Browsing Engineering by Title
Now showing items 3400-3419 of 3509
-
Universal covertness for discrete memoryless sources
(IEEE, 2021-06-21)Consider a sequence $X^{n}$ of length n emitted by a Discrete Memoryless Source (DMS) with unknown distribution $p_{X}$. The objective is to construct a lossless source code that maps $X^{n}$ to a sequence \widehat {Y}^{m} ... -
Universidad Autónoma de Santo Domingo energy forecast
(Industry, Engineering & Conference Management Systems Conference, 2020-03)Energy time series data for Universidad Autónoma de Santo Domingo is analyzed and forecast by the moving window spectral method to capture cyclical components and effects. The historical record is 217 months from March ... -
University-Industry collaboration to meet Criterion 7 of an ETAC accredited program
(Industry, Engineering & Conference Management Systems Conference, 2020-03)With budget shortfalls for education and lack of sufficient funds from grants, institutions are eager to reach collaboration with engineering-related organizations and industries in order to adequately provide current and ... -
Upgrading natural gas to value-added liquid products in aqueous systems under ambient conditions
(Wichita State University, 2017-07)A novel method of upgrading natural gas into value-added liquid products is presented, in which the methane is activated by a decoupled oxidation approach with metal-surface facilitation in aqueous system under ambient ... -
Upper limb rehabilitation and mobility assistance using robotic devices: a review
(ASME, 2019-11-25)This study is aimed at reviewing the various literature on the robot-based rehabilitation and the associated technical issues, augmentation, utilization, and safeties. During recent years, Biorobotics and Collaborative ... -
Usage and flight loads analysis of King Airs in aerial firefighting missions
(American Institute of Aeronautics and Astronautics, 2015-05)Flight data of Beechcraft King Airs used as aerial supervision modules and lead aircraft by the U.S. Forest Service are analyzed. The operational conditions experienced by the airplanes are studied as well as the magnitude ... -
Use of a head component tester to evaluate the injury potential of an aircraft head-up display
(Taylor & Francis, 2011-08)Title 14 of the Code of Federal Regulations Part 25, 25.785 requires that seats and adjacent parts of the airplane be designed so that occupants will not suffer serious injury during an emergency landing as a result of ... -
Use of artificial neural networks to detect damage in composite laminates
(Wichita State University. Graduate School., 2012-04-18)A novel method of damage detection in composite laminates through the use of using artificial neural networks to interpret ultrasonic sensor signals has been investigated for this research. Four sensors were placed 4.25 ... -
Use of Euler parameters for the evaluation of ATD head trajectory from angular rate sensor and accelerometer data in aircraft seat certification testing
(Taylor & Francis, Inc, 2013-04-01)As part of the requirements of the US Federal regulations and the Society of Automotive Engineers (SAE) Aerospace Standard 8049B, when testing of the seat and adjacent parts of the aircraft may be impractical or unknown ... -
Use of SPH and Lagrangian meshing technique to assess damage area in bumper shields impacted by hypervelocity space debris
(2007-05)Space debris are objects in Earth’s orbit consisting of fragments of spent rocket stages, non-functional satellites, and parts like fasteners, paint chips and other waste materials in the lower earth orbits (LEO) (200 – ... -
User interaction in a power-wall based virtual reality environment
(IEEE, 2003-03-22)The Industrial and Manufacturing Engineering Department at Wichita State University is developing an integrated set of virtual reality models of a manufacturing line of Boeing Wichita. The purpose of this research is to ... -
User privacy enhancement in modern web applications
(IEEE, 2015)It has been shown recently that a vast majority of modern web applications are prone to compromising privacy of online activity of their users due to the applications' vulnerability to analysis of unique network traffic ... -
User selection with perfect and no primary CSIT in MIMO cognitive radio networks
(Wichita State University, 2014-12)Spectrum is one of the most precious resources in the field of wireless communication field. As the number of users and demand for fast data transmission increases, the current spectrum resources become insufficient. ... -
Using a value stream map to assess environmental impacts
(Wichita State University, 2009-12)In today's competitive world, companies focus on eliminating wastes to increase their profit, growth and ensure customer satisfaction. Among the known wastes, environmental wastes are typically the least considered. ... -
Using decoy documents to detect masquerade attacks
(Wichita State University, 2021-05)Privacy, security and integrity of data are becoming ever more important in a connected world. While every effort is being made to keep cyber criminals away from sensitive information, sometimes they succeed in bypassing ... -
Using developer-interaction trails to triage change requests
(IEEE, 2015)The paper presents an approach, namely iHDev, to recommend developers who are most likely to implement incoming change requests. The basic premise of iHDev is that the developers who interacted with the source code relevant ... -
Using graphene in coating materials to prevent UV degradation on advanced composite materials
(Wichita State University. Graduate School, 2010-04-23)The objective of the project presented here was to develop a new nanocomposite coating materials for protection of advanced fiber reinforced composite wind turbine blades against UV degradation and corrosion from weathering. ... -
Using machine learning to predict f-actin morphology of endothelial cells: An application for mechanobiology models
(Wichita State University, 2023-05)The expansive monolayer of cells in direct contact with blood is called the endothelium. The endothelium is fundamentally involved with almost every human disease. The endothelium is composed of endothelial cells (EC)s ... -
Using non-ideal gates to implement universal quantum computing between uncoupled qubits
(Springer, 2013-02)In many physical systems, when implementing quantum gate operations unavoidable global and relative phases occur as by-products due to the internal structure of the governing Hamiltonian. To correct, additional phase ... -
Using Rerouting to Improve Aggregate Based Resource Allocation
(Academy Publisher, 2008-06)This paper studies the effect of rerouting for augmenting aggregate based resource allocation in the trade-off between overhead and utilization. Aggregation is a common approach used to address the scalability issue ...