Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 53521 - 53550 of 58020

Full-Text Articles in Physical Sciences and Mathematics

Architecture, Design, And Implementation Of A Rapidly Prototyped Virtual Environment For A Military Spaceplane, Scott A. Rothermel Dec 1997

Architecture, Design, And Implementation Of A Rapidly Prototyped Virtual Environment For A Military Spaceplane, Scott A. Rothermel

Theses and Dissertations

The new Global Engagement vision places increased emphasis on the Air Force's ability to control and exploit space. A military spaceplane combining reliable access to space, high operational tempos, and multi-mission capabilities is in conceptual stages of development. Virtual environment technology provides an opportunity to investigate system requirements and unconventional interface paradigms for this unique vehicle. A virtual environment architecture and design based on support for a rapid prototyping development process, separation of concerns, and user interface development is presented. The rapid prototyping process allowed management of changing requirements via an evolutionary approach to implementation. Separation of the activities performed …


Breast Cancer Mass Detection Using Difference Of Gaussians And Pulse Coupled Neural Networks, Donald A. Cournoyer Dec 1997

Breast Cancer Mass Detection Using Difference Of Gaussians And Pulse Coupled Neural Networks, Donald A. Cournoyer

Theses and Dissertations

CAD, serving as a second reader, has been shown to improve the success of radiologists at detecting breast cancer. This thesis will develop a new algorithm to identify masses in mammograms. The system developed for this thesis will be capable of assisting a radiologist in making decisions.


A Representational Approach To Knowledge And Multiple Skill Levels For Broad Classes Of Computer Generated Forces, Larry J. Hutson Dec 1997

A Representational Approach To Knowledge And Multiple Skill Levels For Broad Classes Of Computer Generated Forces, Larry J. Hutson

Theses and Dissertations

Current computer generated forces (CGFs) in the 'synthetic battlespace', a training arena used by the military, exhibit several deficiencies. Human actors within the battlespace rapidly identify these CGFs and defeat them using unrealistic and potentially fatal tactics, reducing the overall effectiveness of this training arena. Simulators attached to the synthetic battlespace host local threat systems, leading to training inconsistencies when different simulators display the same threat at different levels of fidelity. Finally, current CGFs are engineered 'from the ground up', often without exploiting commonalities with other existing CGFs, increasing development (and ultimately training) costs. This thesis addresses these issues by …


A Single Chip Low Power Implementation Of An Asynchronous Fft Algorithm For Space Applications, Bruce W. Hunt Dec 1997

A Single Chip Low Power Implementation Of An Asynchronous Fft Algorithm For Space Applications, Bruce W. Hunt

Theses and Dissertations

A fully asynchronous fixed point FFT processor is introduced for low power space applications. The architecture is based on an algorithm developed by Suter and Stevens specifically for a low power implementation. The novelty of this architecture lies in its high localization of components and pipelining with no need to share a global memory. High throughput is attained using large numbers of small, local components working in parallel. A derivation of the algorithm from the discrete Fourier transform is presented followed by a discussion of circuit design parameters specifically, those relevant to space applications. The generic architecture is explained with …


A Model For Determining Information To Be Captured Regarding Unauthorized Computer Entry Of An Air Force Computer System, Leslie F. Himebrook Dec 1997

A Model For Determining Information To Be Captured Regarding Unauthorized Computer Entry Of An Air Force Computer System, Leslie F. Himebrook

Theses and Dissertations

This thesis presents a model of information to capture regarding unauthorized computer systems access attempts. This model takes a management focus, and incorporates the technical focus, intelligence focus, and legal focus as inputs. The author used an exploratory, qualitative methodology consisting of an extensive literature review and interviews with experts in the field. These efforts produced the proposed model, which was reviewed by experts in the field using a delphi technique. The model consists of information that is divided into the following areas: 1. What information was compromised. 2. What type of intrusion occurred. 3. How the intrusion was attempted. …


Requirements, Design And Prototype Of A Virtual User Interface For The Afit Virtual Spaceplane, John M. Lewis Dec 1997

Requirements, Design And Prototype Of A Virtual User Interface For The Afit Virtual Spaceplane, John M. Lewis

Theses and Dissertations

The United States Air Force is evaluating the feasibility of designing a military spaceplane capable of accomplishing military objectives from a low earth orbit and atmospheric flight regimes. Current efforts are involved in determining the scientific, operational, and budgetary constraints associated with this concept. This thesis looks at the exploration of new interface techniques associated with the design of a virtual spaceplane and is a subset of the overall virtual spaceplane effort which will assist researchers in determining the feasibility of a military spaceplane. Interface techniques are integrated into a virtual user interface that is designed to accommodate expected operations …


Modeling And Simulation Support For Parallel Algorithms In A High-Speed Network, Dustin E. Yates Dec 1997

Modeling And Simulation Support For Parallel Algorithms In A High-Speed Network, Dustin E. Yates

Theses and Dissertations

This thesis investigates the ability of a simulation model to compare and contrast parallel processing algorithms in a high-speed network. The model extends existing modeling, analysis, and comparison of parallel algorithms by providing graphics based components that facilitate the measurement of system resources. Simulation components are based on the Myrinet local area network standard. The models provide seven different topologies to contrast the performance of five variations of Fast Fourier Transform (FFT) algorithms. Furthermore, the models were implemented using a commercially developed product that facilitates the testing of additional topologies and the investigation of hardware variations. Accurate comparisons are statistically …


Subjective Quality Of Experience With The Internet: Accounting For Temporal Changes In User Acceptance Of Information Technology, Jason M. Turner Dec 1997

Subjective Quality Of Experience With The Internet: Accounting For Temporal Changes In User Acceptance Of Information Technology, Jason M. Turner

Theses and Dissertations

Contemporary information technology (IT) related research has focused on use as a key dependent measure for valuing IT. By understanding the determinants of IT use, we gain descriptive information about successful IT, and prescriptive information for better deploying IT resources. Although there are several competing theories regarding IT use, research findings often cite their inability to account for temporal changes in usage behaviors. This thesis introduces quality of experience as a potential moderator between the determinants of use and actual usage behaviors. A pilot survey concerning Internet usage generated potentially relevant items which were later refined into a questionnaire assessing …


Microprogramming A Writeable Control Memory Using Very Long Instruction Word (Vliw) Compilation Techniques, Randall S. Whitman Dec 1997

Microprogramming A Writeable Control Memory Using Very Long Instruction Word (Vliw) Compilation Techniques, Randall S. Whitman

Theses and Dissertations

Microprogrammed Digital Signal Processors (DSP) are frequently used as a solution to embedded processor applications. These processors utilize a control memory which permits execution of the processor's instruction set architecture (ISA). The control memory can take the form of a static, read only memory (ROM) or a dynamic, writeable control memory (WCM), or both. Microcoding the WCM permits redefining the processor's ISA and provides speedup due to its instruction level parallelism (ILP) potential. In the past, code generation efforts for microprogrammable processors focused on creating assembly and microcode as two separate steps. In this thesis an alternative approach was chosen …


Flow And Congestion Control For Internet Streaming Applications, Shanwei Cen, Calton Pu, Jonathan Walpole Dec 1997

Flow And Congestion Control For Internet Streaming Applications, Shanwei Cen, Calton Pu, Jonathan Walpole

Computer Science Faculty Publications and Presentations

The emergence of streaming multimedia players provides users with low latency audio and video content over the Internet. Providing high-quality, best-effort, real-time multimedia content requires adaptive delivery schemes that fairly share the available network bandwidth with reliable data protocols such as TCP. This paper proposes a new flow and congestion control scheme, SCP (Streaming Control Protocol) , for real-time streaming of continuous multimedia data across the Internet. The design of SCP arose from several years of experience in building and using adaptive real-time streaming video players. SCP addresses two issues associated with real-time streaming. First, it uses a congestion control …


Ta Da! - The Text Adventure Design Assistant A Visual Tool For The Development Of Adventure Games, Sean Molley Dec 1997

Ta Da! - The Text Adventure Design Assistant A Visual Tool For The Development Of Adventure Games, Sean Molley

Masters Theses & Specialist Projects

In this paper, I survey past and present tools available to text adventure game authors, and then describe a new product: the Text Adventure Design Assistant (TA DA!), a visual programming system for creating text adventure games. My system consists of two parts: an abstract framework which defines an archetypical game, and a user interface which allows for the construction of games in a visual manner by manipulating the elements of the abstract game to produce a concrete design. The two most popular contemporary programming languages for creating text adventure games, TADS and Inform, are compared and contrasted, and my …


Corrigendum To “Post-Surgical Passive Response Of Local Environment To Primary Tumor Removal”: Mathl. Comput. Modelling, Vol. 25, No. 6, Pp. 7–17, 1997, J. A. Adam, C. Bellomo Dec 1997

Corrigendum To “Post-Surgical Passive Response Of Local Environment To Primary Tumor Removal”: Mathl. Comput. Modelling, Vol. 25, No. 6, Pp. 7–17, 1997, J. A. Adam, C. Bellomo

Mathematics & Statistics Faculty Publications

The computer program that was used to generate the graphs for the concentration of inhibitor contained an error. This influenced the scaling in the original Figures 2 and 3. As an example, a sample of the corrected graphs are given below. Copies of other corrected figures can be obtained from the authors. It is important to note that the “pulse” appears for the function rC(r, t). As can be seen, it travels slowly outward with decreasing amplitude. The mathematical analysis in the paper remains unchanged.


Windows 3.X Vs. Windows 95: Get Your Ring-Side Seat, Sonya Shepherd Nov 1997

Windows 3.X Vs. Windows 95: Get Your Ring-Side Seat, Sonya Shepherd

Sonya S. Gaither

No abstract provided.


Combining Multi-Attribute Utility And Geographic Information For Boundary Decisions: An Application To Park Planning, Jeffrey Keisler, Ronald Sundell Nov 1997

Combining Multi-Attribute Utility And Geographic Information For Boundary Decisions: An Application To Park Planning, Jeffrey Keisler, Ronald Sundell

Jeffrey Keisler

The quality and value of an area depend primarily on what is found within
its designated boundaries. To determine the value of such areas in terms of boundaries,
we have developed a methodology for integrating multi-attribute utility functions with
spatial analysis so that desirable, or appropriate, boundaries can be determined on the
basis of the goals and objectives for the park. The key to successful evaluation is the
development of measures for what decision makers value, rather than merely using
what is easily measured. In a detailed example for planning of national parks, the
fundamental objectives are conservation and societal …


Market-Based Resource Control For Mobile Agents, Jonathan Bredin, David Kotz, Daniela Rus Nov 1997

Market-Based Resource Control For Mobile Agents, Jonathan Bredin, David Kotz, Daniela Rus

Computer Science Technical Reports

Mobile agents are programs that can migrate from machine to machine in a heterogeneous, partially disconnected network. As mobile agents move across a network, they consume resources. We discuss a system for controlling the activities of mobile agents that uses electronic cash, a banking system, and a set of resource managers. We describe protocols for transactions between agents. We present fixed-pricing and dynamic-pricing policies for resources. We focus on and analyze the sealed-bid second-price auction as a mechanism for dynamic pricing.


Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 13, Number 9, November 1997, College Of Engineering And Computer Science, Wright State University Nov 1997

Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 13, Number 9, November 1997, College Of Engineering And Computer Science, Wright State University

BITs and PCs Newsletter

A twelve page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.


Vic*: A Compiler For Virtual-Memory C*, Alex Colvin, Thomas H. Cormen Nov 1997

Vic*: A Compiler For Virtual-Memory C*, Alex Colvin, Thomas H. Cormen

Computer Science Technical Reports

This paper describes the functionality of ViC*, a compiler for a variant of the data-parallel language C* with support for out-of-core data. The compiler translates C* programs with shapes declared outofcore, which describe parallel data stored on disk. The compiler output is a SPMD-style program in standard C with I/O and library calls added to efficiently access out-of-core parallel data. The ViC* compiler also applies several program transformations to improve out-of-core data layout and access.


Qos And Reliability Models For Network Computing, Ladislau Bölöni, Kyung Koo Jun, Dan C. Marinescu Nov 1997

Qos And Reliability Models For Network Computing, Ladislau Bölöni, Kyung Koo Jun, Dan C. Marinescu

Department of Computer Science Technical Reports

No abstract provided.


Simulation Study Of Learning Automata Games In Automated Highway Systems, Cem Unsal, Pushkin Kachroo, John S. Bay Nov 1997

Simulation Study Of Learning Automata Games In Automated Highway Systems, Cem Unsal, Pushkin Kachroo, John S. Bay

Electrical & Computer Engineering Faculty Research

One of the most important issues in Automated Highway System (AHS) deployment is intelligent vehicle control. While the technology to safely maneuver vehicles exists, the problem of making intelligent decisions to improve a single vehicle’s travel time and safety while optimizing the overall traffic flow is still a stumbling block. We propose an artificial intelligence technique called stochastic learning automata to design an intelligent vehicle path controller. Using the information obtained by on-board sensors and local communication modules, two automata are capable of learning the best possible (lateral and longitudinal) actions to avoid collisions. This learning method is capable of …


Tertiary Storage In Multimedia Systems: Staging Or Direct Access?, Hwee Hwa Pang Nov 1997

Tertiary Storage In Multimedia Systems: Staging Or Direct Access?, Hwee Hwa Pang

Research Collection School Of Computing and Information Systems

Multimedia applications that are required to manipulate large collections of objects are becoming increasingly common. Moreover, the size of multimedia objects, which are already huge, are getting even bigger as the resolution of output devices improve. As a result, many multimedia storage systems are not likely to be able to keep all of their objects disk-resident. Instead, a majority of the less popular objects have to be off-loaded to tertiary storage to keep costs down. The speed at which objects can be accessed from tertiary storage is thus an important consideration. In this paper, we propose an adaptive data retrieval …


An Investigation Into The Use Of Software Product Metrics For Cobol Systems, Richard E. Boone Nov 1997

An Investigation Into The Use Of Software Product Metrics For Cobol Systems, Richard E. Boone

Theses and Dissertations

This thesis investigated several hypotheses that specific product measures could be used to predict later software lifecycle process or product measures. It collected software product and process measures from four consecutive major releases of a large Cobol legacy system (400K LOC). The types of product measures used were size and specific complexity measures. A statistical software package was used to calculate sample correlation coefficients between the measures. A 95% confidence interval was computed for each sample correlation coefficient that showed a strong or moderate linear correlation. The maintenance process measures provided were manhours used for each program changed or added, …


Updated Measurement Of The Τ Lepton Lifetime, R. Barate, Manoj Thulasidas Nov 1997

Updated Measurement Of The Τ Lepton Lifetime, R. Barate, Manoj Thulasidas

Research Collection School Of Computing and Information Systems

A new measurement of the mean lifetime of the τ lepton is presented. Three different analysis methods are applied to a sample of 90000 τ pairs, collected in 1993 and 1994 with the ALEPH detector at LEP. The average of this measurement and those previously published by ALEPH is ττ = 290.1±1.5±1.1fs.


Searches For Scalar Top And Scalar Bottom Quarks At Lep2, Barate, R.; Et Al., M. Thulasidas Nov 1997

Searches For Scalar Top And Scalar Bottom Quarks At Lep2, Barate, R.; Et Al., M. Thulasidas

Research Collection School Of Computing and Information Systems

Searches for scalar top and bottom quarks have been performed with data collected by the ALEPH detector at LEP. The data sample consists of 21.7 pb−1 taken at √ s = 161, 170, and 172 GeV and 5.7 pb−1 taken at √ s = 130 and 136 GeV. No evidence for scalar top quarks or scalar bottom quarks was found in the channels ˜t → cχ, ˜t → bℓν˜, and b˜ → bχ. For the channel ˜t → cχ a limit of 67 GeV/c 2 has been set on the scalar top quark mass, independent of the mixing angle between …


Task Scheduling In Networks, Cynthia Phillips, Clifford Stein, Joel Wein Nov 1997

Task Scheduling In Networks, Cynthia Phillips, Clifford Stein, Joel Wein

Dartmouth Scholarship

Scheduling a set of tasks on a set of machines so as to yield an efficient schedule is a basic problem in computer science and operations research. Most of the research on this problem incorporates the potentially unrealistic assumption that communication between the different machines is instantaneous. In this paper we remove this assumption and study the problem of network scheduling, where each job originates at some node of a network, and in order to be processed at another node must take the time to travel through the network to that node.

Our main contribution is to give approximation algorithms …


An Integrated Environment For Problem Solving And Program Development, Fadi Pierre Deek Oct 1997

An Integrated Environment For Problem Solving And Program Development, Fadi Pierre Deek

Dissertations

A framework for an integrated problem solving and program development environment that addresses the needs of students learning programming is proposed. Several objectives have been accomplished: defining the tasks required for program development and a literature review to determine the actual difficulties involved in learning those tasks. A comprehensive Study of environments and tools developed to support the learning of problem solving and programming was then performed, covering programming environments, debugging aids, intelligent tutoring systems, and intelligent programming environments. This was followed by a careful analysis and critique of these systems, which uncovered the limitations that have prevented them from …


Algorithms And Tools For Splicing Junction Donor Recognition In Genomic Dna Sequences, Maisheng Yin Oct 1997

Algorithms And Tools For Splicing Junction Donor Recognition In Genomic Dna Sequences, Maisheng Yin

Theses

The consensus sequences at splicing junctions in genomic DNA are required for pre-mRNA breaking and rejoining which must be carried out precisely. Programs currently available for identification or prediction of transcribed sequences from within genomic DNA are far from being powerful enough to elucidate genomic structure completely[4]. In this research, we develop a degenerate pattern match algorithm for 5' splicing site (Donor Site) recognition.. Using the Motif models we developed, we can mine out the degenerate pattern information from the consensus splicing junction sequences. Our experimental results show that, this algorithm can correctly recognize 93% of the total donor sites …


Interactive And Batch Creation Of Oodb Medical Vocabularies, Muhammad Arif Oct 1997

Interactive And Batch Creation Of Oodb Medical Vocabularies, Muhammad Arif

Theses

Controlled vocabularies are becoming popular for knowledge representation and querying. They are particularly helpful in the medical field since they can unify disparate terminologies and provide information in a compact, comprehensible manner. In this thesis, we present a mechanism to create OODB controlled medical vocabularies from flat-file format. We also describe a tool by which a user can interactively create, edit and browse the vocabulary. For better understanding of the structure of the vocabulary we designed our interface as a graphical editor and browser. The user of this interface will typically be a medical expert who either wants to add …


Structured Document Comparison And Scientific Data Mining On The World Wide Web, Philip B. Johnson Oct 1997

Structured Document Comparison And Scientific Data Mining On The World Wide Web, Philip B. Johnson

Theses

The usefulness and accessibility of programs and systems have become important issues for users and researchers alike. A program's usefulness can lw measured by the frequency with which it is used. From the author's or maintainer's point of view, the frequency of usage can be determined by how often a request for the software is received. In the past, a user became aware of a particular tool through various means, and contacted the author or maintainer to obtain a copy of it. This presented difficulties, ranging from language barriers to machine incompatibilities to control of the use of the program. …


Testing Statistical Significance In Sequence Classification Algorithms, Tom Tien-Hua Shih Oct 1997

Testing Statistical Significance In Sequence Classification Algorithms, Tom Tien-Hua Shih

Theses

Multiple sequence alignment has proven to be a successful method of representing and organizing of protein sequence data. It is crucial to medical researches on the structure and function of proteins.

There have been numerous tools published on how to abstract meaningful relationship from an unknown sequence and a set of known sequences. One study used a method for discovering active motifs in a set of related protein sequences. These are meaningful knowledge abstracted from the known protein database since most protein families are characterized by multiple local motifs. Another study abstracts knowledge regarding the input sequence using a preconstructed …


Analysis Of The Protocol For The Handover In A Micro-Cell Packet Switched Mobile Network, Anna M. Thomas Oct 1997

Analysis Of The Protocol For The Handover In A Micro-Cell Packet Switched Mobile Network, Anna M. Thomas

Theses

The overlay of microcells over macrocells offers new opportunities and is cost effective, which makes the handover in such a micro-cellular environment an important issue. The objective of this study is to analyze and prove the truthfulness of a new protocol proposed, which guarantees no packet loss during the handoff. The study here emphasizes on the data integrity issue, since it is the key factor affecting the throughput performance of the transport layer. It is shown that usage of the Internet Protocol leads to packet loss in the presence of handover. Simulation results reveal that the proposed new protocol preserves …