Alida Segal's ABSTRACTS


"3G Trends for the Mobile Wireless Systems" , Astoria, NY, 5/2002. CDMA2000
The wireless market is growing rapidly during the last decade and the prevalent trend is towards CDMA based networks. Increasingly, integrated voice and data services are being demanded and the Internet is the disruptive force that pushes the capacity limits of the current wireless networks. CDMA2000 1X is the first technology that can provide the data rates, quality of service and capacity needed to evolve to the next 3G mobile wireless systems over a spectrum efficient, cost effective, and simple upgrading plan.

"Blending algorithms for overlapping projected image boundaries", SDS International, R&D for US Military , 10/2000.
This research attempted to find mathematical functions that decrease the factoring weight associated with red, green, blue and alpha color values as a function of the overlapping region distance. Blending combines the incoming fragment's red, green, blue, alpha values with the ones stored in the framebuffer at the incoming fragment's location. The functions that exhibited the desired factoring weights for the color components at the pixel level, were the logarithm function of the overlapping width and the inverse exponential function of the same input. Within the OpenGL framework, the glBlendFunc(src, dest) function was used, where the source and destination arguments specify how the red, green, blue, and alpha source and destination blending components are computed.

Intelligent Tutoring System (SAM) for Tactical Aircraft Training (ITS-AIR): Lessons Learned & Challenges, SDS International, R&D for US Military , 8/2000.
SAM is an intelligent software agent which invokes, launches, pauses, resumes, stops, and quits complex applications resident on remote systems with a single button click, via a telnet connection. This connection validates the user, negotiates the telnet communication protocol, and transfers commands used to invoke the applications, in a transparent manner. The complexities associated with the telnet connection, and the commands used to invoke these applications, remotely, under different operating systems are all hidden from the user, which sees a simple two button interface. Multiple connections are launched, in a distributed manner. This simulation agent is used by pilots to practice flight instructions and exercises.

NVTS(Night Vision Training System) Approach and Algorithms for the Simulation of NVG (Night Vision Goggles) Gain, Noise, and Halos, SDS International, R&D for US Military , 6/2000.
This project simulates the effect of earth irradiance and wavelengths of lunar scenarios on Night Vision Goggles worn by pilots during air-flight. The SensorHost calculates the tube output, noise level, and halo intensities using a model derived from real-world measurements and sends this data frame-by-frame to a rendering processor through an ethernet TCP/IP connection, to be rendered in real-time. The rendering processor is capable to output material responses, such that scenes are rendered in 3D from a high-resolution material and terrain elevation database. Frames are rendered by modulating the material response by the dot product of the surface normal and the normal to the illuminator at every spacial sample.

"Hybrid points-to analysis", Pointer Analysis Library for McCAT Compiler, McGill University, Montreal,CA,12/97.
This paper reports on the design, partial implementation and expected results of the hybrid approach between FP (fast points-to analysis) and CSP (context-sensitive points-to analysis) models to collect alias information. FP computes a class equivalence memory model that estimates the possible targets of pointers at compile time, in almost linear time in the size of the call graph. CSP, on the other hand, gathers approximate points-to relationships between pairs of stack locations over all contexts of the invocation graph. CSP may in the worst case run in exponential time in the size of the call graph. The new hybrid approach reuses FP knowledge of points-to information to initialize the CSP initial estimate of the alias output information for recursive functions, and has the potential to reduce the number of iterations these functions are processed. This strategy results in a faster CSP algorithm that collects accurate points-to information with initial knowledge gathered by the FP analysis on recursive functions. Other attempts presented in this paper, tried to combine the FP and CSP models and resulted in a hybrid approach in which FP classifies functions as Selected or Excluded depending on their ability to modify or leave intact the alias information.


"Templates Genetic Evolution to match Face Features for Face Recognition" , Pattern Recognition Applications by Alida Segal , 2005, Polytechnic University, White Plains, NY, 5/95.
This paper explores the process of template creation to match face features, by using genetic algorithms and the principles of human evolution. Two methods of template creation are compared, to search for the most adaptive technique. One method of template creation is based on the cross-correlation function, whereas the second is based on the pixel distance between a given image and a template. The results show that the second method produces templates that converge to a steady-state in less trials. The genetically generated templates may be used to implement face recognition to a pool of databased face images .


"Bandwidth Reservation on top of UNIX Sockets for Multimedia information transfer", Polytechnic Univ., White Plains, NY, 12/94.
This paper uses the client-server model for distributed UNIX Sockets applications. The client specifies the bandwidth requirements in its request, and the server, acting as a telephone switch, sets up, controls, satisfies requests for point-to-point TCP connections that transfer multimedia information. The server first validates that all bandwidth requirements are met before it accepts the connection, and rejects it, otherwise. A multimedia information transfer is switched from one routing server node to another, to the proper destination successfully, only if all server nodes along the way, have accepted the bandwidth requirements specified by the client.


"New Trends in Cryptology", Master's Thesis, City College of New York, NY, 12/91 .
This paper focuses on the principles of public-key cryptosystems and their impact on modern cryptology. New trends have been observed in modern cryptology, in which computational complexity and trap-door one-way functions provide secure encryption/decryption algorithms. The RSA-Scheme has been depicted as the representative public-key system to illustrate its characteristics, implementation and cryptocomplexity features. The trap-door one-way function in the RSA-Scheme is the factorization of large composite integers, which at the present time take an unreasonable amount of computer time. Another common tendency found in modern cryptosystems, is towards publicized encryption procedures.


"Interactive dialogue featured as a counseling session in Prolog" , Pattern Recognition Applications by Alida Segal , 2005, City College of New York, NY, 5/89.
This paper discusses a Prolog program that engages the user in a dialogue similar to a counseling session, and works by key-word scanning a sentence looking for a match of words for which it has a prepared response stored in the database. Each matched sentence entered by the user generates a response from the database, or if no match is found, the system replies with "Tell me more".The program uses a simple attribute of Prolog -pattern recognition, and addresses issues of drug addiction, phobias, marital problems, obesity, aging and others.







Job Contracts

EDS
AT&T
IBM
CTG
BFR
LMT
McGill
IVGEn
UMUC
IBI
RHI
Paragon
SDS
DDS
CCT
DOE
CUNY
Tzava