Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Mathematics

Institution
Publication Year
Publication
Publication Type
File Type

Articles 61 - 71 of 71

Full-Text Articles in Physical Sciences and Mathematics

Dynamic Web Tools For Trigonometry, Steven J. Wilson Jan 2008

Dynamic Web Tools For Trigonometry, Steven J. Wilson

Innovations in Math Technology

In the last 20 years, computer technology having mathematical capability has been developed, improved, and become widely available, but textbook presentations are still largely free of any discussion that might require technology. Technology could be used in mathematical instruction for student drill and practice, for instructor demonstrations that promote conceptual understanding, or for the exploration of mathematical ideas, but software is often designed to be pedagogically generic, leaving its use to the creativity of the instructor. Technological solutions for local machines can be quite extensive, but cost and time constraints then limit availability for student use. The internet has the …


Validating Pareto Optimal Operation Parameters Of Polyp Detection Algorithms For Ct Colonography, Jiang Li, Adam Huang, Nicholas Petrick, Jianhua Yao, Ronald M. Summers, Maryellen L. Giger (Ed.), Nico Karssemeijer (Ed.) Jan 2007

Validating Pareto Optimal Operation Parameters Of Polyp Detection Algorithms For Ct Colonography, Jiang Li, Adam Huang, Nicholas Petrick, Jianhua Yao, Ronald M. Summers, Maryellen L. Giger (Ed.), Nico Karssemeijer (Ed.)

Electrical & Computer Engineering Faculty Publications

We evaluated a Pareto front-based multi-objective evolutionary algorithm for optimizing our CT colonography (CTC) computer-aided detection (CAD) system. The system identifies colonic polyps based on curvature and volumetric based features, where a set of thresholds for these features was optimized by the evolutionary algorithm. We utilized a two-fold cross-validation (CV) method to test if the optimized thresholds can be generalized to new data sets. We performed the CV method on 133 patients; each patient had a prone and a supine scan. There were 103 colonoscopically confirmed polyps resulting in 188 positive detections in CTC reading from either the prone or …


Work In Progress: The Wsu Model For Engineering Mathematics Education, Nathan W. Klingbeil, Richard Mercer, Kuldip S. Rattan, Michael L. Raymer, David B. Reynolds Oct 2005

Work In Progress: The Wsu Model For Engineering Mathematics Education, Nathan W. Klingbeil, Richard Mercer, Kuldip S. Rattan, Michael L. Raymer, David B. Reynolds

Kno.e.sis Publications

This paper summarizes progress to date on the WSU model for engineering mathematics education, an NSF funded curriculum reform initiative at Wright State University. The WSU model seeks to increase student retention, motivation and success in engineering through application-driven, just-in-time engineering math instruction. The WSU approach involves the development of a novel freshman-level engineering mathematics course EGR 101, as well as a large-scale restructuring of the engineering curriculum. By removing traditional math prerequisites and moving core engineering courses earlier in the program, the WSU model shifts the traditional emphasis on math prerequisite requirements to an emphasis on engineering motivation for …


A Survey On Intrusion Detection Approaches, A Murali M. Rao Aug 2005

A Survey On Intrusion Detection Approaches, A Murali M. Rao

International Conference on Information and Communication Technologies

Intrusion detection plays one of the key roles in computer security techniques and is one of the prime areas of research. Usages of computer network services are tremendously increasing day by day and at the same time intruders are also playing a major role to deny network services, compromising the crucial services for Email, FTP and Web. Realizing the importance of the problem due to intrusions, many researchers have taken up research in this area and have proposed several solutions. It has come to a stage to take a stock of the research results and project a comprehensive view so …


G-Value Decoding Of Greedy Codes, Khalil Ahmad Aug 2005

G-Value Decoding Of Greedy Codes, Khalil Ahmad

International Conference on Information and Communication Technologies

Error-correcting codes are widely used to increase the reliability of transmission of information over various forms of communication channels. Codes with a given minimum distance d can be constructed by a greedy algorithm [2]. In this paper, I proposed a new algorithm for the allocation of g-values to the binary vectors. Hamming (7, 4, 3) code can be generated by the application of greedy algorithm on the binary vectors of length 7 arranged in B-ordering. This code is used to demonstrate a new decoding technique for linear codes in addition to the schemes already known for decoding such as Syndrome …


Developing A B -Tagging Algorithm Using Soft Muons At Level-3 For The Dø Detector At Fermilab, Mayukh Das Apr 2005

Developing A B -Tagging Algorithm Using Soft Muons At Level-3 For The Dø Detector At Fermilab, Mayukh Das

Doctoral Dissertations

The current data-taking phase of the DØ detector at Fermilab, called Run II, is designed to aid the search for the Higgs Boson. The neutral Higgs is postulated to have a mass of 117 GeV. One of the channels promising the presence of this hypothetical particle is through the decay of b-quark into a muon. The process of identifying a b-quark in a jet using muon as a reference is b-tagging with a muon tag.

At the current data taking and analysis rate, it will take long to reach the process of identifying valid events. The triggering mechanism of the …


Depth-First Search Embedded Wavelet Algorithm For Hardware Implementation, Li-Minn Ang Jan 2001

Depth-First Search Embedded Wavelet Algorithm For Hardware Implementation, Li-Minn Ang

Theses: Doctorates and Masters

The emerging technology of image communication over wireless transmission channels requires several new challenges to be simultaneously met at the algorithm and architecture levels. At the algorithm level, desirable features include high coding performance, bit stream scalability, robustness to transmission errors and suitability for content-based coding schemes. At the architecture level, we require efficient architectures for construction of portable devices with small size and low power consumption. An important question is to ask if a single coding algorithm can be designed to meet the diverse requirements. Recently, researchers working on improving different features have converged on a set of coding …


[Introduction To] Mathematics Calculus Bc, John R. Hubbard, David R. Arterburn, Michael A. Perl Jan 2000

[Introduction To] Mathematics Calculus Bc, John R. Hubbard, David R. Arterburn, Michael A. Perl

Bookshelf

This book gives you the tools to prepare effectively for the Advanced Placement Examination in Mathematics: Calculus BC. These tools include a concise topical review and six full-length practice tests. Our review succinctly covers areas considered most relevant to this exam. Following each of our tests is an answer key complete with detailed explanations designed to clarify the material for you.


Nonsupereulerian Graphs With Large Size, Paul A. Catlin, Zhi-Hong Chen Sep 1991

Nonsupereulerian Graphs With Large Size, Paul A. Catlin, Zhi-Hong Chen

Scholarship and Professional Work - LAS

No abstract provided.


The Arboricity Of The Random Graph, Paul A. Catlin, Zhi-Hong Chen Sep 1991

The Arboricity Of The Random Graph, Paul A. Catlin, Zhi-Hong Chen

Scholarship and Professional Work - LAS

No abstract provided.


Ife, An Interactive Formula Editor, Teresa C. Chau Oct 1988

Ife, An Interactive Formula Editor, Teresa C. Chau

FIU Electronic Theses and Dissertations

IFE, the Interactive Formula Editor is an experimental system designed, developed and implemented to propose a different approach to handle mathematical formulae. Its main characteristics are: (1) Interactive creation and edition of a mathematical formula, (2) Tex-form output for a printed version of a formula, and (3) Ability to generate a new set of characters by means of a character editor.

Mathematical symbols are provided and adjusted by the system, automatically. The system also, guides the user during the formula description because it knows the syntax of the graphical representation.

The system seems to be complete and perform well. The …