Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 56

Full-Text Articles in Engineering

High-Resolution Mapping In Manus Basin, C. Roman, V. Ferrini Dec 2006

High-Resolution Mapping In Manus Basin, C. Roman, V. Ferrini

Christopher N. Roman

Near-bottom seafloor mapping with precisely navigated deep submergence vehicles has become increasingly common in a range of oceanographic settings. Recent mapping efforts at deep-water hydrothermal vent sites have resulted in high-resolution (sub-meter) bathymetry datasets that can be used to identify morphological features associated with volcanic, tectonic, and hydrothermal processes. The resolution of these maps, and our ability to accurately quantify the complex morphologic details of hydrothermal structures has been limited by a number of variables including navigational accuracy, sonar settings (e.g. acoustic wavelength, sonar orientation, ping rate), survey parameters (e.g. altitude, speed), data density, and data processing techniques (e.g. gridding …


Chapter 7: The Evaluation Of Ontologies, Leo Obrst, Benjamin Ashpole, Werner Ceusters, Inderjeet Mani, Steven Ray, Barry Smith Dec 2006

Chapter 7: The Evaluation Of Ontologies, Leo Obrst, Benjamin Ashpole, Werner Ceusters, Inderjeet Mani, Steven Ray, Barry Smith

Steven R Ray

Recent years have seen rapid progress in the development of ontologies as semantic models intended to capture and represent aspects of the real world. There is, however, great variation in the quality of ontologies. If ontologies are to become progressively better in the future, more rigorously developed, and more appropriately compared, then a systematic discipline of ontology evaluation must be created to ensure quality of content and methodology. Systematic methods for ontology evaluation will take into account representation of individual ontologies, performance and accuracy on tasks for which the ontology is designed and used, degree of alignment with other ontologies …


Approches Orientées Services Web De L'Ihm De Supervision : Nouvelles Solutions Technologiques Pour Les Ingénieurs Et Nouvelles Problématiques Pour Les Ergonomes ?, Djilali Idoughi, Christophe Kolski Sep 2006

Approches Orientées Services Web De L'Ihm De Supervision : Nouvelles Solutions Technologiques Pour Les Ingénieurs Et Nouvelles Problématiques Pour Les Ergonomes ?, Djilali Idoughi, Christophe Kolski

Professor Djilali IDOUGHI

RESUME Dans cet article, nous considérons l’IHM de supervision dans un contexte technologique nouveau et en constante évolution, lequel est caractérisé par des aspects impor-tants comme la mobilité et la coopération entre acteurs d’une part, et l’inter connectivité, l’interopérabilité et l’hétérogénéité des systèmes industriels utilisés d’autre part. De nouvelles solutions technologiques « attrayan-tes » pour les ingénieurs devraient conduire à de nouvel-les problématiques pour les ergonomes.


Inventions On Using Ldap For Different Purposes-Part-1, Umakant Mishra Sep 2006

Inventions On Using Ldap For Different Purposes-Part-1, Umakant Mishra

Umakant Mishra

The objective of this article is to know how is LDAP used for applications in e-commerce and Policy Management. The analysis of patents shows which Inventive Principles have been used to solve those inventions. Unlike other parts of the study which have tried to improve certain aspect of LDAP technology and application, this article includes the inventions that use LDAP for various different purposes. This article is divided into 3 parts for convenience of size. The first part of the article includes 6 patents using LDAP for “e-commerce” and “Policy Management”. The second part includes 10 patents using LDAP for …


Inventions On Ldap Data Storage- A Study Based On Us Patents, Umakant Mishra Aug 2006

Inventions On Ldap Data Storage- A Study Based On Us Patents, Umakant Mishra

Umakant Mishra

Lightweight Directory Access Protocol (LDAP) is an IETF open standard to provide directory services in the network. LDAP was initially developed at the University of Michigan with an objective to include most of the features of X.500 directory structure, while eliminating the burdens and difficulties of the same.

As LDAP does not provide any specification on the data storage, different venders can implement different mechanism for data storage as found suitable to the specific vender or environment. Although underlying data storage system between different LDAP servers can differ, this disparity does not affect the functionality or interaction of LDAP clients. …


Inventions On Ldap Data Storage- A Triz Based Analysis, Umakant Mishra Aug 2006

Inventions On Ldap Data Storage- A Triz Based Analysis, Umakant Mishra

Umakant Mishra

Lightweight Directory Access Protocol (LDAP) is an IETF open standard to provide directory services in the network. LDAP stores the directory information in a database. An LDAP server may store data in a Flat file, or in RDBMS or in any other format. The LDAP client applications such as LDAP enabled web browsers like Netscape communicator and Internet Explorer can use LDAP directory interface without having knowledge on the underlying data storage mechanism. This article is a part of the main study made on LDAP based on 60 patents selected from US patent database. (For more details on the study …


Inventions On Extending Ldap Functionality- A Triz Based Analysis, Umakant Mishra Aug 2006

Inventions On Extending Ldap Functionality- A Triz Based Analysis, Umakant Mishra

Umakant Mishra

The LDAP server stores the directory information in a database. The client makes a TCP/IP connection and sends requests to an LDAP server. The LDAP server executes the client requests and returns a response to the client. LDAP offers nine basic functional operations, viz., add, delete, modify, bind, unbind, search, compare, and modify distinguished name and abandon. Apart from the above basic operations, LDAP v3 includes new mechanism called Extended Operations, which allows additional operations to be defined for services not available in this protocol, for instance digitally signed operations and results. Using this feature it is possible to provide …


Inventions On Ldap Data Management- A Triz Based Analysis, Umakant Mishra Aug 2006

Inventions On Ldap Data Management- A Triz Based Analysis, Umakant Mishra

Umakant Mishra

The data model of LDAP is same as X.500 data model. The LDAP protocol assumes there are one or more servers, which jointly provide access to a Directory Information Tree (DIT). The tree is made up of entries. Entries have relative distinguished name (RDN), which must be unique among all its siblings. The concatenation of the relative distinguished names from a particular entry to an immediate subordinate of the root of the tree forms the Distinguished Name (DN) for that entry. (IETF, RFC 2251).

LDAP provides add, delete and modify operations for data modification. Each of these LDAP update operation …


Inventions On Ldap Administration- A Triz Based Analysis, Umakant Mishra Aug 2006

Inventions On Ldap Administration- A Triz Based Analysis, Umakant Mishra

Umakant Mishra

Lightweight Directory Access Protocol (LDAP) is an IETF open standard to provide directory services in the network. LDAP was initially developed at the University of Michigan with an objective to include most of the features of X.500 directory structure, while eliminating the burdens and difficulties of the same. The LDAP protocols offer the following basic functional operations, viz., add, delete, modify, bind, unbind, search, compare, modify distinguished name, abandon and extended operations. The LDAP server stores the directory information in a database. It offers a rich set of searching capabilities and provides the capability for directory information to be queried …


Inventions On Data Searching In Ldap- A Triz Based Analysis, Umakant Mishra Aug 2006

Inventions On Data Searching In Ldap- A Triz Based Analysis, Umakant Mishra

Umakant Mishra

Searching is one of the most basic operation provided by an LDAP server. LDAP offers a rich set of searching capabilities. The search operation allows a client to request the server to perform a search on its behalf. The search operation locates specific users or services in the directory tree. The LDAP server executes the search (or update) command and returns a response to the client. Upon receipt of a Search Request, a server will perform the necessary search of the DIT. The server will then return to the client a sequence of responses in separate LDAP messages. The search …


Inventions On Ldap Access Interface- A Triz Based Analysis, Umakant Mishra Aug 2006

Inventions On Ldap Access Interface- A Triz Based Analysis, Umakant Mishra

Umakant Mishra

LDAP server may store data in a Flat file, in RDBMS or in any other database. The LDAP client applications can use LDAP directory interface without having knowledge on the underlying data storage mechanism. LDAP can be mapped onto any other directory system so long as the X.500 data and service model as used in LDAP is not violated in LDAP interface. The individual entries are stored in the directory server. But different clients may need the same data in different format. LDAP specification does not provide any mechanism of accessing data in different format. This article is a TRIZ …


Inventions On Using Ldap For Different Purposes-Part-3, Umakant Mishra Aug 2006

Inventions On Using Ldap For Different Purposes-Part-3, Umakant Mishra

Umakant Mishra

Unlike other parts of the study which have tried to improve certain aspect of LDAP technology and application, this article includes the inventions that use LDAP for various different purposes. This article is divided into 3 parts for convenience of size. The first part of the article includes 6 patents using LDAP for “e-commerce” and “Policy Management”. The second part includes 10 patents using LDAP for “Network Management” and “Telecommunications”. The third part of the article includes 11 patents using LDAP for “World Wide Web” and “Java and CORBA”. This is the third part of the article which analyses patents …


Inventions On Using Ldap For Different Purposes (Part-2) - A Triz Based Analysis Of Us Patents, Umakant Mishra Aug 2006

Inventions On Using Ldap For Different Purposes (Part-2) - A Triz Based Analysis Of Us Patents, Umakant Mishra

Umakant Mishra

The objective of this article is to know how is LDAP used for Network Management and Telecommunications. The analysis of patents shows which Inventive Principles have been used to solve those inventions. Unlike other parts of the study which have tried to improve certain aspect of LDAP technology and application, this article includes the inventions that use LDAP for various different purposes. This article is divided into 3 parts for convenience of size. The first part of the article includes 6 patents using LDAP for “e-commerce” and “Policy Management”. The second part includes 10 patents using LDAP for “Network Management” …


Inventions On Integrating Ldap With Other Directories - A Triz Based Analysis Of Us Patents, Umakant Mishra Aug 2006

Inventions On Integrating Ldap With Other Directories - A Triz Based Analysis Of Us Patents, Umakant Mishra

Umakant Mishra

Thus the LDAP architecture allows multiple LDAP servers work together on the same directory tree or multiple directory trees. Besides, LDAP being built on an open architecture, it is quite possible to integrate with other directory servers. LDAP can be mapped onto any other directory system so long as the X.500 data and service model as used in LDAP is not violated in LDAP interface. LDAP server may store data in a Flat file, in RDBMS or in any other database. The LDAP client applications can use LDAP directory interface without having knowledge on the underlying data storage mechanism. However, …


Inventions On Ldap Security- A Triz Based Analysis, Umakant Mishra Jul 2006

Inventions On Ldap Security- A Triz Based Analysis, Umakant Mishra

Umakant Mishra

The specifications of LDAP v.3 provide facilities for simple authentication using a cleartext password as well as any SASL mechanism.SASL allows for integrity and privacy services to be negotiated (RFC 2251, www.ietf.org/rfc/rfc2251.txt). Use of cleartext password is strongly discouraged where the underlying transport service cannot guarantee confidentiality and may result in disclosure of the password to unauthorized parties. The protocol allows other security mechanisms like SASL to be implemented in LDAP. The protocol also permits that the server can return its credentials to the client, if it chooses to do so. This article is a TRIZ based study on patents …


The Revised 40 Principles For Software Inventions, Umakant Mishra Jul 2006

The Revised 40 Principles For Software Inventions, Umakant Mishra

Umakant Mishra

Applying 40 Principles is one of the earliest and most popular techniques of TRIZ. There are no controversies on application of 40 principles by any of the TRIZ schools. Although they are fundamentally sound, there is some difficulty in applying those in software related problems. As they were originally developed for mechanical or technical problems, the meaning of many terms like 'thermal', 'aerodynamic', 'hydrodynamic', 'ultrasonic', 'infrared', 'temperature', 'liquid', 'gas' etc. are embarrassing in a software context.

This article reviews the 40 principles in the context of software industry and rephrases the principles and their applications to make them suitable for …


Inventions On Ldap- A Study Based On Us Patents, Umakant Mishra Jun 2006

Inventions On Ldap- A Study Based On Us Patents, Umakant Mishra

Umakant Mishra

Lightweight Directory Access Protocol (LDAP) is an IETF open standard to provide directory services in the network. LDAP is based on X.500 directory architecture, intended to provide directory services in Internet compatible environments. LDAP is used to provide directory services to applications ranging from e-mail systems to distributed system management tools. LDAP is becoming more and more popular with its wider usage in the Internet.

This report on LDAP is based on a study of 60 selected patents on LDAP from US patent database. The objective of this article is to present the distribution of patents according to different features …


Evolution Of User Interfaces For The Visually Impaired- Part 2, Umakant Mishra Jun 2006

Evolution Of User Interfaces For The Visually Impaired- Part 2, Umakant Mishra

Umakant Mishra

Physically or mentally challenged people cannot use a computer in the same way a normal people can. For example, a person with disability in hands cannot use a standard keyboard or mouse efficiently. People having hearing problem, visual challenge etc. cannot interact with a computer like a normal person. So it is necessary to specially design the computers, interfacing devices and software interfaces, which can be used by the physically challenged people.

This article analyses the types of visual disabilities, different assistive technologies for different visual disabilities, guidelines for developing user interfaces for the visually impaired, software products available for …


Patentability Of Software Inventions, Umakant Mishra Jun 2006

Patentability Of Software Inventions, Umakant Mishra

Umakant Mishra

Software is very expensive to develop but very inexpensive to copy. Just by copying a software you create an exact duplicate of the original software and all with the same functionality. There is no difference between the original (which is bought) and the copy (pirated). The worse is when the source code is copied. The copier can even claim to have developed the software where the credit of the developer might go. The software developers use various methods to protect their source code such as copyright, trade secrets etc. but each having limitations. The developers are keen on finding legal …


Can A Triz Software Help You Inventing?, Umakant Mishra May 2006

Can A Triz Software Help You Inventing?, Umakant Mishra

Umakant Mishra

A software on TRIZ and/or Innovation can certainly supplement human brain and memory in order to speed up an innovation job. There are various TRIZ and Innovation software available in market. Some are too complex to use, some deal with only limited number of TRIZ techniques and some are having good features of innovation without much emphasis on TRIZ. An obvious task remains to evaluate them and find which software can help you best in inventing.

This article does not recommend or reject any TRIZ software per se. It only describes the expected features of a good TRIZ software and …


Evolution Of User Interfaces For The Visually Impaired- Part- 1, Umakant Mishra May 2006

Evolution Of User Interfaces For The Visually Impaired- Part- 1, Umakant Mishra

Umakant Mishra

Physically or mentally challenged people cannot use a computer in the same way a normal people can. For example, a person with disability in hands cannot use a standard keyboard or mouse efficiently. People having hearing problem, visual challenge etc. cannot interact with a computer like a normal person. So it is necessary to specially design the computers, interfacing devices and software interfaces, which can be used by the physically challenged people.

There are many special devices like mouse, keyboard, pointers, and touch screens etc. to assist the visually challenged users. It is a challenge for the inventors and manufacturers …


Prospects And Possibilities For Ontology Evaluation: The View From Ncor, Leo Obrst, Todd Hughes, Steven Ray Apr 2006

Prospects And Possibilities For Ontology Evaluation: The View From Ncor, Leo Obrst, Todd Hughes, Steven Ray

Steven R Ray

In this position paper, we briefly describe the perspective of the US National Center for Ontological Research (NCOR, http://ncor.us) on ontology evaluation. NCOR’s inauguration was recently held (October 2005), and at that time goals were identified and committees formed to pursue those goals, including the Ontology Evaluation Committee. This committee is charged with developing a plan for the evaluation of ontologies that is designed to transform ontological engineering into a true scientific and engineering discipline. This paper discusses some issues on ontology evaluation, including the relevant questions to ask, and suggests some approaches.


Consistency Based Error Evaluation For Deep Sea Bathymetric Mapping With Robotic Vehicles, Christopher Roman, Hanumant Singh Apr 2006

Consistency Based Error Evaluation For Deep Sea Bathymetric Mapping With Robotic Vehicles, Christopher Roman, Hanumant Singh

Christopher N. Roman

This paper presents a method to evaluate the mapping error present in point cloud terrain maps created using robotic vehicles and range sensors. This work focuses on mapping environments where no a priori ground truth is available and self consistency is the only available check against false artifacts and errors. The proposed error measure is based on a disparity measurement between common sections of the environment that have been imaged multiple times. This disparity measure highlights inconsistency in the terrain map by showing regions where multiple overlapping point clouds do not fit together well. This error measure provides the map …


Pathologyxgrid Implementation For The Interproscan Bioinformatics Software, Cody K. Bumgardner Apr 2006

Pathologyxgrid Implementation For The Interproscan Bioinformatics Software, Cody K. Bumgardner

Cody Bumgardner

SoftwareInterProScan is an essential step in the Epichloëfestucae genome project’s pipeline. Complete determination of the genome sequence for Epichloëfestucae, requires substantial programmatic and computing efforts. Due to the running time requirements the computational volume of some of its subtasks exceed the power of a traditional single processor computation and high performance approaches, such as grid computing, are needed.


Inventions On Menu Interfacing For Gui Applications, A Triz Based Analysis, Part-3, Umakant Mishra Apr 2006

Inventions On Menu Interfacing For Gui Applications, A Triz Based Analysis, Part-3, Umakant Mishra

Umakant Mishra

This article analyses 15 patents on Menu System from a TRIZ perspective to find out their IFRs and Contradictions. The previous two parts of this article analysed ten patents on the menu interfaces. This part analyses five more patents from TRIZ perspective and draws out the conclusion that the TRIZ process and methodology is perfectly applicable to software inventions.


Fedora: An Architecture For Complex Objects And Their Relationships, Carl Lagoze, Sandy Payette, Edwin Shin, Chris Wilper Apr 2006

Fedora: An Architecture For Complex Objects And Their Relationships, Carl Lagoze, Sandy Payette, Edwin Shin, Chris Wilper

Edwin Shin

The Fedora architecture is an extensible framework for the storage, management, and dissemination of complex objects and the relationships among them. Fedora accommodates the aggregation of local and distributed content into digital objects and the association of services with objects. This allows an object to have several accessible representations, some of them dynamically produced. The architecture includes a generic Resource Description Framework (RDF)-based relationship model that represents relationships among objects and their components. Queries against these relationships are supported by an RDF triple store. The architecture is implemented as a web service, with all aspects of the complex object architecture …


Inventions On Menu Interfacing For Gui Applications, A Triz Based Analysis, Part-2, Umakant Mishra Mar 2006

Inventions On Menu Interfacing For Gui Applications, A Triz Based Analysis, Part-2, Umakant Mishra

Umakant Mishra

The first part of the article analyzed five patents on menu interfaces. This part analyses five more patents from TRIZ perspective to find out their IFRs, Contradictions and which Inventive Principles have been applied to achieve those solutions.


Using Triz To Design The Future Keyboard, Umakant Mishra Feb 2006

Using Triz To Design The Future Keyboard, Umakant Mishra

Umakant Mishra

A keyboard is the most common and widely used input device for a computer. Using the keyboard is often vital to interact with a computer. There are several aspects of a keyboard such as size, key layout, convenience and ergonomic features etc., which are continuously under improvement by keyboard designers and manufacturers. TRIZ is an efficient methodology in product designing. Using IFR and Trends we can well predict the directions of the future keyboards and using Contradictions and Principles we can overcome the current limitations. This article analyses the critical features of a keyboard, does a functional analysis, derives the …


An Ideal Computer Keyboard- A Case Study Of Applying Ideality On Keyboard Evolution, Umakant Mishra Feb 2006

An Ideal Computer Keyboard- A Case Study Of Applying Ideality On Keyboard Evolution, Umakant Mishra

Umakant Mishra

Any product or system moves towards its ideality. If we know the Ideal Final Result (IFR) it becomes easy to predict the future generation of the product or system. The author made a study of over 100 patents on computer keyboards. Each of these inventions tries to achieve some new feature or functionality. But what is the ultimate keyboard? This article makes an attempt to find the features of an Ideal Keyboard.


Inventions On Menu Interfacing For Gui Applications, A Triz Based Analysis, Part-1, Umakant Mishra Feb 2006

Inventions On Menu Interfacing For Gui Applications, A Triz Based Analysis, Part-1, Umakant Mishra

Umakant Mishra

During last two decades, the computer menu system has been improved from a text based multiple choice to highly adaptive, self organized menu system. This has been possible by hundreds of inventions. This article analyses 15 patents on Menu System from a TRIZ perspective to find out their IFRs and Contradictions. Besides we will also see what Inventive Principles have been applied to achieve those solutions.