Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

1997

Computer Sciences

Institution
Keyword
Publication

Articles 1 - 30 of 86

Full-Text Articles in Entire DC Network

Concept Vectors: A Synthesis Of Concept Mapping And Matrices For Knowledge Representation In Intelligent Tutoring Systems, Mark L. Dyson Dec 1997

Concept Vectors: A Synthesis Of Concept Mapping And Matrices For Knowledge Representation In Intelligent Tutoring Systems, Mark L. Dyson

Theses and Dissertations

A review of the literature relating to intelligent tutoring systems (ITS) reveals that the bulk of research to date is focused on the student, and on methods for representing the knowledge itself. From student models to learning schemas to presentation methods, comparatively little attention has been paid to the problem of educators attempting to build viable lesson plans for use in an ITS environment--yet when this problem is addressed in the literature, it is recognized as a potentially daunting one. This thesis addresses the problem of ITS lesson plan development by proposing a practical, computable approach for knowledge engineering that …


An Incompleteness Handling Methodology For Validation Of Bayesian Knowledge Bases, David J. Bawcom Dec 1997

An Incompleteness Handling Methodology For Validation Of Bayesian Knowledge Bases, David J. Bawcom

Theses and Dissertations

The PESKI (Probabilities, Expert Systems, Knowledge, and Inference) system attempts to address some of the problems in expert system design through the use of the Bayesian Knowledge Base (BKB) representation. Knowledge gathered from a domain expert is placed into this framework and inferencing is performed over it. However, by the nature of BKBs, not all knowledge is incorporated, i.e. the representation need not be a complete representation of all combinations and possibilities of the knowledge, as this would be impractical in many real-world systems. Therefore, inherent in such a system is the problem of incomplete knowledge, or spaces within the …


Developing A Corpus Specific Stoplist Using Quantitative Comparison, Craig N. Berg Dec 1997

Developing A Corpus Specific Stoplist Using Quantitative Comparison, Craig N. Berg

Theses and Dissertations

We have become overwhelmed with electronic information and it seems our situation is not going to improve. It is becoming increasingly common for people to work with information on a daily basis. We seem to spend more and more time looking for information, and it is taking longer because more information is available. This thesis will look at how we can provide faster access to the information we want to find. Today's requirements are closely related to searching for information using queries. At the heart of the query process is the removal of search terms having little or no significance …


Visualization And Animation Of A Missile/Target Encounter, Jeffrey T. Bush Dec 1997

Visualization And Animation Of A Missile/Target Encounter, Jeffrey T. Bush

Theses and Dissertations

Existing missile/target encounter modeling and simulation systems focus on improving probability of kill models. Little research has been done to visualize these encounters. These systems can be made more useful to the engineers by incorporating current computer graphics technology for visualizing and animating the encounter. Our research has been to develop a graphical simulation package for visualizing both endgame and full fly-out encounters. Endgame visualization includes showing the interaction of a missile, its fuze cone proximity sensors, and its target during the final fraction of a second of the missile/target encounter. Additionally, this system displays dynamic effects such as the …


Requirements, Design And Prototype Of A Virtual User Interface For The Afit Virtual Spaceplane, John M. Lewis Dec 1997

Requirements, Design And Prototype Of A Virtual User Interface For The Afit Virtual Spaceplane, John M. Lewis

Theses and Dissertations

The United States Air Force is evaluating the feasibility of designing a military spaceplane capable of accomplishing military objectives from a low earth orbit and atmospheric flight regimes. Current efforts are involved in determining the scientific, operational, and budgetary constraints associated with this concept. This thesis looks at the exploration of new interface techniques associated with the design of a virtual spaceplane and is a subset of the overall virtual spaceplane effort which will assist researchers in determining the feasibility of a military spaceplane. Interface techniques are integrated into a virtual user interface that is designed to accommodate expected operations …


An Examination Of Multi-Tier Designs For Legacy Data Access, Michael L. Acker Dec 1997

An Examination Of Multi-Tier Designs For Legacy Data Access, Michael L. Acker

Theses and Dissertations

This work examines the application of Java and the Common Object Request Broker Architecture (CORBA) to support access to remote databases via the Internet. The research applies these software technologies to assist an Air Force distance learning provider in improving the capabilities of its World Wide Web-based correspondence system. An analysis of the distance learning provider's operation revealed a strong dependency on a non-collocated legacy relational database. This dependency limits the distance learning provider's future web-based capabilities. A recommendation to improve operation by data replication is proposed, and the implementation details are provided for two alternative test systems that support …


Pseudorandom Code Generation For Communication And Navigation System Applications, John F. Brendle Jr. Dec 1997

Pseudorandom Code Generation For Communication And Navigation System Applications, John F. Brendle Jr.

Theses and Dissertations

This research project investigated the design, construction and evaluation of a pseudorandom code generator for communication and navigation system applications. These types of codes include spreading codes, Gold codes, Jet Propulsion Laboratory (JPL) ranging codes, syncopated codes, and nonlinear codes. Such waveforms are typically used in communication and navigation system applications. The code generator uses the Stanford Telecom STEL-1032 Pseudorandom Number (PRN) coder. A coder interface was designed and constructed for manual data entry to the registers of the PRN coder. The code generator is capable of independently clocking and generating all possible codes with lengths up to 4,294,967,295 bits. …


Breast Cancer Mass Detection Using Difference Of Gaussians And Pulse Coupled Neural Networks, Donald A. Cournoyer Dec 1997

Breast Cancer Mass Detection Using Difference Of Gaussians And Pulse Coupled Neural Networks, Donald A. Cournoyer

Theses and Dissertations

CAD, serving as a second reader, has been shown to improve the success of radiologists at detecting breast cancer. This thesis will develop a new algorithm to identify masses in mammograms. The system developed for this thesis will be capable of assisting a radiologist in making decisions.


Applications Of Unsupervised Clustering Algorithms To Aircraft Identification Using High Range Resolution Radar, Dzung Tri Pham Dec 1997

Applications Of Unsupervised Clustering Algorithms To Aircraft Identification Using High Range Resolution Radar, Dzung Tri Pham

Theses and Dissertations

Identification of aircraft from high range resolution (HRR) radar range profiles requires a database of information capturing the variability of the individual range profiles as a function of viewing aspect. This database can be a collection of individual signatures or a collection of average signatures distributed over the region of viewing aspect of interest. An efficient database is one which captures the intrinsic variability of the HRR signatures without either excessive redundancy typical of single-signature databases, or without the loss of information common when averaging arbitrary groups of signatures. The identification of 'natural' clustering of similar HRR signatures provides a …


A Model For Determining Information To Be Captured Regarding Unauthorized Computer Entry Of An Air Force Computer System, Leslie F. Himebrook Dec 1997

A Model For Determining Information To Be Captured Regarding Unauthorized Computer Entry Of An Air Force Computer System, Leslie F. Himebrook

Theses and Dissertations

This thesis presents a model of information to capture regarding unauthorized computer systems access attempts. This model takes a management focus, and incorporates the technical focus, intelligence focus, and legal focus as inputs. The author used an exploratory, qualitative methodology consisting of an extensive literature review and interviews with experts in the field. These efforts produced the proposed model, which was reviewed by experts in the field using a delphi technique. The model consists of information that is divided into the following areas: 1. What information was compromised. 2. What type of intrusion occurred. 3. How the intrusion was attempted. …


A Single Chip Low Power Implementation Of An Asynchronous Fft Algorithm For Space Applications, Bruce W. Hunt Dec 1997

A Single Chip Low Power Implementation Of An Asynchronous Fft Algorithm For Space Applications, Bruce W. Hunt

Theses and Dissertations

A fully asynchronous fixed point FFT processor is introduced for low power space applications. The architecture is based on an algorithm developed by Suter and Stevens specifically for a low power implementation. The novelty of this architecture lies in its high localization of components and pipelining with no need to share a global memory. High throughput is attained using large numbers of small, local components working in parallel. A derivation of the algorithm from the discrete Fourier transform is presented followed by a discussion of circuit design parameters specifically, those relevant to space applications. The generic architecture is explained with …


A Representational Approach To Knowledge And Multiple Skill Levels For Broad Classes Of Computer Generated Forces, Larry J. Hutson Dec 1997

A Representational Approach To Knowledge And Multiple Skill Levels For Broad Classes Of Computer Generated Forces, Larry J. Hutson

Theses and Dissertations

Current computer generated forces (CGFs) in the 'synthetic battlespace', a training arena used by the military, exhibit several deficiencies. Human actors within the battlespace rapidly identify these CGFs and defeat them using unrealistic and potentially fatal tactics, reducing the overall effectiveness of this training arena. Simulators attached to the synthetic battlespace host local threat systems, leading to training inconsistencies when different simulators display the same threat at different levels of fidelity. Finally, current CGFs are engineered 'from the ground up', often without exploiting commonalities with other existing CGFs, increasing development (and ultimately training) costs. This thesis addresses these issues by …


A Modeling And Simulation Approach To Characterize Network Layer Internet Survivability, Leif S. King Dec 1997

A Modeling And Simulation Approach To Characterize Network Layer Internet Survivability, Leif S. King

Theses and Dissertations

The Air Force Core Competency of Information Superiority will be achieved in an age of decreasing AF manpower and corporate expertise. Increased AF reliance on COTS solutions, coupled with nearly ubiquitous points of entry to communication networks, create unique challenges in maintaining the Information Superiority edge. The protection of the internet is part of this equation. The internet supports the daily business traffic of the Air Force. Personnel, finance, and supply data flow through its routers. Controlling an adversary's access to our information systems, either the data, or the hardware and software that control the data and transform it into …


Architecture, Design, And Implementation Of A Rapidly Prototyped Virtual Environment For A Military Spaceplane, Scott A. Rothermel Dec 1997

Architecture, Design, And Implementation Of A Rapidly Prototyped Virtual Environment For A Military Spaceplane, Scott A. Rothermel

Theses and Dissertations

The new Global Engagement vision places increased emphasis on the Air Force's ability to control and exploit space. A military spaceplane combining reliable access to space, high operational tempos, and multi-mission capabilities is in conceptual stages of development. Virtual environment technology provides an opportunity to investigate system requirements and unconventional interface paradigms for this unique vehicle. A virtual environment architecture and design based on support for a rapid prototyping development process, separation of concerns, and user interface development is presented. The rapid prototyping process allowed management of changing requirements via an evolutionary approach to implementation. Separation of the activities performed …


Subjective Quality Of Experience With The Internet: Accounting For Temporal Changes In User Acceptance Of Information Technology, Jason M. Turner Dec 1997

Subjective Quality Of Experience With The Internet: Accounting For Temporal Changes In User Acceptance Of Information Technology, Jason M. Turner

Theses and Dissertations

Contemporary information technology (IT) related research has focused on use as a key dependent measure for valuing IT. By understanding the determinants of IT use, we gain descriptive information about successful IT, and prescriptive information for better deploying IT resources. Although there are several competing theories regarding IT use, research findings often cite their inability to account for temporal changes in usage behaviors. This thesis introduces quality of experience as a potential moderator between the determinants of use and actual usage behaviors. A pilot survey concerning Internet usage generated potentially relevant items which were later refined into a questionnaire assessing …


Microprogramming A Writeable Control Memory Using Very Long Instruction Word (Vliw) Compilation Techniques, Randall S. Whitman Dec 1997

Microprogramming A Writeable Control Memory Using Very Long Instruction Word (Vliw) Compilation Techniques, Randall S. Whitman

Theses and Dissertations

Microprogrammed Digital Signal Processors (DSP) are frequently used as a solution to embedded processor applications. These processors utilize a control memory which permits execution of the processor's instruction set architecture (ISA). The control memory can take the form of a static, read only memory (ROM) or a dynamic, writeable control memory (WCM), or both. Microcoding the WCM permits redefining the processor's ISA and provides speedup due to its instruction level parallelism (ILP) potential. In the past, code generation efforts for microprogrammable processors focused on creating assembly and microcode as two separate steps. In this thesis an alternative approach was chosen …


Modeling And Simulation Support For Parallel Algorithms In A High-Speed Network, Dustin E. Yates Dec 1997

Modeling And Simulation Support For Parallel Algorithms In A High-Speed Network, Dustin E. Yates

Theses and Dissertations

This thesis investigates the ability of a simulation model to compare and contrast parallel processing algorithms in a high-speed network. The model extends existing modeling, analysis, and comparison of parallel algorithms by providing graphics based components that facilitate the measurement of system resources. Simulation components are based on the Myrinet local area network standard. The models provide seven different topologies to contrast the performance of five variations of Fast Fourier Transform (FFT) algorithms. Furthermore, the models were implemented using a commercially developed product that facilitates the testing of additional topologies and the investigation of hardware variations. Accurate comparisons are statistically …


An Investigation Into The Use Of Software Product Metrics For Cobol Systems, Richard E. Boone Nov 1997

An Investigation Into The Use Of Software Product Metrics For Cobol Systems, Richard E. Boone

Theses and Dissertations

This thesis investigated several hypotheses that specific product measures could be used to predict later software lifecycle process or product measures. It collected software product and process measures from four consecutive major releases of a large Cobol legacy system (400K LOC). The types of product measures used were size and specific complexity measures. A statistical software package was used to calculate sample correlation coefficients between the measures. A 95% confidence interval was computed for each sample correlation coefficient that showed a strong or moderate linear correlation. The maintenance process measures provided were manhours used for each program changed or added, …


An Integrated Environment For Problem Solving And Program Development, Fadi Pierre Deek Oct 1997

An Integrated Environment For Problem Solving And Program Development, Fadi Pierre Deek

Dissertations

A framework for an integrated problem solving and program development environment that addresses the needs of students learning programming is proposed. Several objectives have been accomplished: defining the tasks required for program development and a literature review to determine the actual difficulties involved in learning those tasks. A comprehensive Study of environments and tools developed to support the learning of problem solving and programming was then performed, covering programming environments, debugging aids, intelligent tutoring systems, and intelligent programming environments. This was followed by a careful analysis and critique of these systems, which uncovered the limitations that have prevented them from …


Structured Document Comparison And Scientific Data Mining On The World Wide Web, Philip B. Johnson Oct 1997

Structured Document Comparison And Scientific Data Mining On The World Wide Web, Philip B. Johnson

Theses

The usefulness and accessibility of programs and systems have become important issues for users and researchers alike. A program's usefulness can lw measured by the frequency with which it is used. From the author's or maintainer's point of view, the frequency of usage can be determined by how often a request for the software is received. In the past, a user became aware of a particular tool through various means, and contacted the author or maintainer to obtain a copy of it. This presented difficulties, ranging from language barriers to machine incompatibilities to control of the use of the program. …


Algorithms And Tools For Splicing Junction Donor Recognition In Genomic Dna Sequences, Maisheng Yin Oct 1997

Algorithms And Tools For Splicing Junction Donor Recognition In Genomic Dna Sequences, Maisheng Yin

Theses

The consensus sequences at splicing junctions in genomic DNA are required for pre-mRNA breaking and rejoining which must be carried out precisely. Programs currently available for identification or prediction of transcribed sequences from within genomic DNA are far from being powerful enough to elucidate genomic structure completely[4]. In this research, we develop a degenerate pattern match algorithm for 5' splicing site (Donor Site) recognition.. Using the Motif models we developed, we can mine out the degenerate pattern information from the consensus splicing junction sequences. Our experimental results show that, this algorithm can correctly recognize 93% of the total donor sites …


Interactive And Batch Creation Of Oodb Medical Vocabularies, Muhammad Arif Oct 1997

Interactive And Batch Creation Of Oodb Medical Vocabularies, Muhammad Arif

Theses

Controlled vocabularies are becoming popular for knowledge representation and querying. They are particularly helpful in the medical field since they can unify disparate terminologies and provide information in a compact, comprehensible manner. In this thesis, we present a mechanism to create OODB controlled medical vocabularies from flat-file format. We also describe a tool by which a user can interactively create, edit and browse the vocabulary. For better understanding of the structure of the vocabulary we designed our interface as a graphical editor and browser. The user of this interface will typically be a medical expert who either wants to add …


Analysis Of The Protocol For The Handover In A Micro-Cell Packet Switched Mobile Network, Anna M. Thomas Oct 1997

Analysis Of The Protocol For The Handover In A Micro-Cell Packet Switched Mobile Network, Anna M. Thomas

Theses

The overlay of microcells over macrocells offers new opportunities and is cost effective, which makes the handover in such a micro-cellular environment an important issue. The objective of this study is to analyze and prove the truthfulness of a new protocol proposed, which guarantees no packet loss during the handoff. The study here emphasizes on the data integrity issue, since it is the key factor affecting the throughput performance of the transport layer. It is shown that usage of the Internet Protocol leads to packet loss in the presence of handover. Simulation results reveal that the proposed new protocol preserves …


Testing Statistical Significance In Sequence Classification Algorithms, Tom Tien-Hua Shih Oct 1997

Testing Statistical Significance In Sequence Classification Algorithms, Tom Tien-Hua Shih

Theses

Multiple sequence alignment has proven to be a successful method of representing and organizing of protein sequence data. It is crucial to medical researches on the structure and function of proteins.

There have been numerous tools published on how to abstract meaningful relationship from an unknown sequence and a set of known sequences. One study used a method for discovering active motifs in a set of related protein sequences. These are meaningful knowledge abstracted from the known protein database since most protein families are characterized by multiple local motifs. Another study abstracts knowledge regarding the input sequence using a preconstructed …


Materialized View Algorithms, Yubo Fan Oct 1997

Materialized View Algorithms, Yubo Fan

Dissertations and Theses

A data warehouse is a stand-alone repository of integrated information available for decision support OLAP querying and analysis. Aggregate views can be materialized (stored in disk) to improve query performance in a data warehouse.

Several static and dynamic algorithms for selecting materialized aggregate views (MA V) in a data warehouse are proposed in this thesis. The algorithms are then compared by running a simulation system, which can be configured to compare several algorithms on different type of data warehouses. Simulation results for static algorithms are presented to show that several proposed algorithms perform close to an existing good algorithm (HRU …


Extracting Functionally Equivalent Object-Oriented Designs From Legacy Imperative Code, Ricky E. Sward Sep 1997

Extracting Functionally Equivalent Object-Oriented Designs From Legacy Imperative Code, Ricky E. Sward

Theses and Dissertations

This research defines a methodology for automatically extracting functionally equivalent object-oriented designs from legacy imperative programs. The Parameter-Based Object Identification (PBOI) methodology is based on fundamental ideas that relate programs written in imperative languages such as C or COBOL to objects and classes written in object-oriented languages such as Ada 95 or C ++. Transformations have been developed that formalize the PBOI methodology and a formal proof is provided showing the extracted object-oriented design is functionally equivalent to the legacy imperative system. To focus the task of re-engineering, generic models of imperative programming languages and object-oriented programming languages have been …


Calibration And Validation Of The Checkpoint Model To The Air Force Electronic Systems Center Software Database, Thomas C. Shrum Sep 1997

Calibration And Validation Of The Checkpoint Model To The Air Force Electronic Systems Center Software Database, Thomas C. Shrum

Theses and Dissertations

This research effort focused on the calibration and validation of CHECKPOINT Version 2.3.1, a computerized software cost estimating tool, to the USAF Electronic Systems Center (ESC) software database. This thesis is a direct follow-on to a 1996 CHECKPOINT study at the Air Force Institute of Technology, which successfully calibrated and validated CHECKPOINT to the SMC software database. While this research generally parallels the methodology in the aforementioned study, it offers advancements in the CHECKPOINT calibration and validation procedure, and it refines the data stratification process and the statistical analyses employed. After stratifying the ESC software database into ten usable data …


Building Multi-Discipline, Multi-Format Digital Libraries Using Clusters And Buckets, Michael L. Nelson Aug 1997

Building Multi-Discipline, Multi-Format Digital Libraries Using Clusters And Buckets, Michael L. Nelson

Computer Science Theses & Dissertations

Our objective was to study the feasibility of extending the Dienst protocol to enable a multi-discipline, multi-format digital library. We implemented two new technologies: cluster functionality and publishing buckets. We have designed a possible implementation of clusters and buckets, and have prototyped some aspects of the resultant digital library.

Currently, digital libraries are segregated by the disciplines they serve ( computer science, aeronautics, etc.), and by the format of their holdings (reports, software, datasets, etc.). NCSTRL+ is a multi-discipline, multi-format digital library (DL) prototype created to explore the feasibility of the design and implementation issues involved with created a …


Mail Server Installation And Integration, Tim Lewis Jul 1997

Mail Server Installation And Integration, Tim Lewis

Honors Capstone Projects and Theses

No abstract provided.


A Synthesized Methodology For Eliciting Expert Judgment For Addressing Uncertainty In Decision Analysis, Richard W. Monroe Jul 1997

A Synthesized Methodology For Eliciting Expert Judgment For Addressing Uncertainty In Decision Analysis, Richard W. Monroe

Engineering Management & Systems Engineering Theses & Dissertations

This dissertation describes the development, refinement, and demonstration of an expert judgment elicitation methodology. The methodology has been developed by synthesizing the literature across several social science and scientific fields. The foremost consideration in the methodology development has been to incorporate elements that are based on reasonable expectations for the human capabilities of the user, the expert in this case.

Many methodologies exist for eliciting assessments for uncertain events. These are frequently elicited in probability form. This methodology differs by incorporating a qualitative element as a beginning step for the elicitation process. The qualitative assessment is a more reasonable way …