Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- China Simulation Federation (3285)
- Singapore Management University (935)
- Selected Works (110)
- Missouri University of Science and Technology (104)
- University of Arkansas, Fayetteville (54)
-
- SelectedWorks (47)
- University of Tennessee, Knoxville (47)
- Western University (43)
- University of Dayton (35)
- California Polytechnic State University, San Luis Obispo (29)
- University of Nebraska - Lincoln (28)
- Purdue University (25)
- Old Dominion University (24)
- Chapman University (23)
- City University of New York (CUNY) (22)
- University of Massachusetts Amherst (21)
- Technological University Dublin (20)
- Southern Methodist University (19)
- Illinois State University (17)
- University of Kentucky (17)
- University of Nebraska at Omaha (15)
- Kennesaw State University (13)
- University of Montana (13)
- Air Force Institute of Technology (12)
- Claremont Colleges (12)
- Florida International University (12)
- The University of Maine (12)
- University of Nevada, Las Vegas (12)
- Embry-Riddle Aeronautical University (11)
- University of New Orleans (11)
- Keyword
-
- Simulation (158)
- Machine learning (65)
- Deep learning (56)
- Modeling (44)
- Numerical simulation (44)
-
- Virtual reality (44)
- Data mining (43)
- Genetic algorithm (42)
- Machine Learning (40)
- Particle swarm optimization (36)
- Modeling and simulation (34)
- Optimization (34)
- Visualization (34)
- Social media (31)
- Twitter (30)
- Path planning (29)
- Reinforcement learning (28)
- Fault diagnosis (27)
- Feature extraction (26)
- Multi-objective optimization (26)
- Classification (25)
- Neural network (25)
- Algorithms (23)
- Digital twin (23)
- Query processing (23)
- Algorithm (22)
- Clustering (22)
- Deep Learning (22)
- Simulation model (22)
- System simulation (22)
- Publication Year
- Publication
-
- Journal of System Simulation (3285)
- Research Collection School Of Computing and Information Systems (904)
- Computer Science Faculty Publications (45)
- Doctoral Dissertations (45)
- Physics Faculty Research & Creative Works (44)
-
- Electronic Thesis and Dissertation Repository (35)
- Kyriakos MOURATIDIS (35)
- Wojciech Budzianowski (29)
- Electronic Theses and Dissertations (26)
- Theses and Dissertations (25)
- Geosciences and Geological and Petroleum Engineering Faculty Research & Creative Works (19)
- Graduate Theses and Dissertations (19)
- Saverio Perugini (19)
- Annual Symposium on Biomathematics and Ecology Education and Research (15)
- Chemistry Faculty Research & Creative Works (14)
- Computer Science and Computer Engineering Undergraduate Honors Theses (14)
- The Summer Undergraduate Research Fellowship (SURF) Symposium (14)
- Dissertations and Theses Collection (Open Access) (13)
- Graduate Student Theses, Dissertations, & Professional Papers (13)
- Master's Theses (13)
- David LO (12)
- FIU Electronic Theses and Dissertations (12)
- Masters Theses (11)
- Mathematical Sciences Spring Lecture Series (11)
- University of New Orleans Theses and Dissertations (11)
- Dissertations (10)
- Holland Computing Center: Faculty Publications (10)
- Articles (9)
- Interdisciplinary Informatics Faculty Proceedings & Presentations (9)
- Robert Oleniacz (9)
- Publication Type
Articles 5341 - 5360 of 5360
Full-Text Articles in Physical Sciences and Mathematics
A Distributed Interactive Simulation Based Remote Debriefing Tool For Red Flag Missions, Michael T. Gardner
A Distributed Interactive Simulation Based Remote Debriefing Tool For Red Flag Missions, Michael T. Gardner
Theses and Dissertations
Air Force leaders, recognizing the need for improved training following the Vietnam War, implemented the Red Flag exercises at Nellis AFB. At the heart of this training is the Red Flag Measurement and Debriefing System RFMDS and its capability to accurately reconstruct the elements of an intense exercise fought over the deserts of Nevada. This thesis uses the technology of distributed interactive simulation DIS to transmit aircraft telemetry onto computer networks, allowing the monitoring and analysis of live Red Flag missions at any site with compatible communications equipment and thesis software. The use of standard DIS protocols enables simulators to …
Query Optimization And Processing In Federated Database Systems, Ee Peng Lim, Jaideep Srivastava
Query Optimization And Processing In Federated Database Systems, Ee Peng Lim, Jaideep Srivastava
Research Collection School Of Computing and Information Systems
No abstract provided.
Multiple Query Optimization With Depth-First Branch-And-Bound, Ahmet Cosar, Ee Peng Lim, Jaideep Srivastava
Multiple Query Optimization With Depth-First Branch-And-Bound, Ahmet Cosar, Ee Peng Lim, Jaideep Srivastava
Research Collection School Of Computing and Information Systems
In certain database applications such as deductive databases, batch query processing, and recursive query processing etc., a single query can be transformed into a set ofclosely related database queries. Great benefits can be obtained by executing a group of related queries all together in a single unijied multi-plan instead of executing each query separately. In order to achieve this, Multiple Query Optimization (MQO) identifies common task(s) (e.g. common subezpressions, joins, etc.) among a set of query plans and creates a single unified plan (multiplan) which can be executed to obtain the required outputs forall queries at once. In this paper, …
Entity Identification In Database Integration: An Evidential Reasoning Approach, Ee Peng Lim, Jaideep Srivastava
Entity Identification In Database Integration: An Evidential Reasoning Approach, Ee Peng Lim, Jaideep Srivastava
Research Collection School Of Computing and Information Systems
Entity identification is the problem of matching object instances from different databases which correspond to the same real-world entity. In this paper, we present a 2-step entity identification process in which attributes for matching tuples may be missing in certain tuples, and thus need to be derived prior to the matching. To match tuples, we require identity rules which specify the conditions to be satisfied by a pair of tuples, from different databases, before they can be considered as modeling the same real-world entity. We also introduce ILFD's (instance-level functional dependencies) as a form of inference rules which derive the …
Real Time Texture Analysis From The Parallel Computation Of Fractal Dimension, Halford I. Hayes Jr.
Real Time Texture Analysis From The Parallel Computation Of Fractal Dimension, Halford I. Hayes Jr.
Computer Science Theses & Dissertations
The discrimination of texture features in an image has many important applications: from detection of man-made objects from a surrounding natural background to identification of cancerous from healthy tissue in X-ray imagery. The fractal structure in an image has been used with success to identify these features but requires unacceptable processing time if executed sequentially.
The paradigm of data parallelism is presented as the best method for applying massively parallel processing to the computation of fractal dimension of an image. With this methodology, and sufficient numbers of processors, this computation can reach real time speeds necessary for many applications. A …
Assessment Of The Accuracy Of Three Methods Of Computerized Growth Prediction Of The Soft Tissue Profile, In Untreated Individuals, Pat Diciccio
Loma Linda University Electronic Theses, Dissertations & Projects
This study was performed to determine the accuracy and reliability of the long range growth predictions for profile structures by three computer software systems (QuickCeph™ for Apple Macintosh™ systems. Rocky Mountain Data Systems™ for IBM™ mainframe systems, and Facial Print™ for IBM™ personal computers), on untreated individuals. The total sample consisted of 90 Caucasian children from the Burlington Growth Centre. These were subdivided into groups of 15 children in each of mesiofacial, dolichofacial, and brachyfacial growth types for both males and females, with Angle class I occlusions, normal overbite, and normal overjet. Points measured consisted of 14 skeletal and soft …
Entity Identification In Database Integration, Ee Peng Lim, Jaideep Srivastava, Satya Prabhakar, James Richardson
Entity Identification In Database Integration, Ee Peng Lim, Jaideep Srivastava, Satya Prabhakar, James Richardson
Research Collection School Of Computing and Information Systems
The objective of entity identification is to determine the correspondence between object instances from more than one database. Entity identification at the instance level, assuming that schema level heterogeneity has been resolved a priori, is examined. Soundness and completeness are defined as the desired properties of any entity identification technique. To achieve soundness, a set of identity and distinctness rules are established for entities in the integrated world. The use of extended key, which is the union of keys, and possibly other attributes, from the relations to be matched, and its corresponding identify rule are proposed to determine the equivalence …
Repository Evaluation Of Software Reuse: An Empirical Study, R. D. Banker, Robert J. Kauffman, D. Zweig
Repository Evaluation Of Software Reuse: An Empirical Study, R. D. Banker, Robert J. Kauffman, D. Zweig
Research Collection School Of Computing and Information Systems
The use and benefits of repository evaluation of software reuse are illustrated through an analysis of the evolving repositories of two large firms that recently implemented integrated CASE development tools. The analysis shows that these tools have supported high levels of software reuse, but it also suggests that there remains considerable unexploited reuse potential. The findings indicate that organizational changes will be required before the full potential of the new technology can be realized.
Multiple Learner Systems Using Resampling Methods, Binyun Xie
Multiple Learner Systems Using Resampling Methods, Binyun Xie
Computer Science Theses & Dissertations
The N-Learners Problem deals with combining a number of learners such that the resultant system is "better", under some criterion, than the best of the individual learners. We consider a system of probably approximately correct concept learners. Depending on the available information, there are several methods to make the composite system better than the best of the individual learners. If a sample and an oracle that generates data points (but, not their classification) is available, then we show that we can achieve arbitrary levels of the normalized confidence of the composite system if (a) a robust learning algorithm is available, …
Single Object Detection Using Multiple Sensors With Unknown Noise Distributions, Shaofen Chen
Single Object Detection Using Multiple Sensors With Unknown Noise Distributions, Shaofen Chen
Computer Science Theses & Dissertations
We consider the design of an object classification system that identifies single objects using a system of sensors; each sensor outputs a random vector, according to an unknown (noise) probability distribution, in response to a sensed object. We consider a special class of systems, called the linearly separable systems, where the error-free sensor outputs corresponding to distinct objects can be mapped into disjoint intervals on real line. Given a set of sensor outputs corresponding to known objects, we show that a detection rule αemp that approaches the correct rule with a high probability can be computed. We show …
Methods For Calculating Solar Position And Day Length Including Computer Programs And Subroutines, M L. Roderick
Methods For Calculating Solar Position And Day Length Including Computer Programs And Subroutines, M L. Roderick
Resource management technical reports
The theory of calculating solar position is described. Using this theory, a number of computing routines are prepared in the C programming language. These routines are suitable for users who program in C, and have an ANSI compatible C compiler. These routines are fully documented, with both the underlying theory, and code particulars, and may be used as a stand alone reference. The source code has also been published in appendix B of the report.
Shadow Casting Phenomena At Newgrange, Frank Prendergast
Shadow Casting Phenomena At Newgrange, Frank Prendergast
Articles
A digital model of the Newgrange passage tomb and surrounding ring of monoliths known as the Great Circle is used to investigate sunrise shadow casting phenomena at the monument. Diurnal variation in shadow directions and lengths are analysed for their potential use in the Bronze Age to indicate the passage of seasonal time. Computer-aided simulations are developed from a photogrammetric survey to accurately show how three of the largest monoliths, located closest to the tomb entrance and archaeologically coded GC1, GC-1 and GC-2, cast their shadows onto the vertical face of the entrance kerbstone, coded K1. The phenomena occur at …
Impact Of Microprocessor Protected Mode Programming On Undergraduate Education N Engineering Technology, Robert L. Douglas
Impact Of Microprocessor Protected Mode Programming On Undergraduate Education N Engineering Technology, Robert L. Douglas
Journal of the Arkansas Academy of Science
No abstract provided.
Data Acquisition And Control Program For Chromatographic And Spectroscopic Studies, M. Keith Hudson, William G. Hood, Robert Henson
Data Acquisition And Control Program For Chromatographic And Spectroscopic Studies, M. Keith Hudson, William G. Hood, Robert Henson
Journal of the Arkansas Academy of Science
An IBMPC compatible computer was interfaced to an Ithaco 3962 lock-in-amplifier. The computer controlled the functions of the lock-in-amplifier, acquired and stored data, and allowed for real time or off-line processing of data. Computer/amplifier connection was made via RS-232-C serial interface. Programmed in Microsoft Quick BASIC, the computer assumed the role of a dedicated chromatographic integrator. This reduced the overall instrumentation expense by eliminating a dedicated chromatographic integrator. The computer program supplied much greater flexibility in control and data interpretation. To show its utility, the program was applied to a study of the infrared emission from a flame upon the …
An Interval Newton Method, E R. Hansen, R I. Greenberg
An Interval Newton Method, E R. Hansen, R I. Greenberg
Computer Science: Faculty Publications and Other Works
We introduce an interval Newton method for bounding solutions of systems of nonlinear equations. It entails three subalgorithms. The first is a Gauss-Seidel-type step. The second is a real (noninterval) Newton iteration. The third solves the linearized equations by elimination. We explain why each subalgorithm is desirable and how they fit together to provide solutions in as little as one-third or one-quarter the time required by Krawczyk's method [7] in our implementations.
Effects Of Changes In Surface Water Regime And/Or Land Use On The Vertical Distribution Of Water Available For Wetland Vegetation: Dynamic Model Of The Zone Of Aeration (Appendix To Part 1 Of Completion Report For Project A-023-Ark), Robert N. Maccallum, R. A. Sims
Effects Of Changes In Surface Water Regime And/Or Land Use On The Vertical Distribution Of Water Available For Wetland Vegetation: Dynamic Model Of The Zone Of Aeration (Appendix To Part 1 Of Completion Report For Project A-023-Ark), Robert N. Maccallum, R. A. Sims
Technical Reports
Appendix to Part 1 of Completion Report for Project A-023-ARK
Using A Prediction Model In Forecasting Appeals, Paul A. Rake
Using A Prediction Model In Forecasting Appeals, Paul A. Rake
IUSTITIA
Following the 1972 reorganization of the Indiana Court of Appeals into three panels serving defined geographical districts, the Court soon found itself floundering with too many unevenly distributed cases. Lacking a sufficient base of statistical data from which to formulate a plan to cope with the problem, various proposals, including redistricting the court, adding more judges, and developing a more sophisticated staff research, could not be measured for effectiveness or advisability.
In response to these problems, the Court developed a project to deal with the future caseload by constructing a regression model to predict appeals. This model generated estimates of …
Cephalometrics For The Oral Surgeon In The Diagnosis Of Facial Deformities, Frederick J. Mantz
Cephalometrics For The Oral Surgeon In The Diagnosis Of Facial Deformities, Frederick J. Mantz
Loma Linda University Electronic Theses, Dissertations & Projects
Surgical orthodontics presents a challenge to the oral surgeon. By the nature of the oral surgeon's training and discipline he should be the one best qualified to treat the surgical aspect of the surgical orthodontic case. The establishment of a proper diagnosis and means of communication between the oral surgeon and orthodontist are essential in achieving a good final result for the surgically treated case. Fortunately, a scientific method of diagnosis is available that can provide both specialties with a common language. Computerized cephalometric analysis can provide the diagnosis and link of communication for the discussion of goals and treatment. …
Digital Computer Solution Of Electromagnetic Transients In Large Power Systems, Bijan Navidbakhsh
Digital Computer Solution Of Electromagnetic Transients In Large Power Systems, Bijan Navidbakhsh
Dissertations and Theses
This thesis is an introduction to the solution of electromagnetic transients by a combination of the Bergeran method of characteristics and the application of trapezoidal rule of integration.
Three test examples solved by digital computer illustrate the step by step solution and computer programming.
To compare this method with the Laplace transformation technique, a test problem solved by both methods and also digital computer is illustrated. In conclusion, the advantages and disadvantages of both methods are compared.
A Computerized Study Of Midpalatal Suture Expansion, Clelan G. Ehrler
A Computerized Study Of Midpalatal Suture Expansion, Clelan G. Ehrler
Loma Linda University Electronic Theses, Dissertations & Projects
An investigation has been conducted to consider the effects of midpalatal suture expansion on the cranial-facial complex. Nine patients were treated that had constricted maxillae. Data was obtained from frontal and lateral headplate radiographs which were taken at four intervals during treatment. The Rocky Mountain Data Systems diagnosis was utilized to interpret the radiographic data.
The data from the nine cases were averaged to obtain a composit [sic] change at each of the four times.
Examination of the lateral headplate data revealed that no permanent significant alteration occurred to the positions of the mandible or maxilla in a vertical or …