Search Results

open access

The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress

Description: This report provides background information regarding the threats and consequences of cybersecurity. The federal legislative framework for cybersecurity is complex, with more than 50 statutes addressing various aspects of it either directly or indirectly.
Date: November 8, 2013
Creator: Fischer, Eric A.; Liu, Edward C.; Rollins, John W. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department
open access

Development of the augmented musculature device.

Description: We developed an Augmented Musculature Device (AMD) that assists the movements of its wearer. It has direct application to aiding military and law enforcement personnel, the neurologically impaired, or those requiring any type of cybernetic assistance. The AMD consists of a collection of artificial muscles, each individually actuated, strategically placed along the surface of the human body. The actuators employed by the AMD are known as 'air muscles' and operate pneumatically. They are commerci… more
Date: December 1, 2004
Creator: Rohrer, Brandon Robinson & Pankretz, Ty
Partner: UNT Libraries Government Documents Department
open access

Relevant literature in support of knowledge-based simulation models

Description: This article describes and references the relevant literature related to knowledge-based simulation. There are essentially ten areas of literature that would likely contain relevant articles. They are the management science/operations research literature, the simulation (and modeling) literature, the production/operations management literature, the knowledge engineering and artificial intelligence literature, the systems science literature, the industrial engineering literature, the mechanical … more
Date: July 1, 1987
Creator: Morgeson, J.D.; Colston, E. & Burns, J.R.
Partner: UNT Libraries Government Documents Department
open access

Dimensional analysis, similarity, analogy, and the simulation theory

Description: Dimensional analysis, similarity, analogy, and cybernetics are shown to be four consecutive steps in application of the simulation theory. This paper introduces the classes of phenomena which follow the same formal mathematical equations as models of the natural laws and the interior sphere of restraints groups of phenomena in which one can introduce simplfied nondimensional mathematical equations. The simulation by similarity in a specific field of physics, by analogy in two or more different … more
Date: January 1, 1978
Creator: Davis, A.A.
Partner: UNT Libraries Government Documents Department
open access

Integrating energy expertise into building design

Description: Most commercial buildings designed to today will use more energy to operate, and cost more to design and construct than necessary. Significant energy savings cold be achieved with little or not increase in first cost if energy-efficient design technologies were used. Research into integration of building systems indicates that by considering energy performance early in the design process, energy savings between 30% and 50% of current energy consumption rates are technically and economically fea… more
Date: August 1990
Creator: Brambley, Michael R.; Stratton, Rex C. & Bailey, Mark L.
Partner: UNT Libraries Government Documents Department
open access

QCD coherence effects in high energy reactions with nuclei.

Description: The authors investigate QCD coherence effects in deep-inelastic scattering (DIS) off nuclei and in Drell-Yan (DY) dilepton production in proton-nucleus collisions within the light-cone color-dipole approach. The physical mechanisms underlying the nuclear effects become very transparent in this approach and are explained in some detail. They present numerical calculations of nuclear shadowing in DIS and DY and compare to data. Nuclear effects in the DY transverse momentum distribition are calcul… more
Date: January 1, 2002
Creator: Raufeisen, J. (Jorg)
Partner: UNT Libraries Government Documents Department
open access

A specialized framework for data retrieval Web applications

Description: Although many general-purpose frameworks have been developed to aid in web application development, they typically tend to be both comprehensive and complex. To address this problem, a specialized server-side Java framework designed specifically for data retrieval and visualization has been developed. The framework's focus is on maintainability and data security. The functionality is rich with features necessary for simplifying data display design, deployment, user management and application de… more
Date: July 12, 2004
Creator: Nogiec, Jerzy; Trombly-Freytag, Kelley & Walbridge, Dana
Partner: UNT Libraries Government Documents Department
open access

More than just wires : applying complexity theory to communications network assurance.

Description: Complexity Theory is the study of order within otherwise chaotic systems (Holland, 1999). Complexity Theory often focuses on Complex Adaptive Systems (CAS). A CAS is a system of components that interact and reproduce while adapting to their environment. A CAS consists of large numbers of components that are diverse in both form and capability. A CAS exhibits unstable coherence in spite of constant disruptions and a lack of central planning. Large-scale, interconnected infrastructures such as co… more
Date: September 5, 2002
Creator: North, M.; Macal, C.; Thomas, W. H.; Miller, D. & Peerenboom, J.
Partner: UNT Libraries Government Documents Department
open access

The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress

Description: This report provides background information regarding the threats and consequences of cybersecurity. The federal legislative framework for cybersecurity is complex, with more than 50 statutes addressing various aspects of it either directly or indirectly.
Date: March 1, 2013
Creator: Fischer, Eric A.; Liu, Edward C.; Rollins, John W. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department
open access

Local control stations: Human engineering issues and insights

Description: The objective of this research project was to evaluate current human engineering at local control stations (LCSs) in nuclear power plants, and to identify good human engineering practices relevant to the design of these operator interfaces. General literature and reports of operating experience were reviewed to determine the extent and type of human engineering deficiencies at LCSs in nuclear power plants. In-plant assessments were made of human engineering at single-function as well as multifu… more
Date: September 1, 1994
Creator: Brown, W. S.; Higgins, J. C. & O'Hara, J. M.
Partner: UNT Libraries Government Documents Department
open access

Models, controls, and levels of semiotic autonomy

Description: In this paper the authors consider forms of autonomy, forms of semiotic systems, and any necessary relations among them. Levels of autonomy are identified as levels of system identity, from adiabatic closure to disintegration. Forms of autonomy or closure in systems are also recognized, including physical, dynamical, functional, and semiotic. Models and controls are canonical linear and circular (closed) semiotic relations respectively. They conclude that only at higher levels of autonomy do se… more
Date: December 1, 1998
Creator: Joslyn, C.
Partner: UNT Libraries Government Documents Department
open access

Semiotic aspects of control and modeling relations in complex systems

Description: A conceptual analysis of the semiotic nature of control is provided with the goal of elucidating its nature in complex systems. Control is identified as a canonical form of semiotic relation of a system to its environment. As a form of constraint between a system and its environment, its necessary and sufficient conditions are established, and the stabilities resulting from control are distinguished from other forms of stability. These result from the presence of semantic coding relations, and … more
Date: August 1, 1996
Creator: Joslyn, C.
Partner: UNT Libraries Government Documents Department
open access

What Makes a Simulation Useful

Description: Modern computers make possible a new blending of systems, man, and cybernetics in the detailed simulation of large sociotechnical systems. Several such simulations are currently under development at Los Alamos National Laboratory and elsewhere. When deployed, they will affect the daily lives of hundreds of millions of people and the allocation of billions of dollars. Whether they are deployed depends entirely on their perceived usefulness, which in turn depends on answers to the following: What… more
Date: October 12, 1999
Creator: Eubank, S.G.
Partner: UNT Libraries Government Documents Department
open access

Multimodal interfaces with voice and gesture input

Description: The modalities of speech and gesture have different strengths and weaknesses, but combined they create synergy where each modality corrects the weaknesses of the other. We believe that a multimodal system such a one interwining speech and gesture must start from a different foundation than ones which are based solely on pen input. In order to provide a basis for the design of a speech and gesture system, we have examined the research in other disciplines such as anthropology and linguistics. Th… more
Date: July 20, 1995
Creator: Milota, A. D. & Blattner, M. M.
Partner: UNT Libraries Government Documents Department
Back to Top of Screen