Adaptive Computer‐Generated Forces For Simulator‐Based Training, Expert Systems With Applications, 2013 Singapore Management University
Adaptive Computer‐Generated Forces For Simulator‐Based Training, Expert Systems With Applications, Teck-Hou Teng, Ah-Hwee Tan, Loo-Nin Teow
Research Collection School Of Computing and Information Systems
Simulator-based training is in constant pursuit of increasing level of realism. The transition from doctrine-driven computer-generated forces (CGF) to adaptive CGF represents one such effort. The use of doctrine-driven CGF is fraught with challenges such as modeling of complex expert knowledge and adapting to the trainees’ progress in real time. Therefore, this paper reports on how the use of adaptive CGF can overcome these challenges. Using a self-organizing neural network to implement the adaptive CGF, air combat maneuvering strategies are learned incrementally and generalized in real time. The state space and action space are extracted from the same hierarchical doctrine …
Remote/Autonomous Sentry Gun Platform, 2013 California Polytechnic State University - San Luis Obispo
Remote/Autonomous Sentry Gun Platform, Angelo Gagliardi, Dante Gagliardi
Electrical Engineering
This senior project involves the complete system design and construction of a "Nerf" sentry gun to replace an armed guard. We aimed to develop a compact and highly mobile defense system that allows operational flexibility. The sentry gun can autonomously track and shoot at moving targets, while also allowing a user to remotely access and control the gun via computer. The mobility, hardiness, and functionality of this system allows a reliable replacement for human beings in harsh and hostile environments; ultimately sparing a life.
Face Recognition Using Statistical Adapted Local Binary Patterns., 2013 University of Louisville
Face Recognition Using Statistical Adapted Local Binary Patterns., Abdallah Abd-Elghafar Mohamed
Electronic Theses and Dissertations
Biometrics is the study of methods of recognizing humans based on their behavioral and physical characteristics or traits. Face recognition is one of the biometric modalities that received a great amount of attention from many researchers during the past few decades because of its potential applications in a variety of security domains. Face recognition however is not only concerned with recognizing human faces, but also with recognizing faces of non-biological entities or avatars. Fortunately, the need for secure and affordable virtual worlds is attracting the attention of many researchers who seek to find fast, automatic and reliable ways to identify …
Identifying Emerging Researchers Using Social Network Analysis, 2013 University of Arkansas, Fayetteville
Identifying Emerging Researchers Using Social Network Analysis, Syed Masum Billah
Graduate Theses and Dissertations
Finding rising stars in academia early in their careers has many implications when hiring new faculty, applying for promotion, and/or requesting grants. Typically, the impact and productivity of a researcher are assessed by a popular measurement called the h-index that grows linearly with the academic age of a researcher. Therefore, h-indices of researchers in the early stages of their careers are almost uniformly low, making it difficult to identify those who will, in future, emerge as influential leaders in their field. To overcome this problem, we make use of Social network analysis to identify young researchers most likely to become …
Exploring Multiple Levels Of Performance Modeling For Heterogeneous Systems, 2013 Clemson University
Exploring Multiple Levels Of Performance Modeling For Heterogeneous Systems, Venkittaraman Vivek Pallipuram Krishnamani
All Dissertations
The current trend in High-Performance Computing (HPC) is to extract concurrency from clusters that include heterogeneous resources such as General Purpose Graphical Processing Units (GPGPUs) and Field Programmable Gate Array (FPGAs). Although these heterogeneous systems can provide substantial performance for massively parallel applications, much of the available computing resources are often under-utilized due to inefficient application mapping, load balancing, and tuning. While several performance prediction models exist to efficiently tune applications, they often require significant computing architecture knowledge for reliable prediction. In addition, they do not address multiple levels of design space abstraction and it is often difficult to choose …
Sociallink: A Social Network Based Trust System For P2p File Sharing Systems, 2013 Clemson University
Sociallink: A Social Network Based Trust System For P2p File Sharing Systems, Fang Qi
All Theses
In peer-to-peer (P2P) file sharing systems, many autonomous peers without preexisting trust relationships share files with each other. Due to their open environment and distributed structure, these systems are vulnerable to the significant impact from selfish and misbehaving nodes. Free-riding, whitewash, collusion and Sybil attacks are common and serious threats, which severely harm non-malicious users and degrade the system performance. Many trust systems were proposed for P2P file sharing systems to encourage cooperative behaviors and punish non-cooperative behaviors. However, querying reputation values usually generates latency and overhead for every user. To address this problem, a social network based trust system …
An Open Source, Line Rate Datagram Protocol Facilitating Message Resiliency Over An Imperfect Channel, 2013 University of Arkansas, Fayetteville
An Open Source, Line Rate Datagram Protocol Facilitating Message Resiliency Over An Imperfect Channel, Christina Marie Smith
Graduate Theses and Dissertations
Remote Direct Memory Access (RDMA) is the transfer of data into buffers between two compute nodes that does not require the involvement of a CPU or Operating System (OS). The idea is borrowed from Direct Memory Access (DMA) which allows memory within a compute node to be transferred without transiting through the CPU. RDMA is termed a zero-copy protocol as it eliminates the need to copy data between buffers within the protocol stack. Because of this and other features, RDMA promotes reliable, high throughput and low latency transfer for packet-switched networking. While the benefits of RMDA are well known and …
Parsing Of Natural Language Requirements, 2013 California Polytechnic State University, San Luis Obispo
Parsing Of Natural Language Requirements, Jamie L. Patterson
Master's Theses
The purpose of this thesis was to automate verification of the software requirements for an implantable cardioverter defibrillator with minimal manual rework. The requirements were written in plain English with only loose stylistic constraints. While full automation proved infeasible, many significant advances were made towards solving the problem, including a framework for storing requirements, a program which translates most of the natural language requirements into the framework, and a novel approach to parts of speech analysis.
Design Of A Low Power Cargo Security Device Using A Micropower Ultra-Wideband Impulse Radar, 2013 California Polytechnic State University, San Luis Obispo
Design Of A Low Power Cargo Security Device Using A Micropower Ultra-Wideband Impulse Radar, Brian M. Wihl
Master's Theses
Each year, thousands of cargo containers are broken into during shipping, costing billions of dollars in lost and damaged goods. In addition to removing its contents, intruders can also add unwanted and dangerous materials to a container, posing a threat to National Security. The possibilities of cargo container break-ins require that the containers go through check points at which they are physically searched. These searches often require the opening of the container, unloading and inspecting all cargo, and then loading the container and resealing it. This is a long and costly process.
Because of the high costs of break-ins and …
Measuring The Counter/Assumption Model's Effect On Argumentation Quality, 2013 California Polytechnic State University, San Luis Obispo
Measuring The Counter/Assumption Model's Effect On Argumentation Quality, Evan D G Ovadia
Master's Theses
This thesis presents a new platform called See the Reason, built upon a tree- structured argumentation model called the Counter/Assumption model. In the Counter/Assumption model, a topic is posted first, then under that topic, reasons for and against, and for each reason, counterarguments, and for any counterargu- ment, more counterarguments. The model enables us to systematically determine whether a claim is “tentatively true” or “tentatively false,” in an effort to motivate people to make their side’s claims tentatively true and the opposing side’s claims tentatively false, thus encouraging conflict. Research suggests that debates with more conflict are better, so this …
Analysis Of Social Networks In A Virtual World, 2013 University of Arkansas, Fayetteville
Analysis Of Social Networks In A Virtual World, Gregory Thomas Stafford
Graduate Theses and Dissertations
As three-dimensional virtual environments become both more prevalent and more fragmented, studying how users are connected via their avatars and how they benefit from the virtual world community has become a significant area of research. An in-depth analysis of virtual world Social networks is needed to evaluate how users interact in virtual worlds, to better understand the impact of avatar Social networks on the virtual worlds, and to improve future online Social networks.
Our current efforts are focused on building and exploring the Social network aspects of virtual worlds. In this thesis, we build a Social network of avatars based …
Snail Algorithm For Task Allocation In Mesh Networks, 2013 University of Nevada, Las Vegas
Snail Algorithm For Task Allocation In Mesh Networks, Bartosz Duszel
UNLV Theses, Dissertations, Professional Papers, and Capstones
Topic of this master's thesis is connected with task allocation algorithms and mesh networks. Author of this work has already graduated from Wroclaw, University of Technology (Poland) where during his studies he created software simulation environment for two different task allocation algorithms for mesh networks:Adaptive ScanandFrame Sliding. Those algorithms were compared by two, main parame- ters: simulation time and average mesh fulfillment (utilization level). All simulations were done in software environment which was developed specially for that research. This application was based on few, different types of objects: task (width, height, processing time), task queue (different number of tasks), task …
Computer-Based Stereoscopic Parts Recognition For Robotic Applications, 2013 University of Nevada, Las Vegas
Computer-Based Stereoscopic Parts Recognition For Robotic Applications, Ahmad A. Fayed
UNLV Theses, Dissertations, Professional Papers, and Capstones
Most of robotic handling and assembly operations are based on sensors such as range and touch sensors. In certain circumstances, such as in the presence of ionizing radiation where most customary sensors will degrade over time due to radiation exposure, these sensors won't function properly. Utilizing two or more cameras (stereo vision) located outside the target zone and analyzing their images to identify location and dimensions of parts within the robot workspace is an alternative for using sensors. Object Recognition is affected by the light condition which oftentimes causes the gray-scale or red, green, and blue values to have a …
Nonlinear Adaptive Diffusion Models For Image Denoising, 2013 University of Nevada, Las Vegas
Nonlinear Adaptive Diffusion Models For Image Denoising, Ajay Kumar Mandava
UNLV Theses, Dissertations, Professional Papers, and Capstones
Most of digital image applications demand on high image quality. Unfortunately, images often are degraded by noise during the formation, transmission, and recording processes. Hence, image denoising is an essential processing step preceding visual and automated analyses. Image denoising methods can reduce image contrast, create block or ring artifacts in the process of denoising. In this dissertation, we develop high performance non-linear diffusion based image denoising methods, capable to preserve edges and maintain high visual quality. This is attained by different approaches: First, a nonlinear diffusion is presented with robust M-estimators as diffusivity functions. Secondly, the knowledge of textons derived …
On High-Performance Parallel Fixed-Point Decimal Multiplier Designs, 2013 University of Nevada, Las Vegas
On High-Performance Parallel Fixed-Point Decimal Multiplier Designs, Ming Zhu
UNLV Theses, Dissertations, Professional Papers, and Capstones
High-performance, area-efficient hardware implementation of decimal multiplication is preferred to slow software simulations in a number of key scientific and financial application areas, where errors caused by converting decimal numbers into their approximate binary representations are not acceptable.
Multi-digit parallel decimal multipliers involve two major stages: (i) the partial product generation (PPG) stage, where decimal partial products are determined by selecting the right versions of the pre-computed multiples of the multiplicand, followed by (ii) the partial product accumulation (PPA) stage, where all the partial products are shifted and then added together to obtain the final multiplication product. In this thesis, …
Clustering And Classification Of Multi-Domain Proteins, 2013 University of Nebraska-Lincoln
Clustering And Classification Of Multi-Domain Proteins, Neethu Shah
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Rapid development of next-generation sequencing technology has led to an unprecedented growth in protein sequence data repositories over the last decade. Majority of these proteins lack structural and functional characterization. This necessitates design and development of fast, efficient, and sensitive computational tools and algorithms that can classify these proteins into functionally coherent groups.
Domains are fundamental units of protein structure and function. Multi-domain proteins are extremely complex as opposed to proteins that have single or no domains. They exhibit network-like complex evolutionary events such as domain shuffling, domain loss, and domain gain. These events therefore, cannot be represented in the …
A Study On Countermeasures Against Steganography: An Active Warden Approach, 2013 University of Nebraska-Lincoln
A Study On Countermeasures Against Steganography: An Active Warden Approach, Qilin Qi
Computer and Electronics Engineering: Dissertations, Theses, and Student Research
Digital steganography is a method used for hiding information in digital images. It can be used for secure communication. There have been many robust digital steganography methods invented in recent decades. The steganographic message can be inserted in multimedia cover signal such as audio, image and video. However, this technique also may be used by malicious users to transmit dangerous information through the Internet beyond the control of security agencies. How to detect and/or block potentially dangerous information transmission on the Internet through billions of multimedia files while not affecting innocent multimedia communications becomes a challenging problem. Existing steganalysis methods …
An Inter-Domain Supervision Framework For Collaborative Clustering Of Data With Mixed Types., 2013 University of Louisville
An Inter-Domain Supervision Framework For Collaborative Clustering Of Data With Mixed Types., Artur Abdullin
Electronic Theses and Dissertations
We propose an Inter-Domain Supervision (IDS) clustering framework to discover clusters within diverse data formats, mixed-type attributes and different sources of data. This approach can be used for combined clustering of diverse representations of the data, in particular where data comes from different sources, some of which may be unreliable or uncertain, or for exploiting optional external concept set labels to guide the clustering of the main data set in its original domain. We additionally take into account possible incompatibilities in the data via an automated inter-domain compatibility analysis. Our results in clustering real data sets with mixed numerical, categorical, …
A Problem Solving Approach To Enterprise Filevault 2 Management And Integration, 2013 Western Kentucky University
A Problem Solving Approach To Enterprise Filevault 2 Management And Integration, Nicholas Cobb
Masters Theses & Specialist Projects
Consumer technology adoption into large enterprise environments is occurring at an unprecedented rate. Employees require the flexibility and efficiency of using operating systems, computers, and mobility products they are familiar with and that enable their productivity. Due to this industry phenomenon, one large shipping enterprise must work to create solutions to integrate Apple’s OS X operating system into its traditional Windows-based operating environment. This level of integration must take place carefully to enable usability and foster the continued data security of enterprise assets. This paper describes the steps and methodology taken, as well as the rationale used, to accomplish the …
Synergy Of The Developed 6d Bim Framework And Conception Of The Nd Bim Framework And Nd Bim Process Ontology, 2013 University of Southern Mississippi
Synergy Of The Developed 6d Bim Framework And Conception Of The Nd Bim Framework And Nd Bim Process Ontology, Shawn Edward O'Keeffe
Dissertations
The author developed a unified nD framework and process ontology for Building Information Modeling (BIM). The research includes a framework developed for 6D BIM, nD BIM, and nD ontology that defines the domain and sub-domain constructs for future nD BIM dimensions. The nD ontology defines the relationships of kinds within any new proposed dimensional domain for BIM. The developed nD BIM framework and ontology takes into account the current 2D-5D BIM dimensions. There is a synergy between the 6D and nD framework that allows the nD framework and ontology to be utilized as a unified template for future dimensional development. …