High Definition video streaming over WLANs faces many challenges because video data requires not only data integrity but also frames have strict playout deadline. Traditional streaming methods that rely solely on either UDP or TCP have difficulties meeting both requirements because UDP incurs packet loss while TCP incurs delay. This...
An Automated Star Tracking System was designed and built for an undergraduate senior design project. The system was designed as a portable and easy to use means of tracking celestial objects, and is usable for a variety of both personal and professional purposes. The project was built around exploring the...
There are generally two types of multiview video:(1) 3D Multiview Video (“3D MVV” also called “2D plus delta” or “stereo” multi-view video): 3D MVV is widely deployed in cinemas and in the TV industry. 3D MVV typically entails capturing video of an object using two cameras with differing view angles...
Energy consumption is one of the primary bottlenecks to both large and small scale modern compute platforms. Reducing the operating voltage of digital circuits to voltages where the supply voltage is near or below the threshold of the transistors has recently gained attention as a method to reduce the energy...
An n-bit Gray code is an ordered set of all 2n binary strings of length n. The
special property of this listing is that Hamming distance between consecutive vectors
is exactly 1. If the last and first codeword also have a Hamming distance 1 then the
code is said to...
The future of mixed-signal, memory, and microprocessor technologies are dependent on ever increasing analog and digital integration, higher cell densities, and demand for more processing power. As a result MOSFET device dimensions continue to shrink to meet these demands. A side effect of device scaling is increased variability at each...
In recent years, RF (Radio Frequency) device fingerprinting using deep learning has emerged as a method of identifying devices solely by their RF transmissions. Conventional approaches to this type of device fingerprinting are not portable to different domains. That is, if a model for this purpose is trained on data...
Until a few years ago, wireless-capable laptops were considered novelties by many. It is now hard to find a laptop or a hand-held computing device that is not wireless-ready. As wireless devices are becoming commodities, they have also become an indispensable part of the modern society. Not surprisingly, research in...
The Discrete Cosine Transform is used in many image and video compression
standards. Many methods have been developed for efficiently computing the Discrete
Cosine Transform including flowgraph algorithms, distributed arithmetic and
two-dimensional decompositions.
A new architecture based on distributed arithmetic is presented for computing
the Discrete Cosine Transform and it's...
Peer-to-Peer (P2P) based distributed storage systems have gain much popularity in recent years. These systems rely greatly on the data redundancy to be robust under network dynamics, i.e., the dynamics of peer entering and departing the network. Hence, it is important to implement mechanisms for maintaining a certain level of...
The rapid population growth in large urban cities has led to an unprecedented increase in both the number and the diversity of wireless devices and applications with varying quality of service requirements in terms of latency and data rates. LinkNYC is an example of an urban communication network infrastructure, which...
Continuous Improvement (CI) of academic computing programs is a main requirement of accreditation. Academic computing programs must have a well-documented CI plan in order to be granted accreditation. Based on the existing literature, we developed a comprehensive CI (or 360-CI) model consisting of 8 components: course, curriculum, administration, faculty, research,...
Advances in low-power digital integration and microelectro-mechanical systems (MEMS) have paved the way for micro-sensors. These sensors are equipped with data processing capabilities along with sensory circuits. Sensor data are processed on these individual sensors and transmitted to the target (sink). Lowcost integration and small sizes of these sensors have...
This research explores the viability and effectiveness of using an inertial navigation system (INS) to control a beamforming array of microstrip patch antennas with the aim of reducing users' exposure to electromagnetic radiation. The system reduces radiated power directed toward a cellular phone user to below 10% of the total...
Advancements in the sophistication and complexity of modern electronic systems are creating a need for highly integrated systems with ever higher operational frequencies. The economical demands of these systems dictate that they be implemented using low cost fabrication technologies, such as digital CMOS. One of the major challenges facing circuit...
Various natural language processing (NLP) tasks necessitate deep models that are fast, efficient, and small based on their ultimate application at the edge or elsewhere. While significant investigation has furthered the efficiency and reduced the size of these models, reducing their downstream latency without significant trade-offs remains a difficult task....
Machine learning applied to computer architecture has rapidly transitioned from a theoretical novelty to being a driving force behind design, control, and simulation in practically all components. These machine-learning-based methodologies are further notable for their scalability to increasingly complex design challenges, which has allowed these methodologies to surpass the prior...
We present the results of embedding a multigrid solver for Poisson's equation
into the parallel 3D Monte Carlo device simulator, PMC-3D. First we compare
the sequential multigrid implementation to the sequential Successive Overrelaxation
(SOR) Monte Carlo code used previously in PMC-3D. Depending on the convergence
threshold, we obtain significant speedups...
Laboratory data of free surface elevations and fluid velocities were
obtained using a laser-Doppler velocimeter for the case of a periodic wave
plunging over an impermeable, steep (1:10) slope with a fixed bottom roughness.
The measurements were conducted over 15 cross-shore locations from the outer
surf zone to the swash...
A distributed system is a network of multiple autonomous computational nodes designed primarily for performance scalability and robustness. The performance of a distributed system depends critically on how tasks and resources are distributed among the nodes. Thus, a main thrust in distributed system research is to design schemes for distributing...
This work presents a new energy saving technique for modern digital designs. We propose Time Interleaved Multi-Rail (TIMR) - a method for providing two dynamic supply rails to a circuit. This technique uses the first supply rail to mask the transition delay while changing the voltage of the second rail....
It is possible to purchase, for as little as $10,000, a cluster of computers with the capability to rival the supercomputers of only a few years ago. Now, users that have little to no experience developing distributed applications or managing a cluster are in a position to do so. To...
Traditional bus-based interconnects are simple and easy to implement, but the scalability is greatly limited. While router-based networks-on-chip (NoCs) offer superior scalability, they also incur significant power and area overhead due to complex router structures. In this thesis, a new class of on-chip networks, referred to as Routerless (RL) NoCs,...
Most of today’s Internet of Things (IoT) applications assume that data will be moved offdevices into centralized cloud platforms. While existing IoT systems leverage cloud-based analytics for meaningful data reasoning, the assumption that data should always be moved off the devices is problematic. The amount of data to be moved...
Cometabolic biodegradation processes are potentially useful for the
bioremediation of hazardous waste sites. In this study the potential application of phenol-oxidizing
and nitrifying bacteria as "priming biocatalysts" was examined in the
degradation of polycyclic aromatic hydrocarbons (PAHs), aryl ethers, and aromatic
ethers. We observed that a phenol-oxidizing Pseudomonas strain cometabolically...
Quotient rings of Gaussian and Eisenstein-Jacobi(EJ) integers can be deployed to construct interconnection networks with good topological properties. In this thesis, we propose deadlock-free deterministic and partially adaptive routing algorithms for hexagonal networks, one special class of EJ networks. Then we discuss higher dimensional Gaussian networks as an alternative to...
RF data-driven device fingerprinting through the use of deep learning has recently surfaced as a possible method for secure device identification and authentication. Traditional approaches are commonly susceptible to the domain adaptation problem where a model trained on data from one domain performs badly when tested on data from a...
Error correction codes (ECCs) have been widely used in communication systems and storage devices. Nowadays, the rapid development of integrated circuit technologies makes feasible the implementation of powerful ECCs such as turbo code and low-density parity-check (LDPC) code. However, these high-performance codes require complex decoding algorithms, resulting in large hardware...
A relatively recent development in the late 1980s in processors has been the superscalar processor. Superscalar processors use multiple pipelines in an attempt to achieve higher performance than previous generations of processors. Having multiple pipelines makes it possible to execute more than one instruction per cycle. However, since instructions are...
Compactness in deep learning can be critical to a model’s viability in low-resource applications, and a common approach to extreme model compression is quantization. We consider Iterative Product Quantization (iPQ) with Quant-Noise [Fan et al., 2020] to be state-of-the-art in this area, but this quantization framework suffers from preventable inference...
The world's demand for energy is an ongoing challenge, which has yet to be overcome.
The efforts to find clean energy alternatives to fossil fuels have been hampered by the
lack of investment in technology and research. Among these clean energy alternatives
are ocean waves and wind. Wind power is...
Massive Multiple-User Miltiple-Input Multiple-Output (MU-MIMO) wireless communication systems incorporate promising advanced strong technologies for upcoming 5G communications. To obtain some of the high spectrum and energy e ciencies bonuses brought by MU-MIMO systems, the ability to obtain Channel State information, especially on the receiver side (CSI), is important. To minimize...
Routerless networks on chip (NoCs) were recently introduced as an alternative to traditional mesh-based scalable networks, promising improved performance and scalability with a large decrease in power and area usage by the elimination of routing on in-flight packets. Without mitigation, most network designs, including routerless, are susceptible to loss of...
Cryptographic devices leak timing and power consumption information that is easily measurable, radiation of various levels, and more. Such devices also have additional inputs, other than plaintext and keys, like voltage, which can be modified to force the device to produce certain faulty outputs that can be used to reveal...
In computer science, peer review, also referred to as code review, is known to be an efficient technique to ensure quality when developing software projects in various industries. Peer review is one method for encouraging computer scientists benefit from each other by providing them with the opportunity to evaluate other...
Recent trends in CMOS technology and scaling of devices clearly indicate that leakage power in digital circuits would be crucial and largely depend on the sub-threshold current.
Minimizing leakage is gaining increasing importance along with other critical design aspects primarily due to the growing demand for portable battery-operated electronic devices...
Achieving sharpened (enhanced detail) features of a multi-dimensional data source using the linear prediction (LP) bandwidth extrapolation (BWE) technique in the transform domain is the main objective of this research. The evolution of sensor technology has provided acquisition scenarios in which the data format is inherently multi-dimensional, including hyperspectral imaging...
This thesis describes the analysis and comparison of Folded Source-Coupled
Logic (FSCL) with standard static CMOS, cascode voltage-switch logic and differential
split-level logic gates. The advantages of FSCL are low switching noise and
high operating speed. The effect of voltage and device scaling on these topologies is
evaluated in terms...
Hybrid automatic repeat request (HARQ) schemes combine packet retransmission with forward error correction to ensure a reliable communications. In multiple-input multiple output (MIMO) systems, interference cancellation (IC) detection is widely used where the detection and cancellation steps of the simultaneously transmitted data streams occur. In principle, the signal stream estimated...
Due to the rapid growth of wireless technology, there has been a growing interest in the capabilities of ad hoc networks connecting mobile phones, PDAs and laptop computers. The distributed and self-configurable capabilities of ad hoc networks make them very attractive for some applications such as tactical communication for military,...
Throughput-oriented processors, such as graphics processing units (GPUs), have been increasingly used to accelerate general purpose computing, including machine learning models that are being utilized in numerous disciplines. Thousands of concurrently running threads in a GPU demand a highly efficient memory subsystem for data supply in GPUs. In this dissertation,...
The proliferation of mobile users and internet content has advanced a plethora of research areas. Among these areas include mobile networks, transport layer protocols, and smart cities. Research shows that global mobile data traffic will increase sevenfold reaching 49 exabytes per month by 2021, most of which will be mobile...
Many algorithms in parallel systems can be easily solved if we can generate a Hamiltonian cycle on the underly network. Finding Hamiltonian cycle is a well known NP-complete problem. For specific instances of regular graphs, such as Torus and Gaussian network, one can easily find Hamiltonian cycles. In this thesis,...
Machine learning has enabled significant advancements in diverse fields, yet, with a few exceptions, has had limited impact on computer architecture. Recent work, however, has begun to explore broader application to design, optimization, and simulation. Notably, machine-learning-based strategies often surpass prior state-of-the-art analytical, heuristic, and human-expert approaches. This thesis first...
The Machine Learning (ML) algorithms are increasingly explored in varies of fields including designing and optimizing computer systems. Recent research, such as optimizing memory/cache prefetching by ML training or predicting traffic pattern in throughput processors, also exhibits a promising future of introducing ML into computer system design and optimization. Throughput...
The meteoric rise and prevalent usage of wireless networking technologies for mobile
communication applications have captured the attention of media and imagination of
public in the recent decade. One such proliferation is experienced in Wireless Sensor
Networks (WSNs), where multimedia enabled elements are fused with integrated
sensors to empower tightly...
In modern on-chip memories, an increasing demand for higher performance, lower power, reduced area, and improved robustness creates a rising need for advanced microarchitecture and circuit design techniques. Particularly in large-signal multi-ported register files, these advanced design techniques include: (i) multi-banked arrays, (ii) multi-frequency arrays, (iii) multi-bit width gating, (iv)...
This work gives some theory and efficient design of binary block codes capable of controlling the deletions of the symbol “0” (referred to as 0-deletions) and/or the insertions of the symbol “0” (referred to as 0-insertions). This problem of controlling 0-deletions and/or 0-insertions (referred to as symmetric 0-errors) is shown...
Dynamic CMOS circuits are commonly used in high-performance memory arrays to implement wide-NOR logic functions for their read and search operations. This is because dynamic circuits have significantly higher speed and lower area compared to static circuits for performing similar operations. Register File (RF) arrays are located at the top...
Multiple-input multiple-output (MIMO) antennas can be exploited to provide high data rate using a limited bandwidth through multiplexing gain. MIMO combined with orthogonal frequency division multiplexing (OFDM) could potentially provide high data rate and high spectral efficiency in frequency-selective fading channels. MIMO-OFDM technology has been widely employed in modern communication...
Relay-assisted cooperative communications are promising solutions for error-performance improvement and cell coverage extension. In this thesis, we propose several efficient cooperative relay communication schemes. First, an efficient space-time coded cooperative relay communications scheme that employs linear precoding and transmission-pattern selection is proposed. This is built upon an existing block linear...
The major limiting factor of DRAM access time is the low transconductance of the
MOSFET's which have only limited current drive capability. The bipolar junction
transistor(BJT) has a collector current amplification factor, β, times base current and is
limited mostly by the willingness to supply this base current. This collector...
A new CAD-oriented methodology for the full-wave broadband characterization of coupled microstrip structures for RF/microwave and high-speed digital circuits is presented. The characterization methodology is based on the finite difference time domain (FDTD) technique combined with a systematic extraction procedure using the normal mode approach and multiport network concepts. The...