Browsing Department of Electrical and Computer Engineering Graduate Theses by Title
Now showing items 116-135 of 378
-
Efficient Switched-Capacitor Converters
Switched-capacitor (SC) power converters are a class of converters comprised entirely of capacitors and switches. These converters contain no bulky magnetic components and are well suited for miniaturization and silicon ... -
Electrical and Thermal Design of High Efficiency and High Power Density Power Converters
This thesis investigates high power density power converters from two approaches: electrical circuit and module design, and thermal management and mitigation. Three specific topics are studied in this thesis: Point-of-Load ... -
Electromagnetic instrument tracking in computer-assisted interventions
(2014-08-15)Accurate localization of medical instruments with respect to patient anatomy is an integral part of computer-assisted interventions. Electromagnetic tracking is the primary choice, particularly for minimally invasive ... -
Electromagnetic Interference Mitigation in Switched Mode Power Converters Using Digital Sampling Techniques
(2011-11-08)Increasing power density of switch mode power supplies, by increasing their switching frequency has becoming a challenging obstacle for EMI mitigation. The passive EMI suppression technique has always been the primary ... -
Empirical Studies of Clone Mutation and Clone Migration in Clone Genealogies
(2013-09-03)Duplications and changes made on code segments by developers form code clones. Cloned code segments are exactly the same or have a particular similarity. A set of cloned code segments that have the same similarity with ... -
Empirical Studies of Code Clone Genealogies
(2012-01-31)Two identical or similar code fragments form a clone pair. Previous studies have identified cloning as a risky practice. Therefore, a developer needs to be aware of any clone pairs so as to properly propagate any changes ... -
Empirical Studies on Reducing Developers' Effort Spent on Resolving Software Issues
Software issue resolving process is one of the most frequent maintenance activities during the software development process. An issue tracking system (ITS) is often used to better manage the software issues. However, ... -
Enabling Efficient Passive RFID SystemsThrough Modulation Silencing
(2013-05-01)RFID technology has attracted much attention due to its wide range of applications, such as inventory control and object tracking. Passive RFID tags are battery-less, mobile and lack intercommunication. Hence, they require ... -
Energy Constrained Link Adaptation For Multi-hop Relay Networks
(2011-02-09)Wireless Sensor Network (WSN) is a widely researched technology that has applications in a broad variety of fields ranging from medical, industrial, automotive and pharmaceutical to even office and home environments. It ... -
Entangled Between ESL-Ness and Poverty: Acculturation of Students in a Grade 3-4 Class
(2010-04-05)This qualitative case study investigated how an elementary school shaped the acculturation processes of grade 3-4 immigrant students. It was grounded on John Berry’s model of acculturation strategies which maintains that ... -
Estimation and Effects of Imperfect System Parameters on the Performance of Multi-Relay Cooperative Communications Systems
(2012-09-17)To date the majority of research in the area of cooperative communications focuses on maximizing throughput and reliability while assuming perfect channel state information (CSI) and synchronization. This thesis, seeks to ... -
Experimental Validation of an Elastic Registration Algorithm for Ultrasound Images
(2007-10-29)Ultrasound is a favorable tool for intra-operative surgical guidance due to its fast imaging speed and non-invasive nature. However, deformations of the anatomy caused by breathing, heartbeat, and movement of the patient ... -
Fabrication and Optimization of Organic FET and Organic Electrolyte Gated FET Devices for Applications as Label-free Biosensors
Organic Thin-Film Transistors are carbon-based semiconductor devices. Their simple fabrication makes them an ideal candidate for disposable, wearable technologies; an implementation being aptamer-based biosensors. This ... -
Finding Failures in Real-Time Systems Using Realistic Model Scheduling
Model-Driven Engineering (MDE) has developed into an increasingly accepted and established research field. With the widespread use of MDE development methods, the need for analysis of models becomes imperative. One form ... -
Finger Movement Classification Using Forearm EMG Signals
(2008-11-04)To a person with an upper limb amputation or congenital defect, a well-functioning prosthesis can open the door to many work and life opportunities. A fundamental component of many modern prostheses is the myoelectric ... -
Forensic Outlier Detection and Penalty Analysis To Regulate Cognitive Radio Network
(2014-09-27)Cognitive Radio Network (CRN) has emerged as a promising solution to the pseudo scarcity of the spectral congestion problem. In a CRN, the new/Secondary Users (SUs), are allowed to access the spectrum in such a way that ... -
Fountain Codes for Fault Tolerance in Distributed Storage Systems
Modern data storage systems are typically built using hard drives and other components that are prone to failure. The financial, operational and legal impact of data loss is usually quite high, particularly for owners of ... -
A Framework for Radio Resource Management in Heterogeneous Wireless Networks
(2007-10-01)Heterogeneous Wireless Networks (HWNs) are composite networks made of different wireless access technologies, possibly with overlapping coverage. Users with multi-mode terminals in HWNs will be able to initiate connectivity ... -
Frequency Domain Modelling & Design of an LCC Resonant Converter with Capacitive Output Filter
Resonant DC-DC converters have been widely discussed with one of the most popular being the LCC topology. It’s application towards low to high voltage converters warrants the use of a capacitive output filter to limit the ... -
Generalization of a Constraint Based Intrusion Detection System
In a world rampant with cyber crime, Intrusion Detection System(IDS) provides an effective way to grapple with cyber attacks. An IDS is used to monitor the network traffic and generate alerts for any malicious activities ...