Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

New Jersey Institute of Technology

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 166

Full-Text Articles in Computer Engineering

Gen-Acceleration: Pioneering Work For Hardware Accelerator Generation Using Large Language Models, Durga Lakshmi Venkata Deepak Vungarala Dec 2023

Gen-Acceleration: Pioneering Work For Hardware Accelerator Generation Using Large Language Models, Durga Lakshmi Venkata Deepak Vungarala

Theses

Optimizing computational power is critical in the age of data-intensive applications and Artificial Intelligence (AI)/Machine Learning (ML). While facing challenging bottlenecks, conventional Von-Neumann architecture with implementing such huge tasks looks seemingly impossible. Hardware Accelerators are critical in efficiently deploying these technologies and have been vastly explored in edge devices. This study explores a state-of-the-art hardware accelerator; Gemmini is studied; we leveraged the open-sourced tool. Furthermore, we developed a Hardware Accelerator in the study we compared with the Non-Von-Neumann architecture. Gemmini is renowned for efficient matrix multiplication, but configuring it for specific tasks requires manual effort and expertise. We propose implementing …


Advanced Traffic Video Analytics For Robust Traffic Accident Detection, Hadi Ghahremannezhad Aug 2023

Advanced Traffic Video Analytics For Robust Traffic Accident Detection, Hadi Ghahremannezhad

Dissertations

Automatic traffic accident detection is an important task in traffic video analysis due to its key applications in developing intelligent transportation systems. Reducing the time delay between the occurrence of an accident and the dispatch of the first responders to the scene may help lower the mortality rate and save lives. Since 1980, many approaches have been presented for the automatic detection of incidents in traffic videos. In this dissertation, some challenging problems for accident detection in traffic videos are discussed and a new framework is presented in order to automatically detect single-vehicle and intersection traffic accidents in real-time.

First, …


Toward Smart And Efficient Scientific Data Management, Jinzhen Wang Aug 2023

Toward Smart And Efficient Scientific Data Management, Jinzhen Wang

Dissertations

Scientific research generates vast amounts of data, and the scale of data has significantly increased with advancements in scientific applications. To manage this data effectively, lossy data compression techniques are necessary to reduce storage and transmission costs. Nevertheless, the use of lossy compression introduces uncertainties related to its performance. This dissertation aims to answer key questions surrounding lossy data compression, such as how the performance changes, how much reduction can be achieved, and how to optimize these techniques for modern scientific data management workflows.

One of the major challenges in adopting lossy compression techniques is the trade-off between data accuracy …


An Animated Introduction To Digital Logic Design, John D. Carpinelli Aug 2023

An Animated Introduction To Digital Logic Design, John D. Carpinelli

Open and Affordable Textbooks

This book is designed for use in an introductory course on digital logic design, typically offered in computer engineering, electrical engineering, computer science, and other related programs. Such a course is usually offered at the sophomore level. This book makes extensive use of animation to illustrate the flow of data within a digital system and to step through some of the procedures used to design and optimize digital circuits.

All of the animations for this book can be found here: https://digitalcommons.njit.edu/dld-animations/


Claw Hand Activity, Admin Stem For Success, Natalie Wilson Apr 2023

Claw Hand Activity, Admin Stem For Success, Natalie Wilson

STEM for Success Showcase

Activity plan where students practice coding principles by programming the actions of a claw hand


Modeling Of Quad-Station Module Cluster Tools Using Petri Nets, Aung Nay Dec 2022

Modeling Of Quad-Station Module Cluster Tools Using Petri Nets, Aung Nay

Theses

The semiconductor industry is highly competitive, and with the recent chip shortage, the throughput of wafers has become more important than ever. One of the tools that the industry has deployed is to use of quad-station modules instead of the traditional single-station modules that allow for higher throughput and better wafer consistency by processing multiple wafers at the same time and distributing work. The industry trend is to use multiple transfer chamber robots to stack the quad-station modules in a series, particularly for etch products. In this work, the quad-station cluster tool wafer movement is modeled by using Petri net …


Performance Analysis Of The Dominant Mode Rejection Beamformer, Enlong Hu Aug 2022

Performance Analysis Of The Dominant Mode Rejection Beamformer, Enlong Hu

Dissertations

In array signal processing over challenging environments, due to the non-stationarity nature of data, it is difficult to obtain enough number of data snapshots to construct an adaptive beamformer (ABF) for detecting weak signal embedded in strong interferences. One type of adaptive method targeting for such applications is the dominant mode rejection (DMR) method, which uses a reshaped eigen-decomposition of sample covariance matrix (SCM) to define a subspace containing the dominant interferers to be rejected, thereby allowing it to detect weak signal in the presence of strong interferences. The DMR weight vector takes a form similar to the adaptive minimum …


Artificial Neural Networks And Their Applications To Intelligent Fault Diagnosis Of Power Transmission Lines, Fatemeh Mohammadi Shakiba Aug 2022

Artificial Neural Networks And Their Applications To Intelligent Fault Diagnosis Of Power Transmission Lines, Fatemeh Mohammadi Shakiba

Dissertations

Over the past thirty years, the idea of computing based on models inspired by human brains and biological neural networks emerged. Artificial neural networks play an important role in the field of machine learning and hold the key to the success of performing many intelligent tasks by machines. They are used in various applications such as pattern recognition, data classification, stock market prediction, aerospace, weather forecasting, control systems, intelligent automation, robotics, and healthcare. Their architectures generally consist of an input layer, multiple hidden layers, and one output layer. They can be implemented on software or hardware. Nowadays, various structures with …


Local Learning Algorithms For Stochastic Spiking Neural Networks, Bleema Rosenfeld May 2022

Local Learning Algorithms For Stochastic Spiking Neural Networks, Bleema Rosenfeld

Dissertations

This dissertation focuses on the development of machine learning algorithms for spiking neural networks, with an emphasis on local three-factor learning rules that are in keeping with the constraints imposed by current neuromorphic hardware. Spiking neural networks (SNNs) are an alternative to artificial neural networks (ANNs) that follow a similar graphical structure but use a processing paradigm more closely modeled after the biological brain in an effort to harness its low power processing capability. SNNs use an event based processing scheme which leads to significant power savings when implemented in dedicated neuromorphic hardware such as Intel’s Loihi chip.

This work …


Outdoor Operations Of Multiple Quadrotors In Windy Environment, Deepan Lobo May 2022

Outdoor Operations Of Multiple Quadrotors In Windy Environment, Deepan Lobo

Dissertations

Coordinated multiple small unmanned aerial vehicles (sUAVs) offer several advantages over a single sUAV platform. These advantages include improved task efficiency, reduced task completion time, improved fault tolerance, and higher task flexibility. However, their deployment in an outdoor environment is challenging due to the presence of wind gusts. The coordinated motion of a multi-sUAV system in the presence of wind disturbances is a challenging problem when considering collision avoidance (safety), scalability, and communication connectivity. Performing wind-agnostic motion planning for sUAVs may produce a sizeable cross-track error if the wind on the planned route leads to actuator saturation. In a multi-sUAV …


Design And Control Of Next-Generation Uavs For Effectively Interacting With Environments, Caiwu Ding May 2022

Design And Control Of Next-Generation Uavs For Effectively Interacting With Environments, Caiwu Ding

Dissertations

In this dissertation, the design and control of a novel multirotor for aerial manipulation is studied, with the aim of endowing the aerial vehicle with more degrees of freedom of motion and stability when interacting with the environments. Firstly, it presents an energy-efficient adaptive robust tracking control method for a class of fully actuated, thrust vectoring unmanned aerial vehicles (UAVs) with parametric uncertainties including unknown moment of inertia, mass and center of mass, which would occur in aerial maneuvering and manipulation. The effectiveness of this method is demonstrated through simulation. Secondly, a humanoid robot arm is adopted to serve as …


Un-Fair Trojan: Targeted Backdoor Attacks Against Model Fairness, Nicholas Furth May 2022

Un-Fair Trojan: Targeted Backdoor Attacks Against Model Fairness, Nicholas Furth

Theses

Machine learning models have been shown to be vulnerable against various backdoor and data poisoning attacks that adversely affect model behavior. Additionally, these attacks have been shown to make unfair predictions with respect to certain protected features. In federated learning, multiple local models contribute to a single global model communicating only using local gradients, the issue of attacks become more prevalent and complex. Previously published works revolve around solving these issues both individually and jointly. However, there has been little study on the effects of attacks against model fairness. Demonstrated in this work, a flexible attack, which we call Un-Fair …


Design And Implementation Of Photovoltaic Energy Harvesting Automaton, Iskandar Askarov Jan 2022

Design And Implementation Of Photovoltaic Energy Harvesting Automaton, Iskandar Askarov

Theses

Global domestic electricity consumption has been rapidly increasing in the past three decades. In fact, from 1990 to 2020, consumption has more than doubled from 10,120 TWh to 23,177 TWh [1]. Moreover, consumers have been turning more towards clean, renewable energy sources such as Photovoltaic. According to International Energy Agency, global Solar power generation alone in 2019 has reached almost 3% [4] of the electricity supply. Even though the efficiency of photovoltaic panels has been growing, presently, the highest efficiency solar panels available to an average consumer range only from 20%-22% [14]. Many research papers have been published to increase …


Statistics-Based Anomaly Detection And Correction Method For Amazon Customer Reviews, Ishani Chatterjee Dec 2021

Statistics-Based Anomaly Detection And Correction Method For Amazon Customer Reviews, Ishani Chatterjee

Dissertations

People nowadays use the Internet to project their assessments, impressions, ideas, and observations about various subjects or products on numerous social networking sites. These sites serve as a great source of gathering information for data analytics, sentiment analysis, natural language processing, etc. The most critical challenge is interpreting this data and capturing the sentiment behind these expressions. Sentiment analysis is analyzing, processing, concluding, and inferencing subjective texts with the views. Companies use sentiment analysis to understand public opinions, perform market research, analyze brand reputation, recognize customer experiences, and study social media influence. According to the different needs for aspect granularity, …


Machine Learning Techniques For Network Analysis, Irfan Lateef Dec 2021

Machine Learning Techniques For Network Analysis, Irfan Lateef

Dissertations

The network's size and the traffic on it are both increasing exponentially, making it difficult to look at its behavior holistically and address challenges by looking at link level behavior. It is possible that there are casual relationships between links of a network that are not directly connected and which may not be obvious to observe. The goal of this dissertation is to study and characterize the behavior of the entire network by using eigensubspace based techniques and apply them to network traffic engineering applications.

A new method that uses the joint time-frequency interpretation of eigensubspace representation for network statistics …


On Resource-Efficiency And Performance Optimization In Big Data Computing And Networking Using Machine Learning, Wuji Liu Dec 2021

On Resource-Efficiency And Performance Optimization In Big Data Computing And Networking Using Machine Learning, Wuji Liu

Dissertations

Due to the rapid transition from traditional experiment-based approaches to large-scale, computational intensive simulations, next-generation scientific applications typically involve complex numerical modeling and extreme-scale simulations. Such model-based simulations oftentimes generate colossal amounts of data, which must be transferred over high-performance network (HPN) infrastructures to remote sites and analyzed against experimental or observation data on high-performance computing (HPC) facility. Optimizing the performance of both data transfer in HPN and simulation-based model development on HPC is critical to enabling and accelerating knowledge discovery and scientific innovation. However, such processes generally involve an enormous set of attributes including domain-specific model parameters, network transport …


A Practical Approach To Automated Software Correctness Enhancement, Aleksandr Zakharchenko Dec 2021

A Practical Approach To Automated Software Correctness Enhancement, Aleksandr Zakharchenko

Dissertations

To repair an incorrect program does not mean to make it correct; it only means to make it more-correct, in some sense, than it is. In the absence of a concept of relative correctness, i.e. the property of a program to be more-correct than another with respect to a specification, the discipline of program repair has resorted to various approximations of absolute (traditional) correctness, with varying degrees of success. This shortcoming is concealed by the fact that most program repair tools are tested on basic cases, whence making them absolutely correct is not clearly distinguishable from making them relatively more-correct. …


Data-Driven Learning For Robot Physical Intelligence, Leidi Zhao Aug 2021

Data-Driven Learning For Robot Physical Intelligence, Leidi Zhao

Dissertations

The physical intelligence, which emphasizes physical capabilities such as dexterous manipulation and dynamic mobility, is essential for robots to physically coexist with humans. Much research on robot physical intelligence has achieved success on hyper robot motor capabilities, but mostly through heavily case-specific engineering. Meanwhile, in terms of robot acquiring skills in a ubiquitous manner, robot learning from human demonstration (LfD) has achieved great progress, but still has limitations handling dynamic skills and compound actions. In this dissertation, a composite learning scheme which goes beyond LfD and integrates robot learning from human definition, demonstration, and evaluation is proposed. This method tackles …


Intelligent And Secure Fog-Aided Internet Of Drones, Jingjing Yao May 2021

Intelligent And Secure Fog-Aided Internet Of Drones, Jingjing Yao

Dissertations

Internet of drones (IoD), which utilize drones as Internet of Things (IoT) devices, deploys several drones in the air to collect ground information and send them to the IoD gateway for further processing. Computing tasks are usually offloaded to the cloud data center for intensive processing. However, many IoD applications require real-time processing and event response (e.g., disaster response and virtual reality applications). Hence, data processing by the remote cloud may not satisfy the strict latency requirement. Fog computing attaches fog nodes, which are equipped with computing, storage and networking resources, to IoD gateways to assume a substantial amount of …


Deep Learning On Image Forensics And Anti-Forensics, Zhangyi Shen May 2021

Deep Learning On Image Forensics And Anti-Forensics, Zhangyi Shen

Dissertations

Image forensics protect the authenticity and integrity of digital images. On the contrary, as the countermeasures of digital forensics, anti-forensics is applied to expose the vulnerability of forensics tools. Consequently, forensics researchers could develop forensics tools against possible new attacks. This dissertation investigation demonstrates two image forensics methods based on convolutional neural network (CNN) and two image anti-forensics methods based on generative adversarial network (GAN).

Detecting unsharp masking (USM) sharpened image is the first study in this dissertation. A CNN architecture comprises four convolutional layers and a classification module is proposed to discriminate sharpened images and unsharpened images. The results …


Towards Improving The Security Of The Software Supply Chain, Hammad Afzali May 2021

Towards Improving The Security Of The Software Supply Chain, Hammad Afzali

Dissertations

A software supply chain comprises a series of steps performed to develop and distribute a software product. History has shown that each of these steps is vulnerable to attacks that can have serious repercussions and can affect many users at once. To address the attacks against the software supply chain, end users must be provided with verifiable guarantees about the individual steps of the chain and with assurances that the steps are securely chained together.

In this dissertation, the security of several individual steps in the software supply chain is enhanced. The first step of the chain, managing the source …


Improving Multi-Threaded Qos In Clouds, Weiwei Jia May 2021

Improving Multi-Threaded Qos In Clouds, Weiwei Jia

Dissertations

Multi-threading and resource sharing are pervasive and critical in clouds and data-centers. In order to ease management, save energy and improve resource utilization, multi-threaded applications from different tenants are often encapsulated in virtual machines (VMs) and consolidated on to the same servers. Unfortunately, despite much effort, it is still extremely challenging to maintain high quality of service (QoS) for multi-threaded applications of different tenants in clouds, and these applications often suffer severe performance degradation, poor scalability, unfair resource allocation, and so on.

The dissertation identifies the causes of the QoS problems and improves the QoS of multi-threaded execution with three …


Human-Robot Interaction For Assistive Robotics, Jiawei Li Dec 2020

Human-Robot Interaction For Assistive Robotics, Jiawei Li

Dissertations

This dissertation presents an in-depth study of human-robot interaction (HRI) withapplication to assistive robotics. In various studies, dexterous in-hand manipulation is included, assistive robots for Sit-To-stand (STS) assistance along with the human intention estimation. In Chapter 1, the background and issues of HRI are explicitly discussed. In Chapter 2, the literature review introduces the recent state-of-the-art research on HRI, such as physical Human-Robot Interaction (HRI), robot STS assistance, dexterous in hand manipulation and human intention estimation. In Chapter 3, various models and control algorithms are described in detail. Chapter 4 introduces the research equipment. Chapter 5 presents innovative theories and …


Performance Optimization Of Big Data Computing Workflows For Batch And Stream Data Processing In Multi-Clouds, Huiyan Cao Dec 2020

Performance Optimization Of Big Data Computing Workflows For Batch And Stream Data Processing In Multi-Clouds, Huiyan Cao

Dissertations

Workflow techniques have been widely used as a major computing solution in many science domains. With the rapid deployment of cloud infrastructures around the globe and the economic benefits of cloud-based computing and storage services, an increasing number of scientific workflows have migrated or are in active transition to clouds. As the scale of scientific applications continues to grow, it is now common to deploy various data- and network-intensive computing workflows such as serial computing workflows, MapReduce/Spark-based workflows, and Storm-based stream data processing workflows in multi-cloud environments, where inter-cloud data transfer oftentimes plays a significant role in both workflow performance …


Treated Hfo2 Based Rram Devices With Ru, Tan, Tin As Top Electrode For In-Memory Computing Hardware, Yuvraj Dineshkumar Patel Dec 2020

Treated Hfo2 Based Rram Devices With Ru, Tan, Tin As Top Electrode For In-Memory Computing Hardware, Yuvraj Dineshkumar Patel

Theses

The scalability and power efficiency of the conventional CMOS technology is steadily coming to a halt due to increasing problems and challenges in fabrication technology. Many non-volatile memory devices have emerged recently to meet the scaling challenges. Memory devices such as RRAMs or ReRAM (Resistive Random-Access Memory) have proved to be a promising candidate for analog in memory computing applications related to inference and learning in artificial intelligence. A RRAM cell has a MIM (Metal insulator metal) structure that exhibits reversible resistive switching on application of positive or negative voltage. But detailed studies on the power consumption, repeatability and retention …


Human Activity Recognition Using Wearable Sensors: A Deep Learning Approach, Jialun Xue Dec 2020

Human Activity Recognition Using Wearable Sensors: A Deep Learning Approach, Jialun Xue

Theses

In the past decades, Human Activity Recognition (HAR) grabbed considerable research attentions from a wide range of pattern recognition and human–computer interaction researchers due to its prominent applications such as smart home health care. The wealth of information requires efficient classification and analysis methods. Deep learning represents a promising technique for large-scale data analytics. There are various ways of using different sensors for human activity recognition in a smartly controlled environment. Among them, physical human activity recognition through wearable sensors provides valuable information about an individual’s degree of functional ability and lifestyle. There is abundant research that works upon real …


Semantic, Integrated Keyword Search Over Structured And Loosely Structured Databases, Xinge Lu Dec 2020

Semantic, Integrated Keyword Search Over Structured And Loosely Structured Databases, Xinge Lu

Dissertations

Keyword search has been seen in recent years as an attractive way for querying data with some form of structure. Indeed, it allows simple users to extract information from databases without mastering a complex structured query language and without having knowledge of the schema of the data. It also allows for integrated search of heterogeneous data sources. However, as keyword queries are ambiguous and not expressive enough, keyword search cannot scale satisfactorily on big datasets and the answers are, in general, of low accuracy. Therefore, flat keyword search alone cannot efficiently return high quality results on large data with structure. …


Hybrid Deep Neural Networks For Mining Heterogeneous Data, Xiurui Hou Aug 2020

Hybrid Deep Neural Networks For Mining Heterogeneous Data, Xiurui Hou

Dissertations

In the era of big data, the rapidly growing flood of data represents an immense opportunity. New computational methods are desired to fully leverage the potential that exists within massive structured and unstructured data. However, decision-makers are often confronted with multiple diverse heterogeneous data sources. The heterogeneity includes different data types, different granularities, and different dimensions, posing a fundamental challenge in many applications. This dissertation focuses on designing hybrid deep neural networks for modeling various kinds of data heterogeneity.

The first part of this dissertation concerns modeling diverse data types, the first kind of data heterogeneity. Specifically, image data and …


Live Media Production: Multicast Optimization And Visibility For Clos Fabric In Media Data Centers, Ammar Latif Aug 2020

Live Media Production: Multicast Optimization And Visibility For Clos Fabric In Media Data Centers, Ammar Latif

Dissertations

Media production data centers are undergoing a major architectural shift to introduce digitization concepts to media creation and media processing workflows. Content companies such as NBC Universal, CBS/Viacom and Disney are modernizing their workflows to take advantage of the flexibility of IP and virtualization.

In these new environments, multicast is utilized to provide point-to-multi-point communications. In order to build point-to-multi-point trees, Multicast has an established set of control protocols such as IGMP and PIM. The existing multicast protocols do not optimize multicast tree formation for maximizing network throughput which lead to decreased fabric utilization and decreased total number of admitted …


Energy And Performance-Optimized Scheduling Of Tasks In Distributed Cloud And Edge Computing Systems, Haitao Yuan Aug 2020

Energy And Performance-Optimized Scheduling Of Tasks In Distributed Cloud And Edge Computing Systems, Haitao Yuan

Dissertations

Infrastructure resources in distributed cloud data centers (CDCs) are shared by heterogeneous applications in a high-performance and cost-effective way. Edge computing has emerged as a new paradigm to provide access to computing capacities in end devices. Yet it suffers from such problems as load imbalance, long scheduling time, and limited power of its edge nodes. Therefore, intelligent task scheduling in CDCs and edge nodes is critically important to construct energy-efficient cloud and edge computing systems. Current approaches cannot smartly minimize the total cost of CDCs, maximize their profit and improve quality of service (QoS) of tasks because of aperiodic arrival …