Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 199

Full-Text Articles in Engineering

Scalable Communication Frameworks For Multi-Agency Data Sharing, Shafaq Chaudhry Jan 2020

Scalable Communication Frameworks For Multi-Agency Data Sharing, Shafaq Chaudhry

Electronic Theses and Dissertations, 2020-

With the rise in frequency and magnitude of natural disasters, there is a need to break down monolithic organizational barriers and engage with community volunteers. This calls for ease of systems interoperability to facilitate communication, data-sharing and scalability of real-time response, essential for crisis communications. We propose two scalable frameworks that enable multi-agency interoperability and real-time data-sharing. The first framework harnesses the power of social media, artificial intelligence, and community volunteers to form an extended rescue-and-response network that alleviates call center burden and augments the finite capacity of dispatch units. Through an "online 9-1-1" service, affected people can request help …


Detecting Small Moving Targets In Infrared Imagery, Adam Cuellar Jan 2020

Detecting Small Moving Targets In Infrared Imagery, Adam Cuellar

Electronic Theses and Dissertations, 2020-

Deep convolutional neural networks have achieved remarkable results for detecting large and medium sized objects in images. However, the ability to detect smallobjects has yet to achieve the same level performance. Our focus is on applications that require the accurate detection and localization of small moving objects that are distantfrom the sensor. We first examine the ability of several state-of-the-art object detection networks (YOLOv3 and Mask R-CNN) to find small moving targets in infraredimagery using a publicly released dataset by the US Army Night Vision and Electronic Sensors Directorate. We then introduce a novel Moving Target Indicator Network (MTINet) and …


Deep Hashing For Image Similarity Search, Ali Al Kobaisi Jan 2020

Deep Hashing For Image Similarity Search, Ali Al Kobaisi

Electronic Theses and Dissertations, 2020-

Hashing for similarity search is one of the most widely used methods to solve the approximate nearest neighbor search problem. In this method, one first maps data items from a real valued high-dimensional space to a suitable low dimensional binary code space and then performs the approximate nearest neighbor search in this code space instead. This is beneficial because the search in the code space can be solved more efficiently in terms of runtime complexity and storage consumption. Obviously, for this method to succeed, it is necessary that similar data items be mapped to binary code words that have small …


Distributed Multi-Agent Optimization And Control With Applications In Smart Grid, Towfiq Rahman Jan 2020

Distributed Multi-Agent Optimization And Control With Applications In Smart Grid, Towfiq Rahman

Electronic Theses and Dissertations, 2020-

With recent advancements in network technologies like 5G and Internet of Things (IoT), the size and complexity of networked interconnected agents have increased rapidly. Although centralized schemes have simpler algorithm design, in practicality, it creates high computational complexity and requires high bandwidth for centralized data pooling. In this dissertation, for distributed optimization of networked multi-agent architecture, the Alternating Direction Method of Multipliers (ADMM) is investigated. In particular, a new adaptive-gain ADMM algorithm is derived in closed form and under the standard convex property to greatly speed up the convergence of ADMM-based distributed optimization. Using the Lyapunov direct approach, the proposed …


Data-Driven Nonlinear Control Designs For Constrained Systems, Roland Harvey Jan 2020

Data-Driven Nonlinear Control Designs For Constrained Systems, Roland Harvey

Electronic Theses and Dissertations, 2020-

Systems with nonlinear dynamics are theoretically constrained to the realm of nonlinear analysis and design, while explicit constraints are expressed as equalities or inequalities of state, input, and output vectors of differential equations. Few control designs exist for systems with such explicit constraints, and no generalized solution has been provided. This dissertation presents general techniques to design stabilizing controls for a specific class of nonlinear systems with constraints on input and output, and verifies that such designs are straightforward to implement in selected applications. Additionally, a closed-form technique for an open-loop problem with unsolvable dynamic equations is developed. Typical optimal …


Mfpa: Mixed-Signal Field Programmable Array For Energy-Aware Compressive Signal Processing, Adrian Tatulian Jan 2020

Mfpa: Mixed-Signal Field Programmable Array For Energy-Aware Compressive Signal Processing, Adrian Tatulian

Electronic Theses and Dissertations, 2020-

Compressive Sensing (CS) is a signal processing technique which reduces the number of samples taken per frame to decrease energy, storage, and data transmission overheads, as well as reducing time taken for data acquisition in time-critical applications. The tradeoff in such an approach is increased complexity of signal reconstruction. While several algorithms have been developed for CS signal reconstruction, hardware implementation of these algorithms is still an area of active research. Prior work has sought to utilize parallelism available in reconstruction algorithms to minimize hardware overheads; however, such approaches are limited by the underlying limitations in CMOS technology. Herein, the …


Pervasive Spectrum Sharing For Improved Wireless Experience, Mostafizur Rahman Jan 2020

Pervasive Spectrum Sharing For Improved Wireless Experience, Mostafizur Rahman

Electronic Theses and Dissertations, 2020-

Spectrum sharing among cellular users has been a promising approach to attain better efficiency in the use of the limited spectral bands. The existing dynamic spectrum access techniques include sharing of the licensed spectrum bands by allowing other 'secondary' users to use the bands if the licensee 'primary' user is idle. This primary-secondary spectrum sharing is limited in terms of design space, and may not be sufficient to meet the ever-increasing demand of connectivity and high signal quality to improve the end-users' wireless experience. The next step to increase spectrum efficiency is to design markets where sharing takes place pervasively …


Heterogeneous Reconfigurable Fabrics For In-Circuit Training And Evaluation Of Neuromorphic Architectures, Ramtin Mohammadizand May 2019

Heterogeneous Reconfigurable Fabrics For In-Circuit Training And Evaluation Of Neuromorphic Architectures, Ramtin Mohammadizand

Electronic Theses and Dissertations

A heterogeneous device technology reconfigurable logic fabric is proposed which leverages the cooperating advantages of distinct magnetic random access memory (MRAM)-based look-up tables (LUTs) to realize sequential logic circuits, along with conventional SRAM-based LUTs to realize combinational logic paths. The resulting Hybrid Spin/Charge FPGA (HSC-FPGA) using magnetic tunnel junction (MTJ) devices within this topology demonstrates commensurate reductions in area and power consumption over fabrics having LUTs constructed with either individual technology alone. Herein, a hierarchical top-down design approach is used to develop the HSCFPGA starting from the configurable logic block (CLB) and slice structures down to LUT circuits and the …


Value-Of-Information Based Data Collection In Underwater Sensor Networks, Fahad Khan May 2019

Value-Of-Information Based Data Collection In Underwater Sensor Networks, Fahad Khan

Electronic Theses and Dissertations

Underwater sensor networks are deployed in marine environments, presenting specific challenges compared to sensor networks deployed in terrestrial settings. Among the major issues that underwater sensor networks face is communication medium limitations that result in low bandwidth and long latency. This creates problems when these networks need to transmit large amounts of data over long distances. A possible solution to address this issue is to use mobile sinks such as autonomous underwater vehicles (AUVs) to offload these large quantities of data. Such mobile sinks are called data mules. Often it is the case that a sensor network is deployed to …


Leveraging The Intrinsic Switching Behaviors Of Spintronic Devices For Digital And Neuromorphic Circuits, Steven Pyle May 2019

Leveraging The Intrinsic Switching Behaviors Of Spintronic Devices For Digital And Neuromorphic Circuits, Steven Pyle

Electronic Theses and Dissertations

With semiconductor technology scaling approaching atomic limits, novel approaches utilizing new memory and computation elements are sought in order to realize increased density, enhanced functionality, and new computational paradigms. Spintronic devices offer intriguing avenues to improve digital circuits by leveraging non-volatility to reduce static power dissipation and vertical integration for increased density. Novel hybrid spintronic-CMOS digital circuits are developed herein that illustrate enhanced functionality at reduced static power consumption and area cost. The developed spin-CMOS D Flip-Flop offers improved power-gating strategies by achieving instant store/restore capabilities while using 10 fewer transistors than typical CMOS-only implementations. The spin-CMOS Muller C-Element developed …


Normally-Off Computing Design Methodology Using Spintronics: From Devices To Architectures, Arman Roohi May 2019

Normally-Off Computing Design Methodology Using Spintronics: From Devices To Architectures, Arman Roohi

Electronic Theses and Dissertations

Energy-harvesting-powered computing offers intriguing and vast opportunities to dramatically transform the landscape of Internet of Things (IoT) devices and wireless sensor networks by utilizing ambient sources of light, thermal, kinetic, and electromagnetic energy to achieve battery-free computing. In order to operate within the restricted energy capacity and intermittency profile of battery-free operation, it is proposed to innovate Elastic Intermittent Computation (EIC) as a new duty-cycle-variable computing approach leveraging the non-volatility inherent in post-CMOS switching devices. The foundations of EIC will be advanced from the ground up by extending Spin Hall Effect Magnetic Tunnel Junction (SHE-MTJ) device models to realize SHE-MTJ-based …


Automated Synthesis Of Unconventional Computing Systems, Amad Ul Hassen Jan 2019

Automated Synthesis Of Unconventional Computing Systems, Amad Ul Hassen

Electronic Theses and Dissertations

Despite decades of advancements, modern computing systems which are based on the von Neumann architecture still carry its shortcomings. Moore's law, which had substantially masked the effects of the inherent memory-processor bottleneck of the von Neumann architecture, has slowed down due to transistor dimensions nearing atomic sizes. On the other hand, modern computational requirements, driven by machine learning, pattern recognition, artificial intelligence, data mining, and IoT, are growing at the fastest pace ever. By their inherent nature, these applications are particularly affected by communication-bottlenecks, because processing them requires a large number of simple operations involving data retrieval and storage. The …


Scalable Map Information Dissemination For Connected And Automated Vehicle Systems, S. M. Osman Gani Jan 2019

Scalable Map Information Dissemination For Connected And Automated Vehicle Systems, S. M. Osman Gani

Electronic Theses and Dissertations

Situational awareness in connected and automated vehicle (CAV) systems becomes particularly challenging in the presence of non-line of sight objects and/or objects beyond the sensing range of local onboard sensors. Despite the fact that fully autonomous driving requires the use of multiple redundant sensor systems, primarily including camera, radar, and LiDAR, the non-line of sight object detection problem still persists due to the inherent limitations of those sensing techniques. To tackle this challenge, the inter-vehicle communication system is envisioned that allows vehicles to exchange self-status updates aiming to extend their effective field of view and thus compensate for the limitations …


Robotic Automation Of A Cnc Machine, Jace Hovey Jan 2019

Robotic Automation Of A Cnc Machine, Jace Hovey

Honors Undergraduate Theses

Robotic automation of CNC machines is becoming more popular as robot technology advances and becomes more readily available. While some CNC machines can run autonomously with part catchers, vertical milling centers require an external entity to keep the machine running. Collaborative and Industrial robots are the two main selections for automating a vertical CNC milling machine. We investigate specifically which robot type is most effective for machine tending a Haas VF2 vertical milling center. To do this a cell floor plan, risk assessment, overall equipment effectiveness evaluation, and a total cost analysis are performed to compare robots. With this results …


Soft-Error Resilience Framework For Reliable And Energy-Efficient Cmos Logic And Spintronic Memory Architectures, Faris Alghareb Jan 2019

Soft-Error Resilience Framework For Reliable And Energy-Efficient Cmos Logic And Spintronic Memory Architectures, Faris Alghareb

Electronic Theses and Dissertations

The revolution in chip manufacturing processes spanning five decades has proliferated high performance and energy-efficient nano-electronic devices across all aspects of daily life. In recent years, CMOS technology scaling has realized billions of transistors within large-scale VLSI chips to elevate performance. However, these advancements have also continually augmented the impact of Single-Event Transient (SET) and Single-Event Upset (SEU) occurrences which precipitate a range of Soft-Error (SE) dependability issues. Consequently, soft-error mitigation techniques have become essential to improve systems' reliability. Herein, first, we proposed optimized soft-error resilience designs to improve robustness of sub-micron computing systems. The proposed approaches were developed to …


Simulation, Analysis, And Optimization Of Heterogeneous Cpu-Gpu Systems, Christopher Giles Jan 2019

Simulation, Analysis, And Optimization Of Heterogeneous Cpu-Gpu Systems, Christopher Giles

Electronic Theses and Dissertations

With the computing industry's recent adoption of the Heterogeneous System Architecture (HSA) standard, we have seen a rapid change in heterogeneous CPU-GPU processor designs. State-of-the-art heterogeneous CPU-GPU processors tightly integrate multicore CPUs and multi-compute unit GPUs together on a single die. This brings the MIMD processing capabilities of the CPU and the SIMD processing capabilities of the GPU together into a single cohesive package with new HSA features comprising better programmability, coherency between the CPU and GPU, shared Last Level Cache (LLC), and shared virtual memory address spaces. These advancements can potentially bring marked gains in heterogeneous processor performance and …


Guided Autonomy For Quadcopter Photography, Saif Alabachi Jan 2019

Guided Autonomy For Quadcopter Photography, Saif Alabachi

Electronic Theses and Dissertations

Photographing small objects with a quadcopter is non-trivial to perform with many common user interfaces, especially when it requires maneuvering an Unmanned Aerial Vehicle (C) to difficult angles in order to shoot high perspectives. The aim of this research is to employ machine learning to support better user interfaces for quadcopter photography. Human Robot Interaction (HRI) is supported by visual servoing, a specialized vision system for real-time object detection, and control policies acquired through reinforcement learning (RL). Two investigations of guided autonomy were conducted. In the first, the user directed the quadcopter with a sketch based interface, and periods of …


Rethinking Routing And Peering In The Era Of Vertical Integration Of Network Functions, Prasun Kanti Dey Jan 2019

Rethinking Routing And Peering In The Era Of Vertical Integration Of Network Functions, Prasun Kanti Dey

Electronic Theses and Dissertations

Content providers typically control the digital content consumption services and are getting the most revenue by implementing an "all-you-can-eat" model via subscription or hyper-targeted advertisements. Revamping the existing Internet architecture and design, a vertical integration where a content provider and access ISP will act as unibody in a sugarcane form seems to be the recent trend. As this vertical integration trend is emerging in the ISP market, it is questionable if existing routing architecture will suffice in terms of sustainable economics, peering, and scalability. It is expected that the current routing will need careful modifications and smart innovations to ensure …


Improvement Of Data-Intensive Applications Running On Cloud Computing Clusters, Ibrahim Adel Ibrahim Jan 2019

Improvement Of Data-Intensive Applications Running On Cloud Computing Clusters, Ibrahim Adel Ibrahim

Electronic Theses and Dissertations

MapReduce, designed by Google, is widely used as the most popular distributed programming model in cloud environments. Hadoop, an open-source implementation of MapReduce, is a data management framework on large cluster of commodity machines to handle data-intensive applications. Many famous enterprises including Facebook, Twitter, and Adobe have been using Hadoop for their data-intensive processing needs. Task stragglers in MapReduce jobs dramatically impede job execution on massive datasets in cloud computing systems. This impedance is due to the uneven distribution of input data and computation load among cluster nodes, heterogeneous data nodes, data skew in reduce phase, resource contention situations, and …


Context-Centric Affect Recognition From Paralinguistic Features Of Speech, Andreas Marpaung Jan 2019

Context-Centric Affect Recognition From Paralinguistic Features Of Speech, Andreas Marpaung

Electronic Theses and Dissertations

As the field of affect recognition has progressed, many researchers have shifted from having unimodal approaches to multimodal ones. In particular, the trends in paralinguistic speech affect recognition domain have been to integrate other modalities such as facial expression, body posture, gait, and linguistic speech. Our work focuses on integrating contextual knowledge into paralinguistic speech affect recognition. We hypothesize that a framework to recognize affect through paralinguistic features of speech can improve its performance by integrating relevant contextual knowledge. This dissertation describes our research to integrate contextual knowledge into the paralinguistic affect recognition process from acoustic features of speech. We …


Autonomous Discovery And Maintenance Of Mobile Frees-Space-Optical Links, Mahmudur Khan Aug 2018

Autonomous Discovery And Maintenance Of Mobile Frees-Space-Optical Links, Mahmudur Khan

Electronic Theses and Dissertations

Free-Space-Optical (FSO) communication has the potential to play a significant role in future generation wireless networks. It is advantageous in terms of improved spectrum utilization, higher data transfer rate, and lower probability of interception from unwanted sources. FSO communication can provide optical-level wireless communication speeds and can also help solve the wireless capacity problem experienced by the traditional RF-based technologies. Despite these advantages, communications using FSO transceivers require establishment and maintenance of line-of-sight (LOS). We consider autonomous mobile nodes (Unmanned Ground Vehicles or Unmanned Aerial Vehicles), each with one FSO transceiver mounted on a movable head capable of scanning in …


Categorical Range Reporting In 2d Using Wavelet Tree, Swathi Kanthareddy Sumithra Jan 2018

Categorical Range Reporting In 2d Using Wavelet Tree, Swathi Kanthareddy Sumithra

Electronic Theses and Dissertations

The research involved optimizing the space and bounding the output time by the output size in categorical range reporting of points within the given rectangle query Q in two dimension using wavelet trees and range counting. The time taken to report those points and space to tore n points in set S can be done using wavelet tree and range counting. Consider set S consisting of n points in two-dimension. An orthogonal range reporting query rectangle Q = [a,b] x [c,d] on set S is sent to report the set of points in S which interacts with the query rectangle[Q]. …


Managing Io Resource For Co-Running Data Intensive Applications In Virtual Clusters, Dan Huang Jan 2018

Managing Io Resource For Co-Running Data Intensive Applications In Virtual Clusters, Dan Huang

Electronic Theses and Dissertations

Today Big Data computer platforms employ resource management systems such as Yarn, Torque, Mesos, and Google Borg to enable sharing the physical computing among many users or applications. Given virtualization and resource management systems, users are able to launch their applications on the same node with low mutual interference and management overhead on CPU and memory. However, there are still challenges to be addressed before these systems can be fully adopted to manage the IO resources in Big Data File Systems (BDFS) and shared network facilities. In this study, we mainly study on three IO management problems systematically, in terms …


Joint Optimization Of Illumination And Communication For A Multi-Element Vlc Architecture, Sifat Ibne Mushfique Jan 2018

Joint Optimization Of Illumination And Communication For A Multi-Element Vlc Architecture, Sifat Ibne Mushfique

Electronic Theses and Dissertations

Because of the ever increasing demand wireless data in the modern era, the Radio Frequency (RF) spectrum is becoming more congested. The remaining RF spectrum is being shrunk at a very heavy rate, and spectral management is becoming more difficult. Mobile data is estimated to grow more than 10 times between 2013 and 2019, and due to this explosion in data usage, mobile operators are having serious concerns focusing on public Wireless Fidelity (Wi-Fi) and other alternative technologies. Visible Light Communication (VLC) is a recent promising technology complementary to RF spectrum which operates at the visible light spectrum band (roughly …


A Game-Theoretic Model For Regulating Freeriding In Subsidy-Based Pervasive Spectrum Sharing Markets, Mostafizur Rahman Jan 2018

A Game-Theoretic Model For Regulating Freeriding In Subsidy-Based Pervasive Spectrum Sharing Markets, Mostafizur Rahman

Electronic Theses and Dissertations

Cellular spectrum is a limited natural resource becoming scarcer at a worrisome rate. To satisfy users' expectation from wireless data services, researchers and practitioners recognized the necessity of more utilization and pervasive sharing of the spectrum. Though scarce, spectrum is underutilized in some areas or within certain operating hours due to the lack of appropriate regulatory policies, static allocation and emerging business challenges. Thus, finding ways to improve the utilization of this resource to make sharing more pervasive is of great importance. There already exists a number of solutions to increase spectrum utilization via increased sharing. Dynamic Spectrum Access (DSA) …


Energy Efficient And Secure Wireless Sensor Networks Design, Afraa Attiah Jan 2018

Energy Efficient And Secure Wireless Sensor Networks Design, Afraa Attiah

Electronic Theses and Dissertations

Wireless Sensor Networks (WSNs) are emerging technologies that have the ability to sense, process, communicate, and transmit information to a destination, and they are expected to have significant impact on the efficiency of many applications in various fields. The resource constraint such as limited battery power, is the greatest challenge in WSNs design as it affects the lifetime and performance of the network. An energy efficient, secure, and trustworthy system is vital when a WSN involves highly sensitive information. Thus, it is critical to design mechanisms that are energy efficient and secure while at the same time maintaining the desired …


Masquerading Techniques In Ieee 802.11 Wireless Local Area Networks, Omar Nakhila Jan 2018

Masquerading Techniques In Ieee 802.11 Wireless Local Area Networks, Omar Nakhila

Electronic Theses and Dissertations

The airborne nature of wireless transmission offers a potential target for attackers to compromise IEEE 802.11 Wireless Local Area Network (WLAN). In this dissertation, we explore the current WLAN security threats and their corresponding defense solutions. In our study, we divide WLAN vulnerabilities into two aspects, client, and administrator. The client-side vulnerability investigation is based on examining the Evil Twin Attack (ETA) while our administrator side research targets Wi-Fi Protected Access II (WPA2). Three novel techniques have been presented to detect ETA. The detection methods are based on (1) creating a secure connection to a remote server to detect the …


Real-Time Sil Emulation Architecture For Cooperative Automated Vehicles, Nitish Gupta Jan 2018

Real-Time Sil Emulation Architecture For Cooperative Automated Vehicles, Nitish Gupta

Electronic Theses and Dissertations

This thesis presents a robust, flexible and real-time architecture for Software-in-the-Loop (SIL) testing of connected vehicle safety applications. Emerging connected and automated vehicles (CAV) use sensing, communication and computing technologies in the design of a host of new safety applications. Testing and verification of these applications is a major concern for the automotive industry. The CAV safety applications work by sharing their state and movement information over wireless communication links. Vehicular communication has fueled the development of various Cooperative Vehicle Safety (CVS) applications. Development of safety applications for CAV requires testing in many different scenarios. However, the recreation of test …


Enhancing Cognitive Algorithms For Optimal Performance Of Adaptive Networks, Hector Lugo-Cordero Jan 2018

Enhancing Cognitive Algorithms For Optimal Performance Of Adaptive Networks, Hector Lugo-Cordero

Electronic Theses and Dissertations

This research proposes to enhance some Evolutionary Algorithms in order to obtain optimal and adaptive network configurations. Due to the richness in technologies, low cost, and application usages, we consider Heterogeneous Wireless Mesh Networks. In particular, we evaluate the domains of Network Deployment, Smart Grids/Homes, and Intrusion Detection Systems. Having an adaptive network as one of the goals, we consider a robust noise tolerant methodology that can quickly react to changes in the environment. Furthermore, the diversity of the performance objectives considered (e.g., power, coverage, anonymity, etc.) makes the objective function non-continuous and therefore not have a derivative. For these …


Bridging The Gap Between Application And Solid-State-Drives, Jian Zhou Jan 2018

Bridging The Gap Between Application And Solid-State-Drives, Jian Zhou

Electronic Theses and Dissertations

Data storage is one of the important and often critical parts of the computing system in terms of performance, cost, reliability, and energy. Numerous new memory technologies, such as NAND flash, phase change memory (PCM), magnetic RAM (STT-RAM) and Memristor, have emerged recently. Many of them have already entered the production system. Traditional storage optimization and caching algorithms are far from optimal because storage I/Os do not show simple locality. To provide optimal storage we need accurate predictions of I/O behavior. However, the workloads are increasingly dynamic and diverse, making the long and short time I/O prediction challenge. Because of …