Browsing School of Engineering & Computer Science by Title
Now showing items 89108 of 167

HyperSim
(20091113)This software package implements the simulation algorithm described in the tech report “Using GF(2) matrices in Simulation and Logic Synthesis” found in this archive. (http://hdl.handle.net/2104/5263). This package is part ... 
Implementation of a MultiAgent System in Java Agent Development Framework for a largescale fossilfuel electrical power unit control.
(, 20140128)With technology and a largerthanever population, the society demand for energy has achieved records in the last few years. Currently, largescale fossil fuel power plants, ranging in the hundreds of MW’s, produce most ... 
Implementation of lossless compression algorithms for the MILSTD1553.
(20090401)This thesis focuses on the bandwidth limitations faced by the legacy MILSTD1553 data bus. In order to improve bandwidth performance, lossless implementations of data compression routines have been proposed. Using data ... 
Improving the Learning Platform for the Leukocoria Detection Project
(20160831)ABSTRACT Improving the Learning Platform for the Leukocoria Detection Project James Boer, M.S. Mentor: Gregory J. Hamerly, Ph.D. In this paper we describe a new and signi cantly improved learning platform for the ... 
Increased computation using parallel FPGA architectures.
(20110105)Two ways to improve algorithm performance in hardware are increasing the speed of each operation, or performing multiple operations simultaneously. However, the percent speedup for the latter depends upon not only system ... 
The influence of load on kinematics of computersimulated sagittalplane lifting.
(20060511)Researchers have shown that lifting kinematics change predictably with increased load. To test whether these kinematics patterns are intrinsic or voluntary, a computer model was developed to simulate lifting in the sagittal ... 
Information storage capacity of genetic algorithm fitness maps.
(, 20110914)To accurately measure the amount of information a genetic algorithm can generate, we must first measure the amount of information one can store, using a fitness map. The amount of information generated, minus the storage ... 
The Inversion Algorithm for Digital Simulation
(20091105)The Inversion Algorithm is an eventdriven algorithm, whose performance rivals or exceeds that of Levelized Compiled code simulation, even at activity rates of 50% or more. The Inversion Algorithm has several unique ... 
The InversionAlgorithm Software
(20091113)The software in this package implements four versions of the Inversion algorithm. Four executable files are produced.These executables are used in much the same way as the FHDL package, but only AND, OR, NAND, NOR, NOT, ... 
Investigation of dense suspension rotary diffusion models for fiber orientation predictions during injection molding of shortfiber reinforced polymeric composites.
(, 20110914)There is a need for physicsbased mathematical models for the design of industrial shortfiber reinforced composites (SFRC) to predict the fiber orientation within the part. Traditional models for fiber interactions use ... 
Investigation of induced thermomechanical response and cure kinetics during processing of carbon fiber reinforced plastics.
(, 20130515)The manufacture of laminated composite materials using a thermosetting resin matrix is a complex process that can be understood with a knowledge of cure kinetics, heat transfer, and structural mechanics. During laminate ... 
Investigation of the impact resistance of carbon nanotube forests within carbon fiber laminated composites through experimental confirmation and finite element substantiation.
(20150727)Carbon fiber laminated thermoset composites have become the industry standard for applications dictating a high strengthtoweight ratio. However, their brittle nature limits energy dissipation characteristics, often leading ... 
The ISCAS85 Benchmarks in FHDL Format
(20091113)The three files that constitute this tech report are ISCAS85.fhdl.zip, ISCAS85.InputVectors.zip, and ISCAS85.VectorGenerators.zip. The first file contains the 10 ISCAS85 benchmarks in FHDL format, plus the smoketest circuit ... 
The ISCAS89 Benchmarks in FHDL Format
(20091113)The .zip file contains each of the ISCAS89 Benchmarks in FHDL format. Also included is a random vector generator file for each circuit. (For what it’s worth.) The generators are written in the DGL language. 
Java bytecode compilation for highperformance, platformindependent logical inference.
(20060511)Automated reasoning systems are powerful computer programs capable of solving complex problems. They are characterized as computationally intensive having high performance requirements. Very few reasoning systems have ... 
Linear stability analysis of Mach 10 nitrogen flow over 7deg halfangle cones.
(20170802)Linear stability theory (LST) analysis was performed on Mach 10 7degree halfangle straight cones in nitrogen for comparison with experimental results obtained in the Arnold Engineering Development Complex (AEDC) Hypervelocity ... 
A linkedplane obstacleset algorithm for modeling broad muscle paths : application to the deltoid muscle.
(20081001)Computer modeling is commonly used to simulate muscle paths for the study of human biomechanics. Because some muscles, such as broad muscles, have complex morphology, modeling the paths of these muscles can be challenging. ... 
A lowcost pulsed Fourier transform network analyzer.
(, 20110914)Characterizing the frequency response of a material or device over microwave frequencies is a common practice for an RF engineer. New industrial and consumer applications are being developed based on the measurement of the ... 
Matrix Representations of GF(p[superscript n]) over GF(p)
(20140131)We show that any nonsingular nxn matrix of order p[superscript n]1 over GF(p) is a generator of a matrix representation of GF(p[superscript n]). We also determine the number of matrix representations of GF(p[superscript ... 
Metamorphic programming
(20090415)Metamorphic programming is an effective tool for creating efficient and elegant solutions to many programming problems, at least once you get over the shock of seeing code that violates many of the accepted rules of good ...