Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Hardware Systems

PDF

2013

Institution
Keyword
Publication
Publication Type

Articles 1 - 26 of 26

Full-Text Articles in Computer Engineering

Situational Awareness/Triage Tool For Use In A Chemical, Biological, Radiological Nuclear Explosive (Cbrne) Environment, John N. Scarlett, Heather L. Gallup, David A. Smith Dec 2013

Situational Awareness/Triage Tool For Use In A Chemical, Biological, Radiological Nuclear Explosive (Cbrne) Environment, John N. Scarlett, Heather L. Gallup, David A. Smith

AFIT Patents

A method of managing patient care and emergency response following a Chemical, Biological, Radiological, or Nuclear Explosive (CBRNE) attack and maintaining compliance with the Health Insurance Portability and Accountability Act (HIPAA). The method including identifying each patient with a unique patient identifier, the identifier based upon the geospatial location of the patient, the geospatial location including at least the latitude and longitude of the patient when first treated, the unique patient identifier being part of patient data. Providing a collection point of patient data to form a patient data database where in the patient location data may be used to …


Testing Virtual Machines For Cadrc Server Hosting, Robin Verweij Dec 2013

Testing Virtual Machines For Cadrc Server Hosting, Robin Verweij

Computer Science and Software Engineering

No abstract provided.


Remote/Autonomous Sentry Gun Platform, Angelo Gagliardi, Dante Gagliardi Dec 2013

Remote/Autonomous Sentry Gun Platform, Angelo Gagliardi, Dante Gagliardi

Electrical Engineering

This senior project involves the complete system design and construction of a "Nerf" sentry gun to replace an armed guard. We aimed to develop a compact and highly mobile defense system that allows operational flexibility. The sentry gun can autonomously track and shoot at moving targets, while also allowing a user to remotely access and control the gun via computer. The mobility, hardiness, and functionality of this system allows a reliable replacement for human beings in harsh and hostile environments; ultimately sparing a life.


Design Of A Low Power Cargo Security Device Using A Micropower Ultra-Wideband Impulse Radar, Brian M. Wihl Dec 2013

Design Of A Low Power Cargo Security Device Using A Micropower Ultra-Wideband Impulse Radar, Brian M. Wihl

Master's Theses

Each year, thousands of cargo containers are broken into during shipping, costing billions of dollars in lost and damaged goods. In addition to removing its contents, intruders can also add unwanted and dangerous materials to a container, posing a threat to National Security. The possibilities of cargo container break-ins require that the containers go through check points at which they are physically searched. These searches often require the opening of the container, unloading and inspecting all cargo, and then loading the container and resealing it. This is a long and costly process.

Because of the high costs of break-ins and …


On High-Performance Parallel Fixed-Point Decimal Multiplier Designs, Ming Zhu Dec 2013

On High-Performance Parallel Fixed-Point Decimal Multiplier Designs, Ming Zhu

UNLV Theses, Dissertations, Professional Papers, and Capstones

High-performance, area-efficient hardware implementation of decimal multiplication is preferred to slow software simulations in a number of key scientific and financial application areas, where errors caused by converting decimal numbers into their approximate binary representations are not acceptable.

Multi-digit parallel decimal multipliers involve two major stages: (i) the partial product generation (PPG) stage, where decimal partial products are determined by selecting the right versions of the pre-computed multiples of the multiplicand, followed by (ii) the partial product accumulation (PPA) stage, where all the partial products are shifted and then added together to obtain the final multiplication product. In this thesis, …


Efficient Arithmetic For The Implementation Of Elliptic Curve Cryptography, Ebrahim Abdulrahman Hasan Abdulrahman Nov 2013

Efficient Arithmetic For The Implementation Of Elliptic Curve Cryptography, Ebrahim Abdulrahman Hasan Abdulrahman

Electronic Thesis and Dissertation Repository

The technology of elliptic curve cryptography is now an important branch in public-key based crypto-system. Cryptographic mechanisms based on elliptic curves depend on the arithmetic of points on the curve. The most important arithmetic is multiplying a point on the curve by an integer. This operation is known as elliptic curve scalar (or point) multiplication operation. A cryptographic device is supposed to perform this operation efficiently and securely. The elliptic curve scalar multiplication operation is performed by combining the elliptic curve point routines that are defined in terms of the underlying finite field arithmetic operations. This thesis focuses on hardware …


Vehicular Motion Sensor: Developing A Wide-Range Motion Sensing Alarm System, Joshua Isaacson Nov 2013

Vehicular Motion Sensor: Developing A Wide-Range Motion Sensing Alarm System, Joshua Isaacson

Senior Honors Theses

Vehicular safety has become a serious concern in recent years. Many drivers have difficulty backing out of parking spaces, especially when large trucks and sport utility vehicles block the peripheral view from smaller vehicles. This can lead to accidents and pedestrian injuries when drivers are unable to see or do not pay careful attention to their surroundings.

Vehicular motion sensor systems can alert drivers of approaching obstacles when attempting to back out of parking spaces with limited visibility. This thesis aims to explain the limitations of current systems and the research conducted by the author to develop a prototype for …


Digital Control Board For Phased Array Antenna Beam Steering In Adaptive Communication Applications, Mayur Bansal Nov 2013

Digital Control Board For Phased Array Antenna Beam Steering In Adaptive Communication Applications, Mayur Bansal

Master's Theses

The application of adaptive communication techniques for mobile communications has attracted considerable interest in the last decade. One example of these techniques is spatial filtering through planar antenna array beam forming.

This thesis describes the development of a digital system that adaptively controls a phased array antenna. The radiating structure of the phased antenna array is tetrahedral-shaped and contains four antenna elements on each of its three faces. The overall system comprises of a digital control board with an external computer interface, an RF control board, and the phased antenna array. The RF controls the main lobe direction on the …


Design Synthesis And Optimization Of Permanent Magnet Synchronous Machines Based On Computationally-Efficient Finite Element Analysis, Gennadi Sizov Oct 2013

Design Synthesis And Optimization Of Permanent Magnet Synchronous Machines Based On Computationally-Efficient Finite Element Analysis, Gennadi Sizov

Dissertations (1934 -)

In this dissertation, a model-based multi-objective optimal design of permanent magnet ac machines, supplied by sine-wave current regulated drives, is developed and implemented. The design procedure uses an efficient electromagnetic finite element-based solver to accurately model nonlinear material properties and complex geometric shapes associated with magnetic circuit design. Application of an electromagnetic finite element-based solver allows for accurate computation in intricate performance parameters and characteristics. The first contribution of this dissertation is the development of a rapid computational method that allows accurate and efficient exploration of large multi-dimensional design spaces in search of optimum design(s). The computationally efficient finite element-based …


Radio Frequency Based Programmable Logic Controller Anomaly Detection, Samuel J. Stone Sep 2013

Radio Frequency Based Programmable Logic Controller Anomaly Detection, Samuel J. Stone

Theses and Dissertations

The research goal involved developing improved methods for securing Programmable Logic Controller (PLC) devices against unauthorized entry and mitigating the risk of Supervisory Control and Data Acquisition (SCADA) attack by detecting malicious software and/or trojan hardware. A Correlation Based Anomaly Detection (CBAD) process was developed to enable 1) software anomaly detection discriminating between various operating conditions to detect malfunctioning or malicious software, firmware, etc., and 2) hardware component discrimination discriminating between various hardware components to detect malfunctioning or counterfeit, trojan, etc., components.


Feedback Stabilization At Spear3, Daniel Kelley, Jeff Corbett Aug 2013

Feedback Stabilization At Spear3, Daniel Kelley, Jeff Corbett

STAR Program Research Presentations

The SPEAR3 synchrotron lightsource at SLAC relies on a sophisticated radio frequency (RF) timing system to maintain current – electrons – in the storage ring. One problem SPEAR3 operators have dealt with is the thermal expansion of one of the cables supporting this RF timing system. As the cable expands and contracts with the diurnal rise and fall of the sun, the phase of the RF in the cable shifts. This shifting phase affects the timing accuracy of electron injections into the storage ring.

A common feedback control algorithm PID (Proportional Integral Derivative) has countless applications in engineering. PID feedback …


A Secure Reconfigurable System-On-Programmable-Chip Computer System, William Herbert Collins Aug 2013

A Secure Reconfigurable System-On-Programmable-Chip Computer System, William Herbert Collins

Masters Theses

A System-on-Programmable-Chip (SoPC) architecture is designed to meet two goals: to provide a role-based secure computing environment and to allow for user reconfiguration. To accomplish this, a secure root of trust is derived from a fixed architectural subsystem, known as the Security Controller. It additionally provides a dynamically configurable single point of access between applications developed by users and the objects those applications use. The platform provides a model for secrecy such that physical recovery of any one component in isolation does not compromise the system. Dual-factor authentication is used to verify users. A model is also provided for tamper …


Equivalence Checking For High-Assurance Behavioral Synthesis, Kecheng Hao Jun 2013

Equivalence Checking For High-Assurance Behavioral Synthesis, Kecheng Hao

Dissertations and Theses

The rapidly increasing complexities of hardware designs are forcing design methodologies and tools to move to the Electronic System Level (ESL), a higher abstraction level with better productivity than the state-of-the-art Register Transfer Level (RTL). Behavioral synthesis, which automatically synthesizes ESL behavioral specifications to RTL implementations, plays a central role in this transition. However, since behavioral synthesis is a complex and error-prone translation process, the lack of designers' confidence in its correctness becomes a major barrier to its wide adoption. Therefore, techniques for establishing equivalence between an ESL specification and its synthesized RTL implementation are critical to bring behavioral synthesis …


Bluelock: A Secure Bluetooth Operated Padlock, Trever Mckee Jun 2013

Bluelock: A Secure Bluetooth Operated Padlock, Trever Mckee

Computer Engineering

For this project a secure, battery operated, Bluetooth operated padlock was created. The project included both the hardware to integrate with a padlock and an Android application used to interface with the hardware. In order to make the padlock secure both AES encryption and challenge response authentication were used for secure message passing between the device and the Android phone. The project also included power consumption and sustainability tuning including exploring Arduino sleep states and integrating the project with a solar charging unit.


Motion Sensing Fifa Controller, Anthony Agius, Jake Troychak Jun 2013

Motion Sensing Fifa Controller, Anthony Agius, Jake Troychak

Computer Engineering

Our Project is designed to control the XBOX 360 video game FIFA Soccer by different kicking motions made by the user. This system consists of two pieces: the microcontroller attached to the XBOX 360 controller and the foot piece that is attached to the users foot in order to read all of the movements needed to control the game. Our project brings the soccer game to life by forcing the users to actually perform the different kicking motions that they want their game avatar to copy on the game. This project was designed for those who want to be more …


Motohud: Intelligent And Safe Navigational Data Presentation For Motorcyclists, Drew Bentz, William Budney Jun 2013

Motohud: Intelligent And Safe Navigational Data Presentation For Motorcyclists, Drew Bentz, William Budney

Computer Engineering

The system uses a GPS (Global Positioning System) sensor, Bluetooth modem, and OLED (organic light-emitting diode) screen to display navigational information to a motorcycle rider. Currently supported navigational information are speed and heading, with a framework in place for future turn-by-turn navigation. The system is powered by a lithium-ion battery pack and controlled by an Arduino Micro. For turn-by-turn navigation, an Android powered smartphone running our Android App is required. Our system aims to reduce safety hazards from having to tilt or move one’s head when trying to view speed on a motorcycle speedometer, which is usually mounted down by …


Design Of An Energy Efficient Virtual End Node Client Using Openadr2.0a And Smap, Kevin Navero Jun 2013

Design Of An Energy Efficient Virtual End Node Client Using Openadr2.0a And Smap, Kevin Navero

BioResource and Agricultural Engineering

Demand Response (DR) describes the set of actions taken to impose a reduction in electrical loads to stabilize the power grid and decrease costs. It is used when power grid emergencies or extremely high demand and congestion, threaten the electricity supply-demand balance. Automated Demand Response (ADR) describes a web-based control system that triggers DR events automatically by signaling other pre-programmed control systems. This project intends to use the OpenADR2.0 specifications provided by the OpenADR Alliance to construct an open source Virtual End Node (VEN) client to retrieve DR signals. The Simple Measurement and Actuation Profile (sMAP) software is also used …


The Visual Representation Of Sound For The Hearing Impaired, Jonathan Brophy Jun 2013

The Visual Representation Of Sound For The Hearing Impaired, Jonathan Brophy

Electrical Engineering

There are many difficulties that arise when one is faced with a hearing disability. New applications of advancing technology have the potential to enable designs capable of assisting the hearing impaired with the ability to see sound. This project seeks to provide a user with a visual representation of loud noises detected using small directional microphones. The microphones determine the location of the sound above a set decibel level and a microprocessor determines the approximate location of the sound source and displays a vertical colored bar on a video image in the direction of the noise using virtual reality glasses. …


Buddy: A Breathalyzer For Iphone, Douglas Blaalid, Brandon Bevans Jun 2013

Buddy: A Breathalyzer For Iphone, Douglas Blaalid, Brandon Bevans

Electrical Engineering

Buddy is a Breathalyzer for the iPhone designed to be more a product than a project. Through proprietary hardware and a custom iOS application, Buddy provides users with a previously untapped link from the alcohol in their body to the display on their phones. Buddy uses an alcohol sensor connected to an Arduino Uno to accurately detect the BAC of the user’s breath. The BAC is then transmitted to an iPhone via the headphone jack where it is displayed and logged in a captivating app. The finished prototype successfully measured the approximate BAC of intoxicated users. The product website has …


Towards A Filmic Look And Feel In Real Time Computer Graphics, Sherief Farouk May 2013

Towards A Filmic Look And Feel In Real Time Computer Graphics, Sherief Farouk

Electronic Theses and Dissertations

Film footage has a distinct look and feel that audience can instantly recognize, making its replication desirable for computer generated graphics. This thesis presents methods capable of replicating significant portions of the film look and feel while being able to fit within the constraints imposed by real-time computer generated graphics on consumer hardware.


File Carving And Malware Identification Algorithms Applied To Firmware Reverse Engineering, Karl A . Sickendick Mar 2013

File Carving And Malware Identification Algorithms Applied To Firmware Reverse Engineering, Karl A . Sickendick

Theses and Dissertations

Modern society depends on critical infrastructure (CI) managed by Programmable Logic Controllers (PLCs). PLCs depend on firmware, though firmware security vulnerabilities and contents remain largely unexplored. Attackers are acquiring the knowledge required to construct and install malicious firmware on CI. To the defender, firmware reverse engineering is a critical, but tedious, process. This thesis applies machine learning algorithms, from the le carving and malware identification fields, to firmware reverse engineering. It characterizes the algorithms' performance. This research describes and characterizes a process to speed and simplify PLC firmware analysis. The system partitions binary firmwares into segments, labels each segment with …


Design And Analysis Of A Small Form Factor Desktop Computer Enclosure, Curt Adkins Mar 2013

Design And Analysis Of A Small Form Factor Desktop Computer Enclosure, Curt Adkins

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Science and Technology at Morehead State University in partial fulfillment of the requirements for the Degree of Masters of Science Engineering Technology by Curt Adkins on March 13, 2013.


Low Cost Dynamic Architecture Adaptation Schemes For Drowsy Cache Management, Nitin Prakash Jan 2013

Low Cost Dynamic Architecture Adaptation Schemes For Drowsy Cache Management, Nitin Prakash

Masters Theses 1911 - February 2014

Energy consumption and speed of execution have long been recognized as conflicting requirements for processor design. In this work, we have developed a low-cost dynamic architecture adaptation scheme to save leakage power in caches. This design uses voltage scaling to implement drowsy caches. The importance of a dynamic scheme for managing drowsy caches, arises from the fact that not only does cache behavior change from one application to the next, but also during different phases of execution within the same application. We discuss various implementations of our scheme that provide a tradeoff between granularity of control and design complexity. …


Design Of An Open-Source Sata Core For Virtex-4 Fpgas, Cory Gorman Jan 2013

Design Of An Open-Source Sata Core For Virtex-4 Fpgas, Cory Gorman

Masters Theses 1911 - February 2014

Many hard drives manufactured today use the Serial ATA (SATA) protocol to communicate with the host machine, typically a PC. SATA is a much faster and much more robust protocol than its predecessor, ATA (also referred to as Parallel ATA or IDE). Many hardware designs, including those using Field-Programmable Gate Arrays (FPGAs), have a need for a long-term storage solution, and a hard drive would be ideal. One such design is the high-speed Data Acquisition System (DAS) created for the NASA Surface Water and Ocean Topography mission. This system utilizes a Xilinx Virtex-4 FPGA. Although the DAS includes a SATA …


A New Simplified Federated Single Sign-On System, Chen Liang Jan 2013

A New Simplified Federated Single Sign-On System, Chen Liang

Masters

The work presented in this MPhil thesis addresses this challenge by developing a new simplified FSSO system that allows end-users to access desktop systems, web-based services/applications and non-web based services/applications using one authentication process. This new system achieves this using two major components: an “Authentication Infrastructure Integration Program (AIIP)" and an “Integration of Desktop Authentication and Web-based Authentication (IDAWA)." The AIIP acquires Kerberos tickets (for end-users who have been authenticated by a Kerberos single sign-on system in one net- work domain) from Kerberos single sign-on systems in different network domains without establishing trust between these Kerberos single sign-on systems. The …


Design And Practical Implementation Of A Simple Data Acquisition System For Photovoltaic Applications, Dr. Adel A. Elbaset Dec 2012

Design And Practical Implementation Of A Simple Data Acquisition System For Photovoltaic Applications, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

There are several commercial systems for testing PV modules under field conditions but they are expensive. This paper presents a design and implementation of a simple, low cost and high efficient data acquisition system for testing the photovoltaic modules under different operating conditions (different solar radiation levels and surface temperatures). It has been designed to be the laboratory basic element for the photovoltaic generators characterization. This data acquisition system is designed to acquire and then records the signals from the different sensors that are used for measuring the different parameters of the PV system. These measurements of the different parameter …