Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Theses/Dissertations

Institution
Keyword
Publication Year
Publication

Articles 631 - 659 of 659

Full-Text Articles in Business

A Study Of Computer Hardware And Software Usage In The Wichita, Kansas Area Business Community, Cheryl L. Rogers Jul 1994

A Study Of Computer Hardware And Software Usage In The Wichita, Kansas Area Business Community, Cheryl L. Rogers

Electronic Theses & Dissertations

For the purpose of informationally equipping educational institutions to prepare students for a future in the business world, this study was conducted with the intent of identifying and analyzing the current computer hardware and software used for word processing, spreadsheet, database, and desktop publishing tasks in Wichita, Kansas, selected area businesses and industries. In addition, this study was designed to determine the factors the business community respondents considered in choosing their computer hardware and software. Finally, the study was intended to ascertain the length of time since computer hardware and software changes had been made within the responding companies and …


Graphical Oodb Modeling For Medical Information Standards (Gommis), Jiping Liu Jan 1994

Graphical Oodb Modeling For Medical Information Standards (Gommis), Jiping Liu

Theses

The graphical representation of database schemata has been a useful tool for the designer and users of database systems. Such a tool for OODB schemata should incorporate a wide variety of symbols which cover most concepts of existing Object-Oriented Database (OODB), so it is sufficient to support a diverse group of object-oriented data models.

In this paper we created a. graphical representation, using the OOdini system and language, of the European Prestandard for Medical Informatics on Message Exchange of Laboratory Information. This European Prestandard describes a standardized format for messages to be exchanged between a. health care provider and a …


Translation Of Semantic Aspects Of Oodini Graphical Representation To Onto Oodb Data Definition Language, Xiaoyong Wang Jan 1994

Translation Of Semantic Aspects Of Oodini Graphical Representation To Onto Oodb Data Definition Language, Xiaoyong Wang

Theses

In this thesis we present a system to translate the semantic elements in the graphical schema language of OODINI from API of OODAL to the Type definition of ONTOS DB. To translate semantic constraints of the graphical language, we patch more information to existent class data structure in API of OODAL. After a brief review of OODINI, ONTOS DB and the existent translator without the ability to translate semantic constraints, we describe in detail the methods to translate the essential relationship. dependent relationship, multi-valued essential relationship and multi-valued dependent relationship. We employ an Inverse Reference to a "Set of" Type …


An Analysis Of The Root Causes Of Delays And Deficiencies In The Development Of Embedded Software For Air Force Weapon Systems, Jay R. Hopkins, Curtis De Keyrel Dec 1993

An Analysis Of The Root Causes Of Delays And Deficiencies In The Development Of Embedded Software For Air Force Weapon Systems, Jay R. Hopkins, Curtis De Keyrel

Theses and Dissertations

The importance of embedded software, used in every subsystem of ah major weapon systems used by the United States Air Force, has increased drastically over the last decades. However, in spite of the regulations currently in existence, developing and acquiring software which meets the user requirements within the original cost and schedule estimates continues to be difficult. At the same time, the Air Force has pushed to improve the development process with the Total Quality Management TQM program. The primary method used to improve the process has been to create metrics, collect data on these metrics, and then perform a …


Protocol Conformance Test Generation Using Circular Uio With Overlapping, Sesharao Patchipala Jan 1993

Protocol Conformance Test Generation Using Circular Uio With Overlapping, Sesharao Patchipala

Theses

The purpose of the protocol conformance testing is to ensure that protocol implementations are consistent with their specifications. After the U-method was introduced, several test methods based on the Unique Input/Output (UI0) sequences which were the main concept in the U-method have been proposed, namely, the RCP-method, MUIO-method, MUIO with overlapping method, B-method, C-method. A good test sequence must be short and have wide fault coverage. By comparing the test sequences generated by the above test methods based on experimental results, reveals that the test sequences by the MUIO with overlapping method are the worst in quality but their lengths …


Computer Implementation Of Mason's Rule And Software Development Of Stochastic Petri Nets, Xiaoyong Zhao Jan 1993

Computer Implementation Of Mason's Rule And Software Development Of Stochastic Petri Nets, Xiaoyong Zhao

Theses

A symbolic performance analysis approach for discrete event systems can be formulated based on the integration of Petri nets and Moment Generating Function concepts [1-3]. The key steps in the method include modeling a system with arbitrary stochastic Petri nets (ASPN), generation of state machine Petri nets with transfer functions, derivation of equivalent transfer functions, and symbolic derivation of transfer functions to obtain the performance measures. Since Mason's rule can be used to effectively derive the closed-form transfer function, its computer implementation plays a very important role in automating the above procedure. This thesis develops the computer implementation of Mason's …


Systems Integration In Pharmaceutical Industry Using Object-Oriented Expert System Technology, Korrapolu Reddy Jan 1993

Systems Integration In Pharmaceutical Industry Using Object-Oriented Expert System Technology, Korrapolu Reddy

Theses

SPHINX is an object-oriented expert system addressed to solve the burning problems of pharmaceutical industry. SPHINX stands for Systems integration in PHarmaceutical INdustry using object-oriented eXpert system technology.

Various problems that American pharmaceutical industries are facing have been explained. Using the revolutionary object-oriented concepts and the powerful expert systems technology, it has been shown how a prescription can be written to solve all the problems of pharmaceutical industries. A problem "Minimizing the wastage of Interferon" has been taken to demonstrate the power of Object-oriented Expert System technology.


Porting Cosmos Expert System From Unix To Dos, Ching-Jeng Chiu Oct 1992

Porting Cosmos Expert System From Unix To Dos, Ching-Jeng Chiu

Theses

COSMOS is an object-oriented Knowledge Based System building Tools (KBSTs) to solve problem in engineering industry. COSMOS stands for C++ Object-oriented System Made for expert System development.

In order to provide more people those who don't have a Sun workstation to use this expert system, our task is porting COSMOS form UNIX to DOS.

Because the differents of workstation environment, the user interface and structure of original COSMOS no longer can be used, therefore we made some necessary change before we porting it to IBM Personal Computer.

In stead of X Window system®, we implemented ObjectWindows® runs on Microsoft WindowsTM. …


Performance Analysis Of Queueing Systems With Synchronous Server, Wonmu Hur Oct 1992

Performance Analysis Of Queueing Systems With Synchronous Server, Wonmu Hur

Theses

The performance measures are derived for a queueing system which is characterized by its synchronous server operations. This property is the one which normal queueing systems lack. A system of this nature contains a single common server to which multiple number of buffers are connected in parallel, where the server operates only when all system buffers are occupied.

In this thesis, the analysis is carried out focusing on the simplest system involving only two buffers. Throughout the analysis, a symmetricity of the system is assumed (i.e., system is symmetrical in terms of arriving customer statistics.). Also assumed are the Poisson …


Domain Analysis Within The Gensif Framework, Heiko Thimm Oct 1992

Domain Analysis Within The Gensif Framework, Heiko Thimm

Theses

The GenSIF framework which is targeted towards very large, distributed, and complex software systems recently has been proposed to accomplish a form of systems engineering and systems development in which the issue of systems integration is considered from the beginning on.

One of the components of GenSIF is domain analysis. Domain analysis leads to the design of a domain model. The specific needs GenSIF has in that area were investigated with an emphasis on domain modeling. Main points addressed in that investigation were the issue regarding the relevant information for the domain modeling process and the required type of domain …


Character Recognition Using String Matching, Xiaozhi Ye Oct 1992

Character Recognition Using String Matching, Xiaozhi Ye

Theses

To handle noisy and distorted pattern is the use of similarity or distance measures. A similarity or distance measure can be defined between a representation of an unknown pattern and a representation of a prototype pattern. Recognition of the unknown pattern can be carried out on the basis of the maximum-similarity or minimum distance criterion (Bunke 1990) This approach is proposed to recognize the noisy or distorted character image. In this work, a directly string representation of the pattern ( prototype as well as unknown input) using the histogram method, a decision procedure for classification is the well known Levenshtein …


Design And Implementation Of Two Text Recognition Algorithms, Madhumathi Yendamuri Oct 1992

Design And Implementation Of Two Text Recognition Algorithms, Madhumathi Yendamuri

Theses

This report presents two algorithms for text recognition. One is a neural-based orthogonal vector with pseudo-inverse approach for pattern recognition. A method to generate N orthogonal vectors for an N-neuron network is also presented. This approach converges the input to the corresponding orthogonal vector representing the prototype vector. This approach can restore an image to the original image and thus has error recovery capacility. Also, the concept of sub-networking is applied to this approach to enhance the memory capacity of the neural network. This concept drastically increases the memory capacity of the network and also causes a reduction of the …


Graphical Image Persistence And Code Generation For Object Oriented Databases, Subrata Chatterjee May 1992

Graphical Image Persistence And Code Generation For Object Oriented Databases, Subrata Chatterjee

Theses

Attached is the detailed description of the design and implementation of graphical image persistence and code generation for object oriented databases. Graphical image persistent is incorporated into a graphics editor called OODINI. OODINI creates and manipulates graphical schemas for object-oriented databases. This graphical image on secondary storage is then translated into an abstract, generic code for dual model databases. This abstract code, DAL can then be converted into different dual model database languages. We provide an example by generating code for the VODAK Data Modeling language. It is also possible to generate a different abstract language code, OODAL from a …


New Algorithms For Mid-Crack Codes In Image Processing, Wai-Tak Wong May 1992

New Algorithms For Mid-Crack Codes In Image Processing, Wai-Tak Wong

Theses

The chain code is a widely-used description for a contour image. Recently, a mid-crack code algorithm has been proposed as another more precise method for image representation. New algorithms using this new mid-crack code for image representation, restoration, and skeletonization are developed. The efficiency and accuracy can be increased obviously.

Firstly, the conversion of a binary image with multiple regions into the mid-crack codes is presented. A fast on-line implementation can be achieved using tables look-up. The input binary image may contain several object regions and their mid-crack codes can be extracted at the same time in a single-pass row-by-row …


An Implementation And Evaluation Of Distributed Information System Based On The Osca Architecture Guidelines, Babita Masand May 1992

An Implementation And Evaluation Of Distributed Information System Based On The Osca Architecture Guidelines, Babita Masand

Theses

The concepts in this thesis discuss and evaluate the need for systems integration. As a conceptual architecture, the OSCATM architecture is investigated. A prototype of the CS Department distributed information system is built following the guidelines and standards of this conceptual architecture. This prototype is implemented in 'C'. RPC (remote procedure call) is used for the communication channel to implement the distributed environment. Conclusions and results that were achieved by implementing this prototype are presented. The main outcome of this thesis is the introduction of the infrastructure to the GenSIF framework.


Decomposition Of Geometric-Shaped Structuring Elements And Optimization On Euclidean Distance Transformation Using Morphology, Hong Wu May 1992

Decomposition Of Geometric-Shaped Structuring Elements And Optimization On Euclidean Distance Transformation Using Morphology, Hong Wu

Theses

Mathematical morphology which is based on geometric shape, provides an approach to the processing and analysis of digital images. Several widely-used geometric-shaped structuring elements can be used to explore the shape characteristics of an object. In first chapter, we present a unified technique to simplify the decomposition of various types of big geometric-shaped structuring elements into dilations of smaller structuring components by the use of a mathematical transformation. Hence, the desired morphological erosion and dilation are equivalent to a simple inverse transformation over the result of operations on the transformed decomposable structuring elements. We also present a strategy to decompose …


A Machine Entity For A Coordinate Measurement Machine : The Generic Workcell Project, Richard C. Meyer Jan 1992

A Machine Entity For A Coordinate Measurement Machine : The Generic Workcell Project, Richard C. Meyer

Theses

The Center for Manufacturing Systems (CMS) department at New Jersey Institute of Technology and Siemens Corporate Research located in Princeton have agreed to jointly implement a research project in generic workcell control architectures. This paper discusses the module, called a Machine Entity, developed by the author that interfaces the Brown & Sharpe Coordinate Measurement Machine located on the CMS factory floor with the cell control software. The module has been designed in such a manner to simplify the development of future Machine Entities, thereby reducing the time required to integrate the CMS factory floor.


Real-Tv : Rtp/L3'S Visual Monitor, Richard Czop Jan 1992

Real-Tv : Rtp/L3'S Visual Monitor, Richard Czop

Theses

Today many real-world activities are being monitored and controlled by some type of micro-processor based system. Emphasis is placed on manufacturing and controlling through the use of computers. The inherent nature of these real-world applications makes them difficult to control and monitor. They must be built meeting strict timing constraints and must be predictable. We need to develop simplistic, reliable, and cost effective methods for building, evaluating, monitoring and controlling these complex systems. These tools should provide the user with system insight. At the New Jersey Institute of Technology Real-Time Computing Laboratory, we are building a system that will provide …


Dynamic Machine Scheduling, Expansion, And Control Of A Generic Workcell, Peter A. Murray Jan 1992

Dynamic Machine Scheduling, Expansion, And Control Of A Generic Workcell, Peter A. Murray

Theses

Factory automation has come a long way since the invention of the automatic flour mill. A workcell is a group of machines (robots) working together to produce a product. In the past workcells have been hard wired using methods such as Programmable Logic Controllers (PLCs). To change a part of this system would require reprogramming the entire system.

The Generic Work Cell (GWC) is a dynamic architecture which allows a workcell to be modified on the fly. The architecture enables the generation of new cells with minimal effort, and the modification of the system without reprogramming the entire system. The …


Searching For Orthogonal States Of Neural Networks, Heng Wang Jan 1992

Searching For Orthogonal States Of Neural Networks, Heng Wang

Theses

Two approaches to find orthogonal states of neural network are presented in the paper. The first approach is a recursive one, it builds N orthogonal vectors based on N /2 orthogonal vectors. The second approach is a formula approach, in which orthogonal vectors can be obtained using a formula. Using these approaches, orthogonal states of neural network are found. Some properties of the neural network built on these orthogonal vectors are presented in Appendix A and some examples are given in Appendix B.


An Experimental Sequence Examining The Effect Of Task Type, Memory Condition, And Display Presentation Type On Performance Time And Error Rate, Using Columnar Table Versus Vertical Bar Graph Versus Line Graph, Suparna Das Oct 1991

An Experimental Sequence Examining The Effect Of Task Type, Memory Condition, And Display Presentation Type On Performance Time And Error Rate, Using Columnar Table Versus Vertical Bar Graph Versus Line Graph, Suparna Das

Theses

A total of 126 subjects at various levels of school and a health related manufacturing firm participated in three experiments that compared Tables, Line graphs and Bar graphs forms of data presentation. The experiments were performed each consisting of a training task followed by answering some questions based on the presented material. The experimental series were presented to six groups. Group 1, 3, 5 viewed Line graphs, Tables or Bar graphs respectively while answering the questions while the other three groups answered questions based on memory of either Line graphs, Table or Bar graph presentation.

The independent variables were:

  1. Memory …


The Performance Of Training Pattern Sets In A New Art-Based Neural Architecture For Image Enhancement, Fu-Chun Chang May 1991

The Performance Of Training Pattern Sets In A New Art-Based Neural Architecture For Image Enhancement, Fu-Chun Chang

Theses

Neural network can be applied on the image enhancement after adding another two layers into the Adaptive Resonance Theory architectures (ART 1). The analysis for selecting a nice training pattern set associate the appropriate vigilance values is the main concerns in this thesis. For a single training pattern ,the network can act as a mathematical morphology operators such as erosion , dilation, opening and closing. With more than one training patterns in the network, 16 experiments are tested and are compared to each other in order to find the best selection for doing the image enhancement work. With both the …


Rule-Based Module And Object-Oriented Design For Optical Character Recognition, Min Gao May 1991

Rule-Based Module And Object-Oriented Design For Optical Character Recognition, Min Gao

Theses

In this thesis, I present a optical character recognition technique based on the rule-based module and object-oriented design. A document image is first scanned, and then segmented into isolated characters by the use of projection profiles. The recognition procedures include three steps: contour extraction, strokes detection and rule-based classification. The contour extraction is to extract the outbound boundary and to perform the boundary linking and noise removal. The stroke detection is to detect the features or strokes of the outbound boundary, such as horizontal/vertical lines, left/right slash lines and left-/right-opened curves. The rule-based classification consists of two rules: character definition …


Computer Use In The Scientific Office, Douglas L. Miller Apr 1991

Computer Use In The Scientific Office, Douglas L. Miller

Psychology Theses & Dissertations

Over the past two decades computers in research and development organizations have become a complex and integral part of the work process. Yet to date only a handful of systematic investigations have addressed issues involving scientists' or other professionals' use of computers, and very little is known about factors influencing use (Bikson and Gutek, 1983; Blacker and Brown, 1986; Collopy, 1988; Gasser, 1986; Helander, 1985; Nickolson, 1985; Pope, 1985). As a result, this research was designed to address four objectives. The first was to develop and evaluate a descriptive model of variables influencing scientists' computer use. The second objective was …


Actuarial Computation Of Multiemployer Pension Plan Withdrawal Liability, Kelly A. Renze Jan 1991

Actuarial Computation Of Multiemployer Pension Plan Withdrawal Liability, Kelly A. Renze

Presidential Scholars Theses (1990 – 2006)

This project helps to demonstrate how pension actuaries must keep a constant eye on new laws. The pension industry is constantly bombarded with new laws which force them to alter policies and procedures. Because of the huge number of laws, it is difficult for all employees to fully understand every law. During my stay at the Principal, I discovered that many passages are interpreted differently by different people. I also uncovered some details through my research that other employees were not aware of.

Because of this complexity, it is often necessary to assign to one person, such as myself, the …


An Underwater Science And Resource Database Management System And Proposed Applications To Marine Geographic Information Systems, Ivar Babb Jan 1990

An Underwater Science And Resource Database Management System And Proposed Applications To Marine Geographic Information Systems, Ivar Babb

Theses and Major Papers

The National Undersea Research Program (NURP) is a federally-funded program that provides scientists with modern in situ technology that allows them to conduct research that goes beyond the constraints of traditional oceanographic methodology. NURP is comprised of five regional centers that administer underwater science, and through the principal investigators that are supported generate a vast quantity of diverse data. This data and information bank consists of the following: raw environmental data, logistical data, locational data, information about the scientists, video and still photograph documentation, and publication information. This paper describes the theory behind the implementation of a Database Management System …


Cost-Benefit Analysis Of Computer Systems In Community Hospital Food Service, Beverly Kittle Sep 1983

Cost-Benefit Analysis Of Computer Systems In Community Hospital Food Service, Beverly Kittle

Loma Linda University Electronic Theses, Dissertations & Projects

Cost containment has always been a major concern to managers. Therefore, any system which decreases costs by reducing labor time is given serious evaluation.

A five week comparison was made between financial record keeping by the manual method and by the computerized method. A continuous time study was utilized to make this comparison.

Over the five weeks, an average overall time savings of 245 minutes for the computerized versus the manual method was observed. The net savings to the institution was 223 minutes per week which translates to approximately $140.00 per month over a 5 year period.

The rapid payback …


Are The Needs Of Industry For Data Processing Programmers Being Adequately Supported By Technical Training Programs In Oklahoma, Dale I. Sare Jul 1973

Are The Needs Of Industry For Data Processing Programmers Being Adequately Supported By Technical Training Programs In Oklahoma, Dale I. Sare

Electronic Theses & Dissertations

In 1970 over 40,000 computers were in use in the United States and 1,000 more on order from manufacturers. Every major newspaper had published at least one news article or editorial about computers during 1970. These articles reported how computers function, the speed at which they function, their limitations and how they have, and are continuing to become, a complex part of the business world and social affairs of man.


Developing An Optical Scanner Card For Computerized Football Scouting, Curtis Lowell Byrnes Jan 1970

Developing An Optical Scanner Card For Computerized Football Scouting, Curtis Lowell Byrnes

All Master's Theses

The purpose of this study is to develop an optical scanner scouting card to use in conjunction with the computer for football scouting.