Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

University of Texas Rio Grande Valley

2015

Applied sciences

Articles 1 - 7 of 7

Full-Text Articles in Engineering

A Handcrafted Multi-Branch Nerve Scaffold For In Vivo Peripheral Nerve Regeneration, Ridwan Fayaz Hossain Dec 2015

A Handcrafted Multi-Branch Nerve Scaffold For In Vivo Peripheral Nerve Regeneration, Ridwan Fayaz Hossain

Theses and Dissertations

Arm and leg peripheral nerve injuries contribute largely to functional disability. These injuries seldom affect a single-line nerve; rather the injury goes beyond and disrupts the nerve tissue across multiple nerve paths. Here we investigate handcrafted PDMS based multi-branch nerve guidance conduit, which addresses this crucial branching from the sciatic nerve to aid with the regeneration to their appropriate distal targets. The design concept of the developed multiple branch nerve scaffolds is not specific for the sciatic nerve but can be modified for general use of all peripheral nerves and additional applications. Microchannels are also fabricated into a device in …


Pdms Microchannel Scaffolds For The Isolation Of Individual Axon Regeneration, Bong Kyun Kim May 2015

Pdms Microchannel Scaffolds For The Isolation Of Individual Axon Regeneration, Bong Kyun Kim

Theses and Dissertations - UTB/UTPA

Injuries to the peripheral nervous system often result in the loss of sensory or motor function within the effected nerve. Nerve scaffolds provide the mechanical support and topographical cues to axon regeneration such that the gap within the injured nerve is bridged and functional recovery is restored. The Microchannel Peripheral Nerve Scaffold, µPNS, was fabricated from PDMS using micromachining techniques that allow for the unprecedented control of microchannel dimensions and paths and therefore, the production of highly customizable Nerve scaffolds for peripheral nerve regeneration applications. The device was then implanted within the sciatic nerves of a series of Lewis rats, …


Security Integrity Of Ekg Signal Monitoring Under Different Network Attack Conditions, Raghava Teja Pingali May 2015

Security Integrity Of Ekg Signal Monitoring Under Different Network Attack Conditions, Raghava Teja Pingali

Theses and Dissertations - UTB/UTPA

This thesis focuses on issues related with monitoring of EKG signals under different network attack traffic conditions. It is becoming common for modern hospitals to monitor real time EKG signals of patients on computers that are usually connected to networks. If the network suffers with attack conditions, it can affect connected computers and alter EKG signals monitoring, hence raising false alarms. Denial of Service attacks may silently affect the real time monitoring of EKG signals. Altering of EKG signals may result in loss of integrity and it can violate CIA triad of security. In this thesis, different attack conditions were …


Improving Queueing Implementation On High Speed Switches, Wendy Hernandez May 2015

Improving Queueing Implementation On High Speed Switches, Wendy Hernandez

Theses and Dissertations - UTB/UTPA

In this thesis two different conventional shared memory allocation schemes - Dynamic Threshold (DT) and Threshold-based Filtering (TF) - are evaluated under varied traffic conditions in order to determine the optimal configuration for each tested scenario. The effect that a changing ABL, load, and ratio between buffer size and ports have on the packet loss is observed for buffer sharing schemes DT and TF schemes. This allowed to easily determining the Alpha and Thresholds required by DT and TF schemes respectively to obtain an optimal configuration under each of the different tested scenarios. A new shared memory allocation scheme referred …


Distributed Coordinate Tracking Control Of Multiple Wheeled Mobile Robots, Yifan Xing May 2015

Distributed Coordinate Tracking Control Of Multiple Wheeled Mobile Robots, Yifan Xing

Theses and Dissertations - UTB/UTPA

In this thesis, distributed coordinate tracking control of multiple wheeled-mobile robots is studied. Control algorithms are proposed for both kinematic and dynamic models. All vehicle agents share the same mechanical structure. The communication topology is leader-follower topology and the reference signal is generated by the virtual leader. We will introduce two common kinematic models of WMR and control algorithms are proposed for both kinematic models with the aid of graph theory. Since it is more realistic that the control inputs are torques so dynamic extension is studied following by the kinematics. Torque controllers are designed with the aid of backstepping …


Electrocardiogram Data Collection Under Network Attacks On The Mac Platform, Golshan Famitafreshi May 2015

Electrocardiogram Data Collection Under Network Attacks On The Mac Platform, Golshan Famitafreshi

Theses and Dissertations - UTB/UTPA

Increasing heart disease among human beings needs more precise treatment, which requires monitoring of electrocardiogram (ECG). In many cases, real time monitoring of ECG is needed via wireless or wireline networks. Use of network-connected computers for monitoring proposes can raise security issues, which can be created by viruses, worms, or external agents such as DoS attack traffic. Any alteration of this biomedical signal can lead to wrong diagnosis and wrong treatment. Furthermore, in healthcare industry, HIPAA rules require health information to be kept secure by providing confidentiality, integrity, and availability. This thesis investigates how integrity and availability of remotely monitored …


Evaluation Of Security Vulnerabilities Of Popular Computer And Server Operating Systems Under Cyber Attacks, Rodolfo Baez Jr. May 2015

Evaluation Of Security Vulnerabilities Of Popular Computer And Server Operating Systems Under Cyber Attacks, Rodolfo Baez Jr.

Theses and Dissertations - UTB/UTPA

Nowadays many operating systems are including security features in order to prevent network attacks, and since one of the roles of the OS is to manage the resources as efficient as possible. It is imperative to investigate the protection that is provided. Therefore, the scientific significance of this thesis was to evaluate, what type of built-in defense mechanisms that different OS’s had in place in order to mitigate these network attacks. In this thesis, we considered the security of the following globally deployed computer OS’s: Microsoft’s Windows 7, Apple’s OS X Lion, and Ubuntu 13.10. Furthermore, we also tested four …