Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Ubiquitous Computing (8)
- Context-Aware (6)
- Mobility (5)
- Localization (4)
- Arrangement detection (3)
-
- Computer science (3)
- Disaster Management (3)
- Networked devices (3)
- Social media (3)
- Student Posters (3)
- Aerial Networks (2)
- Crowd sourcing (2)
- Data (2)
- Emergency response (2)
- Hardware Design (2)
- ICT Asset Management (2)
- Information Security (2)
- Jamming (2)
- Mobile Sensor Networks (2)
- Mobile applications (2)
- Mobile collaboration (2)
- Operating Systems (2)
- Parallel and Distributed Systems (2)
- Presented Posters and Abstracts (2)
- Renewable Energy Source (2)
- Wireless Networks (2)
- Access control (1)
- Africa (1)
- Articles (1)
- Assisted living (1)
- Publication
-
- Martin L Griss (9)
- Zheng Sun (6)
- Christopher N. Roman (5)
- Ray Bareiss (4)
- Aveek Purohit (3)
-
- Carol A. Watson (3)
- Faith Joel Shimba (3)
- George K. Thiruvathukal (3)
- Heather M Brotherton (3)
- Patrick Tague (3)
- Arcot Desai NARASIMHALU (2)
- Dr. Adel A. Elbaset (2)
- Hong-Ning Dai (2)
- Professor Jennifer Seberry (2)
- Cheryl B. Truesdell (1)
- Christine L. Borgman (1)
- Douglas Huber (1)
- Dr Deogratias Harorimana (1)
- James Howard (1)
- Lynn Andrea Stein (1)
- Paul H Miller (1)
- Reihaneh Safavi-Naini (1)
- Todd Sedano (1)
- File Type
Articles 1 - 30 of 59
Full-Text Articles in Engineering
New Frontiers In Ocean Exploration: The 2011 E/V Nautilus Field Season, K. Bell, R. Ballard, D. Coleman, C. Roman, M. Brennan, T. Turanli, M. Duman, S. Carey, P. Nomikou, M. Marani, M. Rosi, J. Austin, M. Canals, J. Karson, L. Mayer, Y. Makovsky
New Frontiers In Ocean Exploration: The 2011 E/V Nautilus Field Season, K. Bell, R. Ballard, D. Coleman, C. Roman, M. Brennan, T. Turanli, M. Duman, S. Carey, P. Nomikou, M. Marani, M. Rosi, J. Austin, M. Canals, J. Karson, L. Mayer, Y. Makovsky
Christopher N. Roman
In the summer of 2011, the Exploration Vessel NAUTILUS is undertaking a four-month expedition to the Black, Aegean and Mediterranean Seas, and North Atlantic Ocean. The primary goal of the NAUTILUS is to create a focus of international leadership for the development and integration of leading-edge technologies, educational programs, field operations, and public outreach programs for ocean exploration, in partnership with NOAA, National Geographic Society, Office of Naval Research, and other sponsors. To do so, the program uses a complement of deep submergence vehicle systems and “telepresence” technologies to engage scientists, educators and the public, both at sea and ashore, …
High Resolution Sea Floor Bathymetry Using High Frequency Multibeam Sonar And Structured Light Laser Imaging, C. Roman, G. Inglis, C. Smart, I. Vaughn, S. Carey
High Resolution Sea Floor Bathymetry Using High Frequency Multibeam Sonar And Structured Light Laser Imaging, C. Roman, G. Inglis, C. Smart, I. Vaughn, S. Carey
Christopher N. Roman
Detailed bathymetric maps of the sea floor with centimeter level resolution can be produced by underwater vehicles using multibeam sonars and structured light laser imaging. Over spatial scales up to tens of thousands of square meters it is possible to produce maps gridded to sub centimeter levels. This level of accuracy demands detailed treatments of the sensor relative data, the vehicle navigation data and the vehicle to sensor position and rotational offsets. The presented results will show comparisons between these two sensor modalities. Data have a been collected during recent field programs to the Kolumbo volcanic crater and the Southern …
Remote Analysis Of Grain Size Characteristic In Submarine Pyroclastic Deposits From Kolumbo Volcano, Greece, C. Smart, D. P. Whitesell, C. Roman, S. Carey
Remote Analysis Of Grain Size Characteristic In Submarine Pyroclastic Deposits From Kolumbo Volcano, Greece, C. Smart, D. P. Whitesell, C. Roman, S. Carey
Christopher N. Roman
Grain size characteristics of pyroclastic deposits provide valuable information about source eruption energetics and depositional processes. Maximum size and sorting are often used to discriminate between fallout and sediment gravity flow processes during explosive eruptions. In the submarine environment the collection of such data in thick pyroclastic sequences is extremely challenging and potentially time consuming. A method has been developed to extract grain size information from stereo images collected by a remotely operated vehicle (ROV). In the summer of 2010 the ROV Hercules collected a suite of stereo images from a thick pumice sequence in the caldera walls of Kolumbo …
Detection Of Diffuse Sea Floor Venting Using Structured Light Imaging, G. Inglis, C. Smart, C. Roman, S. Carey
Detection Of Diffuse Sea Floor Venting Using Structured Light Imaging, G. Inglis, C. Smart, C. Roman, S. Carey
Christopher N. Roman
Efficiently identifying and localizing diffuse sea floor venting at hydrothermal and cold seep sites is often difficult. Actively venting fluids are usually identified by a temperature induced optical shimmering seen during direct visual inspections or in video data collected by vehicles working close to the sea floor. Relying on such direct methods complicates establishing spatial relations between areas within a survey covering a broad area. Our recent work with a structured light laser system has shown that venting can also be detected in the image data in an automated fashion. A structured light laser system consists of a camera and …
The Hydra Filesystem: A Distrbuted Storage Famework, Benjamin Gonzalez, George K. Thiruvathukal
The Hydra Filesystem: A Distrbuted Storage Famework, Benjamin Gonzalez, George K. Thiruvathukal
George K. Thiruvathukal
Hydra File System (HFS) is an experimental framework for constructing parallel and distributed filesystems. While parallel and distributed applications requiring scalable and flexible access to storage and retrieval are becoming more commonplace, parallel and distributed filesystems remain difficult to deploy easily and configure for different needs. HFS aims to be different by being true to the tradition of high-performance computing while employing modern design patterns to allow various policies to be configured on a per instance basis (e.g. storage, communication, security, and indexing schemes). We describe a working prototype (available for public download) that has been implemented in the Python …
Scalable Implementations Of Mpi Atomicity For Concurrent Overlapping I/O, Wei-Keng Liao, Alok Choudhary, Kenin Coloma, George K. Thiruvathukal, Lee Ward, Eric Russell, Neil Pundit
Scalable Implementations Of Mpi Atomicity For Concurrent Overlapping I/O, Wei-Keng Liao, Alok Choudhary, Kenin Coloma, George K. Thiruvathukal, Lee Ward, Eric Russell, Neil Pundit
George K. Thiruvathukal
For concurrent I/O operations, atomicity defines the results in the overlapping file regions simultaneously read/written by requesting processes. Atomicity has been well studied at the file system level, such as POSIX standard. In this paper, we investigate the problems arising from the implementation of MPI atomicity for concurrent overlapping write access and provide a few programming solutions. Since the MPI definition of atomicity differs from the POSIX one, an implementation that simply relies on the POSIX file systems does not guarantee correct MPI semantics. To have a correct implementation of atomic I/O in MPI, we examine the efficiency of three …
Naked Object File System (Nofs): A Framework To Expose An Object-Oriented Domain Model As A File System, Joseph P. Kaylor, Konstantin Läufer, George K. Thiruvathukal
Naked Object File System (Nofs): A Framework To Expose An Object-Oriented Domain Model As A File System, Joseph P. Kaylor, Konstantin Läufer, George K. Thiruvathukal
George K. Thiruvathukal
We present Naked Objects File System (NOFS), a novel framework that allows a developer to expose a domain model as a file system by leveraging the Naked Objects design principle. NOFS allows a developer to construct a file system without having to understand or implement all details related to normal file systems development. In this paper we explore file systems frameworks and object-oriented frameworks in a historical context and present an example domain model using the framework. This paper is based on a fully-functional implementation that is distributed as free/open source software, including virtual machine images to demonstrate and study …
Anticipating Technological Change: Predictions, Trends And Gadgets, Carol A. Watson
Anticipating Technological Change: Predictions, Trends And Gadgets, Carol A. Watson
Carol A. Watson
With the current economic downtown, today's business environment is more competitive than ever. Businesses that distinguish themselves in any small way and provide cost-savings, can gain a significant advantage over their rivals. To emphasize the point, note that the ABA Techshow 2009 has a session titled: If You’re Not Serving Your Clients Online, Someone Else Will Be. It is, therefore, essential that attorneys harness technology and remain up-to-date on the latest computer developments . In this paper, I will begin by discussing technologies that are currently available on the web that will increase your abilities to collaborate, reduce your office …
Technology Management Trends In Law Schools, Carol A. Watson, Larry Reeves
Technology Management Trends In Law Schools, Carol A. Watson, Larry Reeves
Carol A. Watson
Discusses the role of librarians in law school technology management and analyzes technology staffing survey results for 2002, 2006, and 2010. While survey results indicate a trend toward establishing separate information technology departments within law schools, librarians are and will continue to be actively involved in law school technology.
Forecast For The Future: Emerging Legal Technologies, Carol A. Watson
Forecast For The Future: Emerging Legal Technologies, Carol A. Watson
Carol A. Watson
Begins by discussing technologies that are currently available on the web that can reduce office overhead. Also highlights current general technology trends and still-developing technologies. Concludes with a list of frivolous gadgets to provide food for thought about the coming prospects of technology.
Location Constraints In Digital Rights Management, Adam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, Martin Jan Surminen
Location Constraints In Digital Rights Management, Adam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, Martin Jan Surminen
Reihaneh Safavi-Naini
Digital rights management allows information owners to control the use and dissemination of electronic documents via a machine-readable licence. This paper describes the design and implementation of a system for creating and enforcing licences containing location constraints that can be used to restrict access to sensitive documents to a defined area. Documents can be loaded onto a portable device and used in the approved areas, but cannot be used if the device moves to another area. Our contribution includes a taxonomy for access control in the presence of requests to perform non-instantaneous controlled actions.
Ipv6 Overview.Pdf, Douglas Huber
Issues In Human Capital Development : Lessons For Public Administration And Governance, Deogratias Harorimana Mr
Issues In Human Capital Development : Lessons For Public Administration And Governance, Deogratias Harorimana Mr
Dr Deogratias Harorimana
With few minerals or other natural resources, Rwanda believes that she can still achieve her ambitions by investing in human capital - her unique resource. If this ambition can be achieved, then is this the next role model for international development? We used a case study design and analysis methods to examine development models used elsewhere in recent decades, using both qualitative and quantitative data on Rwanda to establish the comparative advantages in relation to Singapore’s economic development model. The implications for international development are that (1) an effective human capital development strategy should be inclusive enough to respond to …
Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang
Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang
Ray Bareiss
As emergency first responders and commanders increasingly use mobile phones, tablets, and social media to communicate, coordinate, and manage information during disasters, we see a need and opportunity to provide a mobile device-appropriate semantic layer to a geographically-based common operating picture. The challenge is to provide a simple, usable structure for a rapidly growing body of information to simplify the development of situational awareness in an unfolding disaster. We use a hyperlinked structure based on the ASK model to organize information in a readily accessible form. In this paper we describe our initial design and experience with an Android-based prototype, …
Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang
Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang
Martin L Griss
As emergency first responders and commanders increasingly use mobile phones, tablets, and social media to communicate, coordinate, and manage information during disasters, we see a need and opportunity to provide a mobile device-appropriate semantic layer to a geographically-based common operating picture. The challenge is to provide a simple, usable structure for a rapidly growing body of information to simplify the development of situational awareness in an unfolding disaster. We use a hyperlinked structure based on the ASK model to organize information in a readily accessible form. In this paper we describe our initial design and experience with an Android-based prototype, …
Pandaa: Physical Arrangement Detection Of Networked Devices Through Ambient-Sound Awareness, Zheng Sun, Aveek Purohit, Kaifei Chen, Shijia Pan, Trevor Pering, Pei Zhang
Pandaa: Physical Arrangement Detection Of Networked Devices Through Ambient-Sound Awareness, Zheng Sun, Aveek Purohit, Kaifei Chen, Shijia Pan, Trevor Pering, Pei Zhang
Zheng Sun
Future ubiquitous home environments can contain 10s or 100s of devices. Ubiquitous services running on these devices (i.e. localizing users, routing, security algorithms) will commonly require an accurate location of each device. In order to obtain these locations, existing techniques require either a manual survey, active sound sources, or estimation using wireless radios. These techniques, however, need additional hardware capabilities and are intrusive to the user. Non-intrusive, automatic localization of ubiquitous computing devices in the home has the potential to greatly facilitate device deployments.
This paper presents the PANDAA system, a zero-configuration spatial localization system for networked devices based on …
Pandaa: Physical Arrangement Detection Of Networked Devices Through Ambient-Sound Awareness, Zheng Sun, Aveek Purohit, Kaifei Chen, Shijia Pan, Trevor Pering, Pei Zhang
Pandaa: Physical Arrangement Detection Of Networked Devices Through Ambient-Sound Awareness, Zheng Sun, Aveek Purohit, Kaifei Chen, Shijia Pan, Trevor Pering, Pei Zhang
Aveek Purohit
Future ubiquitous home environments can contain 10s or 100s of devices. Ubiquitous services running on these devices (i.e. localizing users, routing, security algorithms) will commonly require an accurate location of each device. In order to obtain these locations, existing techniques require either a manual survey, active sound sources, or estimation using wireless radios. These techniques, however, need additional hardware capabilities and are intrusive to the user. Non-intrusive, automatic localization of ubiquitous computing devices in the home has the potential to greatly facilitate device deployments.
This paper presents the PANDAA system, a zero-configuration spatial localization system for networked devices based on …
Pandaa: A Physical Arrangement Detection Technique For Networked Devices Through Ambient-Sound Awareness, Zheng Sun, Aveek Purohit, Philippe De Wagter, Irina Brinster, Chorom Hamm, Pei Zhang
Pandaa: A Physical Arrangement Detection Technique For Networked Devices Through Ambient-Sound Awareness, Zheng Sun, Aveek Purohit, Philippe De Wagter, Irina Brinster, Chorom Hamm, Pei Zhang
Zheng Sun
This demo presents PANDAA, a zero-configuration automatic spatial localization technique for networked devices based on ambient sound sensing. We will demonstrate that after initial placement of the devices, ambient sounds, such as human speech, music, footsteps, finger snaps, hand claps, or coughs and sneezes, can be used to autonomously resolve the spatial relative arrangement of devices, such as mobile phones, using trigonometric bounds and successive approximation.
Digital Filter Design For Jamming Mitigation In 802.15.4 Communication, Bruce Debruhl, Patrick Tague
Digital Filter Design For Jamming Mitigation In 802.15.4 Communication, Bruce Debruhl, Patrick Tague
Patrick Tague
Jamming attackers can dramatically increase attack efficiency and stealth by randomly or periodically cycling the jamming transmission on and off, attacks respectively known as random and periodic jamming. In this paper, we analyze the impact of such attacks on the IEEE 802.15.4 communication protocol, commonly used in wireless sensor networking applications, and show that the cycling behavior introduces a narrow spectral component into the received signal. We propose the inclusion of a digital filter at the receiver side to effectively eliminate this spectral component, and we discuss the benefits involved in this filter design. We evaluate the impacts of random …
Ict And The Education Sector In Tanzania: Effectiveness Of Introducing And Applying Ict In Higher Learning Institutions In Tanzania: The Case Of Ardhi University, Kristofa S. Nkembo, Daniel Koloseni, Faith J. Shimba
Ict And The Education Sector In Tanzania: Effectiveness Of Introducing And Applying Ict In Higher Learning Institutions In Tanzania: The Case Of Ardhi University, Kristofa S. Nkembo, Daniel Koloseni, Faith J. Shimba
Faith Joel Shimba
Academic Institutions are heavily investing in ICT in order to improve delivery and quality of education. But the process of introducing and applying ICT in Higher learning institutions is not effective to enable higher learning Institutions to reap fully the benefits offered by ICT. This book describes a number of factors that hindered the introduction and application of ICT at Ardhi University, which are limited ICT infrastructure, inadequate ICT personnel, inadequate training provided to staff, limited support services, inadequate financial resources,and insufficient budget for ICT infrastructure. Further it recommends among other things, improvement of ICT infrastructure, increasing the number of …
Design, Modeling And Control Strategy Of Pv/Fc Hybrid Power System, Dr. Adel A. Elbaset
Design, Modeling And Control Strategy Of Pv/Fc Hybrid Power System, Dr. Adel A. Elbaset
Dr. Adel A. Elbaset
This paper describes development of a general methodology of an autonomous PV/FC system composed of photovoltaic (PV), electrolyzer, hydrogen storage tank and fuel cell (FC). The aim of this paper is to determine optimum design, control strategy, economic and performance of a PV/FC hybrid power generation system without battery storage taking into account all losses in the system. The paper also presents a computer program based on Matlab software to determine optimum design, control strategy, economic and performance of an autonomous PV/FC hybrid power generation system. The computer program develops to size system components in order to match the load …
Wind Powered Datacenter: Indiana, Heather M. Brotherton
Wind Powered Datacenter: Indiana, Heather M. Brotherton
Heather M Brotherton
This paper will investigate the feasibility of co-locating data centers on Indiana wind farms. Strategic long-term planning including combining clean energy, information technology, and efficient data center design could allow Indiana to emerge as an information technology service leader. There are economic advantages to locating a data center in Indiana. The cost of living in Indiana is low in comparison places such as California with high concentrations of data centers. This in turn means a lower cost workforce. Many less costly areas of the United States lack skilled workers to staff data centers. This is not the case in Indiana. …
Is Data To Knowledge As The Wasp Is To The Fig Tree? Reconsidering Licklider’S Intergalactic Network In The Days Of Data Deluge., Christine L. Borgman
Is Data To Knowledge As The Wasp Is To The Fig Tree? Reconsidering Licklider’S Intergalactic Network In The Days Of Data Deluge., Christine L. Borgman
Christine L. Borgman
No abstract provided.
Coughloc: Location-Aware Indoor Acoustic Sensing For Non-Intrusive Cough Detection, Zheng Sun, Aveek Purohit, Kathleen Yang, Neha Pattan, Dan Siewiorek, Asim Smailagic, Ian Lane, Pei Zhang
Coughloc: Location-Aware Indoor Acoustic Sensing For Non-Intrusive Cough Detection, Zheng Sun, Aveek Purohit, Kathleen Yang, Neha Pattan, Dan Siewiorek, Asim Smailagic, Ian Lane, Pei Zhang
Zheng Sun
Pervasive medical monitoring has become an ideal alter- native to nursing care for elderly people and patients in hospitals. Existing systems using single body-worn sensors are often intrusive and less reliable. By contrast, ubiqui- tous acoustic sensing techniques can support non-intrusive and robust medical monitoring. In this paper, we describe CoughLoc, a ubiquitous acoustic sensing system for con- tinuous cough detection using a wireless sensor network. We show how knowledge of sound source locations can be leveraged to improve the detection accuracy of sound events caused by mobile users. Experiments in indoor environ- ments show our system achieves over 90% …
Towards Secure Multi-Path Routing For Wireless Mobile Ad-Hoc Networks: A Cross-Layer Strategy (Poster), Arjun Athreya, Patrick Tague
Towards Secure Multi-Path Routing For Wireless Mobile Ad-Hoc Networks: A Cross-Layer Strategy (Poster), Arjun Athreya, Patrick Tague
Patrick Tague
Multi-path routing establishes multiple paths between a source and destination node in a network. This helps in achieving reliability in mobile ad-hoc networks (MANETs). To achieve efficient, secure and reliable multi-path routing for MANETs, we propose a routing mechanism that uses crosslayer strategies. The cross-layer strategy involves incorporating feedback and information from layers below the network layer to make decisions at the network layer. We also propose a path evaluation mechanism for the paths returned by the proposed multi-path routing mechanism.
Using Textual Features To Predict Popular Content On Digg, Paul H. Miller
Using Textual Features To Predict Popular Content On Digg, Paul H. Miller
Paul H Miller
Over the past few years, collaborative rating sites, such as Netflix, Digg and Stumble, have become increasingly prevalent sites for users to find trending content. I used various data mining techniques to study Digg, a social news site, to examine the influence of content on popularity. What influence does content have on popularity, and what influence does content have on users’ decisions? Overwhelmingly, prior studies have consistently shown that predicting popularity based on content is difficult and maybe even inherently impossible. The same submission can have multiple outcomes and content neither determines popularity, nor individual user decisions. My results show …
Data Center Recovery Best Practices: Before, During, And After Disaster Recovery Execution, Heather M. Brotherton
Data Center Recovery Best Practices: Before, During, And After Disaster Recovery Execution, Heather M. Brotherton
Heather M Brotherton
This qualitative multiple case study analysis reviews well documented past information technology disasters with a goal of identifying practical before, during, and after disaster recovery best practices. The topic of cyberinfrastructure resiliency is explored including barriers to cyberinfrastructure resiliency. Factors explored include: adherence to established procedures, staff training in recovery procedures, chain of command structure, recovery time and cost, and mutual aid relationships. Helpful tools and resources are included to assist planners.
(Master's Thesis) Data Center Recovery Best Practices: Before, During, And After Disaster Recovery Execution, Heather M. Brotherton
(Master's Thesis) Data Center Recovery Best Practices: Before, During, And After Disaster Recovery Execution, Heather M. Brotherton
Heather M Brotherton
This qualitative multiple case study analysis reviews well documented past information technology disasters with a goal of identifying practical before, during, and after disaster recovery best practices. The topic of cyberinfrastructure resiliency is explored including barriers to cyberinfrastructure resiliency. Factors explored include: adherence to established procedures, staff training in recovery procedures, chain of command structure, recovery time and cost, and mutual aid relationships. Helpful tools and resources are included to assist planners.
An Exploration Of Knowledge And Skills Transfer From A Formal Software Engineering Curriculum To A Capstone Practicum Project, Ray Bareiss, Ed Katz
An Exploration Of Knowledge And Skills Transfer From A Formal Software Engineering Curriculum To A Capstone Practicum Project, Ray Bareiss, Ed Katz
Ray Bareiss
Students at Carnegie Mellon Silicon Valley complete a team-based practicum project for an industrial sponsor as the capstone of their master’s education in software engineering. Over time, the faculty member who typically serves as advisor for such projects has been disturbed by the failure of several student teams to transfer some relevant knowledge and skills from the formal curriculum to the relatively unstructured practicum project environment. We conducted a survey of all 2010 software engineering students to ascertain the most significant selfreported shortcomings. This paper presents the survey data and then discusses the results in terms of a theory of …
The Macos X Command Line, James P. Howard, Ii
The Macos X Command Line, James P. Howard, Ii
James Howard
My wife thinks I bought my Mac laptop to use as a status symbol. But every hacker knows I bought it because I wanted a decent Unix laptop.