Defense Notices
All students and faculty are welcome to attend the final defense of EECS graduate students completing their M.S. or Ph.D. degrees. Defense notices for M.S./Ph.D. presentations for this year and several previous years are listed below in reverse chronological order.
Students who are nearing the completion of their M.S./Ph.D. research should schedule their final defenses through the EECS graduate office at least THREE WEEKS PRIOR to their presentation date so that there is time to complete the degree requirements check, and post the presentation announcement online.
Upcoming Defense Notices
Andrew Riachi
An Investigation Into The Memory Consumption of Web Browsers and A Memory Profiling Tool Using Linux SmapsWhen & Where:
Nichols Hall, Room 246 (Executive Conference Room)
Committee Members:
Prasad Kulkarni, ChairPerry Alexander
Drew Davidson
Heechul Yun
Abstract
Web browsers are notorious for consuming large amounts of memory. Yet, they have become the dominant framework for writing GUIs because the web languages are ergonomic for programmers and have a cross-platform reach. These benefits are so enticing that even a large portion of mobile apps, which have to run on resource-constrained devices, are running a web browser under the hood. Therefore, it is important to keep the memory consumption of web browsers as low as practicable.
In this thesis, we investigate the memory consumption of web browsers, in particular, compared to applications written in native GUI frameworks. We introduce smaps-profiler, a tool to profile the overall memory consumption of Linux applications that can report memory usage other profilers simply do not measure. Using this tool, we conduct experiments which suggest that most of the extra memory usage compared to native applications could be due the size of the web browser program itself. We discuss our experiments and findings, and conclude that even more rigorous studies are needed to profile GUI applications.
Elizabeth Wyss
A New Frontier for Software Security: Diving Deep into npmWhen & Where:
Eaton Hall, Room 2001B
Committee Members:
Drew Davidson, ChairAlex Bardas
Fengjun Li
Bo Luo
J. Walker
Abstract
Open-source package managers (e.g., npm for Node.js) have become an established component of modern software development. Rather than creating applications from scratch, developers may employ modular software dependencies and frameworks--called packages--to serve as building blocks for writing larger applications. Package managers make this process easy. With a simple command line directive, developers are able to quickly fetch and install packages across vast open-source repositories. npm--the largest of such repositories--alone hosts millions of unique packages and serves billions of package downloads each week.
However, the widespread code sharing resulting from open-source package managers also presents novel security implications. Vulnerable or malicious code hiding deep within package dependency trees can be leveraged downstream to attack both software developers and the end-users of their applications. This downstream flow of software dependencies--dubbed the software supply chain--is critical to secure.
This research provides a deep dive into the npm-centric software supply chain, exploring distinctive phenomena that impact its overall security and usability. Such factors include (i) hidden code clones--which may stealthily propagate known vulnerabilities, (ii) install-time attacks enabled by unmediated installation scripts, (iii) hard-coded URLs residing in package code, (iv) the impacts of open-source development practices, (v) package compromise via malicious updates, (vi) spammers disseminating phishing links within package metadata, and (vii) abuse of cryptocurrency protocols designed to reward the creators of high-impact packages. For each facet, tooling is presented to identify and/or mitigate potential security impacts. Ultimately, it is our hope that this research fosters greater awareness, deeper understanding, and further efforts to forge a new frontier for the security of modern software supply chains.
Alfred Fontes
Optimization and Trade-Space Analysis of Pulsed Radar-Communication Waveforms using Constant Envelope ModulationsWhen & Where:
Nichols Hall, Room 246 (Executive Conference Room)
Committee Members:
Patrick McCormick, ChairShannon Blunt
Jonathan Owen
Abstract
Dual function radar communications (DFRC) is a method of co-designing a single radio frequency system to perform simultaneous radar and communications service. DFRC is ultimately a compromise between radar sensing performance and communications data throughput due to the conflicting requirements between the sensing and information-bearing signals.
A novel waveform-based DFRC approach is phase attached radar communications (PARC), where a communications signal is embedded onto a radar pulse via the phase modulation between the two signals. The PARC framework is used here in a new waveform design technique that designs the radar component of a PARC signal to match the PARC DFRC waveform expected power spectral density (PSD) to a desired spectral template. This provides better control over the PARC signal spectrum, which mitigates the issue of PARC radar performance degradation from spectral growth due to the communications signal.
The characteristics of optimized PARC waveforms are then analyzed to establish a trade-space between radar and communications performance within a PARC DFRC scenario. This is done by sampling the DFRC trade-space continuum with waveforms that contain a varying degree of communications bandwidth, from a pure radar waveform (no embedded communications) to a pure communications waveform (no radar component). Radar performance, which is degraded by range sidelobe modulation (RSM) from the communications signal randomness, is measured from the PARC signal variance across pulses; data throughput is established as the communications performance metric. Comparing the values of these two measures as a function of communications symbol rate explores the trade-offs in performance between radar and communications with optimized PARC waveforms.
Qua Nguyen
Hybrid Array and Privacy-Preserving Signaling Optimization for NextG Wireless CommunicationsWhen & Where:
Zoom Defense, please email jgrisafe@ku.edu for link.
Committee Members:
Erik Perrins, ChairMorteza Hashemi
Zijun Yao
Taejoon Kim
KC Kong
Abstract
This PhD research tackles two critical challenges in NextG wireless networks: hybrid precoder design for wideband sub-Terahertz (sub-THz) massive multiple-input multiple-output (MIMO) communications and privacy-preserving federated learning (FL) over wireless networks.
In the first part, we propose a novel hybrid precoding framework that integrates true-time delay (TTD) devices and phase shifters (PS) to counteract the beam squint effect - a significant challenge in the wideband sub-THz massive MIMO systems that leads to considerable loss in array gain. Unlike previous methods that only designed TTD values while fixed PS values and assuming unbounded time delay values, our approach jointly optimizes TTD and PS values under realistic time delays constraint. We determine the minimum number of TTD devices required to achieve a target array gain using our proposed approach. Then, we extend the framework to multi-user wideband systems and formulate a hybrid array optimization problem aiming to maximize the minimum data rate across users. This problem is decomposed into two sub-problems: fair subarray allocation, solved via continuous domain relaxation, and subarray gain maximization, addressed via a phase-domain transformation.
The second part focuses on preserving privacy in FL over wireless networks. First, we design a differentially-private FL algorithm that applies time-varying noise variance perturbation. Taking advantage of existing wireless channel noise, we jointly design differential privacy (DP) noise variances and users transmit power to resolve the tradeoffs between privacy and learning utility. Next, we tackle two critical challenges within FL networks: (i) privacy risks arising from model updates and (ii) reduced learning utility due to quantization heterogeneity. Prior work typically addresses only one of these challenges because maintaining learning utility under both privacy risks and quantization heterogeneity is a non-trivial task. We approach to improve the learning utility of a privacy-preserving FL that allows clusters of devices with different quantization resolutions to participate in each FL round. Specifically, we introduce a novel stochastic quantizer (SQ) that ensures a DP guarantee and minimal quantization distortion. To address quantization heterogeneity, we introduce a cluster size optimization technique combined with a linear fusion approach to enhance model aggregation accuracy. Lastly, inspired by the information-theoretic rate-distortion framework, a privacy-distortion tradeoff problem is formulated to minimize privacy loss under a given maximum allowable quantization distortion. The optimal solution to this problem is identified, revealing that the privacy loss decreases as the maximum allowable quantization distortion increases, and vice versa.
This research advances hybrid array optimization for wideband sub-THz massive MIMO and introduces novel algorithms for privacy-preserving quantized FL with diverse precision. These contributions enable high-throughput wideband MIMO communication systems and privacy-preserving AI-native designs, aligning with the performance and privacy protection demands of NextG networks.
Past Defense Notices
KISHANRAM KAJE
Complex Field Modulation in Direct Detection SystemsWhen & Where:
246 Nichols Hall
Committee Members:
Rongqing Hui, ChairChristopher Allen
Victor Frost
Erik Perrins
Siyuan Han
Abstract
Even though fiber optics communication is providing a high bandwidth channel to achieve high speed data transmission, there is still a need for higher spectral efficiency, faster data processing speeds while reduced resource requirements due to ever increasing data and media traffic. Various multilevel modulation and demodulation techniques are used to improve spectral efficiency. Although, spectral efficiency is improved, there are other challenges that arise while doing so such as requirement for high speed electronics, receiver sensitivity, chromatic dispersion, operational flexibility etc. Here, we investigate multilevel modulation techniques to improve spectral efficiency while reducing the resource requirements.
We demonstrated a digital-analog hybrid subcarrier multiplexing (SCM) technique which can reduce the requirement of high speed electronics such as ADC and DAC, while providing wideband capability, high spectral efficiency, operational flexibility and controllable data-rate granularity.
With conventional Quadrature Phase Shift Keying (QPSK), to achieve maximum spectral efficiency, we need high spectral efficient Nyquist filters which takes high FPGA resources for digital signal processing (DSP). Hence, we investigated Quadrature Duobinary (QDB) modulation as a solution to reduce the FPGA resources required for DSP while achieving spectral efficiency of 2bits/s/Hz. Currently we are investigating all analog single sideband (SSB) complex field modulated direct detection system. Here, we are trying to achieve higher spectral efficiency by using QDB modulation scheme in comparison to QPSK while avoiding signal-signal beat interference (SSBI) by providing a guard-band based approach.
In coherent detection systems, the MLSE receiver could be implemented using Viterbi algorithm. However, in case of direct detection systems due to square law detection the noise in the received signal is not Gaussian anymore. This leads to requirement of channel behavior estimation for the implementation of MLSE receiver in direct detection systems. Recently, Kramers-Kronig receiver has attracted great deal of attention. We are working on utilizing Kramers-Kronig receiver to implement MLSE receiver for direct detection system without the need for channel estimation.
MAHDI JAFARISHIADEH
New Topology and Improved Control of Modular Multilevel Converter (MMC)-Based ConvertersWhen & Where:
1 Eaton Hall
Committee Members:
Reza Ahmadi, ChairGlenn Prescott
Alessandro Salandrino
James Stiles
Xiaoli (Laura) Li
Abstract
Trends toward large-scale integration and the high-power application of green energy resources necessitate the advent of efficient power converter topologies, multilevel converters. Multilevel inverters are effective solutions for high power and medium voltage DC-to-AC conversion due to their higher efficiency, provision of system redundancy, and generation of near-sinusoidal output voltage waveform. Among many proposed multilevel topologies, the neutral-point-clamped (NPC), flying capacitor (FC), and cascaded H-bridge (CHB) converters are the most well-known classical multilevel topologies. For generation of output voltages with more than five levels, the number of required diodes and capacitors in NPC and FC increases rapidly. Also, these two topologies suffer from a significant capacitor voltage balancing problem. CHBs also require bulky multi-winding transformers to realize several isolated dc sources. Recently, modular multilevel converter (MMC) has become increasingly attractive due to its modularity, high efficiency, excellent output voltage waveform, and no need for separate dc sources. To improve the harmonic profile of the output voltage, there is the need to increase the number of output voltage levels. However, this would require increasing the number of submodules (SMs) and power semi-conductor devices and their associated gate driver and protection circuitry, resulting in the overall multilevel converter to be complex and expensive. Fewer efforts have been devoted to proposing MMC-based multilevel topologies focusing on reduced part count. This work will investigate new medium-voltage high-power MMC-based multilevel inverter with reduced component numbers while using conventional half-bridge SM structure.
The second part of this work is on improving control of MMC-based high-power DC-DC converters. Medium-voltage DC (MVDC) grids have been the focus of numerous research studies in recent years due to their increasing applications in rapidly growing grid-connected renewable energy systems, such as wind, solar and wave farms. MMC-based DC-DC converters are employed for collecting power from offshore wind and wave farms. Among various developed high-power DC-DC converter topologies, MMC-based DC-DC converter with medium-frequency (MF) transformer is a valuable topology due to its numerous advantages. Specifically, they offer a significant reduction in the size of the MMC arm capacitors along with the ac-link transformer and arm inductors due to the ac-link transformer operating at medium frequencies. As such, this work focuses on improving the control of isolated MMMC-based DC-DC converters. Conventionally, the active power is controlled by phase shifts between the primary side and secondary side of transformers. Through this work, adding degree of freedom is investigated by considering the amplitude ratio index of MMC leg as a single control parameter. From the derived analytical formulas, this will lead to operating points where the same active power is transferrable but current stress is reduced. Subsequently, longer lifetimes of the high-frequency transformer and power switches are expected.
The specific goals of this work are, (1) Investigating new topology of MMC-based inverter that generate the same peak-to-peak output voltage and voltage levels as conventional MMC but require fewer components. (2) Improving control of isolated MMC-based DC-DC converters to reduce the current stress of the switches and transformer while delivering same power.
RAVALI KONDREDDI
LocTrac - Android application for location trackingWhen & Where:
2001 B Eaton Hall
Committee Members:
Jerzy Grzymala-Busse, ChairMan Kong
Prasad Kulkarni
Abstract
Owing a mobile phone has come to be regarded as a necessity in today’s world. Smart phone is an effective way to locate a person anywhere in this world. Android is an open source software stack with the largest number of users. Hence, this application is developed in Android. LocTrac is an Android application used to track the location of the user. During the time of emergencies or accidents, a person may not be in a situation to let others know about his/her location. LocTrac is an application which automatically send the user’s location to registered contacts so that they can track him/her down. In this application we initially register few contacts as guardians, when the user doesn’t answer the call, his/her location is automatically sent to the registered contacts. This application also uses sensors to capture the phone movement and send the location. Timer, alarm, emergency call are other features of this application.
NIDHI MIDHA
Study of k-Fold Cross ValidationWhen & Where:
2001 B Eaton Hall
Committee Members:
Jerzy Grzymala-Busse, ChairJohn Garrett Morris
Heechul Yun
Abstract
Enormous amount of data is being generated due to advancement in technology. The basic question of discovering knowledge from the data generated is still pertinent. Data mining guides us in discovering patterns or rules. Various techniques are applied to find the error rate on testing data sets based on rules generated from stratified training data sets. In this project, using the k-Fold Cross Validation approach, we vary the number of folds the training data set is divided into, stratify the folds, and find the error rates on testing data sets for each ‘k’. For every data set in each k, experiment is repeated certain number of times such that there is a random testing data set each time. We observed that as the value of k increases, the error rate starts getting stabilized, and there is a stage when error rate doesn't increase even if we increase the number of folds.
ABDULMALIK HUMAYED
Securing CAN-Based Cyber-Physical SystemsWhen & Where:
246 Nichols Hall
Committee Members:
Bo Luo, ChairArvin Agah
Prasad Kulkarni
Heechul Yun
Prajna Dhar
Abstract
With the exponential growth of cyber-physical systems (CPSs), new security challenges have emerged. Various vulnerabilities, threats, attacks, and controls have been introduced for the new generation of CPS. However, there lacks a systematic review of the CPS security literature. In particular, the heterogeneity of CPS components and the diversity of CPS systems have made it difficult to study the problem with one generalized model. As the first component of this dissertation, existing research on CPS security is studied and systematized under a unified framework. Smart cars, as a CPS application, was further explored under the proposed framework and new attacks are identified and addressed.
The Control Area Network (CAN bus) is a prevalent serial communication protocol adopted in industrial CPS, especially in small and large vehicles, ships, planes, and even in drones, radar systems, and submarines. Unfortunately, the CAN bus was designed without any security considerations. We then propose and demonstrate a stealthy targeted Denial of Service (DoS) attack against CAN. Experimentations show that the attack is effective and superior to attacks of the same category due to its stealthiness and ability to avoid detection from current countermeasures.
Two controls are proposed to defend against various spoofing and DoS attacks on CAN. The first one aims to minimize the attack using ID-Hopping mechanism such that CAN arbitration IDs are randomized so an attacker would not be able to target them. ID-Hopping raises the bar for attackers by randomizing the expected patterns in CAN network. Such randomization hinders the attacker's ability to launch targeted DoS attacks. Based on the evaluation on the testbed, the randomization mechanism, ID-Hopping, holds a promising solution for targeted DoS, and reverse engineering CAN IDs, which CAN networks are most vulnerable to. The second countermeasure is a novel CAN firewall that aims to prevent an attacker from launching a plethora of untraditional attacks on CAN that existing solutions do not adequately address. The firewall is placed between a potential attacker’s node and the rest of the CAN bus. Traffic is controlled bidirectionally between the main bus and the attacker’s side so that only benign traffic can pass to the main bus. This ensures that an attacker cannot arbitrarily inject malicious traffic into the main bus. Demonstration and evaluation of the attack and firewall were conducted by a bit-level analysis, i.e., “Bit banging”, of CAN’s traffic. Results show that the firewall successfully prevents the stealthy targeted DoS attack, as well as, other recent attacks. To evaluate the proposed attack and firewall, a testbed was built that consists of BeagleBone Black and STM32 Nucleo-144 microcontrollers to simulate real CAN traffic.
Finally, a design of an Intrusion Detection System (IDS) is proposed to complement the firewall. It utilizes the proposed firewall to add situational awareness capabilities to the bus’s security posture and detect and react to attacks that might bypass the firewall based on certain rules.
SAIKAT SENGUPTA
Understanding Memory Access Behavior for Heterogeneous Memory SystemsWhen & Where:
2001 B Eaton Hall
Committee Members:
Prasad Kulkarni, ChairPerry Alexander
Jerzy W. Grzymala-Busse
Abstract
Present day manufacturers have invented different memory technologies with distinct bandwidth, energy and cost tradeoffs. Systems with such heterogeneous memory technologies can only achieve the best performance and power characteristics by appropriately partitioning process data on OS pages and placing OS pages in the right memory areas. To achieve effective data partitioning and placement we need to first understand how programs access memory and how those patterns change at various stages (phases) of program execution. The goal of this work is to build a framework, design experiments and conduct analysis to understand overall memory usage patterns across many programs.
We use Intel’s Pin dynamic binary translation and instrumentation system for this work. Our Pin based framework instruments programs at run-time to collect data regarding memory allocations, de-allocations, reads and writes, which we then analyze using our specialized scripts. We collect and analyze information including page access counts, hot page ratio, memory read and write access patterns and how that varies in different program phases. We also analyze the similarities regarding memory behavior between distinct phases during program execution. We also study memory behavior both with cache and without cache to understand how caches affect the memory access behavior.
DAIN VERMAAK
Modeling, Visualizing, and Analyzing Student Progress on Learning MapsWhen & Where:
2001 B Eaton Hall
Committee Members:
James Miller, ChairMan Kong
Suzanne Shontz
Guanghui Wang
Bruce Frey
Abstract
A learning map is an unweighted directed graph containing relationships between discrete skills and concepts with edges defining the prerequisite hierarchy. They arose as a means of connecting student instruction directly to standards and curriculum and are designed to assist teachers in lesson planning and evaluating student response. As learning maps gain popularity there is an increasing need for teachers to quickly evaluate which nodes have been mastered by their students. Psychometrics is a field focused on measuring student performance and includes the development of processes used to link a student's response to multiple choice questions directly to their understanding of concepts. This dissertation focuses on developing modeling and visualization capabilities to enable efficient analysis of data pertaining to student understanding generated by psychometric techniques.
Such analysis naturally includes that done by classroom teachers. Visual solutions to this problem clearly indicate the current understanding of a student or classroom in such a way as to make suggestions that can guide future learning. In response to these requirements we present various experimental approaches which augment the original learning map design with targeted visual variables. Particular attention is given to variable selection and their effect on the usability of the resulting graphics.
As well as looking forward, we also consider methods by which data visualization can be used to evaluate and improve existing teaching methods. We present several graphics based on modelling student progression as information flow. These methods rely on conservation of data to increase edge information, reducing the load carried by the nodes and encouraging path comparison.
Finally, we propose a means of combining features of key experimental approaches to design a single graphic capable of meeting both the predictive and validation requirements. We also propose several methods to measure the effectiveness and correctness of the final design.
HAMID MAHMOUDI
Novel Predictive Control Strategies in Power Electronics SystemsWhen & Where:
2001 B Eaton Hall
Committee Members:
Reza Ahmadi, ChairChristopher Allen
Alessandro Salandrino
James Stiles
Shawn Keshmiri
Abstract
This work proposes several advanced predictive switching algorithms and modulation methods for power electronics converters based on model predictive control (MPC) paradigm. The proposed methods retain the advantages of conventional MPC methods in programing the nonlinear effects of the converter into the design calculations to improve the overall dynamic performance and steady state operation of the system. Besides, the proposed methods provide a fixed switching frequency operation of the system, which results in regulating the system objectives with minimized ripple. In the first part of this work, a new modulation based MPC technique is proposed. The proposed method provides flexibility to prioritize different objectives of the system against each other using weighting factors. To further evaluate the merits of the proposed method, it has been used to control modular multilevel converters (MMCs) in voltage-source-converter high-voltage-DC (VSC-HVDC) systems. The proposed method minimizes the line total harmonic distortion (THD), circulating current ripple and steady-state error. Furthermore, a new Finite-Control-Set MPC (FCS-MPC) method for controlling MMCs with minimized computational burden is proposed that doesn’t employ weighting factors to control different system objectives.
Furthermore, a Modulated MPC (MMPC) based control system for a Z-source Inverter (ZSI) based Permanent Magnet Synchronous Motor (PMSM) drive system is proposed. The Proposed method uses two separate MMPC loops for the Z-source network and PMSM control. For the Z-source network, a cascaded MMPC control scheme has been proposed and for the PMSM, a novel MMPC controller is proposed that predicts the future value of PMSM current vectors, selects specific current vectors that minimize a certain cost function the most, and performs modulation between them.
Finally, a torque ripple minimization method for a PMSM drive system that utilizes a modified quasi-Z-source (qZS) inverter which provides a wider range of capabilities for inverter input voltage control is proposed. It also allows for modification of the traditional switching sequence selection scheme when using the Space Vector Modulation (SVM) for switching. The provided flexibilities are leveraged to develop a control system that minimizes the torque ripples during PMSM operation while satisfying conventional control objectives such as shaft speed control.
SALLY SAJADIAN
Model Predictive Control of Impedance Source Inverter for Photovoltaic ApplicationsWhen & Where:
2001B Eaton Hall
Committee Members:
Reza Ahmadi, ChairGlenn Prescott
Alessandro Salandrino
Jim Stiles
Huazhen Fang
Abstract
A model predictive controlled power electronics interface (PEI) based on impedance source inverter for photovoltaic (PV) applications is proposed in this dissertation. The proposed system has the capability of operation in both grid-connected and islanded mode. Firstly, a model predictive based maximum power point tracking (MPPT) method is proposed for PV applications based on single stage grid-connected Z-source inverter (ZSI). This technique predicts the future behavior of the PV side voltage and current using a digital observer that estimates the parameters of the PV module. The proposed method adaptively updates the perturbation size in the PV voltage using the predicted model of the system to reduce oscillations and increase convergence speed. The experimental results demonstrate fast dynamic response to changes in solar irradiance level, small oscillations around maximum power point at steady-state, and high MPPT efficacy.
The second part of this dissertation focuses on the dual-mode operation of the proposed PEI based on ZSI with capability to operate in islanded and grid-connected mode. The transition from islanded to grid-connected mode and vice versa can cause significant deviation in voltage and current due to mismatch in phase, frequency, and amplitude of voltages. The proposed controller using MPC offers seamless transition between the two modes of operations. The proposed direct decoupled active and reactive power control in grid‑connected mode enables the dual-mode ZSI to behave as a power conditioning unit for ancillary services.
The final part of this dissertation focuses on the low voltage ride through (LVRT) capability of the proposed PV systems during grid faults such as voltage sag. In normal grid condition mode, the maximum available power from the PV panels is injected into the grid. In this mode, the system can provide reactive power compensation as a power conditioning unit for ancillary services from DG systems to main ac grid. In case of grid faults, the proposed system changes the behavior of reactive power injection into the grid for LVRT operation according to the grid requirements. Thus, the proposed controller for ZSI is taking into account both the power quality issues and reactive power injection under abnormal grid conditions.
APOORV INGLE
QuB: A Resource Aware Functional Programming LanguageWhen & Where:
2001B Eaton Hall
Committee Members:
Garrett Morris, ChairPerry Alexander
Andy Gill
Prasad Kulkarni
Abstract
Modern programming languages treat resources as normal values. The static semantics of resources in such
languages does not match their runtime semantics. In this thesis, we tackle the resource management problem
by making resources first class citizens in the language, and concentrating on sharing or separation of resources.
We design and implement QuB (pronounced: cube), a Curry-Howard interpretation of logic of bunched implications (BI).
We distinguish two kinds of values—restricted and unrestricted—and two kinds of function implications— sharing and separating.
The restricted values model resources while the unrestricted values model program objects that do not contain any resources.
Sharing functions denote that functions share resources with its arguments, while separating functions denote that functions do not
share resources with its arguments. We show how the use of monads with sharing and separating functions helps in modeling
patterns, such as exception handling, that are difficult to express in linear languages, .