Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Physical Sciences and Mathematics

The Pseudo-Rigid-Body Model For Fast, Accurate, Non-Linear Elasticity, Anthony R. Hall Nov 2013

The Pseudo-Rigid-Body Model For Fast, Accurate, Non-Linear Elasticity, Anthony R. Hall

Theses and Dissertations

We introduce to computer graphics the Pseudo-Rigid-Body Mechanism (PRBM) and the chain algorithm from mechanical engineering, with a unified tutorial from disparate source materials. The PRBM has been used successfully to simplify the simulation of non-linearly elastic beams, using deflections of an analogous spring and rigid-body linkage. It offers computational efficiency as well as an automatic parameterization in terms of physically measurable, intuitive inputs which fit naturally into existing animation work flows for character articulation. The chain algorithm is a technique for simulating the deflection of complicated elastic bodies in terms of straight elastic elements, which has recently been extended …


Developing A Framework For Determining The Contribution Of Transportation Project To Sustainable Development, Karim Ahmed Abdel Warith Oct 2013

Developing A Framework For Determining The Contribution Of Transportation Project To Sustainable Development, Karim Ahmed Abdel Warith

Open Access Dissertations

In the past few years, stakeholders in the transportation industry have been concerned with sustainability. However, transportation decision makers have had difficulty incorporating sustainability into transportation infrastructure decisions. This is mainly attributed to the vagueness of the term. Incorporating sustainability into transportation decision making has been a desire put forth by engineers for that past 10 years. However, with no apparent method of defining sustainability, designers and decision makers have not been able to fulfill this desire.

This investigation attempts to define sustainability in a comprehensive and quantitative manner. The research proposes a new methodology that relies on the objective …


Oyster Sustainability Modeling As A Public Resource, Nathan A. Cooper Aug 2013

Oyster Sustainability Modeling As A Public Resource, Nathan A. Cooper

University of New Orleans Theses and Dissertations

A simulation algorithm based on biological references points proposed by Powell and Klink (2007) is implemented for predicting the total allowable catch of eastern oysters (Crassostrea virginica) from Louisiana’s coast. The model accepts initial per-square-meter shell mass and oyster size distributions as input. Fishing effort is provided as fractions removed of each resource for each month of the season. The model outputs the expected remaining shell mass and harvests of sack and seed oysters after discrete fishing months. Oyster mortality credits the shell budget, while fishing fractions debit oyster and shell resources. Surviving oysters grow larger along a …


Energy Awareness And Scheduling In Mobile Devices And High End Computing, Sachin S. Pawaskaw Jul 2013

Energy Awareness And Scheduling In Mobile Devices And High End Computing, Sachin S. Pawaskaw

Student Work

In the context of the big picture as energy demands rise due to growing economies and growing populations, there will be greater emphasis on sustainable supply, conservation, and efficient usage of this vital resource. Even at a smaller level, the need for minimizing energy consumption continues to be compelling in embedded, mobile, and server systems such as handheld devices, robots, spaceships, laptops, cluster servers, sensors, etc. This is due to the direct impact of constrained energy sources such as battery size and weight, as well as cooling expenses in cluster-based systems to reduce heat dissipation. Energy management therefore plays a …


Analysis Of Re-Advanceable Mortgages, Almas Naseem Jun 2013

Analysis Of Re-Advanceable Mortgages, Almas Naseem

Electronic Thesis and Dissertation Repository

According to Canadian tax law the interest payments on loans used for investment purposes are tax deductible while interest on personal mortgage loans is not. One way of transforming from non-tax deductible to tax deductible interest expenses is to borrow against home equity to make investments. This can be achieved through a re-advanceable mortgage and has been promoted by personal financial planners as a way of significantly decreasing the time required to pay off a mortgage and the associated total interest cost. However, the notion of risk associated with the investment holdings is not emphasized. Using simulation we study the …


American Spread Option Models And Valuation, Yu Hu May 2013

American Spread Option Models And Valuation, Yu Hu

Theses and Dissertations

Spread options are derivative securities, which are written on the difference between the values of two underlying market variables. They are very important tools to hedge the correlation risk. American style spread options allow the holder to exercise the option at any time up to and including maturity. Although they are widely used to hedge and speculate in financial market, the valuation of the American spread option is very challenging. Because even under the classic assumptions that the underlying assets follow the log-normal distribution, the resulting spread doesn't have a distribution with a simple closed formula. In this dissertation, we …


Simulation And Analysis Of Insider Attacks, Christopher Blake Clark May 2013

Simulation And Analysis Of Insider Attacks, Christopher Blake Clark

UNLV Theses, Dissertations, Professional Papers, and Capstones

An insider is an individual (usually an employee, contractor, or business partner) that has been trusted with access to an organization's systems and sensitive data for legitimate purposes. A malicious insider abuses this access in a way that negatively impacts the company, such as exposing, modifying, or defacing software and data.

Many algorithms, strategies, and analyses have been developed with the intent of detecting and/or preventing insider attacks. In an academic setting, these tools and approaches show great promise. To be sure of their effectiveness, however, these analyses need to be tested. While real data is available on insider attacks …


Traffic Modeling In Lagrangian Coordinates Using Smartphone Apps, Sergio Contreras May 2013

Traffic Modeling In Lagrangian Coordinates Using Smartphone Apps, Sergio Contreras

UNLV Theses, Dissertations, Professional Papers, and Capstones

Traditionally, one of the ways traffic flow has been studied is by using the kinematic wave model. This model is derived in the Eulerian framework by using conservation of the number of vehicles. Recently, the kinematic wave model has been transformed into Lagrangian coordinates. In this framework, the independent variables are unique

vehicles and time. The detailed change in framework, and the properties of the model in the changed framework are reviewed. Numerical results from different traffic cases are explained. Since vehicle trajectory data can be easily collected from smartphones,

a smartphone application is developed for this purpose. This data …


Stochastic Modeling And Time-To-Event Analysis Of Voip Traffic, Imad Al Ajarmeh Mar 2013

Stochastic Modeling And Time-To-Event Analysis Of Voip Traffic, Imad Al Ajarmeh

College of Computing and Digital Media Dissertations

Voice over IP (VoIP) systems are gaining increased popularity due to the cost effectiveness, ease of management, and enhanced features and capabilities. Both enterprises and carriers are deploying VoIP systems to replace their TDM-based legacy voice networks. However, the lack of engineering models for VoIP systems has been realized by many researchers, especially for large-scale networks. The purpose of traffic engineering is to minimize call blocking probability and maximize resource utilization. The current traffic engineering models are inherited from the legacy PSTN world, and these models fall short from capturing the characteristics of new traffic patterns. The objective of this …


Optimized Simulation Of Granular Materials, Seth R. Holladay Feb 2013

Optimized Simulation Of Granular Materials, Seth R. Holladay

Theses and Dissertations

Visual effects for film and animation often require simulated granular materials, such as sand, wheat, or dirt, to meet a director's needs. Simulating granular materials can be time consuming, in both computation and labor, as these particulate materials have complex behavior and an enormous amount of small-scale detail. Furthermore, a single cubic meter of granular material, where each grain is a cubic millimeter, would contain a billion granules, and simulating all such interacting granules would take an impractical amount of time for productions. This calls for a simplified model for granular materials that retains high surface detail and granular behavior …


A Compiler-Based Framework For Automatic Extraction Of Program Skeletons For Exascale Hardware/Software Co-Design, Amruth Rudraiah Dakshinamurthy Jan 2013

A Compiler-Based Framework For Automatic Extraction Of Program Skeletons For Exascale Hardware/Software Co-Design, Amruth Rudraiah Dakshinamurthy

Electronic Theses and Dissertations

The design of high-performance computing architectures requires performance analysis of largescale parallel applications to derive various parameters concerning hardware design and software development. The process of performance analysis and benchmarking an application can be done in several ways with varying degrees of fidelity. One of the most cost-effective ways is to do a coarse-grained study of large-scale parallel applications through the use of program skeletons. The concept of a “program skeleton” that we discuss in this paper is an abstracted program that is derived from a larger program where source code that is determined to be irrelevant is removed for …


Packet Coalescing And Server Substitution For Energy-Proportional Operation Of Network Links And Data Servers, Mehrgan Mostowfi Jan 2013

Packet Coalescing And Server Substitution For Energy-Proportional Operation Of Network Links And Data Servers, Mehrgan Mostowfi

USF Tampa Graduate Theses and Dissertations

Electricity generation for Information and Communications Technology (ICT) contributes over 2% of the human-generated CO2 to the atmosphere. Energy costs are rapidly becoming the major operational expense for ICT and may soon dwarf capital expenses as software and hardware continue to drop in price. In this dissertation, three new approaches to achieving energy-proportional operation of network links and data servers are explored.

Ethernet is the dominant wireline communications technology for Internet connectivity. IEEE 802.3az Energy Efficient Ethernet (EEE) describes a Low Power Idle (LPI) mechanism for allowing Ethernet links to sleep. A method of coalescing packets to consolidate link idle …


Applications Of Agent Based Approaches In Business: A Three Essay Dissertation, Shankar Prawesh Jan 2013

Applications Of Agent Based Approaches In Business: A Three Essay Dissertation, Shankar Prawesh

USF Tampa Graduate Theses and Dissertations

The goal of this dissertation is to investigate the enabling role that agent based simulation plays in business and policy. The aforementioned issue has been addressed in this dissertation through three distinct, but related essays. The first essay is a literature review of different research applications of agent based simulation in various business disciplines, such as finance, economics, information systems, management, marketing and accounting. Various agent based simulation tools to develop computational models are discussed. The second essay uses an agent-based simulation approach to study important properties of the widely used most popular news recommender systems (NRS). This essay highlights …