Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

1996

Institution
Keyword
Publication
Publication Type
File Type

Articles 31 - 60 of 413

Full-Text Articles in Physical Sciences and Mathematics

Refined Genetic Algorithms For Polypeptide Structure Prediction, Charles E. Kaiser Jr. Dec 1996

Refined Genetic Algorithms For Polypeptide Structure Prediction, Charles E. Kaiser Jr.

Theses and Dissertations

Accurate and reliable prediction of macromolecular structures has eluded researchers for nearly 40 years. Prediction via energy minimization assumes the native conformation has the globally minimal energy potential. An exhaustive search is impossible since for molecules of normal size, the size of the search space exceeds the size of the universe. Domain knowledge sources, such as the Brookhaven PDB can be mined for constraints to limit the search space. Genetic algorithms (GAs) are stochastic, population based, search algorithms of polynomial (P) time complexity that can produce semi-optimal solutions for problems of nondeterministic polynomial (NP) time complexity such as PSP. Three …


A Specific Network Link And Path Likelihood Prediction Tool, Gary K. Moy Dec 1996

A Specific Network Link And Path Likelihood Prediction Tool, Gary K. Moy

Theses and Dissertations

Communications have always been a crucial part of any military operation. As the pace of warfare and the technological complexity of weaponry have increased, so has the need for rapid information to assess battlefield conditions. Message passing across a network of communication nodes allowed commanders to communicate with their forces. It is clear that an accurate prediction of communication usage through a network will provide commanders with useful intelligence of friendly and unfriendly activities. Providing a specific network link and path likelihood prediction tool gives strategic military commanders additional intelligence information and enables them to manage their limited resources more …


Algebraic Algorithm Design And Local Search, Robert P. Graham Jr. Dec 1996

Algebraic Algorithm Design And Local Search, Robert P. Graham Jr.

Theses and Dissertations

Formal, mathematically-based techniques promise to play an expanding role in the development and maintenance of the software on which our technological society depends. Algebraic techniques have been applied successfully to algorithm synthesis by the use of algorithm theories and design tactics, an approach pioneered in the Kestrel Interactive Development System (KIDS). An algorithm theory formally characterizes the essential components of a family of algorithms. A design tactic is a specialized procedure for recognizing in a problem specification the structures identified in an algorithm theory and then synthesizing a program. Design tactics are hard to write, however, and much of the …


Evaluation Of Segmentation For Bone Structures In 3d Rendering Of Ultrasound Residual Limb Images, Min C. Baker Dec 1996

Evaluation Of Segmentation For Bone Structures In 3d Rendering Of Ultrasound Residual Limb Images, Min C. Baker

Theses and Dissertations

Prosthetists today widely practice manual socket fitting, which produces subjective, inconsistent results. To address this problem, the Computerized Anthropometry Research and Design (CARD) Laboratory is developing a computer-aided socket design system that acquires ultrasound datasets of an amputee's residual limb, creates a 3D model, and helps identify load- bearing and pressure-relief areas. This research project focuses on providing 3D visualization of a residual limb to support the CARD Laboratory's efforts. Creating the 3D model of the skin and two bone contours requires two major steps: segmentation to identify the objects of interest and a surface tracking algorithm to generate the …


Artificial Cochlea Design Using Micro-Electro-Mechanical Systems, George C. Dalton Ii Dec 1996

Artificial Cochlea Design Using Micro-Electro-Mechanical Systems, George C. Dalton Ii

Theses and Dissertations

The use of Micro-Electro-Mechanical Systems (MEMS) in the design of an artificial cochlea is investigated in depth. Interdigitated finger (comb), cantilever, bridge, and mirror resonators are presented as possible devices used to implement the artificial cochlea. These resonators are demonstrated to be extremely high Q devices, capable of being tuned with a simple DC bias. This suggests a possible change to existing cochlea models that claim highly complex AC feedback as being responsible for changes in the damping of the basilar membrane. The new cochlea model presented here, using MEMS to approximate the tuning of the basilar membrane, may be …


Dynamic Relevance Filtering In Asynchronous Transfer Mode-Based Distributed Interactive Simulation Exercises, David T. Hightower Dec 1996

Dynamic Relevance Filtering In Asynchronous Transfer Mode-Based Distributed Interactive Simulation Exercises, David T. Hightower

Theses and Dissertations

As Distributed Interactive Simulation (DIS) exercises continue to grow in scale, the need to support a large number of players has become apparent. The demands on the network and the simulation hosts in large exercises, though, have proved to be prohibitive, requiring significant computational overhead to filter through the information and extract what is relevant to a particular simulation. Some mechanism is needed to reduce irrelevant network traffic received by a system, while increasing the bandwidth available for the DIS exercise. Previous research efforts in this area have centered primarily on fixed geographic partitions of the battlespace to reduce the …


Survivability Analysis Of The Iridium Low Earth Orbit Satellite Network, Douglas K. Stenger Dec 1996

Survivability Analysis Of The Iridium Low Earth Orbit Satellite Network, Douglas K. Stenger

Theses and Dissertations

This thesis evaluates the survivability of the proposed Iridium Low Earth Orbit (LEO) Satellite Network. In addition to the complete Iridium constellation, three degraded Iridium constellations are analyzed. This analysis occurs via the use of simulation models, which are developed to use three dynamic routing algorithms over three loading levels. The Iridium network models use a common set of operating assumptions and system environments. The constellation survivability was determined by comparing packet rejection rates, hop' counts, and average end to end delay performance between the various network scenarios. It was concluded that, based on the established scenarios, the proposed Iridium …


Collaborative Workspaces Within Distributed Virtual Environments, William D. Wells Dec 1996

Collaborative Workspaces Within Distributed Virtual Environments, William D. Wells

Theses and Dissertations

In warfare, be it a training simulation or actual combat, a commander's time is one of the most valuable and fleeting resources of a military unit. Thus, it is natural for a unit to have a plethora of personnel to analyze and filter information to the decision-maker. This dynamic exchange of ideas between analyst and commander is currently not available within the distributed interactive simulation (DIS) community. This lack of exchange limits the usefulness of the DIS experience to the commander and his troops. This thesis addresses the commander's isolation problem through the integration of a collaborative workspace within AFIT's …


Requirements, Design, And Development Of A Rapidly Reconfigurable, Photo-Realistic, Virtual Cockpit Prototype, Terry A. Adams Dec 1996

Requirements, Design, And Development Of A Rapidly Reconfigurable, Photo-Realistic, Virtual Cockpit Prototype, Terry A. Adams

Theses and Dissertations

The United States Air Force uses aircraft flight simulators for pilot training and mission rehearsal. They use a variety of simulators for this task ranging with prices ranging from $400,000 to $30,000,000. These simulators have specialized hardware that restricts reuse of their components and increases maintenance costs. Air Education and Training Command wants to reduce simulators cost and improve availability to the operational commands by supporting research in virtual reality flight simulators. This thesis looks at the development of a reconfigurable virtual cockpit in a distributed virtual environment that can be used for different aircraft as well as training scenarios. …


Inference Algorithm Performance And Selection Under Constrained Resources, Brett J. Borghetti Dec 1996

Inference Algorithm Performance And Selection Under Constrained Resources, Brett J. Borghetti

Theses and Dissertations

Knowing that reasoning over probabilistic networks is, in general, NP-hard, and that most reasoning environments have limited resources, we need to select algorithms that can solve a given problem as fast as possible. This thesis presents a method for predicting the relative performance of reasoning algorithms based on the domain characteristics of the target knowledge structure. Armed with this knowledge, the research shows how to choose the best algorithm to solve the problem. The effects of incompleteness of the knowledge base at the time of inference is explored, and requirements for reasoning over incompleteness are defined. Two algorithms for reasoning …


Elicitation Of Formal Software Specifications From An Object-Oriented Domain Model, Timothy Karagias Dec 1996

Elicitation Of Formal Software Specifications From An Object-Oriented Domain Model, Timothy Karagias

Theses and Dissertations

The ability to provide automated support for the generation of formal software specifications would lead to decreased software development time. By eliciting the needed information from a software developer and harvesting the proper parts of a domain model, a software specifications document could be created. This research establishes the feasibility of producing customized software specifications based on an object-oriented domain model. The research was conducted in three phases. The first phase was to define the requirements for the Elicitor Harvester. Those requirements were balanced between the capabilities of the existing Knowledge Based Software Engineering (KBSE) software used at AFIT and …


Implementation Of An Ada95 Crosscompiler For The Real-Time Executive For Military Systems (Rtems), Kendall M. Lemley Jr. Dec 1996

Implementation Of An Ada95 Crosscompiler For The Real-Time Executive For Military Systems (Rtems), Kendall M. Lemley Jr.

Theses and Dissertations

This thesis represents a continuation of the assessment of the Unified Telerobotics Architecture Project (UTAP), a proposed Air Force standard. This architecture was developed by the NASA Jet Propulsion Laboratory and the National Institute of Standards under contract to the Air Force Materiel Command Robotics and Automation Center of Excellence at Kelly AFB, Texas. Due to operating system constraints, the only UTAP implementation to date has required a separate software interface layer, adding complexity and overhead to the overall system, while reducing portability. This thesis proposes a long term effort to design and implement UTAP-compliant application software devoid of this …


Integrating The Capability Maturity Model For Software And The Quality Air Force Criteria, Marshall B. Messamore Dec 1996

Integrating The Capability Maturity Model For Software And The Quality Air Force Criteria, Marshall B. Messamore

Theses and Dissertations

As defense budgets decrease and it is required to do more with less, the Air Force has chosen to use the Malcolm Baldrige National Quality Award (MBNQA) as the basis for implementing quality principles. The Air Force program is known as Quality Air Force (QAF), and the criteria are referred to as the QAF criteria DEPA95b. At about the same time the Department of the Air Force implemented QAF, the software leaders in the Air Force adopted the Capability Maturity Model for Software (CMM) as the internal standard for Air Force software organizations MOSE9l. Software organizations strapped with both sets …


Utilizing Data And Knowledge Mining For Probabilistic Knowledge Bases, Daniel J. Stein Iii Dec 1996

Utilizing Data And Knowledge Mining For Probabilistic Knowledge Bases, Daniel J. Stein Iii

Theses and Dissertations

Problems can arise whenever inferencing is attempted on a knowledge base that is incomplete. Our work shows that data mining techniques can be applied to fill in incomplete areas in Bayesian Knowledge Bases (BKBs), as well as in other knowledge-based systems utilizing probabilistic representations. The problem of inconsistency in BKBs has been addressed in previous work, where reinforcement learning techniques from neural networks were applied. However, the issue of automatically solving incompleteness in BKBs has yet to be addressed. Presently, incompleteness in BKBs is repaired through the application of traditional knowledge acquisition techniques. We show how association rules can be …


Solar System Modeler: A Distributed, Virtual Environment For Space Visualization And Gps Navigation, Gary E. Williams Dec 1996

Solar System Modeler: A Distributed, Virtual Environment For Space Visualization And Gps Navigation, Gary E. Williams

Theses and Dissertations

The Solar System Modeler (SM) extends the Space Modeler developed in 1994. It provides a virtual environment enabling an explorer to dynamically investigate near Earth satellites, deep space probes, planets, moons, and other celestial phenomena. The explorer navigates the virtual environment via mouse selected options from menu panels while wearing a tracked, head mounted display (HMD). Alternatively, a monitor may replace the HMD and keyboard controls replace head tracking. The SM's functionality is extended by the ability to broadcast simulated GPS satellite transmissions in compliance with Distributed Interactive Simulation (DIS) protocol standards. The transmissions include information found in true GPS …


Speaker Recognition By Hidden Markov Models And Neural Networks, Erik J. Zeek Dec 1996

Speaker Recognition By Hidden Markov Models And Neural Networks, Erik J. Zeek

Theses and Dissertations

As humans, we develop the ability to identify people by their voice at an early age. Getting computers to perform the same task has proven to be an interesting problem. Speaker recognition involves two applications, speaker identification and speaker verification. Both applications are examined in this effort. Two methods are employed to perform speaker recognition. The first is an enhancement of hidden Markov models. Rather than alter some part of the model itself, a single-layer perceptron is added to perform neural post-processing. The second solution is the novel application of an enhanced Feature Space Trajectory Neural Network to speaker recognition. …


Neural Network Classification Of Environmental Samples, Jeffrey L. Blackmon Dec 1996

Neural Network Classification Of Environmental Samples, Jeffrey L. Blackmon

Theses and Dissertations

This research develops a general methodology for designing neural network classifiers for real-world environmental problems. This methodology is demonstrated through the design of a multi-layer perceptron to classify stainless steel and actinide samples. Neural networks, sometimes called artificial neural networks, have been shown capable of classifying complex patterns. Artificial neural networks are physiologically motivated computer algorithms which attempt to mimic the function of the large interconnected network of neurons in the human brain, which has extraordinary pattern recognition capabilities. These artificial neural networks learn to map a set of input features, elemental composition, onto a set of outputs such as …


Development Of Object-Based Teleoperator Control For Unstructured Applications, Hyunki Cho Dec 1996

Development Of Object-Based Teleoperator Control For Unstructured Applications, Hyunki Cho

Theses and Dissertations

For multi-fingered end effectors in unstructured applications, the main issues are control in the presence of uncertainties and providing grasp stability and object manipulability. The suggested concept in this thesis is object based teleoperator control which provides an intuitive way to control the robot in terms of the grasped object and reduces the operator's conceptual constraints. The general control law is developed using a hierarchical control structure, i.e., human interface I gross motion control level in teleoperation control and fine motion control/object grasp stability in autonomous control. The gross motion control is required to provide the position/orientation of the Super …


Analysis And Simulation Of A New Code Tracking Loop For Gps Multipath Mitigation, Mark C. Laxton Dec 1996

Analysis And Simulation Of A New Code Tracking Loop For Gps Multipath Mitigation, Mark C. Laxton

Theses and Dissertations

This thesis proposes a new direct sequence spread spectrum (DS/SS) code phase tracking loop which mitigates the effects of multipath interference on code phase tracking error; such errors can translate to significant range measurement errors in DS/SS ranging systems such as Global Positioning System (GPS). The new code tracking loop, called the modified RAKE delay lock loop (MRDLL), uses maximum likelihood (ML) signal parameter estimation to determine the amplitude, carrier phase, and relative propagation delay of both a direct path and a reflected signal; a multiple correlator code phase tracking loop then exploits these ML signal estimates to remove the …


A Software Architecture For Computer Generated Forces In Complex Distributed Virtual Environments, Vincent B. Zurita Dec 1996

A Software Architecture For Computer Generated Forces In Complex Distributed Virtual Environments, Vincent B. Zurita

Theses and Dissertations

Complex Distributed Virtual Environments (DVEs) present an outstanding opportunity for the Department of Defense to train geographically separated units within a single realistic threat environment with minimal logistical considerations or safety concerns. To increase the fidelity of these simulations, minimize cost, and thereby maximize the training potential, DVEs must be populated with a realistic number of Computer Generated Forces (CGFs). These are currently expensive to design and build due to a lack of standard COF architectures. A solution to this problem is presented in the form of a CGF Architecture that is applicable to CGFs that model any weapon system. …


Weighted Mahalanobis Distance For Hyper-Ellipsoidal Clustering, Khaled S. Younis Dec 1996

Weighted Mahalanobis Distance For Hyper-Ellipsoidal Clustering, Khaled S. Younis

Theses and Dissertations

Cluster analysis is widely used in many applications, ranging from image and speech coding to pattern recognition. A new method that uses the weighted Mahalanobis distance (WMD) via the covariance matrix of the individual clusters as the basis for grouping is presented in this thesis. In this algorithm, the Mahalanobis distance is used as a measure of similarity between the samples in each cluster. This thesis discusses some difficulties associated with using the Mahalanobis distance in clustering. The proposed method provides solutions to these problems. The new algorithm is an approximation to the well-known expectation maximization (EM) procedure used to …


Analysis Of Linkage-Friendly Genetic Algorithms, Laurence D. Merkle Dec 1996

Analysis Of Linkage-Friendly Genetic Algorithms, Laurence D. Merkle

Theses and Dissertations

Evolutionary algorithms (EAs) are stochastic population-based algorithms inspired by the natural processes of selection, mutation, and recombination. EAs are often employed as optimum seeking techniques. A formal framework for EAs is proposed, in which evolutionary operators are viewed as mappings from parameter spaces to spaces of random functions. Formal definitions within this framework capture the distinguishing characteristics of the classes of recombination, mutation, and selection operators. EAs which use strictly invariant selection operators and order invariant representation schemes comprise the class of linkage-friendly genetic algorithms (lfGAs). Fast messy genetic algorithms (fmGAs) are lfGAs which use binary tournament selection (BTS) with …


A Domain Independent Framework For Developing Knowledge Based Computer Generated Forces, James L. Benslay Jr. Dec 1996

A Domain Independent Framework For Developing Knowledge Based Computer Generated Forces, James L. Benslay Jr.

Theses and Dissertations

Computer Generated Forces (CGFs) are important players in Distributed Interactive Simulation (DIS) exercises. A problem with CGFs is that they do not exhibit sufficient human behaviors to make their use effective. The SOAR approach has yielded a human cognitive model that can be applied to CGFs, but this is extremely complex. The product of the research reported in this thesis is a much less complex behavioral framework for a CGF that is easy to validate, revise, and maintain. To support this, an existing, domain independent CGF architecture is discussed and applied to an experimental CGF. Techniques for modeling the knowledge …


A Common Architecture For Simulation Viewing Over Multiple Protocol Environments, Glenn G. Jacquot Dec 1996

A Common Architecture For Simulation Viewing Over Multiple Protocol Environments, Glenn G. Jacquot

Theses and Dissertations

This study discusses an architecture used for displaying data results in a graphical format. This data is obtained via internet connection or from a direct connection to a battlefield simulator known as BattleSim. This architecture utilizes several graphics packages for displaying the output along with two different approaches to receiving commands from the user. Furthermore, the design was built to easily incorporate other graphics packages and communication protocols in order to increase its portability.


A Test-Case Based Approach To Bayesian Knowledge Base Incompleteness Detection And Correction, Louise J. Lyle Dec 1996

A Test-Case Based Approach To Bayesian Knowledge Base Incompleteness Detection And Correction, Louise J. Lyle

Theses and Dissertations

This work develops tools and techniques to identify particular Bayesian Knowledge Base (BKB) incompletenesses, and to modify the existing knowledge-base (KB) structure to correct these problems. The methodology performs manually or automatically, informing the user of either problems causing the incompleteness, or of details resulting from the automatic knowledge-base correction. The proposed methodology is designed for integration with BVAL, to augment BVAL's validation techniques.


Simworx: An Ada Distributed Simulation Application Framework Supporting Hla And Dis, Earl C. Pilloud Dec 1996

Simworx: An Ada Distributed Simulation Application Framework Supporting Hla And Dis, Earl C. Pilloud

Theses and Dissertations

This research consisted of the analysis, design, and implementation of a reusable application framework for distributed simulation which is compliant with both the DoD High Level Architecture (HLA) for Modeling and Simulation and the Distributed Interactive Simulation (DIS) standards. The goal was to create an Ada-based system for experimentation in distributed simulation. A subsidiary goal was to integrate the system with an existing Air Force Institute of Technology (AFIT) application framework for virtual simulations, Easy_Sim. The application framework was designed using object oriented techniques to enable experimenters to customize it via inheritance extension. The application framework, named SimWorx, consists of …


Utilizing Bayesian Techniques For User Interface Intelligence, Robert A. Harrington Dec 1996

Utilizing Bayesian Techniques For User Interface Intelligence, Robert A. Harrington

Theses and Dissertations

The purpose of this research is to study the injection of an intelligent agent into modern user interface technology. This agent is intended to manage the complex interactions between the software system and the user, thus making the complexities transparent to the user. The background study will show that while interesting and promising research exists in the domain of intelligent interface agents, very little research has been published that indicates true success in representing the uncertainty involved in predicting user intent. The interface agent architecture presented in this thesis will offer one solution for solving the problem using a newly …


Export Database Derivation Approach For Supporting Object-Oriented Wrapper Queries, Ee Peng Lim, Hon-Kuan Lee Dec 1996

Export Database Derivation Approach For Supporting Object-Oriented Wrapper Queries, Ee Peng Lim, Hon-Kuan Lee

Research Collection School Of Computing and Information Systems

Wrappers export the schema and data of existing heterogeneous databases and support queries on them. In the context of cooperative information systems, we present a flexible approach to specify the derivation of object-oriented (OO) export databases from local relational databases. Our export database derivation consists of a set of extent derivation structures (EDS) which defines the extent and deep extent of export classes. Having well-defined semantics, the EDS can be readily used in transforming wrapper queries to local queries. Based on the EDS, we developed a wrapper query evaluation strategy which handles OO queries on the export databases. The strategy …


A Specialization Toolkit To Increase The Diversity Of Operating Systems, Calton Pu, Andrew P. Black, Crispin Cowan, Jonathan Walpole, Charles Consel Dec 1996

A Specialization Toolkit To Increase The Diversity Of Operating Systems, Calton Pu, Andrew P. Black, Crispin Cowan, Jonathan Walpole, Charles Consel

Computer Science Faculty Publications and Presentations

Virus and worm attacks that exploit system implementation details can be countered with a diversified set of implementations. Furthermore, immune systems show that attacks from previously unknown organisms require effective dynamic response. In the Synthetix project, we have been developing a specialization toolkit to improve the performance of operating system kernels. The toolkit helps programmers generate and manage diverse specialized implementations of software modules. The Tempo-C specializer tool generates different versions for both compile-time and run-time specialization. We are now adapting the toolkit to improve operating system survivability against implementations attacks.


The Application Of A Multimedia System To The Tourist Guide Of The Miami International Airport, Ying-Yuang Chen Nov 1996

The Application Of A Multimedia System To The Tourist Guide Of The Miami International Airport, Ying-Yuang Chen

FIU Electronic Theses and Dissertations

This project is to present a multimedia system designed for Miami International Airport as a tourist guide for passengers and to demonstrate the functionalities and facilities of the airport.

The project is based on an inexpensive integrated and comprehensive multimedia environment. The major components of the environment consist of (1) a low cost PC 386/486 with only ISA bus and IDE hard drive, (2) a high quality and high performance add-on real-time video/audio codec board (30/25 fps for NTSC/PAL video and synchronized audio sampled at 22KHz), (3) software packages including interactive utility programs to record, playback and edit real-time video/audio …