In this comprehensive thesis, we present a series of experiments and findings that highlight the
critical importance of TDC Voltage Sensors in the hardware security domain. Our research begins
by introducing a novel self-calibrating module, demonstrating its efficiency through preliminary
calibration tests. We then delve into the Peak-to-Peak tests, which...
Food waste (FW), brewery waste (BW), and fats, oils, and greases (FOG), are prevalent waste streams in municipalities across the country, particularly in the Pacific Northwest (PNW). Anaerobic digestion (AD), the microbial-mediated transformation of organic waste into methane-rich biogas, offers a sustainable, energy-generating, waste management solution for these wastes. Anaerobic...
The ferromagnetic resonance (FMR) phenomenon serves as a sensitive probe of the effective internal fields in a magnetic material. FMR spectroscopy has consequently become a well-established technique, extensively employed in assessing material properties such as magnetic anisotropy, Landé g-factor, damping parameter, and the magnetoelastic constants of magnetic materials. Determining these...
Human-robot teams involve humans and robots collaborating to achieve tasks under various environmental conditions. Successful teaming requires robots to adapt autonomously in real-time to a human teammate's state. An important element of such adaptation is the ability for the robot to infer the tasks performed by their human teammates. Human-robot...
Desferrioxamine B (DFOB) was reversibly and covalently conjugated to polystyrene microspheres via N-succinimidyl 3-(2-pyridyldithio)propionate (SPDP) crosslinker. DFOB retained post-immobilization activity with at least 89% able to bind Fe(III)-citrate under pH 7.4 and a citrate:iron molar ratio = 100:1. Comparing iron capture by DFOB-activated beads and sulfhydryl (−SH) control beads demonstrated...
A secret sharing scheme allows a dealer to distribute a secret with a set of parties, such that only a certain subset of parties can collaborate and learn the shared secret. Traditional secret sharing schemes have been used as building blocks in various subdomains of cryptography. Recently, two new extensions...