Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Numerical Analysis and Scientific Computing

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 5341 - 5360 of 5360

Full-Text Articles in Physical Sciences and Mathematics

A Distributed Interactive Simulation Based Remote Debriefing Tool For Red Flag Missions, Michael T. Gardner Dec 1993

A Distributed Interactive Simulation Based Remote Debriefing Tool For Red Flag Missions, Michael T. Gardner

Theses and Dissertations

Air Force leaders, recognizing the need for improved training following the Vietnam War, implemented the Red Flag exercises at Nellis AFB. At the heart of this training is the Red Flag Measurement and Debriefing System RFMDS and its capability to accurately reconstruct the elements of an intense exercise fought over the deserts of Nevada. This thesis uses the technology of distributed interactive simulation DIS to transmit aircraft telemetry onto computer networks, allowing the monitoring and analysis of live Red Flag missions at any site with compatible communications equipment and thesis software. The use of standard DIS protocols enables simulators to …


Query Optimization And Processing In Federated Database Systems, Ee Peng Lim, Jaideep Srivastava Nov 1993

Query Optimization And Processing In Federated Database Systems, Ee Peng Lim, Jaideep Srivastava

Research Collection School Of Computing and Information Systems

No abstract provided.


Multiple Query Optimization With Depth-First Branch-And-Bound, Ahmet Cosar, Ee Peng Lim, Jaideep Srivastava Nov 1993

Multiple Query Optimization With Depth-First Branch-And-Bound, Ahmet Cosar, Ee Peng Lim, Jaideep Srivastava

Research Collection School Of Computing and Information Systems

In certain database applications such as deductive databases, batch query processing, and recursive query processing etc., a single query can be transformed into a set ofclosely related database queries. Great benefits can be obtained by executing a group of related queries all together in a single unijied multi-plan instead of executing each query separately. In order to achieve this, Multiple Query Optimization (MQO) identifies common task(s) (e.g. common subezpressions, joins, etc.) among a set of query plans and creates a single unified plan (multiplan) which can be executed to obtain the required outputs forall queries at once. In this paper, …


Entity Identification In Database Integration: An Evidential Reasoning Approach, Ee Peng Lim, Jaideep Srivastava Sep 1993

Entity Identification In Database Integration: An Evidential Reasoning Approach, Ee Peng Lim, Jaideep Srivastava

Research Collection School Of Computing and Information Systems

Entity identification is the problem of matching object instances from different databases which correspond to the same real-world entity. In this paper, we present a 2-step entity identification process in which attributes for matching tuples may be missing in certain tuples, and thus need to be derived prior to the matching. To match tuples, we require identity rules which specify the conditions to be satisfied by a pair of tuples, from different databases, before they can be considered as modeling the same real-world entity. We also introduce ILFD's (instance-level functional dependencies) as a form of inference rules which derive the …


Real Time Texture Analysis From The Parallel Computation Of Fractal Dimension, Halford I. Hayes Jr. Jul 1993

Real Time Texture Analysis From The Parallel Computation Of Fractal Dimension, Halford I. Hayes Jr.

Computer Science Theses & Dissertations

The discrimination of texture features in an image has many important applications: from detection of man-made objects from a surrounding natural background to identification of cancerous from healthy tissue in X-ray imagery. The fractal structure in an image has been used with success to identify these features but requires unacceptable processing time if executed sequentially.

The paradigm of data parallelism is presented as the best method for applying massively parallel processing to the computation of fractal dimension of an image. With this methodology, and sufficient numbers of processors, this computation can reach real time speeds necessary for many applications. A …


Assessment Of The Accuracy Of Three Methods Of Computerized Growth Prediction Of The Soft Tissue Profile, In Untreated Individuals, Pat Diciccio Jun 1993

Assessment Of The Accuracy Of Three Methods Of Computerized Growth Prediction Of The Soft Tissue Profile, In Untreated Individuals, Pat Diciccio

Loma Linda University Electronic Theses, Dissertations & Projects

This study was performed to determine the accuracy and reliability of the long range growth predictions for profile structures by three computer software systems (QuickCeph™ for Apple Macintosh™ systems. Rocky Mountain Data Systems™ for IBM™ mainframe systems, and Facial Print™ for IBM™ personal computers), on untreated individuals. The total sample consisted of 90 Caucasian children from the Burlington Growth Centre. These were subdivided into groups of 15 children in each of mesiofacial, dolichofacial, and brachyfacial growth types for both males and females, with Angle class I occlusions, normal overbite, and normal overjet. Points measured consisted of 14 skeletal and soft …


Entity Identification In Database Integration, Ee Peng Lim, Jaideep Srivastava, Satya Prabhakar, James Richardson Apr 1993

Entity Identification In Database Integration, Ee Peng Lim, Jaideep Srivastava, Satya Prabhakar, James Richardson

Research Collection School Of Computing and Information Systems

The objective of entity identification is to determine the correspondence between object instances from more than one database. Entity identification at the instance level, assuming that schema level heterogeneity has been resolved a priori, is examined. Soundness and completeness are defined as the desired properties of any entity identification technique. To achieve soundness, a set of identity and distinctness rules are established for entities in the integrated world. The use of extended key, which is the union of keys, and possibly other attributes, from the relations to be matched, and its corresponding identify rule are proposed to determine the equivalence …


Repository Evaluation Of Software Reuse: An Empirical Study, R. D. Banker, Robert J. Kauffman, D. Zweig Jan 1993

Repository Evaluation Of Software Reuse: An Empirical Study, R. D. Banker, Robert J. Kauffman, D. Zweig

Research Collection School Of Computing and Information Systems

The use and benefits of repository evaluation of software reuse are illustrated through an analysis of the evolving repositories of two large firms that recently implemented integrated CASE development tools. The analysis shows that these tools have supported high levels of software reuse, but it also suggests that there remains considerable unexploited reuse potential. The findings indicate that organizational changes will be required before the full potential of the new technology can be realized.


Multiple Learner Systems Using Resampling Methods, Binyun Xie Aug 1992

Multiple Learner Systems Using Resampling Methods, Binyun Xie

Computer Science Theses & Dissertations

The N-Learners Problem deals with combining a number of learners such that the resultant system is "better", under some criterion, than the best of the individual learners. We consider a system of probably approximately correct concept learners. Depending on the available information, there are several methods to make the composite system better than the best of the individual learners. If a sample and an oracle that generates data points (but, not their classification) is available, then we show that we can achieve arbitrary levels of the normalized confidence of the composite system if (a) a robust learning algorithm is available, …


Single Object Detection Using Multiple Sensors With Unknown Noise Distributions, Shaofen Chen May 1992

Single Object Detection Using Multiple Sensors With Unknown Noise Distributions, Shaofen Chen

Computer Science Theses & Dissertations

We consider the design of an object classification system that identifies single objects using a system of sensors; each sensor outputs a random vector, according to an unknown (noise) probability distribution, in response to a sensed object. We consider a special class of systems, called the linearly separable systems, where the error-free sensor outputs corresponding to distinct objects can be mapped into disjoint intervals on real line. Given a set of sensor outputs corresponding to known objects, we show that a detection rule αemp that approaches the correct rule with a high probability can be computed. We show …


Methods For Calculating Solar Position And Day Length Including Computer Programs And Subroutines, M L. Roderick Jan 1992

Methods For Calculating Solar Position And Day Length Including Computer Programs And Subroutines, M L. Roderick

Resource management technical reports

The theory of calculating solar position is described. Using this theory, a number of computing routines are prepared in the C programming language. These routines are suitable for users who program in C, and have an ANSI compatible C compiler. These routines are fully documented, with both the underlying theory, and code particulars, and may be used as a stand alone reference. The source code has also been published in appendix B of the report.


Shadow Casting Phenomena At Newgrange, Frank Prendergast Jan 1991

Shadow Casting Phenomena At Newgrange, Frank Prendergast

Articles

A digital model of the Newgrange passage tomb and surrounding ring of monoliths known as the Great Circle is used to investigate sunrise shadow casting phenomena at the monument. Diurnal variation in shadow directions and lengths are analysed for their potential use in the Bronze Age to indicate the passage of seasonal time. Computer-aided simulations are developed from a photogrammetric survey to accurately show how three of the largest monoliths, located closest to the tomb entrance and archaeologically coded GC1, GC-1 and GC-2, cast their shadows onto the vertical face of the entrance kerbstone, coded K1. The phenomena occur at …


Impact Of Microprocessor Protected Mode Programming On Undergraduate Education N Engineering Technology, Robert L. Douglas Jan 1990

Impact Of Microprocessor Protected Mode Programming On Undergraduate Education N Engineering Technology, Robert L. Douglas

Journal of the Arkansas Academy of Science

No abstract provided.


Data Acquisition And Control Program For Chromatographic And Spectroscopic Studies, M. Keith Hudson, William G. Hood, Robert Henson Jan 1990

Data Acquisition And Control Program For Chromatographic And Spectroscopic Studies, M. Keith Hudson, William G. Hood, Robert Henson

Journal of the Arkansas Academy of Science

An IBMPC compatible computer was interfaced to an Ithaco 3962 lock-in-amplifier. The computer controlled the functions of the lock-in-amplifier, acquired and stored data, and allowed for real time or off-line processing of data. Computer/amplifier connection was made via RS-232-C serial interface. Programmed in Microsoft Quick BASIC, the computer assumed the role of a dedicated chromatographic integrator. This reduced the overall instrumentation expense by eliminating a dedicated chromatographic integrator. The computer program supplied much greater flexibility in control and data interpretation. To show its utility, the program was applied to a study of the infrared emission from a flame upon the …


An Interval Newton Method, E R. Hansen, R I. Greenberg May 1983

An Interval Newton Method, E R. Hansen, R I. Greenberg

Computer Science: Faculty Publications and Other Works

We introduce an interval Newton method for bounding solutions of systems of nonlinear equations. It entails three subalgorithms. The first is a Gauss-Seidel-type step. The second is a real (noninterval) Newton iteration. The third solves the linearized equations by elimination. We explain why each subalgorithm is desirable and how they fit together to provide solutions in as little as one-third or one-quarter the time required by Krawczyk's method [7] in our implementations.


Effects Of Changes In Surface Water Regime And/Or Land Use On The Vertical Distribution Of Water Available For Wetland Vegetation: Dynamic Model Of The Zone Of Aeration (Appendix To Part 1 Of Completion Report For Project A-023-Ark), Robert N. Maccallum, R. A. Sims Jun 1980

Effects Of Changes In Surface Water Regime And/Or Land Use On The Vertical Distribution Of Water Available For Wetland Vegetation: Dynamic Model Of The Zone Of Aeration (Appendix To Part 1 Of Completion Report For Project A-023-Ark), Robert N. Maccallum, R. A. Sims

Technical Reports

Appendix to Part 1 of Completion Report for Project A-023-ARK


Using A Prediction Model In Forecasting Appeals, Paul A. Rake Apr 1977

Using A Prediction Model In Forecasting Appeals, Paul A. Rake

IUSTITIA

Following the 1972 reorganization of the Indiana Court of Appeals into three panels serving defined geographical districts, the Court soon found itself floundering with too many unevenly distributed cases. Lacking a sufficient base of statistical data from which to formulate a plan to cope with the problem, various proposals, including redistricting the court, adding more judges, and developing a more sophisticated staff research, could not be measured for effectiveness or advisability.

In response to these problems, the Court developed a project to deal with the future caseload by constructing a regression model to predict appeals. This model generated estimates of …


Cephalometrics For The Oral Surgeon In The Diagnosis Of Facial Deformities, Frederick J. Mantz Jun 1973

Cephalometrics For The Oral Surgeon In The Diagnosis Of Facial Deformities, Frederick J. Mantz

Loma Linda University Electronic Theses, Dissertations & Projects

Surgical orthodontics presents a challenge to the oral surgeon. By the nature of the oral surgeon's training and discipline he should be the one best qualified to treat the surgical aspect of the surgical orthodontic case. The establishment of a proper diagnosis and means of communication between the oral surgeon and orthodontist are essential in achieving a good final result for the surgically treated case. Fortunately, a scientific method of diagnosis is available that can provide both specialties with a common language. Computerized cephalometric analysis can provide the diagnosis and link of communication for the discussion of goals and treatment. …


Digital Computer Solution Of Electromagnetic Transients In Large Power Systems, Bijan Navidbakhsh May 1973

Digital Computer Solution Of Electromagnetic Transients In Large Power Systems, Bijan Navidbakhsh

Dissertations and Theses

This thesis is an introduction to the solution of electromagnetic transients by a combination of the Bergeran method of characteristics and the application of trapezoidal rule of integration.

Three test examples solved by digital computer illustrate the step by step solution and computer programming.

To compare this method with the Laplace transformation technique, a test problem solved by both methods and also digital computer is illustrated. In conclusion, the advantages and disadvantages of both methods are compared.


A Computerized Study Of Midpalatal Suture Expansion, Clelan G. Ehrler May 1971

A Computerized Study Of Midpalatal Suture Expansion, Clelan G. Ehrler

Loma Linda University Electronic Theses, Dissertations & Projects

An investigation has been conducted to consider the effects of midpalatal suture expansion on the cranial-facial complex. Nine patients were treated that had constricted maxillae. Data was obtained from frontal and lateral headplate radiographs which were taken at four intervals during treatment. The Rocky Mountain Data Systems diagnosis was utilized to interpret the radiographic data.

The data from the nine cases were averaged to obtain a composit [sic] change at each of the four times.

Examination of the lateral headplate data revealed that no permanent significant alteration occurred to the positions of the mandible or maxilla in a vertical or …