Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Old Dominion University (12)
- Air Force Institute of Technology (11)
- University of Central Florida (9)
- University of South Florida (4)
- University of Kentucky (3)
-
- University of Nevada, Las Vegas (3)
- Wright State University (3)
- California Polytechnic State University, San Luis Obispo (2)
- Louisiana Tech University (2)
- University of Texas at El Paso (2)
- Western University (2)
- Claremont Colleges (1)
- Munster Technological University (1)
- Portland State University (1)
- University of Arkansas, Fayetteville (1)
- University of Denver (1)
- University of Massachusetts Amherst (1)
- University of Tennessee, Knoxville (1)
- Wayne State University (1)
- Western Michigan University (1)
- William & Mary (1)
- Keyword
-
- Machine learning (4)
- #antcenter (3)
- Applied sciences (3)
- Department of Computer Science and Engineering (3)
- Computer simulation (2)
-
- Pattern recognition (2)
- Vehicular ad hoc networks (Computer networks) (2)
- Websites (2)
- .Net (1)
- 3D Models (1)
- Actionscript (1)
- Ad Hoc Networks (1)
- Ad hoc networks (Computer networks) (1)
- Admission Control, Channel Allocation, Clustering in VANET, Medium Access Organization, V2I, V2V (1)
- Allocation (1)
- Anatomical contours (1)
- B-Spline curves (1)
- B-Spline surfaces (1)
- BGP (1)
- Behavior modification (1)
- Beowulf Cluster (1)
- BioCAD (1)
- Biological control systems (1)
- Biosensors (1)
- Bluetooth (1)
- Boosted trees (1)
- Cell phones and traffic accidents (1)
- Chameleon Sequences (1)
- Chesapeake Bay (1)
- Chou-Fasman Numbers (1)
- Publication
-
- Theses and Dissertations (11)
- Electronic Theses and Dissertations (10)
- Computer Science Theses & Dissertations (5)
- USF Tampa Graduate Theses and Dissertations (4)
- Browse all Theses and Dissertations (3)
-
- Computational Modeling & Simulation Engineering Theses & Dissertations (3)
- Electrical & Computer Engineering Theses & Dissertations (3)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (3)
- University of Kentucky Doctoral Dissertations (3)
- Doctoral Dissertations (2)
- Electronic Thesis and Dissertation Repository (2)
- Open Access Theses & Dissertations (2)
- CGU Theses & Dissertations (1)
- Computer Engineering (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
- Dissertations (1)
- Dissertations and Theses (1)
- Dissertations, Theses, and Masters Projects (1)
- Doctoral Dissertations 1896 - February 2014 (1)
- Electrical Engineering (1)
- Engineering Management & Systems Engineering Theses & Dissertations (1)
- Masters Theses (1)
- Theses (1)
- Wayne State University Dissertations (1)
Articles 1 - 30 of 63
Full-Text Articles in Engineering
Powersearch: Augmenting Mobile Phone Search Through Personalization, Xiangyu Liu
Powersearch: Augmenting Mobile Phone Search Through Personalization, Xiangyu Liu
Computer Science and Computer Engineering Undergraduate Honors Theses
Cell phone has become a fundamental element of people's life. People use it to call each other, browse websites, send text messages, etc. Among all the functionalities, the most important and frequently used is the search functionality. Based on ComScore, in July 2008, Google was estimated to host 235 millions searches per day. However, unlike the search on desktop, the search on cell phone has one critical constrain: battery. Cell phone performing a normal Google search, the battery drains very fast. The reason is that when sending a query to and fetching the results from Google, cell phone keeps communicating …
Quantification Of Stochastic Uncertainty Propagation For Monte Carlo Depletion Methods In Reactor Analysis, Quentin Thomas Newell
Quantification Of Stochastic Uncertainty Propagation For Monte Carlo Depletion Methods In Reactor Analysis, Quentin Thomas Newell
UNLV Theses, Dissertations, Professional Papers, and Capstones
The Monte Carlo method provides powerful geometric modeling capabilities for large problem domains in 3-D; therefore, the Monte Carlo method is becoming popular for 3-D fuel depletion analyses to compute quantities of interest in spent nuclear fuel including isotopic compositions. The Monte Carlo approach has not been fully embraced due to unresolved issues concerning the effect of Monte Carlo uncertainties on the predicted results.
Use of the Monte Carlo method to solve the neutron transport equation introduces stochastic uncertainty in the computed fluxes. These fluxes are used to collapse cross sections, estimate power distributions, and deplete the fuel within depletion …
Cytongrasp: Cyton Alpha Controller Via Graspit! Simulation, Nicholas Wayne Overfield
Cytongrasp: Cyton Alpha Controller Via Graspit! Simulation, Nicholas Wayne Overfield
Masters Theses
This thesis addresses an expansion of the control programs for the Cyton Alpha 7D 1G arm. The original control system made use of configurable software which exploited the arm’s seven degrees of freedom and kinematic redundancy to control the arm based on desired behaviors that were configured off-line. The inclusions of the GraspIt! grasp planning simulator and toolkit enables the Cyton Alpha to be used in more proactive on-line grasping problems, as well as, presenting many additional tools for on-line learning applications. In short, GraspIt! expands what is possible with the Cyton Alpha to include many machine learning tools and …
Development Of A Simulation Tool For Analysis Of Freeway Crashes Due To Cell Phone Usage, Sourabh Sriom
Development Of A Simulation Tool For Analysis Of Freeway Crashes Due To Cell Phone Usage, Sourabh Sriom
UNLV Theses, Dissertations, Professional Papers, and Capstones
Research shows that drivers are susceptible to numerous distractions while driving which can be held responsible as the reason of a crash. Usage of cell phones, i.e. talking or texting while driving is considered one of the prominent distractions which causes a crash. This dissertation aims to study the number of crashes occurring on the freeways and their relation with the drivers of these cars using cell phones while they are driving. Since crashes occur relatively less frequently, the study of crashes is done using what is called the "rare event" theory. Java based simulations are done to model a …
Investigating The Role Of The Internet In Women And Minority Stem Participation: A Case Study Of Two Florida Engineering Programs, Arland Nguema Ndong
Investigating The Role Of The Internet In Women And Minority Stem Participation: A Case Study Of Two Florida Engineering Programs, Arland Nguema Ndong
USF Tampa Graduate Theses and Dissertations
Despite our awareness of the fascination modern humans have with the Internet, little is known about how and why colleges and universities create and maintain Websites. At the most general level, in this case study, I hypothesize that university Websites serve as communication and marketing tools in attracting students. At the most specific level, I postulate that civil engineering programs with Web pages depicting images of women and minorities would be more successful in recruiting and retaining women and students of color than civil engineering programs with Web pages displaying fewer or no images of women and minorities. The primary …
Three-Dimensional Modeling Of Electrostatic Precipitator Using Hybrid Finite Element - Flux Corrected Transport Technique, Niloofar Farnoosh
Three-Dimensional Modeling Of Electrostatic Precipitator Using Hybrid Finite Element - Flux Corrected Transport Technique, Niloofar Farnoosh
Electronic Thesis and Dissertation Repository
This thesis presents the results of a three-dimensional simulation of the entire precipitation process inside a single-electrode one-stage electrostatic precipitator (ESP). The model was designed to predict the motion of ions, gas and solid particles. The precipitator consists of two parallel grounded collecting plates with a corona electrode mounted at the center, parallel to the plates and excited with a high dc voltage. The complex mutual interaction between the three coexisting phenomena of electrostatic field, fluid dynamics and the particulate transport, which affect the ESP process, were taken into account in all the simulations. The electrostatic field and ionic space …
A Google Earth-Based Framework For Visualization Of The Chesapeake Bay Operational Forecast System, Gary Lawson
A Google Earth-Based Framework For Visualization Of The Chesapeake Bay Operational Forecast System, Gary Lawson
Computational Modeling & Simulation Engineering Theses & Dissertations
For the persons who live near and travel the waters of the Chesapeake Bay, the data provided by the Chesapeake Bay Operational Forecast System (CBOFS) is invaluable. The information provided includes measurements and forecasts of surface wind velocity, water current velocity, salinity levels, water level, and temperature. Currently, this information is freely available on the CBQ_FS website hosted by the National Oceanographic and Atmospheric Administration (NOAA). It is offered as Nowcast, measured data, and Forecast data and is visualized using 2D images which describe a subset of the data in an easy to read chart. However, if the data were …
Addressing Computational Complexity Of High Speed Distributed Circuits Using Model Order Reduction, Ehsan Rasekh
Addressing Computational Complexity Of High Speed Distributed Circuits Using Model Order Reduction, Ehsan Rasekh
Electronic Thesis and Dissertation Repository
Advanced in the fabrication technology of integrated circuits (ICs) over the last couple of years has resulted in an unparalleled expansion of the functionality of microelectronic systems. Today’s ICs feature complex deep-submicron mixed-signal designs and have found numerous applications in industry due to their lower manufacturing costs and higher performance levels. The tendency towards smaller feature sizes and increasing clock rates is placing higher demands on signal integrity design by highlighting previously negligible interconnect effects such as distortion, reflection, ringing, delay, and crosstalk. These effects if not predicted in the early stages of the design cycle can severely degrade circuit …
A Novel Malware Target Recognition Architecture For Enhanced Cyberspace Situation Awareness, Thomas E. Dube
A Novel Malware Target Recognition Architecture For Enhanced Cyberspace Situation Awareness, Thomas E. Dube
Theses and Dissertations
The rapid transition of critical business processes to computer networks potentially exposes organizations to digital theft or corruption by advanced competitors. One tool used for these tasks is malware, because it circumvents legitimate authentication mechanisms. Malware is an epidemic problem for organizations of all types. This research proposes and evaluates a novel Malware Target Recognition (MaTR) architecture for malware detection and identification of propagation methods and payloads to enhance situation awareness in tactical scenarios using non-instruction-based, static heuristic features. MaTR achieves a 99.92% detection accuracy on known malware with false positive and false negative rates of 8.73e-4 and 8.03e-4 respectively. …
On Co-Optimization Of Constrained Satisfiability Problems For Hardware Software Applications, Kunal Ganeshpure
On Co-Optimization Of Constrained Satisfiability Problems For Hardware Software Applications, Kunal Ganeshpure
Doctoral Dissertations 1896 - February 2014
Manufacturing technology has permitted an exponential growth in transistor count and density. However, making efficient use of the available transistors in the design has become exceedingly difficult. Standard design flow involves synthesis, verification, placement and routing followed by final tape out of the design. Due to the presence of various undesirable effects like capacitive crosstalk, supply noise, high temperatures, etc., verification/validation of the design has become a challenging problem. Therefore, having a good design convergence may not be possible within the target time, due to a need for a large number of design iterations.
Capacitive crosstalk is one of the …
Improved Algorithms For Ear-Clipping Triangulation, Bartosz Kajak
Improved Algorithms For Ear-Clipping Triangulation, Bartosz Kajak
UNLV Theses, Dissertations, Professional Papers, and Capstones
We consider the problem of improving ear-slicing algorithm for triangulating a simple polygon. We propose two variations of ear-slicing technique for generating “good-quality” triangulation. The first approach is based on searching for the best triangle along the boundary. The second approach considers polygon partitioning on a pre-process before applying the ear-slicing. Experimental investigation reveals that both approaches yield better quality triangulation than the standard ear-slicing method.
Automatic High-Fidelity 3d Road Network Modeling, Jie Wang
Automatic High-Fidelity 3d Road Network Modeling, Jie Wang
Computational Modeling & Simulation Engineering Theses & Dissertations
Many computer applications such as racing games and driving simulations frequently make use of 3D high-fidelity road network models for a variety of purposes. However, there are very few existing methods for automatic generation of 3D realistic road networks, especially for those in the real world. On the other hand, vast road network GIS data have been collected in the past and used by a wide range of applications, such as navigation and evaluation. A method that can automatically produce 3D high-fidelity road network models from 2D real road GIS data will significantly reduce both the labor and time needed …
Using The Web Infrastructure For Real Time Recovery Of Missing Web Pages, Martin Klein
Using The Web Infrastructure For Real Time Recovery Of Missing Web Pages, Martin Klein
Computer Science Theses & Dissertations
Given the dynamic nature of the World Wide Web, missing web pages, or "404 Page not Found" responses, are part of our web browsing experience. It is our intuition that information on the web is rarely completely lost, it is just missing. In whole or in part, content often moves from one URI to another and hence it just needs to be (re-)discovered. We evaluate several methods for a \justin- time" approach to web page preservation. We investigate the suitability of lexical signatures and web page titles to rediscover missing content. It is understood that web pages change over time …
A Framework For Dynamic Traffic Monitoring Using Vehicular Ad-Hoc Networks, Mohammad Hadi Arbabi
A Framework For Dynamic Traffic Monitoring Using Vehicular Ad-Hoc Networks, Mohammad Hadi Arbabi
Computer Science Theses & Dissertations
Traffic management centers (TMCs) need high-quality data regarding the status of roadways for monitoring and delivering up-to-date traffic conditions to the traveling public. Currently this data is measured at static points on the roadway using technologies that have significant maintenance requirements. To obtain an accurate picture of traffic on any road section at any time requires a real-time probe of vehicles traveling in that section. We envision a near-term future where network communication devices are commonly included in new vehicles. These devices will allow vehicles to form vehicular networks allowing communication among themselves, other vehicles, and roadside units (RSUs) to …
Android Application Controlled Surge Protector, Lok An
Android Application Controlled Surge Protector, Lok An
Electrical Engineering
A significant amount of consumer electronics cannot be switched off completely without being unplugged. Standby power, also known as phantom power, refers to the electric power consumed by electronic appliances when they are switched off. There are some devices that need constant power; items like alarm clocks and security systems need constant power to function correctly. Some devices, such as video game consoles and televisions, consume power without offering any features. Electricity lost from standby power has been increasing with the amount of consumer electronics increasing in households.
This project’s goal is to create a low power remote that can …
A Modeling And Simulation Framework For Electrokinetic Nanoparticle Treatment, James Phillips
A Modeling And Simulation Framework For Electrokinetic Nanoparticle Treatment, James Phillips
Doctoral Dissertations
The focus of this research is to model and provide a simulation framework for the packing of differently sized spheres within a hard boundary. The novel contributions of this dissertation are the cylinders of influence (COI) method and sectoring method implementations. The impetus for this research stems from modeling electrokinetic nanoparticle (EN) treatment, which packs concrete pores with differently sized nanoparticles. We show an improved speed of the simulation compared to previously published results of EN treatment simulation while obtaining similar porosity reduction results. We mainly focused on readily, commercially available particle sizes of 2 nm and 20 nm particles, …
Random Keys Genetic Algorithms Scheduling And Rescheduling Systems For Common Production Systems, Elkin Rodriguez-Velasquez
Random Keys Genetic Algorithms Scheduling And Rescheduling Systems For Common Production Systems, Elkin Rodriguez-Velasquez
Engineering Management & Systems Engineering Theses & Dissertations
The majority of scheduling research deals with problems in specific production environments with specific objective functions. However, in many cases, more than one problem type and/or objective function exists, resulting in the need for a more generic and flexible system to generate schedules. Furthermore, most of the published scheduling research focuses on creating an optimal or near optimal initial schedule during the planning phase. However, after production processes start, circumstances like machine breakdowns, urgent jobs, and other unplanned events may render the schedule suboptimal, obsolete or even infeasible resulting in a "rescheduling" problem, which is typically also addressed for a …
Learning Local Features Using Boosted Trees For Face Recognition, Rajkiran Gottumukkal
Learning Local Features Using Boosted Trees For Face Recognition, Rajkiran Gottumukkal
Electrical & Computer Engineering Theses & Dissertations
Face recognition is fundamental to a number of significant applications that include but not limited to video surveillance and content based image retrieval. Some of the challenges which make this task difficult are variations in faces due to changes in pose, illumination and deformation. This dissertation proposes a face recognition system to overcome these difficulties. We propose methods for different stages of face recognition which will make the system more robust to these variations. We propose a novel method to perform skin segmentation which is fast and able to perform well under different illumination conditions. We also propose a method …
A Probabilistic Analysis Of Misparking In Reservation Based Parking Garages, Vikas G. Ashok
A Probabilistic Analysis Of Misparking In Reservation Based Parking Garages, Vikas G. Ashok
Computer Science Theses & Dissertations
Parking in major cities is an expensive and annoying affair, the reason ascribed to the limited availability of parking space. Modern parking garages provide parking reservation facility, thereby ensuring availability to prospective customers. Misparking in such reservation based parking garages creates confusion and aggravates driver frustration. The general conception about misparking is that it tends to completely cripple the normal functioning of the system leading to chaos and confusion. A single mispark tends to have a ripple effect and therefore spawns a chain of misparks. The chain terminates when the last mispark occurs at the parking slot reserved by the …
Data Aggregation And Dissemination In Vehicular Ad-Hoc Networks, Khaled Ibrahim
Data Aggregation And Dissemination In Vehicular Ad-Hoc Networks, Khaled Ibrahim
Computer Science Theses & Dissertations
Vehicular Ad-Hoc Networks (VANETs) are a fast growing technology that many governments and automobile manufacturers are investing in to provide not only safer and more secure roads, but also informational and entertainment-based applications for drivers. The applications developed for VANETs can be classified into multiple categories (safety, informational, entertainment). Most VANET applications, regardless of their category, depend on having certain vehicular data(vehicular speed, X position and Y position) available. Although these applications appear to use the same vehicular data, the characteristics of this data (i.e., amount, accuracy, and update rate) will vary based on the application category. For …
A Framework For Incident Detection And Notification In Vehicular Ad-Hoc Networks, Mahmoud Abuelela
A Framework For Incident Detection And Notification In Vehicular Ad-Hoc Networks, Mahmoud Abuelela
Computer Science Theses & Dissertations
The US Department of Transportation (US-DOT) estimates that over half of all congestion events are caused by highway incidents rather than by rush-hour traffic in big cities. The US-DOT also notes that in a single year, congested highways due to traffic incidents cost over $75 billion in lost worker productivity and over 8.4 billion gallons of fuel. Further, the National Highway Traffic Safety Administration (NHTSA) indicates that congested roads are one of the leading causes of traffic accidents, and in 2005 an average of 119 persons died each day in motor vehicle accidents.
Recently, Vehicular Ad-hoc Networks (VANET) employing a …
Fusion Of Visual And Thermal Images Using Genetic Algorithms, Sertan Erkanli
Fusion Of Visual And Thermal Images Using Genetic Algorithms, Sertan Erkanli
Electrical & Computer Engineering Theses & Dissertations
Demands for reliable person identification systems have increased significantly due to highly security risks in our daily life. Recently, person identification systems are built upon the biometrics techniques such as face recognition. Although face recognition systems have reached a certain level of maturity, their accomplishments in practical applications are restricted by some challenges, such as illumination variations. Current visual face recognition systems perform relatively well under controlled illumination conditions while thermal face recognition systems are more advantageous for detecting disguised faces or when there is no illumination control. A hybrid system utilizing both visual and thermal images for face recognition …
Solving The Vehicle Re-Identification Problem By Using Neural Networks, Tanweer Rashid
Solving The Vehicle Re-Identification Problem By Using Neural Networks, Tanweer Rashid
Computational Modeling & Simulation Engineering Theses & Dissertations
Vehicle re-identification is the process by which vehicle attributes measured at one point on a road network are compared to vehicle attributes measured at another point in an effort to match vehicles without using any unique identifiers such as license plate numbers. A match is made if the two measurements are estimated to belong to the same vehicle. Vehicle attributes can be sensor readings such as loop induction signatures, or they can also be actual vehicle characteristics such as length, weight, number of axles, etc. This research makes use of vehicle length, travel time, axle spacing and axle weights for …
Holistic Network Defense: Fusing Host And Network Features For Attack Classification, Jenny W. Ji
Holistic Network Defense: Fusing Host And Network Features For Attack Classification, Jenny W. Ji
Theses and Dissertations
This work presents a hybrid network-host monitoring strategy, which fuses data from both the network and the host to recognize malware infections. This work focuses on three categories: Normal, Scanning, and Infected. The network-host sensor fusion is accomplished by extracting 248 features from network traffic using the Fullstats Network Feature generator and from the host using text mining, looking at the frequency of the 500 most common strings and analyzing them as word vectors. Improvements to detection performance are made by synergistically fusing network features obtained from IP packet flows and host features, obtained from text mining port, processor, logon …
Software And Critical Technology Protection Against Side Channel Analysis Through Dynamic Hardware Obfuscation, John R. Bochert
Software And Critical Technology Protection Against Side Channel Analysis Through Dynamic Hardware Obfuscation, John R. Bochert
Theses and Dissertations
Side Channel Analysis (SCA) is a method by which an adversary can gather information about a processor by examining the activity being done on a microchip though the environment surrounding the chip. Side Channel Analysis attacks use SCA to attack a microcontroller when it is processing cryptographic code, and can allow an attacker to gain secret information, like a crypto-algorithm's key. The purpose of this thesis is to test proposed dynamic hardware methods to increase the hardware security of a microprocessor such that the software code being run on the microprocessor can be made more secure without having to change …
Malicious And Malfunctioning Node Detection Via Observed Physical Layer Data, Tyler J. Hardy
Malicious And Malfunctioning Node Detection Via Observed Physical Layer Data, Tyler J. Hardy
Theses and Dissertations
There are many mechanisms that can cause inadequate or unreliable information in sensor networks. A user of the network might be interested in detecting and classifying specific sensors nodes causing these problems. Several network layer based trust methods have been developed in previous research to assess these issues; in contrast this work develops a trust protocol based on observations of physical layer data collected by the sensors. Observations of physical layer data are used for decisions and calculations, and are based on just the measurements collected by the sensors. Although this information is packaged and distributed on the network layer, …
An Architecture For Improving Timeliness And Relevance Of Cyber Incident Notifications, James L. Miller
An Architecture For Improving Timeliness And Relevance Of Cyber Incident Notifications, James L. Miller
Theses and Dissertations
This research proposes a communications architecture to deliver timely and relevant cyber incident notifications to dependent mission stakeholders. This architecture, modeled in Unified Modeling Language (UML), eschews the traditional method of pushing notifications via message as dictated in Air Force Instruction 33-138. It instead shifts to a pull or publish and subscribe method of making notifications. Shifting this paradigm improves the notification process by empowering mission owners to identify those resources on which they depend for mission accomplishment, provides a direct conduit between providing and dependent mission owners for notifications when an incident occurs, and provides a shared representation for …
Kernelized Locality-Sensitive Hashing For Fast Image Landmark Association, Mark A. Weems
Kernelized Locality-Sensitive Hashing For Fast Image Landmark Association, Mark A. Weems
Theses and Dissertations
As the concept of war has evolved, navigation in urban environments where GPS may be degraded is increasingly becoming more important. Two existing solutions are vision-aided navigation and vision-based Simultaneous Localization and Mapping (SLAM). The problem, however, is that vision-based navigation techniques can require excessive amounts of memory and increased computational complexity resulting in a decrease in speed. This research focuses on techniques to improve such issues by speeding up and optimizing the data association process in vision-based SLAM. Specifically, this work studies the current methods that algorithms use to associate a current robot pose to that of one previously …
Measuring The Utility Of A Cyber Incident Mission Impact Assessment (Cimia) Process For Mission Assurance, Christy L. Peterson
Measuring The Utility Of A Cyber Incident Mission Impact Assessment (Cimia) Process For Mission Assurance, Christy L. Peterson
Theses and Dissertations
Information is a critical asset on which virtually all modern organizations depend upon to meet their operational mission objectives. Military organizations, in particular, have embedded Information and Communications Technologies (ICT) into their core mission processes as a means to increase their operational efficiency, exploit automation, improve decision quality, and shorten the kill chain. However, the extreme dependence upon ICT results in an environment where a cyber incident can result in severe mission degradation, or possibly failure, with catastrophic consequences to life, limb, and property. These consequences can be minimized by maintaining real-time situational awareness of mission critical resources so appropriate …
A Multi Agent System For Flow-Based Intrusion Detection Using Reputation And Evolutionary Computation, David Hancock
A Multi Agent System For Flow-Based Intrusion Detection Using Reputation And Evolutionary Computation, David Hancock
Theses and Dissertations
The rising sophistication of cyber threats as well as the improvement of physical computer network properties present increasing challenges to contemporary Intrusion Detection (ID) techniques. To respond to these challenges, a multi agent system (MAS) coupled with flow-based ID techniques may effectively complement traditional ID systems. This paper develops: 1) a scalable software architecture for a new, self-organized, multi agent, flow-based ID system; and 2) a network simulation environment suitable for evaluating implementations of this MAS architecture and for other research purposes. Self-organization is achieved via 1) a reputation system that influences agent mobility in the search for effective vantage …