Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Architecture Arts and Humanities Business Education Engineering Law Life Sciences Medicine and Health Sciences Physical Sciences and Mathematics Social and Behavioral Sciences (6)
- Memristics, Memristors, Computation (4)
- Memristics (3)
- Morphogrammatics (3)
- Daniel Felix Ritchie School of Engineering and Computer Science (2)
-
- Memristor (2)
- morphic bisimilarity. (1)
- An investigation of speech enhancement using wavelet filtering method, International Journal of Speech Technology (1)
- Arabic Script; Arabic Script History; Arabic Typography; Arabic Type Design; Arabic Fonts; Simplified Arabic; Arabic Calligraphy; Islamic Calligraphy (1)
- Art analysis (1)
- Art authentication (1)
- Artificial intelligence (1)
- Arts and Humanities Business Education Engineering Law Life Sciences Medicine and Health Sciences Physical Sciences and Mathematics Social and Behavioral Sciences (1)
- Bisimilarity (1)
- CGMT (1)
- Cellular automata (1)
- Chiasm (1)
- Chinook computer program (1)
- Coalitions (1)
- Communication protocol (1)
- Compiler Directed Power Gating (1)
- Complementarity (1)
- Computer generated music (1)
- Computers (1)
- Computing (1)
- Conference Presentations (1)
- Cooperations (1)
- Crossbar (1)
- Darwin vii (1)
- Data security (1)
- Publication
-
- Philadelphia University, Jordan (7)
- Rudolf Kaehr (7)
- Electronic Theses and Dissertations (2)
- Academic Symposium of Undergraduate Scholarship (1)
- Christy Allen (1)
-
- Cornerstone 3 Reports : Interdisciplinary Informatics (1)
- Dartmouth Scholarship (1)
- Dr Rebecca Giblin (1)
- Faculty and Research Publications (1)
- Incite: The Journal of Undergraduate Scholarship (1)
- Kent D. Palmer (1)
- Publications and Research (1)
- Research Collection College of Integrative Studies (1)
- USF Tampa Graduate Theses and Dissertations (1)
- Publication Type
Articles 1 - 27 of 27
Full-Text Articles in Arts and Humanities
Morphogrammatics Of Reflection, Rudolf Kaehr
Morphogrammatics Of Reflection, Rudolf Kaehr
Rudolf Kaehr
Turning back from the studies of morphogrammatics to some open questions of reflectional programming, the recountered problematics might be put into a different light and new methods of handling formal aspects of reflection and reflectionality shall be introduced. Albeit the use of light-metaphors, morphogrammatic reflection is not sketched along the paradigm of optical metaphors. Morphograms are presenting neither propositions nor perceptions able for mirroring (representation). Exercises in defining morphogrammatic retro-grade recursion and reflection schemata are continued from the paper “Sketches to Morphogrammatic Programming”.
Distributed Web Design, Christy Allen
Architecture And Compiler Support For Leakage Reduction Using Power Gating In Microprocessors, Soumyaroop Roy
Architecture And Compiler Support For Leakage Reduction Using Power Gating In Microprocessors, Soumyaroop Roy
USF Tampa Graduate Theses and Dissertations
Power gating is a technique commonly used for runtime leakage reduction in digital CMOS circuits. In microprocessors, power gating can be implemented by using sleep transistors to selectively deactivate circuit modules when they are idle during program execution. In this dissertation, a framework for power gating arithmetic functional units in embedded microprocessors with architecture and compiler support is proposed. During compile time, program regions are identified where one or more functional units are idle and sleep instructions are inserted into the code so that those units can be put to sleep during program execution. Subsequently, when their need is detected …
Emergent Design Dissertation Errata, Kent D. Palmer
Emergent Design Dissertation Errata, Kent D. Palmer
Kent D. Palmer
Errors found in final dissertation
Composing Music In Constrained Search Environments, Jeffrey Keene
Composing Music In Constrained Search Environments, Jeffrey Keene
Electronic Theses and Dissertations
Composing music with computers in constrained search environments adds complexities and problems not present in the traditional problem domain of generative music. The traditional and well researched mechanisms of Markov chains, genetic algorithms and data driven rule based systems do not directly map to a problem domain in which pitch choice and rhythm choice are likely to be highly limited.
We therefore explore several possible solutions to generating rhythms in extremely constrained environments with the goal of generating music that adheres to user specified constraints and is aesthetically pleasing.
A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade
A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade
Faculty and Research Publications
Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described information security professionals. A primary goal of the study is to understand the perceptions of women in information security and determine …
Exploring The Strategic Alignment Of Performing Arts And Computing: Creating And Delivering Multimedia Performing Arts Content, Linda Calloway, Robert Meffe
Exploring The Strategic Alignment Of Performing Arts And Computing: Creating And Delivering Multimedia Performing Arts Content, Linda Calloway, Robert Meffe
Cornerstone 3 Reports : Interdisciplinary Informatics
No abstract provided.
Memristics: Memristors, Again? – Part Ii, How To Transform Wired ‘Translations’ Between Crossbars Into Interactions?, Rudolf Kaehr
Memristics: Memristors, Again? – Part Ii, How To Transform Wired ‘Translations’ Between Crossbars Into Interactions?, Rudolf Kaehr
Rudolf Kaehr
The idea behind this patchwork of conceptual interventions is to show the possibility of a “buffer-free” modeling of the crossbar architecture for memristive systems on the base of a purely difference-theoretical approach. It is considered that on a nano-electronic level principles of interpretation appears as mechanisms of complementarity. The most basic conceptual approach to such a complementarity is introduced as an interchangeability of operators and operands of an operation. Therefore, the architecture of crossbars gets an interpretation as complementarity between crossbar functionality and “buffering” translation functionality. That is, the same matter functions as operator and at once, as operand – …
Memristics: Memristors, Again?, Rudolf Kaehr
Memristics: Memristors, Again?, Rudolf Kaehr
Rudolf Kaehr
This collection gives first and short critical reflections on the concepts of memristics, memristors and memristive systems and the history of similar movements with an own focus on a possible interplay between memory and computing functions, at once, at the same place and time, to achieve a new kind of complementarity between computation and memory on a single chip without retarding buffering conditions.
Volume 03, Cheryl Peck, Charles Hoever, Longwood Theater Department, Brittany Anderson, J. Ervin Sheldon, Richard Hayden, Yuri Calustro, Candice Fleming, Rebecca Franklin, Ashley Yocum, Danielle M. Jagoda, Cristina M. Valdivieso, Jameka Jones, Amy Ellis, Ashley Maser, Erikk Shupp, Jamie Yurasits, Joshua Davis, Alexander Leonhart, Kenny Wolfe, Sally Meadows, J. Haley, Amy Jackson, Morgan Howard, Adrienne Heinbaugh, Melissa Dorton, Ciarra Stalker
Volume 03, Cheryl Peck, Charles Hoever, Longwood Theater Department, Brittany Anderson, J. Ervin Sheldon, Richard Hayden, Yuri Calustro, Candice Fleming, Rebecca Franklin, Ashley Yocum, Danielle M. Jagoda, Cristina M. Valdivieso, Jameka Jones, Amy Ellis, Ashley Maser, Erikk Shupp, Jamie Yurasits, Joshua Davis, Alexander Leonhart, Kenny Wolfe, Sally Meadows, J. Haley, Amy Jackson, Morgan Howard, Adrienne Heinbaugh, Melissa Dorton, Ciarra Stalker
Incite: The Journal of Undergraduate Scholarship
Introduction from Dean Dr. Charles Ross
Little Shop of Horrors by Longwood Theater Department
Who Has the Hottest Hotsauce in Farmville: A Quantitative Comparison of Sauces from Local Restaurants by Cheryl Peck and Charles Hoever
Precipitation Effects on the Growth of White Oaks and Virginia Pines on the Mt. Vernon Plantation by Brittany Anderson
Design and Synthesis of Novel Ion Binding Molecules for Self-Assembly and Sensing Applications by J. Ervin Sheldon
A Statistical Analysis of Algorithms for Playing SameGame by Richard Hayden
Intersecting Cylinders at Arbitrary Angles by Yuri Calustro
Putting a Foot in the Revolving Door: Strategies for Reducing …
Cold War Origins Of The International Federation For Information Processing, Ksenia Tatarchenko
Cold War Origins Of The International Federation For Information Processing, Ksenia Tatarchenko
Research Collection College of Integrative Studies
The International Federation for Information Processing (IFIP) was born as a nongovernmental federation with the main goal of bringing together computer professionals from countries in the East and West. This article examines the Cold War context of the IFIP's origins and the mechanisms its founders used to reconcile computing and politics and to construct computing as an international discipline.
Artificial Intelligence: Soon To Be The World’S Greatest Intelligence, Or Just A Wild Dream?, Edward R. Kollett
Artificial Intelligence: Soon To Be The World’S Greatest Intelligence, Or Just A Wild Dream?, Edward R. Kollett
Academic Symposium of Undergraduate Scholarship
The purpose of the paper was to examine the field of artificial intelligence. In particular, the paper focused on what has been accomplished towards the goal of making a machine that can think like a human, and the hardships that researchers in the field has faced. It also touched upon the potential outcomes of success. Why is this paper important? As computers become more powerful, the common conception is that they are becoming more intelligent. As computers become more integrated with society and more connected with each other, people again believe they are becoming smarter. Therefore, it is important that …
No Surprise People Ignore Copyright, Rebecca Giblin
No Surprise People Ignore Copyright, Rebecca Giblin
Dr Rebecca Giblin
No abstract provided.
Quantification Of Artistic Style Through Sparse Coding Analysis In The Drawings Of Pieter Bruegel The Elder, James M. Hughes, Daniel J. Graham, Daniel N. Rockmore
Quantification Of Artistic Style Through Sparse Coding Analysis In The Drawings Of Pieter Bruegel The Elder, James M. Hughes, Daniel J. Graham, Daniel N. Rockmore
Dartmouth Scholarship
Recently, statistical techniques have been used to assist art historians in the analysis of works of art. We present a novel technique for the quantification of artistic style that utilizes a sparse coding model. Originally developed in vision research, sparse coding models can be trained to represent any image space by maximizing the kurtosis of a representation of an arbitrarily selected image from that space. We apply such an analysis to successfully distinguish a set of authentic drawings by Pieter Bruegel the Elder from another set of well-known Bruegel imitations. We show that our approach, which involves a direct comparison …
Arabic For Designers By Mourad Boutros, Saad D. Abulhab
Arabic For Designers By Mourad Boutros, Saad D. Abulhab
Publications and Research
No abstract provided.
Sketch Of A Typology Of Abstract Memristic Machines, Rudolf Kaehr
Sketch Of A Typology Of Abstract Memristic Machines, Rudolf Kaehr
Rudolf Kaehr
A typology of memristic machines is sketched. This sketch gives an overview and orientation to the paper “Towards Abstract Memristic Machines”. It also intents to propose a concise systematization of the newly introduced terms and strategies to memristics and morphogrammatics. This sketch is introducing four types of sign-use for four types of machines of fundamentally different paradigms: 1. semiotic, 2. monomorphic, 3. polymorphic and 4. bisimilar abstract machines. Further definitions of abstract machines have to be based on those graphematic notational systems. A realization of such constructions of abstract machines, in contrast to existing abstract machines of the theory of …
Towards Abstract Memristic Machines, Rudolf Kaehr
From Universe To Polyverses, Rudolf Kaehr
From Universe To Polyverses, Rudolf Kaehr
Rudolf Kaehr
Some thoughts about the power of speculation behind important discoveries in mathematics, physics and computer science. The exercise shows that there is no need for a compulsory ultimate unifying universe. It is speculated that just this paradigm of a single ultimate universe is unmasking itself today as the main obstacle for further development in Western science and technology.
Morphogrammatics For Dummies: The Domino Approach, Rudolf Kaehr
Morphogrammatics For Dummies: The Domino Approach, Rudolf Kaehr
Rudolf Kaehr
Dominoes, morphograms, cellular automata, memristics. Topics: possible continuation, coalitions, cooperations, substitution, morphic bisimilarity.
An Investigation Of Speech Enhancement Using Wavelet Filtering Method, International Journal Of Speech Technology, Philadelphia University
An Investigation Of Speech Enhancement Using Wavelet Filtering Method, International Journal Of Speech Technology, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Jordanian Commercial Bank Strategies In High- Rate Of Return Realization And Its Relation With Liquidity Gap Management Performance, Philadelphia University
Jordanian Commercial Bank Strategies In High- Rate Of Return Realization And Its Relation With Liquidity Gap Management Performance, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Testing Lyoequivalency For Three Commercially Sustainedrelease Tablets Containing Diltiazem Hydrochloride, Philadelphia University
Testing Lyoequivalency For Three Commercially Sustainedrelease Tablets Containing Diltiazem Hydrochloride, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
The Novel And The Experimentation, Philadelphia University
The Novel And The Experimentation, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Neural-Network-Based Fuzzy Identifier: Design And Evaluation, Philadelphia University
Neural-Network-Based Fuzzy Identifier: Design And Evaluation, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Using Database Marketing To Enhance Direct Marketing Alternatives In Jordanian Industrial Shareholders Corporations, Philadelphia University
Using Database Marketing To Enhance Direct Marketing Alternatives In Jordanian Industrial Shareholders Corporations, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
A Location Aware P2p Voice Communication Protocol For Networked Virtual Environments, Gabor Papp
A Location Aware P2p Voice Communication Protocol For Networked Virtual Environments, Gabor Papp
Electronic Theses and Dissertations
Multiparty voice communication, where multiple people can communicate in a group, is an important component of networked virtual environments (NVEs), especially in many types of online games. While most research has been conducted on one-to-one communication, we focus on group communication. In this dissertation, we present the first measurement study on the characteristics of multiparty voice communications and develop a model of the talking and silence periods observed during multiparty communication. Over a total of 5 months, we measured over 11,000 sessions on an active multi-party voice communication server to quantify the characteristics of communication generated by game players, including …
Reallocation Of Mesh Points In Fluid Problems Using Back-Propagation Algorithm, Philadelphia University
Reallocation Of Mesh Points In Fluid Problems Using Back-Propagation Algorithm, Philadelphia University
Philadelphia University, Jordan
No abstract provided.