Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- FPGA (2)
- Algorithm (1)
- Bowel Sounds (1)
- Control System (1)
- Deep Learning (1)
-
- Development Platform (1)
- Distribution (1)
- Disturbance (1)
- Embedded (1)
- FDS (1)
- Fire Protection Engineering (1)
- Hardware Security (1)
- Hpc (1)
- Hybrid Manufacturing (1)
- Image Processing (1)
- Insulin Pump (1)
- IoT (1)
- LabVIEW (1)
- Low power (1)
- Medical Device (1)
- Neural Networks (1)
- Neuromorphic Computing (1)
- Neuroscience-Inspired Architectures (1)
- PLC (1)
- Pattern Recognition (1)
- Pattern recognition (1)
- Power system (1)
- Psoc (1)
- RISC-V (1)
- Return-Oriented-Programming (1)
Articles 1 - 10 of 10
Full-Text Articles in Computer Engineering
Evaluation Of Robust Deep Learning Pipelines Targeting Low Swap Edge Deployment, David Carter Cornett
Evaluation Of Robust Deep Learning Pipelines Targeting Low Swap Edge Deployment, David Carter Cornett
Masters Theses
The deep learning technique of convolutional neural networks (CNNs) has greatly advanced the state-of-the-art for computer vision tasks such as image classification and object detection. These solutions rely on large systems leveraging wattage-hungry GPUs to provide the computational power to achieve such performance. However, the size, weight and power (SWaP) requirements of these conventional GPU-based deep learning systems are not suitable when a solution requires deployment to so called "Edge" environments such as autonomous vehicles, unmanned aerial vehicles (UAVs) and smart security cameras.
The objective of this work is to benchmark FPGA-based alternatives to conventional GPU systems that have the …
Design And Simulation Of A Supervisory Control System For Hybrid Manufacturing, Michael Buckley
Design And Simulation Of A Supervisory Control System For Hybrid Manufacturing, Michael Buckley
Masters Theses
The research teams of Dr. Bill Hamel, Dr. Bradley Jared and Dr. Tony Schmitz were tasked by the Office of Naval Research to create a hybrid manufacturing process for a reduced scale model of a naval ship propeller. The base structure of the propeller is created using Wire Arc Additive Manufacturing (WAAM), which is then scanned to compare created geometry to desired geometry. The propeller is then machined down to match the desired geometry. This process is iterated upon until the final product meets design tolerances. Due to the complex nature and numerous industrial machines used in the process, it …
A Secure Architecture For Defense Against Return Address Corruption, Grayson J. Bruner
A Secure Architecture For Defense Against Return Address Corruption, Grayson J. Bruner
Masters Theses
The advent of the Internet of Things has brought about a staggering level of inter-connectivity between common devices used every day. Unfortunately, security is not a high priority for developers designing these IoT devices. Often times the trade-off of security comes at too high of a cost in other areas, such as performance or power consumption. This is especially prevalent in resource-constrained devices, which make up a large number of IoT devices. However, a lack of security could lead to a cascade of security breaches rippling through connected devices. One of the most common attacks used by hackers is return …
The Design And Validation Of A Wireless Bat-Mounted Sonar Recording System, Jeremy Joseph Langford
The Design And Validation Of A Wireless Bat-Mounted Sonar Recording System, Jeremy Joseph Langford
Masters Theses
Scientists studying the behavior of bats monitor their echolocation calls, as their calls are important for navigation and feeding, but scientist are typically restricted to ground-based recording. Recording bat calls used for echolocation from the back of the bat as opposed to the ground offers the opportunity to study bat echolocation from a vantage otherwise only offered to the bats themselves. However, designing a bat mounted in-flight audio recording system, (bat-tag), capable of recording the ultra-sound used in bat echolocation presents a unique set of challenges. Chiefly, the bat-tag must be sufficiently light weight as to not overburden the bat, …
Dividing And Conquering Meshes Within The Nist Fire Dynamics Simulator (Fds) On Multicore Computing Systems, Donald Charles Collins
Dividing And Conquering Meshes Within The Nist Fire Dynamics Simulator (Fds) On Multicore Computing Systems, Donald Charles Collins
Masters Theses
The National Institute for Standards and Technology (NIST) Fire Dynamics Simulator (FDS) provides a computational fluid dynamics model of a fire, which can be visualized by using NIST Smokeview (SMV). Users must create a configuration file (*.fds) that describes the environment and other characteristics of the fire scene so that the FDS software can produce the output file (*.smv) needed for visualization.The processing can be computationally intensive, often taking between several minutes and several hours to complete. In many cases, a user will create a file that is not optimized for a multicore computing system. By dividing meshes within the …
Implementation Of A Neuromorphic Development Platform With Danna, Jason Yen-Shen Chan
Implementation Of A Neuromorphic Development Platform With Danna, Jason Yen-Shen Chan
Masters Theses
Neuromorphic computing is the use of artificial neural networks to solve complex problems. The specialized computing field has been growing in interest during the past few years. Specialized hardware that function as neural networks can be utilized to solve specific problems unsuited for traditional computing architectures such as pattern classification and image recognition. However, these hardware platforms have neural network structures that are static, being limited to only perform a specific application, and cannot be used for other tasks. In this paper, the feasibility of a development platform utilizing a dynamic artificial neural network for researchers is discussed.
Statistical Analysis Of Disturbances In Power Transmission Systems, Liu Liu
Statistical Analysis Of Disturbances In Power Transmission Systems, Liu Liu
Masters Theses
Disturbance analysis is essential to the study of the power transmission systems. Traditionally, disturbances are described as megawatt (MW) events, but the access to data is inefficient due to the slow installation and authorization process of the monitoring device. In this paper, we propose a novel approach to disturbance analysis conducted at the distribution level by exploiting the frequency recordings from Frequency Disturbance Recorders (FDRs) of the Frequency Monitoring Network (FNET/GridEye), based on the relationship between frequency change and the power loss of disturbances - linearly associated by the Frequency Response. We first analyze the real disturbance records of North …
Improved Forensic Medical Device Security Through Eating Detection, Nathan Lee Henry
Improved Forensic Medical Device Security Through Eating Detection, Nathan Lee Henry
Masters Theses
Patients are increasingly reliant on implantable medical device systems today. For patients with diabetes, an implantable insulin pump system or artificial pancreas can greatly improve quality of life. As with any device, these devices can and do suffer from software and hardware issues, often reported as a safety event. For a forensic investigator, a safety event is indistinguishable from a potential security event. In this thesis, we show a new sensor system that can be transparently integrated into existing and future electronic diabetes therapy systems while providing additional forensic data to help distinguish between safety and security events. We demonstrate …
A Secure Reconfigurable System-On-Programmable-Chip Computer System, William Herbert Collins
A Secure Reconfigurable System-On-Programmable-Chip Computer System, William Herbert Collins
Masters Theses
A System-on-Programmable-Chip (SoPC) architecture is designed to meet two goals: to provide a role-based secure computing environment and to allow for user reconfiguration. To accomplish this, a secure root of trust is derived from a fixed architectural subsystem, known as the Security Controller. It additionally provides a dynamically configurable single point of access between applications developed by users and the objects those applications use. The platform provides a model for secrecy such that physical recovery of any one component in isolation does not compromise the system. Dual-factor authentication is used to verify users. A model is also provided for tamper …
An Fpga Based Implementation Of The Exact Stochastic Simulation Algorithm, Phani Bharadwaj Vanguri
An Fpga Based Implementation Of The Exact Stochastic Simulation Algorithm, Phani Bharadwaj Vanguri
Masters Theses
Mathematical and statistical modeling of biological systems is a desired goal for many years. Many biochemical models are often evaluated using a deterministic approach, which uses differential equations to describe the chemical interactions. However, such an approach is inaccurate for small species populations as it neglects the discrete representation of population values, presents the possibility of negative populations, and does not represent the stochastic nature of biochemical systems. The Stochastic Simulation Algorithm (SSA) developed by Gillespie is able to properly account for these inherent noise fluctuations. Due to the stochastic nature of the Monte Carlo simulations, large numbers of simulations …