Current Search: College of Engineering and Computer Science (x)
View All Items
Pages
- Title
- An uncertainty-aware reputation system in mobile networks: analysis and applications.
- Creator
- Li, Feng., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Many emerging mobile networks aim to provide wireless network services without relying on any infrastructure. The main challenge in these networks comes from their self-organized and distributed nature. There is an inherent reliance on collaboration among the participants in order to achieve the aimed functionalities. Therefore, establishing and quantifying trust, which is the driving force for collaboration, is important for applications in mobile networks. This dissertation focuses on...
Show moreMany emerging mobile networks aim to provide wireless network services without relying on any infrastructure. The main challenge in these networks comes from their self-organized and distributed nature. There is an inherent reliance on collaboration among the participants in order to achieve the aimed functionalities. Therefore, establishing and quantifying trust, which is the driving force for collaboration, is important for applications in mobile networks. This dissertation focuses on evaluating and quantifying trust to stimulate collaboration in mobile networks, introducing uncertainty concepts and metrics, as well as providing the various analysis and applications of uncertainty-aware reputation systems. Many existing reputation systems sharply divide the trust value into right or wrong, thus ignoring another core dimension of trust: uncertainty. As uncertainty deeply impacts a node's anticipation of others' behavior and decisions during interaction, we include it in the reputation system. Specifically, we use an uncertainty metric to directly reflect a node's confidence in the sufficiency of its past experience, and study how the collection of trust information may affect uncertainty in nodes' opinions. Higher uncertainty leads to higher transaction cost and reduced acceptance of communication. We exploit mobility to efficiently reduce uncertainty and to speed up trust convergence. We also apply the new reputation system to enhance the analysis of the interactions among mobile nodes, and present three sample uncertainty-aware applications. We integrate the uncertainty-aware reputation model with game theory tools, and enhance the analysis on interactions among mobile nodes., Instead of reactively protecting the mobile networks from existing attacks as in the traditional security paradigms, the analysis in this dissertation gives more insights on nodes' rationality in the interaction, which will enable the mechanism design in mobile networks to be security and incentive compatible. Moreover, we present three sample applications, in which we clearly identify the challenges, specifically formalize the problems, and cleverly employ the uncertainty mitigation schemes. These applications show that the uncertainty definition and mitigation schemes can benefit a broad range of applications, including fields such as security, network services, and routing.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/210520
- Subject Headings
- Wireless communication systems, Security measures, Wireless communication systems, Technological innovations, Computer network architectures, Mobile computing, Ad hoc networks (Computer networks), Security measures
- Format
- Document (PDF)
- Title
- Text Mining and Topic Modeling for Social and Medical Decision Support.
- Creator
- Hurtado, Jose Luis, Zhu, Xingquan, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Effective decision support plays vital roles in people's daily life, as well as for professional practitioners such as health care providers. Without correct information and timely derived knowledge, a decision is often suboptimal and may result in signi cant nancial loss or compromises of the performance. In this dissertation, we study text mining and topic modeling and propose to use text mining methods, in combination with topic models, to discover knowledge from texts popularly available...
Show moreEffective decision support plays vital roles in people's daily life, as well as for professional practitioners such as health care providers. Without correct information and timely derived knowledge, a decision is often suboptimal and may result in signi cant nancial loss or compromises of the performance. In this dissertation, we study text mining and topic modeling and propose to use text mining methods, in combination with topic models, to discover knowledge from texts popularly available from a wide variety of sources, such as research publications, news, medical diagnose notes, and further employ discovered knowledge to assist social and medical decision support. Examples of such decisions include hospital patient readmission prediction, which is a national initiative for health care cost reduction, academic research topics discovery and trend modeling, and social preference modeling for friend recommendation in social networks etc. To carry out text mining, our research, in Chapter 3, first emphasizes on single document analyzing to investigate textual stylometric features for user pro ling and recognition. Our research confirms that by using properly designed features, it is possible to identify the authors who wrote the article, using a number of sample articles written by the author as the training data. This study serves as the base to assert that text mining is a powerful tool for capturing knowledge in texts for better decision making. In the Chapter 4, we advance our research from single documents to documents with interdependency relationships, and propose to model and predict citation relationship between documents. Given a collection of documents with known linkage relationships, our research will discover e ective features to train prediction models, and predict the likelihood of two documents involving a citation relationships. This study will help accurately model social network linkage relationships, and can be used to assist e ective decision making for friend recommendation in social networking, and reference recommendation in scienti c writing etc. In the Chapter 5, we advance a topic discovery and trend prediction principle to discover meaningful topics from a set of data collection, and further model the evolution trend of the topic. By proposing techniques to discover topics from text, and using temporal correlation between trend for prediction, our techniques can be used to summarize a large collection of documents as meaningful topics, and further forecast the popularity of the topic in a near future. This study can help design systems to discover popular topics in social media, and further assist resource planning and scheduling based on the discovered topics and the their evolution trend. In the Chapter 6, we employ both text mining and topic modeling to the medical domain for effective decision making. The goal is to discover knowledge from medical notes to predict the risk of a patient being re-admitted in a near future. Our research emphasizes on the challenge that re-admitted patients are only a small portion of the patient population, although they bring signficant financial loss. As a result, the datasets are highly imbalanced which often result in poor accuracy for decision making. Our research will propose to use latent topic modeling to carryout localized sampling, and combine models trained from multiple copies of sampled data for accurate prediction. This study can be directly used to assist hospital re-admission assessment for early warning and decision support. The text mining and topic modeling techniques investigated in the dissertation can be applied to many other domains, involving texts and social relationships, towards pattern and knowledge based e ective decision making.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004782, http://purl.flvc.org/fau/fd/FA00004782
- Subject Headings
- Social sciences--Research--Methodology., Data mining., Machine learning., Database searching., Discourse analysis--Data processing., Communication--Network analysis., Medical care--Quality control.
- Format
- Document (PDF)
- Title
- Utilizing a Game Theoretical Approach to Prevent Collusion and Incentivize Cooperation in Cybersecurity Contexts.
- Creator
- Golchubian, Arash, Nojoumian, Mehrdad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In this research, a new reputation-based model is utilized to disincentivize collusion of defenders and attackers in Software Defined Networks (SDN), and also, to disincentivize dishonest mining strategies in Blockchain. In the context of SDN, the model uses the reputation values assigned to each entity to disincentivize collusion with an attacker. Our analysis shows that not-colluding actions become Nash Equilibrium using the reputationbased model within a repeated game setting. In the...
Show moreIn this research, a new reputation-based model is utilized to disincentivize collusion of defenders and attackers in Software Defined Networks (SDN), and also, to disincentivize dishonest mining strategies in Blockchain. In the context of SDN, the model uses the reputation values assigned to each entity to disincentivize collusion with an attacker. Our analysis shows that not-colluding actions become Nash Equilibrium using the reputationbased model within a repeated game setting. In the context of Blockchain and mining, we illustrate that by using the same socio-rational model, miners not only are incentivized to conduct honest mining but also disincentivized to commit to any malicious activities against other mining pools. We therefore show that honest mining strategies become Nash Equilibrium in our setting. This thesis is laid out in the following manner. In chapter 2 an introduction to game theory is provided followed by a survey of previous works in game theoretic network security, in chapter 3 a new reputation-based model is introduced to be used within the context of a Software Defined Network (SDN), in chapter 4 a reputation-based solution concept is introduced to force cooperation by each mining entity in Blockchain, and finally, in chapter 5, the concluding remarks and future works are presented.
Show less - Date Issued
- 2017
- PURL
- http://purl.flvc.org/fau/fd/FA00005950
- Subject Headings
- Dissertations, Academic -- Florida Atlantic University, Software-defined networks (Computer network technology), Blockchain, Cybersecurity
- Format
- Document (PDF)
- Title
- Universal physical access control system (UPACS).
- Creator
- Carryl, Clyde, Alhalabi, Bassem A., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This research addresses the need for increased interoperability between the varied access control systems in use today, and for a secure means of providing access to remote physical devices over untrusted networks. The Universal Physical Access Control System (UPACS) is an encryption-enabled security protocol that provides a standard customizable device control mechanism that can be used to control the behavior of a wide variety of physical devices, and provide users the ability to securely...
Show moreThis research addresses the need for increased interoperability between the varied access control systems in use today, and for a secure means of providing access to remote physical devices over untrusted networks. The Universal Physical Access Control System (UPACS) is an encryption-enabled security protocol that provides a standard customizable device control mechanism that can be used to control the behavior of a wide variety of physical devices, and provide users the ability to securely access those physical devices over untrusted networks.
Show less - Date Issued
- 2015
- PURL
- http://purl.flvc.org/fau/fd/FA00004354, http://purl.flvc.org/fau/fd/FA00004354
- Subject Headings
- Body area networks (Electronics), Computational complexity, Computer network protocols, Computer security, Cryptography, Data encryption (Computer science), Data structures (Computer science), Telecommunication -- Security measures
- Format
- Document (PDF)
- Title
- Unifying the conceptual levels of network security through the use of patterns.
- Creator
- Kumar, Ajoy, Fernandez, Eduardo B., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Network architectures are described by the International Standard for Organization (ISO), which contains seven layers. The internet uses four of these layers, of which three are of interest to us. These layers are Internet Protocol (IP) or Network Layer, Transport Layer and Application Layer. We need to protect against attacks that may come through any of these layers. In the world of network security, systems are plagued by various attacks, internal and external, and could result in Denial...
Show moreNetwork architectures are described by the International Standard for Organization (ISO), which contains seven layers. The internet uses four of these layers, of which three are of interest to us. These layers are Internet Protocol (IP) or Network Layer, Transport Layer and Application Layer. We need to protect against attacks that may come through any of these layers. In the world of network security, systems are plagued by various attacks, internal and external, and could result in Denial of Service (DoS) and/or other damaging effects. Such attacks and loss of service can be devastating for the users of the system. The implementation of security devices such as Firewalls and Intrusion Detection Systems (IDS), the protection of network traffic with Virtual Private Networks (VPNs), and the use of secure protocols for the layers are important to enhance the security at each of these layers.We have done a survey of the existing network security patterns and we have written the missing patterns. We have developed security patterns for abstract IDS, Behavior–based IDS and Rule-based IDS and as well as for Internet Protocol Security (IPSec) and Transport Layer Security (TLS) protocols. We have also identified the need for a VPN pattern and have developed security patterns for abstract VPN, an IPSec VPN and a TLS VPN. We also evaluated these patterns with respect to some aspects to simplify their application by system designers. We have tried to unify the security of the network layers using security patterns by tying in security patterns for network transmission, network protocols and network boundary devices.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004132, http://purl.flvc.org/fau/fd/FA00004132
- Subject Headings
- Computer architecture, Computer network architectures, Computer network protocols, Computer network protocols, Computer networks -- Security measures, Expert systems (Computer science)
- Format
- Document (PDF)
- Title
- Traffic congestion detection using VANET.
- Creator
- Padron, Francisco M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
We propose a distributed, collaborative traffic congestion detection and dissemination system using VANET that makes efficient use of the communication channel, maintains location privacy, and provides drivers with real-time information on traffic congestions over long distances. The system uses vehicles themselves, equipped with simple inexpensive devices, as gatherers and distributors of information without the need for costly road infrastructure such as sensors, cameras or external...
Show moreWe propose a distributed, collaborative traffic congestion detection and dissemination system using VANET that makes efficient use of the communication channel, maintains location privacy, and provides drivers with real-time information on traffic congestions over long distances. The system uses vehicles themselves, equipped with simple inexpensive devices, as gatherers and distributors of information without the need for costly road infrastructure such as sensors, cameras or external communication equipment. Additionally, we present a flexible simulation and visualization framework we designed and developed to validate our system by showing its effectiveness in multiple scenarios and to aid in the research and development of this and future VANET applications.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/186684
- Subject Headings
- Vehicular ad-hoc networks (Computer networks), Traffic congestion, Mathematical models, Mobile communication systems, Evaluation, Traffic congestion, Prevention
- Format
- Document (PDF)
- Title
- Towards modeling a long-term disaster recovery management.
- Creator
- Nieto Tibaquirâa, Carlos A., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Disasters are unavoidable. The United States separates the phases of addressing a disaster into Response and Recovery. There are systems in place for Response; but Recovery, a fundamental process for countries to rebound from disasters, is a topic that is left aside. Recently the U.S. released a framework regarding this topic and it is the intention of this work to further explore recovery by starting a modeling process for disaster management systems by developing a Disaster Recovery Roles...
Show moreDisasters are unavoidable. The United States separates the phases of addressing a disaster into Response and Recovery. There are systems in place for Response; but Recovery, a fundamental process for countries to rebound from disasters, is a topic that is left aside. Recently the U.S. released a framework regarding this topic and it is the intention of this work to further explore recovery by starting a modeling process for disaster management systems by developing a Disaster Recovery Roles Pattern based on the framework and creating flowcharts using the Business Process Modeling Notation for use in future development of systems for the recovery process.
Show less - Date Issued
- 2012
- PURL
- http://purl.flvc.org/FAU/3342240
- Subject Headings
- Emergency management, Disaster relief, Government policy, Disaster relief, Planning
- Format
- Document (PDF)
- Title
- User Behavior Modeling in Online Display Advertising.
- Creator
- Van Nice, Kara, Zhu, Xingquan, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Online display advertising intends to find the best match between advertise- ment (ad) campaigns and online users, conditioned by user specific contexts such as geographic locations, and hobbies etc. During this matching process, user behavior plays a crucial role in determining whether and when the user, who has been served the ad, will result in a conversion event. Advertisers seek to understand how users behave if they are continuously served impressions from the same campaign, as well as...
Show moreOnline display advertising intends to find the best match between advertise- ment (ad) campaigns and online users, conditioned by user specific contexts such as geographic locations, and hobbies etc. During this matching process, user behavior plays a crucial role in determining whether and when the user, who has been served the ad, will result in a conversion event. Advertisers seek to understand how users behave if they are continuously served impressions from the same campaign, as well as any noticeable patterns between campaign categorization and user behavior. This thesis carries out data analytics to investigate correlation between user behavior and campaign conversion rates (CVR), including click-through conversion rates and view- through conversion rates. We investigate campaign categorization based on both IAB categories, and campaign dfficulty level defined by effective CPA (eCPA). We carry out large scale analytics over billions of impressions from over 1000 campaigns, observing consistent patterns and significant findings.
Show less - Date Issued
- 2018
- PURL
- http://purl.flvc.org/fau/fd/FA00013018
- Subject Headings
- Consumer behavior, Advertising campaigns--Data processing, Internet advertising
- Format
- Document (PDF)
- Title
- Using Electroencephalography and Structured Data Collection Techniques to Measure Passenger Emotional Response in Human-Autonomous Vehicle Interactions.
- Creator
- Park, Corey, Nojoumian, Mehrdad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Wide spread consumer adoption of self-driving cars (SDC) is predicated on a level of trust between humans and the autonomous vehicle. Despite advances being made in the technical abilities of SDCs, recent studies indicate that people are negatively predisposed toward utilizing autonomous vehicles. To bridge the gap between consumer skepticism and adoption of SDCs, research is needed to better understand the evolution of trust between humans and growing autonomous technologies. The question of...
Show moreWide spread consumer adoption of self-driving cars (SDC) is predicated on a level of trust between humans and the autonomous vehicle. Despite advances being made in the technical abilities of SDCs, recent studies indicate that people are negatively predisposed toward utilizing autonomous vehicles. To bridge the gap between consumer skepticism and adoption of SDCs, research is needed to better understand the evolution of trust between humans and growing autonomous technologies. The question of mainstream acceptance and requisite trust is explored through integration of virtual reality SDC simulator, an electroencephalographic (EEG) recorder, and a new approach for real-time trust measurement between passengers and SDCs. An experiment on fifty human subjects was conducted where participants were exposed to scenarios designed to induce positive and negative trust responses. Emotional state was quantified by the EEG beta wave to alpha wave power ratio, and participants self-reported their levels of trust in the SDC after each segment.
Show less - Date Issued
- 2018
- PURL
- http://purl.flvc.org/fau/fd/FA00013169
- Subject Headings
- Autonomous vehicles--Psychological aspects, Self-driving cars, Electroencephalography
- Format
- Document (PDF)
- Title
- An efficient and scalable core allocation strategy for multicore systems.
- Creator
- Rani, Manira S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Multiple threads can run concurrently on multiple cores in a multicore system and improve performance/power ratio. However, effective core allocation in multicore and manycore systems is very challenging. In this thesis, we propose an effective and scalable core allocation strategy for multicore systems to achieve optimal core utilization by reducing both internal and external fragmentations. Our proposed strategy helps evenly spreading the servicing cores on the chip to facilitate better...
Show moreMultiple threads can run concurrently on multiple cores in a multicore system and improve performance/power ratio. However, effective core allocation in multicore and manycore systems is very challenging. In this thesis, we propose an effective and scalable core allocation strategy for multicore systems to achieve optimal core utilization by reducing both internal and external fragmentations. Our proposed strategy helps evenly spreading the servicing cores on the chip to facilitate better heat dissipation. We introduce a multi-stage power management scheme to reduce the total power consumption by managing the power states of the cores. We simulate three multicore systems, with 16, 32, and 64 cores, respectively, using synthetic workload. Experimental results show that our proposed strategy performs better than Square-shaped, Rectangle-shaped, L-Shaped, and Hybrid (contiguous and non-contiguous) schemes in multicore systems in terms of fragmentation and completion time. Among these strategies, our strategy provides a better heat dissipation mechanism.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3172698
- Subject Headings
- Modularity (Engineering), Multicasting (Computer networks), Convergence (Telecommunication), Computer architecture, Memory management (Computer science), Cache memory
- Format
- Document (PDF)
- Title
- A Study on Random Sum Statistics: Application to Wireless Network Performance Analysis.
- Creator
- Pattaramalai, Suwat, Aalo, Valentine A., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The statistics of random sum is studied and used to evaluate performance metrics in wireless networks. Pertinent wireless network performance measures such as call completion/dropping probabilities and the average number of handovers usually require the probability distributions of the cell dwell time and call holding time; and are therefore not easy to evaluate. The proposed performance evaluation technique requires the moments of the cell dwell time and is given in terms of the Laplace...
Show moreThe statistics of random sum is studied and used to evaluate performance metrics in wireless networks. Pertinent wireless network performance measures such as call completion/dropping probabilities and the average number of handovers usually require the probability distributions of the cell dwell time and call holding time; and are therefore not easy to evaluate. The proposed performance evaluation technique requires the moments of the cell dwell time and is given in terms of the Laplace transform function of the call holding time. Multimedia services that have Weibull and generalized gamma distributed call holding times are investigated. The proposed approximation method uses the compound geometric random sum distribution and requires that the geometric parameter be very small. For applications in which this parameter is not sufficiently small, a result is derived that improves the accuracy (to order of the geometric parameter) of the performance measures evaluated.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012575
- Subject Headings
- Mobile communication systems--Technological innovations, Computer network protocols, Local area networks (Computer networks), Differentiable dynamical systems
- Format
- Document (PDF)
- Title
- A utility-based routing scheme in multi-hop wireless networks.
- Creator
- Lu, Mingming., College of Engineering and Computer Science, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Multi-hop wireless networks are infrastructure-less networks consisting of mobile or stationary wireless devices, which include multi-hop wireless mesh networks and multi-hop wireless sensor networks. These networks are characterized by limited bandwidth and energy resources, unreliable communication, and a lack of central control. These characteristics lead to the research challenges of multi-hop wireless networks. Building up routing schemes with good balance among the routing QoS (such as...
Show moreMulti-hop wireless networks are infrastructure-less networks consisting of mobile or stationary wireless devices, which include multi-hop wireless mesh networks and multi-hop wireless sensor networks. These networks are characterized by limited bandwidth and energy resources, unreliable communication, and a lack of central control. These characteristics lead to the research challenges of multi-hop wireless networks. Building up routing schemes with good balance among the routing QoS (such as reliability, cost, and delay) is a paramount concern to achieve high performance wireless networks. These QoS metrics are internally correlated. Most existing works did not fully utilize this correlation. We design a metric to balance the trade-off between reliability and cost, and build up a framework of utility-based routing model in multi-hop wireless networks. This dissertation focuses on the variations with applications of utility-based routing models, designing new concepts, and developing new algorithms for them. A review of existing routing algorithms and the basic utility-based routing model for multi-hop wireless networks has been provided at the beginning. An efficient algorithm, called MaxUtility, has been proposed for the basic utility-based routing model. MaxUtility is an optimal algorithm that can find the best routing path with the maximum expected utility., Various utility-based routing models are extended to further enhance the routing reliability while reducing the routing overhead. Besides computing the optimal path for a given benefit value and a given source-destination pair, the utility-based routing can be further extended to compute all optimal paths for all possible benefit values and/or all source-destination pairs. Our utility-based routing can also adapt to different applications and various environments. In the self-organized environment, where network users are selfish, we design a truthful routing, where selfish users have to tell the truth in order to maximize their utilities. We apply our utility-based routing scheme to the data-gathering wireless sensor networks, where a routing scheme is required to transmit data sensed by multiple sensor nodes to a common sink node.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/FAU/77647
- Subject Headings
- Wireless communication systems, Security measures, Computer network protocols, Computer algorithms, Computer networks, Security measures
- Format
- Document (PDF)
- Title
- A Biometrics Based Secure Communication Scheme for Bluetooth Environment.
- Creator
- Soni, Puneet, Pandya, Abhijit S., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A novel personnel authentication and verification system for devices communicating through Bluetooth protocol has been proposed in this thesis. Unlike existing verification systems which provide password or a PIN as a key, the system uses biometrics features as a key. In the implementation of the scheme, ridges and bifurcation based parameters are derived to generate a 128 bit Bluetooth pairing PIN. In this thesis a unique translational and rotational invariant feature set has been developed....
Show moreA novel personnel authentication and verification system for devices communicating through Bluetooth protocol has been proposed in this thesis. Unlike existing verification systems which provide password or a PIN as a key, the system uses biometrics features as a key. In the implementation of the scheme, ridges and bifurcation based parameters are derived to generate a 128 bit Bluetooth pairing PIN. In this thesis a unique translational and rotational invariant feature set has been developed. These extracted feature data, unlike traditional systems which include the extracted data into payload, is used for device connection by generating the 128 bit PIN. The system performance is analyzed using the pairing PIN for inter-sample and intra-sample recognition. To validate the stability of the system the performance is analyzed with external samples which are not a part of the internal database.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012556
- Subject Headings
- Bluetooth technology--Security measures, Network performance (Telecommunication), Computer network protocols
- Format
- Document (PDF)
- Title
- ADAPTIVE HYBRID MULTIPLE ACCESS PROTOCOLS WITH SATELLITE NETWORK APPLICATIONS.
- Creator
- SARDANA, KARAMVIR., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A general and broad new class, ART, consisting of adaptive hybrid multiple access protocols applicable to communication networks sharing a single transmission medium and which behave like A loha-type, R eservation and T DMA basic protocols at low, medium and high throughput respectively, is proposed. Each hybrid protocol in this class is a combination of one protocol, possibly individually adaptive or improved version, from each of these three basic classes of protocols. Specifically, for...
Show moreA general and broad new class, ART, consisting of adaptive hybrid multiple access protocols applicable to communication networks sharing a single transmission medium and which behave like A loha-type, R eservation and T DMA basic protocols at low, medium and high throughput respectively, is proposed. Each hybrid protocol in this class is a combination of one protocol, possibly individually adaptive or improved version, from each of these three basic classes of protocols. Specifically, for satellite communication networks, a sub-class of ART protocols called Adaptive Satellite Hybrid Access (ASHA)+ is proposed.Two ASHA protocols named ASHA1 and ASHA2 that combine the features of S-ALOHA, TDMA-Reservation and TDMA protocols by using a proposed generalized design technique, are described in detail and their analytical models are formulated. The ASHA protocols are analyzed using Equilibrium Point Analysis technique and then their analytical results are presented. A fairly sophisticated and new simulator, modeled basically as a 3-state finite state machine, to simulate the ASHA protocols is designed, described and implemented. A new phenomenon called "protocol oscillations" is observed, in which a hybrid protocol oscillates back and forth between its two adjacent states without accomplishing much, and becomes literally unstable. Traffic measures and threshold values to remedy this problem are discussed. As a by-product of simulator validation, it is found that SRUC protocol, previously thought to be stable at all traffic levels, also suffers from this problem. In addition, some previous simulation results of SRUC protocol are felt not to be correct, and its simulation results that we believe to be correct instead, are given. Detailed simulation results of ASHA protocols are presented and also compared with their analytical results. These results provide a large amount of practical and valuable insight, heretofore unknown, into the workings of adaptive hybrid protocols in general and of ASHA protocols in particular. Moreover, these results show that ASHA protocols provide better delay versus throughput performance over the entire range of throughput compared to any of their individual constituent protocols, and extend the channel capacity to unity. ftn$\sp+$As an aside, ASHA means "hope" in Hindi language.
Show less - Date Issued
- 1987
- PURL
- http://purl.flvc.org/fcla/dt/11907
- Subject Headings
- Computer network protocols, Artificial satellites in telecommunication
- Format
- Document (PDF)
- Title
- Acknowledgement overhead in local area networks.
- Creator
- Lyford, Avery Martin., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The throughput of a local area network (LAN) is primarily determined by the speed with which the communicating station can process the packets of data. Because of this, protocol overhead is extremely costly to system throughput. A major contributor to the protocol overhead is the acknowledgement structure. Often in a multilayered system acknowledgements are generated by multiple levels. The purpose of this thesis is to explore, through the use of queueing model simulation and analysis, the...
Show moreThe throughput of a local area network (LAN) is primarily determined by the speed with which the communicating station can process the packets of data. Because of this, protocol overhead is extremely costly to system throughput. A major contributor to the protocol overhead is the acknowledgement structure. Often in a multilayered system acknowledgements are generated by multiple levels. The purpose of this thesis is to explore, through the use of queueing model simulation and analysis, the impact of different acknowledgement structures on throughput. Possible ways to alleviate the problem, such as peripheral processors and modified protocol layers, are also briefly examined.
Show less - Date Issued
- 1987
- PURL
- http://purl.flvc.org/fcla/dt/14424
- Subject Headings
- Local area networks, Acknowledgements
- Format
- Document (PDF)
- Title
- Adaptive two-level watermarking for binary document images.
- Creator
- Muharemagic, Edin., Florida Atlantic University, Furht, Borko, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In our society, large volumes of documents are exchanged on a daily basis. Since documents can easily be scanned, modified and reproduced without any loss in quality, unauthorized use and modification of documents is of major concern. An authentication watermark embedded into a document as an invisible, fragile mark can be used to detect illegal document modification. However, the authentication watermark can only be used to determine whether documents have been tampered with, and additional...
Show moreIn our society, large volumes of documents are exchanged on a daily basis. Since documents can easily be scanned, modified and reproduced without any loss in quality, unauthorized use and modification of documents is of major concern. An authentication watermark embedded into a document as an invisible, fragile mark can be used to detect illegal document modification. However, the authentication watermark can only be used to determine whether documents have been tampered with, and additional protection may be needed to prevent unauthorized use and distribution of those documents. A solution to this problem is a two-level, multipurpose watermark. The first level watermark is an authentication mark used to detect document tampering, while the second level watermark is a robust mark, which identifies the legitimate owner and/or user of specific document. This dissertation introduces a new adaptive two-level multipurpose watermarking scheme suitable for binary document images, such as scanned text, figures, engineering and road maps, architectural drawings, music scores, and handwritten text and sketches. This watermarking scheme uses uniform quantization and overlapped embedding to add two watermarks, one robust and the other fragile, into a binary document image. The two embedded watermarks serve different purposes. The robust watermark carries document owner or document user identification, and the fragile watermark confirms document authenticity and helps detect document tampering. Both watermarks can be extracted without accessing the original document image. The proposed watermarking scheme adaptively selects an image partitioning block size to optimize the embedding capacity, the image permutation key to minimize watermark detection error, and the size of local neighborhood in which modification candidate pixels are scored to minimize visible distortion of watermarked documents. Modification candidate pixels are scored using a novel, objective metric called the Structural Neighborhood Distortion Measure (SNDM). Experimental results confirm that this watermarking scheme, which embeds watermarks by modifying image pixels based on their SNDM scores, creates smaller visible document distortion than watermarking schemes which base watermark embedding on any other published pixel scoring method. Document tampering is detected successfully and the robust watermark can be detected even after document tampering renders the fragile watermark undetectable.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fau/fd/FADT12113
- Subject Headings
- Data encryption (Computer science), Computer security, Digital watermarking, Data protection, Image processing--Digital techniques, Watermarks
- Format
- Document (PDF)
- Title
- Adaptive control of vibration in flexible smart structures.
- Creator
- Gopinathan, Murali., Florida Atlantic University, Pajunen, Grazyna, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This dissertation is concerned with the relevant research in developing finite dimensional indirect adaptive schemes to control vibrations in flexible smart structures based on the finite element approximation of the infinite dimensional system. The advantage of this type of modeling is that the dominant modes of vibrations wherein the total energy is concentrated are accommodated thereby avoiding the so-called "spillover" phenomenon. Further, the mass, stiffness and damping coefficients...
Show moreThis dissertation is concerned with the relevant research in developing finite dimensional indirect adaptive schemes to control vibrations in flexible smart structures based on the finite element approximation of the infinite dimensional system. The advantage of this type of modeling is that the dominant modes of vibrations wherein the total energy is concentrated are accommodated thereby avoiding the so-called "spillover" phenomenon. Further, the mass, stiffness and damping coefficients associated with each element appear explicitly in the model facilitating the derivation of the ARMA parametric representation which is suitable for on-line estimation of the structural parameters. The state-space representation of the finite dimensional model is used to design an indirect linear quadratic self tuning regulator algorithm using the parameter estimation, indicated above. Further, a method to choose the control and state weighting matrices (required to design the controller) to yield a stable closed-loop system, is presented. Simulation results demonstrating the performance of the adaptive control system are presented. Another algorithm based on the model reference technique is also developed by considering the discrete time approximation of the finite dimensional model. This control algorithm in conjunction with the parameter estimation constitute an indirect model reference adaptive control system. Simulation results are presented to demonstrate the effect of the reference model parameters, which may impose certain constraints on the force requirements causing actuator saturation and thereby affecting the stability of the closed-loop system. In order to overcome the problem of using bulky and expensive sensors to measure transverse displacement and velocity, a new spatial recursive technique to estimate these variables alternatively by using a distributed set of (measured) strain data, is developed. Relevant algorithm enables the use of smart materials to sense the strain developed at various locations along the length of the structure leading to the development of flexible smart structures. Experimental results on the personal computer based control of vibrations in an aluminum beam using patches of polyvinyldene fluoride (PVDF), and lead zirconate titanate (PZT) as sensors and control actuators respectively, are furnished to demonstrate the feasibility of real-time implementation of the above mentioned control algorithms.
Show less - Date Issued
- 1995
- PURL
- http://purl.flvc.org/fcla/dt/12418
- Subject Headings
- Adaptive control systems, Smart structures, Vibration
- Format
- Document (PDF)
- Title
- Active networking and innovation: An evaluation of active networking as a driver of accelerated Internet innovation.
- Creator
- Wood, James L., Florida Atlantic University, Wu, Jie, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Innovation has flourished at the edge of the Internet; however, the core has experienced a slower pace of innovation. This lag is impacting the pace of innovation at the edge and threatening quality as ad hoc solutions are implemented to overcome core network barriers to innovation. Active networking technology, which opens up the architecture of routers, is proposed as a standard solution. Researchers draw an analogy to the computer industry where innovation is claimed to be accelerated by...
Show moreInnovation has flourished at the edge of the Internet; however, the core has experienced a slower pace of innovation. This lag is impacting the pace of innovation at the edge and threatening quality as ad hoc solutions are implemented to overcome core network barriers to innovation. Active networking technology, which opens up the architecture of routers, is proposed as a standard solution. Researchers draw an analogy to the computer industry where innovation is claimed to be accelerated by modularization. This argument is valid to the extent that the router market is similar to the computer market; however, contemporary innovation theories cast doubt on this likelihood. These theories indicate that for active networking technology to accelerate Internet innovation, extraordinary measures will be required to break the status quo. This paper analyzes this situation and makes recommendations, based on innovation theory, on how active networking can be successful in accelerating Internet innovation.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/13161
- Subject Headings
- Computer industry--Technological innovations, Computer networks--Management, Computer networks--Software, Routers (Computer networks), Internetworking (Telecommunication)
- Format
- Document (PDF)
- Title
- A study on neural conduction as in myelinated structure under pathological conditions.
- Creator
- Morales, George J., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A method for modeling and simulating neural action potential (AP) propagation along the length of an axon containing a number of Ranvier nodes is proposed in this dissertation. A system identification approach is adopted to represent node of Ranvier (NR) response to current pulse stimulus in the form of transfer function representations for NR excitability. Segments of myelinated internodal (IN) and NR regions are cascaded, representing the remaining downstream axon after a site-of-stimulus...
Show moreA method for modeling and simulating neural action potential (AP) propagation along the length of an axon containing a number of Ranvier nodes is proposed in this dissertation. A system identification approach is adopted to represent node of Ranvier (NR) response to current pulse stimulus in the form of transfer function representations for NR excitability. Segments of myelinated internodal (IN) and NR regions are cascaded, representing the remaining downstream axon after a site-of-stimulus introduction of an external current pulse. This cascading network is used to simulate "cable" properties and signal propagation along the length of the axon. This work proposes possible solutions to attenuation losses inherited in the classical myelinated cable models and accounts for neuronal AP velocity as well as introducing signal attenuation and transient delays associated with internodal demyelination. This model could aide as a predictive tool for the diagnosis and analysis of axonal signal integrity associated with demyelination pathology. Possible applications could include functional stimulation control methodologies for axon bundles that may exhibit signal fidelity issues associated with demyelination. It is further proposed that this model may serve as an instructive tool for further development and incorporation of other axon dynamic behaviors such as: relative refractory periods of AP generation, NR AP recovery mechanisms and responses to varied current stimulus input.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3171723
- Subject Headings
- Nervous system, Diseases, Research, Demyelination, Nodes of Ranvier, Neuromuscular diseases, Research
- Format
- Document (PDF)
- Title
- A web-based automated classification system for nursing language based on nursing theory.
- Creator
- Dass, Subhomoy D., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Health care systems consist of various individuals and organizations that aim to meet the health care needs of people and provide a complete and responsive health care solution. One of the important aspects of a health care delivery system is nursing. The use of technology is a vital aspect for delivering an optimum and complete nursing care to individuals; and also for improving the quality and delivery mechanism of nursing care. The model proposed in this thesis for Nursing Knowledge...
Show moreHealth care systems consist of various individuals and organizations that aim to meet the health care needs of people and provide a complete and responsive health care solution. One of the important aspects of a health care delivery system is nursing. The use of technology is a vital aspect for delivering an optimum and complete nursing care to individuals; and also for improving the quality and delivery mechanism of nursing care. The model proposed in this thesis for Nursing Knowledge Management System is a novel knowledge-based decision support system for nurses to capture and manage nursing practice, and further, to monitor nursing care quality, as well as to test aspects of an electronic health record for recording and reporting nursing practice. As a part of a collaborative research of the Christine E. Lynn College of Nursing and the Department of Computer Science, a prototype toolset was developed to capture and manage nursing practice in order to improve the quality of care. This thesis focuses on implementing a web based SOA solution for Automated Classification of Nursing Care Categories, based on the knowledge gained from the prototype for nursing care practice.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3332184
- Subject Headings
- Nursing, Quality control, Outcome asssessment (Medical care), Nursing assessment, Digital techiques, Nursing, Computer-assisted instruction, Nursing informatics
- Format
- Document (PDF)