Search
Now showing items 71-80 of 24436
Collision Detection And Penetration Depth Calculation In Virtual Surgical Simulation
(Electrical Engineering, 2009-09-16)
Virtual Reality (VR) based surgical simulators create a simulated, realistic three dimensional surgical environments using advanced graphic and haptic rendering techniques. Virtual objects, which are geometric surface ...
CXLEngine - A Comprehensive XML Loosely Structured Search Engine
(Computer Science & Engineering, 2008-04-22)
XML keyword search has been a widely researched area. [15] has proposed an XML semantic search engine called OOXSearch, which answers loosely structured queries. The framework of OOXSearch takes into account the semantic ...
The Evolution Of Problem Solving: An Assessment Of Preference In Concurrent Schedules Of Reinforcement
(Psychology, 2008-09-17)
In personal problem-solving, an organism emits responses that have been useful in the past to alter its personal contingencies and produce a response that "solves" a problem. In verbal behavior, a human organism emits ...
Reluctant Restorationist: Thomas Campbell's Trial and its Role in his Legacy
(History, 2008-04-22)
In 1809, Thomas Campbell, with his son Alexander, founded an American religious movement that proposed the union of all Christians based upon the restoration of the New Testament church. The merging of this movement in ...
A Methodology For Evaluating The Performance Of Reverse Supply Chains In Consumer Electronics Industry
(Industrial & Manufacturing Engineering, 2007-08-23)
Enterprises around the world are employing reverse supply chain practices to generate profit making opportunities while meeting new regulations. As a result of the rapid progress in technology the product lifecycles are ...
The Commercial Sexual Exploitation Of Children
(Criminology & Criminal Justice, 2008-04-22)
The purpose of the study is to review the thematic content analysis of the empirical literature on the commercial sexual exploitation of children. The research explores recurring themes and/ or trends in the literature ...
CPTED: Interpreting Contemporary Security Practices In The Era Of Homeland Security
(Criminology & Criminal Justice, 2008-04-22)
The actions taken by the United States Government to increase domestic security in the wake of the September 11, 2001 terrorist attacks, under the guise of homeland security, clearly make use of the techniques and philosophies ...
Time-varying Feedback Systems Design Via Diophantine Equation Order Reduction
(Electrical Engineering, 2008-04-22)
Diophantine equation plays an important role in the design and synthesis of feedback compensators. Many methods have been developed to solve the Diophantine equation. This dissertation develops a new systematic approach ...
CAP: A Context-aware Privacy Protection System For Location-based Services
(Computer Science & Engineering, 2008-09-17)
Location Based Services (LBS) are information services that provide users with customized contents, such as the nearest restaurants/hotels/clinics, retrieved from a dedicated spatial database. They make use of technologies ...
Numerical Simulation Of Magnetohydrodynamics
(Aerospace Engineering, 2008-04-22)
Use of electromagnetic fields has been shown to be an effective way to control the behavior of electrically conducting fluids. Specifically, the modification of the boundary layer profile with electromagnetic fields can ...