Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Computer Sciences

2001

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 100

Full-Text Articles in Engineering

Automated Online News Classification With Personalization, Chee-Hong Chan, Aixin Sun, Ee Peng Lim Dec 2001

Automated Online News Classification With Personalization, Chee-Hong Chan, Aixin Sun, Ee Peng Lim

Research Collection School Of Computing and Information Systems

Classification of online news, in the past, has often been done manually. In our proposed Categorizor system, we have experimented an automated approach to classify online news using the Support Vector Machine (SVM). SVM has been shown to deliver good classification results when ample training documents are given. In our research, we have applied SVM to personalized classification of online news.


Development Of A Systems Engineering Model Of The Chemical Separations Process: Quarterly Progress Report 8/16/01- 11/15/01, Yitung Chen, Randy Clarksean, Darrell Pepper Nov 2001

Development Of A Systems Engineering Model Of The Chemical Separations Process: Quarterly Progress Report 8/16/01- 11/15/01, Yitung Chen, Randy Clarksean, Darrell Pepper

Separations Campaign (TRP)

The AAA program is developing technology for the transmutation of nuclear waste to address many of the long-term disposal issues. An integral part of this program is the proposed chemical separations scheme.

Two activities are proposed in this Phase I task: the development of a systems engineering model and the refinement of the Argonne code AMUSE (Argonne Model for Universal Solvent Extraction). The detailed systems engineering model is the start of an integrated approach to the analysis of the materials separations associated with the AAA Program. A second portion of the project is to streamline and improve an integral part …


Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 18, Number 3, November 2001, College Of Engineering And Computer Science, Wright State University Nov 2001

Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 18, Number 3, November 2001, College Of Engineering And Computer Science, Wright State University

BITs and PCs Newsletter

An eight page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.


Pickup And Delivery Problem With Time Windows: Algorithms And Test Case Generation, Hoong Chuin Lau, Zhe Liang Nov 2001

Pickup And Delivery Problem With Time Windows: Algorithms And Test Case Generation, Hoong Chuin Lau, Zhe Liang

Research Collection School Of Computing and Information Systems

In the pickup and delivery problem with time windows (PDPTW), vehicles have to transport loads from origins to destinations respecting capacity and time constraints. In this paper, we present a two-phase method to solve the PDPTW. In the first phase, we apply a novel construction heuristics to generate an initial solution. In the second phase, a tabu search method is proposed to improve the solution. Another contribution of this paper is a strategy to generate good problem instances and benchmarking solutions for PDPTW, based on Solomon's benchmark test cases for VRPTW. Experimental results show that our approach yields very good …


Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 18, Number 2, October 2001, College Of Engineering And Computer Science, Wright State University Oct 2001

Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 18, Number 2, October 2001, College Of Engineering And Computer Science, Wright State University

BITs and PCs Newsletter

An eight page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.


Convergence Classes And Spaces Of Partial Functions, Anthony K. Seda, Roland Heinze, Pascal Hitzler Oct 2001

Convergence Classes And Spaces Of Partial Functions, Anthony K. Seda, Roland Heinze, Pascal Hitzler

Computer Science and Engineering Faculty Publications

We study the relationship between convergence spaces and convergence classes given by means of both nets and filters, we consider the duality between them and we identify in convergence terms when a convergence space coincides with a convergence class. We examine the basic operators in the Vienna Development Method of formal systems development, namely, extension, glueing, restriction, removal and override, from the perspective of the Logic for Computable Functions. Thus, we examine in detail the Scott continuity, or otherwise, of these operators when viewed as operators on the domain (XY) of partial functions mapping X into …


On Clustering And Retrieval Of Video Shots, Chong-Wah Ngo, Ting-Chuen Pong, Hong-Jiang Zhang Oct 2001

On Clustering And Retrieval Of Video Shots, Chong-Wah Ngo, Ting-Chuen Pong, Hong-Jiang Zhang

Research Collection School Of Computing and Information Systems

Clustering of video data is an important issue in video abstraction, browsing and retrieval. In this paper, we propose a two-level hierarchical clustering approach by aggregating shots with similar motion and color features. Motion features are computed directly from 20 tensor histograms, while color features are represented by 30 color histograms. Cluster validity analysis is further applied to automatically determine the number of clusters at each level. Video retrieval can then be done directly based on the result of clustering. The proposed approach is found to be useful particularly for sports games, where motion and color are important visual cues …


Reifying Communication At The Application Level, Andrew P. Black, Jie Huang, Jonathan Walpole Oct 2001

Reifying Communication At The Application Level, Andrew P. Black, Jie Huang, Jonathan Walpole

Computer Science Faculty Publications and Presentations

Middleware, from the earliest RPC systems to recent Object-Oriented Remote Message Sending (RMS) systems such as Java RMI and CORBA, claims transparency as one of its main attributes. Coulouris et al. define transparency as “the concealment from the … application programmer of the separation of components in a distributed system.” They go on to identify eight different kinds of transparency.

We considered titling this paper “Transparency Considered Harmful”, but that title is misleading because it implies that all kinds of transparency are bad. This is not our view. Rather, we believe that the choice of which transparencies should be offered …


Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 18, Number 1, September 2001, College Of Engineering And Computer Science, Wright State University Sep 2001

Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 18, Number 1, September 2001, College Of Engineering And Computer Science, Wright State University

BITs and PCs Newsletter

A twelve page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.


Real-Time Travel Time Estimation Using Macroscopic Traffic Flow Models, Pushkin Kachroo, Kaan Ozbay, Antoine G. Hobeika Aug 2001

Real-Time Travel Time Estimation Using Macroscopic Traffic Flow Models, Pushkin Kachroo, Kaan Ozbay, Antoine G. Hobeika

Electrical & Computer Engineering Faculty Research

This paper presents the estimation of travel time on highways based on macroscopic modelling. The focus is on real-time values as compared to average or static values. The macroscopic models are used for distributed and time/space lumped settings and corresponding travel time estimation functions and algorithms are developed. The implications of these algorithms for the implementation of various incident management and traffic control strategies are also discussed.


Analysis Of A New Vehicle Scheduling And Location Problem, Ebru K. Bish, Thin Yin Leong, Chun-Lun Li, Jonathan W. C. Ng, David Simchi-Levi Aug 2001

Analysis Of A New Vehicle Scheduling And Location Problem, Ebru K. Bish, Thin Yin Leong, Chun-Lun Li, Jonathan W. C. Ng, David Simchi-Levi

Research Collection School Of Computing and Information Systems

We consider a container terminal discharging containers from a ship and locating them in the terminal yard. Each container has a number of potential locations in the yard where it can be stored. Containers are moved from the ship to the yard using a fleet of vehicles, each of which can carry one container at a time. The problem is to assign each container to a yard location and dispatch vehicles to the containers so as to minimize the time it takes to download all the containers from the ship. We show that the problem is NP-hard and develop a …


A Multi-Agent Framework For Supporting Intelligent Fourth-Party Logistics, Hoong Chuin Lau, G. Lo Aug 2001

A Multi-Agent Framework For Supporting Intelligent Fourth-Party Logistics, Hoong Chuin Lau, G. Lo

Research Collection School Of Computing and Information Systems

A distributed intelligent agent-based framework that supports fourth-party logistics optimization under a web-based e-Commerce environment has been proposed in this paper. In the framework, customer job requests come through an e-Procurement service. These requests are consolidated and pushed to the e-Market Place service periodically. The e-Market Place then serves as a broker that allows intelligent agents to bid to serve these requests optimally in real-time by solving multiple instances of underlying logistics optimization problem. The resulting system was implemented based on the Java 2 Enterprise Edition (J2EE) platform using distributed system technology for communication between objects.


Video Partitioning By Temporal Slice Coherency, Chong-Wah Ngo, Ting-Chuen Pong, Roland T. Chin Aug 2001

Video Partitioning By Temporal Slice Coherency, Chong-Wah Ngo, Ting-Chuen Pong, Roland T. Chin

Research Collection School Of Computing and Information Systems

We present a novel approach for video partitioning by detecting three essential types of camera breaks, namely cuts, wipes, and dissolves. The approach is based on the analysis of temporal slices which are extracted from the video by slicing through the sequence of video frames and collecting temporal signatures. Each of these slices contains both spatial and temporal information from which coherent regions are indicative of uninterrupted video partitions separated by camera breaks. Properties could further be extracted from the slice for both the detection and classification of camera breaks. For example, cut and wipes are detected by color-texture properties, …


Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 17, Number 9, June 2001, College Of Engineering And Computer Science, Wright State University Jun 2001

Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 17, Number 9, June 2001, College Of Engineering And Computer Science, Wright State University

BITs and PCs Newsletter

An eight page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.


Globally Convergent Approximate Dynamic Programming Applied To An Autolander, J.J. Murray, Richard Saeks, C.J. Cox, George G. Lendaris Jun 2001

Globally Convergent Approximate Dynamic Programming Applied To An Autolander, J.J. Murray, Richard Saeks, C.J. Cox, George G. Lendaris

Systems Science Faculty Publications and Presentations

A globally convergent nonlinear Approximate Dynamic Programming algorithm is described, and an implementation of the algorithm in the linear case is developed. The resultant linear Approximate Dynamic Programming algorithm is illustrated via the design of an autolander for the NASA X-43 research aircraft, without a priori knowledge of the X-43's flight dynamics.


Infopipes—An Abstraction For Information Flow, Jie Huang, Andrew P. Black, Jonathan Walpole, Calton Pu Jun 2001

Infopipes—An Abstraction For Information Flow, Jie Huang, Andrew P. Black, Jonathan Walpole, Calton Pu

Computer Science Faculty Publications and Presentations

Building Object-Oriented Distributed Systems has been facilitated by Remote Message Sending (RMS) systems like Java RMI and implementations of CORBA. However, RMS systems are designed to support request/response interactions. Streaming applications, in contrast, are characterized by high-bandwidth, long-duration communication with stringent performance requirements. Examples of streaming applications include video-on-demand, teleconferencing, on-line education, and environmental observation. These applications transfer huge amounts of data and focus on distributed information flow rather than request/response.

To simplify the task of building distributed streaming applications, we propose a new abstraction for information flow—Infopipes. Using Infopipes, information flow becomes the heart of the system, not an …


Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 17, Number 8, May 2001, College Of Engineering And Computer Science, Wright State University May 2001

Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 17, Number 8, May 2001, College Of Engineering And Computer Science, Wright State University

BITs and PCs Newsletter

An eight page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.


Simulation Of Inviscid Multi-Species Plasma Flow, Alexandre Martin, Marcelo Reggio, Jean-Yves Trépanier May 2001

Simulation Of Inviscid Multi-Species Plasma Flow, Alexandre Martin, Marcelo Reggio, Jean-Yves Trépanier

Alexandre Martin

A multi-species solver for plasma at thermodynamical equilibrium is developed. A numerical scheme, based on Roe's, is implemented with some modification regarding the average quantities. A perfect gas treatment is carried out for validations, and a quasi-real gas treatment is also presented. The latter takes into account the changes in the composition of the gas caused by fluctuations in temperature and density.


Comparison Of Two Distributed Fuzzy Logic Controllers For Flexible-Link Manipulators, Linda Z. Shi, Mohamed Trabia May 2001

Comparison Of Two Distributed Fuzzy Logic Controllers For Flexible-Link Manipulators, Linda Z. Shi, Mohamed Trabia

Mechanical Engineering Faculty Presentations

The paper suggests that fuzzy logic controllers present a computationally efficient and robust alternative to conventional controllers. The paper presents two possible structures for the distributed fuzzy logic controller of a single-link flexible manipulator. A linear quadratic regulator method is used to prove the effectiveness of fuzzy logic controllers.


Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 17, Number 7, April 2001, College Of Engineering And Computer Science, Wright State University Apr 2001

Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 17, Number 7, April 2001, College Of Engineering And Computer Science, Wright State University

BITs and PCs Newsletter

An eight page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.


Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 17, Number 6, March 2001, College Of Engineering And Computer Science, Wright State University Mar 2001

Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 17, Number 6, March 2001, College Of Engineering And Computer Science, Wright State University

BITs and PCs Newsletter

An eight page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.


Modeling The Transient Rate Behavior Of Bandwidth Sharing As A Hybrid Control System, Kang Li, Molly H. Shor, Jonathan Walpole, Calton Pu Mar 2001

Modeling The Transient Rate Behavior Of Bandwidth Sharing As A Hybrid Control System, Kang Li, Molly H. Shor, Jonathan Walpole, Calton Pu

Computer Science Faculty Publications and Presentations

This paper uses hybrid control to model a problem of computer network systems, the dynamic behavior of bandwidth sharing among competing TCP traffic. It has been well known in the computer network community that well-behaved (TCP-friendly) congestion control mechanisms are crucial to the robustness of the Internet. Congestion control determines the transmission rate for each flow. Right now, most TCP-friendly research focuses only on the average throughput behavior without considering how the data is sent out in the short-term (e.g. bursty or smooth). However, recent experimental results show that short-term rate adjustments can change the bandwidth sharing result. Therefore, it …


The Effects Of Budgetary Constraints, Multiple Strategy Selection, And Rationality On Equilibrium Attainment In An Information Warfare Simulation, Steven W. Tait Mar 2001

The Effects Of Budgetary Constraints, Multiple Strategy Selection, And Rationality On Equilibrium Attainment In An Information Warfare Simulation, Steven W. Tait

Theses and Dissertations

Information warfare (IW) has developed into a significant threat to the national security of the United States. Our critical infrastructures, linked together by information systems, are increasingly vulnerable to information attack. This study seeks to understand some of those factors which affect the ability of an individual to make accurate decisions in an IW environment. The study used game theory to analyze the behavior of decision-makers within an IW simulation. The IW game model is based on a set of games known as infinitely repeated games of incomplete information. It uses the Bayesian Nash equilibrium concept to determine the strategy …


A Process For Vectoring Offensive Information Warfare As A Primary Weapon Option Within The United States Air Force, Sheila G. Bennett Mar 2001

A Process For Vectoring Offensive Information Warfare As A Primary Weapon Option Within The United States Air Force, Sheila G. Bennett

Theses and Dissertations

Consistently and comprehensively using Information Operations (IO) capabilities as primary weapon option within the Air Force is the next step to operationalizing IO within the Air Force. Doctrine and official guidance has set the variables of mission and concepts of operations, organizational structure, and IW players in place. The missing variable to operationalizing IO and probably the most difficult is the 'how' or process of the equation. This research will introduce a useable process that can be incorporated within the Air Force for integrating offensive IW activities into the current and given environment. The process is the basis for further …


Influence Of Anonymity In A Group Problem-Solving Environment, Robert A. Sylvester Mar 2001

Influence Of Anonymity In A Group Problem-Solving Environment, Robert A. Sylvester

Theses and Dissertations

A group support system (GSS) uses a combination of networked personal computers, software that collects, manipulates, and aggregates member's individual input, and human facilitation to improve the group decision-making process. Prior GSS research has found that content and process anonymity influence problem solving groups. However, previous studies report mixed results on which levels of anonymity positively influence group performance. This thesis looked at content and process anonymity using four treatments to explore possible explanations for the mixed results found in previous GSS research. The study examined numerous theories including anonymity, identification, social loafing, and social comparison. An experiment was developed …


Gss Technology As A Moderator Of Influence And Perceived Expertise, Kevin V. Thompson Mar 2001

Gss Technology As A Moderator Of Influence And Perceived Expertise, Kevin V. Thompson

Theses and Dissertations

Group Support System (355) research has found this content and process anonymity influence problem solving groups. However, previous studies report mixed results on how OSS technology changes social influence processes and recognition of expertise which affect group performance. This thesis explored content and process anonymity's affect on influence and perceived expertise using three treatments to derive possible explanations for the mixed results found in previous GSS research. The study developed a theoretical model of influence, perceived expertise, and performance. Using structural equation modeling the study tested the relationships between expertise and participation rates, and overall group performance. An experiment was …


Malicious Hackers: A Framework For Analysis And Case Study, Laura J. Kleen Mar 2001

Malicious Hackers: A Framework For Analysis And Case Study, Laura J. Kleen

Theses and Dissertations

Recent years have seen an increase in the number and severity of Information Operations (IO) attacks upon DoD resources. At a higher level, the US as a whole has come under cyber attack by individuals and groups seeking thrills, monetary gain, publicity for their causes, and myriad other goals. This effort develops a first cut model of individual hacker mentality that can be utilized to improve threat assessment, mitigate Information Assurance (IA) vulnerabilities, and improve risk assessment. Further, it is a first step toward automated characterization of Information Warfare (IW) attacks based upon hacker types. All hackers are not the …


Modeling Information Assurance, Joseph E. Beauregard Mar 2001

Modeling Information Assurance, Joseph E. Beauregard

Theses and Dissertations

The ever-increasing speed of information systems allows decision-makers around the world to gather, process, and disseminate information almost instantaneously. However, with this benefit there comes a price. Information is valuable and therefore a target to those who do not have it or wish to destroy it. The Internet has allowed information to flow freely, but it has also made information vulnerable to many forms of corruption. The U. S. military controls much of the world's most sensitive information, and since it cannot sacrifice losing the speed at which this information is currently processed and disseminated, it must find a way …


An Objective Evaluation Of Four Sar Image Segmentation Algorithms, Jason B. Gregga Mar 2001

An Objective Evaluation Of Four Sar Image Segmentation Algorithms, Jason B. Gregga

Theses and Dissertations

Because of the large number of SAR images the Air Force generates and the dwindling number of available human analysts, automated methods must be developed. A key step towards automated SAR image analysis is image segmentation. There are many segmentation algorithms, but they have not been tested on a common set of images, and there are no standard test methods. This thesis evaluates four SAR image segmentation algorithms by running them on a common set of data and objectively comparing them to each other and to human segmentors. This objective comparison uses a multi-metric a approach with a set of …


Multicast Algorithms For Mobile Satellite Communication Networks, Ryan W. Thomas Mar 2001

Multicast Algorithms For Mobile Satellite Communication Networks, Ryan W. Thomas

Theses and Dissertations

With the rise of mobile computing and an increasing need for ubiquitous high speed data connections, Internet-in-the-sky solutions are becoming increasingly viable. To reduce the network overhead of one-to-many transmissions, the multicast protocol has been devised. The implementation of multicast in these Low Earth Orbit (LEO) constellations is a critical component to achieving an omnipresent network environment. This research examines the system performance associated with two terrestrial-based multicast mobility solutions, Distance Vector Multicast Routing Protocol (DVMRP) with mobile IP and On Demand Multicast Routing Protocol (ODMRP). These protocols are implemented and simulated in a six plane, 66 satellite LEO constellation. …