Gruber, Lucinda; Griffith, Connor; Young, Ethan; Sullivan, Adriann; Schuler, Jeff; Arnold-Christian, Susan; Warren, Steve
2009-01-01
Learning experiences for middle school girls are an effective means to steer young women toward secondary engineering curricula that they might not have otherwise considered. Sponsorship of such experiences by a collegiate student group is worthwhile, as it gives the group common purpose and places college students in a position to mentor these young women. This paper addresses learning experiences in different areas of bio-medical engineering offered to middle school girls in November 2008 via a day-long workshop entitled "Engineering The Body." The Kansas State University (KSU) Student Chapter of the IEEE Engineering in Medicine and Biology Society (EMBS) worked with the KSU Women in Engineering and Science Program (WESP) to design and sponsor these experiences, which addressed the areas of joint mechanics, electrocardiograms, membrane transport, computer mouse design, and audio filters for cochlear implants. Fifty five middle-school girls participated in this event, affirming the notion that biomedical engineering appeals to young women and that early education and recruitment efforts have the potential to expand the biomedical engineering talent pool.
Enhancing professionalism among engineering students through involvements in technical societies.
Ghosh, Sreejita; Samineni, Anvesh; Mandal, Subhamoy; Murari, Bhaskar Mohan
2015-08-01
A student chapter can be considered to be a miniature enterprise; however without the latter's major financial risks. Involvement in the student chapter of a professional society like IEEE at undergraduate level plays a pivotal role in the overall professional development of the student by keeping the students informed about the various career possibilities. A student chapter shapes the hitherto naive students into industry ready professionals and to suitable candidates for some of the best grad schools worldwide. This assertion has been discussed in-depth taking the example of IEEE EMBS Student Branch chapter of VIT University. It has been described how the entire process, - starting from inception of an idea to its materialization in to an activity, has shaped the volunteers and participants into better professionals.
2011-10-01
Systems engineer- ing knowledge has also been documented through the standards bodies, most notably : • ISO /IEC/IEEE 15288, Systems Engineer- ing...System Life Cycle Processes, 2008 (see [10]). • ANSI/EIA 632, Processes for Engineering a System, (1998) • IEEE 1220, ISO /IEC 26702 Application...tion • United States Defense Acquisition Guidebook, Chapter 4, June 27, 2011 • IEEE/EIA 12207 , Software Life Cycle Processes, 2008 • United
ERIC Educational Resources Information Center
Plaza, I.; Arcega, F.; Castro, M.; Llamas, M.
2011-01-01
CESEI is the acronym of the Spanish Chapter of the Education Society of IEEE (the Institute of Electric and Electronics Engineers). Every year, the CESEI awards a prize for the best doctoral thesis and FDP (final (master) degree projects) about education. The thesis or the project must be developed in the areas of electrical engineering,…
Air Force Systems Engineering Assessment Model (AF SEAM) Management Guide, Version 2
2010-09-21
gleaned from experienced professionals who assisted with the model’s development. Examples of the references used include the following: • ISO /IEC...Defense Acquisition Guidebook, Chapter 4 • AFI 63-1201, Life Cycle Systems Engineering • IEEE/EIA 12207 , Software Life Cycle Processes • Air...Selection criteria Reference Material: IEEE/EIA 12207 , MIL-HDBK-514 Other Considerations: Modeling, simulation and analysis techniques can be
BIOCONAID System (Bionic Control of Acceleration Induced Dimming).
1981-07-01
Howard, P. , "The Physiology of Positive Acceleration," Chapter 23 in A Textbook of Aviation Physiology, Edited by J. A. Gilles, Pergamon Press...of the Carotid Sinus Baroreceptor Process in a Dog ," IEEE Trans. Biomed. Engineering, BME , Vol. 22, No. 3, pp. 502-507, 1975. 16. Leverett, S. D...Electromyogram, ’ IEEE Transactions on Biomedical Engineering. Vol. BME -24, No. 5, pp. 417-424, 1977. 26. Stoll, Alice M., "Human Tolerance to Positive G as
Introspections on the Semantic Gap
2015-04-14
cloud comput - ing. Zhang received an MS in computer science from Stony Brook University. Contact him at dozhang@ cs.stonybrook.edu. Donald E. Porter...designated by other documentation. ... 2 March/April 2015 Copublished by the IEEE Computer and Reliability Societies 1540-7993/15/$31.00 © 2015 IEEE IEEE S...pauses the VM, and the VMI tool introspects the process descriptor list. In contrast, an asynchronous mechanism would intro - spect memory
Telemetry Standards, IRIG Standard 106-17, Chapter 22, Network Based Protocol Suite
2017-07-01
ER Fiber media connections using 10 Gigabit Ethernet shall comply with IEEE 802.3-2012, Section 5, Clause 52. 22.2.1.1.4 Auto- Negotiation ...22.2.1.1.4.1 Copper Auto- Negotiation Copper media connections, as described in the preceding sections, shall support auto- negotiation of speed, duplex, and...flow control in the manner specified in IEEE 802.3-2012, Section 2, Clause 28. 22.2.1.1.4.2 Fiber Auto- Negotiation Gigabit and 10 Gigabit fiber
Code of Federal Regulations, 2013 CFR
2013-10-01
... Environmental Assessment of Personal Computer Products. 52.223-16 Section 52.223-16 Federal Acquisition... Assessment of Personal Computer Products. As prescribed in 23.705(b)(1), insert the following clause: IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products (DEC 2007) (a) Definitions...
Code of Federal Regulations, 2012 CFR
2012-10-01
... Environmental Assessment of Personal Computer Products. 52.223-16 Section 52.223-16 Federal Acquisition... Assessment of Personal Computer Products. As prescribed in 23.705(b)(1), insert the following clause: IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products (DEC 2007) (a) Definitions...
Code of Federal Regulations, 2011 CFR
2011-10-01
... Environmental Assessment of Personal Computer Products. 52.223-16 Section 52.223-16 Federal Acquisition... Assessment of Personal Computer Products. As prescribed in 23.705(b)(1), insert the following clause: IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products (DEC 2007) (a) Definitions...
Code of Federal Regulations, 2010 CFR
2010-10-01
... Environmental Assessment of Personal Computer Products. 52.223-16 Section 52.223-16 Federal Acquisition... Assessment of Personal Computer Products. As prescribed in 23.706(b)(1), insert the following clause: IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products (DEC 2007) (a) Definitions...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-22
... Computer Software and Complex Electronics Used in Safety Systems of Nuclear Power Plants AGENCY: Nuclear...-1209, ``Software Requirement Specifications for Digital Computer Software and Complex Electronics used... Electronics Engineers (ANSI/IEEE) Standard 830-1998, ``IEEE Recommended Practice for Software Requirements...
GPUs: An Emerging Platform for General-Purpose Computation
2007-08-01
programming; real-time cinematic quality graphics Peak stream (26) License required (limited time no- cost evaluation program) Commercially...folding.stanford.edu (accessed 30 March 2007). 2. Fan, Z.; Qiu, F.; Kaufman, A.; Yoakum-Stover, S. GPU Cluster for High Performance Computing. ACM/IEEE...accessed 30 March 2007). 8. Goodnight, N.; Wang, R.; Humphreys, G. Computation on Programmable Graphics Hardware. IEEE Computer Graphics and
106-17 Telemetry Standards Recorder Data Packet Format Standard Chapter 11
2017-07-01
11.2.2 PCM Data Packets ..................................................................................... 11-11 11.2.3 Time Data Packets...11-95 11.2.15 Ethernet Data Packets ................................................................................ 11-97 11.2.16 Time Space...4 Time ............................................................ 11-10 Figure 11-5. Secondary Header IEEE 1588 Time
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-02
... Software Used in Safety Systems of Nuclear Power Plants AGENCY: Nuclear Regulatory Commission. ACTION... Computer Software Used in Safety Systems of Nuclear Power Plants.'' This RG endorses, with clarifications... Electrical and Electronic Engineers (IEEE) Standard 828-2005, ``IEEE Standard for Software Configuration...
46 CFR 167.40-1 - Electrical installations.
Code of Federal Regulations, 2011 CFR
2011-10-01
... (Electrical Engineering) of this chapter. (3) Institute of Electrical and Electronic Engineers, Inc. (IEEE... 46 Shipping 7 2011-10-01 2011-10-01 false Electrical installations. 167.40-1 Section 167.40-1... SHIPS Certain Equipment Requirements § 167.40-1 Electrical installations. (a) Except as otherwise...
46 CFR 167.40-1 - Electrical installations.
Code of Federal Regulations, 2012 CFR
2012-10-01
... (Electrical Engineering) of this chapter. (3) Institute of Electrical and Electronic Engineers, Inc. (IEEE... 46 Shipping 7 2012-10-01 2012-10-01 false Electrical installations. 167.40-1 Section 167.40-1... SHIPS Certain Equipment Requirements § 167.40-1 Electrical installations. (a) Except as otherwise...
46 CFR 167.40-1 - Electrical installations.
Code of Federal Regulations, 2014 CFR
2014-10-01
... (Electrical Engineering) of this chapter. (3) Institute of Electrical and Electronic Engineers, Inc. (IEEE... 46 Shipping 7 2014-10-01 2014-10-01 false Electrical installations. 167.40-1 Section 167.40-1... SHIPS Certain Equipment Requirements § 167.40-1 Electrical installations. (a) Except as otherwise...
46 CFR 167.40-1 - Electrical installations.
Code of Federal Regulations, 2013 CFR
2013-10-01
... (Electrical Engineering) of this chapter. (3) Institute of Electrical and Electronic Engineers, Inc. (IEEE... 46 Shipping 7 2013-10-01 2013-10-01 false Electrical installations. 167.40-1 Section 167.40-1... SHIPS Certain Equipment Requirements § 167.40-1 Electrical installations. (a) Except as otherwise...
The Sound of Freedom. Naval Weapons Technology at Dahlgren, Virginia, 1918-2006
2006-01-01
the TRINITY device, before later succeeding J. Robert Oppenheimer as the director of Los Alamos National Laboratory. Other former Dahlgren...and the Computer (Cambridge, Mass.: The MIT Press, 1999); Michael R. Williams, A History of Computing Technology, 2nd ed. ( Los Alamos , Calif.: IEEE...Minutes of Advisory Council. 3. Ibid. 4. Ibid.; Michael R. Williams, A History of Computing Technology, 2nd ed. ( Los Alamos , Calif.: IEEE Computer
Reliability Evaluation of Computer Systems.
1981-01-01
algorithms in hardware is not restricted by the designs of particular circuits. Applications could be made in new computer architectures; one candidate...pp. 137-148, IEEE, Chicago, Illinois, September 1963. (With J.F. Wakerly ) "Design of Low-Cost General-Purpose Self- Diagnosing Computers," Proc...34 Proc., IEEE Int’l Solid-State Circuits Conference, Philadelphia, Pennsylvania, February 16-18, 1977. (With J.F. Wakerly ) "Microcomputers in the
IEEE International Symposium on Biomedical Imaging.
2017-01-01
The IEEE International Symposium on Biomedical Imaging (ISBI) is a scientific conference dedicated to mathematical, algorithmic, and computational aspects of biological and biomedical imaging, across all scales of observation. It fosters knowledge transfer among different imaging communities and contributes to an integrative approach to biomedical imaging. ISBI is a joint initiative from the IEEE Signal Processing Society (SPS) and the IEEE Engineering in Medicine and Biology Society (EMBS). The 2018 meeting will include tutorials, and a scientific program composed of plenary talks, invited special sessions, challenges, as well as oral and poster presentations of peer-reviewed papers. High-quality papers are requested containing original contributions to the topics of interest including image formation and reconstruction, computational and statistical image processing and analysis, dynamic imaging, visualization, image quality assessment, and physical, biological, and statistical modeling. Accepted 4-page regular papers will be published in the symposium proceedings published by IEEE and included in IEEE Xplore. To encourage attendance by a broader audience of imaging scientists and offer additional presentation opportunities, ISBI 2018 will continue to have a second track featuring posters selected from 1-page abstract submissions without subsequent archival publication.
DESPIC: Detecting Early Signatures of Persuasion in Information Cascades
2015-08-27
over NoSQL Databases, Proceedings of the 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2014). 26-MAY-14, . : , P...over NoSQL Databases. Proceedings of the 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2014). Chicago, IL, USA...distributed NoSQL databases including HBase and Riak, we finalized the requirements of the optimal computational architecture to support our framework
NASA Astrophysics Data System (ADS)
Bowers, John
2014-03-01
Abstract: A number of important breakthroughs in the past decade have focused attention on Si as a photonic platform. We review here recent progress in this field, focusing on efforts to make lasers, amplifiers, modulators and photodetectors on or in silicon. We also describe optimum quantum well design and distributed feedback cavity design to reduce the threshold and increase the efficiency and power output. The impact active silicon photonic integrated circuits could have on interconnects, telecommunications and on silicon electronics is reviewed. Biography: John Bowers holds the Fred Kavli Chair in Nanotechnology, and is the Director of the Institute for Energy Efficiency and a Professor in the Departments of Electrical and Computer Engineering and Materials at UCSB. He is a cofounder of Aurrion, Aerius Photonics and Calient Networks. Dr. Bowers received his M.S. and Ph.D. degrees from Stanford University and worked for AT&T Bell Laboratories and Honeywell before joining UC Santa Barbara. Dr. Bowers is a member of the National Academy of Engineering and a fellow of the IEEE, OSA and the American Physical Society. He is a recipient of the OSA/IEEE Tyndall Award, the OSA Holonyak Prize, the IEEE LEOS William Streifer Award and the South Coast Business and Technology Entrepreneur of the Year Award. He and coworkers received the EE Times Annual Creativity in Electronics (ACE) Award for Most Promising Technology for the hybrid silicon laser in 2007. Bowers' research is primarily in optoelectronics and photonic integrated circuits. He has published ten book chapters, 600 journal papers, 900 conference papers and has received 54 patents. He has published 180 invited papers and conference papers, and given 16 plenary talks at conferences. As well as Chong Zhang.
Software And Systems Engineering Risk Management
2010-04-01
RSKM 2004 COSO Enterprise RSKM Framework 2006 ISO/IEC 16085 Risk Management Process 2008 ISO/IEC 12207 Software Lifecycle Processes 2009 ISO/IEC...1 Software And Systems Engineering Risk Management John Walz VP Technical and Conferences Activities, IEEE Computer Society Vice-Chair Planning...Software & Systems Engineering Standards Committee, IEEE Computer Society US TAG to ISO TMB Risk Management Working Group Systems and Software
Analysis of Global Properties of Shapes
2010-06-01
Conference on Computer Vision (ICCV) ( Bejing , China , 2005), IEEE. [113] Thrun, S., and Wegbreit, B. Shape from symmetry. In Proceedings of the...International Conference on Computer Vision (ICCV) ( Bejing , China , 2005), IEEE. [114] Toshev, A., Shi, J., and Daniilidis, K. Image matching via saliency...applications ranging from sampling points to finding correspondences to shape simplification. Discrete variants of the Laplace-Beltrami opera - tor [108] and
High-precision arithmetic in mathematical physics
Bailey, David H.; Borwein, Jonathan M.
2015-05-12
For many scientific calculations, particularly those involving empirical data, IEEE 32-bit floating-point arithmetic produces results of sufficient accuracy, while for other applications IEEE 64-bit floating-point is more appropriate. But for some very demanding applications, even higher levels of precision are often required. Furthermore, this article discusses the challenge of high-precision computation, in the context of mathematical physics, and highlights what facilities are required to support future computation, in light of emerging developments in computer architecture.
Use of E-Learning Functionalities and Standards: The Spanish Case
ERIC Educational Resources Information Center
Llamas-Nistal, M.; Caeiro-Rodriguez, M.; Castro, M.
2011-01-01
This paper shows the results of a survey performed in Spain on the different functionalities of e-learning platforms. This survey was filled in by a group of teachers, experts in engineering education from across Spain, within the scope of the Spanish Chapter of the IEEE Education Society. This paper presents their opinions on several aspects of…
Election Verifiability: Cryptographic Definitions and an Analysis of Helios and JCJ
2015-04-01
anonymous credentials. In CSF’14: 27th Computer Security Foundations Symposium. IEEE Computer Society, 2014. To appear. [22] David Chaum . Untraceable...electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84–88, 1981. [23] David Chaum . Secret-ballot receipts...True voter-verifiable elections. IEEE Security and Privacy, 2(1):38–47, 2004. [24] David Chaum , Richard Carback, Jeremy Clark, Aleksander Essex, Stefan
49 CFR 395.18 - Matter incorporated by reference.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Technology—Telecommunications and information exchange between systems—Local and metropolitan area networks...) Specifications,” IEEE Computer Society, Sponsored by the LAN/MAN Standards Committee: June 12, 2007 (IEEE Std... 446-2008, American National Standard for Information Technology—Identifying Attributes for Named...
Telemetry Standards, IRIG Standard 106-17. Chapter 10. Digital Recording Standard
2017-07-01
10-28 10.7.9 Required Discrete Control Functions...1553 data bus, time, analog, video, Aeronautical Radio, Inc. 429, discrete , and Universal Asynchronous Receiver and Transmitter containing...Interfaces 10.3, 10.4 Fibre Channel and/or IEEE 1394b Data Download Port 10.3, 10.7 Discrete Lines and/or RS-232 and 422 Full Duplex Communication 10.3
Effects of Computer Architecture on FFT (Fast Fourier Transform) Algorithm Performance.
1983-12-01
Criteria for Efficient Implementation of FFT Algorithms," IEEE Transactions on Acoustics, Speech, and Signal Processing, Vol. ASSP-30, pp. 107-109, Feb...1982. Burrus, C. S. and P. W. Eschenbacher. "An In-Place, In-Order Prime Factor FFT Algorithm," IEEE Transactions on Acoustics, Speech, and Signal... Transactions on Acoustics, Speech, and Signal Processing, Vol. ASSP-30, pp. 217-226, Apr. 1982. Control Data Corporation. CDC Cyber 170 Computer Systems
2009-12-17
IEEE TDKE, 1996. 8( 1). 14. Garvey, T.D., The inference Problem for Computer Security. 1992, SRI International. 15. Chaum , D ., Blind Signatures for...Pervasive Computing Environments. IEEE Transactions on Vehicular Technology, 2006. 55(4). 17. Chaum , D ., Security without Identification: Transaction...Systems to make Big Brother Obsolete. Communications of the ACM 1985. 28(10). 18. Chaum , D ., Untraceable Electronic Mail, Return Addresses, and Digital
Semiconductor Nanowire and Nanoribbon Thermoelectrics: A Comprehensive Computational Study
2013-05-01
August 17-20, 2010). Available online through IEEE Xplore . http://dx.doi.org/10.1109/NANO.2010.5698047 4. Z. Aksamija and I. Knezevic...Korea (August 17-20, 2010). Available online through IEEE Xplore . http://dx.doi.org/10.1109/NANO.2010.5697827 5. D. Vasileska, K. Raleva, S. M...IWCE 2010) Available online through IEEE Xplore , http://dx.doi.org/10.1109/IWCE.2010.5677916 6. E. B. Ramayya and I. Knezevic, “Ultrascaled
NASA Astrophysics Data System (ADS)
de Turck, Koen; de Vuyst, Stijn; Fiems, Dieter; Wittevrongel, Sabine; Bruneel, Herwig
There is a considerable interest nowadays in making wireless telecommunication more energy-efficient. The sleep-mode mechanism in WiMAX (IEEE 802.16e) is one of such energy saving measures. Recently, Samsung proposed some modifications on the sleep-mode mechanism, scheduled to appear in the forthcoming IEEE 802.16m standard, aimed at minimizing the signaling overhead. In this work, we present a performance analysis of this proposal and clarify the differences with the standard mechanism included in IEEE 802.16e. We also propose some special algorithms aimed at reducing the computational complexity of the analysis.
ERIC Educational Resources Information Center
Concheiro, A. Alonso, Ed.; And Others
The following papers in English from this international conference may be of particular interest to those in the field of education. T. Nakahara, A. Tsukamota, and M. Matsumoto describe a computer-aided design technique for an economical urban cable television system. W. D. Wasson and R. K. Chitkara outline a recognition scheme based on analysis…
Software Defined Network Monitoring Scheme Using Spectral Graph Theory and Phantom Nodes
2014-09-01
networks is the emergence of software - defined networking ( SDN ) [1]. SDN has existed for the...Chapter III for network monitoring. A. SOFTWARE DEFINED NETWORKS SDNs provide a new and innovative method to simplify network hardware by logically...and R. Giladi, “Performance analysis of software - defined networking ( SDN ),” in Proc. of IEEE 21st International Symposium on Modeling, Analysis
A Monocular SLAM Method to Estimate Relative Pose During Satellite Proximity Operations
2015-03-26
localization and mapping with efficient outlier handling. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2013. 5. Herbert Bay...S.H. Spencer . Next generation advanced video guidance sensor. In Aerospace Conference, 2008 IEEE, pages 1–8, March 2008. 12. Michael Calonder, Vincent
Developing a Qualia-Based Multi-Agent Architecture for Use in Malware Detection
2010-03-01
executables were correctly classified with a 6% false positive rate [7]. Kolter and Maloof expand Schultz’s work by analyzing different...Proceedings of the 2001 IEEE Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 2001. [8] J. Z. Kolter and M. A. Maloof
New IEEE standard enables data collection for medical applications.
Kennelly, R J; Wittenber, J
1994-01-01
The IEEE has gone to ballot on a "Standard for Medical Device Communications", IEEE P1073. The lower layer, hardware portions of the standard are expected to be approved by the IEEE Standards Board at their December 11-13, 1994 meeting. Other portions of the standard are in the initial stages of the IEEE ballot process. The intent of the standard is to allow hospitals and other users to interface medical electronic devices to host computer systems in a standard, interchangeable manner. The standard is optimized for acute care environments such as ICU's, operating rooms, and emergency rooms. [1] IEEE General Committee and Subcommittee work has been on-going since 1984. Significant amounts of work have been done to discover and meet the needs of the patient care setting. Surveys performed in 1989 identified the following four key user requirements for medical device communications: 1) Frequent reconfiguration of the network. 2) Allow "plug and play" operation by users. 3) Associate devices with a specific bed and patient. 4) Support a wide range of hospital computer system topologies. Additionally, the most critical difference in the acute care setting is patient safety, which has an overall effect on the standard. The standard that went to ballot meets these requirements. The standard is based on existing ISO standards. P1073 is compliant with the OSI seven layer model. P1073 specifies the entire communication stack, from object-oriented software to hospital unique connectors. The standard will be able to be put forward as a true international standard, much in the way that the IEEE 802.x family of standards (like Ethernet) were presented as draft ISO standards.(ABSTRACT TRUNCATED AT 250 WORDS)
Appropriate Measures and Consistent Standard for High Energy Laser Beam Quality (Postprint)
2006-08-01
another. a We follow the 99% criteria [ Siegman , Lasers , chapter 17.1] which corresponds to a... Siegman , “ Lasers ” University Science Books, 1986. • A.E. Siegman , “New developments in laser resonators”, SPIE Vol. 1224, Optical Resonators, 1990...pp. 1-14. • Anthony E. Siegman & Steven W. Townsend, “Output Beam Propagation and Beam Quality from a Multimode Stable-Cavity Laser ”, IEEE Journal
Yang, Jack Y; Yang, Mary Qu; Arabnia, Hamid R; Deng, Youping
2008-09-16
Supported by National Science Foundation (NSF), International Society of Intelligent Biological Medicine (ISIBM), International Journal of Computational Biology and Drug Design and International Journal of Functional Informatics and Personalized Medicine, IEEE 7th Bioinformatics and Bioengineering attracted more than 600 papers and 500 researchers and medical doctors. It was the only synergistic inter/multidisciplinary IEEE conference with 24 Keynote Lectures, 7 Tutorials, 5 Cutting-Edge Research Workshops and 32 Scientific Sessions including 11 Special Research Interest Sessions that were designed dynamically at Harvard in response to the current research trends and advances. The committee was very grateful for the IEEE Plenary Keynote Lectures given by: Dr. A. Keith Dunker (Indiana), Dr. Jun Liu (Harvard), Dr. Brian Athey (Michigan), Dr. Mark Borodovsky (Georgia Tech and President of ISIBM), Dr. Hamid Arabnia (Georgia and Vice-President of ISIBM), Dr. Ruzena Bajcsy (Berkeley and Member of United States National Academy of Engineering and Member of United States Institute of Medicine of the National Academies), Dr. Mary Yang (United States National Institutes of Health and Oak Ridge, DOE), Dr. Chih-Ming Ho (UCLA and Member of United States National Academy of Engineering and Academician of Academia Sinica), Dr. Andy Baxevanis (United States National Institutes of Health), Dr. Arif Ghafoor (Purdue), Dr. John Quackenbush (Harvard), Dr. Eric Jakobsson (UIUC), Dr. Vladimir Uversky (Indiana), Dr. Laura Elnitski (United States National Institutes of Health) and other world-class scientific leaders. The Harvard meeting was a large academic event 100% full-sponsored by IEEE financially and academically. After a rigorous peer-review process, the committee selected 27 high-quality research papers from 600 submissions. The committee is grateful for contributions from keynote speakers Dr. Russ Altman (IEEE BIBM conference keynote lecturer on combining simulation and machine learning to recognize function in 4D), Dr. Mary Qu Yang (IEEE BIBM workshop keynote lecturer on new initiatives of detecting microscopic disease using machine learning and molecular biology, http://ieeexplore.ieee.org/servlet/opac?punumber=4425386) and Dr. Jack Y. Yang (IEEE BIBM workshop keynote lecturer on data mining and knowledge discovery in translational medicine) from the first IEEE Computer Society BioInformatics and BioMedicine (IEEE BIBM) international conference and workshops, November 2-4, 2007, Silicon Valley, California, USA.
2008-01-01
Supported by National Science Foundation (NSF), International Society of Intelligent Biological Medicine (ISIBM), International Journal of Computational Biology and Drug Design and International Journal of Functional Informatics and Personalized Medicine, IEEE 7th Bioinformatics and Bioengineering attracted more than 600 papers and 500 researchers and medical doctors. It was the only synergistic inter/multidisciplinary IEEE conference with 24 Keynote Lectures, 7 Tutorials, 5 Cutting-Edge Research Workshops and 32 Scientific Sessions including 11 Special Research Interest Sessions that were designed dynamically at Harvard in response to the current research trends and advances. The committee was very grateful for the IEEE Plenary Keynote Lectures given by: Dr. A. Keith Dunker (Indiana), Dr. Jun Liu (Harvard), Dr. Brian Athey (Michigan), Dr. Mark Borodovsky (Georgia Tech and President of ISIBM), Dr. Hamid Arabnia (Georgia and Vice-President of ISIBM), Dr. Ruzena Bajcsy (Berkeley and Member of United States National Academy of Engineering and Member of United States Institute of Medicine of the National Academies), Dr. Mary Yang (United States National Institutes of Health and Oak Ridge, DOE), Dr. Chih-Ming Ho (UCLA and Member of United States National Academy of Engineering and Academician of Academia Sinica), Dr. Andy Baxevanis (United States National Institutes of Health), Dr. Arif Ghafoor (Purdue), Dr. John Quackenbush (Harvard), Dr. Eric Jakobsson (UIUC), Dr. Vladimir Uversky (Indiana), Dr. Laura Elnitski (United States National Institutes of Health) and other world-class scientific leaders. The Harvard meeting was a large academic event 100% full-sponsored by IEEE financially and academically. After a rigorous peer-review process, the committee selected 27 high-quality research papers from 600 submissions. The committee is grateful for contributions from keynote speakers Dr. Russ Altman (IEEE BIBM conference keynote lecturer on combining simulation and machine learning to recognize function in 4D), Dr. Mary Qu Yang (IEEE BIBM workshop keynote lecturer on new initiatives of detecting microscopic disease using machine learning and molecular biology, http://ieeexplore.ieee.org/servlet/opac?punumber=4425386) and Dr. Jack Y. Yang (IEEE BIBM workshop keynote lecturer on data mining and knowledge discovery in translational medicine) from the first IEEE Computer Society BioInformatics and BioMedicine (IEEE BIBM) international conference and workshops, November 2-4, 2007, Silicon Valley, California, USA. PMID:18831773
ERIC Educational Resources Information Center
IEEE Conference on Software Engineering Education and Training, Proceedings (MS), 2012
2012-01-01
The Conference on Software Engineering Education and Training (CSEE&T) is the premier international peer-reviewed conference, sponsored by the Institute of Electrical and Electronics Engineers, Inc. (IEEE) Computer Society, which addresses all major areas related to software engineering education, training, and professionalism. This year, as…
Design of an Information Technology Undergraduate Program to Produce IT Versatilists
ERIC Educational Resources Information Center
Koohang, Alex; Riley, Liz; Smith, Terry; Floyd, Kevin
2010-01-01
This paper attempts to present a model for designing an IT undergraduate program that is based on the recommendations of the Association for Computer Machinery/Institute of Electrical and Electronics Engineers--Information Technology (ACM/IEEE--IT) Curriculum Model. The main intent is to use the ACM/IEEE--IT Curriculum Model's recommendations as a…
Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi
2017-09-21
Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.
Han, Youn-Hee; Min, Sung-Gi
2017-01-01
Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism. PMID:28934152
A Strategy for Improved System Assurance
2007-06-20
Quality (Measurements Life Cycle Safety, Security & Others) ISO /IEC 12207 * Software Life Cycle Processes ISO 9001 Quality Management System...14598 Software Product Evaluation Related ISO /IEC 90003 Guidelines for the Application of ISO 9001:2000 to Computer Software IEEE 12207 Industry...Implementation of International Standard ISO /IEC 12207 IEEE 1220 Standard for Application and Management of the System Engineering Process Use in
Creating a New Model Curriculum: A Rationale for "Computing Curricula 1990".
ERIC Educational Resources Information Center
Bruce, Kim B.
1991-01-01
Describes a model for the design of undergraduate curricula in the discipline of computing that was developed by the ACM/IEEE (Association for Computing Machinery/Institute of Electrical and Electronics Engineers) Computer Society Joint Curriculum Task Force. Institutional settings and structures in which computing degrees are awarded are…
Modeling Respiratory Gas Dynamics in the Aviator’s Breathing System. Volume 2. Appendices
1994-05-01
Rideout, at at. Dfference-Differentlat Equations for Fluid C... Flow in Distensible Tubes. IEEE Transactions on Bio-Medlcat C... Enginhering. Vot INE-14...McGraw-Hill; 1970; Chapter 13: 433-450. 12. Astrand, PO; Saltin, B. Oxygen uptake during the first minutes of heavy muscular exercise. J Appl Physiol...1802-1814; 1986. 233. Linehan, JH; Haworth, ST; Nelin, LD; Krenz, GS; Dawson, CA. A Simple Distensible Vessel Model for Interpreting Pulmonary
Mache: No-Loss Trace Compaction
1988-09-15
Data Compression . IEEE Computer 176 (June 1984), 8-19. 10. ZIV , J. AND LEMPEL , A. A Universal Algorithm for Sequential Data Com- pression. IEEE... compression scheme which takes ad- vantage of repeating patterns in the sequence of bytes. I have used the Lempel - Ziv compression algorithm [9,10,11...Transactions on Information Theory 23 (1976), 75-81. 11. ZIV , J. AND LEMPEL , A. Compression of Individual Sequences via Variable-
Advanced Numerical Techniques of Performance Evaluation. Volume 1
1990-06-01
system scheduling3thread. The scheduling thread then runs any other ready thread that can be found. A thread can only sleep or switch out on itself...Polychronopoulos and D.J. Kuck. Guided Self- Scheduling : A Practical Scheduling Scheme for Parallel Supercomputers. IEEE Transactions on Computers C...Kuck 1987] C.D. Polychronopoulos and D.J. Kuck. Guided Self- Scheduling : A Practical Scheduling Scheme for Parallel Supercomputers. IEEE Trans. on Comp
Real-Time-Simulation of IEEE-5-Bus Network on OPAL-RT-OP4510 Simulator
NASA Astrophysics Data System (ADS)
Atul Bhandakkar, Anjali; Mathew, Lini, Dr.
2018-03-01
The Real-Time Simulator tools have high computing technologies, improved performance. They are widely used for design and improvement of electrical systems. The advancement of the software tools like MATLAB/SIMULINK with its Real-Time Workshop (RTW) and Real-Time Windows Target (RTWT), real-time simulators are used extensively in many engineering fields, such as industry, education, and research institutions. OPAL-RT-OP4510 is a Real-Time Simulator which is used in both industry and academia. In this paper, the real-time simulation of IEEE-5-Bus network is carried out by means of OPAL-RT-OP4510 with CRO and other hardware. The performance of the network is observed with the introduction of fault at various locations. The waveforms of voltage, current, active and reactive power are observed in the MATLAB simulation environment and on the CRO. Also, Load Flow Analysis (LFA) of IEEE-5-Bus network is computed using MATLAB/Simulink power-gui load flow tool.
Interface Provides Standard-Bus Communication
NASA Technical Reports Server (NTRS)
Culliton, William G.
1995-01-01
Microprocessor-controlled interface (IEEE-488/LVABI) incorporates service-request and direct-memory-access features. Is circuit card enabling digital communication between system called "laser auto-covariance buffer interface" (LVABI) and compatible personal computer via general-purpose interface bus (GPIB) conforming to Institute for Electrical and Electronics Engineers (IEEE) Standard 488. Interface serves as second interface enabling first interface to exploit advantages of GPIB, via utility software written specifically for GPIB. Advantages include compatibility with multitasking and support of communication among multiple computers. Basic concept also applied in designing interfaces for circuits other than LVABI for unidirectional or bidirectional handling of parallel data up to 16 bits wide.
An Approach to Noise Reduction in Human Skin Admittance Measurements
2001-10-25
1966, 4, 439-449. [ 4] D. H. Gordon, "Triboelectric interference in the ECG", IEEE Trans., 1975, BME -22, 252-255. [ 5] J. C. Huhta and J. G...Webster, -Hz interference in electrocardiography", IEEE Trans., 1973, BME -20, 91-101. [ 6] S. Grimnes, "Electrovibration, cutaneous sensation of...this period he has published two textbooks about UNIX and Shell Programming, and concentrated at computer simulation and digital signal processing
Privacy Analysis of the Internet Protocol
2002-12-01
mixing approach first proposed for e-mail by David Chaum [Cha81]. The Onion Routing system maintains a set of mixing centers called onion routers...IEEE Computer, vol. 33, no. 5, pp. 59-67, May, 2000. 5. [Cha81] Chaum , D., Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms...the Internet,” Proceedings of IEEE COMPCON, 1997. 11. [Gol99] Goldschlag, David M., Reed, Michael G., and Syverson, Paul F., “Onion Routing for
Parametric Study of Beta-Endpoint Energy in Direct Energy Converters
2007-01-01
Circuits for Ultra-high Efficiency Micro- power Generators using Nickel-63 Radioisotope . Technical Digest, ISSCC, February 2006, 418– 19. 8. Lal, A...Zakar, E.; Dubey, M.; Lal, A. MEMS Radioisotope - powered Piezoelectric Power Generator. IEEE MEMS 2006, Istanbul, Turkey, January 2006, 94–97. 16... Power : A Radioisotope - powered Piezoelectric Generator. IEEE Pervasive Computing Jan-Mar 2005, 4 (1), 53–61. Lee, C.; Guo, H.; Radhakrishnan, S.; Lal, A
A Computational Model and Multi-Agent Simulation for Information Assurance
2002-06-01
Podell , Information Security: an Integrated Collection of Essays, IEEE Computer Society Press, Los Alamitos, CA, 1994. Brinkley, D. L. and Schell, R...R., “What is There to Worry About? An Introduction to the Computer Security Problem,” ed. Abrams and Jajodia and Podell , Information Security: an
A Survey of Parallel Computing
1988-07-01
Evaluating Two Massively Parallel Machines. Communications of the ACM .9, , , 176 BIBLIOGRAPHY 29, 8 (August), pp. 752-758. Gajski , D.D., Padua, D.A., Kuck...Computer Architecture, edited by Gajski , D. D., Milutinovic, V. M. Siegel, H. J. and Furht, B. P. IEEE Computer Society Press, Washington, D.C., pp. 387-407
Adaptive Topological Configuration of an Integrated Circuit/Packet-Switched Computer Network.
1984-01-01
Gitman et al. [45] state that there are basically two approaches to the integrated network design problem: (1) solve the link/capacity problem for...1972), 1385-1397. 33. Frank, H., and Gitman , I. Economic analysis of integrated voice and data networks: a case study. Proc. of IEEE 66 , 11 (Nov. 1978...1974), 1074-1079. 45. Gitman , I., Hsieh, W., and Occhiogrosso, B. J. Analysis and design of hybrid switching networks. IEEE Trans. on Comm. Com-29
Performance of Wireless Unattended Sensor Network in Maritime Applications
2007-06-01
longevity. Crossbow Technologies produces a number of gateways for use with their motes which include the MIB510, the MIB600 and the Stargate . The...MIB510 and MIB600 gateways require interface directly with a PC while he Stargate gateway interfaces remotely using the IEEE 802.11 standard for access...dedicated PC is unfeasible, the Stargate gateway allows remote access using the IEEE 802.11 standard. This can be accomplished via a Personal Computer
Neurale Netwerken en Radarsystemen (Neural Networks and Radar Systems)
1989-08-01
general issues in cognitive science", Parallel distributed processing, Vol 1: Foundations, Rumelhart et al. 1986 pp 110-146 THO rapport Pagina 151 36 D.E...34Neural networks (part 2)",Expert Focus, IEEE Expert, Spring 1988. 61 J.A. Anderson, " Cognitive and Psychological Computations with Neural Models", IEEE...Pagina 154 69 David H. Ackley, Geoffrey E. Hinton and Terrence J. Sejnowski, "A Learning Algorithm for Boltzmann machines", cognitive science 9, 147-169
Transmission Loss Calculation using A and B Loss Coefficients in Dynamic Economic Dispatch Problem
NASA Astrophysics Data System (ADS)
Jethmalani, C. H. Ram; Dumpa, Poornima; Simon, Sishaj P.; Sundareswaran, K.
2016-04-01
This paper analyzes the performance of A-loss coefficients while evaluating transmission losses in a Dynamic Economic Dispatch (DED) Problem. The performance analysis is carried out by comparing the losses computed using nominal A loss coefficients and nominal B loss coefficients in reference with load flow solution obtained by standard Newton-Raphson (NR) method. Density based clustering method based on connected regions with sufficiently high density (DBSCAN) is employed in identifying the best regions of A and B loss coefficients. Based on the results obtained through cluster analysis, a novel approach in improving the accuracy of network loss calculation is proposed. Here, based on the change in per unit load values between the load intervals, loss coefficients are updated for calculating the transmission losses. The proposed algorithm is tested and validated on IEEE 6 bus system, IEEE 14 bus, system IEEE 30 bus system and IEEE 118 bus system. All simulations are carried out using SCILAB 5.4 (www.scilab.org) which is an open source software.
Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria. Version 1.
1987-07-01
for Secure Computer Systema, MTR-3153, The MITRE Corporation, Bedford, MA, June 1975. 1 See, for example, M. D. Abrams and H. J. Podell , Tutorial...References References Abrams, M. D. and H. J. Podell , Tutorial: Computer and Network Security, IEEE Com- puter Society Press, 1987. Addendum to the
Improving the Energy Market: Algorithms, Market Implications, and Transmission Switching
NASA Astrophysics Data System (ADS)
Lipka, Paula Ann
This dissertation aims to improve ISO operations through a better real-time market solution algorithm that directly considers both real and reactive power, finds a feasible Alternating Current Optimal Power Flow solution, and allows for solving transmission switching problems in an AC setting. Most of the IEEE systems do not contain any thermal limits on lines, and the ones that do are often not binding. Chapter 3 modifies the thermal limits for the IEEE systems to create new, interesting test cases. Algorithms created to better solve the power flow problem often solve the IEEE cases without line limits. However, one of the factors that makes the power flow problem hard is thermal limits on the lines. The transmission networks in practice often have transmission lines that become congested, and it is unrealistic to ignore line limits. Modifying the IEEE test cases makes it possible for other researchers to be able to test their algorithms on a setup that is closer to the actual ISO setup. This thesis also examines how to convert limits given on apparent power---as is in the case in the Polish test systems---to limits on current. The main consideration in setting line limits is temperature, which linearly relates to current. Setting limits on real or apparent power is actually a proxy for using the limits on current. Therefore, Chapter 3 shows how to convert back to the best physical representation of line limits. A sequential linearization of the current-voltage formulation of the Alternating Current Optimal Power Flow (ACOPF) problem is used to find an AC-feasible generator dispatch. In this sequential linearization, there are parameters that are set to the previous optimal solution. Additionally, to improve accuracy of the Taylor series approximations that are used, the movement of the voltage is restricted. The movement of the voltage is allowed to be very large at the first iteration and is restricted further on each subsequent iteration, with the restriction corresponding to the accuracy and AC-feasiblity of the solution. This linearization was tested on the IEEE and Polish systems, which range from 14 to 3375 buses and 20 to 4161 transmission lines. It had an accuracy of 0.5% or less for all but the 30-bus system. It also solved in linear time with CPLEX, while the non-linear version solved in O(n1.11) to O(n1.39). The sequential linearization is slower than the nonlinear formulation for smaller problems, but faster for larger problems, and its linear computational time means it would continue solving faster for larger problems. A major consideration to implementing algorithms to solve the optimal generator dispatch is ensuring that the resulting prices from the algorithm will support the market. Since the sequential linearization is linear, it is convex, its marginal values are well-defined, and there is no duality gap. The prices and settlements obtained from the sequential linearization therefore can be used to run a market. This market will include extra prices and settlements for reactive power and voltage, compared to the present-day market, which is based on real power. An advantage of this is that there is a very clear pool that can be used for reactive power/voltage support payments, while presently there is not a clear pool to take them out of. This method also reveals how valuable reactive power and voltage are at different locations, which can enable better planning of reactive resource construction. Transmission switching increases the feasible region of the generator dispatch, which means there may be a better solution than without transmission switching. Power flows on transmission lines are not directly controllable; rather, the power flows according to how it is injected and the physical characteristics of the lines. Changing the network topology changes the physical characteristics, which changes the flows. This means that sets of generator dispatch that may have previously been infeasible due to the flow exceeding line constraints may be feasible, since the flows will be different and may meet line constraints. However, transmission switching is a mixed integer problem, which may have a very slow solution time. For economic switching, we examine a series of heuristics. We examine the congestion rent heuristic in detail and then examine many other heuristics at a higher level. Post-contingency corrective switching aims to fix issues in the power network after a line or generator outage. In Chapter 7, we show that using the sequential linear program with corrective switching helps solve voltage and excessive flow issues. (Abstract shortened by UMI.).
The Computer-Job Salary Picture.
ERIC Educational Resources Information Center
Basta, Nicholas
1987-01-01
Discusses starting salaries for graduates with various degrees in computer science and electrical engineering. Summarizes the results of a recent study by the Institute of Electrical and Electronics Engineers (IEEE) which provides salary estimates for graduates in different specialties and in different geographical locations. (TW)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lloyd, G. Scott
This floating-point arithmetic library contains a software implementation of Universal Numbers (unums) as described by John Gustafson [1]. The unum format is a superset of IEEE 754 floating point with several advantages. Computing with unums provides more accurate answers without rounding errors, underflow or overflow. In contrast to fixed-sized IEEE numbers, a variable number of bits can be used to encode unums. This all allows number with only a few significant digits or with a small dynamic range to be represented more compactly.
Implementation of a Fault Tolerant Control Unit within an FPGA for Space Applications
2006-12-01
Conference 2002, September 2002. [20] M. Alderighi, A. Candelori, F. Casini, S. D’Angelo, M. Mancini, A. Paccagnella, S. Pastore , G.R. Sechi, “Heavy...Luigi Carro and Ricardo Reis , “Designing and Testing Fault-Tolerant Techniques for SRAM-based FPGAs,” in Proc. 1st Conference on Computer Frontiers, pp...susceptibility,” in IEEE Proc. 12th IEEE Intl. Symposium on On-Line Testing, pp. 89-91, 2006. [45] Fernanda Lima, Luigi Carro and Ricardo Reis
Arnold, Jeffrey
2018-05-14
Floating-point computations are at the heart of much of the computing done in high energy physics. The correctness, speed and accuracy of these computations are of paramount importance. The lack of any of these characteristics can mean the difference between new, exciting physics and an embarrassing correction. This talk will examine practical aspects of IEEE 754-2008 floating-point arithmetic as encountered in HEP applications. After describing the basic features of IEEE floating-point arithmetic, the presentation will cover: common hardware implementations (SSE, x87) techniques for improving the accuracy of summation, multiplication and data interchange compiler options for gcc and icc affecting floating-point operations hazards to be avoided. About the speaker: Jeffrey M Arnold is a Senior Software Engineer in the Intel Compiler and Languages group at Intel Corporation. He has been part of the Digital->Compaq->Intel compiler organization for nearly 20 years; part of that time, he worked on both low- and high-level math libraries. Prior to that, he was in the VMS Engineering organization at Digital Equipment Corporation. In the late 1980s, Jeff spent 2½ years at CERN as part of the CERN/Digital Joint Project. In 2008, he returned to CERN to spent 10 weeks working with CERN/openlab. Since that time, he has returned to CERN multiple times to teach at openlab workshops and consult with various LHC experiments. Jeff received his Ph.D. in physics from Case Western Reserve University.
"Reliability Of Fiber Optic Lans"
NASA Astrophysics Data System (ADS)
Code n, Michael; Scholl, Frederick; Hatfield, W. Bryan
1987-02-01
Fiber optic Local Area Network Systems are being used to interconnect increasing numbers of nodes. These nodes may include office computer peripherals and terminals, PBX switches, process control equipment and sensors, automated machine tools and robots, and military telemetry and communications equipment. The extensive shared base of capital resources in each system requires that the fiber optic LAN meet stringent reliability and maintainability requirements. These requirements are met by proper system design and by suitable manufacturing and quality procedures at all levels of a vertically integrated manufacturing operation. We will describe the reliability and maintainability of Codenoll's passive star based systems. These include LAN systems compatible with Ethernet (IEEE 802.3) and MAP (IEEE 802.4), and software compatible with IBM Token Ring (IEEE 802.5). No single point of failure exists in this system architecture.
Can Humans Fly Action Understanding with Multiple Classes of Actors
2015-06-08
recognition using structure from motion point clouds. In European Conference on Computer Vision, 2008. [5] R. Caruana. Multitask learning. Machine Learning...tonomous driving ? the kitti vision benchmark suite. In IEEE Conference on Computer Vision and Pattern Recognition, 2012. [12] L. Gorelick, M. Blank
Real-time modeling and simulation of distribution feeder and distributed resources
NASA Astrophysics Data System (ADS)
Singh, Pawan
The analysis of the electrical system dates back to the days when analog network analyzers were used. With the advent of digital computers, many programs were written for power-flow and short circuit analysis for the improvement of the electrical system. Real-time computer simulations can answer many what-if scenarios in the existing or the proposed power system. In this thesis, the standard IEEE 13-Node distribution feeder is developed and validated on a real-time platform OPAL-RT. The concept and the challenges of the real-time simulation are studied and addressed. Distributed energy resources include some of the commonly used distributed generation and storage devices like diesel engine, solar photovoltaic array, and battery storage system are modeled and simulated on a real-time platform. A microgrid encompasses a portion of an electric power distribution which is located downstream of the distribution substation. Normally, the microgrid operates in paralleled mode with the grid; however, scheduled or forced isolation can take place. In such conditions, the microgrid must have the ability to operate stably and autonomously. The microgrid can operate in grid connected and islanded mode, both the operating modes are studied in the last chapter. Towards the end, a simple microgrid controller modeled and simulated on the real-time platform is developed for energy management and protection for the microgrid.
Mitigating Spam Using Spatio-Temporal Reputation
2010-01-01
scalable; computation can occur in near real-time and over 500,000 emails can be scored an hour. 1 Introduction Roughly 90% of the total volume of email on...Sokolsky, and J. M. Smith. Dynamic trust management. IEEE Computer (Special Issue on Trust Mangement ), 2009. [11] P. Boykins and B. Roychowdhury
2014-08-12
Nolan Warner, Mubarak Shah. Tracking in Dense Crowds Using Prominenceand Neighborhood Motion Concurrence, IEEE Transactions on Pattern Analysis...of computer vision, computer graphics and evacuation dynamics by providing a common platform, and provides...areas that includes Computer Vision, Computer Graphics , and Pedestrian Evacuation Dynamics. Despite the
Campus-Wide Computing: Early Results Using Legion at the University of Virginia
2006-01-01
Bernard et al., “Primitives for Distributed Computing in a Heterogeneous Local Area Network Environ- ment”, IEEE Trans on Soft. Eng. vol. 15, no. 12...1994. [16] F. Ferstl, “CODINE Technical Overview,” Genias, April, 1993. [17] R. F. Freund and D. S. Cornwell , “Superconcurrency: A form of distributed
Scalable Vector Media-processors for Embedded Systems
2002-05-01
Set Architecture for Multimedia “When you do the common things in life in an uncommon way, you will command the attention of the world.” George ...Bibliography [ABHS89] M. August, G. Brost , C. Hsiung, and C. Schiffleger. Cray X-MP: The Birth of a Super- computer. IEEE Computer, 22(1):45–52, January
Securing Emergency State Data in a Tactical Computing Environment
2010-12-01
in a Controlled Manner, 19th IEEE Symposium on Computer-Based Medical Systems (CBMS), 847–854. [38] K. Kifayat, D. Llewellyn - Jones , A. Arabo, O...Drew, M. Merabti, Q. Shi, A. Waller, R. Craddock, G. Jones , State-of-the-Art in System-of-Systems Security for Crisis Management, Fourth Annual
Theoretical Investigation of Optical Computing Based on Neural Network Models.
1987-09-29
34 Cognitive and Psychological Computation with Neu- ral Models," IEEE Trans. Sys., Man, and cyber., SMC-13, p. 799, 1983. 20’ K. Nakano, "Association-A...7),482(1986). 211 F. Rosenblatt, Principles of Neurodynamics : Perceptron and the The- ory of Brain Mechanisms, Spartan Books, Washington,(1961). 22
A Placement Test for Computer Science: Design, Implementation, and Analysis
ERIC Educational Resources Information Center
Nugent, Gwen; Soh, Leen-Kiat; Samal, Ashok; Lang, Jeff
2006-01-01
An introductory CS1 course presents problems for educators and students due to students' diverse background in programming knowledge and exposure. Students who enroll in CS1 also have different expectations and motivations. Prompted by the curricular guidelines for undergraduate programmes in computer science released in 2001 by the ACM/IEEE, and…
An Investigation of Memory Latency Reduction Using an Address Prediction Buffer
1992-12-01
McGraw-Hill Inc.. London, England, 1991. [GAJSKI87] Gajski , D.D. et al, Computer Architecture, IEEE Computer Society Press, Washington, D.C., 1987...California, (vol 19 no 3), 1991. [NOWICK92] Nowicki, G ., "Design and Implementation of a Read Prediction Buffer", Master’s Thesis, Naval Postgraduate School
A note on bound constraints handling for the IEEE CEC'05 benchmark function suite.
Liao, Tianjun; Molina, Daniel; de Oca, Marco A Montes; Stützle, Thomas
2014-01-01
The benchmark functions and some of the algorithms proposed for the special session on real parameter optimization of the 2005 IEEE Congress on Evolutionary Computation (CEC'05) have played and still play an important role in the assessment of the state of the art in continuous optimization. In this article, we show that if bound constraints are not enforced for the final reported solutions, state-of-the-art algorithms produce infeasible best candidate solutions for the majority of functions of the IEEE CEC'05 benchmark function suite. This occurs even though the optima of the CEC'05 functions are within the specified bounds. This phenomenon has important implications on algorithm comparisons, and therefore on algorithm designs. This article's goal is to draw the attention of the community to the fact that some authors might have drawn wrong conclusions from experiments using the CEC'05 problems.
The cortical mouse: a piece of forgotten history in noninvasive brain–computer interfaces.
Principe, Jose C
2013-07-01
Early research on brain-computer interfaces (BCIs) was fueled by the study of event-related potentials (ERPs) by Farwell and Donchin, who are rightly credited for laying important groundwork for the BCI field. However, many other researchers have made substantial contributions that have escaped the radar screen of the current BCI community. For example, in the late 1980s, I worked with a brilliant multidisciplinary research group in electrical engineering at the University of Florida, Gainesville, headed by Dr. Donald Childers. Childers should be well known to long-time members of the IEEE Engineering in Medicine and Biology Society since he was the editor-in-chief of IEEE Transactions on Biomedical Engineering in the 1970s and the recipient of one of the most prestigious society awards, the William J. Morlock Award, in 1973.
Blind quantum computing with weak coherent pulses.
Dunjko, Vedran; Kashefi, Elham; Leverrier, Anthony
2012-05-18
The universal blind quantum computation (UBQC) protocol [A. Broadbent, J. Fitzsimons, and E. Kashefi, in Proceedings of the 50th Annual IEEE Symposiumon Foundations of Computer Science (IEEE Computer Society, Los Alamitos, CA, USA, 2009), pp. 517-526.] allows a client to perform quantum computation on a remote server. In an ideal setting, perfect privacy is guaranteed if the client is capable of producing specific, randomly chosen single qubit states. While from a theoretical point of view, this may constitute the lowest possible quantum requirement, from a pragmatic point of view, generation of such states to be sent along long distances can never be achieved perfectly. We introduce the concept of ϵ blindness for UBQC, in analogy to the concept of ϵ security developed for other cryptographic protocols, allowing us to characterize the robustness and security properties of the protocol under possible imperfections. We also present a remote blind single qubit preparation protocol with weak coherent pulses for the client to prepare, in a delegated fashion, quantum states arbitrarily close to perfect random single qubit states. This allows us to efficiently achieve ϵ-blind UBQC for any ϵ>0, even if the channel between the client and the server is arbitrarily lossy.
Blind Quantum Computing with Weak Coherent Pulses
NASA Astrophysics Data System (ADS)
Dunjko, Vedran; Kashefi, Elham; Leverrier, Anthony
2012-05-01
The universal blind quantum computation (UBQC) protocol [A. Broadbent, J. Fitzsimons, and E. Kashefi, in Proceedings of the 50th Annual IEEE Symposiumon Foundations of Computer Science (IEEE Computer Society, Los Alamitos, CA, USA, 2009), pp. 517-526.] allows a client to perform quantum computation on a remote server. In an ideal setting, perfect privacy is guaranteed if the client is capable of producing specific, randomly chosen single qubit states. While from a theoretical point of view, this may constitute the lowest possible quantum requirement, from a pragmatic point of view, generation of such states to be sent along long distances can never be achieved perfectly. We introduce the concept of ɛ blindness for UBQC, in analogy to the concept of ɛ security developed for other cryptographic protocols, allowing us to characterize the robustness and security properties of the protocol under possible imperfections. We also present a remote blind single qubit preparation protocol with weak coherent pulses for the client to prepare, in a delegated fashion, quantum states arbitrarily close to perfect random single qubit states. This allows us to efficiently achieve ɛ-blind UBQC for any ɛ>0, even if the channel between the client and the server is arbitrarily lossy.
Erdemir, Ahmet; Guess, Trent M.; Halloran, Jason P.; Modenese, Luca; Reinbolt, Jeffrey A.; Thelen, Darryl G.; Umberger, Brian R.
2016-01-01
Objective The overall goal of this document is to demonstrate that dissemination of models and analyses for assessing the reproducibility of simulation results can be incorporated in the scientific review process in biomechanics. Methods As part of a special issue on model sharing and reproducibility in IEEE Transactions on Biomedical Engineering, two manuscripts on computational biomechanics were submitted: A. Rajagopal et al., IEEE Trans. Biomed. Eng., 2016 and A. Schmitz and D. Piovesan, IEEE Trans. Biomed. Eng., 2016. Models used in these studies were shared with the scientific reviewers and the public. In addition to the standard review of the manuscripts, the reviewers downloaded the models and performed simulations that reproduced results reported in the studies. Results There was general agreement between simulation results of the authors and those of the reviewers. Discrepancies were resolved during the necessary revisions. The manuscripts and instructions for download and simulation were updated in response to the reviewers’ feedback; changes that may otherwise have been missed if explicit model sharing and simulation reproducibility analysis were not conducted in the review process. Increased burden on the authors and the reviewers, to facilitate model sharing and to repeat simulations, were noted. Conclusion When the authors of computational biomechanics studies provide access to models and data, the scientific reviewers can download and thoroughly explore the model, perform simulations, and evaluate simulation reproducibility beyond the traditional manuscript-only review process. Significance Model sharing and reproducibility analysis in scholarly publishing will result in a more rigorous review process, which will enhance the quality of modeling and simulation studies and inform future users of computational models. PMID:28072567
Modality-Driven Classification and Visualization of Ensemble Variance
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bensema, Kevin; Gosink, Luke; Obermaier, Harald
Paper for the IEEE Visualization Conference Advances in computational power now enable domain scientists to address conceptual and parametric uncertainty by running simulations multiple times in order to sufficiently sample the uncertain input space.
The RISC (Reduced Instruction Set Computer) Architecture and Computer Performance Evaluation.
1986-03-01
time where the main emphasis of the evaluation process is put on the software . The model is intended to provide a tool for computer architects to use...program, or 3) Was to be implemented in random logic more effec- tively than the equivalent sequence of software instructions. Both data and address...definition is the IEEE standard 729-1983 stating Computer Architecture as: " The process of defining a collection of hardware and software components and
Organizing the History of Computing
NASA Astrophysics Data System (ADS)
Misa, Thomas J.
This paper tries to distill some of the ‘lessons learned’ from the Charles Babbage Institute’s quarter-century experience (1980-present) in organizing the history of computing. It draws on the author’s (recent) experience as CBI director; conversations with Arthur Norberg, CBI’s long-time founding director; and papers delivered at a special symposium appraising CBI’s role in computing history, which appeared in the IEEE Annals of the History of Computing 29 no. 4 (October-December 2007).
Socially Relevant Knowledge Based Telemedicine
2011-10-01
or attitude at different situations and different circumstances. Fogg mentions that there are many reasons that computers can be better persuaders...finding appropriate way to persuade users to perform various activities. Fogg [8] defines persuasive technologies as “interactive computing systems...Education, IEEE Consumer Electronics Society Conference Games Innovation, ICE-GIC, 2009, pp 54-63. [8] Fogg , B. J., Persuasive Technology: Using
ERIC Educational Resources Information Center
Chamberlain, Ed
A cost benefit study was conducted to determine the effectiveness of a computer assisted instruction/computer management system (CAI/CMS) as an alternative to conventional methods of teaching reading within Chapter 1 and DPPF funded programs of the Columbus (Ohio) Public Schools. The Chapter 1 funded Compensatory Language Experiences and Reading…
A 1998 Workshop on Heterogeneous Computing
1998-09-18
of Sussex, England, in 1994. From 1988 to 1990 he was a Lecturer with the UNAM. In 1994, he joined the Laboratorio Nacional de Informatica Avanzada...1984) and at the UNAM (1988-1991). Since 1992, he is titular Researcher and consultant at the Laboratorio Nacional de Informatica Avanzada (LANIA). He...Box 1331 Piscataway, NJ 08855-1331 Tel: + 1-908-981-1393 Fax: + 1-908-981-9667 mis.custserv@computer.org IEEE Computer Society 13, Avenue de
TomoBank: a tomographic data repository for computational x-ray science
NASA Astrophysics Data System (ADS)
De Carlo, Francesco; Gürsoy, Doğa; Ching, Daniel J.; Joost Batenburg, K.; Ludwig, Wolfgang; Mancini, Lucia; Marone, Federica; Mokso, Rajmund; Pelt, Daniël M.; Sijbers, Jan; Rivers, Mark
2018-03-01
There is a widening gap between the fast advancement of computational methods for tomographic reconstruction and their successful implementation in production software at various synchrotron facilities. This is due in part to the lack of readily available instrument datasets and phantoms representative of real materials for validation and comparison of new numerical methods. Recent advancements in detector technology have made sub-second and multi-energy tomographic data collection possible (Gibbs et al 2015 Sci. Rep. 5 11824), but have also increased the demand to develop new reconstruction methods able to handle in situ (Pelt and Batenburg 2013 IEEE Trans. Image Process. 22 5238-51) and dynamic systems (Mohan et al 2015 IEEE Trans. Comput. Imaging 1 96-111) that can be quickly incorporated in beamline production software (Gürsoy et al 2014 J. Synchrotron Radiat. 21 1188-93). The x-ray tomography data bank, tomoBank, provides a repository of experimental and simulated datasets with the aim to foster collaboration among computational scientists, beamline scientists, and experimentalists and to accelerate the development and implementation of tomographic reconstruction methods for synchrotron facility production software by providing easy access to challenging datasets and their descriptors.
Deployment of Directory Service for IEEE N Bus Test System Information
NASA Astrophysics Data System (ADS)
Barman, Amal; Sil, Jaya
2008-10-01
Exchanging information over Internet and Intranet becomes a defacto standard in computer applications, among various users and organizations. Distributed system study, e-governance etc require transparent information exchange between applications, constituencies, manufacturers, and vendors. To serve these purposes database system is needed for storing system data and other relevant information. Directory service, which is a specialized database along with access protocol, could be the single solution since it runs over TCP/IP, supported by all POSIX compliance platforms and is based on open standard. This paper describes a way to deploy directory service, to store IEEE n bus test system data and integrating load flow program with it.
Enhancing the Selection of Backoff Interval Using Fuzzy Logic over Wireless Ad Hoc Networks
Ranganathan, Radha; Kannan, Kathiravan
2015-01-01
IEEE 802.11 is the de facto standard for medium access over wireless ad hoc network. The collision avoidance mechanism (i.e., random binary exponential backoff—BEB) of IEEE 802.11 DCF (distributed coordination function) is inefficient and unfair especially under heavy load. In the literature, many algorithms have been proposed to tune the contention window (CW) size. However, these algorithms make every node select its backoff interval between [0, CW] in a random and uniform manner. This randomness is incorporated to avoid collisions among the nodes. But this random backoff interval can change the optimal order and frequency of channel access among competing nodes which results in unfairness and increased delay. In this paper, we propose an algorithm that schedules the medium access in a fair and effective manner. This algorithm enhances IEEE 802.11 DCF with additional level of contention resolution that prioritizes the contending nodes according to its queue length and waiting time. Each node computes its unique backoff interval using fuzzy logic based on the input parameters collected from contending nodes through overhearing. We evaluate our algorithm against IEEE 802.11, GDCF (gentle distributed coordination function) protocols using ns-2.35 simulator and show that our algorithm achieves good performance. PMID:25879066
Compliance and Functional Testing of IEEE 1451.1 for NCAP-to-NCAP Communications in a Sensor Network
NASA Technical Reports Server (NTRS)
Figueroa, Jorge; Gurkan, Deniz; Yuan, X.; Benhaddou, D.; Liu, H.; Singla, A.; Franzl, R.; Ma, H.; Bhatt, S.; Morris, J.;
2008-01-01
Distributed control in a networked environment is an irreplaceable feature in systems with remote sensors and actuators. Although distributed control was not originally designed to be networked, usage of off-the-shelf networking technologies has become so prevalent that control systems are desired to have access mechanisms similar to computer networks. However, proprietary transducer interfaces for network communications and distributed control overwhelmingly dominate this industry. Unless the lack of compatibility and interoperability among transducers is resolved, the mature level of access (that computer networking can deliver) will not be achieved in such networked distributed control systems. Standardization of networked transducer interfaces will enable devices from different manufacturers to talk to each other and ensure their plug-and-play capability. One such standard is the suite of IEEE 1451 for sensor network communication and transducer interfaces. The suite not only provides a standard interface for smart transducers, but also outlines the connection of an NCAP (network capable application processor) and transducers (through a transducer interface module TIM). This paper presents the design of the compliance testing of IEEE 1451.1 (referred to as Dot1) compatible NCAP-to-NCAP communications on a link-layer independent medium. The paper also represents the first demonstration of NCAP-to-NCAP communications with Dot1 compatibility: a tester NCAP and an NCAP under test (NUT).
Computational estimation of magnetically induced electric fields in a rotating head
NASA Astrophysics Data System (ADS)
Ilvonen, Sami; Laakso, Ilkka
2009-01-01
Change in a magnetic field, or similarly, movement in a strong static magnetic field induces electric fields in human tissues, which could potentially cause harmful effects. In this paper, the fields induced by different rotational movements of a head in a strong homogeneous magnetic field are computed numerically. Average field magnitudes near the retinas and inner ears are studied in order to gain insight into the causes of phosphenes and vertigo-like effects, which are associated with extremely low-frequency (ELF) magnetic fields. The induced electric fields are calculated in four different anatomically realistic head models using an efficient finite-element method (FEM) solver. The results are compared with basic restriction limits by IEEE and ICNIRP. Under rotational movement of the head, with a magnetic flux rate of change of 1 T s-1, the maximum IEEE-averaged electric field and maximum ICNIRP-averaged current density were 337 mV m-1 and 8.84 mA m-2, respectively. The limits by IEEE seem significantly stricter than those by ICNIRP. The results show that a magnetic flux rate of change of 1 T s-1 may induce electric field in the range of 50 mV m-1 near retinas, and possibly even larger values near the inner ears. These results provide information for approximating the threshold electric field values of phosphenes and vertigo-like effects.
2006-09-30
IEEE OES Student Poster Program Oceans ’05 Europe, Brest, France, June 20-23, 2005. Sponsored by Thales Underwater Systems. Student Engagement Award to E.-M. Nosal – Maui High Performance Computing Center (2005-2006).
2011-01-01
and G. Armitage. Dening and evaluating greynets (sparse darknets ). In LCN: Proceedings of the IEEE Conference on Local Computer Networks 30th...analysis of distributed darknet trac. In IMC: Proceedings of the USENIX/ACM Internet Measurement Conference, 2005. Indexing Full Packet Capture Data
IEEE TRANSACTIONS ON CYBERNETICS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Craig R. RIeger; David H. Scheidt; William D. Smart
2014-11-01
MODERN societies depend on complex and critical infrastructures for energy, transportation, sustenance, medical care, emergency response, communications security. As computers, automation, and information technology (IT) have advanced, these technologies have been exploited to enhance the efficiency of operating the processes that make up these infrastructures
Computer Applications in Reading. Third Edition.
ERIC Educational Resources Information Center
Blanchard, Jay S.; And Others
Intended as a reference for researchers, teachers, and administrators, this book chronicles research, programs, and uses of computers in reading. Chapter 1 provides a broad view of computer applications in education, while Chapter 2 provides annotated references for computer based reading and language arts programs for children and adults in…
Friendly Neighborhood Computer Project. Extension of the IBM NJE network to DEC VAX computers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Raffenetti, R.C.; Bertoncini, P.J.; Engert, D.E.
1984-07-01
This manual is divided into six chapters. The first is an overview of the VAX NJE emulator system and describes what can be done with the VAX NJE emulator software. The second chapter describes the commands that users of the VAX systems will use. Each command description includes the format of the command, a list of valid options and parameters and their meanings, and several short examples of command use. The third chapter describes the commands and capabilities for sending general, sequential files from and to VAX VMS nodes. The fourth chapter describes how to transmit data to a VAXmore » from other computer systems on the network. The fifth chapter explains how to exchange electronic mail with IBM CMS users and with users of other VAX VMS systems connected by NJE communications. The sixth chapter describes operator procedures and the additional commands operators may use.« less
An IEEE 1451.1 Architecture for ISHM Applications
NASA Technical Reports Server (NTRS)
Morris, Jon A.; Turowski, Mark; Schmalzel, John L.; Figueroa, Jorge F.
2007-01-01
The IEEE 1451.1 Standard for a Smart Transducer Interface defines a common network information model for connecting and managing smart elements in control and data acquisition networks using network-capable application processors (NCAPs). The Standard is a network-neutral design model that is easily ported across operating systems and physical networks for implementing complex acquisition and control applications by simply plugging in the appropriate network level drivers. To simplify configuration and tracking of transducer and actuator details, the family of 1451 standards defines a Transducer Electronic Data Sheet (TEDS) that is associated with each physical element. The TEDS contains all of the pertinent information about the physical operations of a transducer (such as operating regions, calibration tables, and manufacturer information), which the NCAP uses to configure the system to support a specific transducer. The Integrated Systems Health Management (ISHM) group at NASA's John C. Stennis Space Center (SSC) has been developing an ISHM architecture that utilizes IEEE 1451.1 as the primary configuration and data acquisition mechanism for managing and collecting information from a network of distributed intelligent sensing elements. This work has involved collaboration with other NASA centers, universities and aerospace industries to develop IEEE 1451.1 compliant sensors and interfaces tailored to support health assessment of complex systems. This paper and presentation describe the development and implementation of an interface for the configuration, management and communication of data, information and knowledge generated by a distributed system of IEEE 1451.1 intelligent elements monitoring a rocket engine test system. In this context, an intelligent element is defined as one incorporating support for the IEEE 1451.x standards and additional ISHM functions. Our implementation supports real-time collection of both measurement data (raw ADC counts and converted engineering units) and health statistics produced by each intelligent element. The handling of configuration, calibration and health information is automated by using the TEDS in combination with other electronic data sheets extensions to convey health parameters. By integrating the IEEE 1451.1 Standard for a Smart Transducer Interface with ISHM technologies, each element within a complex system becomes a highly flexible computation engine capable of self-validation and performing other measures of the quality of information it is producing.
MCloud: Secure Provenance for Mobile Cloud Users
2016-10-03
Feasibility of Smartphone Clouds , 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid). 04-MAY- 15, Shenzhen, China...final decision. MCloud: Secure Provenance for Mobile Cloud Users Final Report Bogdan Carbunar Florida International University Computing and...Release; Distribution Unlimited UU UU UU UU 03-10-2016 31-May-2013 30-May-2016 Final Report: MCloud: Secure Provenance for Mobile Cloud Users The views
Probabilistic QoS Analysis In Wireless Sensor Networks
2012-04-01
and A.O. Fapojuwo. TDMA scheduling with optimized energy efficiency and minimum delay in clustered wireless sensor networks . IEEE Trans. on Mobile...Research Computer Science and Engineering, Department of 5-1-2012 Probabilistic QoS Analysis in Wireless Sensor Networks Yunbo Wang University of...Wang, Yunbo, "Probabilistic QoS Analysis in Wireless Sensor Networks " (2012). Computer Science and Engineering: Theses, Dissertations, and Student
1987-05-01
34 Advances in Crypt g: Proceedings of CRYPTO 84,r o ... .. .. _ __...o ... .. ... ....... ed. by G.R. Blakely and D. Chaum . [Wagn84b] Wagner, Neal R...in Distributed Computer Systems," IEEE Trans. on Computers, Vol. C-35, No. 7, Jul. 86, pp. 583-590. Gifford, David K., "Cryptographic Sealing for
Natural Tasking of Robots Based on Human Interaction Cues
2005-06-01
MIT. • Matthew Marjanovic , researcher, ITA Software. • Brian Scasselatti, Assistant Professor of Computer Science, Yale. • Matthew Williamson...2004. 25 [74] Charlie C. Kemp. Shoes as a platform for vision. 7th IEEE International Symposium on Wearable Computers, 2004. [75] Matthew Marjanovic ...meso: Simulated muscles for a humanoid robot. Presentation for Humanoid Robotics Group, MIT AI Lab, August 2001. [76] Matthew J. Marjanovic . Teaching
Training in software used by practising engineers should be included in university curricula
NASA Astrophysics Data System (ADS)
Silveira, A.; Perdigones, A.; García, J. L.
2009-04-01
Deally, an engineering education should prepare students, i.e., emerging engineers, to use problem-solving processes that synergistically combine creativity and imagination with rigour and discipline. Recently, pressures on curricula have resulted in the development of software-specific courses, often to the detriment of the understanding of theory [1]. However, it is also true that there is a demand for information technology courses by students other than computer science majors [2]. The emphasis on training engineers may be best placed on answering the needs of industry; indeed, many proposals are now being made to try to reduce the gap between the educational and industrial communities [3]. Training in the use of certain computer programs may be one way of better preparing engineering undergraduates for eventual employment in industry. However, industry's needs in this respect must first be known. The aim of this work was to determine which computer programs are used by practising agricultural engineers with the aim of incorporating training in their use into our department's teaching curriculum. The results showed that 72% of their working hours involved the use computer programs. The software packages most commonly used were Microsoft Office (used by 79% of respondents) and CAD (56%), as well as budgeting (27%), statistical (21%), engineering (15%) and GIS (13%) programs. As a result of this survey our university department opened an additional computer suite in order to provide students practical experience in the use of Microsoft Excel, budgeting and engineering software. The results of this survey underline the importance of computer software training in this and perhaps other fields of engineering. [1] D. J. Moore, and D. R. Voltmer, "Curriculum for an engineering renaissance," IEEE Trans. Educ., vol. 46, pp. 452-455, Nov. 2003. [2] N. Kock, R. Aiken, and C. Sandas, "Using complex IT in specific domains: developing and assessing a course for nonmajors," IEEE Trans. Educ., vol. 45, pp. 50- 56, Feb. 2002. [3] I. Vélez, and J. F. Sevillano, "A course to train digital hardware designers for industry," IEEE Trans. Educ., vol. 50, pp. 236-243, Aug. 2007. Acknowledgement: This work was supported in part by the Universidad Politécnica de Madrid, Spain.
Stability of power systems coupled with market dynamics
NASA Astrophysics Data System (ADS)
Meng, Jianping
This Ph.D. thesis presented here spans two relatively independent topics. The first part, Chapter 2 is self-contained, and is dedicated to studies of new algorithms for power system state estimation. The second part, encompassing the remaining chapters, is dedicated to stability analysis of power system coupled with market dynamics. The first part of this thesis presents improved Newton's methods employing efficient vectorized calculations of higher order derivatives in power system state estimation problems. The improved algorithms are proposed based on an exact Newton's method using the second order terms. By efficiently computing an exact gain matrix, combined with a special optimal multiplier method, the new algorithms show more reliable convergence compared with the existing methods of normal equations, orthogonal decomposition, and Hachtel's sparse tableau. Our methods are able to handle ill-conditioned problems, yet show minimal penalty in computational cost for well-conditioned cases. These claims are illustrated through the standard IEEE 118 and 300 bus test examples. The second part of the thesis focuses on stability analysis of market/power systems. The work presented is motivated by an emerging problem. As the frequency of market based dispatch updates increases, there will inevitably be interaction between the dynamics of markets determining the generator dispatch commands, and the physical response of generators and network interconnections, necessitating the development of stability analysis for such coupled systems. We begin with numeric tests using different market models, with detailed machine/exciter/turbine/governor dynamics, in the New England 39 bus test system. A progression of modeling refinements are introduced, including such non-ideal effects as time delays. Electricity market parameter identification algorithms are also studied based on real time data from the PJM electricity market. Finally our power market model is augmented by optimal power flow constraints, allowing study of the so-called congestion problem. These studies show that understanding of potential modes of instability in such coupled systems is of crucial importance both in designing suitable rules for power markets, and in designing physical generator controls that are complementary to market-based dispatch.
Message From the Editor for Contributions to the 2010 Real Time Conference Issue of TNS
NASA Astrophysics Data System (ADS)
Schmeling, Sascha Marc
2011-08-01
The 72 papers in this special issue were originally presented at the 17th IEEE-NPSS Real Time Conference (RT2010) on Computing Applications in Nuclear and Plasma Sciences, held in Lisbon, Portugal in May 2010.
Proof Search in an Authorization Logic
2009-04-14
and Itay Neeman. DKAL: Distributed-knowledge authorization language. In Proceedings of the 21st IEEE Symposium on Computer Security Foundations (CSF...21), 2008. [33] Yuri Gurevich and Itay Neeman. The logic of infons. Technical report, Microsoft Research, 2009. [34] Joshua S. Hodas and Dale Miller
A 32 kb 9T near-threshold SRAM with enhanced read ability at ultra-low voltage operation
NASA Astrophysics Data System (ADS)
Kim, Tony Tae-Hyoung; Lee, Zhao Chuan; Do, Anh Tuan
2018-01-01
Ultra-low voltage SRAMs are highly sought-after in energy-limited systems such as battery-powered and self-harvested SoCs. However, ultra-low voltage operation diminishes SRAM read bitline (RBL) sensing margin significantly. This paper tackles this issue by presenting a novel 9T cell with data-independent RBL leakage in combination with an RBL boosting technique for enhancing the sensing margin. The proposed technique automatically tracks process, temperature and voltage (PVT) variations for robust sensing margin enhancement. A test chip fabricated in 65 nm CMOS technology shows that the proposed scheme significantly enlarges the sensing margin compared to the conventional bitline sensing scheme. It also achieves the minimum operating voltage of 0.18 V and the minimum energy consumption of 0.92 J/access at 0.4 V. He received 2016 International Low Power Design Contest Award from ISLPED, a best paper award at 2014 and 2011 ISOCC, 2008 AMD/CICC Student Scholarship Award, 2008 Departmental Research Fellowship from Univ. of Minnesota, 2008 DAC/ISSCC Student Design Contest Award, 2008, 2001, and 1999 Samsung Humantec Thesis Award and, 2005 ETRI Journal Paper of the Year Award. He is an author/co-author of +100 journal and conference papers and has 17 US and Korean patents registered. His current research interests include low power and high performance digital, mixed- mode, and memory circuit design, ultra-low voltage circuits and systems design, variation and aging tolerant circuits and systems, and circuit techniques for 3D ICs. He serves as an associate editor of IEEE Transactions on VLSI Systems. He is an IEEE senior member and the Chair of IEEE Solid-State Circuits Society Singapore Chapter. He has served numerous conferences as a committee member.
Introduction to Computers in Education for Elementary and Middle School Teachers.
ERIC Educational Resources Information Center
Moursund, David
Designed to help elementary and middle school teachers increase their level of computer-education literacy, this book discusses the capabilities, limitations, applications, and possible impact of computers in education. Chapter 1 briefly defines what a computer is and explains the book's goals and applications. Chapter 2 provides a technical…
Making Classical Ground State Spin Computing Fault-Tolerant
2010-06-24
approaches to perebor (brute-force searches) algorithms,” IEEE Annals of the History of Computing, 6, 384–400 (1984). [24] D. Bacon and S . T. Flammia ...Adiabatic gate teleportation,” Phys. Rev. Lett., 103, 120504 (2009). [25] D. Bacon and S . T. Flammia , “Adiabatic cluster state quantum computing...v1 [ co nd -m at . s ta t- m ec h] 2 2 Ju n 20 10 Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the
A Unified Framework for Simulating Markovian Models of Highly Dependable Systems
1989-07-01
ependability I’valuiation of Complex lault- lolerant Computing Systems. Ptreedings of the 1-.et-enth Sv~npmiun on Falult- lolerant Comnputing. Portland, Maine...New York. [12] (icis;t, R.M. and ’I’rivedi, K.S. (1983). I!Itra-Il gh Reliability Prediction for Fault-’ lolerant Computer Systems. IEE.-E Trw.%,.cions... 1998 ). Surv’ey of Software Tools for [valuating Reli- ability. A vailability, and Serviceabilitv. ACA1 Computing S urveyjs 20. 4, 227-269). [32] Meyer
Communication-Efficient Arbitration Models for Low-Resolution Data Flow Computing
1988-12-01
phase can be formally described as follows: Graph Partitioning Problem NP-complete: (Garey & Johnson) Given graph G = (V, E), weights w (v) for each v e V...Technical Report, MIT/LCS/TR-218, Cambridge, Mass. Agerwala, Tilak, February 1982, "Data Flow Systems", Computer, pp. 10-13. Babb, Robert G ., July 1984...34Parallel Processing with Large-Grain Data Flow Techniques," IEEE Computer 17, 7, pp. 55-61. Babb, Robert G ., II, Lise Storc, and William C. Ragsdale
Bio-Inspired Navigation of Chemical Plumes
2006-07-01
Bio-Inspired Navigation of Chemical Plumes Maynard J. Porter III, Captain, USAF Department of Electrical and Computer Engineering Air Force Institute...Li. " Chemical plume tracing via an autonomous underwater vehicle". IEEE Journal of Ocean Engineering , 30(2):428— 442, 2005. [6] G. A. Nevitt...Electrical and Computer Engineering Air Force Institute of Technology Dayton, OH 45433-7765, U.S.A. juan.vasquez@afit.edu May 31, 2006 Abstract - The
1980-11-01
finite aperture size 5. A. E. Siegman , "Unstable optical resonators for laser of the YAG rod, applications," Proc. IEEE 53, 217-287 (1965); "Unstable...Pumped LiNbO3 Tunable Source Radial Birefringent Element Computer Controlled Laser Attenuator Slab Configuration Laser Source 20. ABSTRACT (Continue on...have invented and demonstrated a computer controlled laser attenu- ator. .... Cont inued DD Il 7 1473 EDITION OF I NOV 01 IS OBSOLETE UNCLASSIFIEDAN
QCDOC: A 10-teraflops scale computer for lattice QCD
NASA Astrophysics Data System (ADS)
Chen, D.; Christ, N. H.; Cristian, C.; Dong, Z.; Gara, A.; Garg, K.; Joo, B.; Kim, C.; Levkova, L.; Liao, X.; Mawhinney, R. D.; Ohta, S.; Wettig, T.
2001-03-01
The architecture of a new class of computers, optimized for lattice QCD calculations, is described. An individual node is based on a single integrated circuit containing a PowerPC 32-bit integer processor with a 1 Gflops 64-bit IEEE floating point unit, 4 Mbyte of memory, 8 Gbit/sec nearest-neighbor communications and additional control and diagnostic circuitry. The machine's name, QCDOC, derives from "QCD On a Chip".
Hybrid Architectures for Evolutionary Computing Algorithms
2008-01-01
other EC algorithms to FPGA Core Burns P1026/MAPLD 200532 Genetic Algorithm Hardware References S. Scott, A. Samal , and S. Seth, “HGA: A Hardware Based...on Parallel and Distributed Processing (IPPS/SPDP ), pp. 316-320, Proceedings. IEEE Computer Society 1998. [12] Scott, S. D. , Samal , A., and...Algorithm Hardware References S. Scott, A. Samal , and S. Seth, “HGA: A Hardware Based Genetic Algorithm”, Proceedings of the 1995 ACM Third
Development of Computational Simulation Tools to Model Weapon Propulsors
2004-01-01
Calculation in Permanent Magnet Motors with Rotor Eccentricity: With Slotting Effect Considered," IEEE Transactions on Magnetics, Volume 34, No. 4, 2253-2266...1998). [3] Lieu, Dennis K., Kim, Ungtae. "Magnetic Field Calculation in Permanent Magnet Motors with Rotor Eccentricity: Without Slotting Effect
Database Translator (DATALATOR) for Integrated Exploitation
2010-10-31
Modelling in Information Systems Engineering. 2007, Berlin : Springer, pp. 39-58. 2. Arnon Rosenthal, Len Seligman . Pragmatics and Open Problems for Inter...2004, Vol. 2938 . 21. Ahuja, S., N. Carriero and D. Gelemte,. Linda and friends. IEEE Computer. August 1986, pp. 26- 32. 40 Next Generation Software
Baiting Inside Attackers using Decoy Documents
2008-09-16
viewed. Animated images allow the senders to monitor how long the message was displayed. The web bugs operate without alerting the user of the...Military Computer Security Policies”. IEEE Symposium on Security and Privacy, 1987. [5] Demers, A., Gehrke, J., Hong, M., Panda , B., Riedewald, M., Sharma
Joint Services Electronics Program
1991-03-05
Parallel Computing Network and Program Professor Abhiram Ranade with M.T. Raghunath and Robert Boothe The goal of our research is to develop high...References/Publications [1] M. T. Raghunath and A. 0. Ranade. "A Simulation-Based Comparison of Interconnection Networks," Proceedings of the 2nd IEEE
ERIC Educational Resources Information Center
Dessy, Raymond E.
1982-01-01
Local area networks are common communication conduits allowing various terminals, computers, discs, printers, and other electronic devices to intercommunicate over short distances. Discusses the vocabulary of such networks including RS-232C point-to-point and IEEE-488 multidrop protocols; error detection; message packets; multiplexing; star, ring,…
Message From the Editor for Contributions to the 2007 Real Time Conference Issue of TNS
NASA Astrophysics Data System (ADS)
Dufey, Jean-Pierre
2008-02-01
This issue presents 67 papers which were originally presented at the 15th IEEE-NPSS Real Time Conference (RT2007) on Computing Applications in Nuclear and Plasma Sciences held at Fermilab, Batavia, IL, April 29-May 4, 2007.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Basso, T.; DeBlasio, R.
The IEEE American National Standards smart grid publications and standards development projects IEEE 2030, which addresses smart grid interoperability, and IEEE 1547TM, which addresses distributed resources interconnection with the grid, have made substantial progress since 2009. The IEEE 2030TM and 1547 standards series focus on systems-level aspects and cover many of the technical integration issues involved in a mature smart grid. The status and highlights of these two IEEE series of standards, which are sponsored by IEEE Standards Coordinating Committee 21 (SCC21), are provided in this paper.
NASA Astrophysics Data System (ADS)
Telang, Aparna S.; Bedekar, P. P.
2017-09-01
Load flow analysis is the initial and essential step for any power system computation. It is required for choosing better options for power system expansion to meet with ever increasing load demand. Implementation of Flexible AC Transmission System (FACTS) device like STATCOM, in the load flow, which is having fast and very flexible control, is one of the important tasks for power system researchers. This paper presents a simple and systematic approach for steady state power flow calculations with FACTS controller, static synchronous compensator (STATCOM) using command line usage of MATLAB tool-power system analysis toolbox (PSAT). The complexity of MATLAB language programming increases due to incorporation of STATCOM in an existing Newton-Raphson load flow algorithm. Thus, the main contribution of this paper is to show how command line usage of user friendly MATLAB tool, PSAT, can extensively be used for quicker and wider interpretation of the results of load flow with STATCOM. The novelty of this paper lies in the method of applying the load increase pattern, where the active and reactive loads have been changed simultaneously at all the load buses under consideration for creating stressed conditions for load flow analysis with STATCOM. The performance have been evaluated on many standard IEEE test systems and the results for standard IEEE-30 bus system, IEEE-57 bus system, and IEEE-118 bus system are presented.
NASA Astrophysics Data System (ADS)
Grandner, Jessica Marie
Computational methods were used to determine the mechanisms and selectivities of organometallic-catalyzed reactions. The first half of the dissertation focuses on the study of metathesis catalysts in collaboration with the Grubbs group at CalTech. Chapter 1 describes the studies of the decomposition modes of several ruthenium-based metathesis catalysts. These studies were performed to better understand the decomposition of such catalysts in order to prevent decomposition (Chapter 1.2) or utilize decomposed catalysts for alternative reactions (Chapter 1.1). Chapter 2.1 describes the computational investigation of the origins of stereoretentive metathesis with ruthenium-based metathesis catalysts. These findings were then used to computationally design E-selective metathesis catalysts (Chapter 2.2). While the first half of the dissertation was centered around ruthenium catalysts, the second half of the dissertation pertains to iron-catalyzed reaction, in particular, iron-catalyzed reactions by P450 enzymes. The elements of Chapter 3 concentrate on the stereo- and chemo-selectivity of P450-catalyzed C-H hydroxylations. By combining multiple computational methods, the inherent activity of the iron-oxo catalyst and the influence of the active site on such reactions were illuminated. These discoveries allow for the engineering of new substrates and mutant enzymes for tailored C-H hydroxylation. While the mechanism of C-H hydroxylations catalyzed by P450 enzymes has been well studied, there are several P450-catalyzed transformations for which the mechanism is unknown. The components of Chapter 4 describe the use of computations to determine the mechanisms of complex, multi-step reactions catalyzed by P450s. The determination of these mechanisms elucidates how these enzymes react with various functional groups and substrate architectures and allows for a better understanding of how drug-like compounds may be broken down by human P450s.
Chapter 11. Quality evaluation of apple by computer vision
USDA-ARS?s Scientific Manuscript database
Apple is one of the most consumed fruits in the world, and there is a critical need for enhanced computer vision technology for quality assessment of apples. This chapter gives a comprehensive review on recent advances in various computer vision techniques for detecting surface and internal defects ...
Implementing ISO/IEEE 11073: proposal of two different strategic approaches.
Martínez-Espronceda, M; Serrano, L; Martínez, I; Escayola, J; Led, S; Trigo, J; García, J
2008-01-01
This paper explains the challenges encountered during the ISO/IEEE 11073 standard implementation process. The complexity of the standard and the consequent heavy requirements, which have not encouraged software engineers to adopt the standard. The developing complexity evaluation drives us to propose two possible implementation strategies that cover almost all possible use cases and eases handling the standard by non-expert users. The first one is focused on medical devices (MD) and proposes a low-memory and low-processor usage technique. It is based on message patterns that allow simple functions to generate ISO/IEEE 11073 messages and to process them easily. In this way a framework for MDs can be obtained. Second one is focused on more powerful machines such as data loggers or gateways (aka. computer engines (CE)), which do not have the MDs' memory and processor usage constraints. For CEs a more intelligent and adaptative Plug&Play (P&P) solution is provided. It consists on a general platform that can access to any device supported by the standard. Combining both strategies will cut developing time for applications based on ISO/EEE 11073.
THE BERKELEY DATA ANALYSIS SYSTEM (BDAS): AN OPEN SOURCE PLATFORM FOR BIG DATA ANALYTICS
2017-09-01
Evan Sparks, Oliver Zahn, Michael J. Franklin, David A. Patterson, Saul Perlmutter. Scientific Computing Meets Big Data Technology: An Astronomy ...Processing Astronomy Imagery Using Big Data Technology. IEEE Transaction on Big Data, 2016. Approved for Public Release; Distribution Unlimited. 22 [93
Local Area Networks and the Learning Lab of the Future.
ERIC Educational Resources Information Center
Ebersole, Dennis C.
1987-01-01
Considers educational applications of local area computer networks and discusses industry standards for design established by the International Standards Organization (ISO) and Institute of Electrical and Electronic Engineers (IEEE). A futuristic view of a learning laboratory using a local area network is presented. (Author/LRW)
Large-Scale Distributed Coalition Formation
2009-09-01
Ripeanu, Matei, Adriana Iamnitchi, and Ian Foster. “Mapping the Gnutella Network”. IEEE Internet Computing, 6(1):50–57, 2002. 78. Rowstron, Antony I...for Search. Working Papers 95-02-010, Santa Fe Institute, February 1995. 97. Xu, Yang, Paul Scerri, Bin Yu, Steven Okamoto, Michael Lewis, and Ka
File System Virtual Appliances: Portable File System Implementations
2009-05-01
Mobile Computing Systems and Applications, Santa Cruz, CA, 1994. IEEE. [10] Michael Eisler , Peter Corbett, Michael Kazar, Daniel S. Nydick, and...Gingell, Joseph P. Moran, and William A. Shannon. Virtual Memory Architec- ture in SunOS. In USENIX Summer Conference, pages 81–94, Berkeley, CA, 1987
Wireless Networks: New Meaning to Ubiquitous Computing.
ERIC Educational Resources Information Center
Drew, Wilfred, Jr.
2003-01-01
Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…
Quantification of Energy Release in Composite Structures
NASA Technical Reports Server (NTRS)
Minnetyan, Levon
2003-01-01
Energy release rate is usually suggested as a quantifier for assessing structural damage tolerance. Computational prediction of energy release rate is based on composite mechanics with micro-stress level damage assessment, finite element structural analysis and damage progression tracking modules. This report examines several issues associated with energy release rates in composite structures as follows: Chapter I demonstrates computational simulation of an adhesively bonded composite joint and validates the computed energy release rates by comparison with acoustic emission signals in the overall sense. Chapter II investigates the effect of crack plane orientation with respect to fiber direction on the energy release rates. Chapter III quantifies the effects of contiguous constraint plies on the residual stiffness of a 90 ply subjected to transverse tensile fractures. Chapter IV compares ICAN and ICAN/JAVA solutions of composites. Chapter V examines the effects of composite structural geometry and boundary conditions on damage progression characteristics.
Quantification of Energy Release in Composite Structures
NASA Technical Reports Server (NTRS)
Minnetyan, Levon; Chamis, Christos C. (Technical Monitor)
2003-01-01
Energy release rate is usually suggested as a quantifier for assessing structural damage tolerance. Computational prediction of energy release rate is based on composite mechanics with micro-stress level damage assessment, finite element structural analysis and damage progression tracking modules. This report examines several issues associated with energy release rates in composite structures as follows: Chapter I demonstrates computational simulation of an adhesively bonded composite joint and validates the computed energy release rates by comparison with acoustic emission signals in the overall sense. Chapter II investigates the effect of crack plane orientation with respect to fiber direction on the energy release rates. Chapter III quantifies the effects of contiguous constraint plies on the residual stiffness of a 90 deg ply subjected to transverse tensile fractures. Chapter IV compares ICAN and ICAN/JAVA solutions of composites. Chapter V examines the effects of composite structural geometry and boundary conditions on damage progression characteristics.
Ultrasound-Based Guidance for Partial Breast Irradiation Therapy
2012-01-01
displace- 0278-0062/$20.00 © IEEE Authorized licensed use limited to: IEEE Xplore . Downloaded on January 5, 2009 at 17:37 from IEEE Xplore . Restrictions...Authorized licensed use limited to: IEEE Xplore . Downloaded on January 5, 2009 at 17:37 from IEEE Xplore . Restrictions apply. RIVAZ et al...better CNR values: the Authorized licensed use limited to: IEEE Xplore . Downloaded on January 5, 2009 at 17:37 from IEEE Xplore . Restrictions apply
Computational Nuclear Physics and Post Hartree-Fock Methods
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lietz, Justin; Sam, Novario; Hjorth-Jensen, M.
We present a computational approach to infinite nuclear matter employing Hartree-Fock theory, many-body perturbation theory and coupled cluster theory. These lectures are closely linked with those of chapters 9, 10 and 11 and serve as input for the correlation functions employed in Monte Carlo calculations in chapter 9, the in-medium similarity renormalization group theory of dense fermionic systems of chapter 10 and the Green's function approach in chapter 11. We provide extensive code examples and benchmark calculations, allowing thereby an eventual reader to start writing her/his own codes. We start with an object-oriented serial code and end with discussions onmore » strategies for porting the code to present and planned high-performance computing facilities.« less
2015-06-01
system accuracy. The AnRAD system was also generalized for the additional application of network intrusion detection . A self-structuring technique...to Host- based Intrusion Detection Systems using Contiguous and Discontiguous System Call Patterns,” IEEE Transactions on Computer, 63(4), pp. 807...square kilometer areas. The anomaly recognition and detection (AnRAD) system was built as a cogent confabulation network . It represented road
2014-01-01
computational and empirical dosimetric tools [31]. For the computational dosimetry, we employed finite-dif- ference time- domain (FDTD) modeling techniques to...temperature-time data collected for a well exposed to THz radiation using finite-difference time- domain (FDTD) modeling techniques and thermocouples... like )). Alter- ation in the expression of such genes underscores the signif- 62 IEEE TRANSACTIONS ON TERAHERTZ SCIENCE AND TECHNOLOGY, VOL. 6, NO. 1
JPRS Report, Science & Technology. China.
1989-03-29
Commun ., Vol COM-29, No 6, pp 895-901, June 1981. [4] R.C. Titsworth , "A Boolean-Function-Multiplexed Telemetry System," IEEE Trans, on SET, pp 42...Reagents 39 Gene-Engineered Human Epithelium Growth Factor (hEGF) 39 Superfine Snake Venom 39 COMPUTERS Ai Computer System LISP-MI [Zheng Shouqi, et...XUEBAO, No 3, Jun 88] 134 Coordinated Development of Microwave, Optical Communications [Zhang Xu; DIANXIN KUAIBAO, No 11, Nov 88] 143 Error
Portable Map-Reduce Utility for MIT SuperCloud Environment
2015-09-17
Reuther, A. Rosa, C. Yee, “Driving Big Data With Big Compute,” IEEE HPEC, Sep 10-12, 2012, Waltham, MA. [6] Apache Hadoop 1.2.1 Documentation: HDFS... big data architecture, which is designed to address these challenges, is made of the computing resources, scheduler, central storage file system...databases, analytics software and web interfaces [1]. These components are common to many big data and supercomputing systems. The platform is
Computer-Based National Information Systems. Technology and Public Policy Issues.
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. Office of Technology Assessment.
A general introduction to computer based national information systems, and the context and basis for future studies are provided in this report. Chapter One, the introduction, summarizes computers and information systems and their relation to society, the structure of information policy issues, and public policy issues. Chapter Two describes the…
Chapter 4. Students' Attitudes toward Computer Games
ERIC Educational Resources Information Center
Russian Education and Society, 2004
2004-01-01
In this chapter, the authors attempt not only to discern aspects that relate to age, place, and the amount of time devoted to playing computer games in adolescence, but also to study content characteristics of their attitudes such as: the developmental dynamic in the change of their genre preferences in computer games, changes in factors that…
Optimal Processor Assignment for Pipeline Computations
1991-10-01
the use of ratios: initially each task is assigned a procesbuor2 the remaining proceborb are distributed in proportion to the quantities f,(1), 1 < i...algorithmns. IEEE Trans. onl Parallel and Distributed Systemns, 1 (4):470-499, October 1990. [26] P. Al. Kogge. The Architeture of Pipelined Comnputers
2010-03-01
allows the programmer to use the English language in an expressive manor while still maintaining the logical structure of a programming language ( Pressman ...and Choudhury Tanzeem. 2000. Face Recognition for Smart Environments, IEEE Computer, pp. 50–55. Pressman , Roger. 2010. Software Engineering A
ERIC Educational Resources Information Center
Voskamp, Jorg; Hambach, Sybille
An Internet-based course management system has been under development at the Fraunhofer-Institute for Computer Graphics Rostock (Germany) for the past 5 years. It is used by experts for distributing their courses via the Internet and by students for learning with the material distributed. The "Course Management System for WWW--CMS-W3"…
Towards Formalizing the Java Security Architecture of JDK 1.2
1998-01-01
and Richard E. Newman for their contributions to this paper. References 1. Balfanz , D. and Gong, L.: Experience with Secure Multi-Processing in Java...Privacy, IEEE Computer Society, Oakland, California, Pages 122-136, 1992. 18. Wallach, D. S., Balfanz , D., Dean, D., and Felton, E. W.: Extensible
Device-Enabled Authorization in the Grey System
2005-02-01
proof checker. Journal of Automated Reasoning 31(3-4):231–260, 2003. [7] D. Balfanz , D. Dean, and M. Spreitzer. A security infrastructure for...distributed Java applications. In Proceedings of the 21st IEEE Symposium on Security and Privacy, May 2002. [8] D. Balfanz and E. Felten. Hand-held computers
Managing Parallelism and Resources in Scientific Dataflow Programs
1990-03-01
1983. [52] K. Hiraki , K. Nishida, S. Sekiguchi, and T. Shimada. Maintainence architecture and its LSI implementation of a dataflow computer with a... Hiraki , and K. Nishida. An architecture of a data flow machine and its evaluation. In Proceedings of CompCon 84, pages 486-490. IEEE, 1984. [84] N
Developing Software to Use Parallel Processing Effectively
1988-10-01
Experience, Vol 15(6), June 1985, p53 Gajski85 Gajski , Daniel D. and Jih-Kwon Peir, "Essential Issues in Multiprocessor Systems", IEEE Computer, June...Treleaven (eds.), Springer-Verlag, pp. 213-225 (June 1987). Kuck83 David Kuck, Duncan Lawrie, Ron Cytron, Ahmed Sameh and Daniel Gajski , The Architecture and
Partial Bibliography of Work on Expert Systems,
1982-12-01
Bibliography: AAAI American Association for Artificial Intelligence ACM Association for Computing Machinery AFIPS American Federation of Information...Processing Societies ECAI European Conference on Artificial Intelligence IEEE Institute for Electrical and Electronic Engineers IFIPS International...Federation of Information Processing Societies IJCAI International Joint Conferences on Artificial Intelligence SIGPLAN ACM Special Interest Group on
A Guide to IRUS-II Application Development
1989-09-01
Stallard (editors). Research and Develo; nent in Natural Language b’nderstan,;ng as Part of t/i Strategic Computing Program . chapter 3, pages 27-34...Development in Natural Language Processing in the Strategic Computing Program . Compi-nrional Linguistics 12(2):132-136. April-June, 1986. [24] Sidner. C.L...assist developers interested in adapting IRUS-11 to new application domains Chapter 2 provides a general introduction and overviev ,. Chapter 3 describes
Communication-Efficient Arbitration Models for Low-Resolution Data Flow Computing
1988-12-01
Given graph G = (V, E), weights w (v) for each v e V and L (e) for each e c E, and positive integers B and J, find a partition of V into disjoint...MIT/LCS/TR-218, Cambridge, Mass. Agerwala, Tilak, February 1982, "Data Flow Systems", Computer, pp. 10-13. Babb, Robert G ., July 1984, "Parallel...Processing with Large-Grain Data Flow Techniques," IEEE Computer 17, 7, pp. 55-61. Babb, Robert G ., II, Lise Storc, and William C. Ragsdale, 1986, "A Large
Chapter 2. Adolescents' Attitudes toward the Computer
ERIC Educational Resources Information Center
Russian Education and Society, 2004
2004-01-01
This second chapter focuses on an analysis of the aspects that characterize the typical content of students' attitudes toward the world of computers. In this connection, it attempts to determine what is of the greatest interest to students as they deal with the world of computers, which types of programs they use, and which magazines they read…
Interoperability in digital electrocardiography: harmonization of ISO/IEEE x73-PHD and SCP-ECG.
Trigo, Jesús D; Chiarugi, Franco; Alesanco, Alvaro; Martínez-Espronceda, Miguel; Serrano, Luis; Chronaki, Catherine E; Escayola, Javier; Martínez, Ignacio; García, José
2010-11-01
The ISO/IEEE 11073 (x73) family of standards is a reference frame for medical device interoperability. A draft for an ECG device specialization (ISO/IEEE 11073-10406-d02) has already been presented to the Personal Health Device (PHD) Working Group, and the Standard Communications Protocol for Computer-Assisted ElectroCardioGraphy (SCP-ECG) Standard for short-term diagnostic ECGs (EN1064:2005+A1:2007) has recently been approved as part of the x73 family (ISO 11073-91064:2009). These factors suggest the coordinated use of these two standards in foreseeable telecardiology environments, and hence the need to harmonize them. Such harmonization is the subject of this paper. Thus, a mapping of the mandatory attributes defined in the second draft of the ISO/IEEE 11073-10406-d02 and the minimum SCP-ECG fields is presented, and various other capabilities of the SCP-ECG Standard (such as the messaging part) are also analyzed from an x73-PHD point of view. As a result, this paper addresses and analyzes the implications of some inconsistencies in the coordinated use of these two standards. Finally, a proof-of-concept implementation of the draft x73-PHD ECG device specialization is presented, along with the conversion from x73-PHD to SCP-ECG. This paper, therefore, provides recommendations for future implementations of telecardiology systems that are compliant with both x73-PHD and SCP-ECG.
2013-01-01
M. Ahmadi, and M. Shridhar, “ Handwritten Numeral Recognition with Multiple Features and Multistage Classifiers,” Proc. IEEE Int’l Symp. Circuits...ARTICLE (Post Print) 3. DATES COVERED (From - To) SEP 2011 – SEP 2013 4. TITLE AND SUBTITLE A PARALLEL NEUROMORPHIC TEXT RECOGNITION SYSTEM AND ITS...research in computational intelligence has entered a new era. In this paper, we present an HPC-based context-aware intelligent text recognition
Preliminary Development of a Computational Model of a Dielectric Barrier Discharge
2004-12-01
Gerhard Pietsch . "Microdischarges in Air-Fed Ozonizers," Journal of Physics D: Applied Physics, Vol 24, 1991, pp 564-572. 14 Baldur Eliasson. "Modeling...Gibalov and Gerhard Pietsch . "Two-dimensional Modeling of the Dielectric Barrier Discharge in Air," Plasma Sources Science Technology, 1 (1992), pp. 166...Computer Modeling," IEEE Transactions on Plasma Science, 27 (1), February 1999, pp 36-37. 19 Valentin I Gibalov and Gerhard J. Pietsch . "The
Networking DEC and IBM computers
NASA Technical Reports Server (NTRS)
Mish, W. H.
1983-01-01
Local Area Networking of DEC and IBM computers within the structure of the ISO-OSI Seven Layer Reference Model at a raw signaling speed of 1 Mops or greater are discussed. After an introduction to the ISO-OSI Reference Model nd the IEEE-802 Draft Standard for Local Area Networks (LANs), there follows a detailed discussion and comparison of the products available from a variety of manufactures to perform this networking task. A summary of these products is presented in a table.
An Archeological Survey of Two Proposed Reservoir Areas, Rocky River Basin, North Carolina,
1987-08-01
J. 1942 An Ecological Analysis of the Plant Communities of the Piedmont, North Carolina. The American Midland Naturalist 28:1-126. S ,% ".dl Page 10...Chapter 6. While each chapter in the report is in part at least a team result, certain individuals had primary responsibility for analysis and write...Chapter 5 by Dull; Chapter 6 by Sanborn; Chapter 7 by Vacca; Chapter 8 by Abbott; and Chapter 9 by Abbott and Woodall. The computer work during analysis and
Robust Multi-Agent Sensor Network Systems
2012-05-08
Localization on the Sphere, International Journal of Intelligent Defence Support System, Vol. 4, no. 4, 2011, pp. 328-350. Quality of Network... Quality of Service (QoS). The following standards are included in the IEEE 1609 standard family: IEEE P1609.0, IEEE P1609.1, IEEE P1609.2, IEEE P1609.3...protocols to support safety services in ITS,” in IEEE International Conference on Emerging Technologies and Factory Au- tomation (ETFA), 2008, pp. 1189
Advanced Visual and Instruction Systems for Maintenance Support (AVIS-MS)
2006-12-01
Hayashi , "Augmentable Reality: Situated Communication through Physical and Digital Spaces," Proc. 2nd Int’l Symp. Wearable Computers, IEEE CS Press...H. Ohno , "An Optical See-through Display for Mutual Occlusion of Real and Virtual Environments," Proc. Int’l Symp. Augmented Reality 2000 (ISARO0
Exploiting Semi-Directional Transceivers for Localization in Communication Systems
2006-03-01
some of those late nights. To Patrick S. and Maura D., you guys made AFIT home away from home for me. Additionally to all of my classmates and...conference on Mobile com- puting and networking, 151–159. IEEE Computer Society, ACM Press, Berkeley, CA, November 1995. 6. Kelly , Ian and Alcherio Martinoli
Issues in the Convergence of Control with Communication and Computation
2004-10-04
Library/Upload/116/Cal1.doc. [42] M. H. Shwehdi and A. Z. Khan, “A power line data communication interface using spread spectrum technology in home ... automation ,” IEEE Transactions on Power Delivery, vol. 11, pp. 1232–1237, July 1996. ISSN: 0885-8977. [43] R. G. Olsen, “Technical considerations for
Motion and Structure Estimation of Manoeuvring Objects in Multiple- Camera Image Sequences
1992-11-01
and Speckert [23], Gennery [24], Hallman [25], Legters and Young [26], Stuller and Krishnamurthy [27], Wu et al. [381, Matthies, Kanade, and Szeliski...26] G.R. Legters , T.Y. Young, "A mathematical model for computer image track- ing," IEEE Transactions on Pattern Analysis and Machine Intelligence
2014-06-12
interferometry and polarimetry . In the paper, the model was used to simulate SAR data for Mangrove (tropical) and Nezer (temperate) forests for P-band and...Scattering Model Applied to Radiometry, Interferometry, and Polarimetry at P- and L-Band. IEEE Transactions on Geoscience and Remote Sensing 44(4): 849
Proceedings 3rd NASA/IEEE Workshop on Formal Approaches to Agent-Based Systems (FAABS-III)
NASA Technical Reports Server (NTRS)
Hinchey, Michael (Editor); Rash, James (Editor); Truszkowski, Walt (Editor); Rouff, Christopher (Editor)
2004-01-01
These preceedings contain 18 papers and 4 poster presentation, covering topics such as: multi-agent systems, agent-based control, formalism, norms, as well as physical and biological models of agent-based systems. Some applications presented in the proceedings include systems analysis, software engineering, computer networks and robot control.
Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java
2000-04-01
separation of garbage collection costs is not possible. Balfanz and Gong [2] describe a multi- processing JVM developed to explore the secu- rity...line in Java. In Proc. of the 7th HotOS, Rio Rico, AZ, Mar. 1999. IEEE Computer Society. [2] D. Balfanz and L. Gong. Experience with secure multi
Surveillance of Space - Optimal Use of Complementary Sensors for Maximum Efficiency
2006-04-01
as track - before - detect [4] have been shown to allow improved sensitivity. This technique employs fast running algorithms and computing power to pre...Multifunction Radar” IEEE Signal Processing Magazine, January 2006. [4] Wallace W R “The Use of Track - Before - Detect in Pulse-Doppler Radar” IEE 490, Radar
Image Based Synthesis for Airborne Minefield Data
2005-12-01
Jia, and C-K. Tang, "Image repairing: robust image synthesis by adaptive ND tensor voting ", Proceedings of the IEEE, Computer Society Conference on...utility is capable to synthesize a single frame data as well as list of frames along a flight path. The application is developed in MATLAB -6.5 using the
Image Perception Wavelet Simulation and Enhancement for the Visually Impaired.
1994-12-01
and Computational Harmonic Analysis, 1:54-81 (1993). 6. Cornsweet, Tom N. "The Staircase-Method in Psychophysics," The American Journal of Psychology ...of a Visual Model," Proceedings of the IEEE, 60(7):828-842 (July 1972). 33. Taylor, M. M. and C Douglas Creelman . "PEST: Efficient Estimates on
McGregor, Carolyn; Smith, Kathleen P; Percival, Jennifer
2008-01-01
The study of women within the professions of Engineering and Computer Science has consistently been found to demonstrate women as a minority within these professions. However none of that previous work has assessed publication behaviours based on gender. This paper presents research findings on gender distribution of authors of accepted papers for the IEEE Engineering and Medicine Society annual conference for 2007 (EMBC '07) held in Lyon, France. This information is used to present a position statement of the current state of gender representation for conference publication within the domain of biomedical engineering and health informatics. Issues in data preparation resulting from the lack of inclusion of gender in information gathered from accepted authors are presented and discussed.
Message From the Editor for Contributions to the 2016 Real Time Conference Issue of TNS
NASA Astrophysics Data System (ADS)
Schmeling, Sascha Marc
2017-06-01
This issue of the IEEE Transactions on Nuclear Science (TNS) is devoted to the 20th IEEE-NPSS Real Time Conference (RT2016) on Computing Applications in Nuclear and Plasma Sciences held in Padua, Italy, in June 2016. A total of 90 papers presented at the conference were submitted for possible publication in TNS. This conference issue presents 46 papers, which have been accepted so far after a thorough peer review process. These contributions come from a very broad range of fields of application, including Astrophysics, Medical Imaging, Nuclear and Plasma Physics, Particle Accelerators, and Particle Physics Experiments. Several papers were close to being accepted but did not make it into this special issue. They will be considered for further publication.
Chapter 13: Tools for analysis
William Elliot; Kevin Hyde; Lee MacDonald; James McKean
2007-01-01
This chapter presents a synthesis of current computer modeling tools that are, or could be, adopted for use in evaluating the cumulative watershed effects of fuel management. The chapter focuses on runoff, soil erosion and slope stability predictive tools. Readers should refer to chapters on soil erosion and stability for more detailed information on the physical...
Intelligent Distribution Voltage Control with Distributed Generation =
NASA Astrophysics Data System (ADS)
Castro Mendieta, Jose
In this thesis, three methods for the optimal participation of the reactive power of distributed generations (DGs) in unbalanced distributed network have been proposed, developed, and tested. These new methods were developed with the objectives of maintain voltage within permissible limits and reduce losses. The first method proposes an optimal participation of reactive power of all devices available in the network. The propose approach is validated by comparing the results with other methods reported in the literature. The proposed method was implemented using Simulink of Matlab and OpenDSS. Optimization techniques and the presentation of results are from Matlab. The co-simulation of Electric Power Research Institute's (EPRI) OpenDSS program solves a three-phase optimal power flow problem in the unbalanced IEEE 13 and 34-node test feeders. The results from this work showed a better loss reduction compared to the Coordinated Voltage Control (CVC) method. The second method aims to minimize the voltage variation on the pilot bus on distribution network using DGs. It uses Pareto and Fuzzy-PID logic to reduce the voltage variation. Results indicate that the proposed method reduces the voltage variation more than the other methods. Simulink of Matlab and OpenDSS is used in the development of the proposed approach. The performance of the method is evaluated on IEEE 13-node test feeder with one and three DGs. Variables and unbalanced loads are used, based on real consumption data, over a time window of 48 hours. The third method aims to minimize the reactive losses using DGs on distribution networks. This method analyzes the problem using the IEEE 13-node test feeder with three different loads and the IEEE 123-node test feeder with four DGs. The DGs can be fixed or variables. Results indicate that integration of DGs to optimize the reactive power of the network helps to maintain the voltage within the allowed limits and to reduce the reactive power losses. The thesis is presented in the form of the three articles. The first article is published in the journal Electrical Power and Energy System, the second is published in the international journal Energies and the third was submitted to the journal Electrical Power and Energy System. Two other articles have been published in conferences with reviewing committee. This work is based on six chapters, which are detailed in the various sections of the thesis.
1989-07-11
LITERATURE CITED [Boeh73] Boehm, Barry W., "Software and its Impact: A Quantitative Assessment," Datamation, 19, 5, (May 1973), pp 48-59. [Boeh76...Boehm, Barry W., "Software Engineering," IEEE Transactions on Computers, C-25, 12, (December 1976), pp 1226-1241. [Boeh81a] Boehm, Barry W., Software...Engineering Economics, Prentice-Hall, Inc., Englewood Cliffs, NJ, (1981). [Boeh8lb] Boehm, Barry W., "An Experiment in Small Scale Application Software
2015-05-28
recognition is simpler and requires less computational resources compared to other inputs such as facial expressions . The Berlin database of Emotional ...Processing Magazine, IEEE, vol. 18, no. 1, pp. 32– 80, 2001. [15] K. R. Scherer, T. Johnstone, and G. Klasmeyer, “Vocal expression of emotion ...Network for Real-Time Speech- Emotion Recognition 5a. CONTRACT NUMBER IN-HOUSE 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 62788F 6. AUTHOR(S) Q
Evaluation of Chapter I Take-Home Computer Program. Report No. 7, Vol. 25.
ERIC Educational Resources Information Center
Fraser, Lowrie A.
The Chapter I Take-Home Computer (THC) program was established in nine elementary and eight middle schools in Atlanta (Georgia) in the 1989-90 school year. One hundred and eighty computers were sent home with 422 students, whose parents were willing to work with the students, for 6-week periods. Log sheets were kept by each child regarding the…
Distributed GPU Computing in GIScience
NASA Astrophysics Data System (ADS)
Jiang, Y.; Yang, C.; Huang, Q.; Li, J.; Sun, M.
2013-12-01
Geoscientists strived to discover potential principles and patterns hidden inside ever-growing Big Data for scientific discoveries. To better achieve this objective, more capable computing resources are required to process, analyze and visualize Big Data (Ferreira et al., 2003; Li et al., 2013). Current CPU-based computing techniques cannot promptly meet the computing challenges caused by increasing amount of datasets from different domains, such as social media, earth observation, environmental sensing (Li et al., 2013). Meanwhile CPU-based computing resources structured as cluster or supercomputer is costly. In the past several years with GPU-based technology matured in both the capability and performance, GPU-based computing has emerged as a new computing paradigm. Compare to traditional computing microprocessor, the modern GPU, as a compelling alternative microprocessor, has outstanding high parallel processing capability with cost-effectiveness and efficiency(Owens et al., 2008), although it is initially designed for graphical rendering in visualization pipe. This presentation reports a distributed GPU computing framework for integrating GPU-based computing within distributed environment. Within this framework, 1) for each single computer, computing resources of both GPU-based and CPU-based can be fully utilized to improve the performance of visualizing and processing Big Data; 2) within a network environment, a variety of computers can be used to build up a virtual super computer to support CPU-based and GPU-based computing in distributed computing environment; 3) GPUs, as a specific graphic targeted device, are used to greatly improve the rendering efficiency in distributed geo-visualization, especially for 3D/4D visualization. Key words: Geovisualization, GIScience, Spatiotemporal Studies Reference : 1. Ferreira de Oliveira, M. C., & Levkowitz, H. (2003). From visual data exploration to visual data mining: A survey. Visualization and Computer Graphics, IEEE Transactions on, 9(3), 378-394. 2. Li, J., Jiang, Y., Yang, C., Huang, Q., & Rice, M. (2013). Visualizing 3D/4D Environmental Data Using Many-core Graphics Processing Units (GPUs) and Multi-core Central Processing Units (CPUs). Computers & Geosciences, 59(9), 78-89. 3. Owens, J. D., Houston, M., Luebke, D., Green, S., Stone, J. E., & Phillips, J. C. (2008). GPU computing. Proceedings of the IEEE, 96(5), 879-899.
46 CFR 111.60-3 - Cable application.
Code of Federal Regulations, 2010 CFR
2010-10-01
... IEEE 1580 must meet the provisions for cable application of section 24 of IEEE 45-2002 (both... incorporated by reference; see 46 CFR 110.10-1) must meet section 24 of IEEE 45-2002, except 24.6.1, 24.6.7... constructed according to IEEE 1580 must be applied in accordance with Table 25, Note 6, of IEEE 45-2002. (2...
Defining the IEEE-854 floating-point standard in PVS
NASA Technical Reports Server (NTRS)
Miner, Paul S.
1995-01-01
A significant portion of the ANSI/IEEE-854 Standard for Radix-Independent Floating-Point Arithmetic is defined in PVS (Prototype Verification System). Since IEEE-854 is a generalization of the ANSI/IEEE-754 Standard for Binary Floating-Point Arithmetic, the definition of IEEE-854 in PVS also formally defines much of IEEE-754. This collection of PVS theories provides a basis for machine checked verification of floating-point systems. This formal definition illustrates that formal specification techniques are sufficiently advanced that is is reasonable to consider their use in the development of future standards.
DoS detection in IEEE 802.11 with the presence of hidden nodes
Soryal, Joseph; Liu, Xijie; Saadawi, Tarek
2013-01-01
The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel’s bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) and the results are presented to validate the algorithm. PMID:25685510
DoS detection in IEEE 802.11 with the presence of hidden nodes.
Soryal, Joseph; Liu, Xijie; Saadawi, Tarek
2014-07-01
The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel's bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) and the results are presented to validate the algorithm.
Methods for Identifying Object Class, Type, and Orientation in the Presence of Uncertainty
1990-08-01
on Range Finding Techniques for Computer Vision," IEEE Trans. on Pattern Analysis and Machine Intellegence PAMI-5 (2), pp 129-139 March 1983. 15. Yang... Artificial Intelligence Applications, pp 199-205, December 1984. 16. Flynn, P.J. and Jain, A.K.," On Reliable Curvature Estimation, " Proceedings of the
Fast Electromagnetic Solvers for Large-Scale Naval Scattering Problems
2008-09-27
IEEE Trans. Antennas Propag., vol. 52, no. 8, pp. 2141–2146, 2004. [12] R. J. Burkholder and J. F. Lee, “Fast dual-MGS block-factorization algorithm...Golub and C. F. V. Loan, Matrix Computations. Baltimore: The Johns Hopkins University Press, 1996. [20] W. D. Li, W. Hong, and H. X. Zhou, “Integral
Profile and Instrumentation Driven Methods for Embedded Signal Processing
2015-01-01
applications,” Computers, IEEE Transactions on, vol. 37, no. 9, pp. 1088–1098, Sep 1988. [7] Massimo Ravasi and Marco Mattavelli, “High-level algorithmic...profiling,” in Digital Media and its Application in Museum Heritages, Second Workshop on, Dec 2007, pp. 353–358. [15] H. Hubert , B. Stabernack, and K.-I. Wels
Computational Modeling and Mathematics Applied to the Physical Sciences.
ERIC Educational Resources Information Center
National Academy of Sciences - National Research Council, Washington, DC.
One aim of this report is to show and emphasize that in the computational approaches to most of today's pressing and challenging scientific and technological problems, the mathematical aspects cannot and should not be considered in isolation. Following an introductory chapter, chapter 2 discusses a number of typical problems leading to…
Computer Assisted Introduction to Mechanics.
ERIC Educational Resources Information Center
Huggins, Elisha R.
These six chapters provide an introduction to Newtonian mechanics, based on a coordinated use of text material, laboratory work, and the computer. The material is essentially self-contained so that it can serve as a short text on mechanics or as a text supplement in a regular physics course. Chapter 1 is a brief introduction to the computer…
Computational Thermodynamics of Materials Zi-Kui Liu and Yi Wang
DOE Office of Scientific and Technical Information (OSTI.GOV)
Devanathan, Ram
This authoritative volume introduces the reader to computational thermodynamics and the use of this approach to the design of material properties by tailoring the chemical composition. The text covers applications of this approach, introduces the relevant computational codes, and offers exercises at the end of each chapter. The book has nine chapters and two appendices that provide background material on computer codes. Chapter 1 covers the first and second laws of thermodynamics, introduces the spinodal as the limit of stability, and presents the Gibbs-Duhem equation. Chapter 2 focuses on the Gibbs energy function. Starting with a homogeneous system with amore » single phase, the authors proceed to phases with variable compositions, and polymer blends. The discussion includes the contributions of external electric and magnetic fields to the Gibbs energy. Chapter 3 deals with phase equilibria in heterogeneous systems, the Gibbs phase rule, and phase diagrams. Chapter 4 briefly covers experimental measurements of thermodynamic properties used as input for thermodynamic modeling by Calculation of Phase Diagrams (CALPHAD). Chapter 5 discusses the use of density functional theory to obtain thermochemical data and fill gaps where experimental data is missing. The reader is introduced to the Vienna Ab Initio Simulation Package (VASP) for density functional theory and the YPHON code for phonon calculations. Chapter 6 introduces the modeling of Gibbs energy of phases with the CALPHAD method. Chapter 7 deals with chemical reactions and the Ellingham diagram for metal-oxide systems and presents the calculation of the maximum reaction rate from equilibrium thermodynamics. Chapter 8 is devoted to electrochemical reactions and Pourbaix diagrams with application examples. Chapter 9 concludes this volume with the application of a model of multiple microstates to Ce and Fe3Pt. CALPHAD modeling is briefly discussed in the context of genomics of materials. The book introduces basic thermodynamic concepts clearly and directs readers to appropriate references for advanced concepts and details of software implementation. The list of references is quite comprehensive. The authors make liberal use of diagrams to illustrate key concepts. The two Appendices at the end discuss software requirements and the file structure, and present templates for special quasi-random structures. There is also a link to download pre-compiled binary files of the YPHON code for Linux or Microsoft Windows systems. The exercises at the end of the chapters assume that the reader has access to VASP, which is not freeware. Readers without access to this code can work on a limited number of exercises. However, results from other first principles codes can be organized in the YPHON format as explained in the Appendix. This book will serve as an excellent reference on computational thermodynamics and the exercises provided at the end of each chapter make it valuable as a graduate level textbook. Reviewer: Ram Devanathan is Acting Director of Earth Systems Science Division, Pacific Northwest National Laboratory, USA.« less
Pre-Algebra Groups. Concepts & Applications.
ERIC Educational Resources Information Center
Montgomery County Public Schools, Rockville, MD.
Discussion material and exercises related to pre-algebra groups are provided in this five chapter manual. Chapter 1 (mappings) focuses on restricted domains, order of operations (parentheses and exponents), rules of assignment, and computer extensions. Chapter 2 considers finite number systems, including binary operations, clock arithmetic,…
3-D Sound for Virtual Reality and Multimedia
NASA Technical Reports Server (NTRS)
Begault, Durand R.; Trejo, Leonard J. (Technical Monitor)
2000-01-01
Technology and applications for the rendering of virtual acoustic spaces are reviewed. Chapter 1 deals with acoustics and psychoacoustics. Chapters 2 and 3 cover cues to spatial hearing and review psychoacoustic literature. Chapter 4 covers signal processing and systems overviews of 3-D sound systems. Chapter 5 covers applications to computer workstations, communication systems, aeronautics and space, and sonic arts. Chapter 6 lists resources. This TM is a reprint of the 1994 book from Academic Press.
Ambiguity Function Analysis for UMTS-Based Passive Multistatic Radar
2014-04-16
Sandeep Gogineni, Member, IEEE, Muralidhar Rangaswamy, Fellow, IEEE, Brian D . Rigling, Senior Member, IEEE, and Arye Nehorai, Fellow, IEEE Abstract—There...muralidhar.rangaswamy@us.af. mil). B. D . Rigling is with the Department of Electrical Engineering, Wright State University, Dayton, OH 45435 USA (e-mail...ieeexplore.ieee.org. Digital Object Identifier 10.1109/TSP.2014.2318135 [1]–[9] and audio broadcast signals and FM radio [10], [11], satellite-based [12], and
NASA Astrophysics Data System (ADS)
Clementi, Enrico
2012-06-01
This is the introductory chapter to the AIP Proceedings volume "Theory and Applications of Computational Chemistry: The First Decade of the Second Millennium" where we discuss the evolution of "computational chemistry". Very early variational computational chemistry developments are reported in Sections 1 to 7, and 11, 12 by recalling some of the computational chemistry contributions by the author and his collaborators (from late 1950 to mid 1990); perturbation techniques are not considered in this already extended work. Present day's computational chemistry is partly considered in Sections 8 to 10 where more recent studies by the author and his collaborators are discussed, including the Hartree-Fock-Heitler-London method; a more general discussion on present day computational chemistry is presented in Section 14. The following chapters of this AIP volume provide a view of modern computational chemistry. Future computational chemistry developments can be extrapolated from the chapters of this AIP volume; further, in Sections 13 and 15 present an overall analysis on computational chemistry, obtained from the Global Simulation approach, by considering the evolution of scientific knowledge confronted with the opportunities offered by modern computers.
Mišić, Jelena; (Sherman) Shen, Xuemin
2009-01-01
We consider interconnection of IEEE 802.15.4 beacon-enabled network cluster with IEEE 802.11b network. This scenario is important in healthcare applications where IEEE 802.15.4 nodes comprise patient's body area network (BAN) and are involved in sensing some health-related data. BAN nodes have very short communication range in order to avoid harming patient's health and save energy. Sensed data needs to be transmitted to an access point in the ward room using wireless technology with higher transmission range and rate such as IEEE 802.11b. We model the interconnected network where IEEE 802.15.4-based BAN operates in guaranteed time slot (GTS) mode, and IEEE 802.11b part of the bridge conveys GTS superframe to the 802.11b access point. We then analyze the network delays. Performance analysis is performed using EKG traffic from continuous telemetry, and we discuss the delays of communication due the increasing number of patients. PMID:19107184
IEEE 802.11ah: A Technology to Face the IoT Challenge.
Baños-Gonzalez, Victor; Afaqui, M Shahwaiz; Lopez-Aguilera, Elena; Garcia-Villegas, Eduard
2016-11-22
Since the conception of the Internet of things (IoT), a large number of promising applications and technologies have been developed, which will change different aspects in our daily life. This paper explores the key characteristics of the forthcoming IEEE 802.11ah specification. This future IEEE 802.11 standard aims to amend the IEEE 802.11 legacy specification to support IoT requirements. We present a thorough evaluation of the foregoing amendment in comparison to the most notable IEEE 802.11 standards. In addition, we expose the capabilities of future IEEE 802.11ah in supporting different IoT applications. Also, we provide a brief overview of the technology contenders that are competing to cover the IoT communications framework. Numerical results are presented showing how the future IEEE 802.11ah specification offers the features required by IoT communications, thus putting forward IEEE 802.11ah as a technology to cater the needs of the Internet of Things paradigm.
IEEE 802.11ah: A Technology to Face the IoT Challenge
Baños-Gonzalez, Victor; Afaqui, M. Shahwaiz; Lopez-Aguilera, Elena; Garcia-Villegas, Eduard
2016-01-01
Since the conception of the Internet of things (IoT), a large number of promising applications and technologies have been developed, which will change different aspects in our daily life. This paper explores the key characteristics of the forthcoming IEEE 802.11ah specification. This future IEEE 802.11 standard aims to amend the IEEE 802.11 legacy specification to support IoT requirements. We present a thorough evaluation of the foregoing amendment in comparison to the most notable IEEE 802.11 standards. In addition, we expose the capabilities of future IEEE 802.11ah in supporting different IoT applications. Also, we provide a brief overview of the technology contenders that are competing to cover the IoT communications framework. Numerical results are presented showing how the future IEEE 802.11ah specification offers the features required by IoT communications, thus putting forward IEEE 802.11ah as a technology to cater the needs of the Internet of Things paradigm. PMID:27879688
Misić, Jelena; Sherman Shen, Xuemin
2009-01-01
We consider interconnection of IEEE 802.15.4 beacon-enabled network cluster with IEEE 802.11b network. This scenario is important in healthcare applications where IEEE 802.15.4 nodes comprise patient's body area network (BAN) and are involved in sensing some health-related data. BAN nodes have very short communication range in order to avoid harming patient's health and save energy. Sensed data needs to be transmitted to an access point in the ward room using wireless technology with higher transmission range and rate such as IEEE 802.11b. We model the interconnected network where IEEE 802.15.4-based BAN operates in guaranteed time slot (GTS) mode, and IEEE 802.11b part of the bridge conveys GTS superframe to the 802.11b access point. We then analyze the network delays. Performance analysis is performed using EKG traffic from continuous telemetry, and we discuss the delays of communication due the increasing number of patients.
Planning and simulation of medical robot tasks.
Raczkowsky, J; Bohner, P; Burghart, C; Grabowski, H
1998-01-01
Complex techniques for planning and performing surgery revolutionize medical interventions. In former times preoperative planning of interventions usually took place in the surgeons mind. Today's new computer techniques allow the surgeon to discuss various operation methods for a patient and to visualize them three-dimensionally. The use of computer assisted surgical planning helps to get better results of a treatment and supports the surgeon before and during the surgical intervention. In this paper we are presenting our planning and simulation system for operations in maxillo-facial surgery. All phases of a surgical intervention are supported. Chapter 1 gives a description of the medical motivation for our planning system and its environment. In Chapter 2 the basic components are presented. The planning system is depicted in Chapter 3 and a simulation of a robot assisted surgery can be found in Chapter 4. Chapter 5 concludes the paper and gives a survey about our future work.
Information Transfer Ion Wireless Networks
2010-07-01
conferences with proceed- ings to be made available online in the IEEE Xplore database, namely IFIP Wireless Days (WD 2008) at Dubai, UAE, and the...Poland, May 2008, pp. 61-64, IEEE Xplore , DOI = 10.1109/INFTECH. 2008.4621591. 2. J. Konorski, IEEE 802.11 LAN Capacity: Incentives and Incentive...2008, Dubai, UAE, Nov. 2008, IEEE Xplore DOI = 10.1109/WD.2008.4812857. 4. J. Konorski, QoS Provision in an Ad Hoc IEEE 802.11 WLAN: A Bayesian War
Information Transfer in Wireless Networks
2010-07-01
conferences with proceed- ings to be made available online in the IEEE Xplore database, namely IFIP Wireless Days (WD 2008) at Dubai, UAE, and the...Poland, May 2008, pp. 61-64, IEEE Xplore , DOI = 10.1109/INFTECH. 2008.4621591. 2. J. Konorski, IEEE 802.11 LAN Capacity: Incentives and Incentive...2008, Dubai, UAE, Nov. 2008, IEEE Xplore DOI = 10.1109/WD.2008.4812857. 4. J. Konorski, QoS Provision in an Ad Hoc IEEE 802.11 WLAN: A Bayesian War
Computer simulation modeling of recreation use: Current status, case studies, and future directions
David N. Cole
2005-01-01
This report compiles information about recent progress in the application of computer simulation modeling to planning and management of recreation use, particularly in parks and wilderness. Early modeling efforts are described in a chapter that provides an historical perspective. Another chapter provides an overview of modeling options, common data input requirements,...
The Practical Impact of Recent Computer Advances on the Analysis and Design of Large Scale Networks
1974-12-01
Communications, ICC-74, June 17-19, Minneapolis, Minnesota, pp. 31C-1-21C-5. 28. Gitman , I., R, M. Van Slvke and H. Frank, "On Splitting Random Access Broadcast...1974. 29. Gitman , I., "On the Capacity of Slotted ALOHA Network and Some Design Problems," IEEE Transactions on Communications, Maren, 1975. 30
Designing Robust and Resilient Tactical MANETs
2014-09-25
Bounds on the Throughput Efficiency of Greedy Maximal Scheduling in Wireless Networks , IEEE/ACM Transactions on Networking , (06 2011): 0. doi: N... Wireless Sensor Networks and Effects of Long Range Dependant Data, Special IWSM Issue of Sequential Analysis, (11 2012): 0. doi: A. D. Dominguez...Bushnell, R. Poovendran. A Convex Optimization Approach for Clone Detection in Wireless Sensor Networks , Pervasive and Mobile Computing, (01 2012
Performance Analysis of the Mobile IP Protocol (RFC 3344 and Related RFCS)
2006-12-01
Encapsulation HMAC Keyed-Hash Message Authentication Code ICMP Internet Control Message Protocol IEEE Institute of Electrical and Electronics Engineers IETF...Internet Engineering Task Force IOS Internetwork Operating System IP Internet Protocol ITU International Telecommunication Union LAN Local Area...network computing. Most organizations today have sophisticated networks that are connected to the Internet. The major benefit reaped from such a
Projector-Camera Systems for Immersive Training
2006-01-01
average to a sequence of 100 captured distortion corrected images. The OpenCV library [ OpenCV ] was used for camera calibration. To correct for...rendering application [Treskunov, Pair, and Swartout, 2004]. It was transposed to take into account different matrix conventions between OpenCV and...Screen Imperfections. Proc. Workshop on Projector-Camera Systems (PROCAMS), Nice, France, IEEE. OpenCV : Open Source Computer Vision. [Available
Sparse Matrix Motivated Reconstruction of Far-Field Radiation Patterns
2015-03-01
method for base - station antenna radiation patterns. IEEE Antennas Propagation Magazine. 2001;43(2):132. 4. Vasiliadis TG, Dimitriou D, Sergiadis JD...algorithm based on sparse representations of radiation patterns using the inverse Discrete Fourier Transform (DFT) and the inverse Discrete Cosine...patterns using a Model- Based Parameter Estimation (MBPE) technique that reduces the computational time required to model radiation patterns. Another
Using Artificial Physics to Control Agents
1999-11-01
unlimited 13. SUPPLEMENTARY NOTES IEEE International Conference on Information, Intelligence, and Systems, Oct 31 -Nov 3,1999. Bethesda, MD 14. ABSTRACT...distributed control can also perform distributed computation. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same...1995. [9] H. Pattee. Artificial life needs a real epistemology. In Moran, Moreno, Merelo, and Chacon , editors, Advances in Artificial Life, pages
IEEE Standards activities: A year in review. Annual activities report 1996
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1997-09-01
For IEEE Standards and the constituency it serves, 1996 was a milestone year. It was a period that signaled the beginning of the Standards Program of the future. This program responds to worldwide standards issues and to the technical, market and competitive strategies of industrial sectors. It represents technological innovation, global participation in electrotechnology standards development and dedication to the on-going advancement and promotion of new concepts and technology. Instrumental in ensuring IEEE`s growth opportunities and leadership position in electrotechnology standards development and dissemination is IEEE membership. The value of members and their involvement in IEEE Standards is vital tomore » IEEE`s ability to continuously be the best professional association in the world. To fulfill this vision, IEEE set forth five goals -- increased globalization, career enhancement, electronic dissemination of existing products and services, organizational improvements and public responsibility. Key in the process for the achievement of these goals is to make certain that IEEE members are well informed about opportunities and benefits the present system of standardization offers, and what the future system will offer. With the member in mind, the Standards Board reviewed its strategic direction and operational structures, and its ability to deliver products and services that are needed now and, more importantly, that will be needed in the future. This Annual Activities Report provides a comprehensive picture of 1996 accomplishments and performance. It gives readers a broad picture of the Standards Board`s activities, the evolving role of IEEE Standards and the technological opportunities that the Board encourages.« less
NASA Astrophysics Data System (ADS)
Romaniuk, Ryszard S.
2012-05-01
This paper is the fifth part (out of five) of the research survey of WILGA Symposium work, May 2012 Edition, concerned with Biomedical, Artificial Intelligence and DNA Computing technologies. It presents a digest of chosen technical work results shown by young researchers from different technical universities from this country during the Jubilee XXXth SPIE-IEEE Wilga 2012, May Edition, symposium on Photonics and Web Engineering. Topical tracks of the symposium embraced, among others, nanomaterials and nanotechnologies for photonics, sensory and nonlinear optical fibers, object oriented design of hardware, photonic metrology, optoelectronics and photonics applications, photonics-electronics co-design, optoelectronic and electronic systems for astronomy and high energy physics experiments, JET tokamak and pi-of-the sky experiments development. The symposium is an annual summary in the development of numerable Ph.D. theses carried out in this country in the area of advanced electronic and photonic systems. It is also a great occasion for SPIE, IEEE, OSA and PSP students to meet together in a large group spanning the whole country with guests from this part of Europe. A digest of Wilga references is presented [1-270].
Virtualized Traffic: reconstructing traffic flows from discrete spatiotemporal data.
Sewall, Jason; van den Berg, Jur; Lin, Ming C; Manocha, Dinesh
2011-01-01
We present a novel concept, Virtualized Traffic, to reconstruct and visualize continuous traffic flows from discrete spatiotemporal data provided by traffic sensors or generated artificially to enhance a sense of immersion in a dynamic virtual world. Given the positions of each car at two recorded locations on a highway and the corresponding time instances, our approach can reconstruct the traffic flows (i.e., the dynamic motions of multiple cars over time) between the two locations along the highway for immersive visualization of virtual cities or other environments. Our algorithm is applicable to high-density traffic on highways with an arbitrary number of lanes and takes into account the geometric, kinematic, and dynamic constraints on the cars. Our method reconstructs the car motion that automatically minimizes the number of lane changes, respects safety distance to other cars, and computes the acceleration necessary to obtain a smooth traffic flow subject to the given constraints. Furthermore, our framework can process a continuous stream of input data in real time, enabling the users to view virtualized traffic events in a virtual world as they occur. We demonstrate our reconstruction technique with both synthetic and real-world input. © 2011 IEEE Published by the IEEE Computer Society
Throughput analysis of the IEEE 802.4 token bus standard under heavy load
NASA Technical Reports Server (NTRS)
Pang, Joseph; Tobagi, Fouad
1987-01-01
It has become clear in the last few years that there is a trend towards integrated digital services. Parallel to the development of public Integrated Services Digital Network (ISDN) is service integration in the local area (e.g., a campus, a building, an aircraft). The types of services to be integrated depend very much on the specific local environment. However, applications tend to generate data traffic belonging to one of two classes. According to IEEE 802.4 terminology, the first major class of traffic is termed synchronous, such as packetized voice and data generated from other applications with real-time constraints, and the second class is called asynchronous which includes most computer data traffic such as file transfer or facsimile. The IEEE 802.4 token bus protocol which was designed to support both synchronous and asynchronous traffic is examined. The protocol is basically a timer-controlled token bus access scheme. By a suitable choice of the design parameters, it can be shown that access delay is bounded for synchronous traffic. As well, the bandwidth allocated to asynchronous traffic can be controlled. A throughput analysis of the protocol under heavy load with constant channel occupation of synchronous traffic and constant token-passing times is presented.
Versatile, low-cost, computer-controlled, sample positioning system for vacuum applications
NASA Technical Reports Server (NTRS)
Vargas-Aburto, Carlos; Liff, Dale R.
1991-01-01
A versatile, low-cost, easy to implement, microprocessor-based motorized positioning system (MPS) suitable for accurate sample manipulation in a Second Ion Mass Spectrometry (SIMS) system, and for other ultra-high vacuum (UHV) applications was designed and built at NASA LeRC. The system can be operated manually or under computer control. In the latter case, local, as well as remote operation is possible via the IEEE-488 bus. The position of the sample can be controlled in three linear orthogonal and one angular coordinates.
10 CFR 431.447 - Department of Energy recognition of nationally recognized certification programs.
Code of Federal Regulations, 2013 CFR
2013-01-01
... IEEE Std 112-2004 Test Methods A and B, IEEE Std 114-2010, CSA C390-10, and CSA C747 (incorporated by... IEEE Std 112-2004 Test Methods A and B, IEEE Std 114-2010, CSA C390-10, and CSA C747- (incorporated by...
10 CFR 431.447 - Department of Energy recognition of nationally recognized certification programs.
Code of Federal Regulations, 2014 CFR
2014-01-01
... IEEE Std 112-2004 Test Methods A and B, IEEE Std 114-2010, CSA C390-10, and CSA C747 (incorporated by... IEEE Std 112-2004 Test Methods A and B, IEEE Std 114-2010, CSA C390-10, and CSA C747- (incorporated by...
2011-05-27
frameworks 4 CMMI-DEV IEEE / ISO / IEC 15288 / 12207 Quality Assurance ©2011 Walz IEEE Life Cycle Processes & Artifacts • Systems Life Cycle Processes...TAG to ISO TC 176 Quality Management • Quality: ASQ, work experience • Software: three books, consulting, work experience • Systems: Telecom & DoD...and IEEE 730 SQA need to align. The P730 IEEE standards working group has expanded the scope of the SQA process standard to align with IS 12207
GreenView and GreenLand Applications Development on SEE-GRID Infrastructure
NASA Astrophysics Data System (ADS)
Mihon, Danut; Bacu, Victor; Gorgan, Dorian; Mészáros, Róbert; Gelybó, Györgyi; Stefanut, Teodor
2010-05-01
The GreenView and GreenLand applications [1] have been developed through the SEE-GRID-SCI (SEE-GRID eInfrastructure for regional eScience) FP7 project co-funded by the European Commission [2]. The development of environment applications is a challenge for Grid technologies and software development methodologies. This presentation exemplifies the development of the GreenView and GreenLand applications over the SEE-GRID infrastructure by the Grid Application Development Methodology [3]. Today's environmental applications are used in vary domains of Earth Science such as meteorology, ground and atmospheric pollution, ground metal detection or weather prediction. These applications run on satellite images (e.g. Landsat, MERIS, MODIS, etc.) and the accuracy of output results depends mostly of the quality of these images. The main drawback of such environmental applications regards the need of computation power and storage power (some images are almost 1GB in size), in order to process such a large data volume. Actually, almost applications requiring high computation resources have approached the migration onto the Grid infrastructure. This infrastructure offers the computing power by running the atomic application components on different Grid nodes in sequential or parallel mode. The middleware used between the Grid infrastructure and client applications is ESIP (Environment Oriented Satellite Image Processing Platform), which is based on gProcess platform [4]. In its current format, gProcess is used for launching new processes on the Grid nodes, but also for monitoring the execution status of these processes. This presentation highlights two case studies of Grid based environmental applications, GreenView and GreenLand [5]. GreenView is used in correlation with MODIS (Moderate Resolution Imaging Spectroradiometer) satellite images and meteorological datasets, in order to produce pseudo colored temperature and vegetation maps for different geographical CEE (Central Eastern Europe) regions. On the other hand, GreenLand is used for generating maps for different vegetation indexes (e.g. NDVI, EVI, SAVI, GEMI) based on Landsat satellite images. Both applications are using interpolation and random value generation algorithms, but also specific formulas for computing vegetation index values. The GreenView and GreenLand applications have been experimented over the SEE-GRID infrastructure and the performance evaluation is reported in [6]. The improvement of the execution time (obtained through a better parallelization of jobs), the extension of geographical areas to other parts of the Earth, and new user interaction techniques on spatial data and large set of satellite images are the goals of the future work. References [1] GreenView application on Wiki, http://wiki.egee-see.org/index.php/GreenView [2] SEE-GRID-SCI Project, http://www.see-grid-sci.eu/ [3] Gorgan D., Stefanut T., Bâcu V., Mihon D., Grid based Environment Application Development Methodology, SCICOM, 7th International Conference on "Large-Scale Scientific Computations", 4-8 June, 2009, Sozopol, Bulgaria, (To be published by Springer), (2009). [4] Gorgan D., Bacu V., Stefanut T., Rodila D., Mihon D., Grid based Satellite Image Processing Platform for Earth Observation Applications Development. IDAACS'2009 - IEEE Fifth International Workshop on "Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications", 21-23 September, Cosenza, Italy, IEEE Published in Computer Press, 247-252 (2009). [5] Mihon D., Bacu V., Stefanut T., Gorgan D., "Grid Based Environment Application Development - GreenView Application". ICCP2009 - IEEE 5th International Conference on Intelligent Computer Communication and Processing, 27 Aug, 2009 Cluj-Napoca. Published by IEEE Computer Press, pp. 275-282 (2009). [6] Danut Mihon, Victor Bacu, Dorian Gorgan, Róbert Mészáros, Györgyi Gelybó, Teodor Stefanut, Practical Considerations on the GreenView Application Development and Execution over SEE-GRID. SEE-GRID-SCI User Forum, 9-10 Dec 2009, Bogazici University, Istanbul, Turkey, ISBN: 978-975-403-510-0, pp. 167-175 (2009).
Do, Hyoungho
2018-01-01
Objectives Increasing use of medical devices outside of healthcare facilities inevitably requires connectivity and interoperability between medical devices and healthcare information systems. To this end, standards have been developed and used to provide interoperability between personal health devices (PHDs) and external systems. ISO/IEEE 11073 standards and IHE PCD-01 standard messages have been used the most in the exchange of observation data of health devices. Recently, transmitting observation data using the HL7 FHIR standard has been devised in the name of DoF (Devices on FHIR) and adopted very fast. We compare and analyze these standards and suggest that which standard will work best at the different environments of device usage. Methods We generated each message/resource of the three standards for observed vital signs from blood pressure monitor and thermometer. Then, the size, the contents, and the exchange processes of these messages are compared and analyzed. Results ISO/IEEE 11073 standard message has the smallest data size, but it has no ability to contain the key information, patient information. On the other hand, PCD-01 messages and FHIR standards have the fields for patient information. HL7 DoF standards provide reusing of information unit known as resource, and it is relatively easy to parse DoF messages since it uses widely known XML and JSON. Conclusions ISO/IEEE 11073 standards are suitable for devices having very small computing power. IHE PCD-01 and HL7 DoF messages can be used for the devices that need to be connected to hospital information systems that require patient information. When information reuse is frequent, DoF is advantageous over PCD-01. PMID:29503752
Lee, Sungkee; Do, Hyoungho
2018-01-01
Increasing use of medical devices outside of healthcare facilities inevitably requires connectivity and interoperability between medical devices and healthcare information systems. To this end, standards have been developed and used to provide interoperability between personal health devices (PHDs) and external systems. ISO/IEEE 11073 standards and IHE PCD-01 standard messages have been used the most in the exchange of observation data of health devices. Recently, transmitting observation data using the HL7 FHIR standard has been devised in the name of DoF (Devices on FHIR) and adopted very fast. We compare and analyze these standards and suggest that which standard will work best at the different environments of device usage. We generated each message/resource of the three standards for observed vital signs from blood pressure monitor and thermometer. Then, the size, the contents, and the exchange processes of these messages are compared and analyzed. ISO/IEEE 11073 standard message has the smallest data size, but it has no ability to contain the key information, patient information. On the other hand, PCD-01 messages and FHIR standards have the fields for patient information. HL7 DoF standards provide reusing of information unit known as resource, and it is relatively easy to parse DoF messages since it uses widely known XML and JSON. ISO/IEEE 11073 standards are suitable for devices having very small computing power. IHE PCD-01 and HL7 DoF messages can be used for the devices that need to be connected to hospital information systems that require patient information. When information reuse is frequent, DoF is advantageous over PCD-01.
7, 2018, LA Times) Dr. Jason Siegel to chair IEEE Technical Committee on Automotive Controls (Feb 2018, IEEE) Dr. Anna Stefanopoulou on research of sustainable vehicle technologies (Jan 24, 2018, WEMU ) Stefanopoulou plenary at IEEE 56th CDC (Jan 17, 2018, ME) ARC Researchers at IEEE 56th Conf. Decision and
chair IEEE Technical Committee on Automotive Controls (Feb 2018, IEEE) Dr. Anna Stefanopoulou on research of sustainable vehicle technologies (Jan 24, 2018, WEMU) Stefanopoulou plenary at IEEE 56th CDC (Jan 17, 2018, ME) ARC Researchers at IEEE 56th Conf. Decision and Control (Dec 12-14, 2017, CDC) ARC
NASA Astrophysics Data System (ADS)
Le, Nam-Tuan
2017-05-01
Copyright protection and information security are two most considered issues of digital data following the development of internet and computer network. As an important solution for protection, watermarking technology has become one of the challenged roles in industry and academic research. The watermarking technology can be classified by two categories: visible watermarking and invisible watermarking. With invisible technique, there is an advantage on user interaction because of the visibility. By applying watermarking for communication, it will be a challenge and a new direction for communication technology. In this paper we will propose one new research on communication technology using optical camera communications (OCC) based invisible watermarking. Beside the analysis on performance of proposed system, we also suggest the frame structure of PHY and MAC layer for IEEE 802.15.7r1 specification which is a revision of visible light communication (VLC) standardization.
NASA Astrophysics Data System (ADS)
Kaplan, Jeffrey Daniel
2014-01-01
Computational general relativity is a field of study which has reached maturity only within the last decade. This thesis details several studies that elucidate phenomena related to the coalescence of compact object binaries. Chapters 2 and 3 recounts work towards developing new analytical tools for visualizing and reasoning about dynamics in strongly curved spacetimes. In both studies, the results employ analogies with the classical theory of electricity and magnetism, first (Ch. 2) in the post-Newtonian approximation to general relativity and then (Ch. 3) in full general relativity though in the absence of matter sources. In Chapter 4, we examine the topological structure of absolute event horizons during binary black hole merger simulations conducted with the SpEC code. Chapter 6 reports on the progress of the SpEC code in simulating the coalescence of neutron star-neutron star binaries, while Chapter 7 tests the effects of various numerical gauge conditions on the robustness of black hole formation from stellar collapse in SpEC. In Chapter 5, we examine the nature of pseudospectral expansions of non-smooth functions motivated by the need to simulate the stellar surface in Chapters 6 and 7. In Chapter 8, we study how thermal effects in the nuclear equation of state effect the equilibria and stability of hypermassive neutron stars. Chapter 9 presents supplements to the work in Chapter 8, including an examination of the stability question raised in Chapter 8 in greater mathematical detail.
Aerothermodynamics of Blunt Body Entry Vehicles. Chapter 3
NASA Technical Reports Server (NTRS)
Hollis, Brian R.; Borrelli, Salvatore
2011-01-01
In this chapter, the aerothermodynamic phenomena of blunt body entry vehicles are discussed. Four topics will be considered that present challenges to current computational modeling techniques for blunt body environments: turbulent flow, non-equilibrium flow, rarefied flow, and radiation transport. Examples of comparisons between computational tools to ground and flight-test data will be presented in order to illustrate the challenges existing in the numerical modeling of each of these phenomena and to provide test cases for evaluation of Computational Fluid Dynamics (CFD) code predictions.
NASA Astrophysics Data System (ADS)
Gurov, I. P.; Kozlov, S. A.
2014-09-01
The first international scientific school "Methods of Digital Image Processing in Optics and Photonics" was held with a view to develop cooperation between world-class experts, young scientists, students and post-graduate students, and to exchange information on the current status and directions of research in the field of digital image processing in optics and photonics. The International Scientific School was managed by: Saint Petersburg National Research University of Information Technologies, Mechanics and Optics (ITMO University) - Saint Petersburg (Russia) Chernyshevsky Saratov State University - Saratov (Russia) National research nuclear University "MEPHI" (NRNU MEPhI) - Moscow (Russia) The school was held with the participation of the local chapters of Optical Society of America (OSA), the Society of Photo-Optical Instrumentation Engineers (SPIE) and IEEE Photonics Society. Further details, including topics, committees and conference photos are available in the PDF
Nahar, Jesmin; Imam, Tasadduq; Tickle, Kevin S; Garcia-Alonso, Debora
2013-01-01
This chapter is a review of data mining techniques used in medical research. It will cover the existing applications of these techniques in the identification of diseases, and also present the authors' research experiences in medical disease diagnosis and analysis. A computational diagnosis approach can have a significant impact on accurate diagnosis and result in time and cost effective solutions. The chapter will begin with an overview of computational intelligence concepts, followed by details on different classification algorithms. Use of association learning, a well recognised data mining procedure, will also be discussed. Many of the datasets considered in existing medical data mining research are imbalanced, and the chapter focuses on this issue as well. Lastly, the chapter outlines the need of data governance in this research domain.
History of Binary and Other Nondecimal Numeration.
ERIC Educational Resources Information Center
Glaser, Anton
This study traces the development of nondecimal numeration from the 16th century to the present. The first six chapters detail the contributions of mathematicians as well as people from other fields. Applications to computers are covered in one chapter, while another chapter discusses the coverage of numeration systems in college textbooks for…
Mini-Computers and the Building Trades: A Guide for Teachers of Vocational Education. Final Report.
ERIC Educational Resources Information Center
Asplen, Donald; And Others
These training materials are designed to help vocational education teachers introduce students to the utilization and installation of mini- and microcomputers in residential and small business buildings. It consists of two chapters. Chapter 1 contains general materials, designed to promote awareness, and chapter 2 contains materials which are…
Adaptive, Tactical Mesh Networking: Control Base MANET Model
2010-09-01
pp. 316–320 Available: IEEE Xplore , http://ieeexplore.ieee.org [Accessed: June 9, 2010]. [5] N. Sidiropoulos, “Multiuser Transmit Beamforming...Mobile Mesh Segments of TNT Testbed .......... 11 Figure 5. Infrastructure and Ad Hoc Mode of IEEE 802.11................................ 13 Figure...6. The Power Spectral Density of OFDM................................................ 14 Figure 7. A Typical IEEE 802.16 Network
Tensorial extensions of independent component analysis for multisubject FMRI analysis.
Beckmann, C F; Smith, S M
2005-03-01
We discuss model-free analysis of multisubject or multisession FMRI data by extending the single-session probabilistic independent component analysis model (PICA; Beckmann and Smith, 2004. IEEE Trans. on Medical Imaging, 23 (2) 137-152) to higher dimensions. This results in a three-way decomposition that represents the different signals and artefacts present in the data in terms of their temporal, spatial, and subject-dependent variations. The technique is derived from and compared with parallel factor analysis (PARAFAC; Harshman and Lundy, 1984. In Research methods for multimode data analysis, chapter 5, pages 122-215. Praeger, New York). Using simulated data as well as data from multisession and multisubject FMRI studies we demonstrate that the tensor PICA approach is able to efficiently and accurately extract signals of interest in the spatial, temporal, and subject/session domain. The final decompositions improve upon PARAFAC results in terms of greater accuracy, reduced interference between the different estimated sources (reduced cross-talk), robustness (against deviations of the data from modeling assumptions and against overfitting), and computational speed. On real FMRI 'activation' data, the tensor PICA approach is able to extract plausible activation maps, time courses, and session/subject modes as well as provide a rich description of additional processes of interest such as image artefacts or secondary activation patterns. The resulting data decomposition gives simple and useful representations of multisubject/multisession FMRI data that can aid the interpretation and optimization of group FMRI studies beyond what can be achieved using model-based analysis techniques.
View-Dependent Simplification of Arbitrary Polygonal Environments
2006-01-01
of backfacing nodes are not rendered [ Kumar 96]. 4.3 Triangle-Budget Simplification The screenspace error threshold and silhouette test allow the user...Greg Turk, and Dinesh Manocha for their invaluable guidance and support throughout this project. Funding for this work was provided by DARPA...Proceedings Visualization 95 , IEEE Computer Society Press (Atlanta, GA), 1995, pp. 296-303. [ Kumar 96] Kumar , Subodh, D. Manocha, W. Garrett, M. Lin
1978-09-01
Strategy for a Class of Static Systems", IEEE Trans, on Auto. Cont., AC-17, 7-15 (1972). 14. Findeisen , W., and Lefkowitz, I., "Design and Applications...of Multilayer Control", Proc. Fourth IFAC Congress, Warsaw, 1969. 15. Findeisen , W., Multilevel Control Systems, Panstwowe Wydawnictwo Naukowe
High-Fidelity Design of Multimodal Restorative Interventions in Gulf War Illness
2017-10-01
Bockmayr A, Klarner H, Siebert H. Time series dependent analysis of unparametrized Thomas networks. IEEE/ACM Transactions on Computational Biology and...Award Number: W81XWH-15-1-0582 TITLE:High-Fidelity Design of Multimodal Restorative Interventions in Gulf War Illness PRINCIPAL INVESTIGATOR...not be construed as an official Department of the Army position, policy or decision unless so designated by other documentation. REPORT
Observation Uncertainty in Gaussian Sensor Networks
2006-01-23
Ziv , J., and Lempel , A. A universal algorithm for sequential data compression . IEEE Transactions on Information Theory 23, 3 (1977), 337–343. 73 ...using the Lempel - Ziv algorithm [42], context-tree weighting [41], or the Burrows-Wheeler Trans- form [4], [15], for example. These source codes will...and Computation (Monticello, IL, September 2004). [4] Burrows, M., and Wheeler, D. A block sorting lossless data compression algorithm . Tech.
Investigation of a Nanowire Electronic Nose by Computer Simulation
2009-04-14
R. D. Mileham, and D. W. Galipeau. Gas sensing based on inelastic electron tunneling spectroscopy. IEEE Sensors Journal, 8(6):983988, 2008. [6] J...explosives in the hold of passenger aircraft . More generally they can be used to detect the presence of molecules that could be a threat to human health...design suitable for subsequent fabrication and then characterization. 15. SUBJECT TERMS EOARD, Sensor Technology, electronic
A Spatiotemporal Clustering Approach to Maritime Domain Awareness
2013-09-01
1997. [25] M. E. Celebi, “Effective initialization of k-means for color quantization,” 16th IEEE International Conference on Image Processing (ICIP...release; distribution is unlimited 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) Spatiotemporal clustering is the process of grouping...Department of Electrical and Computer Engineering iv THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT Spatiotemporal clustering is the process of
Three-Dimensional Visualization of Ozone Process Data.
1997-06-18
Scattered Multivariate Data. IEEE Computer Graphics & Applications. 11 (May), 47-55. Odman, M.T. and Ingram, C.L. (1996) Multiscale Air Quality Simulation...the Multiscale Air Quality Simulation Platform (MAQSIP) modeling system. MAQSIP is a modular comprehensive air quality modeling system which MCNC...photolyzed back again to nitric oxide. Finally, oxides of 6 nitrogen are terminated through loss or combination into nitric acid, organic nitrates
Evaluating the Limits of Network Topology Inference Via Virtualized Network Emulation
2015-06-01
76 xi Figure 5.33 Hop-plot of five best reduction methods. KDD most closely matches the Internet plot...respectively, located around the world. These monitors provide locations from which to perform network measurement experiments, primarily using the ping ...International Symposium on Modeling, Analysis and Simulation of Computer Telecommunication Systems. IEEE, 2001, pp. 346–353. 90 [21] C. Jin , Q. Chen, and S
Assisting Design Given Multiple Performance Criteria
1988-08-01
with uninstantiated operators is created then each operator’s implementation is selected. g - Keywords: computer-aided design, artificial...IEEE Trans- actions on Software Engineering, SE-7(1), 1981. [BG86] Forrest D. Brewer and Daniel D. Gajski . An expert-system paradigm for de- sign. In...Teukolsky, api William T. Vet- terling. Numerical Recipes. Cambridge University Press, Cambridge, England, 1987. [RFS83] G . G . Rassweiler, M. D
Multimodal Task-Driven Dictionary Learning for Image Classification
2015-12-18
1 Multimodal Task-Driven Dictionary Learning for Image Classification Soheil Bahrampour, Student Member, IEEE, Nasser M. Nasrabadi, Fellow, IEEE...Asok Ray, Fellow, IEEE, and W. Kenneth Jenkins, Life Fellow, IEEE Abstract— Dictionary learning algorithms have been suc- cessfully used for both...reconstructive and discriminative tasks, where an input signal is represented with a sparse linear combination of dictionary atoms. While these methods are
Validating the Test Procedures Described in UL 1741 SA and IEEE P1547.1: Preprint
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mahmud, Rasel; Hoke, Anderson F; Narang, David J
This paper investigates the test procedures specified in UL 1741 SA and the upcoming revision to IEEE P1547.1. A 550 kVA photovoltaic inverter was chosen for the tests. This research reveals some of key the components to consider while doing certification tests for UL 1741 SA and IEEE P1547.1. This paper also identifies some issues requiring consideration for future releases of the standard, i.e. IEEE P1547.1. This paper investigates the test procedures specified in UL 1741 SA and the upcoming revision to IEEE P1547.1. A 550 kVA photovoltaic inverter was chosen for the tests. This research reveals some of keymore » the components to consider while doing certification tests for UL 1741 SA and IEEE P1547.1. This paper also identifies some issues requiring consideration for future releases of the standard, i.e. IEEE P1547.1.« less
Analytical Design of Evolvable Software for High-Assurance Computing
2001-02-14
Mathematical expression for the Total Sum of Squares which measures the variability that results when all values are treated as a combined sample coming from...primarily interested in background on software design and high-assurance computing, research in software architecture generation or evaluation...respectively. Those readers solely interested in the validation of a software design approach should at the minimum read Chapter 6 followed by Chapter
NASA Astrophysics Data System (ADS)
Liu, Yuan; Wang, Mingqiang; Ning, Xingyao
2018-02-01
Spinning reserve (SR) should be scheduled considering the balance between economy and reliability. To address the computational intractability cursed by the computation of loss of load probability (LOLP), many probabilistic methods use simplified formulations of LOLP to improve the computational efficiency. Two tradeoffs embedded in the SR optimization model are not explicitly analyzed in these methods. In this paper, two tradeoffs including primary tradeoff and secondary tradeoff between economy and reliability in the maximum LOLP constrained unit commitment (UC) model are explored and analyzed in a small system and in IEEE-RTS System. The analysis on the two tradeoffs can help in establishing new efficient simplified LOLP formulations and new SR optimization models.
46 CFR 111.60-1 - Construction and testing of cable.
Code of Federal Regulations, 2010 CFR
2010-10-01
... identification of either IEEE 1580, UL 1309, IEC 92-353, or NPFC MIL-C-24640A or NPFC MIL-C-24643A (all five... 110.10-1). (c) Medium-voltage electric cable must meet the requirements of IEEE 1580 and UL 1072... 1309, IEEE 1580, or section 8 of IEEE 45-2002 (incorporated by reference; see 46 CFR 110.10-1). (e...
Gate-controlled-diodes in silicon-on-sapphire: A computer simulation
NASA Technical Reports Server (NTRS)
Gassaway, J. D.
1974-01-01
The computer simulation of the electrical behavior of a Gate-Controlled Diode (GCD) fabricated in Silicon-On-Sapphire (SOS) was described. A procedure for determining lifetime profiles from capacitance and reverse current measurements on the GCD was established. Chapter 1 discusses the SOS structure and points out the need of lifetime profiles to assist in device design for GCD's and bipolar transistors. Chapter 2 presents the one-dimensional analytical formula for electrostatic analysis of the SOS-GCD which are useful for data interpretation and setting boundary conditions on a simplified two-dimensional analysis. Chapter 3 gives the results of a two-dimensional analysis which treats the field as one-dimensional until the silicon film is depleted and the field penetrates the sapphire substrate. Chapter 4 describes a more complete two-dimensional model and gives results of programs implementing the model.
Campbell, Sarah
2015-01-01
Mark Sagar is changing the way we look at computers by giving them faces?disconcertingly realistic human faces. Sagar first gained widespread recognition for his pioneering work in rendering faces for Hollywood movies, including Avatar and King Kong. With a Ph.D. degree in bioengineering and two Academy Awards under his belt, Sagar now directs a research lab at the University of Auckland, New Zealand, a combinatorial hub where artificial intelligence (AI), neuroscience, computer science, philosophy, and cognitive psychology intersect in creating interactive, intelligent technologies.
1992-08-10
scheduler’s strategy. At the beginning of the is delayed at this state. A routing edge (Si,Tj), execution, the scheduler delays all messages sent for...graph G and Appendix). We remark that the choice of "play" the role ý-’ the scheduler . The scheduler’s constants in the above definition is not...34’ Annmul Symposium ical wakeup . Also, assume that during [t, t + x], for on Foundations of Computer Science. IEEE, t > 2n, a specific route of length at most
Complex network problems in physics, computer science and biology
NASA Astrophysics Data System (ADS)
Cojocaru, Radu Ionut
There is a close relation between physics and mathematics and the exchange of ideas between these two sciences are well established. However until few years ago there was no such a close relation between physics and computer science. Even more, only recently biologists started to use methods and tools from statistical physics in order to study the behavior of complex system. In this thesis we concentrate on applying and analyzing several methods borrowed from computer science to biology and also we use methods from statistical physics in solving hard problems from computer science. In recent years physicists have been interested in studying the behavior of complex networks. Physics is an experimental science in which theoretical predictions are compared to experiments. In this definition, the term prediction plays a very important role: although the system is complex, it is still possible to get predictions for its behavior, but these predictions are of a probabilistic nature. Spin glasses, lattice gases or the Potts model are a few examples of complex systems in physics. Spin glasses and many frustrated antiferromagnets map exactly to computer science problems in the NP-hard class defined in Chapter 1. In Chapter 1 we discuss a common result from artificial intelligence (AI) which shows that there are some problems which are NP-complete, with the implication that these problems are difficult to solve. We introduce a few well known hard problems from computer science (Satisfiability, Coloring, Vertex Cover together with Maximum Independent Set and Number Partitioning) and then discuss their mapping to problems from physics. In Chapter 2 we provide a short review of combinatorial optimization algorithms and their applications to ground state problems in disordered systems. We discuss the cavity method initially developed for studying the Sherrington-Kirkpatrick model of spin glasses. We extend this model to the study of a specific case of spin glass on the Bethe lattice at zero temperature and then we apply this formalism to the K-SAT problem defined in Chapter 1. The phase transition which physicists study often corresponds to a change in the computational complexity of the corresponding computer science problem. Chapter 3 presents phase transitions which are specific to the problems discussed in Chapter 1 and also known results for the K-SAT problem. We discuss the replica method and experimental evidences of replica symmetry breaking. The physics approach to hard problems is based on replica methods which are difficult to understand. In Chapter 4 we develop novel methods for studying hard problems using methods similar to the message passing techniques that were discussed in Chapter 2. Although we concentrated on the symmetric case, cavity methods show promise for generalizing our methods to the un-symmetric case. As has been highlighted by John Hopfield, several key features of biological systems are not shared by physical systems. Although living entities follow the laws of physics and chemistry, the fact that organisms adapt and reproduce introduces an essential ingredient that is missing in the physical sciences. In order to extract information from networks many algorithm have been developed. In Chapter 5 we apply polynomial algorithms like minimum spanning tree in order to study and construct gene regulatory networks from experimental data. As future work we propose the use of algorithms like min-cut/max-flow and Dijkstra for understanding key properties of these networks.
Charged Slurry Droplet Research
1989-02-20
IEEE/IAS annual meeting, Denver, CO, Sept. 28 - Oct. 3, 1986, p.1434. Accepted for publication IEEE Transactions on Industry Applications. 6. Lord...34Analysis of the Description of Evaporating Charged Droplets, IEEE Transactions on Industry Applications, IA-19, 771, 1983. 9. H.M.A. Elghazaly, G.S.P. Castle...34Analysis of the Instability of Evaporating Charged Liquid Drops", IEEE Transactions on Industry Applications, IA-22, 892, 1986. 10. H.M.A
SAR Product Improvements and Enhancements - SARprises
2013-09-30
paper on current fields at Orkney, Scotland, was accepted for publication in IEEE - TGARS and is currently in press (available on IEEE Xplore as Early...Sea surface velocity vector retrieval using dual-beam interferometry: First demonstration, IEEE TGARS, 43, 2494- 2502, 2005. [2] Chapron, B., F...Bight by airborne along-track interferometric SAR, Proc. IGARSS 2002, 1822-1824, IEEE , 2002. [4] Bjerklie, D.M., S.L. Dingman, C.J. Vorosmarty, C.H
Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks
2017-01-01
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle’s safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given. PMID:29231882
Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.
Song, Caixia
2017-12-12
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.
Performance Evaluation and Control of Distributed Computer Communication Networks.
1985-09-01
Zukerman, S. Katz, P. Rodriguez, R. Pazos , S. Resheff, Z. Tsai, Z. Zhang, L. Jong, V. Minh. Other participants are the following visiting... Pazos -Rangel "Bandwidth Allocation and Routing in ISDN’s," IEEE Communications Magazine, February 1984. Abstract The goal of communications network design...location and routing for integrated networks - is formulated, and efficient methods for its solution are presented. (2) R.A. Pazos -Rangel "Evaluation
Parallel Ray Tracing Using the Message Passing Interface
2007-09-01
software is available for lens design and for general optical systems modeling. It tends to be designed to run on a single processor and can be very...Cameron, Senior Member, IEEE Abstract—Ray-tracing software is available for lens design and for general optical systems modeling. It tends to be designed to...National Aeronautics and Space Administration (NASA), optical ray tracing, parallel computing, parallel pro- cessing, prime numbers, ray tracing
Enhanced Lesion Visualization in Image-Guided Noninvasive Surgery With Ultrasound Phased Arrays
2001-10-25
81, 1995. [4] N. Sanghvi et al., “Noninvasive surgery of prostate tissue by high-intensity focused ultrasound ,” IEEE Trans. UFFC, vol. 43, no. 6, pp...ENHANCED LESION VISUALIZATION IN IMAGE-GUIDED NONINVASIVE SURGERY WITH ULTRASOUND PHASED ARRAYS Hui Yao, Pornchai Phukpattaranont and Emad S. Ebbini...Department of Electrical and Computer Engineering University of Minnesota Minneapolis, MN 55455 Abstract- We describe dual-mode ultrasound phased
Dataset Curation through Renders and Ontology Matching
2015-09-01
government .001 services .246 furniture store .299 health salon .998 assoc./organization* .029 insurance agency .103 gastronomy .001 gas & automotive .219...Stanley Michael Bileschi. StreetScenes: Towards scene understanding in still images. PhD thesis, Massachusetts Institute of Technology , 2006. 3.5, 4.4...computer animation]. In Compcon’96.’ Technologies for the Information Superhigh- way’Digest of Papers. IEEE, 1996. 2.1 Aharon Bar Hillel and Daphna Weinshall
1983-01-01
fonctions gfinbrales et lea uti- litaires fournis en particulier grice 41 UNIX, sont intfigrfs aelon divers points de vue: - par leur accas 41 travers le...Are They Really A Problem? Proceedings, 2nd International Conference On Software Engineering, pp 91-68. Long acCA : IEEE Computer Society. Britton...CD The Hague. Nc KLEINSCIIMIDT, M. Dr Fa. LITEF. Poatfach 774. 7800 Freiburg i. Br., Ge KLEMM, R. Dr FGAN- FFM , D 5 307 Watchberg-Werthhoven. Ge KLENK
2016-07-08
Systems Using Automata Theory and Barrier Certifi- cates We developed a sound but incomplete method for the computational verification of specifications...method merges ideas from automata -based model checking with those from control theory including so-called barrier certificates and optimization-based... Automata theory meets barrier certificates: Temporal logic verification of nonlinear systems,” IEEE Transactions on Automatic Control, 2015. [J2] R
Intelligence in Scientific Computing.
1993-12-31
simulation) a high-performance controller for a magnetic levitation system - the German Transrapid system. The new control system can stabilize maglev ...techniques. A paper by Feng Zhao and Richard Thornton about the maglev controller designed by his program was presented at the 31st IEEE conference on...Massachusetts Insti- tute of Technology, 1991. Also availible as MIT AITR 1385. Zhao, F. and Thornton, R. "Automatic Design of a Maglev Controller in
A Common Interface Real-Time Multiprocessor Operating System for Embedded Systems
1991-03-04
Pressman , a design methodology should show hierarchical organization, lead to modules exhibiting independent functional characteristics, and be derived...Boehm, Barry W. "Software Engineering," Tutorial: Software Design Strategies, 2nd Edition. 35-50. Los Angeles CA: IEEE Computer Society Press, 1981... Pressman , Roger S. Software Engineering: A Practitioner’s Approach, Second Edi- tion. McGraw-Hill Book Company, New York, 1988. 59. Quinn, Michael J
Computer Modeling of Complete IC Fabrication Process.
1984-01-01
Venson Shaw 10. C. S. Chang 11. Elizabeth Batson 12. Richard Pinto 13. Jacques Beauduoin SPEAKERS: 1. Tayo Akinwande 2. Dimitri Antoniadis 3. Walter...Numerical Model of Polysilicon Emitter Contacts in Bipolar Transistors,’ To be published IEEE Trans. Electron Devices. [34] M. R. Pinto , R. W. Dutton...Received PhD, Spring 1082) Balaji Swaminathan (Received PhD, Spring 1983) Len Mei Research Associate Michael Kump Research Assistant Mark Pinto Research
Parallel Algorithms for Computer Vision.
1989-01-01
34 IEEE Tran. Pattern Ankyaij and Ma- Artifcial Intelligence , Tokyo, 1979. chine Intelligence , 6, 1984. Kirkpatrick, S., C.D. Gelatt, Jr. and M.P. Vecchi...MASSACHUSETTS INST OF TECH CAMBRIDGE ARTIFICIAL INTELLIGENCE LAB T P06010 JAN 89 ETL-0529 UNCLASSIFIED DACA76-85-C-0010 F.’G 12/1I N mommiimmmiiso...PoggioI Massachusetts Institute of Technology i Artificial Intelligence Laboratory 545 Technology Square Cambridge, Massachusetts 02139 DTIC January
The Use of Empirical Studies in the Development of High End Computing Applications
2009-12-01
34, Proceeding of 5th ACM-IEEE International Symposium on Empirical Software Engineering (ISESE), Rio de Janeiro , Brazil, September, 2006. 8. Jeffrey C...Symposium on Empirical Software Engineering, (ISESE), Rio de Janeiro , September, 2006. [26] Zelkowitz M. , V. Basili, S. Asgari, L. Hochstein, J...data is consistently collected across studies. 4. Sanitization of sensitive data. The framework provides external researcher with access to the
Principles of Adaptive Array Processing
2006-09-01
ACE with and without tapering (homogeneous case). These analytical results are less suited to predict the detection performance of a real system ...Nickel: Adaptive Beamforming for Phased Array Radars. Proc. Int. Radar Symposium IRS’98 (Munich, Sept. 1998), DGON and VDE /ITG, pp. 897-906.(Reprint also...strategies for airborne radar. Asilomar Conf. on Signals, Systems and Computers, Pacific Grove, CA, 1998, IEEE Cat.Nr. 0-7803-5148-7/98, pp. 1327-1331. [17
Message From the Editor for Contributions to the 2012 Real Time Conference Issue of TNS
NASA Astrophysics Data System (ADS)
Schmeling, Sascha Marc
2013-10-01
The papers in this special issue were originally presented at the 18th IEEE-NPSS Real Time Conference (RT2012) on Computing Applications in Nuclear and Plasma Sciences, held in Berkeley, California, USA, in June 2012. These contributions come from a broad range of fields of application, including Astrophysics, Medical Imaging, Nuclear and Plasma Physics, Particle Accelerators, and Particle Physics Experiments.
Overhead-Performance Tradeoffs in Distributed Wireless Networks
2015-06-26
grew this fraction. See the tutorial for details and acronym definitions. Key Publication & Abstract • Gwanmo Ku and John MacLaren Walsh, Resource...tradeoffs. Key Publication & Abstract • Gwanmo Ku , Jie Ren, and John MacLaren Walsh, Computing the Rate Distortion Region for the CEO Problem with...IID. • Jie Ren, Bradford Boyle, Gwanmo Ku , Steven Weber, John MacLaren Walsh, Overhead Performance Tradeoffs A Resource Allocation Perspective, IEEE
An Overview of MSHN: The Management System for Heterogeneous Networks
1999-04-01
An Overview of MSHN: The Management System for Heterogeneous Networks Debra A. Hensgen†, Taylor Kidd†, David St. John§, Matthew C . Schnaidt†, Howard...ABSTRACT UU 18. NUMBER OF PAGES 15 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT unclassified c . THIS PAGE...Alhusaini, V. K. Prasanna, and C . S. Raghavendra, “A unified resource scheduling framework for heterogeneous computing environments,” Proc. 8th IEEE
Computational Methods for Design, Control and Optimization
2007-10-01
Krueger Eugene M. Cliff Hoan Nguyen Traian Iliescu John Singler James Vance Eric Vugrin Adam Childers Dan Sutton References [11 J. T. Borggaard, S...Control, 45th IEEE Conference on Decision and Control, accepted. [11] L. C. Berselli, T. Iliescu and W. J. Layton , Mathematics of Large Eddy...Daniel Inman, Eric Ruggiero and John Singler, Finite Element For- mulation for Static Control of a Thin Euler-Bernoulli Beam Using Piezoelectric
The Emergence of Compositional Communication in a Synthetic Ethology Framework
2005-08-12
34Integrating Language and Cognition: A Cognitive Robotics Approach", invited contribution to IEEE Computational Intelligence Magazine . The first two...papers address the main topic of investigation of the research proposal. In particular, we have introduced a simple structured meaning-signal mapping...Cavalli-Sforza (1982) to investigate analytically the evolution of structured com- munication codes. Let x 6 [0,1] be the proportion of individuals in a
Agreements in Virtual Organizations
NASA Astrophysics Data System (ADS)
Pankowska, Malgorzata
This chapter is an attempt to explain the important impact that contract theory delivers with respect to the concept of virtual organization. The author believes that not enough research has been conducted in order to transfer theoretical foundations for networking to the phenomena of virtual organizations and open autonomic computing environment to ensure the controllability and management of them. The main research problem of this chapter is to explain the significance of agreements for virtual organizations governance. The first part of this chapter comprises explanations of differences among virtual machines and virtual organizations for further descriptions of the significance of the first ones to the development of the second. Next, the virtual organization development tendencies are presented and problems of IT governance in highly distributed organizational environment are discussed. The last part of this chapter covers analysis of contracts and agreements management for governance in open computing environments.
Flexible Description Language for HPC based Processing of Remote Sense Data
NASA Astrophysics Data System (ADS)
Nandra, Constantin; Gorgan, Dorian; Bacu, Victor
2016-04-01
When talking about Big Data, the most challenging aspect lays in processing them in order to gain new insight, find new patterns and gain knowledge from them. This problem is likely most apparent in the case of Earth Observation (EO) data. With ever higher numbers of data sources and increasing data acquisition rates, dealing with EO data is indeed a challenge [1]. Geoscientists should address this challenge by using flexible and efficient tools and platforms. To answer this trend, the BigEarth project [2] aims to combine the advantages of high performance computing solutions with flexible processing description methodologies in order to reduce both task execution times and task definition time and effort. As a component of the BigEarth platform, WorDeL (Workflow Description Language) [3] is intended to offer a flexible, compact and modular approach to the task definition process. WorDeL, unlike other description alternatives such as Python or shell scripts, is oriented towards the description topologies, using them as abstractions for the processing programs. This feature is intended to make it an attractive alternative for users lacking in programming experience. By promoting modular designs, WorDeL not only makes the processing descriptions more user-readable and intuitive, but also helps organizing the processing tasks into independent sub-tasks, which can be executed in parallel on multi-processor platforms in order to improve execution times. As a BigEarth platform [4] component, WorDeL represents the means by which the user interacts with the system, describing processing algorithms in terms of existing operators and workflows [5], which are ultimately translated into sets of executable commands. The WorDeL language has been designed to help in the definition of compute-intensive, batch tasks which can be distributed and executed on high-performance, cloud or grid-based architectures in order to improve the processing time. Main references for further information: [1] Gorgan, D., "Flexible and Adaptive Processing of Earth Observation Data over High Performance Computation Architectures", International Conference and Exhibition Satellite 2015, August 17-19, Houston, Texas, USA. [2] Bigearth project - flexible processing of big earth data over high performance computing architectures. http://cgis.utcluj.ro/bigearth, (2014) [3] Nandra, C., Gorgan, D., "Workflow Description Language for Defining Big Earth Data Processing Tasks", Proceedings of the Intelligent Computer Communication and Processing (ICCP), IEEE-Press, pp. 461-468, (2015). [4] Bacu, V., Stefan, T., Gorgan, D., "Adaptive Processing of Earth Observation Data on Cloud Infrastructures Based on Workflow Description", Proceedings of the Intelligent Computer Communication and Processing (ICCP), IEEE-Press, pp.444-454, (2015). [5] Mihon, D., Bacu, V., Colceriu, V., Gorgan, D., "Modeling of Earth Observation Use Cases through the KEOPS System", Proceedings of the Intelligent Computer Communication and Processing (ICCP), IEEE-Press, pp. 455-460, (2015).
ERIC Educational Resources Information Center
Stanford Univ., CA. School Mathematics Study Group.
This is the second unit of a 15-unit School Mathematics Study Group (SMSG) mathematics text for high school students. Topics presented in the first chapter (Informal Algorithms and Flow Charts) include: changing a flat tire; algorithms, flow charts, and computers; assignment and variables; input and output; using a variable as a counter; decisions…
Dynamic Control of Facts Devices to Enable Large Scale Penetration of Renewable Energy Resources
NASA Astrophysics Data System (ADS)
Chavan, Govind Sahadeo
This thesis focuses on some of the problems caused by large scale penetration of Renewable Energy Resources within EHV transmission networks, and investigates some approaches in resolving these problems. In chapter 4, a reduced-order model of the 500 kV WECC transmission system is developed by estimating its key parameters from phasor measurement unit (PMU) data. The model was then implemented in RTDS and was investigated for its accuracy with respect to the PMU data. Finally it was tested for observing the effects of various contingencies like transmission line loss, generation loss and large scale penetration of wind farms on EHV transmission systems. Chapter 5 introduces Static Series Synchronous Compensators (SSSC) which are seriesconnected converters that can control real power flow along a transmission line. A new application of SSSCs in mitigating Ferranti effect on unloaded transmission lines was demonstrated on PSCAD. A new control scheme for SSSCs based on the Cascaded H-bridge (CHB) converter configuration was proposed and was demonstrated using PSCAD and RTDS. A new centralized controller was developed for the distributed SSSCs based on some of the concepts used in the CHB-based SSSC. The controller's efficacy was demonstrated using RTDS. Finally chapter 6 introduces the problem of power oscillations induced by renewable sources in a transmission network. A power oscillation damping (POD) controller is designed using distributed SSSCs in NYPA's 345 kV three-bus AC system and its efficacy is demonstrated in PSCAD. A similar POD controller is then designed for the CHB-based SSSC in the IEEE 14 bus system in PSCAD. Both controllers were noted to have significantly damped power oscillations in the transmission networks.
Some issues related to simulation of the tracking and communications computer network
NASA Technical Reports Server (NTRS)
Lacovara, Robert C.
1989-01-01
The Communications Performance and Integration branch of the Tracking and Communications Division has an ongoing involvement in the simulation of its flight hardware for Space Station Freedom. Specifically, the communication process between central processor(s) and orbital replaceable units (ORU's) is simulated with varying degrees of fidelity. The results of investigations into three aspects of this simulation effort are given. The most general area involves the use of computer assisted software engineering (CASE) tools for this particular simulation. The second area of interest is simulation methods for systems of mixed hardware and software. The final area investigated is the application of simulation methods to one of the proposed computer network protocols for space station, specifically IEEE 802.4.
Some issues related to simulation of the tracking and communications computer network
NASA Astrophysics Data System (ADS)
Lacovara, Robert C.
1989-12-01
The Communications Performance and Integration branch of the Tracking and Communications Division has an ongoing involvement in the simulation of its flight hardware for Space Station Freedom. Specifically, the communication process between central processor(s) and orbital replaceable units (ORU's) is simulated with varying degrees of fidelity. The results of investigations into three aspects of this simulation effort are given. The most general area involves the use of computer assisted software engineering (CASE) tools for this particular simulation. The second area of interest is simulation methods for systems of mixed hardware and software. The final area investigated is the application of simulation methods to one of the proposed computer network protocols for space station, specifically IEEE 802.4.
Kim, Joongheon; Kim, Jong-Kook
2016-01-01
This paper addresses the computation procedures for estimating the impact of interference in 60 GHz IEEE 802.11ad uplink access in order to construct visual big-data database from randomly deployed surveillance camera sensing devices. The acquired large-scale massive visual information from surveillance camera devices will be used for organizing big-data database, i.e., this estimation is essential for constructing centralized cloud-enabled surveillance database. This performance estimation study captures interference impacts on the target cloud access points from multiple interference components generated by the 60 GHz wireless transmissions from nearby surveillance camera devices to their associated cloud access points. With this uplink interference scenario, the interference impacts on the main wireless transmission from a target surveillance camera device to its associated target cloud access point with a number of settings are measured and estimated under the consideration of 60 GHz radiation characteristics and antenna radiation pattern models.
Automatic metro map layout using multicriteria optimization.
Stott, Jonathan; Rodgers, Peter; Martínez-Ovando, Juan Carlos; Walker, Stephen G
2011-01-01
This paper describes an automatic mechanism for drawing metro maps. We apply multicriteria optimization to find effective placement of stations with a good line layout and to label the map unambiguously. A number of metrics are defined, which are used in a weighted sum to find a fitness value for a layout of the map. A hill climbing optimizer is used to reduce the fitness value, and find improved map layouts. To avoid local minima, we apply clustering techniques to the map-the hill climber moves both stations and clusters when finding improved layouts. We show the method applied to a number of metro maps, and describe an empirical study that provides some quantitative evidence that automatically-drawn metro maps can help users to find routes more efficiently than either published maps or undistorted maps. Moreover, we have found that, in these cases, study subjects indicate a preference for automatically-drawn maps over the alternatives. © 2011 IEEE Published by the IEEE Computer Society
An SNMP-based solution to enable remote ISO/IEEE 11073 technical management.
Lasierra, Nelia; Alesanco, Alvaro; García, José
2012-07-01
This paper presents the design and implementation of an architecture based on the integration of simple network management protocol version 3 (SNMPv3) and the standard ISO/IEEE 11073 (X73) to manage technical information in home-based telemonitoring scenarios. This architecture includes the development of an SNMPv3-proxyX73 agent which comprises a management information base (MIB) module adapted to X73. In the proposed scenario, medical devices (MDs) send information to a concentrator device [designated as compute engine (CE)] using the X73 standard. This information together with extra information collected in the CE is stored in the developed MIB. Finally, the information collected is available for remote access via SNMP connection. Moreover, alarms and events can be configured by an external manager in order to provide warnings of irregularities in the MDs' technical performance evaluation. This proposed SNMPv3 agent provides a solution to integrate and unify technical device management in home-based telemonitoring scenarios fully adapted to X73.
Hu, Fei; Hao, Qi; Lukowiak, Marcin; Sun, Qingquan; Wilhelm, Kyle; Radziszowski, Stanisław; Wu, Yao
2010-11-01
Implantable medical devices (IMDs) have played an important role in many medical fields. Any failure in IMDs operations could cause serious consequences and it is important to protect the IMDs access from unauthenticated access. This study investigates secure IMD data collection within a telehealthcare [mobile health (m-health)] network. We use medical sensors carried by patients to securely access IMD data and perform secure sensor-to-sensor communications between patients to relay the IMD data to a remote doctor's server. To meet the requirements on low computational complexity, we choose N-th degree truncated polynomial ring (NTRU)-based encryption/decryption to secure IMD-sensor and sensor-sensor communications. An extended matryoshkas model is developed to estimate direct/indirect trust relationship among sensors. An NTRU hardware implementation in very large integrated circuit hardware description language is studied based on industry Standard IEEE 1363 to increase the speed of key generation. The performance analysis results demonstrate the security robustness of the proposed IMD data access trust model.
Real Time Conference 2016 Overview
NASA Astrophysics Data System (ADS)
Luchetta, Adriano
2017-06-01
This is a special issue of the IEEE Transactions on Nuclear Science containing papers from the invited, oral, and poster presentation of the 20th Real Time Conference (RT2016). The conference was held June 6-10, 2016, at Centro Congressi Padova “A. Luciani,” Padova, Italy, and was organized by Consorzio RFX (CNR, ENEA, INFN, Università di Padova, Acciaierie Venete SpA) and the Istituto Nazionale di Fisica Nucleare. The Real Time Conference is multidisciplinary and focuses on the latest developments in real-time techniques in high-energy physics, nuclear physics, astrophysics and astroparticle physics, nuclear fusion, medical physics, space instrumentation, nuclear power instrumentation, general radiation instrumentation, and real-time security and safety. Taking place every second year, it is sponsored by the Computer Application in Nuclear and Plasma Sciences technical committee of the IEEE Nuclear and Plasma Sciences Society. RT2016 attracted more than 240 registrants, with a large proportion of young researchers and engineers. It had an attendance of 67 students from many countries.
NASA Technical Reports Server (NTRS)
Taylor, Lawrence W., Jr.; Balakrishnan, A. V.
1988-01-01
The problen of controlling large, flexible space systems has been evaluated using computer simulation. In several cases, ground experiments have also been used to validate system performance under more realistic conditions. There remains a need, however, to test additional control laws for flexible spacecraft and to directly compare competing design techniques. A program is discussed which has been initiated to make direct comparisons of control laws for, first, a mathematical problem, then and experimental test article being assembled under the cognizance of the Spacecraft Control Branch at the NASA Langley Research Center with the advice and counsel of the IEEE Subcommittee on Large Space Structures. The physical apparatus will consist of a softly supported dynamic model of an antenna attached to the Shuttle by a flexible beam. The control objective will include the task of directing the line-of-sight of the Shuttle antenna configuration toward a fixed target, under conditions of noisy data, control authority and random disturbances.
Moving Up the CMMI Capability and Maturity Levels Using Simulation
2008-01-01
Alternative Process Tools, Including NPV and ROI 6 Figure 3: Top-Level View of the Full Life-Cycle Version of the IEEE 12207 PSIM, Including IV&V Layer 19...Figure 4: Screenshot of the Incremental Version Model 19 Figure 5: IEEE 12207 PSIM Showing the Top-Level Life-Cycle Phases 22 Figure 6: IEEE 12207 ...Software Detailed Design for the IEEE 12207 Life- Cycle Process 24 Figure 8: Incremental Life Cycle PSIM Configured for a Specific Project Using SEPG
Sonobuoy-Based, 3-D Acoustic Characterization of Shallow-Water Environments
2015-09-30
10.1109/JOE.2014.2362838, ( IEEE Xplore Early Access, 4 Dec 2014)]. For each type of buoy, the eigenvalues at 50, 75, 125, and 175 Hz were used as input...using sonobuoys,” IEEE J. Ocean. Eng., vol. 40, no. 3, pp. 607-620, Jul. 2015 (DOI: 10.1109/JOE.2014.2362838, ( IEEE Xplore Early Access, 4 Dec 2014...et al, “Modal mapping experiment and geoacoustic inversion using sonobuoys,” IEEE J. Ocean. Eng., vol. 40, no. 3, pp. 607- 620, Jul. 2015 (DOI
2010-10-01
Downloaded on February 20,2010 at 10:55:59 EST from IEEE Xplore . Restrictions apply. STUDENSKI et al.: ACQUISITION AND PROCESSING METHODS FOR A BEDSIDE...February 20,2010 at 10:55:59 EST from IEEE Xplore . Restrictions apply. 208 IEEE TRANSACTIONS ON NUCLEAR SCIENCE, VOL. 57, NO. 1, FEBRUARY 2010 from the...59 EST from IEEE Xplore . Restrictions apply. STUDENSKI et al.: ACQUISITION AND PROCESSING METHODS FOR A BEDSIDE CARDIAC SPECT IMAGING SYSTEM 209
Effect of Interface States on the Performance of Antimonide nMOSFETs
2013-01-14
Member, IEEE, Himanshu Madan , Student Member, IEEE, Michael J. Barth, J. Brad Boos, Member, IEEE, Brian R. Bennett, and Suman Datta, Fellow, IEEE...now with Intel Corporation, Hillsboro, OR 97124 USA (e-mail: AshkarAli@psualum.com). H. Madan , M. J. Barth, and S. Datta are with the Pennsylvania...S. Chau, “Sb-based CMOS devices,” U.S. Patent 7 429 747, Sep. 30, 2008. [2] A. Ali, H. Madan , A. Agrawal, I. Ramirez, R. Misra, J. B. Boos, B. R
A Bibliography of Packet Radio Literature.
1984-03-01
r r* C.C.4. W . . . . . . . . .. . . . Gafni, E. and D. Bertsekas, "Distributed Algorithms for Generating Loop-Free Routes in Networks with Frequently...December 1980). Leiner, B., K. Klemba, and J. Tornow , "Packet Radio Networking," Computer World, pp. 26-37, 30, (September 27, 1982). Liu, J...34Distributed Routing and Relay Management in Mobile Packet Radio Networks," Proceedings IEEE COMPCON Fall , p. 235-243 (1980). MacGregor, W ., J. Westcott, and
2006-03-01
Evaluation of fully 3D emission mammotomography with a compact cadmium zinc telluride detector,” IEEE Trans. Med. Imag. (Submitted) 2005. [16] M.P...times over a few months, and the degradation due to compromised adipose tissue boundaries as well as other physical breast features are becoming...breast lesions, especially in radiographically dense breasts,2,11-13 through the removal of contrast-reducing overlying tissue ; (2) uncompressed
2017-03-20
computation, Prime Implicates, Boolean Abstraction, real- time embedded software, software synthesis, correct by construction software design , model...types for time -dependent data-flow networks". J.-P. Talpin, P. Jouvelot, S. Shukla. ACM-IEEE Conference on Methods and Models for System Design ...information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and
An Internet-style Approach to Managing Wireless Link Errors
2002-05-01
implementation I used. Jamshid Mahdavi and Matt Mathis, then at the Pittsburgh Super- computer Center, and Vern Paxson of the Lawrence Berkeley National...Exposition. IEEE CS Press, 2002. [19] P. Bhagwat, P. Bhattacharya, A. Krishna , and S. Tripathi. Enhancing throughput over wireless LANs using channel...performance over wireless networks at the link layer. ACM Mobile Networks and Applications, 5(1):57– 71, March 2000. [97] Vern Paxson and Mark Allman
DIVA (Data Intensive Architecture)
2004-06-01
Itanium-based workstation as a test bench for the larger system concepts. 44 10. Publications [Hall99] M. Hall, P. Kogge, J. Koller, P. Diniz ...White, Dr. Pedro Diniz . Mr. Pablo Moissett • Caltech: Dr. Thomas Sterling, Mr. Daniel Savarese • University of Notre Dame: Dr. Peter Kogge, Dr. Jay...IEEE Computer, April 1995, pp. 23-31. [Hall99] M. Hall, P. Kogge, J. Koller, P. Diniz , J. Chame, J. Draper, J. LaCoss, J. Granacki, J. Brockman
1985-02-01
Then it follows that H2 (fl,-f 2) (-flf Thus, the total amplitude of the intermodulation signal at fre- quency fAF is given by6 V = V +I mA2 III(fl 1-f...RFI suppression in the manner described. 229 . * . ... ..... 4 -*.-., ,e ’ - ."..~ REFERENCES 1. G. Kaplan , "Computer Aided Design," IEEE Spectrum, Vol
DMPL: Programming and Verifying Distributed Mixed Synchrony and Mixed Critical Software
2016-06-16
ference on Intelligent Robots and Systems, pages 1495–1502, Chicago, IL, September 2014. IEEE Computer Society. [21] MADARA website . http://sourceforge.net...4.6 DMPL program for 5- robot reconnaissance example 19 Figure 5.1 Generated C++ code for example DMPL program. In practice, local vari- ables (lines...examples of collision avoidance in multi- robot systems. CMU/SEI-2016-TR-005 | SOFTWARE ENGINEERING INSTITUTE | Carnegie Mellon University vii
Merging Surface Reconstructions of Terrestrial and Airborne LIDAR Range Data
2009-05-19
Mangan and R. Whitaker. Partitioning 3D surface meshes using watershed segmentation . IEEE Trans. on Visualization and Computer Graphics, 5(4), pp...Jain, and A. Zakhor. Data Processing Algorithms for Generating Textured 3D Building Facade Meshes from Laser Scans and Camera Images. International...acquired set of overlapping range images into a single mesh [2,9,10]. However, due to the volume of data involved in large scale urban modeling, data
Rapid Prototyping of High Performance Signal Processing Applications
2011-01-01
understand- ing broadband wireless networking . Prentice Hall, 2007. [4] J.W.M. Baars, L.R. D’Addario, and A.R. Thompson. Radio astronomy in the... wireless sensor net- works. In Proceedings of the IEEE Real-Time Systems Symposium, pages 214–223, Tucson, Arizona, December 2007. 147 [74] C. Shen, H. Wu...computing platforms. In this region of high performance DSP, rapid prototyping is critical for faster time-to-market (e.g., in the wireless
Radiation Hard Sensors for Surveillance.
1988-03-11
track position measurements were noted. E. Heijne (CERN) reported on the degradation of silicon detectors for doses larger than 2x10 11 muons /cm 2...Workshop on Transmission and Emission Computerized Tomography , July 1978, Seoul, Korea Nahmias C., Kenyon D.B., Garnett E.S.: Optimization of...crystal size in emission computed tomography . IEEE Trans ,.-.e Nucl Sci NS-27: 529-532, 1980. Mullani N.A., Ficke D.C., Ter-Pogossian M.M.: Cesium Fluoride
Cooperation Helps Power Saving
2009-04-07
the destination node hears the poll, the link between the two nodes is activated. In the original STEM, two radios working on two separate channels... hears the poll, the link between the two nodes is activated. In the original STEM, two radios working on two separate chan- nels are used: one radio is...Computer and Communications Societies. Proceedings. IEEE, vol. 3, pp. 1548–1557 vol.3, 2001. [2] R . Kravets and P. Krishnan, “Application-driven power
Bio-Inspired Computation: Clock-Free, Grid-Free, Scale-Free and Symbol Free
2015-06-11
for Prediction Tasks in Spiking Neural Networks ." Artificial Neural Networks and Machine Learning–ICANN 2014. Springer, 2014. pp 635-642. Gibson, T...Henderson, JA and Wiles, J. "Predicting temporal sequences using an event-based spiking neural network incorporating learnable delays." IEEE...Adelaide (2014 Jan). Gibson, T and Wiles, J "Predicting temporal sequences using an event-based spiking neural network incorporating learnable delays" at
Application of Prognostic Health Management in Digital Electronic Systems
2007-01-01
variable external supply applied the necessary core power to the processor while the motherboard continued to source power from the ATX supply. By...isolating the processor power from the motherboard power , control over the aging profile of the processor was achieved. Once nominal operating...Physics-of-failure RISC – Reduced Instruction Set Computer RUL – Remaining Useful Life 1 1-4244-0525-4/07/$20.00 ©2007 IEEE. Paper 1326
Implementing the Victory Access Control Framework in a Military Ground Vehicle
2015-08-01
Protocol ( SOAP ) message body, but lacked the ability to encrypt individual XML elements within the SOAP body. Several attempts were made to augment the C...Service and both use SOAP and provide freely available WSDLs with similarly defined operations. TS3 even leverages the same XACML engine that is...Characterizing the Performance of SOAP Toolkits”, Fifth IEEE/ACM International Workshop on Grid Computing, pages 365- 372, November 2004. [8] J.A
IEEE Computer Society/Software Engineering Institute Software Process Achievement (SPA) Award 2009
2011-03-01
capabilities to our GDM. We also introduced software as a service ( SaaS ) as part our technology solutions and have further enhanced our ability to...model PROSPER Infosys production support methodology Q&P quality and productivity R&D research and development SaaS software as a service ... Software Development Life Cycle (SDLC) 23 Table 10: Scientific Estimation Coverage by Service Line 27 CMU/SEI-2011-TR-008 | vi CMU/SEI-2011
Information Interface Related Standards, Guidelines, and Recommended Practices.
1985-07-01
Application Workshop, IEEE, October 1984 (11) Software Portability and Standards, by Ingemar Dahlstrand, Ellis Horwood Ltd., 1984 (12) World of EDP...March 29, 1985, p. 42-48 * 9. "IBM’s Topview Plays to Poor Reviews of Early Users," Computer World , March 4, 1985, p. 5 10. "Lack of Software Standards...Information Symbols ISOiTR 7239-1984 - Development and Principles for Application of Public Information Symbols ISO/TR 8545 -1984 - Technical Drawings
A New Interface Specification Methodology and its Application to Transducer Synthesis
1988-05-01
structural, and physical. Within each domain descriptive methods are distinguished by the level of abstraction they emphasize. The Gajski -Kuhn Y...4.2. The Gajski -Kuhn Y-chart’s three axes correspond to three different domains for describing designs: behavioral, structural, and physical. The...Gajski83] D. Gajski , R. Kuhn, Guest Editors’ Introduction: New VLSI Tools, IEEE Computer, Vol. 16, No. 12, December 1983. [Girczyc85] E. Girczyc, R
Current state of the mass storage system reference model
NASA Technical Reports Server (NTRS)
Coyne, Robert
1993-01-01
IEEE SSSWG was chartered in May 1990 to abstract the hardware and software components of existing and emerging storage systems and to define the software interfaces between these components. The immediate goal is the decomposition of a storage system into interoperable functional modules which vendors can offer as separate commercial products. The ultimate goal is to develop interoperable standards which define the software interfaces, and in the distributed case, the associated protocols to each of the architectural modules in the model. The topics are presented in viewgraph form and include the following: IEEE SSSWG organization; IEEE SSSWG subcommittees & chairs; IEEE standards activity board; layered view of the reference model; layered access to storage services; IEEE SSSWG emphasis; and features for MSSRM version 5.
Brennan, Jennifer Sousa
2010-01-01
This chapter is an introductory reference guide highlighting some of the most common statistical topics, broken down into both command-line syntax and graphical interface point-and-click commands. This chapter serves to supplement more formal statistics lessons and expedite using Stata to compute basic analyses.
Reproducible Bioinformatics Research for Biologists
USDA-ARS?s Scientific Manuscript database
This book chapter describes the current Big Data problem in Bioinformatics and the resulting issues with performing reproducible computational research. The core of the chapter provides guidelines and summaries of current tools/techniques that a noncomputational researcher would need to learn to pe...
Deelman, E.; Callaghan, S.; Field, E.; Francoeur, H.; Graves, R.; Gupta, N.; Gupta, V.; Jordan, T.H.; Kesselman, C.; Maechling, P.; Mehringer, J.; Mehta, G.; Okaya, D.; Vahi, K.; Zhao, L.
2006-01-01
This paper discusses the process of building an environment where large-scale, complex, scientific analysis can be scheduled onto a heterogeneous collection of computational and storage resources. The example application is the Southern California Earthquake Center (SCEC) CyberShake project, an analysis designed to compute probabilistic seismic hazard curves for sites in the Los Angeles area. We explain which software tools were used to build to the system, describe their functionality and interactions. We show the results of running the CyberShake analysis that included over 250,000 jobs using resources available through SCEC and the TeraGrid. ?? 2006 IEEE.
ERIC Educational Resources Information Center
Darrah, Charles N.
This book explores how people look at workplaces and the consequences for one's understanding of work. Chapter 1 discusses the rhetoric of skill requirements. Chapter 2 follows the attempt of Kramden Computers to provide training to reduce problems in workmanship and the program's failure due to the inadequacy of the skill concept. Chapter 3…
Applications in Data-Intensive Computing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shah, Anuj R.; Adkins, Joshua N.; Baxter, Douglas J.
2010-04-01
This book chapter, to be published in Advances in Computers, Volume 78, in 2010 describes applications of data intensive computing (DIC). This is an invited chapter resulting from a previous publication on DIC. This work summarizes efforts coming out of the PNNL's Data Intensive Computing Initiative. Advances in technology have empowered individuals with the ability to generate digital content with mouse clicks and voice commands. Digital pictures, emails, text messages, home videos, audio, and webpages are common examples of digital content that are generated on a regular basis. Data intensive computing facilitates human understanding of complex problems. Data-intensive applications providemore » timely and meaningful analytical results in response to exponentially growing data complexity and associated analysis requirements through the development of new classes of software, algorithms, and hardware.« less
Advances in integration of photovoltaic power and energy production in practical systems
NASA Astrophysics Data System (ADS)
Fartaria, Tomas Oliveira
This thesis presents advances in integration of photovoltaic (PV) power and energy in practical systems, such as existing power plants in buildings or directly integrated in the public electrical grid. It starts by providing an analyze of the current state of PV power and some of its limitations. The work done in this thesis begins by providing a model to compute mutual shading in large PV plants, and after provides a study of the integration of a PV plant in a biogas power plant. The remainder sections focus on the work done for project PVCROPS, which consisted on the construction and operation of two prototypes composed of a PV system and a novel battery connected to a building and to the public electrical grid. These prototypes were then used to test energy management strategies and validate the suitability of the two advanced batteries (a lithium-ion battery and a vanadium redox ow battery) for households (BIPV) and PV plants. This thesis is divided in 7 chapters: Chapter 1 provides an introduction to explain and develop the main research questions studied for this thesis; Chapter 2 presents the development of a ray-tracing model to compute shading in large PV elds (with or without trackers); Chapter 3 shows the simulation of hybridizing a biogas plant with a PV plant, using biogas as energy storage; Chapters 4 and 5 present the construction, programming, and initial operation of both prototypes (Chapter 4), EMS testing oriented to BIPV systems (Chapter 5). Finally, Chapters 6 provides some future lines of investigation that can follow this thesis, and Chapter 7 shows a synopsis of the main conclusions of this work.
Piezoelectrically forced vibrations of rectangular SC-cut quartz plates
NASA Astrophysics Data System (ADS)
Lee, P. C. Y.; Lin, W. S.
1998-06-01
A system of two-dimensional first-order equations for piezoelectric crystal plates with general symmetry and with electroded faces was recently deduced from the three-dimensional equations of linear piezoelectricity. Solutions of these equations for AT-cut plates of quartz were shown to give accurate dispersion curves without corrections, and the resonances predicted agree closely with the experimental data of Koga and Fukuyo [I. Koga and H. Fukuyo, J. Inst. Electr. Commun. Eng. Jpn. 36, 59 (1953)] and that of Nakazawa, Horiuchi, and Ito (M. Nakazawa, K. Horiuchi, and H. Ito, Proceedings of the 1990 IEEE Ultrasonics Symposium, pp. 547-555). In this article, these equations are employed to study the free as well as the forced vibrations of doubly rotated quartz plates. Solutions of straight-crested vibrational modes varying in the x1 and x3 directions of SC-cut quartz plates of infinite extent are obtained and from which dispersion curves are computed. Comparison of those dispersion curves with those from the three-dimensional equations shows that the agreement is very close without any corrections. Resonance frequencies for free vibrations and capacitance ratios for piezoelectrically forced vibrations are computed and examined for various length-to-thickness or width-to-thickness ratios of rectangular SC-cut quartz plates. The capacitance ratio as a function of forcing frequency is computed for a rectangular AT-cut quartz and compared with the experimental data of Seikimoto, Watanabe, and Nakazawa (H. Sekimoto, Y. Watanabe, and M. Nakazawa, Proceedings of the 1992 IEEE Frequency Control Symposium, pp. 532-536) and is in close agreement.
Comparison of eigensolvers for symmetric band matrices.
Moldaschl, Michael; Gansterer, Wilfried N
2014-09-15
We compare different algorithms for computing eigenvalues and eigenvectors of a symmetric band matrix across a wide range of synthetic test problems. Of particular interest is a comparison of state-of-the-art tridiagonalization-based methods as implemented in Lapack or Plasma on the one hand, and the block divide-and-conquer (BD&C) algorithm as well as the block twisted factorization (BTF) method on the other hand. The BD&C algorithm does not require tridiagonalization of the original band matrix at all, and the current version of the BTF method tridiagonalizes the original band matrix only for computing the eigenvalues. Avoiding the tridiagonalization process sidesteps the cost of backtransformation of the eigenvectors. Beyond that, we discovered another disadvantage of the backtransformation process for band matrices: In several scenarios, a lot of gradual underflow is observed in the (optional) accumulation of the transformation matrix and in the (obligatory) backtransformation step. According to the IEEE 754 standard for floating-point arithmetic, this implies many operations with subnormal (denormalized) numbers, which causes severe slowdowns compared to the other algorithms without backtransformation of the eigenvectors. We illustrate that in these cases the performance of existing methods from Lapack and Plasma reaches a competitive level only if subnormal numbers are disabled (and thus the IEEE standard is violated). Overall, our performance studies illustrate that if the problem size is large enough relative to the bandwidth, BD&C tends to achieve the highest performance of all methods if the spectrum to be computed is clustered. For test problems with well separated eigenvalues, the BTF method tends to become the fastest algorithm with growing problem size.
ERIC Educational Resources Information Center
Prosise, Jeff
This document presents the principles behind modern computer graphics without straying into the arcane languages of mathematics and computer science. Illustrations accompany the clear, step-by-step explanations that describe how computers draw pictures. The 22 chapters of the book are organized into 5 sections. "Part 1: Computer Graphics in…
AstroGrid-D: Grid technology for astronomical science
NASA Astrophysics Data System (ADS)
Enke, Harry; Steinmetz, Matthias; Adorf, Hans-Martin; Beck-Ratzka, Alexander; Breitling, Frank; Brüsemeister, Thomas; Carlson, Arthur; Ensslin, Torsten; Högqvist, Mikael; Nickelt, Iliya; Radke, Thomas; Reinefeld, Alexander; Reiser, Angelika; Scholl, Tobias; Spurzem, Rainer; Steinacker, Jürgen; Voges, Wolfgang; Wambsganß, Joachim; White, Steve
2011-02-01
We present status and results of AstroGrid-D, a joint effort of astrophysicists and computer scientists to employ grid technology for scientific applications. AstroGrid-D provides access to a network of distributed machines with a set of commands as well as software interfaces. It allows simple use of computer and storage facilities and to schedule or monitor compute tasks and data management. It is based on the Globus Toolkit middleware (GT4). Chapter 1 describes the context which led to the demand for advanced software solutions in Astrophysics, and we state the goals of the project. We then present characteristic astrophysical applications that have been implemented on AstroGrid-D in chapter 2. We describe simulations of different complexity, compute-intensive calculations running on multiple sites (Section 2.1), and advanced applications for specific scientific purposes (Section 2.2), such as a connection to robotic telescopes (Section 2.2.3). We can show from these examples how grid execution improves e.g. the scientific workflow. Chapter 3 explains the software tools and services that we adapted or newly developed. Section 3.1 is focused on the administrative aspects of the infrastructure, to manage users and monitor activity. Section 3.2 characterises the central components of our architecture: The AstroGrid-D information service to collect and store metadata, a file management system, the data management system, and a job manager for automatic submission of compute tasks. We summarise the successfully established infrastructure in chapter 4, concluding with our future plans to establish AstroGrid-D as a platform of modern e-Astronomy.
Mathematical challenges from theoretical/computational chemistry
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1995-12-31
The committee believes that this report has relevance and potentially valuable suggestions for a wide range of readers. Target audiences include: graduate departments in the mathematical and chemical sciences; federal and private agencies that fund research in the mathematical and chemical sciences; selected industrial and government research and development laboratories; developers of software and hardware for computational chemistry; and selected individual researchers. Chapter 2 of this report covers some history of computational chemistry for the nonspecialist, while Chapter 3 illustrates the fruits of some past successful cross-fertilization between mathematical scientists and computational/theoretical chemists. In Chapter 4 the committee has assembledmore » a representative, but not exhaustive, survey of research opportunities. Most of these are descriptions of important open problems in computational/theoretical chemistry that could gain much from the efforts of innovative mathematical scientists, written so as to be accessible introductions to the nonspecialist. Chapter 5 is an assessment, necessarily subjective, of cultural differences that must be overcome if collaborative work is to be encouraged between the mathematical and the chemical communities. Finally, the report ends with a brief list of conclusions and recommendations that, if followed, could promote accelerated progress at this interface. Recognizing that bothersome language issues can inhibit prospects for collaborative research at the interface between distinctive disciplines, the committee has attempted throughout to maintain an accessible style, in part by using illustrative boxes, and has included at the end of the report a glossary of technical terms that may be familiar to only a subset of the target audiences listed above.« less
: Institute of Electrical and Electronics Engineers (IEEE). NREL/CP-5500-54165. doi:10.1109/EnergyTech 2011. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE). NREL/CP-5500-53565. doi Electrical and Electronics Engineers (IEEE). NREL/CP-550-47061. doi:10.1109/pes.2009.5275358 Mooney, D., M
2011-02-14
licensed use limited to: UNIV OF HAWAII LIBRARY. Downloaded on June 18,2010 at 22:24:49 UTC from IEEE Xplore . Restrictions apply. KIM et al.: MODIFIED...limited to: UNIV OF HAWAII LIBRARY. Downloaded on June 18,2010 at 22:24:49 UTC from IEEE Xplore . Restrictions apply. 404 IEEE TRANSACTIONS ON...licensed use limited to: UNIV OF HAWAII LIBRARY. Downloaded on June 18,2010 at 22:24:49 UTC from IEEE Xplore . Restrictions apply. KIM et al
2014-06-01
IEEE Xplore , 978-1-4799-3540-6/14, pages 553-554. © 2014 IEEE . The U.S. Government is joint author of the work and has the right to use, modify...unlimited. See additional restrictions described on inside pages STINFO COPY © 2014 IEEE AIR FORCE RESEARCH LABORATORY MATERIALS AND...AR Brown-US, 3M101200250). The length of the dipole arms are changed via 553978-1-4799-3540-6/14/$31.00 ©2014 IEEE AP-S 2014 1 Distribution A
Nielsen, Henrik
2017-01-01
Many computational methods are available for predicting protein sorting in bacteria. When comparing them, it is important to know that they can be grouped into three fundamentally different approaches: signal-based, global-property-based and homology-based prediction. In this chapter, the strengths and drawbacks of each of these approaches is described through many examples of methods that predict secretion, integration into membranes, or subcellular locations in general. The aim of this chapter is to provide a user-level introduction to the field with a minimum of computational theory.
Cloud Security: Issues and Research Directions
2014-11-18
4. Cloud Computing Security: What Changes with Software - Defined Networking ? Maur´ıcio Tsugawa, Andr´ea Matsunaga, and Jos´e A. B. Fortes 5...machine’s memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software - Defined ... Networking ( SDN ) is deployed within and across clouds. Chapters 5-9 are focused on the protection of data stored in the cloud. In Chapter 5, Wang et
Computer Innovations in Education.
ERIC Educational Resources Information Center
Molnar, Andrew R.
Computers in education are put in context by a brief review of current social and technological trends, a short history of the development of computers and the vast expansion of their use, and a brief description of computers and their use. Further chapters describe instructional applications, administrative uses, uses of computers for libraries…
Children and Computers Abstracts.
ERIC Educational Resources Information Center
Rothenberg, Dianne, Ed.
1992-01-01
Abstracts of reports of eight research studies on computer uses in children's education are presented. Topics covered include (1) LOGO computer language; (2) computer graphics for art instruction; (3) animation; (4) problem solving; (5) children's use of symbols; (6) an evaluation of a Chapter 1 program involving children's computer use; (7) peer…
5 CFR 841.707 - COLA's affecting computation of survivor supplements.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 5 Administrative Personnel 2 2012-01-01 2012-01-01 false COLA's affecting computation of survivor... Adjustments § 841.707 COLA's affecting computation of survivor supplements. For purposes of computing the assumed CSRS annuity under § 843.308 of this chapter, the assumed CSRS annuity includes COLA's computed...
5 CFR 841.707 - COLA's affecting computation of survivor supplements.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 5 Administrative Personnel 2 2013-01-01 2013-01-01 false COLA's affecting computation of survivor... Adjustments § 841.707 COLA's affecting computation of survivor supplements. For purposes of computing the assumed CSRS annuity under § 843.308 of this chapter, the assumed CSRS annuity includes COLA's computed...
5 CFR 841.707 - COLA's affecting computation of survivor supplements.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 5 Administrative Personnel 2 2011-01-01 2011-01-01 false COLA's affecting computation of survivor... Adjustments § 841.707 COLA's affecting computation of survivor supplements. For purposes of computing the assumed CSRS annuity under § 843.308 of this chapter, the assumed CSRS annuity includes COLA's computed...
5 CFR 841.707 - COLA's affecting computation of survivor supplements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false COLA's affecting computation of survivor... Adjustments § 841.707 COLA's affecting computation of survivor supplements. For purposes of computing the assumed CSRS annuity under § 843.308 of this chapter, the assumed CSRS annuity includes COLA's computed...
5 CFR 841.707 - COLA's affecting computation of survivor supplements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 5 Administrative Personnel 2 2014-01-01 2014-01-01 false COLA's affecting computation of survivor... Adjustments § 841.707 COLA's affecting computation of survivor supplements. For purposes of computing the assumed CSRS annuity under § 843.308 of this chapter, the assumed CSRS annuity includes COLA's computed...
Recent Advances and Issues in Computers. Oryx Frontiers of Science Series.
ERIC Educational Resources Information Center
Gay, Martin K.
Discussing recent issues in computer science, this book contains 11 chapters covering: (1) developments that have the potential for changing the way computers operate, including microprocessors, mass storage systems, and computing environments; (2) the national computational grid for high-bandwidth, high-speed collaboration among scientists, and…
Progressive Fracture of Composite Structures
NASA Technical Reports Server (NTRS)
Minnetyan, Levon
2001-01-01
This report includes the results of a research in which the COmposite Durability STRuctural ANalysis (CODSTRAN) computational simulation capabilities were augmented and applied to various structures for demonstration of the new features and verification. The first chapter of this report provides an introduction to the computational simulation or virtual laboratory approach for the assessment of damage and fracture progression characteristics in composite structures. The second chapter outlines the details of the overall methodology used, including the failure criteria and the incremental/iterative loading procedure with the definitions of damage, fracture, and equilibrium states. The subsequent chapters each contain an augmented feature of the code and/or demonstration examples. All but one of the presented examples contains laminated composite structures with various fiber/matrix constituents. For each structure simulated, damage initiation and progression mechanisms are identified and the structural damage tolerance is quantified at various degradation stages. Many chapters contain the simulation of defective and defect free structures to evaluate the effects of existing defects on structural durability.
Radiation Protection Studies of International Space Station Extravehicular Activity Space Suits
NASA Technical Reports Server (NTRS)
Cucinotta, Francis A. (Editor); Shavers, Mark R. (Editor); Saganti, Premkumar B. (Editor); Miller, Jack (Editor)
2003-01-01
This publication describes recent investigations that evaluate radiation shielding characteristics of NASA's and the Russian Space Agency's space suits. The introduction describes the suits and presents goals of several experiments performed with them. The first chapter provides background information about the dynamic radiation environment experienced at ISS and summarized radiation health and protection requirements for activities in low Earth orbit. Supporting studies report the development and application of a computer model of the EMU space suit and the difficulty of shielding EVA crewmembers from high-energy reentrant electrons, a previously unevaluated component of the space radiation environment. Chapters 2 through 6 describe experiments that evaluate the space suits' radiation shielding characteristics. Chapter 7 describes a study of the potential radiological health impact on EVA crewmembers of two virtually unexamined environmental sources of high-energy electrons-reentrant trapped electrons and atmospheric albedo or "splash" electrons. The radiological consequences of those sources have not been evaluated previously and, under closer scrutiny. A detailed computational model of the shielding distribution provided by components of the NASA astronauts' EMU is being developed for exposure evaluation studies. The model is introduced in Chapters 8 and 9 and used in Chapter 10 to investigate how trapped particle anisotropy impacts female organ doses during EVA. Chapter 11 presents a review of issues related to estimating skin cancer risk form space radiation. The final chapter contains conclusions about the protective qualities of the suit brought to light form these studies, as well as recommendations for future operational radiation protection.
Contract W911NF-09-1-0488 (Rush University Medical Center)
2012-11-23
algorithm. In Proceedings of the 1993 ACM/IEEE Conference on Supercomputing, pages 12�21, New York, 1993. ACM. [8] R. Yokota, T. Hamada, J. P. Bardhan , M...computing gravity anom- alies. Geophysical Journal International, 2011. to appear. [13] R. Yokota, T. Hamada, J. P. Bardhan , M. G. Knepley, and L. A. Barba...extension of the petfmm a fast multipole library. Presentation at WCCM 2010, Sydney Australia, 2010. [15] J. P. Bardhan . Interpreting the Coulomb
Performance Evaluation and Control of Distributed Computer Communication Networks.
1984-09-01
including: L. Clare, L.A. De Moraes, J. Baker, M. Zuckerman, S. Katz, P. Rodrigues, R. Pazos , S. Resheff. Other participants are the following visiting...investigations have been reported in reference (1) and (2) below. References (1) M. Gerla, R. Pazos -Rangel "Bandwidth Allocation and Routing in ISDN’s," IEEE...and efficient methods for its solution are presented. (2) R.A. Pazos -Rangel "Evaluation and Design of Integrated Packet Switching and Circuit Switching
2002-01-01
1998. [36] T. Sakai, Riemannian Geometry, AMS Translations of Mathematical Monographs, vol 149. [37] N. Sochen, R . Kimmel, and R , Malladi , “A general...matical Physics 107, pp. 649-705, 1986. [5] V. Caselles, R . Kimmel, G. Sapiro, and C. Sbert, “Minimal surfaces based object segmentation,” IEEE- PAMI...June 2000 [9] R . Cohen, R . M. Hardt, D. Kinderlehrer, S. Y. Lin, and M. Luskin, “Minimum energy configurations for liquid crystals: Computational
Design and Implementation of the MARG Human Body Motion Tracking System
2004-10-01
7803-8463-6/041$20.00 ©:!004 IEEE 625 OPTOTRAK from Northern Digital Inc. is a typical example of a marker-based system [I 0]. Another is the...technique called tunneling is :used to overcome this problem. Tunneling is a software solution that runs on the end point routers/computers and allows...multicast packets to traverse the network by putting them into unicast packets. MUTUP overcomes the tunneling problem using shared memory in the
Pseudorandom Number Generators for Mobile Devices: An Examination and Attempt to Improve Randomness
2013-09-01
Notes in Computer Science (LNCS), Vol. 4341), (Hanoi, Vietnam: Springer, 2006), 260–270. 36 Simon R. Blackburn , “The Linear Complexity of the Self... Blackburn , Simon R. ‘The Linear Complexity of the Self-Shrinking Generator.” IEEE Trans. Inf. Theory, 45 (September 1999). Blum, Leonore, Manuel...afloat when the waters have been rough! xv THIS PAGE INTENTIONALLY LEFT BLANK xvi I. INTRODUCTION When the average man thinks about war and
Access Point Selection for Multi-Rate IEEE 802.11 Wireless LANs
2014-05-16
Mobile Systems, Applications and Services, 2006. [2] S . Vasudevan, K. Papagiannaki, C . Diot, J. Kurose, and D. Towsley, “Facilitating Access Point...LANs 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR( S ) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7...PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) University of California at Berkeley,Electrical Engineering and Computer Sciences,Berkeley,CA,94720 8
Galileo battery testing and the impact of test automation
NASA Technical Reports Server (NTRS)
Pertuch, W. T.; Dils, C. T.
1985-01-01
Test complexity, changes of test specifications, and the demand for tight control of tests led to the development of automated testing used for Galileo and other projects. The use of standardized interfacing, i.e., IEEE-488, with desktop computers and test instruments, resulted in greater reliability, repeatability, and accuracy of both control and data reporting. Increased flexibility of test programming has reduced costs by permitting a wide spectrum of test requirements at one station rather than many stations.
Statistical and Variational Methods for Problems in Visual Control
2009-03-02
plane curves to round points," /. Differential Geometry 26 (1987), pp. 285-314. 12 [7] S. Haker , G. Sapiro, and A. Tannenbaum, "Knowledge-based...segmentation of SAR data with learned priors," IEEE Trans. Image Processing, vol. 9, pp. 298-302, 2000. [8] S. Haker , L. Zhu, S. Angenent, and A...Tannenbaum, "Optimal mass transport for registration and warping" Int. Journal Computer Vision, vol. 60, pp. 225-240, 2004. [9] S. Haker , G. Sapiro, A
Chemistry and Physics of Analyte Identification in Integrated Nanosensors
2009-02-05
points," / Differential Geometry 26 (1987), pp. 285-314. 12 [7] S. Haker , G. Sapiro, and A. Tannenbaum, "Knowledge-based segmentation of SAR data with...learned priors," IEEE Trans. Image Processing, vol. 9, pp. 298-302, 2000. [8] S. Haker , L. Zhu, S. Angenent, and A. Tannenbaum, "Optimal mass...transport for registration and warping" Int. Journal Computer Vision, vol. 60, pp. 225-240, 2004. [9] S. Haker , G. Sapiro, A. Tannenbaum, and D. Washburn
A Decision Support System for Control and Automation of Dynamical Processes
1990-03-01
would like to thank my Advisor, Asok Ray , for giving me the opportunity to become involved in the Artificial Intelligence field, and for his guidance in...Applications, IEEE Computer Society, December 1984, pp 460-464. 76 [Ray87) Ray , A., Joshi, S. M., Whitney, C. K., Jow, H. N., "Information...Thomp88] Thompson, D. R., Ray , A., Kumara, S., "A Hierarchically Structured Knowledge-Based System for Welding Automation and Control", Journal of
NASA Astrophysics Data System (ADS)
Papers are presented on such topics as the wireless data network in PCS, advances in digital mobile networks, ATM switching experiments, broadband applications, network planning, and advances in SONET/SDH implementations. Consideration is also given to gigabit computer networks, techniques for modeling large high-speed networks, coding and modulation, the next-generation lightwave system, signaling systems for broadband ISDN, satellite technologies, and advances in standardization of low-rate signal processing.
Wickham, Hadley; Hofmann, Heike
2011-12-01
We propose a new framework for visualising tables of counts, proportions and probabilities. We call our framework product plots, alluding to the computation of area as a product of height and width, and the statistical concept of generating a joint distribution from the product of conditional and marginal distributions. The framework, with extensions, is sufficient to encompass over 20 visualisations previously described in fields of statistical graphics and infovis, including bar charts, mosaic plots, treemaps, equal area plots and fluctuation diagrams. © 2011 IEEE
Joint Services Electronics Program.
1986-09-30
IEEE Computer Society Conference on Trends and Aplications , Gaithersburg, MD, 57-62, May 1983. R.W. Miksad, D.W. Choi and E.J. Powers, "Application of...Estimators for Weakl Nonlinear Esti’mation Problems, M.S. Thesis , Dept. of Electrica Engineering, University of Texas at Austin, May 1982. 7 %- (Page...Chen, J. Vac. Sci. Technol. 17,911 (1980). 6. N.I. Cho, Masters Thesis , unpublished. 7. EI-Saied M. Aly and J.P. Stark, J. Appl. Phys. 53(4), 3063
2017-04-05
Information Technology at Nationwide v Abstract vi 1 Business Imperatives 1 1.1 Deliver the Right Work 1 1.2 Deliver the Right Way 1 1.3 Deliver with...an Engaged Workforce 1 2 Challenges and Opportunities 2 2.1 Responding to Demand 2 2.2 Standards and Capabilities 2 2.3 Information Technology ...release and unlimited distribution. Information Technology at Nationwide Nationwide Information Technology (IT) is comprised of seven offices
United States Air Force Summer Research Program -- 1993. Volume 1. Program Management Report
1993-12-01
IEEE Spectrum and Physics Today. High school applicants can participate only in laboratories located no more than 20 miles from their residence. Tailored...faculty and $37/day for graduate students whose homes were more than 50 miles from the laboratory. Transportation to the laboratory at the beginning of...TX 78212- 7200 Branting, Luther Field: Dept of Computer Science Assistant Professor, PhD Laboratory: AL/HR PC Box 3682 University of Wyoming Vol-Page
libvaxdata: VAX data format conversion routines
Baker, Lawrence M.
2005-01-01
libvaxdata provides a collection of routines for converting numeric data-integer and floating-point-to and from the formats used on a Digital Equipment Corporation1 (DEC) VAX 32-bit minicomputer (Brunner, 1991). Since the VAX numeric data formats are inherited from those used on a DEC PDP-11 16-bit minicomputer, these routines can be used to convert PDP-11 data as well. VAX numeric data formats are also the default data formats used on DEC Alpha 64-bit minicomputers running OpenVMS The libvaxdata routines are callable from Fortran or C. They require that the caller use two's-complement format for integer data and IEEE 754 format (ANSI/IEEE, 1985) for floating-point data. They also require that the 'natural' size of a C int type (integer) is 32 bits. That is the case for most modern 32-bit and 64-bit computer systems. Nevertheless, you may wish to consult the Fortran or C compiler documentation on your system to be sure. Some Fortran compilers support conversion of VAX numeric data on-the-fly when reading or writing unformatted files, either as a compiler option or a run-time I/O option. This feature may be easier to use than the libvaxdata routines. Consult the Fortran compiler documentation on your system to determine if this alternative is available to you. 1Later Compaq Computer Corporation, now Hewlett-Packard Company
Trends in Device SEE Susceptibility from Heavy Ions
NASA Technical Reports Server (NTRS)
Nichols, D. K.; Coss, J. R.; McCarty, K. P.; Schwartz, H. R.; Swift, G. M.; Watson, R. K.; Koga, R.; Crain, W. R.; Crawford, K. B.; Hansel, S. J.
1995-01-01
The sixth set of heavy ion single event effects (SEE) test data have been collected since the last IEEE publications in December issues of IEEE - Nuclear Science Transactions for 1985, 1987, 1989, 1991, and the IEEE Workshop Record, 1993. Trends in SEE susceptibility (including soft errors and latchup) for state-of- are evaluated.
Waste receiving and processing plant control system; system design description
DOE Office of Scientific and Technical Information (OSTI.GOV)
LANE, M.P.
1999-02-24
The Plant Control System (PCS) is a heterogeneous computer system composed of numerous sub-systems. The PCS represents every major computer system that is used to support operation of the Waste Receiving and Processing (WRAP) facility. This document, the System Design Description (PCS SDD), includes several chapters and appendices. Each chapter is devoted to a separate PCS sub-system. Typically, each chapter includes an overview description of the system, a list of associated documents related to operation of that system, and a detailed description of relevant system features. Each appendice provides configuration information for selected PCS sub-systems. The appendices are designed asmore » separate sections to assist in maintaining this document due to frequent changes in system configurations. This document is intended to serve as the primary reference for configuration of PCS computer systems. The use of this document is further described in the WRAP System Configuration Management Plan, WMH-350, Section 4.1.« less
Titan through Time: Evolution of Titan's Atmosphere and its Hydrocarbon Cycle on the Surface
NASA Astrophysics Data System (ADS)
Gilliam, Ashley E.
The Introduction and Appendix i-A outline briefly the history of Titan exploration since its discovery by Christiaan Huygens in 1675 through the recent International Mission of Cassini-Huygens.. Chapter 1: This chapter discusses two possible pathways of loss of the two main gases from Titan's post-accretional atmosphere, methane (CH 4) and ammonia (NH3), by the mechanisms of thermal escape and emission from the interior coupled with thermal escape. Chapter 2: In this chapter, a simple photolysis model is created, where the second most abundant component of the present-day Titan atmosphere, methane (CH4), can either escape the atmosphere or undergo photolytic conversion to ethane (C2H6). Chapter 3: This chapter examines different fluvial features on Titan, identified by the Cassini spacecraft, and evaluates the possibilities of channel formation by two mechanisms: dissolution of ice by a concentrated solution of ammonium sulfate, and by mechanical erosion by flow of liquid ammonia and liquid ethane. Chapter 4: This chapter presents: (1) new explicit mathematical solutions of mixed 1st and 2nd order chemical reactions, represented by ordinary differential first-degree and Riccati equations; (2) the computed present-day concentrations of the three gases in Titan's scale atmosphere, treated as at near-steady state; and (3) an analysis of the reported and computed atmospheric concentrations of CH4, CH 3, and C2H6 on Titan, based on the reaction rate parameters of the species, the rate parameters taken as constants representative of their mean values. Chapter 5: This chapter examines the possible reactions of methane formation in terms of the thermodynamic relationships of the reactions that include pure carbon as graphite, the gases H2, CO2, H2 O, and serpentinization and magnetite formation from olivine fayalite. (Abstract shortened by ProQuest.).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yamazaki, Ichitaro; Wu, Kesheng; Simon, Horst
2008-10-27
The original software package TRLan, [TRLan User Guide], page 24, implements the thick restart Lanczos method, [Wu and Simon 2001], page 24, for computing eigenvalues {lambda} and their corresponding eigenvectors v of a symmetric matrix A: Av = {lambda}v. Its effectiveness in computing the exterior eigenvalues of a large matrix has been demonstrated, [LBNL-42982], page 24. However, its performance strongly depends on the user-specified dimension of a projection subspace. If the dimension is too small, TRLan suffers from slow convergence. If it is too large, the computational and memory costs become expensive. Therefore, to balance the solution convergence and costs,more » users must select an appropriate subspace dimension for each eigenvalue problem at hand. To free users from this difficult task, nu-TRLan, [LNBL-1059E], page 23, adjusts the subspace dimension at every restart such that optimal performance in solving the eigenvalue problem is automatically obtained. This document provides a user guide to the nu-TRLan software package. The original TRLan software package was implemented in Fortran 90 to solve symmetric eigenvalue problems using static projection subspace dimensions. nu-TRLan was developed in C and extended to solve Hermitian eigenvalue problems. It can be invoked using either a static or an adaptive subspace dimension. In order to simplify its use for TRLan users, nu-TRLan has interfaces and features similar to those of TRLan: (1) Solver parameters are stored in a single data structure called trl-info, Chapter 4 [trl-info structure], page 7. (2) Most of the numerical computations are performed by BLAS, [BLAS], page 23, and LAPACK, [LAPACK], page 23, subroutines, which allow nu-TRLan to achieve optimized performance across a wide range of platforms. (3) To solve eigenvalue problems on distributed memory systems, the message passing interface (MPI), [MPI forum], page 23, is used. The rest of this document is organized as follows. In Chapter 2 [Installation], page 2, we provide an installation guide of the nu-TRLan software package. In Chapter 3 [Example], page 3, we present a simple nu-TRLan example program. In Chapter 4 [trl-info structure], page 7, and Chapter 5 [trlan subroutine], page 14, we describe the solver parameters and interfaces in detail. In Chapter 6 [Solver parameters], page 21, we discuss the selection of the user-specified parameters. In Chapter 7 [Contact information], page 22, we give the acknowledgements and contact information of the authors. In Chapter 8 [References], page 23, we list reference to related works.« less
An Overview of High Performance Computing and Challenges for the Future
Google Tech Talks
2017-12-09
In this talk we examine how high performance computing has changed over the last 10-year and look toward the future in terms of trends. These changes have had and will continue to have a major impact on our software. A new generation of software libraries and lgorithms are needed for the effective and reliable use of (wide area) dynamic, distributed and parallel environments. Some of the software and algorithm challenges have already been encountered, such as management of communication and memory hierarchies through a combination of compile--time and run--time techniques, but the increased scale of computation, depth of memory hierarchies, range of latencies, and increased run--time environment variability will make these problems much harder. We will focus on the redesign of software to fit multicore architectures. Speaker: Jack Dongarra University of Tennessee Oak Ridge National Laboratory University of Manchester Jack Dongarra received a Bachelor of Science in Mathematics from Chicago State University in 1972 and a Master of Science in Computer Science from the Illinois Institute of Technology in 1973. He received his Ph.D. in Applied Mathematics from the University of New Mexico in 1980. He worked at the Argonne National Laboratory until 1989, becoming a senior scientist. He now holds an appointment as University Distinguished Professor of Computer Science in the Electrical Engineering and Computer Science Department at the University of Tennessee, has the position of a Distinguished Research Staff member in the Computer Science and Mathematics Division at Oak Ridge National Laboratory (ORNL), Turing Fellow in the Computer Science and Mathematics Schools at the University of Manchester, and an Adjunct Professor in the Computer Science Department at Rice University. He specializes in numerical algorithms in linear algebra, parallel computing, the use of advanced-computer architectures, programming methodology, and tools for parallel computers. His research includes the development, testing and documentation of high quality mathematical software. He has contributed to the design and implementation of the following open source software packages and systems: EISPACK, LINPACK, the BLAS, LAPACK, ScaLAPACK, Netlib, PVM, MPI, NetSolve, Top500, ATLAS, and PAPI. He has published approximately 200 articles, papers, reports and technical memoranda and he is coauthor of several books. He was awarded the IEEE Sid Fernbach Award in 2004 for his contributions in the application of high performance computers using innovative approaches. He is a Fellow of the AAAS, ACM, and the IEEE and a member of the National Academy of Engineering.
An Overview of High Performance Computing and Challenges for the Future
DOE Office of Scientific and Technical Information (OSTI.GOV)
Google Tech Talks
In this talk we examine how high performance computing has changed over the last 10-year and look toward the future in terms of trends. These changes have had and will continue to have a major impact on our software. A new generation of software libraries and lgorithms are needed for the effective and reliable use of (wide area) dynamic, distributed and parallel environments. Some of the software and algorithm challenges have already been encountered, such as management of communication and memory hierarchies through a combination of compile--time and run--time techniques, but the increased scale of computation, depth of memory hierarchies,more » range of latencies, and increased run--time environment variability will make these problems much harder. We will focus on the redesign of software to fit multicore architectures. Speaker: Jack Dongarra University of Tennessee Oak Ridge National Laboratory University of Manchester Jack Dongarra received a Bachelor of Science in Mathematics from Chicago State University in 1972 and a Master of Science in Computer Science from the Illinois Institute of Technology in 1973. He received his Ph.D. in Applied Mathematics from the University of New Mexico in 1980. He worked at the Argonne National Laboratory until 1989, becoming a senior scientist. He now holds an appointment as University Distinguished Professor of Computer Science in the Electrical Engineering and Computer Science Department at the University of Tennessee, has the position of a Distinguished Research Staff member in the Computer Science and Mathematics Division at Oak Ridge National Laboratory (ORNL), Turing Fellow in the Computer Science and Mathematics Schools at the University of Manchester, and an Adjunct Professor in the Computer Science Department at Rice University. He specializes in numerical algorithms in linear algebra, parallel computing, the use of advanced-computer architectures, programming methodology, and tools for parallel computers. His research includes the development, testing and documentation of high quality mathematical software. He has contributed to the design and implementation of the following open source software packages and systems: EISPACK, LINPACK, the BLAS, LAPACK, ScaLAPACK, Netlib, PVM, MPI, NetSolve, Top500, ATLAS, and PAPI. He has published approximately 200 articles, papers, reports and technical memoranda and he is coauthor of several books. He was awarded the IEEE Sid Fernbach Award in 2004 for his contributions in the application of high performance computers using innovative approaches. He is a Fellow of the AAAS, ACM, and the IEEE and a member of the National Academy of Engineering.« less
Planning Guide for Instructional Computing.
ERIC Educational Resources Information Center
League for Innovation in the Community Coll., Laguna Hills, CA.
Designed to assist academic administrators at community colleges in developing strategies for the application of computers to teaching and learning, this guide provides background information and recommendations for the design and implementation of an instructional computing plan. Chapter 1 examines computers as a topic of instruction, as a medium…
NASA Astrophysics Data System (ADS)
Mishchenko, Michael I.
2017-01-01
The second - revised and enlarged - edition of this popular monograph is co-authored by Michael Kahnert and is published as Volume 145 of the Springer Series in Optical Sciences. As in the first edition, the main emphasis is on the mathematics of electromagnetic scattering and on numerically exact computer solutions of the frequency-domain macroscopic Maxwell equations for particles with complex shapes. The book is largely centered on Green-function solution of relevant boundary value problems and the T-matrix methodology, although other techniques (the method of lines, integral equation methods, and Lippmann-Schwinger equations) are also covered. The first four chapters serve as a thorough overview of key theoretical aspects of electromagnetic scattering intelligible to readers with undergraduate training in mathematics. A separate chapter provides an instructive analysis of the Rayleigh hypothesis which is still viewed by many as a highly controversial aspect of electromagnetic scattering by nonspherical objects. Another dedicated chapter introduces basic quantities serving as optical observables in practical applications. A welcome extension of the first edition is the new chapter on group theoretical aspects of electromagnetic scattering by particles with discrete symmetries. An essential part of the book is the penultimate chapter describing in detail popular public-domain computer programs mieschka and Tsym which can be applied to a wide range of particle shapes. The final chapter provides a general overview of available literature on electromagnetic scattering by particles and gives useful reading advice.
10 CFR 431.444 - Test procedures for the measurement of energy efficiency.
Code of Federal Regulations, 2012 CFR
2012-01-01
... the following test methods: (1) Single-phase small electric motors: either IEEE Std 114, (incorporated...) Polyphase small electric motors less than or equal to 1 horsepower (0.746 kW): IEEE Std 112 (incorporated by... (0.746 kW): IEEE Std 112 (incorporated by reference, see § 431.443), Test Method B. ...
Study of Electromagnetic Wave Absorption Properties of Carbon Nanotubes-Based Composites
2012-11-29
Publications: [1]. G. L. Zhao, Z. Ye, Z. Li, J. A. Roberts, "New carbon nanotube-epoxy composite for dampening microwave cavity resonance", IEEE Xplore ...Nanotechnology ( IEEE - NANO), 2012 12th IEEE Conference on 20-23 Aug. 2012. [2]. Z. Li, G. L. Zhao, P. Zhang, S. Guo, J. Tang, " Thermoelectric
Computer Languages: A Practical Guide to the Chief Programming Languages.
ERIC Educational Resources Information Center
Sanderson, Peter C.
All the most commonly-used high-level computer languages are discussed in this book. An introductory discussion provides an overview of the basic components of a digital computer, the general planning of a computer programing problem, and the various types of computer languages. Each chapter is self-contained, emphasizes those features of a…
Ubiquitous Computing: The Universal Use of Computers on College Campuses.
ERIC Educational Resources Information Center
Brown, David G., Ed.
This book is a collection of vignettes from 13 universities where everyone on campus has his or her own computer. These 13 institutions have instituted "ubiquitous computing" in very different ways at very different costs. The chapters are: (1) "Introduction: The Ubiquitous Computing Movement" (David G. Brown); (2) "Dartmouth College" (Malcolm…
Lower bound on the time complexity of local adiabatic evolution
NASA Astrophysics Data System (ADS)
Chen, Zhenghao; Koh, Pang Wei; Zhao, Yan
2006-11-01
The adiabatic theorem of quantum physics has been, in recent times, utilized in the design of local search quantum algorithms, and has been proven to be equivalent to standard quantum computation, that is, the use of unitary operators [D. Aharonov in Proceedings of the 45th Annual Symposium on the Foundations of Computer Science, 2004, Rome, Italy (IEEE Computer Society Press, New York, 2004), pp. 42-51]. Hence, the study of the time complexity of adiabatic evolution algorithms gives insight into the computational power of quantum algorithms. In this paper, we present two different approaches of evaluating the time complexity for local adiabatic evolution using time-independent parameters, thus providing effective tests (not requiring the evaluation of the entire time-dependent gap function) for the time complexity of newly developed algorithms. We further illustrate our tests by displaying results from the numerical simulation of some problems, viz. specially modified instances of the Hamming weight problem.
Computer vision-based classification of hand grip variations in neurorehabilitation.
Zariffa, José; Steeves, John D
2011-01-01
The complexity of hand function is such that most existing upper limb rehabilitation robotic devices use only simplified hand interfaces. This is in contrast to the importance of the hand in regaining function after neurological injury. Computer vision technology has been used to identify hand posture in the field of Human Computer Interaction, but this approach has not been translated to the rehabilitation context. We describe a computer vision-based classifier that can be used to discriminate rehabilitation-relevant hand postures, and could be integrated into a virtual reality-based upper limb rehabilitation system. The proposed system was tested on a set of video recordings from able-bodied individuals performing cylindrical grasps, lateral key grips, and tip-to-tip pinches. The overall classification success rate was 91.2%, and was above 98% for 6 out of the 10 subjects. © 2011 IEEE
GUIDE-0: An Experimental Information System.
ERIC Educational Resources Information Center
Murai, Shinnichi
A description is provided of GUIDE-0, an experimental information system. The system serves as a bibliographic aid for students who are taking introductory computer science courses whose material is at least partially implemented via PLATO-IV lessons. Following a brief introduction to the system in Chapter I, the second Chapter describes the…
The Use of Technology in Adult Literacy Programs.
ERIC Educational Resources Information Center
Anderson, Jonathan; And Others
This document describes the use of educational technology (including radio, television, computers, telephones, satellites, and optical laser discs) in adult literacy programs in Australia. Chapter 1 describes the scope of the study that resulted in the document and defines both literacy and educational technology. Chapter 2 contains a generalized…
The Accidental Systems Librarian.
ERIC Educational Resources Information Center
Gordon, Rachel Singer
This book offers advice and information to help librarians manage and interact with computer technology in their institutions. Chapters 1 and 2 provide a background in systems librarianship, outlining the skills that may be needed and defining the specialty. Chapters 3 and 4 show how traditional library skills such as the organization of knowledge…
Technology for Teachers. 6th Edition.
ERIC Educational Resources Information Center
Volker, Roger; Simonson, Michael
This book helps teachers learn how to use and make educational media, covering traditional and new media such as computer laboratories, authentic assessment, theory bases, and hypermedia. Chapter topics progress from simple to complex. Each chapter includes clearly stated behavioral objectives that provide a study guide for students and can serve…
Study of Allocation Guaranteed Time Slot Wireless Body Area Networks Based on IEEE 802.15.4
NASA Astrophysics Data System (ADS)
Yundra, E.; Harsono, G. D.
2018-04-01
This paper aims to determine the size of the Guaranteed Time Slot (GTS) on the super frame structure required for each sensor as well as to know the performance of the GTS resized system compared to the GTS standard on IEEE 802.15.4. This article proposes a scheme to improve IEEE 802.15.4 medium access control, called allocation Guaranteed Time Slot (ALGATIS). ALGATIS is expected to effectively allocate guaranteed time slot to the requested sensors, it adjusts the length of the slot in super frame duration based on the length of the packet data. This article presents a simulation experiment of IEEE 802.15.4, especially for star network, to predict the throughput of networks and average energy consumption. The simulation experiments show that the performance of ALGATIS is better than that of IEEE 802.15.4 standard in term of the throughput of networks and average energy consumption
Development of a computer-assisted learning software package on dental traumatology.
Tolidis, K; Crawford, P; Stephens, C; Papadogiannis, Y; Plakias, C
1998-10-01
The development of computer-assisted learning software packages is a relatively new field of computer application. The progress made in personal computer technology toward more user-friendly operating systems has stimulated the academic community to develop computer-assisted learning for pre- and postgraduate students. The ability of computers to combine audio and visual data in an interactive form provides a powerful educational tool. The purpose of this study was to develop and evaluate a computer-assisted learning package on dental traumatology. This program contains background information on the diagnosis, classification, and management of dental injuries in both the permanent and the deciduous dentitions. It is structured into chapters according to the nature of the injury and whether injury has occurred in the primary or permanent dentition. At the end of each chapter there is a self-assessment questionnaire as well as references to relevant literature. Extensive use of pictures and video provides a comprehensive overview of the subject.
Computers in Spaceflight: the NASA Experience
NASA Technical Reports Server (NTRS)
Tomayko, James E.
1988-01-01
This book examines the computer systems used in actual spaceflight or in close support of it. Each chapter deals with either a specific program, such as Gemini or Apollo onboard computers, or a closely related set of systems, such as launch processing or mission control. A glossary of computer terms is included.
29 CFR 779.415 - Computing employee's compensation for the representative period.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 29 Labor 3 2010-07-01 2010-07-01 false Computing employee's compensation for the representative... Computing employee's compensation for the representative period. (a) In determining for purposes of section.... (See part 778 of this chapter.) (b) In computing the employee's total compensation for the...
Bayesian Methods for the Physical Sciences. Learning from Examples in Astronomy and Physics.
NASA Astrophysics Data System (ADS)
Andreon, Stefano; Weaver, Brian
2015-05-01
Chapter 1: This chapter presents some basic steps for performing a good statistical analysis, all summarized in about one page. Chapter 2: This short chapter introduces the basics of probability theory inan intuitive fashion using simple examples. It also illustrates, again with examples, how to propagate errors and the difference between marginal and profile likelihoods. Chapter 3: This chapter introduces the computational tools and methods that we use for sampling from the posterior distribution. Since all numerical computations, and Bayesian ones are no exception, may end in errors, we also provide a few tips to check that the numerical computation is sampling from the posterior distribution. Chapter 4: Many of the concepts of building, running, and summarizing the resultsof a Bayesian analysis are described with this step-by-step guide using a basic (Gaussian) model. The chapter also introduces examples using Poisson and Binomial likelihoods, and how to combine repeated independent measurements. Chapter 5: All statistical analyses make assumptions, and Bayesian analyses are no exception. This chapter emphasizes that results depend on data and priors (assumptions). We illustrate this concept with examples where the prior plays greatly different roles, from major to negligible. We also provide some advice on how to look for information useful for sculpting the prior. Chapter 6: In this chapter we consider examples for which we want to estimate more than a single parameter. These common problems include estimating location and spread. We also consider examples that require the modeling of two populations (one we are interested in and a nuisance population) or averaging incompatible measurements. We also introduce quite complex examples dealing with upper limits and with a larger-than-expected scatter. Chapter 7: Rarely is a sample randomly selected from the population we wish to study. Often, samples are affected by selection effects, e.g., easier-to-collect events or objects are over-represented in samples and difficult-to-collect are under-represented if not missing altogether. In this chapter we show how to account for non-random data collection to infer the properties of the population from the studied sample. Chapter 8: In this chapter we introduce regression models, i.e., how to fit (regress) one, or more quantities, against each other through a functional relationship and estimate any unknown parameters that dictate this relationship. Questions of interest include: how to deal with samples affected by selection effects? How does a rich data structure influence the fitted parameters? And what about non-linear multiple-predictor fits, upper/lower limits, measurements errors of different amplitudes and an intrinsic variety in the studied populations or an extra source of variability? A number of examples illustrate how to answer these questions and how to predict the value of an unavailable quantity by exploiting the existence of a trend with another, available, quantity. Chapter 9: This chapter provides some advice on how the careful scientist should perform model checking and sensitivity analysis, i.e., how to answer the following questions: is the considered model at odds with the current available data (the fitted data), for example because it is over-simplified compared to some specific complexity pointed out by the data? Furthermore, are the data informative about the quantity being measured or are results sensibly dependent on details of the fitted model? And, finally, what about if assumptions are uncertain? A number of examples illustrate how to answer these questions. Chapter 10: This chapter compares the performance of Bayesian methods against simple, non-Bayesian alternatives, such as maximum likelihood, minimal chi square, ordinary and weighted least square, bivariate correlated errors and intrinsic scatter, and robust estimates of location and scale. Performances are evaluated in terms of quality of the prediction, accuracy of the estimates, and fairness and noisiness of the quoted errors. We also focus on three failures of maximum likelihood methods occurring with small samples, with mixtures, and with regressions with errors in the predictor quantity.
2011-07-13
Anton A. Stoorvogel b, Håvard Fjær Grip a aSchool of Electrical Engineering and Computer Science, Washington State University, Pullman, WA 99164-2752...utwente.nl ( Anton A. Stoorvogel), grip@ieee.org (Håvard Fjær Grip). of a double integrator controlled by a saturating linear static state feedback...References Chitour, Y., 2001. On the Lp stabilization of the double integrator subject to input saturation. ESAIM: Control, Optimization and Calculus
Generalizing the Nonlocal-Means to Super-Resolution Reconstruction
2008-12-12
Image Process., vol. 5, no. 6, pp. 996–1011, Jun. 1996. [7] A. J. Patti, M. I. Sezan, and M. A. Tekalp, “ Superresolution video reconstruction with...computationally efficient image superresolution algorithm,” IEEE Trans. Image Process., vol. 10, no. 4, pp. 573–583, Apr. 2001. [13] M. Elad and Y...pp. 21–36, May 2003. [18] S. Farsiu, D. Robinson, M. Elad, and P. Milanfar, “Robust shift and add approach to superresolution ,” in Proc. SPIE Conf
Mitri, F G
2013-11-01
The concern addressed in the present commentary is to point out the omission of the azimuthal component Fφ of the axial acoustic radiation force provided in M. Azarpeyvand, M. A. Alibakhshi, R. Self, "Effects of multi-scattering on the performance of a single-beam acoustic manipulation device," IEEE Trans. Ultrason. Ferroelectr. Freq. Control, vol. 59, no. 8, pp. 1741-1749, 2012, which may suggest a miscalculation of the radiation force function Ym and its related numerical computations.
1986-05-01
4. Bossi, J. A., Price, G. A., and Winkleblack, S. A., " Flexible Spacecraft Controller Design Using the Integrated Analysis Capability (IAC)," AIAA...P., "Integrated Control System Design Capabilities at the Goddard Space Flight Center," Pro- ceedings of the 2nd IEEE Control Systems Society...Symposium on Computer- Aided Control System Design (CACSD), Santa Barbara, California, March, 13-15 1985. 6. Frisch, H. P. "Integrated Analysis Capability
1982-09-01
MARK A. WEISSBEGU KALLE R. XONTSON Project Msnaqer, IUTRZ Assistant Director Contractor Operations Approved by CRARLES L. FLYNN, 001, us A. M. MESSE...34 BSTJ, 1946. 2-4priis, H.T., "Introduction to Radio and Antennas," IEEE Spectrum, April, 1971 . RADIO WAVE PROPAGATION: A HANDBOOK OF PRACTICAL...Propagation Tests, TR-0177-71.01, Gautney & Jones Communications, Inc., Falls Church, VA, June 1971 . 3 -7 Comparison of Predicted VLF/LF Signal
A Man-Portable Vector Sensor for Identification of Unexploded Ordnance
2011-08-24
Hanover data of Section III-B2, and Dr. L. Pasion , J. Jacobson, and H. Ngo of Sky Research and Dr. L.-P. Song of the University of British Columbia for...of equivalent dipole polarizabilities in situ,” IEEE Trans. Geosci. Remote Sens., vol. 43, no. 7, pp. 1490–1498, Jul. 2005. [27] L. R. Pasion and D. W...P. Song, F. Shubitidze, L. R. Pasion , D. W. Oldenburg, and S. D. Billings, “Computing transient electromagnetic responses of a metallic object using
A Framework for Managing the Assured Information Sharing Lifecycle
2013-11-06
Mohamed Nabeel , Elisa Bertino: Privacy preserving delegated access control in the storage as a service model. IRI 2012: 645-652 • Mohamed Nabeel , Ning...2012: 67-68 • M. Nabeel , J. Zage, S. Kerr, E. Bertino, N. Athula Kulatunga, U. Sudheera Navaratne, M. Duren: Crypto- graphic Key Management for Smart...Military Communications Conf., Nov.2011. • Pramod Jagtap, Anupam Joshi, Tim Finin and Laura Zavala, Preserving Privacy in Context-Aware Sys - tems, Proc. 5th IEEE Int. Conf. on Semantic Computing, Oct. 2011.
2017-04-01
notice for non -US Government use and distribution. External use: This material may be reproduced in its entirety, without modification, and freely...Combinatorial Design Methods 4 2.1 Identification of Significant Improvement Opportunity 4 2.2 Methodology Development 4 2.3 Piloting...11 3 Process Performance Modeling and Analysis 13 3.1 Identification of Significant Improvement Opportunity 13 3.2 Methodology Development 13 3.3
1987-02-25
Modellierung von Kanten bei unregel. Navigation within a building, to be published in IEEE mifliger Rasterung in Bildverarbeitun uand Muster...converted them into equivalent machine cycles in Table 3-1. We took into account of 100 nanosecond 0 - 0, machine cycle time of the MPP. In MPP, NON- VON ...We show the result for the conjugate gradient method in of NON- VON . We assumed that the instructions which carry Table 4-4. The computation of four
Clustering Similarity Digest Bloom Filters in Self-Organizing Maps
2012-12-01
www.sciencedirect.com/science/article/ pii/S1742287610000368 [4] M. Rogers, J . Goldman, R. Mislan, T. Wedge, and S. Debrota, “Computer forensics field triage...1990. [9] T. Kohonen, S. Kaski, K. Lagus, J . Salojarvi, J . Honkela, V. Paatero, and A. Saarela, “Self organization of a massive document collection...the IEEE-INNS-ENNS Interna- tional Joint Conference on, vol. 6, 2000, pp. 15 –19 vol.6. [12] G. Salton , A. Wong, and C. Yang, “A vector space model for
Understanding the Structure of Large, Diverse Collections of Shapes
2013-06-01
lowest weight edges as candidates, and for each candidate, we compute its edge rank, which is a metric proposed by Heath et al. [51] that estimates the... Neil D. McKay. A method for registration of 3-d shapes. IEEE PAMI, 14(2):239–256, February 1992. [10] V. Blanz, K. Scherbaum, and H.-P. Seidel. Fitting...2011. [50] C. Gu and X. Ren. Discriminative mixture-of-templates for viewpoint classification. In ECCV, 2010. [51] K. Heath , N. Gelfand, M
1990-04-01
REFERENCES Carbonell, J.R. (1970). A] in CAI: An artifcial intelligence approach to computer-assisted instruction. IEEE Transactions on Man-Machine Systems...of intelligent systems use outcome data of any sort (Anderson, in press, is an exception). Other designers describe system goals for learners and then...5601 90 o9 3007 NOTICE When Government drawings, specifications, or other data are used for any purpose other than in connection with a definitely
Quantum State Tomography of a Fiber-Based Source of Polarization-Entangled Photon Pairs
2007-12-20
Processing 175−179 (IEEE, Bangalore, 1984). 4. A. K. Ekert, “ Quantum cryptography based on Bell’s theorem ,” Phys. Rev. Lett. 67, 661–663 (1991). 5...NUMBERS Quantum State Tomography of a Fiber- Based Source of MURI Center for Photonic Quantum Information Systems: AROIARDA Program Polarization...Computer Society Press, Los Alamitos, 1996). 7. N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “ Quantum cryptography ,” Rev. Mod. Phys. 74, 145
75 FR 21664 - Underwriters Laboratories Inc.; Application for Expansion of Recognition
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-26
... in Metal-Enclosed Switchgear \\a\\ IEEE C37.20.6 4.76 kV to 38 kV Rated Grounding and Testing Devices Used in Enclosures \\a\\ IEEE C37.23 Metal-Enclosed Bus \\a\\ IEEE C37.41 High-Voltage Fuses, Distribution... Electrical Equipment UL 852 Metallic Sprinkler Pipe for Fire Protection Service UL 962 Household and...
On Roles of Models in Information Systems
NASA Astrophysics Data System (ADS)
Sølvberg, Arne
The increasing penetration of computers into all aspects of human activity makes it desirable that the interplay among software, data and the domains where computers are applied is made more transparent. An approach to this end is to explicitly relate the modeling concepts of the domains, e.g., natural science, technology and business, to the modeling concepts of software and data. This may make it simpler to build comprehensible integrated models of the interactions between computers and non-computers, e.g., interaction among computers, people, physical processes, biological processes, and administrative processes. This chapter contains an analysis of various facets of the modeling environment for information systems engineering. The lack of satisfactory conceptual modeling tools seems to be central to the unsatisfactory state-of-the-art in establishing information systems. The chapter contains a proposal for defining a concept of information that is relevant to information systems engineering.
NASA Astrophysics Data System (ADS)
Furht, Borko
In the introductory chapter we define the concept of cloud computing and cloud services, and we introduce layers and types of cloud computing. We discuss the differences between cloud computing and cloud services. New technologies that enabled cloud computing are presented next. We also discuss cloud computing features, standards, and security issues. We introduce the key cloud computing platforms, their vendors, and their offerings. We discuss cloud computing challenges and the future of cloud computing.
A spatially augmented reality sketching interface for architectural daylighting design.
Sheng, Yu; Yapo, Theodore C; Young, Christopher; Cutler, Barbara
2011-01-01
We present an application of interactive global illumination and spatially augmented reality to architectural daylight modeling that allows designers to explore alternative designs and new technologies for improving the sustainability of their buildings. Images of a model in the real world, captured by a camera above the scene, are processed to construct a virtual 3D model. To achieve interactive rendering rates, we use a hybrid rendering technique, leveraging radiosity to simulate the interreflectance between diffuse patches and shadow volumes to generate per-pixel direct illumination. The rendered images are then projected on the real model by four calibrated projectors to help users study the daylighting illumination. The virtual heliodon is a physical design environment in which multiple designers, a designer and a client, or a teacher and students can gather to experience animated visualizations of the natural illumination within a proposed design by controlling the time of day, season, and climate. Furthermore, participants may interactively redesign the geometry and materials of the space by manipulating physical design elements and see the updated lighting simulation. © 2011 IEEE Published by the IEEE Computer Society
Kiourti, Asimina; Nikita, Konstantina S
2013-04-01
We numerically assess the effects of head properties (anatomy and dielectric parameters) on the performance of a scalp-implantable antenna for telemetry in the Medical Implant Communications Service band (402.0-405.0 MHz). Safety issues and performance (resonance, radiation) are analyzed for an experimentally validated implantable antenna (volume of 203.6 mm(3) ), considering five head models (3- and 5-layer spherical, 6-, 10-, and 13-tissue anatomical) and seven scenarios (variations ± 20% in the reference permittivity and conductivity values). Simulations are carried out at 403.5 MHz using the finite-difference time-domain method. Anatomy of the head model around the implantation site is found to mainly affect antenna performance, whereas overall tissue anatomy and dielectric parameters are less significant. Compared to the reference dielectric parameter scenario within the 3-layer spherical head, maximum variations of -19.9%, +3.7%, -55.1%, and -39.2% are computed in the maximum allowable net input power imposed by the IEEE Std C95.1-1999 and Std C95.1-2005 safety guidelines, return loss, and maximum far-field gain, respectively. Compliance with the recent IEEE Std C95.1-2005 is found to be almost insensitive to head properties, in contrast with IEEE Std C95.1-1999. Taking tissue property uncertainties into account is highlighted as crucial for implantable antenna design and performance assessment. Bioelectromagnetics 34:167-179, 2013. © 2012 Wiley Periodicals, Inc. Copyright © 2012 Wiley Periodicals, Inc.
NASA Astrophysics Data System (ADS)
Cook, Perry R.
This chapter covers algorithms, technologies, computer languages, and systems for computer music. Computer music involves the application of computers and other digital/electronic technologies to music composition, performance, theory, history, and the study of perception. The field combines digital signal processing, computational algorithms, computer languages, hardware and software systems, acoustics, psychoacoustics (low-level perception of sounds from the raw acoustic signal), and music cognition (higher-level perception of musical style, form, emotion, etc.).
Detectors for the Atacama Cosmology Telescope
NASA Astrophysics Data System (ADS)
Marriage, Tobias Andrew
The Atacama Cosmology Telescope (ACT) will make measurements of the brightness temperature anisotropy in the Cosmic Microwave Background (CMB) on degree to arcminute angular scales. The ACT observing site is located 5200 m near the top of Cerro Toco in the Atacama Desert of northern Chile. This thesis presents research on the detectors which capture the image of the CMB formed at ACT's focal plane. In the first chapter, the primary brightness temperature fluctuations in the Cosmic Microwave Background are reviewed. In Chapter 2, a calculation shows how the CMB brightness is translated by ACT to an input power to the detectors. Chapter 3 describes the ACT detectors in detail and presents the response and sensitivity of the detectors to the input power computed in Chapter 2. Chapter 4 describes the detector fabrication at NASA Goddard Space Flight Center. Chapter 5 summarizes experiments which characterize the ACT detector performance.
10 CFR 431.444 - Test procedures for the measurement of energy efficiency.
Code of Federal Regulations, 2013 CFR
2013-01-01
... the following test methods: (1) Single-phase small electric motors: Either IEEE Std 114-2010 or CSA... to 1 horsepower (0.75 kW): Either IEEE Std 112-2004 Test Method A or CSA C747 (incorporated by...): Either IEEE Std 112-2004 Test Method B or CSA C390-10 (incorporated by reference, see § 431.443). [74 FR...
10 CFR 431.444 - Test procedures for the measurement of energy efficiency.
Code of Federal Regulations, 2014 CFR
2014-01-01
... the following test methods: (1) Single-phase small electric motors: Either IEEE Std 114-2010 or CSA... to 1 horsepower (0.75 kW): Either IEEE Std 112-2004 Test Method A or CSA C747 (incorporated by...): Either IEEE Std 112-2004 Test Method B or CSA C390-10 (incorporated by reference, see § 431.443). [74 FR...
2011-09-01
diagnostics system. Aerospace and Electronic Systems Magazine, IEEE , 9(2), 40–45. Current version released August 2002 in IEEE Xplore . doi: 10.1109...Cramming more components onto integrated circuits. Electronics, 114–117. Reprinted January 1998 in Proceedings of the IEEE , 86(1), 82–85. doi: S 0018
ARO PECASE: Information Assurance for Energy-Constrained Wireless Sensor Networks
2011-12-21
Distribution, 18th Annual IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), September 2007. 2. 2010 IEEE...received the following awards: Student Best Paper Award at the IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC...Localization in Wireless Ad Hoc Networks – Many current and future appli- cations of mobile ad hoc networks, including disaster response and event
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rohatgi, U.S.; Cheng, H.S.; Khan, H.J.
This document is the User`s Manual for the Boiling Water Reactor (BWR), and Simplified Boiling Water Reactor (SBWR) systems transient code RAMONA-4B. The code uses a three-dimensional neutron-kinetics model coupled with a multichannel, nonequilibrium, drift-flux, phase-flow model of the thermal hydraulics of the reactor vessel. The code is designed to analyze a wide spectrum of BWR core and system transients. Chapter 1 gives an overview of the code`s capabilities and limitations; Chapter 2 describes the code`s structure, lists major subroutines, and discusses the computer requirements. Chapter 3 is on code, auxillary codes, and instructions for running RAMONA-4B on Sun SPARCmore » and IBM Workstations. Chapter 4 contains component descriptions and detailed card-by-card input instructions. Chapter 5 provides samples of the tabulated output for the steady-state and transient calculations and discusses the plotting procedures for the steady-state and transient calculations. Three appendices contain important user and programmer information: lists of plot variables (Appendix A) listings of input deck for sample problem (Appendix B), and a description of the plotting program PAD (Appendix C). 24 refs., 18 figs., 11 tabs.« less
Chapter 13. Exploring Use of the Reserved Core
DOE Office of Scientific and Technical Information (OSTI.GOV)
Holmen, John; Humphrey, Alan; Berzins, Martin
2015-07-29
In this chapter, we illustrate benefits of thinking in terms of thread management techniques when using a centralized scheduler model along with interoperability of MPI and PThread. This is facilitated through an exploration of thread placement strategies for an algorithm modeling radiative heat transfer with special attention to the 61st core. This algorithm plays a key role within the Uintah Computational Framework (UCF) and current efforts taking place at the University of Utah to model next-generation, large-scale clean coal boilers. In such simulations, this algorithm models the dominant form of heat transfer and consumes a large portion of compute time.more » Exemplified by a real-world example, this chapter presents our early efforts in porting a key portion of a scalability-centric codebase to the Intel Xeon Phi coprocessor. Specifically, this chapter presents results from our experiments profiling the native execution of a reverse Monte-Carlo ray tracing-based radiation model on a single coprocessor. These results demonstrate that our fastest run configurations utilized the 61st core and that performance was not profoundly impacted when explicitly oversubscribing the coprocessor operating system thread. Additionally, this chapter presents a portion of radiation model source code, a MIC-centric UCF cross-compilation example, and less conventional thread management technique for developers utilizing the PThreads threading model.« less
Computer Simulation of a Multiaxis Air-to-Air Tracking Task Using the Optimal Pilot Control Model.
1982-12-01
v ABSTRACT ........ ............................. .. vi CHAPTER 1 - INTRODUCTION ....... ..................... 1 1.1 Motivation... Introduction ......... . 4 2.2 Optimal Pilot Control Model and Control Synthesis 4 2.3 Pitch Tracking Task ...... ................... 6 2.4 Multiaxis...CHAPTER 3 - SIMULATION SYSTEM ...... .................. 33 3.1 Introduction ........ ....................... 33 3.2 System Hardware
Avoiding Communication in Dense Linear Algebra
2013-08-16
Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.1.1 Asymptotic Notation . . . . . . . . . . . . . . . . . . . . . . . . . . . 6...and parallelizing Strassen’s matrix multiplication algorithm (Chapter 11). 6 Chapter 2 Preliminaries 2.1 Notation and Definitions In this section we...between computations and algo- rithms). The following definition is based on [56]: Definition 2.1. A classical algorithm in linear algebra is one that
Diagnostic cardiology: Noninvasive imaging techniques
DOE Office of Scientific and Technical Information (OSTI.GOV)
Come, P.C.
1985-01-01
This book contains 23 chapters. Some of the chapter titles are: The chest x-ray and cardiac series; Computed tomographic scanning of the heart, coronary arteries, and great vessels; Digital subtraction angiography in the assessment of cardiovascular disease; Magnetic resonance: technique and cardiac applications; Basics of radiation physics and instrumentation; and Nuclear imaging: the assessment of cardiac performance.
Technology-Enhanced Learning Environments. Case Studies in TESOL Practice Series.
ERIC Educational Resources Information Center
Hanson-Smith, Elizabeth, Ed.
This edited volume presents case studies from Europe, North America, Asia, and the Middle East in which teachers have adapted and pioneered teaching innovations. The book is divided into 4 parts, 12 chapters, and an introduction. Part one, "Building a Computer Learning Center," has two chapters: "Guerilla Tactics: Creating a…
Training New Admissions Recruiters: A Guide for Survival and Success.
ERIC Educational Resources Information Center
Swanson, Roger M.; Wilkinson, Christine Kajikawa
This volume is a guide for new college admissions recruiters and their supervisors. Chapter 1 discusses office space and related policy and telephone and computer equipment use as well as other important practical information. Chapter 2 discusses the recruiter's duty to become completely informed about his/her institution in various categories.…
Development and application of QM/MM methods to study the solvation effects and surfaces
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dibya, Pooja Arora
2010-01-01
Quantum mechanical (QM) calculations have the advantage of attaining high-level accuracy, however QM calculations become computationally inefficient as the size of the system grows. Solving complex molecular problems on large systems and ensembles by using quantum mechanics still poses a challenge in terms of the computational cost. Methods that are based on classical mechanics are an inexpensive alternative, but they lack accuracy. A good trade off between accuracy and efficiency is achieved by combining QM methods with molecular mechanics (MM) methods to use the robustness of the QM methods in terms of accuracy and the MM methods to minimize themore » computational cost. Two types of QM combined with MM (QM/MM) methods are the main focus of the present dissertation: the application and development of QM/MM methods for solvation studies and reactions on the Si(100) surface. The solvation studies were performed using a discreet solvation model that is largely based on first principles called the effective fragment potential method (EFP). The main idea of combining the EFP method with quantum mechanics is to accurately treat the solute-solvent and solvent-solvent interactions, such as electrostatic, polarization, dispersion and charge transfer, that are important in correctly calculating solvent effects on systems of interest. A second QM/MM method called SIMOMM (surface integrated molecular orbital molecular mechanics) is a hybrid QM/MM embedded cluster model that mimics the real surface.3 This method was employed to calculate the potential energy surfaces for reactions of atomic O on the Si(100) surface. The hybrid QM/MM method is a computationally inexpensive approach for studying reactions on larger surfaces in a reasonably accurate and efficient manner. This thesis is comprised of four chapters: Chapter 1 describes the general overview and motivation of the dissertation and gives a broad background of the computational methods that have been employed in this work. Chapter 2 illustrates the methodology of the interface of the EFP method with the configuration interaction with single excitations (CIS) method to study solvent effects in excited states. Chapter 3 discusses the study of the adiabatic electron affinity of the hydroxyl radical in aqueous solution and in micro-solvated clusters using a QM/EFP method. Chapter 4 describes the study of etching and diffusion of oxygen atom on a reconstructed Si(100)-2 x 1 surface using a hybrid QM/MM embedded cluster model (SIMOMM). Chapter 4 elucidates the application of the EFP method towards the understanding of the aqueous ionization potential of Na atom. Finally, a general conclusion of this dissertation work and prospective future direction are presented in Chapter 6.« less
Flexible Description and Adaptive Processing of Earth Observation Data through the BigEarth Platform
NASA Astrophysics Data System (ADS)
Gorgan, Dorian; Bacu, Victor; Stefanut, Teodor; Nandra, Cosmin; Mihon, Danut
2016-04-01
The Earth Observation data repositories extending periodically by several terabytes become a critical issue for organizations. The management of the storage capacity of such big datasets, accessing policy, data protection, searching, and complex processing require high costs that impose efficient solutions to balance the cost and value of data. Data can create value only when it is used, and the data protection has to be oriented toward allowing innovation that sometimes depends on creative people, which achieve unexpected valuable results through a flexible and adaptive manner. The users need to describe and experiment themselves different complex algorithms through analytics in order to valorize data. The analytics uses descriptive and predictive models to gain valuable knowledge and information from data analysis. Possible solutions for advanced processing of big Earth Observation data are given by the HPC platforms such as cloud. With platforms becoming more complex and heterogeneous, the developing of applications is even harder and the efficient mapping of these applications to a suitable and optimum platform, working on huge distributed data repositories, is challenging and complex as well, even by using specialized software services. From the user point of view, an optimum environment gives acceptable execution times, offers a high level of usability by hiding the complexity of computing infrastructure, and supports an open accessibility and control to application entities and functionality. The BigEarth platform [1] supports the entire flow of flexible description of processing by basic operators and adaptive execution over cloud infrastructure [2]. The basic modules of the pipeline such as the KEOPS [3] set of basic operators, the WorDeL language [4], the Planner for sequential and parallel processing, and the Executor through virtual machines, are detailed as the main components of the BigEarth platform [5]. The presentation exemplifies the development of some Earth Observation oriented applications based on flexible description of processing, and adaptive and portable execution over Cloud infrastructure. Main references for further information: [1] BigEarth project, http://cgis.utcluj.ro/projects/bigearth [2] Gorgan, D., "Flexible and Adaptive Processing of Earth Observation Data over High Performance Computation Architectures", International Conference and Exhibition Satellite 2015, August 17-19, Houston, Texas, USA. [3] Mihon, D., Bacu, V., Colceriu, V., Gorgan, D., "Modeling of Earth Observation Use Cases through the KEOPS System", Proceedings of the Intelligent Computer Communication and Processing (ICCP), IEEE-Press, pp. 455-460, (2015). [4] Nandra, C., Gorgan, D., "Workflow Description Language for Defining Big Earth Data Processing Tasks", Proceedings of the Intelligent Computer Communication and Processing (ICCP), IEEE-Press, pp. 461-468, (2015). [5] Bacu, V., Stefan, T., Gorgan, D., "Adaptive Processing of Earth Observation Data on Cloud Infrastructures Based on Workflow Description", Proceedings of the Intelligent Computer Communication and Processing (ICCP), IEEE-Press, pp.444-454, (2015).
47 CFR 1.959 - Computation of average terrain elevation.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Section 1.959 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL PRACTICE AND PROCEDURE Grants by...) of this chapter, average terrain elevation must be calculated by computer using elevations from a 30... also be done manually, if the results differ significantly from the computer derived averages. (a...
47 CFR 1.959 - Computation of average terrain elevation.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Section 1.959 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL PRACTICE AND PROCEDURE Grants by...) of this chapter, average terrain elevation must be calculated by computer using elevations from a 30... also be done manually, if the results differ significantly from the computer derived averages. (a...
47 CFR 1.959 - Computation of average terrain elevation.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Section 1.959 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL PRACTICE AND PROCEDURE Grants by...) of this chapter, average terrain elevation must be calculated by computer using elevations from a 30... also be done manually, if the results differ significantly from the computer derived averages. (a...
A Plan for Community College Instructional Computing.
ERIC Educational Resources Information Center
Howard, Alan; And Others
This document presents a comprehensive plan for future growth in instructional computing in the Washington community colleges. Two chapters define the curriculum objectives and content recommended for instructional courses in the community colleges which require access to computing facilities. The courses described include data processing…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Unterweger, Michael; Costrell, Louis deceased
2009-07-07
This project involved support for Lou Costrell and myself in the development of IEEE and IEC standards for nuclear counting and data acquisition systems. Over the years, as a result of this support, Lou and I were able to attend standards meetings of IEEE and IEC, which led directly to the publication of many standards for NIM systems, FastBus and CAMAC. We also chaired several writing committees as well as ANSI N42 (Nuclear instrumentation), IEEE NIM (NIM standard), IEEE NID (NPSS nuclear instruments and detector) and IEC TC45 WG9 (Nuclear instrumentation). Through this support we were able to assure thatmore » the interests of the US and DOE were expressed and implemented in the various standards.« less
Conceptualizing, Designing, and Investigating Locative Media Use in Urban Space
NASA Astrophysics Data System (ADS)
Diamantaki, Katerina; Rizopoulos, Charalampos; Charitos, Dimitris; Kaimakamis, Nikos
This chapter investigates the social implications of locative media (LM) use and attempts to outline a theoretical framework that may support the design and implementation of location-based applications. Furthermore, it stresses the significance of physical space and location awareness as important factors that influence both human-computer interaction and computer-mediated communication. The chapter documents part of the theoretical aspect of the research undertaken as part of LOcation-based Communication Urban NETwork (LOCUNET), a project that aims to investigate the way users interact with one another (human-computer-human interaction aspect) and with the location-based system itself (human-computer interaction aspect). A number of relevant theoretical approaches are discussed in an attempt to provide a holistic theoretical background for LM use. Additionally, the actual implementation of the LOCUNET system is described and some of the findings are discussed.
Risk Management Considerations for Interoperable Acquisition
2006-08-01
Electronics Engineers (IEEE) to harmonize the standards for software (IEEE 12207 ) and system (IEEE 15288) life-cycle processes. A goal of this harmonization...management ( ISO /IEC 16085) is being generalized to apply to the systems level. The revised, generalized standard will add require- ments and guidance for the...risk management. The documents include the following: • ISO /IEC Guide 73: Risk Management—Vocabulary—Guidelines for use in stan- dards [ ISO 02
Should Security Researchers Experiment More and Draw More Inferences?
2011-08-01
knowledge would be enormous. To obtain a large and representative sample of keystroke-dynamics research papers, we consulted the IEEE Xplore database... IEEE Xplore are similar to those published elsewhere), these confidence intervals estimate the re- gions where those true percentages would lie with 95...of articles and conference pro- ceedings published by the IEEE , to which our university maintains a subscription. We conducted two keyword searches for
Simulation Comparisons of Three Different Meander Line Dipoles
2015-01-01
Paez C I. Design formulas for a meandered dipole. IEEE Xplore Digital Library, 2014: n. pag. Web. 2 September 2014. 2. Nguyen, VH, Phan, HP, Hoang...MH. Improving radiation characteristics of UHF RFID antennas by zigzag structures. IEEE Xplore Digital Library, 2014: n. pag. Web. 2 September 2014...geometry-based, frequency-independent lumped element model. IEEE Xplore Digital Library, 2014: n. pag. Web. 2 September 2014. 5. Olaode OO, Palmer WD
High Throughput via Cross-Layer Interference Alignment for Mobile Ad Hoc Networks
2013-08-26
MIMO zero-forcing receiver in the presence of channel estimation error,” IEEE Transactions on Wireless Communications , vol. 6 , no. 3, pp. 805–810, Mar...Robert W. Heath, Nachiappan Valliappan. Antenna Subset Modulation for Secure Millimeter-Wave Wireless Communication , IEEE Transactions on...in MIMO Interference Alignment Networks, IEEE Transactions on Wireless Communications , (02 2012): 0. doi: 10.1109/TWC.2011.120511.111088 TOTAL: 2
1983-01-01
Physique de l’Atmosphire et Environnement terrestre 71 09 - Information, Documentation et Informatique 74 10 - Thimes gin~raux (pluridisciplinaires) et...March Louisiana (US) Fiber Communication Optical Communications IEEE Fibre Optics Electro-Optics 02-08 7-9 March Baden-Baden VDE -IEEE Specialists...Conference on Very Large Electronic Systems VDE (GE) Scale Integrated Circuits Solid State Devices IEEE Integrated Circuits Engineering Design Fabrication
Continuum Electrostatics Approaches to Calculating pKas and Ems in Proteins
Gunner, MR; Baker, Nathan A.
2017-01-01
Proteins change their charge state through protonation and redox reactions as well as through binding charged ligands. The free energy of these reactions are dominated by solvation and electrostatic energies and modulated by protein conformational relaxation in response to the ionization state changes. Although computational methods for calculating these interactions can provide very powerful tools for predicting protein charge states, they include several critical approximations of which users should be aware. This chapter discusses the strengths, weaknesses, and approximations of popular computational methods for predicting charge states and understanding their underlying electrostatic interactions. The goal of this chapter is to inform users about applications and potential caveats of these methods as well as outline directions for future theoretical and computational research. PMID:27497160
DOE Office of Scientific and Technical Information (OSTI.GOV)
Basso, T.
Public-private partnerships have been a mainstay of the U.S. Department of Energy and the National Renewable Energy Laboratory (DOE/NREL) approach to research and development. These partnerships also include technology development that enables grid modernization and distributed energy resources (DER) advancement, especially renewable energy systems integration with the grid. Through DOE/NREL and industry support of Institute of Electrical and Electronics Engineers (IEEE) standards development, the IEEE 1547 series of standards has helped shape the way utilities and other businesses have worked together to realize increasing amounts of DER interconnected with the distribution grid. And more recently, the IEEE 2030 series ofmore » standards is helping to further realize greater implementation of communications and information technologies that provide interoperability solutions for enhanced integration of DER and loads with the grid. For these standards development partnerships, for approximately $1 of federal funding, industry partnering has contributed $5. In this report, the status update is presented for the American National Standards IEEE 1547 and IEEE 2030 series of standards. A short synopsis of the history of the 1547 standards is first presented, then the current status and future direction of the ongoing standards development activities are discussed.« less
Robust numerical electromagnetic eigenfunction expansion algorithms
NASA Astrophysics Data System (ADS)
Sainath, Kamalesh
This thesis summarizes developments in rigorous, full-wave, numerical spectral-domain (integral plane wave eigenfunction expansion [PWE]) evaluation algorithms concerning time-harmonic electromagnetic (EM) fields radiated by generally-oriented and positioned sources within planar and tilted-planar layered media exhibiting general anisotropy, thickness, layer number, and loss characteristics. The work is motivated by the need to accurately and rapidly model EM fields radiated by subsurface geophysical exploration sensors probing layered, conductive media, where complex geophysical and man-made processes can lead to micro-laminate and micro-fractured geophysical formations exhibiting, at the lower (sub-2MHz) frequencies typically employed for deep EM wave penetration through conductive geophysical media, bulk-scale anisotropic (i.e., directional) electrical conductivity characteristics. When the planar-layered approximation (layers of piecewise-constant material variation and transversely-infinite spatial extent) is locally, near the sensor region, considered valid, numerical spectral-domain algorithms are suitable due to their strong low-frequency stability characteristic, and ability to numerically predict time-harmonic EM field propagation in media with response characterized by arbitrarily lossy and (diagonalizable) dense, anisotropic tensors. If certain practical limitations are addressed, PWE can robustly model sensors with general position and orientation that probe generally numerous, anisotropic, lossy, and thick layers. The main thesis contributions, leading to a sensor and geophysical environment-robust numerical modeling algorithm, are as follows: (1) Simple, rapid estimator of the region (within the complex plane) containing poles, branch points, and branch cuts (critical points) (Chapter 2), (2) Sensor and material-adaptive azimuthal coordinate rotation, integration contour deformation, integration domain sub-region partition and sub-region-dependent integration order (Chapter 3), (3) Integration partition-extrapolation-based (Chapter 3) and Gauss-Laguerre Quadrature (GLQ)-based (Chapter 4) evaluations of the deformed, semi-infinite-length integration contour tails, (4) Robust in-situ-based (i.e., at the spectral-domain integrand level) direct/homogeneous-medium field contribution subtraction and analytical curbing of the source current spatial spectrum function's ill behavior (Chapter 5), and (5) Analytical re-casting of the direct-field expressions when the source is embedded within a NBAM, short for non-birefringent anisotropic medium (Chapter 6). The benefits of these contributions are, respectively, (1) Avoiding computationally intensive critical-point location and tracking (computation time savings), (2) Sensor and material-robust curbing of the integrand's oscillatory and slow decay behavior, as well as preventing undesirable critical-point migration within the complex plane (computation speed, precision, and instability-avoidance benefits), (3) sensor and material-robust reduction (or, for GLQ, elimination) of integral truncation error, (4) robustly stable modeling of scattered fields and/or fields radiated from current sources modeled as spatially distributed (10 to 1000-fold compute-speed acceleration also realized for distributed-source computations), and (5) numerically stable modeling of fields radiated from sources within NBAM layers. Having addressed these limitations, are PWE algorithms applicable to modeling EM waves in tilted planar-layered geometries too? This question is explored in Chapter 7 using a Transformation Optics-based approach, allowing one to model wave propagation through layered media that (in the sensor's vicinity) possess tilted planar interfaces. The technique leads to spurious wave scattering however, whose induced computation accuracy degradation requires analysis. Mathematical exhibition, and exhaustive simulation-based study and analysis of the limitations of, this novel tilted-layer modeling formulation is Chapter 7's main contribution.
Probability, statistics, and computational science.
Beerenwinkel, Niko; Siebourg, Juliane
2012-01-01
In this chapter, we review basic concepts from probability theory and computational statistics that are fundamental to evolutionary genomics. We provide a very basic introduction to statistical modeling and discuss general principles, including maximum likelihood and Bayesian inference. Markov chains, hidden Markov models, and Bayesian network models are introduced in more detail as they occur frequently and in many variations in genomics applications. In particular, we discuss efficient inference algorithms and methods for learning these models from partially observed data. Several simple examples are given throughout the text, some of which point to models that are discussed in more detail in subsequent chapters.
Finite Inflation, Holography, and Dark Matter Annihilation
NASA Astrophysics Data System (ADS)
Scacco, Andrew Joseph
This thesis covers work on theoretical cosmology relating to inflation, de Sitter space, dark matter annihilation, and holography. A unifying feature of all these topics is that all of them occur in de Sitter space or focus on epochs of the Universe when the spacetime was close to de Sitter and that all of them have some connection to holography. Chapter 1 provides a pedagogical introduction to the fundamentals of cosmology, inflation, de Sitter space, dark matter annihilation and entanglement entropy. Chapter 2 covers the impact on the causal entropic principle of dark matter annihilation that we find to have the greatest relevance at late times in the future when the dark energy has driven the universe to be asymptotically de Sitter. In this chapter we estimate holographically preferred dark matter properties for a range of assumptions. Chapter 3 covers holographic bounds in models of finite inflation, specifically the Banks-Fischler bound and de Sitter equilibrium. The assumptions in each of these models are explored in detail and some interesting new connections are presented. Chapter 4 tests models of inflation with a fast-roll start that happen to satisfy the holographic bounds in Chapter 3 against cosmic microwave background data from Planck. We find a slight preference for a feature at the scale predicted by the Banks-Fischler bound though this preference is not found to be statistically significant. Chapter 5 contains a numerical computation of the holographic mutual information for an annular configuration of regions on a conformal field theory in de Sitter space using the AdS/CFT correspondence. This computation shows that the de Sitter space CFT entanglement entropy matches what would be expected from a Minkowski CFT and shows that the HRT conjecture works for this case.
Coupling between Current and Dynamic Magnetization : from Domain Walls to Spin Waves
NASA Astrophysics Data System (ADS)
Lucassen, M. E.
2012-05-01
So far, we have derived some general expressions for domain-wall motion and the spin motive force. We have seen that the β parameter plays a large role in both subjects. In all chapters of this thesis, there is an emphasis on the determination of this parameter. We also know how to incorporate thermal fluctuations for rigid domain walls, as shown above. In Chapter 2, we study a different kind of fluctuations: shot noise. This noise is caused by the fact that an electric current consists of electrons, and therefore has fluctuations. In the process, we also compute transmission and reflection coefficients for a rigid domain wall, and from them the linear momentum transfer. More work on fluctuations is done in Chapter 3. Here, we consider a (extrinsically pinned) rigid domain wall under the influence of thermal fluctuations that induces a current via spin motive force. We compute how the resulting noise in the current is related to the β parameter. In Chapter 4 we look into in more detail into the spin motive forces from field driven domain walls. Using micro magnetic simulations, we compute the spin motive force due to vortex domain walls explicitly. As mentioned before, this gives qualitatively different results than for a rigid domain wall. The final subject in Chapter 5 is the application of the general expression for spin motive forces to magnons. Although this might seem to be unrelated to domain-wall motion, this calculation allows us to relate the β parameter to macroscopic transport coefficients. This work was supported by Stichting voor Fundamenteel Onderzoek der Materie (FOM), the Netherlands Organization for Scientific Research (NWO), and by the European Research Council (ERC) under the Seventh Framework Program (FP7).
Modeling low-temperature geochemical processes: Chapter 2
Nordstrom, D. Kirk; Campbell, Kate M.
2014-01-01
This chapter provides an overview of geochemical modeling that applies to water–rock interactions under ambient conditions of temperature and pressure. Topics include modeling definitions, historical background, issues of activity coefficients, popular codes and databases, examples of modeling common types of water–rock interactions, and issues of model reliability. Examples include speciation, microbial redox kinetics and ferrous iron oxidation, calcite dissolution, pyrite oxidation, combined pyrite and calcite dissolution, dedolomitization, seawater–carbonate groundwater mixing, reactive-transport modeling in streams, modeling catchments, and evaporation of seawater. The chapter emphasizes limitations to geochemical modeling: that a proper understanding and ability to communicate model results well are as important as completing a set of useful modeling computations and that greater sophistication in model and code development is not necessarily an advancement. If the goal is to understand how a particular geochemical system behaves, it is better to collect more field data than rely on computer codes.
Office Politics: Computers, Labor, and the Fight for Safety and Health.
ERIC Educational Resources Information Center
Mogensen, Vernon L.
This book explains how the use of video display terminals (VDTs) has been detrimental to women in the work force and has led to widespread health and safety problems. Chapter 1 discusses the development and scope of occupational illnesses associated with VDT work. Chapter 2 analyzes the power relationship between labor and capital in the office…
The Internet and the Law: What Educators Need To Know.
ERIC Educational Resources Information Center
Conn, Kathleen
This book discusses the key legal issues public schools face in using the World Wide Web, e-mail, and other computer technologies. Chapter 1 covers the foundations of school Internet law, including Supreme Court decisions, the legal standard of conduct, standards for technology literacy, and federal vs. state law. Chapter 2 discusses freedom of…
Virtual Learning. A Revolutionary Approach to Building a Highly Skilled Workforce.
ERIC Educational Resources Information Center
Schank, Roger
This book offers trainers and human resource managers an alternative approach to train people more effectively and capitalize on multimedia-based tools. The approach is based on computer-based training and virtual learning theory. Chapter 1 discusses how to remedy problems caused by bad training. Chapter 2 focuses on simulating work and creating…
Electronic Job Search Revolution. Win with the New Technology that's Reshaping Today's Job Market.
ERIC Educational Resources Information Center
Kennedy, Joyce Lain; Morrow, Thomas J.
This book contains information about the resources available to merge new technology and the search for employment. It offers suggestions from human resource specialists, software authors, and database experts. Chapter 1 is an overview of how the computer has become indispensable in a job search. Chapter 2 focuses on external, third-party resume…
1989-03-01
Chapter II. Chapter UI discusses the theory of information systems and the analysis and design of such systems. The last section of Chapter II introduces...34 Improved personnel morale and job satisfaction. Doctors and hospital administrators are trying to recover from the medical computing lag which has...discussed below). The primary source of equipment authorizations is the Table of Distribution and Allowances ( TDA ) which shows the equipment authorized to be
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-10
...): IEEE C37.20.4 Indoor AC Switches (1 kV-38 kV) for Use in Metal-Enclosed Switchgear \\a\\ IEEE C37.20.6 4.76 kV to 38 kV Rated Grounding and Testing Devices Used in Enclosures \\a\\ IEEE C37.23 Metal-Enclosed... Sprinkler Pipe for Fire Protection Service UL 962 Household and Commercial Furnishings \\c\\ UL 1340 Hoists UL...
1980-11-26
and J.B. Thomas, "The Effect of a Memoryless Nonlinearity on the Spectrum of a Random Process," IEEE Transactions on Information Theory, Vol. IT-23, pp...Density Function from Measurements Corrupted by Poisson Noise," IEEE Transactions on Information Theory, Vol. IT-23, pp. 764-766, November 1977. H. Derin...pp. 243-249, December 1977. G.L. Wise and N.C. Gallagher, "On Spherically Invariant Random Processes," IEEE Transactions on Information Theory, Vol. IT
Throughput and delay analysis of IEEE 802.15.6-based CSMA/CA protocol.
Ullah, Sana; Chen, Min; Kwak, Kyung Sup
2012-12-01
The IEEE 802.15.6 is a new communication standard on Wireless Body Area Network (WBAN) that focuses on a variety of medical, Consumer Electronics (CE) and entertainment applications. In this paper, the throughput and delay performance of the IEEE 802.15.6 is presented. Numerical formulas are derived to determine the maximum throughput and minimum delay limits of the IEEE 802.15.6 for an ideal channel with no transmission errors. These limits are derived for different frequency bands and data rates. Our analysis is validated by extensive simulations using a custom C+ + simulator. Based on analytical and simulation results, useful conclusions are derived for network provisioning and packet size optimization for different applications.
5 CFR 839.1003 - How will OPM compute the amount of lost earnings?
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false How will OPM compute the amount of lost... § 839.1003 How will OPM compute the amount of lost earnings? (a) Lost earnings will generally be computed in accordance with the Board's lost earnings regulations (5 CFR 1606 of chapter VI). However, the...
1991-07-01
synchronous machine case study . IEEE T rons. on For the ease nd -nq -2, four time scales trust be used And the A.C, Vol. 36. nul 3, March 1989. damnper... studied . A spot welded(Csse 3) * ss s i* r 0. or a line welded( Case 4) reinforcement plate is attached on the colliding surface of box beams arnd their...phased armature, is given on Figure 1. analytical field calculation in the machine magnetic structure. Il - MAGNETIC STRUCTURE MODELLING: In the case
ERIC Educational Resources Information Center
Shelly, Gary B.; Cashman, Thomas J.; Gunter, Randolph E.; Gunter, Glenda A.
Intended for use in an introductory computer course for educators, this textbook contains the following chapters: (1) "Introduction to Using Computers in Education"; (2) "Communications, Networks, the Internet, and the World Wide Web"; (3) "Software Applications for Education,"; (4) "Hardware Applications for…
20 CFR 229.65 - Initial reduction.
Code of Federal Regulations, 2010 CFR
2010-04-01
... wage (see § 225.2 of this chapter) used to compute the DIB O/M under the Social Security Act rules... that exceed the maximum used in computing social security benefits) for the 5 consecutive years after... earnings that exceed the maximum used in computing social security benefits) for the year of highest...
Computer vision for foreign body detection and removal in the food industry
USDA-ARS?s Scientific Manuscript database
Computer vision inspection systems are often used for quality control, product grading, defect detection and other product evaluation issues. This chapter focuses on the use of computer vision inspection systems that detect foreign bodies and remove them from the product stream. Specifically, we wi...
AUTO_DERIV: Tool for automatic differentiation of a Fortran code
NASA Astrophysics Data System (ADS)
Stamatiadis, S.; Farantos, S. C.
2010-10-01
AUTO_DERIV is a module comprised of a set of FORTRAN 95 procedures which can be used to calculate the first and second partial derivatives (mixed or not) of any continuous function with many independent variables. The mathematical function should be expressed as one or more FORTRAN 77/90/95 procedures. A new type of variables is defined and the overloading mechanism of functions and operators provided by the FORTRAN 95 language is extensively used to define the differentiation rules. Proper (standard complying) handling of floating-point exceptions is provided by using the IEEE_EXCEPTIONS intrinsic module (Technical Report 15580, incorporated in FORTRAN 2003). New version program summaryProgram title: AUTO_DERIV Catalogue identifier: ADLS_v2_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADLS_v2_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.html No. of lines in distributed program, including test data, etc.: 2963 No. of bytes in distributed program, including test data, etc.: 10 314 Distribution format: tar.gz Programming language: Fortran 95 + (optionally) TR-15580 (Floating-point exception handling) Computer: all platforms with a Fortran 95 compiler Operating system: Linux, Windows, MacOS Classification: 4.12, 6.2 Catalogue identifier of previous version: ADLS_v1_0 Journal reference of previous version: Comput. Phys. Comm. 127 (2000) 343 Does the new version supersede the previous version?: Yes Nature of problem: The need to calculate accurate derivatives of a multivariate function frequently arises in computational physics and chemistry. The most versatile approach to evaluate them by a computer, automatically and to machine precision, is via user-defined types and operator overloading. AUTO_DERIV is a Fortran 95 implementation of them, designed to evaluate the first and second derivatives of a function of many variables. Solution method: The mathematical rules for differentiation of sums, products, quotients, elementary functions in conjunction with the chain rule for compound functions are applied. The function should be expressed as one or more Fortran 77/90/95 procedures. A new type of variables is defined and the overloading mechanism of functions and operators provided by the Fortran 95 language is extensively used to implement the differentiation rules. Reasons for new version: The new version supports Fortran 95, handles properly the floating-point exceptions, and is faster due to internal reorganization. All discovered bugs are fixed. Summary of revisions:The code was rewritten extensively to benefit from features introduced in Fortran 95. Additionally, there was a major internal reorganization of the code, resulting in faster execution. The user interface described in the original paper was not changed. The values that the user must or should specify before compilation (essentially, the number of independent variables) were moved into ad_types module. There were many minor bug fixes. One important bug was found and fixed; the code did not handle correctly the overloading of ∗ in aλ when a=0. The case of division by zero and the discontinuity of the function at the requested point are indicated by standard IEEE exceptions ( IEEE_DIVIDE_BY_ZERO and IEEE_INVALID respectively). If the compiler does not support IEEE exceptions, a module with the appropriate name is provided, imitating the behavior of the 'standard' module in the sense that it raises the corresponding exceptions. It is up to the compiler (through certain flags probably) to detect them. Restrictions: None imposed by the program. There are certain limitations that may appear mostly due to the specific implementation chosen in the user code. They can always be overcome by recoding parts of the routines developed by the user or by modifying AUTO_DERIV according to specific instructions given in [1]. The common restrictions of available memory and the capabilities of the compiler are the same as the original version. Additional comments: The program has been tested using the following compilers: Intel ifort, GNU gfortran, NAGWare f95, g95. Running time: The typical running time for the program depends on the compiler and the complexity of the differentiated function. A rough estimate is that AUTO_DERIV is ten times slower than the evaluation of the analytical ('by hand') function value and derivatives (if they are available). References:S. Stamatiadis, R. Prosmiti, S.C. Farantos, AUTO_DERIV: tool for automatic differentiation of a Fortran code, Comput. Phys. Comm. 127 (2000) 343.
Computational Toxicology: Application in Environmental Chemicals
This chapter provides an overview of computational models that describe various aspects of the source-to-health effect continuum. Fate and transport models describe the release, transportation, and transformation of chemicals from sources of emission throughout the general envir...
NASA Astrophysics Data System (ADS)
Kim, Ronny Yongho; Jung, Inuk; Kim, Young Yong
IEEE 802.16m is an advanced air interface standard which is under development for IMT-Advanced systems, known as 4G systems. IEEE 802.16m is designed to provide a high data rate and a Quality of Service (QoS) level in order to meet user service requirements, and is especially suitable for mobilized environments. There are several factors that have great impact on such requirements. As one of the major factors, we mainly focus on latency issues. In IEEE 802.16m, an enhanced layer 2 handover scheme, described as Entry Before Break (EBB) was proposed and adopted to reduce handover latency. EBB provides significant handover interruption time reduction with respect to the legacy IEEE 802.16 handover scheme. Fast handovers for mobile IPv6 (FMIPv6) was standardized by Internet Engineering Task Force (IETF) in order to provide reduced handover interruption time from IP layer perspective. Since FMIPv6 utilizes link layer triggers to reduce handover latency, it is very critical to jointly design FMIPv6 with its underlying link layer protocol. However, FMIPv6 based on new handover scheme, EBB has not been proposed. In this paper, we propose an improved cross-layering design for FMIPv6 based on the IEEE 802.16m EBB handover. In comparison with the conventional FMIPv6 based on the legacy IEEE 802.16 network, the overall handover interruption time can be significantly reduced by employing the proposed design. Benefits of this improvement on latency reduction for mobile user applications are thoroughly investigated with both numerical analysis and simulation on various IP applications.
The snow system: A decentralized medical data processing system.
Bellika, Johan Gustav; Henriksen, Torje Starbo; Yigzaw, Kassaye Yitbarek
2015-01-01
Systems for large-scale reuse of electronic health record data is claimed to have the potential to transform the current health care delivery system. In principle three alternative solutions for reuse exist: centralized, data warehouse, and decentralized solutions. This chapter focuses on the decentralized system alternative. Decentralized systems may be categorized into approaches that move data to enable computations or move computations to the where data is located to enable computations. We describe a system that moves computations to where the data is located. Only this kind of decentralized solution has the capabilities to become ideal systems for reuse as the decentralized alternative enables computation and reuse of electronic health record data without moving or exposing the information to outsiders. This chapter describes the Snow system, which is a decentralized medical data processing system, its components and how it has been used. It also describes the requirements this kind of systems need to support to become sustainable and successful in recruiting voluntary participation from health institutions.
Computational Design of DNA-Binding Proteins.
Thyme, Summer; Song, Yifan
2016-01-01
Predicting the outcome of engineered and naturally occurring sequence perturbations to protein-DNA interfaces requires accurate computational modeling technologies. It has been well established that computational design to accommodate small numbers of DNA target site substitutions is possible. This chapter details the basic method of design used in the Rosetta macromolecular modeling program that has been successfully used to modulate the specificity of DNA-binding proteins. More recently, combining computational design and directed evolution has become a common approach for increasing the success rate of protein engineering projects. The power of such high-throughput screening depends on computational methods producing multiple potential solutions. Therefore, this chapter describes several protocols for increasing the diversity of designed output. Lastly, we describe an approach for building comparative models of protein-DNA complexes in order to utilize information from homologous sequences. These models can be used to explore how nature modulates specificity of protein-DNA interfaces and potentially can even be used as starting templates for further engineering.
A High Performance Frequency Standard and Distribution System for Cassini Ka-Band Experiment
2005-08-01
Orthogonal Polarization In Anisotropic Dielectric Resonators”, Proceedings of the 2002 IEEE International Frequency Control Symposium , pp. 553-558...2002. [9] G. J. Dick, Rabi T. Wang, Robert Tjoelker, “Design and Progress Report for Compact Cryocooled Sapphire Oscillator "VCSO"”, Proc. 2005 Joint...IEEE FCS/ PTTI. [10] R. Basu, G. J. Dick, Rabi T. Wang,” Novel Design of an All- Cryogenic RF Pound Circuit “,Proc. 2005 Joint IEEE FCS/ PTTI
Hierarchical Organization for Large, Dynamic Radio Networks.
1988-01-01
January 1985. [3] N. Shacharm and J. Tornow . Future Directions in Packet Radio Technology. In - Proc. of IEEE INFOCOM, Washington, D.C., 1985. [4] J.J...Freeman and Company, 1979. [7] J. Jubin and J. Tornow . The DARPA Packet Radio Network Protocols. Proceed- inga of the IEEE, 75(1):21-32, January 1987... Tornow . Future Directions in Packet Radio Technology. In Proc. of IEEE INFOCOM, Washington, D.C., 1985. [28] N. Shacham and J. Westcott. Future
2012-03-01
detection and physical layer authentication in mobile Ad Hoc networks and wireless sensor networks (WSNs) have been investigated. Résume Le rapport...IEEE 802.16 d and e (WiMAX); (b) IEEE 802.11 (Wi-Fi) family of a, b, g, n, and s (c) Sensor networks based on IEEE 802.15.4: Wireless USB, Bluetooth... sensor network are investigated for standard compatible wireless signals. The proposed signal existence detection and identification process consists
An NTP Stratum-One Server Farm Fed By IEEE-1588
2010-01-01
Serial Time Code Formats,” U.S. Army White Sands Missile Range, N.M. [11] J. Eidson , 2005, “IEEE-1588 Standard for a Precision Clock Synchronization ... synchronized to its Master Clocks via IRIG-B time code on a low- frequency RF distribution system. The availability of Precise Time Protocol (PTP, IEEE...forwarding back to the requestor. The farm NTP servers are synchronized to the USNO Master Clocks using IRIG-B time code. The current standard NTP
2017-01-05
1 Performance Evaluation of Glottal Inverse Filtering Algorithms Using a Physiologically Based Articulatory Speech Synthesizer Yu-Ren Chien, Daryush...D. Mehta, Member, IEEE, Jón Guðnason, Matías Zañartu, Member, IEEE, and Thomas F. Quatieri, Fellow, IEEE Abstract—Glottal inverse filtering aims to...of inverse filtering performance has been challenging due to the practical difficulty in measuring the true glottal signals while speech signals are
2012-08-01
Heterogeneous Packet Transmission in Communication Networks Soumik Sarkar, Member, IEEE, Kushal Mukherjee,Member, IEEE, Asok Ray , Fellow, IEEE...Dr. Mukherjee is a member of the American Society of Mechanical Engineers. Asok Ray (SM’83–F’02) received the graduate de- grees in each discipline of...United Technologies Research Center, East Hartford, CT 06108 USA (e-mail: sarkars@utrc.utc.com; srivasa1@utrc.utc.com). K. Mukherjee and A. Ray are with
2014-06-01
Hieb, and R. Brown, “Standardizing Battle Management Language – A Vital Move Towards the Army Transformation,” paper 01S- SIW -067, IEEE Fall Simulation...Hieb, M., W. Sudnikovich, A. Tolk and J. Pullen, “Developing Battle Management Language into a Web Service,” paper 04S- SIW -113, IEEE Spring Simulation...Mediation and Data Storage,” paper 05S- SIW -019, IEEE Spring Simulation Interoperability Workshop, Orlando, FL, 2005 [6] Multilateral
Algorithm XXX : functions to support the IEEE standard for binary floating-point arithmetic.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cody, W. J.; Mathematics and Computer Science
1993-12-01
This paper describes C programs for the support functions copysign(x,y), logb(x), scalb(x,n), nextafter(x,y), finite(x), and isnan(x) recommended in the Appendix to the IEEE Standard for Binary Floating-Point Arithmetic. In the case of logb, the modified definition given in the later IEEE Standard for Radix-Independent Floating-Point Arithmetic is followed. These programs should run without modification on most systems conforming to the binary standard.
2014-03-01
64 selections, 128 aggregations and 510 join operators . 0 100 200 300 400 500 600 700 800 900 1000 0 10 20 30 40 50 60 70 T im e...DC, USA, 2001, IEEE Computer So- ciety, pp. 391–398. [66] E. Network and I. S. A. (ENISA), Inventory of risk managemen - t /risk assessment methods, Sept... Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that
IEEE 1982. Proceedings of the international conference on cybernetics and society
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1982-01-01
The following topics were dealt with: knowledge-based systems; risk analysis; man-machine interactions; human information processing; metaphor, analogy and problem-solving; manual control modelling; transportation systems; simulation; adaptive and learning systems; biocybernetics; cybernetics; mathematical programming; robotics; decision support systems; analysis, design and validation of models; computer vision; systems science; energy systems; environmental modelling and policy; pattern recognition; nuclear warfare; technological forecasting; artificial intelligence; the Turin shroud; optimisation; workloads. Abstracts of individual papers can be found under the relevant classification codes in this or future issues.
Basic mathematical function libraries for scientific computation
NASA Technical Reports Server (NTRS)
Galant, David C.
1989-01-01
Ada packages implementing selected mathematical functions for the support of scientific and engineering applications were written. The packages provide the Ada programmer with the mathematical function support found in the languages Pascal and FORTRAN as well as an extended precision arithmetic and a complete complex arithmetic. The algorithms used are fully described and analyzed. Implementation assumes that the Ada type FLOAT objects fully conform to the IEEE 754-1985 standard for single binary floating-point arithmetic, and that INTEGER objects are 32-bit entities. Codes for the Ada packages are included as appendixes.
Design of WLAN microstrip antenna for 5.17 - 5.835 GHz
NASA Astrophysics Data System (ADS)
Bugaj, Jarosław; Bugaj, Marek; Wnuk, Marian
2017-04-01
This paper presents the project of miniaturized WLAN Antenna made in microstrip technique working at a frequency of 5.17 - 5.835 GHz in 802.11ac IEEE standard. This dual layer antenna is designed on RT/duroid 5870 ROGERS CORPORATION substrate with dielectric constant 2.33 and thickness of 3.175 mm. The antenna parameters such as return loss, VSWR, gain and directivity are simulated and optimized using commercial computer simulation technology microwave studio (CST MWS). The paper presents the results of discussed numerical analysis.
Dynamic Programming and Transitive Closure on Linear Pipelines.
1984-05-01
four partitions. 2.0 - 1.9 1.0t N. N 3N N -8 4 24 Figure41 An ideal solution to small problem sizes is to design an algorithm on an array where the...12 References [1] A.V. Aho, J. Hopcroft, and J.D. Ullman. The Design and Analysis of Computer Algorithms, Addison-Wesley, (1974). - " [2] R. Aubusson...K.E. Batcher, " Design of a Massively Parallel Processor," IEEE-TC, Vol. C-9, No. 9, (September, 1980), pp. 83-840. [4] K.Q. Brown, "Dynamic Programming
Molecular Dynamics Studies of Self-Assembling Biomolecules and DNA-functionalized Gold Nanoparticles
NASA Astrophysics Data System (ADS)
Cho, Vince Y.
This thesis is organized as following. In Chapter 2, we use fully atomistic MD simulations to study the conformation of DNA molecules that link gold nanoparticles to form nanoparticle superlattice crystals. In Chapter 3, we study the self-assembly of peptide amphiphiles (PAs) into a cylindrical micelle fiber by using CGMD simulations. Compared to fully atomistic MD simulations, CGMD simulations prove to be computationally cost-efficient and reasonably accurate for exploring self-assembly, and are used in all subsequent chapters. In Chapter 4, we apply CGMD methods to study the self-assembly of small molecule-DNA hybrid (SMDH) building blocks into well-defined cage-like dimers, and reveal the role of kinetics and thermodynamics in this process. In Chapter 5, we extend the CGMD model for this system and find that the assembly of SMDHs can be fine-tuned by changing parameters. In Chapter 6, we explore superlattice crystal structures of DNA-functionalized gold nanoparticles (DNA-AuNP) with the CGMD model and compare the hybridization.
A Performance Comparison of Tree and Ring Topologies in Distributed System
DOE Office of Scientific and Technical Information (OSTI.GOV)
Huang, Min
A distributed system is a collection of computers that are connected via a communication network. Distributed systems have become commonplace due to the wide availability of low-cost, high performance computers and network devices. However, the management infrastructure often does not scale well when distributed systems get very large. Some of the considerations in building a distributed system are the choice of the network topology and the method used to construct the distributed system so as to optimize the scalability and reliability of the system, lower the cost of linking nodes together and minimize the message delay in transmission, and simplifymore » system resource management. We have developed a new distributed management system that is able to handle the dynamic increase of system size, detect and recover the unexpected failure of system services, and manage system resources. The topologies used in the system are the tree-structured network and the ring-structured network. This thesis presents the research background, system components, design, implementation, experiment results and the conclusions of our work. The thesis is organized as follows: the research background is presented in chapter 1. Chapter 2 describes the system components, including the different node types and different connection types used in the system. In chapter 3, we describe the message types and message formats in the system. We discuss the system design and implementation in chapter 4. In chapter 5, we present the test environment and results, Finally, we conclude with a summary and describe our future work in chapter 6.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sacks, H.K.; Novak, T.
2008-03-15
During the past decade, several methane/air explosions in abandoned or sealed areas of underground coal mines have been attributed to lightning. Previously published work by the authors showed, through computer simulations, that currents from lightning could propagate down steel-cased boreholes and ignite explosive methane/air mixtures. The presented work expands on the model and describes a methodology based on IEEE Standard 1410-2004 to estimate the probability of an ignition. The methodology provides a means to better estimate the likelihood that an ignition could occur underground and, more importantly, allows the calculation of what-if scenarios to investigate the effectiveness of engineering controlsmore » to reduce the hazard. The computer software used for calculating fields and potentials is also verified by comparing computed results with an independently developed theoretical model of electromagnetic field propagation through a conductive medium.« less
Beard, Brian B; Kainz, Wolfgang
2004-10-13
We reviewed articles using computational RF dosimetry to compare the Specific Anthropomorphic Mannequin (SAM) to anatomically correct models of the human head. Published conclusions based on such comparisons have varied widely. We looked for reasons that might cause apparently similar comparisons to produce dissimilar results. We also looked at the information needed to adequately compare the results of computational RF dosimetry studies. We concluded studies were not comparable because of differences in definitions, models, and methodology. Therefore we propose a protocol, developed by an IEEE standards group, as an initial step in alleviating this problem. The protocol calls for a benchmark validation study comparing the SAM phantom to two anatomically correct models of the human head. It also establishes common definitions and reporting requirements that will increase the comparability of all computational RF dosimetry studies of the human head.
Beard, Brian B; Kainz, Wolfgang
2004-01-01
We reviewed articles using computational RF dosimetry to compare the Specific Anthropomorphic Mannequin (SAM) to anatomically correct models of the human head. Published conclusions based on such comparisons have varied widely. We looked for reasons that might cause apparently similar comparisons to produce dissimilar results. We also looked at the information needed to adequately compare the results of computational RF dosimetry studies. We concluded studies were not comparable because of differences in definitions, models, and methodology. Therefore we propose a protocol, developed by an IEEE standards group, as an initial step in alleviating this problem. The protocol calls for a benchmark validation study comparing the SAM phantom to two anatomically correct models of the human head. It also establishes common definitions and reporting requirements that will increase the comparability of all computational RF dosimetry studies of the human head. PMID:15482601
Computational Physics? Some perspectives and responses of the undergraduate physics community
NASA Astrophysics Data System (ADS)
Chonacky, Norman
2011-03-01
Any of the many answers possible to the evocative question ``What is ...'' will likely be heavily shaded by the experience of the respondent. This is partly due to absence of a canon of practice in this still immature, hence dynamic and exciting, method of physics. The diversity of responses is even more apparent in the area of physics education, and more disruptive because an undergraduate educational canon uniformly accepted across institutions for decades already exists. I will present evidence of this educational community's lagging response to the challenge of the current dynamic and diverse practice of computational physics in research. I will also summarize current measures that attempt respond to this lag, discuss a researched-based approach for moving beyond these early measures, and suggest how DCOMP might help. I hope this will generate criticisms and concurrences from the floor. Research support for material in this talk was from: IEEE-Computer Society; Shodor Foundation; Teragrid Project.
An efficient technique for the numerical solution of the bidomain equations.
Whiteley, Jonathan P
2008-08-01
Computing the numerical solution of the bidomain equations is widely accepted to be a significant computational challenge. In this study we extend a previously published semi-implicit numerical scheme with good stability properties that has been used to solve the bidomain equations (Whiteley, J.P. IEEE Trans. Biomed. Eng. 53:2139-2147, 2006). A new, efficient numerical scheme is developed which utilizes the observation that the only component of the ionic current that must be calculated on a fine spatial mesh and updated frequently is the fast sodium current. Other components of the ionic current may be calculated on a coarser mesh and updated less frequently, and then interpolated onto the finer mesh. Use of this technique to calculate the transmembrane potential and extracellular potential induces very little error in the solution. For the simulations presented in this study an increase in computational efficiency of over two orders of magnitude over standard numerical techniques is obtained.
Continuum Electrostatics Approaches to Calculating pKas and Ems in Proteins.
Gunner, M R; Baker, N A
2016-01-01
Proteins change their charge state through protonation and redox reactions as well as through binding charged ligands. The free energy of these reactions is dominated by solvation and electrostatic energies and modulated by protein conformational relaxation in response to the ionization state changes. Although computational methods for calculating these interactions can provide very powerful tools for predicting protein charge states, they include several critical approximations of which users should be aware. This chapter discusses the strengths, weaknesses, and approximations of popular computational methods for predicting charge states and understanding the underlying electrostatic interactions. The goal of this chapter is to inform users about applications and potential caveats of these methods as well as outline directions for future theoretical and computational research. © 2016 Elsevier Inc. All rights reserved.
Recent achievements in restorative neurology: Progressive neuromuscular diseases
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dimitrijevic, M.R.; Kakulas, B.A.; Vrbova, G.
1986-01-01
This book contains 27 chapters. Some of the chapter titles are: Computed Tomography of Muscles in Neuromuscular Disease; Mapping the Genes for Muscular Dystrophy; Trophic Factors and Motor Neuron Development; Size of Motor Units and Firing Rate in Muscular Dystrophy; Restorative Possibilities in Relation to the Pathology of Progressive Neuromuscular Disease; and An Approach to the Pathogenesis of some Congenital Myopathies.
NASA Technical Reports Server (NTRS)
Dexter, Daniel E.; Varesic, Tony E.
2015-01-01
This document describes the design of the Integrated Mission Simulation (IMSim) federate multiphase initialization process. The main goal of multiphase initialization is to allow for data interdependencies during the federate initialization process. IMSim uses the High Level Architecture (HLA) IEEE 1516 [1] to provide the communication and coordination between the distributed parts of the simulation. They are implemented using the Runtime Infrastructure (RTI) from Pitch Technologies AB. This document assumes a basic understanding of IEEE 1516 HLA, and C++ programming. In addition, there are several subtle points in working with IEEE 1516 and the Pitch RTI that need to be understood, which are covered in Appendix A. Please note the C++ code samples shown in this document are for the IEEE 1516-2000 standard.
Implicit Block ACK Scheme for IEEE 802.11 WLANs
Sthapit, Pranesh; Pyun, Jae-Young
2016-01-01
The throughput of IEEE 802.11 standard is significantly bounded by the associated Medium Access Control (MAC) overhead. Because of the overhead, an upper limit exists for throughput, which is bounded, including situations where data rates are extremely high. Therefore, an overhead reduction is necessary to achieve higher throughput. The IEEE 802.11e amendment introduced the block ACK mechanism, to reduce the number of control messages in MAC. Although the block ACK scheme greatly reduces overhead, further improvements are possible. In this letter, we propose an implicit block ACK method that further reduces the overhead associated with IEEE 802.11e’s block ACK scheme. The mathematical analysis results are presented for both the original protocol and the proposed scheme. A performance improvement of greater than 10% was achieved with the proposed implementation.
NASA Astrophysics Data System (ADS)
Ng, J.; Kingsbury, N. G.
2004-02-01
This book provides an overview of the theory and practice of continuous and discrete wavelet transforms. Divided into seven chapters, the first three chapters of the book are introductory, describing the various forms of the wavelet transform and their computation, while the remaining chapters are devoted to applications in fluids, engineering, medicine and miscellaneous areas. Each chapter is well introduced, with suitable examples to demonstrate key concepts. Illustrations are included where appropriate, thus adding a visual dimension to the text. A noteworthy feature is the inclusion, at the end of each chapter, of a list of further resources from the academic literature which the interested reader can consult. The first chapter is purely an introduction to the text. The treatment of wavelet transforms begins in the second chapter, with the definition of what a wavelet is. The chapter continues by defining the continuous wavelet transform and its inverse and a description of how it may be used to interrogate signals. The continuous wavelet transform is then compared to the short-time Fourier transform. Energy and power spectra with respect to scale are also discussed and linked to their frequency counterparts. Towards the end of the chapter, the two-dimensional continuous wavelet transform is introduced. Examples of how the continuous wavelet transform is computed using the Mexican hat and Morlet wavelets are provided throughout. The third chapter introduces the discrete wavelet transform, with its distinction from the discretized continuous wavelet transform having been made clear at the end of the second chapter. In the first half of the chapter, the logarithmic discretization of the wavelet function is described, leading to a discussion of dyadic grid scaling, frames, orthogonal and orthonormal bases, scaling functions and multiresolution representation. The fast wavelet transform is introduced and its computation is illustrated with an example using the Haar wavelet. The second half of the chapter groups together miscellaneous points about the discrete wavelet transform, including coefficient manipulation for signal denoising and smoothing, a description of Daubechies’ wavelets, the properties of translation invariance and biorthogonality, the two-dimensional discrete wavelet transforms and wavelet packets. The fourth chapter is dedicated to wavelet transform methods in the author’s own specialty, fluid mechanics. Beginning with a definition of wavelet-based statistical measures for turbulence, the text proceeds to describe wavelet thresholding in the analysis of fluid flows. The remainder of the chapter describes wavelet analysis of engineering flows, in particular jets, wakes, turbulence and coherent structures, and geophysical flows, including atmospheric and oceanic processes. The fifth chapter describes the application of wavelet methods in various branches of engineering, including machining, materials, dynamics and information engineering. Unlike previous chapters, this (and subsequent) chapters are styled more as literature reviews that describe the findings of other authors. The areas addressed in this chapter include: the monitoring of machining processes, the monitoring of rotating machinery, dynamical systems, chaotic systems, non-destructive testing, surface characterization and data compression. The sixth chapter continues in this vein with the attention now turned to wavelets in the analysis of medical signals. Most of the chapter is devoted to the analysis of one-dimensional signals (electrocardiogram, neural waveforms, acoustic signals etc.), although there is a small section on the analysis of two-dimensional medical images. The seventh and final chapter of the book focuses on the application of wavelets in three seemingly unrelated application areas: fractals, finance and geophysics. The treatment on wavelet methods in fractals focuses on stochastic fractals with a short section on multifractals. The treatment on finance touches on the use of wavelets by other authors in studying stock prices, commodity behaviour, market dynamics and foreign exchange rates. The treatment on geophysics covers what was omitted from the fourth chapter, namely, seismology, well logging, topographic feature analysis and the analysis of climatic data. The text concludes with an assortment of other application areas which could only be mentioned in passing. Unlike most other publications in the subject, this book does not treat wavelet transforms in a mathematically rigorous manner but rather aims to explain the mechanics of the wavelet transform in a way that is easy to understand. Consequently, it serves as an excellent overview of the subject rather than as a reference text. Keeping the mathematics to a minimum and omitting cumbersome and detailed proofs from the text, the book is best-suited to those who are new to wavelets or who want an intuitive understanding of the subject. Such an audience may include graduate students in engineering and professionals and researchers in engineering and the applied sciences.
Computers and Individualized Instruction: Moving to Alternative Learning Environments.
ERIC Educational Resources Information Center
Robbat, Richard J.
The overall focus of this booklet is on planning for change that allows for integration of computers into articulated learning environments that will enhance the learning goal of students. The first chapter presents four major themes to increase the likelihood of combining computers and individualized instruction in schools: (1) a revitalized form…
Books, Bytes, and Bridges: Libraries and Computer Centers in Academic Institutions.
ERIC Educational Resources Information Center
Hardesty, Larry, Ed.
This book about the relationship between computer centers and libraries at academic institutions contains the following chapters: (1) "A History of the Rhetoric and Reality of Library and Computing Relationships" (Peggy Seiden and Michael D. Kathman); (2) "An Issue in Search of a Metaphor: Readings on the Marriageability of…
Specialty Engineering Supplement to IEEE-15288.1
2015-05-15
receiver required to work in a dense EMI environment. (15) Any RF receiver with a burnout level of less than 30 dBm (1 mW). b. A summary of all...Context 2.1 ISO-IEC-IEEE-15288: 2015, Systems and Software Engineering — System life cycle processes ISO-IEC-IEEE 15288 is the DOD-adopted standard for...to ISO-15288 for application of systems engineering on defense programs that was developed by a joint services working group under the auspices of the
Radar Methods in Urban Environments
2016-10-26
to appear in IEEE Journal of Selected Topics in Signal Processing. J8. M. Wang and A. Nehorai, “Coarrays, MUSIC , and the Cramér Rao bound,” to...Journal Papers: 1. P. Chavali and A. Nehorai, "Scheduling and resource allocation in a cognitive radar network for multiple- target tracking,’’ IEEE...Processing. 33. M. Wang and A. Nehorai, "Coarrays, MUSIC , and the Cramér Rao bound," to appear in IEEE Trans. on Signal Processing. 34. J. Li and A. Nehorai
2011-08-01
component in an airborne platform. Authorized licensed use limited to: ROME AFB. Downloaded on August 05,2010 at 14:47:37 UTC from IEEE Xplore ...UTC from IEEE Xplore . Restrictions apply. 2 . (7) For instance, it is not difficult to show that the MGF of for Nakagami-m fading with i.n.d fading...August 05,2010 at 14:47:37 UTC from IEEE Xplore . Restrictions apply. 3 ditions. Once again, using integration by parts, (14) can be concisely expressed
An Energy-Efficient Sleep Mode in IEEE 802.15.4 by Considering Sensor Device Mobility
NASA Astrophysics Data System (ADS)
Kim, Jinho; Lee, Jun; Hong, Choong Seon; Lee, Sungwon
The current version of IEEE 802.15.4 MAC protocol does not support energy-efficient mobility for the low-power device. In this paper, we propose an energy-efficient sleep mode as part of the IEEE 802.15.4 that can conserve energy by considering mobility of mobile sensor devices. The proposed energy-efficient sleep mode dynamically extends the sleep interval if there is no data to transmit from the device or receive from corresponding nodes.
Unlocking User-Centered Design Methods for Building Cyber Security Visualizations
2015-10-03
a final, deployed tool. Goodall et al. interviewed analysts to derive requirements for a network security tool [14], while Stoll et al. explain the...4673-7599-3/15/$31.00 c©2015 IEEE 2015 IEEE SYMPOSIUM ON VISUALIZATION FOR CYBER SECURITY (VIZSEC) [14] J. R. Goodall , A. A. Ozok, W. G. Lutters, P...Visualization for Cyber Security, pages 91–98. IEEE, 2005. [19] A. Komlodi, P. Rheingans, U. Ayachit, J. Goodall , and A. Joshi. A user- centered look at
1981-01-01
Channel and study permutation codes as a special case. ,uch a code is generated by an initial vector x, a group G of orthogonal n by n matrices, and a...random-access components, is introduced and studied . Under this scheme, the network stations are divided into groups , each of which is assigned a...IEEE INFORMATION THEORY GROUP CO-SPONSORED BY: UNION RADIO SCIENTIFIQUE INTERNATIONALE IEEE Catalog Number 81 CH 1609-7 IT . 81 ~20 04Q SECURITY
Performance Evaluation of Parallel Algorithms and Architectures in Concurrent Multiprocessor Systems
1988-09-01
HEP and Other Parallel processors, Report no. ANL-83-97, Argonne National Laboratory, Argonne, Ill. 1983. [19] Davidson, G . S. A Practical Paradigm for...IEEE Comp. Soc., 1986. [241 Peir, Jih-kwon, and D. Gajski , "CAMP: A Programming Aide For Multiprocessors," Proc. 1986 ICPP, IEEE Comp. Soc., pp475...482. [251 Pfister, G . F., and V. A. Norton, "Hot Spot Contention and Combining in Multistage Interconnection Networks,"IEEE Trans. Comp., C-34, Oct
Code of Federal Regulations, 2010 CFR
2010-01-01
... the Individual Retirement Record under consideration. Unexpended balance means the unrefunded amount... of this chapter; (b) Amounts deposited by an employee for periods of service (including military... service. Year of the computation means the calendar year when the unexpended balance is being computed. ...
NASA Astrophysics Data System (ADS)
Russell, Greg
The work described in this dissertation was motivated by a desire to better understand the cellular pathology of ischemic stroke. Two of the three bodies of research presented herein address and issue directly related to the investigation of ischemic stroke through the use of diffusion weighted magnetic resonance imaging (DWMRI) methods. The first topic concerns the development of a computationally efficient finite difference method, designed to evaluate the impact of microscopic tissue properties on the formation of DWMRI signal. For the second body of work, the effect of changing the intrinsic diffusion coefficient of a restricted sample on clinical DWMRI experiments is explored. The final body of work, while motivated by the desire to understand stroke, addresses the issue of acquiring large amounts of MRI data well suited for quantitative analysis in reduced scan time. In theory, the method could be used to generate quantitative parametric maps, including those depicting information gleaned through the use of DWMRI methods. Chapter 1 provides an introduction to several topics. A description of the use of DWMRI methods in the study of ischemic stroke is covered. An introduction to the fundamental physical principles at work in MRI is also provided. In this section the means by which magnetization is created in MRI experiments, how MRI signal is induced, as well as the influence of spin-spin and spin-lattice relaxation are discussed. Attention is also given to describing how MRI measurements can be sensitized to diffusion through the use of qualitative and quantitative descriptions of the process. Finally, the reader is given a brief introduction to the use of numerical methods for solving partial differential equations. In Chapters 2, 3 and 4, three related bodies of research are presented in terms of research papers. In Chapter 2, a novel computational method is described. The method reduces the computation resources required to simulate DWMRI experiments. In Chapter 3, a detailed study on how changes in the intrinsic intracellular diffusion coefficient may influence clinical DWMRI experiments is described. In Chapter 4, a novel, non-steady state quantitative MRI method is described.
Martinello wins 2018 IEEE PAST Doctoral Student Award November 28, 2017 PAST has awarded Fermilab scientist Martina Martinello the 2018 IEEE PAST Doctoral Student Award. Performance recognition awards go to
Accuracy of the lattice-Boltzmann method using the Cell processor
NASA Astrophysics Data System (ADS)
Harvey, M. J.; de Fabritiis, G.; Giupponi, G.
2008-11-01
Accelerator processors like the new Cell processor are extending the traditional platforms for scientific computation, allowing orders of magnitude more floating-point operations per second (flops) compared to standard central processing units. However, they currently lack double-precision support and support for some IEEE 754 capabilities. In this work, we develop a lattice-Boltzmann (LB) code to run on the Cell processor and test the accuracy of this lattice method on this platform. We run tests for different flow topologies, boundary conditions, and Reynolds numbers in the range Re=6 350 . In one case, simulation results show a reduced mass and momentum conservation compared to an equivalent double-precision LB implementation. All other cases demonstrate the utility of the Cell processor for fluid dynamics simulations. Benchmarks on two Cell-based platforms are performed, the Sony Playstation3 and the QS20/QS21 IBM blade, obtaining a speed-up factor of 7 and 21, respectively, compared to the original PC version of the code, and a conservative sustained performance of 28 gigaflops per single Cell processor. Our results suggest that choice of IEEE 754 rounding mode is possibly as important as double-precision support for this specific scientific application.
On the Feasibility of Wireless Multimedia Sensor Networks over IEEE 802.15.5 Mesh Topologies
Garcia-Sanchez, Antonio-Javier; Losilla, Fernando; Rodenas-Herraiz, David; Cruz-Martinez, Felipe; Garcia-Sanchez, Felipe
2016-01-01
Wireless Multimedia Sensor Networks (WMSNs) are a special type of Wireless Sensor Network (WSN) where large amounts of multimedia data are transmitted over networks composed of low power devices. Hierarchical routing protocols typically used in WSNs for multi-path communication tend to overload nodes located within radio communication range of the data collection unit or data sink. The battery life of these nodes is therefore reduced considerably, requiring frequent battery replacement work to extend the operational life of the WSN system. In a wireless sensor network with mesh topology, any node may act as a forwarder node, thereby enabling multiple routing paths toward any other node or collection unit. In addition, mesh topologies have proven advantages, such as data transmission reliability, network robustness against node failures, and potential reduction in energy consumption. This work studies the feasibility of implementing WMSNs in mesh topologies and their limitations by means of exhaustive computer simulation experiments. To this end, a module developed for the Synchronous Energy Saving (SES) mode of the IEEE 802.15.5 mesh standard has been integrated with multimedia tools to thoroughly test video sequences encoded using H.264 in mesh networks. PMID:27164106
On the Feasibility of Wireless Multimedia Sensor Networks over IEEE 802.15.5 Mesh Topologies.
Garcia-Sanchez, Antonio-Javier; Losilla, Fernando; Rodenas-Herraiz, David; Cruz-Martinez, Felipe; Garcia-Sanchez, Felipe
2016-05-05
Wireless Multimedia Sensor Networks (WMSNs) are a special type of Wireless Sensor Network (WSN) where large amounts of multimedia data are transmitted over networks composed of low power devices. Hierarchical routing protocols typically used in WSNs for multi-path communication tend to overload nodes located within radio communication range of the data collection unit or data sink. The battery life of these nodes is therefore reduced considerably, requiring frequent battery replacement work to extend the operational life of the WSN system. In a wireless sensor network with mesh topology, any node may act as a forwarder node, thereby enabling multiple routing paths toward any other node or collection unit. In addition, mesh topologies have proven advantages, such as data transmission reliability, network robustness against node failures, and potential reduction in energy consumption. This work studies the feasibility of implementing WMSNs in mesh topologies and their limitations by means of exhaustive computer simulation experiments. To this end, a module developed for the Synchronous Energy Saving (SES) mode of the IEEE 802.15.5 mesh standard has been integrated with multimedia tools to thoroughly test video sequences encoded using H.264 in mesh networks.
NASA Astrophysics Data System (ADS)
Yadav, Naresh Kumar; Kumar, Mukesh; Gupta, S. K.
2017-03-01
General strategic bidding procedure has been formulated in the literature as a bi-level searching problem, in which the offer curve tends to minimise the market clearing function and to maximise the profit. Computationally, this is complex and hence, the researchers have adopted Karush-Kuhn-Tucker (KKT) optimality conditions to transform the model into a single-level maximisation problem. However, the profit maximisation problem with KKT optimality conditions poses great challenge to the classical optimisation algorithms. The problem has become more complex after the inclusion of transmission constraints. This paper simplifies the profit maximisation problem as a minimisation function, in which the transmission constraints, the operating limits and the ISO market clearing functions are considered with no KKT optimality conditions. The derived function is solved using group search optimiser (GSO), a robust population-based optimisation algorithm. Experimental investigation is carried out on IEEE 14 as well as IEEE 30 bus systems and the performance is compared against differential evolution-based strategic bidding, genetic algorithm-based strategic bidding and particle swarm optimisation-based strategic bidding methods. The simulation results demonstrate that the obtained profit maximisation through GSO-based bidding strategies is higher than the other three methods.
IEEE Nuclear and Space Radiation Effects Conference: Notes on the Early Conferences
NASA Technical Reports Server (NTRS)
Pellish, Jonathan A.; Galloway, Kenneth F.
2013-01-01
This paper gathers the remembrances of several key contributors who participated in the earliest Institute of Electrical and Electronics Engineers (IEEE) Nuclear and Space Radiation Effects Conferences (NSREC).
33 CFR 183.5 - Incorporation by reference.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 08854: IEEE 45 IEEE Recommended Practice for Electrical Installations on Shipboard—1983. Cable..., Warrendale, PA 15096: SAE J378 Marine Engine Wiring—1984 § 183.430 SAE J557 High Tension Ignition Cable—1968...
An Analytical Model for the Performance Analysis of Concurrent Transmission in IEEE 802.15.4
Gezer, Cengiz; Zanella, Alberto; Verdone, Roberto
2014-01-01
Interference is a serious cause of performance degradation for IEEE802.15.4 devices. The effect of concurrent transmissions in IEEE 802.15.4 has been generally investigated by means of simulation or experimental activities. In this paper, a mathematical framework for the derivation of chip, symbol and packet error probability of a typical IEEE 802.15.4 receiver in the presence of interference is proposed. Both non-coherent and coherent demodulation schemes are considered by our model under the assumption of the absence of thermal noise. Simulation results are also added to assess the validity of the mathematical framework when the effect of thermal noise cannot be neglected. Numerical results show that the proposed analysis is in agreement with the measurement results on the literature under realistic working conditions. PMID:24658624
An analytical model for the performance analysis of concurrent transmission in IEEE 802.15.4.
Gezer, Cengiz; Zanella, Alberto; Verdone, Roberto
2014-03-20
Interference is a serious cause of performance degradation for IEEE802.15.4 devices. The effect of concurrent transmissions in IEEE 802.15.4 has been generally investigated by means of simulation or experimental activities. In this paper, a mathematical framework for the derivation of chip, symbol and packet error probability of a typical IEEE 802.15.4 receiver in the presence of interference is proposed. Both non-coherent and coherent demodulation schemes are considered by our model under the assumption of the absence of thermal noise. Simulation results are also added to assess the validity of the mathematical framework when the effect of thermal noise cannot be neglected. Numerical results show that the proposed analysis is in agreement with the measurement results on the literature under realistic working conditions.
IEEE 342 Node Low Voltage Networked Test System
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schneider, Kevin P.; Phanivong, Phillippe K.; Lacroix, Jean-Sebastian
The IEEE Distribution Test Feeders provide a benchmark for new algorithms to the distribution analyses community. The low voltage network test feeder represents a moderate size urban system that is unbalanced and highly networked. This is the first distribution test feeder developed by the IEEE that contains unbalanced networked components. The 342 node Low Voltage Networked Test System includes many elements that may be found in a networked system: multiple 13.2kV primary feeders, network protectors, a 120/208V grid network, and multiple 277/480V spot networks. This paper presents a brief review of the history of low voltage networks and how theymore » evolved into the modern systems. This paper will then present a description of the 342 Node IEEE Low Voltage Network Test System and power flow results.« less
IEEE 1451.2 based Smart sensor system using ADuc847
NASA Astrophysics Data System (ADS)
Sreejithlal, A.; Ajith, Jose
IEEE 1451 standard defines a standard interface for connecting transducers to microprocessor based data acquisition systems, instrumentation systems, control and field networks. Smart transducer interface module (STIM) acts as a unit which provides signal conditioning, digitization and data packet generation functions to the transducers connected to it. This paper describes the implementation of a microcontroller based smart transducer interface module based on IEEE 1451.2 standard. The module, implemented using ADuc847 microcontroller has 2 transducer channels and is programmed using Embedded C language. The Sensor system consists of a Network Controlled Application Processor (NCAP) module which controls the Smart transducer interface module (STIM) over an IEEE1451.2-RS232 bus. The NCAP module is implemented as a software module in C# language. The hardware details, control principles involved and the software implementation for the STIM are described in detail.
Utilization of Renewable Energy to Meet New National Challenges in Energy and Climate Change
DOE Office of Scientific and Technical Information (OSTI.GOV)
Momoh, James A.
The project aims to design a microgrid system to promote utilization of renewable energy resources such as wind and solar to address the national challenges in energy and climate change. Different optimization techniques and simulation software are used to study the performance of the renewable energy system under study. A series of research works performed under the grant Department of Energy (DOE) is presented. This grant opportunity affords Howard faculty, students, graduates, undergraduates, K-12, postdocs and visiting scholars to benefit state of the art research work. The research work has led to improve or advance understanding of new hardware technologies,more » software development and engineering optimization methods necessary and sufficient for handling probabilistic models and real-time computation and functions necessary for development of microgrid system. Consistent with State of Project Objective Howard University has partitioned the task into the following integrated activities: 1. Stochastic Model for RER and Load • Development of modeling Renewable Energy Resources (RER) and load which is used to perform distribution power flow study which leads to publication in refereed journals and conferences. The work was also published at the IEEE conference. 2. Stochastic optimization for voltage/Var • The development of voltage VAr optimization based on a review of existing knowledge in optimization led to the use of stochastic program and evolution of programming optimization method for V/VAr optimization. Papers were presented at the North America Power Systems Conference and the IEEE PES general meeting. 3. Modeling RER and Storage • Extending the concept of optimization method an RER with storage, such as the development of microgrid V/VAr and storage is performed. Several papers were published at the North America Power Systems Conference and the IEEE PES general meeting. 4. Power Game • Development of power game experiment using Labvolt to allow for hands on understanding of design and development of microgrid functions is performed. Publication were done by students at the end of their summer program. 5. Designing Microgrid Testbed • Example microgrid test bed is developed. In addition, function of the test bed are developed. The papers were presented at the North America Power Systems Conference and the IEEE general meeting. 6. Outreach Program • From the outreach program, topics from the project have been included in the revision of courses at Howard University, new book called Energy Processing and Smartgrid has being developed. • Hosted masters students from University of Denver to complete their projects with us. • Hosted high school students for early exposure for careers in STEM • Representations made in IEEE conferences to share the lessons learned in the use of micro grid to expose students to STEM education and research.« less
26 CFR 40.6302(c)-3 - Special rules for use of Government depositaries under chapter 33.
Code of Federal Regulations, 2010 CFR
2010-04-01
... pay over any tax imposed by chapter 33 may compute the amount of that tax to be deposited on the basis... adjustment results from a refusal to pay or inability to collect the tax and the uncollected tax has not been... paragraph (f)(3)(i) of this section (adjusted, if that amount is based on reasonable expectations, to...
2009-03-01
III. Methodology ...............................................................................................................26 Overview...applications relating to this research and the results they have obtained, as well as the background on LEEDR. Chapter 3 will detail the methodology ...different in that the snow dissipates faster and it is better to descend slower, at rates of 200 – 300 ft/min. 26 III. Methodology This chapter
NASA Astrophysics Data System (ADS)
Mayne, Richard
2015-03-01
Slime mould computing is an inherently multi-disciplinary subfield of unconventional computing that draws upon aspects of not only theoretical computer science and electronics, but also the natural sciences. This chapter focuses on the biology of slime moulds and expounds the viewpoint that a deep, intuitive understanding of slime mould life processes is a fundamental requirement for understanding -- and, hence, harnessing -- the incredible behaviour patterns we may characterise as "computation"...
A Novel Interdisciplinary Approach to Socio-Technical Complexity
NASA Astrophysics Data System (ADS)
Bassetti, Chiara
The chapter presents a novel interdisciplinary approach that integrates micro-sociological analysis into computer-vision and pattern-recognition modeling and algorithms, the purpose being to tackle socio-technical complexity at a systemic yet micro-grounded level. The approach is empirically-grounded and both theoretically- and analytically-driven, yet systemic and multidimensional, semi-supervised and computable, and oriented towards large scale applications. The chapter describes the proposed approach especially as for its sociological foundations, and as applied to the analysis of a particular setting --i.e. sport-spectator crowds. Crowds, better defined as large gatherings, are almost ever-present in our societies, and capturing their dynamics is crucial. From social sciences to public safety management and emergency response, modeling and predicting large gatherings' presence and dynamics, thus possibly preventing critical situations and being able to properly react to them, is fundamental. This is where semi/automated technologies can make the difference. The work presented in this chapter is intended as a scientific step towards such an objective.
Nature-Computer Camp 1991. Chapter 2 Program Evaluation Report.
ERIC Educational Resources Information Center
District of Columbia Public Schools, Washington, DC. Dept. of Research and Evaluation.
The District of Columbia Public Schools Nature Computer Camp (NCC) is an environmental/computer program which has been operating in the Catoctin Mountain Park (Maryland) since 1983. The camp operates for five one-week sessions serving a total of 406 regular sixth-grade students representing 84 elementary schools with an average of 81 students per…
The Nature-Computer Camp. Final Evaluation Report, 1982-1983. E.C.I.A. Chapter 2.
ERIC Educational Resources Information Center
District of Columbia Public Schools, Washington, DC. Div. of Quality Assurance.
This report presents a description and evaluation of the Nature-Computer Camp (NCC), an environmental and computer science program designed for sixth grade students in the District of Columbia public schools. Among the major components of the program were: planning for administration of operating the camp and for instruction in environmental…
The Nature-Computer Camp. Final Evaluation Report, 1984-1985. E.C.I.A. Chapter 2.
ERIC Educational Resources Information Center
District of Columbia Public Schools, Washington, DC. Div. of Quality Assurance.
This report presents a description and evaluation of the Nature-Computer Camp (NCC), an environmental and computer science program designed for sixth grade students in the District of Columbia public schools. Inputs, processes and outcomes based on a Planning, Monitoring and Implementing (PMI) Evaluation Model are reviewed for each of the four…
Nature-Computer Camp. Final Evaluation Report. E.C.I.A. Chapter 2.
ERIC Educational Resources Information Center
District of Columbia Public Schools, Washington, DC. Div. of Quality Assurance.
This report presents a description and evaluation of the Nature-Computer Camp (NCC), an environmental and computer science program designed for sixth grade students in the District of Columbia public schools. Inputs, processes and outcomes based on a Planning, Monitoring and Implementing (PMI) Evaluation Model are reviewed for each of the four…
Molecular Imaging and Contrast Agent Database (MICAD): evolution and progress.
Chopra, Arvind; Shan, Liang; Eckelman, W C; Leung, Kam; Latterner, Martin; Bryant, Stephen H; Menkens, Anne
2012-02-01
The purpose of writing this review is to showcase the Molecular Imaging and Contrast Agent Database (MICAD; www.micad.nlm.nih.gov ) to students, researchers, and clinical investigators interested in the different aspects of molecular imaging. This database provides freely accessible, current, online scientific information regarding molecular imaging (MI) probes and contrast agents (CA) used for positron emission tomography, single-photon emission computed tomography, magnetic resonance imaging, X-ray/computed tomography, optical imaging and ultrasound imaging. Detailed information on >1,000 agents in MICAD is provided in a chapter format and can be accessed through PubMed. Lists containing >4,250 unique MI probes and CAs published in peer-reviewed journals and agents approved by the United States Food and Drug Administration as well as a comma separated values file summarizing all chapters in the database can be downloaded from the MICAD homepage. Users can search for agents in MICAD on the basis of imaging modality, source of signal/contrast, agent or target category, pre-clinical or clinical studies, and text words. Chapters in MICAD describe the chemical characteristics (structures linked to PubChem), the in vitro and in vivo activities, and other relevant information regarding an imaging agent. All references in the chapters have links to PubMed. A Supplemental Information Section in each chapter is available to share unpublished information regarding an agent. A Guest Author Program is available to facilitate rapid expansion of the database. Members of the imaging community registered with MICAD periodically receive an e-mail announcement (eAnnouncement) that lists new chapters uploaded to the database. Users of MICAD are encouraged to provide feedback, comments, or suggestions for further improvement of the database by writing to the editors at micad@nlm.nih.gov.
Molecular Imaging and Contrast Agent Database (MICAD): Evolution and Progress
Chopra, Arvind; Shan, Liang; Eckelman, W. C.; Leung, Kam; Latterner, Martin; Bryant, Stephen H.; Menkens, Anne
2011-01-01
The purpose of writing this review is to showcase the Molecular Imaging and Contrast Agent Database (MICAD; www.micad.nlm.nih.gov) to students, researchers and clinical investigators interested in the different aspects of molecular imaging. This database provides freely accessible, current, online scientific information regarding molecular imaging (MI) probes and contrast agents (CA) used for positron emission tomography, single-photon emission computed tomography, magnetic resonance imaging, x-ray/computed tomography, optical imaging and ultrasound imaging. Detailed information on >1000 agents in MICAD is provided in a chapter format and can be accessed through PubMed. Lists containing >4250 unique MI probes and CAs published in peer-reviewed journals and agents approved by the United States Food and Drug Administration (FDA) as well as a CSV file summarizing all chapters in the database can be downloaded from the MICAD homepage. Users can search for agents in MICAD on the basis of imaging modality, source of signal/contrast, agent or target category, preclinical or clinical studies, and text words. Chapters in MICAD describe the chemical characteristics (structures linked to PubChem), the in vitro and in vivo activities and other relevant information regarding an imaging agent. All references in the chapters have links to PubMed. A Supplemental Information Section in each chapter is available to share unpublished information regarding an agent. A Guest Author Program is available to facilitate rapid expansion of the database. Members of the imaging community registered with MICAD periodically receive an e-mail announcement (eAnnouncement) that lists new chapters uploaded to the database. Users of MICAD are encouraged to provide feedback, comments or suggestions for further improvement of the database by writing to the editors at: micad@nlm.nih.gov PMID:21989943
Generalized Design Procedure for Short, Efficient Adiabatic Mode Converters
2016-05-20
Electron. Lett. 28, 1610–1611 (1992). 3. K. Kawano, M. Kohtoku, M. Wada, H. Okamoto, Y. Itaya, and M. Na- ganuma, IEEE J. Sel. Top. Quant . Electron. 2, 348...Burkhard, IEEE J. Sel. Top. Quant . Electron. 3, 1372–1383 (1997). Fig. 5. (a) Power in the fundamental mode as a function of propagation distance for 1...points). 5. I. Moerman, P. P. Van Daele, and P. M. Demeester, IEEE J. Sel. Top. Quant . Electron. 3, 1308–1320 (1997). 6. P. V. Studenkov, M. R. Gokhale
2007-01-01
IEEE JOURNAL OF OCEANIC ENGINEERING. VOL. 32. NO. 1. JANUARY 2007 103 Multibeam Observations of Mine Burial Near Clearwater, FL, Including...DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release; distribution is unlimited 20090522023 13. SUPPLEMENTARY NOTES IEEE Journal of Oceanic ...Z39.18 104 IEEE JOURNAL OF OCEANIC ENGINEERING. VOL. 32, NO. 1. JANUARY 2007 depth (m) 28°00’ N 27°58’ N 83°04’ W 83°02’ W 83°00’ W Fig. 1. Location
Molecular Simulation of Adsorption in Zeolites
NASA Astrophysics Data System (ADS)
Bai, Peng
Zeolites are a class of crystalline nanoporous materials that are widely used as catalysts, sorbents, and ion-exchangers. Zeolites have revolutionized the petroleum industry and have fueled the 20th-century automobile culture, by enabling numerous highly-efficient transformations and separations in oil refineries. They are also posed to play an important role in many processes of biomass conversion. One of the fundamental principles in the field of zeolites involves the understanding and tuning of the selectivity for different guest molecules that results from the wide variety of pore architectures. The primary goal of my dissertation research is to gain such understanding via computer simulations and eventually to reach the level of predictive modeling. The dissertation starts with a brief introduction of the applications of zeolites and computer modeling techniques useful for the study of zeolitic systems. Chapter 2 then describes an effort to improve simulation efficiency, which is essential for many challenging adsorption systems. Chapter 3 studies a model system to demonstrate the applicability and capability of the method used for the majority of this work, configurational-bias Monte Carlo simulations in the Gibbs ensemble (CBMC-GE). After these methodological developments, Chapter 4 and 5 report a systematic parametrization of a new transferable force field for all-silica zeolites, TraPPE-zeo, and a subsequent, relatively ad-hoc extension to cation-exchanged aluminosilicates. The CBMC-GE method and the TraPPE-zeo force field are then combined to investigate some complex adsorption systems, such as linear and branched C6-C 9 alkanes in a hierarchical microporous/mesoporous material (Chapter 6), the multi-component adsorption of aqueous alcohol solutions (Chapter 7) and glucose solutions (Chapter 8). Finally, Chapter 9 describes an endeavor to screen a large number of zeolites with the purpose of finding better materials for two energy-related applications, ethanol/water separation and hydrocarbon iso-dewaxing.
Regional Value Analysis at Threat Evaluation
2014-06-01
targets based on information entropy and fuzzy optimization theory. in Industrial Engineering and Engineering Management (IEEM), 2011 IEEE...Assignment by Virtual Permutation and Tabu Search Heuristics. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, 2010