Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Hardware Systems

PDF

2021

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 38

Full-Text Articles in Computer Engineering

Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao Dec 2021

Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao

Posters-at-the-Capitol

Gaze tracking has become an established technology that enables using an individual’s gaze as an input signal to support a variety of applications in the context of Human-Computer Interaction. Gaze tracking primarily relies on sensing devices such as infrared (IR) cameras. Nevertheless, in the recent years, several attempts have been realized at detecting gaze by acquiring and processing images acquired from standard RGB cameras. Nowadays, there are only a few publicly available open-source libraries and they have not been tested extensively. In this paper, we present the result of a comparative analysis that studied a commercial eye-tracking device using IR …


Enhanced Security Utilizing Side Channel Data Analysis, Michael Taylor Dec 2021

Enhanced Security Utilizing Side Channel Data Analysis, Michael Taylor

Computer Science and Engineering Theses and Dissertations

The physical state of a system is affected by the activities and processes in which it is tasked with carrying out. In the past there have been many instances where such physical changes have been exploited by bad actors in order to gain insight into the operational state and even the data being held on a system. This method of side channel exploitation is very often effective due to the relative difficulty of obfuscating activity on a physical level. However, in order to take advantage of side channel data streams one must have a detailed working knowledge of how a …


Autonomous Control And Signal Acquisition System, Rion Cadell Krampe Dec 2021

Autonomous Control And Signal Acquisition System, Rion Cadell Krampe

Honors College Theses

Our goal is to continue a previous teams project to build a NDE autonomous control and signal acquisition system that is more precise, more customizable with both code and mechanical parts, and cheaper than a similar system bought by the school. This goal has two stages to it. First, to repair the system from considerable damage it received during transportation. Secondly, to continue designing and developing the system to make considerable progress towards the goal of a fully functional NDE system. Along with making progress we must consider the team after us and create an easy stepping off point for …


Design, Development, And Testing Of Embedded Computing On Afit's Control & Autonomy Space Proximity Robot (Caspr), Collin A. Gwaltney Dec 2021

Design, Development, And Testing Of Embedded Computing On Afit's Control & Autonomy Space Proximity Robot (Caspr), Collin A. Gwaltney

Theses and Dissertations

This thesis reviews RPO algorithm testbeds and discusses the development of the Control and Autonomy Space proximity Robot (CASpR) kinematic testbed housed at the Air Force Institute of Technology (AFIT). CASpR operates on a rail system to propagate the trajectories of two satellites using the Hill-Clohessy-Wiltshire (HCW) Equations of Motion (EOMs). In this study, the implementation of a Jetson TX2i as an onboard flight computer is discussed and accomplished. Each hardware component used in the process of adding embedded computing as well as the software and paths of communication are all discussed in detail. Tests are conducted to assess the …


Autonomous Control And Signal Acquisition System, Rion Krampe Nov 2021

Autonomous Control And Signal Acquisition System, Rion Krampe

Scholars Week

Dr. Bunget has an autonomous control and signal acquisition system that he wants to be repaired and improved upon. This requires that we identify the current issues with the system and repair them as well as make innovations to the system to meet customer needs. The position control needs to be autonomous, and the acquisition of the oscilloscope signal and the transducer position needs to be synchronous. The user should be able to control the position, speed, and how often the signals are captured. The waveform of the scan should be appended into a spreadsheet. The system code also needs …


Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne Oct 2021

Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

Everyone knows what package shipping is, but not everyone knows what warshipping is. Corporate mailrooms are rarely considered as part of the cybersecurity attack surface of most organizations, but they offer physical access to millions of uninspected packages daily. UPS shipped 5.5 billion items last year, with their daily average being 21.9 million items and operating through 1,800 locations in 2020. FedEx shipped 6.5 million packages daily and operates 2,150 locations. The United States Postal Service delivered 143 billion pieces of mail in 2019. Increasingly the world’s consumers are relying on e-commerce, and during the recent COVID-19 pandemic, package deliveries …


Using A Light-Based Power Source To Defeat Power Analysis Attacks, Remus Valentin Tumac Oct 2021

Using A Light-Based Power Source To Defeat Power Analysis Attacks, Remus Valentin Tumac

Computer Science and Engineering Theses and Dissertations

Power analysis attacks exploit the correlation between the information processed by an electronic system and the power consumption of the system. By powering an electronic system with an optical power source, we can prevent meaningful information from being leaked to the power pins and captured in power traces. The relatively constant current draw of the optical power source hides any variability in the power consumption of the target system caused by the logic gates' switching activity of the system as observed at the power pins. This thesis will provide evidence to show that using an optical power source should make …


Physically Unclonable Characteristics For Verification Of Transmon-Based Quantum Computers, Leleia A. Hsia Sep 2021

Physically Unclonable Characteristics For Verification Of Transmon-Based Quantum Computers, Leleia A. Hsia

Theses and Dissertations

Future national security can be strengthened by verifying and securing the quantum computing supply chain. This dissertation proposes physically unclonable characteristics (PUCs), a method of quantum hardware verification inspired by classical physically unclonable functions, for future application to quantum processors implemented with transmon qubits. Qualitative and quantitative analysis is provided on the development of PUCs, including identifying qubit characteristics and qubit discrimination methods suitable for PUCs. Characteristics tested on IBM Quantum services include T1 and T2 coherence times, single-qubit and multi-qubit gate error rates, readout error rates, quantum process tomography metrics, and random benchmarking metrics. Results show that non-parametric qubit …


Toward Reliable And Efficient Message Passing Software For Hpc Systems: Fault Tolerance And Vector Extension, Dong Zhong Aug 2021

Toward Reliable And Efficient Message Passing Software For Hpc Systems: Fault Tolerance And Vector Extension, Dong Zhong

Doctoral Dissertations

As the scale of High-performance Computing (HPC) systems continues to grow, researchers are devoted themselves to achieve the best performance of running long computing jobs on these systems. My research focus on reliability and efficiency study for HPC software.

First, as systems become larger, mean-time-to-failure (MTTF) of these HPC systems is negatively impacted and tends to decrease. Handling system failures becomes a prime challenge. My research aims to present a general design and implementation of an efficient runtime-level failure detection and propagation strategy targeting large-scale, dynamic systems that is able to detect both node and process failures. Using multiple overlapping …


Signal Fingerprinting And Machine Learning Framework For Uav Detection And Identification., Olusiji Oloruntobi Medaiyese Aug 2021

Signal Fingerprinting And Machine Learning Framework For Uav Detection And Identification., Olusiji Oloruntobi Medaiyese

Electronic Theses and Dissertations

Advancement in technology has led to creative and innovative inventions. One such invention includes unmanned aerial vehicles (UAVs). UAVs (also known as drones) are now an intrinsic part of our society because their application is becoming ubiquitous in every industry ranging from transportation and logistics to environmental monitoring among others. With the numerous benign applications of UAVs, their emergence has added a new dimension to privacy and security issues. There are little or no strict regulations on the people that can purchase or own a UAV. For this reason, nefarious actors can take advantage of these aircraft to intrude into …


Hardware Acceleration In Image Stitching: Gpu Vs Fpga, Joshua David Edgcombe Jul 2021

Hardware Acceleration In Image Stitching: Gpu Vs Fpga, Joshua David Edgcombe

Masters Theses

Image stitching is a process where two or more images with an overlapping field of view are combined. This process is commonly used to increase the field of view or image quality of a system. While this process is not particularly difficult for modern personal computers, hardware acceleration is often required to achieve real-time performance in low-power image stitching solutions. In this thesis, two separate hardware accelerated image stitching solutions are developed and compared. One solution is accelerated using a Xilinx Zynq UltraScale+ ZU3EG FPGA and the other solution is accelerated using an Nvidia RTX 2070 Super GPU. The image …


Inventory Locating With Quuppa: The Design And Development Of A Real-Time Process Monitoring Web Application Solution, Dylan C. Moreland, Trevor J. Howell, John W. Takiff, Patrick S. Dillon, Theo E. Fritz, William K. Mcintyre Jun 2021

Inventory Locating With Quuppa: The Design And Development Of A Real-Time Process Monitoring Web Application Solution, Dylan C. Moreland, Trevor J. Howell, John W. Takiff, Patrick S. Dillon, Theo E. Fritz, William K. Mcintyre

Industrial and Manufacturing Engineering

Viasat, Inc. requires precise inventory tracking at their production facility in San Diego, CA. Viasat has installed the Quuppa indoor real-time locating system (RTLS), which it uses to track the real-time position of high-value work-in-process items. In its current state, the system only displays in-the-moment location information, with no available functionality for storing historical data for review, analysis, or visualization. In addition, the data displayed is noisy and prone to significant random error. This paper provides an overview of RTLS methods and technologies, assesses alternative solutions to Viasat’s issue, demonstrates our RTLS integrated web app solution, analyzes its impact, and …


A Method For Monitoring Operating Equipment Effectiveness With The Internet Of Things And Big Data, Carl D. Hays Iii Jun 2021

A Method For Monitoring Operating Equipment Effectiveness With The Internet Of Things And Big Data, Carl D. Hays Iii

Master's Theses

The purpose of this paper was to use the Overall Equipment Effectiveness productivity formula in plant manufacturing and convert it to measuring productivity for forklifts. Productivity for a forklift was defined as being available and picking up and moving containers at port locations in Seattle and Alaska. This research uses performance measures in plant manufacturing and applies them to mobile equipment in order to establish the most effective means of analyzing reliability and productivity. Using the Internet of Things to collect data on fifteen forklift trucks in three different locations, this data was then analyzed over a six-month period to …


Online Laboratory Course Using Low Tech Supplies To Introduce Digital Logic Design Concepts, Dhanya Nair Jun 2021

Online Laboratory Course Using Low Tech Supplies To Introduce Digital Logic Design Concepts, Dhanya Nair

Engineering Faculty Articles and Research

This paper describes a Digital Logic Design Laboratory Course developed to engage students with hardware systems within an online setting. This is a junior level core course for students from Computer Science (CS), Computer Engineering (CE) and Electrical Engineering (EE). Hence, the laboratories are designed to provide the hands-on experience of breadboarding, testing and debugging essential to CE and EE while accommodating CS students with no prior hardware experience. Commercially available low-cost electronic trainers (portable workstations) are loaned to the students in addition to basic electronic components. To ensure a strong foundation in debugging, prior to utilizing these workstations, students …


Bibliometric Review On Iot Based System For Remote Downloading On Microcontroller, Arundhati Bandopadhyaya Ms., Diya Dodwad Ms., Diviyanshi Gupta Ms., Surya Koyyana Mr., Parag Narkhede Mr., Shripad Deshpande Mr. Jun 2021

Bibliometric Review On Iot Based System For Remote Downloading On Microcontroller, Arundhati Bandopadhyaya Ms., Diya Dodwad Ms., Diviyanshi Gupta Ms., Surya Koyyana Mr., Parag Narkhede Mr., Shripad Deshpande Mr.

Library Philosophy and Practice (e-journal)

Working with sensors has become an area of expertise within the domain of electronic engineering. On a day to day basis, thousands of sensors are put to use around us, for instance, in smoke alarms, speedometers, motors, computers, radiators etc. to accumulate sensor data, cables that connect the sensors to the bottom station after which the information is worked on. But cabling is often expensive especially when handling large scale industrial applications [5]. For an equivalent reason, low-cost wireless networks came into the picture recently and are in high demand. A research paper we found during our review of …


Malicious Hardware & Its Effects On Industry, Gustavo Perez May 2021

Malicious Hardware & Its Effects On Industry, Gustavo Perez

Computer Science and Computer Engineering Undergraduate Honors Theses

In recent years advancements have been made in computer hardware security to circumnavigate the threat of malicious hardware. Threats come in several forms during the development and overall life cycle of computer hardware and I aim to highlight those key points. I will illustrate the various ways in which attackers exploit flaws in a chip design, or how malicious parties take advantage of the many steps required to design and fabricate hardware. Due to these exploits, the industry and consumers have suffered damages in the form of financial loss, physical harm, breaches of personal data, and a multitude of other …


Demo Abstract: Porting And Execution Of Anomalies Detection Models On Embedded Systems In Iot, Bharath Sudharsan, Pankesh Patel, Abdul Wahid, Muhammad Yahya, John G. Breslin, Muhammad Intizar Ali May 2021

Demo Abstract: Porting And Execution Of Anomalies Detection Models On Embedded Systems In Iot, Bharath Sudharsan, Pankesh Patel, Abdul Wahid, Muhammad Yahya, John G. Breslin, Muhammad Intizar Ali

Publications

In the Industry 4.0 era, Microcontrollers (MCUs) based tiny embedded sensor systems have become the sensing paradigm to interact with the physical world. In 2020, 25.6 billion MCUs were shipped, and over 250 billion MCUs are already operating in the wild. Such low-power, low-cost MCUs are being used as the brain to control diverse applications and soon will become the global digital nervous system. In an Industrial IoT setup, such tiny MCU-based embedded systems are equipped with anomaly detection models and mounted on production plant machines for monitoring the machine’s health/condition. These models process the machine’s health data (from temperature, …


A Secure Architecture For Defense Against Return Address Corruption, Grayson J. Bruner May 2021

A Secure Architecture For Defense Against Return Address Corruption, Grayson J. Bruner

Masters Theses

The advent of the Internet of Things has brought about a staggering level of inter-connectivity between common devices used every day. Unfortunately, security is not a high priority for developers designing these IoT devices. Often times the trade-off of security comes at too high of a cost in other areas, such as performance or power consumption. This is especially prevalent in resource-constrained devices, which make up a large number of IoT devices. However, a lack of security could lead to a cascade of security breaches rippling through connected devices. One of the most common attacks used by hackers is return …


Non-Volatile Memory Adaptation In Asynchronous Microcontroller For Low Leakage Power And Fast Turn-On Time, Jean Pierre Thierry Habimana May 2021

Non-Volatile Memory Adaptation In Asynchronous Microcontroller For Low Leakage Power And Fast Turn-On Time, Jean Pierre Thierry Habimana

Graduate Theses and Dissertations

This dissertation presents an MSP430 microcontroller implementation using Multi-Threshold NULL Convention Logic (MTNCL) methodology combined with an asynchronous non-volatile magnetic random-access-memory (RAM) to achieve low leakage power and fast turn-on. This asynchronous non-volatile RAM is designed with a Spin-Transfer Torque (STT) memory device model and CMOS transistors in a 65 nm technology. A self-timed Quasi-Delay-Insensitive 1 KB STT RAM is designed with an MTNCL interface and handshaking protocol. A replica methodology is implemented to handle write operation completion detection for long state-switching delays of the STT memory device. The MTNCL MSP430 core is integrated with the STT RAM to create …


Cognitive Digital Twins For Smart Manufacturing, Muhammad Intizar Ali, Pankesh Patel, John G. Breslin, Ramy Harik, Amit Sheth Apr 2021

Cognitive Digital Twins For Smart Manufacturing, Muhammad Intizar Ali, Pankesh Patel, John G. Breslin, Ramy Harik, Amit Sheth

Publications

Smart manufacturing or Industry 4.0, a trend initiated a decade ago, aims to revolutionize traditional manufacturing using technology-driven approaches. Modern digital technologies such as the Industrial Internet of Things (IIoT), Big Data Analytics, Augmented/Virtual Reality, and Artificial Intelligence (AI) are the key enablers of new smart manufacturing approaches. The digital twin is an emerging concept whereby a digital replica can be built of any physical object. Digital twins are becoming mainstream; many organizations have started to rely on digital twins to monitor, analyze, and simulate physical assets and processes. The current use of digital twins for smart manufacturing is largely …


Side Channel Attack Counter Measure Using A Moving Target Architecture, Jithin Joseph Apr 2021

Side Channel Attack Counter Measure Using A Moving Target Architecture, Jithin Joseph

Electrical and Computer Engineering ETDs

A novel countermeasure to side-channel power analysis attacks called Side-channel Power analysis Resistance for Encryption Algorithms using DPR or SPREAD is investigated in this thesis. The countermeasure leverages a strategy that is best characterized as a moving target architecture. Modern field programmable gate arrays (FPGA) architectures provide support for dynamic partial reconfiguration (DPR), a feature that allows real-time reconfiguration of the programmable logic (PL). The moving target architecture proposed in this work leverages DPR to implement a power analysis countermeasure to side-channel attacks, the most common of which are referred to as differential power analysis (DPA) and correlation power analysis …


Machine Learning Meets Internet Of Things: From Theory To Practice, Bharath Sudharsan, Pankesh Patel Apr 2021

Machine Learning Meets Internet Of Things: From Theory To Practice, Bharath Sudharsan, Pankesh Patel

Publications

Standalone execution of problem-solving Artificial Intelligence (AI) on IoT devices produces a higher level of autonomy and privacy. This is because the sensitive user data collected by the devices need not be transmitted to the cloud for inference. The chipsets used to design IoT devices are resource-constrained due to their limited memory footprint, fewer computation cores, and low clock speeds. These limitations constrain one from deploying and executing complex problem-solving AI (usually an ML model) on IoT devices. Since there is a high potential for building intelligent IoT devices, in this tutorial, we teach researchers and developers; (i) How to …


Addressing Security Challenges In Embedded Systems And Multi-Tenant Fpgas, Georgios Provelengios Apr 2021

Addressing Security Challenges In Embedded Systems And Multi-Tenant Fpgas, Georgios Provelengios

Doctoral Dissertations

Embedded systems and field-programmable gate arrays (FPGAs) have become crucial parts of the infrastructure that supports our modern technological world. Given the multitude of threats that are present, the need for secure computing systems is undeniably greater than ever. Embedded systems and FPGAs are governed by characteristics that create unique security challenges and vulnerabilities. Despite their array of uses, embedded systems are often built with modest microprocessors that do not support the conventional security solutions used by workstations, such as virus scanners. In the first part of this dissertation, a microprocessor defense mechanism that uses a hardware monitor to protect …


Modern Methods Of Testing And Information Security Problems In Iot, Halim Khujamatov, Ernazar Reypnazarov, Amir Lazarev Apr 2021

Modern Methods Of Testing And Information Security Problems In Iot, Halim Khujamatov, Ernazar Reypnazarov, Amir Lazarev

Bulletin of TUIT: Management and Communication Technologies

This article analyzes the technology of the internet of things, ie its architecture, communication standards, threats to security and safety, methods and types of testing devices of the internet of things. In short, the architectures proposed by ITU-T and IWF, IEEE standards for Internet of Things, LPWAN standards, four levels of security (devices/gateways, network/transport, services and applications), components according to test methods, performance, loading, security, etc.


Ez-Translate, Mason D. Beattie Apr 2021

Ez-Translate, Mason D. Beattie

Honors Theses

This report describes the EZ-Translate Software that was designed and developed by Mason Beattie for the CSCI495-D1 Honors Capstone Project and Course at Coastal Carolina University. This project is built from Java and is designed for the Windows 10 operating system. While running it displays or hides a translation menu when the designated key binds are pressed. Translations supported include select phrases from English, German, and Russian. The application also provides localization support for these three languages. The overall goal of this project to provide translation services while within another application was successfully achieved. The application utilizes an open-source Java …


Low-Cost Hardware-In-The-Loop (Hil) Simulator For Simulation And Analysis Of Embedded Systems With Non-Real-Time Applications, Chanuka S. Elvitigala Mar 2021

Low-Cost Hardware-In-The-Loop (Hil) Simulator For Simulation And Analysis Of Embedded Systems With Non-Real-Time Applications, Chanuka S. Elvitigala

LSU Master's Theses

Hardware-In-the-Loop (HIL) simulation is an approach that is used for embedded systems testing which was popular in the early days of embedded systems. This technology was wrapped and was stored away for a long time. One of the main reasons is that the less use of embedded systems in society. Recent developments in embedded systems, data science, and control systems lead to a focus on testing these systems. The earliest method of testing these systems was by doing destructive testing which is a waste of money, resources, and time. The HIL provided a safe and economical way of testing the …


On-Device Deep Learning Inference For System-On-Chip (Soc) Architectures, Tom Springer, Elia Eiroa-Lledo, Elizabeth Stevens, Erik Linstead Mar 2021

On-Device Deep Learning Inference For System-On-Chip (Soc) Architectures, Tom Springer, Elia Eiroa-Lledo, Elizabeth Stevens, Erik Linstead

Engineering Faculty Articles and Research

As machine learning becomes ubiquitous, the need to deploy models on real-time, embedded systems will become increasingly critical. This is especially true for deep learning solutions, whose large models pose interesting challenges for target architectures at the “edge” that are resource-constrained. The realization of machine learning, and deep learning, is being driven by the availability of specialized hardware, such as system-on-chip solutions, which provide some alleviation of constraints. Equally important, however, are the operating systems that run on this hardware, and specifically the ability to leverage commercial real-time operating systems which, unlike general purpose operating systems such as Linux, can …


Reduced Multiplicative Complexity Discrete Cosine Transform (Dct) Circuitry, Sirani Kanchana Mututhanthrige Perera Jan 2021

Reduced Multiplicative Complexity Discrete Cosine Transform (Dct) Circuitry, Sirani Kanchana Mututhanthrige Perera

Publications

System and techniques for reduced multiplicative complex­ity discrete cosine transform (DCT) circuitry are described herein. An input data set can be received and, upon the input data set, a self-recursive DCT technique can be performed to produce a transformed data set. Here, the self-recursive DCT technique is based on a product of factors of a specified type of DCT technique. Recursive components of the technique are of the same DCT type as that of the DCT technique. The transformed data set can then be produced to a data con­sumer.


Annual Report 2020-2021, Depaul University College Of Computing And Digital Media Jan 2021

Annual Report 2020-2021, Depaul University College Of Computing And Digital Media

CDM Annual Reports

LETTER FROM THE DEAN

As I write this letter during the beginning of the 2021–22 academic year, we have started to welcome the majority of our students to campus— many for the very first time, and some for the first time in a year and a half. It has been wonderful to be together, in-person, again. Four quarters of learning and working remotely was challenging, to be sure, but I have been consistently amazed by the resilience, innovation, and hard work of our students, faculty, and staff, even in the most difficult of circumstances. This annual report, covering the 2020–21 …


Energy Harvesting And Sensor Based Hardware Security Primitives For Cyber-Physical Systems, Carson Labrado Jan 2021

Energy Harvesting And Sensor Based Hardware Security Primitives For Cyber-Physical Systems, Carson Labrado

Theses and Dissertations--Electrical and Computer Engineering

The last few decades have seen a large proliferation in the prevalence of cyber-physical systems. Although cyber-physical systems can offer numerous advantages to society, their large scale adoption does not come without risks. Internet of Things (IoT) devices can be considered a significant component within cyber-physical systems. They can provide network communication in addition to controlling the various sensors and actuators that exist within the larger cyber-physical system. The adoption of IoT features can also provide attackers with new potential avenues to access and exploit a system's vulnerabilities. Previously, existing systems could more or less be considered a closed system …