Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

2008

Physical Sciences and Mathematics

Institution
Keyword
Publication

Articles 1 - 30 of 104

Full-Text Articles in Engineering

Quad General Tree Drawing Algorithm And General Trees Characterization: Towards An Environment For The Experimental Study On General Tree Drawing Algorithms, Chu Yao Dec 2008

Quad General Tree Drawing Algorithm And General Trees Characterization: Towards An Environment For The Experimental Study On General Tree Drawing Algorithms, Chu Yao

Theses and Dissertations

Information visualization produces (interactive) visual representations of abstract data to reinforce human cognition and perception; thus enabling the viewer to gain knowledge about the internal structure of the data and causal relationships in it. The visualization of information hierarchies is concerned with the presentation of abstract hierarchical information about relationships between various entities. It has many applications in diverse domains such as software engineering, information systems, biology, and chemistry. Information hierarchies are typically modeled by an abstract tree, where vertices are entities and edges represent relationships between entities. The aim of visualizing tree drawings is to automatically produce drawings of …


Sub-Circuit Selection And Replacement Algorithms Modeled As Term Rewriting Systems, Eric D. Simonaire Dec 2008

Sub-Circuit Selection And Replacement Algorithms Modeled As Term Rewriting Systems, Eric D. Simonaire

Theses and Dissertations

Intent protection is a model of software obfuscation which, among other criteria, prevents an adversary from understanding the program’s function for use with contextual information. Relating this framework for obfuscation to malware detection, if a malware detector can perfectly normalize a program P and any obfuscation (variant) of the program O(P), the program is not intent protected. The problem of intent protection on programs can also be modeled as intent protection on combinational logic circuits. If a malware detector can perfectly normalize a circuit C and any obfuscation (variant) O(C) of the circuit, the circuit is not intent protected. In …


Nondestructive Evaluation Of Aircraft Composites Using Terahertz Time Domain Spectroscopy, Christopher D. Stoik Dec 2008

Nondestructive Evaluation Of Aircraft Composites Using Terahertz Time Domain Spectroscopy, Christopher D. Stoik

Theses and Dissertations

Terahertz (THz) time domain spectroscopy (TDS) was assessed as a nondestructive evaluation technique for aircraft composites. Material properties of glass fiber composite were measured using both transmission and reflection configuration. The interaction of THz with a glass fiber composite was then analyzed, including the effects of scattering, absorption, and the index of refraction, as well as effective medium approximations. THz TDS, in both transmission and reflection configuration, was used to study composite damage, including voids, delaminations, mechanical damage, and heat damage. Measurement of the material properties on samples with localized heat damage showed that burning did not change the refractive …


Mapping Reality Into Virtual Worlds, Josh Mcfarlane Dec 2008

Mapping Reality Into Virtual Worlds, Josh Mcfarlane

Computer Science and Computer Engineering Undergraduate Honors Theses

As virtual worlds become more prevalent, they become increasingly useful as a means of information dissemination. This thesis examines the possible connections between real world objects and their virtual world counterparts. We look at how, by attaching sensors to an object, or by using a smart object with embedded sensors, the information can be relayed to a server. From this information, it will be possible to create a duplicate object in the virtual world and have it mirror the real world object in terms of state and movement. Almost all current solutions for remotely viewing a room or area are …


Steganography In Ipv6, Barret Miller Dec 2008

Steganography In Ipv6, Barret Miller

Computer Science and Computer Engineering Undergraduate Honors Theses

Steganography is the process of hiding a secret message within another message such that it is difficult to detect the presence of the secret message. In other words, the existence of the secret message is hidden. A covert channel refers to the actual medium that is used to communicate the information such as a message, image, or file. This honors thesis uses steganography within the source address fields of Internet Protocol Version 6 (IPv6) packets to create a covert channel through which clandestine messages are passed from one party to another. A fully functional computer program was designed and written …


Intergranular Phases In Cyclically Annealed Yba2cu3o7-X And Their Implications For Critical Current Densities, Andrew Peter Clarke Dec 2008

Intergranular Phases In Cyclically Annealed Yba2cu3o7-X And Their Implications For Critical Current Densities, Andrew Peter Clarke

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

We report changes in the intergranular material and grain morphology of YBa2Cu3O7-x during cyclic anneals between 780 and 980 ºC in oxygen at atmospheric pressure. Two endothermic reactions were detected: (a) the eutectic reaction of YBa2Cu3O7-x with CuO and BaCuO2 at 900 ºC (enthalpy ∆Ha) and (b) the peritectic reaction of YBa2Cu3O7-x with CuO at 950 ºC (∆Hb). During the first anneal, only reaction (b) is detected, and although it should only occur if there is an excess of CuO, …


A Three-Dimensional, Time-Dependent Circulation Model Of Utah Lake, Eric V. Callister Dec 2008

A Three-Dimensional, Time-Dependent Circulation Model Of Utah Lake, Eric V. Callister

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Spatial and temporal variations of Utah Lake’s flow field were modeled using the Estuary Lake and Computer Model from the Centre for Water Research (CWR-ELCOM) at the University of Western Australia as part of an effort to increase understanding of the lake’s natural processes in order to restore the lake to its pristine, clear-water state and preserve the habitat of the June sucker, an endangered species. The model was validated using temperature measurements taken by sensors in 2007. The water temperature was a strong function of air temperature and incident short wave radiation, and was influenced to a lesser degree …


A C To Register Transfer Level Algorithm Using Structured Circuit Templates: A Case Study With Simulated Annealing, Jonathan D. Phillips Dec 2008

A C To Register Transfer Level Algorithm Using Structured Circuit Templates: A Case Study With Simulated Annealing, Jonathan D. Phillips

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

A tool flow is presented for deriving simulated annealing accelerator circuits on a field programmable gate array (FPGA) from C source code by exploring architecture solutions that conform to a preset template through scheduling and mapping algorithms. A case study carried out on simulated annealing-based Autonomous Mission Planning and Scheduling (AMPS) software used for autonomous spacecraft systems is explained. The goal of the research is an automated method for the derivation of a hardware design that maximizes performance while minimizing the FPGA footprint. Results obtained are compared with a peer C to register transfer level (RTL) logic tool, a state-of-the-art …


Irrelevance, Polymorphism, And Erasure In Type Theory, Richard Nathan Mishra-Linger Nov 2008

Irrelevance, Polymorphism, And Erasure In Type Theory, Richard Nathan Mishra-Linger

Dissertations and Theses

Dependent type theory is a proven technology for verified functional programming in which programs and their correctness proofs may be developed using the same rules in a single formal system. In practice, large portions of programs developed in this way have no computational relevance to the ultimate result of the program and should therefore be removed prior to program execution. In previous work on identifying and removing irrelevant portions of programs, computational irrelevance is usually treated as an intrinsic property of program expressions. We find that such an approach forces programmers to maintain two copies of commonly used datatypes: a …


Analysis And Evaluation Of Existing C-Band Feed Horns For Applicability To The 21 Meter Morehead Space Tracking Antenna, Prabhakara Rao Eluru Oct 2008

Analysis And Evaluation Of Existing C-Band Feed Horns For Applicability To The 21 Meter Morehead Space Tracking Antenna, Prabhakara Rao Eluru

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Science & Technology at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Prabhakara Rao Eluru on October 8, 2008.


Engineering Management Framework In Support Of Modeling & Simulation Application For Domain Specific Procurement, Thomas Guy Litwin Oct 2008

Engineering Management Framework In Support Of Modeling & Simulation Application For Domain Specific Procurement, Thomas Guy Litwin

Engineering Management & Systems Engineering Theses & Dissertations

A strategic process is desirable for project-based organizations in order for them to be efficient and effective when developing Modeling & Simulation (M&S) systems. This thesis proposes an overarching process that combines traditional M&S and Engineering Management methodologies in a new framework to support M&S organizations during the procurement process.

This thesis proposes both a Strategic Project Management Process (SPMP) and a systems engineering process for M&S federation development projects. The systems engineering process utilizes the artifacts of Model Driven Architecture (MDA) to support building M&S federations driven by operational requirements. Detailed research of this systems engineering process revealed a …


Modeling Geographic Population Dispersion Utilizing Geospatial Information System Environment Agents In An Agent Based Model, Karl D. Liebert Oct 2008

Modeling Geographic Population Dispersion Utilizing Geospatial Information System Environment Agents In An Agent Based Model, Karl D. Liebert

Computational Modeling & Simulation Engineering Theses & Dissertations

New capabilities in agent based model (ABM) environments are opening the door to the creation of ABM that may incorporate high-quality, real world environment data in the form of Geospatial Information System (GIS) files . In the past, GJS environments were only possible through extensive software development efforts focused on specific model applications.

This thesis explores the value and issues of using GIS data to provide an ABM environment. It examines the ability of ABM development environments (DE) to support GIS environment data. The selected ABM DE is then used to model population behavior in an environment defined by authoritative …


Window Queries Over Data Streams, Jin Li Oct 2008

Window Queries Over Data Streams, Jin Li

Dissertations and Theses

Evaluating queries over data streams has become an appealing way to support various stream-processing applications. Window queries are commonly used in many stream applications. In a window query, certain query operators, especially blocking operators and stateful operators, appear in their windowed versions. Previous research work in evaluating window queries typically requires ordered streams and this order requirement limits the implementations of window operators and also carries performance penalties. This thesis presents efficient and flexible algorithms for evaluating window queries. We first present a new data model for streams, progressing streams, that separates stream progress from physical-arrival order. Then, we …


Using Timed-Release Cryptography To Mitigate Preservation Risk Of Embargo Periods, Rabia Haq Oct 2008

Using Timed-Release Cryptography To Mitigate Preservation Risk Of Embargo Periods, Rabia Haq

Computer Science Theses & Dissertations

This research defines Time-Locked Embargo, a framework designed to mitigate the Preservation Risk Interval: the preservation risk associated with embargoed scholarly material. Due to temporary access restrictions, embargoed data cannot be distributed freely and thus preserved via data refreshing during the embargo time interval. A solution to mitigate the risk of data loss has been developed by suggesting a data dissemination framework that allows data refreshing of encrypted instances of embargoed content in an open, unrestricted scholarly community. This framework has been developed by exploiting implementations of existing technologies to"time-lock" data using Timed-Release Cryptology (TRC) so that it can be …


A Confidence Paradigm For Classification Systems, Nathan J. Leap Sep 2008

A Confidence Paradigm For Classification Systems, Nathan J. Leap

Theses and Dissertations

There is no universally accepted methodology to determine how much confidence one should have in a classifier output. This research proposes a framework to determine the level of confidence in an indication from a classifier system where the output is or can be transformed into a posterior probability estimate. This is a theoretical framework that attempts to unite the viewpoints of the classification system developer (or engineer) and the classification system user (or war-fighter). The paradigm is based on the assumptions that the system confidence acts like, or can be modeled as a value and that indication confidence can be …


Cephalometric Analysis Using Magnetic Resonance Imaging, Wade A. Williams Sep 2008

Cephalometric Analysis Using Magnetic Resonance Imaging, Wade A. Williams

Loma Linda University Electronic Theses, Dissertations & Projects

Purpose: The purpose of this study was to determine if T1-weighted 3D magnetic resonance images performed at 3.0 Tesla could be used to conduct routine orthodontic cephalometric analysis.

Methods: Three cranial imaging methods were compared using sixteen non-growing subjects (10 male and 6 female) who were not claustrophobic, did not have any metallic restorations on the distal of first molars, had no medical implants and the female subjects were not pregnant. Sagittal cranial images were produced by three methods: (1) a digital lateral cephalometric (LC) radiograph (Orthophos XG Plus, SironaTM, Bensheim, Germany), (2) a 12-inch FOV cone beam …


Studies Of Polymers In Fouling Release Coating Science, Haoran Chen Aug 2008

Studies Of Polymers In Fouling Release Coating Science, Haoran Chen

Master's Theses and Doctoral Dissertations

In chapter one, we describe our studies of the solubility properties of two biocides in F127 aqueous solutions. One is zinc omadine and the other is C9211. The partition coefficients of these two biocides were also determined from the analytical results.

In chapter two, we conducted phase related studies of a triblock copolymer, PEO400- PBO55-PEO400 in aqueous solution. The phase diagram features of PEO400-PBO55-PEO400 in water are compared with those of F127. We believe the lack of a lower gel to liquid transition boundary in this system is because of the relatively longer PEO segments relative to the PBO segment. …


Service Oriented Transitive Closure Solution, Jonathan Baran Aug 2008

Service Oriented Transitive Closure Solution, Jonathan Baran

Computer Science and Computer Engineering Undergraduate Honors Theses

The goal of this project is a service based solution that utilizes parallel and distributed processing algorithms to solve the transitive closure problem for a large dataset. A dataset may be view conceptually as a table in a database, with a physical structure representing a file containing a sequence of records and fields. Two records are said to be transitively related if and only if they are directly related due to sharing of one or more specific fields, or a sequence may be made from one record to the other under the condition that all intermediate entries are related the …


Predicting The Longevity Of Dvdr Media By Periodic Analysis Of Parity, Jitter, And Ecc Performance Parameters, Daniel Patrick Wells Jul 2008

Predicting The Longevity Of Dvdr Media By Periodic Analysis Of Parity, Jitter, And Ecc Performance Parameters, Daniel Patrick Wells

Theses and Dissertations

For the last ten years, DVD-R media have played an important role in the storage of large amounts of digital data throughout the world. During this time it was assumed that the DVD-R was as long-lasting and stable as its predecessor, the CD-R. Several reports have surfaced over the last few years questioning the DVD-R's ability to maintain many of its claims regarding archival quality life spans. These reports have shown a wide range of longevity between the different brands. While some DVD-Rs may last a while, others may result in an early and unexpected failure. Compounding this problem is …


Poly(Ethylenedioxythiophene) Based Electronic Devices For Sensor Applications, Jie Liu Jul 2008

Poly(Ethylenedioxythiophene) Based Electronic Devices For Sensor Applications, Jie Liu

Doctoral Dissertations

Organic electronic devices, based on Poly (3,4-ethylenedioxythiophene)-Poly (styrene sulfonic acid) (PEDOT-PSS) as the active layer for sensor applications, have been studied. Two sets of sensors have been developed. In one case, sensors consisting of PEDOT-PSS resistors have been realized and demonstrated for soil moisture monitoring. The resistor model for the soil moisture sensor enables the sensor device to be fabricated at low cost and easily tested with a simple structure. Unlike the large dimension device used in Time Domain Reflectometry (TDR), the sensors are small and are capable of capturing microscale behavior of moisture in soil which is useful for …


Biology-Inspired Approach For Communal Behavior In Massively Deployed Sensor Networks, Kennie H. Jones Jul 2008

Biology-Inspired Approach For Communal Behavior In Massively Deployed Sensor Networks, Kennie H. Jones

Computer Science Theses & Dissertations

Research in wireless sensor networks has accelerated rapidly in recent years. The promise of ubiquitous control of the physical environment opens the way for new applications that will redefine the way we live and work. Due to the small size and low cost of sensor devices, visionaries promise smart systems enabled by deployment of massive numbers of sensors working in concert. To date, most of the research effort has concentrated on forming ad hoc networks under centralized control, which is not scalable to massive deployments. This thesis proposes an alternative approach based on models inspired by biological systems and reports …


Using Agile Software Development Practices In A Research Oriented Distributed Simulation, Douglas James Mielke Jul 2008

Using Agile Software Development Practices In A Research Oriented Distributed Simulation, Douglas James Mielke

Computational Modeling & Simulation Engineering Theses & Dissertations

Although sometimes controversial, agile methodologies have proven to be a viable choice for some software development projects. Projects suited to agile methodologies are those that involve new technology, have requirements that change rapidly, and are controlled by small, talented teams. Much literature about agile software development leans towards business products and non-government entities. Only a handful of literature resources mention agile software development being used in government contracts and even fewer resources mention research projects. NASA's Airspace and Traffic Operations Simulation (ATOS) is a research oriented simulation that doesn't follow the traditional business project mold. In an effort to gain …


A Finite Difference Method For Studying Thermal Deformation In Three-Dimensional Thin Films Exposed To Ultrashort Pulsed Lasers, Suyang Zhang Jul 2008

A Finite Difference Method For Studying Thermal Deformation In Three-Dimensional Thin Films Exposed To Ultrashort Pulsed Lasers, Suyang Zhang

Doctoral Dissertations

Thermal analysis related to ultrashort-pulsed lasers has been intensely studied in science and engineering communities in recent years, because the pulse duration of ultrashort-pulsed lasers is only the order of sub-picoseconds to femtoseconds, and the lasers have exclusive capabilities in limiting the undesirable spread of the thermal process zone in the heated sample. Studying the thermal deformation induced by ultrashort-pulsed lasers is essential for preventing thermal damage. For the ultrashort-pulsed laser, the thermal damage is different from that caused by the long pulsed lasers and cracks occur after heating.

This dissertation presents a new finite difference method for studying thermal …


Integrating Preservation Functions Into The Web Server, Joan A. Smith Jul 2008

Integrating Preservation Functions Into The Web Server, Joan A. Smith

Computer Science Theses & Dissertations

Digital preservation of theWorldWideWeb poses unique challenges, different fromthe preservation issues facing professional Digital Libraries. The complete list of a website’s resources cannot be cited with confidence, and the descriptive metadata available for the resources is so minimal that it is sometimes insufficient for a browser to recognize. In short, the Web suffers from a counting problem and a representation problem. Refreshing the bits, migrating from an obsolete file format to a newer format, and other classic digital preservation problems also affect the Web. As digital collections devise solutions to these problems, the Web will also benefit. But the core …


Reflection High-Energy Electron Diffraction Studies Of Indium Phosphide (100) And Growth On Indium And Indium Nitride On Silicon (100), Mohamed Abd-Elsattar Hafez Jul 2008

Reflection High-Energy Electron Diffraction Studies Of Indium Phosphide (100) And Growth On Indium And Indium Nitride On Silicon (100), Mohamed Abd-Elsattar Hafez

Electrical & Computer Engineering Theses & Dissertations

Study of the effects of atomic hydrogen exposure on structure and morphology of semiconductor surfaces is important for fundamental properties and applications. In this dissertation, the electron yield of a hydrogen-cleaned indium phosphide (InP) surface was measured and correlated to the development of the surface morphology, which was monitored by in situ reflection high-energy electron diffraction (RHEED). Atomic hydrogen treatment produced a clean, well-ordered, and (2x4)-reconstructed InP(100) surface. The quantum efficiency, after activation to negative electron affinity, and the secondary electron emission were shown to increase with hydrogen cleaning time. RHEED patterns of low-index InP(100) surface were modified by the …


Material Perturbations To Enhance Performance Of The Theile Half-Width Leaky Mode Antenna, Jason A. Girard Jun 2008

Material Perturbations To Enhance Performance Of The Theile Half-Width Leaky Mode Antenna, Jason A. Girard

Theses and Dissertations

Microstrip traveling-wave antennas, often referred to as leaky-wave antennas, have been shown to radiate when the dominant or fundamental mode is suppressed and the first higher-order mode is excited. One such microstrip variation is the Thiele Half-Width (THW) antenna, which operates from 5.9 - 8.2 GHz for this research. Increasing the bandwidth over which the THW antenna radiates is desired, as is a fundamental understanding of the propagation characteristics over this region. This dissertation seeks to vary or perturb the material and physical properties of the THW antenna, including strip-width variations and modifications of the substrate layer, to achieve these …


A Secure And Efficient Communications Architecture For Global Information Grid Users Via Cooperating Space Assets, Victor P. Hubenko Jun 2008

A Secure And Efficient Communications Architecture For Global Information Grid Users Via Cooperating Space Assets, Victor P. Hubenko

Theses and Dissertations

With the Information Age in full and rapid development, users expect to have global, seamless, ubiquitous, secure, and efficient communications capable of providing access to real-time applications and collaboration. The United States Department of Defense’s (DoD) Network-Centric Enterprise Services initiative, along with the notion of pushing the “power to the edge,” aims to provide end-users with maximum situational awareness, a comprehensive view of the battlespace, all within a secure networking environment. Building from previous AFIT research efforts, this research developed a novel security framework architecture to address the lack of efficient and scalable secure multicasting in the low earth orbit …


Statistical Methods For Image Registration And Denoising, Matthew D. Sambora Jun 2008

Statistical Methods For Image Registration And Denoising, Matthew D. Sambora

Theses and Dissertations

This dissertation describes research into image processing techniques that enhance military operational and support activities. The research extends existing work on image registration by introducing a novel method that exploits local correlations to improve the performance of projection-based image registration algorithms. The dissertation also extends the bounds on image registration performance for both projection-based and full-frame image registration algorithms and extends the Barankin bound from the one-dimensional case to the problem of two-dimensional image registration. It is demonstrated that in some instances, the Cramer-Rao lower bound is an overly-optimistic predictor of image registration performance and that under some conditions, the …


An Analysis Of Botnet Vulnerabilities, Sean W. Hudson Jun 2008

An Analysis Of Botnet Vulnerabilities, Sean W. Hudson

Theses and Dissertations

Botnets are a significant threat to computer networks and data stored on networked computers. The ability to inhibit communication between servers controlling the botnet and individual hosts would be an effective countermeasure. The objective of this research was to find vulnerabilities in Unreal IRCd that could be used to shut down the server. Analysis revealed that Unreal IRCd is a very mature and stable IRC server and no significant vulnerabilities were found. While this research does not eliminate the possibility that a critical vulnerability is present in the Unreal IRCd software, none were identified during this effort.


Location-Based Hashing For Querying And Searching, Felix Ching May 2008

Location-Based Hashing For Querying And Searching, Felix Ching

Computer Science and Computer Engineering Undergraduate Honors Theses

The rapidly growing information technology in modern days demands an efficient searching scheme to search for desired data. Locality Sensitive Hashing (LSH) is a method for searching similar data in a database. LSH achieves high accuracy and precision for locating desired data, but consumes a significant amount of memory and time. Based on LSH, this thesis presents two novel schemes for efficient and accurate data searching: Locality Sensitive Hashing-SmithWaterman (LSH-SmithWaterman) and Secure Min-wise Locality Sensitive Hashing (SMLSH). Both methods dramatically reduce the memory and time consumption and exhibit high accuracy in data searching. Simulation results demonstrate the efficiency of the …