Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Wright State University (162)
- TÜBİTAK (74)
- University of Texas at El Paso (71)
- University of Nebraska - Lincoln (68)
- Selected Works (59)
-
- Embry-Riddle Aeronautical University (44)
- California Polytechnic State University, San Luis Obispo (34)
- Universitas Indonesia (30)
- Air Force Institute of Technology (27)
- SelectedWorks (21)
- Washington University in St. Louis (19)
- Marquette University (18)
- Old Dominion University (18)
- Technological University Dublin (17)
- Clemson University (15)
- University of Massachusetts Amherst (15)
- Portland State University (13)
- Singapore Management University (13)
- University of Dayton (11)
- Institute of Business Administration (9)
- University of Central Florida (9)
- Syracuse University (8)
- University of Arkansas, Fayetteville (8)
- University of Nevada, Las Vegas (8)
- Connecticut College (7)
- University of South Florida (7)
- University of Tennessee, Knoxville (7)
- Western Kentucky University (7)
- Wayne State University (6)
- Cleveland State University (5)
- Keyword
-
- Applied sciences (8)
- Department of Computer Science and Engineering (8)
- Ubiquitous Computing (8)
- #antcenter (7)
- Engineering (7)
-
- Optimization (7)
- Robotics (7)
- Security (7)
- Classification (6)
- Context-Aware (6)
- Interval computations (6)
- Technology (6)
- Computer science (5)
- Computer vision (5)
- GPGPU (5)
- Image processing (5)
- Localization (5)
- Mobile (5)
- Mobility (5)
- Simulation (5)
- Social media (5)
- Wireless sensor networks (5)
- Authentication (4)
- Computer security (4)
- Data mining (4)
- Digital forensics (4)
- Genetic algorithm (4)
- Genetic algorithms (4)
- Oceanography (4)
- Ontology (4)
- Publication
-
- Computer Science & Engineering Syllabi (154)
- Turkish Journal of Electrical Engineering and Computer Sciences (74)
- Departmental Technical Reports (CS) (64)
- Makara Journal of Technology (30)
- Department of Electrical and Computer Engineering: Faculty Publications (to 2015) (28)
-
- Journal of Digital Forensics, Security and Law (28)
- Theses and Dissertations (25)
- All Computer Science and Engineering Research (19)
- Electrical and Computer Engineering Faculty Publications (17)
- Electrical and Computer Engineering Faculty Research and Publications (17)
- Annual ADFSL Conference on Digital Forensics, Security and Law (16)
- Computer Engineering (15)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (14)
- Master's Theses (14)
- All Theses (13)
- Department of Electrical and Computer Engineering: Faculty Publications (13)
- Research Collection School Of Computing and Information Systems (13)
- Computer Science Faculty Publications (11)
- Electronic Theses and Dissertations (11)
- International Conference on Information and Communication Technologies (9)
- Martin L Griss (9)
- Browse all Theses and Dissertations (8)
- Computer Science Faculty Publications and Presentations (8)
- Doctoral Dissertations (7)
- JITP 2011: The Future of Computational Social Science (7)
- Masters Theses 1911 - February 2014 (7)
- Open Access Theses & Dissertations (7)
- USF Tampa Graduate Theses and Dissertations (7)
- Computer and Electronics Engineering: Dissertations, Theses, and Student Research (6)
- Conference papers (6)
- Publication Type
Articles 871 - 899 of 899
Full-Text Articles in Engineering
Design And Implement A Cost-Effective Wireless Communication Project On A Pic Training System, Steve Hsiung, Walter F. Deal, Lacides Agustin Osorio, Mathew Henderson
Design And Implement A Cost-Effective Wireless Communication Project On A Pic Training System, Steve Hsiung, Walter F. Deal, Lacides Agustin Osorio, Mathew Henderson
Engineering Technology Faculty Publications
Wireless communication becomes popular and widely used in almost every electronic product in our daily life. The RF communication is one of the major wireless applications in consumer products. Usually, it is integrated with an embedded system (microcontroller) to control various applications such as temperature sensing, data logging, data exchange, actuator activation, and user interaction wirelessly. A project based model can be used as an effective instructional strategy to enhance learning about complex RF concepts and technologies. The project method can lead to improved understanding and create interest by actively engaging the student with hands-on and problem solving and critical …
Generic Trace Logics, Christian Kissig, Alexander Kurz
Generic Trace Logics, Christian Kissig, Alexander Kurz
Engineering Faculty Articles and Research
We combine previous work on coalgebraic logic with the coalgebraic traces semantics of Hasuo, Jacobs, and Sokolova.
Protection Models For Web Applications, Karthick Jayaraman
Protection Models For Web Applications, Karthick Jayaraman
Electrical Engineering and Computer Science - Dissertations
Early web applications were a set of static web pages connected to one another. In contrast, modern applications are full-featured programs that are nearly equivalent to desktop applications in functionality. However, web servers and web browsers, which were initially designed for static web pages, have not updated their protection models to deal with the security consequences of these full-featured programs. This mismatch has been the source of several security problems in web applications.
This dissertation proposes new protection models for web applications. The design and implementation of prototypes of these protection models in a web server and a web browser …
Development Of Visualization Facility At The Gis And Remote Sensing Core Lab, University Of Nevada, Las Vegas, Haroon Stephen, William J. Smith, Zhongwei Liu
Development Of Visualization Facility At The Gis And Remote Sensing Core Lab, University Of Nevada, Las Vegas, Haroon Stephen, William J. Smith, Zhongwei Liu
Public Policy and Leadership Faculty Presentations
Visualization using advanced computational and graphic equipment has become a standard way of present day research. Availability of low cost and fast processing units, high resolution displays with graphic processing units, and specialized software has brought complex visualization capabilities to an office desktop. Nevertheless, when dealing with large datasets such as, global climate, geospatial, and social data the office desktop falls short and calls for a centralized visualization facility with high end computing and graphics equipment.
Visualization Facility at GIS and Remote Sensing Core Lab would be a useful and important addition to the UNLV IT infrastructure. It would provide …
Predictive And Adaptive Game Development A Practical Application Of Development Models To The Independent Video Game Industry, Liam A. Hunt
Predictive And Adaptive Game Development A Practical Application Of Development Models To The Independent Video Game Industry, Liam A. Hunt
Theses : Honours
Through the process of researching a number of game and system development models, this study defines two archetypical development models - the predictive and the adaptive. Using each of these models, two video games have been developed in order to measure the practical effect that they can have on the design, development process and player experience of a game. Using the knowledge gained through playtesting and an analysis of the relationship between each game and its development methodology, a number of development guidelines and recommendations have been specifically constructed for use by independent games developers. The practical development and written …
An Investigation Into Internetworking Education, Woratat Makasiranondh
An Investigation Into Internetworking Education, Woratat Makasiranondh
Theses: Doctorates and Masters
Computer network technology and the Internet grew rapidly in recent years. Their growth created a large demand from industry for the development of IT and internetworking professionals. These professionals need to be equipped with both technical hands-on skills and non-technical or soft skills. In order to supply new professionals to the industry, educational institutions need to address these skills training in their curricula. Technical hands-on skills in internetworking education can be emphasised through the practical use of equipment in classrooms. The provision of the networking equipment to the internetworking students is a challenge. Particularly, university students in developing countries may …
Relativistic Red-Black Trees, Philip William Howard, Jonathan Walpole
Relativistic Red-Black Trees, Philip William Howard, Jonathan Walpole
Computer Science Faculty Publications and Presentations
Operating system performance and scalability on sharedmemory many-core systems depends critically on efficient access to shared data structures. Scalability has proven difficult to achieve for many data structures. In this paper we present a novel and highly scalable concurrent red-black tree. Red-black trees are widely used in operating systems, but typically exhibit poor scalability. Our red-black tree has linear read scalability, uncontended read performance that is at least 25% faster than other known approaches, and deterministic lookup times for a given tree size, making it suitable for realtime applications.
The Ordering Requirements Of Relativistic And Reader-Writer Locking Approaches To Shared Data Access, Philip William Howard, Josh Triplett, Jonathan Walpole, Paul E. Mckenney
The Ordering Requirements Of Relativistic And Reader-Writer Locking Approaches To Shared Data Access, Philip William Howard, Josh Triplett, Jonathan Walpole, Paul E. Mckenney
Computer Science Faculty Publications and Presentations
The semantics of reader-writer locks allow read-side concurrency. Unfortunately, the locking primitives serialize access to the lock variable to an extent that little or no concurrency is realized in practice for small critical sections. Relativistic programming is a methodology that also allows read- side concurrency. Relativistic programming uses dfferent ordering constraints than reader-writer locking. The different ordering constraints allow relativistic readers to proceed without synchronization so relativistic readers scale even for very short critical sections. In this paper we explore the diferences between the ordering constraints for reader-writer locking and relativistic programs. We show how and why the dfferent ordering …
Concept-Driven Multi-Modality Fusion For Video Search, Xiao-Yong Wei, Yu-Gang Jiang, Chong-Wah Ngo
Concept-Driven Multi-Modality Fusion For Video Search, Xiao-Yong Wei, Yu-Gang Jiang, Chong-Wah Ngo
Research Collection School Of Computing and Information Systems
As it is true for human perception that we gather information from different sources in natural and multi-modality forms, learning from multi-modalities has become an effective scheme for various information retrieval problems. In this paper, we propose a novel multi-modality fusion approach for video search, where the search modalities are derived from a diverse set of knowledge sources, such as text transcript from speech recognition, low-level visual features from video frames, and high-level semantic visual concepts from supervised learning. Since the effectiveness of each search modality greatly depends on specific user queries, prompt determination of the importance of a modality …
Promoting The Buildout Of New Networks Vs. Compelling Access To The Monopoly Loop: A Clash Of Regulatory Paradigms, Christopher S. Yoo
Promoting The Buildout Of New Networks Vs. Compelling Access To The Monopoly Loop: A Clash Of Regulatory Paradigms, Christopher S. Yoo
All Faculty Scholarship
No abstract provided.
Autonomous Mobility And Manipulation Of A 9-Dof Wmra, William Garrett Pence
Autonomous Mobility And Manipulation Of A 9-Dof Wmra, William Garrett Pence
USF Tampa Graduate Theses and Dissertations
The wheelchair-mounted robotic arm (WMRA) is a 9-degree of freedom (DoF) assistive system that consists of a 2-DoF modified commercial power wheelchair and a custom 7-DoF robotic arm. Kinematics and control methodology for the 9-DoF system that combine mobility and manipulation have been previously developed and implemented. This combined control allows the wheelchair and robotic arm to follow a single trajectory based on weighted optimizations. However, for the execution of activities of daily living (ADL) in the real-world environment, modified control techniques have been implemented.
In order to execute macro ADL tasks, such as a "go to and pick up" …
A Dynamic Hierarchical Web-Based Portal, Matthew James Spaulding
A Dynamic Hierarchical Web-Based Portal, Matthew James Spaulding
USF Tampa Graduate Theses and Dissertations
A dynamic hierarchical web-based portal was created to house a suite of web-based supply chain management applications. The portal was designed in a hierarchical manner to match the structure of large companies. Administrators of the the portal have the ability to form the portal in such a way to mimic the existing structure of their company. Access rights to the applications in the portal may be granted or denied per division and the users of the portal are placed in these divisions based on their duty in the company. In addition, users are granted roles which dictate their ability to …
Design, Synthesis And Test Of Reversible Circuits For Emerging Nanotechnologies, Himanshu Thapliyal
Design, Synthesis And Test Of Reversible Circuits For Emerging Nanotechnologies, Himanshu Thapliyal
USF Tampa Graduate Theses and Dissertations
Reversible circuits are similar to conventional logic circuits except that they are built from reversible gates. In reversible gates, there is a unique, one-to-one mapping between the inputs and outputs, not the case with conventional logic. Also, reversible gates require constant ancilla inputs for reconfiguration of gate functions and garbage outputs that help in keeping reversibility. Reversible circuits hold promise in futuristic computing technologies like quantum computing, quantum dot cellular automata, DNA computing, optical computing, etc. Thus, it is important to minimize parameters such as ancilla and garbage bits, quantum cost and delay in the design of reversible circuits.
The …
Asymmetric Passive Dynamic Walker Used To Examine Gait Rehabilitation Methods, John Sushko
Asymmetric Passive Dynamic Walker Used To Examine Gait Rehabilitation Methods, John Sushko
USF Tampa Graduate Theses and Dissertations
Testing gait rehabilitation devices on humans can be a difficult task, due to the effects of the neurological controls of the human body. This thesis advances the use of a passive dynamic walker (PDW) tuned to have asymmetric gait patterns similar to those with physical impairments to test rehabilitation devices. A passive dynamic walker is a multipendulum system that has a stable gait pattern when walking down a slope without any energy inputs except the forces due to gravity. A PDW model is better suited for testing rehabilitation devices because it has been shown to resemble human gait and separates …
Robotic Hand Evaluation Based On Task Specific Kinematic Requirements, Carlos Rafael Neninger
Robotic Hand Evaluation Based On Task Specific Kinematic Requirements, Carlos Rafael Neninger
USF Tampa Graduate Theses and Dissertations
With the rise autonomous and robotic systems in field applications, the need for dexterous, highly adaptable end effectors has become a major research topic. Control mechanisms of robotics hands with a high number independent actuators is recognized as a complex, high dimensional problem, with exponentially complex algorithms. However, recent studies have shown that human hand motion possesses very high joint correlation which translates into a set of predefined postures, or synergies. The hand produces a motion using a complementing contribution of multiple joints, called synergies. The similarities place variables onto a common dimensional space, effectively reducing the number of independent …
Design Of Multi Agent Based Crowd Injury Model, Emin Kugu
Design Of Multi Agent Based Crowd Injury Model, Emin Kugu
Electrical & Computer Engineering Theses & Dissertations
A major concern of many government agencies is to predict and control the behavior of crowds in different situations. Many times such gatherings are legal, legitimate, and peaceful. But there are times when they can turn violent, run out of control, result in material damages and even casualties. It then becomes the duty of governments to bring them under control using a variety of techniques, including non-lethal and lethal weapons, if necessary.
In order to aid decision makers on the course of action in crowd control, there are modeling and simulation tools that can provide guidelines by giving programmed rules …
Spectrum Adaptation In Cognitive Radio Systems With Operating Constraints, Deepak R. Joshi
Spectrum Adaptation In Cognitive Radio Systems With Operating Constraints, Deepak R. Joshi
Electrical & Computer Engineering Theses & Dissertations
The explosion of high-data-rate-demanding wireless applications such as smart-phones and wireless Internet access devices, together with growth of existing wireless services, are creating a shortage of the scarce Radio Frequency (RF) spectrum. However, several spectrum measurement campaigns revealed that current spectrum usage across time and frequency is inefficient, creating the artificial shortage of the spectrum because of the traditional exclusive "command-and-control" model of using the spectrum. Therefore, a new concept of Cognitive Radio (CR) has been emerging recently in which unlicensed users temporarily borrow spectrum from the licensed Primary Users (PU) based on the Dynamic Spectrum Access (DSA) technique that …
Measuring Uncertainty Of Protein Secondary Structure, Alan Eugene Herner
Measuring Uncertainty Of Protein Secondary Structure, Alan Eugene Herner
Browse all Theses and Dissertations
This dissertation develops and demonstrates a method to measure the uncertainty of secondary structure of protein sequences using Shannon's information theory. This method is applied to a newly developed large dataset of chameleon sequences and to several protein hinges culled from the Hinge Atlas. The uncertainty of the central residue in each tripeptide is computed for each amino acid in a sequence using Cuff and Barton's CB513 as the reference set. It is shown that while secondary structure uncertainty is relatively high in chameleon regions [avg = 1.27 bits] it is relatively low in the regions 1-7 residues nearest a …
A User Centered Design And Prototype Of A Mobile Reading Device For The Visually Impaired, Robert B. Keefer
A User Centered Design And Prototype Of A Mobile Reading Device For The Visually Impaired, Robert B. Keefer
Browse all Theses and Dissertations
While mobile reading devices have been on the market and investigated by researchers in recent years, there is still work required to make these devices highly accessible to the visually impaired. A usability test with one such device revealed gaps in the current state of the art devices. These gaps focus mostly on the user interaction and his or her ability to quickly consume written reading material. In this dissertation a voice user interface (VUI) is presented that improves the ability of a blind user of a mobile reading device to interact with written material. The image processing techniques required …
Weapon Engagement Zone Maximum Launch Range Approximation Using A Multilayer Perceptron, Brian Michael Birkmire
Weapon Engagement Zone Maximum Launch Range Approximation Using A Multilayer Perceptron, Brian Michael Birkmire
Browse all Theses and Dissertations
This thesis investigates the use of an artificial neural network (ANN), in particular a Multi-Layer Perceptron (MLP), to perform function approximation on truth data representing a weapon engagement zone's (WEZ) maximum launch range. The WEZ of an air-to-air missile represents the boundaries and zones of effectiveness for a one-vs-one air-to-air combat engagement [13]. The intent is for the network to fuse table lookup and interpolation functionality into a physically compact and computationally efficient package, while improving approximation accuracy over conventional methods. Data was collected from simulated firings of a notional air-to-air missile model and used to train a two layer …
Design And Development Of A Fall Detection Device With Infrared Receiving Capabilities, Ammari Ramzi
Design And Development Of A Fall Detection Device With Infrared Receiving Capabilities, Ammari Ramzi
Browse all Theses and Dissertations
Fall related injuries are the leading cause of death and hospitalization among the elderly. Falls among older people become a major problem facing hospitals and nursing homes. In this study we put an effort to design a wireless device capable of detecting falls with the hope that this study will provide a path towards better healthcare monitoring and better independent living for the elderly.
In this project I showed how the fall detection device can be interfaced with different systems to achieve functionality without adding extra cost. For seniors who prefer to stay at their homes and live independently, the …
3-D Model Characterization And Identification From Intrinsic Landmarks, John L. Camp
3-D Model Characterization And Identification From Intrinsic Landmarks, John L. Camp
Browse all Theses and Dissertations
A method to automatically characterize and identify 3-D range scans based on intrinsic landmarks is presented. Intrinsic landmarks represent locally unique, intrinsic properties of a scanned surface, regardless of scale or rotation. The number, location, and characteristics of landmarks are used to characterize the scanned models. This method contains a selection process to identify stable, intrinsic landmarks for range scans as well as the identification of those scans. The selection process requires no user interaction or surface assumptions. It uses the principal curvatures at the range points to select the landmarks. First, a large number of landmarks are generated by …
A Domain Specific Language Based Approach For Developing Complex Cloud Computing Applications, Ashwin Kumar Manjunatha
A Domain Specific Language Based Approach For Developing Complex Cloud Computing Applications, Ashwin Kumar Manjunatha
Browse all Theses and Dissertations
Computing has changed. Lately, a slew of cheap, ubiquitous, connected mobile devices as well as seemingly unlimited, utility style, pay as you go computing resources has become available at the disposal of the common man. The latter commonly called Cloud Computing (or just Cloud) is democratizing computing by making large computing power accessible to people and corporations around the world easily and economically.
However, taking full advantage of this computing landscape, especially for the data intensive domains, has been hampered by many factors, the primary one being the complexity in developing applications for the variety of available platforms.
This thesis …
Comparing Extreme Programming And Waterfall Project Results, Feng Ji, Todd Sedano
Comparing Extreme Programming And Waterfall Project Results, Feng Ji, Todd Sedano
Todd Sedano
Waterfall and Extreme Programming are two software project methods used for project management. Although there are a number of opinions comparing the two methods regarding how they should be applied, none have used project data to clearly conclude which one is better. In this paper, we present the results of a controlled empirical study conducted at Carnegie Mellon University in Silicon Valley to learn about the effective transition from traditional development to agile development. We conducted a comparison research against these two approaches. Multiple teams were assigned a project; some used Waterfall development, others used Extreme Programming. The purpose of …
Contextualized Mobile Support For Learning By Doing In The Real World, Ray Bareiss, Natalie Linnell, Martin Griss
Contextualized Mobile Support For Learning By Doing In The Real World, Ray Bareiss, Natalie Linnell, Martin Griss
Ray Bareiss
This research addresses the use of mobile devices with both embedded and external sensors to provide contextualized help, advice, and remediation to learners engaged in real-world learn-by-doing tasks. This work is situated within the context of learning a complex procedure, in particular emergency responders learning to conduct urban search and rescue operations. Research issues include the design and delivery of contextualized performance support and the inferring of learner actions and intentions from sensor data to ensure that the right support is delivered just in time, as it is relevant to what the learner is doing.
Link Scheduling In Multi-Transmit-Receive Wireless Networks, Hong-Ning Dai, Soung Chang Liew, Liqun Fu
Link Scheduling In Multi-Transmit-Receive Wireless Networks, Hong-Ning Dai, Soung Chang Liew, Liqun Fu
Hong-Ning Dai
This paper investigates the problem of link scheduling to meet traffic demands with minimum airtime in a multitransmit-receive (MTR) wireless network. MTR networks are a new class of networks, in which each node can simultaneously transmit to a number of other nodes, or simultaneously receive from a number of other nodes. The MTR capability can be enabled by the use of multiple directional antennas or multiple channels. Potentially, MTR can boost the network capacity significantly. However, link scheduling that makes full use of the MTR capability must be in place before this can happen. We show that optimal link scheduling …
Exploring Security Improvement Of Wireless Networks With Directional Antennas, Hong-Ning Dai, Dong Li, Raymond Chi-Wing Wong
Exploring Security Improvement Of Wireless Networks With Directional Antennas, Hong-Ning Dai, Dong Li, Raymond Chi-Wing Wong
Hong-Ning Dai
There are a number of studies on using directional antennas in wireless networks. Many of them concentrate on analyzing the theoretical capacity improvement by using directional antennas. Other studies focus on designing proper Medium Access Control (MAC) protocols to improve the practical network throughput. There are few works on the security improvement using directional antennas. In this paper, we explore the benefits of directional antennas in security improvements on both singlehop and multi-hop wireless networks. In particular, we found that using directional antennas in wireless networks can significantly reduce the eavesdropping probabilities of both single-hop transmissions as well as multi-hop …
Challenges Associated With Ict Asset Disposal In Tanzania, Faith J. Shimba, Daniel Koloseni
Challenges Associated With Ict Asset Disposal In Tanzania, Faith J. Shimba, Daniel Koloseni
Faith Joel Shimba
Government and non–Government institutions are heavily investing in Information and Communication Technologies (ICT) to enhance their businesses and operational activities. This trend has partially been inspired by the lift of computer ban in 1980s where millions of ICT assets had been imported. Subsequently, there is a rapid increase of Internet Service Providers (ISPs), Mobile Service Providers (MSP), and ICT asset vendors’ country-wide. This implies a massive increase in imported ICT assets as well as the number of ICT assets that are going out of the ICT asset life cycle. In order to study challenges facing Tanzania in disposing end of …
Computing Without Borders? Adapting An Irish Programme For The Tanzanian Ict Market, Faraja Igira, Herman Mandari, Bosi Masamila, Salehe Mwachaka, Zanifa Omar, Jafari Said, Faith J. Shimba, Rose Tinabo, June Barret, Damian Gordon, Paul Kelly, Fredick Mtenzi, Oliver O'Connor, Patricia O'Byrne, Ciaran O'Leary
Computing Without Borders? Adapting An Irish Programme For The Tanzanian Ict Market, Faraja Igira, Herman Mandari, Bosi Masamila, Salehe Mwachaka, Zanifa Omar, Jafari Said, Faith J. Shimba, Rose Tinabo, June Barret, Damian Gordon, Paul Kelly, Fredick Mtenzi, Oliver O'Connor, Patricia O'Byrne, Ciaran O'Leary
Faith Joel Shimba
A Tanzanian higher education institution (Institute of Finance Management) and an Irish higher education institutio (Dublin Institute of Technology) have worked in partnership to develop the final stage of a Computer Science programme to meet the specific needs of the Tanzanian Information and Communication Technology (ICT) sector. The designed stage sits above three stages of a programme designed for the Irish ICT sector which was transplanted to the Tanzanian context. The final stage is crucial as it represents the final bridge between the employment market and the programme, which is informed by the best practice, needs and requirements of both …