Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Mechanical Engineering (7)
- Electrical and Computer Engineering (5)
- Energy Systems (5)
- Computer Engineering (3)
- Biomaterials (2)
-
- Biomedical Engineering and Bioengineering (2)
- Controls and Control Theory (2)
- Molecular, Cellular, and Tissue Engineering (2)
- Physical Sciences and Mathematics (2)
- Aerospace Engineering (1)
- Civil and Environmental Engineering (1)
- Computer and Systems Architecture (1)
- Construction Engineering and Management (1)
- Data Storage Systems (1)
- Digital Communications and Networking (1)
- Electrical and Electronics (1)
- Electromagnetics and Photonics (1)
- Hardware Systems (1)
- Life Sciences (1)
- Materials Science and Engineering (1)
- Ocean Engineering (1)
- Oceanography (1)
- Oceanography and Atmospheric Sciences and Meteorology (1)
- Other Computer Engineering (1)
- Other Electrical and Computer Engineering (1)
- Robotics (1)
- VLSI and Circuits, Embedded and Hardware Systems (1)
- Keyword
-
- Hydrogen Production (3)
- Grants/ Funded Projects (2)
- Original Publications (2)
- Bioinformatics (1)
- Book Chapters (1)
-
- Comparative Law and Economics (1)
- Control channel jamming (1)
- Covariance models (1)
- Customer satisfaction (1)
- EMI/EMC Protection (1)
- Electromagnetic Vulnerability (1)
- Electronics Vulnerability (1)
- Facilities Management (1)
- Genetic algorithms (1)
- High Power Electromagnetics (HPEM) (1)
- Incineration (1)
- Intentional EMI (1)
- Node capture attacks (1)
- Office buildings (1)
- Private sector organizations (1)
- Probabilistic metrics (1)
- Public sector organizations (1)
- Pulverized Coal Injection (1)
- RNA database search (1)
- Robotics (1)
- Security (1)
- Stun Gun Electronic Effects (1)
- System Effects and Hardening (1)
- System Vulnerabilities (1)
- Taser Electronic Effects (1)
Articles 1 - 18 of 18
Full-Text Articles in Engineering
Efficient Non-Coding Rna Gene Searches Through Classical And Evolutionary Methods, Jennifer Smith
Efficient Non-Coding Rna Gene Searches Through Classical And Evolutionary Methods, Jennifer Smith
Jennifer A. Smith
Successful non-coding RNA gene searching requires examination of long-range intramolecular base pairing possibilities. This results in search algorithms with extremely long run times such that large-scale use of the algorithms often becomes computationally infeasible. Methods for the efficient search of the solution space are examined. A review of the standard dynamic-programming covariance model search algorithm is given. An analysis of the statistically probable regions of the search space is undertaken and a method of limiting the traditional dynamic-programming algorithm to this region is shown. An alternative search method using a Genetic Algorithm (GA) which favours the probable region of the …
Diagnostic Analysis Of A Small-Scale Incinerator By The Garson Index, Wei-Hsin Chen
Diagnostic Analysis Of A Small-Scale Incinerator By The Garson Index, Wei-Hsin Chen
Wei-Hsin Chen
No abstract provided.
Modeling And Simulation Of Hydrogen Generation From Hightemperature And Low-Temperature Water Gas Shift Reactions, Wei-Hsin Chen
Modeling And Simulation Of Hydrogen Generation From Hightemperature And Low-Temperature Water Gas Shift Reactions, Wei-Hsin Chen
Wei-Hsin Chen
No abstract provided.
A Perception-Driven Autonomous Urban Vehicle, John Leonard, Jonathan How, Seth Teller, Mitch Berger, Stefan Campbell, Gaston Fiore, Luke Fletcher, Emilio Frazzoli, Albert Huang, Sertac Karaman, Olivier Koch, Yoshiaki Kuwata, David Moore, Edwin Olson, Steve Peters, Justin Teo, Robert Truax, Matthew Walter, David Barrett, Alexander Epstein, Keoni Mahelona, Katy Moyer, Troy Jones, Ryan Buckley, Matthew Antone, Robert Galejs, Siddhartha Krishnamurthy, Jonathan Williams
A Perception-Driven Autonomous Urban Vehicle, John Leonard, Jonathan How, Seth Teller, Mitch Berger, Stefan Campbell, Gaston Fiore, Luke Fletcher, Emilio Frazzoli, Albert Huang, Sertac Karaman, Olivier Koch, Yoshiaki Kuwata, David Moore, Edwin Olson, Steve Peters, Justin Teo, Robert Truax, Matthew Walter, David Barrett, Alexander Epstein, Keoni Mahelona, Katy Moyer, Troy Jones, Ryan Buckley, Matthew Antone, Robert Galejs, Siddhartha Krishnamurthy, Jonathan Williams
David Barrett
This paper describes the architecture and implementation of an autonomous passenger vehicle designed to navigate using locally perceived information in preference to potentially inaccurate or incomplete map data. The vehicle architecture was designed to handle the original DARPA Urban Challenge requirements of perceiving and navigating a road network with segments defined by sparse waypoints. The vehicle implementation includes many heterogeneous sensors with significant communications and computation bandwidth to capture and process high-resolution, high-rate sensor data. The output of the comprehensive environmental sensing subsystem is fed into a kinodynamic motion planning algorithm to generate all vehicle motion. The requirements of driving …
An Experimental Study On Carbon Monoxide Conversion And Hydrogen Generation From Water Gas Shift Reaction, Wei-Hsin Chen
An Experimental Study On Carbon Monoxide Conversion And Hydrogen Generation From Water Gas Shift Reaction, Wei-Hsin Chen
Wei-Hsin Chen
No abstract provided.
A Transcendental To Changing Metal Powder Characteristics, Mahendra Kumar Trivedi, Rama Mohan Tallapragada
A Transcendental To Changing Metal Powder Characteristics, Mahendra Kumar Trivedi, Rama Mohan Tallapragada
Mahendra Kumar Trivedi
- https://www.trivedieffect.com/science/a-transcendental-approach-to-changing-metal-powder-characteristics
- https://www.sciencedirect.com/science/article/pii/S0026065708701450
Hydrogen Generation From A Catalytic Water Gas Shift Reaction Under Microwave Irradiation, Wei-Hsin Chen
Hydrogen Generation From A Catalytic Water Gas Shift Reaction Under Microwave Irradiation, Wei-Hsin Chen
Wei-Hsin Chen
No abstract provided.
Investigation Of Stun Guns As Intentional Electromagnetic Interference (Emi) Sources, George H. Baker, Ryan C. Tuttle
Investigation Of Stun Guns As Intentional Electromagnetic Interference (Emi) Sources, George H. Baker, Ryan C. Tuttle
George H Baker
Determined malefactors have demonstrated the use of common systems as effective weapons against civilian infrastructures, e.g. commercial jetliners used as kinetic weapons and cell phones used to trigger explosive devices. This undergraduate research project investigated the possibility of using readily available stun gun devices for electro-magnetic interference with or disruption of personal computers. At present, the system effects of high power electromagnetic sources are well recognized by world scientific and military communities. Former CIA Director John Deutch has said that, "the electron is the ultimate precision-guided weapon."1 There has been much research on the deleterious effects of pulsed voltages and …
High-Resolution Optical Imaging For Deep-Water Archaeology, Hanumant Singh, Christopher Roman, Oscar Pizarro, Brendan Foley, Ryan Eustice, Ali Can
High-Resolution Optical Imaging For Deep-Water Archaeology, Hanumant Singh, Christopher Roman, Oscar Pizarro, Brendan Foley, Ryan Eustice, Ali Can
Christopher N. Roman
No abstract provided.
Ionic Liquids For Energy Relevant Green Engineering, Samuel Morton
Ionic Liquids For Energy Relevant Green Engineering, Samuel Morton
Samuel A Morton
No abstract provided.
Formation Characteristics Of Aerosol Particles From Pulverized Coal Pyrolysis In High-Temperature Environments, Wei-Hsin Chen
Formation Characteristics Of Aerosol Particles From Pulverized Coal Pyrolysis In High-Temperature Environments, Wei-Hsin Chen
Wei-Hsin Chen
No abstract provided.
Synthesis And Characterization Of Biodegradable Elastomeric Polyurethane Scaffolds Fabricated By The Inkjet Technique.”, Changhong Zhang, Xuejun Wen, Narendra Vyavahare, Thomas Boland
Synthesis And Characterization Of Biodegradable Elastomeric Polyurethane Scaffolds Fabricated By The Inkjet Technique.”, Changhong Zhang, Xuejun Wen, Narendra Vyavahare, Thomas Boland
Thomas Boland
Biodegradable polyurethanes (PUs) were synthesized from methylene di-p-phenyl-diisocyanate (MDI), polycaprolactone diol (PCL-diol) and N,N-bis (2-hydorxyethyl)-2-aminoethane-sulfonic acid (BES), serving as a hard segment, soft segment and chain extender, respectively. MDI was chosen due to its reactivity and wide application in synthesis of biomedical polyurethanes due to its reactivity; PCL-diol was chosen because of its biodegradability; and BES was chosen because it allowed the introduction sulfonic acid groups onto the polymer chains. We evaluated the polyurethanes' degradation rate, mechanical properties, hydrophilicity, antithrombogenecity, and ability to support fibroblast cell attachment and growth by comparing with polymers having a 2,2-(methylimino)diethanol (MIDE) chain extender. Mechanical …
Boeing Welliver Faculty Fellowship, Raúl Ordóñez
Loading Dependent Swelling And Release Properties Of Novel Biodegradable, Elastic And Environmental Stimuli-Sensitive Polyurethanes, Changhong Zhang, Kejia Zhao, Tj Hu, Xiaofeng Cui, Nathan Brown, Thomas Boland
Loading Dependent Swelling And Release Properties Of Novel Biodegradable, Elastic And Environmental Stimuli-Sensitive Polyurethanes, Changhong Zhang, Kejia Zhao, Tj Hu, Xiaofeng Cui, Nathan Brown, Thomas Boland
Thomas Boland
A novel degradable, elastic, anionic, and linear polyurethane was synthesized from hexamethylene diisocyanate, polycaprolactone diol, and a bicine chain extender. The chemical structure, mechanical properties, degradation rate, and swelling ratio were characterized by comparing the polymer with a polyurethane containing a 2,2-(methylimino) diethanol chain extender. Due to the incorporation of negatively charged carboxyl side groups, the bicine extended polymers exhibited higher micro-phase separation, better mechanical properties in dry condition, and better sensitivity to environmental stimuli than controls, as demonstrated by its high swelling ratio at elevated pH, lower ionic strength, or higher temperature. The swelling ratio of membranes showed reversible …
Motoman Robotics Laboratory, Raúl Ordóñez
Motoman Robotics Laboratory, Raúl Ordóñez
Raúl Ordóñez
PI, funded by Motoman in kind and UD in matching funds, $1M, established fall 2008. Supported by SAS, Sick, others.
Perceived Conditions Of Workers In Different Organizational Settings, Craig Langston, Yu Song, Brian Purdey
Perceived Conditions Of Workers In Different Organizational Settings, Craig Langston, Yu Song, Brian Purdey
Craig Langston
Purpose – Research into office design and its effect on employee satisfaction and performance has attracted considerable contemporary research interest. However, most studies have tended to concentrate on the impact of the built environment on human performance, ignoring the actual needs of employees working in different organizational settings. This paper hence aims to investigate the nature and extent of occupant satisfaction with the built environment in different organizational settings in Australia for a range of climates.
Design/methodology/approach – A survey was conducted in Australia from 2004-2005, comprising 41 buildings, including six government buildings, 14 educational buildings and 21 commercial buildings. …
This Is A Submission Of Testable Proportions, Gillian K. Hadfield
This Is A Submission Of Testable Proportions, Gillian K. Hadfield
Gillian K Hadfield
No abstract provided.
Mitigation Of Control Channel Jamming Under Node Capture Attacks, Patrick Tague, Mingya Li, Radha Poovendran
Mitigation Of Control Channel Jamming Under Node Capture Attacks, Patrick Tague, Mingya Li, Radha Poovendran
Patrick Tague
Availability of service in many wireless networks depends on the ability for network users to establish and maintain communication channels using control messages from base stations and other users. An adversary with knowledge of the underlying communication protocol can mount an efficient denial of service attack by jamming the communication channels used to exchange control messages. The use of spread spectrum techniques can deter an external adversary from such control channel jamming attacks. However, malicious colluding insiders or an adversary who captures or compromises system users are not deterred by spread spectrum, as they know the required spreading sequences. For …