Current Search: FAU (x) » text (x) » Duran, Simeon ben Ẓemaḥ 1361-1444 (x) » College of Engineering and Computer Science (x)
View All Items
Pages
- Title
- Ensemble-classifier approach to noise elimination: A case study in software quality classification.
- Creator
- Joshi, Vedang H., Florida Atlantic University, Khoshgoftaar, Taghi M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis presents a noise handling technique that attempts to improve the quality of training data for classification purposes by eliminating instances that are likely to be noise. Our approach uses twenty five different classification techniques to create an ensemble of classifiers that acts as a noise filter on real-world software measurement datasets. Using a relatively large number of base-level classifiers for the ensemble-classifier filter facilitates in achieving the desired level...
Show moreThis thesis presents a noise handling technique that attempts to improve the quality of training data for classification purposes by eliminating instances that are likely to be noise. Our approach uses twenty five different classification techniques to create an ensemble of classifiers that acts as a noise filter on real-world software measurement datasets. Using a relatively large number of base-level classifiers for the ensemble-classifier filter facilitates in achieving the desired level of noise removal conservativeness with several possible levels of filtering. It also provides a higher degree of confidence in the noise elimination procedure as the results are less likely to get influenced by (possible) inappropriate learning bias of a few algorithms with twenty five base-level classifiers than with a relatively smaller number of base-level classifiers. Empirical case studies of two different high assurance software projects demonstrate the effectiveness of our noise elimination approach by the significant improvement achieved in classification accuracies at various levels of filtering.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/13144
- Subject Headings
- Computer interfaces--Software--Quality control, Acoustical engineering, Noise control--Case studies, Expert systems (Computer science), Software documentation
- Format
- Document (PDF)
- Title
- Active networking and innovation: An evaluation of active networking as a driver of accelerated Internet innovation.
- Creator
- Wood, James L., Florida Atlantic University, Wu, Jie, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Innovation has flourished at the edge of the Internet; however, the core has experienced a slower pace of innovation. This lag is impacting the pace of innovation at the edge and threatening quality as ad hoc solutions are implemented to overcome core network barriers to innovation. Active networking technology, which opens up the architecture of routers, is proposed as a standard solution. Researchers draw an analogy to the computer industry where innovation is claimed to be accelerated by...
Show moreInnovation has flourished at the edge of the Internet; however, the core has experienced a slower pace of innovation. This lag is impacting the pace of innovation at the edge and threatening quality as ad hoc solutions are implemented to overcome core network barriers to innovation. Active networking technology, which opens up the architecture of routers, is proposed as a standard solution. Researchers draw an analogy to the computer industry where innovation is claimed to be accelerated by modularization. This argument is valid to the extent that the router market is similar to the computer market; however, contemporary innovation theories cast doubt on this likelihood. These theories indicate that for active networking technology to accelerate Internet innovation, extraordinary measures will be required to break the status quo. This paper analyzes this situation and makes recommendations, based on innovation theory, on how active networking can be successful in accelerating Internet innovation.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/13161
- Subject Headings
- Computer industry--Technological innovations, Computer networks--Management, Computer networks--Software, Routers (Computer networks), Internetworking (Telecommunication)
- Format
- Document (PDF)
- Title
- Modeling access control of medical information.
- Creator
- Sorgente, Tami W., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Medical information is very private and sensitive. With the digitization of medical data, it is becoming accessible through distributed systems, including the Internet. Access to all this information and appropriate exchange of data makes the job of health providers more effective, however, the number of people that can potentially access this information increases by orders of magnitude. Private health information is not well protected. We present guidelines for security models for medical...
Show moreMedical information is very private and sensitive. With the digitization of medical data, it is becoming accessible through distributed systems, including the Internet. Access to all this information and appropriate exchange of data makes the job of health providers more effective, however, the number of people that can potentially access this information increases by orders of magnitude. Private health information is not well protected. We present guidelines for security models for medical information systems. First, we model the structure of the medical information in the form of object-oriented patterns. Second, we study models and patterns in use today and compare them to our patterns. Next we define requirements necessary for controlling access, and describe the common policies and restrictions of security models for medical applications. We present some of the medical record access control restrictions directly in a conceptual model of the medical information.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/13163
- Subject Headings
- Medical records--Access control, Privacy, Right of, Freedom of information, Medical records--Data processing, Medicine--Research--Moral and ethical aspects, Confidential communications, Medical ethics, Information storage and retrieval systems--Medical care, Medical informatics, Computer security, Medicine--Computer networks
- Format
- Document (PDF)
- Title
- Dynamic stability of fluid-conveying pipes on uniform or non-uniform elastic foundations.
- Creator
- Vittori, Pablo J., Florida Atlantic University, Elishakoff, Isaac, College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
The dynamic behavior of straight cantilever pipes conveying fluid is studied, establishing the conditions of stability for systems, which are only limited to move in a 2D-plane. Internal friction of pipe and the effect of the surrounding fluid are neglected. A universal stability curve showing boundary between the stable and unstable behaviors is constructed by finding solution to equation of motion by exact and high-dimensional approximate methods. Based on the Boobnov-Galerkin method, the...
Show moreThe dynamic behavior of straight cantilever pipes conveying fluid is studied, establishing the conditions of stability for systems, which are only limited to move in a 2D-plane. Internal friction of pipe and the effect of the surrounding fluid are neglected. A universal stability curve showing boundary between the stable and unstable behaviors is constructed by finding solution to equation of motion by exact and high-dimensional approximate methods. Based on the Boobnov-Galerkin method, the critical velocities for the fluid are obtained by using both the eigenfunctions of a cantilever beam (beam functions), as well as the utilization of Duncan's functions. Stability of cantilever pipes with uniform and non-uniform elastic foundations of two types are considered and discussed. Special emphasis is placed on the investigation of the paradoxical behavior previously reported in the literature.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/13167
- Subject Headings
- Strains and stresses, Structural dynamics, Structural stability, Fluid dynamics, Vibration
- Format
- Document (PDF)
- Title
- Implementation of digital filters with LabVIEW.
- Creator
- Landrin, Thomas., Florida Atlantic University, Zilouchian, Ali, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In this thesis, realization and implementation of one-dimensional (1-D) and two-dimensional (2-D) recursive digital filters using LabVIEW are presented. A number of direct and state-space realizations for 1-D filters are implemented either as in general form or second-order modules. Implementation programs are provided and simulation results are presented to show the effectiveness of the proposed method. In addition, several realizations for 2-D separable-in-denominator filters are proposed....
Show moreIn this thesis, realization and implementation of one-dimensional (1-D) and two-dimensional (2-D) recursive digital filters using LabVIEW are presented. A number of direct and state-space realizations for 1-D filters are implemented either as in general form or second-order modules. Implementation programs are provided and simulation results are presented to show the effectiveness of the proposed method. In addition, several realizations for 2-D separable-in-denominator filters are proposed. These realizations have the properties of highly parallel structure and improved throughput delay. The performance as well as the implementation of 2-D filters using LabVIEW is also presented.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/13183
- Subject Headings
- LabVIEW, Computer programming, Computer graphics, Electric filters, Digital--Design and construction, Recursive functions--Data processing, Signal processing--Digital techniques
- Format
- Document (PDF)
- Title
- A low power and high performance centralized full adder.
- Creator
- Srivastav, Sidharth., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In this thesis, we proposed a low power and high performance architecture for 1-bit full adder design. The proposed architecture was proven to offer a wide range of performance ability in terms of power consumption and speed. We implemented the architecture using a 2-input 2 multiplexers, an XOR and an XNOR gate. The proposed architecture and the Standard full adder were designed and simulated using Lasi, Winspice and Silos. Silos, a logic simulation environment was used in the design and...
Show moreIn this thesis, we proposed a low power and high performance architecture for 1-bit full adder design. The proposed architecture was proven to offer a wide range of performance ability in terms of power consumption and speed. We implemented the architecture using a 2-input 2 multiplexers, an XOR and an XNOR gate. The proposed architecture and the Standard full adder were designed and simulated using Lasi, Winspice and Silos. Silos, a logic simulation environment was used in the design and verification of the proposed architecture and the standard full adder that were modeled with Verilog hardware description language. Lasi was used for the layout design of the proposed architecture and the standard full adder. After the layout, both the architectures were compiled separately using LASICKT and a corresponding .CIR file was generated. The .CIR file was imported and executed into WINSPICE3 for the simulation of the circuit.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/13188
- Subject Headings
- Digital integrated circuits, Metal oxide semiconductors, Complementary, Integrated circuits--Design and contruction, Verilog (Computer hardware description language), Mixed signal circuits--Design and construction--Computer-aided design
- Format
- Document (PDF)
- Title
- Using classification and regression tree to detect hematology abnormalities.
- Creator
- Qian, Cheng., Florida Atlantic University, Wu, Jie, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The detection of the abnormal blood cells and particles in a blood test is essential in medical diagnosis. The detection rules, which are usually implemented in the widely used automated hematology analyzer, are therefore critical for the health and even lives of millions of people. The research endeavor of this thesis is on generating such detection rules using a supervised machine learning algorithm. The first part of this thesis studies the hematology data and surveys the popular...
Show moreThe detection of the abnormal blood cells and particles in a blood test is essential in medical diagnosis. The detection rules, which are usually implemented in the widely used automated hematology analyzer, are therefore critical for the health and even lives of millions of people. The research endeavor of this thesis is on generating such detection rules using a supervised machine learning algorithm. The first part of this thesis studies the hematology data and surveys the popular classification algorithms. In the second part, the selected algorithm, CART, is implemented with deliberately selected parameters. In the third part, a modification of the algorithm, logical pruning with Enclose the Normal principle, is exercised. To extend the algorithm and to achieve better performance, I developed and implemented the idea of decision tree combinations. The research has proven to be successful by the achievement of good performance and reasonable detection rules.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/13189
- Subject Headings
- Regression analysis, Health survey--Statistical methods, Medical statistics, Blood--Diseases--Diagnosis, Hematology, Blood--Examination
- Format
- Document (PDF)
- Title
- Security in voice over IP networks.
- Creator
- Pelaez, Juan C., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Voice over IP (VoIP) is revolutionizing the global communications system by allowing human voice and fax information to travel over existing packet data networks along with traditional data packets. The convergence of voice and data in one simplified network brings both benefits and constraints to users. Among the several issues that need to be addressed when deploying this technology, security is one of the most critical. This thesis will present a combination of security patterns based on...
Show moreVoice over IP (VoIP) is revolutionizing the global communications system by allowing human voice and fax information to travel over existing packet data networks along with traditional data packets. The convergence of voice and data in one simplified network brings both benefits and constraints to users. Among the several issues that need to be addressed when deploying this technology, security is one of the most critical. This thesis will present a combination of security patterns based on the systematic analysis of attacks against a VoIP network and the existing techniques to mitigate these attacks, providing good practices for all IP telephony systems. The VoIP Security Patterns which are based on object-oriented modeling, will help network designers to improve the level of security not only in voice but also in data, video, and fax over IP networks.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/13190
- Subject Headings
- Internet telephony--Security measures, Computer network protocols, Multimedia systems
- Format
- Document (PDF)
- Title
- Web log analysis: Experimental studies.
- Creator
- Yang, Zhijian., Florida Atlantic University, Zhong, Shi, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
With rapid growth of the World Wide Web, web performance becomes increasingly important for modern businesses, especially for e-commerce. As we all know, web server logs contain potentially useful empirical data to improve web server performance. In this thesis, we discuss some topics related to the analysis of a website's server logs for enhancing server performance, which will benefit some applications in business. Markov chain models are used and allow us to dynamically model page...
Show moreWith rapid growth of the World Wide Web, web performance becomes increasingly important for modern businesses, especially for e-commerce. As we all know, web server logs contain potentially useful empirical data to improve web server performance. In this thesis, we discuss some topics related to the analysis of a website's server logs for enhancing server performance, which will benefit some applications in business. Markov chain models are used and allow us to dynamically model page sequences extracted from server logs. My experimental studies contain three major parts. First, I present a workload characterization study of the website used for my research. Second, Markov chain models are constructed for both page request and page-visiting sequence prediction. Finally, I carefully evaluate the constructed models using an independent test data set, which is from server logs on a different day. The research results demonstrate the effectiveness of Markov chain models for characterizing page-visiting sequences.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13202
- Subject Headings
- Markov processes, Operations research, Business enterprises--Computer networks, Electronic commerce--Data processing
- Format
- Document (PDF)
- Title
- Correcting noisy data and expert analysis of the correction process.
- Creator
- Seiffert, Christopher N., Florida Atlantic University, Khoshgoftaar, Taghi M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis expands upon an existing noise cleansing technique, polishing, enabling it to be used in the Software Quality Prediction domain, as well as any other domain where the data contains continuous values, as opposed to categorical data for which the technique was originally designed. The procedure is applied to a real world dataset with real (as opposed to injected) noise as determined by an expert in the domain. This, in combination with expert assessment of the changes made to the...
Show moreThis thesis expands upon an existing noise cleansing technique, polishing, enabling it to be used in the Software Quality Prediction domain, as well as any other domain where the data contains continuous values, as opposed to categorical data for which the technique was originally designed. The procedure is applied to a real world dataset with real (as opposed to injected) noise as determined by an expert in the domain. This, in combination with expert assessment of the changes made to the data, provides not only a more realistic dataset than one in which the noise (or even the entire dataset) is artificial, but also a better understanding of whether the procedure is successful in cleansing the data. Lastly, this thesis provides a more in-depth view of the process than previously available, in that it gives results for different parameters and classifier building techniques. This allows the reader to gain a better understanding of the significance of both model generation and parameter selection.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13223
- Subject Headings
- Computer interfaces--Software--Quality control, Acoustical engineering, Noise control--Computer programs, Expert systems (Computer science), Software documentation
- Format
- Document (PDF)
- Title
- Contribution of on-site treatment and disposal systems on coastal nutrient loading.
- Creator
- Morin, Frederic., Florida Atlantic University, Meeroff, Daniel E., College of Engineering and Computer Science, Department of Civil, Environmental and Geomatics Engineering
- Abstract/Description
-
When onsite treatment and disposal systems (OSTDS) are not properly sited, they can be a potential risk to public health and a source of environmental degradation. In Florida, OSTDS location has proven to be problematic from a water resources perspective. The objective of this study is to quantify the pollutant loading contributions from OSTDS on coastal canals, with regard to nutrients and pathogens indicators (Total Coliform, E. coli, Enterococcus). Two similar single-family residential...
Show moreWhen onsite treatment and disposal systems (OSTDS) are not properly sited, they can be a potential risk to public health and a source of environmental degradation. In Florida, OSTDS location has proven to be problematic from a water resources perspective. The objective of this study is to quantify the pollutant loading contributions from OSTDS on coastal canals, with regard to nutrients and pathogens indicators (Total Coliform, E. coli, Enterococcus). Two similar single-family residential locations were identified: Dania Beach, FL (with 100% OSTDS) and Hollywood, FL (with 100% sewer). Field studies were conducted during the height of the wet and dry seasons. During the wet season, surface water quality of the canal was affected by an OSTDS contribution with higher levels of nutrients and pathogens indicators. During the dry season, no OSTDS impact was detected. OSTDS appear to work properly during the dry season.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13224
- Subject Headings
- Estuarine ecology, Sewage disposal--Florida, Sewage--Purification--Nitrogen removal, Land treatment of wastewater--Florida
- Format
- Document (PDF)
- Title
- Simulation study of beacon time synchronization algorithm in low rate wireless personal area networks.
- Creator
- Shrivastav, Madhu., Florida Atlantic University, Mahgoub, Imad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In a beacon-enabled network, nodes send beacons when they are ready to transmit or receive messages from the other sensors in their communication range. If the beacons are not synchronized in time, a sensor might receive more than one beacon and hence will not be able to demodulate the beacon, thereby, being isolated from the network. As a result coverage nulls are introduced in the system. To address the above mentioned issues, Motorola Labs have proposed an algorithm for synchronizing the...
Show moreIn a beacon-enabled network, nodes send beacons when they are ready to transmit or receive messages from the other sensors in their communication range. If the beacons are not synchronized in time, a sensor might receive more than one beacon and hence will not be able to demodulate the beacon, thereby, being isolated from the network. As a result coverage nulls are introduced in the system. To address the above mentioned issues, Motorola Labs have proposed an algorithm for synchronizing the beacons in a wireless personal area network. In this thesis, extensive study of the proposed beacon time synchronization algorithm is done using OPNET as a simulation tool. Simulation is carried out by designing a detailed model of the algorithm using IEEE 802.15.4 as a reference. In depth analysis of the simulation results has been carried out. The results obtained are compared with those of existing time synchronization methods.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13227
- Subject Headings
- Wireless LANs, Extranets (Computer networks), Wireless communication systems, Data transmission systems, Computer network protocols, Home computer networks
- Format
- Document (PDF)
- Title
- Karhunen-Loeve decomposition for non stationary propulsor flow noise.
- Creator
- Kersulec, Jean-Luc., Florida Atlantic University, Glegg, Stewart A. L., College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
The aim of this thesis is to develop a theory for non stationary propulsor flow noise. The model which is proposed is based on Amiet's paper "Acoustic Radiation from an Airfoil in a Turbulent Stream" [1], which describes broad band noise when a simple model of airfoil interacts with a turbulent flow, under the assumption of stationarity. The Karhunen-Loeve method provides a set of modes which describe the turbulent flow without the assumption of stationarity. A method is described to obtain...
Show moreThe aim of this thesis is to develop a theory for non stationary propulsor flow noise. The model which is proposed is based on Amiet's paper "Acoustic Radiation from an Airfoil in a Turbulent Stream" [1], which describes broad band noise when a simple model of airfoil interacts with a turbulent flow, under the assumption of stationarity. The Karhunen-Loeve method provides a set of modes which describe the turbulent flow without the assumption of stationarity. A method is described to obtain broad band noise calculations when the mean turbulent flow varies with time and produces non stationary turbulence. A comparison of the numerical results obtained with the results from the paper of reference [1] shows the characteristics of time varying sound radiation. The various mathematical formulae will give a starting point to the analysis of real time varying flows, which are not considered in this thesis.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13233
- Subject Headings
- Aerodynamic noise, Turbulence, Aerofoils, Unsteady flow (Aerodynamics), Nonlinear control theory, Differential equations, Nonlinear
- Format
- Document (PDF)
- Title
- Concord: A proactive lightweight middleware to enable seamless connectivity in a pervasive environment.
- Creator
- Mutha, Mahesh., Florida Atlantic University, Hsu, Sam, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
One of the major components of any pervasive system is its proactive behavior. Various models have been developed to provide system wide changes which would enable proactive behavior. A major drawback of these approaches is that they do not address the need to make use of existing applications whose design cannot be changed. To overcome this drawback, a middleware architecture called "Concord" is proposed. Concord is based on a simple model which consists of Lookup Server and Database. The...
Show moreOne of the major components of any pervasive system is its proactive behavior. Various models have been developed to provide system wide changes which would enable proactive behavior. A major drawback of these approaches is that they do not address the need to make use of existing applications whose design cannot be changed. To overcome this drawback, a middleware architecture called "Concord" is proposed. Concord is based on a simple model which consists of Lookup Server and Database. The rewards for this simple model are many. First, Concord uses the existing computing infrastructure. Second, Concord standardizes the interfaces for all services and platforms. Third new services can be added dynamically without any need for reconfiguration. Finally, Concord consists of Database that can maintain and publish the active set of available resources. Thus Concord provides a solid system for integration of various entities to provide seamless connectivity and enable proactive behavior.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13234
- Subject Headings
- CONCORD (Computer architecture), Middleware, Computer architecture, Database management
- Format
- Document (PDF)
- Title
- Performance analysis of multitaper spectrum estimation.
- Creator
- Skoro Kaskarovska, Violeta, Florida Atlantic University, Erdol, Nurgun, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
We characterize the Multitaper Spectral Estimation method as a tool for stationary signal analysis. We compare its performance to the conventional periodogram, the parametric autoregressive and multitaper autoregressive spectral estimates. We analyze single and two frequency sinusoids with additive Gaussian white noise and autoregressive processes of orders 2, 4 and 24. We extend its application to non-stationary signals and develop the multitaper spectrogram. We test the spectrograms with...
Show moreWe characterize the Multitaper Spectral Estimation method as a tool for stationary signal analysis. We compare its performance to the conventional periodogram, the parametric autoregressive and multitaper autoregressive spectral estimates. We analyze single and two frequency sinusoids with additive Gaussian white noise and autoregressive processes of orders 2, 4 and 24. We extend its application to non-stationary signals and develop the multitaper spectrogram. We test the spectrograms with simulated non-stationary autoregressive process of order 2 as the magnitude of its poles vary between 0 and 1 and the angle of the poles vary between 0 and pi. Our results show that the multitaper spectral estimate can be parameterized and is more accurate than others tested for non-sinusoidal signals. We also show applications to aero-acoustic data analysis.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13235
- Subject Headings
- Spectral theory (Mathematics), Signal processing--Mathematics, System identification, Power spectra
- Format
- Document (PDF)
- Title
- Intrusion detection in wireless networks: A data mining approach.
- Creator
- Nath, Shyam Varan., Florida Atlantic University, Khoshgoftaar, Taghi M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The security of wireless networks has gained considerable importance due to the rapid proliferation of wireless communications. While computer network heuristics and rules are being used to control and monitor the security of Wireless Local Area Networks (WLANs), mining and learning behaviors of network users can provide a deeper level of security analysis. The objective and contribution of this thesis is three fold: exploring the security vulnerabilities of the IEEE 802.11 standard for...
Show moreThe security of wireless networks has gained considerable importance due to the rapid proliferation of wireless communications. While computer network heuristics and rules are being used to control and monitor the security of Wireless Local Area Networks (WLANs), mining and learning behaviors of network users can provide a deeper level of security analysis. The objective and contribution of this thesis is three fold: exploring the security vulnerabilities of the IEEE 802.11 standard for wireless networks; extracting features or metrics, from a security point of view, for modeling network traffic in a WLAN; and proposing a data mining-based approach to intrusion detection in WLANs. A clustering- and expert-based approach to intrusion detection in a wireless network is presented in this thesis. The case study data is obtained from a real-word WLAN and contains over one million records. Given the clusters of network traffic records, a distance-based heuristic measure is proposed for labeling clusters as either normal or intrusive. The empirical results demonstrate the promise of the proposed approach, laying the groundwork for a clustering-based framework for intrusion detection in computer networks.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13246
- Subject Headings
- Wireless communication systems, Data warehousing, Data mining, Telecommunication--Security measures, Computer networks--Security measures, Computer security
- Format
- Document (PDF)
- Title
- A study on glucose metabolism: Computer simulation and modeling.
- Creator
- Leesirikul, Meta., Florida Atlantic University, Neelakanta, Perambur S., Roth, Zvi S., Morgera, Salvatore D., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Sorensen's model of glucose metabolism and regulation is reconstructed using SimulinkRTM. Most of the existing glucose metabolism models consist of several mass balance equations that interact with each others. Graphical format used by SimulinkRTM provides a visualized perspective of such relations so that it is easier to modify the model on ad hoc basis. Type-I and Type-II diabetes with relevant clinical details are simulated. Further, a control strategy is introduced in order to simulate...
Show moreSorensen's model of glucose metabolism and regulation is reconstructed using SimulinkRTM. Most of the existing glucose metabolism models consist of several mass balance equations that interact with each others. Graphical format used by SimulinkRTM provides a visualized perspective of such relations so that it is easier to modify the model on ad hoc basis. Type-I and Type-II diabetes with relevant clinical details are simulated. Further, a control strategy is introduced in order to simulate the control of exogenous insulin pump. Simulated results are consistent with available clinical data. Living systems in general, exhibit both stochastical and deterministic characteristics. Activities such as glucose metabolism traditionally modeled do not include stochastical properties, nor that they are viewed in the large framework of complex system with explicit interaction details. Currently, a complexity system model is developed to describe the glucose metabolism related activities. The simulation results obtained thereof illustrate the bounding domain of variations in some clinically observed details.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13254
- Subject Headings
- Glucose--Metabolism, Computer simulation, Diabetes--Metabolism, Computer modeling
- Format
- Document (PDF)
- Title
- XYZ: A scalable, partially centralized lookup service for large-scale peer-to-peer systems.
- Creator
- Zhang, Jianying., Florida Atlantic University, Wu, Jie, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Peer-to-Peer (P2P) systems are characterized by direct access between peer computers, rather than through a centralized server. File sharing is the dominant P2P application on the Internet, allowing users to easily contribute, search and obtain content. The objective of this thesis was to design XYZ, a partially centralized, scalable and self-organizing lookup service for wide area P2P systems. The XYZ system is based on distributed hash table (DHT). A unique ID and a color assigned to each...
Show morePeer-to-Peer (P2P) systems are characterized by direct access between peer computers, rather than through a centralized server. File sharing is the dominant P2P application on the Internet, allowing users to easily contribute, search and obtain content. The objective of this thesis was to design XYZ, a partially centralized, scalable and self-organizing lookup service for wide area P2P systems. The XYZ system is based on distributed hash table (DHT). A unique ID and a color assigned to each node and each file. The author uses clustering method to create the system backbone by connecting the cluster heads together and uses color clustering method to create color overlays. Any lookup for a file with a color will only be forwarded in the color overlay with the same color so that the searching space is minimized. Simulations and analysis are also provided in this thesis.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13263
- Subject Headings
- Wireless communication systems, Peer-to-peer architecture (Computer networks), Computational grids (Computer systems)
- Format
- Document (PDF)
- Title
- Design and implementation of an energy model for JiST/SWANS simulator.
- Creator
- Sutaria, Trishla., Florida Atlantic University, Mahgoub, Imad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Wireless sensor networks are one of the first real world examples of pervasive computing, the notion that small, smart, and cheap sensing and computing devices will eventually permeate the environment. Sensor networks consist of very large number of energy constrained nodes and to properly evaluate these networks a scalable ad-hoc wireless network simulator with an energy model is needed. Since most of the existing simulators have been designed for ad-hoc network with low scalability they can...
Show moreWireless sensor networks are one of the first real world examples of pervasive computing, the notion that small, smart, and cheap sensing and computing devices will eventually permeate the environment. Sensor networks consist of very large number of energy constrained nodes and to properly evaluate these networks a scalable ad-hoc wireless network simulator with an energy model is needed. Since most of the existing simulators have been designed for ad-hoc network with low scalability they can not be used to accurately simulate sensor networks. The JiST/SWANS simulator is one of the newer simulators that has been developed by Cornell University for simulating ad-hoc networks and is highly scalable which makes it appropriate for use in evaluating sensor networks. Since this simulator lack energy model our objective is to design and implement an energy model for JiST/SWANS so that it can adequately and accurately calculate the amount of energy consumption in the simulation of sensor networks.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13275
- Subject Headings
- Sensor networks, Wireless LANs, Computer network protocols, Wireless communication systems
- Format
- Document (PDF)
- Title
- Simulation-based performance evaluation of packet-switched H.264/AVC video streaming on WCDMA networks.
- Creator
- Murillo, Carlos A., Florida Atlantic University, Iskander, Cyril-Daniel, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis presents the simulation based performance evaluation on the transmission of multimedia services (H.264/AVC video streaming) to a mobile user over a packet-switched wireless network based on the WCDMA standard. The H.264/AVC refers to the codec, which is used as the main tool for video compression. It enables the transport of high bandwidth video data over Third Generation (3G) wireless systems by offering a high video compression rate, adaptability to the channel, and error...
Show moreThis thesis presents the simulation based performance evaluation on the transmission of multimedia services (H.264/AVC video streaming) to a mobile user over a packet-switched wireless network based on the WCDMA standard. The H.264/AVC refers to the codec, which is used as the main tool for video compression. It enables the transport of high bandwidth video data over Third Generation (3G) wireless systems by offering a high video compression rate, adaptability to the channel, and error resilience. It is transported using the RTP/UDP/IP protocol stack over the 3G wireless system. The WCDMA technology is simulated with special emphasis on the upper layers of the wireless channel. The performance of the WCDMA system is studied when transporting RTP/UDP/IP packets of H.264/AVC compressed video data under diverse configuration scenarios, namely, ARQ schemes and variable length of the transmitted frame at the link layer. These components of a packet-switched streaming service are integrated into a software simulation model, which is used to evaluate the end-to-end H.264/AVC video quality in a WCDMA wireless network.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13291
- Subject Headings
- Wireless communication systems, Mobile communication systems, Global system for mobile communications, Code division multiple access, Streaming technology (Telecommunications)
- Format
- Document (PDF)