Current Search: Florida Atlantic University -- History (x) » Working class -- Latin America -- Periodicals. (x) » Department of Computer and Electrical Engineering and Computer Science (x)
View All Items
Pages
- Title
- The "Stop-It anti-fidgeting device.
- Creator
- Barnard, Scott A., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Fidgeting and otherwise constant movements in individuals can be beneficial in those who suffer from Attention Deficit/Hyperactivity Disorder or Generalized Anxiety Disorder as well as others. However this constant movement can also be a distraction to others as well as protrude an air of no self confidence. It is the drawbacks from these actions that we wish to address. By developing an intelligent system that can detect these motions and alert the user, it will allow the wearer of the...
Show moreFidgeting and otherwise constant movements in individuals can be beneficial in those who suffer from Attention Deficit/Hyperactivity Disorder or Generalized Anxiety Disorder as well as others. However this constant movement can also be a distraction to others as well as protrude an air of no self confidence. It is the drawbacks from these actions that we wish to address. By developing an intelligent system that can detect these motions and alert the user, it will allow the wearer of the device to self correct. It is in this self control that one may exhibit more confidence or simply reduce the level of irritation experienced by those in the immediate vicinity. We have designed and built a low cost, mobile, lightweight, untethered, wearable prototype device. It will detect these actions and deliver user selectable biofeedback through a light emitting diode, buzzer, vibromotor or an electric shock to allow for self control.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/368612
- Subject Headings
- Restless legs syndrome, Treatment, Technological innovations, Agitation (Psychology), Biomedical engineering, Neural networks (Neurobiology)
- Format
- Document (PDF)
- Title
- 2D/3D face recognition.
- Creator
- Guan, Xin., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This dissertation introduces our work on face recognition using a novel approach based on creating 3D face model from 2D face images. Together with the pose angle estimation and illumination compensation, this method can be used successfully to recognize 2D faces with 3D recognition algorithms. The results reported here were obtained partially with our own face image database, which had 2D and 3D face images of 50 subjects, with 9 different pose angles. It is shown that by applying even the...
Show moreThis dissertation introduces our work on face recognition using a novel approach based on creating 3D face model from 2D face images. Together with the pose angle estimation and illumination compensation, this method can be used successfully to recognize 2D faces with 3D recognition algorithms. The results reported here were obtained partially with our own face image database, which had 2D and 3D face images of 50 subjects, with 9 different pose angles. It is shown that by applying even the simple PCA algorithm, this new approach can yield successful recognition rates using 2D probing images and 3D gallery images. The insight gained from the 2D/3D face recognition study was also extended to the case of involving 2D probing and 2D gallery images, which offers a more flexible approach since it is much easier and practical to acquire 2D photos for recognition. To test the effectiveness of the proposed approach, the public AT&T face database, which had 2D only face photos of 40 subjects, with 10 different images each, was utilized in the experimental study. The results from this investigation show that with our approach, the 3D recognition algorithm can be successfully applied to 2D only images. The performance of the proposed approach was further compared with some of the existing face recognition techniques. Studies on imperfect conditions such as domain and pose/illumination variations were also carried out. Additionally, the performance of the algorithms on noisy photos was evaluated. Pros and cons of the proposed face recognition technique along with suggestions for future studies are also given in the dissertation.
Show less - Date Issued
- 2012
- PURL
- http://purl.flvc.org/FAU/3342104
- Subject Headings
- Pattern recognition systems, Optical pattern recognition, Biometric identification, Face perception, Artificial intellingence
- Format
- Document (PDF)
- Title
- A Biometrics Based Secure Communication Scheme for Bluetooth Environment.
- Creator
- Soni, Puneet, Pandya, Abhijit S., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A novel personnel authentication and verification system for devices communicating through Bluetooth protocol has been proposed in this thesis. Unlike existing verification systems which provide password or a PIN as a key, the system uses biometrics features as a key. In the implementation of the scheme, ridges and bifurcation based parameters are derived to generate a 128 bit Bluetooth pairing PIN. In this thesis a unique translational and rotational invariant feature set has been developed....
Show moreA novel personnel authentication and verification system for devices communicating through Bluetooth protocol has been proposed in this thesis. Unlike existing verification systems which provide password or a PIN as a key, the system uses biometrics features as a key. In the implementation of the scheme, ridges and bifurcation based parameters are derived to generate a 128 bit Bluetooth pairing PIN. In this thesis a unique translational and rotational invariant feature set has been developed. These extracted feature data, unlike traditional systems which include the extracted data into payload, is used for device connection by generating the 128 bit PIN. The system performance is analyzed using the pairing PIN for inter-sample and intra-sample recognition. To validate the stability of the system the performance is analyzed with external samples which are not a part of the internal database.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012556
- Subject Headings
- Bluetooth technology--Security measures, Network performance (Telecommunication), Computer network protocols
- Format
- Document (PDF)
- Title
- A body area network as a pre-screening surrogate to the polysomnography.
- Creator
- LaFleur, Sheryl, Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Out of 60 million Americans suffering from sleep disorder, an estimated 18 million have sleep apnea. According to the U.S. Department of Health & Human Services, sleep apnea is a chronic condition that disrupts a patient’s sleep. While the annual cost of treating sleep apnea patients in the United States is approximately $3.18 billion (including screening costs) it is estimated that untreated sleep apnea may cause $3.4 billion in additional medical costs. A polysomnography (PSG) is an all...
Show moreOut of 60 million Americans suffering from sleep disorder, an estimated 18 million have sleep apnea. According to the U.S. Department of Health & Human Services, sleep apnea is a chronic condition that disrupts a patient’s sleep. While the annual cost of treating sleep apnea patients in the United States is approximately $3.18 billion (including screening costs) it is estimated that untreated sleep apnea may cause $3.4 billion in additional medical costs. A polysomnography (PSG) is an all-night sleep study which monitors various physical functions during sleep including electrical activity of the heart, brain wave patterns, eye movement, muscle tone, body movements, and breathing. It is currently, the most accurate and sophisticated test for the diagnosis of sleep-disordered breathing (SDB), but also, the most expensive. The cost of an overnight sleep study is estimated between $900 and $3,000. In addition, the PSG is not mobile and has to be administered outside a patient’s home. The Long QT Syndrome (LQTS) is a rhythm disorder that causes erratic (unpredictable) heartbeats. The LQTS has been linked to patients with the most severe form of sleep apnea. If LQTS is left untreated, sudden cardiac death may occur.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004300
- Subject Headings
- Neurophysiology, Nevous system -- Diseases -- Diagnosis, Polysomnography, Sleep -- Physiological aspects, Sleep apnea syndromes -- Diagnosis, Sleep disorders -- Diagnosis
- Format
- Document (PDF)
- Title
- A Clinical Decision Support System for the Identification of Potential Hospital Readmission Patients.
- Creator
- Baechle, Christopher, Agarwal, Ankur, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Recent federal legislation has incentivized hospitals to focus on quality of patient care. A primary metric of care quality is patient readmissions. Many methods exist to statistically identify patients most likely to require hospital readmission. Correct identification of high-risk patients allows hospitals to intelligently utilize limited resources in mitigating hospital readmissions. However, these methods have seen little practical adoption in the clinical setting. This research attempts...
Show moreRecent federal legislation has incentivized hospitals to focus on quality of patient care. A primary metric of care quality is patient readmissions. Many methods exist to statistically identify patients most likely to require hospital readmission. Correct identification of high-risk patients allows hospitals to intelligently utilize limited resources in mitigating hospital readmissions. However, these methods have seen little practical adoption in the clinical setting. This research attempts to identify the many open research questions that have impeded widespread adoption of predictive hospital readmission systems. Current systems often rely on structured data extracted from health records systems. This data can be expensive and time consuming to extract. Unstructured clinical notes are agnostic to the underlying records system and would decouple the predictive analytics system from the underlying records system. However, additional concerns in clinical natural language processing must be addressed before such a system can be implemented. Current systems often perform poorly using standard statistical measures. Misclassification cost of patient readmissions has yet to be addressed and there currently exists a gap between current readmission system evaluation metrics and those most appropriate in the clinical setting. Additionally, data availability for localized model creation has yet to be addressed by the research community. Large research hospitals may have sufficient data to build models, but many others do not. Simply combining data from many hospitals often results in a model which performs worse than using data from a single hospital. Current systems often produce a binary readmission classification. However, patients are often readmitted for differing reasons than index admission. There exists little research into predicting primary cause of readmission. Furthermore, co-occurring evidence discovery of clinical terms with primary diagnosis has seen only simplistic methods applied. This research addresses these concerns to increase adoption of predictive hospital readmission systems.
Show less - Date Issued
- 2017
- PURL
- http://purl.flvc.org/fau/fd/FA00004880, http://purl.flvc.org/fau/fd/FA00004880
- Subject Headings
- Health services administration--Management., Medical care--Quality control--Statistical methods., Medical care--Quality control--Data processing., Medical care--Decision making., Evidence-based medicine., Outcome assessment (Medical care)
- Format
- Document (PDF)
- Title
- A Collaborative Approach for Real-Time Measurements of Human Trust, Satisfaction and Frustration in Human-Robot Teaming.
- Creator
- Gonzalez Moya, Iker Javier, Nojoumian, Mehrdad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis aims at real-time measurements of human trust, satisfaction, and frustration in human-robot teaming. Recent studies suggest that humans are inclined to have a negative attitude towards using autonomous systems. These ndings elevate the necessity of conducting research to better understand the key factors that a ect the levels of trust, satisfaction and frustration in Human-Robot Interaction (HRI). We utilized a new sequential and collaborative approach for HRI data collection that...
Show moreThis thesis aims at real-time measurements of human trust, satisfaction, and frustration in human-robot teaming. Recent studies suggest that humans are inclined to have a negative attitude towards using autonomous systems. These ndings elevate the necessity of conducting research to better understand the key factors that a ect the levels of trust, satisfaction and frustration in Human-Robot Interaction (HRI). We utilized a new sequential and collaborative approach for HRI data collection that employed trust, satisfaction and frustration as primarily evaluative metrics. We also used haptic feedback through a soft actuator armband to help our human subjects control a robotic hand for grabbing or not grabbing an object during our interaction scenarios. Three experimental studies were conducted during our research of which the rst was related to the evaluation of aforementioned metrics through a collabora- tive approach between the Baxter robot and human subjects. The second experiment embodied the evaluation of a newly fabricated 3D- nger for the I-Limb robotic hand through a nuclear-waste glove. The third experiment was based on the two previous studies that focused on real-time measurements of trust, satisfaction and frustration in human-robot teaming with the addition of pressure feedback to the system through soft actuators. In the last case, human subjects had more controls over our robotic systems compared to earlier experiments leading to a more collaborative interaction and teaming. The results of these experiments illustrated that human subjects can rebuild their trust and also increase their satisfaction levels while lowering their frus- tration levels after failures or any faulty behavior. Furthermore, our analyses showed that our methods are highly e ective for collecting honest and genuine data from hu- man subjects and lays the foundation for more-involved future research in the domain of human-robot teaming.
Show less - Date Issued
- 2018
- PURL
- http://purl.flvc.org/fau/fd/FA00013064
- Subject Headings
- Human-robot interaction., Haptic devices.
- Format
- Document (PDF)
- Title
- A Collision-Free Drone Scheduling System.
- Creator
- Steinberg, Andrew, Cardei, Mihaela, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Today, drones have been receiving a lot of notice from commercial businesses. Businesses (mainly companies that have delivery services) are trying to expand their productivity in order bring more satisfaction for their loyal customers. One-way companies can expand their delivery services are through the use of delivery drones. Drones are very powerful devices that are going through many evolutionary changes for their uses throughout the years. For many years, researchers in academia have been...
Show moreToday, drones have been receiving a lot of notice from commercial businesses. Businesses (mainly companies that have delivery services) are trying to expand their productivity in order bring more satisfaction for their loyal customers. One-way companies can expand their delivery services are through the use of delivery drones. Drones are very powerful devices that are going through many evolutionary changes for their uses throughout the years. For many years, researchers in academia have been examining how drones can plan their paths along with avoiding collisions of other drones and certain obstacles in the civil airspace. However, researchers have not considered how the motion path planning can a ect the overall scheduling aspect of civilian drones. In this thesis, we propose an algorithm for a collision-free scheduling motion path planning of a set drones such that they avoid certain obstacles as well as maintaining a safety distance from each other.
Show less - Date Issued
- 2017
- PURL
- http://purl.flvc.org/fau/fd/FA00004994, http://purl.flvc.org/fau/fd/FA00004984
- Subject Headings
- Dissertations, Academic -- Florida Atlantic University, Drone aircraft., Algorithms., Scheduling., Drone aircraft--Safety measures.
- Format
- Document (PDF)
- Title
- A COMPARATIVE STUDY OF STRUCTURED VERSUS UNSTRUCTURED TEXT DATA.
- Creator
- Cardenas, Erika, Khoshgoftaar, Taghi M., Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
In today’s world, data is generated at an unprecedented rate, and a significant portion of it is unstructured text data. The recent advancements in Natural Language Processing have enabled computers to understand and interpret human language. Data mining techniques were once unable to use text data due to the high dimensionality of text processing models. This limitation was overcome with the ability to represent data as text. This thesis aims to compare the predictive performance of...
Show moreIn today’s world, data is generated at an unprecedented rate, and a significant portion of it is unstructured text data. The recent advancements in Natural Language Processing have enabled computers to understand and interpret human language. Data mining techniques were once unable to use text data due to the high dimensionality of text processing models. This limitation was overcome with the ability to represent data as text. This thesis aims to compare the predictive performance of structured versus unstructured text data in two different applications. The first application is in the field of real estate. We compare the performance of tabular real-estate data and unstructured text descriptions of homes to predict the house price. The second application is in translating Electronic Health Records (EHR) tabular data to text data for survival classification of COVID-19 patients. Lastly, we present a range of strategies and perspectives for future research.
Show less - Date Issued
- 2023
- PURL
- http://purl.flvc.org/fau/fd/FA00014220
- Subject Headings
- Natural language processing (Computer science), Text data mining
- Format
- Document (PDF)
- Title
- A Comparison of Model Checking Tools for Service Oriented Architectures.
- Creator
- Venkat, Raghava, Khoshgoftaar, Taghi M., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Recently most of the research pertaining to Service-Oriented Architecture (SOA) is based on web services and how secure they are in terms of efficiency and effectiveness. This requires validation, verification, and evaluation of web services. Verification and validation should be collaborative when web services from different vendors are integrated together to carry out a coherent task. For this purpose, novel model checking technologies have been devised and applied to web services. "Model...
Show moreRecently most of the research pertaining to Service-Oriented Architecture (SOA) is based on web services and how secure they are in terms of efficiency and effectiveness. This requires validation, verification, and evaluation of web services. Verification and validation should be collaborative when web services from different vendors are integrated together to carry out a coherent task. For this purpose, novel model checking technologies have been devised and applied to web services. "Model Checking" is a promising technique for verification and validation of software systems. WS-BPEL (Business Process Execution Language for Web Services) is an emerging standard language to describe web service composition behavior. The advanced features of BPEL such as concurrency and hierarchy make it challenging to verify BPEL models. Based on all such factors my thesis surveys a few important technologies (tools) for model checking and comparing each of them based on their "functional" and "non-functional" properties. The comparison is based on three case studies (first being the small case, second medium and the third one a large case) where we construct synthetic web service compositions for each case (as there are not many publicly available compositions [1]). The first case study is "Enhanced LoanApproval Process" and is considered a small case. The second is "Enhanced Purchase Order Process" which is of medium size and the third, and largest is based on a scientific workflow pattern, called the "Service Oriented Architecture Implementing BOINC Workflow" based on BOINC (Berkeley Open Infrastructure Network Computing) architecture.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012565
- Subject Headings
- Computer network architectures, Expert systems (Computer science), Software engineering, Web servers--Management
- Format
- Document (PDF)
- Title
- A Decision Support System for Sprint Planning in Scrum Practice.
- Creator
- Alhazmi, Alhejab Shawqi, Huang, Shihong, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Scrum is one of the Agile software development processes broadly adopted in industry. Scrum promotes frequent customer involvements and incremental short release. Sprint planning is a critical step in Scrum that sets up next release goals and lays out plans to achieve those goals. This thesis presents a Sprint Planning dEcision Support System (SPESS) which is a tool to assist the managers for Sprint planning. Among considering other Sprint planning factors, SPESS takes into consideration...
Show moreScrum is one of the Agile software development processes broadly adopted in industry. Scrum promotes frequent customer involvements and incremental short release. Sprint planning is a critical step in Scrum that sets up next release goals and lays out plans to achieve those goals. This thesis presents a Sprint Planning dEcision Support System (SPESS) which is a tool to assist the managers for Sprint planning. Among considering other Sprint planning factors, SPESS takes into consideration developer competency, developer seniority and task dependency. The results are that the assignments of the tasks of each Sprint to developers guarantee that each team member contributes to their fullest potential, and project planning is optimized for the shortest possible time. Keywords—Scrum, Sprint planning, planning poker, competence, task dependence, Hungarian algorithm, Essence.
Show less - Date Issued
- 2018
- PURL
- http://purl.flvc.org/fau/fd/FA00005970
- Subject Headings
- Scrum (Computer software development), Project management, Agile software development
- Format
- Document (PDF)
- Title
- A FRAMEWORK FOR NON-INTRUSIVE OCEAN CURRENT TURBINE ROTOR BLADE IMBALANCE FAULT DETECTION.
- Creator
- Freeman, Brittny, Tang, Yufei, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
Ocean current turbines (OCT) convert the kinetic energy housed within the earth’s ocean currents into electricity. However, due to the harsh environmental conditions that these turbines operate in, their system performance naturally degrades over time. This degradation correlates to high operation and maintenance (O&M) costs, which necessitates the need for robust condition monitoring and fault detection (CMFD). Unfortunately, OCT operational data is not publicly available in large and/or...
Show moreOcean current turbines (OCT) convert the kinetic energy housed within the earth’s ocean currents into electricity. However, due to the harsh environmental conditions that these turbines operate in, their system performance naturally degrades over time. This degradation correlates to high operation and maintenance (O&M) costs, which necessitates the need for robust condition monitoring and fault detection (CMFD). Unfortunately, OCT operational data is not publicly available in large and/or diverse enough quantities to develop such frameworks. Therefore, from an industry-wide perspective, the technologies needed to harvest this energy source are still in their infancy.
Show less - Date Issued
- 2022
- PURL
- http://purl.flvc.org/fau/fd/FA00014094
- Subject Headings
- Marine turbines, Marine turbines--Blades
- Format
- Document (PDF)
- Title
- A MACHINE LEARNING APPROACH FOR OCEAN EVENT MODELING AND PREDICTION.
- Creator
- Muhamed, Ali Ali Abdullateef, Zhuang, Hanqi, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
In the last decade, deep learning models have been successfully applied to a variety of applications and solved many tasks. The ultimate goal of this study is to produce deep learning models to improve the skills of forecasting ocean dynamic events in general and those of the Loop Current (LC) system in particular. A specific forecast target is to predict the geographic location of the (LC) extension and duration, LC eddy shedding events for a long lead time with high accuracy. Also, this...
Show moreIn the last decade, deep learning models have been successfully applied to a variety of applications and solved many tasks. The ultimate goal of this study is to produce deep learning models to improve the skills of forecasting ocean dynamic events in general and those of the Loop Current (LC) system in particular. A specific forecast target is to predict the geographic location of the (LC) extension and duration, LC eddy shedding events for a long lead time with high accuracy. Also, this study aims to improve the predictability of velocity fields (or more precisely, velocity volumes) of subsurface currents. In this dissertation, several deep learning based prediction models have been proposed. The core of these models is the Long-Short Term Memory (LSTM) network. This type of recurrent neural network is trained with Sea Surface Height (SSH) and LC velocity datasets. The hyperparameters of these models are tuned according to each model's characteristics and data complexity. Prior to training, SSH and velocity data are decomposed into their temporal and spatial counterparts.A model uses the Robust Principle Component Analysis is first proposed, which produces a six-week lead time in forecasting SSH evolution. Next, the Wavelet+EOF+LSTM (WELL) model is proposed to improve the forecasting capability of a prediction model. This model is tested on the prediction of two LC eddies, namely eddy Cameron and Darwin. It is shown that the WELL model can predict the separation of both eddies 10 and 14 weeks ahead respectively, which is two more weeks than the DAC model. Furthermore, the WELL model overcomes the problem due to the partitioning step involved in the DAC model. For subsurface currents forecasting, a layer partitioning method is proposed to predict the subsurface field of the LC system. A weighted average fusion is used to improve the consistency of the predicted layers of the 3D subsurface velocity field. The main challenge of forecasting of the LC and its eddies is the small number of events that have occurred over time, which is only once or twice a year, which makes the training task difficult. Forecasting the velocity of subsurface currents is equally challenging because of the limited insitu measurements.
Show less - Date Issued
- 2021
- PURL
- http://purl.flvc.org/fau/fd/FA00013727
- Subject Headings
- Machine learning, Loop Current, Oceanography--Forecasting
- Format
- Document (PDF)
- Title
- A Network Telescope Approach for Inferring and Characterizing IoT Exploitations.
- Creator
- Neshenko, Nataliia, Bou-Harb, Elias, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
While the seamless interconnection of IoT devices with the physical realm is envisioned to bring a plethora of critical improvements on many aspects and in diverse domains, it will undoubtedly pave the way for attackers that will target and exploit such devices, threatening the integrity of their data and the reliability of critical infrastructure. The aim of this thesis is to generate cyber threat intelligence related to Internet-scale inference and evaluation of malicious activities...
Show moreWhile the seamless interconnection of IoT devices with the physical realm is envisioned to bring a plethora of critical improvements on many aspects and in diverse domains, it will undoubtedly pave the way for attackers that will target and exploit such devices, threatening the integrity of their data and the reliability of critical infrastructure. The aim of this thesis is to generate cyber threat intelligence related to Internet-scale inference and evaluation of malicious activities generated by compromised IoT devices to facilitate prompt detection, mitigation and prevention of IoT exploitation. In this context, we initially provide a unique taxonomy, which sheds the light on IoT vulnerabilities from five di↵erent perspectives. Subsequently, we address the task of inference and characterization of IoT maliciousness by leveraging active and passive measurements. To support large-scale empirical data analytics in the context of IoT, we made available corresponding raw data through an authenticated platform.
Show less - Date Issued
- 2018
- PURL
- http://purl.flvc.org/fau/fd/FA00013089
- Subject Headings
- Internet of things., Internet of things--Security measures., Cyber intelligence (Computer security)
- Format
- Document (PDF)
- Title
- A NOVEL FRAMEWORK FOR ANALYSIS OF LOWER LIMB MOVEMENTS: INTEGRATION OF AUGMENTED REALITY AND SENSOR-BASED SYSTEMS.
- Creator
- Davis, Edward P., Pandya, Abhijit, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
In this thesis, an augmented reality device was coupled with motion sensor units to function as a system of cooperative technologies for usage within exercise science and neurorehabilitation. Specifically, in a subfield of exercise science called biomechanics, the assessment and analysis of movements are critical to the evaluation and prescription of improvements for physical function in both daily and sport-specific activities. Furthermore, the systematic combination of these technologies...
Show moreIn this thesis, an augmented reality device was coupled with motion sensor units to function as a system of cooperative technologies for usage within exercise science and neurorehabilitation. Specifically, in a subfield of exercise science called biomechanics, the assessment and analysis of movements are critical to the evaluation and prescription of improvements for physical function in both daily and sport-specific activities. Furthermore, the systematic combination of these technologies provided potential end-users with a modality to perform exercise within, and correlated feedback based upon the end-user’s exercise performance. Data collection specific to biomechanics can provide both the end-user and their evaluators with critical feedback that can be used to modify movement efficiency, improve exercise capacity, and evaluate exercise performance. By coordinating both technologies and completing movement-based experiments, the systems were successfully integrated.
Show less - Date Issued
- 2022
- PURL
- http://purl.flvc.org/fau/fd/FA00013952
- Subject Headings
- Augmented reality, Biomechanics, Sensors
- Format
- Document (PDF)
- Title
- A Novel Method for Human Face Enhancement for Video Images.
- Creator
- Salas, Ernesto Anel, Pandya, Abhijit S., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The focus of this research is on images extracted from surveillance videos that have a low resolution and are taken under low illumination. In recent years, great advances have been made in face recognition and many studies mention results of 80% and 90% of recognition efficiency, however, most of these studies reported results using face images under controlled conditions. Current surveillance systems are equipped with low resolution cameras and are located in places with changing...
Show moreThe focus of this research is on images extracted from surveillance videos that have a low resolution and are taken under low illumination. In recent years, great advances have been made in face recognition and many studies mention results of 80% and 90% of recognition efficiency, however, most of these studies reported results using face images under controlled conditions. Current surveillance systems are equipped with low resolution cameras and are located in places with changing illumination, as opposed to a controlled environment. To be used in face recognition, images extracted from videos need to be normalized, enlarged and preprocessed. There is a multitude of processing algorithms for image enhancement, and each algorithm faces its advantages and disadvantages. This thesis presents a novel method for image enlargement of human faces applied to low quality video recordings. Results and comparison to traditional methods are also presented.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012547
- Subject Headings
- Human face recognition (Computer science), Biometric identification, Image processing--Digital techniques, Pattern recognition systems
- Format
- Document (PDF)
- Title
- A Phased Approach to Evaluate the Performance of Handoff by Mobile Handsets.
- Creator
- Siddiqui, Arjumand Fatima, Pandya, Abhijit S., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The ever increasing demand for capacity in wireless cellular networks is resolved by decreasing the size of the cells. The smaller cells created inside large cells are called microcells and they cover smaller and dense areas. As a result of this, the mobile device ends up changing the base stations or performing handover at a much higher rate. To maintain the reliability and quality of the call, it is obligatory to ascertain that the handover is performed at a proper location. If the handover...
Show moreThe ever increasing demand for capacity in wireless cellular networks is resolved by decreasing the size of the cells. The smaller cells created inside large cells are called microcells and they cover smaller and dense areas. As a result of this, the mobile device ends up changing the base stations or performing handover at a much higher rate. To maintain the reliability and quality of the call, it is obligatory to ascertain that the handover is performed at a proper location. If the handover is delayed or the mobile handset drags its base station, it is more probable that either the call will drop or the quality of the call will be compromised. The last thing a mobile handset user would want is to experience any of these two consequences. In this thesis we study the methods to analyze the performance ofhandover by the mobile handsets in the drive setup under test. This thesis presents a model for analyzing the performance ofhandoffbased on the measurements ofthe received signal strength indicator and the color code recorded by the mobile handset in the drive test field path. The model from the simulations is seen to yield results that agree with other research about the performance of mobile handsets.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012551
- Subject Headings
- Mobile communication systems--Design, Wireless communication systems--Technological innovations, Cellular telephones--Design
- Format
- Document (PDF)
- Title
- A PROBABILISTIC CHECKING MODEL FOR EFFECTIVE EXPLAINABILITY BASED ON PERSONALITY TRAITS.
- Creator
- Alharbi, Mohammed N., Huang, Shihong, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
It is becoming increasingly important for an autonomous system to be able to explain its actions to humans in order to improve trust and enhance human-machine collaboration. However, providing the most appropriate kind of explanations – in terms of length, format, and presentation mode of explanations at the proper time – is critical to enhancing their effectiveness. Explanation entails costs, such as the time it takes to explain and for humans to comprehend and respond. Therefore, the actual...
Show moreIt is becoming increasingly important for an autonomous system to be able to explain its actions to humans in order to improve trust and enhance human-machine collaboration. However, providing the most appropriate kind of explanations – in terms of length, format, and presentation mode of explanations at the proper time – is critical to enhancing their effectiveness. Explanation entails costs, such as the time it takes to explain and for humans to comprehend and respond. Therefore, the actual improvement in human-system tasks from explanations (if any) is not always obvious, particularly given various forms of uncertainty in knowledge about humans. In this research, we propose an approach to address this issue. The key idea is to provide a structured framework that allows a system to model and reason about human personality traits as critical elements to guide proper explanation in human and system collaboration. In particular, we focus on the two concerns of modality and amount of explanation in order to optimize the explanation experience and improve overall system-human utility. Our models are based on probabilistic modeling and analysis (PRISM-games) to determine at run time what the most effective explanation under uncertainty is. To demonstrate our approach, we introduce a self-adaptative system called Grid – a virtual game – and the Stock Prediction Engine (SPE), which allows an automated system and a human to collaborate on the game and stock investments. Our evaluation of these exemplars, through simulation, demonstrates that a human subject’s performance and overall human-system utility is improved when considering the psychology of human personality traits in providing explanations.
Show less - Date Issued
- 2022
- PURL
- http://purl.flvc.org/fau/fd/FA00013894
- Subject Headings
- Human-computer interaction, Probabilistic modelling, Human-machine systems, Affective Computing
- Format
- Document (PDF)
- Title
- A REFERENCE ARCHITECTURE FOR NETWORK FUNCTION VIRTUALIZATION.
- Creator
- Alwakeel, Ahmed M., Fernandez, Eduardo B., Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
Cloud computing has provided many services to potential consumers, one of these services being the provision of network functions using virtualization. Network Function Virtualization is a new technology that aims to improve the way we consume network services. Legacy networking solutions are different because consumers must buy and install various hardware equipment. In NFV, networks are provided to users as a software as a service (SaaS). Implementing NFV comes with many benefits, including...
Show moreCloud computing has provided many services to potential consumers, one of these services being the provision of network functions using virtualization. Network Function Virtualization is a new technology that aims to improve the way we consume network services. Legacy networking solutions are different because consumers must buy and install various hardware equipment. In NFV, networks are provided to users as a software as a service (SaaS). Implementing NFV comes with many benefits, including faster module development for network functions, more rapid deployment, enhancement of the network on cloud infrastructures, and lowering the overall cost of having a network system. All these benefits can be achieved in NFV by turning physical network functions into Virtual Network Functions (VNFs). However, since this technology is still a new network paradigm, integrating this virtual environment into a legacy environment or even moving all together into NFV reflects on the complexity of adopting the NFV system. Also, a network service could be composed of several components that are provided by different service providers; this also increases the complexity and heterogeneity of the system. We apply abstract architectural modeling to describe and analyze the NFV architecture. We use architectural patterns to build a flexible NFV architecture to build a Reference Architecture (RA) for NFV that describe the system and how it works. RAs are proven to be a powerful solution to abstract complex systems that lacks semantics. Having an RA for NFV helps us understand the system and how it functions. It also helps us to expose the possible vulnerabilities that may lead to threats toward the system. In the future, this RA could be enhanced into SRA by adding misuse and security patterns for it to cover potential threats and vulnerabilities in the system. Our audiences are system designers, system architects, and security professionals who are interested in building a secure NFV system.
Show less - Date Issued
- 2020
- PURL
- http://purl.flvc.org/fau/fd/FA00013434
- Subject Headings
- Virtual computer systems, Cloud computing, Computer network architectures, Computer networks
- Format
- Document (PDF)
- Title
- A REVIEW AND ANALYSIS OF BOT-IOT SECURITY DATA FOR MACHINE LEARNING.
- Creator
- Peterson, Jared M., Khoshgoftaar, Taghi M., Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
Machine learning is having an increased impact on the Cyber Security landscape. The ability for predictive models to accurately identify attack patterns in security data is set to overtake more traditional detection methods. Industry demand has led to an uptick in research in the application of machine learning for Cyber Security. To facilitate this research many datasets have been created and made public. This thesis provides an in-depth analysis of one of the newest datasets, Bot-IoT. The...
Show moreMachine learning is having an increased impact on the Cyber Security landscape. The ability for predictive models to accurately identify attack patterns in security data is set to overtake more traditional detection methods. Industry demand has led to an uptick in research in the application of machine learning for Cyber Security. To facilitate this research many datasets have been created and made public. This thesis provides an in-depth analysis of one of the newest datasets, Bot-IoT. The full dataset contains about 73 million instances (big data), 3 dependent features, and 43 independent features. The purpose of this thesis is to provide researchers with a foundational understanding of Bot-IoT, its development, its features, its composition, and its pitfalls. It will also summarize many of the published works that utilize Bot-IoT and will propose new areas of research based on the issues identified in the current research and in the dataset.
Show less - Date Issued
- 2021
- PURL
- http://purl.flvc.org/fau/fd/FA00013838
- Subject Headings
- Machine learning, Cyber security, Big data
- Format
- Document (PDF)
- Title
- A Study on Random Sum Statistics: Application to Wireless Network Performance Analysis.
- Creator
- Pattaramalai, Suwat, Aalo, Valentine A., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The statistics of random sum is studied and used to evaluate performance metrics in wireless networks. Pertinent wireless network performance measures such as call completion/dropping probabilities and the average number of handovers usually require the probability distributions of the cell dwell time and call holding time; and are therefore not easy to evaluate. The proposed performance evaluation technique requires the moments of the cell dwell time and is given in terms of the Laplace...
Show moreThe statistics of random sum is studied and used to evaluate performance metrics in wireless networks. Pertinent wireless network performance measures such as call completion/dropping probabilities and the average number of handovers usually require the probability distributions of the cell dwell time and call holding time; and are therefore not easy to evaluate. The proposed performance evaluation technique requires the moments of the cell dwell time and is given in terms of the Laplace transform function of the call holding time. Multimedia services that have Weibull and generalized gamma distributed call holding times are investigated. The proposed approximation method uses the compound geometric random sum distribution and requires that the geometric parameter be very small. For applications in which this parameter is not sufficiently small, a result is derived that improves the accuracy (to order of the geometric parameter) of the performance measures evaluated.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012575
- Subject Headings
- Mobile communication systems--Technological innovations, Computer network protocols, Local area networks (Computer networks), Differentiable dynamical systems
- Format
- Document (PDF)