8 sonuçlar
Arama Sonuçları
Listeleniyor 1 - 8 / 8
Yayın Volumetric ultrasound imaging using 2-D CMUT arrays(IEEE-Inst Electrical Electronics Engineers Inc, 2003-11) Oralkan, Ömer; Ergün, Arif Sanlı; Cheng, Ching-Hsiang; Johnson, Jeremy A.; Karaman, Mustafa; H. Lee, Thomas; Khuri-Yakub, Butrus ThomasRecently, capacitive micromachined ultrasonic transducers (CMUTs) have emerged as a candidate to overcome the difficulties in the realization of 2-D arrays for real-time 3-D imaging. In this paper, we present the first volumetric images obtained using a 2-D CMUT array. We have fabricated a 128 x 128-element 2-D CMUT array with through-wafer via interconnects and a 420-mum element pitch. As an experimental prototype, a 32 x 64-element portion of the 128 X 128-element array was diced and flip-chip bonded onto a glass fanout chip. This chip provides individual leads from a central 16 X 16-element portion of the array to surrounding bondpads. An 8 x 16-element poition of the array was used in the experiments along with a 128-channel data acquisition system. For imaging phantoms, we used a 2.37-mm diameter steel sphere located 10 mm from the array center and two 12-mm-thick Plexiglas plates located 20 mm and 60 mm from the array. A 4 X 4 group of elements in the middle of the 8 X 16-element array was used in transmit, and the remaining elements were used to receive the echo signals. The echo signal obtained from the spherical target presented a frequency spectrum centered at 4.37 MHz with a 100% fractional bandwidth, whereas the frequency spectrum for the echo signal from the parallel plate phantom was centered at 3.44 MHz with a 91% fractional bandwidth. The images were reconstructed by using RF beamforming and synthetic phased array approaches and visualized by surface rendering and multiplanar slicing techniques. The image of the spherical target has been used to approximate the point spread function of the system and is compared with theoretical expectations. This study experimentally demonstrates that 2-D CMUT arrays can be fabricated with high yield using silicon IC-fabrication processes, individual electrical connections can be provided using through-wafer vias, and flip-chip bonding can be used to integrate these dense 2-D arrays with electronic circuits for practical 3-D imaging applications.Yayın Design and analysis of classifier learning experiments in bioinformatics: survey and case studies(IEEE Computer Soc, 2012-12) İrsoy, Ozan; Yıldız, Olcay Taner; Alpaydın, Ahmet İbrahim EthemIn many bioinformatics applications, it is important to assess and compare the performances of algorithms trained from data, to be able to draw conclusions unaffected by chance and are therefore significant. Both the design of such experiments and the analysis of the resulting data using statistical tests should be done carefully for the results to carry significance. In this paper, we first review the performance measures used in classification, the basics of experiment design and statistical tests. We then give the results of our survey over 1,500 papers published in the last two years in three bioinformatics journals (including this one). Although the basics of experiment design are well understood, such as resampling instead of using a single training set and the use of different performance metrics instead of error, only 21 percent of the papers use any statistical test for comparison. In the third part, we analyze four different scenarios which we encounter frequently in the bioinformatics literature, discussing the proper statistical methodology as well as showing an example case study for each. With the supplementary software, we hope that the guidelines we discuss will play an important role in future studies.Yayın Evolutionary route to diploidy and sex(National Academy of Sciences, 2001-11-20) Tüzel, Erkan; Sevim, Volkan; Erzan, AyşeBy using a bit-string model of evolution, we find a successful route to diploidy and sex in simple organisms. Allowing the sexually reproducing diploid individuals to also perform mitosis, as they do in a haploid-diploid cycle, leads to the complete takeover of the population by sexual diploids. This mechanism is so robust that even the accidental conversion and pairing of only two diploids give rise to a sexual population.Yayın Integration of 2D CMUT arrays with front-end electronics for volumetric ultrasound imaging(IEEE-INST Electrical Electronics Engineers Inc, 2008-02) Wygant, Ira O.; Zhuang, Xuefeng; Yeh, David T.; Oralkan, Ömer; Ergün, Arif Sanlı; Karaman, Mustafa; Khuri-Yakub, Butrus ThomasFor three-dimensional (3D) ultrasound imaging, connecting elements of a two-dimensional (2D) transducer array to the imaging system's front-end electronics is a challenge because of the large number of array elements and the small element size. To compactly connect the transducer array with electronics, we flip-chip bond a 2D 16 x 16-element capacitive micromachined ultrasonic transducer (CMUT) array to a custom-designed integrated circuit (IC). Through-wafer interconnects are used to connect the CMUT elements on the top side of the array with flip-chip bond pads on the back side. The IC provides a 25-V pulser and a transimpedance preamplifier to each element of the array. For each of three characterized devices, the element yield is excellent (99 to 100% of the elements are functional). Center frequencies range from 2.6 MHz to 5.1 MHz. For pulse-echo operation, the average -6-dB fractional bandwidth is as high as 125%. Transmit pressures normalized to the face of the transducer are as high as 339 kPa and input-referred receiver noise is typically 1.2 to 2.1 mPa/root Hz. The flip-chip bonded devices were used to acquire 3D synthetic aperture images of a wire-target phantom. Combining the transducer array and IC, as shown in this paper, allows for better utilization of large arrays, improves receive sensitivity, and may lead to new imaging techniques that depend on transducer arrays that are closely coupled to IC electronics.Yayın Efficient privacy-aware record integration(2013) Kuzu, Mehmet; Kantarcıoğlu, Murat; İnan, Ali; Bertino, Elisa; Durham, Elizabeth Ashley; Malin, Bradley A.The integration of information dispersed among multiple repositories is a crucial step for accurate data analysis in various domains. In support of this goal, it is critical to devise procedures for identifying similar records across distinct data sources. At the same time, to adhere to privacy regulations and policies, such procedures should protect the confidentiality of the individuals to whom the information corresponds. Various private record linkage (PRL) protocols have been proposed to achieve this goal, involving secure multi-party computation (SMC) and similarity preserving data transformation techniques. SMC methods provide secure and accurate solutions to the PRL problem, but are prohibitively expensive in practice, mainly due to excessive computational requirements. Data transformation techniques offer more practical solutions, but incur the cost of information leakage and false matches. In this paper, we introduce a novel model for practical PRL, which 1) affords controlled and limited information leakage, 2) avoids false matches resulting from data transformation. Initially, we partition the data sources into blocks to eliminate comparisons for records that are unlikely to match. Then, to identify matches, we apply an efficient SMC technique between the candidate record pairs. To enable efficiency and privacy, our model leaks a controlled amount of obfuscated data prior to the secure computations. Applied obfuscation relies on differential privacy which provides strong privacy guarantees against adversaries with arbitrary background knowledge. In addition, we illustrate the practical nature of our approach through an empirical analysis with data derived from public voter records.Yayın Minimally redundant 2-D array designs for 3-D medical ultrasound imaging(IEEE-Inst Electrical Electronics Engineers Inc, 2009-07) Karaman, Mustafa; Wygant, Ira O.; Oralkan, Ömer; Khuri-Yakub, Butrus ThomasIn real-time ultrasonic 3-D imaging, in addition to difficulties in fabricating and interconnecting 2-D transducer arrays with hundreds of elements, there are also challenges in acquiring and processing data from a large number of ultrasound channels. The coarray (spatial convolution of the transmit and receive arrays) can be used to find efficient array designs that capture all of the spatial frequency content (a transmit-receive element combination corresponds to a spatial frequency) with a reduced number of active channels and firing events. Eliminating the redundancies in the transmit-receive element combinations and firing events reduces the overall system complexity and improves the frame rate. Here we explore four reduced redundancy 2-D array configurations for miniature 3-D ultrasonic imaging systems. Our approach is based on 1) coarray design with reduced redundancy using different subsets of linear arrays constituting the 2-D transducer array, and 2) 3-D scanning using fan-beams (narrow in one dimension and broad in the other dimension) generated by the transmit linear arrays. We form the overall array response through coherent summation of the individual responses of each transmit-receive array pairs. We present theoretical and simulated point spread functions of the array configurations along with quantitative comparison in terms of the front-end complexity and image quality.Yayın Relocating sensor nodes to maximize cumulative connected coverage in wireless sensor networks(Molecular Diversity Preservation Int, 2008-04) Coşkun, VedatIn order to extend the availability of the wireless sensor network and to extract maximum possible information from the surveillance area, proper usage of the power capacity of the sensor nodes is important. Our work describes a dynamic relocation algorithm called MaxNetLife, which is mainly based on utilizing the remaining power of individual sensor nodes as well as properly relocating sensor nodes so that all sensor nodes can transmit the data they sense to the sink. Hence, the algorithm maximizes total collected information from the surveillance area before the possible death of the sensor network by increasing cumulative connected coverage parameter of the network. A deterministic approach is used to deploy sensor nodes into the sensor field where Hexagonal Grid positioning is used to address and locate each sensor node. Sensor nodes those are not planned to be actively used in the close future in a specific cell are preemptively relocated to the cells those will be in need of additional sensor nodes to improve cumulative connected coverage of the network. MaxNetLife algorithm also includes the details of the relocation activities, which include preemptive migration of the redundant nodes to the cells before any coverage hole occurs because of death of a sensor node. Relocation Model, Data Aggregation Model, and Energy model of the algorithm are studied in detail. MaxNetLife algorithm is proved to be effective, scalable, and applicable through simulations.Yayın Hierarchical secure key assignment scheme(Public Library of Science, 2026-02-18) Çeliktaş, Barış; Çelikbilek, İbrahim; Güzey, Süeda; Özdemir, EnverThis work presents a novel hierarchical key assignment mechanism for access control, designed to be computationally lightweight and optimized for digital environments with structured access policies. By leveraging orthogonal projection and distributing a basis to each group, it enables flexible and efficient left-to-right and top-down access structures. The scheme ensures that parent groups can derive the secret keys of their child groups while preventing unauthorized reverse access. It is resilient against collusion attacks and privilege escalation, offering robust key recovery and indistinguishability properties. Moreover, it guarantees strong key indistinguishability under adversarial models and facilitates a secure rekeying process without reliance on a trusted third party. To demonstrate practical efficiency, we provide a full analytical complexity evaluation showing that key derivation requires at most ∂(n2i ) operations, where ni is the dimension of the assigned subspace. For typical deployment parameters used in the experiments, the total key material per user remains compact (≈ 3,072 bits), significantly smaller than well-known post-quantum schemes such as Dilithium-5 (38,912 bits). The storage requirement scales linearly with the number of groups (ck+1 bases for c groups with at most k members), ensuring that even large hierarchies remain lightweight. Our evaluation further shows that selective rekeying affects only the descendants of the modified group, resulting in communication overhead of ∂(m′λ) bits, where m′ is the number of affected users and λ is the key length. These results collectively highlight the scheme’s scalability, low storage footprint, and suitability for large access hierarchies.












