Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

Spectral, Energy And Computation Efficiency In Future 5g Wireless Networks, Haijian Sun Aug 2019

Spectral, Energy And Computation Efficiency In Future 5g Wireless Networks, Haijian Sun

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Wireless technology has revolutionized the way people communicate. From first generation, or 1G, in the 1980s to current, largely deployed 4G in the 2010s, we have witnessed not only a technological leap, but also the reformation of associated applications. It is expected that 5G will become commercially available in 2020. 5G is driven by ever-increasing demands for high mobile traffic, low transmission delay, and massive numbers of connected devices. Today, with the popularity of smart phones, intelligent appliances, autonomous cars, and tablets, communication demands are higher than ever, especially when it comes to low-cost and easy-access solutions.

Existing communication architecture …


Understanding Security Threats Of Emerging Computing Architectures And Mitigating Performance Bottlenecks Of On-Chip Interconnects In Manycore Ntc System, Chidhambaranathan Rajamanikkam May 2019

Understanding Security Threats Of Emerging Computing Architectures And Mitigating Performance Bottlenecks Of On-Chip Interconnects In Manycore Ntc System, Chidhambaranathan Rajamanikkam

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Emerging computing architectures such as, neuromorphic computing and third party intellectual property (3PIP) cores, have attracted significant attention in the recent past. Neuromorphic Computing introduces an unorthodox non-von neumann architecture that mimics the abstract behavior of neuron activity of the human brain. They can execute more complex applications, such as image processing, object recognition, more efficiently in terms of performance and energy than the traditional microprocessors. However, focus on the hardware security aspects of the neuromorphic computing at its nascent stage. 3PIP core, on the other hand, have covertly inserted malicious functional behavior that can inflict range of harms at …