Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Computer Engineering

Theory, Synthesis, And Application Of Adiabatic And Reversible Logic Circuits For Security Applications, Matthew Arthur Morrison Nov 2013

Theory, Synthesis, And Application Of Adiabatic And Reversible Logic Circuits For Security Applications, Matthew Arthur Morrison

USF Tampa Graduate Theses and Dissertations

Programmable reversible logic is emerging as a prospective logic design style for implementation in modern nanotechnology and quantum computing with minimal impact on circuit heat generation. Adiabatic logic is a design methodology for reversible logic in CMOS where the current flow through the circuit is controlled such that the energy dissipation due to switching and capacitor dissipation is minimized. Recent advances in reversible logic using and quantum computer algorithms allow for improved computer architectures. Production of cost-effective Secure Integrated Chips, such as Smart Cards, requires hardware designers to consider tradeoffs in size, security, and power consumption. In order to design …


Prevention And Detection Of Intrusions In Wireless Sensor Networks, Ismail Butun Jan 2013

Prevention And Detection Of Intrusions In Wireless Sensor Networks, Ismail Butun

USF Tampa Graduate Theses and Dissertations

Wireless Sensor Networks (WSNs) continue to grow as one of the most exciting and challenging research areas of engineering. They are characterized by severely constrained computational and energy

resources and also restricted by the ad-hoc network operational

environment. They pose unique challenges, due to limited power

supplies, low transmission bandwidth, small memory sizes and limited energy. Therefore, security techniques used in traditional networks cannot be directly adopted. So, new ideas and approaches are needed, in order to increase the overall security of the network. Security applications in such resource constrained WSNs with minimum overhead provides significant challenges, and is the …


A Novel Method For Watermarking Sequential Circuits, Matthew Lewandowski Jan 2013

A Novel Method For Watermarking Sequential Circuits, Matthew Lewandowski

USF Tampa Graduate Theses and Dissertations

We present an Intellectual Property (IP) protection technique for sequential circuits driven by embedding a decomposed signature into a Finite State Machine (FSM) through the manipulation of the arbitrary state encoding of the unprotected FSM. This technique is composed of three steps: (a) transforming the signature into a watermark graph, (b) embedding watermark graphs into the original FSM's State Transition Graph (STG) and (c) generating models for verification and extraction. In the watermark construction process watermark graphs are generated from signatures. The proposed methods for watermark construction are: (1) BSD, (2) FSD, and (3) HSD. The HSD method is shown …


Algorithms And Data Structures For Efficient Timing Analysis Of Asynchronous Real-Time Systems, Yingying Zhang Jan 2013

Algorithms And Data Structures For Efficient Timing Analysis Of Asynchronous Real-Time Systems, Yingying Zhang

USF Tampa Graduate Theses and Dissertations

This thesis presents a framework to verify asynchronous real-time systems based on model checking. These systems are modeled by using a common modeling formalism named Labeled Petri-nets(LPNs).

In order to verify the real-time systems algorithmically, the zone-based timing analysis method is used for LPNs. It searches the state space with timing information (represented by zones). When there is a high degree of concurrency in the model, firing concurrent enabled transitions in different order may result in different zones, and these zones may be combined without affecting the verification result. Since the zone-based method could not deal with this problem efficiently, …


Design Of A Highly Portable Data Logging Embedded System For Naturalistic Motorcycle Study, Noureddine Elmehraz Jan 2013

Design Of A Highly Portable Data Logging Embedded System For Naturalistic Motorcycle Study, Noureddine Elmehraz

USF Tampa Graduate Theses and Dissertations

According to Motorcycle Industrial Council (MIC), in USA the number of owned

motorcycle increased during last few years and most likely will keep increasing. However, the

number of the deadly crash accidents associated with motorcycles is on the rise. Although MIC

doesn't explain why the accident rate has increased, the unprotected motorcyclist gear can be one

of the reasons. The most recent National Highway Traffic Safety Administration (NHTSA)

annual report stated that its data analyses are based on their experiences and the best judgment is

not based on solid scientific experiment [3]. Thus, building a framework for the data acquisition …


Approximate Sub-Graph Isomorphism For Watermarking Finite State Machine Hardware, Richard William Piper Meana Jan 2013

Approximate Sub-Graph Isomorphism For Watermarking Finite State Machine Hardware, Richard William Piper Meana

USF Tampa Graduate Theses and Dissertations

We present a method of mitigating theft of sequential circuit Intellectual Property hardware designs through means of watermarking. Hardware watermarking can be performed by selectively embedding a watermark in the state encoding of the Finite State Machine. This form of watermarking can be achieved by matching a directed graph representation of the watermark with a sub-graph in state transition graph representation of the FSM. We experiment with three approaches: a brute force method that provides a proof of concept, a greedy algorithm that provides excellent runtime with a drawback of sub-optimal results, and finally a simulated annealing method that provides …


Packet Coalescing And Server Substitution For Energy-Proportional Operation Of Network Links And Data Servers, Mehrgan Mostowfi Jan 2013

Packet Coalescing And Server Substitution For Energy-Proportional Operation Of Network Links And Data Servers, Mehrgan Mostowfi

USF Tampa Graduate Theses and Dissertations

Electricity generation for Information and Communications Technology (ICT) contributes over 2% of the human-generated CO2 to the atmosphere. Energy costs are rapidly becoming the major operational expense for ICT and may soon dwarf capital expenses as software and hardware continue to drop in price. In this dissertation, three new approaches to achieving energy-proportional operation of network links and data servers are explored.

Ethernet is the dominant wireline communications technology for Internet connectivity. IEEE 802.3az Energy Efficient Ethernet (EEE) describes a Low Power Idle (LPI) mechanism for allowing Ethernet links to sleep. A method of coalescing packets to consolidate link idle …


A Distributed Local-Leg Feedback Algorithm For Robust Walking On Uneven Terrain, Mayur Ramakant Palankar Jan 2013

A Distributed Local-Leg Feedback Algorithm For Robust Walking On Uneven Terrain, Mayur Ramakant Palankar

USF Tampa Graduate Theses and Dissertations

Legged animals can traverse significantly more of the Earth's land mass than man-made wheeled and tracked vehicles~\cite{Anonymous67}. Their impressive mobility is largely due to multiple dexterous legs and the robust algorithms that coordinate and control them. A legged animal such as a squirrel can exhibit multiple locomotion modes such as walking, running and jumping and also multiple gaits or leg phase timings within each mode. A robot that could mimic this level of robust locomotion would be highly useful for planetary exploration, military reconnaissance, and time-critical search and rescue in cluttered or collapsed buildings.

A number of biological studies on …


Fpca Based Human-Like Trajectory Generating, Wei Dai Jan 2013

Fpca Based Human-Like Trajectory Generating, Wei Dai

USF Tampa Graduate Theses and Dissertations

This thesis presents a new human-like upper limb and hand motion generating method. The work is based on Functional Principal Component Analysis and Quadratic Programming. The human-like motion generating problem is formulated in a framework of minimizing the difference of the dynamic profile of the optimal trajectory and the known types of trajectory. Statistical analysis is applied to the pre-captured human motion records to work in a low dimensional space. A novel PCA FPCA hybrid motion recognition method is proposed. This method is implemented on human grasping data to demonstrate its advantage in human motion recognition. One human grasping hierarchy …


Classification Models In Clinical Decision Making, Eleazar Gil-Herrera Jan 2013

Classification Models In Clinical Decision Making, Eleazar Gil-Herrera

USF Tampa Graduate Theses and Dissertations

In this dissertation, we present a collection of manuscripts describing the development of prognostic models designed to assist clinical decision making. This work is motivated by limitations of commonly used techniques to produce accessible prognostic models with easily interpretable and clinically credible results. Such limitations hinder prognostic model widespread utilization in medical practice.

Our methodology is based on Rough Set Theory (RST) as a mathematical tool for clinical data anal- ysis. We focus on developing rule-based prognostic models for end-of life care decision making in an effort to improve the hospice referral process. The development of the prognostic models is …


Robotic Swarming Without Inter-Agent Communication, Daniel Jonathan Standish Jan 2013

Robotic Swarming Without Inter-Agent Communication, Daniel Jonathan Standish

USF Tampa Graduate Theses and Dissertations

Many physical and algorithmic swarms utilize inter-agent communication to achieve advanced swarming behaviors. These swarms are inspired by biological swarms that can be seen throughout nature and include bee swarms, ant colonies, fish schools, and bird flocks. These biological swarms do not utilize inter-agent communication like their physical and algorithmic counterparts. Instead, organisms in nature rely on a local awareness of other swarm members that facilitates proper swarm motion and behavior. This research aims to pursue an effective swarm algorithm using only line-of-sight proximity information and no inter-agent communication. It is expected that the swarm performance will be lower than …


Determining The Benefit Of Human Input In Human-In-The-Loop Robotic Systems, Christine Elizabeth Bringes Jan 2013

Determining The Benefit Of Human Input In Human-In-The-Loop Robotic Systems, Christine Elizabeth Bringes

USF Tampa Graduate Theses and Dissertations

This work analyzes human-in-the-loop robotic systems to determine where human input can be most beneficial to a collaborative task. This is accomplished by implementing a pick-and-place task using a human-in-the-loop robotic system and determining which segments of the task, when replaced by human guidance, provide the most improvement to overall task performance and require the least cognitive effort.

The first experiment entails implementing a pick and place task on a commercial robotic arm. Initially, we look at a pick-and-place task that is segmented into two main areas: coarse approach towards a goal object and fine pick motion. For the fine …


A Multi-Parameter Functional Side Channel Analysis Method For Hardware Trojan Detection In Untrusted Fpga Bitstreams, Christopher William Bell Jan 2013

A Multi-Parameter Functional Side Channel Analysis Method For Hardware Trojan Detection In Untrusted Fpga Bitstreams, Christopher William Bell

USF Tampa Graduate Theses and Dissertations

Hardware Trojan Horses (HTHs or Trojans) are malicious design modifications intended to cause the design to function incorrectly. Globalization of the IC development industry has created new opportunities for rogue agents to compromise a design in such a way. Offshore foundries cannot always be trusted, and the use of trusted foundries is not always practical or economical. There is a pressing need for a method to reliably detect these Trojans, to prevent compromised designs from being put into production.

This thesis proposes a multi-parameter analysis method that is capable of reliably detecting function-altering and performance-degrading Trojans in FPGA bitstreams. It …


Efficient And Private Processing Of Analytical Queries In Scientific Datasets, Anand Kumar Jan 2013

Efficient And Private Processing Of Analytical Queries In Scientific Datasets, Anand Kumar

USF Tampa Graduate Theses and Dissertations

Large amount of data is generated by applications used in basic-science research and development applications. The size of data introduces great challenges in storage, analysis and preserving privacy. This dissertation proposes novel techniques to efficiently analyze the data and reduce storage space requirements through a data compression technique while preserving privacy and providing data security.

We present an efficient technique to compute an analytical query called spatial distance histogram (SDH) using spatiotemporal properties of the data. Special spatiotemporal properties present in the data are exploited to process SDH efficiently on the fly. General purpose graphics processing units (GPGPU or just …


Design Of An Advanced Lighting Measurement System For Roadway Safety, Mathew Johnson Jan 2013

Design Of An Advanced Lighting Measurement System For Roadway Safety, Mathew Johnson

USF Tampa Graduate Theses and Dissertations

Roadway illumination is a vital component of safety while driving during the night. There are regulations in place to ensure all publicly maintained roads are properly lit, but the validation process is too time consuming, costly, and dangerous for adequate data collection studies. The work in this thesis is aimed toward remedying this problem by creating an Advanced Lighting Measurement System (ALMS) capable of recording illumination readings while traveling at normal driving speeds. This solution is based on the Arduino Uno development board, a cost effective yet powerful embedded platform. This thesis involves collecting data along 100 centerline miles of …


Human Intention Recognition Based Assisted Telerobotic Grasping Of Objects In An Unstructured Environment, Karan Hariharan Khokar Jan 2013

Human Intention Recognition Based Assisted Telerobotic Grasping Of Objects In An Unstructured Environment, Karan Hariharan Khokar

USF Tampa Graduate Theses and Dissertations

In this dissertation work, a methodology is proposed to enable a robot to identify an object to be grasped and its intended grasp configuration while a human is teleoperating a robot towards the desired object. Based on the detected object and grasp configuration, the human is assisted in the teleoperation task. The environment is unstructured and consists of a number of objects, each with various possible grasp configurations. The identification of the object and the grasp configuration is carried out in real time, by recognizing the intention of the human motion. Simultaneously, the human user is assisted to preshape over …