Now showing items 102-121 of 141

  • Optimizing multi-agent dynamics for underwater tactical applications. 

    Yu, Albert R. (2011-05-12)
    Large groups of autonomous agents, or swarms, can exhibit complex emergent behaviors that are difficult to predict and characterize from their low-level interactions. These emergent behaviors can have hidden implications ...
  • The Parallel Technique Software Package 

    Maurer, Peter M. (2009-11-13)
    This is the software described in the technical report “Two New Techniques for Unit-Delay Compiled Simulation” available from this archive. This package is part of the FHDL system and must be installed in your FHDL directory.
  • The PC-Set Method Software Package 

    Maurer, Peter M. (2009-11-13)
    This is the software described in the technical report “Two New Techniques for Unit-Delay Compiled Simulation” available from this archive. This package is part of the FHDL system and must be installed in your FHDL directory.
  • Performance improvements to peer-to-peer file transfers using network coding. 

    Kelley, Aaron A. (, 2013-09-16)
    A common peer-to-peer approach to large data distribution is to divide the data into blocks. Peers will gather blocks from other peers in parallel. Problems with this approach are that each peer must know which blocks ...
  • PG-means: learning the number of clusters in data. 

    Feng, Yu. (2007-03-19)
    We present a novel algorithm called PG-means in this thesis. This algorithm is able to determine the number of clusters in a classical Gaussian mixture model automatically. PG-means uses efficient statistical hypothesis ...
  • Primitive Polynomials for the Field GF(2): Degree 2 through Degree 16 

    Maurer, Peter M. (2013-09-20)
    This report lists the primitive polynomials over GF(2) of degree 2 through 16. These polynomials were generated using a new matrix-based technique I invented.
  • Primitive Polynomials for the Field GF(3): Degree 2 through Degree 11 

    Maurer, Peter M. (2013-09-20)
    This report lists the primitive polynomials over GF(3) of degree 2 through 11. These polynomials were generated using a new matrix-based technique I invented.
  • Principal component and neural network calibration of a microwave frequency composition measurement sensor. 

    Maule, Charles Stephen. (2008-03-03)
    Microwave sensors are becoming more prevalent throughout a variety of industries. While providing an effective form of measurement, microwave sensors are difficult to calibrate and provide results which can be difficult ...
  • A Quick Algorithm for Identifying Conjugate Groups in GF(2) 

    Maurer, Peter M. (2009-02-18)
    This report gives the details an algorithm for determining whether two matrix groups are conjugate to one another. Each group is designated by a pair of matrices that generate the group. The algorithm is able to determine ...
  • Recommendations Made Easy 

    Guinness, Darren; Karbasi, Paniz; Nazarov, Rovshen; Speegle, Greg (2014-06-23)
    Fueled by ever-growing data, the need to provide recommendations for consumers, and the considerable domain knowledge required to implement distributed large scale graph solutions we sought to provide recommendations for ...
  • Remotely sensed hyperspectral image unmixing. 

    Yang, Zhuocheng. (2010-10-08)
    Estimating abundance fractions of materials in hyperspectral images is an important area of study in the field of remote sensing. The need for liner unmixing in remotely sensed imagery arises from the fact that the sampling ...
  • The Representations of GF(8) in GL3(2) 

    Maurer, Peter M. (2013-09-20)
    As is well known (or should be well known) the finite field GF(2^k) can be represented in the general linear group of kxk matrices over GF(2). There are many such representations. This report gives the 8 representations ...
  • The Representations of GF(8) in GL3(2) 

    Maurer, Peter M. (2013-09-20)
    This report gives one subgroup of each of the conjugacy classes of the subgroups of S7.
  • Response of passive surface hairs in steady and unsteady Falkner-Skan boundary layers. 

    Case, Lance C. (, 2012-11-29)
    Arrays of biologically inspired artificial hair sensors for flow detection are being considered to provide small unmanned aerial vehicles greater platform stability through gust mitigation. Analytical models of hair sensor ...
  • Review-by-Few or Review-by-Many? 

    Maurer, Peter (2011-05-13)
    It’s clear that traditional forms of academic publication are rapidly becoming obsolete. It’s also clear that peer review is a seriously flawed process that could be much improved upon by modern methods of communication. ...
  • Robust geolocation techniques for multiple receiver systems. 

    Fisher, Gregory W. (2011-05-12)
    The purpose of this thesis is to investigate signal processing algorithms that allow multiple moving receivers to locate a stationary emitter. This problem has received considerable attention over the past 50 years, yet ...
  • A Search Strategy Using a Hamming-Distance Oracle 

    Maurer, Peter M. (2009-08-04)
    The objective of the algorithm described in this report is to optimally guess a hidden binary string based on queries to an oracle where the length of the string is known beforehand. A C++ version of the algorithm is given ...
  • The Shadow Algorithm Software Package 

    Maurer, Peter M. (2009-11-13)
    This is the software described in the technical report “The Shadow Algorithm: …” available from this archive. This package is part of the FHDL system and must be installed in your FHDL directory.
  • The Shadow Algorithm: A Scheduling Technique for Both Compiled and Interpreted Simulation 

    Maurer, Peter M. (2009-11-05)
    The shadow algorithm is an event-driven unit-delay simulation technique that has been designed to take advantage of the instruction caches present in many of the latest workstations. The algorithm is based on the threaded-code ...
  • Side lobe modulation of radar antenna pattern utilizing an auxiliary array. 

    Wang, Loria LayShay. (, 2013-05-15)
    In the area of electronic countermeasures, disabling the ability of an individual to “listen” to the transmitted waveform is of great interest. Most often, an individual can intercept the transmitted radar signal through ...