Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

144,583 Full-Text Articles 166,130 Authors 56,080,941 Downloads 298 Institutions

All Articles in Engineering

Faceted Search

144,583 full-text articles. Page 4060 of 4144.

A General Approach Towards The Synthesis Of Amido-Functionalized Biodegradable Polyesters, Joseph Russell 2010 Bucknell University

A General Approach Towards The Synthesis Of Amido-Functionalized Biodegradable Polyesters, Joseph Russell

Master’s Theses

The thesis presented here describes methodologies to produce pendant group functionalized polyesters from amido-functionalized α-hydroxy acids. The synthetic methods used to produce the functionalized α-hydroxy acids are compatible with a wide array of functional groups, making this technique highly versatile. The synthesis of functionalized polyesters was investigated to develop polymers with properties that may improve the capabilities of existing biodegradable polyesters for applications in controlled release pharmaceuticals. Chemically modified a-hydroxy acids were synthesized by reacting glyoxylic acid with a primary or secondary amide. To demonstrate the utility of this reaction, fourstructurally dissimilar amide substituents were examined including 2-pyrrolidione ...


Gravitational Effects On Thin-Wire Subcooled Nucleate Boiling Dynamics, Justin Koeln, Andrew Fassmann, Troy Munro, Rob Barnett 2010 Utah State University

Gravitational Effects On Thin-Wire Subcooled Nucleate Boiling Dynamics, Justin Koeln, Andrew Fassmann, Troy Munro, Rob Barnett

Education and Outreach

No abstract provided.


Funboe (Follow-Up Nucleate Boiling On-Flight Experiment), Getaway Special Team 2010 2010 Utah State University

Funboe (Follow-Up Nucleate Boiling On-Flight Experiment), Getaway Special Team 2010

Education and Outreach

No abstract provided.


Performance Tuning Of Streaming Applications Via Search-Space Decomposition, Shobana Padmanabhan, Roger D. Chamberlain, Yixin Chen 2010 Washington University in St Louis

Performance Tuning Of Streaming Applications Via Search-Space Decomposition, Shobana Padmanabhan, Roger D. Chamberlain, Yixin Chen

All Computer Science and Engineering Research

High-performance streaming applications are typically pipelined and deployed on architecturally diverse (hybrid)systems. Developers of such applications are interested in customizing components used, so as to benefit application performance. We present an efficient and automatic technique for design-space exploration of applications in this problem domain. We solve performance tuning as an optimization problem by formulating cost functions using results from queueing theory. This results in a mixed-integer nonlinear optimization problem which is NP-hard. We reduce the search complexity by decomposing the search space. We have developed a domain-specific decomposition technique using topological information of the application embodied in the queueing ...


What Do Collaborations With The Arts Have To Say About Human-Robot Interaction?, William D. Smart, Annamaria Pileggi, Leila Takayama 2010 Washington University in St Louis

What Do Collaborations With The Arts Have To Say About Human-Robot Interaction?, William D. Smart, Annamaria Pileggi, Leila Takayama

All Computer Science and Engineering Research

This is a collection of papers presented at the workshop "What Do Collaborations with the Arts Have to Say About HRI", held at the 2010 Human-Robot Interaction Conference, in Osaka, Japan.


Cloud Computing For Scalable Planning By Stochastic Search, Qiang Lu, You Xu, Ruoyun Huang, Yixin Chen 2010 Washington University in St Louis

Cloud Computing For Scalable Planning By Stochastic Search, Qiang Lu, You Xu, Ruoyun Huang, Yixin Chen

All Computer Science and Engineering Research

Graph search has been employed by many AI techniques and applications. A natural way to improve the efficiency of search is to utilize ad- vanced, more powerful computing platforms. However, expensive computing infrastructures, such as supercomputers and large-scale clusters, are traditionally available to only a limited number of projects and researchers. As a results, most AI applications, with access to only commodity com- puters and clusters, cannot benefit from the efficiency improvements of high-performance parallel search algorithms. Cloud computing provides an attractive, highly accessible alternative to other traditional high- performance computing platforms. In this paper, we first show that the ...


Priority Assignment For Real-Time Flows In Wirelesshart Sensor-Actuator Networks, Abusayeed Saifullah, You Chenyang, Yixin Chen 2010 Washington University in St Louis

Priority Assignment For Real-Time Flows In Wirelesshart Sensor-Actuator Networks, Abusayeed Saifullah, You Chenyang, Yixin Chen

All Computer Science and Engineering Research

Recent years have witnessed the adoption of wireless sensor-actuator networks as a communication infrastructure for process control applications. An important enabling technology for industrial process control is WirelessHART, an open wireless sensor-actuator network standard specifically developed for process industries. A key challenge faced byWirelessHART networks is to meet the stringent real-time communication requirements imposed by feedback control systems in process industries. Fixed priority scheduling, a popular scheduling policy in real-time networks, has recently been shown to be an effective real-time transmission scheduling policy in WirelessHART networks. Priority assignment has a major impact on the schedulability of real-time flows in these ...


Non-Planar Diamond Electrodes For Biomedical Neural Sensing And Stimulating, Jeffrey M. Halpern 2010 University of New Hampshire - Main Campus

Non-Planar Diamond Electrodes For Biomedical Neural Sensing And Stimulating, Jeffrey M. Halpern

Chemical Engineering Scholarship

Abstract

Conductive diamond has exceptional chemical stability, making it an appealing candidate material for long-term medical device implants. This work describes the characterization, and fabrication of four diamond-based neural devices. A previously developed 30 µm diamond-disk in vitro needle electrode was characterized. The device could detect 1 nM concentration analytes in a flow cell using fast scan cyclic voltammetry, but the fabrication was not reproducible. A novel in vitro diamond device was developed with diamond selectively grown at the tip of a hollow quartz capillary, resulting in a 2-4 µm tip diameter. The diamond tip shape and size were geometrically ...


Terahertz Emission From Inp, Stuart Hargreaves, Roger A. Lewis 2010 University of Wollongong

Terahertz Emission From Inp, Stuart Hargreaves, Roger A. Lewis

Australian Institute for Innovative Materials - Papers

We investigate the generation of THz radiation by the application of ultra-short near-infrared optical pulses to bulk unbiased InP. The THz radiation is detected in the direction of the specular reflection. While the overall emission characteristics are similar to those displayed by InAs under similar excitation conditions, in contrast to InAs, a single-cycle only variation in THz signal, of about ±20%, is observed as the sample is rotated through 360° around the surface normal.


Preparation Of Thiol-Terminated Monolayers On Silicon(100) Surfaces Using Thioacetyl-Protected Alkynethiol, Cheuk Chi Albert Ng, Guillaume Le Saux, Muthukumar Chockalingam, Simone Ciampi, Jason Brian Harper, J Justin Gooding 2010 University of New South Wales

Preparation Of Thiol-Terminated Monolayers On Silicon(100) Surfaces Using Thioacetyl-Protected Alkynethiol, Cheuk Chi Albert Ng, Guillaume Le Saux, Muthukumar Chockalingam, Simone Ciampi, Jason Brian Harper, J Justin Gooding

Australian Institute for Innovative Materials - Papers

The attachment of acetyl-protected alkynethiol groups onto silicon(100) surfaces was achieved using a hydrosilylation methodology. Subsequent deprotection of the thiols using either hydrochloric acid or ammonia solution was investigated using X-ray photoelectron spectroscopy (XPS), and compared with similar reaction in solution. It was found that ammonia solution was more efficient than hydrochloric acid for the deprotection step. However, the deprotection was much less efficient on the surface than in solution. 2010 IEEE.


Wet Chemical Routes To The Assembly Of Organic Monolayers On Silicon Surfaces Via The Formation Of Si-C Bonds: Surface Preparation, Passivation And Functionalization, Simone Ciampi, Jason Brian Harper, J Justin Gooding 2010 University of New South Wales

Wet Chemical Routes To The Assembly Of Organic Monolayers On Silicon Surfaces Via The Formation Of Si-C Bonds: Surface Preparation, Passivation And Functionalization, Simone Ciampi, Jason Brian Harper, J Justin Gooding

Australian Institute for Innovative Materials - Papers

Organic functionalization of non-oxidized silicon surfaces, while allowing for robust chemical passivation of the inorganic substrate, is intended and expected to broaden the chemical, physical and electronic properties of the currently most relevant technological material. Numerous protocols are now available for the preparation of Si-C, Si-O and Si-N bound layers. In particular, the covalent attachment of 1-alkenes and 1-alkynes onto hydride-terminated Si(100) and Si(111) has seen a wealth of research activity starting from the pioneering work of Linford and Chidsey (Alkyl monolayers covalently bonded to silicon surfaces, J. Am. Chem. Soc., 1993, 115(26), 12631-12632). This critical review ...


Reverse Engineering Aspects To Derive Application Class Models, Irenee Morcos George Magdalla 2010 Cleveland State University

Reverse Engineering Aspects To Derive Application Class Models, Irenee Morcos George Magdalla

ETD Archive

Aspects provide a nice way to modify behavior and implement cross-cutting concerns in object-oriented systems. As such, aspects do not have an existence of their own the application classes that the aspects refer to must be present in order to instantiate the aspects. In this research, we present a reverse engineering approach to generate a minimal class model that has all the structural elements necessary in order to complete exercise a set of aspects


A Risk-Based Approach For Examining Vertical Separation Distances In On-Site Wastewater Treatment Sytems, Anthony M. Janicek 2010 Cleveland State University

A Risk-Based Approach For Examining Vertical Separation Distances In On-Site Wastewater Treatment Sytems, Anthony M. Janicek

ETD Archive

Regulations regarding the use of on-site wastewater treatment systems in many states lack a sufficient scientific basis, which in many cases restricts the use of on-site systems, drives up cost, and restricts innovation of new treatment technologies. Of particular regulatory concern is the minimum vertical separation distance (VSD) located in the area between the trench bottom of the subsurface soil absorption system and any restricting or limiting layer. The minimum VSD needed for proper effluent treatment is based on many complex and interrelated factors regarding physical, chemical, and biological soil conditions at a particular site. Research has shown that depending ...


Computer Forensic Functions Testing: Media Preparation, Write Protection And Verification, Yinghua Guo, Jill Slay 2010 University of South Australia

Computer Forensic Functions Testing: Media Preparation, Write Protection And Verification, Yinghua Guo, Jill Slay

Journal of Digital Forensics, Security and Law

The growth in the computer forensic field has created a demand for new software (or increased functionality to existing software) and a means to verify that this software is truly forensic i.e. capable of meeting the requirements of the trier of fact. In this work, we review our previous work---a function oriented testing framework for validation and verification of computer forensic tools. This framework consists of three parts: function mapping, requirements specification and reference set development. Through function mapping, we give a scientific and systemized description of the fundamentals of computer forensic discipline, i.e. what functions are needed ...


A Comparative Study On Fault Detection And Self-Reconfiguration, Ning Ge 2010 Cleveland State University

A Comparative Study On Fault Detection And Self-Reconfiguration, Ning Ge

ETD Archive

Extended State Observer (ESO) and the Alpha-Beta-Gamma Tracker are introduced and compared. In comparison, the ESO is found to be more noise resistant. The extended state used for the estimation of the general system dynamics in real time makes it suitable for fault detection. Four control schemes are proposed for self-reconfiguration upon fault detection. These schemes are Active Disturbance Rejection Control, Tracker-based Feedback Control, Fuzzy Logic Control and Tracker-based PID Control. To compare their control performance, these schemes are applied to three different applications namely Active Engine Vibration Isolation System, Three-Tank Dynamic System and MEMS Gyroscope System. The advantages and ...


Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns 2010 University of South Florida, St. Petersburg

Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns

Journal of Digital Forensics, Security and Law

Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forensic tools is a goal of the AICPA (American Institute of Certified Public Accountants). Accounting students, however, may not view information technology as vital to their career paths and need motivation to acquire forensic knowledge and skills ...


Visual Representations Of Queried Database Results Using Google's Mapping Technologies, Steven Michael Kilbert 2010 California Polytechnic State University - San Luis Obispo

Visual Representations Of Queried Database Results Using Google's Mapping Technologies, Steven Michael Kilbert

Industrial and Manufacturing Engineering

Database queries have been used in business applications throughout the world to filter out specific information which is often used as a basis for making a decision. Despite the broad use of queries, there are only a limited number of ways to represent results, the most common being a dynaset, or results table. This paper describes the investigation of methods to create more visual representations of results using maps to show queried geospatial data. From these methods, applications were successfully developed to create customized maps in Google Earth and Google Maps based on queried geographical data from Microsoft Access databases ...


Implementing Rfid To Improve Animal Shelter Inventory And Allocation, Adam Mach 2010 California Polytechnic State University - San Luis Obispo

Implementing Rfid To Improve Animal Shelter Inventory And Allocation, Adam Mach

Industrial and Manufacturing Engineering

The purpose of this project is to observe the best way to incorporate Radio Frequency Identification (RFID) technology into the animal inventory system present in animal shelters, while also observing the benefits of implementing this system. The Woods Humane Society was used in this project as a sample animal care facility that could benefit from this application.

Many RFID systems can be observed in other industries, but very few examples this technology exist in animal shelters or smaller animal care facilities. Part of the reason for that is because funds are scarce at most animal care facilities, like the Woods ...


Some Skepticism About Search Neutrality, James Grimmelmann 2010 University of Maryland Francis King Carey School of Law

Some Skepticism About Search Neutrality, James Grimmelmann

Faculty Scholarship

In the last few years, some search-engine critics have suggested that dominant search engines (i.e. Google) should be subject to “search neutrality” regulations. By analogy to network neutrality, search neutrality would require even-handed treatment in search results: It would prevent search engines from playing favorites among websites. Academics, Google competitors, and public-interest groups have all embraced search neutrality.

Despite this sudden interest, the case for search neutrality is too muddled to be convincing. While “neutrality” is an appealing-sounding principle, it lacks a clear definition. This essay explores no fewer than eight different meanings that search-neutrality advocates have given the ...


Clustering Spam Domains And Destination Websites: Digital Forensics With Data Mining, Chun Wei, Alan Sprague, Gary Warner, Anthony Skjellum 2010 University of Alabama, Birmingham

Clustering Spam Domains And Destination Websites: Digital Forensics With Data Mining, Chun Wei, Alan Sprague, Gary Warner, Anthony Skjellum

Journal of Digital Forensics, Security and Law

Spam related cyber crimes have become a serious threat to society. Current spam research mainly aims to detect spam more effectively. We believe the identification and disruption of the supporting infrastructure used by spammers is a more effective way of stopping spam than filtering. The termination of spam hosts will greatly reduce the profit a spammer can generate and thwart his ability to send more spam. This research proposes an algorithm for clustering spam domains extracted from spam emails based on the hosting IP addresses and tracing the IP addresses over a period of time. The results show that many ...


Digital Commons powered by bepress