Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Other Computer Engineering

Investigating The Effect Of Detecting And Mitigating A Ring Oscillator-Based Hardware Trojan, Lakshmi Ramakrishnan Oct 2018

Investigating The Effect Of Detecting And Mitigating A Ring Oscillator-Based Hardware Trojan, Lakshmi Ramakrishnan

Electrical Engineering Theses and Dissertations

The outsourcing of the manufacturing process of integrated circuits to fabrications plants all over the world has exposed these chips to several security threats, especially at the hardware level. There have been instances of malicious circuitry, such as backdoors, being added to circuits without the knowledge of the chip designers or vendors. Such threats could be immensely powerful and dangerous against confidentiality, among other vulnerabilities.

Defense mechanisms against such attacks have been probed and defense techniques have been developed. But with the passage of time, attack techniques have improved immensely as well. From directly observing the inputs or outputs, adversaries …


Collision Avoidance Smartphone, Matt Columbres, Aaron Parisi, Joey Schnecker, Luis Wong Jun 2018

Collision Avoidance Smartphone, Matt Columbres, Aaron Parisi, Joey Schnecker, Luis Wong

Electrical Engineering

There are many instances in day-to-day life where people cannot or would rather not pay full attention to their surroundings. Walking while preoccupied with a smartphone or walking while blind are excellent examples where technology could be used to make the task of avoiding 2collisions reactive, instead of proactive. A device which monitors a user’s surroundings and notifies the user when a potential collision is detected (and, additionally, notifying them as to where the obstacle is with respect to them) could be used to make walking distracted less of a hazard for the user and those around the user and …


Image Processing Applications In Real Life: 2d Fragmented Image And Document Reassembly And Frequency Division Multiplexed Imaging, Houman Kamran Habibkhani Apr 2018

Image Processing Applications In Real Life: 2d Fragmented Image And Document Reassembly And Frequency Division Multiplexed Imaging, Houman Kamran Habibkhani

LSU Doctoral Dissertations

In this era of modern technology, image processing is one the most studied disciplines of signal processing and its applications can be found in every aspect of our daily life. In this work three main applications for image processing has been studied.

In chapter 1, frequency division multiplexed imaging (FDMI), a novel idea in the field of computational photography, has been introduced. Using FDMI, multiple images are captured simultaneously in a single shot and can later be extracted from the multiplexed image. This is achieved by spatially modulating the images so that they are placed at different locations in the …


Employing A User-Centered Design Process For Cybersecurity Awareness In The Power Grid, Jean C. Scholtz, Lyndsey Franklin, Aditya Ashok, Katya Leblanc, Christopher Bonebrake, Eric Andersen, Michael Cassiadoro Jan 2018

Employing A User-Centered Design Process For Cybersecurity Awareness In The Power Grid, Jean C. Scholtz, Lyndsey Franklin, Aditya Ashok, Katya Leblanc, Christopher Bonebrake, Eric Andersen, Michael Cassiadoro

Journal of Human Performance in Extreme Environments

In this paper, we discuss the process we are using in the design and implementation of a tool to improve the situation awareness of cyberattacks in the power grid. We provide details of the steps we have taken to date and describe the steps that still need to be accomplished. The focus of this work is to provide situation awareness of the power grid to staff from different, non-overlapping roles in an electrical transmission organization in order to facilitate an understanding of a possible occurrence of a cyberattack. Our approach follows a user-centered design process and includes determining the types …


Some Aggregation Operators For Bipolar-Valued Hesitant Fuzzy Information, Florentin Smarandache, Tahir Mahmood, Kifayat Ullah, Qaisar Khan Jan 2018

Some Aggregation Operators For Bipolar-Valued Hesitant Fuzzy Information, Florentin Smarandache, Tahir Mahmood, Kifayat Ullah, Qaisar Khan

Branch Mathematics and Statistics Faculty and Staff Publications

In this article we define some aggregation operators for bipolar-valued hesitant fuzzy sets. These operations include bipolar-valued hesitant fuzzy ordered weighted averaging (BPVHFOWA) operator, bipolar-valued hesitant fuzzy ordered weighted geometric (BPVHFOWG) operator and their generalized forms. We also define hybrid aggregation operators and their generalized forms and solved a decision-making problem on these operation.