Ceg 770-01: Computer Engineering Mathematics, 2010 Wright State University - Main Campus
Ceg 770-01: Computer Engineering Mathematics, Jack Jean
Computer Science & Engineering Syllabi
No abstract provided.
Ceg 260-01: Digital Computing Hardware/Switching Circuits, 2010 Wright State University - Main Campus
Ceg 260-01: Digital Computing Hardware/Switching Circuits, Meilin Liu
Computer Science & Engineering Syllabi
We will discuss and cover basic digital, combinational and sequential logic systems. Labs will be used to gain valuable practical experience in implementing elementary circuits and logic designs.
Ceg 416-01: Matrix Computations, 2010 Wright State University - Main Campus
Ceg 416-01: Matrix Computations, Ronald F. Taylor
Computer Science & Engineering Syllabi
This course is a survey of numerical methods in linear algebra for application to problems in engineering and the sciences. Emphasis is on using modern software tools on high performance computing systems. This course covers the mathematics of linear equations, eigenvalue problems, singular value decomposition, and least squares. Material covered will be relevant to applications areas such as structural analysis, heat transfer, neural networks, mechanical vibrations, and image processing in biomedical engineering. A familiarity with MATLAB is useful, and the ability to program in languages such as CIC++ or Fortran is very important. A basic knowledge of matrix algebra is …
Ceg 211-01: Pc Networking Ii, 2010 Wright State University - Main Campus
Ceg 211-01: Pc Networking Ii, Karen Meyer
Computer Science & Engineering Syllabi
Focuses on server installation, administration, multiple protocol integration, systems maintenance, and trouble-shooting. Includes hands-on class and laboratory assignments.
Accurate And Stable Numerical Methods For Solving Micro Heat Transfer Models In An N-Carrier System In Spherical Coordinates, 2010 Louisiana Tech University
Accurate And Stable Numerical Methods For Solving Micro Heat Transfer Models In An N-Carrier System In Spherical Coordinates, Di Zhao
Doctoral Dissertations
Energy exchange between electrons and phonons in metal provides the best example in describing non-equilibrium heating during the ultrafast transient. In times comparable to the thermalization and relaxation time of electrons and phonons, which are in the range of a few to several tens of picoseconds, heat continuously flows from hot electrons to cold phonons through mutual collisions. Consequently, electron temperature continuously decreases whereas phonon temperature continuously increases until thermal equilibrium is reached. Tien developed the well-known parabolic two-step model for describing the non-equilibrium heating in the electron-phonon system in 1992, and Tzou developed the parabolic model for the non-equilibrium …
Mixed Operators In Compressed Sensing, 2010 University of California - Los Angeles
Mixed Operators In Compressed Sensing, Matthew A. Herman, Deanna Needell
CMC Faculty Publications and Research
Applications of compressed sensing motivate the possibility of using different operators to encode and decode a signal of interest. Since it is clear that the operators cannot be too different, we can view the discrepancy between the two matrices as a perturbation. The stability of L1-minimization and greedy algorithms to recover the signal in the presence of additive noise is by now well-known. Recently however, work has been done to analyze these methods with noise in the measurement matrix, which generates a multiplicative noise term. This new framework of generalized perturbations (i.e., both additive and multiplicative noise) extends the prior …
Managing Media Rich Geo-Spatial Annotations For A Map-Based Mobile Application Using Clustering, 2010 Nanyang Technological University
Managing Media Rich Geo-Spatial Annotations For A Map-Based Mobile Application Using Clustering, Khasfariyati Razikin, Dion Hoe-Lian Goh, Ee Peng Lim, Aixin Sun, Yin-Leng Theng, Thi Nhu Quynh Kim, Kalyani Chatterjea, Chew-Hung Chang
Research Collection School Of Computing and Information Systems
With the prevalence of mobile devices that are equipped with wireless Internet capabilities and Global Positioning System (GPS) functionality, the creation and access of user-generated content are extended to users on the go. Such content are tied to real world objects, in the form of geospatial annotations, and it is only natural that these annotations are visualized using a map-based approach. However, viewing maps that are filled with annotations could hinder the serendipitous discovery of data, especially on the small screens of mobile devices. This calls for a need to manage the annotations. In this paper, we introduce a mobile …
Pagesense: Style-Wise Web Page Advertising, 2010 Singapore Management University
Pagesense: Style-Wise Web Page Advertising, Lusong Li, Tao Mei, Xiang Niu, Chong-Wah Ngo
Research Collection School Of Computing and Information Systems
This paper presents an innovative style-wise advertising platform for web page. Web page “style” mainly refers to visual effects, such as color and layout. Unlike the most popular ad-network such as Google AdSense which needs publishers to change the original structure of their pages and define the position and style of the embedded ads manually, stylewise page advertising aims to automatically deliver styleconsistent ads at proper positions within the web page, without breaking the layout of the original page. Our system is motivated from the fact that almost 90% web pages contain blank regions without any content. Given a web …
What Is Twitter, A Social Network Or A News Media?, 2010 Singapore Management University
What Is Twitter, A Social Network Or A News Media?, Haewoon Kwak, Changhyun Lee, Hosung: Moon Park
Research Collection School Of Computing and Information Systems
Twitter, a microblogging service less than three years old, commands more than 41 million users as of July 2009 and is growing fast. Twitter users tweet about any topic within the 140-character limit and follow others to receive their tweets. The goal of this paper is to study the topological characteristics of Twitter and its power as a new medium of information sharing.We have crawled the entire Twitter site and obtained 41.7 million user profiles, 1.47 billion social relations, 4,262 trending topics, and 106 million tweets. In its follower-following topology analysis we have found a non-power-law follower distribution, a short …
Semantics-Empowered Text Exploration For Knowledge Discovery, 2010 Wright State University - Main Campus
Semantics-Empowered Text Exploration For Knowledge Discovery, Delroy H. Cameron, Pablo N. Mendes, Amit P. Sheth, Victor Chan
Kno.e.sis Publications
The interaction paradigm offered by most contemporary Web Information Systems is a search-and-sift paradigm in which users manually seek information using hyperlinked documents. This paradigm is derived from a document-centric model that gives users minimal support for scanning through high volumes of text. We present a novel information exploration paradigm based on a data-centric view of corpora, along with a prototype implementation that demonstrates the value in content-driven navigation. We leverage semantic metadata to link data in documents by exploiting named relationships between entities. We also present utilities for gathering user generated navigation trails, critical for knowledge discovery. We discuss …
What Goes Around Comes Around - Improving Linked Open Data Through On-Demand Model Creation, 2010 Wright State University - Main Campus
What Goes Around Comes Around - Improving Linked Open Data Through On-Demand Model Creation, Christopher Thomas, Wenbo Wang, Pankaj Mehra, Delroy H. Cameron, Pablo N. Mendes, Amit P. Sheth
Kno.e.sis Publications
Web 2.0 has changed the way we share and keep up with information. We communicate through social media platforms and make the information we exchange to a large extent publicly available. Linked Open Data (LOD) follows the same paradigm of sharing information but also makes it machine accessible. LOD provides an abundance of structured information albeit in a less formally rigorous form than would be desirable for Semantic Web applications. Nevertheless, most of the LOD assertions are community reviewed and we can rely on their accuracy to a large extent. In this work we want to follow the Web 2.0 …
Dynamic Associative Relationships On The Linked Open Data Web, 2010 Wright State University - Main Campus
Dynamic Associative Relationships On The Linked Open Data Web, Pablo N. Mendes, Pavan Kapanipathi, Delroy H. Cameron, Amit P. Sheth
Kno.e.sis Publications
We provide a definition of context based on theme, time and location, and propose a mixed retrieval/extraction model for the dynamic suggestion of trending relationships to LOD resources.
A Pda Intervention To Sustain Smoking Cessation In Clients With Socioeconomic Vulnerability, 2010 University of Nebraska Medical Center
A Pda Intervention To Sustain Smoking Cessation In Clients With Socioeconomic Vulnerability, Lynne Buchanan, Deepak Khazanchi
Information Systems and Quantitative Analysis Faculty Publications
This article describes a pilot study to explore use of a personal digital assistant (PDA) to sustain smoking cessation after discharge in clients with socioeconomic vulnerability. The major aim is to describe technology acceptance (perceived ease of use, usefulness, and attitude), portability, technical difficulty, satisfaction, and use time. The sample includes 31 medical surgical clients with average age of 47.35 (±13.3), average household income of $13,629 (±8,204), average number in the household of 2.67 (±2.22), and average education of 11th grade. The results demonstrate mean use time of 9.28 (±3.23) hr, or about 1 hr over 8 weeks. Technology acceptance …
Developing Cyberspace Data Understanding Using Crisp-Dm For Host-Based Ids Feature Mining, 2010 Air Force Institute of Technology
Developing Cyberspace Data Understanding Using Crisp-Dm For Host-Based Ids Feature Mining, Joseph R. Erskine, Gilbert L. Peterson, Barry E. Mullins, Michael R. Grimaila
Faculty Publications
Current intrusion detection systems (IDS) generate a large number of specific alerts, but typically do not provide actionable information. Compounding this problem is the fact that many alerts are false positive alerts. This paper applies the Cross Industry Standard Process for Data Mining (CRISP-DM) to develop an understanding of a host environment under attack. Data is generated by launching scans and exploits at a machine outfitted with a set of host-based forensic data collectors. Through knowledge discovery, features are selected to project human understanding of the attack process into the IDS model. By discovering relationships between the data collected and …
System Design And Algorithmic Development For Computational Steering In Distributed Environments, 2010 New Jersey Institute of Technology
System Design And Algorithmic Development For Computational Steering In Distributed Environments, Qishi Wu, Michelle Zhu, Yi Gu, Nageswara S.V. Rao
Department of Computer Science Faculty Scholarship and Creative Works
Supporting visualization pipelines over wide-area networks is critical to enabling large-scale scientific applications that require visual feedback to interactively steer online computations. We propose a remote computational steering system that employs analytical models to estimate the cost of computing and communication components and optimizes the overall system performance in distributed environments with heterogeneous resources. We formulate and categorize the visualization pipeline configuration problems for maximum frame rate into three classes according to the constraints on node reuse or resource sharing, namely no, contiguous, and arbitrary reuse. We prove all three problems to be NP-complete and present heuristic approaches based on …
Inter Spem Et Metum, Fiat Lux, 2010 Rhode Island College
Inter Spem Et Metum, Fiat Lux, Michael A. Mota
Honors Projects
Explores the design and development of a simple, 3D flight simulator. The resulting application allows users to pilot an abstract human avatar and to create free-hand strokes and physically-based explosions onto the environment through a ball discharge meta-game feature. Uses the C++ language, and the ancillary programming API libraries, OpenGL, GLEW, and Win32.
Volume 03, 2010 Longwood University
Volume 03, Cheryl Peck, Charles Hoever, Longwood Theater Department, Brittany Anderson, J. Ervin Sheldon, Richard Hayden, Yuri Calustro, Candice Fleming, Rebecca Franklin, Ashley Yocum, Danielle M. Jagoda, Cristina M. Valdivieso, Jameka Jones, Amy Ellis, Ashley Maser, Erikk Shupp, Jamie Yurasits, Joshua Davis, Alexander Leonhart, Kenny Wolfe, Sally Meadows, J. Haley, Amy Jackson, Morgan Howard, Adrienne Heinbaugh, Melissa Dorton, Ciarra Stalker
Incite: The Journal of Undergraduate Scholarship
Introduction from Dean Dr. Charles Ross
Little Shop of Horrors by Longwood Theater Department
Who Has the Hottest Hotsauce in Farmville: A Quantitative Comparison of Sauces from Local Restaurants by Cheryl Peck and Charles Hoever
Precipitation Effects on the Growth of White Oaks and Virginia Pines on the Mt. Vernon Plantation by Brittany Anderson
Design and Synthesis of Novel Ion Binding Molecules for Self-Assembly and Sensing Applications by J. Ervin Sheldon
A Statistical Analysis of Algorithms for Playing SameGame by Richard Hayden
Intersecting Cylinders at Arbitrary Angles by Yuri Calustro
Putting a Foot in the Revolving Door: Strategies for Reducing …
Cold War Origins Of The International Federation For Information Processing, 2010 Singapore Management University
Cold War Origins Of The International Federation For Information Processing, Ksenia Tatarchenko
Research Collection College of Integrative Studies
The International Federation for Information Processing (IFIP) was born as a nongovernmental federation with the main goal of bringing together computer professionals from countries in the East and West. This article examines the Cold War context of the IFIP's origins and the mechanisms its founders used to reconcile computing and politics and to construct computing as an international discipline.
Efficient Skyline Maintenance For Streaming Data With Partially-Ordered Domains, 2010 Singapore Management University
Efficient Skyline Maintenance For Streaming Data With Partially-Ordered Domains, Yuan Fang, Chee-Yong Chan
Research Collection School Of Computing and Information Systems
We address the problem of skyline query processing for a count-based window of continuous streaming data that involves both totally- and partially-ordered attribute domains. In this problem, a fixed-size buffer of the N most recent tuples is dynamically maintained and the key challenge is how to efficiently maintain the skyline of the sliding window of N tuples as new tuples arrive and old tuples expire. We identify the limitations of the state-of-the-art approach STARS, and propose two new approaches, STARS+ and SkyGrid, to address its drawbacks. STARS+ is an enhancement of STARS with three new optimization techniques, while SkyGrid is …
Shifting Inference Control To User Side: Architecture And Protocol, 2010 Singapore Management University
Shifting Inference Control To User Side: Architecture And Protocol, Yanjiang Yang, Yingjiu Li, Robert H. Deng, Feng Bao
Research Collection School Of Computing and Information Systems
Inference has been a longstanding issue in database security, and inference control, aiming to curb inference, provides an extra line of defense to the confidentiality of databases by complementing access control. However, in traditional inference control architecture, database server is a crucial bottleneck, as it enforces highly computation-intensive auditing for all users who query the protected database. As a result, most auditing methods, though rigorously studied, are not practical for protecting large-scale real-world database systems. In this paper, we shift this paradigm by proposing a new inference control architecture, entrusting inference control to each user's platform that is equipped with …