Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Masters Theses

2013

Discipline
Institution
Keyword

Articles 1 - 12 of 12

Full-Text Articles in Computer Engineering

Firmware And Software For An Integrated Electrophysiology Data Acquisition And Stimulation System, Kyle D. Batzer Dec 2013

Firmware And Software For An Integrated Electrophysiology Data Acquisition And Stimulation System, Kyle D. Batzer

Masters Theses

This thesis describes the firmware and software design for a prototype electrophysiology experimentation system. The overall system, built on the work of previous students and developed with fellow graduate student Mr. Donovan Squires, provides eight channels of acquisition and four channel of arbitrary waveform generation for stimulation of biological systems. In order to show the performance of the system, a common electrophysiology experiment was performed on the giant axon of an earthworm and the results were compared to previously validated systems. The developed system is intended to support future work at the Neurobiology Engineering Laboratory at Western Michigan University.

The …


A Privacy-Aware Distributed Storage And Replication Middleware For Heterogeneous Computing Platform, Jilong Liao Dec 2013

A Privacy-Aware Distributed Storage And Replication Middleware For Heterogeneous Computing Platform, Jilong Liao

Masters Theses

Cloud computing is an emerging research area that has drawn considerable interest in recent years. However, the current infrastructure raises significant concerns about how to protect users' privacy, in part due to that users are storing their data in the cloud vendors' servers. In this paper, we address this challenge by proposing and implementing a novel middleware, called Uno, which separates the storage of physical data and their associated metadata. In our design, users' physical data are stored locally on those devices under a user's full control, while their metadata can be uploaded to the commercial cloud. To ensure the …


Automated Generation Of Simulink Models For Enumeration Hybrid Automata, David Aaron Heise Aug 2013

Automated Generation Of Simulink Models For Enumeration Hybrid Automata, David Aaron Heise

Masters Theses

An enumeration hybrid automaton has been shown in principle to be ready for automated transformation into a Simulink implementation. This paper describes a strategy for and a demonstration of automated construction. This is accomplished by designing a data model which represents EHA data and providing a mapping from EHA data points to Simulink blocks.


A Secure Reconfigurable System-On-Programmable-Chip Computer System, William Herbert Collins Aug 2013

A Secure Reconfigurable System-On-Programmable-Chip Computer System, William Herbert Collins

Masters Theses

A System-on-Programmable-Chip (SoPC) architecture is designed to meet two goals: to provide a role-based secure computing environment and to allow for user reconfiguration. To accomplish this, a secure root of trust is derived from a fixed architectural subsystem, known as the Security Controller. It additionally provides a dynamically configurable single point of access between applications developed by users and the objects those applications use. The platform provides a model for secrecy such that physical recovery of any one component in isolation does not compromise the system. Dual-factor authentication is used to verify users. A model is also provided for tamper …


Tor Bridge Distribution Powered By Threshold Rsa, Jordan Hunter Deyton May 2013

Tor Bridge Distribution Powered By Threshold Rsa, Jordan Hunter Deyton

Masters Theses

Since its inception, Tor has offered anonymity for internet users around the world. Tor now offers bridges to help users evade internet censorship, but the primary distribution schemes that provide bridges to users in need have come under attack. This thesis explores how threshold RSA can help strengthen Tor's infrastructure while also enabling more powerful bridge distribution schemes. We implement a basic threshold RSA signature system for the bridge authority and a reputation-based social network design for bridge distribution. Experimental results are obtained showing the possibility of quick responses to requests from honest users while maintaining both the secrecy and …


Programming Dense Linear Algebra Kernels On Vectorized Architectures, Jonathan Lawrence Peyton May 2013

Programming Dense Linear Algebra Kernels On Vectorized Architectures, Jonathan Lawrence Peyton

Masters Theses

The high performance computing (HPC) community is obsessed over the general matrix-matrix multiply (GEMM) routine. This obsession is not without reason. Most, if not all, Level 3 Basic Linear Algebra Subroutines (BLAS) can be written in terms of GEMM, and many of the higher level linear algebra solvers' (i.e., LU, Cholesky) performance depend on GEMM's performance. Getting high performance on GEMM is highly architecture dependent, and so for each new architecture that comes out, GEMM has to be programmed and tested to achieve maximal performance. Also, with emergent computer architectures featuring more vector-based and multi to many-core processors, GEMM performance …


Fuzzy Logic Color Detection: Blue Areas In Dermoscopy Melanoma Images, Mounika Lingala Jan 2013

Fuzzy Logic Color Detection: Blue Areas In Dermoscopy Melanoma Images, Mounika Lingala

Masters Theses

"Malignant melanoma is one of the deadliest forms of skin cancer and is one of the most rapidly increasing cancers in the world. Image analysis techniques for the early detection of melanoma are dependent upon the detection of multiple color shades in melanoma images. Use of magnified visible-light imaging by dermoscopy allows detailed investigation of these color shades. This research explores the fuzzy logic methods for the detection and characterization of blue color shades to discriminate melanoma from benign skin lesions. Standard thresholds are placed on the RGB dermoscopy images firstly and then the restrictiveness is explored by implementing fuzzy …


Uterine Cervical Cancer Histology Image Feature Extraction And Classification, Cheng Lu Jan 2013

Uterine Cervical Cancer Histology Image Feature Extraction And Classification, Cheng Lu

Masters Theses

"Cervical cancer, the second most common cancer affecting women worldwide and the most common in developing countries can be cured in almost all patients, if detected early and treated. However, cervical cancer incidence and mortality remain high in resource-poor regions, where early detection systems often cannot be maintained because of inherent complexity. The National Cancer Institute (NCI) has collected a vast amount of visual information, 100,000 cervigrams (35 mm color slides), screening thousands of women by this technique. In addition to the cervigrams, large digitized histology images are being archived.

In this research, a framework for automatic recognition and classification …


Trough-Silicon-Via Inductor: Is It Real Or Just A Fantasy?, Rongbo Yang Jan 2013

Trough-Silicon-Via Inductor: Is It Real Or Just A Fantasy?, Rongbo Yang

Masters Theses

"Through-silicon-vias (TSVs) can potentially be used to implement inductors in three-dimensional (3D) integrated system for minimal footprint and large inductance. However, different from conventional 2D spiral inductor, TSV inductors are buried in lossy substrate, thus suffering from low quality factors. This thesis presents how various process and design parameters affect their performance. A few interesting phenomena that are unique to TSV inductors are observed. We then proposed a novel shield mechanism utilizing the micro-channel, a technique conventionally used for heat removal, to reduce the substrate loss. The technique increases the quality factor and inductance of the TSV inductor by up …


Automatic Detection Of Polypoid Skin Lesions: The Squash Sign, Saurabh G. Karnik Jan 2013

Automatic Detection Of Polypoid Skin Lesions: The Squash Sign, Saurabh G. Karnik

Masters Theses

“Earlier detection of malignant melanoma can save lives. Automatic in-vivo methods of melanoma detection including smart-phone applications are now available, but specificity is low, i.e. too many benign lesions are detected as possible melanomas. Polypoids, elevated and rounded lesions are one class of benign lesions. These raised lesions with piecewise circular borders, predominantly intradermal nevi and cutaneous polyps (IDNs), are always benign. Variegated coloring present in polypoid lesions can lead physicians to perform an unneeded biopsy. Contact dermatoscope plates with gel squash these lesions, leaving a “squash sign” marker of benignancy which can be automatically detected. We present a method …


Communication Protocols For Integrated Fiber Optic Sensor Interrogator, Tameem Ahmed Khan Jan 2013

Communication Protocols For Integrated Fiber Optic Sensor Interrogator, Tameem Ahmed Khan

Masters Theses

"Fiber optic sensors have gained rapid recognition in sensing environmental factors such as strain, stress, acoustics, pressure, temperature among emerging other sensing applications. Major advantages of fiber based systems are small size, light weight, multiplex-ability of sensors on a single fiber, and immunity to Radio Frequency (RF) interference. However, single most major disadvantage of such technology is that traditionally the interrogation systems are typically bulky and heavy lab only equipment. Embed-ability of sensors into different structures and environments requires that the whole systems (sensors + interrogator) be small, modular and portable. This thesis presents such a custom Fiber optic Sensor …


An Evaluation Of De-Embedding Techniques For Tsvs, Nicholas Garrett Erickson Jan 2013

An Evaluation Of De-Embedding Techniques For Tsvs, Nicholas Garrett Erickson

Masters Theses

"One of the most important aspects of modern electronic designs is device measurement and characterization. Without device measurement and characterization, the functionality of end designs cannot be guaranteed. At the silicon level (on-wafer), extracting the electrical performance of devices and structures has grown increasingly more complex with the continual shrink of feature sizes. Compared to the overall measurement setup (VNA, cables, probes, interposers, etc.), the ultra small size of on-wafer structures leads to their electrical performance being easily overshadowed by other, larger fixtures. Thus, many scientists and engineers have worked to devise ever more accurate calibration and de-embedding techniques for …