Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

1997

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 136

Full-Text Articles in Engineering

Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 13, Number 10, December 1997, College Of Engineering And Computer Science, Wright State University Dec 1997

Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 13, Number 10, December 1997, College Of Engineering And Computer Science, Wright State University

BITs and PCs Newsletter

A twelve page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.


Coincidences Are Not Accidental: A Theorem, Vladik Kreinovich Dec 1997

Coincidences Are Not Accidental: A Theorem, Vladik Kreinovich

Departmental Technical Reports (CS)

In this paper, we formalize and prove the statement that coincidences cannot be accidental, a statement that underlies many useful heuristics in mathematics and physics.

Our proof uses a version of Kolmogorov complexity, a technique originally developed to describe randomness and "accidentalness".


Why Kolmogorov Complexity In Physical Equations, Vladik Kreinovich, Luc Longpre Dec 1997

Why Kolmogorov Complexity In Physical Equations, Vladik Kreinovich, Luc Longpre

Departmental Technical Reports (CS)

Several researchers, including M. Gell-Mann, argue that the notion of Kolmogorov complexity, developed in the algorithmic information theory, is useful in physics (i.e., in the description of the physical world). Their arguments are rather convincing, but there seems to be a gap between traditional physical equations and Kolmogorov complexity: namely, it is not clear how the standard equations of physics can lead to algorithmic notions underlying Kolmogorov complexity. In this paper, this "gap" is bridged: we explain how Kolmogorov complexity naturally appear in physical equation.


Flow And Congestion Control For Internet Streaming Applications, Shanwei Cen, Calton Pu, Jonathan Walpole Dec 1997

Flow And Congestion Control For Internet Streaming Applications, Shanwei Cen, Calton Pu, Jonathan Walpole

Computer Science Faculty Publications and Presentations

The emergence of streaming multimedia players provides users with low latency audio and video content over the Internet. Providing high-quality, best-effort, real-time multimedia content requires adaptive delivery schemes that fairly share the available network bandwidth with reliable data protocols such as TCP. This paper proposes a new flow and congestion control scheme, SCP (Streaming Control Protocol) , for real-time streaming of continuous multimedia data across the Internet. The design of SCP arose from several years of experience in building and using adaptive real-time streaming video players. SCP addresses two issues associated with real-time streaming. First, it uses a congestion control …


Self-Assembly Of Microstructures, Paul E. Kladitis Dec 1997

Self-Assembly Of Microstructures, Paul E. Kladitis

Theses and Dissertations

Four areas are investigated in this research: erecting microstructures normal to the substrate plane without direct human intervention (self-assembled), providing low resistance electrical connections to the erected microstructure, realizing circular motion normal to the substrate plane, and implementing a micro-robot. The designs in this research concentrate on erecting and providing power to a leg designed for use with the micro-robot. The leg and the attached low resistance electrical connectors were not self-assembled because the accompanying actuators were not powerful enough. However, the novel connectors provide the most practical, versatile, and lowest possible resistance connections for the MUMPs fabrication process. The …


A Comparative Analysis Of Networks Of Workstations And Massively Parallel Processors For Signal Processing, David C. Gindhart Dec 1997

A Comparative Analysis Of Networks Of Workstations And Massively Parallel Processors For Signal Processing, David C. Gindhart

Theses and Dissertations

The traditional approach to parallel processing has been to use Massively Parallel Processors (MPPs). An alternative design is commercial-off-the-shelf (COTS) workstations connected to high-speed networks. These networks of workstations (NOWs) typically have faster processors, heterogeneous environments, and most importantly, offer a lower per node cost. This thesis compares the performance of MPPs and NOWs for the two-dimensional fast Fourier transform (2-D FFT). Three original, high-performance, portable 2-D FFTs have been implemented: the vector-radix, row-column and pipeline. The performance of these algorithms was measured on the Intel Paragon, IBM SP2 and the AFIT NOW, which consists of 6 Sun Ultra workstations …


A Reconfigurable Superscalar Architecture, Christopher B. Mayer Dec 1997

A Reconfigurable Superscalar Architecture, Christopher B. Mayer

Theses and Dissertations

The invention of the Field Programmable Gate Array (FPGA) has led to a number of interesting developments. One is the idea of providing custom hardware support for applications running on a computer. These reconfigurable computers have been shown to decrease the execution time for some applications. Based on past results, attention has subsequently turned to using reconfigurable computing in general-purpose computers (e.g. desktop and workstation environments). This thesis develops a design for just such a computer. The design, FPGADLX, is based on a hypothetical superscalar computer running the DLX instruction set and is generic enough in principle to be adapted …


Message-Bundle Converting In Intenet Protocol Multicast-Based High Level Architecture Exercises, Tracy A. Bobo Dec 1997

Message-Bundle Converting In Intenet Protocol Multicast-Based High Level Architecture Exercises, Tracy A. Bobo

Theses and Dissertations

The Department of Defense is pushing for more wide-spread and realistic interactive training simulations which increases the demand on network capacity and resources. While network bandwidth is a measurable resource, packet bandwidth, or the number of packets-per-second (Pk/s) a host can handle, is a shifting commodity. This research analyzes host performance characteristics under varying data loads. The hosts include SGI single and multi-processor systems and Intel Pentium platforms using both Windows 95 and Linux Operating Systems. The networking media covers Ethernet, ATM and FDDI. For the ATM network, both AAL5 and IP over ATM were analyzed. With the data from …


Modeling And Simulation Support For Parallel Algorithms In A High-Speed Network, Dustin E. Yates Dec 1997

Modeling And Simulation Support For Parallel Algorithms In A High-Speed Network, Dustin E. Yates

Theses and Dissertations

This thesis investigates the ability of a simulation model to compare and contrast parallel processing algorithms in a high-speed network. The model extends existing modeling, analysis, and comparison of parallel algorithms by providing graphics based components that facilitate the measurement of system resources. Simulation components are based on the Myrinet local area network standard. The models provide seven different topologies to contrast the performance of five variations of Fast Fourier Transform (FFT) algorithms. Furthermore, the models were implemented using a commercially developed product that facilitates the testing of additional topologies and the investigation of hardware variations. Accurate comparisons are statistically …


A Modeling And Simulation Approach To Characterize Network Layer Internet Survivability, Leif S. King Dec 1997

A Modeling And Simulation Approach To Characterize Network Layer Internet Survivability, Leif S. King

Theses and Dissertations

The Air Force Core Competency of Information Superiority will be achieved in an age of decreasing AF manpower and corporate expertise. Increased AF reliance on COTS solutions, coupled with nearly ubiquitous points of entry to communication networks, create unique challenges in maintaining the Information Superiority edge. The protection of the internet is part of this equation. The internet supports the daily business traffic of the Air Force. Personnel, finance, and supply data flow through its routers. Controlling an adversary's access to our information systems, either the data, or the hardware and software that control the data and transform it into …


A Mammographic Registration Method Based On Optical Flow And Multiresolution Computing, Kevin A. Lee Dec 1997

A Mammographic Registration Method Based On Optical Flow And Multiresolution Computing, Kevin A. Lee

Theses and Dissertations

Mammography is a potent weapon in the fight against Breast Cancer, due in large part to its widespread availability and low cost. Despite the fact that mammography can detect small lesions as early as two years before they become palpable on physical exam, between 10 and 30 percent of cancerous lesions go undetected during evaluation by the radiologist. One approach to improving detection rates involves comparing mammograms of the same breast from successive years. Since most forms of breast cancer develop slowly, multiple view techniques might be able to detect subtle changes indicative of cancerous growth. This thesis proposes a …


Fpga Processor Implementation For The Forward Kinematics Of The Umdh, Steven M. Parmley Dec 1997

Fpga Processor Implementation For The Forward Kinematics Of The Umdh, Steven M. Parmley

Theses and Dissertations

The focus of this research was on the implementation of a forward kinematic algorithm for the Utah MIT Dexterous Hand (UMDH). Specifically, the algorithm was synthesized from mathematical models onto a Field Programmable Gate Array (FPGA) processor. This approach is different from the classical, general purpose microprocessor design where all robotic controller functions including forward Kinematics are executed serially from a compiled programming language such as C. The compiled code and subsequent real time operating system must be stored on some form of nonvolatile memory, typically magnetic media such as a fixed or hard disk drive, along with other computer …


A Performance Analysis Of The Faugeras Color Space As A Component Of Color Histogram-Based Image Retrieval, Chad A. Vander Meer Dec 1997

A Performance Analysis Of The Faugeras Color Space As A Component Of Color Histogram-Based Image Retrieval, Chad A. Vander Meer

Theses and Dissertations

The use of color histograms for image retrieval from databases has been implemented in many variations. Selecting the appropriate color space for similarity comparisons is an important part of a color histogram technique. This paper serves to introduce and evaluate the performance of a color space through the use of color histograms. Performance is evaluated by correlating the similarity results obtained from various color feature vector techniques (including color histgramming) to those gathered through a human perceptual test. The perceptual test required 36 human subjects to evaluate the similarity of 10 military aircraft images. The same 10 images were also …


Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 13, Number 9, November 1997, College Of Engineering And Computer Science, Wright State University Nov 1997

Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 13, Number 9, November 1997, College Of Engineering And Computer Science, Wright State University

BITs and PCs Newsletter

A twelve page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.


Spinal Cord Stimulation For Chronic Pain Management: Towards An Expert System, Kenneth M. Alo, Richard Alo, Andre De Korvin, Vladik Kreinovich Nov 1997

Spinal Cord Stimulation For Chronic Pain Management: Towards An Expert System, Kenneth M. Alo, Richard Alo, Andre De Korvin, Vladik Kreinovich

Departmental Technical Reports (CS)

Chronic pain is a serious health problem affecting millions of people worldwide. Currently, spinal cord simulation is one of the most effective methods of easing the chronic pain. For most patients, a careful selection of weak electric currents enables to drastically decrease the pain level. The first devices offered only a few possible regimes, and it was possible to choose an appropriate regime simply by exhaustive search. Continuous engineering progress leads to more and more flexible devices that offer a wide variety of millions of possible simulation regimes. With this variety, it is no longer possible to test all of …


From Fuzzification And Intervalization To Anglification: A New 5d Geometric Formalism For Physics And Data Processing, Scott A. Starks, Vladik Kreinovich Nov 1997

From Fuzzification And Intervalization To Anglification: A New 5d Geometric Formalism For Physics And Data Processing, Scott A. Starks, Vladik Kreinovich

Departmental Technical Reports (CS)

No abstract provided.


From Expert Words Directly To Numerical Simulations: Group-Theoretic Approach To Computing With Words In Information/Intelligent Systems, Vladik Kreinovich, Brian Penn, Scott A. Starks Nov 1997

From Expert Words Directly To Numerical Simulations: Group-Theoretic Approach To Computing With Words In Information/Intelligent Systems, Vladik Kreinovich, Brian Penn, Scott A. Starks

Departmental Technical Reports (CS)

In many real-life situations, e.g., when making an environmental decision, it is important to be able to predict long-term consequences of different decisions. Very often, these predictions must be done in the situation where the only available information consists of expert rules, which are formulated by words from natural language. One possible way to transform these expert words into numerical simulation (leading to prediction) is to use the fuzzy control methodology. However, there is a problem with using this methodology: it invokes replacing each word by a membership function, and this replacement drastically increases the required computer space (and thus, …


Searches For Scalar Top And Scalar Bottom Quarks At Lep2, Barate, R.; Et Al., M. Thulasidas Nov 1997

Searches For Scalar Top And Scalar Bottom Quarks At Lep2, Barate, R.; Et Al., M. Thulasidas

Research Collection School Of Computing and Information Systems

Searches for scalar top and bottom quarks have been performed with data collected by the ALEPH detector at LEP. The data sample consists of 21.7 pb−1 taken at √ s = 161, 170, and 172 GeV and 5.7 pb−1 taken at √ s = 130 and 136 GeV. No evidence for scalar top quarks or scalar bottom quarks was found in the channels ˜t → cχ, ˜t → bℓν˜, and b˜ → bχ. For the channel ˜t → cχ a limit of 67 GeV/c 2 has been set on the scalar top quark mass, independent of the mixing angle between …


Development Of A Message Model To Support Integrated Design And Manufacturing, Venkat Allada, Steven Ray Oct 1997

Development Of A Message Model To Support Integrated Design And Manufacturing, Venkat Allada, Steven Ray

Steven R Ray

Mere sharing of information between engineering design systems and manufacturing systems does not represent an ideal integrated system. While information sharing represents an important aspect of an integrated design and manufacturing environment, an equally critical aspect is the "interaction" capability of the two systems. This interaction could be in the form of feedback and request messages between the design and manufacturing systems. The goal of this study is to investigate the issues involved in the development of a conceptual message model that will facilitate an "upstream" and a "downstream" communication between the design activities and process planning activities. The development …


A Political Psychological Primer Of Virtual Reality Sequelae For Mental Health Professionals, Ibpp Editor Oct 1997

A Political Psychological Primer Of Virtual Reality Sequelae For Mental Health Professionals, Ibpp Editor

International Bulletin of Political Psychology

This paper describes a number of sequelae stemming from virtual reality (VR) and VR technology (VRT) based on theoretical and empirical research in the behavioral sciences, social sciences, humanities.


Ua3/9/2 Information Technology Summary Report, Wku Information Technology Oct 1997

Ua3/9/2 Information Technology Summary Report, Wku Information Technology

WKU Archives Records

Report of the WKU Information Technology Division to the president regarding operations from 1991 through 1997.


Frequency-Mixing Detection Of Polarization-Modulated Light Using Different Periodic Analyzers, R.M.A. Azzam Oct 1997

Frequency-Mixing Detection Of Polarization-Modulated Light Using Different Periodic Analyzers, R.M.A. Azzam

Department of Electrical and Computer Engineering: Faculty Publications

We derive the equations that permit the use of six different periodic analyzers for the frequency- mixing detection (FMD) of polarization -modulated light. The six periodic analyzers are (1) the rotating linear analyzer, (2) rotating half -wave plate and fixed linear analyzer, (3) rotating quarter -wave plate and fixed linear analyzer, (4) rotating linear analyzer and fixed linear analyzer, (5) oscillating -phase retarder and fixed linear analyzer, and (6) oscillating optical rotator and fixed linear analyzer. In all cases, the average polarization and the polarization and intensity modulation parameters of the light beam can be determined easily and explicitly from …


Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 13, Number 8, October 1997, College Of Engineering And Computer Science, Wright State University Oct 1997

Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 13, Number 8, October 1997, College Of Engineering And Computer Science, Wright State University

BITs and PCs Newsletter

A twelve page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.


Modeling And Comparison Of Wormhole Routed Mesh And Torus Networks, Ronald I. Greenberg, Lee Guan Oct 1997

Modeling And Comparison Of Wormhole Routed Mesh And Torus Networks, Ronald I. Greenberg, Lee Guan

Computer Science: Faculty Publications and Other Works

2D-mesh and torus networks have often been proposed as the interconnection pattern for parallel computers. In addition, wormhole routing has increasingly been advocated as a method of reducing latency. Most analysis of wormhole routed networks, however, has focused on the torus and the broader class of k-ary n-cubes to which it belongs. This paper presents a performance model for the wormhole routed mesh, and it compares the performance of the mesh and torus based on theoretical and empirical analyses.


A Player For Adaptive Mpeg Video Streaming Over The Internet, Jonathan Walpole, Rainer Koster, Shanwei Cen, Crispin Cowan, David Maier, Dylan Mcnamee, Calton Pu, David Steere, Liujin Yu Oct 1997

A Player For Adaptive Mpeg Video Streaming Over The Internet, Jonathan Walpole, Rainer Koster, Shanwei Cen, Crispin Cowan, David Maier, Dylan Mcnamee, Calton Pu, David Steere, Liujin Yu

Computer Science Faculty Publications and Presentations

This paper describes the design and implementation of a real-time, streaming, Internet video and audio player. The player has a number of advanced features including dynamic adaptation to changes in available bandwidth, latency and latency variation; a multi-dimensional media scaling capability driven by user-specified quality of service (QoS) requirements; and support for complex content comprising multiple synchronized video and audio streams. The player was developed as part of the QUASAR t project at Oregon Graduate Institute, is freely available, and serves as a testbed for research in adaptive resource management and QoS control.


Strict Achimedean T-Norms And T-Conorms As Universal Approximators, Hung T. Nguyen, Vladik Kreinovich, Piotr Wojciechowski Sep 1997

Strict Achimedean T-Norms And T-Conorms As Universal Approximators, Hung T. Nguyen, Vladik Kreinovich, Piotr Wojciechowski

Departmental Technical Reports (CS)

In knowledge representation, when we have to use logical connectives, various continuous t-norms and t-conorms are used. In this paper, we show that every continuous t-norm and t-conorm can be approximated, to an arbitrary degree of accuracy, by a strict Archimedean t-norm (t-conorm).


Computational Geometry And Artifical Neural Networks: A Hybrid Approach To Optimal Sensor Placement For Aerospace Nde, Roberto A. Osegueda, Carlos M. Ferregut, Mary J. George, Jose M. Gutierrez, Vladik Kreinovich Sep 1997

Computational Geometry And Artifical Neural Networks: A Hybrid Approach To Optimal Sensor Placement For Aerospace Nde, Roberto A. Osegueda, Carlos M. Ferregut, Mary J. George, Jose M. Gutierrez, Vladik Kreinovich

Departmental Technical Reports (CS)

The ideal design of an airplane should include built-in sensors that are pre-blended in the perfect aerodynamic shape. Each built-in sensor is expensive to blend in and requires continuous maintenance and data processing, so we would like to use as few sensors as possible. The ideal formulation of the corresponding optimization problem is, e.g., to minimize the average detection error for fault locations. However, there are two obstacles to this ideal formulation:

--First, this ideal formulation requires that we know the probabilities of different fault locations etc., and there are usually not enough statistics to determine these probabilities.

--Second, even …


Identification And Classification Of Inconsistency In Relationship To Software Maintenance, Daniel Cooke, Luqi, Vladik Kreinovich Sep 1997

Identification And Classification Of Inconsistency In Relationship To Software Maintenance, Daniel Cooke, Luqi, Vladik Kreinovich

Departmental Technical Reports (CS)

This paper provides an overview of the relationship between recent work in logic programming and recent developments in software engineering. The relationship to software engineering is more specifically concerned with how formal specifications can be used to explain and represent the basis of software maintenance and evolution. Some of the results reviewed here have appeared in our previous papers. These previous results are summarized, extended, and made more general in this paper.


The Challenge Of Hyper-Spectral Satellite Imaging And Integer-Valued Fuzzy Sets, Maria Beltran, Vladik Kreinovich, Scott A. Starks Sep 1997

The Challenge Of Hyper-Spectral Satellite Imaging And Integer-Valued Fuzzy Sets, Maria Beltran, Vladik Kreinovich, Scott A. Starks

Departmental Technical Reports (CS)

Satellite images already produce huge amounts of data, which makes their processing a serious computational challenge. This problem will become even more complicated with the launch of multi-spectral Earth-imaging satellites that will increase the amount of information by at least two orders of magnitude. With such a huge amount of information, it is necessary to come up with data processing methods that are as fast as possible. In particular, we show that for fuzzy processing techniques, this leads to the necessity to use integer-valued fuzzy sets.


Sensor Placement For Aerospace Non-Destructive Evaluation (Nde): Optimization Under Fuzzy Uncertainty, Roberto A. Osegueda, Carlos M. Ferregut, Mary J. George, Jose M. Gutierrez, Vladik Kreinovich Sep 1997

Sensor Placement For Aerospace Non-Destructive Evaluation (Nde): Optimization Under Fuzzy Uncertainty, Roberto A. Osegueda, Carlos M. Ferregut, Mary J. George, Jose M. Gutierrez, Vladik Kreinovich

Departmental Technical Reports (CS)

No abstract provided.