Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Other Electrical and Computer Engineering

Electrical Engineering Theses and Dissertations

Articles 1 - 7 of 7

Full-Text Articles in Electrical and Computer Engineering

Modeling And Compensating Of Noise In Time-Of-Flight Sensors, Bryan Rodriguez Oct 2023

Modeling And Compensating Of Noise In Time-Of-Flight Sensors, Bryan Rodriguez

Electrical Engineering Theses and Dissertations

Three-dimensional (3D) sensors provide the ability to perform contactless measurements of objects and distances that are within their field of view. Unlike traditional two-dimensional (2D) cameras, which only provide RGB data about objects within a scene, 3D sensors are able to directly provide depth information for objects within a scene. Of these 3D sensing technologies, Time-of-Flight (ToF) sensors are becoming more compact which allows them to be more easily integrated with other devices and to find use in more applications. ToF sensors also provide several benefits over other 3D sensing technologies that increase the types of applications where ToF sensors …


A 2.56 Gbps Serial Wireline Transceiver That Supports An Auxiliary Channel And A Hybrid Line Driver To Compensate Large Channel Loss, Xiaoran Wang Aug 2020

A 2.56 Gbps Serial Wireline Transceiver That Supports An Auxiliary Channel And A Hybrid Line Driver To Compensate Large Channel Loss, Xiaoran Wang

Electrical Engineering Theses and Dissertations

Serial transceiver links are widely used for high-speed point-to-point communications. This dissertation describes two transceiver link designs for two different applications.

In serial wireline communications, security is an increasingly important factor to concern. Securing an information processing system at the application and system software layers is regarded as a necessary but incomplete defense against the cyber security threats. In this dissertation, an asynchronous serial transceiver that is capable of transmitting and receiving an auxiliary data stream concurrently with the primary data stream is described. The transceiver instantiates the auxiliary data stream by modulating the phase of the primary data without …


Heuristic-Based Threat Analysis Of Register-Transfer-Level Hardware Designs, Wesley Layton Ellington Apr 2020

Heuristic-Based Threat Analysis Of Register-Transfer-Level Hardware Designs, Wesley Layton Ellington

Electrical Engineering Theses and Dissertations

The development of globalized semiconductor manufacturing processes and supply chains has lead to an increased interest in hardware security as new types of hardware based attacks, called hardware Trojans, are being observed in industrial and military electronics. To combat this, a technique was developed to help analyze hardware designs at the register-transfer-level (RTL) and locate points of interest within a design that might be vulnerable to attack. This method aims to eventually enable the creation of an end-to-end design hardening solution that analyzes existing designs and suggests countermeasures for potential Trojan attacks. The method presented in this work uses a …


Technology-Dependent Quantum Logic Synthesis And Compilation, Kaitlin Smith Dec 2019

Technology-Dependent Quantum Logic Synthesis And Compilation, Kaitlin Smith

Electrical Engineering Theses and Dissertations

The models and rules of quantum computation and quantum information processing (QIP) differ greatly from those that govern classical computation, and these differences have caused the implementation of quantum processing devices with a variety of new technologies. Many platforms have been developed in parallel, but at the time of writing, one method of quantum computing has not shown to be superior to the rest. Because of the variation that exists between quantum platforms, even between those of the same technology, there must be a way to automatically synthesize technology-independent quantum designs into forms that are capable of physical realization on …


Wireless Channel Characterization Based On Crowdsourced Data And Geographical Features, Rita Enami May 2019

Wireless Channel Characterization Based On Crowdsourced Data And Geographical Features, Rita Enami

Electrical Engineering Theses and Dissertations

To design and plan wireless communication systems, an accurate propagation estimate is required of a deployment region. Propagation prediction models consist of two types of fading: large-scale and small-scale fading. With large-scale fading, the path loss information is crucial for cell planning, coverage estimation, and optimization. With small-scale fading, the statistical fluctuation on the local variations of the average signal level can have a dramatic effect on protocol decisions and resulting performance. To obtain accurate estimates of both types of fading, typically field measurements are needed that use drive testing, which is expensive in terms of time and cost. Recently, …


Indirect Imaging Using Computational Imaging Techniques, Aparna Viswanath Oct 2018

Indirect Imaging Using Computational Imaging Techniques, Aparna Viswanath

Electrical Engineering Theses and Dissertations

The work describes various methods employed towards solving the problem of indirect imaging. Computational techniques are employed to indirectly decipher information about an object hidden from view of a camera. Notion of virtualizing the source of illumination and detectors on real world rough surfaces was exploited to construct a non line of sight computational imager. Diversity was explored from the stand point of both illumination of the object and imaging of light reflected from the object. To understand the impact of scattering by real world rough surfaces, an instrument was developed that allows characterization of isoplanatic angle for different surface …


Investigating The Effect Of Detecting And Mitigating A Ring Oscillator-Based Hardware Trojan, Lakshmi Ramakrishnan Oct 2018

Investigating The Effect Of Detecting And Mitigating A Ring Oscillator-Based Hardware Trojan, Lakshmi Ramakrishnan

Electrical Engineering Theses and Dissertations

The outsourcing of the manufacturing process of integrated circuits to fabrications plants all over the world has exposed these chips to several security threats, especially at the hardware level. There have been instances of malicious circuitry, such as backdoors, being added to circuits without the knowledge of the chip designers or vendors. Such threats could be immensely powerful and dangerous against confidentiality, among other vulnerabilities.

Defense mechanisms against such attacks have been probed and defense techniques have been developed. But with the passage of time, attack techniques have improved immensely as well. From directly observing the inputs or outputs, adversaries …