Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Computer Engineering

The Aim To Decentralize Economic Systems With Blockchains And Crypto, Mary Lacity Jan 2024

The Aim To Decentralize Economic Systems With Blockchains And Crypto, Mary Lacity

Arkansas Law Review

As an information systems (“IS”) professor, I wrote this Article for legal professionals new to blockchains and crypto. This target audience likely is most interested in crypto for its legal implications—depending on whether it functions as currencies, securities, commodities, or properties; however, legal professionals also need to understand crypto’s origin, how transactions work, and how they are governed.


Analyzing The Adoption Rate Of Local Variable Type Inference In Open-Source Java 10 Projects, Clayton Liddell, Donghoon Kim Jan 2019

Analyzing The Adoption Rate Of Local Variable Type Inference In Open-Source Java 10 Projects, Clayton Liddell, Donghoon Kim

Journal of the Arkansas Academy of Science

Type Inference is used in programming languages to improve writability. In this paper, we will be looking more specifically at Local Variable Type Inference (LVTI). For those unfamiliar with LVTI, we will also give an in-depth explanation of what it is and how it works. There is a lot of debate surrounding Type Inference in modern day programming languages. More specifically, whether the costs associated with LVTI outweigh the benefits. It has found its way into many higher-level languages including C#, C++, JavaScript, Swift, Kotlin, Rust, Go, etc. In this paper, we will look at the usefulness of LVTI and …


Parallelizing Scale Invariant Feature Transform On A Distributed Memory Cluster, Stanislav Bobovych Jan 2011

Parallelizing Scale Invariant Feature Transform On A Distributed Memory Cluster, Stanislav Bobovych

Inquiry: The University of Arkansas Undergraduate Research Journal

Scale Invariant Feature Transform (SIFT) is a computer vision algorithm that is widely-used to extract features from images. We explored accelerating an existing implementation of this algorithm with message passing in order to analyze large data sets. We successfully tested two approaches to data decomposition in order to parallelize SIFT on a distributed memory cluster.


A Comparative Evaluation Of .Net Remoting And Java Rmi, Taneem Ibrahim Jan 2004

A Comparative Evaluation Of .Net Remoting And Java Rmi, Taneem Ibrahim

Inquiry: The University of Arkansas Undergraduate Research Journal

Distributed application technologies such as Micrososoft.NET Remoting, and Java Remote Method Invocation (RMI) have evolved over many years to keep up with the constantly increasing requirements of the enterprise. In the broadest sense, a distributed application is one in which the application processing is divided among two or more machines. Distributed middleware technologies have made significant progress over the last decade. Although Remoting and RMI are the two of most popular contemporary middleware technologies, little literature exists that compares them. In this paper, we study the issues involved in designing a distributed system using Java RMI and Microsoft.NET Remoting. In …


Interpolation Techniques For Overset Grids, Paul S. Sherman, Nathan B. Edgar Jan 2003

Interpolation Techniques For Overset Grids, Paul S. Sherman, Nathan B. Edgar

Journal of the Arkansas Academy of Science

The use of finite difference schemes in computational aeroacoustics requires the use of structured grids incomputational space. Complex geometries in the physical space can be modeled using multiple overlapping grids that are transformed into computational space. In this work, finite difference schemes are used that necessitate the addition of psuedo- or ghost-points in the overlap region of the grids for closure of the difference stencil. The functional values at these ghost points must be approximated from the values at the original grid points. This paper investigates interpolation techniques for these overset grids. An n th order interpolation scheme using Lagrange …


Analysis Of Wireless Networking On The University Of Arkansas Campus, Julia Lincoln Jan 2000

Analysis Of Wireless Networking On The University Of Arkansas Campus, Julia Lincoln

Inquiry: The University of Arkansas Undergraduate Research Journal

Wireless communication has already begun to change the way business and research is done today. Development of the wireless network for digital cellular phone has already improved the area of voice communications. The area of portable and mobile connectivity for computers and other devices is beginning to emerge. The research analyzes and compares a few of these wireless networks. Physical aspects such as range, interference factors, and frequency capabilities and restrictions are assessed. Capacity analysis including round trip times, latency, and throughput are done as well. Issues of authentication and addressing protocols are researched to determine optimal performance and convenience …


Derivation Of Equations Of Motion For A Four Link Robotic Leg For A Walking Vehicle, Andrew B. Wright Jan 1999

Derivation Of Equations Of Motion For A Four Link Robotic Leg For A Walking Vehicle, Andrew B. Wright

Journal of the Arkansas Academy of Science

A four degree of freedom leg for a walking robot has been modeled using Newton's method. Unlike robot manipulators, which have a fixed base, a leg model must include inertial forces due to base motion. These forces have been included in the formulation. These equations can be used for design, simulation, and control. The inverse kinematics for this leg are also presented. This allows the joint angles to be computed from a desired foot-hold position.


Computer Model For Predicting Aids Among Intravenous Drug Users, Daniel Berleant, R. Ron Goforth, Jun Yuan Jan 1993

Computer Model For Predicting Aids Among Intravenous Drug Users, Daniel Berleant, R. Ron Goforth, Jun Yuan

Journal of the Arkansas Academy of Science

Intravenous drug abuse (IVDA) is an important cause of HIV transmission. Computer simulation is one way to understand and predict the spread of HIV infection among IVDAs. We design and simulate HIV infection among IVDAs and the impact of AIDS on this community, and thereby predict future IVDA population, HIV levels, AIDS levels, and AIDS deaths in this group. The HIV to AIDS, and AIDS to Death latencies are described by probability density functions (PDFs) in this model. Factors such as the recruit, quit, and normal death rate of IVDAs, are considered, as well as the infection and removal rates …


Simple Synchronous Detector For Spectroscopic Studies, Mokhtar Mofidi, M. Keith Hudson, Reagan Cole, James D. Wilson Jan 1991

Simple Synchronous Detector For Spectroscopic Studies, Mokhtar Mofidi, M. Keith Hudson, Reagan Cole, James D. Wilson

Journal of the Arkansas Academy of Science

Lock-in-amplifiers are used in many applications for signal processing and offer the ability to discriminate high levels of noise. While these instruments are very powerful and offer many features, they are not portable and are expensive. An economical and easy to use alternative circuit is presented which incorporates pre-amplification, reference, and synchronous detection on one circuit board. The design can be used in laboratory or process control situations where its small size and low cost are advantageous. The circuit was successfully applied to moderate and high level signals as seen in flame infrared emission detection and in a portable radiometer …


Construction And Software Design For A Microcomputer Controlled Ph/Ion Titrator, Edmond W. Wilson Jr., Dennis K. Thompson, James E. Mackey Jan 1984

Construction And Software Design For A Microcomputer Controlled Ph/Ion Titrator, Edmond W. Wilson Jr., Dennis K. Thompson, James E. Mackey

Journal of the Arkansas Academy of Science

The construction of an automated titration device is described. The major components include an Apple II+ Microcomputer and 8-bit parallel interface. Fisher Accumet, Model 520 Digital pH/lon Meter, Gilmont Micrometer Buret of 2.5 mL capacity, Sigma stepper motor, power supply and driver to operate the buret, and a constant temperature bath of ± 0.005 °C stability. The limitations of the system are 0.001 pH/0.1 mv for the pH/ion sensing system, and 0.125 μL per step for the buret. The system as described is designed to determine equilibrium constants for metal ion-amino acid complexes. By changing the software a variety of …


Use Of A Calculator Chip For Realtime Data Processing, Jeffrey O. Cohen, Hal E. Mcloud Jan 1980

Use Of A Calculator Chip For Realtime Data Processing, Jeffrey O. Cohen, Hal E. Mcloud

Journal of the Arkansas Academy of Science

No abstract provided.