Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2016

Computer Engineering

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 707

Full-Text Articles in Electrical and Computer Engineering

Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah Dec 2016

Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah

Journal of Digital Forensics, Security and Law

With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …


The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler Dec 2016

The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler

Journal of Digital Forensics, Security and Law

The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …


Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh Dec 2016

Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh

Journal of Digital Forensics, Security and Law

The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any application; name, description, publisher …


The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi Dec 2016

The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi

Journal of Digital Forensics, Security and Law

This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased …


A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi Dec 2016

A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi

Journal of Digital Forensics, Security and Law

The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …


The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler Dec 2016

The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler

Journal of Digital Forensics, Security and Law

A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.


A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun Dec 2016

A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun

Journal of Digital Forensics, Security and Law

Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …


Table Of Contents Dec 2016

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Mass Reduction Patterning Of Silicon-On-Oxide–Based Micromirrors, Harris J. Hall, Andrew Green, Sarah Dooley, Jason D. Schmidt, Lavern A. Starman, Derrick Langley, Ronald A. Coutu Jr. Dec 2016

Mass Reduction Patterning Of Silicon-On-Oxide–Based Micromirrors, Harris J. Hall, Andrew Green, Sarah Dooley, Jason D. Schmidt, Lavern A. Starman, Derrick Langley, Ronald A. Coutu Jr.

Electrical and Computer Engineering Faculty Research and Publications

It has long been recognized in the design of micromirror-based optical systems that balancing static flatness of the mirror surface through structural design with the system’s mechanical dynamic response is challenging. Although a variety of mass reduction approaches have been presented in the literature to address this performance trade, there has been little quantifiable comparison reported. In this work, different mass reduction approaches, some unique to the work, are quantifiably compared with solid plate thinning in both curvature and mass using commercial finite element simulation of a specific square silicon-on-insulator–based micromirror geometry. Other important considerations for micromirror surfaces, including surface …


Distributed And Scalable Video Analysis Architecture For Human Activity Recognition Using Cloud Services, Cody Wilson Eilar Dec 2016

Distributed And Scalable Video Analysis Architecture For Human Activity Recognition Using Cloud Services, Cody Wilson Eilar

Electrical and Computer Engineering ETDs

This thesis proposes an open-source, maintainable system for detecting human activity in large video datasets using scalable hardware architectures. The system is validated by detecting writing and typing activities that were collected as part of the Advancing Out of School Learning in Mathematics and Engineering (AOLME) project. The implementation of the system using Amazon Web Services (AWS) is shown to be both horizontally and vertically scalable. The software associated with the system was designed to be robust so as to facilitate reproducibility and extensibility for future research.


Modelling And Analysis Of Smart Grids For Critical Data Communication, Abdulfattah Noorwali Dec 2016

Modelling And Analysis Of Smart Grids For Critical Data Communication, Abdulfattah Noorwali

Electronic Thesis and Dissertation Repository

Practical models for the subnetworks of smart grid are presented and analyzed. Critical packet-delay bounds for these subnetworks are determined, with the overall objective of identifying parameters that would help in the design of smart grid with least end-to-end delay.

A single-server non-preemptive queueing model with prioritized critical packets is presented for Home Area Network (HAN). Closed-form expressions for critical packet delay are derived and illustrated as a function of: i) critical packet arrival rate, ii) service rate, iii) utilization factor, and iv) rate of arrival of non-critical packets. Next, wireless HANs using FDMA and TDMA are presented. Upper and …


Expression And The Functional Study Of Fusion Proteins Α-Amylase And Hemolysin- Αas An Application In Biofilm Polysaccharide Degradation, Gede Yuda Sugiarta, Anggoro Wiseso, Siska Yuliana Sari, Etri Dian Kamila, Vanessa Geraldine, Diana Christina, Muhammad Hanifi, Dwiantari Satyapertiwi, Robby Hertanto, Budiman Bela, Masafumi Yohda, Muhamad Sahlan Dec 2016

Expression And The Functional Study Of Fusion Proteins Α-Amylase And Hemolysin- Αas An Application In Biofilm Polysaccharide Degradation, Gede Yuda Sugiarta, Anggoro Wiseso, Siska Yuliana Sari, Etri Dian Kamila, Vanessa Geraldine, Diana Christina, Muhammad Hanifi, Dwiantari Satyapertiwi, Robby Hertanto, Budiman Bela, Masafumi Yohda, Muhamad Sahlan

Makara Journal of Technology

Biofilm is an aggregate of consortium bacteria that adhere to each other on a surface. It is usually protected by the exopolysaccharide layer. Various invasive medical procedures, such as catheterization, endotracheal tube installation, and contact lens utilization, are vulnerable to biofilm infection. The National Institute of Health (NIH) estimates 65% of all microbial infections are caused by biofilm. Periplasmic α-amylase (MalS) is an enzyme that hydrolyzes α-1, 4- glicosidic bond in glycogen, starch, and others related polysaccharides in periplasmic space. Another protein called hemolysin-α (HlyA) is a secretion signal protein on C terminal of particular peptide in gram negative bacteria. …


Thermoeconomic Optimization Of Cascade Refrigeration System Using Mixed Carbon Dioxide And Hydrocarbons At Low Temperature Circuit, Nasruddin Nasruddin, Arnas Arnas, Ahmad Faqih, Niccolo Giannetti Dec 2016

Thermoeconomic Optimization Of Cascade Refrigeration System Using Mixed Carbon Dioxide And Hydrocarbons At Low Temperature Circuit, Nasruddin Nasruddin, Arnas Arnas, Ahmad Faqih, Niccolo Giannetti

Makara Journal of Technology

Many applications and industrial processes require very low cooling temperature, such as cold storage in the biomedical field, requiring temperature below -80 °C. However, single-cycle refrigeration systems can only achieve the effective cooling temperature of -40 °C and, also, the performance of the cycle will decrease drastically for cooling temperatures lower than -35°C. Currently, most of cascade refrigeration systems use refrigerants that have ozone depletion potential (ODP) and global warming potential (GWP), therefore, in this study, a cascade system is simulated using a mixture of environmentally friendly refrigerants, namely, carbon dioxide and a hydrocarbon (propane, ethane or ethylene) as the …


Effect Of Milling On The Densification Of Sic-Basedcomposites From Polysilazane, Alfian Noviyanto, Toshiyuki Nishimura Dec 2016

Effect Of Milling On The Densification Of Sic-Basedcomposites From Polysilazane, Alfian Noviyanto, Toshiyuki Nishimura

Makara Journal of Technology

High density SiC-based composites from polysilazane were fabricated by high energy milling and hot pressing. After cross-linking at 200 °C, the polysilazane was pyrolysed at 1000 °C in N2 for 2 h to form amorphous Si-C-N-O followed by high energy milling for 1 h. Milled amorphous Si-C-N-O was sintered in hot pressing at 1600 and 1700 °C for 1 h in vacuum under the applied pressure of 50 MPa. Although no sintering additives were used, dense SiC-based composites were obtained with this method. Sintered density was 3.04 g/cm3, while only 2.57 g/cm3 for amorphous Si-C-N-O without milling. It is suggested …


Design Of The Human Assembly Strategy In A Self-Optimizing Assembly Cell: A Case Study Of Indonesians, Novie Susanto, Ratna Purwaningsih, Kharisma Panca Kurniawati Dec 2016

Design Of The Human Assembly Strategy In A Self-Optimizing Assembly Cell: A Case Study Of Indonesians, Novie Susanto, Ratna Purwaningsih, Kharisma Panca Kurniawati

Makara Journal of Technology

This paper presents a continuing study of the human cognitive aspect application in the technical systems. The last studies design a human-centered design based on the German culture. The result shows a significant difference of human performance between Germans and Indonesians. Therefore, this study examines the human cognitive model based on Indonesian culture to investigate whether the different cognitive model based on the culture aspect can improve the human performance. The study was conducted on 60 people classified by age, young (16-34 years old) and old (older than 34 years old). Participants render predictions on an assembly activity for two …


Thermal And -Γ –Ray Irradiation Effects On The Ionic Conductivity Of (Licl)X(Montmorillonite)1-X, Safei Purnama, Aziz Khan Jahja, Takeshi Sakuma Dec 2016

Thermal And -Γ –Ray Irradiation Effects On The Ionic Conductivity Of (Licl)X(Montmorillonite)1-X, Safei Purnama, Aziz Khan Jahja, Takeshi Sakuma

Makara Journal of Technology

Compositesof montmorillonite (MMT) - lithium salts have been prepared using a simple process of powders mixing followed by heating. The powders resulting from this method are expected to beionic conductors with a high ionic conductivity characteristics. This characteristics is also further improved by employing gamma-ray irradiation technique at specified irradiation doses. The best results were obtained for the (LiCl)0.5(MMT)0.5 composite with a room temperature ionic conductivity of 2.192 mS/cm, which then increases to ~5 mS/cm after gamma irradiation at a dose of 400 kGy. This value is equivalent to the value of the ionic conductivity of current commercial rechargeable lithium …


Optimizing Supply Chain Collaboration Based On Agreement Buyer-Supplier Relationship With Network Design Problem, Wahyudi Sutopo, Ayu Erliza, Arien Heryansyah Dec 2016

Optimizing Supply Chain Collaboration Based On Agreement Buyer-Supplier Relationship With Network Design Problem, Wahyudi Sutopo, Ayu Erliza, Arien Heryansyah

Makara Journal of Technology

In recent years, the rising competitive environment with shorter product life cycles and high customization forces industries to increase their flexibility, speed up their response, and enhance concurrent engineering designs. To integrate these prospects, supply chain collaboration becomes a pertinent strategy for industries to strengthen their competitiveness. The network design problem is used to implement supply chain collaboration. In the buying and selling process, sharing information between buyer and supplier are important to obtain a transaction decision. The optimimum supply chain profit can be identified by mathematical model of network design problem. The Mathematical Model takes into consideration the uncertainity …


Characterization And Utilization Of Calcium Oxide (Cao) Thermally Decomposed From Fish Bones As A Catalyst In The Production Of Biodiesel From Waste Cooking Oil, Aldes Lesbani, Sabat Okta Ceria Sitompul, Risfidian Mohadi, Nurlisa Hidayati Dec 2016

Characterization And Utilization Of Calcium Oxide (Cao) Thermally Decomposed From Fish Bones As A Catalyst In The Production Of Biodiesel From Waste Cooking Oil, Aldes Lesbani, Sabat Okta Ceria Sitompul, Risfidian Mohadi, Nurlisa Hidayati

Makara Journal of Technology

Thermal decomposition of fish bones to obtain calcium oxide (CaO) was conducted at various temperatures of 400, 500, 800, 900, 1000, and 1100 °C. The calcium oxide was then characterized using X-ray diffractometer, FTIR spectrophotometer, and SEM analysis. The calcium oxide obtained from the decomposition at 1000 °C was then used as a catalyst in the production of biodiesel from waste cooking oil. Diffraction pattern of the calcium oxide produced from decomposition at 1000 °C showed a pattern similar to that of the calcium oxide produced by the Joint Committee on Powder Diffraction Standard (JCDPS). The diffractions of 2q values …


Developing Road Infrastructure Route Planning: Increasing Feasibility Of Toll Road Project, Mohammed Ali Berawi, Teuku Yuri Zagloel, Perdana Miraj, Abdur Rohim Boy Berawi, Wellsi Titaheluw, Saipol Bari Bin Abd Karim Dec 2016

Developing Road Infrastructure Route Planning: Increasing Feasibility Of Toll Road Project, Mohammed Ali Berawi, Teuku Yuri Zagloel, Perdana Miraj, Abdur Rohim Boy Berawi, Wellsi Titaheluw, Saipol Bari Bin Abd Karim

Makara Journal of Technology

Indonesian government attempts to improve connectivity and to increase regional activities in Sumatera Island through the development of Trans Sumatera Toll Road (TSTR). However, despite its benefits to local economic development in Sumatera, the project shows low feasibility due to a low amount of investment. It can be attributed from the lack of planning in the initial phase to produce a comprehensive route that considers the various potentials of the regions. Thus, this research aims to investigate alternative route planning of Trans Sumatera Toll Road particularly in this paper for Central Sumatera by studying Gross Regional Domestic Product (GRDP), population …


Investigation Of Polymer–Plasticizer Blends As Sh-Saw Sensor Coatings For Detection Of Benzene In Water With High Sensitivity And Long-Term Stability, Pintu Adhikari, Laura Jeanne Alderson, Florian Bender, Antonio J. Ricco, Fabien Josse Dec 2016

Investigation Of Polymer–Plasticizer Blends As Sh-Saw Sensor Coatings For Detection Of Benzene In Water With High Sensitivity And Long-Term Stability, Pintu Adhikari, Laura Jeanne Alderson, Florian Bender, Antonio J. Ricco, Fabien Josse

Electrical and Computer Engineering Faculty Research and Publications

We report the first-ever direct detection of benzene in water at concentrations below 100 ppb (parts per billion) using acoustic wave (specifically, shear-horizontal surface acoustic wave, SH-SAW) sensors with plasticized polymer coatings. Two polymers and two plasticizers were studied as materials for sensor coatings. For each polymer–plasticizer combination, the influence of the mixing ratio of the blend on the sensitivity to benzene was measured and compared to commercially available polymers that were used for BTEX (benzene, toluene, ethylbenzene, and xylene) detection in previous work. After optimizing the coating parameters, the highest sensitivity and lowest detection limit for benzene were found …


Electronic Deer Warning System, David Zhuo, Anlang Lu Dec 2016

Electronic Deer Warning System, David Zhuo, Anlang Lu

Computer Engineering

Deer-vehicle collisions (DVCs) are extremely dangerous, often injuring or even killing drivers. Unfortunately, this form of automotive accident is commonplace in the United States. According to the NHTSA, DVCs result in 200 human deaths a year.2

Despite these deadly incidents, there currently are no deployed federal or state systems for preventing DVCs. There are many consumer electronic deer deterrent products, but their long-term effectiveness is questionable.3 In fact, there does not appear to be much research into electronic deer deterrent systems. Aside from constant audio output and electric shock, no other means of electronic deterrent exist. Even if fixed deterrents …


Isopropyl Alcohol Pump For Printed Circuit Boards Using An Arduino, Lawrence Zhu Dec 2016

Isopropyl Alcohol Pump For Printed Circuit Boards Using An Arduino, Lawrence Zhu

Computer Engineering

No abstract provided.


Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi Dec 2016

Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi

UNLV Theses, Dissertations, Professional Papers, and Capstones

Securing IoT (Internet of Things) systems in general, regardless of the communication technology used, has been the concern of many researchers and private companies. As for ZigBee security concerns, much research and many experiments have been conducted to better predict the nature of potential security threats. In this research we are addressing several ZigBee vulnerabilities by performing first hand experiments and attack simulations on ZigBee protocol. This will allow us to better understand the security issues surveyed and find ways to mitigate them. Based on the attack simulations performed and the survey conducted, we have developed a ZigBee IoT framework …


An Emg-Based Patient Monitoring System Using Zynq Soc Device, Farhad Fallahlalehzari Dec 2016

An Emg-Based Patient Monitoring System Using Zynq Soc Device, Farhad Fallahlalehzari

UNLV Theses, Dissertations, Professional Papers, and Capstones

This thesis describes the design, development, and testing of an EMG-based patient monitoring system using the Zynq device. Zynq is a system on chip device designed by Xilinx which consists of an ARM dual cortex-A9 processor as well as an FPGA integrated into one chip. This work also analyzes the performance of image-processing algorithms on this system and compares that performance to more traditional PC-based systems. Image processing algorithms, such as Sobel edge detection, dilation and erosion, could be used in conjunction with a camera for the patient monitoring purposes. These algorithms often perform sub-optimally on processors because of their …


Approximate Computing: An Integrated Cross-Layer Framework, Swagath Venkataramani Dec 2016

Approximate Computing: An Integrated Cross-Layer Framework, Swagath Venkataramani

Open Access Dissertations

A new design approach, called approximate computing (AxC), leverages the flexibility provided by intrinsic application resilience to realize hardware or software implementations that are more efficient in energy or performance. Approximate computing techniques forsake exact (numerical or Boolean) equivalence in the execution of some of the application’s computations, while ensuring that the output quality is acceptable. While early efforts in approximate computing have demonstrated great potential, they consist of ad hoc techniques applied to a very narrow set of applications, leaving in question the applicability of approximate computing in a broader context.

The primary objective of this thesis is to …


Implementing A Wireless Monitoring Solution For A Biomechanical Telemetry System, Hyung Suk Kim Dec 2016

Implementing A Wireless Monitoring Solution For A Biomechanical Telemetry System, Hyung Suk Kim

Open Access Theses

Sport-related Traumatic Brain Injury (TBI) is one of the major concerns for collision based sports athletes and their families. The ability to measure impacts on the head is imperative to monitor brain injury and prevent serious TBI. Recent research by the Purdue Neurotrauma Group (PNG) indicates that accumulation of subconcussive impacts may cause permanent neurological damage. Currently available commercial impact monitoring systems are designed as an event-based models which collect impact data above pre-determined acceleration thresholds. To track long-term effects of sub-concussive impacts, event-based modeling is inadequate. The PNG developed a biomechanical sports telemetry system that is capable of storing …


Improvement Of A Biomechanical Telemetry System Hardware Platform, Soon Ho Kwon Dec 2016

Improvement Of A Biomechanical Telemetry System Hardware Platform, Soon Ho Kwon

Open Access Theses

Traumatic brain injuries (TBI) while playing sports are a major concern for the general public today. Recently, studies have shown that repetitive subconcussive hits can lead to neurological disorders. In order to prevent the athletes from suffering traumatic brain injuries, many organizations related to contact based sports and the military employ commercialized head impact telemetry systems. However, a majority of the commercialized systems is event based which only collects the linear acceleration that exceeds a certain threshold. To accurately record and utilize the data from the impact telemetry system, it is necessary to record all the linear and angular acceleration …


A High-Performance Communication Topology For Decentralized Protocols, Raza A. Khan Dec 2016

A High-Performance Communication Topology For Decentralized Protocols, Raza A. Khan

Open Access Theses

Preserving transaction atomicity and ensuring its commitment is key to the maintenance of data integrity in a distributed database. The distributed consensus protocol is a prominent example of a mechanism used to accomplish safe commitment of a distributed transaction. These protocols are based primarily on repeated message exchange among all sites/nodes and their performance is characterized not only by the number of these messages but also by the underlying communication topology. This thesis proposes a measure of performance known as average message complexity and proposes a communication structure based on folded even graphs called the Folded Even Network (FEN). Performance …


Psychophysiological Analysis Of A Pedagogical Agent And Robotic Peer For Individuals With Autism Spectrum Disorders., Mohammad Nasser Saadatzi Dec 2016

Psychophysiological Analysis Of A Pedagogical Agent And Robotic Peer For Individuals With Autism Spectrum Disorders., Mohammad Nasser Saadatzi

Electronic Theses and Dissertations

Autism spectrum disorder (ASD) is a neurodevelopmental disorder characterized by ongoing problems in social interaction and communication, and engagement in repetitive behaviors. According to Centers for Disease Control and Prevention, an estimated 1 in 68 children in the United States has ASD. Mounting evidence shows that many of these individuals display an interest in social interaction with computers and robots and, in general, feel comfortable spending time in such environments. It is known that the subtlety and unpredictability of people’s social behavior are intimidating and confusing for many individuals with ASD. Computerized learning environments and robots, however, prepare a predictable, …


Analog Spiking Neuromorphic Circuits And Systems For Brain- And Nanotechnology-Inspired Cognitive Computing, Xinyu Wu Dec 2016

Analog Spiking Neuromorphic Circuits And Systems For Brain- And Nanotechnology-Inspired Cognitive Computing, Xinyu Wu

Boise State University Theses and Dissertations

Human society is now facing grand challenges to satisfy the growing demand for computing power, at the same time, sustain energy consumption. By the end of CMOS technology scaling, innovations are required to tackle the challenges in a radically different way. Inspired by the emerging understanding of the computing occurring in a brain and nanotechnology-enabled biological plausible synaptic plasticity, neuromorphic computing architectures are being investigated. Such a neuromorphic chip that combines CMOS analog spiking neurons and nanoscale resistive random-access memory (RRAM) using as electronics synapses can provide massive neural network parallelism, high density and online learning capability, and hence, paves …