacity and the task-solving performance as a function of the structure of a given network instance, enabling direct determination of the function-structure relation in RNNs. We calculate the memory capacity for arbitrary networks with exponentially correlated input and further related it to the performance of …
Information Representation And Computation Of Spike Trains In Reservoir Computing Systems With Spiking Neurons And Analog Neurons, Amin Almassian
Information Representation And Computation Of Spike Trains In Reservoir Computing Systems With Spiking Neurons And Analog Neurons, Amin Almassian
Dissertations and Theses
Real-time processing of space-and-time-variant signals is imperative for perception and real-world problem-solving. In the brain, spatio-temporal stimuli are converted into spike trains by sensory neurons and projected to the neurons in subcortical and cortical layers for further processing.
Reservoir Computing (RC) is a neural computation paradigm that is inspired by cortical Neural Networks (NN). It is promising for real-time, on-line computation of spatio-temporal signals. An RC system incorporates a Recurrent Neural Network (RNN) called reservoir, the state of which is changed by a trajectory of perturbations caused by a spatio-temporal input sequence. A trained, non- recurrent, linear readout-layer interprets the …
Sparse Adaptive Local Machine Learning Algorithms For Sensing And Analytics, Jack Cannon
Sparse Adaptive Local Machine Learning Algorithms For Sensing And Analytics, Jack Cannon
Undergraduate Research & Mentoring Program
The goal of digital image processing is to capture, transmit, and display images as efficiently as possible. Such tasks are computationally intensive because an image is digitally represented by large amounts of data. It is possible to render an image by reconstructing it with a subset of the most relevant data. One such procedure used to accomplish this task is commonly referred to as sparse coding. For our purpose, we use images of handwritten digits that are presented to an artificial neural network. The network implements Rozell's locally competitive algorithm (LCA) to generate a sparse code. This sparse code is …
A Brief Review Of Speaker Recognition Technology, Clark D. Shaver, John M. Acken
A Brief Review Of Speaker Recognition Technology, Clark D. Shaver, John M. Acken
Electrical and Computer Engineering Faculty Publications and Presentations
This paper reviews the development of speaker recognition systems from pre-computing days to current trends. Advances in various sciences which have allowed autonomous speaker recognition systems to become a practical means of identity authentication are also reviewed.
Modeling And Experimental Demonstration Of A Hopfield Network Analog-To-Digital Converter With Hybrid Cmos/Memristor Circuits, Xinjie Guo, Farnood Merrikh-Bayat, Ligang Gao, Brian D. Hoskins, Fabien Alibart, Bernabe Linares-Barranco, Luke Theogarajan, Christof Teuscher, Dmitri B. Strukov
Modeling And Experimental Demonstration Of A Hopfield Network Analog-To-Digital Converter With Hybrid Cmos/Memristor Circuits, Xinjie Guo, Farnood Merrikh-Bayat, Ligang Gao, Brian D. Hoskins, Fabien Alibart, Bernabe Linares-Barranco, Luke Theogarajan, Christof Teuscher, Dmitri B. Strukov
Electrical and Computer Engineering Faculty Publications and Presentations
The purpose of this work was to demonstrate the feasibility of building recurrent artificial neural networks with hybrid complementary metal oxide semiconductor (CMOS)/memristor circuits. To do so, we modeled a Hopfield network implementing an analog-to-digital converter (ADC) with up to 8 bits of precision. Major shortcomings affecting the ADC's precision, such as the non-ideal behavior of CMOS circuitry and the specific limitations of memristors, were investigated and an effective solution was proposed, capitalizing on the in-field programmability of memristors. The theoretical work was validated experimentally by demonstrating the successful operation of a 4-bit ADC circuit implemented with discrete Pt/TiO2− …
Computational Capacity And Energy Consumption Of Complex Resistive Switch Networks, Jens Bürger, Alireza Goudarzi, Darko Stefanovic, Christof Teuscher
Computational Capacity And Energy Consumption Of Complex Resistive Switch Networks, Jens Bürger, Alireza Goudarzi, Darko Stefanovic, Christof Teuscher
Electrical and Computer Engineering Faculty Publications and Presentations
Resistive switches are a class of emerging nanoelectronics devices that exhibit a wide variety of switching characteristics closely resembling behaviors of biological synapses. Assembled into random networks, such resistive switches produce emerging behaviors far more complex than that of individual devices. This was previously demonstrated in simulations that exploit information processing within these random networks to solve tasks that require nonlinear computation as well as memory. Physical assemblies of such networks manifest complex spatial structures and basic processing capabilities often related to biologically-inspired computing. We model and simulate random resistive switch networks and analyze their computational capacities. We provide a …
Computational Capabilities Of Leaky Integrate-And-Fire Neural Networks For Liquid State Machines, Amin Almassian, Christof Teuscher
Computational Capabilities Of Leaky Integrate-And-Fire Neural Networks For Liquid State Machines, Amin Almassian, Christof Teuscher
Student Research Symposium
We analyze the computational capability of Leaky Integrate-and-Fire (LIF) Neural Networks used as a reservoir (liquid) in the framework of Liquid State Machines (LSM). Maass et. al. investigated LIF neurons in LSM and their results showed that they are capable of noise-robust, parallel, and real-time computation. However, it still remains an open question how the network topology affects the computational capability of a reservoir. To address that question, we investigate the performance of the reservoir as a function of the average reservoir connectivity. We also show that the dynamics of the LIF reservoir is sensitive to changes in the average …
Blackfingers A Sophisticated Hand Prothesis, Michele Folgheraiter, Giuseppina Gini, Marek Perkowski, Mikhail Pivtoraiko
Blackfingers A Sophisticated Hand Prothesis, Michele Folgheraiter, Giuseppina Gini, Marek Perkowski, Mikhail Pivtoraiko
Electrical and Computer Engineering Faculty Publications and Presentations
Our goal is to develop the low level control system for an artificial hand ”Blackfingers”. Blackfingers was thought to have two main applications: as humanoid robot’s hand or as a human hand prothesis. In this last application our intent is to realize a device more sophisticated respect the actual commerce prothesis. Also in our intention is to use some biological paradigms to create a human like reflex control easy to be interfaced also with the human nervous system. In this paper we illustrate the properties and the morphology of a human like neural reflex controller, used to set the stiffness …
Le Bio Wall : Un Tissue Informatique Pour Le Prototypage De Systèmes Bio-Inspirés, Andre Stauffer, Daniel Mange, Gianluca Tempesti, Christof Teuscher
Le Bio Wall : Un Tissue Informatique Pour Le Prototypage De Systèmes Bio-Inspirés, Andre Stauffer, Daniel Mange, Gianluca Tempesti, Christof Teuscher
Electrical and Computer Engineering Faculty Publications and Presentations
Dans cet article, nous décrivons le BioWall, un tissu informatique reconfigurable géant développé dans le but d’y implémenter des machines mettant en oeuvre les principes de notre projet Embryonique. Bien que ses dimensions et ses caractéristiques en font d’abord un objet de démonstration publique, le BioWall constitue également un outil de recherche précieux, du fait que sa faculté de reprogrammation et sa structure cellulaire s’adaptent parfaitement à l’implémentation de toutes sortes de systèmes bioinspirés. Pour illustrer ces capacités, nous décrivons un ensemble d’applications qui reflètent différentes sources d’inspiration biologique allant des systèmes biologiques ontogénétiques aux dispositifs évolutifs phylogénétiques, en passant …
Training Strategies For Critic And Action Neural Networks In Dual Heuristic Programming Method, Christian Peter Paintz
Training Strategies For Critic And Action Neural Networks In Dual Heuristic Programming Method, Christian Peter Paintz
Dissertations and Theses
This thesis discusses strategies for and details of training procedures for the Dual Heuristic Programming (DHP) methodology. This and other approximate dynamic programming approaches (HDP, DHP, GDHP) have been discussed in some detail in the literature, all being members of the Adaptive Critic Design (ACD) family. The example applications used here are the inverted pendulum problem and a fully nonlinear constant velocity bicycle steering model. The inverted pendulum has been successfully controlled using DHP, as reported in the literature. This thesis suggests and investigates several alternative D HP training procedures and compares their performance with respect to convergence speed and …
Automatic Tuning Of Integrated Filters Using Neural Networks, Lutz Henning Lenz
Automatic Tuning Of Integrated Filters Using Neural Networks, Lutz Henning Lenz
Dissertations and Theses
Component values of integrated filters vary considerably due to· manufacturing tolerances and environmental changes. Thus it is of major importance that the components of an integrated filter be electronically tunable. The method explored in this thesis is the transconductance-C-method.
A method of realizing higher-order filters is to use a cascade structure of second-order filters. In this context, a method of tuning second-order filters becomes important.
The research objective of this thesis is to determine if the Neural Network methodology can be used to facilitate the filter tuning process for a second-order filter (realized via the transconductance-C-method). Since this thesis is, …