IPMP, Insect Pest Management on Peppermint, provides the user with information for managing insects on peppermint. The program includes information on insect identification, life cycles, sampling methods, treatment thresholds, and registered insecticides.
Software maintenance accounts for a large portion of the software development cost, particularly the process of updating programs either to adapt for requirement change or to enhance design or efficiency. Currently, program updates are generally performed manually by programmers using text editors. This is an unreliable
method because syntax and...
A cost reduction analysis is performed by coordinating
the exchange of LANDSAT (formerly ERTS) data between a CDC
3300 and a PDP8/L minicomputer. The LANDSAT data is displayed
on a 4002 Tektronix terminal by means of a grayscale output.
Large amounts of data and number manipulation are processed
in the...
The main goal of automated test generation is to improve the reliability of a program by exposing faults to developers. To this end, testing should cover the largest possible portion of the program given a test budget (i.e., time and resources) as frequently as possible. Coverage of a program entity...
ThermoSolver is an educational thermodynamics software program designed to be both
easy to use and useful in that it permits the user to make nontrivial chemical engineering
thermodynamic calculations. The software program accompanies the textbook
Engineering and Chemical Thermodynamics by Milo Koretsky, and is available for free
download from the...
An age-wave is upon us where many older adults are reaching retirement. Technically experienced older adults have skills that could be directly applied to free/open source software (FOSS) communities, such as project management, programming, and/or knowledge of a rapidly growing end-user population. FOSS is a widely popular, low-cost way to...
This thesis details the applications of a new method of agent-based structure synthesis. The goal of this research is to create structures that meet a structural goal within a simulated physics environment. The method proposed works as an iterative process of changing the structure, evaluating the new structure and using...
The non-ideal aqueous electrolyte simulator (NAELS) is composed of
three major parts: a Newton-Raphson non-linear optimization program written
by Weare, et al (1987); an activity coefficient subroutine for non-ideal
electrolyte systems based on Pitzer's model; and an extensive, user expandable
database. It is robust, stable, and requires neither thermodynamic data...
A simple approach to developing approximate analytical
performance models for complex systems (such as distributed
processing systems or computer networks) is presented.
The approach is applicable in cases where measurement
or simulation data describing system performance are
available but the system is too complex for exact analytical
models to be...
The VISualization of Terrestrial and Aquatic Systems (VISTAS) software development project began with the proposition that visualization would increase the ability of scientists to explore and communicate their data, especially complex datasets that span multiple spatial and temporal scales. A case study of VISTAS articulates how and why scientists intend...
A procedure for displaying cursory computer analyses of time
series acoustic signals is described. The graphic presentation is
optimized for visual analysis. The results displayed represent time
series signals and/or Power Spectral Density estimates.
Both hardware and software components of the procedure are
described and compared with current methods. Suggestions...
With the success of the CounterDataFlow Pipeline microarchitecture developed by Oregon State University, there is increasing demand for a highly flexible high-level simulator modeling tool to support the further expansions and studies of the Counterflow pipeline processors family. This work examines the implementation of a Java-based execution-driven simulator modeling tool,...
In a manufacturing system, machines, robots and storage areas are used as serially-reusable resources. If the usage of these resources is not properly controlled, deadlocks may occur. In this paper, we present a simple deadlock prevention method for a linear manufacturing line. Our deadlock prevention method can be implemented simply...
This paper describes HelpDez, a colored-Petri-net-based approach for the design, simulation, and construction of hypermedia help systems. The storage model, system capabilities, and user interface model of a hypermedia help system are examined. Colored Petri nets are chosen to model hypermedia help systems due to their graphical expressiveness and their...
This volume contains the papers accepted for the informal workshop on Knowledge Compilation and Speedup Learning held along with the Machine Learning Conference in Aberdeen Scotland. This workshop is a sequel to the first Knowledge Compilation workshop, which was organized by Jim Bennett, Tom Dieterich, and Jack Mostow in Otter...
The fundamental objective of a design engineer in performing tolerance technology is to transform functional requirements into tolerances on individual parts based on existing data and algorithms for design tolerance analysis and synthesis. The transformation of functional requirements into tolerances must also consider the existing process capabilities and manufacturing costs...
Advanced Encryption Standard (AES) is one of the secret key algorithms used in Cryptography. It is applied in a variety of applications including smart cards, internet web servers, automated teller machines (ATMs), etc. Both hardware and software implementations are taken into consideration while addressing AES algorithms. In addition to reaching...
The application of the least squares adjustment techniques to the
area of surveying has been considered and two computer programs
called HCONTRL and VCONTRL are developed for horizontal and vertical
control respectively. The principle of least squares is discussed
in chapter II. The observation and condition equations are compared
and...
A simulation method using a hybrid computer is developed in
this dissertation to enhance the study of wind-driven ocean circulation.
The simulation is based on the mathematical model developed by
Ekman. Pure digital simulation is not economical due to excessive
computer time required for the solution of the partial differential...
This paper describes a Lesson Generating System for CAI, which, by relieving the course author from the burden of programming, provides an efficient means for developing courseware to augment classroom instruction.
This paper is concerned with the application of
hierarchial and parallel computing structures to digital
data communications processing in a multi-access telecommunications
environment. Designs are analyzed and
evaluated in terms of data collected from remote access
tele-communications traffic and in terms of the application
to several processing problems in the...
The purpose of this research is to develop methods to
translate a certain machine independent intermediate
language (IML) to efficient horizontal microprograms for a
class of microprogrammable machines. This IML has been
developed by Malik (12) and is compiled directly from a
high level microprogramming language used to implement a...
Theories of human behavior are an important but largely untapped resource for software engineering research. They facilitate understanding of human developers’ needs and activities, and thus can serve as a valuable resource to researchers designing software engineering tools. Furthermore, theories abstract beyond specific methods and tools to fundamental principles that...
The purpose of this report is to provide information on the adjustable-speed coupling system (ASCS) including: physical construction, principles of operation, application potential, and laboratory and field test results. In addition, comparison laboratory tests will be presented for conventional adjustable speed drives (ASDs). The ASCS has been tested at three...
Many theories of human debugging rely on complex mental constructs that offer little practical advice to builders of software engineering tools. Although hypotheses are important in debugging, a theory of navigation adds more practical value to our understanding of how programmers debug. Therefore, in this paper, we reconsider how people...
Efficient routing of messages is critical to the performance of multicomputers. Many adaptive routing algorithms have been proposed to improve the network efficiency; however, they can make only short-sighted decisions to choose a channel for message routing because of limited information about network condition. The short-sighted decisions may cause unnecessary...
The objective of this thesis is to describe the design and
implementation of a VSLI reduced instruction set computer (RISC).
The RISC machine constitutes a new style of computer architecture.
It differs significantly from the complex instruction set computer
architectures (CISC) of the past. RISC architectures are
characterized by their...
Communicating dynamic motion content, such as exercise, with a static medium, such as paper, is difficult. The technology exists for presenting 3D animated exercise content to patients; however, the tools for allowing exercise domain experts to effectively author the content do not exist. We conducted two formative studies with exercise...
Computer and network security has recently become a popular subject due to the explosive growth of the Internet and the migration of commerce practices to the electronic medium. Thus the authenticity and privacy of the information transmitted and the data stored on networked computers is of utmost importance. The deployment...
The purpose of this research was to determine whether
student academic achievement in college computer science
programs in the Republic of China (ROC) could be predicted
by factors reported to be effective in US studies. The
relationship between these factors and course performance in
computer science programs was examined. Gender...
Plywood production scheduling for years has been
considered, more or less, a sacred activity in which only
a select group of individuals with the experience and
knowledge could take part. With the advancements in
computer technology and related fields, the plywood
industry is in a position where more people can...
With the increase in demand for streaming media capabilities across the Internet, the focus has shifted from traditional client-server to peer-to-peer approaches. Content Distribution Networks (CDNs) have also recently moved from web acceleration to media streaming. P2P CDNs can be used both as a delivery mechanism and as an independent...
This research work investigates the use of production
systems as a model of parallel processing. The purpose of
the model is to provide a suitable medium within which parallel
processing systems can be systematically specified,
analyzed, and designed. Furthermore, the model provides a
suitable means for deriving implementations of synchronization...
With the advancing solid-state technology, it is necessary to
develop new techniques for synthesizing digital networks. The regular
pattern of cellular circuits seems to be the best fitted for the new LSI
technology. Recently, cellular implementations of comibinational circuits
have received considerable attention but very little attention has
been given...
Visual programming languages employ visual representation to make programming easier and make programs more reliable and more accessible. Visual program testing becomes increasingly important as more and more visual programming languages and visual programming environments come into real use. In this work, we focus on one important class of visual...
Scientists in the biological sciences need to retrieve information from a variety of data collections, traditionally maintained in SQL databases, in order to conduct research. Because current assistant tools are designed primarily for business and financial users, scientists have been forced to use the notoriously difficult command-line SQL interface, supplied...
Finding information can cost a significant amount of time, even when the information is already stored on the user’s local computer system. There is significant research aimed at reducing these time costs, but little research into exactly what these costs are or how they impact people’s use of tools and...
A Graphic User Interface is developed to determine the existence of a
particular sequence of piano notes within a monophonic sound waveform.
Such waveforms are recorded within the Graphic User Interface and then
passed to the monophonic analysis engine. The first phase of analysis segments
the PCM sound data to...
Quotient rings of Gaussian and Eisenstein-Jacobi(EJ) integers can be deployed to construct interconnection networks with good topological properties. In this thesis, we propose deadlock-free deterministic and partially adaptive routing algorithms for hexagonal networks, one special class of EJ networks. Then we discuss higher dimensional Gaussian networks as an alternative to...
Magnetic and gravity modelling was completed along two E-W transects offshore central Oregon. These models indicate that the backstop-forming western edge of the Siletz terrane has a seaward dip of approximately 40° to 49° at 44°48'N, shallowing to ~28° at 44°1 1 'N. This is a well-determined result, given available...
Modern superscalar processors exploit instruction-level parallelism (ILP) by issuing multiple instructions in a single cycle because of increasing demand for higher performance in computing. However, stalls due to cache misses severely degrade the performance by disturbing the exploitation of ILP. Multiprocessors also greatly exacerbate the memory latency problem. In SMPs,...
The microprocessors will have more than a billion logic transistors on a single chip in the near future. Several alternatives have been suggested for obtaining highest performance with billion-transistor chips. To achieve the highest performance possible, an on-chip multiprocessor will become one promising alternative to the current superscalar microprocessor. It...
Modular multiplication is a mathematical operation fundamental to the RSA cryptosystern,
a public-key cryptosystem with many applications in privacy, security, and authenticity.
However, cryptosecurity requires that the numbers involved be extremely large,
typically ranging from 512-1024 bits in length. Calculations on numbers of this magnitude
are cumbersome and lengthy; this...
Standard accounts of women's relationship with technology stress women's need to overcome anxiety to achieve competence with computers. Recent studies provide evidence that this woman-anxiety-technology connection is an oversimplification of the relationship between women and computers. New literature also suggests that making computers more appealing will help girls overcome computational...
In pursuit of global sustainability, forestry has witnessed significant shifts in practices and the development of new technologies and ideas. Primary and secondary processing industries have made substantial efforts to increase wood utilization rates, improve occupational safety and the working environment for humans, and have exhibited interest in procuring raw...