Current Search: College of Engineering and Computer Science (x)
View All Items
Pages
- Title
- Image improvement using dynamic optical low-pass filter.
- Creator
- Petljanski, Branko., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Professional imaging systems, particularly motion picture cameras, usually employ larger photosites and lower pixel counts than many amateur cameras. This results in the desirable characteristics of improved dynamic range, signal to noise and sensitivity. However, high performance optics often have frequency response characteristics that exceed the Nyquist limit of the sensor, which, if not properly addressed, results in aliasing artifacts in the captured image. Most contemporary still and...
Show moreProfessional imaging systems, particularly motion picture cameras, usually employ larger photosites and lower pixel counts than many amateur cameras. This results in the desirable characteristics of improved dynamic range, signal to noise and sensitivity. However, high performance optics often have frequency response characteristics that exceed the Nyquist limit of the sensor, which, if not properly addressed, results in aliasing artifacts in the captured image. Most contemporary still and video cameras employ various optically birefringent materials as optical low-pass filters (OLPF) in order to minimize aliasing artifacts in the image. Most OLPFs are designed as optical elements with a frequency response that does not change even if the frequency responses of the other elements of the capturing systems are altered. An extended evaluation of currently used birefringent-based OLPFs is provided. In this work, the author proposed and demonstrated the use of a parallel optical window p ositioned between a lens and a sensor as an OLPF. Controlled X- and Y-axes rotations of the optical window during the image exposure results in a manipulation of the system's point-spread function (PSF). Consequently, changing the PSF affects some portions of the frequency components contained in the image formed on the sensor. The system frequency response is evaluated when various window functions are used to shape the lens' PSF, such as rectangle, triangle, Tukey, Gaussian, Blackman-Harris etc. In addition to the ability to change the PSF, this work demonstrated that the PSF can be manipulated dynamically, which allowed us to modify the PSF to counteract any alteration of other optical elements of the capturing system. There are several instances presented in the dissertation in which it is desirable to change the characteristics of an OLPF in a controlled way., In these instances, an OLPF whose characteristics can be altered dynamically results in an improvement of the image quality.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/1927613
- Subject Headings
- Image processing, Digital techniques, Signal processing, Digital techniques, Frequency response (Dynamics), Polymers and polymerization, Optical wave guides
- Format
- Document (PDF)
- Title
- INVESTIGATING MACHINE LEARNING ALGORITHMS WITH IMBALANCED BIG DATA.
- Creator
- Hasanin, Tawfiq, Khoshgoftaar, Taghi M., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Recent technological developments have engendered an expeditious production of big data and also enabled machine learning algorithms to produce high-performance models from such data. Nonetheless, class imbalance (in binary classifications) between the majority and minority classes in big data can skew the predictive performance of the classification algorithms toward the majority (negative) class whereas the minority (positive) class usually holds greater value for the decision makers. Such...
Show moreRecent technological developments have engendered an expeditious production of big data and also enabled machine learning algorithms to produce high-performance models from such data. Nonetheless, class imbalance (in binary classifications) between the majority and minority classes in big data can skew the predictive performance of the classification algorithms toward the majority (negative) class whereas the minority (positive) class usually holds greater value for the decision makers. Such bias may lead to adverse consequences, some of them even life-threatening, when the existence of false negatives is generally costlier than false positives. The size of the minority class can vary from fair to extraordinary small, which can lead to different performance scores for machine learning algorithms. Class imbalance is a well-studied area for traditional data, i.e., not big data. However, there is limited research focusing on both rarity and severe class imbalance in big data.
Show less - Date Issued
- 2019
- PURL
- http://purl.flvc.org/fau/fd/FA00013316
- Subject Headings
- Algorithms, Machine learning, Big data--Data processing, Big data
- Format
- Document (PDF)
- Title
- Individual profiling of perceived tinnitus by developing tinnitus analyzer software.
- Creator
- Chaudbury, Baishali., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Tinnitus is a conscious perception of phantom sounds in the absence of external acoustic stimuli, and masking is one of the popular ways to treat it. Due to the variation in the perceived tinnitus sound from patient to patient, the usefulness of masking therapy cannot be generalized. Thus, it is important to first determine the feasibility of masking therapy on a particular patient, by quantifying the tinnitus sound, and then generate an appropriate masking signal. This paper aims to achieve...
Show moreTinnitus is a conscious perception of phantom sounds in the absence of external acoustic stimuli, and masking is one of the popular ways to treat it. Due to the variation in the perceived tinnitus sound from patient to patient, the usefulness of masking therapy cannot be generalized. Thus, it is important to first determine the feasibility of masking therapy on a particular patient, by quantifying the tinnitus sound, and then generate an appropriate masking signal. This paper aims to achieve this kind of individual profiling by developing interactive software -Tinnitus Analyzer, based on clinical approach. The developed software has been proposed to be used in place of traditional clinical methods and this software (as a part of the future work) will be implemented in the practical scenario involving real tinnitus patients.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/1927612
- Subject Headings
- Medical care, Technological innovations, Tinnitus, Diagnosis, Aids and devices, Hearing disorders, Diagnosis, Technological innovations, Psychoacoustics, Research
- Format
- Document (PDF)
- Title
- Geographic Routing Reliability Enhancement in Urban Vehicular Ad Hoc Networks.
- Creator
- Alzamzami, Ohoud, Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Vehicular Ad hoc Networks (VANETs) have the potential to enable various kinds of applications aiming at improving road safety and transportation efficiency. These applications require uni-cast routing, which remains a significant challenge due to VANETs characteristics. Given VANET dynamic topology, geographic routing protocols are considered the most suitable for such network due to their scalability and low overhead. However, the optimal selection of next-hop nodes in geographic routing is...
Show moreVehicular Ad hoc Networks (VANETs) have the potential to enable various kinds of applications aiming at improving road safety and transportation efficiency. These applications require uni-cast routing, which remains a significant challenge due to VANETs characteristics. Given VANET dynamic topology, geographic routing protocols are considered the most suitable for such network due to their scalability and low overhead. However, the optimal selection of next-hop nodes in geographic routing is a challenging problem where the routing performance is highly affected by the variable link quality and bandwidth availability. In this dissertation, a number of enhancements to improve geographic routing reliability in VANETs are proposed. To minimize packet losses, the direction and link quality of next-hop nodes using the Expected Transmission Count (ETX) are considered to select links with low loss ratios. To consider the available bandwidth, a cross-layer enchantment of geographic routing, which can select more reliable links and quickly react to varying nodes load and channel conditions, is proposed. We present a novel model of the dynamic behavior of a wireless link. It considers the loss ratio on a link, in addition to transmission and queuing delays, and it takes into account the physical interference e ect on the link. Then, a novel geographic routing protocol based on fuzzy logic systems, which help in coordinating di erent contradicting metrics, is proposed. Multiple metrics related to vehicles' position, direction, link quality and achievable throughput are combined using fuzzy rules in order to select the more reliable next-hop nodes for packet forwarding. Finally, we propose a novel link utility aware geographic routing protocol, which extends the local view of the network topology using two-hop neighbor information. We present our model of link utility, which measures the usefulness of a two-hop neighbor link by considering its minimum residual bandwidth and packet loss rate. The proposed protocol can react appropriately to increased network tra c and to frequent topology dis-connectivity in VANETs. To evaluate the performance of the proposed protocols, extensive simulation experiments are performed using network and urban mobility simulation tools. Results confirm the advantages of the proposed schemes in increased traffic loads and network density.
Show less - Date Issued
- 2018
- PURL
- http://purl.flvc.org/fau/fd/FA00013037
- Subject Headings
- Vehicular ad hoc networks (Computer networks), Traffic safety, Routing protocols (Computer network protocols), Fuzzy logic
- Format
- Document (PDF)
- Title
- Implementing security in an IP Multimedia Subsystem (IMS) next generation network - a case study.
- Creator
- Ortiz-Villajos, Jose M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The IP Multimedia Subsystem (IMS) has gone from just a step in the evolution of the GSM cellular architecture control core, to being the de-facto framework for Next Generation Network (NGN) implementations and deployments by operators world-wide, not only cellular mobile communications operators, but also fixed line, cable television, and alternative operators. With this transition from standards documents to the real world, engineers in these new multimedia communications companies need to...
Show moreThe IP Multimedia Subsystem (IMS) has gone from just a step in the evolution of the GSM cellular architecture control core, to being the de-facto framework for Next Generation Network (NGN) implementations and deployments by operators world-wide, not only cellular mobile communications operators, but also fixed line, cable television, and alternative operators. With this transition from standards documents to the real world, engineers in these new multimedia communications companies need to face the task of making these new networks secure against threats and real attacks that were not a part of the previous generation of networks. We present the IMS and other competing frameworks, we analyze the security issues, we present the topic of Security Patterns, we introduce several new patterns, including the basis for a Generic Network pattern, and we apply these concepts to designing a security architecture for a fictitious 3G operator using IMS for the control core.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/186763
- Subject Headings
- Electronic digital computers, Programming, Computer networks, Security measures, TCP/IP (Computer network protocol), Security measures, Internet Protocol Multimedia Subsystem (IMS), Security measures, Multimedia communications, Security measures
- Format
- Document (PDF)
- Title
- Improving Privacy With Intelligent Cooperative Caching In Vehicular Ad Hoc Networks.
- Creator
- Glass, Stephen C., Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
With the issuance of the Notice of Proposed Rule Making (NPRM) for Vehicle to Vehicle (V2V) communications by the United States National Highway Tra c Safety Administration (NHTSA), the goal of the widespread deployment of vehicular networking has taken a signi cant step towards becoming a reality. In order for consumers to accept the technology, it is expected that reasonable mechanisms will be in place to protect their privacy. Cooperative Caching has been proposed as an approach that can...
Show moreWith the issuance of the Notice of Proposed Rule Making (NPRM) for Vehicle to Vehicle (V2V) communications by the United States National Highway Tra c Safety Administration (NHTSA), the goal of the widespread deployment of vehicular networking has taken a signi cant step towards becoming a reality. In order for consumers to accept the technology, it is expected that reasonable mechanisms will be in place to protect their privacy. Cooperative Caching has been proposed as an approach that can be used to improve privacy by distributing data items throughout the mobile network as they are requested. With this approach, vehicles rst attempt to retrieve data items from the mobile network, alleviating the need to send all requests to a centralized location that may be vulnerable to an attack. However, with this approach, a requesting vehicle may expose itself to many unknown vehicles as part of the cache discovery process. In this work we present a Public Key Infrastructure (PKI) based Cooperative Caching system that utilizes a genetic algorithm to selectively choose members of the mobile network to query for data items with a focus on improving overall privacy. The privacy improvement is achieved by avoiding those members that present a greater risk of exposing information related to the request and choosing members that have a greater potential of having the needed data item. An Agent Based Model is utilized to baseline the privacy concerns when using a broadcast based approach to cache discovery. In addition, an epidemiology inspired mathematical model is presented to illustrate the impact of reducing the number of vehicles queried during cache discovery. Periodic reports from neighboring vehicles are used by the genetic algorithm to identify which neighbors should be queried during cache discovery. In order for the system to be realistic, vehicles must trust the information in these reports. A PKI based approach used to evaluate the trustworthiness of each vehicle in the system is also detailed. We have conducted an in-depth performance study of our system that demonstrates a signi cant reduction in the overall risk of exposure when compared to broadcasting the request to all neighbors.
Show less - Date Issued
- 2017
- PURL
- http://purl.flvc.org/fau/fd/FA00004975, http://purl.flvc.org/fau/fd/FA00004965
- Subject Headings
- Dissertations, Academic -- Florida Atlantic University, Public key infrastructure (Computer security), Privacy., Cache memory., Public key infrastructure (Computer security).
- Format
- Document (PDF)
- Title
- Indoor localization using Wi-Fi fingerprinting.
- Creator
- Mirzaei, Azandaryani Saeid, Cardei, Ionut E., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Nowadays the widespread availability of wireless networks has created an interest in using them for other purposes, such as localization of mobile devices in indoor environments because of the lack of GPS signal reception indoors. Indoor localization has received great interest recently for the many context-aware applications it could make possible. We designed and implemented an indoor localization platform for Wi-Fi nodes (such as smartphones and laptops) that identifies the building name,...
Show moreNowadays the widespread availability of wireless networks has created an interest in using them for other purposes, such as localization of mobile devices in indoor environments because of the lack of GPS signal reception indoors. Indoor localization has received great interest recently for the many context-aware applications it could make possible. We designed and implemented an indoor localization platform for Wi-Fi nodes (such as smartphones and laptops) that identifies the building name, floor number, and room number where the user is located based on a Wi-Fi access point signal fingerprint pattern matching. We designed and evaluated a new machine learning algorithm, KRedpin, and developed a new web-services architecture for indoor localization based on J2EE technology with the Apache Tomcat web server for managing Wi-Fi signal data from the FAU WLAN. The prototype localization client application runs on Android cellphones and operates in the East Engineering building at FAU. More sophisticated classifiers have also been used to improve the localization accuracy using the Weka data mining tool.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fau/fd/FA0004038
- Subject Headings
- Location based services, Mobile geographic information systems, Wireless LANs, Wireless communication systems
- Format
- Document (PDF)
- Title
- Identification of MicroRNA biomarkers for cancer by combining multiple feature selection techniques.
- Creator
- Kotlarchyk, Alex J., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
MicroRNAs (miRNAs) may serve as diagnostic and predictive biomarkers for cancer. The aim of this study was to identify novel cancer biomarkers from miRNA datasets, in addition to those already known. Three published miRNA cancer datasets (liver, breast, and brain) were evaluated, and the performance of the entire feature set was compared to the performance of individual feature filters, an ensemble of those filters, and a support vector machine (SVM) wrapper. In addition to confirming many...
Show moreMicroRNAs (miRNAs) may serve as diagnostic and predictive biomarkers for cancer. The aim of this study was to identify novel cancer biomarkers from miRNA datasets, in addition to those already known. Three published miRNA cancer datasets (liver, breast, and brain) were evaluated, and the performance of the entire feature set was compared to the performance of individual feature filters, an ensemble of those filters, and a support vector machine (SVM) wrapper. In addition to confirming many known biomarkers, the main contribution of this study is that seven miRNAs have been newly identified by our ensemble methodology as possible important biomarkers for hepatocellular carcinoma or breast cancer, pending wet lab confirmation. These biomarkers were identified from miRNA expression datasets by combining multiple feature selection techniques (i.e., creating an ensemble) or by the SVM-wrapper, and then classified by different learners. Generally speaking, creating a subset of features by selecting only the highest ranking features (miRNAs) improved upon results generated when using all the miRNAs, and the ensemble and SVM-wrapper approaches outperformed individual feature selection methods. Finally, an algorithm to determine the number of top-ranked features to include in the creation of feature subsets was developed. This algorithm takes into account the performance improvement gained by adding additional features compared to the cost of adding those features.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3332260
- Subject Headings
- Gene silencing, Biochemical markers, Cancer, Diagnosis, Data processing, Cancer, Diagnosis, Research, Gene expression, Tumor markers, Diagnostic use
- Format
- Document (PDF)
- Title
- Impact of interference on connectivity and outage performances in wireless communication networks: interference-based channel models.
- Creator
- Mukasa, Constantine, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In recent years, a plethora of wireless applications such as Bluetooth and Ultra-wide band (UWB) radio have emerged. This drastic increase has overly congested the spectrum. So, new networks such as cognitive radios that can solve the spectrum congestion have emerged. But in such networks, interference is introduced at the physical layer. We study and develop an interference model capable of capturing the intrinsic characteristics of the coexistence of such wireless applications. We...
Show moreIn recent years, a plethora of wireless applications such as Bluetooth and Ultra-wide band (UWB) radio have emerged. This drastic increase has overly congested the spectrum. So, new networks such as cognitive radios that can solve the spectrum congestion have emerged. But in such networks, interference is introduced at the physical layer. We study and develop an interference model capable of capturing the intrinsic characteristics of the coexistence of such wireless applications. We investigate the effect of interference using device isolation probability or outage probability in presence Rayleigh and Nakagami-m fading at the physical layer and the impact of lognormal shadowing. We assume that the devices are either deterministically placed or randomly distributed according to a Poisson point process. We derive explicit expressions for the isolation probability and outage probability that give insight into how these channel impairments affect communication in these applications. We use computer simulations to validate our analytical results.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fcla/dt/3362551
- Subject Headings
- Wireless communication systems, Technological innovations, Wireless communication systems, Mathematical models, Orthogonal frequency division multiplexing
- Format
- Document (PDF)
- Title
- Image retrieval using visual attention.
- Creator
- Mayron, Liam M., College of Engineering and Computer Science, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The retrieval of digital images is hindered by the semantic gap. The semantic gap is the disparity between a user's high-level interpretation of an image and the information that can be extracted from an image's physical properties. Content based image retrieval systems are particularly vulnerable to the semantic gap due to their reliance on low-level visual features for describing image content. The semantic gap can be narrowed by including high-level, user-generated information. High-level...
Show moreThe retrieval of digital images is hindered by the semantic gap. The semantic gap is the disparity between a user's high-level interpretation of an image and the information that can be extracted from an image's physical properties. Content based image retrieval systems are particularly vulnerable to the semantic gap due to their reliance on low-level visual features for describing image content. The semantic gap can be narrowed by including high-level, user-generated information. High-level descriptions of images are more capable of capturing the semantic meaning of image content, but it is not always practical to collect this information. Thus, both content-based and human-generated information is considered in this work. A content-based method of retrieving images using a computational model of visual attention was proposed, implemented, and evaluated. This work is based on a study of contemporary research in the field of vision science, particularly computational models of bottom-up visual attention. The use of computational models of visual attention to detect salient by design regions of interest in images is investigated. The method is then refined to detect objects of interest in broad image databases that are not necessarily salient by design. An interface for image retrieval, organization, and annotation that is compatible with the attention-based retrieval method has also been implemented. It incorporates the ability to simultaneously execute querying by image content, keyword, and collaborative filtering. The user is central to the design and evaluation of the system. A game was developed to evaluate the entire system, which includes the user, the user interface, and retrieval methods.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/fcla/flaent/EN00154040/68_1/98p0137i.pdf, http://purl.flvc.org/FAU/58006
- Subject Headings
- Image processing, Digital techniques, Database systems, Cluster analysis, Multimedia systems
- Format
- Document (PDF)
- Title
- Implementation of an improved embedded SQL for Java.
- Creator
- Bradley, Louis M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The Java Devlopment Environment defines SQLJ as a standard way of embedding the relational database language SQL in the object-oriented programming language Java. Oracle Corporation provides an extension of SQLJ that supports dynamic SQL constructs for the processing of SQL commands that are not completely known at compile time. Unfortunately, these constructs are not sufficient to handle all dynamic situations, so that the programmer has to depend on other SQL embeddings, such as JDBC, in...
Show moreThe Java Devlopment Environment defines SQLJ as a standard way of embedding the relational database language SQL in the object-oriented programming language Java. Oracle Corporation provides an extension of SQLJ that supports dynamic SQL constructs for the processing of SQL commands that are not completely known at compile time. Unfortunately, these constructs are not sufficient to handle all dynamic situations, so that the programmer has to depend on other SQL embeddings, such as JDBC, in addition to Oracle's SQLJ. In this thesis we implement several extensions to Oracle's SQLJ so that all dynamic situations can be programmed in SQLJ, without resorting to other SQL embeddings. We also add a sub-query based for loop facility, similar to the one provided in Oracle's database programming language PL/SQL, as an improvement over the iterator constructs that SQLJ provides. This thesis discusses the design, development and implementation of these SQLJ extensions, and provided applications that show the utility of these extensions in terms of clarity and power.
Show less - Date Issued
- 2012
- PURL
- http://purl.flvc.org/FAU/3358327
- Subject Headings
- SQL (Computer program language), Java ( (Computer program language), Object-oriented programming ( (Computer science), Client/server computing, Application software, Development
- Format
- Document (PDF)
- Title
- Implementations Of The DTM, DADCQ And SLAB VANET Broadcast Protocols For The Ns-3 Simulator.
- Creator
- Alwakeel, Ahmed M., Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This work presents the implementations of three adaptive broadcast protocols for vehicular ad hoc networks (VANET) using the Network Simulator 3 (Ns-3). Performing real life tests for VANET protocols is very costly and risky, so simulation becomes a viable alternative technique. Ns-3 is one of the most advanced open source network simulators. Yet Ns-3 lacks implementations of broadcast protocols for VANET. We first implement the Distance to Mean (DTM) protocol, which uses the distance to mean...
Show moreThis work presents the implementations of three adaptive broadcast protocols for vehicular ad hoc networks (VANET) using the Network Simulator 3 (Ns-3). Performing real life tests for VANET protocols is very costly and risky, so simulation becomes a viable alternative technique. Ns-3 is one of the most advanced open source network simulators. Yet Ns-3 lacks implementations of broadcast protocols for VANET. We first implement the Distance to Mean (DTM) protocol, which uses the distance to mean to determine if a node should rebroadcast or not. We then implement the Distribution-Adaptive Distance with Channel Quality (DADCQ) protocol, which uses node distribution, channel quality and distance to determine if a node should favor rebroadcasting. The third protocol, Statistical Location-Assisted Broadcast protocol (SLAB), is an improvement of DADCQ which automates the threshold function design using machine learning. Our NS-3 implementations of the three protocols have been validated against their JiST/SWANS implementations.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004565, http://purl.flvc.org/fau/fd/FA00004565
- Subject Headings
- Vehicular ad hoc networks (Computer networks)--Technological innovations., Wireless communication systems--Technological innovations., Mobile communication systems--Technological innovations., Mobile computing., Intelligent transportation systems--Mathematical models., Routing protocols (Computer network protocols)
- Format
- Document (PDF)
- Title
- Implementation of a mobile data collector in wireless sensor networks for energy conservation.
- Creator
- Heshike, Pedro L., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A Wireless Sensor Network (WSN) is composed of low-cost electronic devices with sensing, data storage and transmitting capabilities, powered by batteries. There are extensive studies in the field of WSN investigating different algorithms and protocols for data collection. A data collector can be static or mobile. Using a mobile data collector can extend network lifetime and can be used to collect sensor data in hardly accessible locations, partitioned networks, and delay-tolerant networks....
Show moreA Wireless Sensor Network (WSN) is composed of low-cost electronic devices with sensing, data storage and transmitting capabilities, powered by batteries. There are extensive studies in the field of WSN investigating different algorithms and protocols for data collection. A data collector can be static or mobile. Using a mobile data collector can extend network lifetime and can be used to collect sensor data in hardly accessible locations, partitioned networks, and delay-tolerant networks. The implementation of the mobile data collector in our study consists of combining two different platforms: the Crossbow sensor hardware and the NXT Legos. We developed an application for data collection and sensor querying support. Another important contribution is designing a semi-autonomous robot control. This hardware prototype implementation shows the benefits of using a mobile data collector in WSN. It also serves as a reference in developing future applications for mobile WSNs.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3171401
- Subject Headings
- Wireless communication systems, Technological innovations, Sensor networks, Design and construction, Compter network protocols, Ad hoc networks (Computer networks), Technological innovations
- Format
- Document (PDF)
- Title
- Implementation of a VANET Geo-Fence Based Adaptive Traffic Light Control Scheme.
- Creator
- Edwards, Alain D., Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In this thesis we extend the VANET-based approach to counting vehicles at a traffic light by implementing a Geo-fence Based Vehicle Counting Algorithm which supports the use of RFID technology. This implementation utilizes the concept of geo-fencing to create a Zone of Interest (ZOI) that sections off a roadway that is relevant to a traffic intersection. All vehicles in this ZOI are used to determine the required length of the green-cycle time. By utilizing vehicle-to-vehicle (V2V) and...
Show moreIn this thesis we extend the VANET-based approach to counting vehicles at a traffic light by implementing a Geo-fence Based Vehicle Counting Algorithm which supports the use of RFID technology. This implementation utilizes the concept of geo-fencing to create a Zone of Interest (ZOI) that sections off a roadway that is relevant to a traffic intersection. All vehicles in this ZOI are used to determine the required length of the green-cycle time. By utilizing vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) technologies, we broadcast beacons that are propagated to all vehicles in the ZOI from the infrastructure which in this case is the traffic light controller. These beacons are used to determine the last vehicle location in the ZOI. A timing algorithm ensures that the last vehicle broadcasts first. The beacons are sent using the IEEE 1609.4 Wireless Access in Vehicular Environments Standard Vendor Specific Action (VSA) frames on the Smart Drive Initiative Vehiclular Ad Hoc Networks testbed. This work is implemented in conjunction with the Vehicular Multi-technology Communication Device (VMCD) supported by the National Science Foundation.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004720
- Subject Headings
- Traffic engineering., Radio frequency identification systems.
- Format
- Document (PDF)
- Title
- Object detection in low resolution video sequences.
- Creator
- Pava, Diego F., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
With augmenting security concerns and decreasing costs of surveillance and computing equipment, research on automated systems for object detection has been increasing, but the majority of the studies focus their attention on sequences where high resolution objects are present. The main objective of this work is the detection and extraction of information of low resolution objects (e.g. objects that are so far away from the camera that they occupy only tens of pixels) in order to provide a...
Show moreWith augmenting security concerns and decreasing costs of surveillance and computing equipment, research on automated systems for object detection has been increasing, but the majority of the studies focus their attention on sequences where high resolution objects are present. The main objective of this work is the detection and extraction of information of low resolution objects (e.g. objects that are so far away from the camera that they occupy only tens of pixels) in order to provide a base for higher level information operations such as classification and behavioral analysis. The system proposed is composed of four stages (preprocessing, background modeling, information extraction, and post processing) and uses context based region of importance selection, histogram equalization, background subtraction and morphological filtering techniques. The result is a system capable of detecting and tracking low resolution objects in a controlled background scene which can be a base for systems with higher complexity.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/186685
- Subject Headings
- Computer systems, Security measures, Remote sensing, Image processing, Digital techniques, Imaging systems, Mathematical models
- Format
- Document (PDF)
- Title
- Object recognition on Android mobil platform using speeded up robust features.
- Creator
- Tyagi, Vivek K., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In recent years there has been great interest in implementing object recognition frame work on mobile phones. This has stemmed from the fact the advances in object recognition algorithm and mobile phone capabilities have built a congenial ecosystem. Application developers on mobile platforms are trying to utilize the object recognition technology to build better human computer interfaces. This approach is in the nascent phase and proper application framework is required. In this thesis, we...
Show moreIn recent years there has been great interest in implementing object recognition frame work on mobile phones. This has stemmed from the fact the advances in object recognition algorithm and mobile phone capabilities have built a congenial ecosystem. Application developers on mobile platforms are trying to utilize the object recognition technology to build better human computer interfaces. This approach is in the nascent phase and proper application framework is required. In this thesis, we propose a framework to overcome design challenges and provide an evaluation methodology to assess the system performance. We use the emerging Android mobile platform to implement and test the framework. We performed a case study using the proposal and reported the test result. This assessment will help developers make wise decisions about their application design. Furthermore, the Android API developers could use this information to provide better interfaces to the third party developers. The design and evaluation methodology could be extended to other mobile platforms for a wider consumer base.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/2683531
- Subject Headings
- Mobile computing, Application software, Development, Object-oriented programming (Computer software), Pattern recognition systems, Development
- Format
- Document (PDF)
- Title
- Perceptual methods for video coding.
- Creator
- Adzic, Velibor, Kalva, Hari, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The main goal of video coding algorithms is to achieve high compression efficiency while maintaining quality of the compressed signal at the highest level. Human visual system is the ultimate receiver of compressed signal and final judge of its quality. This dissertation presents work towards optimal video compression algorithm that is based on the characteristics of our visual system. Modeling phenomena such as backward temporal masking and motion masking we developed algorithms that are...
Show moreThe main goal of video coding algorithms is to achieve high compression efficiency while maintaining quality of the compressed signal at the highest level. Human visual system is the ultimate receiver of compressed signal and final judge of its quality. This dissertation presents work towards optimal video compression algorithm that is based on the characteristics of our visual system. Modeling phenomena such as backward temporal masking and motion masking we developed algorithms that are implemented in the state-of- the-art video encoders. Result of using our algorithms is visually lossless compression with improved efficiency, as verified by standard subjective quality and psychophysical tests. Savings in bitrate compared to the High Efficiency Video Coding / H.265 reference implementation are up to 45%.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004074, http://purl.flvc.org/fau/fd/FA00004074
- Subject Headings
- Algorithms, Coding theory, Digital coding -- Data processing, Imaging systems -- Image quality, Perception, Video processing -- Data processing
- Format
- Document (PDF)
- Title
- Physical Layer Security of Wireless Transmissions Over Fading Channels.
- Creator
- Blanc, Sadrac, Aalo, Valentine A., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The open nature of the wireless medium makes the wireless communication susceptible to eavesdropping attacks. In addition, fading and shadowing significantly degrade the performance of the communication system in the wireless networks. A versatile approach to circumvent the issues of eavesdropping attacks while exploiting the physical properties of the wireless channel is the so-called physical layer-security. In this work, we consider a model in which two legitimate users communicate in the...
Show moreThe open nature of the wireless medium makes the wireless communication susceptible to eavesdropping attacks. In addition, fading and shadowing significantly degrade the performance of the communication system in the wireless networks. A versatile approach to circumvent the issues of eavesdropping attacks while exploiting the physical properties of the wireless channel is the so-called physical layer-security. In this work, we consider a model in which two legitimate users communicate in the presence of an eavesdropper. We investigate the performance of the wireless network at the physical layer that is subject to a variety of fading environments that may be modeled by the Rayleigh, Nakagami-m, and Generalized-K distributions, to mention a few. We use the secrecy outage probability (SOP) as the standard performance metrics to study the performance of the wireless networks. We propose two different approaches to compute the secrecy outage probability, and derive explicit expressions for the secrecy outage probability that allow us to characterize the performance of the wireless networks. Specifically, we use a direct integration approach as well as a Taylor series base approach to evaluate the secrecy outage probability. Finally, we use computer simulations, based on MATLAB, to confirm the analytical results.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004729, http://purl.flvc.org/fau/fd/FA00004729
- Subject Headings
- Data encryption (Computer science), Digital communications -- Reliability -- Mathematics, Internetworking (Telecommunication), Radio wave propagation, Wireless communication systems -- Security measures
- Format
- Document (PDF)
- Title
- Performance analyses of Slotted ALOHA protocol in a Weibull fading environment.
- Creator
- Rene, Jean N., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In past and recent literature, random access protocols have been investigated with growing interest. In particular, the Slotted ALOHA protocol has been extensively used in satellite communications, and has also attracted considerable attention in many areas of wireless communication systems, especially in the cellular mobile environment. In this thesis, we investigate the performance of Slotted ALOHA, an effective random access protocol, in a Weibull fading environment. We study the...
Show moreIn past and recent literature, random access protocols have been investigated with growing interest. In particular, the Slotted ALOHA protocol has been extensively used in satellite communications, and has also attracted considerable attention in many areas of wireless communication systems, especially in the cellular mobile environment. In this thesis, we investigate the performance of Slotted ALOHA, an effective random access protocol, in a Weibull fading environment. We study the performance metrics based on the signal-to-interference-and-noise ratio (SINR) model, in a cellular network system, assuming two captures models. The capture effect, also called co-channel interference tolerance, is the ability to correctly receive a strong signal from one transmitter despite significant interference from other transmitters. We derive closed-formed expressions and numerical evaluations for both the capture probability and the system throughput. he analytical results will be validated with computer simulations. Finally, to mitigate the effects of Weibull fading channel we also consider the effect of dual selection diversity that will increase the capture probability and the system throughput.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fcla/dt/3362567
- Subject Headings
- Multiple access protocols (Computer network protocols), Wireless communication systems, Packet switching (Data transmission), Computer simulation, Radio frequency identification systems, Computer simulation
- Format
- Document (PDF)
- Title
- Personal health record system and integration techniques with various electronic medical record systems.
- Creator
- Ved, Vishesh., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In order to improve the quality of care, there is urgent need to involve patients in their own healthcare. So to make patient centered health care system Personal Health Records are proposed as viable solution. This research discusses the importance of a Patient Centric Health Record system. Such systems can empower patients to participate in improving health care quality. It would also provide an economically viable solution to the need for better healthcare without escalating costs by...
Show moreIn order to improve the quality of care, there is urgent need to involve patients in their own healthcare. So to make patient centered health care system Personal Health Records are proposed as viable solution. This research discusses the importance of a Patient Centric Health Record system. Such systems can empower patients to participate in improving health care quality. It would also provide an economically viable solution to the need for better healthcare without escalating costs by avoiding duplication. The proposed system is Web-based; therefore it has high accessibility and availability. The cloud computing based architecture is used which will allow consumers to address the challenge of sharing medical data. PHR would provide a complete and accurate summary of the health and medical history of an individual by gathering data from many sources. This would make information accessible online to anyone who has the necessary electronic credentials to view the information.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/1930491
- Subject Headings
- Medical records, Data processing, Management, Medical informatics, Information storage and retrieval systems, Medical care, Medical care, Quality control, Personal information management
- Format
- Document (PDF)