1 - 25 of 26
Number of results to display per page
CreatorTitleDescriptionSubjectDate
1 Khan, Faisal HabibQuantifying device degradation in live power converters using SSTDR assisted impedance MatrixA noninterfering measurement technique designed around spread spectrum time domain reflectometry (SSTDR) has been proposed in this paper to identify the level of aging associated with power semiconductor switches inside a live converter circuit. Power MOSFETs are one of the most age-sensitive compon...2014-01-01
2 Khan, Faisal HabibReliability analysis and performance degradation of a boost converterIn general, power converters are operated in closed-loop systems, and any characteristic variations in one component will simultaneously alter the operating point of other components, resulting in a shift in overall reliability profile. This interdependence makes the reliability of a converter a com...2014-01-01
3 Lenart, Joshua B.The Uinta Express pipeline: a comprehensive research report conducted by students enrolled in CvEEN 3100 technical communicationsThe Uinta Express Pipeline is a proposed common carrier pipeline which would transport waxy crude oil extracted from the Uinta Basin in northeastern Utah to area refineries in North Salt Lake City. The proposed project would consist of a 12-inch, buried, insulated, carbon steel pipeline supported by...Uinta Express pipeline; Feasibility study; Waxy crude oil; Environmental impact assessment2015-02
4 Gale, Bruce K.Platinum functionalized titania nanotube array sensor for detection of Trichloroethylene in waterA sensor using platinum functionalized titania nanotubes for the detection of Trichloroethylene (TCE) in water samples has been developed. The titania nanotubes were synthesized using an electrochemical anodization technique and platinum was photocatalytically deposited on the nanotubes. The sensor ...2013-01-01
5 Adams, DanielMicrobial production of methane and carbon dioxide from lignite, bituminous coal, and coal waste materialsThe aim of this study was to examine microbial methane and CO2 production from bituminous coal waste, lignite, and bituminous coal materials. Bituminous coal and coal waste material were obtained from a Utah mine and lignite was obtained from a commercially available North Dakota sample. Microbial p...2012-01-01
6 Yang, HaoriPulsed photofission delayed gamma ray detection for nuclear material identificationInnovative systems with increased sensitivity and resolution are in great demand to detect diversion and to prevent misuse in support of nuclear materials management for the U.S. fuel cycle. Nuclear fission is the most important multiplicative process involved in non-destructive active interrogation...2012-01-01
7 Myers, Chris J.Design of a genetic muller C-elementSynthetic biology uses engineering principles to design circuits out of genetic materials that are inserted into bacteria to perform various tasks. While synthetic combinational Boolean logic gates have been constructed, there are many open issues in the design of sequential logic gates. One such g...2007
8 Christensen, Douglas A.Interface of forest and agriculture in nonpoint pollution controlManagement practices of agriculture, including conservation and tillage options, recently have received a great deal of attention with respect to their impact upon the environment. Research efforts have focused both on the direct impacts of reduced on-site productivity resulting from the erosion of ...Suspended sediment; Channel erosion; Silviculture1983
9 Lenart, Joshua B.A Feasibility Study of a Transfer of Federal Lands: Assessing the Triple Bottom LineThis feasibility study identifies various aspects of the proposed transfer of public federal lands to individual states by characterizing the most significant challenges that the transfer entails for civil and environmental engineers.2016
10 Furse, Cynthia M.Leaky fields from damaged shieldsIn a world where wireless devices appear to dominate society, it is wires that truly rule and connect our lives. Certainly the spread of cellular phones, Bluetooth technology, wireless sensor networks, and advances of ion-lithium battery capabilities have made common daily devices more disconnecte...2011
11 Henderson, Thomas C.Target localization and autonomous navigation using wireless sensor networks -a pseudogradient algorithm approachAutonomous mobile robots (AMRs) operating in unknown environments face twin challenges: 1) localization and 2) efficient directed navigation. This paper describes a two-tiered approach to solving these challenges: 1) by developing novel wireless-sensor-network (WSN)-based localization methods and 2)...2014-01-01
12 Yang, HaoriDetection of concealed special nuclear material using nuclear resonance fluorescence techniqueAbstract-Detection method based on Nuclear Resonance Fluorescence (NRF) technique targeting concealed Special Nuclear Material (SNM) has been discussed. Customized DAQ system has been developed to handle high rate events in NRF measurements by implementing real-time DSP on fast ADC and FPGA chip. ...2009
13 Mathews, V. JohnBlind identification of QAM signals using a likelihood-based algorithmThis paper presents a method for automatically identifying different QAM modulations. This method identifies the modulation type as the hypothesis for which the likelihood function of the amplitudes of the received signal is the maximum. The derivation of the likelihood functions assumes additive wh...2013-01-01
14 Furse, Cynthia M.Invisible fray: a critical analysis of the use of reflectometry for fray locationSignificant international research and development efforts have been devoted to methods and equipment for locating wiring faults, particularly those on aging aircraft. Several reflectometry methods that send high frequency signals down the line and analyze the returned reflections have risen to the...Reflectometry; Fray location; Invisible fray; Fault location; Aging wiring; Spread spectrum reflectometry2006-06
15 Khan, Faisal HabibChallenges and solutions in measuring computer power supply efficiency for 80 PLUS® certificationThis paper discusses the techniques, challenges, and results of measuring computer power supply (CPS) efficiency, power factor (PF), and input harmonic currents for the 80 PLUS® program since its beginning in 2002. To date, over 750 power supplies have been tested with many certified for the 80 PL...2009-02
16 Furse, Cynthia M.Measurement and modeling of interference for multiple antenna systemThis paper provides a detailed signal model based on network theory to predict the multi-antenna capacity in the presence of co- and adjacent channel interference. This model expands on previous channel models by including the simultaneous effects of interference, antenna matching, efficiency, direc...2010-01-01
17 Myers, Chris J.; Stevens, KennethAn asynchronous instruction length decoderAbstract-This paper describes an investigation of potential advantages and pitfalls of applying an asynchronous design methodology to an advanced microprocessor architecture. A prototype complex instruction set length decoding and steering unit was implemented using self-timed circuits. [The Revolvi...2001
18 Stevens, Kenneth; Myers, Chris J.An asynchronous instruction length decoderThis paper describes an investigation of potential advantages and pitfalls of applying an asynchronous design methodology to an advanced microprocessor architecture. A prototype complex instruction set length decoding and steering unit was implemented using self-timed circuits. [The Revolving Async...2001
19 Gopalakrishnan, Ganesh; Henderson, Thomas C.Modeling and verification of distributed control scheme for mobile robotsIn this report we present a sensor-based distributed control scheme for mobile robots. This scheme combines centralized and decentralized control strategies. Each group of sensors is considered to be a process that performs sensing and carries out local control tasks as well. Besides these processes...Distributed control scheme; Sensor-based1995
20 Stevens, KennethPractical verification and synthesis of low latency asynchronous systemsA new theory and methodology for the practical verification and synthesis of asynchronous systems is developed to aid in the rapid and correct implementation of complex control structures. Specifications are based on a simple process algebra called CCS that is concise and easy to understand and use....1994
21 Kasera, Sneha K.Violating privacy through walls by passive monitoring of radio windowsWe investigate the ability of an attacker to passively use an otherwise secure wireless network to detect moving people through walls. We call this attack on privacy of people a "monitoring radio windows" (MRW) attack. We design and implement the MRW attack methodology to reliably detect when a pers...2014-01-01
22 Stevens, KennethRadiation hardening by design of asynchronous logic for hostile environmentsA wide range of emerging applications is driving the development of wireless sensor node technology towards a monolithic system-on-a-chip implementation. Of particular interest are hostile environment scenarios where radiation and thermal extremes exist. Radiation hardening by design has been recogn...2009
23 Balasubramonian, RajeevMemory hierarchy reconfiguration for energy and performance in general-purpose processor architecturesConventional microarchitectures choose a single memory hierarchy design point targeted at the average application. In this paper we propose a cache and TLB layout and design that leverages repeater insertion to provide dynamic low-cost configurability trading of size and speed on a per application ...Translation lookaside buffer (TLB)2000
24 Davis, AlAn introduction to asynchronous circuit designThe purpose of this monograph is to provide both an introduction to field of asynchronous digital circuit design and an overview of the practical state of the art in 1997. In the early days of digital circuit design, little distinction was made between synchronous and asynchronous circuits. However,...Asynchronous circuit design1997
25 Balasubramonian, RajeevDynamically tunable memory hierarchyThe widespread use of repeaters in long wires creates the possibility of dynamically sizing regular on-chip structures. We present a tunable cache and translation lookaside buffer (TLB) hierarchy that leverages repeater insertion to dynamically trade off size for speed and power consumption on a per...Microarchitecture; High performance microprocessors; Reconfigurable architectures; Energy and performance of on-chip caches; Translation lookaside buffer (TLB); Tunable cache2003-10
1 - 25 of 26