High Definition video streaming over WLANs faces many challenges because video data requires not only data integrity but also frames have strict playout deadline. Traditional streaming methods that rely solely on either UDP or TCP have difficulties meeting both requirements because UDP incurs packet loss while TCP incurs delay. This...
The rapid population growth in large urban cities has led to an unprecedented increase in both the number and the diversity of wireless devices and applications with varying quality of service requirements in terms of latency and data rates. LinkNYC is an example of an urban communication network infrastructure, which...
In recent years, RF (Radio Frequency) device fingerprinting using deep learning has emerged as a method of identifying devices solely by their RF transmissions. Conventional approaches to this type of device fingerprinting are not portable to different domains. That is, if a model for this purpose is trained on data...
RF data-driven device fingerprinting through the use of deep learning has recently surfaced as a possible method for secure device identification and authentication. Traditional approaches are commonly susceptible to the domain adaptation problem where a model trained on data from one domain performs badly when tested on data from a...
Various natural language processing (NLP) tasks necessitate deep models that are fast, efficient, and small based on their ultimate application at the edge or elsewhere. While significant investigation has furthered the efficiency and reduced the size of these models, reducing their downstream latency without significant trade-offs remains a difficult task....
Achieving sharpened (enhanced detail) features of a multi-dimensional data source using the linear prediction (LP) bandwidth extrapolation (BWE) technique in the transform domain is the main objective of this research. The evolution of sensor technology has provided acquisition scenarios in which the data format is inherently multi-dimensional, including hyperspectral imaging...
Cryptographic devices leak timing and power consumption information that is easily measurable, radiation of various levels, and more. Such devices also have additional inputs, other than plaintext and keys, like voltage, which can be modified to force the device to produce certain faulty outputs that can be used to reveal...
Energy consumption is one of the primary bottlenecks to both large and small scale modern compute platforms. Reducing the operating voltage of digital circuits to voltages where the supply voltage is near or below the threshold of the transistors has recently gained attention as a method to reduce the energy...
The future of mixed-signal, memory, and microprocessor technologies are dependent on ever increasing analog and digital integration, higher cell densities, and demand for more processing power. As a result MOSFET device dimensions continue to shrink to meet these demands. A side effect of device scaling is increased variability at each...
The meteoric rise and prevalent usage of wireless networking technologies for mobile
communication applications have captured the attention of media and imagination of
public in the recent decade. One such proliferation is experienced in Wireless Sensor
Networks (WSNs), where multimedia enabled elements are fused with integrated
sensors to empower tightly...