Defense Notices


All students and faculty are welcome to attend the final defense of EECS graduate students completing their M.S. or Ph.D. degrees. Defense notices for M.S./Ph.D. presentations for this year and several previous years are listed below in reverse chronological order.

Students who are nearing the completion of their M.S./Ph.D. research should schedule their final defenses through the EECS graduate office at least THREE WEEKS PRIOR to their presentation date so that there is time to complete the degree requirements check, and post the presentation announcement online.

Upcoming Defense Notices

Manu Chaudhary

Utilizing Quantum Computing for Solving Multidimensional Partial Differential Equations

When & Where:


Eaton Hall, Room 2001B

Committee Members:

Esam El-Araby, Chair
Perry Alexander
Tamzidul Hoque
Prasad Kulkarni
Tyrone Duncan

Abstract

Quantum computing has the potential to revolutionize computational problem-solving by leveraging the quantum mechanical phenomena of superposition and entanglement, which allows for processing a large amount of information simultaneously. This capability is significant in the numerical solution of complex and/or multidimensional partial differential equations (PDEs), which are fundamental to modeling various physical phenomena. There are currently many quantum techniques available for solving partial differential equations (PDEs), which are mainly based on variational quantum circuits. However, the existing quantum PDE solvers, particularly those based on variational quantum eigensolver (VQE) techniques, suffer from several limitations. These include low accuracy, high execution times, and low scalability on quantum simulators as well as on noisy intermediate-scale quantum (NISQ) devices, especially for multidimensional PDEs.

 In this work, we propose an efficient and scalable algorithm for solving multidimensional PDEs. We present two variants of our algorithm: the first leverages finite-difference method (FDM), classical-to-quantum (C2Q) encoding, and numerical instantiation, while the second employs FDM, C2Q, and column-by-column decomposition (CCD). Both variants are designed to enhance accuracy and scalability while reducing execution times. We have validated and evaluated our proposed concepts using a number of case studies including multidimensional Poisson equation, multidimensional heat equation, Black Scholes equation, and Navier-Stokes equation for computational fluid dynamics (CFD) achieving promising results. Our results demonstrate higher accuracy, higher scalability, and faster execution times compared to VQE-based solvers on noise-free and noisy quantum simulators from IBM. Additionally, we validated our approach on hardware emulators and actual quantum hardware, employing noise mitigation techniques. This work establishes a practical and effective approach for solving PDEs using quantum computing for engineering and scientific applications.


Past Defense Notices

Dates

YEFENG SUN

Optical Absorption Simulation by ZnTe/CdTe Superlattices Based on Kronig-Penney Model

When & Where:


246 Nichols Hall

Committee Members:

Ron Hui, Chair
Ken Demarest
Victor Frost


Abstract

Nowadays superlattices (SLs) are widely used as optical materials due to optical absorption properties. Short-period superlattices with certain optical properties such as InAs/GaSb type-II superlattices and ZnTe/CdTe superlattices can serve for mid-infrared (MIR) detection and solar cells. In this study, a standard Kronig-Penney model is applied to calculate the mini band structure of such SLs. On the basis of the energy-balance equation derived from the Boltzmann equation, a simple approach is used to calculate the optical absorption coefficient for the corresponding SL systems. Comparison of simulation results and experimental findings will be made in this study. And reasonable causes of error and future work will be discussed.


ADAM VAN HORN

Machine Learning Techniques for High Performance Engine Calibration

When & Where:


2001B Eaton Hall

Committee Members:

Arvin Agah, Chair
Jerzy Grzymala-Busse
James Miller
Christopher Depcik

Abstract

Ever since the advent of electronic fuel injection, auto manufacturers have been able to increase fuel efficiency and power production, and to meet stricter emission standards. Most of these systems use engine sensors (RPM, Throttle Position, etc.) in concert with look-up tables to determine the correct amount of fuel to inject. While these systems work well, it is time and labor intensive to fine tune the parameters for these look-up tables. Automobile manufacturers are able to absorb the cost of this calibration since the variation between engines in a new model line is often small enough as to be inconsequential for a specific calibration. 

However, a growing number of drivers are interested in modifying their vehicles with the intent of improving performance. While some aftermarket performance upgrades can be accounted for by the original manufacturer equipped (OEM) electronic control unit (ECU), other more significant changes, such as adding a turbocharger or installing larger fuel injectors, require more drastic accommodations. These modifications often require an entirely new ECU calibration or an aftermarket ECU to properly control the upgraded engine. The problem then, is that the driver becomes responsible for the calibration of the ECU of this “new” engine. However, most drivers are unable to devote the resources required to achieve a calibration of the same quality as the original manufacturers. At best, this results in reduced fuel economy and performance, and at worst, unsafe and possibly destructive operation of the engine. 

The purpose of this thesis is to design and develop—using machine learning techniques—an approximate predictive model from current engine data logs, which can be used to rapidly and incrementally improve the calibration of the engine. While there has been research into novel control methods for engine air-fuel ratio control, these methods are inaccessible to the majority of end users, either due to cost or the required expertise with engine calibration. This study shows that there is a great deal of promise in applying machine learning techniques to engine calibration and that the process of engine calibration can be expedited by the application of these techniques.


LANE RYAN

Polyphase-Coded FM Waveform Optimization within a LINC Transmit Architecture

When & Where:


246 Nichols Hall

Committee Members:

Chris Allen, Chair
Shannon Blunt
Jim Stiles


Abstract

Linear amplification using nonlinear components (LINC) is a design approach that can suppress the effects of the nonlinear distortion introduced by the transmitter. A typical transmitter design requirement is for the high power amplifier to be operated in saturation. The LINC approach described here employs a polyphase-coded FM (PCFM) waveform that is able to overcome this saturated amplifier distortion to greatly improve the spectral containment of the transmitted waveform. A two stage optimization process involving simulation and hardware-in-the-loop routines is used to create the final PCFM waveform code.


YUFEI CHENG

Performance Analysis of Different Traffic Types in Mobile Ad-hoc Networks

When & Where:


246 Nichols Hall

Committee Members:

James Sterbenz, Chair
Fengjun Li
Gary Minden


Abstract

Mobile Ad Hoc networks~(MANETs) present great challenges to new protocol design, especially in scenarios where nodes are high mobile. Routing protocols performance is essential to the performance of wireless networks especially in mobile ad-hoc scenarios. The development of new routing protocols requires comparing them against well-known protocols in various simulation environments. Furthermore, application traffic like transactional application traffic has not been investigated for domain-specific MANETs scenarios. Overall, there are not enough performance comparison work in the past literatures. This thesis presents extensive performance comparison work with MANETs and uses inclusive parameter sets including both highly-dynamic environment as well as low-mobility cases.


EVAN AUSTIN

Theorem Provers as Libraries: An Approach to Formally Verifying Functional Programs

When & Where:


250 Nichols Hall

Committee Members:

Perry Alexander, Chair
Arvin Agah
Andy Gill
Prasad Kulkarni
Erik Van Vleck

Abstract

Property-directed verification of functional programs tends to take one of two paths. 
First, is the traditional testing approach, where properties are expressed in the original programming language and checked with a collection of test data. 
Tools following this technique have the advantage of a direct integration with the host system, but their resultant statement about a program's correctness is anything but a guarantee. 
Alternatively, for those desiring a more rigorous approach, properties can be written and checked with a formal tool; typically, an external proof system. 
This process delivers a well reasoned argument for a program's correctness, however, it comes at the cost of a more complex system integration requiring additional expertise. 

We propose a hybrid approach that captures the best of both worlds: the formality of a proof system paired with the native integration of an embedded, domain specific language for testing. 
Presented in this document is a description of the hybridization, a theorem prover as a library, as well as a classification of our target properties for case study. 
As we attempt to verify these properties, our goal is to document and formalize the logical connection between language and tool. 
The resultant process will be evaluated both for the strength of its reasoning power and its viability for real world application.


LEI SHI

Multichannel Sense-and-Avoid Radar for Small UAVs

When & Where:


2139 Learned Hall

Committee Members:

Chris Allen, Chair
Shannon Blunt
Ron Hui
Jim Stiles
Dongkyu Choi

Abstract

A multichannel sense-and-avoid radar system targeted for small unmanned aerial vehicles (UAVs), such as the 40% Yak-54 RC aircraft, is being developed to assist the integration of UAVs into the national air space. This frequency-modulated continuous-wave (FMCW) radar system utilizes a two-dimensional fast-Fourier transform process to detect targets in range and Doppler. Interferometry using a 5-element receiver array allows the radar to calculate the azimuth/elevation angles of the target relative to itself. These tasks are being performed in real time with a targeted update rate of 10 Hz utilizing highly-integrated radar-ready components and an FPGA based processor. The focus of the research is on analysis and enhancement of the radar performance by implementing various detection and predictive algorithms such as extended Kalman filtering and constant false alarm rate detection. By tracking targets and predicting their future location, false alarms caused by anomalies can be minimized. Furthermore, targets located at the same range and Doppler will corrupt each other’s signals during interferometic processing thus giving the autopilot corrupted angle information. Using a predictive algorithm these occurrences can be avoided with some level of confidence.


JUNYAN LI

Geo-Diversity Routing Protocol Implementation in ns-3

When & Where:


246 Nichols Hall

Committee Members:

James Sterbenz, Chair
Victor Frost
Bo Luo


Abstract

The path geo-diversity routing protocol described in this report takes advantage of geographical diversity of physical network topology, and quickens the routing selection. By importing this mechanism, a more accurate path could be provided instead of multiple useless attempts when area-based challenges occur in the network. A k-shortest path algorithm is introduced, followed by a modified algorithm. These two algorithms are implemented in ns-3, and tested in both grid network and real network. Simulation results show that they provide better performance compared to OSPF, as multiple geo-diverse paths are calculated to provide reliable performance.


NAJLA AHMAD

Intent Recognition in Multi-Agent Systems: Collective Box Pushing and Cow Herding

When & Where:


250 Nichols Hall

Committee Members:

Arvin Agah, Chair
Victor Frost
Jerzy Grzymala-Busse
Bo Luo
Sara Kieweg

Abstract

In a multi-agent system, an idle agent may be available to assist other agents in the system. An agent architecture called intent recognition is proposed to accomplish this with minimal communication. 
In order to assist other agents in the system, an agent performing recognition observes the tasks other agents are performing. Unlike the much studied field of plan recognition, the overall intent of an agent is recognized instead of a specific plan. The observing agent may use capabilities that it has not observed. This study focuses on the key research questions of: (1) What are intent recognition systems? (2) How can these be used in order to have agents autonomously assist each other effectively and efficiently? A conceptual framework is proposed for intent recognition systems. An implementation of the conceptual framework is tested and evaluated. We hypothesize that using intent recognition in a multi-agent system increases utility (where utility is domain specific) and decreases the amount of communication. We test our hypotheses using two experimental series in the domains of Box Pushing, where agents attempt to push boxes to specified locations; and Cow Herding, where agents attempt to herd cow agents into team corrals. A set of metrics, including task time and number of communications, is used to compare the performance of plan recognition and intent recognition. In both sets of experimental series, intent recognition agents communicate fewer times than plan recognition agents. In addition, unlike plan recognition, when agents use the novel approach of intent recognition, they select unobserved actions to perform, which was seen in both experimental series. Intent recognition agents were also able to outperform plan recognition agents by sometimes reducing task completion time in the Box Pushing domain and consistently scoring more points in the Cow Herding domain.


JUSTIN METCALF

Signal Processing for Non-Gaussian Statistics: Clutter Distribution Identification and Adaptive Threshold Estimation

When & Where:


129 Nichols

Committee Members:

Shannon Blunt, Chair
Luke Huan
Lingjia Liu
Jim Stiles
Tyrone Duncan

Abstract

We examine the problem of determining a decision threshold for the binary hypothesis test that naturally arises when a radar system must decide if there is a target present in a range cell under test. Modern radar systems require predictable, low, constant rates of false alarm (i.e. when unwanted noise and clutter returns are mistaken for a target). Measured clutter returns have often been fitted to heavy tailed, non-Gaussian distributions. The heavy tails on these distributions cause an unacceptable rise in the number of false alarms. We use the class of spherically invariant random vectors (SIRVs) to model clutter returns. SIRVs arise from a phenomenological consideration of the radar sensing problem, and include both the Gaussian distribution and most commonly reported non-Gaussian clutter distributions (e.g. K distribution, Weibull distribution). We propose an extension of a prior technique called the Ozturk algorithm. The Ozturk algorithm generates a graphical library of points corresponding to known SIRV distributions. These points are generated from linked vectors whose magnitude is derived from the order statistics of the SIRV distributions. Measured data is then compared to the library and a distribution is chosen that best approximates the measured data. Our extension introduces a framework of weighting functions and adaptively scaling of the measured data. Further, we extend the Ozturk algorithm to both a distribution classi fication technique as well as a method of determining an adaptive threshold in data that may not belong to a known distribution. Special attention is paid to producing a robust, adaptive estimation of the detection threshold.


EGEMEN CETINKAYA

Modelling and Design of Resilient Networks under Challenges

When & Where:


246 Nichols Hall

Committee Members:

James Sterbenz, Chair
Victor Frost
Bo Luo
Gary Minden
Tyrone Duncan

Abstract

Communication networks, in particular the Internet, face a variety of challenges that can disrupt our daily lives resulting in the loss of human lives and significant financial costs in the worst cases. We define challenges as external events that trigger faults that eventually result in service failures. Understanding these challenges accordingly is essential for improvement of the current networks and for designing Future Internet architectures. This dissertation presents a taxonomy of challenges that can help evaluate design choices for the current and Future Internet. Graph models to analyse critical infrastructures are examined and a multilevel graph model is developed to study interdependencies between different networks. Furthermore, graph-theoretic heuristic optimisation algorithms are developed. These heuristic algorithms add links to increase the resilience of networks in the least costly manner and they are computationally less expensive than an exhaustive search algorithm. The performance of networks under random failures, targeted attacks, and correlated area-based challenges are evaluated by the challenge simulation module that we developed. The GpENI Future Internet testbed is used to conduct experiments to evaluate the performance of the heuristic algorithms developed.