Current Search: System design (x)
View All Items
Pages
- Title
- Connected Dominating Set in Wireless Ad Hoc Networks: Variations with Applications.
- Creator
- Yang, Shuhui, Wu, Jie, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Wireless ad hoc networks (or simply ad hoc networks) are infrastructureless multihop networks consisting of mobile or stationary wireless devices, which include mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs). These networks are characterized by limited bandwidth and energy resources, frequent topology changes, and a lack of central control. These characteristics lead to the research challenges of ad hoc networks. The algorithms designed for ad hoc networks should be...
Show moreWireless ad hoc networks (or simply ad hoc networks) are infrastructureless multihop networks consisting of mobile or stationary wireless devices, which include mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs). These networks are characterized by limited bandwidth and energy resources, frequent topology changes, and a lack of central control. These characteristics lead to the research challenges of ad hoc networks. The algorithms designed for ad hoc networks should be localized, selforganizing, and energy efficient. A connected dominating set (CDS) is frequently used in ad hoc networks as a virtual backbone to support efficient routing, service discovery, and area monitoring. In addition, efficient broadcasting (i.e., finding a small set of forward nodes to ensure full delivery) can be viewed as forming a CDS on-the-fly. The periodically maintained virtual backbone is called a static CDS, and the temporarily formed forward node set is called a dynamk CDS. For efficiency and robustness, the ideal CDS construction algorithm is lightweight, has fast convergence, and minimizes the CDS size. Recently, due to some specific applications and new techniques, the concept of a connected dominating set can be modified or further extended for more efficient usage. This dissertation focuses on the variations with applications of the connected dominating set, designing new concepts, and developing new algorithms for them. A review of CDS construction algorithms for ad hoc networks has been provided at the beginning. An efficient scheme, called Rule K, has been proposed for static CDS construction. Rule K achieves a probabilistic constant upper bound on the expected CDS size, which is currently the best known performance guarantee for localized CDS algorithms. Several CDS algorithms are extended to generate the extended CDS, which exploits the cooperative communication technique to further reduce the size of CDS. A k-coverage set is developed for higher robustness. With the equipment of directional antennas , the transmission can be restricted to some certain directions to reduce interference and energy consumption. The corresponding directional CDS is discussed. Finally, a wireless sensor and actor network (WSAN) is introduced and localized algorithms are designed for it.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012580
- Subject Headings
- Computer network protocols, Wireless communication systems--Design and construction, Mobile computing, Computer algorithms
- Format
- Document (PDF)
- Title
- Model-Driven Architecture and the Secure Systems Methodology.
- Creator
- Morrison, Patrick, Fernandez, Eduardo B., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
As a compamon and complement to the work being done to build a secure systems methodology, this thesis evaluates the use of Model-Driven Architecture (MDA) in support of the methodology's lifecycle. The development lifecycle illustrated follows the recommendations of this secure systems methodology, while using MDA models to represent requirements, analysis, design, and implementation information. In order to evaluate MDA, we analyze a well-understood distributed systems security problem,...
Show moreAs a compamon and complement to the work being done to build a secure systems methodology, this thesis evaluates the use of Model-Driven Architecture (MDA) in support of the methodology's lifecycle. The development lifecycle illustrated follows the recommendations of this secure systems methodology, while using MDA models to represent requirements, analysis, design, and implementation information. In order to evaluate MDA, we analyze a well-understood distributed systems security problem, remote access, as illustrated by the internet "secure shell" protocol, ssh. By observing the ability of MDA models and transformations to specify remote access in each lifecycle phase, MDA's strengths and weaknesses can be evaluated in this context. A further aim of this work is to extract concepts that can be contained in an MDA security metamodel for use in future projects.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012537
- Subject Headings
- Expert systems (Computer science), Software engineering, Computer-aided design, Computer network architectures
- Format
- Document (PDF)
- Title
- The design of reliable decentralized computer systems.
- Creator
- Wu, Jie., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
With the increase in the applications of computer technology, there are more and more demands for the use of computer systems in the area of real-time applications and critical systems. Reliability and performance are fundamental design requirements for these applications. In this dissertation, we develop some specific aspects of a fault-tolerant decentralized system architecture. This system can execute concurrent processes and it is composed of processing elements that have only local...
Show moreWith the increase in the applications of computer technology, there are more and more demands for the use of computer systems in the area of real-time applications and critical systems. Reliability and performance are fundamental design requirements for these applications. In this dissertation, we develop some specific aspects of a fault-tolerant decentralized system architecture. This system can execute concurrent processes and it is composed of processing elements that have only local memories with point-to-point communication. A model using hierarchical layers describes this system. Fault tolerance techniques are discussed for the applications, software, operating system, and hardware layers of the model. Scheduling of communicating tasks to increase performance is also addressed. Some special problems such as the Byzantine Generals problem are considered. We have shown that, by combining reliable techniques on different layers and with consideration of system performance, one can provide a system with a very high level reliability as well as performance.
Show less - Date Issued
- 1989
- PURL
- http://purl.flvc.org/fcla/dt/12237
- Subject Headings
- Electronic digital computers--Reliability, Fault-tolerant computing, System design, Computer software--Reliability
- Format
- Document (PDF)
- Title
- Mechanisms for improving energy efficiency in wireless sensor networks.
- Creator
- Fonoage, Mirela Ioana., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A Wireless Sensor Network (WSN) is composed of a large number of sensor nodes that are densely deployed in an area. One of the main issues addressed in WSNs research is energy efficiency due to sensors' limited energy resources. WSNs are deployed to monitor and control the physical environment, and to transmit the collected data to one or more sinks using multi-hop communication. Energy efficiency protocols represent a key mechanism in WSNs. This dissertation proposes several methods used to...
Show moreA Wireless Sensor Network (WSN) is composed of a large number of sensor nodes that are densely deployed in an area. One of the main issues addressed in WSNs research is energy efficiency due to sensors' limited energy resources. WSNs are deployed to monitor and control the physical environment, and to transmit the collected data to one or more sinks using multi-hop communication. Energy efficiency protocols represent a key mechanism in WSNs. This dissertation proposes several methods used to prolong WSNs lifetime focusing on designing energy efficient communication protocols. A critical issue for data gathering in WSNs is the formation of energy holes near the sinks where sensor nodes participate more in relaying data on behalf of other sensors. The solution proposed in this dissertation is to use mobile sinks that change their location to overcome the formation of energy holes. First, a study of the improvement in network lifetime when sinks move along the perimeter of a hexagonal tiling is conveyed. Second, a design of a distributed and localized algorithm used by sinks to decide their next move is proposed. Two extensions of the distributed algorithm, coverage and time-delivery requirement, are also addressed. Sensor scheduling mechanisms are used to increase network lifetime by sending redundant sensor nodes to sleep. In this dissertation a localized connected dominating set based approach is used to optimize network lifetime of a composite event detection application. A set of active nodes form a connected set that monitor the environment and send data to sinks. After some time, a new active nodes set is chosen. Thus, network lifetime is prolonged by alternating the active sensors. QoS is another main issue encountered in WSNs because of the dynamically changing network topology., This dissertation introduces an energy efficient QoS based routing for periodic and event-based reporting applications. A geographic routing mechanism combined with QoS support is used to forward packets in the network. Congestion control is achieved by using a ring or barrier mechanism that captures and aggregates messages that report the same event to the same sink. The main operations of the barrier mechanism are presented in this dissertation.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/2975242
- Subject Headings
- Computer network protocols, Wireless communication systems, Technological innovations, Sensor networks, Design and construction
- Format
- Document (PDF)
- Title
- Cross-Layer Network Design using Controllers.
- Creator
- Slavik, Michael J., Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A cross-layer design architecture featuring a new network stack component called a controller is presented. The controller takes system status information from the protocol components and uses it to tune the behavior of the network stack to a given performance objective. A controller design strategy using a machine learning algorithm and a simulator is proposed, implemented, and tested. Results show the architecture and design strategy are capable of producing a network stack that outperforms...
Show moreA cross-layer design architecture featuring a new network stack component called a controller is presented. The controller takes system status information from the protocol components and uses it to tune the behavior of the network stack to a given performance objective. A controller design strategy using a machine learning algorithm and a simulator is proposed, implemented, and tested. Results show the architecture and design strategy are capable of producing a network stack that outperforms the existing protocol stack for arbitrary performance objectives. The techniques presented give network designers the flexibility to easily tune the performance of their networks to suit their application. This cognitive networking architecture has great potential for high performance in future wireless networks.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012555
- Subject Headings
- Computer architecture, Wireless communication systems--Design and construction, Evolutionary programming (Computer science), Mathematical optimization
- Format
- Document (PDF)
- Title
- DESIGN & DEVELOPMENT OF A SECURE SELF-LEVELING WIRELESS RECHARGING PLATFORM FOR AN AERIAL DRONE ON AN UNMANNED SURFACE VESSEL.
- Creator
- McKinney, Adriana, Dhanak, Manhar, Florida Atlantic University, Department of Ocean and Mechanical Engineering, College of Engineering and Computer Science
- Abstract/Description
-
The Design and Development of an automated recharging station for an aerial drone, onboard a small, unmanned surface vessel, is described. Drones require a landing surface that is level within five degrees of the surrounding terrain for repeated reliable landing and takeoff. System constraints and at-sea application necessitate a compact, lightweight, and secure solution. A passive self-leveling platform and an accompanying automated parallel-pusher drone restraint mechanism have been...
Show moreThe Design and Development of an automated recharging station for an aerial drone, onboard a small, unmanned surface vessel, is described. Drones require a landing surface that is level within five degrees of the surrounding terrain for repeated reliable landing and takeoff. System constraints and at-sea application necessitate a compact, lightweight, and secure solution. A passive self-leveling platform and an accompanying automated parallel-pusher drone restraint mechanism have been designed and fabricated to aid in achieving a level landing surface and holding the drone in place while it charges. The self-leveling mechanism has been analyzed and subjected to initial laboratory tests. The testing of the drone restraint mechanism to verify its weight capacity and closing time, and the integration of the platform with a custom conductive contact wireless charging pad are identified as future work. The resulting cohesive unit will be tested for performance optimization and implementation onboard the unmanned surface vehicle.
Show less - Date Issued
- 2021
- PURL
- http://purl.flvc.org/fau/fd/FA00013869
- Subject Headings
- Drone aircraft, Drone aircraft--Control systems--Design and construction, Drone aircraft--Automatic control
- Format
- Document (PDF)
- Title
- Software design using case based reasoning.
- Creator
- Smith, Nancy T., Florida Atlantic University, Ganesan, Krishnamurthy, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The project that was created for this thesis is a Case Based Reasoning application to be used in high level software design for Siemens' Telecommunications software. Currently, design engineers search for existing subtasks in the software that are similar to subtasks in their new designs by reading documentation and consulting with other engineers. The prototype for Software Design Using Case Based Reasoning (SDUCBR) stores these subtasks in a case library and enables the design engineer to...
Show moreThe project that was created for this thesis is a Case Based Reasoning application to be used in high level software design for Siemens' Telecommunications software. Currently, design engineers search for existing subtasks in the software that are similar to subtasks in their new designs by reading documentation and consulting with other engineers. The prototype for Software Design Using Case Based Reasoning (SDUCBR) stores these subtasks in a case library and enables the design engineer to locate relevant subtasks via three different indexing techniques. This thesis addresses knowledge representation and indexing mechanisms appropriate for this application. SDUCBR is domain-dependent. Cases are stored in a relational hierarchy to facilitate analyzing the existing implementation from various perspectives. The indexing mechanisms were designed to provide the software design engineer with the flexibility of describing a problem differently based on the objective, level of granularity, and special characteristics of the subtask.
Show less - Date Issued
- 1995
- PURL
- http://purl.flvc.org/fcla/dt/15198
- Subject Headings
- Computer software--Development, Case-based reasoning, Artificial intelligence--Data processing, System design
- Format
- Document (PDF)
- Title
- Design and Deployment Analysis of Morphing Ocean Structure.
- Creator
- Li, Yanjun, Su, Tsung-Chow, Florida Atlantic University, College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
As humans explore greater depths of Earth’s oceans, there is a growing need for the installation of subsea structures. 71% of the earth’s surface is ocean but there are limitations inherent in current detection instruments for marine applications leading to the need for the development of underwater platforms that allow research of deeper subsea areas. Several underwater platforms including Autonomous Underwater Vehicles (AUVs), Remote Operated Vehicles (ROVs), and wave gliders enable more...
Show moreAs humans explore greater depths of Earth’s oceans, there is a growing need for the installation of subsea structures. 71% of the earth’s surface is ocean but there are limitations inherent in current detection instruments for marine applications leading to the need for the development of underwater platforms that allow research of deeper subsea areas. Several underwater platforms including Autonomous Underwater Vehicles (AUVs), Remote Operated Vehicles (ROVs), and wave gliders enable more efficient deployment of marine structures. Deployable structures are able to be compacted and transported via AUV to their destination then morph into their final form upon arrival. They are a lightweight, compact solution. The wrapped package includes the deployable structure, underwater pump, and other necessary instruments, and the entire package is able to meet the payload capability requirements. Upon inflation, these structures can morph into final shapes that are a hundred times larger than their original volume, which extends the detection range and also provides long-term observation capabilities. This dissertation reviews underwater platforms, underwater acoustics, imaging sensors, and inflatable structure applications then proposes potential applications for the inflatable structures. Based on the proposed applications, a conceptual design of an underwater tubular structure is developed and initial prototypes are built for the study of the mechanics of inflatable tubes. Numerical approaches for the inflation process and bending loading are developed to predict the inflatable tubular behavior during the structure’s morphing process and under different loading conditions. The material properties are defined based on tensile tests. The numerical results are compared with and verified by experimental data. The methods used in this research provide a solution for underwater inflatable structure design and analysis. Several ocean morphing structures are proposed based on the inflatable tube analysis.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004752, http://purl.flvc.org/fau/fd/FA00004752
- Subject Headings
- Air-supported structures--Design and construction., Remote submersibles--Design and construction., Tensile architecture., Fluid mechanics., Structural dynamics., Ocean engineering., Adaptive control systems.
- Format
- Document (PDF)
- Title
- Use of microsimulation to access HCM2010 methodology for oversaturated freeway segments.
- Creator
- Jolovic, Dusan, College of Engineering and Computer Science, Department of Civil, Environmental and Geomatics Engineering
- Abstract/Description
-
Highway Capacity Manual (HCM) 2010 methodology for freeway operations contain procedures for calculating traffic performance measures both for undersaturated and oversaturated flow conditions. However, one of the limitations regarding oversaturated freeway weaving segments is that the HCM procedures have not been extensively calibrated based on field observations on U.S. freeways. This study validates the HCM2010 methodology for oversaturated freeway weaving segment by comparing space mean...
Show moreHighway Capacity Manual (HCM) 2010 methodology for freeway operations contain procedures for calculating traffic performance measures both for undersaturated and oversaturated flow conditions. However, one of the limitations regarding oversaturated freeway weaving segments is that the HCM procedures have not been extensively calibrated based on field observations on U.S. freeways. This study validates the HCM2010 methodology for oversaturated freeway weaving segment by comparing space mean speed and density obtained from HCM procedure to those generated by a microsimulation model. A VISSIM model is extensively calibrated and validated based on NGSIM field data for the US 101 Highway. Abundance of the NGSIM data is utilized to calibrate and validate the VISSIM model. Results show that HCM methodology has significant limitations and while in some cases it can reproduce density correctly, the study finds that speeds estimated by the HCM methodology significantly differ from those observed in the field.
Show less - Date Issued
- 2012
- PURL
- http://purl.flvc.org/FAU/3342202
- Subject Headings
- Roads, Design and construction, Traffic engineering, Express highways, Management, Intelligent transportation systems, Design and construction
- Format
- Document (PDF)
- Title
- Patterns for Enterprise Application Design and Development.
- Creator
- Rubis, Ruslan, Cardei, Ionut E., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Designing and developing enterprise applications is a complex and resource intensive process, as it often must address thousands of requirements. At the same time, the software architecture of most enterprise applications at their core have many features and structures in common. Designers from different teams do not normally share design elements because of the competitive and proprietary nature of development, and enterprise applications design and development teams end up re-inventing the...
Show moreDesigning and developing enterprise applications is a complex and resource intensive process, as it often must address thousands of requirements. At the same time, the software architecture of most enterprise applications at their core have many features and structures in common. Designers from different teams do not normally share design elements because of the competitive and proprietary nature of development, and enterprise applications design and development teams end up re-inventing the wheel when tackling a new product. My objective is to formulate new design patterns for enterprise application architectures that assist software architects with reusable solutions to improve design quality and productivity. I achieve this by presenting seven patterns, each providing a solution to a specific challenge or a problem that is common to many enterprise applications. The Business Object Pattern provides a generic approach to design extensible Business Objects and their frameworks for enterprise applications. The pattern covers a number of concepts, including the Dynamic business object, the Static business object, constraints for validity, editability, and attribute visibility, as well as the mechanisms for workflow. The Business Object Life Cycle Pattern introduces the concept of stages which comprise a business object’s life cycle, and their relation to the business object’s integrity during that life cycle. The Simple Change History Pattern provides a concept of enforcing record keeping of the owner and date of the last change performed on a given business data object. The Business Data Object Versioning Pattern offers a solution by introducing a new version of a given business data object which allows for preservation of the original data. The Change History Record Pattern defines a solution for cases when there is a need to capture detailed information about the changes performed on a given business object, such as who made the changes, when, and what changes were made. The Permission Based Granular Access Control Pattern offers a basic approach for access control to objects and their attributes. Finally, the Money Object Pattern offers a language neutral approach to internationalization and globalization of business applications which require multi-currency capability. It is hoped that applying these patterns will provide many advantages, ranging from quicker delivery times to a more reliable software, and ultimately help achieve a systematic approach to designing and building complex enterprise applications.
Show less - Date Issued
- 2017
- PURL
- http://purl.flvc.org/fau/fd/FA00004976, http://purl.flvc.org/fau/fd/FA00004966
- Subject Headings
- Dissertations, Academic -- Florida Atlantic University, Enterprise application integration (Computer systems), Software architecture--Development., Software Design., Application software--Design., Patterns.
- Format
- Document (PDF)
- Title
- Simulator and location-aware routing protocol for mobile ad hoc acoustic networks of AUVs.
- Creator
- Carlson, Edward A., College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
Acoustic networks of autonomous underwater vehicles (AUVs) show great promise, but a lack of simulation tools and reliance on protocols originally developed for terrestrial radio networks has hindered progress. This work addresses both issues. A new simulator of underwater communication among AUVs provides accurate communication modeling and flexible vehicle behavior, while a new routing protocol, location-aware source routing (LASR) provides superior network performance. The new simulator...
Show moreAcoustic networks of autonomous underwater vehicles (AUVs) show great promise, but a lack of simulation tools and reliance on protocols originally developed for terrestrial radio networks has hindered progress. This work addresses both issues. A new simulator of underwater communication among AUVs provides accurate communication modeling and flexible vehicle behavior, while a new routing protocol, location-aware source routing (LASR) provides superior network performance. The new simulator was used to evaluate communication without networking, and then with networking using the coding or dynamic source routing (DSR) protocols. The results confirmed that a network was essential to ensure effective fleet-wide communication. The flooding protocol provided extremely reliable communication but with low message volumes. The DSR protocol, a popular routing protocol due to its effectiveness in terrestrial radio networks, proved to be a bad choice in an acoustic environment: in most cases, it suffered from both poor reliability and low message volumes. Due to the high acoustic latency, even moderate vehicle speeds caused the network topology to change faster than DSR could adapt. DSR's reliance on shortest-path routing also proved to be a significant disadvantage. Several DSR optimizations were also tested; most proved to be unhelpful or actually harmful in an underwater acoustic network. LASR was developed to address the problems noted in flooding and DSR. LASR was loosely derived from DSR, most significantly retaining source routes and the reply/request route discovery technique. However, LASR added features which proved, in simulation, to be significant advantages -- two of the most effective were a link/route metric and a node tracking system. To replace shortest-path routing, LASR used the expected transmission count (ETX) metric., This allowed LASR to make more informed routing decisions which greatly increased performance compared to DSR. The node tracking system was the most novel addition: using only implicit communication coupled with the use of time-division multiple access (TDMA), the tracking system provided predicted node locations. These predictions made it possible for LASR to proactively respond to topology changes. In most cases, LASR outperformed flooding and DSR in message delivery reliability and message delivery volume.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/187208
- Subject Headings
- Ad hoc networks (Computer networks), Computer network protocols, Routers (Computer networks), Mobile communication systems, Design and construction, Remote submersibles, Design and construction
- Format
- Document (PDF)
- Title
- Task allocation and path planning for acoustic networks of AUVs.
- Creator
- Deng, Yueyue, College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
Controlling the cooperative behaviors of a fleet of autonomous underwater vehicles in a stochastic, complex environment is a formidable challenge in artificial intelligence. The complexity arises from the challenges of limited navigation and communication capabilities of underwater environment. A time critical cooperative operation by acoustic networks of Multiple Cooperative Vehicles (MCVs) necessitates a robust task allocation mechanism and an efficient path planning model. In this work, we...
Show moreControlling the cooperative behaviors of a fleet of autonomous underwater vehicles in a stochastic, complex environment is a formidable challenge in artificial intelligence. The complexity arises from the challenges of limited navigation and communication capabilities of underwater environment. A time critical cooperative operation by acoustic networks of Multiple Cooperative Vehicles (MCVs) necessitates a robust task allocation mechanism and an efficient path planning model. In this work, we present solutions to investigate two aspects of the cooperative schema for multiple underwater vehicles under realistic underwater acoustic communications: a Location-aided Task Allocation Framework (LAAF) algorithm for multi-target task assignment and a mathematical programming model, the Grid-based Multi-Objective Optimal Programming (GMOOP), for finding an optimal vehicle command decision given a set of objectives and constraints. We demonstrate that, the location-aided auction strategies perform significantly better than the generic auction algorithm in terms of effective task allocation time and information bandwidth requirements. In a typical task assignment scenario, the time needed in the LAAF algorithm is only a fraction compared to the generic auction algorithm. On the other hand; the GMOOP path planning technique provides a unique means for multi-objective tasks by cooperative agents with limited communication capabilities. Under different environmental settings, the GMOOP path planning technique is proved to provide a method with balance of sufficient expressive power and flexibility, and its solution algorithms tractable in terms of mission completion time, with a limited increase of overhead in acoustic communication. Prior to this work, existing multi-objective action selection methods were limited to robust networks where constant communication available., The dynamic task allocation, together with the GMOOP path planning controller, provides a comprehensive solution to the search-classify tasks for cooperative AUVs.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/1927865
- Subject Headings
- Computer network protocols, Routers (Computer networks), Remote submersibles, Design and construction, Mobile communication systems, Design and construction, Ad hoc networks (Computer networks)
- Format
- Document (PDF)
- Title
- DCVS logic synthesis.
- Creator
- Xiao, Kang., Florida Atlantic University, Barrett, Raymond L. Jr., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Implementation of CMOS combinational logic with Differential Cascode Voltage Switch logic (DCVS) may have many advantages over the traditional CMOS logic approaches with respect to device count, layout density and timing. DCVS is an ideal target technology for a logic synthesis system in that it provides a complete function cover by providing the function and its complement simultaneously. DCVS is also more testable due to this. We have developed for IBM's DCVS technology a synthesis...
Show moreImplementation of CMOS combinational logic with Differential Cascode Voltage Switch logic (DCVS) may have many advantages over the traditional CMOS logic approaches with respect to device count, layout density and timing. DCVS is an ideal target technology for a logic synthesis system in that it provides a complete function cover by providing the function and its complement simultaneously. DCVS is also more testable due to this. We have developed for IBM's DCVS technology a synthesis algorithm and a new test generation approach, that are based on topologies rather than individual logic functions. We have found that 19 and 363 DCVS topologies can represent 256 and 65,536 functions, respectively, for the 3- and 4-varaible cases. Physical defect analysis was conducted with the aid of a building block approach to analyze the n-type logic tree and provides a basis for evolving hierarchical test pattern generation for the topologies.
Show less - Date Issued
- 1992
- PURL
- http://purl.flvc.org/fcla/dt/14850
- Subject Headings
- Integrated circuits--Very large scale integration--Data processing, Metal oxide semiconductors, Complementary, Computer-aided design, Electronic systems, Logic design--Data processing
- Format
- Document (PDF)
- Title
- Cache optimization for real-time embedded systems.
- Creator
- Asaduzzaman, Abu Sadath Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Cache memory is used, in most single-core and multi-core processors, to improve performance by bridging the speed gap between the main memory and CPU. Even though cache increases performance, it poses some serious challenges for embedded systems running real-time applications. Cache introduces execution time unpredictability due to its adaptive and dynamic nature and cache consumes vast amount of power to be operated. Energy requirement and execution time predictability are crucial for the...
Show moreCache memory is used, in most single-core and multi-core processors, to improve performance by bridging the speed gap between the main memory and CPU. Even though cache increases performance, it poses some serious challenges for embedded systems running real-time applications. Cache introduces execution time unpredictability due to its adaptive and dynamic nature and cache consumes vast amount of power to be operated. Energy requirement and execution time predictability are crucial for the success of real-time embedded systems. Various cache optimization schemes have been proposed to address the performance, power consumption, and predictability issues. However, currently available solutions are not adequate for real-time embedded systems as they do not address the performance, power consumption, and execution time predictability issues at the same time. Moreover, existing solutions are not suitable for dealing with multi-core architecture issues. In this dissertation, we develop a methodology through cache optimization for real-time embedded systems that can be used to analyze and improve execution time predictability and performance/power ratio at the same time. This methodology is effective for both single-core and multi-core systems. First, we develop a cache modeling and optimization technique for single-core systems to improve performance. Then, we develop a cache modeling and optimization technique for multi-core systems to improve performance/power ratio. We develop a cache locking scheme to improve execution time predictability for real-time systems. We introduce Miss Table (MT) based cache locking scheme with victim cache (VC) to improve predictability and performance/power ratio. MT holds information about memory blocks, which may cause more misses if not locked, to improve cache locking performance., VC temporarily stores the victim blocks from level-1 cache to improve cache hits. In addition, MT is used to improve cache replacement performance and VC is used to improve cache hits by supporting stream buffering. We also develop strategies to generate realistic workload by characterizing applications to simulate cache optimization and cache locking schemes. Popular MPEG4, H.264/AVC, FFT, MI, and DFT applications are used to run the simulation programs. Simulation results show that newly introduced Miss Table based cache locking scheme with victim cache significantly improves the predictability and performance/power ratio. In this work, a reduction of 33% in mean delay per task and a reduction of 41% in total power consumption are achieved by using MT and VCs while locking 25% of level-2 cache size in an 4-core system. It is also observed that execution time predictability can be improved by avoiding more than 50% cache misses while locking one-fourth of the cache size.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/359919
- Subject Headings
- Real-time embedded systems and components, Embedded computer systems, Programming, Computer architecture, Integrated circuits, Design and construction, Signal processing, Digital techniques, Object-oriented methods (Computer science)
- Format
- Document (PDF)
- Title
- Dynamics and Control of Autonomous Underwater Vehicles with Internal Actuators.
- Creator
- Li, Bo, Su, Tsung-Chow, Florida Atlantic University, College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
This dissertation concerns the dynamics and control of an autonomous underwater vehicle (AUV) which uses internal actuators to stabilize its horizontalplane motion. The demand for high-performance AUVs are growing in the field of ocean engineering due to increasing activities in ocean exploration and research. New generations of AUVs are expected to operate in harsh and complex ocean environments. We propose a hybrid design of an underwater vehicle which uses internal actuators instead of...
Show moreThis dissertation concerns the dynamics and control of an autonomous underwater vehicle (AUV) which uses internal actuators to stabilize its horizontalplane motion. The demand for high-performance AUVs are growing in the field of ocean engineering due to increasing activities in ocean exploration and research. New generations of AUVs are expected to operate in harsh and complex ocean environments. We propose a hybrid design of an underwater vehicle which uses internal actuators instead of control surfaces to steer. When operating at low speeds or in relatively strong ocean currents, the performances of control surfaces will degrade. Internal actuators work independent of the relative ows, thus improving the maneuvering performance of the vehicle. We develop the mathematical model which describes the motion of an underwater vehicle in ocean currents from first principles. The equations of motion of a body-fluid dynamical system in an ideal fluid are derived using both Newton-Euler and Lagrangian formulations. The viscous effects of a real fluid are considered separately. We use a REMUS 100 AUV as the research model, and conduct CFD simulations to compute the viscous hydrodynamic coe cients with ANSYS Fluent. The simulation results show that the horizontal-plane motion of the vehicle is inherently unstable. The yaw moment exerted by the relative flow is destabilizing. The open-loop stabilities of the horizontal-plane motion of the vehicle in both ideal and real fluid are analyzed. In particular, the effects of a roll torque and a moving mass on the horizontal-plane motion are studied. The results illustrate that both the position and number of equilibrium points of the dynamical system are prone to the magnitude of the roll torque and the lateral position of the moving mass. We propose the design of using an internal moving mass to stabilize the horizontal-plane motion of the REMUS 100 AUV. A linear quadratic regulator (LQR) is designed to take advantage of both the linear momentum and lateral position of the internal moving mass to stabilize the heading angle of the vehicle. Alternatively, we introduce a tunnel thruster to the design, and use backstepping and Lyapunov redesign techniques to derive a nonlinear feedback control law to achieve autopilot. The coupling e ects between the closed-loop horizontal-plane and vertical-plane motions are also analyzed.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004738, http://purl.flvc.org/fau/fd/FA00004738
- Subject Headings
- Dynamics., Remote submersibles--Design and construction., Ocean engineering., Fluid dynamics., Nonlinear control theory., Differentiable dynamical systems.
- Format
- Document (PDF)
- Title
- Implementation of a mobile data collector in wireless sensor networks for energy conservation.
- Creator
- Heshike, Pedro L., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A Wireless Sensor Network (WSN) is composed of low-cost electronic devices with sensing, data storage and transmitting capabilities, powered by batteries. There are extensive studies in the field of WSN investigating different algorithms and protocols for data collection. A data collector can be static or mobile. Using a mobile data collector can extend network lifetime and can be used to collect sensor data in hardly accessible locations, partitioned networks, and delay-tolerant networks....
Show moreA Wireless Sensor Network (WSN) is composed of low-cost electronic devices with sensing, data storage and transmitting capabilities, powered by batteries. There are extensive studies in the field of WSN investigating different algorithms and protocols for data collection. A data collector can be static or mobile. Using a mobile data collector can extend network lifetime and can be used to collect sensor data in hardly accessible locations, partitioned networks, and delay-tolerant networks. The implementation of the mobile data collector in our study consists of combining two different platforms: the Crossbow sensor hardware and the NXT Legos. We developed an application for data collection and sensor querying support. Another important contribution is designing a semi-autonomous robot control. This hardware prototype implementation shows the benefits of using a mobile data collector in WSN. It also serves as a reference in developing future applications for mobile WSNs.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3171401
- Subject Headings
- Wireless communication systems, Technological innovations, Sensor networks, Design and construction, Compter network protocols, Ad hoc networks (Computer networks), Technological innovations
- Format
- Document (PDF)
- Title
- Modeling the performance of a laser for tracking an underwater dynamic target.
- Creator
- Dill, Thomas J., von Ellenrieder, Karl, Florida Atlantic University, College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
Options for tracking dynamic underwater targets using optical methods is currently limited. This thesis examines optical reflectance intensities utilizing Lambert’s Reflection Model and based on a proposed underwater laser tracking system. Numerical analysis is performed through simulation to determine the detectable light intensities based on relationships between varying inputs such as angle of illumination and target position. Attenuation, noise, and laser beam spreading are included in...
Show moreOptions for tracking dynamic underwater targets using optical methods is currently limited. This thesis examines optical reflectance intensities utilizing Lambert’s Reflection Model and based on a proposed underwater laser tracking system. Numerical analysis is performed through simulation to determine the detectable light intensities based on relationships between varying inputs such as angle of illumination and target position. Attenuation, noise, and laser beam spreading are included in the analysis. Simulation results suggest optical tracking exhibits complex relationships based on target location and illumination angle. Signal to Noise Ratios are a better indicator of system capabilities than received intensities. Signal reception does not necessarily confirm target capture in a multi-sensor network.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004279, http://purl.flvc.org/fau/fd/FA00004279
- Subject Headings
- Acoustic velocity meters, Intelligent control systems, Optical instruments -- Design and construction, Roving vehicles (Astronautics), Target acquisition, Underwater acoustics
- Format
- Document (PDF)
- Title
- Patterns for wireless sensor networks.
- Creator
- Sahu, Anupama., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Sensors are shaping many activities in our society with an endless array of potential applications in military, civilian, and medical application. They support different real world applications ranging from common household appliances to complex systems. Technological advancement has enabled sensors to be used in medical applications, wherein they are deployed to monitor patients and assist disabled patients. Sensors have been invaluable in saving lives, be it a soldier's life in a remote...
Show moreSensors are shaping many activities in our society with an endless array of potential applications in military, civilian, and medical application. They support different real world applications ranging from common household appliances to complex systems. Technological advancement has enabled sensors to be used in medical applications, wherein they are deployed to monitor patients and assist disabled patients. Sensors have been invaluable in saving lives, be it a soldier's life in a remote battlefield or a civilian's life in a disaster area or natural calamities. In every application the sensors are deployed in a pre-defined manner to perform a specific function. Understanding the basic structure of a sensor node is essential as this would be helpful in using the sensors in devices and environments that have not been explored. In this research, patterns are used to present a more abstract view of the structure and architecture of sensor nodes and wireless sensor networks. This would help an application designer to choose from different types of sensor nodes and sensor network architectures for applications such as robotic landmine detection or remote patient monitoring systems. Moreover, it would also help the network designer to reuse, combine or modify the architectures to suit more complex needs. More importantly, they can be integrated with complete IT applications. One of the important applications of wireless sensor networks in the medical field is a remote patient monitoring system. In this work, patterns were developed to describe the architecture of patient monitoring system., This pattern describes how to connect sensor nodes and other wireless devices with each other to form a network that aims to monitor the vital signs of a person and report it to a central system. This central system could be accessed by the patient's healthcare provider for treatment purposes. This system shows one of the most important applications of sensors and it application which needs to be integrated with medical records and the use of patterns makes this integration much simpler.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/2979380
- Subject Headings
- Wireless communication systems, Technological innovations, Wireless sensor networks, Design and construction, Computer network protocols, Multisensensor data fusion
- Format
- Document (PDF)
- Title
- Effects of added components on the dynamic modeling of printed circuit boards.
- Creator
- Vallamattam, Bijoy Kurian., Florida Atlantic University, Stevens, Karl K., College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
Dynamic modeling of Printed Circuit Boards (PCBs) with mounted components, was investigated via the example of a PC network card by removing components in different stages and examining the resulting effects on the modal properties. Modal test results were compared with those from an ANSYS finite element analysis. Questions considered were: a) Do added components have a significant effect on the modal properties of a PCB and what are the effects ? b) How much variation is there in natural...
Show moreDynamic modeling of Printed Circuit Boards (PCBs) with mounted components, was investigated via the example of a PC network card by removing components in different stages and examining the resulting effects on the modal properties. Modal test results were compared with those from an ANSYS finite element analysis. Questions considered were: a) Do added components have a significant effect on the modal properties of a PCB and what are the effects ? b) How much variation is there in natural frequencies from board to board and test to test for a single board? c) Can a board with attached components reasonably be modeled as a uniform elastic plate with an "equivalent" density and modulus of elasticity? Results obtained indicate that added components do have significant effects on the board modal properties, less so for the lower modes than for the higher modes. There was only slight variation in the natural frequencies from board to board and from test to test for a single board. For the first two modes of vibration, it was found that the board considered could be modeled as a uniform elastic plate with "equivalent" properties, provided an appropriate value of equivalent elastic modulus was used. General findings, applicable to any PCB design, are presented.
Show less - Date Issued
- 1994
- PURL
- http://purl.flvc.org/fcla/dt/15015
- Subject Headings
- Modal analysis, Printed circuits--Mathematical models, Printed circuits--Design and construction--Data processing, Electronic systems
- Format
- Document (PDF)
- Title
- System Level Modeling and Simulation with MLDesigner.
- Creator
- Kovalski, Fabiano, Aalo, Valentine A., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
System modeling has the potential to enhance system design productivity by providing a platform for system performance evaluations. This model must be designed at an abstract level, hiding system details. However, it must represent any subsystem or its components at any level of specification details. In order to model such a system, we will need to combine various models-of-computation (MOC). MOC provide a framework to model various algorithms and activities, while accounting for and...
Show moreSystem modeling has the potential to enhance system design productivity by providing a platform for system performance evaluations. This model must be designed at an abstract level, hiding system details. However, it must represent any subsystem or its components at any level of specification details. In order to model such a system, we will need to combine various models-of-computation (MOC). MOC provide a framework to model various algorithms and activities, while accounting for and exploiting concurrency and synchronization aspects. Along with supporting various MOC, a modeling environment should also support a well developed library. In this thesis, we have explored various modeling environments. MLDesigner (MLD) is one such modeling environment that supports a well developed library and integrates various MOC. We present an overview and discuss the process of system modeling with MLD. We further present an abstract model of a Network-on-Chip in MLD and show latency results for various customizable parameters for this model.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fau/fd/FA00012531
- Subject Headings
- High performance computing, Electronic data processing--Distributed processing, Information technology--Management, Spatial analysis (Statistics), System design
- Format
- Document (PDF)