Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2008

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 17 of 17

Full-Text Articles in Other Computer Engineering

Application Of Parent-Child Uav Tasking For Wildfire Detection And Response, Stephen T. Kubik Dec 2008

Application Of Parent-Child Uav Tasking For Wildfire Detection And Response, Stephen T. Kubik

Master's Theses

In recent years, unmanned aerial vehicles (UAVs) have become a dominant force in the aerospace industry. Recent technological developments have moved these aircraft from remote operation roles to more active response missions. Of particular interest is the possibility of applying UAVs toward solving complex problems in long-endurance missions. Under that belief, the feasibility of utilizing UAVs for wildfire detection and response was investigated in a partnership that included NASA’s Aeronautics Research Mission Directorate and Science Mission Directorate, and the United States Forest Service. Under NASA’s Intelligent Mission Management (IMM) project, research was conducted to develop a mission architecture that would …


Implementing Arabic-To-English Machine Translation Using The Role And Reference Grammar Linguistic Model, Yasser Salem, Arnold Hensman, Brian Nolan Oct 2008

Implementing Arabic-To-English Machine Translation Using The Role And Reference Grammar Linguistic Model, Yasser Salem, Arnold Hensman, Brian Nolan

Conference Papers

This paper presents work-in-progress investigating the development of a rule-based lexical framework for Arabic language processing using the Role and Reference Grammar (RRG) linguistic model. A system, called UniArab is introduced in this research to support the framework. The paper outlines the conceptual structure of UniArab System, which utilizes the framework and translates the Arabic language into another natural language. Also, this paper explores how the characteristics of the Arabic language will effect the development of a Machine Translation (MT) tool from Arabic to English. Several distinguishing features of Arabic pertinent to MT will be explored in detail with reference …


Using Triz For Maximizing Information Presentation In Gui, Umakant Mishra Oct 2008

Using Triz For Maximizing Information Presentation In Gui, Umakant Mishra

Umakant Mishra

The modern software tools provide numerous graphic elements in their GUI, which demand more and more screen space. As the size of a display screen cannot be extended beyond a limit, it is typically seen as a constraint in a graphical user interface.

Looking from a TRIZ perspective, the computer screen should display all the information that the user needs (Ideal Final Result). There are various methods of addressing the problem of screen space, some of which are, ”using icons for windows”, “the desktop metaphor”, “the large virtual workspace metaphor”, “multiple virtual workspaces”, “overlapping windows” and “increasing dimensions” etc.

There …


Using Triz To Improve Navigation In Gui, Umakant Mishra Oct 2008

Using Triz To Improve Navigation In Gui, Umakant Mishra

Umakant Mishra

A typical user interface consists of several buttons, menus, windows, trees and other type of controls. The increased number of GUI elements and complexities of the GUI controls necessitate the user to acquire certain level of skill and efficiency in order to operate the GUI. There are many situations which further make the navigation difficult. Ideally the user should face no difficulties in navigating through the user interface. Any operation in the graphical user interface should require minimum pointer operations from the user (Ideal Final Result). This objective of a graphical user interface has led to several inventions trying to …


Using Triz For Minimizing Cursor Movements In Gui, Umakant Mishra Oct 2008

Using Triz For Minimizing Cursor Movements In Gui, Umakant Mishra

Umakant Mishra

Although a GUI is a revolutionary development over its predecessors, it suffers from a typical shortcoming that it requires a lot of pointer movements. As pointer movement is a slow process it affects the overall performance of a GUI operation. Besides too much pointer movement can frustrate a user. Hence, it is desirable to reduce the pointer movements while performing any action through a typical GUI. Ideally the user need not move the pointer to initiate a GUI based operation. In other words the pointer itself should automatically move onto the desired location on the graphical user interface (Ideal Final …


Using Triz To Design Error-Free Gui, Umakant Mishra Oct 2008

Using Triz To Design Error-Free Gui, Umakant Mishra

Umakant Mishra

A graphical user interface has a lot of advantages over its predecessors. Its beauty, simplicity, adaptability, user-friendliness, visual clarity, speed and ease of operation have made it popular and suitable to a broad range of users. But a GUI also has certain limitations. Like any other type of user interface, a GUI can also be operated wrongly which may yield undesirable results. A good GUI should be intelligent to determine user’s intention and disallow him doing wrong operations. A less error-prone GUI is certainly more effective and efficient. Ideally the GUI should prevent users from doing any mistake while operating …


Arranging Display Of Gui Elements- A Triz Based Analysis, Umakant Mishra Oct 2008

Arranging Display Of Gui Elements- A Triz Based Analysis, Umakant Mishra

Umakant Mishra

One of the biggest drawbacks of the graphical user interface is that it consumes the active display area associated with the device. Whether the display screen is a part of a television, computer, or any other consumer device, the graphical user interface appears on the active area of the display screen. As a result the GUI masks a part of the display screen and the amount of information that can be viewed on the screen is reduced. Ideally the GUI should offer all its features without blocking any part of the display screen. The features should be readily available and …


Inventions On Three Dimensional Gui- A Triz Based Analysis, Umakant Mishra Oct 2008

Inventions On Three Dimensional Gui- A Triz Based Analysis, Umakant Mishra

Umakant Mishra

The graphical user interface has become popular because of its simplicity and user friendliness. The user can do very complex operations through GUI by simple pointer movements. One of its major drawbacks is that it consumes active display area. Every icon, every window and every other GUI element occupies some amount of screen space. It is desirable to display more GUI features within the limited amount of display screen. Adding another dimension to a graphical user interface can yield tremendous benefits such as improving aesthetics, data presentation, screen-space utilization and user friendliness. The user can easily locate the objects in …


Emotional Speech Corpus Construction, Annotation And Distribution, Brian Vaughan, Charlie Cullen, Spyros Kousidis, John Mcauley May 2008

Emotional Speech Corpus Construction, Annotation And Distribution, Brian Vaughan, Charlie Cullen, Spyros Kousidis, John Mcauley

Conference papers

This paper details a process of creating an emotional speech corpus by collecting natural emotional speech assets, analysisng and tagging them (for certain acoustic and linguistic features) and annotating them within an on-line database. The definition of specific metadata for use with an emotional speech corpus is crucial, in that poorly (or inaccurately) annotated assets are of little use in analysis. This problem is compounded by the lack of standardisation for speech corpora, particularly in relation to emotion content. The ISLE Metadata Initiative (IMDI) is the only cohesive attempt at corpus metadata standardisation performed thus far. Although not a comprehensive …


Emotional Speech Corpora For Analysis And Media Production, Charlie Cullen, Brian Vaughan, Spyros Kousidis Jan 2008

Emotional Speech Corpora For Analysis And Media Production, Charlie Cullen, Brian Vaughan, Spyros Kousidis

Conference papers

Research into the acoustic correlates of emotional speech as part of the SALERO project has led to the construction of high quality emotional speech corpora, which contain both IMDI metadata and acoustic analysis data for each asset. Research into semi-automated, re-usable character animation has considered the development of online workflows based on speech corpus assets that would provide a single point of origin for character animation in media production. In this paper, a brief description of the corpus design and construction is given. Further, a prototype workflow for semi-automated emotional character animation is also provided, alongside a description of current …


Linguatag: An Emotional Speech Analysis Application, Charlie Cullen, Brian Vaughan, Spyros Kousidis Jan 2008

Linguatag: An Emotional Speech Analysis Application, Charlie Cullen, Brian Vaughan, Spyros Kousidis

Conference papers

The analysis of speech, particularly for emotional content, is an open area of current research. Ongoing work has developed an emotional speech corpus for analysis, and defined a vowel stress method by which this analysis may be performed. This paper documents the development of LinguaTag, an open source speech analysis software application which implements this vowel stress emotional speech analysis method developed as part of research into the acoustic and linguistic correlates of emotional speech. The analysis output is contained within a file format combining SMIL and SSML markup tags, to facilitate search and retrieval methods within an emotional speech …


Metadata Visualisation Techniques For Emotional Speech Corpora, Charlie Cullen, Brian Vaughan, Spyros Kousidis Jan 2008

Metadata Visualisation Techniques For Emotional Speech Corpora, Charlie Cullen, Brian Vaughan, Spyros Kousidis

Conference papers

Our research in emotional speech analysis has led to the construction of dedicated high quality, online corpora of natural emotional speech assets. Once obtained, the annotation and analysis of these assets was necessary in order to develop a database of both analysis data and metadata relating to each speech act. With annotation complete, the means by which this data may be presented to the user online for analysis, retrieval and organization is the current focus of our investigations. Building on an initial web interface developed in Ruby on Rails, we are now working towards a visually driven GUI built on …


Functorial Coalgebraic Logic: The Case Of Many-Sorted Varieties, Alexander Kurz, Daniela Petrişan Jan 2008

Functorial Coalgebraic Logic: The Case Of Many-Sorted Varieties, Alexander Kurz, Daniela Petrişan

Engineering Faculty Articles and Research

Following earlier work, a modal logic for T-coalgebras is a functor L on a suitable variety. Syntax and proof system of the logic are given by presentations of the functor. This paper makes two contributions. First, a previous result characterizing those functors that have presentations is generalized from endofunctors on one-sorted varieties to functors between many-sorted varieties. This yields an equational logic for the presheaf semantics of higher-order abstract syntax. As another application, we show how the move to functors between many-sorted varieties allows to modularly combine syntax and proof systems of different logics. Second, we show how to associate …


The Design And Testing Of Hand Held Devices To Assist Persons With Disabilities To Navigate Bus Services, Daniel Fitch Jan 2008

The Design And Testing Of Hand Held Devices To Assist Persons With Disabilities To Navigate Bus Services, Daniel Fitch

Undergraduate Review

Many transit systems around the U.S. are using global positioning systems to track their buses. Some of these systems provide bus locations in real-time on web maps. With internet integration becoming common in portable electronics, this research project analyzed the opportunity to utilize mass market devices to assist the general public and persons with disabilities to access and navigate fixed route bus services. This study has taken advantage of the state of the art automatic vehicle location systems aboard the Cape Cod Regional Transit Authority and MetroWest (Boston) Regional Transit Authority bus services, Microsoft Virtual Earth mapping services and Microsoft …


New Classes Of Codes For Cryptologists And Computer Scientists, Florentin Smarandache, W.B. Vasantha Kandasamy Jan 2008

New Classes Of Codes For Cryptologists And Computer Scientists, Florentin Smarandache, W.B. Vasantha Kandasamy

Branch Mathematics and Statistics Faculty and Staff Publications

Historically a code refers to a cryptosystem that deals with linguistic units: words, phrases etc. We do not discuss such codes in this book. Here codes are message carriers or information storages or information transmitters which in time of need should not be decoded or read by an enemy or an intruder. When we use very abstract mathematics in using a specific code, it is difficult for non-mathematicians to make use of it. At the same time, one cannot compromise with the capacity of the codes. So the authors in this book have introduced several classes of codes which are …


A Framework For Evaluating Managerial Styles In Open Source Projects, Tony Wasserman, Eugenio Capra Dec 2007

A Framework For Evaluating Managerial Styles In Open Source Projects, Tony Wasserman, Eugenio Capra

Tony Wasserman

This paper presents the Software Project Governance Framework (SPGF) for characterizing management of software projects, based on mechanisms used for communication and collaboration, the organizational structure of projects, and testing and quality assurance procedures. The framework was developed and validated from interviews and surveys with leaders of more than 70 commercial and community based software projects, including both closed and open source projects.


Mitigation Of Control Channel Jamming Under Node Capture Attacks, Patrick Tague, Mingya Li, Radha Poovendran Dec 2007

Mitigation Of Control Channel Jamming Under Node Capture Attacks, Patrick Tague, Mingya Li, Radha Poovendran

Patrick Tague

Availability of service in many wireless networks depends on the ability for network users to establish and maintain communication channels using control messages from base stations and other users. An adversary with knowledge of the underlying communication protocol can mount an efficient denial of service attack by jamming the communication channels used to exchange control messages. The use of spread spectrum techniques can deter an external adversary from such control channel jamming attacks. However, malicious colluding insiders or an adversary who captures or compromises system users are not deterred by spread spectrum, as they know the required spreading sequences. For …