Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 32

Full-Text Articles in Computer Engineering

Deep Learning Based Power System Stability Assessment For Reduced Wecc System, Yinfeng Zhao Aug 2023

Deep Learning Based Power System Stability Assessment For Reduced Wecc System, Yinfeng Zhao

Doctoral Dissertations

Power system stability is the ability of power system, for a giving initial operating condition, to reach a new operation condition with most of the system variables bounded in normal range after subjecting to a short or long disturbance. Traditional power system stability mainly uses time-domain simulation which is very time consuming and only appropriate for offline assessment.

Nowadays, with increasing penetration of inverter based renewable, large-scale distributed energy storage integration and operation uncertainty brought by weather and electricity market, system dynamic and operating condition is more dramatic, and traditional power system stability assessment based on scheduling may not be …


Development Of A Soft Robotic Approach For An Intra-Abdominal Wireless Laparoscopic Camera, Hui Liu Aug 2023

Development Of A Soft Robotic Approach For An Intra-Abdominal Wireless Laparoscopic Camera, Hui Liu

Doctoral Dissertations

In Single-Incision Laparoscopic Surgery (SILS), the Magnetic Anchoring and Guidance System (MAGS) arises as a promising technique to provide larger workspaces and field of vision for the laparoscopes, relief space for other instruments, and require fewer incisions. Inspired by MAGS, many concept designs related to fully insertable magnetically driven laparoscopes are developed and tested on the transabdominal operation. However, ignoring the tissue interaction and insertion procedure, most of the designs adopt rigid structures, which not only damage the patients' tissue with excess stress concentration and sliding motion but also require complicated operation for the insertion. Meanwhile, lacking state tracking of …


Unconventional Computation Including Quantum Computation, Bruce J. Maclennan Apr 2022

Unconventional Computation Including Quantum Computation, Bruce J. Maclennan

Faculty Publications and Other Works -- EECS

Unconventional computation (or non-standard computation) refers to the use of non-traditional technologies and computing paradigms. As we approach the limits of Moore’s Law, progress in computation will depend on going beyond binary electronics and on exploring new paradigms and technologies for information processing and control. This book surveys some topics relevant to unconventional computation, including the definition of unconventional computations, the physics of computation, quantum computation, DNA and molecular computation, and analog computation. This book is the content of a course taught at UTK.


Evaluation Of Robust Deep Learning Pipelines Targeting Low Swap Edge Deployment, David Carter Cornett Dec 2021

Evaluation Of Robust Deep Learning Pipelines Targeting Low Swap Edge Deployment, David Carter Cornett

Masters Theses

The deep learning technique of convolutional neural networks (CNNs) has greatly advanced the state-of-the-art for computer vision tasks such as image classification and object detection. These solutions rely on large systems leveraging wattage-hungry GPUs to provide the computational power to achieve such performance. However, the size, weight and power (SWaP) requirements of these conventional GPU-based deep learning systems are not suitable when a solution requires deployment to so called "Edge" environments such as autonomous vehicles, unmanned aerial vehicles (UAVs) and smart security cameras.

The objective of this work is to benchmark FPGA-based alternatives to conventional GPU systems that have the …


Sabr: Development Of A Neuromorphic Balancing Robot, Alec Yen, Yaw Mensah, Mark Dean Sep 2021

Sabr: Development Of A Neuromorphic Balancing Robot, Alec Yen, Yaw Mensah, Mark Dean

EURēCA: Exhibition of Undergraduate Research and Creative Achievement

We discuss the development of a self-adjusted balancing robot (SABR) using a neuromorphic computing framework for control. Implementations of two-wheeled balancing robots have been achieved using traditional algorithms, often in the form of proportional-integral-derivative (PID) control. We aim to achieve the same task using a neuromorphic architecture, which offers potential for higher power efficiency than conventional processing techniques. We utilize evolutionary optimization (EO) and the second iteration of Dynamic Adaptive Neural Network Arrays (DANNA2) developed by the Laboratory of Tennesseans Exploring Neural Networks (TENNLab). For the purpose of comparison, a traditional balancing robot was first designed using PID control; the …


Sensor Fusion For Object Detection And Tracking In Autonomous Vehicles, Mohamad Ramin Nabati Aug 2021

Sensor Fusion For Object Detection And Tracking In Autonomous Vehicles, Mohamad Ramin Nabati

Doctoral Dissertations

Autonomous driving vehicles depend on their perception system to understand the environment and identify all static and dynamic obstacles surrounding the vehicle. The perception system in an autonomous vehicle uses the sensory data obtained from different sensor modalities to understand the environment and perform a variety of tasks such as object detection and object tracking. Combining the outputs of different sensors to obtain a more reliable and robust outcome is called sensor fusion. This dissertation studies the problem of sensor fusion for object detection and object tracking in autonomous driving vehicles and explores different approaches for utilizing deep neural networks …


Design And Simulation Of A Supervisory Control System For Hybrid Manufacturing, Michael Buckley Aug 2021

Design And Simulation Of A Supervisory Control System For Hybrid Manufacturing, Michael Buckley

Masters Theses

The research teams of Dr. Bill Hamel, Dr. Bradley Jared and Dr. Tony Schmitz were tasked by the Office of Naval Research to create a hybrid manufacturing process for a reduced scale model of a naval ship propeller. The base structure of the propeller is created using Wire Arc Additive Manufacturing (WAAM), which is then scanned to compare created geometry to desired geometry. The propeller is then machined down to match the desired geometry. This process is iterated upon until the final product meets design tolerances. Due to the complex nature and numerous industrial machines used in the process, it …


Towards Secure Deep Neural Networks For Cyber-Physical Systems, Jiangnan Li May 2021

Towards Secure Deep Neural Networks For Cyber-Physical Systems, Jiangnan Li

Doctoral Dissertations

In recent years, deep neural networks (DNNs) are increasingly investigated in the literature to be employed in cyber-physical systems (CPSs). DNNs own inherent advantages in complex pattern identifying and achieve state-of-the-art performances in many important CPS applications. However, DNN-based systems usually require large datasets for model training, which introduces new data management issues. Meanwhile, research in the computer vision domain demonstrated that the DNNs are highly vulnerable to adversarial examples. Therefore, the security risks of employing DNNs in CPSs applications are of concern.

In this dissertation, we study the security of employing DNNs in CPSs from both the data domain …


A Secure Architecture For Defense Against Return Address Corruption, Grayson J. Bruner May 2021

A Secure Architecture For Defense Against Return Address Corruption, Grayson J. Bruner

Masters Theses

The advent of the Internet of Things has brought about a staggering level of inter-connectivity between common devices used every day. Unfortunately, security is not a high priority for developers designing these IoT devices. Often times the trade-off of security comes at too high of a cost in other areas, such as performance or power consumption. This is especially prevalent in resource-constrained devices, which make up a large number of IoT devices. However, a lack of security could lead to a cascade of security breaches rippling through connected devices. One of the most common attacks used by hackers is return …


Leveraging Conventional Internet Routing Protocol Behavior To Defeat Ddos And Adverse Networking Conditions, Jared M. Smith Aug 2020

Leveraging Conventional Internet Routing Protocol Behavior To Defeat Ddos And Adverse Networking Conditions, Jared M. Smith

Doctoral Dissertations

The Internet is a cornerstone of modern society. Yet increasingly devastating attacks against the Internet threaten to undermine the Internet's success at connecting the unconnected. Of all the adversarial campaigns waged against the Internet and the organizations that rely on it, distributed denial of service, or DDoS, tops the list of the most volatile attacks. In recent years, DDoS attacks have been responsible for large swaths of the Internet blacking out, while other attacks have completely overwhelmed key Internet services and websites. Core to the Internet's functionality is the way in which traffic on the Internet gets from one destination …


Learning Multimodal Structures In Computer Vision, Ali Taalimi Aug 2017

Learning Multimodal Structures In Computer Vision, Ali Taalimi

Doctoral Dissertations

A phenomenon or event can be received from various kinds of detectors or under different conditions. Each such acquisition framework is a modality of the phenomenon. Due to the relation between the modalities of multimodal phenomena, a single modality cannot fully describe the event of interest. Since several modalities report on the same event introduces new challenges comparing to the case of exploiting each modality separately.

We are interested in designing new algorithmic tools to apply sensor fusion techniques in the particular signal representation of sparse coding which is a favorite methodology in signal processing, machine learning and statistics to …


Computational Imaging Approach To Recovery Of Target Coordinates Using Orbital Sensor Data, Michael D. Vaughan Aug 2017

Computational Imaging Approach To Recovery Of Target Coordinates Using Orbital Sensor Data, Michael D. Vaughan

Doctoral Dissertations

This dissertation addresses the components necessary for simulation of an image-based recovery of the position of a target using orbital image sensors. Each component is considered in detail, focusing on the effect that design choices and system parameters have on the accuracy of the position estimate. Changes in sensor resolution, varying amounts of blur, differences in image noise level, selection of algorithms used for each component, and lag introduced by excessive processing time all contribute to the accuracy of the result regarding recovery of target coordinates using orbital sensor data.

Using physical targets and sensors in this scenario would be …


Wide-Area Measurement-Driven Approaches For Power System Modeling And Analytics, Hesen Liu Aug 2017

Wide-Area Measurement-Driven Approaches For Power System Modeling And Analytics, Hesen Liu

Doctoral Dissertations

This dissertation presents wide-area measurement-driven approaches for power system modeling and analytics. Accurate power system dynamic models are the very basis of power system analysis, control, and operation. Meanwhile, phasor measurement data provide first-hand knowledge of power system dynamic behaviors. The idea of building out innovative applications with synchrophasor data is promising.

Taking advantage of the real-time wide-area measurements, one of phasor measurements’ novel applications is to develop a synchrophasor-based auto-regressive with exogenous inputs (ARX) model that can be updated online to estimate or predict system dynamic responses.

Furthermore, since auto-regressive models are in a big family, the ARX model …


Target Detection With Neural Network Hardware, Hollis Bui, Garrett Massman, Nikolas Spangler, Jalen Tarvin, Luke Bechtel, Kevin Dunn, Shawn Bradford May 2017

Target Detection With Neural Network Hardware, Hollis Bui, Garrett Massman, Nikolas Spangler, Jalen Tarvin, Luke Bechtel, Kevin Dunn, Shawn Bradford

Chancellor’s Honors Program Projects

No abstract provided.


Face Centered Image Analysis Using Saliency And Deep Learning Based Techniques, Rui Guo Aug 2016

Face Centered Image Analysis Using Saliency And Deep Learning Based Techniques, Rui Guo

Doctoral Dissertations

Image analysis starts with the purpose of configuring vision machines that can perceive like human to intelligently infer general principles and sense the surrounding situations from imagery. This dissertation studies the face centered image analysis as the core problem in high level computer vision research and addresses the problem by tackling three challenging subjects: Are there anything interesting in the image? If there is, what is/are that/they? If there is a person presenting, who is he/she? What kind of expression he/she is performing? Can we know his/her age? Answering these problems results in the saliency-based object detection, deep learning structured …


The Design And Validation Of A Wireless Bat-Mounted Sonar Recording System, Jeremy Joseph Langford Aug 2016

The Design And Validation Of A Wireless Bat-Mounted Sonar Recording System, Jeremy Joseph Langford

Masters Theses

Scientists studying the behavior of bats monitor their echolocation calls, as their calls are important for navigation and feeding, but scientist are typically restricted to ground-based recording. Recording bat calls used for echolocation from the back of the bat as opposed to the ground offers the opportunity to study bat echolocation from a vantage otherwise only offered to the bats themselves. However, designing a bat mounted in-flight audio recording system, (bat-tag), capable of recording the ultra-sound used in bat echolocation presents a unique set of challenges. Chiefly, the bat-tag must be sufficiently light weight as to not overburden the bat, …


Using Gpu To Accelerate Linear Computations In Power System Applications, Xue Li Dec 2015

Using Gpu To Accelerate Linear Computations In Power System Applications, Xue Li

Doctoral Dissertations

With the development of advanced power system controls, the industrial and research community is becoming more interested in simulating larger interconnected power grids. It is always critical to incorporate advanced computing technologies to accelerate these power system computations. Power flow, one of the most fundamental computations in power system analysis, converts the solution of non-linear systems to that of a set of linear systems via the Newton method or one of its variants. An efficient solution to these linear equations is the key to improving the performance of power flow computation, and hence to accelerating other power system applications based …


Neuron Clustering For Mitigating Catastrophic Forgetting In Supervised And Reinforcement Learning, Benjamin Frederick Goodrich Dec 2015

Neuron Clustering For Mitigating Catastrophic Forgetting In Supervised And Reinforcement Learning, Benjamin Frederick Goodrich

Doctoral Dissertations

Neural networks have had many great successes in recent years, particularly with the advent of deep learning and many novel training techniques. One issue that has affected neural networks and prevented them from performing well in more realistic online environments is that of catastrophic forgetting. Catastrophic forgetting affects supervised learning systems when input samples are temporally correlated or are non-stationary. However, most real-world problems are non-stationary in nature, resulting in prolonged periods of time separating inputs drawn from different regions of the input space.

Reinforcement learning represents a worst-case scenario when it comes to precipitating catastrophic forgetting in neural networks. …


Arithmetic Logic Unit Architectures With Dynamically Defined Precision, Getao Liang Dec 2015

Arithmetic Logic Unit Architectures With Dynamically Defined Precision, Getao Liang

Doctoral Dissertations

Modern central processing units (CPUs) employ arithmetic logic units (ALUs) that support statically defined precisions, often adhering to industry standards. Although CPU manufacturers highly optimize their ALUs, industry standard precisions embody accuracy and performance compromises for general purpose deployment. Hence, optimizing ALU precision holds great potential for improving speed and energy efficiency. Previous research on multiple precision ALUs focused on predefined, static precisions. Little previous work addressed ALU architectures with customized, dynamically defined precision. This dissertation presents approaches for developing dynamic precision ALU architectures for both fixed-point and floating-point to enable better performance, energy efficiency, and numeric accuracy. These new …


Dividing And Conquering Meshes Within The Nist Fire Dynamics Simulator (Fds) On Multicore Computing Systems, Donald Charles Collins Dec 2015

Dividing And Conquering Meshes Within The Nist Fire Dynamics Simulator (Fds) On Multicore Computing Systems, Donald Charles Collins

Masters Theses

The National Institute for Standards and Technology (NIST) Fire Dynamics Simulator (FDS) provides a computational fluid dynamics model of a fire, which can be visualized by using NIST Smokeview (SMV). Users must create a configuration file (*.fds) that describes the environment and other characteristics of the fire scene so that the FDS software can produce the output file (*.smv) needed for visualization.The processing can be computationally intensive, often taking between several minutes and several hours to complete. In many cases, a user will create a file that is not optimized for a multicore computing system. By dividing meshes within the …


Implementation Of A Neuromorphic Development Platform With Danna, Jason Yen-Shen Chan Dec 2015

Implementation Of A Neuromorphic Development Platform With Danna, Jason Yen-Shen Chan

Masters Theses

Neuromorphic computing is the use of artificial neural networks to solve complex problems. The specialized computing field has been growing in interest during the past few years. Specialized hardware that function as neural networks can be utilized to solve specific problems unsuited for traditional computing architectures such as pattern classification and image recognition. However, these hardware platforms have neural network structures that are static, being limited to only perform a specific application, and cannot be used for other tasks. In this paper, the feasibility of a development platform utilizing a dynamic artificial neural network for researchers is discussed.


Data Security And Privacy In Smart Grid, Yue Tong Aug 2015

Data Security And Privacy In Smart Grid, Yue Tong

Doctoral Dissertations

This dissertation explores novel data security and privacy problems in the emerging smart grid.

The need for data security and privacy spans the whole life cycle of the data in the smart grid, across the phases of data acquisition, local processing and archiving, collaborative processing, and finally sharing and archiving. The first two phases happen in the private domains of an individual utility company, where data are collected from the power system and processed at the local facilities. When data are being acquired and processed in the private domain, data security is the most critical concern. The key question is …


A Magnetic Actuated Fully Insertable Robotic Camera System For Single Incision Laparoscopic Surgery, Xiaolong Liu Aug 2015

A Magnetic Actuated Fully Insertable Robotic Camera System For Single Incision Laparoscopic Surgery, Xiaolong Liu

Doctoral Dissertations

Minimally Invasive Surgery (MIS) is a common surgical procedure which makes tiny incisions in the patients anatomy, inserting surgical instruments and using laparoscopic cameras to guide the procedure. Compared with traditional open surgery, MIS allows surgeons to perform complex surgeries with reduced trauma to the muscles and soft tissues, less intraoperative hemorrhaging and postoperative pain, and faster recovery time. Surgeons rely heavily on laparoscopic cameras for hand-eye coordination and control during a procedure. However, the use of a standard laparoscopic camera, achieved by pushing long sticks into a dedicated small opening, involves multiple incisions for the surgical instruments. Recently, single …


Compressed Sensing In Resource-Constrained Environments: From Sensing Mechanism Design To Recovery Algorithms, Shuangjiang Li Aug 2015

Compressed Sensing In Resource-Constrained Environments: From Sensing Mechanism Design To Recovery Algorithms, Shuangjiang Li

Doctoral Dissertations

Compressed Sensing (CS) is an emerging field based on the revelation that a small collection of linear projections of a sparse signal contains enough information for reconstruction. It is promising that CS can be utilized in environments where the signal acquisition process is extremely difficult or costly, e.g., a resource-constrained environment like the smartphone platform, or a band-limited environment like visual sensor network (VSNs). There are several challenges to perform sensing due to the characteristic of these platforms, including, for example, needing active user involvement, computational and storage limitations and lower transmission capabilities. This dissertation focuses on the study of …


Dynamic Simulation And Neuromuscular Control Of Movement: Applications For Predictive Simulations Of Balance Recovery, Misagh Mansouri Boroujeni May 2015

Dynamic Simulation And Neuromuscular Control Of Movement: Applications For Predictive Simulations Of Balance Recovery, Misagh Mansouri Boroujeni

Doctoral Dissertations

Balance is among the most challenging tasks for patients with movement disorders. Study and treatment of these disorders could greatly benefit from combined software tools that offer better insights into neuromuscular biomechanics, and predictive capabilities for optimal surgical and rehabilitation treatment planning. A platform was created to combine musculoskeletal modeling, closed-loop forward dynamic simulation, optimization techniques, and neuromuscular control system design. Spinal (stretch-reflex) and supraspinal (operational space task-based) controllers were developed to test simulation-based hypotheses related to balance recovery and movement control. A corrective procedure (rectus femoris transfer surgery) was targeted for children experiencing stiff-knee gait and how this procedure …


Cpas - Campus Parking Availability System, Jacob Lambert May 2015

Cpas - Campus Parking Availability System, Jacob Lambert

Chancellor’s Honors Program Projects

No abstract provided.


Statistical Analysis Of Disturbances In Power Transmission Systems, Liu Liu Aug 2014

Statistical Analysis Of Disturbances In Power Transmission Systems, Liu Liu

Masters Theses

Disturbance analysis is essential to the study of the power transmission systems. Traditionally, disturbances are described as megawatt (MW) events, but the access to data is inefficient due to the slow installation and authorization process of the monitoring device. In this paper, we propose a novel approach to disturbance analysis conducted at the distribution level by exploiting the frequency recordings from Frequency Disturbance Recorders (FDRs) of the Frequency Monitoring Network (FNET/GridEye), based on the relationship between frequency change and the power loss of disturbances - linearly associated by the Frequency Response. We first analyze the real disturbance records of North …


Modeling, Analysis, And Control Of A Mobile Robot For In Vivo Fluoroscopy Of Human Joints During Natural Movements, Matthew A. Young May 2014

Modeling, Analysis, And Control Of A Mobile Robot For In Vivo Fluoroscopy Of Human Joints During Natural Movements, Matthew A. Young

Doctoral Dissertations

In this dissertation, the modeling, analysis and control of a multi-degree of freedom (mdof) robotic fluoroscope was investigated. A prototype robotic fluoroscope exists, and consists of a 3 dof mobile platform with two 2 dof Cartesian manipulators mounted symmetrically on opposite sides of the platform. One Cartesian manipulator positions the x-ray generator and the other Cartesian manipulator positions the x-ray imaging device. The robotic fluoroscope is used to x-ray skeletal joints of interest of human subjects performing natural movement activities. In order to collect the data, the Cartesian manipulators must keep the x-ray generation and imaging devices accurately aligned while …


Improved Forensic Medical Device Security Through Eating Detection, Nathan Lee Henry May 2014

Improved Forensic Medical Device Security Through Eating Detection, Nathan Lee Henry

Masters Theses

Patients are increasingly reliant on implantable medical device systems today. For patients with diabetes, an implantable insulin pump system or artificial pancreas can greatly improve quality of life. As with any device, these devices can and do suffer from software and hardware issues, often reported as a safety event. For a forensic investigator, a safety event is indistinguishable from a potential security event. In this thesis, we show a new sensor system that can be transparently integrated into existing and future electronic diabetes therapy systems while providing additional forensic data to help distinguish between safety and security events. We demonstrate …


A Secure Reconfigurable System-On-Programmable-Chip Computer System, William Herbert Collins Aug 2013

A Secure Reconfigurable System-On-Programmable-Chip Computer System, William Herbert Collins

Masters Theses

A System-on-Programmable-Chip (SoPC) architecture is designed to meet two goals: to provide a role-based secure computing environment and to allow for user reconfiguration. To accomplish this, a secure root of trust is derived from a fixed architectural subsystem, known as the Security Controller. It additionally provides a dynamically configurable single point of access between applications developed by users and the objects those applications use. The platform provides a model for secrecy such that physical recovery of any one component in isolation does not compromise the system. Dual-factor authentication is used to verify users. A model is also provided for tamper …