Economic Design Of Retaining Wall Using Particle Swarm Optimization With Passive Congregation, 2010 SelectedWorks
Economic Design Of Retaining Wall Using Particle Swarm Optimization With Passive Congregation, Mohammad Khajehzadeh, M R., Taha, A., El-Shafie, Mahdiyeh Eslami
Dr. Mahdiyeh Eslami (مهدیه اسلامی)
No abstract provided.
Adaptive Pid Control Based On Rbf Network Approximating The Satellite Clock Thermal Model, 2010 Nanyang Technological University, Singapore
Adaptive Pid Control Based On Rbf Network Approximating The Satellite Clock Thermal Model, Bin Xu
Bin Xu
The accuracy o f t ime information prov ided by sate llite clock g reat ly depends on its frequency stab ili ty, w hich is up to the stability o f the co re tempera ture. Th is paper introduces an adaptive PID control for the sate llite c lock system whose mode l is approx imated based on RBF neural netw orks. Simu lation resu lts demonstrate the va lid ity o f the proposed contro.l
Some Skepticism About Search Neutrality, 2010 University of Maryland Francis King Carey School of Law
Some Skepticism About Search Neutrality, James Grimmelmann
Faculty Scholarship
In the last few years, some search-engine critics have suggested that dominant search engines (i.e. Google) should be subject to “search neutrality” regulations. By analogy to network neutrality, search neutrality would require even-handed treatment in search results: It would prevent search engines from playing favorites among websites. Academics, Google competitors, and public-interest groups have all embraced search neutrality.
Despite this sudden interest, the case for search neutrality is too muddled to be convincing. While “neutrality” is an appealing-sounding principle, it lacks a clear definition. This essay explores no fewer than eight different meanings that search-neutrality advocates have given the term. …
Runtime Assertion Checking For Jml On The Eclipse Platform Using Ast Merging, 2010 University of Texas at El Paso
Runtime Assertion Checking For Jml On The Eclipse Platform Using Ast Merging, Amritam Sarcar
Departmental Technical Reports (CS)
The Java Modeling Language (JML) is a formal behavioral interface specification language for Java. It is used for detailed design documentation of Java program modules such as classes and interfaces. JML has been used extensively by many researchers across various projects and has a large and varied spectrum of tool support. It extends from runtime assertion checking (RAC) to theorem proving.
Amongst these tools, RAC and ESC/Java has been used as a common tool for many research projects. RAC for JML is a tool that checks at runtime for possible violations of any specifications. However, lately there has been a …
A Subthreshold Reconfigurable Architecture For Harsh Environments, 2010 University of Texas at El Paso
A Subthreshold Reconfigurable Architecture For Harsh Environments, Ameet Chavan
Open Access Theses & Dissertations
Energy harvesting and functional reconfigurability are necessary features in order to simultaneously achieve longer operating lifetimes and versatility in application for many next generation electronic systems. The presented research incorporates capabilities that not only enable applications to self-power from ambience but also permit change in functionality based on real-time application requirements. Currently, many applications are battery powered with custom hardware, which severely confines the application platform. Moreover, maintenance and upgrades are prohibitively expensive, particularly in the case of remote locations with limited accessibility. For harsh environments like Space or the battlefield, apart from features such as low power and reconfigurability, …
A Signal Processing Method To Explore Similarity In Protein Flexibility, 2010 Virginia Commonwealth University
A Signal Processing Method To Explore Similarity In Protein Flexibility, Simina Vasilache, Nazanin Mirshahi, Soo-Yeon Ji, James Mottonen, Donald J. Jacobs, Kayvan Najarian
Computer Science Publications
Understanding mechanisms of protein flexibility is of great importance to structural biology. The ability to detect similarities between proteins and their patterns is vital in discovering new information about unknown protein functions. A Distance Constraint Model (DCM) provides a means to generate a variety of flexibility measures based on a given protein structure. Although information about mechanical properties of flexibility is critical for understanding protein function for a given protein, the question of whether certain characteristics are shared across homologous proteins is difficult to assess. For a proper assessment, a quantified measure of similarity is necessary. This paper begins to …
Application Planning, 2010 CUNY Hunter College
Application Planning, Jochen Albrecht, Clare Davies
Publications and Research
No abstract provided.
Split And Merge Functions For Supporting Multiple Processing Pipelines In Mercury Blastn, 2010 Washington University in St Louis
Split And Merge Functions For Supporting Multiple Processing Pipelines In Mercury Blastn, Jwalant Ahir, Jeremy Buhler, Roger D. Chamberlain
All Computer Science and Engineering Research
Biosequence similarity search is an important application in computational biology. Mercury BLASTN, an FPGA-based implementation of BLAST for DNA, is one of the alternatives for fast DNA sequence comparison. The re-design of BLAST into a streaming application combined with a high-throughput hardware pipeline have enabled Mercury BLAST to emerge as one of the fastest implementations of bio-sequence similarity search. This performance can be further enhanced by exploiting the data-level parallelism present within the application. Here we present a multiple FPGA-based Mercury BLASTN design in order to double the speed and throughput of DNA sequence computation. This paper describes a dual …
Cloud Computing For Scalable Planning By Stochastic Search, 2010 Washington University in St Louis
Cloud Computing For Scalable Planning By Stochastic Search, Qiang Lu, You Xu, Ruoyun Huang, Yixin Chen
All Computer Science and Engineering Research
Graph search has been employed by many AI techniques and applications. A natural way to improve the efficiency of search is to utilize ad- vanced, more powerful computing platforms. However, expensive computing infrastructures, such as supercomputers and large-scale clusters, are traditionally available to only a limited number of projects and researchers. As a results, most AI applications, with access to only commodity com- puters and clusters, cannot benefit from the efficiency improvements of high-performance parallel search algorithms. Cloud computing provides an attractive, highly accessible alternative to other traditional high- performance computing platforms. In this paper, we first show that the …
Against All Probabilities: A Modeling Paradigm For Streaming Applications That Goes Against Common Notions, 2010 Washington University in St Louis
Against All Probabilities: A Modeling Paradigm For Streaming Applications That Goes Against Common Notions, Rahav Dor
All Computer Science and Engineering Research
Hardware and software design requires the right portion of skills and mental faculties. The design of a good system is an exercise in rational thinking, engineering, and art. The design process is further complicated when we aspire to build systems that exploit parallelism or are targeted to be deployed on architecturally diverse computing devices, FPGAs or GPUs to name just a few. The need to develop systems that can take advantage of computing devices beyond general purpose CPUs is real. There are several application domains and research efforts that will simply not be able to adequately perform or yield answers …
Multi-Tier Diversified Service Architecture For Internet 3.0: The Next Generation Internet, 2010 Washington University in St Louis
Multi-Tier Diversified Service Architecture For Internet 3.0: The Next Generation Internet, Subharthi Paul, Raj Jain, Jianli Pan, Chakchai So-In
All Computer Science and Engineering Research
The next generation Internet needs to support multiple diverse application contexts. In this paper, we present Internet 3.0, a diversified, multi-tier architecture for the next generation Internet. Unlike the current Internet, Internet 3.0 defines a new set of primitives that allows diverse applications to compose and optimize their specific contexts over resources belonging to multiple ownerships. The key design philosophy is to enable diversity through explicit representation, negotiation and enforcement of policies at the granularity of network infrastructure, compute resources, data and users. The basis of the Internet 3.0 architecture is a generalized three-tier object model. The bottom tier consists …
Arch: Practical Channel Hopping For Reliable Home-Area Sensor Networks, 2010 Washington University in St Louis
Arch: Practical Channel Hopping For Reliable Home-Area Sensor Networks, Mo Sha, Gregory Hackmann, Chenyang Lu
All Computer Science and Engineering Research
Home area networks (HANs) promise to enable sophisticated home automation applications such as smart energy usage and assisted living. However, recent empirical study of HAN reliability in real-world residential environments revealed significant challenges to achieving reliable performance in the face of significant and variable interference from a multitude of coexisting wireless devices. We propose the Adaptive and Robust Channel Hopping (ARCH) protocol: a lightweight receiveroriented protocol which handles the dynamics of residential environments by reactively channel hopping when channel conditions have degraded. ARCH has several key features. First, ARCH is an adaptive protocol that channel-hops based on changes in channel …
End-To-End Delay Analysis For Fixed Priority Scheduling In Wirelesshart Networks, 2010 Washington University in St Louis
End-To-End Delay Analysis For Fixed Priority Scheduling In Wirelesshart Networks, Abusayeed Saifullah, You Xu, Chenyang Lu, Yixin Chen
All Computer Science and Engineering Research
The WirelessHART standard has been specifically designed for real-time communication between sensor and actuator devices for industrial process monitoring and control. End-to-end communication delay analysis for WirelessHART networks is required for acceptance test of real-time data flows from sensors to actuators and for workload adjustment in response to network dynamics. In this paper, we map the scheduling of real-time periodic data flows in a WirelessHART network to real-time multiprocessor scheduling. We, then, exploit the response time analysis for multiprocessor scheduling and propose a novel method for the end-to-end delay analysis of the real-time flows that are scheduled using a fixed …
Toward A Two-Tier Clinical Warning System For Hospitalized Patients, 2010 Washington University in St Louis
Toward A Two-Tier Clinical Warning System For Hospitalized Patients, Gregory Hackmann, Minmin Chen, Octav Chipara, Chenyang Lu, Yixin Chen, Marin Kollef, Thomas C. Bailey
All Computer Science and Engineering Research
Clinical study has found early detection and intervention to be essential for preventing clinical deterioration in patients at general hospital units. In this paper, we envision a two-tiered early warning system designed to identify the signs of clinical deterioration and provide early warning of serious clinical events. The first tier of the system automatically identifies patients at risk of clinical deterioration from existing electronic medical record databases. The second tier performs real-time clinical event detection based on real-time vital sign data collected from on-body wireless sensors attached to those high-risk patients. We employ machine-learning techniques to analyze data from both …
Computational Public Safety In Emergency Management Communications, 2010 Sheridan College
Computational Public Safety In Emergency Management Communications, Cristina Ribeiro, Alexander Ferworn
Publications and Scholarship
Communications are very important in any situation but in emergency management it is imperative that the communications be reliable and responsive to the evolving situation. In emergency management there are many different types of networks with different objectives. It is of immense value to have the ability to seamlessly integrate other networks and computing resources into one interconnected heterogeneous network. The entire management team should be able to access any of the individual networks and their resources. In this paper we discuss various wireless network communication options in the context of their viability for use in emergency management. We analyze …
Mining Frequent Generalized Patterns For Web Personalization In The Presence Of Taxonomies, 2010 University of Peloponnese, Greece
Mining Frequent Generalized Patterns For Web Personalization In The Presence Of Taxonomies, P. Giannikopoulos, I. Varlamis, Magdalini Eirinaki
Faculty Publications
The Web is a continuously evolving environment, since its content is updated on a regular basis. As a result, the traditional usage-based approach to generate recommendations that takes as input the navigation paths recorded on the Web page level, is not as effective. Moreover, most of the content available online is either explicitly or implicitly characterized by a set of categories organized in a taxonomy, allowing the page-level navigation patterns to be generalized to a higher, aggregate level. In this direction, the authors present the Frequent Generalized Pattern (FGP) algorithm. FGP takes as input the transaction data and a hierarchy …
Incentive Mechanisms In P2p Media Streaming Systems, 2010 San Jose State University
Incentive Mechanisms In P2p Media Streaming Systems, Xiao Su, Suchreet Dhaliwal
Faculty Publications
This paper highlights the need to curb free-riding in P2P media streaming systems and discusses the mechanisms by which this could be accomplished. Free riding, whereby a peer utilizes network resources, but does not contribute services could have a huge impact on the efficacy of blue streaming systems, leading to scalability issues and service degradation. We discuss why BitTorrent-like tit-for-tat mechanisms cannot be simply tailored and used in streaming. Even though the problem of free riding is more severe in P2P media streaming than in file sharing, the deployed systems still lack incentive schemes. In this paper, we categorize, analyze, …
Harvesting Single Ferroelectric Domain Stressed Nanoparticles For Optical And Ferroic Applications, 2010 Air Force Research Laboratory
Harvesting Single Ferroelectric Domain Stressed Nanoparticles For Optical And Ferroic Applications, Gary Cook, J. L. Barnes, S. A. Basun, Dean R. Evans, Ron F. Ziolo, Arturo Ponce, Victor Yu. Reshetnyak, Anatoliy Glushchenko, Partha P. Banerjee
Electrical and Computer Engineering Faculty Publications
We describe techniques to selectively harvest single ferroelectric domain nanoparticles of BaTiO3 as small as 9 nm from a plethora of nanoparticles produced by mechanical grinding. High resolution transmission electron microscopy imaging shows the unidomain atomic structure of the nanoparticles and reveals compressive and tensile surface strains which are attributed to the preservation of ferroelectric behavior in these particles.
We demonstrate the positive benefits of using harvested nanoparticles in disparate liquid crystal systems.
Cs 415-01: Social Implications Of Computing, 2010 Wright State University - Main Campus
Cs 415-01: Social Implications Of Computing, Leo Finkelstein
Computer Science & Engineering Syllabi
CS 415 is a communication skills course using as its subject matter current salient issues associated with the social implications of computing. In addition to the course text, you will need to use certain reading materials in the library and elsewhere, and you will be responsible for using concepts and theories provided in class lectures and discussions.
Cs 302-01: Introduction To Oracle/Sql Databases, 2010 Wright State University - Main Campus
Cs 302-01: Introduction To Oracle/Sql Databases, Karen Meyer
Computer Science & Engineering Syllabi
Relational client server database design and access techniques. Includes building database tables, writing SQL and PL/SQL statements and programs and developing user interfaces using forms and reports.