Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2016

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 1299

Full-Text Articles in Computer Engineering

Table Of Contents Dec 2016

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah Dec 2016

Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah

Journal of Digital Forensics, Security and Law

With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom ...


The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi Dec 2016

The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi

Journal of Digital Forensics, Security and Law

This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased in the UAE, as well ...


Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh Dec 2016

Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh

Journal of Digital Forensics, Security and Law

The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any ...


A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun Dec 2016

A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun

Journal of Digital Forensics, Security and Law

Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent ...


The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler Dec 2016

The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler

Journal of Digital Forensics, Security and Law

The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash ...


The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler Dec 2016

The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler

Journal of Digital Forensics, Security and Law

A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.


A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi Dec 2016

A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi

Journal of Digital Forensics, Security and Law

The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a ...


Leveraging Lexical Link Analysis (Lla) To Discover New Knowledge, Ying Zhao, Douglas J. Mackinnon, Shelley P. Gallup, Joseph L. Billingsley Dec 2016

Leveraging Lexical Link Analysis (Lla) To Discover New Knowledge, Ying Zhao, Douglas J. Mackinnon, Shelley P. Gallup, Joseph L. Billingsley

Military Cyber Affairs

Lexical Link Analysis (LLA) is a form of text mining in which word meanings represented in lexical terms (e.g., word pairs) are treated as if they are in a community of a word network. LLA can provide automated awareness for analyzing text data and reveal previously unknown, data-driven themed connections. We applied LLA to develop authentic archetypes and conversely determine potential imposters of that same archetype. We use publically available social media data to develop a cyber professional as an example. This paper reports the development of the algorithm, the collection and labeling of data, as well as the ...


Mass Reduction Patterning Of Silicon-On-Oxide–Based Micromirrors, Harris J. Hall, Andrew Green, Sarah Dooley, Jason D. Schmidt, Lavern A. Starman, Derrick Langley, Ronald A. Coutu Jr. Dec 2016

Mass Reduction Patterning Of Silicon-On-Oxide–Based Micromirrors, Harris J. Hall, Andrew Green, Sarah Dooley, Jason D. Schmidt, Lavern A. Starman, Derrick Langley, Ronald A. Coutu Jr.

Electrical and Computer Engineering Faculty Research and Publications

It has long been recognized in the design of micromirror-based optical systems that balancing static flatness of the mirror surface through structural design with the system’s mechanical dynamic response is challenging. Although a variety of mass reduction approaches have been presented in the literature to address this performance trade, there has been little quantifiable comparison reported. In this work, different mass reduction approaches, some unique to the work, are quantifiably compared with solid plate thinning in both curvature and mass using commercial finite element simulation of a specific square silicon-on-insulator–based micromirror geometry. Other important considerations for micromirror surfaces ...


Computer Network Design For Universities In Developing Countries, Rafid Salih Sarhan Alsarhan Dec 2016

Computer Network Design For Universities In Developing Countries, Rafid Salih Sarhan Alsarhan

Information Technology Capstone Research Project Reports

The purpose of this project is to design a suitable network system for universities in developing countries. The aim was to design a network with high-quality security and low cost, in such a way that network devices of universities in developing countries, will meet standards associated with the universities in developed countries. This project will help to enhance education in developing countries. There are many devices that were used in designing the network, such as routers, switches, backup, firewall, and servers. All devices were connected to each other to make integration network system and configured by putting IP addresses to ...


On Frequency Variation Of Dynamic Resting-State Functional Brain Network Activation And Connectivity With Applications To Both Healthy And Clinical Populations, Maziar Yaesoubi Dec 2016

On Frequency Variation Of Dynamic Resting-State Functional Brain Network Activation And Connectivity With Applications To Both Healthy And Clinical Populations, Maziar Yaesoubi

Electrical and Computer Engineering ETDs

One of the earliest and fundamental observation in scientific study of the brain was discovering the relation between activities in different local regions of brain and some core functions of the brain. This was later followed by observing that not only local activities of regions but also synchronous activities between distributed brain regions play a key role in high-level brain functions. Synchronous activity related to the functions of the brain is commonly referred to as functional connectivity (FC) and is studied in the form of connectivity states of the brain which measure degree of interactions between distributed parts of the ...


Analysis Of 3d Cone-Beam Ct Image Reconstruction Performance On A Fpga, Devin Held Dec 2016

Analysis Of 3d Cone-Beam Ct Image Reconstruction Performance On A Fpga, Devin Held

Electronic Thesis and Dissertation Repository

Efficient and accurate tomographic image reconstruction has been an intensive topic of research due to the increasing everyday usage in areas such as radiology, biology, and materials science. Computed tomography (CT) scans are used to analyze internal structures through capture of x-ray images. Cone-beam CT scans project a cone-shaped x-ray to capture 2D image data from a single focal point, rotating around the object. CT scans are prone to multiple artifacts, including motion blur, streaks, and pixel irregularities, therefore must be run through image reconstruction software to reduce visual artifacts. The most common algorithm used is the Feldkamp, Davis, and ...


Study Of Mobile Robot Operations Related To Lunar Exploration, Matthew Cross Dec 2016

Study Of Mobile Robot Operations Related To Lunar Exploration, Matthew Cross

Electronic Thesis and Dissertation Repository

Mobile robots extend the reach of exploration in environments unsuitable, or unreachable, by humans. Far-reaching environments, such as the south lunar pole, exhibit lighting conditions that are challenging for optical imagery required for mobile robot navigation. Terrain conditions also impact the operation of mobile robots; distinguishing terrain types prior to physical contact can improve hazard avoidance.

This thesis presents the conclusions of a trade-off that uses the results from two studies related to operating mobile robots at the lunar south pole. The lunar south pole presents engineering design challenges for both tele-operation and lidar-based autonomous navigation in the context of ...


Distributed And Scalable Video Analysis Architecture For Human Activity Recognition Using Cloud Services, Cody Wilson Eilar Dec 2016

Distributed And Scalable Video Analysis Architecture For Human Activity Recognition Using Cloud Services, Cody Wilson Eilar

Electrical and Computer Engineering ETDs

This thesis proposes an open-source, maintainable system for detecting human activity in large video datasets using scalable hardware architectures. The system is validated by detecting writing and typing activities that were collected as part of the Advancing Out of School Learning in Mathematics and Engineering (AOLME) project. The implementation of the system using Amazon Web Services (AWS) is shown to be both horizontally and vertically scalable. The software associated with the system was designed to be robust so as to facilitate reproducibility and extensibility for future research.


Recent Semantic Changes For The Term "Digital", Tore Brattli Dec 2016

Recent Semantic Changes For The Term "Digital", Tore Brattli

Proceedings from the Document Academy

The term digital originates from the Latin word for finger/counting and has for many years been used to denote discrete signals and information, as opposed to analog. Discrete representation is an important principle, not only in computers, but also for (printed) text, music scores and even our genes. Recently however, the use of the term has increased and the meaning expanded to include almost everything related to information technology, e.g. digital natives and digital addiction. This study investigates the core principles of digital representation and compares this concept with the recent usage, with a focus on Norwegian media ...


Modelling And Analysis Of Smart Grids For Critical Data Communication, Abdulfattah Noorwali Dec 2016

Modelling And Analysis Of Smart Grids For Critical Data Communication, Abdulfattah Noorwali

Electronic Thesis and Dissertation Repository

Practical models for the subnetworks of smart grid are presented and analyzed. Critical packet-delay bounds for these subnetworks are determined, with the overall objective of identifying parameters that would help in the design of smart grid with least end-to-end delay.

A single-server non-preemptive queueing model with prioritized critical packets is presented for Home Area Network (HAN). Closed-form expressions for critical packet delay are derived and illustrated as a function of: i) critical packet arrival rate, ii) service rate, iii) utilization factor, and iv) rate of arrival of non-critical packets. Next, wireless HANs using FDMA and TDMA are presented. Upper and ...


Distributed All-Ip Mobility Management Architecture Supported By The Ndn Overlay, Zhiwei Yan, Guanggang Geng, Sherali Zeadally, Yong-Jin Park Dec 2016

Distributed All-Ip Mobility Management Architecture Supported By The Ndn Overlay, Zhiwei Yan, Guanggang Geng, Sherali Zeadally, Yong-Jin Park

Information Science Faculty Publications

Two of the most promising candidate solutions for realizing the next-generation all-IP mobile networks are Mobile IPv6 (MIPv6), which is the host-based and global mobility supporting protocol, and Proxy MIPv6 (PMIPv6), which is the network-based and localized mobility supporting protocol. However, the unprecedented growth of mobile Internet traffic has resulted in the development of distributed mobility management (DMM) architecture by the Internet engineering task force DMM working group. The extension of the basic MIPv6 and PMIPv6 to support their distributed and scalable deployment in the future is one of the major goals of the DMM working group. We propose an ...


Investigating The Impact Of Unsupervised Feature-Extraction From Multi-Wavelength Image Data For Photometric Classification Of Stars, Galaxies And Qsos, Annika Lindh Dec 2016

Investigating The Impact Of Unsupervised Feature-Extraction From Multi-Wavelength Image Data For Photometric Classification Of Stars, Galaxies And Qsos, Annika Lindh

Conference papers

Accurate classification of astronomical objects currently relies on spectroscopic data. Acquiring this data is time-consuming and expensive compared to photometric data. Hence, improving the accuracy of photometric classification could lead to far better coverage and faster classification pipelines. This paper investigates the benefit of using unsupervised feature-extraction from multi-wavelength image data for photometric classification of stars, galaxies and QSOs. An unsupervised Deep Belief Network is used, giving the model a higher level of interpretability thanks to its generative nature and layer-wise training. A Random Forest classifier is used to measure the contribution of the novel features compared to a set ...


Effect Of Milling On The Densification Of Sic-Basedcomposites From Polysilazane, Alfian Noviyanto, Toshiyuki Nishimura Dec 2016

Effect Of Milling On The Densification Of Sic-Basedcomposites From Polysilazane, Alfian Noviyanto, Toshiyuki Nishimura

Makara Journal of Technology

High density SiC-based composites from polysilazane were fabricated by high energy milling and hot pressing. After cross-linking at 200 °C, the polysilazane was pyrolysed at 1000 °C in N2 for 2 h to form amorphous Si-C-N-O followed by high energy milling for 1 h. Milled amorphous Si-C-N-O was sintered in hot pressing at 1600 and 1700 °C for 1 h in vacuum under the applied pressure of 50 MPa. Although no sintering additives were used, dense SiC-based composites were obtained with this method. Sintered density was 3.04 g/cm3, while only 2.57 g/cm3 for amorphous Si-C-N-O without ...


Optimizing Supply Chain Collaboration Based On Agreement Buyer-Supplier Relationship With Network Design Problem, Wahyudi Sutopo, Ayu Erliza, Arien Heryansyah Dec 2016

Optimizing Supply Chain Collaboration Based On Agreement Buyer-Supplier Relationship With Network Design Problem, Wahyudi Sutopo, Ayu Erliza, Arien Heryansyah

Makara Journal of Technology

In recent years, the rising competitive environment with shorter product life cycles and high customization forces industries to increase their flexibility, speed up their response, and enhance concurrent engineering designs. To integrate these prospects, supply chain collaboration becomes a pertinent strategy for industries to strengthen their competitiveness. The network design problem is used to implement supply chain collaboration. In the buying and selling process, sharing information between buyer and supplier are important to obtain a transaction decision. The optimimum supply chain profit can be identified by mathematical model of network design problem. The Mathematical Model takes into consideration the uncertainity ...


Characterization And Utilization Of Calcium Oxide (Cao) Thermally Decomposed From Fish Bones As A Catalyst In The Production Of Biodiesel From Waste Cooking Oil, Aldes Lesbani, Sabat Okta Ceria Sitompul, Risfidian Mohadi, Nurlisa Hidayati Dec 2016

Characterization And Utilization Of Calcium Oxide (Cao) Thermally Decomposed From Fish Bones As A Catalyst In The Production Of Biodiesel From Waste Cooking Oil, Aldes Lesbani, Sabat Okta Ceria Sitompul, Risfidian Mohadi, Nurlisa Hidayati

Makara Journal of Technology

Thermal decomposition of fish bones to obtain calcium oxide (CaO) was conducted at various temperatures of 400, 500, 800, 900, 1000, and 1100 °C. The calcium oxide was then characterized using X-ray diffractometer, FTIR spectrophotometer, and SEM analysis. The calcium oxide obtained from the decomposition at 1000 °C was then used as a catalyst in the production of biodiesel from waste cooking oil. Diffraction pattern of the calcium oxide produced from decomposition at 1000 °C showed a pattern similar to that of the calcium oxide produced by the Joint Committee on Powder Diffraction Standard (JCDPS). The diffractions of 2q values ...


Thermal And -Γ –Ray Irradiation Effects On The Ionic Conductivity Of (Licl)X(Montmorillonite)1-X, Safei Purnama, Aziz Khan Jahja, Takeshi Sakuma Dec 2016

Thermal And -Γ –Ray Irradiation Effects On The Ionic Conductivity Of (Licl)X(Montmorillonite)1-X, Safei Purnama, Aziz Khan Jahja, Takeshi Sakuma

Makara Journal of Technology

Compositesof montmorillonite (MMT) - lithium salts have been prepared using a simple process of powders mixing followed by heating. The powders resulting from this method are expected to beionic conductors with a high ionic conductivity characteristics. This characteristics is also further improved by employing gamma-ray irradiation technique at specified irradiation doses. The best results were obtained for the (LiCl)0.5(MMT)0.5 composite with a room temperature ionic conductivity of 2.192 mS/cm, which then increases to ~5 mS/cm after gamma irradiation at a dose of 400 kGy. This value is equivalent to the value of the ...


Expression And The Functional Study Of Fusion Proteins Α-Amylase And Hemolysin- Αas An Application In Biofilm Polysaccharide Degradation, Gede Yuda Sugiarta, Anggoro Wiseso, Siska Yuliana Sari, Etri Dian Kamila, Vanessa Geraldine, Diana Christina, Muhammad Hanifi, Dwiantari Satyapertiwi, Robby Hertanto, Budiman Bela, Masafumi Yohda, Muhamad Sahlan Dec 2016

Expression And The Functional Study Of Fusion Proteins Α-Amylase And Hemolysin- Αas An Application In Biofilm Polysaccharide Degradation, Gede Yuda Sugiarta, Anggoro Wiseso, Siska Yuliana Sari, Etri Dian Kamila, Vanessa Geraldine, Diana Christina, Muhammad Hanifi, Dwiantari Satyapertiwi, Robby Hertanto, Budiman Bela, Masafumi Yohda, Muhamad Sahlan

Makara Journal of Technology

Biofilm is an aggregate of consortium bacteria that adhere to each other on a surface. It is usually protected by the exopolysaccharide layer. Various invasive medical procedures, such as catheterization, endotracheal tube installation, and contact lens utilization, are vulnerable to biofilm infection. The National Institute of Health (NIH) estimates 65% of all microbial infections are caused by biofilm. Periplasmic α-amylase (MalS) is an enzyme that hydrolyzes α-1, 4- glicosidic bond in glycogen, starch, and others related polysaccharides in periplasmic space. Another protein called hemolysin-α (HlyA) is a secretion signal protein on C terminal of particular peptide in gram negative bacteria ...


Thermoeconomic Optimization Of Cascade Refrigeration System Using Mixed Carbon Dioxide And Hydrocarbons At Low Temperature Circuit, Nasruddin Nasruddin, Arnas Arnas, Ahmad Faqih, Niccolo Giannetti Dec 2016

Thermoeconomic Optimization Of Cascade Refrigeration System Using Mixed Carbon Dioxide And Hydrocarbons At Low Temperature Circuit, Nasruddin Nasruddin, Arnas Arnas, Ahmad Faqih, Niccolo Giannetti

Makara Journal of Technology

Many applications and industrial processes require very low cooling temperature, such as cold storage in the biomedical field, requiring temperature below -80 °C. However, single-cycle refrigeration systems can only achieve the effective cooling temperature of -40 °C and, also, the performance of the cycle will decrease drastically for cooling temperatures lower than -35°C. Currently, most of cascade refrigeration systems use refrigerants that have ozone depletion potential (ODP) and global warming potential (GWP), therefore, in this study, a cascade system is simulated using a mixture of environmentally friendly refrigerants, namely, carbon dioxide and a hydrocarbon (propane, ethane or ethylene) as ...


Design Of The Human Assembly Strategy In A Self-Optimizing Assembly Cell: A Case Study Of Indonesians, Novie Susanto, Ratna Purwaningsih, Kharisma Panca Kurniawati Dec 2016

Design Of The Human Assembly Strategy In A Self-Optimizing Assembly Cell: A Case Study Of Indonesians, Novie Susanto, Ratna Purwaningsih, Kharisma Panca Kurniawati

Makara Journal of Technology

This paper presents a continuing study of the human cognitive aspect application in the technical systems. The last studies design a human-centered design based on the German culture. The result shows a significant difference of human performance between Germans and Indonesians. Therefore, this study examines the human cognitive model based on Indonesian culture to investigate whether the different cognitive model based on the culture aspect can improve the human performance. The study was conducted on 60 people classified by age, young (16-34 years old) and old (older than 34 years old). Participants render predictions on an assembly activity for two ...


Developing Road Infrastructure Route Planning: Increasing Feasibility Of Toll Road Project, Mohammed Ali Berawi, Teuku Yuri Zagloel, Perdana Miraj, Abdur Rohim Boy Berawi, Wellsi Titaheluw, Saipol Bari Bin Abd Karim Dec 2016

Developing Road Infrastructure Route Planning: Increasing Feasibility Of Toll Road Project, Mohammed Ali Berawi, Teuku Yuri Zagloel, Perdana Miraj, Abdur Rohim Boy Berawi, Wellsi Titaheluw, Saipol Bari Bin Abd Karim

Makara Journal of Technology

Indonesian government attempts to improve connectivity and to increase regional activities in Sumatera Island through the development of Trans Sumatera Toll Road (TSTR). However, despite its benefits to local economic development in Sumatera, the project shows low feasibility due to a low amount of investment. It can be attributed from the lack of planning in the initial phase to produce a comprehensive route that considers the various potentials of the regions. Thus, this research aims to investigate alternative route planning of Trans Sumatera Toll Road particularly in this paper for Central Sumatera by studying Gross Regional Domestic Product (GRDP), population ...


Open Scholarly Publishing Plugin, Barry Bailey Dec 2016

Open Scholarly Publishing Plugin, Barry Bailey

Sabbatical Projects

Presentation reflecting author's sabbatical project, which reviewed the need for and developed a plugin to allow institutions to convert WordPress into an institutional repository.


The Eco-Smart Can, Darack B. Nanto Dec 2016

The Eco-Smart Can, Darack B. Nanto

Undergraduate Honors Theses

I noticed that maintenance workers had the same itinerary when emptying trashcans, meanwhile some trashcans needed to be emptied urgently. Traditionally, ETSU maintenance operate on daily routes to pick trash on designated time, regardless the level of the containers. The time, resources and labor invested in collecting the trash could be saved. Therefore, I decided to use the Internet of Things (IoT) to create a device that will optimize trash collection, to reduce costs and pollution.


Approximate Computing: An Integrated Cross-Layer Framework, Swagath Venkataramani Dec 2016

Approximate Computing: An Integrated Cross-Layer Framework, Swagath Venkataramani

Open Access Dissertations

A new design approach, called approximate computing (AxC), leverages the flexibility provided by intrinsic application resilience to realize hardware or software implementations that are more efficient in energy or performance. Approximate computing techniques forsake exact (numerical or Boolean) equivalence in the execution of some of the application’s computations, while ensuring that the output quality is acceptable. While early efforts in approximate computing have demonstrated great potential, they consist of ad hoc techniques applied to a very narrow set of applications, leaving in question the applicability of approximate computing in a broader context.

The primary objective of this thesis is ...