Current Search: Computer programs (x)
View All Items
Pages
- Title
- An investigation of Oracle8i.
- Creator
- He, Li., Florida Atlantic University, Solomon, Martin K.
- Abstract/Description
-
Oracle8i, the database for Internet computing, changes the way information is managed and accessed. Not only does Oracle8i introduce new features and enhancement for traditional OLTP and data warehouse, it also provides breakthrough technologies concerning the Internet and Java. This thesis presents a concrete investigation of Oracle8i's new features and new technologies, especially in the area of Internet and Java support. The following research tasks are performed: A comprehensive survey on...
Show moreOracle8i, the database for Internet computing, changes the way information is managed and accessed. Not only does Oracle8i introduce new features and enhancement for traditional OLTP and data warehouse, it also provides breakthrough technologies concerning the Internet and Java. This thesis presents a concrete investigation of Oracle8i's new features and new technologies, especially in the area of Internet and Java support. The following research tasks are performed: A comprehensive survey on the new features and new technologies of Oracle8i; An identification of the key features of Java utilities in Oracle8i, including JDBC drivers, SQLJ, and Enterprise JavaBeans, with complete examples running in Windows NT 4.0 environment; Discussions of Oracle8i and Internet, including Oracle WebDB and iFS; A presentation on areas for further study.
Show less - Date Issued
- 1999
- PURL
- http://purl.flvc.org/fcla/dt/15710
- Subject Headings
- Oracle (Computer file), Relational databases, Web servers, Java (Computer program language)
- Format
- Document (PDF)
- Title
- A framework for an icon-based software engineering environment.
- Creator
- Huang, Qinxi., Florida Atlantic University, Larrondo-Petrie, Maria M.
- Abstract/Description
-
Current computer technologies and demands bring new challenges to the software engineering tools. This thesis includes a survey of software engineering environments, standards and technologies. It also examines the features needed to support rigorous object-oriented software development. The main contributions of the thesis are descriptions of innovative concepts and a high-level framework for a next-generation object-oriented software system development, management and maintenance...
Show moreCurrent computer technologies and demands bring new challenges to the software engineering tools. This thesis includes a survey of software engineering environments, standards and technologies. It also examines the features needed to support rigorous object-oriented software development. The main contributions of the thesis are descriptions of innovative concepts and a high-level framework for a next-generation object-oriented software system development, management and maintenance environment, called IconSEE++, an Icon-based Software Engineering Environment.
Show less - Date Issued
- 1998
- PURL
- http://purl.flvc.org/fcla/dt/15576
- Subject Headings
- Software engineering, Object-oriented methods (Computer science), Icon (Computer program language)
- Format
- Document (PDF)
- Title
- Extensions to real-time object-oriented software design methodologies.
- Creator
- Woodcock, Timothy G., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Real-time systems are systems where time is considered a system resource that needs to be managed. Time is usually represented in these systems as a deadline to complete a task. Unfortunately, by adding timing to even simple algorithms, it complicates them greatly. Real-time systems are by nature difficult and complex to understand. Object-oriented methodologies have attributes that allow real-time systems to be designed and implemented with less error and some control over the resultant...
Show moreReal-time systems are systems where time is considered a system resource that needs to be managed. Time is usually represented in these systems as a deadline to complete a task. Unfortunately, by adding timing to even simple algorithms, it complicates them greatly. Real-time systems are by nature difficult and complex to understand. Object-oriented methodologies have attributes that allow real-time systems to be designed and implemented with less error and some control over the resultant complexity. With object-oriented design, the system is modeled in the environment that it will be used in. Objects themselves, are partitions of the system, into logical, understandable units. In this dissertation, we start by surveying the current real-time object-oriented design methodologies. By comparing these methodologies and developing a set of criteria for evaluating them, we discover that certain aspects of these methodologies still need some work. The most important aspects of the methodologies are understanding the effects of deadlines on statechart behavioral models and understanding the effects of deadlines when object models are inherited or undergo aggregation. The effects of deadlines on statecharts are then explored in detail. There are two basic ways that deadlines are added to statecharts. The first, and most popular, is adding timing as a condition on a state transition. The second is adding a count down timer to a state and forcing a transition if the timer reaches zero. We show that these are equivalent and can be used interchangeably to simplify designs. Next, the effects of deadlines on behavior models when the corresponding object models undergo inheritance or aggregation are studied. We will first analyze the effects on the behavior model when object inheritance is encountered. We found eight ways that the behavior model can be modified and still maintain the properties of inheritance. Finally, deadlines are added and the analysis is repeated.
Show less - Date Issued
- 1996
- PURL
- http://purl.flvc.org/fcla/dt/12493
- Subject Headings
- Real-time data processing, Computer software--Development, Object-oriented programming (Computer science)
- Format
- Document (PDF)
- Title
- Cross-Layer Network Design using Controllers.
- Creator
- Slavik, Michael J., Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A cross-layer design architecture featuring a new network stack component called a controller is presented. The controller takes system status information from the protocol components and uses it to tune the behavior of the network stack to a given performance objective. A controller design strategy using a machine learning algorithm and a simulator is proposed, implemented, and tested. Results show the architecture and design strategy are capable of producing a network stack that outperforms...
Show moreA cross-layer design architecture featuring a new network stack component called a controller is presented. The controller takes system status information from the protocol components and uses it to tune the behavior of the network stack to a given performance objective. A controller design strategy using a machine learning algorithm and a simulator is proposed, implemented, and tested. Results show the architecture and design strategy are capable of producing a network stack that outperforms the existing protocol stack for arbitrary performance objectives. The techniques presented give network designers the flexibility to easily tune the performance of their networks to suit their application. This cognitive networking architecture has great potential for high performance in future wireless networks.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012555
- Subject Headings
- Computer architecture, Wireless communication systems--Design and construction, Evolutionary programming (Computer science), Mathematical optimization
- Format
- Document (PDF)
- Title
- A methodology for object-oriented modeling and design of real-time, fault-tolerant systems.
- Creator
- Hancock, Debera R., Florida Atlantic University, Fernandez, Eduardo B.
- Abstract/Description
-
Many methodologies for software modeling and design include some form of static and dynamic modeling to describe the structural and behavioral views respectively. Modeling and design of complex real-time software systems requires notations for describing concurrency, asynchronous event handling, communication between independent machines, timing properties, and accessing real time. Function-oriented structured analysis methodologies such as Ward and Mellor's SA/RT and Harel's Statecharts have...
Show moreMany methodologies for software modeling and design include some form of static and dynamic modeling to describe the structural and behavioral views respectively. Modeling and design of complex real-time software systems requires notations for describing concurrency, asynchronous event handling, communication between independent machines, timing properties, and accessing real time. Function-oriented structured analysis methodologies such as Ward and Mellor's SA/RT and Harel's Statecharts have provided extensions for real-time system modeling. Dynamic modeling of real time systems using object-oriented methodologies also requires extensions to the traditional state machine notations in order to convey the real time system characteristics and constraints. Shaw's Communicating Real Time State Machines (CRSM's), Harel's O-Chart notations, and the Octopus methodology provide methods for modeling real-time systems consistent with object-oriented methods. This thesis proposes an object-oriented analysis and design methodology that augments the traditional Object Modeling Technique (OMT) dynamic model with real-time extensions based on high-level parallel machines and communication notations from CRSM. An example of the proposed methodology is provided using a realistic but hypothetical example of an automated passenger train system. A design refinement step is included for fault tolerant considerations. An evaluation of the proposed methodology with its extended notations is provided.
Show less - Date Issued
- 1997
- PURL
- http://purl.flvc.org/fcla/dt/15405
- Subject Headings
- Object-oriented methods (Computer science), Fault-tolerant computing, Real-time programming
- Format
- Document (PDF)
- Title
- Industrial-strength formalization of object-oriented real-time systems.
- Creator
- Raghavan, Gopalakrishna., Florida Atlantic University, Larrondo-Petrie, Maria M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The goal of this dissertation is to propose an industrial-strength formal model for object-oriented real-time systems that captures real-time constraints using industry standard notations and tools. A light-weight formalization process is proposed that is semi-formal, graphical and easier to read and understand. This process supports formal behavior analysis, verification and validation. It is very effective in early detection of incompleteness and ambiguities in the specifications. The...
Show moreThe goal of this dissertation is to propose an industrial-strength formal model for object-oriented real-time systems that captures real-time constraints using industry standard notations and tools. A light-weight formalization process is proposed that is semi-formal, graphical and easier to read and understand. This process supports formal behavior analysis, verification and validation. It is very effective in early detection of incompleteness and ambiguities in the specifications. The proposed process uses industry standard tools and fits well within stringent industrial schedules. Formal requirements analysis is conducted using High Level Message Sequencing Chart (HMSC) and Message Sequencing Chart (MSC). In the formal analysis phase, the static structures are modeled using Unified Modeling Language (UML) and the constraints are formalized using Object Constraint Language (OCL). System behavior is formally modeled using Specification and Description Language (SDL) during the formal design phase. SDL is used for behavior modeling due to wide commercial availability of SDL-based tools for formal behavior analysis and validation. Transition rules mapping from UML Class Diagrams and Statecharts to SDL models are proposed. SDL models are formally simulated and validated during the formal validation phase. Using the proposed process real-time clock, timer, periodic process, aperiodic process, resource and precedence constraints were formalized. Different types of timers, such as periodic, aperiodic, one-shot, fixed-interval and variable-interval timers are derived using inheritance models. Semaphore wait and signal operations are formalized as part of the resource constraint. Pre-conditions, post-conditions and invariants for the real-time constraints were captured using OCL. Behavior of the proposed models were captured using Statecharts. The proposed mapping rules were used to translate the behavior models to SDL. The SDL models were formally simulated and validated using Telelogic Software Development Tool (SDT). The tools allowed extensive model analysis and helped uncover several design flaws. The real-time constraints were stereotyped and packaged into reusable formal components. These components can be easily imported by applications. Two case studies, Cruise Control System and Bottle Filling System, are included to illustrate the use of the proposed process and the real-time package. The "industrial-strength" of the process was validated by utilizing the proposed process in an industrial project where it was found to accelerate the development process.
Show less - Date Issued
- 2000
- PURL
- http://purl.flvc.org/fcla/dt/12632
- Subject Headings
- Object-oriented programming (Computer science), Real-time data processing, Formal methods (Computer science)
- Format
- Document (PDF)
- Title
- Software reliability engineering with genetic programming.
- Creator
- Liu, Yi., Florida Atlantic University, Khoshgoftaar, Taghi M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Software reliability engineering plays a vital role in managing and controlling software quality. As an important method of software reliability engineering, software quality estimation modeling is useful in defining a cost-effective strategy to achieve a reliable software system. By predicting the faults in a software system, the software quality models can identify high-risk modules, and thus, these high-risk modules can be targeted for reliability enhancements. Strictly speaking, software...
Show moreSoftware reliability engineering plays a vital role in managing and controlling software quality. As an important method of software reliability engineering, software quality estimation modeling is useful in defining a cost-effective strategy to achieve a reliable software system. By predicting the faults in a software system, the software quality models can identify high-risk modules, and thus, these high-risk modules can be targeted for reliability enhancements. Strictly speaking, software quality modeling not only aims at lowering the misclassification rate, but also takes into account the costs of different misclassifications and the available resources of a project. As a new search-based algorithm, Genetic Programming (GP) can build a model without assuming the size, shape, or structure of a model. It can flexibly tailor the fitness functions to the objectives chosen by the customers. Moreover, it can optimize several objectives simultaneously in the modeling process, and thus, a set of multi-objective optimization solutions can be obtained. This research focuses on building software quality estimation models using GP. Several GP-based models of predicting the class membership of each software module and ranking the modules by a quality factor were proposed. The first model of categorizing the modules into fault-prone or not fault-prone was proposed by considering the distinguished features of the software quality classification task and GP. The second model provided quality-based ranking information for fault-prone modules. A decision tree-based software classification model was also proposed by considering accuracy and simplicity simultaneously. This new technique provides a new multi-objective optimization algorithm to build decision trees for real-world engineering problems, in which several trade-off objectives usually have to be taken into account at the same time. The fourth model was built to find multi-objective optimization solutions by considering both the expected cost of misclassification and available resources. Also, a new goal-oriented technique of building module-order models was proposed by directly optimizing several goals chosen by project analysts. The issues of GP , bloating and overfitting, were also addressed in our research. Data were collected from three industrial projects, and applied to validate the performance of the models. Results indicate that our proposed methods can achieve useful performance results. Moreover, some proposed methods can simultaneously optimize several different objectives of a software project management team.
Show less - Date Issued
- 2003
- PURL
- http://purl.flvc.org/fau/fd/FADT12047
- Subject Headings
- Computer software--Quality control, Genetic programming (Computer science), Software engineering
- Format
- Document (PDF)
- Title
- Performance analysis of a new object-based I/O architecture for PCs and workstations.
- Creator
- Huynh, Khoa Dang., Florida Atlantic University, Khoshgoftaar, Taghi M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In this dissertation, an object-based I/O architecture for personal computers (PCs) and workstations is proposed. The proposed architecture allows the flexibility of having I/O processing performed as much as possible by intelligent I/O adapters, or by the host processor, or by any processor in the system, depending on application requirements and underlying hardware capabilities. It keeps many good features of current I/O architectures, while providing more flexibility to take advantage of...
Show moreIn this dissertation, an object-based I/O architecture for personal computers (PCs) and workstations is proposed. The proposed architecture allows the flexibility of having I/O processing performed as much as possible by intelligent I/O adapters, or by the host processor, or by any processor in the system, depending on application requirements and underlying hardware capabilities. It keeps many good features of current I/O architectures, while providing more flexibility to take advantage of new hardware technologies, promote architectural openness, provide better performance and higher reliability. The proposed architecture introduces a new definition of I/O subsystems and makes use of concurrent object-oriented technology. It combines the notions of object and thread into something called an active object. All concurrency abstractions required by the proposed architecture are provided through external libraries on top of existing sequential object-oriented languages, without any changes to the syntax and semantics of these languages. We also evaluate the performance of optimal implementations of the proposed I/O architecture against other I/O architectures in three popular, PC-based, distributed environments: network file server, video server, and video conferencing. Using the RESearch Queueing Modeling Environment (RESQME), we have developed detailed simulation models for various implementations of the proposed I/O architecture and two other existing I/O architectures: a conventional, interrupt-based I/O architecture and a peer-to-peer I/O architecture. Our simulation results indicate that, on several different hardware platforms, the proposed I/O architecture outperforms both existing architectures in all three distributed environments considered.
Show less - Date Issued
- 1994
- PURL
- http://purl.flvc.org/fcla/dt/12386
- Subject Headings
- Local area networks (Computer networks), Computer input-output equipment, Computer networks, Videoconferencing, Client/server computing, Object-oriented programming (Computer science)
- Format
- Document (PDF)
- Title
- QUIC-TCP: validation of QUIC-TCP through network simulations.
- Creator
- Boughen, Brian, Wang, Xin, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The scalability of QUIC-TCP was examined by expanding previous developmental 11-node, 4-flow topology to over 30 nodes with 11 flows to validate QUIC-TCP for larger networks. The topology was simulated using ns-2 network simulator with the same ns-2 module of FAST-TCP modified to produce QUIC-TCP agent that the original development used. A symmetrical topology and a random topology were examined. Fairness, aggregate throughput and the object of the utility function were used as validation...
Show moreThe scalability of QUIC-TCP was examined by expanding previous developmental 11-node, 4-flow topology to over 30 nodes with 11 flows to validate QUIC-TCP for larger networks. The topology was simulated using ns-2 network simulator with the same ns-2 module of FAST-TCP modified to produce QUIC-TCP agent that the original development used. A symmetrical topology and a random topology were examined. Fairness, aggregate throughput and the object of the utility function were used as validation criteria. It was shown through simulation that QUICTCP optimized the utility function and demonstrated a good balance between aggregate throughput and fairness; therefore QUIC-TCP is indeed scalable to larger networks.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fau/fd/FA0004007
- Subject Headings
- Ad hoc networks (computer networks), Embedded computer systems -- Programming, QUIC TCP (Computer network protocol), Wireless communication systems
- Format
- Document (PDF)
- Title
- CBR-based software quality models and quality of data.
- Creator
- Xiao, Yudong., Florida Atlantic University, Khoshgoftaar, Taghi M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The performance accuracy of software quality estimation models is influenced by several factors, including the following two important factors: performance of the prediction algorithm and the quality of data. This dissertation addresses these two factors, and consists of two components: (1) a proposed genetic algorithm (GA) based optimization of software quality models for accuracy enhancement, and (2) a proposed partitioning- and rule-based filter (PRBF) for noise detection toward...
Show moreThe performance accuracy of software quality estimation models is influenced by several factors, including the following two important factors: performance of the prediction algorithm and the quality of data. This dissertation addresses these two factors, and consists of two components: (1) a proposed genetic algorithm (GA) based optimization of software quality models for accuracy enhancement, and (2) a proposed partitioning- and rule-based filter (PRBF) for noise detection toward improvement of data quality. We construct a generalized framework of our embedded GA-optimizer, and instantiate the GA-optimizer for three optimization problems in software quality engineering: parameter optimization for case-based reasoning (CBR) models; module rank optimization for module-order modeling (MOM); and structural optimization for our multi-strategy classification modeling approach, denoted RB2CBL. Empirical case studies using software measurement data from real-world software systems were performed for the optimization problems. The GA-optimization approaches improved software quality prediction accuracy, highlighting the practical benefits of using GA for solving optimization problems in software engineering. The proposed noise detection approach, PRBF, was empirically evaluated using data categorized into two classes. Empirical studies on artificially corrupted datasets and datasets with known (natural) noise demonstrated that PRBF can effectively detect both artificial and natural noise. The proposed filter is a stable and robust technique, and always provided optimal or near-optimal noise detection results. In addition, it is applicable on datasets with nominal and numerical attributes, as well as those with missing values. The PRBF technique supports two methods of noise detection: class noise detection and cost-sensitive noise detection. The former is an easy-to-use method and does not need parameter settings, while the latter is suited for applications where each class has a specific misclassification cost. PRBF can also be used iteratively to investigate the two general types of data noise: attribute and class noise.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/12141
- Subject Headings
- Computer software--Quality control, Genetic programming (Computer science), Software engineering, Case-based reasoning, Combinatorial optimization, Computer network architecture
- Format
- Document (PDF)
- Title
- Controlling access to physical locations.
- Creator
- Desouza-Doucet, Ana C., Florida Atlantic University, Fernandez, Eduardo B.
- Abstract/Description
-
The need to secure and control access to rooms in premises has shifted from allowing some people to enter a room to giving permission to specific persons to access a room and recording who entered the room and the time they spent in it. With such need for higher security in mind, we design an access control system for controlling physical access of people to locations or to specific units in these locations. Our study gives emphasis to the organization of physical locations, including nested...
Show moreThe need to secure and control access to rooms in premises has shifted from allowing some people to enter a room to giving permission to specific persons to access a room and recording who entered the room and the time they spent in it. With such need for higher security in mind, we design an access control system for controlling physical access of people to locations or to specific units in these locations. Our study gives emphasis to the organization of physical locations, including nested rooms, and the approach used to assign permission to people to access such locations. We also define some security policies to be used in such model as well as appropriate user interfaces. Finally, we develop two patterns based on our model.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/13328
- Subject Headings
- Software architecture, Computer networks--Access control, Computer security, Object-oriented programming (Computer science), Smart cards--Security measures
- Format
- Document (PDF)
- Title
- Correcting noisy data and expert analysis of the correction process.
- Creator
- Seiffert, Christopher N., Florida Atlantic University, Khoshgoftaar, Taghi M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis expands upon an existing noise cleansing technique, polishing, enabling it to be used in the Software Quality Prediction domain, as well as any other domain where the data contains continuous values, as opposed to categorical data for which the technique was originally designed. The procedure is applied to a real world dataset with real (as opposed to injected) noise as determined by an expert in the domain. This, in combination with expert assessment of the changes made to the...
Show moreThis thesis expands upon an existing noise cleansing technique, polishing, enabling it to be used in the Software Quality Prediction domain, as well as any other domain where the data contains continuous values, as opposed to categorical data for which the technique was originally designed. The procedure is applied to a real world dataset with real (as opposed to injected) noise as determined by an expert in the domain. This, in combination with expert assessment of the changes made to the data, provides not only a more realistic dataset than one in which the noise (or even the entire dataset) is artificial, but also a better understanding of whether the procedure is successful in cleansing the data. Lastly, this thesis provides a more in-depth view of the process than previously available, in that it gives results for different parameters and classifier building techniques. This allows the reader to gain a better understanding of the significance of both model generation and parameter selection.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13223
- Subject Headings
- Computer interfaces--Software--Quality control, Acoustical engineering, Noise control--Computer programs, Expert systems (Computer science), Software documentation
- Format
- Document (PDF)
- Title
- Experimental implementation of the new prototype in Linux.
- Creator
- Han, Gee Won., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite. In the wired network, TCP performs remarkably well due to its scalability and distributed end-to-end congestion control algorithms. However, many studies have shown that the unmodified standard TCP performs poorly in networks with large bandwidth-delay products and/or lossy wireless links. In this thesis, we analyze the problems TCP exhibits in the wireless communication and develop TCP...
Show moreThe Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite. In the wired network, TCP performs remarkably well due to its scalability and distributed end-to-end congestion control algorithms. However, many studies have shown that the unmodified standard TCP performs poorly in networks with large bandwidth-delay products and/or lossy wireless links. In this thesis, we analyze the problems TCP exhibits in the wireless communication and develop TCP congestion control algorithm for mobile applications. We show that the optimal TCP congestion control and link scheduling scheme amounts to window-control oriented implicit primaldual solvers for underlying network utility maximization. Based on this idea, we used a scalable congestion control algorithm called QUeueIng-Control (QUIC) TCP where it utilizes queueing-delay based MaxWeight-type scheduler for wireless links developed in [34]. Simulation and test results are provided to evaluate the proposed schemes in practical networks.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fcla/dt/3362375
- Subject Headings
- Ad hoc networks (Computer networks), Wireless sensor networks, Embedded computer systems, Programming, Operating systems (Computers), Network performance (Telecommunication), TCP/IP (Computer network protocol)
- Format
- Document (PDF)
- Title
- A comparative analysis of the success of students placed in the lowest level of remedial coursework taken through CAI versus a traditional remedial education mode of instruction: implications for success, retention and costs.
- Creator
- Vassiliou, John., College of Education, Department of Educational Leadership and Research Methodology
- Abstract/Description
-
The purpose of this study was to examine the Computer-Assisted Instructional (CAI) method as an alternative to the Traditional method of instruction for the lowest level of remediation in the content areas of mathematics, reading, and sentence skills, and to specifically determine the comparative effectiveness of these two delivery modes in terms of student success, retention, and costs. The researcher aimed to (a) determine the extent to which ACCUPLACERª mean scores for CAI participants...
Show moreThe purpose of this study was to examine the Computer-Assisted Instructional (CAI) method as an alternative to the Traditional method of instruction for the lowest level of remediation in the content areas of mathematics, reading, and sentence skills, and to specifically determine the comparative effectiveness of these two delivery modes in terms of student success, retention, and costs. The researcher aimed to (a) determine the extent to which ACCUPLACERª mean scores for CAI participants increase based on pre and post measures, (b) investigate the pros and cons fiscally of each method of delivery (CAI vs. Traditional), respectively, (c) examine whether CAI participants are more likely to enroll during the immediately following semester compared to students enrolled in a Traditional course, and (d) investigate the extent to which CAI participants are equally or more likely to complete successfully the course taken during the immediately following semester compared to students enroll ed in a Traditional course. The study consisted of a two-group design (CAI and Traditional), and four dependent variables. All CAI participants (N = 129) were self-selected to participate in the study. A dependent t-test found that CAI participants increased their ACCUPLACER mean scores significantly over time by 22.74 points or 72.6%. A frequency count found that retention rates were slightly higher for the Traditional group (82.3%) in comparison to the CAI group (76.6%), however, chi-square tests did not reveal a statistical significance. Chi-squares found significant increase in success rates for the CAI group as 86% passed their initial course, in comparison to 59.8% of students taught in the Traditional format. CAI participants were found to have greater success (74.1%) in subsequent classes than students taught via the Traditional instructional method (51.9%)., In addition, a straightforward comparison of expense totals between the two groups was conducted to estimate the differences in cost between the groups. The Cost-Effectiveness Analysis (CEA) model used, indicated that CAI is less expensive and more effective than Traditional instruction. The cost per credit analysis projected 54.6% savings if CAI is used as the alternative instructional modality.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3322520
- Subject Headings
- Computer-assisted instruction, Evaluation, Academic achievement, Educational tests and measurements, School improvement programs, Student assistance programs, Educational accountability
- Format
- Document (PDF)
- Title
- APIS: A SOFTWARE AND HARDWARE TOOLKIT FOR FEDERATED POWER MANAGEMENT IN ENERGY HARVESTING APPLICATIONS.
- Creator
- Prey, Adam, Hallstrom, Jason O., Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
Embedded systems and Internet of Things (IoT) devices have been limited in application by constraints posed by batteries. Batteries add size, weight, and upkeep costs, while also limiting the lifetime of devices that are preferred to be small, lightweight, and long-lasting. We present Apis, a software and hardware toolkit for federated power management in energy harvesting applications. By replacing batteries with rapid charging storage capacitors, circuitry to control federated energy...
Show moreEmbedded systems and Internet of Things (IoT) devices have been limited in application by constraints posed by batteries. Batteries add size, weight, and upkeep costs, while also limiting the lifetime of devices that are preferred to be small, lightweight, and long-lasting. We present Apis, a software and hardware toolkit for federated power management in energy harvesting applications. By replacing batteries with rapid charging storage capacitors, circuitry to control federated energy storage, and software support to make this architecture useful to developers, embedded devices can potentially run inde nitely with limited maintenance. We present the Apis hardware design for controlling federated energy storage, supporting software for controlling this hardware, and the results of experiments performed to validate the Apis model. The system is named after the taxonomy genus for the honey bee, a creature dedicated to the harvesting and federated storage of energy resources.
Show less - Date Issued
- 2019
- PURL
- http://purl.flvc.org/fau/fd/FA00013405
- Subject Headings
- Internet of things, Energy harvesting, Embedded systems (Computer systems), Telecommunication--Power supply, Application program interfaces (Computer software)
- Format
- Document (PDF)
- Title
- Object recognition on Android mobil platform using speeded up robust features.
- Creator
- Tyagi, Vivek K., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In recent years there has been great interest in implementing object recognition frame work on mobile phones. This has stemmed from the fact the advances in object recognition algorithm and mobile phone capabilities have built a congenial ecosystem. Application developers on mobile platforms are trying to utilize the object recognition technology to build better human computer interfaces. This approach is in the nascent phase and proper application framework is required. In this thesis, we...
Show moreIn recent years there has been great interest in implementing object recognition frame work on mobile phones. This has stemmed from the fact the advances in object recognition algorithm and mobile phone capabilities have built a congenial ecosystem. Application developers on mobile platforms are trying to utilize the object recognition technology to build better human computer interfaces. This approach is in the nascent phase and proper application framework is required. In this thesis, we propose a framework to overcome design challenges and provide an evaluation methodology to assess the system performance. We use the emerging Android mobile platform to implement and test the framework. We performed a case study using the proposal and reported the test result. This assessment will help developers make wise decisions about their application design. Furthermore, the Android API developers could use this information to provide better interfaces to the third party developers. The design and evaluation methodology could be extended to other mobile platforms for a wider consumer base.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/2683531
- Subject Headings
- Mobile computing, Application software, Development, Object-oriented programming (Computer software), Pattern recognition systems, Development
- Format
- Document (PDF)
- Title
- NEURALSYNTH - A NEURAL NETWORK TO FPGA COMPILATION FRAMEWORK FOR RUNTIME EVALUATION.
- Creator
- Lanham, Grant Jr, Hallstrom, Jason O., Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
Artificial neural networks are increasing in power, with attendant increases in demand for efficient processing. Performance is limited by clock speed and degree of parallelization available through multi-core processors and GPUs. With a design tailored to a specific network, a field-programmable gate array (FPGA) can be used to minimize latency without the need for geographically distributed computing. However, the task of programming an FPGA is outside the realm of most data scientists....
Show moreArtificial neural networks are increasing in power, with attendant increases in demand for efficient processing. Performance is limited by clock speed and degree of parallelization available through multi-core processors and GPUs. With a design tailored to a specific network, a field-programmable gate array (FPGA) can be used to minimize latency without the need for geographically distributed computing. However, the task of programming an FPGA is outside the realm of most data scientists. There are tools to program FPGAs from a high level description of a network, but there is no unified interface for programmers across these tools. In this thesis, I present the design and implementation of NeuralSynth, a prototype Python framework which aims to bridge the gap between data scientists and FPGA programming for neural networks. My method relies on creating an extensible Python framework that is used to automate programming and interaction with an FPGA. The implementation includes a digital design for the FPGA that is completed by a Python framework. Programming and interacting with the FPGA does not require leaving the Python environment. The extensible approach allows multiple implementations, resulting in a similar workflow for each implementation. For evaluation, I compare the results of my implementation with a known neural network framework.
Show less - Date Issued
- 2020
- PURL
- http://purl.flvc.org/fau/fd/FA00013533
- Subject Headings
- Artificial neural networks, Neural networks (Computer science)--Design, Field programmable gate arrays, Python (Computer program language)
- Format
- Document (PDF)
- Title
- Design patterns and object oriented model of a biometric service system.
- Creator
- Blandon, Jatni., Florida Atlantic University, Han, Chingping (Jim)
- Abstract/Description
-
Continuous changes in the software development community require challenging conventional approaches resulting in techniques that allow for early decisions at the design level. This project is a demonstration of the use of design patterns as a common way to organize objects to make practical design decisions helping to generate flexible, manageable and agile software architectures. Due to the continuity and unpredictability of its requirements, the Biometric Industry is appropriate to...
Show moreContinuous changes in the software development community require challenging conventional approaches resulting in techniques that allow for early decisions at the design level. This project is a demonstration of the use of design patterns as a common way to organize objects to make practical design decisions helping to generate flexible, manageable and agile software architectures. Due to the continuity and unpredictability of its requirements, the Biometric Industry is appropriate to illustrate of the use of design patterns and object oriented analysis. First, the conceptual model of an Electronic Fingerprint Service establishes the vocabulary for discussing how a system is constructed. Since good design decisions eventually result in a good design model, this model is used to leverage the object reused when requirements change. The Electronic Biometric Services model demonstrates how by applying design patterns, the system can gain the flexibility and agility required to grow and change according to new requirements.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/13351
- Subject Headings
- Computer software--Development, Software architecture, Object-oriented programming (Computer science), Biometric identification, Pattern recognition systems--Development
- Format
- Document (PDF)
- Title
- An intelligent approach to system identification.
- Creator
- Saravanan, Natarajan, Florida Atlantic University, Duyar, Ahmet, College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
System identification methods are frequently used to obtain appropriate models for the purpose of control, fault detection, pattern recognition, prediction, adaptive filtering and other purposes. A number of techniques exist for the identification of linear systems. However, real-world and complex systems are often nonlinear and there exists no generic methodology for the identification of nonlinear systems with unknown structure. A recent approach makes use of highly interconnected networks...
Show moreSystem identification methods are frequently used to obtain appropriate models for the purpose of control, fault detection, pattern recognition, prediction, adaptive filtering and other purposes. A number of techniques exist for the identification of linear systems. However, real-world and complex systems are often nonlinear and there exists no generic methodology for the identification of nonlinear systems with unknown structure. A recent approach makes use of highly interconnected networks of simple processing elements, which can be programmed to approximate nonlinear functions to identify nonlinear dynamic systems. This thesis takes a detailed look at identification of nonlinear systems with neural networks. Important questions in the application of neural networks for nonlinear systems are identified; concerning the excitation properties of input signals, selection of an appropriate neural network structure, estimation of the neural network weights, and the validation of the identified model. These questions are subsequently answered. This investigation leads to a systematic procedure for identification using neural networks and this procedure is clearly illustrated by modeling a complex nonlinear system; the components of the space shuttle main engine. Additionally, the neural network weights are determined by using a general purpose optimization technique known as evolutionary programming which is based on the concept of simulated evolution. The evolutionary programming algorithm is modified to include self-adapting step sizes. The effectiveness of the evolutionary programming algorithm as a general purpose optimization algorithm is illustrated on a test suite of problems including function optimization, neural network weight optimization, optimal control system synthesis and reinforcement learning control.
Show less - Date Issued
- 1994
- PURL
- http://purl.flvc.org/fcla/dt/12371
- Subject Headings
- Neural networks (Computer science), System identification, Nonlinear theories, System analysis, Space shuttles--Electronic equipment, Algorithms--Computer programs
- Format
- Document (PDF)
- Title
- Knowledge-based expert system for selection and design of retaining structures.
- Creator
- Sreenivasan, Giri., Florida Atlantic University, Arockiasamy, Madasamy, College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
This thesis describes the development of a microcomputer based prototype expert system, RETAININGEARTH, for the selection and design of earth retaining structures. RETAININGEARTH is an interactive menu-driven system and consists of two modules--the selection module, SELECTWALL and the design module. SELECTWALL is developed using the rule-based M.1 knowledge engineering shell and it makes a choice of the most appropriate retaining structure from a list of ten typical walls. The design module...
Show moreThis thesis describes the development of a microcomputer based prototype expert system, RETAININGEARTH, for the selection and design of earth retaining structures. RETAININGEARTH is an interactive menu-driven system and consists of two modules--the selection module, SELECTWALL and the design module. SELECTWALL is developed using the rule-based M.1 knowledge engineering shell and it makes a choice of the most appropriate retaining structure from a list of ten typical walls. The design module consists of five independent design programs which performs detailed designs of the concrete gravity and cantilever walls, gabions, reinforced earth and sheetpile structures. The SELECTWALL and the design module are linked by the M.1 external code EXT through a control program CALL. All the design procedures are coded using the C programming language.
Show less - Date Issued
- 1991
- PURL
- http://purl.flvc.org/fcla/dt/14718
- Subject Headings
- Retaining walls--Data processing, Structural design--Computer programs, Expert systems (Computer science), Earthwork--Data processing
- Format
- Document (PDF)