Defense Notices
All students and faculty are welcome to attend the final defense of EECS graduate students completing their M.S. or Ph.D. degrees. Defense notices for M.S./Ph.D. presentations for this year and several previous years are listed below in reverse chronological order.
Students who are nearing the completion of their M.S./Ph.D. research should schedule their final defenses through the EECS graduate office at least THREE WEEKS PRIOR to their presentation date so that there is time to complete the degree requirements check, and post the presentation announcement online.
Upcoming Defense Notices
Luke Staudacher
Enabling Versal-Based Signal Processing Through a Development Framework and User GuideWhen & Where:
Nichols Hall, Room 246 (Executive Conference Room)
Committee Members:
Jonathan Owen, ChairShannon Blunt
Carl Leuschen
Erik Perrins
Abstract
AMD’s latest generation of adaptive system-on-chip (SoC) devices, the Versal product family, offers enhanced processing capabilities that are attractive to researchers and system designers. However, these capabilities introduce a significant knowledge barrier, limiting the practical benefits of Versal devices compared to more mature platforms from AMD, Intel, and other industry vendors. This project addresses this challenge through two primary deliverables: a software framework and a comprehensive user manual targeting Versal development. The software framework, named RSL Versal Core, provides a framework for users unfamiliar with Versal devices by selectively abstracting away more complex design components. Using a small set of commands, users can synthesize a programmable logic (PL) design, compile a Linux operating system for the onboard Arm processor with PL communication support, and program supported development boards. Following initial setup, the framework also supports extended software and firmware development for specific project needs. The accompanying user manual documents both RSL Versal Core and broader Versal development concepts. It guides users through reproducing and customizing the framework outputs manually and introduces key architectural and design principles useful for effective Versal-based system development. Together, these deliverables enable new developers to rapidly gain proficiency with Versal platforms and enable implementation of digital signal processing (DSP) concepts.
William Powers
Implementation and Analysis of Robust System-Informed Waveform DesignWhen & Where:
Nichols Hall, Room 246 (Executive Conference Room)
Committee Members:
Jonathan Owen, ChairShannon Blunt
Carl Leuschen
Abstract
Due to rapid advances in high-speed analog-to-digital conversion and software-defined architectures, modern radar systems increasingly shift signal generation and conditioning into the digital domain. These architectures enable high-fidelity signal capture and provide substantial flexibility in waveform synthesis and signal processing that was previously impractical in analog implementations. Despite these advances, however, achievable radar performance remains fundamentally constrained by the physical transmit hardware through which the signal is ultimately realized. Nonlinear amplification, finite bandwidth, and memory effects introduce distortion that creates a significant gap between idealized waveform design and the waveform that is physically radiated.
To address this limitation, this work proposes a system-aware radar waveform design framework that couples data-driven system identification with deterministic optimization to generate waveforms tailored to the underlying transmit hardware. A complex baseband memory polynomial model is developed to characterize nonlinear transmit-chain behavior using loopback measurements, where $\ell_1$-regularized LASSO estimation is employed to improve robustness against ill-conditioning and feature redundancy. Under this architecture, a generalized integrated sidelobe level (GISL) objective is reformulated using logarithmic scalarization to produce a numerically stable and Pareto-tunable optimization criterion capable of balancing output energy and sidelobe suppression. Additionally, efficient vectorized gradient expressions are derived using Wirtinger calculus and implemented using gradient-based descent and the limited-memory BFGS algorithm for practical high-dimensional waveform synthesis.
To validate the framework, a comprehensive hardware-in-the-loop testbench was developed supporting direct model identification and experimental evaluation of optimized waveform performance. Simulation and experimental results demonstrate that continuous-phase FM waveforms exhibit strong inherent robustness to nonlinear distortion, while phase-coded waveforms with large instantaneous phase discontinuities show significantly greater sensitivity to transmit-chain impairments. Across both waveform classes, the proposed framework achieves substantial improvements in output power efficiency and pulse compression performance relative to system-agnostic waveform design. These results demonstrate that transmitter constraints must be treated as fundamental design variables rather than secondary effects and establish system-aware optimization as a practical framework for next-generation radar waveform synthesis.
Cody Gish
Real-time GPU Based Arbitrary Waveform Generation Utilizing a Software-Defined Radar PlatformWhen & Where:
Nichols Hall, Room 246 (Executive Conference Room)
Committee Members:
Jonathan Owen, ChairShannon Blunt
Patrick McCormick
Abstract
Due to the ever-growing demand for access to the finite resources of the electromagnetic spectrum, significant effort has been directed toward improving spectrum utilization. This has become a particular challenge in radar transmission design, where waveform diversity techniques have emerged as a promising solution despite the accompanying implementation complexity. Diverse signals are inherently non-repeating and pose unique challenges in comparison to traditional radar waveforms. Software defined radios (SDRs) allow for traditional RF components and signal processing to be implemented and controlled in software rather than hardware, providing a platform for testing experimental radar algorithms. This thesis presents a real-time parallel implementation of five previously developed distinct waveform-diverse radar signals for use in a coherent SDR system. The implemented waveforms include stochastic waveform generation (StoWGe), multi-user radar communication (MURC), phase-attached radar communication (PARC), pseudo-random optimized frequency modulation (PRO-FM), and waveform recycling. To enable real-time generation at maximum SDR data rates, these waveforms are implemented using digital synthesis techniques via GPU parallel processing. This approach alleviates CPU resource limitations by offloading computationally intensive waveform generation tasks to the GPU, enabling continuous high-throughput operation. A custom asynchronous transmit and receive architecture is developed to integrate these GPU-accelerated waveforms with UHD-based SDR hardware. The system leverages a multithreaded framework approach that can sustain coherent and synchronized radar operation. To validate the system, a series of loopback testing across all waveforms and a variety of parameters is completed to confirm the execution of the generate-transmit-receive chain.
David Felton
Optimization and Evaluation of Physical Complementary Radar WaveformsWhen & Where:
Nichols Hall, Room 129 (Apollo Auditorium)
Committee Members:
Shannon Blunt, ChairRachel Jarvis
Patrick McCormick
James Stiles
Zsolt Talata
Abstract
The RF spectrum is a precious, finite resource with ever-increasing demand. Consequently, the mandate to be a "good spectral neighbor" is in direct conflict with the requirements for high-performance sensing where correlation error is fundamentally limited. As such, matched-filter radar performance is often sidelobe-limited with estimation error being constrained by the time-bandwidth (TB) of the collective emission. The methods developed here seek to bridge this gap between idealized radar performance and practical utility via waveform design.
Estimation error becomes more complex when employing pulse-agility. In doing so, range-sidelobe modulation (RSM) spreads energy across Doppler, rendering traditional methods ineffective. To address this, the gradient-based complementary-FM framework was developed to produce complementary sidelobe cancellation (CSC) after coherently combining subsets within a pulse-agile emission. In contrast to the majority of complementary signals, explored via phase-coding, these Comp-FM waveform subsets achieve CSC while preserving hardware-compatibility since they are FM (though design distortion is never completely avoided). Although Comp-FM addressed practicality via hardware amenability, CSC was localized to zero-Doppler. This work expands the Comp-FM notion to a Doppler-generalized (DG) framework, extending the cancellation condition to an arbitrary span. The same framework can likewise be employed to jointly optimize an entire coherent processing interval (CPI) to minimize RSM within the radar point-spread-function (PSF), thereby generalizing the notion of complementarity and introducing the potential for cognitive operation if sufficient scattering knowledge is available a-priori.
Sensing with a single emitter is limited by self-inflicted error alone (e.g., clutter, sidelobes), while MIMO systems must additionally contend with the cross-responses from emitters operating concurrently (e.g., simultaneously, spatially proximate, in a shared spectrum), further degrading radar sensitivity. Now, total correlation error is dictated by the overlapping TB (i.e., how coincident are the signals) and number of operating emitters, compounding difficulty to estimate if left unaddressed. As such, the determination of "orthogonal waveforms" comprises a large portion of MIMO literature, though remains a phenomenological misnomer for pulsed emissions. Here, the notion of complementary-FM is applied to a multi-emitter context in which transmitter-amenable quasi-orthogonal subsets, occupying the same spectral band, are produced via a similar gradient-based approach. To further practicalize these MIMO-Comp-FM waveform subsets, the same "DG" approach described above, addressing the otherwise-default Doppler-induced degradation of complementary signals, is applied. In doing so, Doppler-independent separability and complementarity greatly improves estimation sensitivity for multi-emitter systems.
This MIMO-Comp-FM framework is developed for standard matched filter processing. Coupling this framework with a "DG" form of the previously explored MIMO-MiCRFt is also investigated, illustrating the added benefit of pairing optimized subsets with similarly calibrated processing.
Each of these methods is developed to address unique and increasingly complex sources of estimation error. All approaches are initially developed and evaluated via simulated analysis where ground-truth is known. Then, despite hardware-induced distortion being unavoidable, the MIMO-Comp-FM framework is confirmed via loopback measurements to preserve the majority of CSC that was observed in simulation. Finally, open-air demonstration of each approach validates practical utility on a radar system.
Past Defense Notices
TIANCHEN LI
Radar Cross-Section Enhancement of a 40 Percent Yak54 Unmanned Aerial VehicleWhen & Where:
2001B Eaton Hall
Committee Members:
Chris Allen, ChairKen Demarest
Ron Hui
Abstract
With increasing civilian use of unmanned aerial vehicles (UAVs), flight safety of these unmanned devices in populated area has become one of the most concerned issues among the operators and users. To reduce the rate of colliding, anti-collision systems based on airborne radar system and enhanced autopilot programs are developed. However, for most civilian UAVs being made of non-metal materials which has considerably low radar cross-section (RCS), those UAVs are really hard or even impossible to be detected by radars. This project aims to design a light-weight UAV mounted RCS enhancement device that can increase the visibility of the UAV for airborne radars which work in the frequency band near
1.445 GHz. In this project, a 40% YAK54 radio controlled UAV is used as the subject UAV. The report also concentrates on the design of passive Van Atta Array reflector approach.
REID CROWE
Development and Implementation of a VHF High Power Amplifier for the Multi-Channel Coherent Radar Depth Sounder/Imager SystemWhen & Where:
317 Nichols Hall
Committee Members:
Fernando Rodriguez-Morales, ChairChris Allen
Carl Leuschen
Abstract
This thesis presents the implementation and characterization of a VHF high power amplifier developed for the Multi-channel Coherent Radar Depth Sounder/Imager (MCoRDS/I) system. MCoRDS/I is used to collect data on the thickness and basal topography of polar ice sheets, ice sheet margins, and fast-flowing glaciers from airborne platforms. Previous surveys have indicated that higher transmit power is needed to improve the performance of the radar, particularly when flying over challenging areas.
The VHF high power amplifier system presented here consists of a 50-W driver amplifier and a 1-kW output stage operating in Class C. Its performance was characterized and optimized to obtain the best tradeoff between linearity, output power, efficiency, and conducted and radiated noise. A waveform pre-distortion technique to correct for gain variations (dependent on input power and operating frequency) was demonstrated using digital techniques.
The amplifier system is a modular unit that can be expanded to handle a larger number of transmit channels as needed for future applications. The system can support sequential transmit/receive operations on a single antenna by using a high-power circulator and a duplexer circuit composed of two 90° hybrid couplers and anti-parallel diodes. The duplexer is advantageous over switches based on PIN-diodes due to the moderately high power handling capability and fast switching time. The system presented here is also smaller and lighter than previous implementations with comparable output power levels.
KENNETH DEWAYNE BROWN
A Mobile Wireless Channel State Recognition AlgorithmWhen & Where:
2001B Eaton Hall
Committee Members:
Glenn Prescott, ChairChris Allen
Gary Minden
Erik Perrins
Richard Hale
Abstract
The scope of this research is a blind mobile wireless channel state recognition (CSR) algorithm that detects channel time and frequency dispersion. Hidden Markov Models (HMM) are utilized to represent the statistical relationship between these hidden channel dispersive state process and an observed received waveform process. The HMMs provide sufficient sensitivity to detect the hidden channel dispersive state process. First-order and second-order statistical features are assumed to be sufficient to discriminate channel state from the receive waveform observations. State hard decisions provide sufficient information, and can be combined, to increase the reliability of a time block channel state estimate. To investigate the feasibility of the proposed CSR algorithm, this research effort has architected, designed, and verified a blind statistical feature recognition process capable of detecting whether a mobile wireless channel is coherent, single time, single frequency, or dual dispersive. Channel state waveforms are utilized to compute the transition and output probability parameters for a set of feature recognition HMMs. Time and frequency statistical features are computed from consecutive sample blocks and input into the set of trained HMMs which compute a state sequence conditional probability for each feature. The conditional probabilities identify how well the input waveform statistically agrees with the previous training waveforms. Hard decisions were produced from each feature state probability estimate and combined to produce a single output channel dispersive state estimate for each input time block. To verify the CSR algorithm performance, combinations of state sequence blocks were input to the process and state recognition accuracy was characterized. Initial results suggest that CSR based on blind waveform statistical feature recognition is feasible.
WENRONG ZENG
Content-Based Access ControlWhen & Where:
250 Nichols Hall
Committee Members:
Bo Luo, ChairArvin Agah
Jerzy Grzymala-Busse
Prasad Kulkarni
Alfred Tat-Kei Ho
Abstract
In conventional database access control models, access control policies are explicitly specified for each role against each data object manually. Nowadays, in large-scale content-centric data sharing,
conventional approaches could be impractical due to exponential explosion and the sensitivity of data objects. In this proposal, we first introduce Content-Based Access Control (CBAC), an innovative access control model for content-centric information sharing. As a complement to conventional access control models, the CBAC model makes access control decisions based on the content similarity between user credentials and data content automatically. In CBAC, each user is allowed by a meta-rule to access “a subset” of the designated data objects of the whole database, while the boundary of the subset is dynamically determined by the textual content of data objects. We then present an enforcement mechanism for CBAC that exploits Oracle’s Virtual Private Database (VPD). To further improve the performance of the proposed approach, we introduce a content-based blocking mechanism to improve the efficiency of CBAC enforcement to further
reveal a more relavant part of the data objects comparing with the user credentials and data content. We also utilized a tagging mechanism for more accurate textual content matching for short text snippets (e.g. short VarChar attributes) to extract topics other than pure word occurences to
represent the content of data. Experimental results show that CBAC makes reasonable access control decisions with a small overhead.
MARIANNE JANTZ
Detecting and Understanding Dynamically Dead Instructions for Contemporary MachinesWhen & Where:
246 Nichols Hall
Committee Members:
Prasad Kulkarni, ChairXin Fu
Man Kong
Abstract
Instructions executed by the processor are dynamically dead if the values they produce are not used by the program. Researchers have discovered that a surprisingly large fraction of executed instructions are dynamically dead. Dynamically dead instructions (DDI) can potentially slow-down program execution and waste power. Unfortunately, although the issue of DDI is well-known, there has not been any comprehensive study to understand and explain the occurence of DDI, evaluate its performance impact, and resolve the problem, especially for contemporary architectures.
The goals of our research are to quantify and understand the properties of DDI, as well as, systematically characterize them for existinng state-of-the-art compilers and popular architectures in order to develop compiler and/or architectural techniques to avoid their execution at runtime. In this thesis, we describe our GCC-based framework to instrument binary programs to generate control-flow and data-flow (registers and memory) traces at runtime. We present the percentage of DDI in our benchmark programs, as well as, characteristics of the DDI. We display that context information can have a siginificant impact on the probability that an instruction will be dynamically dead. We show that a low percentage of static instructions actually contribute to the overall DDI in our benchmark programs. We also describe the outcome of our manual study to analyze and categorize the instances of dead instructions in our x86 benchmarks into seven distinct categories. We briefly describe our plan to develop compiler and architecture based techniques to eliminate each category of DDI in future programs. And finally, we find that x86 and ARM programs, compiled with GCC, generally contain a significant amount of DDI. However, x86 programs present fewer DDI than the ARM benchmarks, which display similar percentages of DDI as earlier research for other architectures. Therefore, we suggest that the ARM architecture observes a non-negligible fraction of DDI and should be examined further. Overall, we believe that a close synergy between static code generation and program execution techniques may be the most effective strategy to eliminate DDI.
YUHAO YANG
Protecting Attributes and Contents in Online Social NetworksWhen & Where:
2001B Eaton Hall
Committee Members:
Bo Luo, ChairArvin Agah
Luke Huan
Prasad Kulkarni
Alfred Tat-Kei Ho
Abstract
With the extreme popularity of online social networks, security and privacy issues become critical. In particular, it is important to protect user privacy without preventing them from normal socialization. User privacy in the context of data publishing and structural re-identification attacks has been well studied. However, protection of attributes and data content was mostly neglected in the research community. While social network data is rarely published, billions of messages are shared in various social networks on a daily basis. Therefore, it is more important to protect attributes and textual content in social networks.
We first study the vulnerabilities of user attributes and contents, in particular, the identifiability of the users when the adversary learns a small piece of information about the target. We have presented two attribute-reidentification attacks that exploit information retrieval and web search techniques. We have shown that large portions of users with online presence are very identifiable, even with a small piece of seed information, and the seed information could be inaccurate.
To protect user attributes and content, we will adopt the social circle model derived from the concepts of “privacy as user perception” and “information boundary”. Users will have different social circles, and share different information in different circles. We propose to automatically identify social circles based on three observations: (1) friends in the same circle are connected and share many friends in common; (2) friends in the same circle are more likely to interact; (3) friends in the same circle tend to have similar interests and share similar content. We propose to adopt multi-view clustering to model and integrate such observations to identify implicit circles in a user’s personal network. Moreover, we propose an evaluation mechanism that evaluates the quality of the clusters (circles).
Furthermore, we propose to exploit such circles for cross-site privacy protection for users –new messages (blogs, micro-blogs, updates, etc) will be evaluated and distributed to the most relevant circle(s). We monitor information distributed to each circle to protect users against information aggregation attacks, and also enforce circle boundaries to prevent sensitive information leakage.
MICHAEL JANTZ
Automatic Cross-Layer Framework to Improve Memory Power and EfficiencyWhen & Where:
246 Nichols Hall
Committee Members:
Prasad Kulkarni, ChairXin Fu
Andy Gill
Bo Luo
Karen Nordheden
Abstract
Recent computing trends include an increased focus on power and energy consumption and the need to support multi-tenant use cases in which physical resources need to be multiplexed efficiently without causing performance interference. Many recent works have focused on how to best allocate CPU, storage and network resources to meet competing service quality objectives and reduce power. At the same time, data-intensive computing is placing larger demands on physical memory systems than ever before. In comparison to other resources, however, it is challenging to obtain precise control over distribution of memory capacity, bandwidth, or power, when virtualizing and multiplexing system memory. That is because these effects intimately depend upon the results of activity across multiple layers of the vertical execution stack, which are often not available in any individual component.
The goal of our proposed work is to exercise collaboration between the compiler, operating system, and memory controller for a hybrid memory architecture to reduce energy consumption, while balancing performance trade-offs. Analysis, data structure partitioning, and code layout transformations will be conducted by the compiler and two-way communication between the applications and OS will guide memory management. The OS, together with the hardware memory controller, will allocate, map, and migrate pages to minimize energy consumption for a specified performance tolerance.
NIRANJAN SUNDARARAJAN
Study of Balanced and Unbalanced RFID Tags Attached to Charge PumpsWhen & Where:
246 Nichols Hall
Committee Members:
Ken Demarest, ChairDan Deavours
Jim Stiles
Abstract
Ultra High frequency Radio Frequency Identification (UHF RFID) technology has gained wide prominence in recent years. The main drawback of a UHF RFID tag antenna is that it is sensitive to the environment in which it is placed. That is the performance of a RFID tag deteriorates when placed on conductive or dielectric objects. Most UHF RFID antennas use variations of a balanced folded dipole, such as a T-match antenna. In this project, we answer the question, would it be beneficial having an unbalanced version of a T-match antenna (Gamma match antenna) in a RFID tag compared to having a conventional balanced T-match antenna? To test this we analyzed the performance of a gamma match and T-match antenna, when attached to a charge pump, which generally acts as a load for a RFID antenna in a RFID tag. Also, we propose a procedure to find out the best impedance to drive a charge pump and outline a simple procedure to design a balanced T-match antenna for any desirable input impedance. Later, we transform a balanced T-match antenna into a unbalanced Gamma match antenna and tested to see that a Gamma match antenna is able to deliver more power and voltage to a charge pump than a T-match antenna. Finally we validate these results by studying and comparing the Z-parameters of a Gamma match and T-match antenna.
HARIPRASAD SAMPATHKUMAR
A Framework for Information Retrieval and Knowledge Discovery from Online Healthcare Social NetworksWhen & Where:
246 Nichols Hall
Committee Members:
Bo Luo, ChairXue-Wen Chen
Jerzy Grzymala-Busse
Prasad Kulkarni
Jie Zhang
Abstract
Information used to assist biomedical research has largely comprised of data available in published sources like scientific literature or clinical sources like patient health records. Information from such sources, though extensive and organized, is often not readily available due to its proprietary and/or privacy-sensitive nature. Collecting such information through clinical and pharmaceutical studies is expensive and the information is limited to the diversity of people involved in the study. With the growth of Web 2.0, more and more people openly share their health experiences with other similar patients on healthcare related social networks. The data available in these networks can act as a new source that provides for unrestricted, high volume, highly diverse and up-to-date information needed for assisting biomedical and pharmaceutical research. However, this data is often unstructured, noisy and scattered, making it unsuitable for use in its current form. The goal of this research is to develop an Information Retrieval and Knowledge Discovery framework that is capable of automatically collecting such data from online healtcare networks, extracting useful information and representing it in a form that would facilitate knowledge discovery in biomedical and pharmaceutical research. Information retrieval, Text mining and Ontology modeling techniques are employed in building this framework. An Adverse Drug Reaction discovery tool and a patient profiling tool are being developed to demonstrate the utility of this framework.
SRINIVAS PALGHAT VISWANATH
Design and Development of a Social Media AggregatorWhen & Where:
2001B Eaton Hall
Committee Members:
Fengjun Li, ChairVictor Frost
Prasad Kulkarni
Abstract
There are so many social network aggregators available in the market, e.g.SocialNetwork.in, FriedFeed, Pluggio, Postano, Hootsuite etc. A social network aggregator is a one-stop shop which provides a single point of entry to manage operations of multiple social network accounts and keep track of social media streams. Once a user establishes the sites credentials onto the aggregator, it pulls static data like user profile information, dynamic data like news feed and user posts.
This project aims to design a unified interface of static and dynamic data from facebook, foursquare and twitter for a particular user. Unlike other social aggregators that display dynamic social media stream data in different tabs, each corresponding to a social networking site, we merge dynamic data like timeline from facebook and sent tweets from twitter together and display them on a single stream sorted according to the posting date. Similarly, news feed from facebook and twitter home are merged together and can be seen on a single stream. To simplify cross-social-network management, we support unified operations such as Posting. New posts/tweets can be easily posted at the same time on both the sites through this application. User can further specify the access privileges (i.e., seen by public, friends, friends of friends or only me) of the posts on Facebook, for dynamic privacy protection.
Least but not last, this aggregator supports integration of user profiles from the three social networks. An edit distance based similarity score is calculated to determine the likelihood of profiles from three social networks belong to a same friend. For those with a perfect score, the matched profiles are combined and displayed in an additional dialog.