The project team surveyed and interviewed forty identified experts within the diverse tsunami community. The survey revealed that this community is a sophisticated user of Internet search engines and tools and is very familiar with existing information. The sites mentioned most frequently as being helpful were those of the National...
Spacecrafts experience radiation in the course of their operation
and all electronic equipment on board these spacecrafts has to
be designed to withstand the effects of this radiation.
This thesis describes the effects of total ionization dose (TID)
and single event transients (SET) in phase-locked loops - an
important circuit...
Circuits operating outside the earth’s atmosphere are more vulnerable to cosmic radiation and require special design consideration. The purpose of this work is to explore methods of mitigating the effect of radiation in phase locked loop (PLL) circuits. Several voltage controlled oscillators (VCOs) and two complete PLLs are designed and...
The design of a 10-bit pipelined charge redistribution DAC employing MOSCAPs biased in their accumulation mode is presented in this thesis. A switched capacitor filter and output buffer have also been designed for the system. The effect of MOSCAP nonlinearity on the performance of the pipelined charge redistribution DAC has...
Digital phase-locked loops (PLLs) have been receiving increasing attention recently due to their ease of integration, scalability and performance comparable to their analog counterparts. In digital PLLs, increased resolution in time-to-digital conversion is desirable for improved noise performance. This work describes the design and simulation of a stochastic time-to-digital converter...
End-user programmers, because they are human, make mistakes. However, past research has not considered how visual end-user debugging devices could be designed to ameliorate the effects of mistakes. This paper empirically examines oracle mistakes mistakes users make about which values are right and which are wrong to reveal differences in...
Previous research has revealed gender differences that impact females’ willingness to adopt software features in end users’ programming environments. Since these features have separately been shown to help end users problem solve, it is important to female end users’ productivity that we find ways to make these features more acceptable...
A large number of sequential decision-making problems in uncertain environments
can be modeled as Markov Decision Processes (MDPs). In such settings, an agent
can observe at each time step the state of the environment and then executes an
action, causing a stochastic transition to a new state of the environment...
Ultra-wideband (UWB) radio is the transmission of data using an extremely wide bandwidth and very low power spectral density. In this thesis, the mereits and challenges of UWB architectures versus conventional narrowband architectures will be compared. Pulsed UWB systems can be implemented with very simple architectures. These advantages make UWB...
Ferrites have been used for various high frequency applications as bulk
materials. These applications, however, are limited to large dimension devices. In
this thesis, thin film ferrites were deposited from a low temperature solution-based
deposition process that is suitable for micro-scale high frequency applications. The
low temperature nature of this...
With the ever-increasing demand for portable devices used in applications
such as wireless communication, mobile computing, consumer electronics, etc.,
the scaling of the CMOS process to deep submicron dimensions becomes more
important to achieve low-cost, low-power and high-performance digital systems.
However, this downscaling also requires similar shrinking of the supply...
A discrete trap model is developed and employed for elucidation of thin-film transistor (TFT) device physics trends. An attractive feature of this model is that only two model parameters are required, the trap energy depth, E[subscript T], and the trap density, N[subscript T]. The most relevant trends occur when E[subscript...
Digital-to-analog converters (DACs) suffer from static and dynamic nonlinearity problems, which degrade their accuracy and performance. Mismatch errors in the analog components restrict the maximum achievable linearity.
This thesis presents various techniques for correcting these errors. It describes a correction process for the nonlinear behavior of DACs, on three different...
Recently, continuous-time ΔΣ modulators are appearing increasingly often in both the literature and the marketplace due to their features of inherent antialiasing and relaxed requirements for opamp and so on. However, several nonideal factors such as clock jitter, excess loop delay, inter-symbol interference and so on, degrade the SNR performance...
This thesis presents a Z-parameter based model to predict the substratenoise coupling between two contacts in a heavily doped substrate for frequenciesless than 2 GHz. The empirical model is scalable with contact size and spacingsbetween the contacts and model parameters can be readily extracted from simu-lated or measured data. The...
Commonly proposed ocean wave energy converters (OWEC) use inefficient and maintenance demanding intermediate hydraulic and pneumatic systems. We propose a novel rotary direct-drive OWEC that eliminates these intermediate stages. The new device employs a contactless force transmission system (CFTS) comprising a “piston” and a “cylinder” and a ball screw to...
There is a large and growing market for portable consumer audio products
with very small size. As the size of these products is reduced, the area occupied
by batteries becomes significant and hence limits the number of batteries to one.
In order to build such small products, high levels of...
The purpose of this thesis is to explore dependency speculation in Dynamic Simultaneous Multi-Threading (DSMT). DSMT is a microprocessor architecture which attempts to extract Thread Level Parallelism (TLP) from single-threaded programs at run-time. This is accomplished by running multiple iterations of program loops in parallel. The DSMT architecture was originally...
Functional programming is concerned with referential transparency, that is, given a certain function and its parameter, that the result will always be the same. However, it seems that this is violated in applications involving uncertainty, such as rolling a dice. This thesis defines the background of probabilistic programming and domain-specific...
Continuously tunable diode laser sources coupled to single-mode fiber are useful sources for fiber Bragg grating (FBG) strain sensors. This paper describes the
development and fabrication of such a device. An introduction is given describing
applications of tunable lasers and some of the different methods of creating a tunable
diode...
Designing spectral efficient, high-speed wireless links that offer high quality-
of-service and range capability has been a critical research and engineering challenge. In this thesis, we mainly address the complexity and performance issues of
channel estimation and data detection in multiple-input multiple-output (MIMO)
orthogonal frequency division multiplexing (OFDM) systems over...
This thesis presents a comparison of time-domain and frequency-domain algorithms for phase noise calculation in oscillators. Floquet theory provides the mathematical foundation for these calculations and the numerical methods employ perturbation projection vectors (PPVs). The PPVs are an estimate of an oscillator's sensitivity to noise.
The in-house circuit simulator SPICE3...
Traditionally linear actuator applications are addressed by the use of hydraulic systems. The high maintenance cost and poor reliability will always be the most critical problem in the real applications. Benefited from both the high mechanical advantage of the roll screw and the simple structure of the switched reluctance motor,...
In recent years, there has been growing interest in both industry and academia to use continuous-time (CT) Δ-Σ A/D converters for wideband wireless and wireline communication applications.
So far no reported CT Δ-Σ A/D modulator achieves 14-bit or higher dynamic range (DR) with more than 2MHz signal bandwidth (equivalently 4MS/s)....
This thesis focuses on two aspects of transparent electronics, SnO₂ transparent thin-film transistors (TTFTs) and transparent circuits. Both depletion- and enhancement-mode SnO₂ TTFTs are realized. The maximum effective mobility for the depletion- and enhancement-mode devices are 2 cm²V⁻¹s⁻¹ and 0.8 cm²V⁻¹s⁻¹, respectively. A variety of techniques to decrease the carrier...
This thesis presents new, compact configurations for RF/microwave bandstop and lowpass filters for embedded passive applications. A simple design methodology is presented for designing the folded-transmission line filters on a microstrip platform. Unlike the conventional stub-loaded filter designs, the proposed folded-line filters will have practical dimensions for a wide range...
This thesis presents a channelized digital receiver design for UWB sytems in a multipath indoor environment. The UWB technology has been used for commercial and military purposes due to a number of advantages such as low-power consumption, noise-like and carrier free. The energy of UWB signal is spread over a...
Conventional register files spread porting resources uniformly across all registers. This paper proposes a method called Asymmetric Clustering using a Register Cache (ACRC). ACRC utilizes a fast register cache that concentrates valuable register file ports to the most active registers thereby reducing the total register file area and power consumption....
The demand for portable electronic systems and the continued
down-scaling of device dimensions resulted in rapid improvement in
the performance of integrated systems. Several low-voltage design
techniques have been proposed to operate analog circuits with sub-1V
supply. However, these techniques require higher power consumption
to achieve large dynamic range while...
Protein secondary structure prediction plays a pivotal role in predicting protein folding in three-dimensions. Its task is to assign each residue one of the three secondary structure classes helix, strand, or random coil. This is an instance of the problem of sequential supervised learning in machine learning. This thesis describes...
Ultra-wideband (UWB) communication has emerged as a very promising
technology for short-range wireless applications, including
high-speed multimedia transmissions and sensor networks. UWB
system designs involve many different aspects covering analog and
digital processing, channel estimation and modeling, and
modulation and demodulation. Although UWB still faces many
challenges, significant progress has...
Popular applications such as P2P file sharing, multiplayer gaming, videoconferencing, etc. rely on the efficiency of content distribution from a single source to multiple receivers. Most users of these applications are on the widely prevalent source constraint networks such as the Digital Subscriber Line (DSL) and wireless networks. Overlay multicast...
As broadband Internet becomes widely available, Peer-to-Peer (P2P) applications over the Internet are becoming increasingly popular. Such an example is a video multicast application in which, one source streams a video to a large number of destination nodes through an overlay multicast tree consisting of peers.
These overlay multicast-based applications,...
Smart weapons promise to provide leap ahead capability with regard to accuracy and engagement range for medium and large caliber projectiles. One of the most critical components of a smart weapon system is its sensor suite that provides position, orientation, and velocity information as the projectile flies down range so...
This thesis presents a domain specific visual language designed to allow coaches to create content that exhibits the complex 2D interactions observed in the game of American football. Coaches can visually program the content by using symbols and drawing primitives similar to those that they currently use to design static...
The thesis focuses on model-based approximation methods for reinforcement
learning with large scale applications such as combinatorial optimization problems.
First, the thesis proposes two new model-based methods to stablize the
value–function approximation for reinforcement learning. The first one is the
BFBP algorithm, a batch-like reinforcement learning process which iterates between...
We present an approach for generating a character’s response in anticipation of an impending impact. Protective anticipatory movement is built upon several simple actions that have been identified as response mechanisms in monkeys and in humans. These actions are parameterized by a model of the interaction based on the approaching...
In modern on-chip memories, an increasing demand for higher performance, lower power, reduced area, and improved robustness creates a rising need for advanced microarchitecture and circuit design techniques. Particularly in large-signal multi-ported register files, these advanced design techniques include: (i) multi-banked arrays, (ii) multi-frequency arrays, (iii) multi-bit width gating, (iv)...
Power reduction can be achieved at many different levels, such as architecture, algorithm, logic, and transistor levels in circuit design. This thesis focuses on low power scheduling at the algorithm level. We present a latency-constrained scheduling and a latency and resource constrained scheduling, which minimize power consumption for the resources...
Accurate scaled modeling and simulation are critical to advancing ocean wave linear generator buoys. A 100th scaled model of ocean wave generator buoy systems is analyzed by solving the Navier-Stokes equations. These equations are numerically solved using Computational Fluid Dynamics (CFD) by implementing the front capturing method. In this thesis,...
Traditional application of Voronoi diagrams for space partitioning creates Voronoi regions, with areas determined by the generators’ relative locations and weights. Especially in the area of information space (re)construction, however, there is a need for inverse solutions; i.e., finding weights that result in regions with predefined areas. In this thesis,...
The code reuse problem is a common software engineering problem in scientific computing. As a prevailing programming language in many scientific fields, Fortran does not provide support to address this problem. One particular reason is that Fortran lacks the support for generic programming. By applying program-generation techniques, we developed two...
Achieving sharpened (enhanced detail) features of a multi-dimensional data source using the linear prediction (LP) bandwidth extrapolation (BWE) technique in the transform domain is the main objective of this research. The evolution of sensor technology has provided acquisition scenarios in which the data format is inherently multi-dimensional, including hyperspectral imaging...
Although researchers have begun to explicitly support end-user programmers’ debugging by providing information to help them find bugs, there is little research addressing the right content to communicate to these users. The specific semantic content of these debugging communications matters because, if the users are not actually seeking the information...
This thesis presents a model for simulating individual pedestrian motion based on empirical data. The model keeps track of a pedestrian’s position, orientation, and body configuration and leverages motion capture data to generate plausible motion. Our model can automatically incorporate a pedestrian’s physical limitations when making movement decisions, since it...
The substrate noise injected by a stepped buffer circuit into two single-ended 1.5GHz low noise amplifiers is examined for a heavily doped 0.25µm CMOS process. The difference in the LNA noise rejection is characterized as a function of the size and placement of substrate contacts. The use of a resistive...
Authentication protocols play important roles in network security. A variety of authentication protocols ranging from complex public-key cryptosystems to simple password-based authentication schemes have been proposed. However, currently there is no fully secure authentication scheme that can resist all known attacks. When a user authentication is performed over an insecure...
As the Tekbots program expands into senior and graduate level classes at Oregon State University, so does the need arise for more complex learning platforms. These complex hardware platforms cannot be adequately tested in a manufacturing environment as we have done previously. Also, due to their complexity, these platforms require...
Multiple-input multiple-output (MIMO) antenna technology is promising
for high-speed wireless communications without increasing the transmission band-
width. Space time coding (STC) is a scheme that employs multiple antennas to
increase transmission rate or to improve transmission quality. STC is used widely
in mobile cellular networks, wireless local area networks (WLAN)...
Software maintenance accounts for a large portion of the software development cost, particularly the process of updating programs either to adapt for requirement change or to enhance design or efficiency. Currently, program updates are generally performed manually by programmers using text editors. This is an unreliable
method because syntax and...