Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Engineering

Mixed-Criticality System Design For Real-Time Scheduling And Routing Upon Platforms With Uncertainties, Sudharsan Vaidhun Bhaskar Jan 2022

Mixed-Criticality System Design For Real-Time Scheduling And Routing Upon Platforms With Uncertainties, Sudharsan Vaidhun Bhaskar

Electronic Theses and Dissertations, 2020-

Unlike typical computing systems, applications in real-time systems require strict timing guarantees. In the pursuit of providing guarantees, the complex dynamic behaviors of these systems are simplified using models to keep the analysis tractable. In order to guarantee safety, such models often involve pessimistic assumptions. While the amount of pessimism was reasonable for simple computing platforms, for modern platforms the pessimism involves ignoring features that improve performance such as cache usage, instruction pipelines, and more. In this work, we explore routing and scheduling problems in real-time systems, where the uncertainties in the operation are carefully accounted for by complex models …


Examining Cooperative System Responses Against Grid Integrity Attacks, Alexander D. Parady Jan 2022

Examining Cooperative System Responses Against Grid Integrity Attacks, Alexander D. Parady

Honors Undergraduate Theses

Smart grid technologies are integral to society’s transition to sustainable energy sources, but they do not come without a cost. As the energy sector shifts away from a century’s reliance on fossil fuels and centralized generation, technology that actively monitors and controls every aspect of the power infrastructure has been widely adopted, resulting in a plethora of new vulnerabilities that have already wreaked havoc on critical infrastructure. Integrity attacks that feedback false data through industrial control systems, which result in possible catastrophic overcorrections and ensuing failures, have plagued grid infrastructure over the past several years. This threat is now at …


Biomimetic Design, Modeling, And Adaptive Control Of Robotic Gripper For Optimal Grasping, Mushtaq Al-Mohammed Jan 2022

Biomimetic Design, Modeling, And Adaptive Control Of Robotic Gripper For Optimal Grasping, Mushtaq Al-Mohammed

Electronic Theses and Dissertations, 2020-

Grasping is an essential skill for almost every assistive robot. Variations in shape and/or weight of different objects involved in Activities of Daily Living (ADL) lead to complications, especially, when the robot is trying to grip novel objects for which it has no prior information –too much force will deform or crush the object while too little force will lead to slipping and possibly dropped objects. Thus, successful grasping requires the gripper to immobilize an object with the minimal force. In Chapter 2, we present the design, analysis, and experimental implementation of an adaptive control to facilitate 1-click grasping of …


Energy And Area Efficient Machine Learning Architectures Using Spin-Based Neurons, Hossein Pourmeidani Jan 2022

Energy And Area Efficient Machine Learning Architectures Using Spin-Based Neurons, Hossein Pourmeidani

Electronic Theses and Dissertations, 2020-

Recently, spintronic devices with low energy barrier nanomagnets such as spin orbit torque-Magnetic Tunnel Junctions (SOT-MTJs) and embedded magnetoresistive random access memory (MRAM) devices are being leveraged as a natural building block to provide probabilistic sigmoidal activation functions for RBMs. In this dissertation research, we use the Probabilistic Inference Network Simulator (PIN-Sim) to realize a circuit-level implementation of deep belief networks (DBNs) using memristive crossbars as weighted connections and embedded MRAM-based neurons as activation functions. Herein, a probabilistic interpolation recoder (PIR) circuit is developed for DBNs with probabilistic spin logic (p-bit)-based neurons to interpolate the probabilistic output of the neurons …


Big Data Processing Attribute Based Access Control Security, Anne Tall Jan 2022

Big Data Processing Attribute Based Access Control Security, Anne Tall

Electronic Theses and Dissertations, 2020-

The purpose of this research is to analyze the security of next-generation big data processing (BDP) and examine the feasibility of applying advanced security features to meet the needs of modern multi-tenant, multi-level data analysis. The research methodology was to survey of the status of security mechanisms in BDP systems and identify areas that require further improvement. Access control (AC) security services were identified as priority area, specifically Attribute Based Access Control (ABAC). The exemplar BDP system analyzed is the Apache Hadoop ecosystem. We created data generation software, analysis programs, and posted the detailed the experiment configuration on GitHub. Overall, …