We consider the problem of finding unknown patterns that are recurring across multiple sets. For example, finding multiple objects that are present in multiple images or a short DNA code that is repeated across multiple DNA sequences. We first consider a simple problem of finding a single unknown pattern in...
Continues-Time (CT) Delta-Sigma (ΔΣ) Analog-to-Digital Converters (ADCs) have one important constrain, namely the excess loop delay. Most previous excess lop delay compensation methods need to know the exact value of the excess loop delay in advance. However, the value of the excess loop delay is a uniformly distribution random variable....
Powerline communication (PLC), is becoming a more commonplace method for data transmission, however it is still a very new medium for data transmission, and international standards for powerline communication are still in the process of being developed and established. PLC can provide a means of simplifying the device connectivity to...
In diversity combining automatic repeat request (ARQ), erroneous packets are combined together forming a single, more reliable, packet. In this thesis, we give a diversity combining scheme for the m-ary unidirectional channel. A system using the given scheme with a t-unidirectional error detecting code is able to correct up to...
This thesis presents a novel methodology that enables power efficient video decoding
in an embedded system based on MPSoC (Multiprocessor System on Chip). This
methodology is a physical combination of parallel processing which reduces power
consumption of processors by exploiting thread-level parallelism and Dynamic
Voltage Frequency Scaling (DVFS) that allows...
Web applications are popular attack targets. Misuse detection systems use signature databases to detect known attacks. However, it is difficult to keep the database up to date with the rate of discovery of vulnerabilities. They also cannot detect zero-day attacks. By contrast, anomaly detection systems learn the normal behavior of...
This thesis presents a channelized digital receiver design for UWB sytems in a multipath indoor environment. The UWB technology has been used for commercial and military purposes due to a number of advantages such as low-power consumption, noise-like and carrier free. The energy of UWB signal is spread over a...
NAND flash based solid state drives (SSDs) require out-of-place updating due to the characteristics of flash memories. In addition, due to the mismatched granularity between read/write and erase operations, a cleaning policy involving garbage collection and wear leveling has to perform data migration incurring high overhead. Another challenge is that...
In a radiological emergency scenario, the capability to rapidly visualize radiation emitted from debris, contamination, or absorbed in biological samples, while visualizing the non-radioactive (or “conventional” image) features within a field of view, will provide critical information to support optimization of further analysis, sample collection, and decision making. This research...
Continuous-time ΔΣ modulators are widely used in cellular handsets due to their power efficiency and inherent anti-aliasing characteristics. To achieve demanding cellular bandwidth requirements while maintaining good power efficiency, multi-bit feedback is typically used. This approach provides benefits such as lower OSR, relaxed loop filter requirements, and reduced jitter sensitivity....
Threshold-based time of arrival (TOA) estimation is a technique for high-precision indoor localization. Existing threshold selection methods, such as xed thresh- old and normalized threshold methods, do not consider the signal-to-noise radio (SNR) value at the receiver. This is not desired for high-precision positioning. A proper threshold value depends on...
Data converters are essential interface circuits between the analog world that people live in and the digital processors that people live with. Linearity, which often is a tradeoff against other performance criteria, is one of the major performance demands from applications for both analog-to-digital converts (ADC) and digital-to-analog converters (DAC)....
In this paper, we propose a credit-based resource allocation technique for dynamic spectrum access (DSA) systems that is robust against malicious and selfi sh behaviors and ensures good overall system fairness performance while also allowing spectrum users to achieve high amounts of service. We also propose a new objective function...
In modern digital communication systems, error correction codes (ECC) are widely used and play an important role. The main effect of ECCs is to reduce the transmission error caused by channel noise, thereby protecting data and increasing the quality of information transmission. In addition, high spectral efficiency is desired in...
Quantum physics in the Copenhagen interpretation places an unsatisfying divide between the quantum and classical worlds. Decoherence -- the destruction of superposition states of the system -- helps us understand how the quantum transitions to the classical. Quantum Darwinism builds on decoherence to understand how information about the system is...
The broadband wireless interference in a computer platform is resulted by multiple electro-magnetic emission sources. This non-Gaussian interference is proved to be double-sided K-distributed in previous research. With the limitation of transmission power and dimension of the device, interference mitigation is an efficient way to improve received signal bit error...
Incremental ADCs (IADCs) have many advantages for low-frequency high-accuracy data conversion—they are easy to multiplex between channels, need simpler digital decimation filter, and allow extended counting with a Nyquist-rate ADC. A single-loop incremental ADC was designed and fabricated in 90 nm for a biosensor interface circuit. It incorporates one integrator,...
Network coding, as the next generation of data routing protocols, enables each intermediate node in a network to process and encode its received data before forwarding it to the next nodes. Hence, the core idea in network coding is to allow a network to encode the data that is being...
While the stability of time-homogeneous Markov chains have been extensively studied through the concept of mixing times, the stability of time-inhomogeneous Markov chains has not been studied as in depth. In this manuscript we will introduce special types of time-inhomogeneous Markov chains that are defined through an adiabatic transition. After...
MANETs are known to be useful in situations where mobile nodes need to communicate and coordinate in dynamic environments with no access to fixed network infrastructure. However, connectivity problems can occur when sub-groups within a MANET move out of communication range from one another. The increasingly prolific use of UAVs...
Parallel processors are classified into two classes: shared-memory multiprocessors and distributed- memory multiprocessors. In the shared-memory system, processors communicate through a common memory unit. However, in the distributed multiprocessor system, each processor has its own memory unit and the communications among the processors are performed through an interconnection network. Thus,...
As more features are being integrated into mobile platforms, the demand for
long battery life during standby mode has been increasing. Light load efficiency
becomes one of essential features in today's DC-DC converter. The most effective
method to improve light load efficiency is to operate the DC-DC converter under
pulse-frequency-modulation...
Ultra-wideband (UWB) radio has become an attractive alternative for wireless communications due to the robustness to multipath fading, low power transmission, mostly-digital implementation, and low cost. Furthermore, short-range, high data-rates applications are possible with UWB radios due to the wide spectral
allocations at 3.1 - 10.6 GHz.
This thesis presents...
The enormous success of wireless technology has recently led to an explosive demand for, and hence a shortage of, bandwidth resources. This expected shortage problem is reported to be primarily due to the inefficient, static nature of current spectrum allocation methods. As an initial step towards solving this shortage problem,...
Pulsed ultra-wideband (UWB) radio uses extremely short pulses to transmit information. Such pulses provide very fine timing information, which has led to technological advances in high-precision localization. This thesis investigates UWB localization strategies with a focus on receiver synchronization algorithms for time-difference-of-arrival localization to achieve centimeter accuracies in a 3-dimensional...
As more wind farms are connected to the grid, the variable nature of wind energy begins to influence grid stability. Energy storage could help smooth the variable nature of wind energy. Laboratory demonstration and exploration of the interaction between different energy storage devices and wind energy could help improve and...
Interconnection networks play important roles in designing high performance computers. Recently two new classes of interconnection networks based on the concept of Gaussian and Eisenstein-Jacobi integers were introduced. In this research, efficient routing and broadcasting algorithms for these networks are developed. Furthermore, constructing edge disjoint Hamiltonian cycles in Gaussian networks...
New video-conference devices based on omnidirectional multi-camera systems have been emerging in the last few years. These devices require innovative and automated video quality assessment in the earlier stages of their design in order to guarantee competitive product development and quality monitoring. Current quality assessment techniques are not adequate since...
The purpose of this thesis is to explore methods which can reduce the power dissipation of a mobile system while decoding MPEG video. MPEG decoding is a microprocessor intensive process that makes heavy use of both the L1 and L2 caches as well as main memory. The heavy load placed...
Transmission over wireless networks presents multiple technical challenges due to
noise, interference, fading, power constraints and bandwidth limitation. Different
solutions have been propposed to overcome these issues and some of them are
treated here. Cooperative diversity has been proposed as an implementation for
networks where terminals are restricted to using...
In the thesis, an application of a genetic algorithm (GA) is considered to solve the vehicle routing problem (VRP) which involves heterogeneous vehicles to serve known customer demands from multiple depots achieving the minimum delivery cost, where each customer must be satisfied by one or more visit(s), and each vehicle...
An n-bit Gray code is an ordered set of all 2n binary strings of length n. The
special property of this listing is that Hamming distance between consecutive vectors
is exactly 1. If the last and first codeword also have a Hamming distance 1 then the
code is said to...
Dynamic multithreaded processors attempt to increase the performance of a single
sequential program by dynamically extracting threads from sources such as loop
iterations. The scheduling of instructions in such a processor plays a vital role in the
amount of thread level parallelism that can be extracted and thus the overall...
The amount of instruction level parallelism (ILP) that can be exploited depends
greatly on the size of the instruction window and the number of in-flight instructions
the processor can support. However, this requires a register file with a large set of
physical registers for renaming and multiple ports to provide...
Conventional register files spread porting resources uniformly across all registers. This paper proposes a method called Asymmetric Clustering using a Register Cache (ACRC). ACRC utilizes a fast register cache that concentrates valuable register file ports to the most active registers thereby reducing the total register file area and power consumption....
We define an inner product on a vector space of adelic measures over a number field $K$. We find that the norm induced by this inner product governs weak convergence at each place of $K$. The canonical adelic measure associated to a rational map is in this vector space, and...
Iterative algorithms are simple yet efficient in solving large-scale optimization problems in practice. With a surge in the amount of data in past decades, these methods have become increasingly important in many application areas including matrix/tensor recovery, deep learning, data mining, and reinforcement learning. To optimize or improve iterative algorithms,...
This work expands the field of indoor free-space optical communication by introducing novel techniques in short range optical communication. The increasing need for high bandwidth communication necessitates the transition to optical frequencies with hundreds of terahertz worth of unregulated bandwidth. Optical communication offers an inherent security advantage over traditional communications...
This work gives some theory and efficient design of binary block codes capable of controlling the deletions of the symbol “0” (referred to as 0-deletions) and/or the insertions of the symbol “0” (referred to as 0-insertions). This problem of controlling 0-deletions and/or 0-insertions (referred to as symmetric 0-errors) is shown...
In weak supervision learning, label information can be provided at different levels of granularity. For example, in multi-instance multi-label learning, samples are organized into bags and labels for each class are provided at the bag level. For small datasets, this approach offers means of reducing the labeling efforts. However, in...
The Machine Learning (ML) algorithms are increasingly explored in varies of fields including designing and optimizing computer systems. Recent research, such as optimizing memory/cache prefetching by ML training or predicting traffic pattern in throughput processors, also exhibits a promising future of introducing ML into computer system design and optimization. Throughput...
Throughput-oriented processors, such as graphics processing units (GPUs), have been increasingly used to accelerate general purpose computing, including machine learning models that are being utilized in numerous disciplines. Thousands of concurrently running threads in a GPU demand a highly efficient memory subsystem for data supply in GPUs. In this dissertation,...
We study joint nonlinear state estimation with multi-period measurement vectors that are potentially corrupted by sparse gross errors. The identifiability-aware approach is proposed to leverage common characteristics of fundamentally identifiable gross errors to enhance error correction performance. First, we derive a necessary rank condition that the sparsity pattern of any...
The ubiquity of high quality video and proliferation of mobile devices has contributed to an unprecedented rise in video consumption. HTTP, in conjunction with adaptive streaming, has become the de facto mechanism for delivering the vast majority of video as it readily caters to heterogeneous networks and devices. This dissertation...
This research focuses on receiver architectures which enable better spectral eciency
by handling blockers in the same spectral range as the signal. The presence of
such blockers, without the use of blocker cancelling/ltering techniques leads to gain
compression and hence, consequent performance degradation of receivers leading to
reduced spectrum...
Analog-to-digital converters are essential components to the portable devices that we are using today. Wireless sensors, body implanted devices, communication devices and so forth require low power ADCs. Therefore achieving higher resolution and bandwidth with lower power consumption is targeted in ADCs design. In this work power efficient ADCs for...
Seed dormancy is defined as the inability of viable seeds to germinate under conditionsotherwise favorable for germination. Dormancy provides a strategy for seeds to germinateat an appropriate time. Abscisic acid (ABA) is a major hormone involved in the regulationof seed dormancy. To elucidate the molecular mechanisms of dormancy, the twoexperimental...
Translation surfaces can be viewed as polygons with parallel and equal sides identified. An affine homeomorphism φ from a translation surface to itself is called pseudo-Anosov when its derivative is a constant matrix in SL₂(R) whose trace is larger than 2 in absolute value. In this setting, the eigendirections of...
Researchers rely on bioeconomic models to guide research and generate fishery management advice for commercial fisheries. Due partly to a paradigm shift towards ecosystem based fishery management, increasing complexity in the characteristics of the problems has meant that bioeconomic simulation models are becoming more prevalent in the fisheries literature. However...
Hybrid automatic repeat request (HARQ) schemes combine packet retransmission with forward error correction to ensure a reliable communications. In multiple-input multiple output (MIMO) systems, interference cancellation (IC) detection is widely used where the detection and cancellation steps of the simultaneously transmitted data streams occur. In principle, the signal stream estimated...