Open Access. Powered by Scholars. Published by Universities.^{®}
 Discipline

 Physical Sciences and Mathematics (57)
 Computer Sciences (50)
 Digital Communications and Networking (14)
 Electrical and Computer Engineering (10)
 Computer and Systems Architecture (6)

 OS and Networks (6)
 Systems and Communications (5)
 Mechanical Engineering (4)
 Robotics (4)
 Oceanography (3)
 Optics (3)
 Other Computer Engineering (3)
 Ocean Engineering (3)
 Electromagnetics and Photonics (3)
 Physics (3)
 Other Electrical and Computer Engineering (3)
 Electrical and Electronics (3)
 Oceanography and Atmospheric Sciences and Meteorology (3)
 Education (3)
 Psychology (2)
 Databases and Information Systems (2)
 Social and Behavioral Sciences (2)
 Business (2)
 Acoustics, Dynamics, and Controls (1)
 Algebra (1)
 Applied Mathematics (1)
 Chemistry (1)
 Artificial Intelligence and Robotics (1)
 Institution

 University of Texas at El Paso (43)
 Washington University in St. Louis (35)
 Portland State University (7)
 University of South Carolina (7)
 California State University, San Bernardino (6)

 Selected Works (6)
 New Jersey Institute of Technology (4)
 University of Dayton (3)
 EmbryRiddle Aeronautical University (3)
 University of Nebraska  Lincoln (3)
 Edith Cowan University (3)
 Old Dominion University (3)
 Boise State University (2)
 University of Nevada, Las Vegas (2)
 Syracuse University (1)
 The University of Maine (1)
 Eastern Illinois University (1)
 Technological University Dublin (1)
 Nova Southeastern University (1)
 Chapman University (1)
 University of North Florida (1)
 Cedarville University (1)
 Singapore Management University (1)
 Keyword

 Software agents (6)
 Computer Science and Engineering (6)
 Fuzzy logic (4)
 Internet (3)
 Information resources (3)

 Digital libraries (3)
 Information retrieval (3)
 Multimedia systems (2)
 Computer programs (2)
 Nonassociative operations (2)
 Computer security (2)
 Presented Posters and Abstracts (2)
 Fuzzy (2)
 Probabilistic (2)
 Distributors (Commerce) (2)
 Multiagent systems (2)
 Interval computations (2)
 Network security (2)
 Electronic commerce (2)
 Web site development (2)
 Teaching  Aids and devices (2)
 Educational technology (2)
 Adaptive computing systems (2)
 Algorithmic Information Theory (1)
 Aerospace applications (1)
 Aerospace structures (1)
 Acoustic distortion (1)
 AUV (1)
 Acoustic sensors (1)
 Adaptive computing sytems (1)
 Publication

 Departmental Technical Reports (CS) (40)
 All Computer Science and Engineering Research (35)
 Faculty Publications (7)
 Computer Science Faculty Publications and Presentations (6)
 Theses Digitization Project (6)

 Electrical and Computer Engineering Faculty Publications (4)
 Theses (4)
 Computer Science Faculty Publications (3)
 Christopher N. Roman (3)
 Departmental Papers (CS) (3)
 Electrical and Computer Engineering Faculty Publications and Presentations (2)
 International Bulletin of Political Psychology (2)
 Theses: Doctorates and Masters (2)
 Engineering and Computer Science Academic Celebrations (1)
 College of Engineering and Computing Course Catalogs (1)
 Robert Oddy (1)
 Electrical Engineering and Computer Science (1)
 Engineering Faculty Articles and Research (1)
 Masters Theses (1)
 CSE Conference and Workshop Papers (1)
 Sanza Kazadi (1)
 Research Collection School Of Information Systems (1)
 Faculty Publications in Computer & Electronics Engineering (to 2015) (1)
 Electronic Theses and Dissertations (1)
 Faculty Publications from the Department of Electrical and Computer Engineering (1)
 Robert A Iannucci (1)
 Dissertations and Theses (1)
 Mechanical Engineering Faculty Presentations (1)
 Other resources (1)
 Theses  Daytona Beach (1)
 Publication Type
Articles 1  30 of 136
FullText Articles in Computer Engineering
Attack Visualization For Intrusion Detection System, Mohammad A. Rabie
Attack Visualization For Intrusion Detection System, Mohammad A. Rabie
Theses
Attacks detection and visualization is the process of attempting to identify instances of network misuse by comparing current activity against the expected actions of an intruder. Most current approaches to attack detection involve the use of rulebased expert systems to identify indications of known attacks. However, these techniques are less successful in identifying attacks, which vary from expected patterns. Artificial neural networks provide the potential to identify and classify network activity based on limited, incomplete, and nonlinear data sources. Presenting an approach to the process of Attack visualization that utilizes the analytical strengths of neural networks, and providing the results ...
From Planning To Searching For The Shortest Plan: An Optimal Transition, Raul A. Trejo, Joel Galloway, Charanjiv Sachar, Vladik Kreinovich, Chitta Baral, Le Chi Tuan
From Planning To Searching For The Shortest Plan: An Optimal Transition, Raul A. Trejo, Joel Galloway, Charanjiv Sachar, Vladik Kreinovich, Chitta Baral, Le Chi Tuan
Departmental Technical Reports (CS)
Since Kautz and Selman's 1992 ECAI paper on satisfiability based planning, there has been several work on planning through finding models of a logical theory. Most of these works focus on finding a plan of a given length. If we want to find the shortest plan, then usually, we try plans of length 1, 2, ..., until we find the first length for which such a plan exists. When the planning problem is difficult and the shortest plan is of a reasonable length, this linear search can take a long time; to speed up the process, it has been proposed ...
Automated Online News Classification With Personalization, CheeHong Chan, Aixin Sun, Ee Peng Lim
Automated Online News Classification With Personalization, CheeHong Chan, Aixin Sun, Ee Peng Lim
Research Collection School Of Information Systems
Classification of online news, in the past, has often been done manually. In our proposed Categorizor system, we have experimented an automated approach to classify online news using the Support Vector Machine (SVM). SVM has been shown to deliver good classification results when ample training documents are given. In our research, we have applied SVM to personalized classification of online news.
Statistical And DempsterShafer Techniques In Testing Structural Integrity Of Aerospace Structures, Roberto A. Osegueda, Seetharami R. Seelam, Ana C. Holguin, Vladik Kreinovich, ChinWang Tao, Hung T. Nguyen
Statistical And DempsterShafer Techniques In Testing Structural Integrity Of Aerospace Structures, Roberto A. Osegueda, Seetharami R. Seelam, Ana C. Holguin, Vladik Kreinovich, ChinWang Tao, Hung T. Nguyen
Departmental Technical Reports (CS)
We describe the existing statisticsrelated methods of testing structural integrity for aerospace structures, describe their drawbacks, how they can be overcome, and compare the resulting techniques.
Uwit: Underwater Image Toolbox And Mosaicking In Matlab, R. Eustice, O. Pizarro, C. Roman, H. Singh
Uwit: Underwater Image Toolbox And Mosaicking In Matlab, R. Eustice, O. Pizarro, C. Roman, H. Singh
Christopher N. Roman
No abstract provided.
A Short Summary Of Seabed And Some Data Highlights, H. Singh, R. Eustice, C. Roman, O. Pizarro, N. Mcphee
A Short Summary Of Seabed And Some Data Highlights, H. Singh, R. Eustice, C. Roman, O. Pizarro, N. Mcphee
Christopher N. Roman
No abstract provided.
A Realistic (NonAssociative) Logic And A Possible Explanations Of 7+2 Law, Raul A. Trejo, Vladik Kreinovich, I. R. Goodman, Jesus Martinez, Reginaldo Gonzalez
A Realistic (NonAssociative) Logic And A Possible Explanations Of 7+2 Law, Raul A. Trejo, Vladik Kreinovich, I. R. Goodman, Jesus Martinez, Reginaldo Gonzalez
Departmental Technical Reports (CS)
When we know the subjective probabilities (degrees of belief) p1 and p2 of two statements S1 and S2, and we have no information about the relationship between these statements, then the probability of S1&S2 can take any value from the interval [max(p1+p21,0),min(p1,p2)]. If we must select a single number from this interval, the natural idea is to take its midpoint. The corresponding "and" operation p1&p_2=(1/2)(max(p1+p21,0)+min(p1,p2)) is not associative. However, since the largest possible nonassociativity degree (a&b)&ca&(b&c) is equal to ...
Representation, Elicitation, And Aggregation Of Uncertainty In Risk Analysis  From Traditional Probabilistic Techniques To More General, More Realistic Approaches: A Survey, Scott Ferson, Vladik Kreinovich
Representation, Elicitation, And Aggregation Of Uncertainty In Risk Analysis  From Traditional Probabilistic Techniques To More General, More Realistic Approaches: A Survey, Scott Ferson, Vladik Kreinovich
Departmental Technical Reports (CS)
No abstract provided.
A Dipolar Coupling Based Strategy For Simultaneous Resonance Assignment And Structure Determination Of Protein Backbones, Fang Tian, Homayoun Valafar, James H. Prestegard
A Dipolar Coupling Based Strategy For Simultaneous Resonance Assignment And Structure Determination Of Protein Backbones, Fang Tian, Homayoun Valafar, James H. Prestegard
Faculty Publications
A new approach for simultaneous protein backbone resonance assignment and structure determination by NMR is introduced. This approach relies on recent advances in highresolution NMR spectroscopy that allow observation of anisotropic interactions, such as dipolar couplings, from proteins partially aligned in field ordered media. Residual dipolar couplings are used for both geometric information and a filter in the assembly of residues in a sequential manner. Experimental data were collected in less than one week on a small redox protein, rubredoxin, that was 15N enriched but not enriched above 1% natural abundance in 13C. Given the acceleration possible with partial 13C ...
Estimation Of Error In Large Area Underwater Photomosaics Using Vehicle Navigation Data, C. Roman, H. Singh
Estimation Of Error In Large Area Underwater Photomosaics Using Vehicle Navigation Data, C. Roman, H. Singh
Christopher N. Roman
Creating geometrically accurate photomosaics of underwater sites using images collected from an AUV or ROV is a difficult task due to dimensional errors which grow as a function of 3D image distortion and the mosaicking process. Although photomosiacs are accurate locally their utility for accurately representing a large survey area is jeopardized by this error growth. Evaluating the error in a mosaic is the first step in creating globally accurate photomosaics of an unstructured environment with bounded error. Using vehicle navigation data and sensor offsets it is possible to estimate the error present in large area photomosaics independent of the ...
How To Interpret Neural Networks In Terms Of Fuzzy Logic?, Sompong Dhompongsa, Vladik Kreinovich, Hung T. Nguyen
How To Interpret Neural Networks In Terms Of Fuzzy Logic?, Sompong Dhompongsa, Vladik Kreinovich, Hung T. Nguyen
Departmental Technical Reports (CS)
Neural networks are a very efficient learning tool, e.g., for transforming an experience of an expert human controller into the design of an automatic controller. It is desirable to reformulate the neural network expression for the inputoutput function in terms most understandable to an expert controller, i.e., by using words from natural language. There are several methodologies for transforming such naturallanguage knowledge into a precise form; since these methodologies have to take into consideration the uncertainty (fuzziness) of natural language, they are usually called fuzzy logics.
Combining Fuzzy And Probabilistic Knowledge Using Belief Functions, Vladik Kreinovich, Claude Langrand, Hung T. Nguyen
Combining Fuzzy And Probabilistic Knowledge Using Belief Functions, Vladik Kreinovich, Claude Langrand, Hung T. Nguyen
Departmental Technical Reports (CS)
Some knowledge comes in probabilistic terms, some in fuzzy terms. These formalisms are drastically different, so it is difficult to combine the corresponding knowledge. A natural way to combine fuzzy and probabilistic knowledge is to find a formalism which enables us to express both types of knowledge, and then to use a combination rule from this general formalism. In this paper, as such a formalism, we propose to use belief functions. For the case when the universe of discourse is the set of all real numbers, we derive new explicit easytocompute analytical formulas for the resulting combination.
A Statistical Analysis For Rule Base Reduction, Vladik Kreinovich, Claude Langrand, Hung T. Nguyen
A Statistical Analysis For Rule Base Reduction, Vladik Kreinovich, Claude Langrand, Hung T. Nguyen
Departmental Technical Reports (CS)
When we take into account more input variables in a control system, the number of rules grows exponentially. To decrease the number of rules, we propose not to explicitly state the control for every combination of input variables, but to use the "otherwise" clause. In this paper, we provide a simple statistical analysis of the resulting reduction and show, on a case study, that this reduction can indeed be drastic.
Interval Mathematics: Algebraic Aspects, Sompong Dhompongsa, Vladik Kreinovich, Hung T. Nguyen
Interval Mathematics: Algebraic Aspects, Sompong Dhompongsa, Vladik Kreinovich, Hung T. Nguyen
Departmental Technical Reports (CS)
Many applicationoriented mathematical models deal with real numbers. In real life, due to the inevitable measurement inaccuracy, we do not know the exact values of the measured quantities, we know, at best, the intervals of possible values. It is thus desirable to analyze how the corresponding mathematical results will look if we replace numbers by intervals.
NonAssociative Operations, Bernadette BouchonMeunier, Vladik Kreinovich, Hung T. Nguyen
NonAssociative Operations, Bernadette BouchonMeunier, Vladik Kreinovich, Hung T. Nguyen
Departmental Technical Reports (CS)
How is fuzzy logic usually formalized? There are many seemingly reasonable requirements that a logic should satisfy: e.g., since A&B and B&A are the same, the corresponding andoperation should be commutative. Similarly, since A&A means the same as A, we should expect that the andoperation should also satisfy this property, etc. It turns out to be impossible to satisfy all these seemingly natural requirements, so usually, some requirements are picked as absolutely true (like commutativity or associativity), and others are ignored if they contradict to the picked ones. This idea leads to a neat mathematical theory ...
Aerospace Applications Of Intervals: From Geospatial Data Processing To Fault Detection In Aerospace Structures, Vladik Kreinovich, Scott A. Starks
Aerospace Applications Of Intervals: From Geospatial Data Processing To Fault Detection In Aerospace Structures, Vladik Kreinovich, Scott A. Starks
Departmental Technical Reports (CS)
This paper presents a brief introduction into interval computations and their use in aerospace applications.
Constrained Fuzzy Arithmetic, Vladik Kreinovich, Mirko Navara, Zdenek Zabokrtsky
Constrained Fuzzy Arithmetic, Vladik Kreinovich, Mirko Navara, Zdenek Zabokrtsky
Departmental Technical Reports (CS)
No abstract provided.
Reifying Communication At The Application Level, Andrew P. Black, Jie Huang, Jonathan Walpole
Reifying Communication At The Application Level, Andrew P. Black, Jie Huang, Jonathan Walpole
Computer Science Faculty Publications and Presentations
Middleware, from the earliest RPC systems to recent ObjectOriented Remote Message Sending (RMS) systems such as Java RMI and CORBA, claims transparency as one of its main attributes. Coulouris et al. define transparency as “the concealment from the … application programmer of the separation of components in a distributed system.” They go on to identify eight different kinds of transparency.
We considered titling this paper “Transparency Considered Harmful”, but that title is misleading because it implies that all kinds of transparency are bad. This is not our view. Rather, we believe that the choice of which transparencies should be offered by ...
LogicMotivated Choice Of Fuzzy Logic Operators, Pratit Santiprabhob, Hung T. Nguyen, Witold Pedrycz, Vladik Kreinovich
LogicMotivated Choice Of Fuzzy Logic Operators, Pratit Santiprabhob, Hung T. Nguyen, Witold Pedrycz, Vladik Kreinovich
Departmental Technical Reports (CS)
Many different "and" and "or"operations have been proposed for use in fuzzy logic; it is therefore important to select, for each particular application, the operations which are the best for this particular application. Several papers discuss the optimal choice of "and" and "or"operations for fuzzy control, when the main criterion is to get the stablest control (or the smoothest or the most robust or the fastesttocompute). In reasoning applications, however, it is more appropriate to select operations which are the best in reflecting human reasoning, i.e., operations which are "the most logical". In this paper, we explain ...
Discrete (Set) Derivatives And "Algebraic" Fuzzy Logic Operations, Bernadette BouchonMeunier, Hung T. Nguyen, Vladik Kreinovich
Discrete (Set) Derivatives And "Algebraic" Fuzzy Logic Operations, Bernadette BouchonMeunier, Hung T. Nguyen, Vladik Kreinovich
Departmental Technical Reports (CS)
We propose a new way to generalize logical operations from the discrete classical logic to a continuous fuzzy logic; namely, we propose to define derivatives for discrete case, and then to use these derivatives to derive the continuous operations. We show that this natural approach leads to "algebraic" fuzzy operations a*b and a+ba*b.
Hyperbolic Approach To Fuzzy Control Is Optimal, Hung T. Nguyen, Vladik Kreinovich, Michael Margaliot, Gideon Langholtz
Hyperbolic Approach To Fuzzy Control Is Optimal, Hung T. Nguyen, Vladik Kreinovich, Michael Margaliot, Gideon Langholtz
Departmental Technical Reports (CS)
In a series of papers and a book, M. Margaliot and G. Langholz proposed a hyperbolic approach to fuzzy control, in which they apply a certain hyperbolic nonlinear transformation to the original variables. In this paper, we consider all possible nonlinear transformations of this type and show that this hyperbolic transformation is indeed optimal.
A New Derivation Of Centroid Defuzzification, Mourad Oussalah, Hung T. Nguyen, Vladik Kreinovich
A New Derivation Of Centroid Defuzzification, Mourad Oussalah, Hung T. Nguyen, Vladik Kreinovich
Departmental Technical Reports (CS)
We describe a new symmetrybased derivation of centroid defuzzification.
Theoretical Justification Of A Heuristic Subbox Selection Criterion, Vladik Kreinovich, Tibor Csendes
Theoretical Justification Of A Heuristic Subbox Selection Criterion, Vladik Kreinovich, Tibor Csendes
Departmental Technical Reports (CS)
The most widely used guaranteed methods for global optimization are probably the intervalbased branchandbound techniques. In these techniques, we start with a single box  the entire function domain  as a possible location of the global minimum, and then, of each step, subdivide some of the boxes, use interval computations to compute the enclosure [F(X),F+(X)] of the range f(X) of the objective function f(x) on each new subbox X, and, based on these computations, eliminate the boxes which cannot contain the global minimum. The computational efficiency of these methods strongly depends on which boxes we select ...
Automatic Concurrency In Sequencel, Daniel E. Cooke, Vladik Kreinovich
Automatic Concurrency In Sequencel, Daniel E. Cooke, Vladik Kreinovich
Departmental Technical Reports (CS)
This paper presents a programming language which we believe to be most appropriate for the automation of parallel data processing, especially data processing of concern to the oil industry and to the U.S. Federal Agencies involved in the analysis of Satellite Telemetry Data. Focus is placed upon major language issues facing the development of the information power grid. The paper presents an example of the type of parallelism desired in the Grid. To implement this parallelism in such a language as Java we need to specify parallelism explicitly. We show that if we rewrite the same solution in the ...
Computational Complexity Of Optimization And Crude Range Testing: A New Approach Motivated By Fuzzy Optimization, G. William Walster, Vladik Kreinovich
Computational Complexity Of Optimization And Crude Range Testing: A New Approach Motivated By Fuzzy Optimization, G. William Walster, Vladik Kreinovich
Departmental Technical Reports (CS)
It is often important to check whether the maximum max f of a given function f on a given set B is smaller than a given number C. This "crude range testing" (CRT) problem is one of the most important problems in the practical application of interval analysis. Empirical evidence shows that the larger the difference C  max f, the easier the test. In general, the fewer global maxima, the easier the test; and finally, the further away global maxima are from each other, the easier the test. Using standard complexity theory to explain these empirical observations fails because the ...
Towards Fusing Sophisticated Mathematical Knowledge And Informal Expert Knowledge: An Arbitrary Metric Can Be Naturally Interpreted In Fuzzy Terms, Hung T. Nguyen, Vladik Kreinovich, Witold Pedrycz
Towards Fusing Sophisticated Mathematical Knowledge And Informal Expert Knowledge: An Arbitrary Metric Can Be Naturally Interpreted In Fuzzy Terms, Hung T. Nguyen, Vladik Kreinovich, Witold Pedrycz
Departmental Technical Reports (CS)
In many practical situations, we are faced with a necessity to combine sophisticated mathematical knowledge about the analyzed systems with informal expert knowledge. To make this combination natural, it is desirable to reformulate the abstract mathematical knowledge in understandable intuitive terms. In this paper, we show how this can be done for an abstract metric.
One way to define a metric is to pick certain properties P1, ..., Pn, and to define a similarity between two objects x and y as the degree to which P1(x) is similar to P1(y) and P2(x) is similar to P2(y), etc ...
SecondOrder Uncertainty As A Bridge Between Probabilistic And Fuzzy Approaches, Hung T. Nguyen, Vladik Kreinovich, Luc Longpre
SecondOrder Uncertainty As A Bridge Between Probabilistic And Fuzzy Approaches, Hung T. Nguyen, Vladik Kreinovich, Luc Longpre
Departmental Technical Reports (CS)
On the example of physics, we show that the traditional onelevel description is not completely adequate. For a more adequate structure, a hierarchical description of uncertainty is necessary, which supplements the more traditional firstorder uncertainty with secondorder, thirdorder and more sophisticated models. In particular, the secondorder approach seems to provide a bridge between probabilistic and fuzzy approaches to uncertainty.
The Effect Of Target Position And Tactual Recognition Field Size On Touch Bias And Accuracy, Elizabeth L. Brix
The Effect Of Target Position And Tactual Recognition Field Size On Touch Bias And Accuracy, Elizabeth L. Brix
Theses  Daytona Beach
Past studies have shown that touchscreen display angles other than those that perpendicularly bisect the operator's line of sight cause the operator to touch slightly below the target. The amount of touch bias created from this misjudgment fluctuates according to the target's position on the screen. Additionally, the percentage of touches that activate a specific target varies according to the size of the tactual recognition field. Out of three square tactual recognition field sizes, this study sought to match these fields with the amount of touch bias occurring in each location (i.e., small amount of touch bias ...
Feedback Correction Of Angular Error In Grating Readout, Monish Ranjan Chatterjee, Sundaram Ramachandran
Feedback Correction Of Angular Error In Grating Readout, Monish Ranjan Chatterjee, Sundaram Ramachandran
Electrical and Computer Engineering Faculty Publications
Angular and wavelength READ beam errors in holographic interconnection systems are often a recurrent problem. Several strategies have been proposed to minimize or eliminate such READOUT misalignments.
Some years ago, Chatterjee and coworkers proposed a method involving READ beam wavelength tuning to correct output angular errors. In this paper, we investigate the possibility of using an acoustooptic (AO) Bragg cell with optoelectronic feedback to dynamically correct the scattered beam for deviations in the incidence direction of the READ beam of a hologram. The concept here is based on an acoustic frequency feedback strategy used recently by Balakshy and Kazaryan for ...
Identification Of Shapes Using A Nonlinear Dynamic System, Shaheen Hoque, Sanza Kazadi, Angel Li, Will Chen, Elvio Sadun