Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 199

Full-Text Articles in Engineering

A Unique Method Of Using Information Entropy To Evaluate The Reliability Of Deep Neural Network Predictions On Intracranial Electroencephalogram, Elakkat Dharmaraj Gireesh Aug 2023

A Unique Method Of Using Information Entropy To Evaluate The Reliability Of Deep Neural Network Predictions On Intracranial Electroencephalogram, Elakkat Dharmaraj Gireesh

Electronic Theses and Dissertations, 2020-

Deep Neural networks (DNN) are fundamentally information processing machines, which synthesize the complex patterns in input to arrive at solutions, with applications in various fields. One major question when working with the DNN is, which features in the input lead to a specific decision by DNN. One of the common methods of addressing this question involve generation of heatmaps. Another pertinent question is how effectively DNN has captured the entire information presented in the input, which can potentially be addressed with complexity measures of the inputs. In the case of patients with intractable epilepsy, appropriate clinical decision making depends on …


Leveraging Signal Transfer Characteristics And Parasitics Of Spintronic Circuits For Area And Energy-Optimized Hybrid Digital And Analog Arithmetic, Adrian Tatulian Jan 2023

Leveraging Signal Transfer Characteristics And Parasitics Of Spintronic Circuits For Area And Energy-Optimized Hybrid Digital And Analog Arithmetic, Adrian Tatulian

Electronic Theses and Dissertations, 2020-

While Internet of Things (IoT) sensors offer numerous benefits in diverse applications, they are limited by stringent constraints in energy, processing area and memory. These constraints are especially challenging within applications such as Compressive Sensing (CS) and Machine Learning (ML) via Deep Neural Networks (DNNs), which require dot product computations on large data sets. A solution to these challenges has been offered by the development of crossbar array architectures, enabled by recent advances in spintronic devices such as Magnetic Tunnel Junctions (MTJs). Crossbar arrays offer a compact, low-energy and in-memory approach to dot product computation in the analog domain by …


Micro-Credentialing With Fuzzy Content Matching: An Educational Data-Mining Approach, Paul Amoruso Jan 2023

Micro-Credentialing With Fuzzy Content Matching: An Educational Data-Mining Approach, Paul Amoruso

Electronic Theses and Dissertations, 2020-

There is a growing need to assess and issue micro-credentials within STEM curricula. Although one approach is to insert a free-standing academic activity into the students learning and degree path, herein the development and mechanism of an alternative approach rooted in leveraging responses on digitized quiz-based assessments is developed. An online assessment and remediation protocol with accompanying Python-based toolset was developed to engage undergraduate tutors who identify and fill knowledge gaps of at-risk learners. Digitized assessments, personalized tutoring, and automated micro-credentialing scripts for Canvas LMS are used to issue skill-specific badges which motivate the learner incrementally, while increasing self-efficacy. This …


Mixed-Criticality System Design For Real-Time Scheduling And Routing Upon Platforms With Uncertainties, Sudharsan Vaidhun Bhaskar Jan 2022

Mixed-Criticality System Design For Real-Time Scheduling And Routing Upon Platforms With Uncertainties, Sudharsan Vaidhun Bhaskar

Electronic Theses and Dissertations, 2020-

Unlike typical computing systems, applications in real-time systems require strict timing guarantees. In the pursuit of providing guarantees, the complex dynamic behaviors of these systems are simplified using models to keep the analysis tractable. In order to guarantee safety, such models often involve pessimistic assumptions. While the amount of pessimism was reasonable for simple computing platforms, for modern platforms the pessimism involves ignoring features that improve performance such as cache usage, instruction pipelines, and more. In this work, we explore routing and scheduling problems in real-time systems, where the uncertainties in the operation are carefully accounted for by complex models …


Examining Cooperative System Responses Against Grid Integrity Attacks, Alexander D. Parady Jan 2022

Examining Cooperative System Responses Against Grid Integrity Attacks, Alexander D. Parady

Honors Undergraduate Theses

Smart grid technologies are integral to society’s transition to sustainable energy sources, but they do not come without a cost. As the energy sector shifts away from a century’s reliance on fossil fuels and centralized generation, technology that actively monitors and controls every aspect of the power infrastructure has been widely adopted, resulting in a plethora of new vulnerabilities that have already wreaked havoc on critical infrastructure. Integrity attacks that feedback false data through industrial control systems, which result in possible catastrophic overcorrections and ensuing failures, have plagued grid infrastructure over the past several years. This threat is now at …


Biomimetic Design, Modeling, And Adaptive Control Of Robotic Gripper For Optimal Grasping, Mushtaq Al-Mohammed Jan 2022

Biomimetic Design, Modeling, And Adaptive Control Of Robotic Gripper For Optimal Grasping, Mushtaq Al-Mohammed

Electronic Theses and Dissertations, 2020-

Grasping is an essential skill for almost every assistive robot. Variations in shape and/or weight of different objects involved in Activities of Daily Living (ADL) lead to complications, especially, when the robot is trying to grip novel objects for which it has no prior information –too much force will deform or crush the object while too little force will lead to slipping and possibly dropped objects. Thus, successful grasping requires the gripper to immobilize an object with the minimal force. In Chapter 2, we present the design, analysis, and experimental implementation of an adaptive control to facilitate 1-click grasping of …


Energy And Area Efficient Machine Learning Architectures Using Spin-Based Neurons, Hossein Pourmeidani Jan 2022

Energy And Area Efficient Machine Learning Architectures Using Spin-Based Neurons, Hossein Pourmeidani

Electronic Theses and Dissertations, 2020-

Recently, spintronic devices with low energy barrier nanomagnets such as spin orbit torque-Magnetic Tunnel Junctions (SOT-MTJs) and embedded magnetoresistive random access memory (MRAM) devices are being leveraged as a natural building block to provide probabilistic sigmoidal activation functions for RBMs. In this dissertation research, we use the Probabilistic Inference Network Simulator (PIN-Sim) to realize a circuit-level implementation of deep belief networks (DBNs) using memristive crossbars as weighted connections and embedded MRAM-based neurons as activation functions. Herein, a probabilistic interpolation recoder (PIR) circuit is developed for DBNs with probabilistic spin logic (p-bit)-based neurons to interpolate the probabilistic output of the neurons …


Big Data Processing Attribute Based Access Control Security, Anne Tall Jan 2022

Big Data Processing Attribute Based Access Control Security, Anne Tall

Electronic Theses and Dissertations, 2020-

The purpose of this research is to analyze the security of next-generation big data processing (BDP) and examine the feasibility of applying advanced security features to meet the needs of modern multi-tenant, multi-level data analysis. The research methodology was to survey of the status of security mechanisms in BDP systems and identify areas that require further improvement. Access control (AC) security services were identified as priority area, specifically Attribute Based Access Control (ABAC). The exemplar BDP system analyzed is the Apache Hadoop ecosystem. We created data generation software, analysis programs, and posted the detailed the experiment configuration on GitHub. Overall, …


Optimal Feature Learning For Facial Expression Recognition, Kamran Ali Dec 2021

Optimal Feature Learning For Facial Expression Recognition, Kamran Ali

Electronic Theses and Dissertations, 2020-

A great deal of research has been done to improve the performance of Facial Expression Recognition (FER) algorithms, but extracting optimal features to represent expressions remains a challenging task. The biggest drawback is that most work on FER ignores the inter-subject variations in facial attributes of individuals present in data. Hence, the representation extracted for the recognition of expressions is polluted by identity-related features that negatively affect the generalization capability of a FER technique on unseen identities. To overcome the effect of subject-identity bias, previous research shows the effectiveness of extracting identity-invariant expression features for FER. However, most of those …


Self Adaptive Reinforcement Learning For High-Dimensional Stochastic Systems With Application To Robotic Control, Sayyed Jaffar Ali Raza Dec 2021

Self Adaptive Reinforcement Learning For High-Dimensional Stochastic Systems With Application To Robotic Control, Sayyed Jaffar Ali Raza

Electronic Theses and Dissertations, 2020-

A long standing goal in the field of artificial intelligence (AI) is to develop agents that can perceive richer problem space and effortlessly plan their activity in minimal duration. Several strides have been made towards this goal over the last few years due to simultaneous advances in compute power, optimized algorithms, and most importantly evident success of AI based machines in nearly every discipline. The progress has been especially rapid in area of reinforcement learning (RL) where computers can now plan-ahead their activities and outperform their human rivals in complex problem domains like chess or Go game. However, despite encouraging …


Synthesis Methodologies For Robust And Reconfigurable Clock Networks, Necati Uysal Dec 2021

Synthesis Methodologies For Robust And Reconfigurable Clock Networks, Necati Uysal

Electronic Theses and Dissertations, 2020-

In today's aggressively scaled technology nodes, billions of transistors are packaged into a single integrated circuit. Electronic Design Automation (EDA) tools are needed to automatically assemble the transistors into a functioning system. One of the most important design steps in the physical synthesis is the design of the clock network. The clock network delivers a synchronizing clock signal to each sequential element. The clock signal is required to be delivered meeting timing constraints under variations and in multiple operating modes. Synthesizing such clock networks is becoming increasingly difficult with the complex power management methodologies and severe manufacturing variations. Clock network …


Performance Enhancement Of Time Delay And Convolutional Neural Networks Employing Sparse Representation In The Transform Domains, Masoumeh Kalantari Khandani May 2021

Performance Enhancement Of Time Delay And Convolutional Neural Networks Employing Sparse Representation In The Transform Domains, Masoumeh Kalantari Khandani

Electronic Theses and Dissertations, 2020-

Deep neural networks are quickly advancing and increasingly used in many applications; however, these networks are often extremely large and require computing and storage power beyond what is available in most embedded and sensor devices. For example, IoT (Internet of Things) devices lack powerful processors or graphical processing units (GPUs) that are commonly used in deep networks. Given the very large-scale deployment of such low power devices, it is desirable to design methods for efficient reduction of computational needs of neural networks. This can be done by reducing input data size or network sizes. Expectedly, such reduction comes at the …


Long Short-Term Memory With Spin-Based Binary And Non-Binary Neurons, Meghana Reddy Vangala Jan 2021

Long Short-Term Memory With Spin-Based Binary And Non-Binary Neurons, Meghana Reddy Vangala

Electronic Theses and Dissertations, 2020-

Research in the field of neural networks has shown advancement in the device technology and machine learning application platforms of use. Some of the major applications of neural network prominent in recent scenarios include image recognition, machine translation, text classification and object categorization. With these advancements, there is a need for more energy-efficient and low area overhead circuits in the hardware implementations. Previous works have concentrated primarily on CMOS technology-based implementations which can face challenges of high energy consumption, memory wall, and volatility complications for standby modes. We herein developed a low-power and area-efficient hardware implementation for Long Short-Term Memory …


Optimizing Peer Selection Among Internet Service Providers (Isps), Shahzeb Mustafa Jan 2021

Optimizing Peer Selection Among Internet Service Providers (Isps), Shahzeb Mustafa

Electronic Theses and Dissertations, 2020-

Connections among Internet Service Providers (ISPs) form the backbone of the Internet. This enables communications across the globe. ISPs are represented as Autonomous Systems (ASes) in the global Internet and inter-ISP traffic exchange takes place via inter-AS links, which are formed based on inter-ISP connections and agreements. In addition to customer-provider agreements, a crucial type of inter-ISP agreement is peering. ISP administrators use various platforms like AP-NIC and NANOG networking events for establishing new peering connections in accordance with their business and technical needs. Such methods are often inefficient and slow, potentially resulting in missed opportunities or sub-optimal routes. The …


Fpga-Augmented Secure Crash-Consistent Non-Volatile Memory, Yu Zou Jan 2021

Fpga-Augmented Secure Crash-Consistent Non-Volatile Memory, Yu Zou

Electronic Theses and Dissertations, 2020-

Emerging byte-addressable Non-Volatile Memory (NVM) technology, although promising superior memory density and ultra-low energy consumption, poses unique challenges to achieving persistent data privacy and computing security, both of which are critically important to the embedded and IoT applications. Specifically, to successfully restore NVMs to their working states after unexpected system crashes or power failure, maintaining and recovering all the necessary security-related metadata can severely increase memory traffic, degrade runtime performance, exacerbate write endurance problem, and demand costly hardware changes to off-the-shelf processors. In this thesis, we summarize and expand upon two of our innovative works, ARES and HERMES, to design …


Energy-Aware Real-Time Scheduling On Heterogeneous And Homogeneous Platforms In The Era Of Parallel Computing, Ashik Ahmed Bhuiyan Jan 2021

Energy-Aware Real-Time Scheduling On Heterogeneous And Homogeneous Platforms In The Era Of Parallel Computing, Ashik Ahmed Bhuiyan

Electronic Theses and Dissertations, 2020-

Multi-core processors increasingly appear as an enabling platform for embedded systems, e.g., mobile phones, tablets, computerized numerical controls, etc. The parallel task model, where a task can execute on multiple cores simultaneously, can efficiently exploit the multi-core platform's computational ability. Many computation-intensive systems (e.g., self-driving cars) that demand stringent timing requirements often evolve in the form of parallel tasks. Several real-time embedded system applications demand predictable timing behavior and satisfy other system constraints, such as energy consumption. Motivated by the facts mentioned above, this thesis studies the approach to integrating the dynamic voltage and frequency scaling (DVFS) policy with real-time …


Energy-Efficient In-Memory Architectures Leveraging Intrinsic Behaviors Of Embedded Mram Devices, Shadi Sheikhfaal Jan 2021

Energy-Efficient In-Memory Architectures Leveraging Intrinsic Behaviors Of Embedded Mram Devices, Shadi Sheikhfaal

Electronic Theses and Dissertations, 2020-

For decades, innovations to surmount the processor versus memory gap and move beyond conventional von Neumann architectures continue to be sought and explored. Recent machine learning models still expend orders of magnitude more time and energy to access data in memory in addition to merely performing the computation itself. This phenomenon referred to as a memory-wall bottleneck, is addressed herein via a completely fresh perspective on logic and memory technology design. The specific solutions developed in this dissertation focus on utilizing intrinsic switching behaviors of embedded MRAM devices to design cross-layer and energy-efficient Compute-in-Memory (CiM) architectures, accelerate the computationally-intensive operations …


Improving Performance And Flexibility Of Fabric-Attached Memory Systems, Vamsee Reddy Kommareddy Jan 2021

Improving Performance And Flexibility Of Fabric-Attached Memory Systems, Vamsee Reddy Kommareddy

Electronic Theses and Dissertations, 2020-

As demands for memory-intensive applications continue to grow, the memory capacity of each computing node is expected to grow at a similar pace. In high-performance computing (HPC) systems, the memory capacity per compute node is decided upon the most demanding application that would likely run on such a system, and hence the average capacity per node in future HPC systems is expected to grow significantly. However, diverse applications run on HPC systems with different memory requirements and memory utilization can fluctuate widely from one application to another. Since memory modules are private for a corresponding computing node, a large percentage …


Robust Acceleration Of Data-Centric Applications Using Resistive Computing Systems, Baogang Zhang Jan 2021

Robust Acceleration Of Data-Centric Applications Using Resistive Computing Systems, Baogang Zhang

Electronic Theses and Dissertations, 2020-

With the accessible data reaching zettabyte level, CMOS technology is reaching its limit for the data hungry applications. Moore's law has been reaching its depletion in recent studies. On the other hand, von Neumann architecture is approaching the bottleneck due to the data movement between the computing and memory units. With data movement and power budgets becoming the limiting factors of today's computing systems, in-memory computing using emerging non-volatile resistive devices has attracted an increasing amount of attention. A non-volatile resistive device may be realized using memristor, resistive random access memory (ReRAM), phase change memory (PCM), or spin-transfer torque magnetic …


Pervasive Spectrum Sharing For Improved Wireless Experience, Mostafizur Rahman Jan 2020

Pervasive Spectrum Sharing For Improved Wireless Experience, Mostafizur Rahman

Electronic Theses and Dissertations, 2020-

Spectrum sharing among cellular users has been a promising approach to attain better efficiency in the use of the limited spectral bands. The existing dynamic spectrum access techniques include sharing of the licensed spectrum bands by allowing other 'secondary' users to use the bands if the licensee 'primary' user is idle. This primary-secondary spectrum sharing is limited in terms of design space, and may not be sufficient to meet the ever-increasing demand of connectivity and high signal quality to improve the end-users' wireless experience. The next step to increase spectrum efficiency is to design markets where sharing takes place pervasively …


Investigations On The Use Of Hyperthermia For Breast Cancer Treatment, Sreekala Suseela Jan 2020

Investigations On The Use Of Hyperthermia For Breast Cancer Treatment, Sreekala Suseela

Electronic Theses and Dissertations, 2020-

Hyperthermia using electromagnetic energy has been proven to be an effective method in the treatment of cancer. Hyperthermia is a therapeutic procedure in which the temperature in the tumor tissue is raised above 42°C without causing any damage to the surrounding healthy tissue. This method has been shown to increase the effectiveness of radiotherapy and chemotherapy. Radio frequencies, microwave frequencies or focused ultrasound can be used to deliver energy to the tumor tissue to attain higher temperatures in the tumor region for hyperthermia application. In this dissertation the use of a near field focused (NFF) microstrip antenna array for the …


Distributed Multi-Agent Optimization And Control With Applications In Smart Grid, Towfiq Rahman Jan 2020

Distributed Multi-Agent Optimization And Control With Applications In Smart Grid, Towfiq Rahman

Electronic Theses and Dissertations, 2020-

With recent advancements in network technologies like 5G and Internet of Things (IoT), the size and complexity of networked interconnected agents have increased rapidly. Although centralized schemes have simpler algorithm design, in practicality, it creates high computational complexity and requires high bandwidth for centralized data pooling. In this dissertation, for distributed optimization of networked multi-agent architecture, the Alternating Direction Method of Multipliers (ADMM) is investigated. In particular, a new adaptive-gain ADMM algorithm is derived in closed form and under the standard convex property to greatly speed up the convergence of ADMM-based distributed optimization. Using the Lyapunov direct approach, the proposed …


Control Strategies For Multi-Controller Multi-Objective Systems, Raaed Al-Azzawi Jan 2020

Control Strategies For Multi-Controller Multi-Objective Systems, Raaed Al-Azzawi

Electronic Theses and Dissertations, 2020-

This dissertation's focus is control systems controlled by multiple controllers, each having its own objective function. The control of such systems is important in many practical applications such as economic systems, the smart grid, military systems, robotic systems, and others. To reap the benefits of feedback, we consider and discuss the advantages of implementing both the Nash and the Leader-Follower Stackelberg controls in a closed-loop form. However, closed-loop controls require continuous measurements of the system's state vector, which may be expensive or even impossible in many cases. As an alternative, we consider a sampled closed-loop implementation. Such an implementation requires …


Modeling Site Specific Urban Propagation Using A Variable Terrain Radiowave Parabolic Equation - Vertical Plane Launch (Vtrpe-Vpl) Hybrid Technique, Pierre Cadette Jan 2020

Modeling Site Specific Urban Propagation Using A Variable Terrain Radiowave Parabolic Equation - Vertical Plane Launch (Vtrpe-Vpl) Hybrid Technique, Pierre Cadette

Electronic Theses and Dissertations, 2020-

The development of efficient algorithms for calculating propagation loss in site specific urban environments has been an active area of research for many years. This dissertation demonstrates that, for particular scenarios, a hybrid approach that combines the Variable Terrain Radiowave Parabolic Equation (VTRPE) and Vertical Plane Launch (VPL) models can be used to produce accurate results for a downrange region of interest. The hybrid approach consists of leveraging the 2-D parabolic equation method in the initial propagation region, where backscatter and out of plane energy can be neglected, then transitioning to the more computationally intensive 3-D ray launching method for …


Provably Trustworthy And Secure Hardware Design With Low Overhead, Qutaiba Alasad Jan 2020

Provably Trustworthy And Secure Hardware Design With Low Overhead, Qutaiba Alasad

Electronic Theses and Dissertations, 2020-

Due to the globalization of IC design in the semiconductor industry and outsourcing of chip manufacturing, 3PIPs become vulnerable to IP piracy, reverse engineering, counterfeit IC, and hardware Trojans. To thwart such attacks, ICs can be protected using logic encryption techniques. However, strong resilient techniques incur significant overheads. SCAs further complicate matters by introducing potential attacks post-fabrication. One of the most severe SCAs is PA attacks, in which an attacker can observe the power variations of the device and analyze them to extract the secret key. PA attacks can be mitigated via adding large extra hardware; however, the overheads of …


Statistical And Stochastic Learning Algorithms For Distributed And Intelligent Systems, Jiang Bian Jan 2020

Statistical And Stochastic Learning Algorithms For Distributed And Intelligent Systems, Jiang Bian

Electronic Theses and Dissertations, 2020-

In the big data era, statistical and stochastic learning for distributed and intelligent systems focuses on enhancing and improving the robustness of learning models that have become pervasive and are being deployed for decision-making in real-life applications including general classification, prediction, and sparse sensing. The growing prospect of statistical learning approaches such as Linear Discriminant Analysis and distributed Learning being used (e.g., community sensing) has raised concerns around the robustness of algorithm design. Recent work on anomalies detection has shown that such Learning models can also succumb to the so-called 'edge-cases' where the real-life operational situation presents data that are …


Deep Hashing For Image Similarity Search, Ali Al Kobaisi Jan 2020

Deep Hashing For Image Similarity Search, Ali Al Kobaisi

Electronic Theses and Dissertations, 2020-

Hashing for similarity search is one of the most widely used methods to solve the approximate nearest neighbor search problem. In this method, one first maps data items from a real valued high-dimensional space to a suitable low dimensional binary code space and then performs the approximate nearest neighbor search in this code space instead. This is beneficial because the search in the code space can be solved more efficiently in terms of runtime complexity and storage consumption. Obviously, for this method to succeed, it is necessary that similar data items be mapped to binary code words that have small …


Extracting Data-Level Parallelism In High-Level Synthesis For Reconfigurable Architectures, Juan Andres Escobedo Contreras Jan 2020

Extracting Data-Level Parallelism In High-Level Synthesis For Reconfigurable Architectures, Juan Andres Escobedo Contreras

Electronic Theses and Dissertations, 2020-

High-Level Synthesis (HLS) tools are a set of algorithms that allow programmers to obtain implementable Hardware Description Language (HDL) code from specifications written high-level, sequential languages such as C, C++, or Java. HLS has allowed programmers to code in their preferred language while still obtaining all the benefits hardware acceleration has to offer without them needing to be intimately familiar with the hardware platform of the accelerator. In this work we summarize and expand upon several of our approaches to improve the automatic memory banking capabilities of HLS tools targeting reconfigurable architectures, namely Field-Programmable Gate Arrays or FPGA's. We explored …


Data-Driven Nonlinear Control Designs For Constrained Systems, Roland Harvey Jan 2020

Data-Driven Nonlinear Control Designs For Constrained Systems, Roland Harvey

Electronic Theses and Dissertations, 2020-

Systems with nonlinear dynamics are theoretically constrained to the realm of nonlinear analysis and design, while explicit constraints are expressed as equalities or inequalities of state, input, and output vectors of differential equations. Few control designs exist for systems with such explicit constraints, and no generalized solution has been provided. This dissertation presents general techniques to design stabilizing controls for a specific class of nonlinear systems with constraints on input and output, and verifies that such designs are straightforward to implement in selected applications. Additionally, a closed-form technique for an open-loop problem with unsolvable dynamic equations is developed. Typical optimal …


Improving Usability Of Genetic Algorithms Through Self Adaptation On Static And Dynamic Environments, Reamonn Norat Jan 2020

Improving Usability Of Genetic Algorithms Through Self Adaptation On Static And Dynamic Environments, Reamonn Norat

Electronic Theses and Dissertations, 2020-

We propose a self-adaptive genetic algorithm, called SAGA, for the purposes of improving the usability of genetic algorithms on both static and dynamic problems. Self-adaption can improve usability by automating some of the parameter tuning for the algorithm, a difficult and time-consuming process on canonical genetic algorithms. Reducing or simplifying the need for parameter tuning will help towards making genetic algorithms a more attractive tool for those who are not experts in the field of evolutionary algorithms, allowing more people to take advantage of the problem solving capabilities of a genetic algorithm on real-world problems. We test SAGA and analyze …