Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Wind energy (2)
- Anxiety (1)
- Applied sciences (1)
- Approximation Algorithms (1)
- Automated Monitoring (1)
-
- Biomedical (1)
- Biomedical materials<br />Computer vision<br />Pattern recognition systems (1)
- Checkpoint placement (1)
- Computer Vision (1)
- Data placement and replication (1)
- Diphenoxylate (1)
- Dynamic wake (1)
- Fluid-structure interaction (1)
- Hardware Security (1)
- Influence Maximization (1)
- Large-scale storage system (1)
- Lattice Boltzmann (1)
- MATLAB (1)
- Machine Learning (1)
- Network Optimization (1)
- Network Reliability (1)
- Noise (1)
- Object Detection/Segmentation (1)
- Offshore wind power (1)
- Optimization (1)
- Physical Unclonable Function (1)
- Planning and Decision Making (1)
- Process Variations (1)
- Propranolol (1)
- Psychology (1)
Articles 1 - 7 of 7
Full-Text Articles in Engineering
Intrinsic Functions For Securing Cmos Computation: Variability, Modeling And Noise Sensitivity, Xiaolin Xu
Intrinsic Functions For Securing Cmos Computation: Variability, Modeling And Noise Sensitivity, Xiaolin Xu
Doctoral Dissertations
A basic premise behind modern secure computation is the demand for lightweight cryptographic primitives, like identifier or key generator. From a circuit perspective, the development of cryptographic modules has also been driven by the aggressive scalability of complementary metal-oxide-semiconductor (CMOS) technology. While advancing into nano-meter regime, one significant characteristic of today's CMOS design is the random nature of process variability, which limits the nominal circuit design. With the continuous scaling of CMOS technology, instead of mitigating the physical variability, leveraging such properties becomes a promising way. One of the famous products adhering to this double-edged sword philosophy is the Physically …
Stochastic Network Design: Models And Scalable Algorithms, Xiaojian Wu
Stochastic Network Design: Models And Scalable Algorithms, Xiaojian Wu
Doctoral Dissertations
Many natural and social phenomena occur in networks. Examples include the spread of information, ideas, and opinions through a social network, the propagation of an infectious disease among people, and the spread of species within an interconnected habitat network. The ability to modify a phenomenon towards some desired outcomes has widely recognized benefits to our society and the economy. The outcome of a phenomenon is largely determined by the topology or properties of its underlying network. A decision maker can take management actions to modify a network and, therefore, change the outcome of the phenomenon. A management action is an …
Anxiolytic Effects Of Propranolol And Diphenoxylate On Mice And Automated Stretch-Attend Posture Analysis, Kevin Scott Holly
Anxiolytic Effects Of Propranolol And Diphenoxylate On Mice And Automated Stretch-Attend Posture Analysis, Kevin Scott Holly
Doctoral Dissertations
The prevention of social anxiety, performance anxiety, and social phobia via the combination of two generic drugs, diphenoxylate HC1 (opioid) plus atropine sulfate (anticholinergic) and propranolol HCl (beta blocker) was evaluated in mice through behavioral studies. A patent published on a September 8, 2011 by Benjamin D. Holly, US 2011/0218215 Al, prompted the research. The drug combination of diphenoxylate and atropine plus propranolol could be an immediate treatment for patients suffering from acute phobic and social anxiety disorders. Demonstrating the anxiolytic effects of the treatment on mice would validate a mouse model for neuroscientist to be used to detect the …
Lattice Boltzmann Methods For Wind Energy Analysis, Stephen Lloyd Wood
Lattice Boltzmann Methods For Wind Energy Analysis, Stephen Lloyd Wood
Doctoral Dissertations
An estimate of the United States wind potential conducted in 2011 found that the energy available at an altitude of 80 meters is approximately triple the wind energy available 50 meters above ground. In 2012, 43% of all new electricity generation installed in the U.S. (13.1 GW) came from wind power. The majority of this power, 79%, comes from large utility scale turbines that are being manufactured at unprecedented sizes. Existing wind plants operate with a capacity factor of only approximately 30%. Measurements have shown that the turbulent wake of a turbine persists for many rotor diameters, inducing increased vibration …
Achieving High Reliability And Efficiency In Maintaining Large-Scale Storage Systems Through Optimal Resource Provisioning And Data Placement, Lipeng Wan
Doctoral Dissertations
With the explosive increase in the amount of data being generated by various applications, large-scale distributed and parallel storage systems have become common data storage solutions and been widely deployed and utilized in both industry and academia. While these high performance storage systems significantly accelerate the data storage and retrieval, they also bring some critical issues in system maintenance and management. In this dissertation, I propose three methodologies to address three of these critical issues.
First, I develop an optimal resource management and spare provisioning model to minimize the impact brought by component failures and ensure a highly operational experience …
Wind Farm Wake Modeling And Analysis Of Wake Impacts In A Wind Farm, Yujia Hao
Wind Farm Wake Modeling And Analysis Of Wake Impacts In A Wind Farm, Yujia Hao
Doctoral Dissertations
More and more wind turbines have been grouped in the same location during the last decades to take the advantage of profitable wind resources and reduced maintenance cost. However wind turbines located in a wind farm are subject to a wind field that is substantially modified compared to the ambient wind field due to wake effects. The wake results in a reduced power production, increased load variation on the waked turbine, and reduced wake farm efficiency. Therefore the wake has long been an important concern for the wind farm installation, maintenance, and control. Thus a wake simulation tool is required. …
Detecting, Segmenting And Tracking Bio-Medical Objects, Mingzhong Li
Detecting, Segmenting And Tracking Bio-Medical Objects, Mingzhong Li
Doctoral Dissertations
"Studying the behavior patterns of biomedical objects helps scientists understand the underlying mechanisms. With computer vision techniques, automated monitoring can be implemented for efficient and effective analysis in biomedical studies. Promising applications have been carried out in various research topics, including insect group monitoring, malignant cell detection and segmentation, human organ segmentation and nano-particle tracking.
In general, applications of computer vision techniques in monitoring biomedical objects include the following stages: detection, segmentation and tracking. Challenges in each stage will potentially lead to unsatisfactory results of automated monitoring. These challenges include different foreground-background contrast, fast motion blur, clutter, object overlap and …