Open Access. Powered by Scholars. Published by Universities.®

Hardware Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

515 Full-Text Articles 762 Authors 344,893 Downloads 88 Institutions

All Articles in Hardware Systems

Faceted Search

515 full-text articles. Page 1 of 22.

Drones For Marine Science And Agriculture, David Caldera, Sai Murthy 2023 California Polytechnic State University, San Luis Obispo

Drones For Marine Science And Agriculture, David Caldera, Sai Murthy

College of Engineering Summer Undergraduate Research Program

Our research project was launched at Cal Poly in 2019 with the goal of assisting researchers at the CSULB Shark Lab in detecting sharks from aerial images. Under the guidance of Dr. Franz J. Kurfess, students trained an object detection algorithm using shark images and were able to achieve high rate of detection. Following this success, the team has constructed multiple drones and expanded their research to include applications in the fields of agriculture and ecology. This summer the goal is to use a iPhone 14 Pro in lieu of a traditional camera system for real-time object recognition. Object detection …


National Conference On Computing 4.0 Empowering The Next Generation Of Technology (Era Of Computing 4.0 And Its Impact On Technology And Intelligent Systems), Subhrajit Pradhan Prof (Dr), Chandan Kumar Sahoo Dr., Tarini Prasad Pattnaik Prof., Tamasha Priyadarshini Prof 2023 Principal, GANDHI INSTITUTE OF EXCELLENT TECHNOCRATS (GIET) Ghangapatana, Bhubaneswar

National Conference On Computing 4.0 Empowering The Next Generation Of Technology (Era Of Computing 4.0 And Its Impact On Technology And Intelligent Systems), Subhrajit Pradhan Prof (Dr), Chandan Kumar Sahoo Dr., Tarini Prasad Pattnaik Prof., Tamasha Priyadarshini Prof

Conference Proceedings - Full Volumes

As we enter the era of Computing 4.0, the landscape of technology and intelligent systems is rapidly evolving, with groundbreaking advancements in artificial intelligence, machine learning, data science, and beyond. The theme of this conference revolves around exploring and shaping the future of these intelligent systems that will revolutionize industries and transform the way we live, work, and interact with technology.

Conference Topics

  • Quantum Computing and Quantum Information
  • Edge Computing and Fog Computing
  • Artificial Intelligence and Machine Learning in Computing 4.0
  • Internet of Things (IOT) and Smart Cities
  • Block chain and Distributed Ledger Technologies
  • Cybersecurity and Privacy in the Computing …


Watch: A Distributed Clock Time Offset Estimation Tool On The Platform For Open Wireless Data-Driven Experimental Research, Cassie Jeng 2023 Washington University in St. Louis

Watch: A Distributed Clock Time Offset Estimation Tool On The Platform For Open Wireless Data-Driven Experimental Research, Cassie Jeng

McKelvey School of Engineering Theses & Dissertations

The synchronization of the clocks used at different devices across space is of critical importance in wireless communications networks. Each device’s local clock differs slightly, affecting the times at which packets are transmitted from different nodes in the network. This thesis provides experimentation and software development on POWDER, the Platform for Open, Wireless Data-driven Experimental Research, an open wireless testbed across the University of Utah campus. We build upon Shout, a suite of Python scripts that allow devices to iteratively transmit and receive with each other and save the collected data. We introduce WATCH, an experimental method to estimate clock …


Sel4 On Risc-V - Developing High Assurance Platforms With Modular Open-Source Architectures, Michael A. Doran Jr 2023 Grand Valley State University

Sel4 On Risc-V - Developing High Assurance Platforms With Modular Open-Source Architectures, Michael A. Doran Jr

Masters Theses

Virtualization is now becoming an industry standard for modern embedded systems. Modern embedded systems can now support multiple applications on a single hardware platform while meeting power and cost requirements. Virtualization on an embedded system is achieved through the design of the hardware-software interface. Instruction set architecture, ISA, defines the hardware-software interface for an embedded system. At the hardware level the ISA, provides extensions to support virtualization.

In addition to an ISA that supports hypervisor extensions it is equally important to provide a hypervisor completely capable of exploiting the benefits of virtualization for securing modern embedded systems. Currently there does …


Virtual Prototyping Of Pebb Based Power Electronics System For Ground Vehicles, Yi Li 2023 Clemson University

Virtual Prototyping Of Pebb Based Power Electronics System For Ground Vehicles, Yi Li

All Theses

Power electronics are heavily involved in power and energy systems in plenty of applications nowadays. The increase of demand brings more challenges into simulations for development. Considering the complexity of the systems and high frequency operational conditions, this paper presents comprehensive research on modeling, simulating, and validation on ground vehicle propulsion system applications.

To reduce the computational burden, the Power Electronics Building Blocks concept is utilized to simplify the structure of modeling under different conversion scenarios in ground vehicle systems. In addition, the Average and Switching versions models are included. To speedup the simulation, the engagement of advanced computing technique …


Electrical Vehicle Charging Infrastructure Design And Operations, Yu Yang, Hen-Geul Yeh 2023 California State University, Long Beach

Electrical Vehicle Charging Infrastructure Design And Operations, Yu Yang, Hen-Geul Yeh

Mineta Transportation Institute Publications

California aims to achieve five million zero-emission vehicles (ZEVs) on the road by 2030 and 250,000 electrical vehicle (EV) charging stations by 2025. To reduce barriers in this process, the research team developed a simulation-based system for EV charging infrastructure design and operations. The increasing power demand due to the growing EV market requires advanced charging infrastructures and operating strategies. This study will deliver two modules in charging station design and operations, including a vehicle charging schedule and an infrastructure planning module for the solar-powered charging station. The objectives are to increase customers’ satisfaction, reduce the power grid burden, and …


Digital Simulations Of Memristors Towards Integration With Reconfigurable Computing, Ivris Raymond 2023 University of Arkansas, Fayetteville

Digital Simulations Of Memristors Towards Integration With Reconfigurable Computing, Ivris Raymond

Computer Science and Computer Engineering Undergraduate Honors Theses

The end of Moore’s Law has been predicted for decades. Demand for increased parallel computational performance has been increased by improvements in machine learning. This past decade has demonstrated the ever-increasing creativity and effort necessary to extract scaling improvements in CMOS fabrication processes. However, CMOS scaling is nearing its fundamental physical limits. A viable path for increasing performance is to break the von Neumann bottleneck. In-memory computing using emerging memory technologies (e.g. ReRam, STT, MRAM) offers a potential path beyond the end of Moore’s Law. However, there is currently very little support from industry tools for designers wishing to incorporate …


Bridging The Gap Between Public Organizaions And Cybersecurity, Christopher Boutros 2023 California State University, San Bernardino

Bridging The Gap Between Public Organizaions And Cybersecurity, Christopher Boutros

Electronic Theses, Projects, and Dissertations

Cyberattacks are a major problem for public organizations across the nation, and unfortunately for them, the frequency of these attacks is constantly growing. This project used a case study approach to explore the types of cybersecurity public organization agencies face and how those crimes can be mitigated. The goal of this paper is to understand how public organization agencies have prepared for cyberattacks and discuss additional suggestions to improve their current systems with the current research available This research provides an analysis of current cyber security systems, new technologies that can be implemented, roadblocks public agencies face before and during …


Protecting The Infrastructure Of Michigan: Analyzing And Understanding Internet Infrastructure, Samuel Blaser, Travis Munyer, Damian Ramirez, Lester Juarez, Jackson Servant 2023 University of Nebraska at Omaha

Protecting The Infrastructure Of Michigan: Analyzing And Understanding Internet Infrastructure, Samuel Blaser, Travis Munyer, Damian Ramirez, Lester Juarez, Jackson Servant

Theses/Capstones/Creative Projects

The Michigan Army National Guard DCOE is hoping to increase their understanding of the physical, electrical, protocol, and logical topography of internet service. In order to understand the infrastructure of the internet, information must be collected on its pieces. By studying, describing, and illustrating the infrastructure of the global internet we can develop hardening tactics, improve user training, and develop contingency plans in the case of an attack. The research is focused on where data lives, locating data centers in the region, identifying global infrastructure and who owns it, and potential for hardening. An interactive map has been created in …


Pillow Based Sleep Tracking Device Using Raspberry Pi, Venkatachalam Seviappan 2023 California State University, San Bernardino

Pillow Based Sleep Tracking Device Using Raspberry Pi, Venkatachalam Seviappan

Electronic Theses, Projects, and Dissertations

Almost half of all people have sleep interruptions at some point in their lives, making sleep disorders a common issue that affects a sizeable section of the population. Both their physical and emotional well-being may suffer as a result of this.Insomnia, which is a prevalent sleep disorder, is identified by symptoms including insufficient sleep duration and quality, trouble initiating sleep, multiple nighttime awakenings, early morning awakenings, and non-restorative sleep. It is essential to employ sleep monitoring systems to detect sleeping disorders as soon as possible for prompt diagnosis and treatment. To avoid sleep related health issues, there are plenty of …


Encrypted Malicious Network Traffic Detection Using Machine Learning, Niklas Knipschild 2023 Kennesaw State University

Encrypted Malicious Network Traffic Detection Using Machine Learning, Niklas Knipschild

Symposium of Student Scholars

The research project aims to find ways to detect malicious packets inside encrypted network traffic. In addition to this goal maintaining user privacy is a priority. As encryption has become less expensive to implement more and more network traffic is encrypted. Currently, 90% of all network traffic is encrypted, and this trend is expected to increase. The creators of malware areemploying various methods to ensure delivery of their malware, including encryption. One proposed method to combat this suggests implementing machine learning with various algorithms to analyze packet attributes to determine if they contain malware, without actually knowing what's inside …


The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman 2023 Embry-Riddle Aeronautical University

The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman

Doctoral Dissertations and Master's Theses

This study provides a synopsis of the following topics: the prospective limiters levied on cyber-warfare by present–day international legislation; significant complexities and contentions brought up in the rendering & utilization of International Humanitarian Legislation against cyber-warfare; feasible repercussions of cyber-warfare on humanitarian causes. It is also to be contended and outlined in this research study that non–state actors can be held accountable for breaches of international humanitarian legislation committed using cyber–ordnance if sufficient resources and skill are made available. It details the factors that prosecutors and investigators must take into account when organizing investigations into major breaches of humanitarian legislation …


Accurate Indoor Navigation System Based On Imu/Lp-Mm Integrated Method Using Kalman Filter Algorithm, Abdullah Mohammed Bahasan 2023 Hadramout university

Accurate Indoor Navigation System Based On Imu/Lp-Mm Integrated Method Using Kalman Filter Algorithm, Abdullah Mohammed Bahasan

Hadhramout University Journal of Natural & Applied Sciences

Abstract

The demand for navigation systems is rapidly increasing, especially in indoor environments which the signal of GPS is not available. Therefore the Inertial Measurement Unit (IMU) system is a suitable navigation system in such indoor environments. It usually consists of three accelerometers and three gyroscopes to determine position, velocity and attitude information, respectively, without need of any external source. But this type of navigation systems has errors growth with time due to accelerometers and gyroscopes drifts. This paper introduces indoor navigation system based on integrated IMU navigation system with proposed system called Landmarks Points-Map Matching (LP-MM) system using Kalman …


Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian) 2023 Central University of South Bihar, Panchanpur, Gaya, Bihar

Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)

Library Philosophy and Practice (e-journal)

Abstract

Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …


Phone Microwave, Khanh Kim Hoang, Emily Zhou 2023 California Polytechnic State University, San Luis Obispo

Phone Microwave, Khanh Kim Hoang, Emily Zhou

Computer Engineering

This project involves the installation of remote-control capabilities in an antique 1980s microwave, effectively turning the microwave into a “smart” device. While preserving the original functionality of the microwave, a combination of software and hardware components allows for remote microwave operations. The microwave can be remotely operated by calling the built-in number, and more advanced settings and options can be utilized by texting. The microwave is also secured against unauthorized use with the addition of a PIN code that is required to operate the device.


Imitation Learning For Swarm Control Using Variational Inference, Hafeez Olafisayo Jimoh 2023 West Virginia University

Imitation Learning For Swarm Control Using Variational Inference, Hafeez Olafisayo Jimoh

Graduate Theses, Dissertations, and Problem Reports

Swarms are groups of robots that can coordinate, cooperate, and communicate to achieve tasks that may be impossible for a single robot. These systems exhibit complex dynamical behavior, similar to those observed in physics, neuroscience, finance, biology, social and communication networks, etc. For instance, in Biology, schools of fish, swarm of bacteria, colony of termites exhibit flocking behavior to achieve simple and complex tasks. Modeling the dynamics of flocking in animals is challenging as we usually do not have full knowledge of the dynamics of the system and how individual agent interact. The environment of swarms is also very noisy …


A Secure And Distributed Architecture For Vehicular Cloud And Protocols For Privacy-Preserving Message Dissemination In Vehicular Ad Hoc Networks, Hassan Mistareehi 2023 University of Kentucky

A Secure And Distributed Architecture For Vehicular Cloud And Protocols For Privacy-Preserving Message Dissemination In Vehicular Ad Hoc Networks, Hassan Mistareehi

Theses and Dissertations--Computer Science

Given the enormous interest in self-driving cars, Vehicular Ad hoc NETworks (VANETs) are likely to be widely deployed in the near future. Cloud computing is also gaining widespread deployment. Marriage between cloud computing and VANETs would help solve many of the needs of drivers, law enforcement agencies, traffic management, etc. The contributions of this dissertation are summarized as follows: A Secure and Distributed Architecture for Vehicular Cloud: Ensuring security and privacy is an important issue in the vehicular cloud; if information exchanged between entities is modified by a malicious vehicle, serious consequences such as traffic congestion and accidents can …


Developing A Web-Based System For Remote Collection And Analysis Of Vehicle Electrical Systems Over Canbus Using Carloop, Joshua N. Valle, Alex Columna-Fuentes 2023 Arcadia University

Developing A Web-Based System For Remote Collection And Analysis Of Vehicle Electrical Systems Over Canbus Using Carloop, Joshua N. Valle, Alex Columna-Fuentes

Capstone Showcase

Our program collects vehicle data using an OBD-II device called Carloop that is plugged into the vehicle's diagnostic port. The device executes our code which then communicates with the vehicle's onboard computer to collect data such as engine RPM, vehicle speed, fuel level, and other diagnostic information. This data is then sent over WiFi to Particle’s Cloud, which is a platform for managing IoT devices.

Integrations set up on Particle take care of sending data to our InfluxDB Database, which is hosted on our own cloud-based machine. InfluxDB is a high-performance time-series database that is optimized for storing and querying …


Small Business Office Network, Michael Gerome 2023 The University of Akron

Small Business Office Network, Michael Gerome

Williams Honors College, Honors Research Projects

This project will emulate a small office network environment. The project will demonstrate the process of building and configuring the network to meet the requirements laid out in the project plan. This network includes four subnets with Windows 10 end devices and a Kali Linux device, it also includes five Cisco layer 2 switches and three Cisco routers. There are also three subnets connecting the routers to each other to enable routing between the subnets. After the network environment is set up, various penetration tests are performed from the Kali Linux device to gather information. The Nmap reconnaissance tool is …


Small Voip-Supported Network, Drina Hobson 2023 The University of Akron

Small Voip-Supported Network, Drina Hobson

Williams Honors College, Honors Research Projects

Create a small VoIP network using SIP using physical Cisco equipment. Implement advanced VoIP features such as multicast paging, voice message system & message waiting indicator, and music-on-hold.


Digital Commons powered by bepress