Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Air Force Institute of Technology (264)
- Wright State University (243)
- Old Dominion University (189)
- University of Central Florida (176)
- Chulalongkorn University (144)
-
- University of Arkansas, Fayetteville (97)
- University of South Florida (75)
- California Polytechnic State University, San Luis Obispo (63)
- University of South Carolina (57)
- Purdue University (54)
- University of Nevada, Las Vegas (50)
- Missouri University of Science and Technology (44)
- Portland State University (44)
- University of Massachusetts Amherst (42)
- New Jersey Institute of Technology (41)
- University of Wisconsin Milwaukee (41)
- University of Tennessee, Knoxville (39)
- University of Texas at El Paso (39)
- Washington University in St. Louis (37)
- Western University (35)
- University of Kentucky (33)
- Wayne State University (30)
- University of Denver (26)
- Louisiana State University (22)
- University of Louisville (22)
- Louisiana Tech University (19)
- Singapore Management University (19)
- Munster Technological University (18)
- Walden University (17)
- Clemson University (16)
- Keyword
-
- Department of Computer Science and Engineering (220)
- Machine learning (120)
- Computer Science (117)
- Machine Learning (112)
- Deep learning (65)
-
- Applied sciences (55)
- Deep Learning (55)
- Cybersecurity (43)
- Artificial intelligence (40)
- Computer vision (40)
- Artificial Intelligence (39)
- Robotics (34)
- Computer Engineering (33)
- Security (33)
- Simulation (32)
- #antcenter (28)
- Computer Vision (28)
- Optimization (28)
- Daniel Felix Ritchie School of Engineering and Computer Science (26)
- Algorithms (25)
- Clustering (25)
- Computer networks--Security measures (21)
- Department of Computer Science (21)
- Image processing (21)
- Classification (20)
- FPGA (20)
- Neural networks (19)
- Semantic Web (18)
- Reinforcement Learning (17)
- Natural Language Processing (16)
- Publication Year
- Publication
-
- Theses and Dissertations (402)
- Electronic Theses and Dissertations (256)
- Browse all Theses and Dissertations (243)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (144)
- Doctoral Dissertations (101)
-
- USF Tampa Graduate Theses and Dissertations (75)
- Graduate Theses and Dissertations (64)
- Dissertations (50)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (50)
- Computer Science Theses & Dissertations (47)
- Dissertations and Theses (46)
- Electrical & Computer Engineering Theses & Dissertations (44)
- Masters Theses (43)
- Computational Modeling & Simulation Engineering Theses & Dissertations (40)
- Open Access Theses & Dissertations (39)
- McKelvey School of Engineering Theses & Dissertations (37)
- Electronic Thesis and Dissertation Repository (35)
- Engineering Management & Systems Engineering Theses & Dissertations (35)
- Open Access Dissertations (32)
- Computer Engineering (29)
- Computer Science and Computer Engineering Undergraduate Honors Theses (28)
- Master's Theses (26)
- Open Access Theses (24)
- Wayne State University Dissertations (24)
- Honors Theses (23)
- Theses (22)
- Dissertations and Theses Collection (Open Access) (17)
- Walden Dissertations and Doctoral Studies (17)
- CCE Theses and Dissertations (16)
- Dissertations, Master's Theses and Master's Reports (15)
Articles 1 - 30 of 2391
Full-Text Articles in Engineering
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Honors Theses
Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …
Machine Learning-Based Gps Jamming And Spoofing Detection, Alberto Squatrito
Machine Learning-Based Gps Jamming And Spoofing Detection, Alberto Squatrito
Doctoral Dissertations and Master's Theses
The increasing reliance on Global Positioning System (GPS) technology across various sectors has exposed vulnerabilities to malicious attacks, particularly GPS jamming and spoofing. This thesis presents an analysis into detection and mitigation strategies for enhancing the resilience of GPS receivers against jamming and spoofing attacks. The research entails the development of a simulated GPS signal and a receiver model to accurately decode and extract information from simulated GPS signals. The study implements the generation of jammed and spoofed signals to emulate potential threats faced by GPS receivers in practical settings. The core innovation lies in the integration of machine learning …
Extracting Dnn Architectures Via Runtime Profiling On Mobile Gpus, Dong Hyub Kim
Extracting Dnn Architectures Via Runtime Profiling On Mobile Gpus, Dong Hyub Kim
Masters Theses
Due to significant investment, research, and development efforts over the past decade, deep neural networks (DNNs) have achieved notable advancements in classification and regression domains. As a result, DNNs are considered valuable intellectual property for artificial intelligence providers. Prior work has demonstrated highly effective model extraction attacks which steal a DNN, dismantling the provider’s business model and paving the way for unethical or malicious activities, such as misuse of personal data, safety risks in critical systems, or spreading misinformation. This thesis explores the feasibility of model extraction attacks on mobile devices using aggregated runtime profiles as a side-channel to leak …
An Efficient Privacy-Preserving Framework For Video Analytics, Tian Zhou
An Efficient Privacy-Preserving Framework For Video Analytics, Tian Zhou
Doctoral Dissertations
With the proliferation of video content from surveillance cameras, social media, and live streaming services, the need for efficient video analytics has grown immensely. In recent years, machine learning based computer vision algorithms have shown great success in various video analytic tasks. Specifically, neural network models have dominated in visual tasks such as image and video classification, object recognition, object detection, and object tracking. However, compared with classic computer vision algorithms, machine learning based methods are usually much more compute-intensive. Powerful servers are required by many state-of-the-art machine learning models. With the development of cloud computing infrastructures, people are able …
Attribution Robustness Of Neural Networks, Sunanda Gamage
Attribution Robustness Of Neural Networks, Sunanda Gamage
Electronic Thesis and Dissertation Repository
While deep neural networks have demonstrated excellent learning capabilities, explainability of model predictions remains a challenge due to their black box nature. Attributions or feature significance methods are tools for explaining model predictions, facilitating model debugging, human-machine collaborative decision making, and establishing trust and compliance in critical applications. Recent work has shown that attributions of neural networks can be distorted by imperceptible adversarial input perturbations, which makes attributions unreliable as an explainability method. This thesis addresses the research problem of attribution robustness of neural networks and introduces novel techniques that enable robust training at scale.
Firstly, a novel generic framework …
Mri Image Regression Cnn For Bone Marrow Lesion Volume Prediction, Kevin Yanagisawa
Mri Image Regression Cnn For Bone Marrow Lesion Volume Prediction, Kevin Yanagisawa
Theses and Dissertations
Bone marrow lesions (BMLs), occurs from fluid build up in the soft tissues inside your bone. This can be seen on magnetic resonance imaging (MRI) scans and is characterized by excess water signals in the bone marrow space. This disease is commonly caused by osteoarthritis (OA), a degenerative join disease where tissues within the joint breakdown over time [1]. These BMLs are an emerging target for OA, as they are commonly related to pain and worsening of the diseased area until surgical intervention is required [2]–[4]. In order to assess the BMLs, MRIs were utilized as input into a regression …
Towards Algorithmic Justice: Human Centered Approaches To Artificial Intelligence Design To Support Fairness And Mitigate Bias In The Financial Services Sector, Jihyun Kim
CMC Senior Theses
Artificial Intelligence (AI) has positively transformed the Financial services sector but also introduced AI biases against protected groups, amplifying existing prejudices against marginalized communities. The financial decisions made by biased algorithms could cause life-changing ramifications in applications such as lending and credit scoring. Human Centered AI (HCAI) is an emerging concept where AI systems seek to augment, not replace human abilities while preserving human control to ensure transparency, equity and privacy. The evolving field of HCAI shares a common ground with and can be enhanced by the Human Centered Design principles in that they both put humans, the user, at …
Nonuniform Sampling-Based Breast Cancer Classification, Santiago Posso
Nonuniform Sampling-Based Breast Cancer Classification, Santiago Posso
Theses and Dissertations--Electrical and Computer Engineering
The emergence of deep learning models and their success in visual object recognition have fueled the medical imaging community's interest in integrating these algorithms to improve medical diagnosis. However, natural images, which have been the main focus of deep learning models and mammograms, exhibit fundamental differences. First, breast tissue abnormalities are often smaller than salient objects in natural images. Second, breast images have significantly higher resolutions but are generally heavily downsampled to fit these images to deep learning models. Models that handle high-resolution mammograms require many exams and complex architectures. Additionally, spatially resizing mammograms leads to losing discriminative details essential …
Adaptable And Trustworthy Machine Learning For Human Activity Recognition From Bioelectric Signals, Morgan S. Stuart
Adaptable And Trustworthy Machine Learning For Human Activity Recognition From Bioelectric Signals, Morgan S. Stuart
Theses and Dissertations
Enabling machines to learn measures of human activity from bioelectric signals has many applications in human-machine interaction and healthcare. However, labeled activity recognition datasets are costly to collect and highly varied, which challenges machine learning techniques that rely on large datasets. Furthermore, activity recognition in practice needs to account for user trust - models are motivated to enable interpretability, usability, and information privacy. The objective of this dissertation is to improve adaptability and trustworthiness of machine learning models for human activity recognition from bioelectric signals. We improve adaptability by developing pretraining techniques that initialize models for later specialization to unseen …
Assessing Performance Optimization Strategies In Cloud-Native Environments Through Containerization And Orchestration Analysis, Daniel E. Ukene
Assessing Performance Optimization Strategies In Cloud-Native Environments Through Containerization And Orchestration Analysis, Daniel E. Ukene
Electronic Theses and Dissertations
This thesis comprises three distinct, yet interconnected studies addressing critical aspects of web infrastructure management. We begin by studying containerization via Docker and its impact on web server performance, focusing on Apache and Nginx hosted on virtualized environments. Through meticulous load testing and analysis, we provide insights into the comparative performance of these servers, adding users of this technology know which webservers to leverage when hosting their webservice along alongside the infrastructure to host it on. Next, we expand our focus to examine the performance of caching systems, namely Redis and Memcached, across traditional VMs and Docker containers. By comparing …
Language Models For Rare Disease Information Extraction: Empirical Insights And Model Comparisons, Shashank Gupta
Language Models For Rare Disease Information Extraction: Empirical Insights And Model Comparisons, Shashank Gupta
Theses and Dissertations--Computer Science
End-to-end relation extraction (E2ERE) is a crucial task in natural language processing (NLP) that involves identifying and classifying semantic relationships between entities in text. This thesis compares three paradigms for end-to-end relation extraction (E2ERE) in biomedicine, focusing on rare diseases with discontinuous and nested entities. We evaluate Named Entity Recognition (NER) to Relation Extraction (RE) pipelines, sequence-to-sequence models, and generative pre-trained transformer (GPT) models using the RareDis information extraction dataset. Our findings indicate that pipeline models are the most effective, followed closely by sequence-to-sequence models. GPT models, despite having eight times as many parameters, perform worse than sequence-to-sequence models and …
The Integration Of Neuromorphic Computing In Autonomous Robotic Systems, Md Abu Bakr Siddique
The Integration Of Neuromorphic Computing In Autonomous Robotic Systems, Md Abu Bakr Siddique
Dissertations, Master's Theses and Master's Reports
Deep Neural Networks (DNNs) have come a long way in many cognitive tasks by training on large, labeled datasets. However, this method has problems in places with limited data and energy, like when planetary robots are used or when edge computing is used [1]. In contrast to this data-heavy approach, animals demonstrate an innate ability to learn by communicating with their environment and forming associative memories among events and entities, a process known as associative learning [2-4]. For instance, rats in a T-maze learn to associate different stimuli with outcomes through exploration without needing labeled data [5]. This learning paradigm …
Effective Drag Coefficient Prediction On Single-View 2d Images Of Snowflakes, Cameron Hudson
Effective Drag Coefficient Prediction On Single-View 2d Images Of Snowflakes, Cameron Hudson
Graduate College Dissertations and Theses
The drag coefficient of snowflakes is an crucial particle descriptor that can quantify the relationships with the mass, shape, size, and fall speed of snowflake particles. Previous studies has relied on estimating and improving empirical correlations for the drag coefficient of particles, utilizing 3D images from the Multi-Angled Snowflake Camera Database (MASCDB) to estimate snowflake properties such as mass, geometry, shape classification, and rimming degree. However, predictions of the drag coefficient with single-view 2D images of snowflakes has proven to be a challenging problem, primarily due to the lack of data and time-consuming, expensive methods used to estimate snowflake shape …
Cross-Layer Design Of Highly Scalable And Energy-Efficient Ai Accelerator Systems Using Photonic Integrated Circuits, Sairam Sri Vatsavai
Cross-Layer Design Of Highly Scalable And Energy-Efficient Ai Accelerator Systems Using Photonic Integrated Circuits, Sairam Sri Vatsavai
Theses and Dissertations--Electrical and Computer Engineering
Artificial Intelligence (AI) has experienced remarkable success in recent years, solving complex computational problems across various domains, including computer vision, natural language processing, and pattern recognition. Much of this success can be attributed to the advancements in deep learning algorithms and models, particularly Artificial Neural Networks (ANNs). In recent times, deep ANNs have achieved unprecedented levels of accuracy, surpassing human capabilities in some cases. However, these deep ANN models come at a significant computational cost, with billions to trillions of parameters. Recent trends indicate that the number of parameters per ANN model will continue to grow exponentially in the foreseeable …
Development Of A Collaborative Research Platform For Efficient Data Management And Visualization Of Qubit Control, Devanshu Brahmbhatt
Development Of A Collaborative Research Platform For Efficient Data Management And Visualization Of Qubit Control, Devanshu Brahmbhatt
Computer Science and Engineering Theses
This thesis introduces QubiCSV, a pioneering open-source platform for quantum computing field. With an emphasis on collaborative research, QubiCSV addresses the critical need for specialized data management and visualization tools in qubit control. The platform is crafted to overcome the challenges posed by the high costs and complexities associated with quantum experimental setups. It emphasizes efficient utilization of resources through shared ideas, data, and implementation strategies. One of the primary obstacles in quantum computing research has been the ineffective management of extensive calibration data and the inability to visualize complex quantum experiment outcomes effectively. QubiCSV fills this gap by offering …
Autonomous Shuttle Car Docking To A Continuous Miner Using Rgb-Depth Imagery, Sky Rose
Autonomous Shuttle Car Docking To A Continuous Miner Using Rgb-Depth Imagery, Sky Rose
Theses and Dissertations--Mining Engineering
A great deal of research is currently being conducted in automating mining equipment to improve worker health and safety and increase mine productivity. Significant progress has been made in some applications, e.g., autonomous haul trucks for surface mining. However, little progress has been made in autonomous face haulage in underground room-and pillar coal mines. Accordingly, this thesis addresses automating the operation of a shuttle car, focusing on positioning the shuttle car under the continuous miner coal-discharge conveyor during cutting and loading operations. The approach uses a stereo depth camera as the sensor, and machine-learning algorithms are used to identify various …
Railroad Condition Monitoring Using Distributed Acoustic Sensing And Deep Learning Techniques, Md Arifur Rahman
Railroad Condition Monitoring Using Distributed Acoustic Sensing And Deep Learning Techniques, Md Arifur Rahman
Electronic Theses and Dissertations
Proper condition monitoring has been a major issue among railroad administrations since it might cause catastrophic dilemmas that lead to fatalities or damage to the infrastructure. Although various aspects of train safety have been conducted by scholars, in-motion monitoring detection of defect occurrence, cause, and severity is still a big concern. Hence extensive studies are still required to enhance the accuracy of inspection methods for railroad condition monitoring (CM). Distributed acoustic sensing (DAS) has been recognized as a promising method because of its sensing capabilities over long distances and for massive structures. As DAS produces large datasets, algorithms for precise …
Implementing Unmanned Aerial Vehicles To Collect Human Gait Data At Distance And Altitude For Identification And Re-Identification, Donn E. Bartram
Implementing Unmanned Aerial Vehicles To Collect Human Gait Data At Distance And Altitude For Identification And Re-Identification, Donn E. Bartram
Graduate Theses, Dissertations, and Problem Reports
Gait patterns are a class of biometric information pertaining to the way a person moves and poses. Gait information is unique to each person and can be used to identify and reidentify people. Historically, this task has been achieved through the use of multiple ground-based imaging sensors. However, as Unmanned Aerial Vehicles (UAVs) advance, they present the opportunity to evolve the process of persons identification and re-identification. Collecting human gait data using UAVs at distances ranging from 20m to 500m and altitudes ranging from 0m to 120m is a challenging task. The current biometric data collection methods, primarily designed for …
Brain-Inspired Spatio-Temporal Learning With Application To Robotics, Thiago André Ferreira Medeiros
Brain-Inspired Spatio-Temporal Learning With Application To Robotics, Thiago André Ferreira Medeiros
USF Tampa Graduate Theses and Dissertations
The human brain still has many mysteries and one of them is how it encodes information. The following study intends to unravel at least one such mechanism. For this it will be demonstrated how a set of specialized neurons may use spatial and temporal information to encode information. These neurons, called Place Cells, become active when the animal enters a place in the environment, allowing it to build a cognitive map of the environment. In a recent paper by Scleidorovich et al. in 2022, it was demonstrated that it was possible to differentiate between two sequences of activations of a …
Leveraging Agile Software Methodologies Within Software Development To Introduce A Novel Educational Software Methodology, Montserrat Guadalupe Molina
Leveraging Agile Software Methodologies Within Software Development To Introduce A Novel Educational Software Methodology, Montserrat Guadalupe Molina
Open Access Theses & Dissertations
Agile Software Development has been growing increasingly popular in the software engineering industry as a way to produce working software in a quick and people-centered manner. Agile methodologies require practitioners to have strong technical and non-technical skills, such as teamwork, project management, and communication skills. Students graduating from the software engineering discipline have been found to be lacking in these areas, leading to many difficulties faced by recent graduates as they begin their professional careers. Given that Agile Software Development is the most popular software development lifecycle currently used by practitioners in industry, it is important to expose students to …
Decoding Usage And Adoption Behavior Of The Low-Carbon Transportation Market: An Ai-Driven Exploration, Vuban Chowdhury
Decoding Usage And Adoption Behavior Of The Low-Carbon Transportation Market: An Ai-Driven Exploration, Vuban Chowdhury
Graduate Theses and Dissertations
The transportation sector stands as a significant contributor to greenhouse gas emissions in the United States, with its environmental impact steadily escalating over the past few decades. This has prompted government agencies to facilitate the adoption and usage of low-carbon transportation (LCT) options as alternatives to fossil-fuel-powered transportation. LCTs include modes of transportation that minimize the overall carbon footprint of the transportation sector by relying on energy sources that are environmentally sustainable. These sustainable transportation options have also garnered significant interest in the transportation research community. For government agencies and researchers alike, a comprehensive understanding of the adoption and usage …
Remote Side-Channel Disassembly On Field-Programmable Gate Arrays, Brandon R. Baggett
Remote Side-Channel Disassembly On Field-Programmable Gate Arrays, Brandon R. Baggett
<strong> Theses and Dissertations </strong>
Over the last two decades, side-channel vulnerabilities have shown to be a major threat to embedded devices. Most side-channel research has developed our understanding of the vulnerabilities to cryptographic devices due to their implementation and how we can protect them. However, side-channel leakage can yield useful information about many other processes that run on the device. One promising area that has received little attention is the side-channel leakage due to the execution of assembly instructions. There has been some work in this area that has demonstrated the idea’s potential, but so far, this research has assumed the adversary has physical …
Use Of Digital Twins To Mitigate Communication Failures In Microgrids, Andrew Eggebeen
Use Of Digital Twins To Mitigate Communication Failures In Microgrids, Andrew Eggebeen
Theses and Dissertations
This work investigates digital twin (DT) applications for electric power system (EPS) resilience. A novel DT architecture is proposed consisting of a physical twin, a virtual twin, an intelligent agent, and data communications. Requirements for the virtual twin are identified. Guidelines are provided for generating, capturing, and storing data to train the intelligent agent. The relationship between the DT development process and an existing controller hardware-in-the-loop (CHIL) process is discussed. To demonstrate the proposed DT architecture and development process, a DT for a battery energy storage system (BESS) is created based on the simulation of an industrial nanogrid. The creation …
Exact Models, Heuristics, And Supervised Learning Approaches For Vehicle Routing Problems, Zefeng Lyu
Exact Models, Heuristics, And Supervised Learning Approaches For Vehicle Routing Problems, Zefeng Lyu
Doctoral Dissertations
This dissertation presents contributions to the field of vehicle routing problems by utilizing exact methods, heuristic approaches, and the integration of machine learning with traditional algorithms. The research is organized into three main chapters, each dedicated to a specific routing problem and a unique methodology. The first chapter addresses the Pickup and Delivery Problem with Transshipments and Time Windows, a variant that permits product transfers between vehicles to enhance logistics flexibility and reduce costs. To solve this problem, we propose an efficient mixed-integer linear programming model that has been shown to outperform existing ones. The second chapter discusses a practical …
A Design Strategy To Improve Machine Learning Resiliency Of Physically Unclonable Functions Using Modulus Process, Yuqiu Jiang
A Design Strategy To Improve Machine Learning Resiliency Of Physically Unclonable Functions Using Modulus Process, Yuqiu Jiang
Theses and Dissertations
Physically unclonable functions (PUFs) are hardware security primitives that utilize non-reproducible manufacturing variations to provide device-specific challenge-response pairs (CRPs). Such primitives are desirable for applications such as communication and intellectual property protection. PUFs have been gaining considerable interest from both the academic and industrial communities because of their simplicity and stability. However, many recent studies have exposed PUFs to machine-learning (ML) modeling attacks. To improve the resilience of a system to general ML attacks instead of a specific ML technique, a common solution is to improve the complexity of the system. Structures, such as XOR-PUFs, can significantly increase the nonlinearity …
Robust And Uncertainty-Aware Image Classification Using Bayesian Vision Transformer Model, Fazlur Rahman Bin Karim
Robust And Uncertainty-Aware Image Classification Using Bayesian Vision Transformer Model, Fazlur Rahman Bin Karim
Theses and Dissertations
Transformer Neural Networks have emerged as the predominant architecture for addressing a wide range of Natural Language Processing (NLP) applications such as machine translation, speech recognition, sentiment analysis, text anomaly detection, etc. This noteworthy achievement of Transformer Neural Networks in the NLP field has sparked a growing interest in integrating and utilizing Transformer models in computer vision tasks. The Vision Transformer (ViT) model efficiently captures long-range dependencies by employing a self-attention mechanism to transform different image data into meaningful, significant representations. Recently, the Vision Transformer (ViT) has exhibited incredible performance in solving image classification problems by utilizing ViT models, thereby …
Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum
Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum
Honors Theses
Satellite communication is essential for the exploration and study of space. Satellites allow communications with many devices and systems residing in space and on the surface of celestial bodies from ground stations on Earth. However, with the rise of Ground Station as a Service (GsaaS), the ability to efficiently send action commands to distant satellites must ensure non-repudiation such that an attacker is unable to send malicious commands to distant satellites. Distant satellites are also constrained devices and rely on limited power, meaning security on these devices is minimal. Therefore, this study attempted to propose a novel algorithm to allow …
Qasm-To-Hls: A Framework For Accelerating Quantum Circuit Emulation On High-Performance Reconfigurable Computers, Anshul Maurya
Qasm-To-Hls: A Framework For Accelerating Quantum Circuit Emulation On High-Performance Reconfigurable Computers, Anshul Maurya
Theses and Dissertations
High-performance reconfigurable computers (HPRCs) make use of Field-Programmable Gate Arrays (FPGAs) for efficient emulation of quantum algorithms. Generally, algorithm-specific architectures are implemented on the FPGAs and there is very little flexibility. Moreover, mapping a quantum algorithm onto its equivalent FPGA emulation architecture is challenging. In this work, we present an automation framework for converting quantum circuits to their equivalent FPGA emulation architectures. The framework processes quantum circuits represented in Quantum Assembly Language (QASM) and derives high-level descriptions of the hardware emulation architectures for High-Level Synthesis (HLS) on HPRCs. The framework generates the code for a heterogeneous architecture consisting of a …
Accelerating Machine Learning Inference For Satellite Component Feature Extraction Using Fpgas., Andrew Ekblad
Accelerating Machine Learning Inference For Satellite Component Feature Extraction Using Fpgas., Andrew Ekblad
Theses and Dissertations
Running computer vision algorithms requires complex devices with lots of computing power, these types of devices are not well suited for space deployment. The harsh radiation environment and limited power budgets have hindered the ability of running advanced computer vision algorithms in space. This problem makes running an on-orbit servicing detection algorithm very difficult. This work proposes using a low powered FPGA to accelerate the computer vision algorithms that enable satellite component feature extraction. This work uses AMD/Xilinx’s Zynq SoC and DPU IP to run model inference. Experiments in this work centered around improving model post processing by creating implementations …
Hpc-Enabled Fast And Configurable Dynamic Simulation, Analysis, And Learning For Complex Power System Adaptation And Control, Cong Wang
All Dissertations
This dissertation presents an HPC-enabled fast and configurable dynamic simulation, analysis, and learning framework for complex power system adaptation and control. Dynamic simulation for a large transmission system comprising thousands of buses and branches implies the latency of complicated numerical computations. However, faster-than-real-time execution is often required to provide timely support for power system planning and operation. The traditional approaches for speeding up the simulation demand extensive computing facilities such as CPU-based multi-core supercomputers, resulting in heavily resource-dependent solutions. In this work, by coupling the Message Passing Interface (MPI) protocol with an advanced heterogeneous programming environment, further acceleration can be …