Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 56 of 56

Full-Text Articles in Engineering

Inventions On Computer Keyboard- A Triz Based Analysis, Umakant Mishra Jan 2006

Inventions On Computer Keyboard- A Triz Based Analysis, Umakant Mishra

Umakant Mishra

Every stage of evolution takes a product towards its ideality. This also happens in case of the Computer Keyboard. Today’s keyboards are outcome of hundreds of inventions in past. This article analyzes some interesting inventions on computer keyboard from TRIZ perspective. The inventions improve various aspects of computer keyboards like increasing operating (typing) efficiency, reducing size, improving ergonomic features and so on. This article was first published in TRIZ Journal (http://www.triz-journal.com/archives/2003/11/) in November 2003.


The 2006 Upper Ontology Summit Communique, Leo Obrst, Patrick Cassidy, Steven Ray, Barry Smith, Dagobert Soergel, Matthew West, Peter Yim Dec 2005

The 2006 Upper Ontology Summit Communique, Leo Obrst, Patrick Cassidy, Steven Ray, Barry Smith, Dagobert Soergel, Matthew West, Peter Yim

Steven R Ray

On March 14-15 in Gaithersburg, MD, at the US National Institute of Standards and Technology (NIST), the Upper Ontology Summit (UOS) took place. The Upper Ontology Summit was a convening of custodians of several prominent upper ontologies, key ontology technology participants, and interested other parties, with the purpose of finding a means to relate the different ontologies to each other. The result is reflected in a joint communiqué, directed to the larger ontology community and the general public, and expressing a joint intent to build bridges among the existing upper ontologies in ways designed to increase and rationalize their utilization …


Manufacturing Interoperability, Steven Ray, Al Jones Dec 2005

Manufacturing Interoperability, Steven Ray, Al Jones

Steven R Ray

As manufacturing and commerce become ever more global, companies are dependent increasingly upon the efficient and effective sharing of information with their partners, wherever they may be. Leading manufacturers perform this sharing with computers, which must therefore have the required software to encode and decode the associated electronic transmissions. Because no single company can dictate that all its partners use the same software, standards for how the information is represented become critical for error-free transmission and translation. The terms interoperability and integration are frequently used to refer to this error-free transmission and translation. This paper summarizes two projects underway at …


Case Study Amag - Reorganization Of Spare Parts Business, Enrico Senger Dec 2005

Case Study Amag - Reorganization Of Spare Parts Business, Enrico Senger

Enrico Senger

Swiss Volkswagen importer AMAG reorganized its spare parts supply process through a new method of collaboration between Volkswagen, AMAG’s central warehouse and regional warehouses, and service stations. From the service station spare parts orders via replenishment by the VW spare parts warehouse in Kassel (Germany) and by other sup-pliers, to Swiss customs, inventory levels in the central and regional warehouses, and the delivery to the service stations, the entire process utilizes the same database in real time. This enables AMAG to eliminate an existing sales and warehousing step and to manage the rapidly growing complexity of spare parts logistics resulting …


Towards New Web Services Based Supervisory Systems Dedicated To Nomadic Operators, Djilali Idoughi, Christophe Kolski Dec 2005

Towards New Web Services Based Supervisory Systems Dedicated To Nomadic Operators, Djilali Idoughi, Christophe Kolski

Professor Djilali IDOUGHI

This paper outlines new approaches and motivations about supervisory HMI, such as mobility and information access by different human actors belonging to the organization, by using diverse interaction devices, exploiting Web Services and their underlying technologies. The basic concepts are explained in the context of industrial supervision adopting a service oriented architecture (SOA) design approach which makes it possible to integrate real time information from different systems more easily than traditional ones. A representative supervisory scenario which illustrates the approach is described and discussed.


Chapter 7 Impact Of Interconnecting Issue Of Pv/Wes With Eu On Their Reliability Using A Fuzzy Scheme, Dr. Adel A. Elbaset Dec 2005

Chapter 7 Impact Of Interconnecting Issue Of Pv/Wes With Eu On Their Reliability Using A Fuzzy Scheme, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Chapter 5 Operation Control Strategy And Simulation Of Wtg Interconnected With Eu, Dr. Adel A. Elbaset Dec 2005

Chapter 5 Operation Control Strategy And Simulation Of Wtg Interconnected With Eu, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Chapter 4 Design Of Wes Interconnected With Eu, Dr. Adel A. Elbaset Dec 2005

Chapter 4 Design Of Wes Interconnected With Eu, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Definations, Dr. Adel A. Elbaset Dec 2005

Definations, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Abstract English, Dr. Adel A. Elbaset Dec 2005

Abstract English, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

Abstract of Ph. D. Thesis Study of Interconnecting Issues of Photovoltaic/Wind Hybrid System with Electric Utility Using Artificial Intelligence By Eng. Adel A. Elbaset Submitted to Electrical Engineering Dept., Faculty of Engineering, Elminia University The overall objective of PV and WES are to obtain electricity from the sun and wind that are cost competitive and even advantageous with respect to other energy sources. The global average insolation i.e. horizontal global and wind speed in Egypt are relatively good. The design of photovoltaic wind en¬ergy system hybrid power system (PV/WES HEPS) has many difficulties if we take all economical and technical …


Chapter 1 Introduction And Previous Work, Dr. Adel A. Elbaset Dec 2005

Chapter 1 Introduction And Previous Work, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Power Point, Chapter 1, Dr. Adel A. Elbaset Dec 2005

Power Point, Chapter 1, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Arabic Abstract, Dr. Adel A. Elbaset Dec 2005

Arabic Abstract, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

ملخص الرسالة "دراسة قضايا ربط نظام مختلط من منظومة فوتوفولتية و منظومة رياح مع شبكة كهربية بإستخدام الذكاء الاصطناعي" يشهد العالم إرتفاعاًَ ملحوظاَ في أسعار الوقود الحفري منذ نهاية القرن الماضي وحتي الاّن ، ويزداد هذا الإرتفاع والتناقص في المخزون يوماَ بعد يوم. ولهذا فقد إتجهت أنظار الباحثين في مجال توليد القدرة الكهربية إلي التوسع في إستغلال مصادر الطاقة الغير تقليدية وبصفة خاصة مصادر الطاقة الجديدة والمتجددة. وتعتبر الطاقة الجديدة والمتجددة من الطاقة التي لا تنضب بالاستخدام لأنها تعتمد علي مصادر طبيعية متجددة ، ومن أمثلة هذه المصادر الشمس، والرياح، والمد والجزر، حرارة باطن الأرض …………..الخ. ولقد أصبح استغلال هذه …


Examining Committee, Dr. Adel A. Elbaset Dec 2005

Examining Committee, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


References, Dr. Adel A. Elbaset Dec 2005

References, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Power Point, Chapter 3, Dr. Adel A. Elbaset Dec 2005

Power Point, Chapter 3, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Power Point, Chapter 2, Dr. Adel A. Elbaset Dec 2005

Power Point, Chapter 2, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


A_ Cover, Dr. Adel A. Elbaset Dec 2005

A_ Cover, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Contents, Dr. Adel A. Elbaset Dec 2005

Contents, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Computer Programs, Dr. Adel A. Elbaset Dec 2005

Computer Programs, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Chapter 8 Conclusions And Suggestions For Future Work, Dr. Adel A. Elbaset Dec 2005

Chapter 8 Conclusions And Suggestions For Future Work, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Chapter 3 Operation Control Strategy And Simulation Of Pv System Interconnected With Eu, Dr. Adel A. Elbaset Dec 2005

Chapter 3 Operation Control Strategy And Simulation Of Pv System Interconnected With Eu, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Chapter 6 Design And Control Strategy Of Pv/Wes Heps Interconnected With Eu, Dr. Adel A. Elbaset Dec 2005

Chapter 6 Design And Control Strategy Of Pv/Wes Heps Interconnected With Eu, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


An Overview Of Mac Protocols With Directional Antennas In Wireless Ad Hoc Networks, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu Dec 2005

An Overview Of Mac Protocols With Directional Antennas In Wireless Ad Hoc Networks, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu

Hong-Ning Dai

Although directional antennas have been used in mobile communications systems for quite a long time, realistic applications of directional or smart antennas in wireless ad hoc network have emerged just in recent years. Directional antennas provide numerous benefits, such as higher gains, increased transmission range and low interferences. Wireless medium access schemes play a crucial role in ensuring the efficient and fair sharing of wireless resources. Therefore there are many research work on mechanisms at the wireless medium access layer by using directional antennas. The new features of MAC with directional antennas can cause not only location dependent carrier sensing …


Mac Os X Forensics, Philip Craiger, Paul Burke Dec 2005

Mac Os X Forensics, Philip Craiger, Paul Burke

J. Philip Craiger, Ph.D.

This paper describes procedures for conducting forensic examinations of Apple Macs running Mac OS X. The target disk mode is used to create a forensic duplicate of a Mac hard drive and preview it. Procedures are discussed for recovering evidence from allocated space, unallocated space, slack space and virtual memory. Furthermore, procedures are described for recovering trace evidence from Mac OS X default email, web browser and instant messaging applications, as well as evidence pertaining to commands executed from a terminal.


Assessing Trace Evidence Left By Secure Deletion Programs, Paul Burke, Philip Craiger Dec 2005

Assessing Trace Evidence Left By Secure Deletion Programs, Paul Burke, Philip Craiger

J. Philip Craiger, Ph.D.

Secure deletion programs purport to permanently erase files from digital media. These programs are used by businesses and individuals to remove sensitive information from media, and by criminals to remove evidence of the tools or fruits of illegal activities. This paper focuses on the trace evidence left by secure deletion programs. In particular, five Windows-based secure deletion programs are tested to determine if they leave identifiable signatures after deleting a file. The results show that the majority of the programs leave identifiable signatures. Moreover, some of the programs do not completely erase file metadata, which enables forensic investigators to extract …