Current Search: computation (x)
View All Items
Pages
- Title
- Software quality assurance.
- Creator
-
Soistman, Edward C., null, null, Engineering
- Abstract / Description
-
University of Central Florida College of Engineering Thesis; The problems associated with software development and use are investigated from a management point of view. Having identified the critical aspects of effective software management, an approach is suggested for the creation and implementation of a software quality assurance program, Particular attention is focused on the concept of Life Cycle Procurement as currently utilized by the Department of Defense. The research was...
Show moreUniversity of Central Florida College of Engineering Thesis; The problems associated with software development and use are investigated from a management point of view. Having identified the critical aspects of effective software management, an approach is suggested for the creation and implementation of a software quality assurance program, Particular attention is focused on the concept of Life Cycle Procurement as currently utilized by the Department of Defense. The research was accomplished in two phases. The first consisted of an extensive literature search, seminar attendance and participation in several working groups assigned the responsibility for establishing software quality assurance guidelines. The second phase involved direct participation in the development of a formal software quality assurance program. The report is written in a manner designed to guide a non-technically oriented manager through a complete analysis of software, its measures of quality, its problem sources and the most promising techniques which can he used to control and evaluate its development.
Show less - Date Issued
- 1979
- Identifier
- CFR0003518, ucf:52989
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFR0003518
- Title
- COMPUTATION OF BOOLEAN FORMULAS USING SNEAK PATHS IN CROSSBAR COMPUTING.
- Creator
-
Velasquez, Alvaro, Jha, Sumit, University of Central Florida
- Abstract / Description
-
Memristor-based nano-crossbar computing is a revolutionary computing paradigm that does away with the traditional Von Neumann architectural separation of memory and computation units. The computation of Boolean formulas using memristor circuits has been a subject of several recent investigations. Crossbar computing, in general, has also been a topic of active interest, but sneak paths have posed a hurdle in the design of pervasive general-purpose crossbar computing paradigms. In this paper,...
Show moreMemristor-based nano-crossbar computing is a revolutionary computing paradigm that does away with the traditional Von Neumann architectural separation of memory and computation units. The computation of Boolean formulas using memristor circuits has been a subject of several recent investigations. Crossbar computing, in general, has also been a topic of active interest, but sneak paths have posed a hurdle in the design of pervasive general-purpose crossbar computing paradigms. In this paper, we demonstrate that sneak paths in nano-crossbar computing can be exploited to design a Boolean-formula evaluation strategy. We demonstrate our approach on a simple Boolean formula and a 1-bit addition circuit. We also conjecture that our nano-crossbar design will be an effective approach for synthesizing high-performance customized arithmetic and logic circuits.
Show less - Date Issued
- 2014
- Identifier
- CFH0004571, ucf:45163
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFH0004571
- Title
- TRUTHS, REALITIES AND THE EASILY TRANSMITTED IMAGE.
- Creator
-
Walton, Elizabeth, Haxton, David, University of Central Florida
- Abstract / Description
-
By the documenting and examining things that are often overlooked in everyday life, I try to find the beauty of these objects, of people, their lives and their homes. I am interested in the current technology and the influence of the easily transmitted image. What is the truth and reality of the images shared by the current youth culture because of the use of camera phones, digital image takers, and the constant image transmissions through online social networking venues such as My Space and...
Show moreBy the documenting and examining things that are often overlooked in everyday life, I try to find the beauty of these objects, of people, their lives and their homes. I am interested in the current technology and the influence of the easily transmitted image. What is the truth and reality of the images shared by the current youth culture because of the use of camera phones, digital image takers, and the constant image transmissions through online social networking venues such as My Space and FaceBook? The current digital image is no longer a precious object as it was in the past. The easy accessibility of technology and the growing popularity of an affordable camera have made these images a common object, easily replaced. It is my interest or concern with this technology that led me to my final body of work, images of this youth culture.
Show less - Date Issued
- 2007
- Identifier
- CFE0001610, ucf:47184
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0001610
- Title
- THE EFFECT OF THE MATH CONCEPTS AND SKILLS (MCS) COMPUTER PROGRAM ON STANDARDIZED TEST SCORES AT A MIDDLE SCHOOL IN EAST CENTRAL FLORIDA.
- Creator
-
Manning, Cheryl, Sivo, Stephen, University of Central Florida
- Abstract / Description
-
This study measures the effectiveness of the National Computer Systems (NCS) Learn SuccessMaker Math Concepts and Skills computer program on standardized test scores at a middle school in east central Florida. The NCS Learn Company makes three claims for the SuccessMaker interactive computer program, Math Concepts and Skills (MCS): 1. Student Florida Comprehensive Assessment Test (FCAT) scores will improve from using the software 30 hours or more; 2. The increase in FCAT scores is directly...
Show moreThis study measures the effectiveness of the National Computer Systems (NCS) Learn SuccessMaker Math Concepts and Skills computer program on standardized test scores at a middle school in east central Florida. The NCS Learn Company makes three claims for the SuccessMaker interactive computer program, Math Concepts and Skills (MCS): 1. Student Florida Comprehensive Assessment Test (FCAT) scores will improve from using the software 30 hours or more; 2. The increase in FCAT scores is directly related to the length of time the students' spend using the program; 3. The software package grading system is equivalent to the FCAT scoring. This study was designed to evaluate each claim. To test the first claim, the FCAT Norm Referenced Test (NRT) Mathematics scale scores of the 6th-grade middle school students were compared to the same students' previous FCAT scores. The scores were compared before and after they used the Math Concepts and Skills program. An independent t test was used to compare the scores. There was a statistically significant difference in scale scores when the students used the MCS program for 30 hours or more. Further investigation is needed to establish the causal effect for the observed differences. To test the second claim, the 6th- and 8th-grade students' time on task in the laboratory was compared to their change in FCAT scores. A Pearson correlation coefficient of 0.58 was found to exist for the complete 6th-grade data set and a 0.71 correlation for the 8th-grade group. To test the third claim, the MCS computer program grade equivalent scores were compared to the mathematics FCAT Level using the dependent t test to see if the two scores were equal. The analysis revealed that the difference in the two scores was statistically significant. Therefore the claim that the two scores are equivalent was not true for this data set. Recommendations were made for future studies to include qualitative data, a control group, and larger sample sizes. Studying the effect of the Math Concepts and Skills program on FCAT scores continues to be a project for investigation as implementation of the computer software is contingent on improving FCAT scores.
Show less - Date Issued
- 2004
- Identifier
- CFE0000227, ucf:46267
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0000227
- Title
- ARCHITECTURAL SUPPORT FOR IMPROVING SYSTEMHARDWARE/SOFTWARE RELIABILITY.
- Creator
-
Dimitrov, Martin, Zhou, Huiyang, University of Central Florida
- Abstract / Description
-
It is a great challenge to build reliable computer systems with unreliable hardware and buggy software. On one hand, software bugs account for as much as 40% of system failures and incur high cost, an estimate of $59.5B a year, on the US economy. On the other hand, under the current trends of technology scaling, transient faults (also known as soft errors) in the underlying hardware are predicted to grow at least in proportion to the number of devices being integrated, which further...
Show moreIt is a great challenge to build reliable computer systems with unreliable hardware and buggy software. On one hand, software bugs account for as much as 40% of system failures and incur high cost, an estimate of $59.5B a year, on the US economy. On the other hand, under the current trends of technology scaling, transient faults (also known as soft errors) in the underlying hardware are predicted to grow at least in proportion to the number of devices being integrated, which further exacerbates the problem of system reliability. We propose several methods to improve system reliability both in terms of detecting and correcting soft-errors as well as facilitating software debugging. In our first approach, we detect instruction-level anomalies during program execution. The anomalies can be used to detect and repair soft-errors, or can be reported to the programmer to aid software debugging. In our second approach, we improve anomaly detection for software debugging by detecting different types of anomalies as well as by removing false-positives. While the anomalies reported by our first two methods are helpful in debugging single-threaded programs, they do not address concurrency bugs in multi-threaded programs. In our third approach, we propose a new debugging primitive which exposes the non-deterministic behavior of parallel programs and facilitates the debugging process. Our idea is to generate a time-ordered trace of events such as function calls/returns and memory accesses in different threads. In our experience, exposing the time-ordered event information to the programmer is highly beneficial for reasoning about the root causes of concurrency bugs.
Show less - Date Issued
- 2010
- Identifier
- CFE0002975, ucf:47941
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0002975
- Title
- IMPROVING BRANCH PREDICTION ACCURACY VIA EFFECTIVE SOURCE INFORMATION AND PREDICTION ALGORITHMS.
- Creator
-
GAO, HONGLIANG, ZHOU, HUIYANG, University of Central Florida
- Abstract / Description
-
Modern superscalar processors rely on branch predictors to sustain a high instruction fetch throughput. Given the trend of deep pipelines and large instruction windows, a branch misprediction will incur a large performance penalty and result in a significant amount of energy wasted by the instructions along wrong paths. With their critical role in high performance processors, there has been extensive research on branch predictors to improve the prediction accuracy. Conceptually a dynamic...
Show moreModern superscalar processors rely on branch predictors to sustain a high instruction fetch throughput. Given the trend of deep pipelines and large instruction windows, a branch misprediction will incur a large performance penalty and result in a significant amount of energy wasted by the instructions along wrong paths. With their critical role in high performance processors, there has been extensive research on branch predictors to improve the prediction accuracy. Conceptually a dynamic branch prediction scheme includes three major components: a source, an information processor, and a predictor. Traditional works mainly focus on the algorithm for the predictor. In this dissertation, besides novel prediction algorithms, we investigate other components and develop untraditional ways to improve the prediction accuracy. First, we propose an adaptive information processing method to dynamically extract the most effective inputs to maximize the correlation to be exploited by the predictor. Second, we propose a new prediction algorithm, which improves the Prediction by Partial Matching (PPM) algorithm by selectively combining multiple partial matches. The PPM algorithm was previously considered optimal and has been used to derive the upper limit of branch prediction accuracy. Our proposed algorithm achieves higher prediction accuracy than PPM and can be implemented in realistic hardware budget. Third, we discover a new locality existing between the address of producer loads and the outcomes of their consumer branches. We study this address-branch correlation in detail and propose a branch predictor to explore this correlation for long-latency and hard-to-predict branches, which existing branch predictors fail to predict accurately.
Show less - Date Issued
- 2008
- Identifier
- CFE0002283, ucf:47877
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0002283
- Title
- Approximate Binary Decision Diagrams for High-Performance Computing.
- Creator
-
Sivakumar, Anagha, Jha, Sumit Kumar, Leavens, Gary, Valliyil Thankachan, Sharma, University of Central Florida
- Abstract / Description
-
Many soft applications such as machine learning and probabilistic computational modeling can benefit from approximate but high-performance implementations. In this thesis, we study how Binary decision diagrams (BDDs) can be used to synthesize approximate high-performance implementations from high-level specifications such as program kernels written in a C-like language. We demonstrate the potential of our approach by designing nanoscale crossbars from such approximate Boolean decision...
Show moreMany soft applications such as machine learning and probabilistic computational modeling can benefit from approximate but high-performance implementations. In this thesis, we study how Binary decision diagrams (BDDs) can be used to synthesize approximate high-performance implementations from high-level specifications such as program kernels written in a C-like language. We demonstrate the potential of our approach by designing nanoscale crossbars from such approximate Boolean decision diagrams. Our work may be useful in designing massively-parallel approximate crossbar computing systems for application-specific domains such as probabilistic computational modeling.
Show less - Date Issued
- 2018
- Identifier
- CFE0007414, ucf:52704
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0007414
- Title
- Personal Computer Simulation Program for Step Motor Drive Systems.
- Creator
-
Koos, William M., Harden, Richard C., Engineering
- Abstract / Description
-
University of Central Florida College of Engineering Thesis; A system of equations modeling a class of step motors known as the permanent magnet rotor step motor is presented. The model is implemented on a APPLE personal computer in a version of BASIC. Measurements are then made on an existing motor and input to the program for validation. A special test fixture is utilized to take performance data on the motor to facilitate comparisons with the predictions of the program. The comparisons...
Show moreUniversity of Central Florida College of Engineering Thesis; A system of equations modeling a class of step motors known as the permanent magnet rotor step motor is presented. The model is implemented on a APPLE personal computer in a version of BASIC. Measurements are then made on an existing motor and input to the program for validation. A special test fixture is utilized to take performance data on the motor to facilitate comparisons with the predictions of the program. The comparisons show the model is indeed valid for design of step motor drive systems and emphasize the practical nature of using personal computers and simulations for design
Show less - Date Issued
- 1982
- Identifier
- CFR0008163, ucf:53067
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFR0008163
- Title
- A Differential Sample and Hold Technique that Rejects Offset Voltages.
- Creator
-
Davis, John A., Harden, Richard C., Engineering
- Abstract / Description
-
Florida Technological University College of Engineering Thesis; This research report discussed modern sample and hold theory and techniques and then uses them to develop a new differential sampling concept to solve a real engineering problem, involving the synchronous demodulation of three amplitude modulated direction cosine signals in an unusual noise environment. The problem is discussed in detail and a detailed circuit design solution given. Additionally, the results of a breadboard test...
Show moreFlorida Technological University College of Engineering Thesis; This research report discussed modern sample and hold theory and techniques and then uses them to develop a new differential sampling concept to solve a real engineering problem, involving the synchronous demodulation of three amplitude modulated direction cosine signals in an unusual noise environment. The problem is discussed in detail and a detailed circuit design solution given. Additionally, the results of a breadboard test of the concept is given that shows their circuit to have a 60dB offset voltage rejection ratio.
Show less - Date Issued
- 1976
- Identifier
- CFR0004426, ucf:52976
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFR0004426
- Title
- A Comparative Study of Computer-Assisted Instruction Versus Classroom Training of Naval Technicians of Varying Aptitude.
- Creator
-
Dwyer, Daniel J., Burrough, Wayne A., Social Sciences
- Abstract / Description
-
University of Central Florida College of Social Sciences Thesis; Any discussion of computer-assisted instruction (CAI) cannot proceed very far without first examining the issue of programmed instruction (PI). CAI is a relatively recent development in the area of education and training, whereas PI enjoys a somewhat longer history. Nonetheless, PI lies at the very heart of CAI and forms the base on which CAI exists. CAI then, may be viewed as a mode or type of PI. B. F. Skinner's work in the...
Show moreUniversity of Central Florida College of Social Sciences Thesis; Any discussion of computer-assisted instruction (CAI) cannot proceed very far without first examining the issue of programmed instruction (PI). CAI is a relatively recent development in the area of education and training, whereas PI enjoys a somewhat longer history. Nonetheless, PI lies at the very heart of CAI and forms the base on which CAI exists. CAI then, may be viewed as a mode or type of PI. B. F. Skinner's work in the 1940's with the principles of operant conditioning laid the groundwork for the concept of PI (Garner, 1966). Operant conditioning is a type of conditioning whereby an emitted response is reinforced. The reinforcement should increase the strength of the response and presumably increase the chances that the response will occur again (Munn, Fernald, & Fernald, 1972). Operant conditioning, in which an individual is conditioned to behave in the direction of a predetermined goal, is achieved through the contingent reinforcement of a series of steps. These steps of action are linked together in a chain of successive approximations. 1 Each link of the chain approximates the end goal slightly more than the previous link. This chain of successive approximations is followed until the end behavior is achieved (Garner, 1966). 2 In this respect, PI makes use of the sequencing of small successive steps and contingent reinforcement to achieve some desired end goal , namely, achieving the lesson objective. This "Skinnerian" or linear form of PI requires the student to proceed through a forward moving chain in a step-by-step fashion until the end behavior is achieved. The step-by-step sequence, as it pertains to PI, refers to the individual segments or frames of a PI lesson. Each frame might be considered one step of the entire PI lesson. These frames, which should flow logically from one to the next, should build upon each other and approximate the lesson objective. Periodically, progress should be monitored in order to assure that the student is comprehending the lesson material (Wilson and Tosti, 1972). Typically, this is accomplished by incorporating multiple choice or true/false questions within the PI lesson itself . By so doing, student performances can be checked and appropriate actions taken within the concept of reinforcement. Deterline (1962) argues that all learned behavior is based on, reinforcement. Individuals learn by acting on their environment and, in turn, are influenced by the consequences of their actions (Deterline, 1962) . ""Then consequences strengthen behavior, reinforcement is said to have taken place.
Show less - Date Issued
- 1979
- Identifier
- CFR0003505, ucf:53141
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFR0003505
- Title
- Harmony Oriented Architecture.
- Creator
-
Martin, Kyle, Hua, Kien, Wu, Annie, Heinrich, Mark, University of Central Florida
- Abstract / Description
-
This thesis presents Harmony Oriented Architecture: a novel architectural paradigm that applies the principles of Harmony Oriented Programming to the architecture of scalable and evolvable distributed systems. It is motivated by research on Ultra Large Scale systems that has revealed inherent limitations in human ability to design large-scale software systems that can only be overcome through radical alternatives to traditional object-oriented software engineering practice that simplifies the...
Show moreThis thesis presents Harmony Oriented Architecture: a novel architectural paradigm that applies the principles of Harmony Oriented Programming to the architecture of scalable and evolvable distributed systems. It is motivated by research on Ultra Large Scale systems that has revealed inherent limitations in human ability to design large-scale software systems that can only be overcome through radical alternatives to traditional object-oriented software engineering practice that simplifies the construction of highly scalable and evolvable system.HOP eschews encapsulation and information hiding, the core principles of object- oriented design, in favor of exposure and information sharing through a spatial abstraction. This helps to avoid the brittle interface dependencies that impede the evolution of object-oriented software. HOA extends these concepts to distributed systems resulting in an architecture in which application components are represented by objects in a spatial database and executed in strict isolation using an embedded application server. Application components store their state entirely in the database and interact solely by diffusing data into a space for proximate components to observe. This architecture provides a high degree of decoupling, isolation, and state exposure allowing highly scalable and evolvable applications to be built.A proof-of-concept prototype of a non-distributed HOA middleware platform supporting JavaScript application components is implemented and evaluated. Results show remarkably good performance considering that little effort was made to optimize the implementation.
Show less - Date Issued
- 2011
- Identifier
- CFE0004480, ucf:49298
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0004480
- Title
- IPCL1- An Interactive Process Control Language.
- Creator
-
Erlandson, Richard A., Bauer, Christian S., Engineering
- Abstract / Description
-
University of Central Florida College of Engineering Thesis; This report documents a Process Control Language. It was written to provide an easy-to-use, user-friendly language to control a manufacturing-type process. It is not assumed the user is proficient or even familiar with any computer languages. The user should be able to grasp the simple set of commands available and begin writing user programs in a short period of time. Emphasis has been placed on error messages to inform the user of...
Show moreUniversity of Central Florida College of Engineering Thesis; This report documents a Process Control Language. It was written to provide an easy-to-use, user-friendly language to control a manufacturing-type process. It is not assumed the user is proficient or even familiar with any computer languages. The user should be able to grasp the simple set of commands available and begin writing user programs in a short period of time. Emphasis has been placed on error messages to inform the user of the type of error and enough information to correct it. The language was written in PDP-11 assembly language and run on a 11/34 computer in the Microcomputer Laboratory at the University of Central Florida.
Show less - Date Issued
- 1985
- Identifier
- CFR0004771, ucf:52983
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFR0004771
- Title
- A CASE STUDY OF THE STUDENT ACADEMIC SUPPORT SYSTEM: STATE UNIVERSITY SYSTEM OF FLORIDA.
- Creator
-
Hill, Helen, Magann, Douglas, University of Central Florida
- Abstract / Description
-
ABSTRACT In 1985, the Florida Legislature mandated the development of a computer assisted academic advisement program for the State University System. This study of the Student Academic Support System (SASS) explored the administrator and advisor viewpoints, rather than traditional student perception assessments, in order to add to the understanding of computer assisted advising as it now stands in the State of Florida. The goal of this research was to determine the best practices of computer...
Show moreABSTRACT In 1985, the Florida Legislature mandated the development of a computer assisted academic advisement program for the State University System. This study of the Student Academic Support System (SASS) explored the administrator and advisor viewpoints, rather than traditional student perception assessments, in order to add to the understanding of computer assisted advising as it now stands in the State of Florida. The goal of this research was to determine the best practices of computer assisted advising throughout the State University System. Individuals who use or have responsibility for the advising system were identified in each institution in the State University System. An instrument was developed to identify the use of key components of the Student Academic Support System and interviews were scheduled. A review of the literature and results of this study found that there were many factors that influenced the success or failure of a computer assisted advising system. Factors such as funding, administrative sponsorship from the highest levels of the institution, institutional culture, advisor computer proficiency, and the existence of alternate computer advising technologies played significant roles in the development and implementation of the mandated state computer advising system. The qualitative interviews utilized in this case study highlighted the complexities of computer assisted advising. This research studied the perceptions and practices of administrators and advisors in the 11 State Universities in Florida. This research study documents the history of the development and implementation of computer assisted advising within the Florida State University System. As such, this research provides insight for administrators, technology professionals, and policy makers in the field of student advisement. Implications of this study, for the Florida State University System, show that strong administrative support and acceptance of the value of the system by advisors are necessary for successful implementation of a computer assisted advising system. Continued assessment, modification, and funding must be a priority for any institution that utilizes computer assisted advising systems. A properly implemented advising tool, such as the Student Academic Support System, results in a better informed student and a more effective sharing of information between students, advisors, and the university. Properly advised students will reach their educational goals in a timely and efficient fashion. The use of computer assisted advising was found to result in a satisfying academic experience for the advisor and to increase a student's level of satisfaction with the advising encounter.
Show less - Date Issued
- 2004
- Identifier
- CFE0000228, ucf:46246
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0000228
- Title
- OBJECT ASSOCIATION ACROSS MULTIPLE MOVING CAMERAS IN PLANAR SCENES.
- Creator
-
Sheikh, Yaser, Shah, Mubarak, University of Central Florida
- Abstract / Description
-
In this dissertation, we address the problem of object detection and object association across multiple cameras over large areas that are well modeled by planes. We present a unifying probabilistic framework that captures the underlying geometry of planar scenes, and present algorithms to estimate geometric relationships between different cameras, which are subsequently used for co-operative association of objects. We first present a local1 object detection scheme that has three fundamental...
Show moreIn this dissertation, we address the problem of object detection and object association across multiple cameras over large areas that are well modeled by planes. We present a unifying probabilistic framework that captures the underlying geometry of planar scenes, and present algorithms to estimate geometric relationships between different cameras, which are subsequently used for co-operative association of objects. We first present a local1 object detection scheme that has three fundamental innovations over existing approaches. First, the model of the intensities of image pixels as independent random variables is challenged and it is asserted that useful correlation exists in intensities of spatially proximal pixels. This correlation is exploited to sustain high levels of detection accuracy in the presence of dynamic scene behavior, nominal misalignments and motion due to parallax. By using a non-parametric density estimation method over a joint domain-range representation of image pixels, complex dependencies between the domain (location) and range (color) are directly modeled. We present a model of the background as a single probability density. Second, temporal persistence is introduced as a detection criterion. Unlike previous approaches to object detection that detect objects by building adaptive models of the background, the foreground is modeled to augment the detection of objects (without explicit tracking), since objects detected in the preceding frame contain substantial evidence for detection in the current frame. Finally, the background and foreground models are used competitively in a MAP-MRF decision framework, stressing spatial context as a condition of detecting interesting objects and the posterior function is maximized efficiently by finding the minimum cut of a capacitated graph. Experimental validation of the method is performed and presented on a diverse set of data. We then address the problem of associating objects across multiple cameras in planar scenes. Since cameras may be moving, there is a possibility of both spatial and temporal non-overlap in the fields of view of the camera. We first address the case where spatial and temporal overlap can be assumed. Since the cameras are moving and often widely separated, direct appearance-based or proximity-based constraints cannot be used. Instead, we exploit geometric constraints on the relationship between the motion of each object across cameras, to test multiple correspondence hypotheses, without assuming any prior calibration information. Here, there are three contributions. First, we present a statistically and geometrically meaningful means of evaluating a hypothesized correspondence between multiple objects in multiple cameras. Second, since multiple cameras exist, ensuring coherency in association, i.e. transitive closure is maintained between more than two cameras, is an essential requirement. To ensure such coherency we pose the problem of object associating across cameras as a k-dimensional matching and use an approximation to find the association. We show that, under appropriate conditions, re-entering objects can also be re-associated to their original labels. Third, we show that as a result of associating objects across the cameras, a concurrent visualization of multiple aerial video streams is possible. Results are shown on a number of real and controlled scenarios with multiple objects observed by multiple cameras, validating our qualitative models. Finally, we present a unifying framework for object association across multiple cameras and for estimating inter-camera homographies between (spatially and temporally) overlapping and non-overlapping cameras, whether they are moving or non-moving. By making use of explicit polynomial models for the kinematics of objects, we present algorithms to estimate inter-frame homographies. Under an appropriate measurement noise model, an EM algorithm is applied for the maximum likelihood estimation of the inter-camera homographies and kinematic parameters. Rather than fit curves locally (in each camera) and match them across views, we present an approach that simultaneously refines the estimates of inter-camera homographies and curve coefficients globally. We demonstrate the efficacy of the approach on a number of real sequences taken from aerial cameras, and report quantitative performance during simulations.
Show less - Date Issued
- 2006
- Identifier
- CFE0001045, ucf:46797
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0001045
- Title
- A COMPARATIVE STUDY OF ANT COLONY OPTIMIZATION.
- Creator
-
Becker, Matthew, Mohapatra, Ram, University of Central Florida
- Abstract / Description
-
Ant Colony Optimization (ACO) belongs to a class of biologically-motivated approaches to computing that includes such metaheuristics as artificial neural networks, evolutionary algorithms, and artificial immune systems, among others. Emulating to varying degrees the particular biological phenomena from which their inspiration is drawn, these alternative computational systems have succeeded in finding solutions to complex problems that had heretofore eluded more traditional techniques. Often,...
Show moreAnt Colony Optimization (ACO) belongs to a class of biologically-motivated approaches to computing that includes such metaheuristics as artificial neural networks, evolutionary algorithms, and artificial immune systems, among others. Emulating to varying degrees the particular biological phenomena from which their inspiration is drawn, these alternative computational systems have succeeded in finding solutions to complex problems that had heretofore eluded more traditional techniques. Often, the resulting algorithm bears little resemblance to its biological progenitor, evolving instead into a mathematical abstraction of a singularly useful quality of the phenomenon. In such cases, these abstract computational models may be termed biological metaphors. Mindful that a fine line separates metaphor from distortion, this paper outlines an attempt to better understand the potential consequences an insufficient understanding of the underlying biological phenomenon may have on its transformation into mathematical metaphor. To that end, the author independently develops a rudimentary ACO, remaining as faithful as possible to the behavioral qualities of an ant colony. Subsequently, the performance of this new ACO is compared with that of a more established ACO in three categories: (1) the hybridization of evolutionary computing and ACO, (2) the efficacy of daemon actions, and (3) theoretical properties and convergence proofs.
Show less - Date Issued
- 2006
- Identifier
- CFE0001192, ucf:46844
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0001192
- Title
- A COMPARISON OF COMPUTER AND TRADITIONAL FACE-TO-FACE CLASSROOM ORIENTATION FOR BEGINNING CRITICAL CARE NURSES.
- Creator
-
Anzalone, Patricia, Sole, Mary Lou, University of Central Florida
- Abstract / Description
-
Purpose: Education of the novice critical care nurse has traditionally been conducted by critical care educators in face-to-face classes in an orientation or internship. A shortage of qualified educators and growth in electronic modes of course delivery has led organizations to explore electronic learning (e-learning) to provide orientation to critical care nursing concepts. Equivalence of e-learning versus traditional critical care orientation has not been studied. The primary aim of this...
Show morePurpose: Education of the novice critical care nurse has traditionally been conducted by critical care educators in face-to-face classes in an orientation or internship. A shortage of qualified educators and growth in electronic modes of course delivery has led organizations to explore electronic learning (e-learning) to provide orientation to critical care nursing concepts. Equivalence of e-learning versus traditional critical care orientation has not been studied. The primary aim of this study was to examine the equivalency of knowledge attainment in the cardiovascular module of the Essentials of Critical Care Orientation (ECCO) e-learning program to traditional face-to-face critical care orientation classes covering the same content. Additional aims were to determine if learning style is associated with a preference for type of learning method, and to determine any difference in learning satisfaction between the two modalities. Methods: The study was conducted using a two-group pretest-posttest experimental design. Forty-one practicing volunteer nurses with no current critical care experience living in southwest Florida were randomly assigned to either the ECCO (n=19) or face-to-face (n=22) group. Those in the face-to-face group attended 20 hours of classroom instruction taught by an expert educator. Those in the ECCO group completed the lessons on line and had an optional 2 hour face-to-face discussion component. Pre-test measures included the Basic Knowledge Assessment Test (BKAT-7), modified ECCO Cardiovascular (CV) Examination, and Kolb Learning Style Inventory (LSI). Post-tests included the BKAT-7, modified CV Examination, and Affective Measures Survey. Results: The majority of subjects were female, married, and educated at the associate degree level. Their mean age was 39.5 + 12 years, and they averaged 9.9 + 11.7 years of nursing experience. The diverging learning style was assessed in 37% of subjects. Classroom instruction was preferred by 61% of participants. No statistical differences were noted between groups on any demographic variables or baseline knowledge. Learning outcomes were compared by repeated measures analysis of variance. Mean scores of subjects in both groups increased statistically on both the BKAT-7 and modified CV Examination (p=<.01); however, no significant differences (p> .05) were found between groups. Preference for online versus classroom instruction was not associated with learning style (X2 = 3.39, p = .34). Satisfaction with learning modality was significantly greater for those in the classroom group (t=4.25, p=.000). Discussion/Implications: This is the first study to evaluate the ECCO orientation program and contributes to the growing body of knowledge exploring e-learning versus traditional education. The results of this study provide evidence that the ECCO critical care education produces learning outcomes at least equivalent to traditional classroom instruction, regardless of the learning style of the student. As participant satisfaction was more favorable toward the classroom learning modality, consideration should be given to providing blended learning if using computer-based orientation programs. Replication of this study with a variety of instructors in varied geographic locations, expanded populations, larger samples, and different subject matter is recommended.
Show less - Date Issued
- 2008
- Identifier
- CFE0002192, ucf:47888
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0002192
- Title
- DECOHERENCE IN SEMICONDUCTOR SOLID-STATE QUANTUM COMPUTERS.
- Creator
-
Valente, Diego, Mucciolo, Eduardo, University of Central Florida
- Abstract / Description
-
In this dissertation we discuss decoherence in charge qubits formed by multiple lateral quantum dots in the framework of the spin-boson model and the Born-Markov approximation. We consider the intrinsic decoherence caused by the coupling to bulk phonon modes and electromagnetic environmental fluctuations. In the case of decoherence caused by phonon coupling, two distinct quantum dot configurations are studied and proposed as setups that mitigate its nocive effects : (i) Three quantum dots in...
Show moreIn this dissertation we discuss decoherence in charge qubits formed by multiple lateral quantum dots in the framework of the spin-boson model and the Born-Markov approximation. We consider the intrinsic decoherence caused by the coupling to bulk phonon modes and electromagnetic environmental fluctuations. In the case of decoherence caused by phonon coupling, two distinct quantum dot configurations are studied and proposed as setups that mitigate its nocive effects : (i) Three quantum dots in a ring geometry with one excess electron in total and (ii) arrays of quantum dots where the computational basis states form multipole charge configurations. For the three-dot qubit, we demonstrate the possibility of performing one- and two-qubit operations by solely tuning gate voltages. Compared to a previous proposal involving a linear three-dot spin qubit, the three-dot charge qubit allows for less overhead on two-qubit operations. For small interdot tunnel amplitudes, the three-dot qubits have Q factors much higher than those obtained for double-dot systems. The high-multipole dot configurations also show a substantial decrease in decoherence at low operation frequencies when compared to the double-dot qubit. We also discuss decoherence due to electromagnetic fluctuations in charge qubits formed by two lateral quantum dots. We use effective circuit models to evaluate correlations of voltage fluctuations in the qubit setup. These correlations allows us to estimate energy (T1) and phase (T2) relaxation times of the the qubit system. We also discuss the dependence the quality factor Q shows with respect to parameters of the setup, such as temperature and capacitive coupling between the electrodes.
Show less - Date Issued
- 2009
- Identifier
- CFE0002961, ucf:47959
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0002961
- Title
- BELIEFS OF GRADUATE STUDENTS ABOUT UNSTRUCTURED COMPUTER USE IN FACE-TO-FACE CLASSES WITH INTERNET ACCESS AND ITS INFLUENCE ON STUDENT RECALL.
- Creator
-
Johnson, Gregory, Gunter, Glenda, University of Central Florida
- Abstract / Description
-
The use of computers equipped with Internet access by students during face-to-face (F2F) class sessions is perceived as academically beneficial by a growing number of students and faculty members in universities across the United States. Nevertheless, some researchers suggest unstructured computer use detached from the immediate class content may negatively influence student participation, increase distraction levels, minimize recall of recently presented information, and decrease student...
Show moreThe use of computers equipped with Internet access by students during face-to-face (F2F) class sessions is perceived as academically beneficial by a growing number of students and faculty members in universities across the United States. Nevertheless, some researchers suggest unstructured computer use detached from the immediate class content may negatively influence student participation, increase distraction levels, minimize recall of recently presented information, and decrease student engagement. This study investigates graduate students' beliefs about computer use with Internet access during graduate face-to-face lecture classes in which computer use is neither mandated nor integrated in the class and the effect of such use on student recall. Methods include a 44-item questionnaire to investigate graduate students' beliefs about computers and two experiments to investigate the influence of computer use during a lecture on students' memory recall. One experimental group (open laptop) used computers during a lecture while the other (closed laptop) did not. Both groups were given the same memory recall test after the lectures, and the resulting scores were analyzed. Two weeks later, a second phase of the experiment was implemented in which laptop groups were reversed. Results from the first experiment indicated no statistically significant difference in recall scores between the open laptop group (M = 54.90, SD = 19.65) and the closed laptop group (M = 42.86, SD = 16.68); t (29) = -1.82, p = .08 (two tailed). Conversely, the second experiment revealed statistically significant differences in scores between the open laptop (M = 39.67, SD = 15.97) and the closed laptop group (M = 59.29, SD = 26.88); t (20.89) = 2.37, p = .03 (two tailed). The magnitude of the difference in mean scores (mean difference = 19.62, 95% CI: 2.39 to 36.85) was large (eta squared = 0.17). Multiple regression analysis suggests two factors accounted for 10% of the variance in recall scores: (1) students' beliefs about distractions from computer use, and (2) beliefs about the influence of computer use on memory recall. Based on survey findings, participants (N=116) viewed computers and Internet access in graduate classes as helpful academic tools, but distractions from computer use were major sources of concern for students who used computers in graduate classes and those who did not. Additionally, participants believed academic productivity would increase if instructors integrated computer use appropriately in the curricula. Results of the survey and experiments suggest unstructured computer use with Internet access in the graduate classroom is strongly correlated with increased student distractions and decreased memory recall. Thus, restricting unstructured computer use is likely to increase existing memory recall levels, and increasing unstructured computer use is likely to reduce memory recall. Recommendations include changes in the way students use computers, pedagogical shifts, computer integration strategies, modified seating arrangements, increased accountability, and improved interaction between instructors and students.
Show less - Date Issued
- 2009
- Identifier
- CFE0002950, ucf:47966
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0002950
- Title
- SENSOR-BASED COMPUTING TECHNIQUES FOR REAL-TIME TRAFFIC EVACUATION MANAGEMENT.
- Creator
-
Hamza-Lup, Georgiana, Hua, Kien, University of Central Florida
- Abstract / Description
-
The threat of terrorist incidents is higher than ever before and devastating acts, such as the terrorist attacks on the World Trade Center and the Pentagon, have left many concerns about the possibility of future incidents and their potential impact. Unlike some natural disasters that can be anticipated, terrorist attacks are sudden and unexpected. Even if sometimes we do have partial information about a possible attack, it is generally not known exactly where, when, or how an attack will...
Show moreThe threat of terrorist incidents is higher than ever before and devastating acts, such as the terrorist attacks on the World Trade Center and the Pentagon, have left many concerns about the possibility of future incidents and their potential impact. Unlike some natural disasters that can be anticipated, terrorist attacks are sudden and unexpected. Even if sometimes we do have partial information about a possible attack, it is generally not known exactly where, when, or how an attack will occur. This lack of information posses great challenges on those responsible for security, specifically, on their ability to respond fast, whenever necessary with flexibility and coordination. The surface transportation system plays a critical role in responding to terrorist attacks or other unpredictable human-caused disasters. In particular, existing Intelligent Transportation Systems (ITS) can be enhanced to improve the ability of the surface transportation system to efficiently respond to emergencies and recover from disasters. This research proposes the development of new information technologies to enhance today's ITS with capabilities to improve the crisis response capabilities of the surface transportation system. The objective of this research is to develop a Smart Traffic Evacuation Management System (STEMS) that responds rapidly and effectively to terrorist threats or other unpredictable disasters, by creating dynamic evacuation plans adaptable to continuously changing traffic conditions based on real-time information. The intellectual merit of this research is that the proposed STEMS will possess capabilities to support both the unexpected and unpredictable aspects of a terrorist attack and the dynamic aspect of the traffic network environment. Studies of related work indicate that STEMS is the first system that automatically generates evacuation plans, given the location and scope of an incident and the current traffic network conditions, and dynamically adjusts the plans based on real-time information received from sensors and other surveillance technologies. Refining the plans to keep them consistent with the current conditions significantly improves evacuation effectiveness. The changes that STEMS can handle range from slow, steady variations in traffic conditions, to more sudden variations caused by secondary accidents or other stochastic factors (e.g., high visibility events that determine a sudden increase in the density of the traffic). Being especially designed to handle evacuation in case of terrorist-caused disasters, STEMS can also handle multiple coordinated attacks targeting some strategic area over a short time frame. These are frequently encountered in terrorist acts as they are intended to create panic and terror. Due to the nature of the proposed work, an important component of this project is the development of a simulation environment to support the design and test of STEMS. Developing analytical patterns for modeling traffic dynamics has been explored in the literature at different levels of resolution and realism. Most of the proposed approaches are either too limited in representing reality, or too complex for handling large networks. The contribution of this work consists of investigating and developing traffic models and evacuation algorithms that overcome both of the above limitations. Two of the greatest impacts of this research in terms of science are as follows. First, the new simulation environment developed for this project provides a test bed to facilitate future work on traffic evacuation systems. Secondly, although the models and algorithms developed for STEMS are targeted towards traffic environments and evacuation, their applicability can be extended to other environments (e.g., building evacuation) and other traffic related problems (e.g., real-time route diversion in case of accidents). One of the broader impacts of this research would be the deployment of STEMS in a real environment. This research provides a fundamental tool for handling emergency evacuation for a full range of unpredictable incidents, regardless of cause, origin and scope. Wider and swifter deployment of STEMS will support Homeland Security in general, and will also enhance the surface transportation system on which so many Homeland Security stakeholders depend.
Show less - Date Issued
- 2006
- Identifier
- CFE0001248, ucf:46919
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0001248