Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

12,894 Full-Text Articles 16,147 Authors 4,117,996 Downloads 199 Institutions

All Articles in Computer Engineering

Faceted Search

12,894 full-text articles. Page 436 of 437.

Table Of Contents, 2010 Embry-Riddle Aeronautical University

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Data Compression Concepts And Algorithms And Their Applications To Bioinformatics, Ozkan U. Nalbantoglu, David J. Russell, Khalid Sayood 2010 University of Nebraska-Lincoln

Data Compression Concepts And Algorithms And Their Applications To Bioinformatics, Ozkan U. Nalbantoglu, David J. Russell, Khalid Sayood

Faculty Publications from the Department of Electrical and Computer Engineering

Data compression at its base is concerned with how information is organized in data. Understanding this organization can lead to efficient ways of representing the information and hence data compression. In this paper we review the ways in which ideas and approaches fundamental to the theory and practice of data compression have been used in the area of bioinformatics. We look at how basic theoretical ideas from data compression, such as the notions of entropy, mutual information, and complexity have been used for analyzing biological sequences in order to discover hidden patterns, infer phylogenetic relationships between organisms and study viral ...


Discrete Coordinate Transformation For Designing All-Dielectric Flat Antennas, Wenxuan Tang, Christos Argyropoulos, Efthymios Kallos, Wei Song, Yang Hao 2010 University of London

Discrete Coordinate Transformation For Designing All-Dielectric Flat Antennas, Wenxuan Tang, Christos Argyropoulos, Efthymios Kallos, Wei Song, Yang Hao

Faculty Publications from the Department of Electrical and Computer Engineering

Transformation electromagnetics provides a practical approach to control electromagnetic fields at will. Based on this principle, novel devices such as the invisible cloak have been proposed. Here we examine the extension of this technique as applied to the design of flat devices in antenna systems. A method using discrete coordinate transformation is proposed, which allows the conversion of conventional devices with curved shapes into flat systems, while preserving their non-dispersive, isotropic, broadband, and lossless properties. Two specific design examples, a flat reflector and a flat lens embedded in free space, are presented. To avoid the loss and narrow bandwidth issues ...


Bioinformatic Identification And Characterization Of Human Endothelial Cell-Restricted Genes, Manoj Bhasin, Lei Yuan, Derin B. Keskin, Hasan H. Otu, Towia A. Libermann, Peter Oettgen 2010 Harvard Medical School

Bioinformatic Identification And Characterization Of Human Endothelial Cell-Restricted Genes, Manoj Bhasin, Lei Yuan, Derin B. Keskin, Hasan H. Otu, Towia A. Libermann, Peter Oettgen

Faculty Publications from the Department of Electrical and Computer Engineering

Background: In this study, we used a systematic bioinformatics analysis approach to elucidate genes that exhibit an endothelial cell (EC) restricted expression pattern, and began to define their regulation, tissue distribution, and potential biological role.

Results:Using a high throughput microarray platform, a primary set of 1,191 transcripts that are enriched in different primary ECs compared to non-ECs was identified (LCB >3, FDR

Conclusion: The study provides an initial catalogue of EC-restricted genes most of which are ubiquitously expressed in different endothelial cells.


Tob1 Is A Constitutively Expressed Repressor Of Liver Regeneration, Karen J. Ho, Nhue L. Do, Hasan H. Otu, Martin J. Dib, Xianghui Ren, Keiichi Enjyoji, Simon C. Robson, Ernest F. Terwilliger, Seth J. Karp 2010 Beth Israel Deaconess Medical Center

Tob1 Is A Constitutively Expressed Repressor Of Liver Regeneration, Karen J. Ho, Nhue L. Do, Hasan H. Otu, Martin J. Dib, Xianghui Ren, Keiichi Enjyoji, Simon C. Robson, Ernest F. Terwilliger, Seth J. Karp

Faculty Publications from the Department of Electrical and Computer Engineering

How proliferative and inhibitory signals integrate to control liver regeneration remains poorly understood. A screen for antiproliferative factors repressed after liver injury identified transducer of ErbB2.1 (Tob1), a member of the PC3/BTG1 family of mito-inhibitory molecules as a target for further evaluation. Tob1 protein decreases after 2/3 hepatectomy in mice secondary to posttranscriptional mechanisms. Deletion of Tob1 increases hepatocyte proliferation and accelerates restoration of liver mass after hepatectomy. Down-regulation of Tob1 is required for normal liver regeneration, and Tob1 controls hepatocyte proliferation in a dose-dependent fashion. Tob1 associates directly with both Caf1 and cyclindependent kinase (Cdk) 1 ...


Iterative Signal Processing In Communications, Christian Schlegel, Peter Hoeher, Owe Axelsson, Lance C. Pérez 2010 University of Alberta

Iterative Signal Processing In Communications, Christian Schlegel, Peter Hoeher, Owe Axelsson, Lance C. Pérez

Faculty Publications from the Department of Electrical and Computer Engineering

Iterative signal processing in communications has experienced an explosive rise in popularity in recent years. The catalytic origins of this paradigm-shifting new philosophy among communications experts can be traced to the invention of turbo coding, and the subsequent rediscovery of low-density parity check (LDPC) coding, both in the field of error control coding. Both systems rely on iterative decoding algorithms to achieve their astounding performance. However, iterative signal processing is not confined to the decoding of error control codes and rather quickly spread to many other possible applications. The purpose of this special issue is to examine the concept of ...


Graduate Curricula In Software Engineering And Software Assurance: Need And Recommendations, T. B. Hilburn, Andrew J. Kornecki 2010 Embry-Riddle Aeronautical University

Graduate Curricula In Software Engineering And Software Assurance: Need And Recommendations, T. B. Hilburn, Andrew J. Kornecki

Electrical, Computer, Software and Systems Engineering - Daytona Beach

In discussions about the development and use of computer systems and software products, the term “professional software engineer” is used repeatedly. In the last two decades there has been significant effort devoted to enhancing and advancing the state of professional software engineering (SwE) – new software engineering processes, methods, tools, and practices; creation of a software engineering body of knowledge [1]; development of a code of ethics and professional conduct [2], and software certification and licensing programs [3] . In 1989 the Software Engineering Institute (SEI) of Carnegie Mellon University published a landmark report on graduate education in software engineering [4]. The ...


Hardware Certification For Real-Time Safety-Critical Systems: State Of The Art, Andrew J. Kornecki, Janusz Zalewski 2010 Embry-Riddle Aeronautical University

Hardware Certification For Real-Time Safety-Critical Systems: State Of The Art, Andrew J. Kornecki, Janusz Zalewski

Electrical, Computer, Software and Systems Engineering - Daytona Beach

This paper discusses issues related to the RTCA document DO-254 Design Assurance Guidance for Airborne Electronic Hardware and its consequences for hardware certification. In particular, problems related to circuits’ compliance with DO-254 in avionics and other industries are considered. Extensive literature review of the subject is given, including current views on and experiences of chip manufacturers and EDA industry with qualification of hardware design tools, including formal approaches to hardware verification. Some results of the authors’ own study on tool qualification are presented.


Estimating Information Amount Under Uncertainty: Algorithmic Solvability And Computational Complexity, Vladik Kreinovich, Gang Xiang 2010 University of Texas at El Paso

Estimating Information Amount Under Uncertainty: Algorithmic Solvability And Computational Complexity, Vladik Kreinovich, Gang Xiang

Departmental Technical Reports (CS)

Measurement results (and, more generally, estimates) are never absolutely accurate: there is always an uncertainty, the actual value x is, in general, different from the estimate X. Sometimes, we know the probability of different values of the estimation error dx=X-x, sometimes, we only know the interval of possible values of dx, sometimes, we have interval bounds on the cdf of dx. To compare different measuring instruments, it is desirable to know which of them brings more information - i.e., it is desirable to gauge the amount of information. For probabilistic uncertainty, this amount of information is described by Shannon ...


Runtime Assertion Checking For Jml On The Eclipse Platform Using Ast Merging, Amritam Sarcar 2010 University of Texas at El Paso

Runtime Assertion Checking For Jml On The Eclipse Platform Using Ast Merging, Amritam Sarcar

Departmental Technical Reports (CS)

The Java Modeling Language (JML) is a formal behavioral interface specification language for Java. It is used for detailed design documentation of Java program modules such as classes and interfaces. JML has been used extensively by many researchers across various projects and has a large and varied spectrum of tool support. It extends from runtime assertion checking (RAC) to theorem proving.

Amongst these tools, RAC and ESC/Java has been used as a common tool for many research projects. RAC for JML is a tool that checks at runtime for possible violations of any specifications. However, lately there has been ...


Synchronizing Real And Predicted Synthetic Video Imagery For Localization Of A Robot To A 3d Environment, Damian M. Lyons, Sirhan Chaudhry, D. Paul Benjamin 2010 Fordham University

Synchronizing Real And Predicted Synthetic Video Imagery For Localization Of A Robot To A 3d Environment, Damian M. Lyons, Sirhan Chaudhry, D. Paul Benjamin

Faculty Publications

A mobile robot moving in an environment in which there are other moving objects and active agents, some of which may represent threats and some of which may represent collaborators, needs to be able to reason about the potential future behaviors of those objects and agents. In previous work, we presented an approach to tracking targets with complex behavior, leveraging a 3D simulation engine to generate predicted imagery and comparing that against real imagery. We introduced an approach to compare real and simulated imagery using an affine image transformation that maps the real scene to the synthetic scene in a ...


Augmented Reality Navigation Interfaces Improve Human Performance In End-Effector Controlled Telerobotics, Keshav Chintamani 2010 Wayne State University

Augmented Reality Navigation Interfaces Improve Human Performance In End-Effector Controlled Telerobotics, Keshav Chintamani

Wayne State University Dissertations

On the International Space Station (ISS) and space shuttles, the National Aeronautics and Space Administration (NASA) has used robotic manipulators extensively to perform payload handling and maintenance tasks. Teleoperating robots require expert skills and optimal performance is crucial to mission completion and crew safety. Degradation in performance is observed when manual control is mediated through remote camera views, resulting in poor end-effector navigation quality and extended task completion times. This thesis explores the application of three-dimensional augmented reality (AR) interfaces specifically designed to improve human performance during end-effector controlled teleoperations. A modular telerobotic test bed was developed for this purpose ...


Integrated Circuit Implementation For A Gan Hfet Driver Circuit, Bo Wang, Jason D. Bakos, Antonello Monti 2010 University of South Carolina - Columbia

Integrated Circuit Implementation For A Gan Hfet Driver Circuit, Bo Wang, Jason D. Bakos, Antonello Monti

Faculty Publications

This paper presents the design and implementation of a new integrated circuit (IC) that is suitable for driving the new generation of high-frequency GaN HFETs. The circuit, based upon a resonant switching transition technique, is first briefly described and then discussed in detail, focusing on the design process practical considerations. A new level-shifter topology, used to generate the zero and negative gate-source voltages required to switch the GaN HFET, is introduced and analyzed. The experimental measurements included in this paper report the results of tests carried out on an IC designed and fabricated as part of the multiproject die in ...


Genome3d: A Viewer-Model Framework For Integrating And Visualizing Multi-Scale Epigenomic Information Within A Three-Dimensional Genome, Thomas M. Asbury, Matt Mitman, Jijun Tang, W. Jim Zheng 2010 University of South Carolina - Columbia

Genome3d: A Viewer-Model Framework For Integrating And Visualizing Multi-Scale Epigenomic Information Within A Three-Dimensional Genome, Thomas M. Asbury, Matt Mitman, Jijun Tang, W. Jim Zheng

Faculty Publications

Background
New technologies are enabling the measurement of many types of genomic and epigenomic information at scales ranging from the atomic to nuclear. Much of this new data is increasingly structural in nature, and is often difficult to coordinate with other data sets. There is a legitimate need for integrating and visualizing these disparate data sets to reveal structural relationships not apparent when looking at these data in isolation.

Results
We have applied object-oriented technology to develop a downloadable visualization tool, Genome3D, for integrating and displaying epigenomic data within a prescribed three-dimensional physical model of the human genome. In order ...


Some Skepticism About Search Neutrality, James Grimmelmann 2010 University of Maryland Francis King Carey School of Law

Some Skepticism About Search Neutrality, James Grimmelmann

Faculty Scholarship

In the last few years, some search-engine critics have suggested that dominant search engines (i.e. Google) should be subject to “search neutrality” regulations. By analogy to network neutrality, search neutrality would require even-handed treatment in search results: It would prevent search engines from playing favorites among websites. Academics, Google competitors, and public-interest groups have all embraced search neutrality.

Despite this sudden interest, the case for search neutrality is too muddled to be convincing. While “neutrality” is an appealing-sounding principle, it lacks a clear definition. This essay explores no fewer than eight different meanings that search-neutrality advocates have given the ...


A New Class Of Attacks On Time Series Data Mining, Ye Zhu, Yongjian Fu, Huirong Fu 2010 Cleveland State University

A New Class Of Attacks On Time Series Data Mining, Ye Zhu, Yongjian Fu, Huirong Fu

Electrical Engineering & Computer Science Faculty Publications

Traditional research on preserving privacy in data mining focuses on time-invariant privacy issues. With the emergence of time series data mining, traditional snapshot-based privacy issues need to be extended to be multi-dimensional with the addition of time dimension. We find current techniques to preserve privacy in data mining are not effective in preserving time-domain privacy. We present the data flow separation attack on privacy in time series data mining, which is based on blind source separation techniques from statistical signal processing. Our experiments with real data show that this attack is effective. By combining the data flow separation method and ...


Robotic Goal-Based Semi-Autonomous Algorithms Improve Remote Operator Performance, Shawn Hunt 2010 Wayne State University

Robotic Goal-Based Semi-Autonomous Algorithms Improve Remote Operator Performance, Shawn Hunt

Wayne State University Dissertations

The focus of this research was to determine if reliable goal-based semi-autonomous algorithms are able to improve remote operator performance or not. Two semi-autonomous algorithms were examined: visual servoing and visual dead reckoning. Visual servoing uses computer vision techniques to generate movement commands while using internal properties of the camera combined with sensor data that tell the robot its current position based on its previous position. This research shows that the semi-autonomous algorithms developed increased performance in a measurable way. An analysis of tracking algorithms for visual servoing was conducted and tracking algorithms were enhanced to make them as robust ...


Expressiveness Of Streaming String Transducers, Rajeev Alur 2010 University of Pennsylvania

Expressiveness Of Streaming String Transducers, Rajeev Alur

Departmental Papers (CIS)

Streaming string transducers define (partial) functions from input strings to output strings. A streaming string transducer makes a single pass through the input string and uses a finite set of variables that range over strings from the output alphabet. At every step, the transducer processes an input symbol, and updates all the variables in parallel using assignments whose right-hand-sides are concatenations of output symbols and variables with the restriction that a variable can be used at most once in a right-hand-side expression. It has been shown that streaming string transducers operating on strings over infinite data domains are of interest ...


Solid State Drives: The Beginning Of The End For Current Practice In Digital Forensic Recovery?, Graeme B. Bell, Richard Boddington 2010 Murdoch University, Perth

Solid State Drives: The Beginning Of The End For Current Practice In Digital Forensic Recovery?, Graeme B. Bell, Richard Boddington

Journal of Digital Forensics, Security and Law

Digital evidence is increasingly relied upon in computer forensic examinations and legal proceedings in the modern courtroom. The primary storage technology used for digital information has remained constant over the last two decades, in the form of the magnetic disc. Consequently, investigative, forensic, and judicial procedures are well-established for magnetic disc storage devices (Carrier, 2005). However, a paradigm shift has taken place in technology storage and complex, transistor-based devices for primary storage are now increasingly common. Most people are aware of the transition from portable magnetic floppy discs to portable USB transistor flash devices, yet the transition from magnetic hard ...


Forensic Analysis Of The Windows 7 Registry, Khawla A. Alghafli, Andrew Jones, Thomas A. Martin 2010 Khalifa University of Science, Technology and Research (KUSTAR)

Forensic Analysis Of The Windows 7 Registry, Khawla A. Alghafli, Andrew Jones, Thomas A. Martin

Journal of Digital Forensics, Security and Law

The recovery of digital evidence of crimes from storage media is an increasingly time consuming process as the capacity of the storage media is in a state of constant growth. It is also a difficult and complex task for the forensic investigator to analyse all of the locations in the storage media. These two factors, when combined, may result in a delay in bringing a case to court. The concept of this paper is to start the initial forensic analysis of the storage media in locations that are most likely to contain digital evidence, the Windows Registry. Consequently, the forensic ...


Digital Commons powered by bepress