Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

2011

Discipline
Institution
Keyword
Publication
File Type

Articles 31 - 60 of 85

Full-Text Articles in Computer Engineering

Ict And The Education Sector In Tanzania: Effectiveness Of Introducing And Applying Ict In Higher Learning Institutions In Tanzania: The Case Of Ardhi University, Kristofa S. Nkembo, Daniel Koloseni, Faith J. Shimba Jul 2011

Ict And The Education Sector In Tanzania: Effectiveness Of Introducing And Applying Ict In Higher Learning Institutions In Tanzania: The Case Of Ardhi University, Kristofa S. Nkembo, Daniel Koloseni, Faith J. Shimba

Faith Joel Shimba

Academic Institutions are heavily investing in ICT in order to improve delivery and quality of education. But the process of introducing and applying ICT in Higher learning institutions is not effective to enable higher learning Institutions to reap fully the benefits offered by ICT. This book describes a number of factors that hindered the introduction and application of ICT at Ardhi University, which are limited ICT infrastructure, inadequate ICT personnel, inadequate training provided to staff, limited support services, inadequate financial resources,and insufficient budget for ICT infrastructure. Further it recommends among other things, improvement of ICT infrastructure, increasing the number of …


Design, Modeling And Control Strategy Of Pv/Fc Hybrid Power System, Dr. Adel A. Elbaset Jul 2011

Design, Modeling And Control Strategy Of Pv/Fc Hybrid Power System, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

This paper describes development of a general methodology of an autonomous PV/FC system composed of photovoltaic (PV), electrolyzer, hydrogen storage tank and fuel cell (FC). The aim of this paper is to determine optimum design, control strategy, economic and performance of a PV/FC hybrid power generation system without battery storage taking into account all losses in the system. The paper also presents a computer program based on Matlab software to determine optimum design, control strategy, economic and performance of an autonomous PV/FC hybrid power generation system. The computer program develops to size system components in order to match the load …


Calibration Of Complex System Dynamics Models: A Practioner's Report, Rod Walker, Wayne W. Wakeland Jul 2011

Calibration Of Complex System Dynamics Models: A Practioner's Report, Rod Walker, Wayne W. Wakeland

Wayne W. Wakeland

This paper is not a typical academic paper that is solidly grounded in the literature. Instead, this paper reports practitioner’s experiences in rebuilding and calibrating a very large system dynamics model. A prior version of this model had been in use for over 10 years in an ongoing executive training simulation. That model had never worked correctly in several key areas, requiring the outputs to be manually adjusted by very experienced facilitators during the course of the simulation. The present project rebuilt the system dynamics model, redesigned the parts that weren’t working, and calibrated the resulting model to match the …


A System Dynamics Model Of Pharmaceutical Opioids: Medical Use, Diversion, And Nonmedical Use, Teresa D. Schmidt, Wayne W. Wakeland, J. David Haddox Jul 2011

A System Dynamics Model Of Pharmaceutical Opioids: Medical Use, Diversion, And Nonmedical Use, Teresa D. Schmidt, Wayne W. Wakeland, J. David Haddox

Wayne W. Wakeland

Abstract: A dramatic rise in the nonmedical of pharmaceutical opioids has presented the United States with a substantial public health problem. Nonmedical use of prescription pain relievers has become increasingly prevalent in the US over the last two decades, and diversion of medicines obtained by prescription is assumed to be a major source of supply for nonmedical opioid use. Policymakers striving to protect population health by ameliorating the adverse outcomes of nonmedical use of opioid analgesics could benefit from a systems-level model which reflects the complexity of the system and incorporates the full range of available data. To address this …


Wind Powered Datacenter: Indiana, Heather M. Brotherton Jun 2011

Wind Powered Datacenter: Indiana, Heather M. Brotherton

Heather M Brotherton

This paper will investigate the feasibility of co-locating data centers on Indiana wind farms. Strategic long-term planning including combining clean energy, information technology, and efficient data center design could allow Indiana to emerge as an information technology service leader. There are economic advantages to locating a data center in Indiana. The cost of living in Indiana is low in comparison places such as California with high concentrations of data centers. This in turn means a lower cost workforce. Many less costly areas of the United States lack skilled workers to staff data centers. This is not the case in Indiana. …


Is Data To Knowledge As The Wasp Is To The Fig Tree? Reconsidering Licklider’S Intergalactic Network In The Days Of Data Deluge., Christine L. Borgman Jun 2011

Is Data To Knowledge As The Wasp Is To The Fig Tree? Reconsidering Licklider’S Intergalactic Network In The Days Of Data Deluge., Christine L. Borgman

Christine L. Borgman

No abstract provided.


Coughloc: Location-Aware Indoor Acoustic Sensing For Non-Intrusive Cough Detection, Zheng Sun, Aveek Purohit, Kathleen Yang, Neha Pattan, Dan Siewiorek, Asim Smailagic, Ian Lane, Pei Zhang Jun 2011

Coughloc: Location-Aware Indoor Acoustic Sensing For Non-Intrusive Cough Detection, Zheng Sun, Aveek Purohit, Kathleen Yang, Neha Pattan, Dan Siewiorek, Asim Smailagic, Ian Lane, Pei Zhang

Zheng Sun

Pervasive medical monitoring has become an ideal alter- native to nursing care for elderly people and patients in hospitals. Existing systems using single body-worn sensors are often intrusive and less reliable. By contrast, ubiqui- tous acoustic sensing techniques can support non-intrusive and robust medical monitoring. In this paper, we describe CoughLoc, a ubiquitous acoustic sensing system for con- tinuous cough detection using a wireless sensor network. We show how knowledge of sound source locations can be leveraged to improve the detection accuracy of sound events caused by mobile users. Experiments in indoor environ- ments show our system achieves over 90% …


Towards Secure Multi-Path Routing For Wireless Mobile Ad-Hoc Networks: A Cross-Layer Strategy (Poster), Arjun Athreya, Patrick Tague May 2011

Towards Secure Multi-Path Routing For Wireless Mobile Ad-Hoc Networks: A Cross-Layer Strategy (Poster), Arjun Athreya, Patrick Tague

Patrick Tague

Multi-path routing establishes multiple paths between a source and destination node in a network. This helps in achieving reliability in mobile ad-hoc networks (MANETs). To achieve efficient, secure and reliable multi-path routing for MANETs, we propose a routing mechanism that uses crosslayer strategies. The cross-layer strategy involves incorporating feedback and information from layers below the network layer to make decisions at the network layer. We also propose a path evaluation mechanism for the paths returned by the proposed multi-path routing mechanism.


The Effectiveness Of Multi-Stage Dehumidification– Humidification For Improving The Cooling Ability Of Evaporative Air Conditioning, Philadelphia University May 2011

The Effectiveness Of Multi-Stage Dehumidification– Humidification For Improving The Cooling Ability Of Evaporative Air Conditioning, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Using Textual Features To Predict Popular Content On Digg, Paul H. Miller May 2011

Using Textual Features To Predict Popular Content On Digg, Paul H. Miller

Paul H Miller

Over the past few years, collaborative rating sites, such as Netflix, Digg and Stumble, have become increasingly prevalent sites for users to find trending content. I used various data mining techniques to study Digg, a social news site, to examine the influence of content on popularity. What influence does content have on popularity, and what influence does content have on users’ decisions? Overwhelmingly, prior studies have consistently shown that predicting popularity based on content is difficult and maybe even inherently impossible. The same submission can have multiple outcomes and content neither determines popularity, nor individual user decisions. My results show …


Data Center Recovery Best Practices: Before, During, And After Disaster Recovery Execution, Heather M. Brotherton Apr 2011

Data Center Recovery Best Practices: Before, During, And After Disaster Recovery Execution, Heather M. Brotherton

Heather M Brotherton

This qualitative multiple case study analysis reviews well documented past information technology disasters with a goal of identifying practical before, during, and after disaster recovery best practices. The topic of cyberinfrastructure resiliency is explored including barriers to cyberinfrastructure resiliency. Factors explored include: adherence to established procedures, staff training in recovery procedures, chain of command structure, recovery time and cost, and mutual aid relationships. Helpful tools and resources are included to assist planners.


(Master's Thesis) Data Center Recovery Best Practices: Before, During, And After Disaster Recovery Execution, Heather M. Brotherton Apr 2011

(Master's Thesis) Data Center Recovery Best Practices: Before, During, And After Disaster Recovery Execution, Heather M. Brotherton

Heather M Brotherton

This qualitative multiple case study analysis reviews well documented past information technology disasters with a goal of identifying practical before, during, and after disaster recovery best practices. The topic of cyberinfrastructure resiliency is explored including barriers to cyberinfrastructure resiliency. Factors explored include: adherence to established procedures, staff training in recovery procedures, chain of command structure, recovery time and cost, and mutual aid relationships. Helpful tools and resources are included to assist planners.


An Exploration Of Knowledge And Skills Transfer From A Formal Software Engineering Curriculum To A Capstone Practicum Project, Ray Bareiss, Ed Katz Apr 2011

An Exploration Of Knowledge And Skills Transfer From A Formal Software Engineering Curriculum To A Capstone Practicum Project, Ray Bareiss, Ed Katz

Ray Bareiss

Students at Carnegie Mellon Silicon Valley complete a team-based practicum project for an industrial sponsor as the capstone of their master’s education in software engineering. Over time, the faculty member who typically serves as advisor for such projects has been disturbed by the failure of several student teams to transfer some relevant knowledge and skills from the formal curriculum to the relatively unstructured practicum project environment. We conducted a survey of all 2010 software engineering students to ascertain the most significant selfreported shortcomings. This paper presents the survey data and then discusses the results in terms of a theory of …


The Macos X Command Line, James P. Howard, Ii Apr 2011

The Macos X Command Line, James P. Howard, Ii

James Howard

My wife thinks I bought my Mac laptop to use as a status symbol. But every hacker knows I bought it because I wanted a decent Unix laptop.


Coughloc: Location-Aware Indoor Acoustic Sensing For Non-Intrusive Cough Detection, Zheng Sun, Aveek Purohit, Kathleen Yang, Neha Pattan, Dan Siewiorek, Asim Smailagic, Ian Lane, Pei Zhang Apr 2011

Coughloc: Location-Aware Indoor Acoustic Sensing For Non-Intrusive Cough Detection, Zheng Sun, Aveek Purohit, Kathleen Yang, Neha Pattan, Dan Siewiorek, Asim Smailagic, Ian Lane, Pei Zhang

Aveek Purohit

Pervasive medical monitoring has become an ideal alter- native to nursing care for elderly people and patients in hospitals. Existing systems using single body-worn sensors are often intrusive and less reliable. By contrast, ubiqui- tous acoustic sensing techniques can support non-intrusive and robust medical monitoring. In this paper, we describe CoughLoc, a ubiquitous acoustic sensing system for con- tinuous cough detection using a wireless sensor network. We show how knowledge of sound source locations can be leveraged to improve the detection accuracy of sound events caused by mobile users. Experiments in indoor environ- ments show our system achieves over 90% …


Development Of High Resolution Sea Floor Mapping Tools And Techniques, Gabrielle Inglis, Ian Vaughn, Clara Smart, Chris Roman Apr 2011

Development Of High Resolution Sea Floor Mapping Tools And Techniques, Gabrielle Inglis, Ian Vaughn, Clara Smart, Chris Roman

Christopher N. Roman

There is a persistent need for high resolution photographic and bathymetric maps of the sea floor for many research areas in marine geology, biology and archaeology. This poster will present recent work using high frequency multibeam sonars, stereo vision and structured light laser imaging techniques to create maps with centimeter resolution for these applications. This research involves the development of new image and sonar processing techniques that combat the typical difficulties of imperfect navigation information, limited sensor ranges and adverse environmental conditions associated with using marine robotic vehicles in the ocean. Data for this work has been collected with the …


Sensorfly: Controlled-Mobile Sensing Platform For Indoor Emergency Response Applications, Aveek Purohit, Zheng Sun, Frank Mokaya, Pei Zhang Apr 2011

Sensorfly: Controlled-Mobile Sensing Platform For Indoor Emergency Response Applications, Aveek Purohit, Zheng Sun, Frank Mokaya, Pei Zhang

Aveek Purohit

Indoor emergency response situations, such as urban fire, are characterized by dangerous constantly-changing operating environments with little access to situational information for first responders. In-situ information about the conditions, such as the extent and evolution of an indoor fire, can augment rescue efforts and reduce risk to emergency personnel. Static sensor networks that are pre-deployed or manually deployed have been proposed, but are less practical due to need for large infrastructure, lack of adaptivity and limited coverage. Controlled-mobility in sensor networks, i.e. the capability of nodes to move as per network needs can provide the desired autonomy to overcome these …


Sensorfly: Controlled-Mobile Sensing Platform For Indoor Emergency Response Applications, Aveek Purohit, Zheng Sun, Frank Mokaya, Pei Zhang Apr 2011

Sensorfly: Controlled-Mobile Sensing Platform For Indoor Emergency Response Applications, Aveek Purohit, Zheng Sun, Frank Mokaya, Pei Zhang

Zheng Sun

Indoor emergency response situations, such as urban fire, are characterized by dangerous constantly-changing operating environments with little access to situational information for first responders. In-situ information about the conditions, such as the extent and evolution of an indoor fire, can augment rescue efforts and reduce risk to emergency personnel. Static sensor networks that are pre-deployed or manually deployed have been proposed, but are less practical due to need for large infrastructure, lack of adaptivity and limited coverage. Controlled-mobility in sensor networks, i.e. the capability of nodes to move as per network needs can provide the desired autonomy to overcome these …


Complex Orthogonal Sequences From Amicable Hadamard Matrices, L. C. Tran, J. Seberry, B. J. Wysocki, Tadeusz Wysocki, T. Xia, Ying Zhao Apr 2011

Complex Orthogonal Sequences From Amicable Hadamard Matrices, L. C. Tran, J. Seberry, B. J. Wysocki, Tadeusz Wysocki, T. Xia, Ying Zhao

Professor Jennifer Seberry

The paper deals with the novel technique of designing complex spreading sequences with only four phases (0.25π, 0.75π, 1.25π, 1.75π). The interesting feature of those new sequences is the fact that not only the complex sequences are orthogonal but the real parts and imaginary parts are independently orthogonal. This can be utilized for spreading of complex constellation signals where the independent spreading using bipolar sequences (real part for in-phase component and imaginary part for quadrature component) can be applied. The paper introduces the theoretical background, and some example constructions of the amicable Hadamard matrices and the corresponding complex spreading sequences. …


Modeling Dual Polarization Wireless Fading Channels Using Quaternions, B. J. Wysocki, Tadeusz Wysocki, J. Seberry Apr 2011

Modeling Dual Polarization Wireless Fading Channels Using Quaternions, B. J. Wysocki, Tadeusz Wysocki, J. Seberry

Professor Jennifer Seberry

In the letter we describe signal transmitted between two dual-polarized antennas using a quaternion notation. The channel can then be modeled by a single quaternion gain, instead of a matrix of four complex gains as it is done in a classical approach. The model is very useful as it allows for a simple accommodation of any polarization twist between the transmit and receive antennas, as well as, modeling random fading in both polarizations with or without cross-polar scattering.


Imirok: Real-Time Imitative Robotic Arm Control For Home Robot Applications, Heng-Tze Cheng, Zheng Sun, Pei Zhang Mar 2011

Imirok: Real-Time Imitative Robotic Arm Control For Home Robot Applications, Heng-Tze Cheng, Zheng Sun, Pei Zhang

Zheng Sun

Training home robots to behave like human can help people with their daily chores and repetitive tasks. In this paper, we present Imirok, a system to remotely control robotic arms by user motion using low-cost, off-the-shelf mobile devices and webcam. The motion tracking algorithm detects user motion in real-time, without classifier training or predefined action set. Experimental results show that the system achieves 90% precision and recall rate on motion detection with blank background, and is robust under the change of cluttered background and user-to-camera distance.


Leveraging Mobile Context For Effective Collaboration And Task Management In Disaster Response, Faisal Luqman, Martin L. Griss Mar 2011

Leveraging Mobile Context For Effective Collaboration And Task Management In Disaster Response, Faisal Luqman, Martin L. Griss

Martin L Griss

Collaboration and task management is challenging in distributed, dynamically-formed teams, typical in large scale disaster response scenarios. Ineffective collaboration may result in poor performance and possible loss of life. In this paper, we present Overseer, an agent-based system that exploits context information from mobile devices to facilitate collaboration and task allocation. We describe our system architecture and show how mobile context can be used to create dynamic role-based assignments to support collaboration and effective task management.


Toward The Next Generation Of Emergency Operations Systems, Art Botterell, Martin Griss Mar 2011

Toward The Next Generation Of Emergency Operations Systems, Art Botterell, Martin Griss

Martin L Griss

For more than half a century the Emergency Operations Center (EOC) has been a key component of emergency management (EM), homeland security and business continuity practice. Changes in the technical, threat, economic and social environments are placing new pressures on the concept of the EOC in the public, private and community sectors. Investigation of the desirable attributes of a “Next Generation EOC” has led to alternative EOC roles and configurations. This paper describes emerging pressures on, and trends in, emergency and business contingency management systems, and describes a research program to explore solutions to both new and persistent design challenges.


Cortina: Collaborative Context-Aware Indoor Positioning Employing Rss And Rtof Techniques, Zheng Sun, Richard Farley, Telis Kaleas, Judy Ellis, Kiran Chikkappa Mar 2011

Cortina: Collaborative Context-Aware Indoor Positioning Employing Rss And Rtof Techniques, Zheng Sun, Richard Farley, Telis Kaleas, Judy Ellis, Kiran Chikkappa

Zheng Sun

Cortina is an energy-efficient indoor localization system, which leverages a wireless sensor network to support navigation and tracking applications. To improve the localization performance, we develop a hybrid ranging system, which incor- porate both RSS and RToF-based techniques. To overcome effects from indoor multipath, we design and implement algorithms to take account various context information. We evaluated the system over a 2000m2 area instrumented with twenty-six fixed nodes. Evaluation results show the system achieved 2.5m accuracy in a pedestrian tracking application.


If Emulation Is Representation, Does Detail Matter?, Lynn Stein Mar 2011

If Emulation Is Representation, Does Detail Matter?, Lynn Stein

Lynn Andrea Stein

One property of the emulator framework presented by Grush is that imagery operates off-line. Contrary to this viewpoint, we present evidence showing that mental rotation of a simple figure modulates low-level features of drawing articulation. This effect is dependent upon the type of rotation, suggesting a more integrative online role for imagery than proposed by the target article.


Design Guidelines For Technology-Mediated Social Interaction In A Presence Sensing Physical Space, Alex Darrow, Jing Jin, Ed Katz, Ray Bareiss, Martin Griss Feb 2011

Design Guidelines For Technology-Mediated Social Interaction In A Presence Sensing Physical Space, Alex Darrow, Jing Jin, Ed Katz, Ray Bareiss, Martin Griss

Ray Bareiss

Technology for building smart homes is here today; however, a solid understanding of how people will interact in these spaces is not. In this paper, we present our research into designing a smart living space that focuses on inherent social behavior and in turn facilitates social interactions. We start by explaining our initial design scenario, and then discuss the process whereby we obtained data about user needs in a smart living space. We then offer six principles for building an environment that assists in home activities and explain how these principles could be applied to similar projects. We walk through …


Raising The Profile Of Iu Scholarship: Institutional Repositories (And More) At Iu, Cheryl Truesdell, Kimberly Thompson, Sherri Michaels Feb 2011

Raising The Profile Of Iu Scholarship: Institutional Repositories (And More) At Iu, Cheryl Truesdell, Kimberly Thompson, Sherri Michaels

Cheryl B. Truesdell

No abstract provided.


Jamming-Aware Traffic Allocation For Multiple-Path Routing Using Portfolio Selection, Patrick Tague, Sidharth Nabar, James Ritcey, Radha Poovendran Jan 2011

Jamming-Aware Traffic Allocation For Multiple-Path Routing Using Portfolio Selection, Patrick Tague, Sidharth Nabar, James Ritcey, Radha Poovendran

Patrick Tague

Multiple-path source routing protocols allow a data source node to distribute the total traffic among available paths. In this article, we consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. We formulate this traffic allocation as a lossy network flow optimization problem using portfolio selection theory from financial statistics. We show that in multi-source networks, this centralized optimization problem can be solved using a distributed algorithm based on decomposition in network utility maximization (NUM). We demonstrate the network’s ability to estimate the impact of jamming …


Anubis: An Attestation Protocol For Distributed Context-Aware Applications, Senaka Buthpitiya, Feng-Tso Sun, Heng-Tze Chen, Patrick Tague, Martin L. Griss, Anind K. Dey Jan 2011

Anubis: An Attestation Protocol For Distributed Context-Aware Applications, Senaka Buthpitiya, Feng-Tso Sun, Heng-Tze Chen, Patrick Tague, Martin L. Griss, Anind K. Dey

Martin L Griss

Sharing sensitive context information among multiple distributed components in mobile environments introduces major security concerns. The distributed sensing, processing and actuating components of these applications can be compromised and modified or impersonated to extract private and confidential information or to inject false information. In this paper we present the Anubis protocol for remote code attestation and access control of distributed components using remote execution of trusted code. Our Anubis protocol leverages previous work in the fields of wireless sensor networks and secure web browsing. Anubis allows new components to be introduced to the environment without updating existing components. Our implementation …


Mobile Context-Aware Personal Messaging Assistant, Senaka Buthpitiya, Deepthi Madamanchi, Sumalatha Kommaraju, Martin L. Griss Jan 2011

Mobile Context-Aware Personal Messaging Assistant, Senaka Buthpitiya, Deepthi Madamanchi, Sumalatha Kommaraju, Martin L. Griss

Martin L Griss

A previous study shows that busy professionals receive in excess of 50 emails per day of which approximately 23% require immediate attention, 13% require attention later and 64% are unimportant and typically ignored. The flood of emails impact mobile users even more heavily. Flooded inboxes cause busy professionals to spend considerable amounts of time searching for important messages, and there has been much research into automating the process using email content for classification; but we find email priority depends also on user context. In this paper we describe the Personal Messaging Assistant (PMA), an advanced rule-based email management system which …