Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 43

Full-Text Articles in Computer Engineering

Protecting Return Address Integrity For Risc-V Via Pointer Authentication, Yuhe Zhao Mar 2024

Protecting Return Address Integrity For Risc-V Via Pointer Authentication, Yuhe Zhao

Masters Theses

Embedded systems based on lightweight microprocessors are becoming more prevalent in various applications. However, the security of them remains a significant challenge due to the limited resources and exposure to external threats. Especially, some of these devices store sensitive data and control critical devices, making them high-value targets for attackers. Software security is particularly important because attackers can easily access these devices on the internet and obtain control of them by injecting malware.

Return address (RA) hijacking is a common software attack technique used to compromise control flow integrity (CFI) by manipulating memory, such as return-to-libc attacks. Several methods have …


Blockchain Design For A Secure Pharmaceutical Supply Chain, Zhe Xu Mar 2024

Blockchain Design For A Secure Pharmaceutical Supply Chain, Zhe Xu

Masters Theses

In the realm of pharmaceuticals, particularly during the challenging times of the COVID-19 pandemic, the supply chain for drugs has faced significant strains. The increased demand for vaccines and therapeutics has revealed critical weaknesses in the current drug supply chain management systems. If not addressed, these challenges could lead to severe societal impacts, including the rise of counterfeit medications and diminishing trust in government authorities.

The study identified that more than the current strategies, such as the Drug Supply Chain Security Act (DSCSA) in the U.S., which focuses on unique authentication and traceability codes for prescription drugs, is needed to …


Design And Fabrication Of A Trapped Ion Quantum Computing Testbed, Christopher A. Caron Aug 2023

Design And Fabrication Of A Trapped Ion Quantum Computing Testbed, Christopher A. Caron

Masters Theses

Here we present the design, assembly and successful ion trapping of a room-temperature ion trap system with a custom designed and fabricated surface electrode ion trap, which allows for rapid prototyping of novel trap designs such that new chips can be installed and reach UHV in under 2 days. The system has demonstrated success at trapping and maintaining both single ions and cold crystals of ions. We achieve this by fabricating our own custom surface Paul traps in the UMass Amherst cleanroom facilities, which are then argon ion milled, diced, mounted and wire bonded to an interposer which is placed …


Sel4 On Risc-V - Developing High Assurance Platforms With Modular Open-Source Architectures, Michael A. Doran Jr Aug 2023

Sel4 On Risc-V - Developing High Assurance Platforms With Modular Open-Source Architectures, Michael A. Doran Jr

Masters Theses

Virtualization is now becoming an industry standard for modern embedded systems. Modern embedded systems can now support multiple applications on a single hardware platform while meeting power and cost requirements. Virtualization on an embedded system is achieved through the design of the hardware-software interface. Instruction set architecture, ISA, defines the hardware-software interface for an embedded system. At the hardware level the ISA, provides extensions to support virtualization.

In addition to an ISA that supports hypervisor extensions it is equally important to provide a hypervisor completely capable of exploiting the benefits of virtualization for securing modern embedded systems. Currently there does …


Evaluation Of Robust Deep Learning Pipelines Targeting Low Swap Edge Deployment, David Carter Cornett Dec 2021

Evaluation Of Robust Deep Learning Pipelines Targeting Low Swap Edge Deployment, David Carter Cornett

Masters Theses

The deep learning technique of convolutional neural networks (CNNs) has greatly advanced the state-of-the-art for computer vision tasks such as image classification and object detection. These solutions rely on large systems leveraging wattage-hungry GPUs to provide the computational power to achieve such performance. However, the size, weight and power (SWaP) requirements of these conventional GPU-based deep learning systems are not suitable when a solution requires deployment to so called "Edge" environments such as autonomous vehicles, unmanned aerial vehicles (UAVs) and smart security cameras.

The objective of this work is to benchmark FPGA-based alternatives to conventional GPU systems that have the …


Benchmarking Small-Dataset Structure-Activity-Relationship Models For Prediction Of Wnt Signaling Inhibition, Mahtab Kokabi Oct 2021

Benchmarking Small-Dataset Structure-Activity-Relationship Models For Prediction Of Wnt Signaling Inhibition, Mahtab Kokabi

Masters Theses

Quantitative structure-activity relationship (QSAR) models based on machine learning algorithms are powerful tools to expedite drug discovery processes and therapeutics development. Given the cost in acquiring large-sized training datasets, it is useful to examine if QSAR analysis can reasonably predict drug activity with only a small-sized dataset (size < 100) and benchmark these small-dataset QSAR models in application-specific studies. To this end, here we present a systematic benchmarking study on small-dataset QSAR models built for prediction of effective Wnt signaling inhibitors, which are essential to therapeutics development in prevalent human diseases (e.g., cancer). Specifically, we examined a total of 72 two-dimensional (2D) QSAR models based on 4 best-performing algorithms, 6 commonly used molecular fingerprints, and 3 typical fingerprint lengths. We trained these models using a training dataset (56 compounds), benchmarked their performance on 4 figures-of-merit (FOMs), and examined their prediction accuracy using an external validation dataset (14 compounds). Our data show that the model performance is maximized when: 1) molecular fingerprints are selected to provide sufficient, unique, and not overly detailed representations of the chemical structures of drug compounds; 2) algorithms are selected to reduce the number of false predictions due to class imbalance in the dataset; and 3) models are selected to reach balanced performance on all 4 FOMs. These results may provide general guidelines in developing high-performance small-dataset QSAR models for drug activity prediction.


A Cloud Infrastructure For Large Scale Health Monitoring In Older Adult Care Facilities, Uchechukwu Gabriel David Sep 2021

A Cloud Infrastructure For Large Scale Health Monitoring In Older Adult Care Facilities, Uchechukwu Gabriel David

Masters Theses

Technology development in the sub-field of older adult care has always been on the back-burner compared to other healthcare areas. But with increasing life expectancy, this is poised to change. With the increasing older adult population, the current older adult care facilities and personnel are struggling to keep up with demand. Research conducted in the Netherlands [1] found 33,000 older adults were awaiting admission into a home for the elderly showing that demand far exceeds availability. This huge demand for older adult care has resulted in a decrease in the quality of care being provided. A recent study involving older …


Design And Simulation Of A Supervisory Control System For Hybrid Manufacturing, Michael Buckley Aug 2021

Design And Simulation Of A Supervisory Control System For Hybrid Manufacturing, Michael Buckley

Masters Theses

The research teams of Dr. Bill Hamel, Dr. Bradley Jared and Dr. Tony Schmitz were tasked by the Office of Naval Research to create a hybrid manufacturing process for a reduced scale model of a naval ship propeller. The base structure of the propeller is created using Wire Arc Additive Manufacturing (WAAM), which is then scanned to compare created geometry to desired geometry. The propeller is then machined down to match the desired geometry. This process is iterated upon until the final product meets design tolerances. Due to the complex nature and numerous industrial machines used in the process, it …


A Secure Architecture For Defense Against Return Address Corruption, Grayson J. Bruner May 2021

A Secure Architecture For Defense Against Return Address Corruption, Grayson J. Bruner

Masters Theses

The advent of the Internet of Things has brought about a staggering level of inter-connectivity between common devices used every day. Unfortunately, security is not a high priority for developers designing these IoT devices. Often times the trade-off of security comes at too high of a cost in other areas, such as performance or power consumption. This is especially prevalent in resource-constrained devices, which make up a large number of IoT devices. However, a lack of security could lead to a cascade of security breaches rippling through connected devices. One of the most common attacks used by hackers is return …


Metric Learning Via Linear Embeddings For Human Motion Recognition, Byoungdoo Kong Dec 2020

Metric Learning Via Linear Embeddings For Human Motion Recognition, Byoungdoo Kong

Masters Theses

We consider the application of Few-Shot Learning (FSL) and dimensionality reduction to the problem of human motion recognition (HMR). The structure of human motion has unique characteristics such as its dynamic and high-dimensional nature. Recent research on human motion recognition uses deep neural networks with multiple layers. Most importantly, large datasets will need to be collected to use such networks to analyze human motion. This process is both time-consuming and expensive since a large motion capture database must be collected and labeled. Despite significant progress having been made in human motion recognition, state-of-the-art algorithms still misclassify actions because of characteristics …


Compound Effects Of Clock And Voltage Based Power Side-Channel Countermeasures, Jacqueline Lagasse Jul 2020

Compound Effects Of Clock And Voltage Based Power Side-Channel Countermeasures, Jacqueline Lagasse

Masters Theses

The power side-channel attack, which allows an attacker to derive secret information from power traces, continues to be a major vulnerability in many critical systems. Numerous countermeasures have been proposed since its discovery as a serious vulnerability, including both hardware and software implementations. Each countermeasure has its own drawback, with some of the highly effective countermeasures incurring large overhead in area and power. In addition, many countermeasures are quite invasive to the design process, requiring modification of the design and therefore additional validation and testing to ensure its accuracy. Less invasive countermeasures that do not require directly modifying the system …


Application And Evaluation Of Lighthouse Technology For Precision Motion Capture, Soumitra Sitole Oct 2018

Application And Evaluation Of Lighthouse Technology For Precision Motion Capture, Soumitra Sitole

Masters Theses

This thesis presents the development towards a system that can capture and quantify motion for applications in biomechanical and medical fields demanding precision motion tracking using the lighthouse technology. Commercially known as SteamVR tracking, the lighthouse technology is a motion tracking system developed for virtual reality applications that makes use of patterned infrared light sources to highlight trackers (objects embedded with photodiodes) to obtain their pose or spatial position and orientation. Current motion capture systems such as the camera-based motion capture are expensive and not readily available outside of research labs. This thesis provides a case for low-cost motion capture …


Analog Computing Using 1t1r Crossbar Arrays, Yunning Li Mar 2018

Analog Computing Using 1t1r Crossbar Arrays, Yunning Li

Masters Theses

Memristor is a novel passive electronic device and a promising candidate for new generation non-volatile memory and analog computing. Analog computing based on memristors has been explored in this study. Due to the lack of commercial electrical testing instruments for those emerging devices and crossbar arrays, we have designed and built testing circuits to implement analog and parallel computing operations. With the setup developed in this study, we have successfully demonstrated image processing functions utilizing large memristor crossbar arrays. We further designed and experimentally demonstrated the first memristor based field programmable analog array (FPAA), which was successfully configured for audio …


Magneto-Electric Approximate Computational Framework For Bayesian Inference, Sourabh Kulkarni Oct 2017

Magneto-Electric Approximate Computational Framework For Bayesian Inference, Sourabh Kulkarni

Masters Theses

Probabilistic graphical models like Bayesian Networks (BNs) are powerful artificial-intelligence formalisms, with similarities to cognition and higher order reasoning in the human brain. These models have been, to great success, applied to several challenging real-world applications. Use of these formalisms to a greater set of applications is impeded by the limitations of the currently used software-based implementations. New emerging-technology based circuit paradigms which leverage physical equivalence, i.e., operating directly on probabilities vs. introducing layers of abstraction, promise orders of magnitude increase in performance and efficiency of BN implementations, enabling networks with millions of random variables. While majority of applications with …


Oracle Guided Incremental Sat Solving To Reverse Engineer Camouflaged Circuits, Xiangyu Zhang Oct 2017

Oracle Guided Incremental Sat Solving To Reverse Engineer Camouflaged Circuits, Xiangyu Zhang

Masters Theses

This study comprises two tasks. The first is to implement gate-level circuit camouflage techniques. The second is to implement the Oracle-guided incremental de-camouflage algorithm and apply it to the camouflaged designs.

The circuit camouflage algorithms are implemented in Python, and the Oracle- guided incremental de-camouflage algorithm is implemented in C++. During this study, I evaluate the Oracle-guided de-camouflage tool (Solver, in short) performance by de-obfuscating the ISCAS-85 combinational benchmarks, which are camouflaged by the camouflage algorithms. The results show that Solver is able to efficiently de-obfuscate the ISCAS-85 benchmarks regardless of camouflaging style, and is able to do so 10.5x …


Explorations Into Machine Learning Techniques For Precipitation Nowcasting, Aditya Nagarajan Mar 2017

Explorations Into Machine Learning Techniques For Precipitation Nowcasting, Aditya Nagarajan

Masters Theses

Recent advances in cloud-based big-data technologies now makes data driven solutions feasible for increasing numbers of scientific computing applications. One such data driven solution approach is machine learning where patterns in large data sets are brought to the surface by finding complex mathematical relationships within the data. Nowcasting or short-term prediction of rainfall in a given region is an important problem in meteorology. In this thesis we explore the nowcasting problem through a data driven approach by formulating it as a machine learning problem.

State-of-the-art nowcasting systems today are based on numerical models which describe the physical processes leading to …


Variation Aware Placement For Efficient Key Generation Using Physically Unclonable Functions In Reconfigurable Systems, Shrikant S. Vyas Nov 2016

Variation Aware Placement For Efficient Key Generation Using Physically Unclonable Functions In Reconfigurable Systems, Shrikant S. Vyas

Masters Theses

With the importance of data security at its peak today, many reconfigurable systems are used to provide security. This protection is often provided by FPGA-based encrypt/decrypt cores secured with secret keys. Physical unclonable functions (PUFs) use random manufacturing variations to generate outputs that can be used in keys. These outputs are specific to a chip and can be used to create device-tied secret keys. Due to reliability issues with PUFs, key generation with PUFs typically requires error correction techniques. This can result in substantial hardware costs. Thus, the total cost of a $n$-bit key far exceeds just the cost of …


The Design And Validation Of A Wireless Bat-Mounted Sonar Recording System, Jeremy Joseph Langford Aug 2016

The Design And Validation Of A Wireless Bat-Mounted Sonar Recording System, Jeremy Joseph Langford

Masters Theses

Scientists studying the behavior of bats monitor their echolocation calls, as their calls are important for navigation and feeding, but scientist are typically restricted to ground-based recording. Recording bat calls used for echolocation from the back of the bat as opposed to the ground offers the opportunity to study bat echolocation from a vantage otherwise only offered to the bats themselves. However, designing a bat mounted in-flight audio recording system, (bat-tag), capable of recording the ultra-sound used in bat echolocation presents a unique set of challenges. Chiefly, the bat-tag must be sufficiently light weight as to not overburden the bat, …


A Haptic Surface Robot Interface For Large-Format Touchscreen Displays, Mark Price Jul 2016

A Haptic Surface Robot Interface For Large-Format Touchscreen Displays, Mark Price

Masters Theses

This thesis presents the design for a novel haptic interface for large-format touchscreens. Techniques such as electrovibration, ultrasonic vibration, and external braked devices have been developed by other researchers to deliver haptic feedback to touchscreen users. However, these methods do not address the need for spatial constraints that only restrict user motion in the direction of the constraint. This technology gap contributes to the lack of haptic technology available for touchscreen-based upper-limb rehabilitation, despite the prevalent use of haptics in other forms of robotic rehabilitation. The goal of this thesis is to display kinesthetic haptic constraints to the touchscreen user …


Processor Temperature And Reliability Estimation Using Activity Counters, Mayank Chhablani Mar 2016

Processor Temperature And Reliability Estimation Using Activity Counters, Mayank Chhablani

Masters Theses

With the advent of technology scaling lifetime reliability is an emerging threat in high-performance and deadline-critical systems. High on-chip thermal gradients accelerates localised thermal elevations (hotspots) which increases the aging rate of the semiconductor devices. As a result, reliable operation of the processors has become a challenging task. Therefore, cost effective schemes for estimating temperature and reliability are crucial. In this work we present a reliability estimation scheme that is based on a light-weight temperature estimation technique that monitors hardware events. Unlike previously pro- posed hardware counter-based approaches, our approach involves a linear-temporal-feedback estimator, taking into account the effects of …


Computer Aided Brain Tumor Edge Extraction Using Morphological Operations, Warqaa Shaher Alazawee Dec 2015

Computer Aided Brain Tumor Edge Extraction Using Morphological Operations, Warqaa Shaher Alazawee

Masters Theses

Detecting the precise boundary of the area containing a recognized brain tumor is a complex problem and must be addressed since it applies to many medical modalities and tumor types. The objective of this thesis is to provide an efficient algorithm for detecting edges of brain tumors to help neurosurgeons identify the border of the critical area and distinguish the precise margin of the tumor from the rest of the brain tissue during the surgery. This thesis work exploits MRI brain tumor images as a tool to aid surgeons. MRI image segmentation is an essential step as a preliminary process …


Dividing And Conquering Meshes Within The Nist Fire Dynamics Simulator (Fds) On Multicore Computing Systems, Donald Charles Collins Dec 2015

Dividing And Conquering Meshes Within The Nist Fire Dynamics Simulator (Fds) On Multicore Computing Systems, Donald Charles Collins

Masters Theses

The National Institute for Standards and Technology (NIST) Fire Dynamics Simulator (FDS) provides a computational fluid dynamics model of a fire, which can be visualized by using NIST Smokeview (SMV). Users must create a configuration file (*.fds) that describes the environment and other characteristics of the fire scene so that the FDS software can produce the output file (*.smv) needed for visualization.The processing can be computationally intensive, often taking between several minutes and several hours to complete. In many cases, a user will create a file that is not optimized for a multicore computing system. By dividing meshes within the …


An Integrated Framework For Cardiac Sounds Diagnosis, Zichun Tong Dec 2015

An Integrated Framework For Cardiac Sounds Diagnosis, Zichun Tong

Masters Theses

The Phonocardiogram (PCG) signal contains valuable information about the cardiac condition and is a useful tool in recognizing dysfunction and heart failure. By analyzing the PCG, early detection and diagnosis of heart diseases can be accomplished since many pathological conditions of the cardiovascular system cause murmurs or abnormal heart sounds. This thesis presents an algorithm to classify normal and abnormal heart sound signals using PCG. The proposed analysis is based on a framework composed of several statistical signal analysis techniques such as wavelet based de-noising, energy-based segmentation, Hilbert-Huang transform based feature extraction, and Support Vector Machine based classification. The MATLAB …


Design Of Digital Down Converter Chain For Software Defined Radio Systems On Fpga, Nagarjun Marappa Dec 2015

Design Of Digital Down Converter Chain For Software Defined Radio Systems On Fpga, Nagarjun Marappa

Masters Theses

Modern communication systems have increasingly attempted to trade off the digital signal processing for analog circuitry. In performing this tradeoff, advanced algorithms have been implemented in both custom programmable hardware and in software; such systems are commonly called Software Defined Radios (SDR). Advanced software defined radios consist of highly configurable hardware and computers used as digital signal processing (DSP) platforms that provide the technology for realizing current and future generations of digital wireless communication infrastructure. Many sophisticated signal processing tasks are performed in SDR, including compression algorithms, channel estimation, equalization, forward error correction and protocol management. This research has focused …


Morphology Based Framework For Improved Driver's Visibility In Inclement Weather Conditions, Saleem Farhood Hussein Dec 2015

Morphology Based Framework For Improved Driver's Visibility In Inclement Weather Conditions, Saleem Farhood Hussein

Masters Theses

The U.S. Department of Transportation reports that on average there are 5,870,000 vehicle accidents each year. Twenty-three percent (23%) of these accidents are attributed to weather conditions with an annual average of more than 6,000 people are killed and 480,000 people are injured. Weather-related accidents occur mainly because of the low visibility on the roads under inclement conditions such as snow, rain and fog. While these conditions can be predictable and individuals try to avoid driving in inclement weather, there are circumstances that require driving in such conditions such as emergency responders or when the severity of the storm has …


Design Of A New Digital Relay For Transmission Line Fault Detection, Classification And Localization Based On A New Composite Relay And Artificial Neural Network Approach, Ahmed Sabri Altaie Dec 2015

Design Of A New Digital Relay For Transmission Line Fault Detection, Classification And Localization Based On A New Composite Relay And Artificial Neural Network Approach, Ahmed Sabri Altaie

Masters Theses

This thesis focuses on new approach to detect, classify, and localize the fault in transmission line. Firstly, fault detection was carried out using the New Composite Relay (CR) which, has different characteristics and the ability to detect any type of fault including series faults. Secondly, fault classification was conducted using the Feed Forward Artificial Neural Network (FFANN). In addition, the fault classification led to the investigation of the best use of the FFANN. The data used come from MATLAB/SIMULINK three phase series compensated network. The results obtained using FFANN, were compared with the type of the fault that have been …


Implementation Of A Neuromorphic Development Platform With Danna, Jason Yen-Shen Chan Dec 2015

Implementation Of A Neuromorphic Development Platform With Danna, Jason Yen-Shen Chan

Masters Theses

Neuromorphic computing is the use of artificial neural networks to solve complex problems. The specialized computing field has been growing in interest during the past few years. Specialized hardware that function as neural networks can be utilized to solve specific problems unsuited for traditional computing architectures such as pattern classification and image recognition. However, these hardware platforms have neural network structures that are static, being limited to only perform a specific application, and cannot be used for other tasks. In this paper, the feasibility of a development platform utilizing a dynamic artificial neural network for researchers is discussed.


Signage Recognition Based Wayfinding System For The Visually Impaired, Abdullah Khalid Ahmed Dec 2015

Signage Recognition Based Wayfinding System For The Visually Impaired, Abdullah Khalid Ahmed

Masters Theses

Persons of visual impairment make up a growing segment of modern society. To cater to the special needs of these individuals, society ought to consider the design of special constructs to enable them to fulfill their daily necessities. This research proposes a new method for text extraction from indoor signage that will help persons of visual impairment maneuver in unfamiliar indoor environments, thus enhancing their independence and quality of life.

In this thesis, images are acquired through a video camera mounted on glasses of the walking person. Frames are then extracted and used in an integrated framework that applies Maximally …


Control Of Cation Ordering In Zinc Tin Nitride And In-Situ Monitoring Of Growth, Brian Christopher Durant Dec 2015

Control Of Cation Ordering In Zinc Tin Nitride And In-Situ Monitoring Of Growth, Brian Christopher Durant

Masters Theses

Semiconducting materials with a band gap around 1.5 eV are very much sought after due to their close match to the solar spectrum. However, some compounds that have shown promise for highly efficient solar cells contain rare, expensive, and sometimes toxic elements, such as indium and gallium. As such, a search for earth abundant materials has become more prominent recently. One such earth abundant semiconducting material that has garnered interest is ZnSnN2. It has been shown through previous studies that there is the possibility of continuously tuning the band gap between 1.0 and 2.0 eV by controlling the …


A High Performance Architecture For An Exact Match Short-Read Aligner Using Burrows-Wheeler Aligner On Fpgas, Dana Abdul Qader Dec 2015

A High Performance Architecture For An Exact Match Short-Read Aligner Using Burrows-Wheeler Aligner On Fpgas, Dana Abdul Qader

Masters Theses

Due to modern DNA sequencing technologies vast amount of short DNA sequences known as short-reads is generated. Biologists need to be able to align the short-reads to a reference genome to be able to make scientific use of the data. Fast and accurate short-read aligner programs are needed to keep up with the pace at which this data is generated. Field Programmable Gate Arrays have been widely used to accelerate many data-intensive bioinformatics applications.

Burrows-Wheeler Transform has been used in the theory of string matching which has led to the development of many short-read alignment programs. This thesis presents a …