Defense Notices


All students and faculty are welcome to attend the final defense of EECS graduate students completing their M.S. or Ph.D. degrees. Defense notices for M.S./Ph.D. presentations for this year and several previous years are listed below in reverse chronological order.

Students who are nearing the completion of their M.S./Ph.D. research should schedule their final defenses through the EECS graduate office at least THREE WEEKS PRIOR to their presentation date so that there is time to complete the degree requirements check, and post the presentation announcement online.

Upcoming Defense Notices

Manu Chaudhary

Utilizing Quantum Computing for Solving Multidimensional Partial Differential Equations

When & Where:


Eaton Hall, Room 2001B

Committee Members:

Esam El-Araby, Chair
Perry Alexander
Tamzidul Hoque
Prasad Kulkarni
Tyrone Duncan

Abstract

Quantum computing has the potential to revolutionize computational problem-solving by leveraging the quantum mechanical phenomena of superposition and entanglement, which allows for processing a large amount of information simultaneously. This capability is significant in the numerical solution of complex and/or multidimensional partial differential equations (PDEs), which are fundamental to modeling various physical phenomena. There are currently many quantum techniques available for solving partial differential equations (PDEs), which are mainly based on variational quantum circuits. However, the existing quantum PDE solvers, particularly those based on variational quantum eigensolver (VQE) techniques, suffer from several limitations. These include low accuracy, high execution times, and low scalability on quantum simulators as well as on noisy intermediate-scale quantum (NISQ) devices, especially for multidimensional PDEs.

 In this work, we propose an efficient and scalable algorithm for solving multidimensional PDEs. We present two variants of our algorithm: the first leverages finite-difference method (FDM), classical-to-quantum (C2Q) encoding, and numerical instantiation, while the second employs FDM, C2Q, and column-by-column decomposition (CCD). Both variants are designed to enhance accuracy and scalability while reducing execution times. We have validated and evaluated our proposed concepts using a number of case studies including multidimensional Poisson equation, multidimensional heat equation, Black Scholes equation, and Navier-Stokes equation for computational fluid dynamics (CFD) achieving promising results. Our results demonstrate higher accuracy, higher scalability, and faster execution times compared to VQE-based solvers on noise-free and noisy quantum simulators from IBM. Additionally, we validated our approach on hardware emulators and actual quantum hardware, employing noise mitigation techniques. This work establishes a practical and effective approach for solving PDEs using quantum computing for engineering and scientific applications.


Syed Abid Sahdman

Soliton Generation and Pulse Optimization using Nonlinear Transmission Lines

When & Where:


Eaton Hall, Room 2001B

Committee Members:

Alessandro Salandrino, Chair
Shima Fardad
Morteza Hashemi


Abstract

Nonlinear Transmission Lines (NLTLs) have gained significant interest due to their ability to generate ultra-short, high-power RF pulses, which are valuable in applications such as ultrawideband radar, space vehicles, and battlefield communication disruption. The waveforms generated by NLTLs offer frequency diversity not typically observed in High-Power Microwave (HPM) sources based on electron beams. Nonlinearity in lumped element transmission lines is usually introduced using voltage-dependent capacitors due to their simplicity and widespread availability. The periodic structure of these lines introduces dispersion, which broadens pulses. In contrast, nonlinearity causes higher-amplitude regions to propagate faster. The interaction of these effects results in the formation of stable, self-localized waveforms known as solitons.
Soliton propagation in NLTLs can be described by the Korteweg-de Vries (KdV) equation. In this thesis, the Bäcklund Transformation (BT) method has been used to derive both single and two-soliton solutions of the KdV equation. This method links two different partial differential equations (PDEs) and their solutions to produce solutions for nonlinear PDEs. The two-soliton solution is obtained from the single soliton solution using a nonlinear superposition principle known as Bianchi’s Permutability Theorem (BPT). Although the KdV model is suitable for NLTLs where the capacitance-voltage relationship follows that of a reverse-biased p-n junction, it cannot generally represent arbitrary nonlinear capacitance characteristics.
To address this limitation, a Finite Difference Time Domain (FDTD) method has been developed to numerically solve the NLTL equation for soliton propagation. To demonstrate the pulse sharpening and RF generation capability of a varactor-loaded NLTL, a 12-section lumped element circuit has been designed and simulated using LTspice and verified with the calculated result. In airborne radar systems, operational constraints such as range, accuracy, data rate, environment, and target type require flexible waveform design, including variation in pulse widths and pulse
repetition frequencies. A gradient descent optimization technique has been employed to generate pulses with varying amplitudes and frequencies by optimizing the NLTL parameters. This work provides a theoretical analysis and numerical simulation to study soliton propagation in NLTLs and demonstrates the generation of tunable RF pulses through optimized circuit design.


Past Defense Notices

Dates

CENK SAHIN

On Fundamental Performance Limits of Delay-Sensitive Wireless Communications

When & Where:


246 Nichols Hall

Committee Members:

Erik Perrins, Chair
Shannon Blunt
Victor Frost
Lingjia Liu
Zsolt Talata

Abstract

Mobile traffic is expected to grow at an annual compound rate of 66% in the next 3 years, while among the data types that account for this growth mobile video has the highest growth rate. Since most video applications are delay-sensitive, the delay-sensitive traffic will be the dominant traffic over future wireless communications. Consequently, future mobile wireless systems will face the dual challenge of supporting large traffic volume while providing reliable service for various kinds of delay-sensitive applications (e.g. real-time video, online gaming, and voice-over-IP (VoIP)). Past work on delay-sensitive communications has generally overlooked the physical-layer considerations such as modulation and coding scheme (MCS), probability of decoding error, and coding delay by employing oversimplified models for the physical-layer. With the proposed research we aim to bridge information theory, communication theory, and queueing theory by jointly considering the delay-violation probability and the probability of decoding error to identify the fundamental trade-offs among wireless system parameters such as channel fading speed, average received signal-to-noise ratio (SNR), MCS, and user perceived quality of service. We will model the underlying wireless channel by a finite-state Markov chain, use channnel dispersion to track the probability of decoding error and the coding delay for a given MCS, and focus on the asymptotic decay rate of buffer occupancy for queueing delay analysis. The proposed work will be used to obtain fundamental bounds on the performance of queued systems over wireless communication channels.


GHAITH SHABSIGH

LPI Performance of an Ad-Hoc Covert System Exploiting Wideband Wireless Mobile Networks

When & Where:


246 Nichols Hall

Committee Members:

Victor Frost, Chair
Chris Allen
Lingjia Liu
Erik Perrins
Tyrone Duncan

Abstract

The high level of functionality and flexibility of modern wideband wireless networks, LTE and WiMAX, have made them the preferred technology for providing mobile internet connectivity. The high performance of these systems comes from adopting several innovative techniques such as Orthogonal Frequency Division Multiplexing (OFDM), Automatic Modulation and Coding (AMC), and Hybrid Automatic Repeat Request (HARQ). However, this flexibility also opens the door for network exploitation by other ad-hoc networks, like Device-to-Device technology, or covert systems. In this work effort, we provide the theoretical foundation for a new ad-hoc wireless covert system that hides its transmission in the RF spectrum of an OFDM-based wideband network (Target Network), like LTE. The first part of this effort will focus on designing the covert waveform to achieve a low probability of detection (LPD). Next, we compare the performance of several available detection methods in detecting the covert transmission, and propose a detection algorithm that would represent a worst case scenario for the covert system. Finally, we optimize the performance of the covert system in terms of its throughput, transmission power, and interference on/from the target network.


MOHAMMED ALENAZI

Network Resilience Improvement and Evaluation Using Link Additions

When & Where:


246 Nichols Hall

Committee Members:

James Sterbenz, Chair
Victor Frost
Lingjia Liu
Bo Luo
Tyrone Duncan

Abstract

Computer networks are prone to targeted attacks and natural disasters that could disrupt its normal operation and services. Adding links to form a full mesh yields the most resilient network but it incurs unfeasible high cost. In this research, we investigate the resilience improvement of real-world network via adding a cost-efficient set of links. Adding a set of link to get optimal solution using exhaustive search is impracticable given the size of communication network graphs. Using a greedy algorithm, a feasible solution is obtained by adding a set of links to improve network connectivity by increasing a graph robustness metric such as algebraic connectivity or total path diversity. We use a graph metric called flow robustness as a measure for network resilience. To evaluate the improved networks, we apply three centrality-based attacks and study their resilience. The flow robustness results of the attacks show that the improved networks are more resilient than the non-improved networks.


ASHWINI SHIKARIPUR NADIG

Statitistical Approaches to Inferring Object Shape from Single Images

When & Where:


2001B Eaton Hall

Committee Members:

Bo Luo, Chair
Brian Potetz
Luke Huan
Jim Miller
Paul Selden

Abstract

Depth inference is a fundamental problem of computer vision with a broad range of potential applications. Monocular depth inference techniques, particularly shape from shading dates back to as early as the 40's when it was first used to study the shape of the lunar surface. Since then there has been ample research to develop depth inference algorithms using monocular cues. Most of these are based on physical models of image formation and rely on a number of simplifying assumptions that do not hold for real world and natural imagery. Very few make use of the rich statistical information contained in real world images and their 3D information. There have been a few notable exceptions though. The study of statistics of natural scenes has been concentrated on outdoor natural scenes which are cluttered. Statistics of scenes of single objects has been less studied, but is an essential part of daily human interaction with the environment. This thesis focuses on studying the statistical properties of single objects and their 3D imagery, uncovering some interesting trends, which can benefit shape inference techniques. I acquired two databases: Single Object Range and HDR (SORH) and the Eton Myers Database of single objects, including laser-acquired depth, binocular stereo, photometric stereo and High Dynamic Range (HDR) photography. The fractal structure of natural images was previously well known, and thought to be a universal property. However, my research showed that the fractal structure of single objects and surfaces is governed by a wholly different set of rules. Classical computer vision problems of binocular and multi-view stereo, photometric stereo, shape from shading, structure from motion, and others, all rely on accurate and complete models of which 3D shapes and textures are plausible in nature, to avoid producing unlikely outputs. Bayesian approaches are common for these problems, and hopefully the findings on the statistics of the shape of single objects from this work and others will both inform new and more accurate Bayesian priors on shape, and also enable more efficient probabilistic inference procedures.


STEVE PENNINGTON

Spectrum Coverage Estimation Using Large Scale Measurements

When & Where:


246 Nichols Hall

Committee Members:

Joseph Evans, Chair
Arvin Agah
Victor Frost
Gary Minden
Ronald Aust

Abstract

The work presented in this thesis explores the use of geographic data and geostatistical methods to estimate path loss for cognitive radio networks. Path loss models typically employed in this scenario use a general terrain type (i.e., urban, suburban, or rural) and possibly a digital elevation model to predict excess path loss over the free space model. Additional descriptive knowledge of the local environment can be used to make more accurate path loss predictions. This research focuses on the use of visible imagery, digital elevation models, and terrain classification systems for predicting localized propagation characteristics. A low-cost data collection platform was created and used to generate a sufficiently large spectrum measurement set for machine learning. A series of path loss models were fitted to the data using linear and nonlinear methods. These models were then used to create a radio environment map depicting estimated signal strength. All of the models created have good cross-validated prediction results when compared to existing path loss models, although some of the more flexible models had a tendency to overfit the data. A number of geostatistical models were fitted on the data as well. 
These models have the advantage of not requiring the transmitter location in order to create a model. The geostatistical models performed very well when given a sufficient density of observations but were not able to generalize as well as some of the regression models. An analysis of the geographical data sets indicated that each had a significant measurable effect on path loss estimation, with the medium resolution imagery and elevation data providing the greatest increase in accuracy. Finally, these models were compared to number of existing path loss models, demonstrating a gain in usable spectrum for cognitive radio network use.


BENJAMIN EWY

Collaborative Approaches to Probabilistic Reasoning in Network Management

When & Where:


246 Nichols Hall

Committee Members:

Joseph Evans, Chair
Arvin Agah
Victor Frost
Gary Minden
Bozenna Pasik-Duncan

Abstract

Tactical networks, networks designed to facilitate command and control capabilities for militaries, have key attributes that differ from the commercial Internet. Characterizing, modeling, and ex- ploiting our understanding of these differences is the focus of this research. 
The differences between tactical and commercial networks can be found primarily in the areas of access bandwidth, access diversity, access latency, core latency, subnet distribution, and network infrastructure. In this work we characterize and model these differences. These key attributes affect research into issues such as peer-to-peer protocols, service discovery, and server selection among others, as well as the deployment of services and systems in tactical networks. Researchers traditionally struggle with measuring, analyzing, or testing new ideas on tactical networks due to a lack of direct access, and thus this characterization is crucial to evolving this research field. 
In this work we develop a topology generator that creates realistic tactical networks that can be visualized, analyzed, and emulated. 
Topological features including geographically constrained line of sight networks, high density low bandwidth satellite networks, and the latest high bandwidth on- the-move networks are captured. All of these topological features can be mixed to create realistic networks for many different tactical scenarios. A web based visualization tool is developed, as well as the ability to export topologies to the Mininet network virtualization environment. 
Finally, state-of-the-art server selection algorithms are reviewed and found to perform poorly for tactical networks. We develop a collaborative algorithm tailored to the attributes of tactical networks, and utilize our generated networks to assess the algorithm, finding a reduction in utilized bandwidth and a significant reduction in client to server latency as key improvements.


MEENAKSHI MISHRA

Task Relationship Modeling in Multitask Learning with Applications to Computational Toxicity

When & Where:


246 Nichols Hall

Committee Members:

Luke Huan, Chair
Arvin Agah
Swapan Chakrabarti
Ron Hui
Zhou Wang

Abstract

Multitask Learning is a learning framework which explores the concept of sharing training information among multiple related tasks to improve the generalization error of each task. The benefits of multitask learning have been shown both empirically and theoretically. There are a number of fields that benefit from multitask learning, including toxicology. However, the current multitask learning algorithms make a very important key assumption that all the tasks are related to each other in a similar fashion in multitask learning. The users often do not have the knowledge of which tasks are related and train all tasks together. This results in sharing of training information even among the unrelated tasks. Training unrelated tasks together can cause a negative transfer and deteriorate the performance of multitask learning. For example, consider the case of predicting in vivo toxicity of chemicals at various endpoints from the chemical structure. Toxicity at all the endpoints are not related. Since, biological networks are highly complex, it is also not possible to predetermine which endpoints are related. Thus, training all the endpoints together may cause a negative effect on the overall performance. This proposal aims at developing algorithms which make use of task relationship models to further improve the generalization error and prevent transfer of information among the unrelated tasks. The algorithms proposed here either learn the task relationships or utilize the known task relationships in the learning framework. Further, these algorithms will be utilized to predict toxicity of chemicals at various endpoints using the chemical structures and the results of multiple in vitro assays performed on these chemicals.


YINGYING MA

A Comparison of Two Discretization Options of the MLEM2 Algorithm

When & Where:


2001B Eaton Hall

Committee Members:

Jerzy Grzymala-Busse, Chair
Luke Huan
Prasad Kulkarni


Abstract

A rule set is a popular symbolic representation of knowledge derived from 
data. A rule induction is an important technique of data mining or machine 
learning. Many rule induction algorithms are widely used, such as LEM1, LEM2 and MLEM2. Some of these algorithms perform better on special data, e. g., on inconsistent data set or data sets with missing attribute values. This work discusses basic ideas of the MLEM2 algorithm, especially, how it handles data sets with numeric attribute values. Additionally, a comparison of the performance of different discretization options of the MLEM2 algorithm is also included.


FRANK MOLEY

Maintaining Privacy and Security of Personally Identifiable Information Data in a Connected System

When & Where:


280 Best

Committee Members:

Hossein Saiedian, Chair
Fengjun Li
Bo Luo


Abstract

The large data stores of Personally Identifiable Information (PII) in todays connected systems, coupled with the increased potential damages of Identity Theft bring the need for architectures that provide secure collection, storage, and transmission of this data. The need has not yet been standardized in the industry in a way similar to the Payment Card Industry (PCI) has done so. At the same time, however, municipalities, states, and even countries are instituting legislature that requires business entities that store PII data to maintain adequate security of the data. The need has become clear for a set of processes, procedures, and systems that provide a framework for securely storing PII data. This project defines the lower level datastore system and associated services for that PII data. It also outlines a network architecture prototype for providing segmented security zones used to provide more layers of security in a connected system.


KALYANI HARIDASYAM

AskMyNetwork: Finding Reliable Feedback and Reviews

When & Where:


280 Best

Committee Members:

Hossein Saiedian, Chair
Fengjun Li
Bo Luo


Abstract

We all consult online reviews before obtaining a product or service. However, not all the reviews can be trusted. For example, in 2013, "Operation Clean Turf” a yearlong sting operation in New York State, caught 19different companies that were writing fake reviews in online forums like Yelp for businesses that paid them. For my project, I've developed an application called AskMyNetwork. AskMyNetwork interfaces with Facebook to obtain feedback or input from a user's Facebook friends.The rationale for my project is that the feedback or inputs are from "friends" (personal friends, family members,or colleagues in a user's Facebook friends' list) and can be trusted. 

AskMyNetwork has four major components namely, Login,Search My Network, Ask My Network and Notifications. Using the Login component, the user can login to the application with Facebook credentials. Using Search My Network component, the user can define search criteria (e.g.,search for restaurant in Kansas City) and search his or her Facebook data for relevant results. Using Ask My Network component, the user can ask a group of friends question about a product or service they would like an opinion on. The group of friends can either be chosen by name or by the current location of the friends. Using the Notifications component, the user can view the responses given to questions asked from AskMyNetwork. 

I validated AskMyNetwork via a number of inquiries on topics such as restaurants, places to visit in a city and arts. The results of the validation were satisfactory.