Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 24 of 24

Full-Text Articles in Computer Sciences

Radar - A Novel Admission Control And Handoff Management Scheme For Multimedia Leo Satellite Networks, Syed Rashidali Rizvi Dec 2005

Radar - A Novel Admission Control And Handoff Management Scheme For Multimedia Leo Satellite Networks, Syed Rashidali Rizvi

Computer Science Theses & Dissertations

Low Earth Orbit (LEO) satellite networks are deployed as an enhancement to terrestrial wireless networks in order to provide broadband services to users regardless of their location. In addition to global coverage, these satellite systems support communications with hand-held devices and offer low cost-per-minute access cost, making them promising platforms for Personal Communication Services (PCS). LEO satellites are expected to support multimedia traffic and to provide their users with some form of Quality of Service (QoS) guarantees. However, the limited bandwidth of the satellite channel, satellite rotation around the Earth and mobility of end-users makes QoS provisioning and mobility management …


Robust And Efficient Localization Techniques For Cellular And Wireless Sensor Networks, Haseebulla M. Khan Dec 2005

Robust And Efficient Localization Techniques For Cellular And Wireless Sensor Networks, Haseebulla M. Khan

Computer Science Theses & Dissertations

Localization in wireless networks refers to a collection of tasks that, collectively, determines the location of a mobile user, striving to hide the effects of mobility from the user and/or application. Localization has become an important issue and has drawn considerable attention, as many applications including E-911, cargo tracking, locating patients, location-sensitive billing, etc., require knowledge of the location of user/objects. It was realized, quite a while back, that extending emergency 911-like services (E-911) to continually growing mobile population is one of the extremely important localization applications. The bulk of the proposed solutions to emergency location management in wireless environments …


Non-Linear And Linear Transformations Of Features For Robust Speech Recognition And Speaker Identification, Saurabh Prasad Jul 2005

Non-Linear And Linear Transformations Of Features For Robust Speech Recognition And Speaker Identification, Saurabh Prasad

Electrical & Computer Engineering Theses & Dissertations

Automatic speech recognizers perform poorly when training and test data are systematically different in terms of noise and channel characteristics. One manifestation of such differences is variations in the probability density functions (pdfs) between training and test features. Consequently, both automatic speech recognition and automatic speaker identification may be severely degraded. Previous attempts to mm1m1ze this problem include Cepstral Mean and Variance Normalization and transforming all speech features to a uni-variate Gaussian pdf. In this thesis, two techniques are presented for non-linearly scaling speech features to fit them to a target pdf - the first is based on the principles …


Dream: A Theoretical Analysis, Xueying Qi Jul 2005

Dream: A Theoretical Analysis, Xueying Qi

Computer Science Theses & Dissertations

A Mobile Ad-hoc Network (MANET, for short) is a collection of mobile nodes deployed in support of a short-lived special-purpose operation. Examples include search-and-rescue missions, law-enforcement, multimedia classrooms, and among many others. Unlike cellular or satellite networks, MANET do not rely on any form of pre-existing infrastructure. The mobility of nodes combined with the lack of infrastructure makes routing in MANET notoriously difficult. It was recently suggested that routing in MANET can use to advantage geographic information that the nodes may acquire either by endowing them with a GPS chip or simply by using known localization algorithms. Distance Routing Effect …


Mobility-Pattern Based Localization Update Algorithm For Mobile Wireless Sensor Networks, Mohammad Yacoub Al-Laho Jul 2005

Mobility-Pattern Based Localization Update Algorithm For Mobile Wireless Sensor Networks, Mohammad Yacoub Al-Laho

Electrical & Computer Engineering Theses & Dissertations

In mobile wireless sensor networks, sensors move in the monitored area at any direction and speed. Unlike many other networking hosts, sensor nodes do not have global addresses. They are often identified by using a location-based addressing scheme. Therefore, it is important to have the knowledge of the sensor location indicating where the data came from. In this thesis, three localization update algorithms were designed, Specifically, a sensor movement is divided into three states: Pause, Linear, and Random. Each state adopts different localization update algorithm. Since complex movement involves different mobility patterns, a state transition model is developed to …


A Feature Specific Modular Approach For Pose And Illumination Invariant Face Recognition, Praveen Sankaran Jul 2005

A Feature Specific Modular Approach For Pose And Illumination Invariant Face Recognition, Praveen Sankaran

Electrical & Computer Engineering Theses & Dissertations

A feature specific modular-PCA (Principal Component Analysis) approach on face images in multiple views for pose and illumination invariant face recognition is presented in this thesis. Principal components are extracted from different sub-modules of the image and are concatenated to make a single signature vector to represent a face region in a particular viewing angle. Additional principal components are extracted horn image regions representing key facial feature and are added as an extension of the signature vector. Feature specific modular-PCA approach is capable of recognizing faces in varying illumination conditions and facial expressions as the modular components represent the local …


Strategies For Analysis Of Unimodal And Multimodal Data For Simulation, Anshul Rai Sharma Jul 2005

Strategies For Analysis Of Unimodal And Multimodal Data For Simulation, Anshul Rai Sharma

Electrical & Computer Engineering Theses & Dissertations

The primary objective of this thesis is to provide strategies for analysis for data associated with simulation. Data analysis is an important part of the simulation process. Typically more stress is laid upon the development of the computer simulation while the data analysis takes a back seat. However, the accuracy of a simulation depends on the data driving it. In other words, any simulation is only as accurate as the input data fed into the simulation. Also, the output of simulation should be analyzed properly in order to validly estimate the performance of the system being simulated. The focus of …


Opal: In Vivo Based Preservation Framework For Locating Lost Web Pages, Terry L. Harrison Jul 2005

Opal: In Vivo Based Preservation Framework For Locating Lost Web Pages, Terry L. Harrison

Computer Science Theses & Dissertations

We present Opal, a framework for interactively locating missing web pages (http status code 404). Opal is an example of "in vivo" preservation: harnessing the collective behavior of web archives, commercial search engines, and research projects for the purpose of preservation. Opal servers learn from their experiences and are able to share their knowledge with other Opal servers using the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH). Using cached copies that can be found on the web, Opal creates lexical signatures which are then used to search for similar versions of the web page. Using the OAI-PMH to facilitate …


Clustering And Hybrid Routing In Mobile Ad Hoc Networks, Lan Wang Apr 2005

Clustering And Hybrid Routing In Mobile Ad Hoc Networks, Lan Wang

Computer Science Theses & Dissertations

This dissertation focuses on clustering and hybrid routing in Mobile Ad Hoc Networks (MANET). Specifically, we study two different network-layer virtual infrastructures proposed for MANET: the explicit cluster infrastructure and the implicit zone infrastructure. In the first part of the dissertation, we propose a novel clustering scheme based on a number of properties of diameter-2 graphs to provide a general-purpose virtual infrastructure for MANET. Compared to virtual infrastructures with central nodes, our virtual infrastructure is more symmetric and stable, but still light-weight. In our clustering scheme, cluster initialization naturally blends into cluster maintenance, showing the unity between these two operations. …


Applying A Simulation-Based Real-Time Decision Making Method To Mass Casualty Scenarios In Hospital Emergency Departments, Fatemah Al-Douli Apr 2005

Applying A Simulation-Based Real-Time Decision Making Method To Mass Casualty Scenarios In Hospital Emergency Departments, Fatemah Al-Douli

Electrical & Computer Engineering Theses & Dissertations

The high possibility of having a mass casualty incident compels hospitals to plan ahead in order to sufficiently provide the healthcare needed to as many casualty victims as possible. The Emergency Rooms (ER) are usually hospitals' main entrance for many casualties. Therefore, the ER in the Children's Hospital of the King's Daughters (CHKD) was selected as the system to be examined. The ER in CHKD, the only specialized pediatric ER in the region, already struggles to handle very high patient arrival rates. Consequently, it is expected that treating a large number of patients surviving within a very short period of …


Creating Software [Sic] Environments On An M-Node Beowulf Cluster To Execute Discrete-Event Simulations, Jermaine Fitz-Gerald Headley Apr 2005

Creating Software [Sic] Environments On An M-Node Beowulf Cluster To Execute Discrete-Event Simulations, Jermaine Fitz-Gerald Headley

Electrical & Computer Engineering Theses & Dissertations

This thesis describes the development of a software tool that facilitates the creation of software environments that make a simulation tool execute k replications of an application program on several nodes of an M-node Beowulf cluster. It is assumed that each cluster-node consists of p processors. The p processors that are contained in the master cluster-node are termed master processors, and the p processors that are contained in a slave cluster-node are termed slave processors. The slave processors are used to execute the replications, while the master processors are dedicated to schedule the replications and process other housekeeping chores. For …


Image Compression By Vector Quantization Of Dct Coefficients Using A Self-Organizing Neural Network, Kirankumar Boyapati Apr 2005

Image Compression By Vector Quantization Of Dct Coefficients Using A Self-Organizing Neural Network, Kirankumar Boyapati

Electrical & Computer Engineering Theses & Dissertations

Image compression is used to remove different types of redundancies and irrelevant information in an image so that the space required for storing the image is minimized. Conventional transform based techniques remove the redundancies between adjacent pixels and irrelevant information in the image but fail to remove the redundancies between different parts of the image. There are techniques like vector quantization, which take care of the redundant information in different parts of the image, but fail to remove the irrelevant information in the image. In this thesis a new technique for lossy digital image compression is proposed which is a …


Programmable Process Flow Networks, Filip D. Cuckov Apr 2005

Programmable Process Flow Networks, Filip D. Cuckov

Electrical & Computer Engineering Theses & Dissertations

A model that introduces programmability to processes occurring in a cargo terminal simulation through the use of a process language is presented in this thesis. The model provides a means for a straight-forward definition, and redefinition of changing processes, their incorporation in the simulation architecture and efficient execution. The model was built to investigate a solution for transforming the cargo terminal simulation CPortS into a process-oriented simulation without hard-coded processes. The approach taken separates the system into an architecture and a set of processes which utilize and interact with the architecture's resources and infrastructure. The processes that take place within …


Rapid Prototyping For The Design Of Virtual Worlds, Prabhu V. Krishnan Apr 2005

Rapid Prototyping For The Design Of Virtual Worlds, Prabhu V. Krishnan

Electrical & Computer Engineering Theses & Dissertations

Development of Virtual Reality (VR) applications is challenging where application developers are required to have expertise in the target VR technologies along with the problem domain expertise. New VR technologies impose a significant learning curve to even the most experienced VR developer. The proposed solution relies on synthesis to automate the migration of a VR application to a new unfamiliar VR platform/technology. To solve the problem, the Common Scene Definition Framework (CSDF) was developed, that serves as a superset/model representation of the target virtual world. Input modules were developed to populate the framework with the capabilities of the virtual world …


Generalization Issues In Pattern Classification Applied To Speaker Identification, Mame C. Sall Apr 2005

Generalization Issues In Pattern Classification Applied To Speaker Identification, Mame C. Sall

Electrical & Computer Engineering Theses & Dissertations

This thesis is an extension of previous work on speaker identification, but with a primary focus on the generalization performance of patterns classifiers for speaker identification. The goal for all pattern classifiers is to generalize to new data, not just perform well on the training data set. The error on the training data is typically a biased estimate of the generalization error. The training set error tends to be smaller than the generalization error if the model is selected such that it minimizes the training error. Therefore, the training error alone should not be used as a good predictor of …


Lightweight Federation Of Non-Cooperating Digital Libraries, Rong Shi Apr 2005

Lightweight Federation Of Non-Cooperating Digital Libraries, Rong Shi

Computer Science Theses & Dissertations

This dissertation studies the challenges and issues faced in federating heterogeneous digital libraries (DLs). The objective of this research is to demonstrate the feasibility of interoperability among non-cooperating DLs by presenting a lightweight, data driven approach, or Data Centered Interoperability (DCI). We build a Lightweight Federated Digital Library (LFDL) system to provide federated search service for existing digital libraries with no prior coordination.

We describe the motivation, architecture, design and implementation of the LFDL. We develop, deploy, and evaluate key services of the federation. The major difference to existing DL interoperability approaches is one where we do not insist on …


Implementing Simple Protocols In Multiple Processors Control Applications, Steve Hsiung, Tyson Mccall, Corinne Ransberger Jan 2005

Implementing Simple Protocols In Multiple Processors Control Applications, Steve Hsiung, Tyson Mccall, Corinne Ransberger

Engineering Technology Faculty Publications

Using microprocessor/microcontroller in various control applications is not only one of the major topics in Engineering Technology curricula, but also of interest in industry applications. To accomplish it correctly the process of designing application programs starts from the individual module development through extensive testing, verification, and modification. Applying these developed modules in a useful manner requires the links and integrations that lead to the practical project implementation. Frequently, in students' senior project designs and faculty's research plans, the microprocessor/microcontroller resources become scarce or cause conflicts during the modules' integration stage. To accommodate the shortfall of the resources and resolve any …


Final Report For The Development Of The Nasa Technical Report Server (Ntrs), Michael L. Nelson Jan 2005

Final Report For The Development Of The Nasa Technical Report Server (Ntrs), Michael L. Nelson

Computer Science Faculty Publications

The author performed a variety of research, development and consulting tasks for NASA Langley Research Center in the area of digital libraries (DLs) and supporting technologies, such as the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH). In particular, the development focused on the NASA Technical Report Server (NTRS) and its transition from a distributed searching model to one that uses the OAI-PMH. The Open Archives Initiative (OAI) is an international consortium focused on furthering the interoperability of DLs through the use of "metadata harvesting". The OAI-PMH version of NTRS went into public production on April 28, 2003. Since that …


Introduction: Data Communication And Topology Algorithms For Sensor Networks, Stephan Olariu, David Simplot-Ryl, Ivan Stojmenovic Jan 2005

Introduction: Data Communication And Topology Algorithms For Sensor Networks, Stephan Olariu, David Simplot-Ryl, Ivan Stojmenovic

Computer Science Faculty Publications

(First paragraph) We are very proud and honored to have been entrusted to be Guest Editors for this special issue. Papers were sought to comprehensively cover the algorithmic issues in the “hot” area of sensor networking. The concentration was on network layer problems, which can be divided into two groups: data communication problems and topology control problems. We wish to briefly introduce the five papers appearing in this special issue. They cover specific problems such as time division for reduced collision, fault tolerant clustering, self-stabilizing graph optimization algorithms, key pre-distribution for secure communication, and distributed storage based on spanning trees …


Software Development Project Risk Management: A Literature Review, Kevin Macg. Adams, C. Ariel Pinto Jan 2005

Software Development Project Risk Management: A Literature Review, Kevin Macg. Adams, C. Ariel Pinto

Engineering Management & Systems Engineering Faculty Publications

The rapid and unprecedented growth in software has brought with it some of the most spectacular and costly project failures in modern history. How risk management is presented in the scholarly journals may give insight into the risk management methods and techniques in use on software development projects. This paper provides a glimpse into the risk management methods, methodologies and techniques available to those who are responsible for software development projects by conducting a non-experimental content analysis. The findings reveal that risk management has not received sufficient attention and does not appear to be widely accepted within the software engineering …


Performance Analysis And Validation Of A Recoverable Flight Control System In A Simulated Neutron Environment, Hong Zhang, W. Steven Gray, Oscar R. Gonzalez Jan 2005

Performance Analysis And Validation Of A Recoverable Flight Control System In A Simulated Neutron Environment, Hong Zhang, W. Steven Gray, Oscar R. Gonzalez

Electrical & Computer Engineering Faculty Publications

This paper introduces a class of stochastic hybrid models for the analysis of closed-loop control systems implemented with NASA's Recoverable Computer System. Such Recoverable Computer Systems have been proposed to insure reliable control performance in harsh environments. The stochastic hybrid models consist of either a stochastic finite-state automaton or a finite-state machine driven by a Markov input, which in turn drives a switched linear discrete-time dynamical system. Their stability and output tracking performance are analyzed using an extension of the existing theory for Markov jump-linear systems. For illustration, a stochastic hybrid model is used to calculate the tracking error performance …


Lessons Learned With Arc, An Oai-Pmh Service Provider, Xiaoming Liu, Kurt Maly, Michael L. Nelson Jan 2005

Lessons Learned With Arc, An Oai-Pmh Service Provider, Xiaoming Liu, Kurt Maly, Michael L. Nelson

Computer Science Faculty Publications

Web-based digital libraries have historically been built in isolation utilizing different technologies, protocols, and metadata. These differences hindered the development of digital library services that enable users to discover information from multiple libraries through a single unified interface. The Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH) is a major, international effort to address technical interoperability among distributed repositories. Arc debuted in 2000 as the first end-user OAI-PMH service provider. Since that time, Arc has grown to include nearly 7,000,000 metadata records. Arc has been deployed in a number of environments and has served as the basis for many other …


Archive Ingest And Handling Test, Michael L. Nelson, Johan Bollen, Giridhar Manepalli, Rabia Haq Jan 2005

Archive Ingest And Handling Test, Michael L. Nelson, Johan Bollen, Giridhar Manepalli, Rabia Haq

Computer Science Faculty Publications

The Archive Ingest and Handling Test (AIHT) was a Library of Congress (LC) sponsored research project administered by Information Systems and Support Inc. (ISS). The project featured five participants: Old Dominion University Computer Science Department; Harvard University Library; Johns Hopkins University Library; Stanford University Library; Library of Congress. All five participants received identical disk drives containing copies of the 911.gmu.edu web site, a collection of 9/11 materials maintained by George Mason University (GMU). The purpose of the AIHT experiment was to perform archival forensics to determine the nature of the archive, ingest it, simulate at least one of the file …


Energy-Efficient Self-Organization Protocols For Sensor Networks, Qingwen Xu Jan 2005

Energy-Efficient Self-Organization Protocols For Sensor Networks, Qingwen Xu

Computer Science Theses & Dissertations

A Wireless Sensor Network (WSN, for short) consists of a large number of very small sensor devices deployed in an area of interest for gathering and delivery information. The fundamental goal of a WSN is to produce, over an extended period of time, global information from local data obtained by individual sensors. The WSN technology will have a significant impact on a wide array of applications on the efficiency of many civilian and military applications including combat field surveillance, intrusion detection, disaster management among many others. The basic management problem in the WSN is to balance the utility of the …