Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 24 of 24

Full-Text Articles in Physical Sciences and Mathematics

Shape Recognition By Curvature Changing Points And Fourier Transform, Jianzhong Li Dec 1987

Shape Recognition By Curvature Changing Points And Fourier Transform, Jianzhong Li

Masters Theses

Computer vision is a relatively new and fast-growing field. Shape representation and recognition is a very important but difficult branch in this field.

One method of using curvature changing points and Fourier transform to recognize the shape is described in this thesis. Also an important feature in computer vision, multiscaling, is achieved by this method.


A Graphic Implementation Of Blocks World As An Example Of Artificial Intelligence, Shigenori Ochiai Dec 1987

A Graphic Implementation Of Blocks World As An Example Of Artificial Intelligence, Shigenori Ochiai

Masters Theses

The objective of this study is to implement blocks world as a classic example of artificial intelligence both visually and realistically.

The visual representation is implemented by using a graphic system in a microcomputer. Real world constraints are implemented as rules concerning centers of gravity.

These goals are significant in realizing principles of artificial intelligence. Visual data help a human being to quickly understand the state of a system. Also, bringing a situation closer to the real world is a step toward to the final goal of artificial intelligence.


An Application Of Stochastic Learning Automata To Queueing Disciplines, Tearesa Lynn Wegscheid Dec 1987

An Application Of Stochastic Learning Automata To Queueing Disciplines, Tearesa Lynn Wegscheid

Masters Theses

There has been extensive research in the area of Stochastic Learning in both Psychology and Computer Science. This thesis examines the literature of Stochastic Learning automata with respect to operation control. It traces the development of an optimal reinforcement scheme, and examines the applications of Stochastic Learning automata in routing. The paper simulates M/M/3 and M/M/5 queueing systems similar to the system described by Glorioso and Osorio. The simulation implements Lr-p, Li-p, and Lr-i learning models and compares their performance to Teller Window and Jockeying. A blocking factor is developed to provide more information for …


The Western Michigan University Programming Contest Proctor System, Joel Marshall Fletcher Dec 1987

The Western Michigan University Programming Contest Proctor System, Joel Marshall Fletcher

Masters Theses

A software package for administering programming contests has been developed for DECsystem-10 timesharing computers. This package provides a neutral editing environment for contestants, a method for submitting problems for execution, and an automatic judging facility for evaluating contestants' solutions and tabulating scores. The proctor system has been used in numerous competitions, including a regional contest sponsored by the Association for Computing Machinery.


A Microprocessor-Based Multivariable Interactive Control System, Sayed Mehdi Khayam-Nekouei Dec 1987

A Microprocessor-Based Multivariable Interactive Control System, Sayed Mehdi Khayam-Nekouei

Electronic Theses & Dissertations

This study outlines the various types of control systems and reviews the necessary mathematical techniques to solve the problem of multivariable interactive control. The characteristics as well as the state representation for control processes involving either p or v type canonical structures are discussed. Next, the characteristics of multivariable interactive discrete control systems are discussed in detail. The advantages of flexibility and speed of microprocessors are used as powerful tools to implement a microprocessor-based system can be employed to control discrete processes. To demonstrate a practical application of a microprocessor-based system in a multivariable interactive discrete process, the algorithm and …


A Study Of Automated Reasoning In A Brain Tumor Diagnosis Expert System, Aung Zaw Maung Aug 1987

A Study Of Automated Reasoning In A Brain Tumor Diagnosis Expert System, Aung Zaw Maung

Masters Theses

The objective of this study is to survey various theorem-proving methods and to evaluate how these methods can be applied as inference engines in a brain tumor diagnosis expert system.

Various applications of automated reasoning based on the resolution principle are discussed. Knowledge representations and inference mechanisms used in expert systems are also surveyed.

An actual application of this method for a medical diagnosis problem is implemented and explained, and the limitations of this approach and possible future enhancements are discussed.


The Evolution Of Text Formatting Languages, Dirk Herr-Hoyman Jun 1987

The Evolution Of Text Formatting Languages, Dirk Herr-Hoyman

Masters Theses

Text, as seen in books and magazines, can take on three forms: string, graphic (two-dimensional), and image (digitized pictures). Text formatting processes text into a representation suitable for printing. Since a printer is really a computer, this representation is machine code for the printer. ASCII is one such code.

Six historically significant text formatting languages are surveyed: Runoff, Troff, TeX, Bravo, Scribe, and Postscript. The emphasis is on the text types available and the code generated. The main evolutionary forces are the changes in printers. Comparisons are made with programming languages.

Each of the six languages has ASCII as its …


Rise To Power Of Senator Joseph R. Mccarthy: Reflections Of The Cold War Mccarthy Era In American Film, Scott Lainer May 1987

Rise To Power Of Senator Joseph R. Mccarthy: Reflections Of The Cold War Mccarthy Era In American Film, Scott Lainer

Honors Theses

The common bond between much of the film industry and Joseph McCarthy was insecurity and the drive for national approval. If one grasps the specific characteristics of McCarthy the man, and the methods of these politically "inspired" movies, we can to better place the period into context and acknowledge the fact that, if the citizenry is not aware, and is again caught by an ever-building wave of trickle down sentiment, the 1950s might not prove to be an isolated period in American history. Insecurity was not a fifties novelty. It still exists, and could potentially escalate anti-Communist policy and sentiment …


Program Development For Computer Simulation And Analysis For Multiplex Chromatography, Barbara Pawliszyn May 1987

Program Development For Computer Simulation And Analysis For Multiplex Chromatography, Barbara Pawliszyn

All Graduate Plan B and other Reports, Spring 1920 to Spring 2023

In this report, the programs developed for the analysis of simulated data in multiplex chromatography are written in the ASYST language. The integration of the program modules into a menu-driven, user-friendly prototype program is outlined. The program is developed to allow for flexibility and easy upgrading of the code.

This report examines the calculation procedures potentially useful in multiplex chromatography. Analysis of the mutliplex chromatograms is done by three mathematical methods, Cross-Correlation, Hadamard Transform and Fast Fourier Transform. The effects of experimental length/chromatogram length and decision sequences on correlation noise present in a single chromatogram, are discussed. As the number …


Shamat: A Matrix Manipulation Program, Shahriyar Dadkhah May 1987

Shamat: A Matrix Manipulation Program, Shahriyar Dadkhah

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

This report is both a users guide and a programmers manual for running and modifying the program SHAMAT, an interactive matrix calculator. The program is written in Turbo Pascal version 3.0 for MS-DOS computers. This software enables the user to type in matrix equations for solving statistical problems such as multiple regression, analysis of variance, etc. All matrix operations necessary for linear models analysis are included in this program. Since each operation uses a separate subroutine, program enhancement, modification and updating is demonstrated to be easy.


Medial Axis Transform Using Ridge Following, Richard Mark Volkmann Jan 1987

Medial Axis Transform Using Ridge Following, Richard Mark Volkmann

Masters Theses

"The intent of this investigation has been to find a robust algorithm for generation of the medial axis transform (MAT). The MAT is an invertible, object centered, shape representation defined as the collection of the centers of disks contained in the shape but not in any other such disk. Its uses include feature extraction, shape smoothing, and data compression. MAT generating algorithms include brushfire, Voronoi diagrams, and ridge following. An improved implementation of the ridge following algorithm is given. Orders of the MAT generating algorithms are compared. The effects of the number of edges in the polygonal approximation, shape area, …


Performance Parameter Measurements Of Generic Files, Sankarraman Subramanian Jan 1987

Performance Parameter Measurements Of Generic Files, Sankarraman Subramanian

Masters Theses

"This study discusses the performance parameter measurements of generic files, the pile file, the sequential file, the indexed-sequential file, the indexed file and the direct file. The file performance measurements are compiled in a software package. The study then describes the use of such software package as a simulation tool in a file design environment"--Abstract, page iii.


Intensional Reasoning About Knowledge, Oliver B. Popov Jan 1987

Intensional Reasoning About Knowledge, Oliver B. Popov

Doctoral Dissertations

"As demands and ambitions increase in Artificial Intelligence, the need for formal systems that facilitate a study and a simulation of a machine cognition has become an inevitability. This paper explores and developes the foundations of a formal system for propositional reasoning about knowledge. The semantics of every meaningful expression in the system is fully determined by its intension, the set of complexes in which the expression is confirmed. The knowledge system is based on three zeroth-order theories of epistemic reasoning for consciousness, knowledge and entailed knowledge. The results presented in the paper determine the soundness and the completeness of …


A Proposed C Language Binding For The Graphical Kernel System-3d, Mark Gerard Bolten Jan 1987

A Proposed C Language Binding For The Graphical Kernel System-3d, Mark Gerard Bolten

Masters Theses

"This thesis introduces a proposed C language binding definition for the International Standards Organization's draft international standard of the Graphical Kernel System-3D. This work augments the earlier C language binding of the two dimensional version of the Graphical Kernel System commonly known as GKS. The proposed function interface will provide a basis for, if not a final, C language binding for the three dimensional version of the Graphical Kernel System"--Abstract, page ii.


Lily: A Parser Generator For Ll(1) Languages, Timothy Topper Taylor Jan 1987

Lily: A Parser Generator For Ll(1) Languages, Timothy Topper Taylor

Masters Theses

This paper discusses the design and implementation of Lily, a language for generating LL(1) language parsers, originally designed by Dr. Thomas J. Sager of the University of Missouri--Rolla. A method for the automatic generation of parser tables is described which creates small, highly optimized tables, suitable for conversion to minimal perfect hash functions.

An implementation of Lily is discussed with attention to design goals, implementation of parser table generation, and table optimization techniques. Proposals are made detailing possibilities for further augmentation of the system. Examples of Lily programs are given as well as a manual for the system.


Multilist And Inverted File System Performance Measurements, Ashok Chandramouli Jan 1987

Multilist And Inverted File System Performance Measurements, Ashok Chandramouli

Masters Theses

"This study evaluates the multilist and inverted file systems. It describes the structure of the two file system and then proceeds to investigate the performance. The performance is based on quantitative estimates of space requirements for file system, time to retrieve records, time to insert a record, time to delete a record, time to update a record and time to exhaustively read and reorganize the file system. The study then investigates specific situations in which one file system seems to perform better than the other"--Abstract, page ii.


Organization For Collection Development In Medium-Sized Academic Libraries, Carol W. Cubberley Jan 1987

Organization For Collection Development In Medium-Sized Academic Libraries, Carol W. Cubberley

CCE Theses and Dissertations

At the University of Central Florida Library, the librarians with collection development assignments, and the Head of Collection Development, were frustrated in their attempts to fulfill their responsibilities. Those librarians did not report to the Department Head, but to other departments, and only a small percentage of their time was set aside for collection development. This meant that collection development duties frequently were deferred to other duties. There also was uncertainty about what duties could be expected of these librarians. Some functioned only as liaisons to academic departments, while others did extensive selection of material, wrote collection development policies, and …


Strategic Planning For A Special Library, Donald A. Guerriero Jan 1987

Strategic Planning For A Special Library, Donald A. Guerriero

CCE Theses and Dissertations

STRATEGIC PLANNING FOR A SPECIAL LIBRARY

The Technical and Management Information Center of the U.S. Defense Communications Agency is a special library providing worldwide library and information services in the subject fields of communications, electronics, command and control, and computer sciences. A project was designed with the objective of developing a strategic plan for this library. Long-range and strategic planning methods commonly used in business organizations were used. An extensive review of the literature on strategic planning was done to determine the best methods available for use in a special library environment. The methods used to develop the strategic plan …


A.R.M.S., Arbitrary Robot Modeling System, William Richard Gerlt Jan 1987

A.R.M.S., Arbitrary Robot Modeling System, William Richard Gerlt

Masters Theses

“This paper deals with the mathematical modeling of robot arms. Modeling robot arms includes finding a suitable way to describe a robot, turning the description into a mathematical system, and using the system to find a set of equations which can be used to control the robot.

One of the problems associated with robot modeling is that it involves a great deal of mathematics. When the process is done by hand, the large volume of mathematics makes the process very time consuming and prone to errors. These problems are part of the motivation for automating the modeling of robots.

ARMS …


Ethernet Performance: Design And Implementation Study, Michael M. Chaney Jan 1987

Ethernet Performance: Design And Implementation Study, Michael M. Chaney

Masters Theses

"General concepts concerning local area network designs, functions and topologies will be presented. Ethernet as a multipoint bus topology local area network will be presented in detail. The Carrier Sense Multiple Access/Collision Detect (CSMA/CD) method of fairly regulating access to the shared network bus is studied. The Ethernet Network in relation to the Open Systems Interconnect (OSI) is reviewed, but only the layers pertaining to Ethernet are discussed throughout the majority of the paper. The specifications as described by Xerox, Digital and Intel are presented to help the designer understand the network's physical limitations. Analytical models are used to predict …


The Implementation Of A Compiler Targeted To A Multiprocessor Environment, R. Dwight Schettler Jan 1987

The Implementation Of A Compiler Targeted To A Multiprocessor Environment, R. Dwight Schettler

Masters Theses

"This research is an application of the techniques which have been developed for the detection and exploitation of implicit parallelism. A system has been developed based on Intel 86/12A single board computers utilizing dual-port RAM for communication. The compiler system accepts the source code of a simple block structured language and generates parallel programs to be executed on the Multibus system. The techniques used for detection of parallelism are stressed"--Abstract, page ii.


Design And Performance Analysis Of A Relational Replicated Database Systems, Jon Gregory Hanson Jan 1987

Design And Performance Analysis Of A Relational Replicated Database Systems, Jon Gregory Hanson

Retrospective Theses and Dissertations

The hardware organization and software structure of a new database system are presented. This system, the relational replicated database system (RRDS), is based on a set of replicated processors operating on a partitioned database. Performance improvements and capacity growth can be obtained by adding more processors to the configuration. Based on designing goals a set of hardware and software design questions were developed. The system then evolved according to a five-phase process, based on simulation and analysis, which addressed and resolved the design questions. Strategies and algorithms were developed for data access, data placement, and directory management for the hardware …


The Slicing Extent Technique For Fast Ray Tracing, Sudhanshu Kumar Semwal Jan 1987

The Slicing Extent Technique For Fast Ray Tracing, Sudhanshu Kumar Semwal

Retrospective Theses and Dissertations

A new technique for image generation using ray tracing is introduced. The “Slicing Extent Technique” (SET) partitions object space with slicing planes perpendicular to all three axes. Planes are divided into two dimensional rectangular cells, which contain pointers to nearby objects. Cell size and the space between slices varies, and is determined by the objects’ locations and orientations. Unlike oct-tree and other space-partitioning methods, SET is not primarily concerned with dividing space into mutually exclusive volume elements (‘voxels’) and identifying objects within each voxel. Instead, SET is based on analysis of projections of objects onto slicing planes. In comparison to …


Training For The Airland Battle With Modeling And Simulation On The Microcomputer, David Dean Holmes Jan 1987

Training For The Airland Battle With Modeling And Simulation On The Microcomputer, David Dean Holmes

Masters Theses

"This paper describes a methodology for modifying a combat training simulation model to include a comprehensive data structure and computer software, to allow the model to be implemented on a microcomputer. It begins by developing a topology for combat simulation models and proceeds to define a data structure suitable for describing military units and facilitating the varied aspects of the simulation. An eclectic approach to the development of the model and the implementing software is followed throughout. Appropriate aspects of a number of models are incorporated into a single model suitable for training military commanders and their staffs. PASCAL, a …