Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

23,692 Full-Text Articles 38,598 Authors 8,340,641 Downloads 266 Institutions

All Articles in Computer Engineering

Faceted Search

23,692 full-text articles. Page 925 of 935.

Economic Design Of Retaining Wall Using Particle Swarm Optimization With Passive Congregation, Mohammad Khajehzadeh, M R., Taha, A., El-shafie, Mahdiyeh Eslami 2010 SelectedWorks

Economic Design Of Retaining Wall Using Particle Swarm Optimization With Passive Congregation, Mohammad Khajehzadeh, M R., Taha, A., El-Shafie, Mahdiyeh Eslami

Dr. Mahdiyeh Eslami (مهدیه اسلامی)

No abstract provided.


Adaptive Pid Control Based On Rbf Network Approximating The Satellite Clock Thermal Model, Bin Xu 2010 Nanyang Technological University, Singapore

Adaptive Pid Control Based On Rbf Network Approximating The Satellite Clock Thermal Model, Bin Xu

Bin Xu

The accuracy o f t ime information prov ided by sate llite clock g reat ly depends on its frequency stab ili􀀁 ty, w hich is up to the stability o f the co re tempera ture. Th is paper introduces an adaptive PID control for the sate llite c lock system whose mode l is approx imated based on RBF neural netw orks. Simu lation resu lts demonstrate the va lid ity o f the proposed contro.l


Some Skepticism About Search Neutrality, James Grimmelmann 2010 University of Maryland Francis King Carey School of Law

Some Skepticism About Search Neutrality, James Grimmelmann

Faculty Scholarship

In the last few years, some search-engine critics have suggested that dominant search engines (i.e. Google) should be subject to “search neutrality” regulations. By analogy to network neutrality, search neutrality would require even-handed treatment in search results: It would prevent search engines from playing favorites among websites. Academics, Google competitors, and public-interest groups have all embraced search neutrality.

Despite this sudden interest, the case for search neutrality is too muddled to be convincing. While “neutrality” is an appealing-sounding principle, it lacks a clear definition. This essay explores no fewer than eight different meanings that search-neutrality advocates have given the term. …


Runtime Assertion Checking For Jml On The Eclipse Platform Using Ast Merging, Amritam Sarcar 2010 University of Texas at El Paso

Runtime Assertion Checking For Jml On The Eclipse Platform Using Ast Merging, Amritam Sarcar

Departmental Technical Reports (CS)

The Java Modeling Language (JML) is a formal behavioral interface specification language for Java. It is used for detailed design documentation of Java program modules such as classes and interfaces. JML has been used extensively by many researchers across various projects and has a large and varied spectrum of tool support. It extends from runtime assertion checking (RAC) to theorem proving.

Amongst these tools, RAC and ESC/Java has been used as a common tool for many research projects. RAC for JML is a tool that checks at runtime for possible violations of any specifications. However, lately there has been a …


A Subthreshold Reconfigurable Architecture For Harsh Environments, Ameet Chavan 2010 University of Texas at El Paso

A Subthreshold Reconfigurable Architecture For Harsh Environments, Ameet Chavan

Open Access Theses & Dissertations

Energy harvesting and functional reconfigurability are necessary features in order to simultaneously achieve longer operating lifetimes and versatility in application for many next generation electronic systems. The presented research incorporates capabilities that not only enable applications to self-power from ambience but also permit change in functionality based on real-time application requirements. Currently, many applications are battery powered with custom hardware, which severely confines the application platform. Moreover, maintenance and upgrades are prohibitively expensive, particularly in the case of remote locations with limited accessibility. For harsh environments like Space or the battlefield, apart from features such as low power and reconfigurability, …


A Signal Processing Method To Explore Similarity In Protein Flexibility, Simina Vasilache, Nazanin Mirshahi, Soo-Yeon Ji, James Mottonen, Donald J. Jacobs, Kayvan Najarian 2010 Virginia Commonwealth University

A Signal Processing Method To Explore Similarity In Protein Flexibility, Simina Vasilache, Nazanin Mirshahi, Soo-Yeon Ji, James Mottonen, Donald J. Jacobs, Kayvan Najarian

Computer Science Publications

Understanding mechanisms of protein flexibility is of great importance to structural biology. The ability to detect similarities between proteins and their patterns is vital in discovering new information about unknown protein functions. A Distance Constraint Model (DCM) provides a means to generate a variety of flexibility measures based on a given protein structure. Although information about mechanical properties of flexibility is critical for understanding protein function for a given protein, the question of whether certain characteristics are shared across homologous proteins is difficult to assess. For a proper assessment, a quantified measure of similarity is necessary. This paper begins to …


Application Planning, Jochen Albrecht, Clare Davies 2010 CUNY Hunter College

Application Planning, Jochen Albrecht, Clare Davies

Publications and Research

No abstract provided.


Split And Merge Functions For Supporting Multiple Processing Pipelines In Mercury Blastn, Jwalant Ahir, Jeremy Buhler, Roger D. Chamberlain 2010 Washington University in St Louis

Split And Merge Functions For Supporting Multiple Processing Pipelines In Mercury Blastn, Jwalant Ahir, Jeremy Buhler, Roger D. Chamberlain

All Computer Science and Engineering Research

Biosequence similarity search is an important application in computational biology. Mercury BLASTN, an FPGA-based implementation of BLAST for DNA, is one of the alternatives for fast DNA sequence comparison. The re-design of BLAST into a streaming application combined with a high-throughput hardware pipeline have enabled Mercury BLAST to emerge as one of the fastest implementations of bio-sequence similarity search. This performance can be further enhanced by exploiting the data-level parallelism present within the application. Here we present a multiple FPGA-based Mercury BLASTN design in order to double the speed and throughput of DNA sequence computation. This paper describes a dual …


Cloud Computing For Scalable Planning By Stochastic Search, Qiang Lu, You Xu, Ruoyun Huang, Yixin Chen 2010 Washington University in St Louis

Cloud Computing For Scalable Planning By Stochastic Search, Qiang Lu, You Xu, Ruoyun Huang, Yixin Chen

All Computer Science and Engineering Research

Graph search has been employed by many AI techniques and applications. A natural way to improve the efficiency of search is to utilize ad- vanced, more powerful computing platforms. However, expensive computing infrastructures, such as supercomputers and large-scale clusters, are traditionally available to only a limited number of projects and researchers. As a results, most AI applications, with access to only commodity com- puters and clusters, cannot benefit from the efficiency improvements of high-performance parallel search algorithms. Cloud computing provides an attractive, highly accessible alternative to other traditional high- performance computing platforms. In this paper, we first show that the …


Against All Probabilities: A Modeling Paradigm For Streaming Applications That Goes Against Common Notions, Rahav Dor 2010 Washington University in St Louis

Against All Probabilities: A Modeling Paradigm For Streaming Applications That Goes Against Common Notions, Rahav Dor

All Computer Science and Engineering Research

Hardware and software design requires the right portion of skills and mental faculties. The design of a good system is an exercise in rational thinking, engineering, and art. The design process is further complicated when we aspire to build systems that exploit parallelism or are targeted to be deployed on architecturally diverse computing devices, FPGAs or GPUs to name just a few. The need to develop systems that can take advantage of computing devices beyond general purpose CPUs is real. There are several application domains and research efforts that will simply not be able to adequately perform or yield answers …


Multi-Tier Diversified Service Architecture For Internet 3.0: The Next Generation Internet, Subharthi Paul, Raj Jain, Jianli Pan, Chakchai So-in 2010 Washington University in St Louis

Multi-Tier Diversified Service Architecture For Internet 3.0: The Next Generation Internet, Subharthi Paul, Raj Jain, Jianli Pan, Chakchai So-In

All Computer Science and Engineering Research

The next generation Internet needs to support multiple diverse application contexts. In this paper, we present Internet 3.0, a diversified, multi-tier architecture for the next generation Internet. Unlike the current Internet, Internet 3.0 defines a new set of primitives that allows diverse applications to compose and optimize their specific contexts over resources belonging to multiple ownerships. The key design philosophy is to enable diversity through explicit representation, negotiation and enforcement of policies at the granularity of network infrastructure, compute resources, data and users. The basis of the Internet 3.0 architecture is a generalized three-tier object model. The bottom tier consists …


Arch: Practical Channel Hopping For Reliable Home-Area Sensor Networks, Mo Sha, Gregory Hackmann, Chenyang Lu 2010 Washington University in St Louis

Arch: Practical Channel Hopping For Reliable Home-Area Sensor Networks, Mo Sha, Gregory Hackmann, Chenyang Lu

All Computer Science and Engineering Research

Home area networks (HANs) promise to enable sophisticated home automation applications such as smart energy usage and assisted living. However, recent empirical study of HAN reliability in real-world residential environments revealed significant challenges to achieving reliable performance in the face of significant and variable interference from a multitude of coexisting wireless devices. We propose the Adaptive and Robust Channel Hopping (ARCH) protocol: a lightweight receiveroriented protocol which handles the dynamics of residential environments by reactively channel hopping when channel conditions have degraded. ARCH has several key features. First, ARCH is an adaptive protocol that channel-hops based on changes in channel …


End-To-End Delay Analysis For Fixed Priority Scheduling In Wirelesshart Networks, Abusayeed Saifullah, You Xu, Chenyang Lu, Yixin Chen 2010 Washington University in St Louis

End-To-End Delay Analysis For Fixed Priority Scheduling In Wirelesshart Networks, Abusayeed Saifullah, You Xu, Chenyang Lu, Yixin Chen

All Computer Science and Engineering Research

The WirelessHART standard has been specifically designed for real-time communication between sensor and actuator devices for industrial process monitoring and control. End-to-end communication delay analysis for WirelessHART networks is required for acceptance test of real-time data flows from sensors to actuators and for workload adjustment in response to network dynamics. In this paper, we map the scheduling of real-time periodic data flows in a WirelessHART network to real-time multiprocessor scheduling. We, then, exploit the response time analysis for multiprocessor scheduling and propose a novel method for the end-to-end delay analysis of the real-time flows that are scheduled using a fixed …


Toward A Two-Tier Clinical Warning System For Hospitalized Patients, Gregory Hackmann, Minmin Chen, Octav Chipara, Chenyang Lu, Yixin Chen, Marin Kollef, Thomas C. Bailey 2010 Washington University in St Louis

Toward A Two-Tier Clinical Warning System For Hospitalized Patients, Gregory Hackmann, Minmin Chen, Octav Chipara, Chenyang Lu, Yixin Chen, Marin Kollef, Thomas C. Bailey

All Computer Science and Engineering Research

Clinical study has found early detection and intervention to be essential for preventing clinical deterioration in patients at general hospital units. In this paper, we envision a two-tiered early warning system designed to identify the signs of clinical deterioration and provide early warning of serious clinical events. The first tier of the system automatically identifies patients at risk of clinical deterioration from existing electronic medical record databases. The second tier performs real-time clinical event detection based on real-time vital sign data collected from on-body wireless sensors attached to those high-risk patients. We employ machine-learning techniques to analyze data from both …


Computational Public Safety In Emergency Management Communications, Cristina Ribeiro, Alexander Ferworn 2010 Sheridan College

Computational Public Safety In Emergency Management Communications, Cristina Ribeiro, Alexander Ferworn

Publications and Scholarship

Communications are very important in any situation but in emergency management it is imperative that the communications be reliable and responsive to the evolving situation. In emergency management there are many different types of networks with different objectives. It is of immense value to have the ability to seamlessly integrate other networks and computing resources into one interconnected heterogeneous network. The entire management team should be able to access any of the individual networks and their resources. In this paper we discuss various wireless network communication options in the context of their viability for use in emergency management. We analyze …


Mining Frequent Generalized Patterns For Web Personalization In The Presence Of Taxonomies, P. Giannikopoulos, I. Varlamis, Magdalini Eirinaki 2010 University of Peloponnese, Greece

Mining Frequent Generalized Patterns For Web Personalization In The Presence Of Taxonomies, P. Giannikopoulos, I. Varlamis, Magdalini Eirinaki

Faculty Publications

The Web is a continuously evolving environment, since its content is updated on a regular basis. As a result, the traditional usage-based approach to generate recommendations that takes as input the navigation paths recorded on the Web page level, is not as effective. Moreover, most of the content available online is either explicitly or implicitly characterized by a set of categories organized in a taxonomy, allowing the page-level navigation patterns to be generalized to a higher, aggregate level. In this direction, the authors present the Frequent Generalized Pattern (FGP) algorithm. FGP takes as input the transaction data and a hierarchy …


Incentive Mechanisms In P2p Media Streaming Systems, Xiao Su, Suchreet Dhaliwal 2010 San Jose State University

Incentive Mechanisms In P2p Media Streaming Systems, Xiao Su, Suchreet Dhaliwal

Faculty Publications

This paper highlights the need to curb free-riding in P2P media streaming systems and discusses the mechanisms by which this could be accomplished. Free riding, whereby a peer utilizes network resources, but does not contribute services could have a huge impact on the efficacy of blue streaming systems, leading to scalability issues and service degradation. We discuss why BitTorrent-like tit-for-tat mechanisms cannot be simply tailored and used in streaming. Even though the problem of free riding is more severe in P2P media streaming than in file sharing, the deployed systems still lack incentive schemes. In this paper, we categorize, analyze, …


Harvesting Single Ferroelectric Domain Stressed Nanoparticles For Optical And Ferroic Applications, Gary Cook, J. L. Barnes, S. A. Basun, Dean R. Evans, Ron F. Ziolo, Arturo Ponce, Victor Yu. Reshetnyak, Anatoliy Glushchenko, Partha P. Banerjee 2010 Air Force Research Laboratory

Harvesting Single Ferroelectric Domain Stressed Nanoparticles For Optical And Ferroic Applications, Gary Cook, J. L. Barnes, S. A. Basun, Dean R. Evans, Ron F. Ziolo, Arturo Ponce, Victor Yu. Reshetnyak, Anatoliy Glushchenko, Partha P. Banerjee

Electrical and Computer Engineering Faculty Publications

We describe techniques to selectively harvest single ferroelectric domain nanoparticles of BaTiO3 as small as 9 nm from a plethora of nanoparticles produced by mechanical grinding. High resolution transmission electron microscopy imaging shows the unidomain atomic structure of the nanoparticles and reveals compressive and tensile surface strains which are attributed to the preservation of ferroelectric behavior in these particles.

We demonstrate the positive benefits of using harvested nanoparticles in disparate liquid crystal systems.


Cs 415-01: Social Implications Of Computing, Leo Finkelstein 2010 Wright State University - Main Campus

Cs 415-01: Social Implications Of Computing, Leo Finkelstein

Computer Science & Engineering Syllabi

CS 415 is a communication skills course using as its subject matter current salient issues associated with the social implications of computing. In addition to the course text, you will need to use certain reading materials in the library and elsewhere, and you will be responsible for using concepts and theories provided in class lectures and discussions.


Cs 302-01: Introduction To Oracle/Sql Databases, Karen Meyer 2010 Wright State University - Main Campus

Cs 302-01: Introduction To Oracle/Sql Databases, Karen Meyer

Computer Science & Engineering Syllabi

Relational client server database design and access techniques. Includes building database tables, writing SQL and PL/SQL statements and programs and developing user interfaces using forms and reports.


Digital Commons powered by bepress