Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Physical Sciences and Mathematics

Automated Transforms Of Software Models: A Design Pattern Approach, Brandon Adam Gump Jan 2009

Automated Transforms Of Software Models: A Design Pattern Approach, Brandon Adam Gump

Browse all Theses and Dissertations

In the realm of software development, projects are plagued by continuous maintenance at the source code level as well as tedious transformations from formal specifications to source code. Such work consumes a large amount of time only to create complicated, un-intelligible, and un-reusable code that is completely detached from initial design rational. To cope with these problems, The Air Force Institute of Technology (AFIT) Wide Spectrum Object Modeling Environment (AWSOME) was designed to generate specifications that can be transformed into abstract designs and finally into source code. The specifications are written in the AFIT Wide-spectrum Language (AWL) and parsed in …


Semantics Enriched Service Environments, Karthik Rajagopal Gomadam Jan 2009

Semantics Enriched Service Environments, Karthik Rajagopal Gomadam

Browse all Theses and Dissertations

During the past seven years services centric computing has emerged as the preferred approach to architect complex software. Software is increasingly developed by integrating remotely existing components, popularly called services. This architectural paradigm, also called Service Oriented Architecture (SOA), brings with it the benefits of interoperability, agility and flexibility to software design and development. One can easily add or change new features to existing systems, either by the addition of new services or by replacing existing ones. Two popular approaches have emerged for realizing SOA. The first approach is based on the SOAP protocol for communication and the Web Service …


Computational Analysis Of Metabolomic Toxicological Data Derived From Nmr Spectroscopy, Benjamin J. Kelly Jan 2009

Computational Analysis Of Metabolomic Toxicological Data Derived From Nmr Spectroscopy, Benjamin J. Kelly

Browse all Theses and Dissertations

Nuclear magnetic resonance (NMR) spectroscopy is a non-invasive method of acquiring metabolic profiles from biofluids. The most informative metabolomic features, or biomarkers, may provide keys to the early detection of changes within an organism such as those that result from exposure to a toxin. One major difficulty with typical NMR data, whether it come from a toxicological, medical or other source, is that it features a low sample size relative to the number of variables measured. Thus, traditional pattern recognition techniques are not always feasible. The "curse of dimensionality" is an important consideration in selecting appropriate statistical and pattern recognition …


Investigation And Quantification Of Codon Usage Bias Trends In Prokaryotes, Amanda L. Hanes Jan 2009

Investigation And Quantification Of Codon Usage Bias Trends In Prokaryotes, Amanda L. Hanes

Browse all Theses and Dissertations

Organisms construct proteins out of individual amino acids using instructions encoded in the nucleotide sequence of a DNA molecule. The genetic code associates combinations of three nucleotides, called codons, with every amino acid. Most amino acids are associated with multiple synonymous codons, but although they result in the same amino acid and thus have no effect on the final protein, synonymous codons are not present in equal amounts in the genomes of most organisms. This phenomenon is known as codon usage bias, and the literature has shown that all organisms display a unique pattern of codon usage. Research also suggests …


Tyflos: A Wearable Navigation Prototype For Blind & Visually Impaired; Design, Modelling And Experimental Results, Dimitrios Dakopoulos Jan 2009

Tyflos: A Wearable Navigation Prototype For Blind & Visually Impaired; Design, Modelling And Experimental Results, Dimitrios Dakopoulos

Browse all Theses and Dissertations

The need for assistive devices has, had and will have a large merit in many engineering research arenas. This dissertation deals with the design, modeling, implementation and experimentation of the navigation component of a wearable assistive system for blind and visually impaired people, called TYFLOS (ΤΥΦΛΟΣ) which is the Greek word for "Blind".

The current prototype consists of two mini cameras attached to a pair of conventional eye-glasses, a 2D tactile display vibration array) which consists of 16 vibrating elements arranged in a 4x4 manner, attached to an elastic vest worn on the user's abdomen, a portable computer, an ear-speaker …


A Software Framework For The Design, Testing And Deployment Of Control Systems For Autonomous Robotics, Duane Stanley Bolick Jr. Jan 2009

A Software Framework For The Design, Testing And Deployment Of Control Systems For Autonomous Robotics, Duane Stanley Bolick Jr.

Browse all Theses and Dissertations

Simulation and control of robotic agents are common enough tasks among computer science and engineering researchers that there exists a large variety of software applications, toolkits, and programming frameworks designed to facilitate such research. The intent of this project is to provide an autonomous robotics simulation and control framework with sufficiently useful tools and reference implementations so as to be immediately useful to basic users, as well as easily understood and extended by software developers and robotics researchers.

As such, this document describes the implementation of a general networking toolkit, an autonomous robotics extension framework, and an autonomous robotics simulator …


Burst Scheduling, Grooming And Qos Provisioning In Optical Burst-Switched Networks, Yuqi Fan Jan 2009

Burst Scheduling, Grooming And Qos Provisioning In Optical Burst-Switched Networks, Yuqi Fan

Browse all Theses and Dissertations

The demand of network capacity has been increasing steadily with more users than ever connected to the Internet through broadband access and the popularity of video based applications, such as YouTube. Optical wavelength division multiplexing (WDM) networks are expected to form the next-generation backbone network and to fulfill the insatiable appetite for bandwidth.

Wavelength routed WDM optical networks offer the granularity of switching at a fiber, waveband, or a wavelength level. The finest granularity offered is at a wavelength level by provisioning lightpaths for different clients/services. All-optical packet switching is still deemed technically infeasible and its competitiveness as a backbone …


A System For Incorporating Time-Based Event-Condition-Action Rules Into Business Databases, Christina Marie Steidle Jan 2009

A System For Incorporating Time-Based Event-Condition-Action Rules Into Business Databases, Christina Marie Steidle

Browse all Theses and Dissertations

Human beings handle time-based events continuously; however the passage of time does not play an active part in most business systems because they are typically driven by interaction from human users or other systems. In order to take an action based upon the passage of time it is necessary to build a framework which will monitor the progression of time and a way to define what events the system should be waiting for. This thesis describes such a system, and shows that the system performs as specified. With this system business users are able to build event-condition-action rules using a …


Improving Remote Homology Detection Using A Sequence Property Approach, Gina Marie Cooper Jan 2009

Improving Remote Homology Detection Using A Sequence Property Approach, Gina Marie Cooper

Browse all Theses and Dissertations

Understanding the structure and function of proteins is a key part of understanding biological systems. Although proteins are complex biological macromolecules, they are made up of only 20 basic building blocks known as amino acids. The makeup of a protein can be described as a sequence of amino acids. One of the most important tools in modern bioinformatics is the ability to search for biological sequences (such as protein sequences) that are similar to a given query sequence. There are many tools for doing this (Altschul et al., 1990, Hobohm and Sander, 1995, Thomson et al., 1994, Karplus and Barrett, …


Design And Performance Analysis Of A Secure Proces-Sor Scan-Sp With Crypto-Biometric Capabilities, Raghudeep Kannavara Jan 2009

Design And Performance Analysis Of A Secure Proces-Sor Scan-Sp With Crypto-Biometric Capabilities, Raghudeep Kannavara

Browse all Theses and Dissertations

Secure computing is gaining importance in recent times as computing capability is increasingly becoming distributed and information is everywhere. Prevention of piracy and digital rights management has become very important. Information security is mandatory rather than an additional feature. Numerous software techniques have been proposed to provide certain level of copyright and intellectual property protection. Techniques like obfuscation attempt to transform the code into a form that is harder to reverse engineer. Tamper-proofing causes a program to malfunction when it detects that it has been modified. Software watermarking embeds copyright notice in the software code to allow the owners of …


Semantic And Role-Based Access Control For Data Grid Systems, Vineela Muppavarapu Jan 2009

Semantic And Role-Based Access Control For Data Grid Systems, Vineela Muppavarapu

Browse all Theses and Dissertations

A Grid is an integration infrastructure for sharing and coordinated use of diverseresources in dynamic, distributed virtual organizations (VOs). A Data Grid is an architecture for the access, exchange, and sharing of data in the Grid environment. Distributed data resources can be diverse in their formats, schema, quality, access mechanisms, ownership, access policies, and capabilities. In recent years, several organizations have started utilizing Grid technologies to deploy data-intensive and/or computation-intensive applications. As more and more organizations are sharing data resources and participating in Data Grids, the complexity and heterogeneity of the systems is increasing constantly, but their management techniques are …


A Cryptanalysis Methodology For The Reverse Engineering Of Encrypted Information In Images, Allan Anthony Rwabutaza Jan 2009

A Cryptanalysis Methodology For The Reverse Engineering Of Encrypted Information In Images, Allan Anthony Rwabutaza

Browse all Theses and Dissertations

Security is an important issue related to the storage and communication of data and information. In data and information security, cryptography and steganography are two of the most common security techniques. On one hand, there is cryptography, which is the secret communication between two parties by message scrambling on the sender's side and message unscrambling on the receiver's side so that only the intended receiver gets the secret message. On the other hand, there is steganography, which is the hiding of information in a medium in such a way that no one other than the sender or the intended receiver …