Flexible and printed electronics have become increasingly popular as they make possible the production of flexible, low-cost, multifunction devices that are unachievable through traditional manufacturing methods. The printed films are significantly impacted and thus limited by the existing ink production process. Herein, an alternate technique of generating high-quality titanium dioxide...
In this comprehensive thesis, we present a series of experiments and findings that highlight the
critical importance of TDC Voltage Sensors in the hardware security domain. Our research begins
by introducing a novel self-calibrating module, demonstrating its efficiency through preliminary
calibration tests. We then delve into the Peak-to-Peak tests, which...
The ferromagnetic resonance (FMR) phenomenon serves as a sensitive probe of the effective internal fields in a magnetic material. FMR spectroscopy has consequently become a well-established technique, extensively employed in assessing material properties such as magnetic anisotropy, Landé g-factor, damping parameter, and the magnetoelastic constants of magnetic materials. Determining these...
This paper addresses the high model complexity and overconfident frame labeling of state-of-the-art (SOTA) action segmenters. Their complexity is typically justified by the need to sequentially refine action segmentation through multiple stages of a deep architecture. However, this multistage refinement does not take into account uncertainty of frame labeling predicted...
Distributed version control allows developers to manage software evolution among distributed development teams. But it does not eliminate all consistency and concurrency issues, and instead introduces additional complexity when merging code. And resolving merge conflicts is nontrivial when automated merging fails. In such cases, developers are forced to inspect the...
Metric spaces (X, d) are ubiquitous objects in mathematics and computer science that are able to capture pairwise distance relationships d(x, y) between points x, y ∈ X. Because of this, it is natural to ask what useful generalizations there are of metric spaces for capturing “k-wise distance relationships” d(x1,...
Given the abundance of images related to operations that are being captured and stored, it behooves firms to innovate systems using image processing to improve operational performance that refers to any activity that can save labor cost. In this paper, we use deep learning techniques, combined with classic image/signal processing...
Low-power receivers (RX) with 100$\mu W$-scale power consumption can enable several power/energy-constrained IoT applications. However, achieving sensitivity, interferer tolerance and wide operating range with low power presents a challenge for existing architectures, particularly those constrained to highly integrated solutions without high-Q off-chip components. Existing solutions rely heavily on high quality...
Explainable Artificial Intelligence (XAI) systems aim to improve users’ understanding of AI but rarely consider the inclusivity aspects of XAI. Without inclusive approaches, improving explanations might not work well for everyone. This study investigates leveraging users’ diverse problem-solving styles as an inclusive strategy to fix an XAI prototype, with the...
We present student perceptions of a new first-year engineering programming class that was designed by informed research practices. While the College of Engineering at Oregon State University saw a lot of major switching in the first year, there were not many students switching into computer science (CS). This could have...
A multidisciplinary perspective is necessitated for the analysis of wave energy conversion systems, spanning hydrodynamics, mechanics, electric power, and control systems. The complexity inherent in these scientific domains poses challenges for unified analysis. This paper addresses these challenges by connecting various domains through the application of circuit theory, characterizing the...
Autonomous robotic agents are on their way to becoming in-home personal assistants, construction assistants, and warehouse workers. The degree of autonomy of such systems is reflected by the manner in which we specify goals to them; the abstraction of low-level commands to high-level goals goes hand-in-hand with increased autonomy. In...
Learning to recognize objects is a fundamental and essential step in human perception and understanding of the world. Accordingly, research of object discovery across diverse modalities plays a pivotal role in the context of computer vision. This field not only contributes significantly to enhancing our understanding of visual information but...
Rapid and sensitive detection of stress hormones, such as cortisol and dehydroepiandrosterone (DHEA), can benefit the diagnosis of diseases related to adrenal gland disorders, post-traumatic stress disorders, chronic fatigue syndrome, and more. Stress hormones fluctuate in a circadian rhythm, the highest in the early morning and the lowest at night;...
Motivation: Many robots such as legged robots and prosthetic hands/arms are designed to interact with uncertain and time-varying environments to accomplish their tasks.
Observations on humans and animals during their daily tasks suggest that they adapt their leg compliance while traversing with different velocities on different grounds and adjust their...
In this thesis, we propose a systematic code for correcting t = 1 insertion/deletion errors of the character ”0” that can occur between any two consecutive 1’s in a binary string. The code requires balanced input strings, where each word of length n contains ⌈n/2⌉ 0’s and ⌊n/2⌋ 1’s. This...
Emerging research shows that individual differences in how people use technology sometimes cluster by socioeconomic status (SES) and that when technology is not socioeconomically inclusive, low-SES individuals may abandon it. To understand how to improve technology’s SES-inclusivity, we present a multi-phase case study on SocioEconomicMag (SESMag), an emerging inspection method...
A secret sharing scheme allows a dealer to distribute a secret with a set of parties, such that only a certain subset of parties can collaborate and learn the shared secret. Traditional secret sharing schemes have been used as building blocks in various subdomains of cryptography. Recently, two new extensions...
One of the pervasive problems arising in our modern, digital world surrounds data breaches where an adversary, through zero-day exploitations, phishing, or old-fashioned social engineering attacks, gains access to a service’s data stores. Our society increasingly relies on these cloud-based services for everything from our taxes to personal communication. As...
Additive manufacturing has become a promising method for the fabrication of inexpensive, green, flexible sensors and electronics. Printed electronics on low- temperature substrates are very appealing for the flexible hybrid electronics market for their use in disposable and biocompatible electronic applications and in areas like packaging, wearables, and consumer electronics....