This research work focuses on the mechanism of 1/f noise in GaAs
resistors on semi-insulating substrates and 1/f noise due to temperature
fluctuations in heat conduction in resistors, diodes, and bipolar transistors. The
goal of this research is to generate accurate models to explain physical origin of 1/f
noise in...
In many traditional computer graphics applications, rendered scenes typically utilize 3D meshes to represent objects within an environment. As the demand to further improve the realism of graphics applications increases, such as for movies and games, it is becoming more important to represent the inner volumes of object meshes. In...
The sensors in real time data processing IoT devices require high resolution and sub-MHz data converters, usually implemented as Incremental ADCs due to the advantages of oversampling technique and low latency. In discrete time incremental (IDT) ADCs, the sampling switch non-linearity, charge injection degrade the resolution, and power hungry OPAMPs...
Commonly proposed ocean wave energy converters (OWEC) use inefficient and maintenance demanding intermediate hydraulic and pneumatic systems. We propose a novel rotary direct-drive OWEC that eliminates these intermediate stages. The new device employs a contactless force transmission system (CFTS) comprising a “piston” and a “cylinder” and a ball screw to...
With the development of high performance power electronic and semiconductor technologies, Adjustable Speed Drive (ASD) systems are increasingly applied in residential, commercial and industrial applications. Due to the advantages at higher power ratings, the three-level Neutral-Point-Clamped (NPC) Voltage Source Inverter (VSI) is being employed in industrial and traction applications, static...
This dissertation presents a dual-path 2-0 MASH (Multi-stAge-noise -SHaping) ADC with two verified digital corrections of DAC mismatch error and quantization noise leakage. By using these two techniques, the requirements for the analog circuits are greatly relaxed. The dual-path structure generates two outputs, one only composed of conversion errors, the...
Continuous Improvement (CI) of academic computing programs is a main requirement of accreditation. Academic computing programs must have a well-documented CI plan in order to be granted accreditation. Based on the existing literature, we developed a comprehensive CI (or 360-CI) model consisting of 8 components: course, curriculum, administration, faculty, research,...
This thesis proposes a novel fully digital technique for the estimation and correction of the DAC error in multi-bit delta sigma ADCs. The structure of the DAC error is indicated through a simple model for unit-element based DACs. The impact of the DAC error on the performance of ADC is...
The electrical grid is a key component of the Nation's critical infrastructure. Its continuous and reliable operation is of vital importance; any system-wide disruption would have a debilitating impact on crucial services, public health and safety, the economy, and the national security of the United States.
High-impact low-frequency events pose...
Over the last decade the increase in penetration of wind power and its variable nature has begun to add considerable stress to and threatened the stability of the nation's grid. In order to continue growth wind farms will need to have the ability to participate in the same grid frequency...
Digital-to-analog converters (DACs) with wide dynamic range and high
linearity are required for high-end audio applications. A multi-bit delta sigma
audio DAC, using a novel gain-correction technique, is described in this thesis. For
widely varying on-chip RC time constant, the DAC gain can be accurately
controlled by the correction circuitry....
Evolution of the mobile communication standards and proliferation of hand-held devices mandate stringent Analog-to-Digital Converter (ADC) specifications. Among various ADCs, a ∆Σ ADC is best known as a power-efficient ADC when more than 12b is required. However, a conventional discrete-time (DT) ∆Σ Modulator (∆ΣM) is inadequate for low-power wideband applications...
This work presents a novel CCRW receiver that utilizes a window of variable width, for e˙ectively mitigating multipath and ambiguity in both civil and military positioning applica-tions using Global Navigation Satellite Systems (GNSS). This CCRW receiver incorporates a single stroboscopic window, whose width is iteratively reduced until the e˙ect of...
The spread of the internet and communications techniques increases the necessity
for security in applications that involves sharing or exchange of secret or private infor-
mation. Public-key cryptography is widely used in establishing secure communication
channels between the users on the Internet, for E-commerce transactions, and in net-
work security...
Multi-instance data, in which each object (e.g., a document) is a collection of instances
(e.g., word), are widespread in machine learning, signal processing, computer vision,
bioinformatic, music, and social sciences. Existing probabilistic models, e.g., latent
Dirichlet allocation (LDA), probabilistic latent semantic indexing (pLSI), and discrete
component analysis (DCA), have been...
The potential for electric energy generation from ocean waves is substantial and much research is being conducted on the conversion process as a renewable, grid-connected, power source. Some of the same attributes that make wave energy harvesting attractive as a grid-connected source also make it attractive as a remote, or...
This dissertation presents a phase domain in-loop-bandwidth spread-spectrum clock generation technique. In this proposed technique, a charge-based discrete-time loop filter is proposed to enable the phase domain in-loop-bandwidth spread-spectrum modulation without a delta-sigma modulator or time-to-digital converter. The in-loop-bandwidth modulation technique maximizes the loop bandwidth to improve phase noise suppression...
Delta-Sigma (ΔΣ) analog-to-digital converters (ADCs) are widely used in wireless transceivers. Recently, continuous-time (CT) ΔΣ ADCs gain growing interest in wireless applications for their lower power consumption and wider input bandwidth as compared with the discrete-time (DT) counterparts.
In this thesis, a wideband low-power CT ΔΣ modulator for next generation...
The need for sustainably powering unobtrusive internet-of-things applications has led to an interest in energy harvesting. Particularly, the proliferation of wireless communication and devices in the 2.4 GHz Industrial Scientificc Medical (ISM) band creates an opportunity to leverage commonly used devices for RF powering. This dissertation presents a low-quiescent-power...
Pipelined analog to digital converters (ADCs) are very important building blocks in many electronic systems such as high quality video systems, high performance digital communication systems and high speed data acquisition systems. The rapid development of these applications is driving the design of pipeline ADCs towards higher speed, higher dynamic...
In the past few decades, magnetic recording has been used as a dominant solution for massive data storage due to its large capacity, excellent reliability and low cost. Nowadays, exponentially increasing user-generated information is creating a huge demand as well as great challenges for high density data storage solutions. For...
This paper addresses the high model complexity and overconfident frame labeling of state-of-the-art (SOTA) action segmenters. Their complexity is typically justified by the need to sequentially refine action segmentation through multiple stages of a deep architecture. However, this multistage refinement does not take into account uncertainty of frame labeling predicted...
In this dissertation, we address action segmentation in videos under limited supervision. The goal of action segmentation is to predict an action class for each frame of a video. The limited supervision means ground truth labels of video frames are not available in training. We focus on three types of...
Humans are remarkably efficient in learning by interacting with other people and observing their behavior. Children learn by watching their parents’ actions and mimic their behavior. When they are not sure about their parents demonstration, they communicate with them, ask questions, and learn from their feedback. On the other hand,...
Successive-approximation-register (SAR) analog-to-digital converters are popular for medium accuracy, medium speed and low power applications, such as in biomedical applications. They have low latency and simple architecture compared with ΔΣ ADCs. This is because of SAR ADCs’ binary searching scheme. Furthermore, SAR ADCs can apply oversampling and noise shaping schemes...
Knowledge workers are struggling in the information flood. There is a growing interest in intelligent desktop environments that help knowledge workers organize their daily life. Intelligent desktop environments allow the desktop user to define a set of “activities” that characterize the user’s desktop work. These environments then attempt to identify...
Partial programming is a field of study where users specify an outline or skeleton of a program, but leave various parts undefined. The undefined parts are then completed by an external mechanism to form a complete program. Adaptation-Based Programming (ABP) is a method of partial programming that utilizes techniques from...
As the number of mobile devices accessing large-scale WLANs such as campus
and metropolitan area networks increases, the need for load balancing among the
cells becomes crucial. In addition, the network must also support some minimum
handoff tolerance defined by an application.
A number of load balancing techniques have been...
The ubiquity of high quality video and proliferation of mobile devices has contributed to an unprecedented rise in video consumption. HTTP, in conjunction with adaptive streaming, has become the de facto mechanism for delivering the vast majority of video as it readily caters to heterogeneous networks and devices. This dissertation...
The exponential rate of advances in modern communication devices in the last several years have brought us higher levels of functionality and performance as well as reductions in physical size and power consumption. To continue this rate of advancement, next generation systems require wider bandwidth and higher resolution ADCs. Additionally,...
In modern on-chip memories, an increasing demand for higher performance, lower power, reduced area, and improved robustness creates a rising need for advanced microarchitecture and circuit design techniques. Particularly in large-signal multi-ported register files, these advanced design techniques include: (i) multi-banked arrays, (ii) multi-frequency arrays, (iii) multi-bit width gating, (iv)...
Traditionally linear actuator applications are addressed by the use of hydraulic systems. The high maintenance cost and poor reliability will always be the most critical problem in the real applications. Benefited from both the high mechanical advantage of the roll screw and the simple structure of the switched reluctance motor,...
The appropriate separation of concerns is a fundamental engineering principle. A concern, for software developers, is that which must be represented by code in a program; by extension, separation of concerns is the ability to represent a single concern in a single appropriate programming language construct. Advanced separation of concerns...
This dissertation proposes the use of advanced time-varying approaches for modeling the dynamics of the multipath channel in wireless communication networks. These advanced time-varying approaches include linear Kalman innovation models in observable block companion form, and neural network-based models. The e˙ectiveness of these type of models is evaluated through three...
Preventative methods for software reverse engineering have been given greater attention in recent times due to the increase in computational resources and tools available to the public. The inherent security provided by encoding source into machine code (executable form) can no longer be assumed, given the availability of effective automated...
Cryptographic devices leak timing and power consumption information that is easily measurable, radiation of various levels, and more. Such devices also have additional inputs, other than plaintext and keys, like voltage, which can be modified to force the device to produce certain faulty outputs that can be used to reveal...
Simultaneous translation, which translates concurrently with the source language speech, is widely used in many scenarios including multilateral organizations. However, it is well known to be one of the most challenging tasks for humans due to the simultaneous perception and production in two languages. On the other hand, simultaneous translation...
Global Positioning Systems have allowed for precise timing of power system measurements over wide areas. This newly found capability has the potential to provide much greater insight into the operation of the power system and its response to contingencies, but few analytical techniques currently exist that provide enough robustness and...
Within the past several years the technology of high-throughput sequencing has transformed the study of biology by offering unprecedented access to life's fundamental building block, DNA. With this transformation's potential a host of brand-new challenges have emerged, many of which lend themselves to being solved through computational methods. From de...
The Internet of Things (IoT) paradigm brought an ever-increasing dependence on low-power devices to collect sensor data and transmit that information to the cloud, placing greater demand on connectivity and lifespan. In response, rapid worldwide innovation demonstrates the trade-offs in processing, communication, and energy consumption with diverse approaches to low-power...
Merge conflicts have long plagued software development. With larger and more dispersed teams comes greater risk of developers working on the same code at the same time. While merge conflicts are known to be painful, their exact impact on software is still largely unknown. Are merge conflicts an isolated problem,...
This dissertation focuses on the analysis, design, and application of inductor-capacitor (LC) oscillators for wireless sensor networks (WSNs).
First an analysis and design optimization approach for enhanced swing, low power CMOS LC oscillators is presented. A phasor based analysis is used for determining the amplitude and phase noise of these...
High speed serial links are critical components for addressing the growing demand for I/O bandwidth in next-generation computing applications, such as many-core systems, backplane and optical data communications. Due to continued process scaling and circuit innovations, today's CMOS serial link transceivers can achieve tens of Gb/s per pin. However, most...
The release of the IEEE802.15.6 standard has led to increased interest in low-power technologies for wireless body-area-networks (WBANs). The power dissipation, supply voltage, and die area are some of the most important criteria for successful WBAN implementations. Digital-intensive RX architectures can potentially result in sub-1V operation with significant reductions in...
Causal inference is an important analytical tool to bridge the gap between prediction and decision-making. However, learning a causal network solely from data is a challenging task. In this work, various techniques have been explored for a better and improved causal network learning from data. Firstly, the problem of learning...
Advances in sensor technology are greatly expanding the range of quantities that can be measured while simultaneously reducing the cost. However, deployed sensors drift out of calibration and fail, so every sensor network requires quality control procedures to promptly detect these failures. To address these problems, we propose a two-level...
Anomaly detection has been used in variety of applications in practice, including cyber-security, fraud detection and detecting faults in safety critical systems, etc. Anomaly detectors produce a ranked list of statistical anomalies, which are typically examined by human analysts in order to extract the actual anomalies of interest. Unfortunately, most...
This work addresses the application of Nonlinear Model Predictive Control (NMPC) to a class of ocean wave energy conversion systems in which the cost functional is not in a standard quadratic form, and the WEC model includes the nonlinear effects, such as the hydrodynamic viscous drag. The NMPC implementation is...
The quality of a digital image pipeline relies greatly on its color reproduction which should at a minimum handle the color constancy, and the final judgment of the excellence of the pipeline is made through subjective observations by humans.
This dissertation addresses a few topics surrounding the color processing of...
This dissertation explores the idea of applying machine learning technologies to help computer users find information and better organize electronic resources, by presenting the research work conducted in the following three applications: FolderPredictor, Stacking Recommendation Engines, and Integrating Learning and Reasoning.
FolderPredictor is an intelligent desktop software tool that helps...
There are growing interests in designing polynomial-time approximation schemes (PTAS) for optimization problems in planar graphs. Many NP-hard problems are shown to admit PTAS in planar graphs in the last decade, including Steiner tree, Steiner forest, two- edge-connected subgraphs and so on. We follow this research line and study several...
Delta-sigma analog-to-digital converters (ADCs) are suitable for many applications due to several advantages such as relaxed anti-aliasing filter, high signal-to noise and distortion ratio (SNDR) and most important of all, reduced sensitivity to
analog imperfections.This thesis introduces several structures to overcome loop imperfections and stability issues in delta-sigma modulators. First,...
For today’s ubiquitous portable devices, innovative integrated circuits with high performance
yet very low power are necessary. As these devices are used to communicate and sense real world signals in the environment, analog-to-digital converters (ADC) and systems are the key interface circuits needed to digitize the sensed information and they...
Throughput-oriented processors, such as graphics processing units (GPUs), have been increasingly used to accelerate general purpose computing, including machine learning models that are being utilized in numerous disciplines. Thousands of concurrently running threads in a GPU demand a highly efficient memory subsystem for data supply in GPUs. In this dissertation,...
Most of today’s Internet of Things (IoT) applications assume that data will be moved offdevices into centralized cloud platforms. While existing IoT systems leverage cloud-based analytics for meaningful data reasoning, the assumption that data should always be moved off the devices is problematic. The amount of data to be moved...
The trend towards higher resolution, faster refresh rate active-matrix liquid-crystal displays (AMLCDs) as well as the emergence of active-matrix organic light-emitting diode (AMOLED) displays is driving the demand for amorphous oxide semiconductor thin-film transistors (AOS TFTs) with higher mobility. A physics-based model for carrier transport in an amorphous semiconductor is...
Back end of line (BEOL) metal-insulator-metal capacitors (MIMCAPs) have become a core passive component in modern integrated circuits. International Technology Roadmap for Semiconductors (ITRS) projections for scaling of analog/mixed-signal MIMCAP applications require simultaneously increasing capacitance density while maintaining low leakage current density and low voltage nonlinearity (characterized by the quadratic...
Atomic layer deposition (ALD) is an enabling technique for many new micro- and nanoscale technologies. The self-limiting surface chemical reactions by which ALD fundamentally operates give rise to uniquely high precision (atomic) control over deposited film thickness, uniformity over large areas, and conformality over complex and extreme topographies. One such...
The atomic solid state energy (SSE) scale is introduced as a tool for inorganic materials design. The SSE scale is obtained by assessing an average electron affinity (EA) (for a cation) or an average ionization potential (IP) (for an anion) for each atom using data from compounds having that specific...
Low noise oscillators are universally needed in digital systems for clock generation and synchronization, and in radio-frequency communication front-ends for frequency up- and down-conversion. Noise in oscillators results in timing jitter, and limits the clock frequency of digital systems. In radio-frequency communication systems, phase noise in oscillators lowers the signal-to-noise...
This thesis describes circuit architectures and techniques that facilitate the
automatic synthesis and fabrication of analog-to-digital converters (ADCs). Since
automated synthesis already exists for digital circuits and is part of the digital
circuit design flow, this work demonstrates the feasibility of ADC synthesis with
little or no modification to presently...
A procedure for automating the design and layout of analog-to-digital converters (ADCs) is presented. This procedure makes use of the existing synthesis and place-and-route tools that are common in digital circuit design. A method for adding rudimentary analog cells to the standard library is described, allowing the designer to synthesize...
In an increasingly computation-driven world, algorithms and mathematical models significantly impact decision making across various fields. To foster trust and understanding, it is crucial to provide users with clear and concise explanations of the reasoning behind the results produced by computational tools, especially when recommendations appear counterintuitive. Legal frameworks in...
The code reuse problem is a common software engineering problem in scientific computing. As a prevailing programming language in many scientific fields, Fortran does not provide support to address this problem. One particular reason is that Fortran lacks the support for generic programming. By applying program-generation techniques, we developed two...
Wind turbines serve an increasing proportion of total energy generation, with expanded onshore and offshore installations proceeding worldwide. Continued construction, expansion, and operation of wind energy installations must be managed in conjunction with effects on local and migratory wildlife, specifically bird and bat species that may be affected by wind...
How can an agent generalize its knowledge to new circumstances? To learn
effectively an agent acting in a sequential decision problem must make intelligent action selection choices based on its available knowledge. This dissertation focuses on Bayesian methods of representing learned knowledge and develops novel algorithms that exploit the represented...
Bayesian Optimization (BO) methods are often used to optimize an unknown function f(•) that is costly to evaluate. They typically work in an iterative manner. In each iteration, given a set of observation points, BO algorithms select k ≥ 1 points to be evaluated. The results of those points are...
This work – in which three peer-reviewed academic papers are presented – addresses the ap-plication of Bayesian Reinforcement Learning to the control of a class of ocean wave energy conversion systems. The first paper presents a comparison of a Reinforcement-Learning (RL) based wave energy converter controller against standard Reactive Damping...
In this dissertation, we present a user-in-the-loop method for the design of an interactive motion data structure that benefits from the advantages of both motion graphs and blend-based techniques. Our novel approach automatically analyzes a traditional motion graph built from labeled motion clips. The result is a more condensed, coarser...
Wireless Networks have been widely adopted into a major part of today's network infrastructure. They have become a popular technology to not only expand the coverage of wired networks but also to interconnect a large wireless network, i.e., wireless mesh networks. As they allow more flexible communication than traditional wired-networks...
Building software systems that adapt to the changing environment is challenging. Developers cannot anticipate all the changes in advance, and even if they could, the effort required to handle such situations is too onerous for practical purposes. Self Adaptive Software (SAS) adapts itself as per changing environment. The area of...
Designing spectral efficient, high-speed wireless links that offer high quality-
of-service and range capability has been a critical research and engineering challenge. In this thesis, we mainly address the complexity and performance issues of
channel estimation and data detection in multiple-input multiple-output (MIMO)
orthogonal frequency division multiplexing (OFDM) systems over...
Due to the limitation of the radio frequency (RF) spectrum, it is increasingly more difficult to support billions of wireless devices in the age of Internet-of-Things. Consequently, many recent wireless indoor communication systems have been developed using free space optical (FSO) communication technologies that exploit the extremely large light spectrum...
This dissertation delves into understanding, characterizing, and addressing dataset shift in deep learning, a pervasive issue for deployed machine learning systems. Integral aspects of the problem are examined: We start with the use of counterfactual explanations in order to characterize the behavior of deep reinforcement learning agents in visual input...
One of the pervasive problems arising in our modern, digital world surrounds data breaches where an adversary, through zero-day exploitations, phishing, or old-fashioned social engineering attacks, gains access to a service’s data stores. Our society increasingly relies on these cloud-based services for everything from our taxes to personal communication. As...
Modern sensors are complex systems comprising multiple sub-systems such as transducers, analog and mixed-signal interface circuits, digital processing circuits, and packaging. Over the last few decades, innovations in these sub-systems combined with their increased integration in complementary metal-oxide semiconductor (CMOS) processes have led to the rapid growth in sensors for...
This research focuses on receiver architectures which enable better spectral eciency
by handling blockers in the same spectral range as the signal. The presence of
such blockers, without the use of blocker cancelling/ltering techniques leads to gain
compression and hence, consequent performance degradation of receivers leading to
reduced spectrum...
In this dissertation, we explored multiple coding techniques to reduce energy consumption, improve performance, and secure wireless sensor networks specifically and ad-hoc networks in general. With the introduction of Internet of Things (IoT) and 5G technologies, wireless sensor networks are quickly emerging as an important and key technology in the...
Secure Computation is a powerful tool that enables a set of parties to jointly compute any function over their private inputs, without a trusted third party. Private Set Intersection is a specific case of two-party Secure Computation, where Alice (with private set X) and Bob (with private set Y) specifically...
Secure two-party computation (2PC) is the task of performing arbitrary calculations on secret inputs provided by two parties, while maintaining secrecy if at least one party is honest. 2PC has been applied to privacy-preserving record linkage and machine learning, in areas such as medicine where maintaining privacy is crucial. One...
Recent sensor System-on-Chips (SoC) have enabled significant advances in energy-efficiency by incorporating various micro-powered building blocks. Unfortunately, most of these sensor systems do not address the high power cost associated with data storage and transmission, which in some cases vastly exceeds the power consumed by the rest of the SoC....
Our goal is to build a system to model the RNA sequences that reveals their structural information by using efficient dynamic programming algorithms and deep learning approaches. We aim to 1) achieve linear-time for RNA secondary structure prediction based on existing minimum free energy models; 2) utilize deep neural networks...
We describe a series of novel computational models, CERENKOV (Computational Elucidation of the REgulatory NonKOding Variome) and its successors CERENKOV2, CERENKOV3, and Convolutional CERENKOV3, for discriminating regulatory single nucleotide polymorphisms (rSNPs) from non-regulatory SNPs within non-coding genetic loci. The CERENKOV models are designed for recognizing rSNPs in the context of...
Protein-protein interactions underlie all biological processes and are a field of study that has wide implications throughout many other fields including medicine, genetics, biology, and ecology. Proteins are the building blocks and primary actors of life. They work together to accomplish virtually every task within a cell, including, metabolism, signal...
Learning Analytics and other branches of Educational Research such as Computing Education Research (CER) implicitly assume that students, especially college students, have no barriers to access learning platforms or software packages. This assumption may be attributed to such pervasive beliefs such as "everyone has a device", or "everyone can access...
The Fréchet distance is a measure of similarity between curves or surfaces. The Fréchet distance between two polygons can be computed in polynomial time, but it is much harder to compute the Fréchet distance between surfaces. We present the first (1+ε)-approximation algorithm and the first exact algorithm for computing the...
Analog-to-digital converters (ADCs) convert analog
continuous time signals into discrete time, digital format. One
precondition that must be met for conventional nyquist rate ADCs is
that the input signal must be suitably band-limited to an input
bandwidth less than the nyquist frequency. This mandates expensive
anti-alias filters which contribute to...
Iterative algorithms are simple yet efficient in solving large-scale optimization problems in practice. With a surge in the amount of data in past decades, these methods have become increasingly important in many application areas including matrix/tensor recovery, deep learning, data mining, and reinforcement learning. To optimize or improve iterative algorithms,...
This thesis presents methods to reduce the effects of finite opamp DC gain, output voltage swing limitations in opamps, and component mismatches. The primary contribution of this thesis is a new switched-capacitor method named correlated level shifting (CLS). CLS enables true rail-to-rail operation by storing an estimate of the desired...
Many problems in ecology and conservation biology can be formulated and solved using machine learning algorithms for multi-label classification. This dissertation addresses three topics related to predicting the distributions of multiple species. It improves existing methods and proposes a new modeling paradigm to address the multi-species, multi-label problem. The first...
Authentication protocols play important roles in network security. A variety of authentication protocols ranging from complex public-key cryptosystems to simple password-based authentication schemes have been proposed. However, currently there is no fully secure authentication scheme that can resist all known attacks. When a user authentication is performed over an insecure...
Soft keyboards come in different shapes, sizes, and layouts. Each layout is designed to help the users in different inputting tasks. Most of these layouts, however, focus on general text entry as opposed to computer programs. This dissertation addresses the problems with current input mechanisms on touchscreen devices. The dissertation...
The meteoric rise and prevalent usage of wireless networking technologies for mobile
communication applications have captured the attention of media and imagination of
public in the recent decade. One such proliferation is experienced in Wireless Sensor
Networks (WSNs), where multimedia enabled elements are fused with integrated
sensors to empower tightly...
There are nearly two million limb amputees living in the United States of America. Loss of limbs results in profound changes in one's life. However, the underlying neural circuitry and much of the ability to sense and control movements of their missing limb is retained even after limb loss. This...
The electrical stability of amorphous indium-gallium-zinc oxide (a-IGZO) thinfilmtransistors (TFTs) is investigated for flat-panel display applications. Althoughproducts incorporating a-IGZO TFT backplanes are already commercially available,e.g., iMac with 5K retina display, technical challenges need to be addressed for nextgenerationapplications, e.g., active-matrix organic light-emitting diode displays.Device stability is one crucial issue. The...
As one of the most popular data types, the point cloud is widely used in various appli- cations, including computer vision, computer graphics and robotics. The capability to directly measure 3D point clouds is invaluable in those applications as depth information could remove a lot of the segmentation ambiguities in...
We explore the application of deep learning to the disparate fields of natural language processing and computational biology. Both the sentences uttered by humans as well as the RNA and protein sequences found within the cells of their bodies can be considered formal languages in computer science, as sets of...
This work gives some theory and efficient design of binary block codes capable of controlling the deletions of the symbol “0” (referred to as 0-deletions) and/or the insertions of the symbol “0” (referred to as 0-insertions). This problem of controlling 0-deletions and/or 0-insertions (referred to as symmetric 0-errors) is shown...
The widespread use of wireless devices that we have recently been witnessing, such as smartphones, tablets, laptops, and wirelessly accessible devices in general, is causing an unprecedented growth in the required amount of the wireless radio spectrum. On the other hand, the spectrum resource has, for the last several decades,...