Current Search: info:fedora/fau:CurrentETDs (x) » Department of Computer and Electrical Engineering and Computer Science (x)
View All Items
Pages
- Title
- 2006-2007 Program Review Computer Science and Engineering.
- Creator
- Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
Florida Atlantic University Departmental Dashboard Indicators. Department program reviews for College of Engineering and Computer Science, Florida Atlantic University.
- Date Issued
- 2006-2007
- PURL
- http://purl.flvc.org/fau/fd/FA00007722
- Subject Headings
- Florida Atlantic University -- History
- Format
- Document (PDF)
- Title
- 2006-2007 Program Review Electrical Engineering.
- Creator
- Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
Florida Atlantic University Departmental Dashboard Indicators. Department program reviews for College of Engineering and Computer Science, Florida Atlantic University.
- Date Issued
- 2006-2007
- PURL
- http://purl.flvc.org/fau/fd/FA00007723
- Subject Headings
- Florida Atlantic University -- History
- Format
- Document (PDF)
- Title
- 2009-2010 Program Review Computer and Electrical Engineering and Computer Science.
- Creator
- Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
Florida Atlantic University Departmental Dashboard Indicators. Department program reviews for College of Engineering and Computer Science, Florida Atlantic University.
- Date Issued
- 2009-2010
- PURL
- http://purl.flvc.org/fau/fd/FA00007727
- Subject Headings
- Florida Atlantic University -- History
- Format
- Document (PDF)
- Title
- 2009-2010 Program Review Computer and Electrical Engineering and Computer Science.
- Creator
- Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
Florida Atlantic University Departmental Dashboard Indicators. Department program reviews for College of Engineering and Computer Science, Florida Atlantic University.
- Date Issued
- 2010-2011
- PURL
- http://purl.flvc.org/fau/fd/FA00007730
- Subject Headings
- Florida Atlantic University -- History
- Format
- Document (PDF)
- Title
- 2009-2010 Program Review Computer and Electrical Engineering and Computer Science.
- Creator
- Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
Florida Atlantic University Departmental Dashboard Indicators. Department program reviews for College of Engineering and Computer Science, Florida Atlantic University.
- Date Issued
- 2012-2013
- PURL
- http://purl.flvc.org/fau/fd/FA00007733
- Subject Headings
- Florida Atlantic University -- History
- Format
- Document (PDF)
- Title
- 2009-2010 Program Review Computer and Electrical Engineering and Computer Science.
- Creator
- Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
Florida Atlantic University Departmental Dashboard Indicators. Department program reviews for College of Engineering and Computer Science, Florida Atlantic University.
- Date Issued
- 2013-2014
- PURL
- http://purl.flvc.org/fau/fd/FA00007736
- Subject Headings
- Florida Atlantic University -- History
- Format
- Document (PDF)
- Title
- 2009-2010 Program Review Computer and Electrical Engineering and Computer Science.
- Creator
- Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
Florida Atlantic University Departmental Dashboard Indicators. Department program reviews for College of Engineering and Computer Science, Florida Atlantic University.
- Date Issued
- 2014-2015
- PURL
- http://purl.flvc.org/fau/fd/FA00007739
- Subject Headings
- Florida Atlantic University -- History
- Format
- Document (PDF)
- Title
- 2009-2010 Program Review Computer and Electrical Engineering and Computer Science.
- Creator
- Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
Florida Atlantic University Departmental Dashboard Indicators. Department program reviews for College of Engineering and Computer Science, Florida Atlantic University.
- Date Issued
- 2015-2016
- PURL
- http://purl.flvc.org/fau/fd/FA00007742
- Subject Headings
- Florida Atlantic University -- History
- Format
- Document (PDF)
- Title
- 2009-2010 Program Review Computer and Electrical Engineering and Computer Science.
- Creator
- Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
Florida Atlantic University Departmental Dashboard Indicators. Department program reviews for College of Engineering and Computer Science, Florida Atlantic University.
- Date Issued
- 2016-2017
- PURL
- http://purl.flvc.org/fau/fd/FA00007745
- Subject Headings
- Florida Atlantic University -- History
- Format
- Document (PDF)
- Title
- Modeling and Control of Proton Exchange Membrane (PEM) Fuel Cell System.
- Creator
- Saengrung, Anucha, Zilouchian, Ali, Abtahi, Amir, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This dissertation presents the design, implementation and application of soft computing methodologies to Proton Exchange Membrane (PEM) Fuel Cell systems. In the first part of the research work, two distinct approaches for the modeling and prediction of a commercial PEM fuel cell system are presented. Several Simulink models are constructed from the electrochemical models of the PEM fuel cells. The models have been simulated in three dimension (3-D) space to provide the visual understanding...
Show moreThis dissertation presents the design, implementation and application of soft computing methodologies to Proton Exchange Membrane (PEM) Fuel Cell systems. In the first part of the research work, two distinct approaches for the modeling and prediction of a commercial PEM fuel cell system are presented. Several Simulink models are constructed from the electrochemical models of the PEM fuel cells. The models have been simulated in three dimension (3-D) space to provide the visual understanding of fuel cell behaviors. In addition, two optimal predictive models, based on back-propagation (BP) and radial basis function (RBF) neural networks are developed. Experimental data as well as pre-processing data are utilized to determine the accuracy and speed of the proposed prediction algorithms. Extensive simulation results are presented to demonstrate the effectiveness of the proposed method on prediction of nonlinear input-output linear input-output mapping. In the second part of the study, the design and implementation of several fuzzy logic controllers (FLCs) as well as classical controllers are carried out. The proposed real-time controller design is based on the integration of sensory information, Labview programming, mathematical calculation, and expert knowledge of the process to yield optimum output power performance under variable load condition. The implementations of the proposed controllers are carried out for a commercial PEM fuel system at FA U Fuel Cell Laboratory. The performance of the proposed controllers pertaining to the oxygen (02) flow rate optimization as well as the actual fuel cell output power under a variable load bank are compared and investigated. It was found the Fuzzy Logic Controller design provide a simple and effective approach for the implementation of the fuel cell systems.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/fau/fd/FA00012577
- Subject Headings
- Proton exchange membrane fuel cells--Design and construction, Proton exchange membrane fuel cells--Computer simulation, Fuel cells--Design and construction
- Format
- Document (PDF)
- Title
- Connected Dominating Set in Wireless Ad Hoc Networks: Variations with Applications.
- Creator
- Yang, Shuhui, Wu, Jie, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Wireless ad hoc networks (or simply ad hoc networks) are infrastructureless multihop networks consisting of mobile or stationary wireless devices, which include mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs). These networks are characterized by limited bandwidth and energy resources, frequent topology changes, and a lack of central control. These characteristics lead to the research challenges of ad hoc networks. The algorithms designed for ad hoc networks should be...
Show moreWireless ad hoc networks (or simply ad hoc networks) are infrastructureless multihop networks consisting of mobile or stationary wireless devices, which include mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs). These networks are characterized by limited bandwidth and energy resources, frequent topology changes, and a lack of central control. These characteristics lead to the research challenges of ad hoc networks. The algorithms designed for ad hoc networks should be localized, selforganizing, and energy efficient. A connected dominating set (CDS) is frequently used in ad hoc networks as a virtual backbone to support efficient routing, service discovery, and area monitoring. In addition, efficient broadcasting (i.e., finding a small set of forward nodes to ensure full delivery) can be viewed as forming a CDS on-the-fly. The periodically maintained virtual backbone is called a static CDS, and the temporarily formed forward node set is called a dynamk CDS. For efficiency and robustness, the ideal CDS construction algorithm is lightweight, has fast convergence, and minimizes the CDS size. Recently, due to some specific applications and new techniques, the concept of a connected dominating set can be modified or further extended for more efficient usage. This dissertation focuses on the variations with applications of the connected dominating set, designing new concepts, and developing new algorithms for them. A review of CDS construction algorithms for ad hoc networks has been provided at the beginning. An efficient scheme, called Rule K, has been proposed for static CDS construction. Rule K achieves a probabilistic constant upper bound on the expected CDS size, which is currently the best known performance guarantee for localized CDS algorithms. Several CDS algorithms are extended to generate the extended CDS, which exploits the cooperative communication technique to further reduce the size of CDS. A k-coverage set is developed for higher robustness. With the equipment of directional antennas , the transmission can be restricted to some certain directions to reduce interference and energy consumption. The corresponding directional CDS is discussed. Finally, a wireless sensor and actor network (WSAN) is introduced and localized algorithms are designed for it.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012580
- Subject Headings
- Computer network protocols, Wireless communication systems--Design and construction, Mobile computing, Computer algorithms
- Format
- Document (PDF)
- Title
- Achieving Higher Receiver Satisfaction using Multicast-Favored Bandwidth Allocation Protocols.
- Creator
- Yousefizadeh, Hooman, Zilouchian, Ali, Ilyas, Mohammad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In recent years, many protocols for efficient Multicasting have been proposed. However, many of the Internet Service Providers (ISPs) are reluctant to use multicastenabled routers in their networks. To provide such incentives, new protocols are needed to improve the quality of their services. The challenge is to find a compromise between allocating Bandwidth (BW) among different flows in a fair manner, and favoring multicast sessions over unicast sessions. In addition, the overall higher...
Show moreIn recent years, many protocols for efficient Multicasting have been proposed. However, many of the Internet Service Providers (ISPs) are reluctant to use multicastenabled routers in their networks. To provide such incentives, new protocols are needed to improve the quality of their services. The challenge is to find a compromise between allocating Bandwidth (BW) among different flows in a fair manner, and favoring multicast sessions over unicast sessions. In addition, the overall higher level of receiver satisfaction should be achieved. In this dissertation, we propose three new innovative protocols to favor multicast sessions over unicast sessions. Multicast Favored BW Allocation- Logarithmic (MFBA-Log) and Multicast Favored BW Allocation-Linear (MFBALin) protocols allocate BW proportional to the number of down stream receivers. The proposed Multicast Reserved BW Allocation (MRBA) protocol allocates part of the BW in the links only to multicast sessions. Simulation results show the increase in the overall level of Receiver Satisfaction in the network.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fau/fd/FA00012581
- Subject Headings
- Multicasting (Computer networks), Computer network protocols, Computer algorithms
- Format
- Document (PDF)
- Title
- Novel Techniques in Genetic Programming.
- Creator
- Fernandez, Thomas, Furht, Borko, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Three major problems make Genetic Programming unfeasible or impractical for real world problems. The first is the excessive time complexity.In nature the evolutionary process can take millions of years, a time frame that is clearly not acceptable for the solution of problems on a computer. In order to apply Genetic Programming to real world problems, it is essential that its efficiency be improved. The second is called overfitting (where results are inaccurate outside the training data). In a...
Show moreThree major problems make Genetic Programming unfeasible or impractical for real world problems. The first is the excessive time complexity.In nature the evolutionary process can take millions of years, a time frame that is clearly not acceptable for the solution of problems on a computer. In order to apply Genetic Programming to real world problems, it is essential that its efficiency be improved. The second is called overfitting (where results are inaccurate outside the training data). In a paper[36] for the Federal Reserve Bank, authors Neely and Weller state “a perennial problem with using flexible, powerful search procedures like Genetic Programming is overfitting, the finding of spurious patterns in the data. Given the well-documented tendency for the genetic program to overfit the data it is necessary to design procedures to mitigate this.” The third is the difficulty of determining optimal control parameters for the Genetic Programming process. Control parameters control the evolutionary process. They include settings such as, the size of the population and the number of generations to be run. In his book[45], Banzhaf describes this problem, “The bad news is that Genetic Programming is a young field and the effect of using various combinations of parameters is just beginning to be explored.” We address these problems by implementing and testing a number of novel techniques and improvements to the Genetic Programming process. We conduct experiments using data sets of various degrees of difficulty to demonstrate success with a high degree of statistical confidence.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fau/fd/FA00012570
- Subject Headings
- Evolutionary programming (Computer science), Genetic algorithms, Genetic programming (Computer science)
- Format
- Document (PDF)
- Title
- Passive Optical Networks with a New Bandwidth Allocation Scheme in Ethernet Passive Optical Networks.
- Creator
- Krijestorac, Sadeta, Bagby, Jonathan S., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
With the ever increasing demand for bandwidth intensive applications like video-ondemand, interactive television services, high-defmition television (HDTV) and internet telephony, the first mile network, referred to as the last mile network in the earlier stages of its development, has proven to solve the "bottleneck" often experienced between users and the central office. The Ethernet Passive Optical Network (EPON), developed by the IEEE 802.3ah Task Force for Ethernet in the First Mile (EFM...
Show moreWith the ever increasing demand for bandwidth intensive applications like video-ondemand, interactive television services, high-defmition television (HDTV) and internet telephony, the first mile network, referred to as the last mile network in the earlier stages of its development, has proven to solve the "bottleneck" often experienced between users and the central office. The Ethernet Passive Optical Network (EPON), developed by the IEEE 802.3ah Task Force for Ethernet in the First Mile (EFM), resolves this bottleneck by providing the user with a fiber optic link to the central office that has many advantages, such as nearly infinite bandwidth, low cost, easy installation and immunity to electromagnetic interference, and a saving of the need for powered components in the signal path from the user to the switch. EPON s have proven to deliver the essential services of voice, video, and data communications reliably, while at the same time providing expected guarantees of the delivery of those services in terms of defined Quality of Service measures (QOS). A continuous theme throughout EPON research has been the study of efficient Dynamic Bandwidth Allocation (DBA) as a key factor in achieving fairness in distributing bandwidth amongst remote network units. This research investigates another factor and its effect on network performance and service delivery: Cycle Demand Proportionality (CDP). By observing the patterns of demand in the network on an individual network unit basis cycle after cycle, deductions regarding load characteristics of some units over others can be made. Decisions can be make about subsequent grant allocations based on this factor and aim to achieve better results in the process. Simulations of EPONs Lmder varying loads incorporating the usc of CDP in conjunction with currently used DBA schemes are made and results are analyzed. A major contribution of this research is a new bandwidth allocation algorithm that gives improved performance in terms of packet delay versus offered load. Performance metrics are compared against two common bandwidth allocation algorithms: Interleaved Polling with Adaptive Cycle Time (IPACT) and Cyclic Polling (CP). Additional results also include improvements in packet loss and throughput. The data that represents traffic for this network has two properties, self-similarity and long range dependency. Plotting the auto-covariance, auto-correlation, and variance for this traffic, for various aggregation levels demonstrates these properties.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/fau/fd/FA00012571
- Subject Headings
- Ethernet (Local area network system), Optical communications, Computer network protocols, Wavelength divisional multiplexing
- Format
- Document (PDF)
- Title
- Efficient and Effective Searching m Unstructured FileSharing Peer-to-Peer Networks.
- Creator
- Li, Xiuqi, Wu, Jie, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Peer-to-peer (P2P) networking has been receiving increasing attention from the research community recently. How to conduct efficient and effective searching in such networks has been a challenging research topic. This dissertation focuses on unstructured file-sharing peer-to-peer networks. Three novel searching schemes are proposed, implemented, and evaluated. In the first scheme named ISRL (Intelligent Search by Reinforcement Learning), we propose to systematically learn the best route to...
Show morePeer-to-peer (P2P) networking has been receiving increasing attention from the research community recently. How to conduct efficient and effective searching in such networks has been a challenging research topic. This dissertation focuses on unstructured file-sharing peer-to-peer networks. Three novel searching schemes are proposed, implemented, and evaluated. In the first scheme named ISRL (Intelligent Search by Reinforcement Learning), we propose to systematically learn the best route to desired files through reinforcement learning when topology adaptation is impossible or infeasible. To discover the best path to desired files, ISRL not only explores new paths by forwarding queries to randomly chosen neighbors, but also exploits the paths that have been discovered for reducing the cumulative query cost. Three models of ISRL are put forwarded: a basic version for finding one desired file, MP-ISRL (MP stands for Multiple-Path ISRL) for finding at least k files, and C-ISRL (C refers to Clustering) for reducing maintenance overhead through clustering when there are many queries. ISRL outperforms existing searching approaches in unstructured peer-to-peer networks by achieving similar query quality with lower cumulative query cost. The experimental results confirm the performance improvement of ISRL. The second approach, HS-SDBF (Hint-based Searching by Scope Decay Bloom Filter), addresses the issue of effective and efficient hint propagation. We design a new data structure called SDBF (Scope Decay Bloom Filter) to represent and advertise probabilistic hints. Compared to existing proactive schemes, HSSDBF can answer many more queries successfully at a lower amortized cost considering both the query traffic and hint propagation traffic. Both the analytic and the experimental results support the performance improvement of our protocol. The third algorithm, hybrid search, seeks to combine the benefits of both forwarding and non-forwarding searching schemes. In this approach, a querying source directly probes its own extended neighbors and forwards a query to a subset of its extended neighbors and guides these neighbors to probe their own extended neighbors on its behalf. The hybrid search is able to adapt query execution to the popularity of desired files without generating too much state maintenance overhead because of the 1-hop forwarding inherent in the approach. It achieves a higher query efficiency than the forwarding scheme and a better success rate than the non-forwarding approach. To the best of our knowledge, this work is the first attempt to integrate forwarding and non-forwarding schemes. Simulation results demonstrate the effectiveness of the hybrid search.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fau/fd/FA00012572
- Subject Headings
- Peer-to-peer architecture (Computer networks), Computer security, Database searching, Internetworking (Telecommunication), Heterogeneous computing
- Format
- Document (PDF)
- Title
- Video and Image Analysis using Statistical and Machine Learning Techniques.
- Creator
- Luo, Qiming, Khoshgoftaar, Taghi M., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Digital videos and images are effective media for capturing spatial and ternporal information in the real world. The rapid growth of digital videos has motivated research aimed at developing effective algorithms, with the objective of obtaining useful information for a variety of application areas, such as security, commerce, medicine, geography, etc. This dissertation presents innovative and practical techniques, based on statistics and machine learning, that address some key research...
Show moreDigital videos and images are effective media for capturing spatial and ternporal information in the real world. The rapid growth of digital videos has motivated research aimed at developing effective algorithms, with the objective of obtaining useful information for a variety of application areas, such as security, commerce, medicine, geography, etc. This dissertation presents innovative and practical techniques, based on statistics and machine learning, that address some key research problems in video and image analysis, including video stabilization, object classification, image segmentation, and video indexing. A novel unsupervised multi-scale color image segmentation algorithm is proposed. The basic idea is to apply mean shift clustering to obtain an over-segmentation, and then merge regions at multiple scales to minimize the MDL criterion. The performance on the Berkeley segmentation benchmark compares favorably with some existing approaches. This algorithm can also operate on one-dimensional feature vectors representing each frame in ocean survey videos, which results in a novel framework for building a hierarchical video index. The advantage is to provide the user with the flexibility of browsing the videos at arbitrary levels of detail, which makes it more efficient for users to browse a long video in order to find interesting information based on the hierarchical index. Also, an empirical study on classification of ships in surveillance videos is presented. A comparative performance study on three classification algorithms is conducted. Based on this study, an effective feature extraction and classification algorithm for classifying ships in coastline surveillance videos is proposed. Finally, an empirical study on video stabilization is presented, which includes a comparative performance study on four motion estimation methods and three motion correction methods. Based on this study, an effective real-time video stabilization algorithm for coastline surveillance is proposed, which involves a novel approach to reduce error accumulation.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012574
- Subject Headings
- Image processing--Digital techniques, Electronic surveillance, Computational learning theory
- Format
- Document (PDF)
- Title
- A Study on Random Sum Statistics: Application to Wireless Network Performance Analysis.
- Creator
- Pattaramalai, Suwat, Aalo, Valentine A., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The statistics of random sum is studied and used to evaluate performance metrics in wireless networks. Pertinent wireless network performance measures such as call completion/dropping probabilities and the average number of handovers usually require the probability distributions of the cell dwell time and call holding time; and are therefore not easy to evaluate. The proposed performance evaluation technique requires the moments of the cell dwell time and is given in terms of the Laplace...
Show moreThe statistics of random sum is studied and used to evaluate performance metrics in wireless networks. Pertinent wireless network performance measures such as call completion/dropping probabilities and the average number of handovers usually require the probability distributions of the cell dwell time and call holding time; and are therefore not easy to evaluate. The proposed performance evaluation technique requires the moments of the cell dwell time and is given in terms of the Laplace transform function of the call holding time. Multimedia services that have Weibull and generalized gamma distributed call holding times are investigated. The proposed approximation method uses the compound geometric random sum distribution and requires that the geometric parameter be very small. For applications in which this parameter is not sufficiently small, a result is derived that improves the accuracy (to order of the geometric parameter) of the performance measures evaluated.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012575
- Subject Headings
- Mobile communication systems--Technological innovations, Computer network protocols, Local area networks (Computer networks), Differentiable dynamical systems
- Format
- Document (PDF)
- Title
- VoIP Network Security and Forensic Models using Patterns.
- Creator
- Pelaez, Juan C., Fernandez, Eduardo B., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Voice over Internet Protocol (VoIP) networks is becoming the most popular telephony system in the world. However, studies of the security of VoIP networks are still in their infancy. VoIP devices and networks are commonly attacked, and it is therefore necessary to analyze the threats against the converged network and the techniques that exist today to stop or mitigate these attacks. We also need to understand what evidence can be obtained from the VoIP system after an attack has occurred....
Show moreVoice over Internet Protocol (VoIP) networks is becoming the most popular telephony system in the world. However, studies of the security of VoIP networks are still in their infancy. VoIP devices and networks are commonly attacked, and it is therefore necessary to analyze the threats against the converged network and the techniques that exist today to stop or mitigate these attacks. We also need to understand what evidence can be obtained from the VoIP system after an attack has occurred. Many of these attacks occur in similar ways in different contexts or environments. Generic solutions to these issues can be expressed as patterns. A pattern can be used to guide the design or simulation of VoIP systems as an abstract solution to a problem in this environment. Patterns have shown their value in developing good quality software and we expect that their application to VoIP will also prove valuable to build secure systems. This dissertation presents a variety of patterns (architectural, attack, forensic and security patterns). These patterns will help forensic analysts as well, as secure systems developers because they provide a systematic approach to structure the required information and help understand system weaknesses. The patterns will also allow us to specify, analyze and implement network security investigations for different architectures. The pattern system uses object-oriented modeling (Unified Modeling Language) as a way to formalize the information and dynamics of attacks and systems.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012576
- Subject Headings
- Internet telephony--Security measures, Computer network protocols, Global system for mobile communications, Software engineering
- Format
- Document (PDF)
- Title
- QoS Driven Communication Backbone for NOC Based Embedded Systems.
- Creator
- Agarwal, Ankur, Shankar, Ravi, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
With the increasing complexity of the system design, it has become very critical to enhance system design productivity to meet with the time-to-market demands. Real Time embedded system designers are facing extreme challenges in underlying architectural design selection. It involves the selection of a programmable, concurrent, heterogeneous multiprocessor architecture platform. Such a multiprocessor system on chip (MPSoC) platform has set new innovative trends for the real-time systems and...
Show moreWith the increasing complexity of the system design, it has become very critical to enhance system design productivity to meet with the time-to-market demands. Real Time embedded system designers are facing extreme challenges in underlying architectural design selection. It involves the selection of a programmable, concurrent, heterogeneous multiprocessor architecture platform. Such a multiprocessor system on chip (MPSoC) platform has set new innovative trends for the real-time systems and system on Chip (SoC) designers. The consequences of this trend imply the shift in concern from computation and sequential algorithms to modeling concurrency, synchronization and communication in every aspect of hardware and software co-design and development. Some of the main problems in the current deep sub-micron technologies characterized by gate lengths in the range of 60-90 nm arise from non scalable wire delays, errors in signal integrity and un-synchronized communication. These problems have been addressed by the use of packet switched Network on Chip (NOC) architecture for future SoCs and thus, real-time systems. Such a NOC based system should be able to support different levels of quality of service (QoS) to meet the real time systems requirements. It will further help in enhancing the system productivity by providing a reusable communication backbone. Thus, it becomes extremely critical to properly design a communication backbone (CommB) for NOC. Along with offering different levels of QoS, CommB is responsible directing the flow of data from one node to another node through routers, allocators, switches, queues and links. In this dissertation I present a reusable component based, design of CommB, suitable for embedded applications, which supports three types of QoS (real-time, multi-media and control applications).
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fau/fd/FA00012566
- Subject Headings
- Computer networks--Quality control, Data transmission systems, Embedded computer systems--Quality control, Interconnects (Integrated circuit technology)
- Format
- Document (PDF)
- Title
- Rough Set-Based Software Quality Models and Quality of Data.
- Creator
- Bullard, Lofton A., Khoshgoftaar, Taghi M., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In this dissertation we address two significant issues of concern. These are software quality modeling and data quality assessment. Software quality can be measured by software reliability. Reliability is often measured in terms of the time between system failures. A failure is caused by a fault which is a defect in the executable software product. The time between system failures depends both on the presence and the usage pattern of the software. Finding faulty components in the development...
Show moreIn this dissertation we address two significant issues of concern. These are software quality modeling and data quality assessment. Software quality can be measured by software reliability. Reliability is often measured in terms of the time between system failures. A failure is caused by a fault which is a defect in the executable software product. The time between system failures depends both on the presence and the usage pattern of the software. Finding faulty components in the development cycle of a software system can lead to a more reliable final system and will reduce development and maintenance costs. The issue of software quality is investigated by proposing a new approach, rule-based classification model (RBCM) that uses rough set theory to generate decision rules to predict software quality. The new model minimizes over-fitting by balancing the Type I and Type II niisclassiflcation error rates. We also propose a model selection technique for rule-based models called rulebased model selection (RBMS). The proposed rule-based model selection technique utilizes the complete and partial matching rule sets of candidate RBCMs to determine the model with the least amount of over-fitting. In the experiments that were performed, the RBCMs were effective at identifying faulty software modules, and the RBMS technique was able to identify RBCMs that minimized over-fitting. Good data quality is a critical component for building effective software quality models. We address the significance of the quality of data on the classification performance of learners by conducting a comprehensive comparative study. Several trends were observed in the experiments. Class and attribute had the greatest impact on the performance of learners when it occurred simultaneously in the data. Class noise had a significant impact on the performance of learners, while attribute noise had no impact when it occurred in less than 40% of the most significant independent attributes. Random Forest (RF100), a group of 100 decision trees, was the most, accurate and robust learner in all the experiments with noisy data.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/fau/fd/FA00012567
- Subject Headings
- Computer software--Quality control, Computer software--Reliability, Software engineering, Computer arithmetic
- Format
- Document (PDF)