Prototypes Research Papers - Academia.edu (original) (raw)

Ocean energy is a well-invested renewable energy resource. Although proven technologies for energy generation from the ocean exist, most of the developed systems are yet to be combined with storage devices for later use. In this paper,... more

Ocean energy is a well-invested renewable energy resource. Although proven technologies for energy generation from the ocean exist, most of the developed systems are yet to be combined with storage devices for later use. In this paper, three different energy conversion projects are described with prototypes for generating electricity from the ocean waves, currents and tides. Each project builds on the lessons learned from the previous, and involves incremental improvements towards the goal to store the generated electricity to be used afterwards. The small-scale prototypes reveal both promises and challenges of sustainable energy conversion devices and necessary storage technologies to be useful at large scale.

This paper presents a new intensity-to-time processing paradigm suitable for very large scale integration (VLSI) computational sensor implementation of global operations over sensed images. Global image quantities usually describe images... more

This paper presents a new intensity-to-time processing paradigm suitable for very large scale integration (VLSI) computational sensor implementation of global operations over sensed images. Global image quantities usually describe images with fewer data. When computed at the point of sensing, global quantities result in a low-latency performance due to the reduced data transfer requirements between an image sensor and a processor. The global quantities also help global top-down adaptation: the quantities are continuously computed on-chip, and are readily available to sensing for adaptation. As an example, we have developed a sorting image computational sensor-a VLSI chip which senses an image and sorts all pixel by their intensities. The first sorting sensor prototype is a 21 2 2 2 26 array of cells. It receives an image optically, senses it, and computes the image's cumulative histogram-a global quantity which can be quickly routed off chip via one pin. In addition, the global cumulative histogram is used internally on-chip in a top-down fashion to adapt the values in individual pixel so as to reflect the index of the incoming light, thus computing an "image of indices." The image of indices never saturates and has a uniform histogram.

The Vehicular Delay-Tolerant Networks (VTDN) project proposed a novel architecture for VDTN. Besides positioning the bundle layer below the network layer, it employs out-of-band signaling and devises the separation of the control plane... more

The Vehicular Delay-Tolerant Networks (VTDN) project proposed a novel architecture for VDTN. Besides positioning the bundle layer below the network layer, it employs out-of-band signaling and devises the separation of the control plane and data plane. A laboratory prototype was created to demonstrate this approach. The project also developed new applications, fragmentation mechanisms, content storage and retrieval mechanisms, dropping and scheduling policies, and routing protocols for VDTNs.

An enormous challenge when the Internet matured into a mainstream technology was meeting the information technology workforce needs in a competitive business environment. In anticipation of a similar scenario for upcoming grid technology... more

An enormous challenge when the Internet matured into a mainstream technology was meeting the information technology workforce needs in a competitive business environment. In anticipation of a similar scenario for upcoming grid technology we are in the process of implementing a comprehensive multitier NSF-supported adaptation of grid technology in education. The project addresses the above mentioned challenge at three important levels of our educational system: the undergraduate, the graduate and the industrial training. Our grid technology-based curriculum has been developed for a sequence of two new courses for senior level undergraduates. The same courses would be taught at the graduate level with emphasis on research. Additionally, seminars are planned for spreading grid awareness to the local businesses and industries by using domain-dependent grid applications. This paper presents the details of the model we call GridForce (Grid For Research, Collaboration and Education) and our experiences with its implementation, with the objective of improving the technical preparedness of the workforce for the grid.

Policies can be used to customize a wide range of system behavior. People must have usable tools in order to author and maintain high-quality policies. In this paper we discuss policy templates as a mechanism for assisting people in... more

Policies can be used to customize a wide range of system behavior. People must have usable tools in order to author and maintain high-quality policies. In this paper we discuss policy templates as a mechanism for assisting people in policy authoring and as a means for connecting policy elements to system entities. We believe that policy templates can be leveraged to make policy authoring more usable and to provide consistent policy authoring interfaces across a wide variety of policy types. Templates give users a structured format for creating policies which capture their intentions; however, a general approach for the creation of policy templates or for associating policy elements with the system implementation has not been described in published research to date. The existing methods for creating policy templates require significant programming expertise. Based on research in policy management, we propose an iterative policy refinement process based on policy templates. This process consists of at least three user roles and spans policy authoring, template authoring, and policy element definition. We designed a GUI-based prototype that enables users to create policy templates. We conducted an empirical user study with 20 participants who used the prototype to create templates to cover sets of policies that were presented in scenarios in the e-commerce and social networking domains. The participants successfully created the templates, and used three different strategies in their approach to the task. In this paper we describe our proposed template-based policy refinement process, the policy template authoring prototype and the user study.

This paper focuses on the importance of test driven development, in an interdisciplinary academic case study, involving unauthorized access and fraud. In it, Problem Based Learning (PBL) enabled the organization of an environment for... more

This paper focuses on the importance of test driven development, in an interdisciplinary academic case study, involving unauthorized access and fraud. In it, Problem Based Learning (PBL) enabled the organization of an environment for diverse knowledge and skills, favorable to experimentation and prototyping of new models, methods, techniques, and tools. The application of the principles of agile methods aimed at overcoming difficulties related to the computer systems development, such as requirement changes, uncertainties, and risks, in order to improve quality. Unlike traditional methodologies, tests were used since the beginning of the development lifecycle with Acceptance Test Driven Development (ATDD). The agile testing quadrants guided the categorized elaboration of tests during unit testing, integration testing, system testing, and acceptance testing phases. The main contribution of this article was the integrated application of PBL, ATDD, and agile development in the case study of a Real-Time Embedded System for Unauthorized Access Control and Fraud Detection (Sistema Embarcado de Tempo Real para Controle de Acessos Indevidos e Deteccao de Fraudes-SETRAIF).

The paper presents some tests in the field of through-hole plating process using special solderable conductive pastes in order to metallize the barrel of drilled holes for vias. The process consists of dispensing the special paste into... more

The paper presents some tests in the field of through-hole plating process using special solderable conductive pastes in order to metallize the barrel of drilled holes for vias. The process consists of dispensing the special paste into holes, absorption of paste from them, keeping inside only the necessary quantity for metallization, and curing the paste into a regular hot-air oven at 160°C for 30 minutes. The process is appropriate for small/medium quantity of vias (less than 400) and FR4 substrate. The contact resistance, specified by producer as 150 mΩ, will be analyzed. In addition, pastes shall be evaluated as soldering materials destined for contacting the SMDs onto the printed circuit boards.

Abstract—Forensic analysis of a suspect program is a daily challenge encounters forensic analysts and law-enforcement. It requires determining the behavior of a suspect program found in a computer system subject to investigation and... more

Abstract—Forensic analysis of a suspect program is a daily challenge encounters forensic analysts and law-enforcement. It requires determining the behavior of a suspect program found in a computer system subject to investigation and attempting to reconstruct actions that have been invoked in the system. In this research paper, a forensic analysis approach for suspect programs in an executable binary form is introduced. The proposed approach aims to reconstruct high level forensic actions and approximate action arguments from low level machine instructions; That is, reconstructed actions will assist in forensic inferences of evidence and traces caused by an action invocation in a system subject to forensics investigation.

Growing convergence among mobile computing devices and embedded technology sparks the development and deployment of "context-aware" applications, where location is the most essential context. In this paper we present LANDMARC, a location... more

Growing convergence among mobile computing devices and embedded technology sparks the development and deployment of "context-aware" applications, where location is the most essential context. In this paper we present LANDMARC, a location sensing prototype system that uses Radio Frequency Identification (RFID) technology for locating objects inside buildings. The major advantage of LANDMARC is that it improves the overall accuracy of locating objects by utilizing the concept of reference tags. Based on experimental analysis, we demonstrate that active RFID is a viable and cost-effective candidate for indoor location sensing. Although RFID is not designed for indoor location sensing, we point out three major features that should be added to make RFID technologies competitive in this new and growing market.

As simulator-based training systems become more complex, the amount of effort required to generate, monitor, and maintain training exercises multiplies greatly. This has significantly increased the burden on the instructors, potentially... more

As simulator-based training systems become more complex, the amount of effort required to generate, monitor, and maintain training exercises multiplies greatly. This has significantly increased the burden on the instructors, potentially making the training experience less efficient as well as less effective. Research on intelligent tutoring systems (ITS) has largely addressed this issue by replacing the instructor with a computer model of the appropriate pedagogical concepts and the domain expertise. While this approach is highly desirable, the effort required to develop and maintain an ITS can be quite significant. A more modest as well as practical alternative to an ITS is the development of intelligent computer-based tools that can support the instructors in their tasks. The advantage of this approach is that various tools can be developed to address the different aspects of the instructor's duties. Moreover, without the burden of having to repace the instructor, these tools are more easily developed and fielded in existing trainers. One aspect of an instructor's task is to assess the students' performance after each training exercise and select the next exercise based on their previous performances. It would clearly be advantageous if this exercise selection process were to be automated, thus relieving the instructor of a significant burden and allowing him to concentrate on other tasks. Therefore, the focus of this paper is the development of a stand-alone system capable of determining exercise progression and remediation automatically during a training session in a simulator-based trainer, on the basis of the students's past performance. Instructional heuristics were developed to carry out the exercise progression process. A prototype was developed and applied to gunnery training on the Army M1 main battle tank. I. PROBLEM STATEMENT AND OBJECTIVE OF RESEARCH NTELLIGENT tutoring systems (ITS) are generally devel-I oped to take the place of the instructor. Ideally, by having no human instructor, the efficiency of an instructor is increased infinitely. Control of the progression of exercises, evaluation of performance, feedback to student, and student record update are some of the functions that can be automated by an ITS. However, the level of effort required to develop and field a full ITS can be quite high and therefore very costly, especially when applied to previously existing simulator-based trainers. This paper presents the concept of an Intelligent instructor Support System (ZZSS) [l] as an alternative to an ITS for simulator-based training. Rather than replace the isntructor, IISS provides the tools for automating various facets of an Manuscript

Learning Vector Quantization (LVQ) is a popular class of nearest prototype classifiers for multiclass classification. Learning algorithms from this family are widely used because of their intuitively clear learning process and ease of... more

Learning Vector Quantization (LVQ) is a popular class of nearest prototype classifiers for multiclass classification. Learning algorithms from this family are widely used because of their intuitively clear learning process and ease of implementation. They run efficiently and in many cases provide state of the art performance. In this paper we propose a modification of the LVQ algorithm that addresses problems of determining appropriate number of prototypes, sensitivity to initialization, and sensitivity to noise in data. The proposed algorithm allows adaptive addition of prototypes at potentially beneficial locations and removal of harmful or less useful prototypes. The prototype addition and removal steps can be easily implemented on top of the many existing LVQ algorithms. Experimental results on synthetic and benchmark datasets showed that the proposed modifications can significantly improve LVQ classification accuracy while at the same time determining the appropriate number of prototypes and avoiding the problems of initialization.

This paper uses a traditional compiler architecture to discuss how a transformation component can be integrated in CASE tools. The architecture outlines some general requirements to the transjbrmatwn component as well as to the source and... more

This paper uses a traditional compiler architecture to discuss how a transformation component can be integrated in CASE tools. The architecture outlines some general requirements to the transjbrmatwn component as well as to the source and the target language. To illustrate this approach, the PPP environment is presented. Within this environment several transformations from PPP models to programs have been implemented. A specifrc t,ransformationfrom PPP models to TEQUELIC is discussed with reference to the compiler architecture.

We introduce the continuous convergence protocol for handling locally committed and possibly concurrent updates to replicated data objects in distributed real-time databases. The protocol is designed for systems where replicated database... more

We introduce the continuous convergence protocol for handling locally committed and possibly concurrent updates to replicated data objects in distributed real-time databases. The protocol is designed for systems where replicated database objects are used to share data between collaborating real-time applications. We define the properties of the protocol, and describe how it can be implemented using data structures such as version vectors and conflict sets. We also show how applications can exploit the protocol's properties, and how the protocol supports forward resolution of update conflicts.

A novel method of parametric active contours with geometric shape prior is presented in this paper. The main idea of the method consists in minimizing an energy function that includes additional information on a shape reference called a... more

A novel method of parametric active contours with geometric shape prior is presented in this paper. The main idea of the method consists in minimizing an energy function that includes additional information on a shape reference called a prototype. Shape prior introduced through a similarity measurement between evolving contour and Procrustes mean shape of desired object. This similarity measurement is full Procrustes distance between these two contours that is invariant with respect to similarity transformations (translation, scaling, and rotation). This extra shape knowledge enhances the model robustness to noise, occlusion and complex background. We also use gradient direction information in addition to gradient magnitude for more robustness to complex background. In this paper we introduce one important application of this new snake "3D object tracking". We obtain promising results for 3D object tracking which show the robustness of our method against noise, complex background, similarity transformations, occlusion, and changing viewpoint of 3D object.

Fidelity is one of the most important parameters to consider when dealing with prototypes, which affect the related costs and performances. Current literature contributions often rely on generic definitions of Fidelity based on the... more

Fidelity is one of the most important parameters to consider when dealing with prototypes, which affect the related costs and performances. Current literature contributions often rely on generic definitions of Fidelity based on the concept of closeness. However, the review performed in this paper revealed that Fidelity is a more complex concept, which considers (at least) eight main dimensions, mutually interrelated, and potentially characterized by many other potential sub-dimensions. The identified set has been applied to an industrial case study were a real engineering prototype has been assessed in terms of Fidelity. In particular, the case study application shows how the different dimensions can be interrelated each other. Furthermore, some important research hints have been highlighted in this paper, where the identified set of Fidelity dimensions paves the way for the related future activities.

DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page... more

DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page numbers. Link to publication General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal. If the publication is distributed under the terms of Article 25fa of the Dutch Copyright Act, indicated by the "Taverne" license above, please follow below link for the End User Agreement:

As a part of the Cyber Command and Control (CC2) initiative within the Information Assurance and Survivability program, DARPA is sponsoring development of a prototype Intelligence Preparation of the Information Battlespace (IPIB)... more

As a part of the Cyber Command and Control (CC2) initiative within the Information Assurance and Survivability program, DARPA is sponsoring development of a prototype Intelligence Preparation of the Information Battlespace (IPIB) application. This effort attempts to map the kinetic warfare Intelligence Preparation of the Battlespace (IPB) process to cyber defense. This project addresses three issues: whether it is feasible to identify cyberspace analogs for kinetic concepts such as terrain, weather, and adversary doctrine; whether an IPIB prototype would assist analysts to perform cyberspace IPB, and whether IPIB improves cyber defenses. The CC2 team conducted a whiteboard experiment to address the third, efficacy issue. This paper describes the experimental process, hypotheses to be tested, conduct of the experiment, results, and conclusions. We provide some lessons learned that should be of interest to the Information Assurance (IA) community at large.

In this paper, the verification strategy of PROVER environment is presented. The PROVER system (PROduction system for hardware VERification) is implemented using CLIPS (C Language Integrated Production System). PROVER is a rulebased... more

In this paper, the verification strategy of PROVER environment is presented. The PROVER system (PROduction system for hardware VERification) is implemented using CLIPS (C Language Integrated Production System). PROVER is a rulebased framework for formal hardware verification. The environment supports verification at different levels of hardware specification. Verification strategy is illustrated in this paper using Carry select adder as a case study. Ref er en c e s (1) Elleithy, "Formal Hardware Verification: of VLSI Architectures: Current Status and Future directions" in T I-PC3.3

The selection and scheduling of a portfolio of projects is a task frequently found among the strategical activities performed by management staff in several industries. When choosing a project to be selected and scheduled into a... more

The selection and scheduling of a portfolio of projects is a task frequently found among the strategical activities performed by management staff in several industries. When choosing a project to be selected and scheduled into a portfolio, managers have to deal with conflicting criteria, resource constraints, distinct scenarios, and changes during the planning and execution phases. In this work, we describe the functionalities of a decision support system (DSS) prototype designed to help managers make better decisions, when constructing a portfolio of projects. The DSS software was developed to solve portfolio selection problems originating at a large corporation in the power generation industry. It implements a heuristic algorithm, which finds solutions at least 10% better than a manually produced solution for a real-world input instance.

Signs are everywhere in our lives. They make our lives easier when we are familiar with them. But sometimes they also pose problems. For example, a tourist might not be able to understand signs in a foreign country. In this paper, we... more

Signs are everywhere in our lives. They make our lives easier when we are familiar with them. But sometimes they also pose problems. For example, a tourist might not be able to understand signs in a foreign country. In this paper, we present our efforts towards automatic sign translation. We discuss methods for automatic sign detection. We describe sign translation using example based machine translation technology. We use a usercentered approach in developing an automatic sign translation system. The approach takes advantage of human intelligence in selecting an area of interest and domain for translation if needed. A user can determine which sign is to be translated if multiple signs have been detected within the image. The selected part of the image is then processed, recognized, and translated. We have developed a prototype system that can recognize Chinese signs input from a video camera which is a common gadget for a tourist, and translate them into English text or voice stream.

Much research in traceability has focused on following requirements and features over the early phases of the software lifecycle. There has been comparatively little work on traceability into later phases and artifacts. In this paper, we... more

Much research in traceability has focused on following requirements and features over the early phases of the software lifecycle. There has been comparatively little work on traceability into later phases and artifacts. In this paper, we tackle the problem of traceability across artifacts, including documents and source code, and maintaining traceability links through successive changes. We have developed Zelda, a prototype for associating arbitrary lines in text-based files with a feature map. This representation can be used to link together sections from many types of artifacts and can also contain annotations and notes. Zelda automatically tracks and presents the locations of these links in subsequent versions of the artifacts. We evaluated Zelda using 25 versions of jEdit, (260 KLOC). The overall precision for 419 links across the five features was 0.90 and the recall was 0.73. The average precision and recall per features is 0.78 and 0.69 respectively.

Information retrieval technology has been central to the success of the Web. For semantic web documents or annotations to have an impact, they will have to be compatible with Web based indexing and retrieval technology. We discuss some of... more

Information retrieval technology has been central to the success of the Web. For semantic web documents or annotations to have an impact, they will have to be compatible with Web based indexing and retrieval technology. We discuss some of the underlying problems and issues central to extending information retrieval systems to handle annotations in semantic web languages. We also describe three prototype systems that we have implemented to explore these ideas.

A new capacitance sensor system was developed with a microcontroller, commercial humidity and temperature sensors, a capacitance-to-digital converter, and a custom-built capacitance sensor. The performance of the system was evaluated by... more

A new capacitance sensor system was developed with a microcontroller, commercial humidity and temperature sensors, a capacitance-to-digital converter, and a custom-built capacitance sensor. The performance of the system was evaluated by simulation and testing of the prototype. The impact of variations of ambient conditions on the system performance was analyzed, and a model for correcting the humidity and temperature influence was developed. Based on the experimental results obtained in an uncontrolled environment using a standard capacitor of 1 pF, the 24-h stability of the system was estimated to be within 30 parts in 10 6 . The high stability and sensitivity of the system allow its effective use in object-detection applications. Several sensors were constructed and evaluated while sensing various materials under different scenarios.

SUNDR is a network file system designed to store data securely on untrusted servers. SUNDR lets clients detect any attempts at unauthorized file modification by malicious server operators or users. SUNDR's protocol achieves a property... more

SUNDR is a network file system designed to store data securely on untrusted servers. SUNDR lets clients detect any attempts at unauthorized file modification by malicious server operators or users. SUNDR's protocol achieves a property called fork consistency, which guarantees that clients can detect any integrity or consistency failures as long as they see each other's file modifications. An implementation is described that performs comparably with NFS (sometimes better and sometimes worse), while offering significantly stronger security.

this paper we introduce ourinteractive movie system by focusing on how weachieved an integration of narrative-based and spontaneousinteractions. Also, there is the important question:what is the objective of creating interactive... more

this paper we introduce ourinteractive movie system by focusing on how weachieved an integration of narrative-based and spontaneousinteractions. Also, there is the important question:what is the objective of creating interactive animatedagents? Although the technological aspects ofsuch agents have been studied and discussed in detail,this critical question has rarely been discussed. In thelatter part of this paper, we will discuss what

Abslruct-The paper describes a Genetic Algorithm for the Floorplan Area Optimization problem. The algorithm is based on suitable techniques for solution encoding and evaluation function definition, effective cross-over and mutation... more

Abslruct-The paper describes a Genetic Algorithm for the Floorplan Area Optimization problem. The algorithm is based on suitable techniques for solution encoding and evaluation function definition, effective cross-over and mutation operators, and heuristic operalors which further improve the method's effectiveness. An adaptive approach automatically provides the optimal values for the activation probabillities of the operators. Experimental results show that the prloposed method is competitive with the most effective ones as far as the CPU time requirements and the result accuracy is considered, but it also presents some advantages. It requires a limited amount of memory, it is not sensible to special structures which are critical for other methods, and has a comlplexity which grows linearly with the number of implementations. Finally, we demonstrate that the method is able to handle floorplans much larger (in terms of number of basic rectangles) than any benchmark previously considered in the literature.

We present a novel approach to prototyping asynchronous circuits which uses clocked field programmable gate arrays (FPGA's). Unlike other proposed techniques for implementing asynchronous circuits on FPGA's, our method does not attempt to... more

We present a novel approach to prototyping asynchronous circuits which uses clocked field programmable gate arrays (FPGA's). Unlike other proposed techniques for implementing asynchronous circuits on FPGA's, our method does not attempt to preserve the pure asynchronous nature of the circuit. Rather, it preserves the communication behavior of the circuits and uses synchronous duals for common asynchronous modules.

Part of designing any system requires the development of an architecture on which the system and subsequent implementations are based. The architecture will vary depending on the requirements. For a healthcare monitoring application the... more

Part of designing any system requires the development of an architecture on which the system and subsequent implementations are based. The architecture will vary depending on the requirements. For a healthcare monitoring application the researchers developed a four-tiered architecture that consists of the following layers: user interface, process management, database and sensor network. In this paper, the authors present their layered architecture for remote healthcare monitoring of aged and infirm persons and illustrate its advantages by describing their latest prototype which is called MoteCare. They also discuss the direction the researchers intend to take for the development of their fourth prototype, paying particular attention to the use of open source databases, the issue of security in the development of mote sensor networks (MSN) and the advantages of linking such systems with wireless broadband to enable potential users to achieve more mobility options.

Most recommender systems present recommended products in lists to the user. By doing so, much information is lost about the mutual similarity between recommended products. We propose a graphical shopping interface, which represents the... more

Most recommender systems present recommended products in lists to the user. By doing so, much information is lost about the mutual similarity between recommended products. We propose a graphical shopping interface, which represents the mutual similarities of the recommended products in a two dimensional space, where similar products are located close to each other and dissimilar products far apart. The graphical shopping interface can be used to navigate through the complete product space in a number of steps. We show a prototype application of the system to MP3-players.

The aim of this work is to measure the barrier synchronization influence on the overall pevormance of several application programs. In order to do that, we use the MPICH implementation [ I ] version 1.1 of the MPI library. Moreover, we... more

The aim of this work is to measure the barrier synchronization influence on the overall pevormance of several application programs. In order to do that, we use the MPICH implementation [ I ] version 1.1 of the MPI library. Moreover, we choose two barrier synchronization solutions: the MPICH software solution, i.e. the MPI-Barrier routine, and the TTL-PAPERS hardware solution [ 2 ]. The last one was implemented as a collective operation in MPICH we called MPI-Papers. Finally, we compare the execution time of MPI programs using the MPI-Barrier and MPI-Papers routines. Our testing environment consists of a cluster of 8 Dual Pentium Pro processors interconnected via both IOMb/s ethemet network and a TTL-PAPERS prototype. We use two kinds of MPI programs: test programs that p e~o r m few messages into the network and local calculations, and scientific calculation programs that carry out date exchange and local calculations.

Branch prediction schemes have become an integral part of today's superscalar processors. They are one of the key issues in enhancing the performance of processors. Pipeline stalls due to conditional branches are one of the most... more

Branch prediction schemes have become an integral part of today's superscalar processors. They are one of the key issues in enhancing the performance of processors. Pipeline stalls due to conditional branches are one of the most significant impediments to realise the performance potential of superscalar processors. Many schemes for branch prediction, that can effectively and accurately predict the outcome of branch instructions have been proposed. In this paper, an overview of some dynamic branch prediction schemes for superscalar processors are presented. . His main research interests are in algorithms, computational complexity and parallel computing.

: Qualitative accelerated test methods improve system reliability by identifying and removing initial design flaws. However, schedule and cost constraints often preclude sufficient testing to generate a meaningful reliability estimate... more

: Qualitative accelerated test methods improve system reliability by identifying and removing initial design flaws. However, schedule and cost constraints often preclude sufficient testing to generate a meaningful reliability estimate from the data obtained in these tests. In this dissertation a modified accelerated life test is proposed to assess the likelihood of attaining a reliability requirement based on tests of early system prototypes. Assuming each prototype contains an unknown number of independent competing failure modes whose respective times to occurrence are governed by a distinct Weibull law, the observed failure data from this qualitative test are shown to follow a poly-Weibull distribution. However, using an agent-based Monte Carlo simulation, it is shown that for typical products subjected to qualitative testing, the failure observations result from a homogenous subset of the total number of latent failure modes and the failure data can be adequately modeled with a ...

This article asks the following: How does a teacher use a metaphor in relation to a prototypical image to help students remember a set of theorems? This question is analyzed through the case of a geometry teacher. The analysis uses... more

This article asks the following: How does a teacher use a metaphor in relation to a prototypical image to help students remember a set of theorems? This question is analyzed through the case of a geometry teacher. The analysis uses Duval's work on the apprehension of diagrams to investigate how the teacher used a metaphor to remind students about the heuristics involved when applying a set of theorems during a problem-based lesson. The findings show that the teacher used the metaphor to help students recall the apprehensions of diagrams when applying several theorems. The metaphor was instrumental for mediating students' work on a problem and the proof of a new theorem. The findings suggest that teachers' use of metaphors in relation to prototypical images may facilitate how they organize students' knowledge for later retrieval.

Ambient Intelligent Systems have been proposed for their potential to track collaborative activities in the workplace, capture them, and in real time respond to them. The longer term goal is to develop embedded technologies that provide... more

Ambient Intelligent Systems have been proposed for their potential to track collaborative activities in the workplace, capture them, and in real time respond to them. The longer term goal is to develop embedded technologies that provide intelligent feedback in predictable office environments but also address the unpredictable working environments of nomadic knowledge workers and of remote workers engaged in virtual collaboration with those physically present. Some of these systems are relatively close to market and others are less immediately applicable. This paper suggests that a heterogeneous mix of such systems is likely to be necessary for some time to come. A prototype real time location system for mapping the real-time location of workers in offices has been developed by Johnson Controls. During tests it has been found to positively assist in gathering information for better management of space and support of collaborative activity. This has proved to justify the costs.

Kutatási eredményeink "terméke" egy egyedülálló prototípus egy vegán golyó és hamburger készítő automata berendezés. A fejlesztés technológiai eredménye egy új, tesztelt prototípus. Intelligens gyártási innovációt tartalmaz a prototípus... more

Kutatási eredményeink "terméke" egy egyedülálló prototípus egy vegán golyó és hamburger készítő automata berendezés. A fejlesztés technológiai eredménye egy új, tesztelt prototípus. Intelligens gyártási innovációt tartalmaz a prototípus egésze, de külön kiemelnénk az új típusú keverő egységet, mely az alapanyagot vákuum alatt főzi, homogenizálja. Kiemelendő még a formázó egység, ahol a súlyadagolás után megfelelően szép alakot formázunk. Így speciálisan a növényi anyag súlyának és textúrájának megfelelő módszerrel végezzük el a termék formázását, úgy, hogy utána azt a technológia a sütési, sokkolási, hűtési és csomagolási folyamaton a lehető leggyorsabban átviszi. Technológia és termék szinten is arra kutatási eredményre jutottunk, hogy olyan technológia szükséges, ami a termék eltarthatóságát növelni tudja. Így a hűtés és vákuumos-védőgázas csomagolás (beadagolókkal) helyett a terméket fagyasztjuk, ezáltal az eltarthatóság 3 hónapról 1 évre lett növelhető. 2018.év vége és 2019 év vége között közötti időszakban folyamatosan zajlottak a prototípus kísérletek, eltarthatósági és beltartalmi vizsgálatokkal együtt. Az eredetileg tervezett növényi burger fejlesztési irány a mai divatos trendeknek megfelelően mind ízben, mind állagban egy húsimitációsabb irányt vett. Az eredetileg tervezett köleses és hajdinás irány megmaradt, illetve további receptek is születtek a fejlesztések során. A kísérleti gyártások eredményeképpen kifejlesztésre kerültek a vegán termékek első körös, tesztelésre alkalmas receptúrái, melyek működőképesek voltak. A technológia kapcsán viszont megállapítást nyert, hogy a piac egyre jobban elhatárolódik az olajban történő kisütéstől, ezért kontakt grill technológia irányába fordultunk. Valamint ahhoz, hogy a napjainkban divatos, jelenleg nagyon felkapott hús jellegű textúrát elérjük (beyond meat) a receptúrában szereplő vizet, zsírt, keményítőt és egyéb adalékanyagokat emulgeáltuk, így és egy magas szintű homogenizációt értünk el. A technológiai eljárás során az anyag előkészítésben a vákuumos keverés helyett emulziós vákuumos keverés történik a húsjellegűbb textúra elérése érdekében

This paper deals with the problem of digital visual inspection of thin-film disk heads. We will present machine vision algorithms and a supporting architecture that are integrated in a fully automated prototype system for disk head... more

This paper deals with the problem of digital visual inspection of thin-film disk heads. We will present machine vision algorithms and a supporting architecture that are integrated in a fully automated prototype system for disk head inspection. We will also elaborate on some specific methods, such as computation of the Hough transform and multicode masks in pipeline architectures, object segmentation in textured backgrounds, and matching of extracted defects with inspection specifications. Extensive experimented results will also be given.

This paper describes the concept of sensor networks which has been made viable by the convergence of microelectro-mechanical systems technology, wireless communications and digital electronics. First, the sensing tasks and the potential... more

This paper describes the concept of sensor networks which has been made viable by the convergence of microelectro-mechanical systems technology, wireless communications and digital electronics. First, the sensing tasks and the potential sensor networks applications are explored, and a review of factors influencing the design of sensor networks is provided. Then, the communication architecture for sensor networks is outlined, and the algorithms and protocols developed for each layer in the literature are explored. Open research issues for the realization of sensor networks are also discussed. Ó 2002 Published by Elsevier Science B.V.

In this paper we displayed the problematic of spring design, with usage of CAD/CAE (Computer Aided Design/Computer Aided Engineering) methods. Spring 3D (Three-dimensional) parametric modeling is performed in CATIA (Computer Aided... more

In this paper we displayed the problematic of spring design, with usage of CAD/CAE (Computer Aided Design/Computer Aided Engineering) methods. Spring 3D (Three-dimensional) parametric modeling is performed in CATIA (Computer Aided Three-dimensional Interactive Application) software for purposes of achieving fast manipulation of spring geometry, so various spring variants can be made. Using the same software, FEM (Finite Element Method) analysis is used to determine maximum stresses and deflections. Utility of developed parametrized spring system is best reflected for cases of new spring design, where new geometric and FEM models are created with simple parameter application and update feature. This research resulted in spring prototyping with utilization of 3D printing techniques and spring manufacturing.

This work describes part of a novel approach employed at the authors' institution in the last five years, which comprises the teaching of computer organization/ architecture through the effective implementation of processors and... more

This work describes part of a novel approach employed at the authors' institution in the last five years, which comprises the teaching of computer organization/ architecture through the effective implementation of processors and computers. The context of the courses is presented first, including a comparison of two hardware courses tracks in Computer Science and Computer Engineering curricula. Previous publications have described the structure of courses dealing with the minimal implementation of a working processor. Here, the emphasis is on subsequent courses, which take the minimal implementation and guide the students through the necessary steps to add performance, such as pipelining, and functionality, such as memory management and basic IO subsystems.

This paper discusses the contribution and use of the value chain component within a prototype decision support system (DSS). Here we focus on the inclusion of Porter's value chain within the general design of the DSS for a purchasing... more

This paper discusses the contribution and use of the value chain component within a prototype decision support system (DSS). Here we focus on the inclusion of Porter's value chain within the general design of the DSS for a purchasing manager in the Norwegian wood processing industry. We will discuss the value chain and cost driver parameters as well as those design principles that we found significant for the creation, inclusion, visualization, and use of the value system. We will summarize related research that we conducted concerning the analysis and diagnosis of decision processes for this particular decision maker and his organization and the formulation of a prescriptive model. We then will discuss some of the general design and implementation features of our prototype DSS. The goal of this DSS is to present a tool for the decision maker that addresses qualitative decision making and improve the user's mental model and modeling capacity.