Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2005

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 211 - 240 of 502

Full-Text Articles in Computer Engineering

Performance Analysis Of Three Database Server Distribution Algorithms, Christopher G. Brown May 2005

Performance Analysis Of Three Database Server Distribution Algorithms, Christopher G. Brown

Culminating Projects in Information Assurance

Although the concept of the distributed database has been around for over 20 years, it has not dominated the computer landscape especially in business-related applications. This paper will explore the effectiveness of distributed database under a variety of conditions by conducting experiments using a number of different combinations of variables listed below. Specifically, the following questions will be researched:

  1. How does the workload intensity influence the need and performance of distributed database applications?
  2. How does the number of nodes the database is stored upon affect the data access time?
  3. How does the method used to assign a given query to …


Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 21, Number 8, May 2005, College Of Engineering And Computer Science, Wright State University May 2005

Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 21, Number 8, May 2005, College Of Engineering And Computer Science, Wright State University

BITs and PCs Newsletter

An eight page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.


Hide It Or Unbundle It: A Comparison Of The Antitrust Investigations Against Microsoft In The U.S. And The E.U., Sue Ann Mota May 2005

Hide It Or Unbundle It: A Comparison Of The Antitrust Investigations Against Microsoft In The U.S. And The E.U., Sue Ann Mota

The University of New Hampshire Law Review

[Excerpt] "Microsoft Corporation, the world’s largest software company, has been facing antitrust scrutiny globally. In the U.S., after what’s been called the antitrust trial of the century, a consent decree was reached between Microsoft, the United States government, and several states, that closely resembled the litigated remedy that the remaining states received. Only Massachusetts appealed the litigated remedy, which was approved by the appeals court on June 30, 2004. In the United States, Microsoft was required to hide, but not remove, the Internet Explorer browser on the Windows Operating System. While antitrust litigation was ongoing in the United States against …


10 Inventions On Keyboard Key Switch Mechanism, Umakant Mishra May 2005

10 Inventions On Keyboard Key Switch Mechanism, Umakant Mishra

Umakant Mishra

The key switches of the keyboard of a computer system are generally comprised of a key cap having a plunger, conductive rubber disposed above a membrane circuit and compressed by the plunger to trigger the membrane circuit causing it to produce an electric signal to the computer. Some key switches use springs. Some other keyboards use rubber domes or a dome sheet, which do the function of springs. When the user depresses the key button the spring or domes collapse. The key switch depresses the key stem, which actuates the button on the membrane circuit. When the user releases the …


10 Inventions On Laptop Keyboards, Umakant Mishra May 2005

10 Inventions On Laptop Keyboards, Umakant Mishra

Umakant Mishra

A desktop keyboard has several sections like character key section, navigation key section, numeric key section, and function key section etc. each consisting of several number of keys. However, a laptop computer does not have so much of space to accommodate all these keys into the keyboard. There are several considerations while designing a laptop keyboard.

This article illustrates 10 inventions on keyboards for laptop and portable computers. The inventions are selected from US patent database. The inventions try to improve various aspects of a laptop keyboard, such as reducing size, folding and concealing, ergonomic features, improving quality and reducing …


10 Inventions On Special Type Of Keyboards, Umakant Mishra May 2005

10 Inventions On Special Type Of Keyboards, Umakant Mishra

Umakant Mishra

A keyboard is the most important input device for a computer. It is used with various types and sizes of computer. But the same standard keyboard will not work efficiently with different types of computers at different environments. There is a need to develop special keyboards to meet special requirements.

This article illustrates 10 inventions on special types of keyboards. The special keyboard are used in special computers or computers used for special purposes. A special keyboard is to be understood as a keyboard having features beyond a normal keyboard. The example of special keyboards are, a children’s keyboard which …


New Algorithms For Statistical Analysis Of Interval Data, Gang Xiang, Scott A. Starks, Vladik Kreinovich, Luc Longpre May 2005

New Algorithms For Statistical Analysis Of Interval Data, Gang Xiang, Scott A. Starks, Vladik Kreinovich, Luc Longpre

Departmental Technical Reports (CS)

It is known that in general, statistical analysis of interval data is an NP-hard problem: even computing the variance of interval data is, in general, NP-hard. Until now, only one case was known for which a feasible algorithm can compute the variance of interval data: the case when all the measurements are accurate enough -- so that even after the measurement, we can distinguish between different measured values Xi. In this paper, we describe several new cases in which feasible algorithms are possible -- e.g., the case when all the measurements are done by using the same (not necessarily very …


Effects Of Load Magnitude On Diagnosing Broken Bar Faults In Induction Motors Using The Pendulous Oscillation Of The Rotor Magnetic Field Orientation, Behrooz Mirafzal, Nabeel Demerdash May 2005

Effects Of Load Magnitude On Diagnosing Broken Bar Faults In Induction Motors Using The Pendulous Oscillation Of The Rotor Magnetic Field Orientation, Behrooz Mirafzal, Nabeel Demerdash

Electrical and Computer Engineering Faculty Research and Publications

The effects of load level on the ability to diagnose broken bar faults in squirrel-cage induction motors are studied in this paper. The pendulous oscillation of the rotor magnetic field orientation is implemented as a fault signature for rotor fault diagnostic purposes at steady-state operations. Moreover, the effects of load level on the low-side band component of the stator current spectrum, and associated diagnostic difficulties in this approach particularly in the presence of motor operation from pulsewidth-modulation drives, are reported as well. These investigations were performed through testing 2-hp and 5-hp induction motors over a wide range of load levels …


Optimal Flux Weakening In Surface Pm Machines Using Fractional-Slot Concentrated Windings, Ayman M. El-Refaie, Thomas M. Jahns May 2005

Optimal Flux Weakening In Surface Pm Machines Using Fractional-Slot Concentrated Windings, Ayman M. El-Refaie, Thomas M. Jahns

Electrical and Computer Engineering Faculty Research and Publications

A design approach is presented for achieving optimal flux-weakening operation in surface permanent-magnet (SPM) synchronous machines by properly designing the machine's stator windings using concentrated, fractional-slot stator windings. This technique makes it possible to significantly increase the machine inductance in order to achieve the critical condition for providing wide speed ranges of constant-power operation. The conditions for optimal flux weakening can be achieved while simultaneously delivering sinusoidal line-to-line back-electromotive-force waveforms and low cogging torque. A closed-form analytical model is described that can be used to design SPM machines to achieve optimal flux-weakening conditions. This technique is applied to design a …


Architectures For Rule Processing Intrusion Detection And Prevention Systems, Michael E. Attig May 2005

Architectures For Rule Processing Intrusion Detection And Prevention Systems, Michael E. Attig

All Computer Science and Engineering Research

High-performance intrusion detection and prevention systems are needed by network administrators in order to protect Internet systems from attack. Researchers have been working to implement components of intrusion detection and prevention systems for the highly popular Snort system in reconfigurable hardware. While considerable progress has been made in the areas of string matching and header processing, complete systems have not yet been demonstrated that effectively combine all of the functionality necessary to perform intrusion detection and prevention for real network systems. In this thesis, three architectures to perform rule processing, the heart of intrusion detection and prevention, are presented. The …


Capacity And Complexity Of Hmm Duration Modeling Techniques, Michael T. Johnson May 2005

Capacity And Complexity Of Hmm Duration Modeling Techniques, Michael T. Johnson

Electrical and Computer Engineering Faculty Research and Publications

The ability of a standard hidden Markov model (HMM) or expanded state HMM (ESHMM) to accurately model duration distributions of phonemes is compared with specific duration-focused approaches such as semi-Markov models or variable transition probabilities. It is demonstrated that either a three-state ESHMM or a standard HMM with an increased number of states is capable of closely matching both Gamma distributions and duration distributions of phonemes from the TIMIT corpus, as measured by Bhattacharyya distance to the true distributions. Standard HMMs are easily implemented with off-the-shelf tools, whereas duration models require substantial algorithmic development and have higher computational costs when …


Improving The Performance Of Internet Data Transport, Anshul Kantawala, Jonathan S. Turner May 2005

Improving The Performance Of Internet Data Transport, Anshul Kantawala, Jonathan S. Turner

All Computer Science and Engineering Research

With the explosion of the World Wide Web, the Internet infrastructure faces new challenges in providing high performance for data traffic. First, it must be able to pro-vide a fair-share of congested link bandwidth to every flow. Second, since web traffic is inherently interactive, it must minimize the delay for data transfer. Recent studies have shown that queue management algorithms such as Tail Drop, RED and Blue are deficient in providing high throughput, low delay paths for a data flow. Two major shortcomings of the current algorithms are: they allow TCP flows to get synchronized and thus require large buffers …


Using A Pda To Control Home Appliances, Atif Albraiki May 2005

Using A Pda To Control Home Appliances, Atif Albraiki

Honors Capstone Projects - All

The Personal Digital Assistant (PDA) is a handheld device that gives users different organizational capabilities. Over the years, the functionality of PDAs has expanded tremendously to include internet connectivity and different computer applications. The purpose of my honors thesis, combined with my engineering senior design project, was to include a new functionality to the PDA and use it to control different home appliances. The goal of the project was to develop a PDA program that will communicate with a PC program, and have the PC program communicate with a microcontroller to control home appliances. My part of the project was …


Nanoindentation Technique For Characterizing Cantilever Beam Style Rf Microelectromechanical Systems (Mems) Switches, Hyukjae Lee, Ronald A. Coutu Jr., Shankar Mall, Paul E. Kladitis Apr 2005

Nanoindentation Technique For Characterizing Cantilever Beam Style Rf Microelectromechanical Systems (Mems) Switches, Hyukjae Lee, Ronald A. Coutu Jr., Shankar Mall, Paul E. Kladitis

Electrical and Computer Engineering Faculty Research and Publications

A nanoindentation technique was used to mechanically actuate a radio frequency micro-switch along with the measurement of contact resistance to investigate its applicability to characterize deflection and contact resistance behaviors of micro-sized cantilever beam switches. The resulting load–displacement relationship showed a discontinuity in slope when the micro-switch closed. The measured spring constants reasonably agreed with theoretical values obtained from the simple beam models. The change in contact resistance during test clearly indicated micro-switch closure but it did not coincide exactly with the physical contact between two electric contacts due to a resistive contaminated film.


Static Determination Of Allocation Rates To Support Real-Time Garbage Collection, Tobias Mann Apr 2005

Static Determination Of Allocation Rates To Support Real-Time Garbage Collection, Tobias Mann

All Computer Science and Engineering Research

While it is generally accepted that garbage-collected languages offer advantages over languages in which objects must be explicitly deallocated, real-time developers are leery of the adverse effects a garbage collector might have on real-time performance. Semiautomatic approaches based on regions have been proposed, but incorrect usage could cause unbounded storage leaks or program failure. Moreover, correct usage cannot be guaranteed at compile-time. Recently, real-time garbage collectors have been developed that provide a guaranteed fraction of the CPU to the application, and the correct operation of those collectors has been proven, subject only to the specification of certain statistics related to …


Composable Timed Automata Models For Real-Time Embedded Systems Middleware, Venkita Subramonian, Christopher Gill, Cesar Sanchez, Henny Sipma Apr 2005

Composable Timed Automata Models For Real-Time Embedded Systems Middleware, Venkita Subramonian, Christopher Gill, Cesar Sanchez, Henny Sipma

All Computer Science and Engineering Research

Middleware for distributed real-time embedded (DRE) systems has grown more and more complex in recent years, to address functional and temporal requirements of complex real-time applications. While current approaches for modeling middleware have eased the task of assembling, deploying and configuring middleware and applications, a more formal, fundamental and lower-level set of models is needed to be able to uncover subtle safety and timing errors introduced by interference between computations, particularly in the face of alternative concurrency strategies in the middleware layer. In this paper, we examine how formal models of lower-level middleware building blocks provide an appropriate level of …


What A Mesh: Dependent Data Types For Correct Mesh Manipulation Algorithms, Joel R. Brandt Apr 2005

What A Mesh: Dependent Data Types For Correct Mesh Manipulation Algorithms, Joel R. Brandt

All Computer Science and Engineering Research

The Edinburgh Logical Framework (LF) has been proposed as a system for expressing inductively defined sets. I will present an inductive definition of the set of manifold meshes in LF. This definition takes into account the topological characteri-zation of meshes, namely their Euler Characteristic. I will then present a set of dependent data types based on this inductive def-inition. These data types are defined in a programming language based on LF. The language’s type checking guarantees that any typeable expression represents a correct manifold mesh. Furthermore, any mesh can be represented using these data types. Hence, the encoding is sound …


A Computational Study Of Thermo-Fluid Dynamics Of Pulse Detonation Engines, Alberto Davila Urresti Apr 2005

A Computational Study Of Thermo-Fluid Dynamics Of Pulse Detonation Engines, Alberto Davila Urresti

Master's Theses - Daytona Beach

The purpose of this thesis is to use a transient Computational Fluid Dynamics computer code written in FORTRAN 90 for full reaction kinetics, to perform an analysis of the physical processes and chemical phenomena occurring on a single cycle of an ideal Pulse Detonation Engine (PDE) using a stoichiometric mixture of H2 and O2. A small zone of high pressure and temperature is used to initiate the detonation wave in the PDE. A simple case with no chemical reactions and the same PDE geometry and “computational spark” is also tested. The speed of the wave relative to …


Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 21, Number 7, April 2005, College Of Engineering And Computer Science, Wright State University Apr 2005

Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 21, Number 7, April 2005, College Of Engineering And Computer Science, Wright State University

BITs and PCs Newsletter

A six page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.


Cs 207: Advanced Office Productivity Ii, Louis A. Benavides Apr 2005

Cs 207: Advanced Office Productivity Ii, Louis A. Benavides

Computer Science & Engineering Syllabi

This course covers post-advanced microcomputer applications including Microsoft Office Word 2003, Microsoft Office Excel 2003, Microsoft Office Access 2003, and Microsoft Office PowerPoint 2003. Topics include: creating an online form; working with macros and Visual Basic for Applications (VBA); working with a master document, an index and a table of contents; linking an Excel worksheet and charting its data in Word; formula auditing, data validation, and complex problem solving in Excel; importing data into Excel; working with PivotCharts, PivotTables, and trendlines in Excel; creating a PivotTable List; advanced Access report and form techniques, and creating multi-page forms; administering a database …


Cs 240: Introduction To Computer Science I, L. Jane Lin Apr 2005

Cs 240: Introduction To Computer Science I, L. Jane Lin

Computer Science & Engineering Syllabi

This course is the first in the three course sequence "Introduction to Computer Science" offered by the Computer Science department at WSU. This course presents a general introduction to C++ programming language. It introduces the fundamental capabilities of C++ language as a problem solving tool. Topics include data representation, debugging and program verification.


Cs 241: Computer Science Ii, L. Jane Lin Apr 2005

Cs 241: Computer Science Ii, L. Jane Lin

Computer Science & Engineering Syllabi

This course is the second in the three course sequence "Introduction to Computer Science" offered by the Computer Science department, WSU. It focuses on tools for building abstract data types (using structure and class concepts in C++)
and Object-Oriented Programming. We also begin the study of data structures in this course. For All CS 241 students, concurrent registration into CS 241 lab is a must.


Cs 240-02: Introduction To Computer Science, Eric Maston Apr 2005

Cs 240-02: Introduction To Computer Science, Eric Maston

Computer Science & Engineering Syllabi

We will develop basic techniques to design, develop and implement programs using the C++ language. This course focuses on basic elements of programming and assumes no knowledge of programming in C++.


Cs 241-02: Introduction To Computer Science Ii, Praveen Kakumanu Apr 2005

Cs 241-02: Introduction To Computer Science Ii, Praveen Kakumanu

Computer Science & Engineering Syllabi

This course is the second in the three course sequence "Introduction to Computer Science" offered by the Computer Science department, WSU. It focuses on tools for building abstract data types {using structure and class concepts in C++) and Object-Oriented Programming. We also begin the study of data structures in this course. Note: For all CS 241 students, concurrent registration into CS 241 lab is a must


Cs/Mth 316/516: Numerical Methods For Digital Computers - I, Ronald F. Taylor Apr 2005

Cs/Mth 316/516: Numerical Methods For Digital Computers - I, Ronald F. Taylor

Computer Science & Engineering Syllabi

Introduction to numerical methods used in the sciences. Methods of interpolation, data smoothing, functional approximation, numerical differentiation and integration. Solution techniques for linear and nonlinear equations. Discussion of sources of error in numerical methods. Applications of interest to engineering, science, and applied mathematics students are an integral part of the course. Special topics presented as schedule permits. 4 credit hours. Prerequisites: CS 142 or EGR 153 or CEG 220 or CS 241, MTH 231, MTH 253 or 255.


Bio/Cs 271: Introduction To Bioinformatics, Dan E. Krane, Travis E. Doom Apr 2005

Bio/Cs 271: Introduction To Bioinformatics, Dan E. Krane, Travis E. Doom

Computer Science & Engineering Syllabi

BIO/CS 271 Introduction to Bioinformatics: Introduction to DNA as an information storage system, data searches and pairwise alignments, substitution patterns, protein folding, and proteomics. Prerequisite: CS 240 or equivalent, BIO 112


Cs 340: Programming Language Workshop In Java, Krishnaprasad Thirunarayan Apr 2005

Cs 340: Programming Language Workshop In Java, Krishnaprasad Thirunarayan

Computer Science & Engineering Syllabi

This course is designed as a self-study in Java. You are expected to learn the Java language and solve a set of programming problems assigned to you using it. (You may develop your code using any IDE you like, but you must ensure that it eventually runs using JDK 5). There are no exams. We officially meet only once in a quarter. However, I will be available in the posted office hours for clarifications and discussions about the programming problems.


Cs 242-02: Introduction To Computer Science Iii, Praveen Kakumanu Apr 2005

Cs 242-02: Introduction To Computer Science Iii, Praveen Kakumanu

Computer Science & Engineering Syllabi

This is the final course in the three course sequence "Introduction to Computer Science" offered by the Computer Science department, WSU. It focuses on building a number of abstract data types such as stacks, queues, trees and tables. We continue to study the C++ object-oriented concepts such as Inheritance, polymorphism and template handling. We also start learning to analyze the complexity of algorithms in this course. Note: For all CS 242 students, concurrent registration into CS 242 lab is a must.


Cs 480/680: Comparative Programming Languages, Michael L. Raymer Apr 2005

Cs 480/680: Comparative Programming Languages, Michael L. Raymer

Computer Science & Engineering Syllabi

No abstract provided.


Cs 466/666: Introduction To Formal Languages, Thomas Sudkamp Apr 2005

Cs 466/666: Introduction To Formal Languages, Thomas Sudkamp

Computer Science & Engineering Syllabi

CS 466/666 is an introduction to formal language and automata theory. In this course we will examine methods for defining syntax of languages and recognizing patterns: the syntax of languages can be defined using grammars and patterns accepted by finite state machines. Along with presenting the fundamentals of these two topics, the course will develop and investigate the relationships between language definition and pattern recognition. The text will be the third edition of Languages and Machines: An Introduction to the Theory of Computer Science.