Explore Results

Developing a Test Bed for Interactive Narrative in Virtual Environments

Description: As Virtual Environments (VE) become a more commonly used method of interaction and presentation, supporting users as they navigate and interact with scenarios presented in VE will be a significant issue. A key step in understanding the needs of users in these situations will be observing them perform representative tasks in a fully developed environment. In this paper, we describe the development of a test bed for interactive narrative in a virtual environment. The test bed was specifically dev… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: August 2002
Creator: Mellacheruvu, Krishna
Partner: UNT Libraries

Implementation of Scalable Secure Multicasting

Description: A large number of applications like multi-player games, video conferencing, chat groups and network management are presently based on multicast communication. As the group communication model is being deployed for mainstream use, it is critical to provide security mechanisms that facilitate confidentiality, authenticity and integrity in group communications. Providing security in multicast communication requires addressing the problem of scalability in group key distribution. Scalability is a c… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: August 2002
Creator: Vellanki, Ramakrishnaprasad
Partner: UNT Libraries

Performance Evaluation of MPLS on Quality of Service in Voice Over IP (VoIP) Networks

Description: The transmission of voice data over Internet Protocol (IP) networks is rapidly gaining acceptance in the field of networking. The major voice transmissions in the IP networks are involved in Internet telephony, which is also known as IP telephony or Voice Over IP (VoIP). VoIP is undergoing many enhancements to provide the end users with same quality as in the public switched telephone networks (PSTN). These enhancements are mostly required in quality of service (QoS) for the transmission of voi… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: December 2002
Creator: Chetty, Sharath
Partner: UNT Libraries

Ensuring Authenticity and Integrity of Critical Information Using XML Digital Signatures

Description: It has been noticed in the past five years that the Internet use has been troubled by the lack of sufficient security and a legal framework to enable electronic commerce to flourish. Despite these shortcomings, governments, businesses and individuals are using the Internet more often as an inexpensive and ubiquitous means to disseminate and obtain information, goods and services. The Internet is insecure -- potentially millions of people have access, and "hackers" can intercept anything travel… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: December 2002
Creator: Korivi, Arjun
Partner: UNT Libraries

Server load balancing.

Description: Server load balancing technology has obtained much attention as much business proceeded towards e-commerce. The idea behind is to have set of clustered servers that share the load as against a single server to achieve better performance and throughput. In this problem in lieu of thesis, I propose and evaluate an implementation of a prototype scalable server. The prototype consists of a load-balanced cluster of hosts that collectively accept and service TCP connections. The host IP addresses are… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: December 2002
Creator: Kanuri, Jaichandra
Partner: UNT Libraries

Implementation of Back Up Host in TCP/IP

Description: This problem in lieu thesis is considering a TCP client H1 making a connection to distant server S and is downloading a file. In the midst of the downloading, if H1 crashes, the TCP connection from H1 to S is lost. In the future, if H1 restarts, the TCP connection from H1 to S will be reestablished and the file will be downloaded again. This cannot happen until host H1 restarts. Now consider a situation where there is a standby host H2 for the host H1. H1 and H2 monitor the health of each other… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: December 2002
Creator: Golla,Mohan
Partner: UNT Libraries

A Quality of Service Aware Protocol for Power Conservation in Wireless Ad Hoc and Mobile Networks

Description: Power consumption is an important issue for mobile computers since they rely on the short life of batteries. Conservation techniques are commonly used in hardware design of such systems but network interface is a significant consumer of power, which needs considerable research to be devoted towards designing a low-power design network protocol stack. Due to the dynamic nature of wireless networks, adaptations are necessary to achieve energy efficiency and a reasonable quality of service. This p… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: December 2002
Creator: Gangidi, Murali
Partner: UNT Libraries

Automatic Software Test Data Generation

Description: In software testing, it is often desirable to find test inputs that exercise specific program features. Finding these inputs manually, is extremely time consuming, especially, when the software being tested is complex. Therefore, there have been numerous attempts automate this process. Random test data generation consists of generating test inputs at random, in the hope that they will exercise the desired software features. Often the desired inputs must satisfy complex constraints, and this mak… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: December 2002
Creator: Munugala, Ajay Kumar
Partner: UNT Libraries
open access

Control Mechanisms and Recovery Techniques for Real-Time Data Transmission Over the Internet.

Description: Streaming multimedia content with UDP has become popular over distributed systems such as an Internet. This may encounter many losses due to dropped packets or late arrivals at destination since UDP can only provide best effort delivery. Even UDP doesn't have any self-recovery mechanism from congestion collapse or bursty loss to inform sender of the data to adjust future transmission rate of data like in TCP. So there is a need to incorporate various control schemes like forward error control, … more
Date: August 2002
Creator: Battula, Venkata Krishna Rao
Partner: UNT Libraries
open access

User Modeling Tools for Virtual Architecture

Description: As the use of virtual environments (VEs) is becoming more widespread, user needs are becoming a more significant part in those environments. In order to adapt to the needs of the user, a system should be able to infer user interests and goals. I developed an architecture for user modeling to understand users' interests in a VE by monitoring their actions. In this paper, I discussed the architecture and the virtual environment that was created to test it. This architecture employs sensors to kee… more
Date: May 2003
Creator: Uppuluri, Raja
Partner: UNT Libraries
open access

The Feasibility of Multicasting in RMI

Description: Due to the growing need of the Internet and networking technologies, simple, powerful, easily maintained distributed applications needed to be developed. These kinds of applications can benefit greatly from distributed computing concepts. Despite its powerful mechanisms, Jini has yet to be accepted in mainstream Java development. Until that happens, we need to find better Remote Method Invocation (RMI) solutions. Feasibility of implementation of Multicasting in RMI is worked in this paper. Mult… more
Date: May 2003
Creator: Ujjinihavildar, Vinay
Partner: UNT Libraries
open access

Machine Recognition of Hand-Send Morse Code Using the M6800 Microcomputer

Description: This research is the result of an effort to provide real-time machine recognition of hand-send Morse code through the use of the M6800 microcomputer. While the capability to recognize hand-send Morse code messages by machine has been demonstrated before on large scale special purpose computers, on minicomputers, and even on the M6800 microcomputer, the main contribution of this paper is to demonstrate it with relatively understandable hardware and software.
Date: May 1980
Creator: Firouzi, Hossein
Partner: UNT Libraries
open access

Merlin Classifier System

Description: There is a natural tendency for biological systems to change as their environments change. The fittest in the biological systems survive, adapt to their environment, and multiply while the weakest in the environment diminish. There have been attempts in computer science to model the processes of natural selection and survival which occur in biological systems in order to obtain more efficient and effective machine-learning algorithms. Genetic algorithms are the result of these attempts.
Date: May 1991
Creator: Pantermuehl, Brenda N.
Partner: UNT Libraries
open access

A Report on Control of Access to Stored Information in a Computer Utility

Description: Time-sharing computer systems permit large numbers of users to operate on common sets of data and programs. Since certain parts of these computer resources may be sensitive or proprietary, there exists the risks that information belonging to one user, may, contrary to his intent, become available to other users, and there is the additional risk that outside agencies may infiltrate the system and obtain information. The question naturally arises of protecting one user's stored program and data a… more
Date: 1978
Creator: Shakiba-Jahromi, Mostafa
Partner: UNT Libraries
open access

The Principles of Relational Databases

Description: Every business has to keep records. Sometimes these records have to be presented in a standardized form, or more often they can be arranged in any way that suits the user. Business records are of little use unless they can be referred to quickly, to provide information when it is required. In computer systems it is essential to be able to recognize any particular record in a data file which is a collection of similar records kept on secondary computer storage devices.
Date: August 1986
Creator: Hsu, Chaur-Chun
Partner: UNT Libraries
open access

Text Processing for Thai Characters

Description: The purpose of this project is 1) to create a Thai character set for text processing, 2) to write a text processing program for the character set, and 3) to allow users to create and save the text.
Date: August 1983
Creator: Tarapoom, Nirut
Partner: UNT Libraries
open access

A Comparison of Meansort and Quicksort

Description: The main purpose of this project is to compare a new sorting method- Meansort with its preceding sorting method- Quicksort. Meansort uses the mean value for each key to determine the partition of the file, but Quicksort selects at random. Experiments proved that in some ways Meansort is superior to Quicksort but is still not perfect since it always needs a mean value for each key. This project implements these two methods and determines the situations under which each of these methods outperfor… more
Date: November 1985
Creator: Tsang, Pey Betty
Partner: UNT Libraries
open access

The Data Structure of a KSAM Key Directory

Description: The purpose of this project is to explore the alternate data structures for a disk file which is currently a preorder binary tree. specifically, the file is the key directory for an implementation of Keyed Sequential Access Method (KSAM) in a mini-computer operating system. A new data structure will be chosen, with the reasons for that choice given, and it will be incorporated into the existing system.
Date: November 1980
Creator: Kirchoff, Deanna T.
Partner: UNT Libraries
open access

Mini-ADA Compiler Project

Description: The Ada language is one of the most controversial topics in computer science today. Ada was originally designed as a solution to the software maintenance problems encountered by the United States Department of Defense[2], and as a multi-purpose language to be used particularly in an embedded computer system[7]. Never before has a project been undertaken. The Ada language does not simply entail the construction of a new compiler or a new language definition, it is this and a great deal more.
Date: October 1983
Creator: Chang, Kai
Partner: UNT Libraries
open access

Design and Implementation of a Text Editor Under Music Interactive Operating System

Description: An interactive text editor is a computer program that allows a user to create and revise a target document such as program statements, manuscript text, and numeric data through an online terminal and the computer. It allows text to be modified and corrected many orders of magnitude faster and more easily than would manual correction. The most important characteristic of the text editor is its convenience for the user. Such convenience requires a simple, mnemonic command language which is easy t… more
Date: March 1984
Creator: Hwa, Shu-Jen
Partner: UNT Libraries
open access

Multiple Window Editor

Description: This paper is written to present the design purpose and design process of the Multiple Window Editor. Multiple Window Editor is a software which allows the user to edit or view different files or the same file on the screen by the window facilities provided by this software. All the windows can be dynamically created, changed, moved, and destroyed. The main purpose of this program is to improve the programming environment for the users. The design motivations will be introduced through the comp… more
Date: June 1986
Creator: Alphy, Yu Cherng-Der
Partner: UNT Libraries
open access

FORTRAN Graphics Library

Description: The objective of this work is to help the faculty, staffs and students of NTSU to use the CalComp plotting facility very easily. Therefore, this work is written in such a step by step and self-explanatory way to help the reader to understand and grasp the essential technique of the computer plotting. Each subroutine illustrated in this work has been run and checked by our NTSU computer-CalComp plotting facility; the results of sample programs and illustrated graphs are believed to be very usefu… more
Date: August 1979
Creator: Ling-Yann, Huang
Partner: UNT Libraries
open access

PILOT for the Apple II Microcomputer

Description: PILOT (Programmed Inquiry, Learning or Teaching) is a simple, conversational language developed in 1969 by John A. Starkweather at the University of California Medical Center in San Francisco. Originally designed for computer assisted instructional needs, PILOT also has been effectively used as an introductory computer language. The PILOT system developed for the Apple II microcomputer consists of two programs, PILOT EDITOR and PILOT DRIVER, which are written in Applesoft and which use the Appl… more
Date: August 1979
Creator: Ellis, Richard George
Partner: UNT Libraries
Back to Top of Screen