Site-wide links

Engineering, Science, & Technology

Creating, innovating, addressing challenges, solving problems, and improving the quality of lives in society.

Many tasks in the field of computer vision rely on an underlying change detection algorithm in images or video sequences. Although much research has focused on change detection in consumer images, there is little work related to change detection on aerial imagery, where individual images... READ MORE
Life Cycle Assessment (LCA) is one of the most widely used tools to determine the environmental impact of products and processes. One of the main concerns with LCA is the limited comparability of the results due to limitations in defining the functional unit. This affects... READ MORE
There has been a growing awareness about the environmental impacts of producing and consuming goods and services. Among the various tools that have been developed to better understand these impacts, Life Cycle Assessment (LCA) is one of the most commonly used tools to estimate... READ MORE
Musculoskeletal (MSK) systems have long been compared to simple mechanical machines. This not only allows for ease of understanding locomotion, but ease of modeling a biological system during complex motion. More specifically, simple lever systems are most commonly employed to approximate mechanical... READ MORE
Cardiovascular disease is the leading cause of death in the United States. Tracking daily changes in one’s cardiovascular health can be critical in diagnosing and managing cardiovascular disease, such as heart failure and hypertension. A toilet seat is the ideal device for monitoring parameters... READ MORE
Legged transport is the most versatile form of locomotion available to humans and animals. Walking is a complex motion and the best bipedal robots of today are not able to walk as adeptly as a human. Many different models for walking have been studied... READ MORE
Cryptographic architectures provide different security properties to sensitive usage models. However, unless reliability of architectures is guaranteed, such security properties can be undermined through natural or malicious faults. In this thesis, two underlying block ciphers which can be used in authenticated encryption algorithms are considered,... READ MORE