The OSU Motor Systems Resource Facility (MSRF), co-directed by the Principal Investigators (PI's, bios included), is an Energy Systems Laboratory with operating capabilities up to 750kV A, testbeds up to 300hp, a 120kVA fully programmable source, and a bi-directional grid interface enabling regeneration back onto the grid. The MSRF was...
This paper presents an overview of cogeneration, also known as combined heat and power (CHP). The technology of cogeneration is described and the three primary cogeneration processes are discussed. The transition between parallel operation with the utility and stand-alone operation is discussed. The tradeoff between a synchronous and an induction...
Digital libraries are digitally accessible, organized collections of knowledge. Although under this broad definition any digitally accessible data set might be considered a digital library, the term is generally reserved for collections whose structures are carefully documented and made available in the form of so-called metadata. There is no specific...
Current database systems apply access control mostly on tables and columns.
However, many applications require access control on individual rows in database
tables. Therefore, we have implemented a row-based access control mechanism. In
our model for access control, object groups, in addition to user groups, are used to
reduce the...
"Collaborative filtering algorithms’ performances have been evaluated using a variety of metrics.
These metrics, such as Mean Absolute Error and Precision, have often ignored recommendations for
which they do not have data. Ignoring these recommendations has provided numbers which do not
accurately represent the user experience. Qualitatively we have seen...
"SAML Edit® is a PC-based tool for creation and manipulation of SAML Assertion text files (as defined by OASIS). The tool allows its user to modify the data/information contained in the underlying file. As security information between entities is exchanged using such SAML Assertion text files, the ability to manipulate...
Active contour models have been widely applied to image segmentation and
analysis. It has been successfully used in contour detection for object recognition,
computer vision, computer graphics, and biomedical image processing such as X-ray,
MRI and Ultrasound images.
The energy-minimizing active contour models or snakes were developed by Kass,
Witkin...
Spatial Supervised Learning seeks to learn how to assign a label to each pixel in a spatial grid
such as the pixels of remote-sensed images. The standard approach is to treat each grid cell
separately and to use only the measured features of the grid cell to determine the assigned...
The appropriate separation of concerns is a fundamental engineering principle. A concern, for software developers, is that which must be represented by code in a program; by extension, separation of concerns is the ability to represent a single concern in a single appropriate programming language construct. Advanced separation of concerns...
In this thesis, novel solutions are proposed for key management issues in mobile ad hoc networks. Presented Hierarchical Binary Tree (HBT) based model is distributed, self-organizing, scalable and does not employ online key distribution authority or group manager. Two different group authentication and group key establishment protocols are proposed for...
The long-term goal of this research project is the development of solution-based inorganic dielectric and semiconductor materials for inkjet printed electronics. The main focus of this thesis involves testing of the materials and devices under development. A new solution-based inorganic dielectric material (HfOSO₄), given the name hafsox, is developed and...
In some practical systems, most of the errors are of 1 → 0 type and 0 → 1
errors occur very rarely. In this thesis, first, the capacity of the asymmetric
channel is derived. The capacity of the binary symmetric channel (BSC) and the
Z-channel can be derived from this...
Spiral inductors are a key component of mixed-signal and analog integrated circuits (IC's). Such circuits are often fabricated using silicon-based technology, owing to the inherent low-cost and high volume production aspects. However, semiconducting substrate materials such as silicon can have adverse effects on spiral inductor performance due to the lossy...
In many areas of engineering and applied mathematics, spectral methods provide very powerful tools for solving and analyzing problems. For instance, large to extremely large sizes of numbers can efficiently be multiplied by using discrete Fourier transform and convolution property. Such computations are needed when computing π to millions of...
A constant push from society for more information with richer content simultaneously available at the consumers fingertips have pushed the speeds of electronics to extremes. Bus lines on circuit boards responsible for data communication are being pushed to their limit to meet these demands. As data busses are pushed to...
A methodology for rapid estimation of substrate noise generated by digital circuitry in mixed-signal circuits is presented. This methodology is incorporated into the Silencer! framework, and also provides for future improvements including pre-layout noise estimation. Measurements of a test chip fabricated in the TSMC o.25[mu]m heavily doped logic process validate...
Graph-based approaches for sequencing motion capture data have produced some of the most realistic and controllable character motion to date. Most previous graph-based approaches have employed a run-time global search to find paths through the motion graph that meet user-defined constraints such as a desired locomotion path. Such searches do...
With an increasing number of wireless applications at microwave frequencies, the frequency spectrum is becoming quite crowded. Due to this congestion, the current state of technology is leading towards upper microwave and millimeter wave spectra as they also offer other distinct advantages such as larger bandwidth and smaller component footprint....
Modern applications in wireless communications systems demand the capability of high transmission rate. Engineers have to find optimum solutions to transmit the signal over fading environments. In this study, we propose the combination of space-time diversity techniques and optimum QAM constellation design, in order to further improve performance. Specifically, we...
A class of high-performance thin-film transistor (TFT) channel materials has emerged
involving oxides composed of heavy-metal cations (HMCs) with (n-1)d¹⁰ns⁰ (n≥4)
electronic configurations. This thesis is devoted to the pursuit of three topics involving
the development of these materials for TFT applications: modeling TFT currentvoltage
characteristics, an exploratory method for...
Time of Arrival (TOA) is a popular technique used for geolocation. This thesis evaluates the use of TOA techniques indoors. The accuracy of measuring distances using TOA is dependent on the bandwidth of the system and the multipath conditions between the receiver and transmitter. System bandwidth has a significant effect...
Passive components, including spiral inductors and transformers, fabricated on silicon-based substrates are placing an increasing demand on radio-frequency integrated circuit (RFIC) design. Performance of the RFIC suffers from several non-ideal effects that must be taken into account in order to create a successful design. In particular, monolithic transformers can be...
The focus of this thesis involves developing general fabrication processes relevant to the manufacture of two new devices for the Microscale technology Energy and Chemical Systems (MECS) program at Oregon State University. The two MECS devices developed, capture dots and transparent thin-film heaters (TTFHs), require unique process development for successful...
The world market for sensors is several hundred million dollars growing at an annual rate of 20 percent with accelerometers comprising 19 percent of the market. With an increasing market, a wide range of applications with varying degrees of resolution are in demand. Therefore, there is sufficient motivation for developing...
The primary focus of this thesis involves modeling and development of p-type thin-film transistors (p-TFTs), moving towards the realization of a filly transparent thin-film transistor (TTFT). The modeling portion of this thesis emphasizes the development of physics-based TFT models, specifically focusing on the elucidation of non-ideal current-voltage characteristic behavior. A...
Machine learning encompasses probabilistic and statistical techniques that can build models from large quantities of extensional information (examples) with minimal dependence on intensional information (domain knowledge). This focus of machine learning is reflected in the never-ending quest for "off-the-shelf" classifiers. To generalize to unseen data, however, we must make use...
Recently, the demand for higher data rates of transmission has increased in
many wireless communication applications. Using multi-transmit and multi-receive
antennas has been shown to be a solution, since it can increase the channel capacity to
accommodate higher transmission rates. Among the popular techniques developed to
exploit the use of...
This paper studies the current counternarcotics methods and the electronics technology used by the United States and Colombian governments to combat narcoterrorism in the Andean region. The efficiency and efficacy of these methods with the use of electronics technology are analyzed to determine if they are
successful. The current counternarcotics...
Preventative motor fault detection is of prime importance for modern plant management. During research into rotor faults, performed at the Motor Systems Resource Facility (MSRF), an optimized rotor fault detection and classification method was proposed. In critical process applications, the suggested method would provide the foundation for continually monitoring a...
As more advanced hybrid electric vehicles begin emerging onto the commercial market, design algorithms for their control become increasingly more complicated. One major hurdle for designers is the mitigation and control of the created high frequency harmonics caused from switching the dc voltage into an ac voltage by use of...
We have developed a framework for Web-based GIS/database (WebGD) applications
that allow users to insert, query, and delete data with map interfaces displayed by Web
browsers. The framework uses such open source software packages as Minnesota
MapServer, PostGIS, and PostgreSQL. With this framework, we can create the map
interface of...
This work focusses on the modeling and the development of efficient coupled simulation techniques for MEMS based RF oscillators. High-level models for MEMS based varactors have been discussed and their accuracy issues are identified, based on comparisons with numerical simulations. A faster simulation approach based on the time-domain shooting method...
Various methods and techniques have been introduced and applied to advance the state of the art of mobile wireless communications technology. For example, some techniques are applied to overcome the problem of multipath caused by the mobile environment. Multipath produces replicas of the wanted signal which arrive at the receiver...
Pipeline analog-to-digital converters (ADCs) have long been used in high-speed systems for power-efficient data conversion. Broadband communication and video processing systems are placing high demands on converter accuracy and speed (above 14 bits and in the multiple-MHz range). The increasing converter requirements coupled with lower supply voltages in modern processes...
Symmetric key block ciphers, such as AES, are well known and frequently used. There are five confidentiality modes of operation that are currently recommended for use with a symmetric key block cipher algorithm: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR). This...
Controlling a virtual character with a pen input device is difficult. Pen input
devices require freeform gestures and users are not confined to particular mapping of a
key or a button that is exactly repeatable. This is a problem since an intuitive motion
gesture for one user might not be...
Industry today is pushing personal portable handheld communication de- vices, from cellular telephones to personal navigation systems, and society is embracing the push. The goal is to make compact multi-functional handheld products that can transfer information to those around us through high bandwidth mobile communications. These modules rely heavily on...
The focus of this work is on developing algorithms for frequency domain steady-state analysis of oscillators. Convergence problems associated with the frequency domain harmonic balance simulation of oscillators have been examined. Globally convergent homotopy methods have been combined with the harmonic balance method for robust high-Q oscillator simulation. Various homotopy...
Successful software systems evolve over their lifetimes through the cumulative changes made by software maintainers. As software evolves, the problems resulting from software change worsen, exacerbated by increased system size and complexity, lack of program understanding, amount of effort required to make changes, and number of personnel involved. Experience shows...
Authenticated-Encryption modes of operation have recently received great atten- tion amongst researchers. Such modes of operation provide both privacy and authentic- ity. A proposed mode in this category is the Offset Codebook mode (OCB) by Rogaway et al. This mode shows great substantial advantages over conventional modes. In the past...
New video-conference devices based on omnidirectional multi-camera systems have been emerging in the last few years. These devices require innovative and automated video quality assessment in the earlier stages of their design in order to guarantee competitive product development and quality monitoring. Current quality assessment techniques are not adequate since...
Advanced Encryption Standard (AES) is one of the secret key algorithms used in Cryptography. It is applied in a variety of applications including smart cards, internet web servers, automated teller machines (ATMs), etc. Both hardware and software implementations are taken into consideration while addressing AES algorithms. In addition to reaching...
AES (Advanced Encryption Standard), also known as Rijndael, is a symmetric key block cipher adopted as an encryption standard by the US government and used extensively in cryptographic applications worldwide. ARM is the most popular processor core used in embedded applications. This thesis surveys the available public implementations of AES...
Preventative methods for software reverse engineering have been given greater attention in recent times due to the increase in computational resources and tools available to the public. The inherent security provided by encoding source into machine code (executable form) can no longer be assumed, given the availability of effective automated...
Modular arithmetic is a basic operation for many cryptography applications such as public key cryptography, key exchange algorithms, digital signatures, and elliptic curve cryptography. Therefore, fast and efficient hardware design of modular division and multiplication is proposed for implementation of cryptography system with intent to achieve information security. The hardware...
Professional software developers do not test code adequately, even though testing tools are widely available. Until developers realize the deficiencies in their tests, inadequate testing of software seems likely to remain a major problem. To support developers writing tests, industry and researchers have proposed systems that visualize “testedness” for end-user...
Radio frequency (RF) power amplifiers (PA) are the most power consuming components of a mobile communications unit. They are used to convert the DC power from the battery into RF power delivered to the antenna. In a cell phone it becomes very important to use highly efficient power amplifiers, such...
This thesis presents new, compact configurations for RF/microwave bandstop and lowpass filters for embedded passive applications. A simple design methodology is presented for designing the folded-transmission line filters on a microstrip platform. Unlike the conventional stub-loaded filter designs, the proposed folded-line filters will have practical dimensions for a wide range...
This thesis presents a comparison of time-domain and frequency-domain algorithms for phase noise calculation in oscillators. Floquet theory provides the mathematical foundation for these calculations and the numerical methods employ perturbation projection vectors (PPVs). The PPVs are an estimate of an oscillator's sensitivity to noise.
The in-house circuit simulator SPICE3...
Designing spectral efficient, high-speed wireless links that offer high quality-
of-service and range capability has been a critical research and engineering challenge. In this thesis, we mainly address the complexity and performance issues of
channel estimation and data detection in multiple-input multiple-output (MIMO)
orthogonal frequency division multiplexing (OFDM) systems over...