Current Search: College of Engineering and Computer Science (x)
View All Items
Pages
- Title
- Predictive modeling for wellness.
- Creator
- Pulumati, Pranitha, Agarwal, Ankur, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Wellness and healthy life are the most common concerns for an individual to lead a happy life. A web-based approach known as Wellness Scoring is being developed taking into people’s concerns for their health issues. In this approach, four different classifiers are being investigated to predict the wellness. In this thesis, we investigated four different classifiers (a probabilistic graphical model, simple probabilistic classifier, probabilistic statistical classification and an artificial...
Show moreWellness and healthy life are the most common concerns for an individual to lead a happy life. A web-based approach known as Wellness Scoring is being developed taking into people’s concerns for their health issues. In this approach, four different classifiers are being investigated to predict the wellness. In this thesis, we investigated four different classifiers (a probabilistic graphical model, simple probabilistic classifier, probabilistic statistical classification and an artificial neural network) to predict the wellness outcome. An approach to calculate wellness score is also addressed. All these classifiers are trained on real data, hence giving more accurate results. With this solution, there is a better way of keeping track of an individuals’ health. In this thesis, we present the design and development of such a system and evaluate the performance of the classifiers and design considerations to maximize the end user experience with the application. A user experience model capable of predicting the wellness score for a given set of risk factors is developed.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004321, http://purl.flvc.org/fau/fd/FA00004321
- Subject Headings
- Bayesian statistical decision theory, Expert systems (Computer science), Health risk assessment, Medicine, Preventive, Patient self monitoring, Self care, Health, Well being
- Format
- Document (PDF)
- Title
- Multimedia Big Data Processing Using Hpcc Systems.
- Creator
- Chinta, Vishnu, Kalva, Hari, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
There is now more data being created than ever before and this data can be any form of data, textual, multimedia, spatial etc. To process this data, several big data processing platforms have been developed including Hadoop, based on the MapReduce model and LexisNexis’ HPCC systems. In this thesis we evaluate the HPCC Systems framework with a special interest in multimedia data analysis and propose a framework for multimedia data processing. It is important to note that multimedia data...
Show moreThere is now more data being created than ever before and this data can be any form of data, textual, multimedia, spatial etc. To process this data, several big data processing platforms have been developed including Hadoop, based on the MapReduce model and LexisNexis’ HPCC systems. In this thesis we evaluate the HPCC Systems framework with a special interest in multimedia data analysis and propose a framework for multimedia data processing. It is important to note that multimedia data encompasses a wide variety of data including but not limited to image data, video data, audio data and even textual data. While developing a unified framework for such wide variety of data, we have to consider computational complexity in dealing with the data. Preliminary results show that HPCC can potentially reduce the computational complexity significantly.
Show less - Date Issued
- 2017
- PURL
- http://purl.flvc.org/fau/fd/FA00004875, http://purl.flvc.org/fau/fd/FA00004875
- Subject Headings
- Big data., High performance computing., Software engineering., Artificial intelligence--Data processing., Management information systems., Multimedia systems.
- Format
- Document (PDF)
- Title
- New Structured Data Collection Approach for Real-Time Trust Measurement In Human-Autonomous Vehicle Interactions.
- Creator
- Shahrdar, Shervin, Nojoumian, Mehrdad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Most of recent studies indicate that people are negatively predisposed toward utilizing autonomous systems. These findings highlight the necessity of conducting research to better understand the evolution of trust between humans and growing autonomous technologies such as self-driving cars (SDC). This research therefore presents a new approach for real-time trust measurement between passengers and SDCs. We utilized a new structured data collection approach along with a virtual reality (VR)...
Show moreMost of recent studies indicate that people are negatively predisposed toward utilizing autonomous systems. These findings highlight the necessity of conducting research to better understand the evolution of trust between humans and growing autonomous technologies such as self-driving cars (SDC). This research therefore presents a new approach for real-time trust measurement between passengers and SDCs. We utilized a new structured data collection approach along with a virtual reality (VR) SDC simulator to understand how various autonomous driving scenarios can increase or decrease human trust and how trust can be re-built in the case of incidental failures. To verify our methodology, we designed and conducted an empirical experiment on 50 human subjects. The results of this experiment indicated that most subjects could rebuild trust during a reasonable timeframe after the system demonstrated faulty behavior. Furthermore, we discovered that the cultural background and past trust-related experiences of the subjects affect how they lose or regain their trust in SDCs. Our analysis showed that this model is highly effective for collecting real-time data from human subjects and lays the foundation for more-involved future research in the domain of human trust and autonomous driving.
Show less - Date Issued
- 2018
- PURL
- http://purl.flvc.org/fau/fd/FA00013033
- Subject Headings
- Autonomous vehicles, Trust, Measurement
- Format
- Document (PDF)
- Title
- Predicting Levels of Learning with Eye Tracking.
- Creator
- Parikh, Saurin Sharad, Kalva, Hari, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
E-Learning is transforming the delivery of education. Today, millions of students take selfpaced online courses. However, the content and language complexity often hinders comprehension, and that with lack of immediate help from the instructor leads to weaker learning outcomes. Ability to predict difficult content in real time enables eLearning systems to adapt content as per students' level of learning. The recent introduction of lowcost eye trackers has opened a new class of applications...
Show moreE-Learning is transforming the delivery of education. Today, millions of students take selfpaced online courses. However, the content and language complexity often hinders comprehension, and that with lack of immediate help from the instructor leads to weaker learning outcomes. Ability to predict difficult content in real time enables eLearning systems to adapt content as per students' level of learning. The recent introduction of lowcost eye trackers has opened a new class of applications based on eye response. Eye tracking devices can record eye response on the visual element or concept in real time. The response and the variations in eye response to the same concept over time may be indicative of the levels of learning. In this study, we have analyzed reading patterns using eye tracker and derived 12 eye response features based on psycholinguistics, contextual information processing, anticipatory behavior analysis, recurrence fixation analysis, and pupils' response. We use eye responses to predict the level of learning for a term/concept. One of the main contribution is the spatio-temporal analysis of the eye response on a term/concept to derive relevant first pass (spatial) and reanalysis (temporal) eye response features. A spatiotemporal model, built using these derived features, analyses slide images, extracts words (terms), maps the subject's eye response to words, and prepares a term-response map. A parametric baseline classifier, trained with labeled data (term-response maps) classifies a term/concept as a novel (positive class) or familiar (negative class), using majority voting method. On using, only first pass features for prediction, the baseline classifier shows 61% prediction accuracy, but on adding reanalysis features, baseline achieves 66.92% accuracy for predicting difficult terms. However, all proposed features do not have the same response to learning difficulties for all subjects, as we consider reading as an individual characteristic. Hence, we developed a non-parametric, feature weighted linguistics classifier (FWLC), which assigns weight to features based on their relevance. The FWLC classifier achieves a prediction accuracy of 90.54% an increase of 23.62% over baseline and 29.54% over the first-pass variant of baseline. Predicting novel terms as familiar is more expensive because content adapts by using this information. Hence, our primary goal is to increase the prediction rate of novel terms by minimizing the cost of false predictions. On comparing the performance of FWLC with other frequently used machine learning classifiers, FWLC achieves highest true positive rate (TPR) and lowest ratio of false negative rate (FNR) to false positive rate (FPR). The higher prediction performance of proposed spatio-temporal eye response model to predict levels of learning builds a strong foundation for eye response driven adaptive e-Learning.
Show less - Date Issued
- 2017
- PURL
- http://purl.flvc.org/fau/fd/FA00005941
- Subject Headings
- Dissertations, Academic -- Florida Atlantic University, Eye tracking., E-Learning.
- Format
- Document (PDF)
- Title
- Predictive modeling for chronic conditions.
- Creator
- Jain, Ritesh, Agarwal, Ankur, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Chronic Diseases are the major cause of mortality around the world, accounting for 7 out of 10 deaths each year in the United States. Because of its adverse effect on the quality of life, it has become a major problem globally. Health care costs involved in managing these diseases are also very high. In this thesis, we will focus on two major chronic diseases Asthma and Diabetes, which are among the leading causes of mortality around the globe. It involves design and development of a...
Show moreChronic Diseases are the major cause of mortality around the world, accounting for 7 out of 10 deaths each year in the United States. Because of its adverse effect on the quality of life, it has become a major problem globally. Health care costs involved in managing these diseases are also very high. In this thesis, we will focus on two major chronic diseases Asthma and Diabetes, which are among the leading causes of mortality around the globe. It involves design and development of a predictive analytics based decision support system which uses five supervised machine learning algorithm to predict the occurrence of Asthma and Diabetes. This system helps in controlling the disease well in advance by selecting its best indicators and providing necessary feedback.
Show less - Date Issued
- 2015
- PURL
- http://purl.flvc.org/fau/fd/FA00004382, http://purl.flvc.org/fau/fd/FA00004382
- Subject Headings
- Biomedical engineering, Chronic diseases -- United States -- Prevention, Cloud computing, Medical informatics, Medicine, Preventive, Primary care (Medicine)
- Format
- Document (PDF)
- Title
- Towards a methodology for building reliable systems.
- Creator
- Buckley, Ingrid A., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Reliability is a key system characteristic that is an increasing concern for current systems. Greater reliability is necessary due to the new ways in which services are delivered to the public. Services are used by many industries, including health care, government, telecommunications, tools, and products. We have defined an approach to incorporate reliability along the stages of system development. We first did a survey of existing dependability patterns to evaluate their possible use in...
Show moreReliability is a key system characteristic that is an increasing concern for current systems. Greater reliability is necessary due to the new ways in which services are delivered to the public. Services are used by many industries, including health care, government, telecommunications, tools, and products. We have defined an approach to incorporate reliability along the stages of system development. We first did a survey of existing dependability patterns to evaluate their possible use in this methodology. We have defined a systematic methodology that helps the designer apply reliability in all steps of the development life cycle in the form of patterns. A systematic failure enumeration process to define corresponding countermeasures was proposed as a guideline to define where reliability is needed. We introduced the idea of failure patterns which show how failures manifest and propagate in a system. We also looked at how to combine reliability and security. Finally, we defined an approach to certify the level of reliability of an implemented web service. All these steps lead towards a complete methodology.
Show less - Date Issued
- 2012
- PURL
- http://purl.flvc.org/FAU/3342037
- Subject Headings
- Computer software, Reliability, Reliability (Engineering), Computer programs, Fault-tolerant computing
- Format
- Document (PDF)
- Title
- The Effect of Fluid Flow on Human Sperm Fertility.
- Creator
- Rappa, Kari, Asghar, Waseem, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Current sperm processing methods used in assisted reproductive technologies can cause damage to the sperm cell. New ways that mimic the natural guidance mechanisms present in the female genital tract may offer ways to sort sperm with better fertility parameters. Sperm that respond to these cues may have better over sperm health. Human sperm exhibit positive rheotaxis by orienting and swimming against the fluid released by the female genital tract. At certain flow rates sperm can actively...
Show moreCurrent sperm processing methods used in assisted reproductive technologies can cause damage to the sperm cell. New ways that mimic the natural guidance mechanisms present in the female genital tract may offer ways to sort sperm with better fertility parameters. Sperm that respond to these cues may have better over sperm health. Human sperm exhibit positive rheotaxis by orienting and swimming against the fluid released by the female genital tract. At certain flow rates sperm can actively orient and swim against the flow. Sperm retrieved that exhibit positive rheotaxis have higher motility and better morphology than the original semen sample.
Show less - Date Issued
- 2017
- PURL
- http://purl.flvc.org/fau/fd/FA00004938, http://purl.flvc.org/fau/fd/FA00004938
- Subject Headings
- Human reproduction--Immunological aspects., Fertility, Human., Cell separation., Reproductive health., Cilia and ciliary motion., Spermatozoa--Motility.
- Format
- Document (PDF)
- Title
- Video transcoding using machine learning.
- Creator
- Holder, Christopher., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The field of Video Transcoding has been evolving throughout the past ten years. The need for transcoding of video files has greatly increased because of the new upcoming standards which are incompatible with old ones. This thesis takes the method of using machine learning for video transcoding mode decisions and discusses ways to improve the process of generating the algorithm for implementation in different video transcoders. The transcoding methods used decrease the complexity in the mode...
Show moreThe field of Video Transcoding has been evolving throughout the past ten years. The need for transcoding of video files has greatly increased because of the new upcoming standards which are incompatible with old ones. This thesis takes the method of using machine learning for video transcoding mode decisions and discusses ways to improve the process of generating the algorithm for implementation in different video transcoders. The transcoding methods used decrease the complexity in the mode decision inside the video encoder. Also methods which automate and improve results are discussed and implemented in two different sets of transcoders: H.263 to VP6 , and MPEG-2 to H.264. Both of these transcoders have shown a complexity loss of almost 50%. Video transcoding is important because the quantity of video standards have been increasing while devices usually can only decode one specific codec.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/FAU/166451
- Subject Headings
- Coding theory, Image transmission, Technological innovations, File conversion (Computer science), Data structures (Computer science), MPEG (Video coding standard), Digital media, Video compression
- Format
- Document (PDF)
- Title
- Vibration analysis for ocean turbine reliability models.
- Creator
- Wald, Randall David., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Submerged turbines which harvest energy from ocean currents are an important potential energy resource, but their harsh and remote environment demands an automated system for machine condition monitoring and prognostic health monitoring (MCM/PHM). For building MCM/PHM models, vibration sensor data is among the most useful (because it can show abnormal behavior which has yet to cause damage) and the most challenging (because due to its waveform nature, frequency bands must be extracted from...
Show moreSubmerged turbines which harvest energy from ocean currents are an important potential energy resource, but their harsh and remote environment demands an automated system for machine condition monitoring and prognostic health monitoring (MCM/PHM). For building MCM/PHM models, vibration sensor data is among the most useful (because it can show abnormal behavior which has yet to cause damage) and the most challenging (because due to its waveform nature, frequency bands must be extracted from the signal). To perform the necessary analysis of the vibration signals, which may arrive rapidly in the form of data streams, we develop three new wavelet-based transforms (the Streaming Wavelet Transform, Short-Time Wavelet Packet Decomposition, and Streaming Wavelet Packet Decomposition) and propose modifications to the existing Short-TIme Wavelet Transform. ... The proposed algorithms also create and select frequency-band features which focus on the areas of the signal most important to MCM/PHM, producing only the information necessary for building models (or removing all unnecessary information) so models can run on less powerful hardware. Finally, we demonstrate models which can work in multiple environmental conditions. ... Our results show that many of the transforms give similar results in terms of performance, but their different properties as to time complexity, ability to operate in a fully streaming fashion, and number of generated features may make some more appropriate than others in particular applications, such as when streaming data or hardware limitations are extremely important (e.g., ocean turbine MCM/PHM).
Show less - Date Issued
- 2012
- PURL
- http://purl.flvc.org/FAU/3359158
- Subject Headings
- Marine turbines, Mathematical models, Fluid dynamics, Structural dynamics, Vibration, Measurement, Stochastic processes
- Format
- Document (PDF)
- Title
- Web-based wireless sensor network monitoring using smartphones.
- Creator
- Marcus, Anthony M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis consists of the development of a web based wireless sensor network (WSN) monitoring system using smartphones. Typical WSNs consist of networks of wireless sensor nodes dispersed over predetermined areas to acquire, process, and transmit data from these locations. Often it is the case that the WSNs are located in areas too hazardous or inaccessible to humans. We focused on the need for access to this sensed data remotely and present our reference architecture to solve this problem....
Show moreThis thesis consists of the development of a web based wireless sensor network (WSN) monitoring system using smartphones. Typical WSNs consist of networks of wireless sensor nodes dispersed over predetermined areas to acquire, process, and transmit data from these locations. Often it is the case that the WSNs are located in areas too hazardous or inaccessible to humans. We focused on the need for access to this sensed data remotely and present our reference architecture to solve this problem. We developed this architecture for web-based wireless sensor network monitoring and have implemented a prototype that uses Crossbow Mica sensors and Android smartphones for bridging the wireless sensor network with the web services for data storage and retrieval. Our application has the ability to retrieve sensed data directly from a wireless senor network composed of Mica sensors and from a smartphones onboard sensors. The data is displayed on the phone's screen, and then, via Internet connection, they are forwarded to a remote database for manipulation and storage. The attributes sensed and stored by our application are temperature, light, acceleration, GPS position, and geographical direction. Authorized personnel are able to retrieve and observe this data both textually and graphically from any browser with Internet connectivity or through a native Android application. Web-based wireless sensor network architectures using smartphones provides a scalable and expandable solution with applicability in many areas, such as healthcare, environmental monitoring, infrastructure health monitoring, border security, and others.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3171682
- Subject Headings
- Smartphones, Wireless communication systems, Security measures, Wireless communication systems, Technological innovations, Computer networks, Security measures, Ad hoc networks (Computer networks), Security measures
- Format
- Document (PDF)
- Title
- Web accessibility for the hearing impaired.
- Creator
- Pasmore, Simone., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
With the exponential increase of Internet usage and the embedding of multimedia content on the Web, some of the Internet resources remain inaccessible for people with disabilities. Particularly, people who are deaf or Hard of Hearing (HOH) experience inaccessible Web sites due to a lack of Closed Captioning (CC) for multimedia content on the Web, no sign language equivalents for the content on the Web, and an insufficient evaluation framework for determining if a Web page is accessible to the...
Show moreWith the exponential increase of Internet usage and the embedding of multimedia content on the Web, some of the Internet resources remain inaccessible for people with disabilities. Particularly, people who are deaf or Hard of Hearing (HOH) experience inaccessible Web sites due to a lack of Closed Captioning (CC) for multimedia content on the Web, no sign language equivalents for the content on the Web, and an insufficient evaluation framework for determining if a Web page is accessible to the Hearing Impaired community. Several opportunities for accessing content needed to be rectified in order for the Hearing Impaired community to access the full benefits of the information repository on the Internet. The research contributions of this thesis are to resolve some of the Web accessibility problems being faced by the Hearing Impaired community. These objectives are to create an automated CC for the Web for multimedia content, to embed sign language equivalent for content available on the Web, to create a framework to evaluate Web accessibility for the Hearing Impaired community, and to create a social network for the Deaf community. To demonstrate the feasibility of fulfilling the above listed objectives several prototypes were implemented. These prototypes have been used in real life scenarios in order to have an objective evaluation of the proposed framework. Further, the implemented prototypes have had an impact to both the academic community and to the industry.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/fcla/dt/177011
- Subject Headings
- Computers and people with disabilities, Interactive multimedia, Hearing impaired, Services for, Communication devices for people with disabilities, User interfaces (Computer systems), Web sites, Design
- Format
- Document (PDF)
- Title
- Web services cryptographic patterns.
- Creator
- Hashizume, Keiko., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Data security has been identified as one of the most important concerns where sensitive messages are exchanged over the network. In web service architecture, multiple distributed applications communicate with each other over the network by sending XML messages. How can we protect these sensitive messages? Some web services standards have emerged to tackle this problem. The XML Encryption standard defines the process of encrypting and decrypting all of an XML message, part of an XML message,...
Show moreData security has been identified as one of the most important concerns where sensitive messages are exchanged over the network. In web service architecture, multiple distributed applications communicate with each other over the network by sending XML messages. How can we protect these sensitive messages? Some web services standards have emerged to tackle this problem. The XML Encryption standard defines the process of encrypting and decrypting all of an XML message, part of an XML message, or even an external resource. Like XML Encryption, the XML Signature standard specifies how to digitally sign an entire XML message, part of an XML message, or an external object. WS-Security defines how to embed security tokens, XML encryption, and XML signature into XML documents. It does not define new security mechanisms, but leverages existing security technologies such as encryption and digital signature.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/216413
- Subject Headings
- Computer networks, Access control, Data encryption (Computer science), XML (Document markup language), Digital signatures, Computer network architectures
- Format
- Document (PDF)
- Title
- Virtualization techniques for mobile systems.
- Creator
- Jaramillo, David, Furht, Borko, Agarwal, Ankur, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In current mobile system environment there is a large gap in the use of smart phones for personal and enterprise use due to required enterprise security policies, privacy concerns as well as freedom of use. In the current environment, data-plans on mobile systems have become so wide spread that the rate of adaptation of data plans for every day customers has far outpaced the ability for enterprises to keep up with existing secure enterprise infrastructures. Most of the enterprises require...
Show moreIn current mobile system environment there is a large gap in the use of smart phones for personal and enterprise use due to required enterprise security policies, privacy concerns as well as freedom of use. In the current environment, data-plans on mobile systems have become so wide spread that the rate of adaptation of data plans for every day customers has far outpaced the ability for enterprises to keep up with existing secure enterprise infrastructures. Most of the enterprises require/provide the access of emails and other official information on smart platforms which presents a big challenge for the enterprise in securing their systems. Therefore due to the security issues and policies imposed by the enterprise in using the same device for dual purpose (personal and enterprise), the consumers often lose their individual freedom and convenience at the cost of security. Few solutions have been successful addressing this challenge. One effective way is to partition the mobile device such that the enterprise system access and its information are completely separated from the personal information. Several approaches are described and presented for mobile virtualization that creates a secure and secluded environment for enterprise information while allowing the user to access their personal information. A reference architecture is then presented that allows for integration with existing enterprise mobile device management systems and at the same time providing a light weight solution for containerizing mobile applications. This solution is then benchmarked with several of the existing mobile virtualization solutions.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fau/fd/FA0004028
- Subject Headings
- Mobile communication systems, Virtual computer systems
- Format
- Document (PDF)
- Title
- Visualization tool for molecular dynamics simulation.
- Creator
- Garg, Meha., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A study of Molecular Dynamics using computational methods and modeling provides the understanding on the interaction of the atoms, properties, structure, and motion and model phenomenon. There are numerous commercial tools available for simulation, analysis and visualization. However any particular tool does not provide all the functionalities. The main objective of this work is the development of the visualization tool customized for our research needs to view the three dimensional...
Show moreA study of Molecular Dynamics using computational methods and modeling provides the understanding on the interaction of the atoms, properties, structure, and motion and model phenomenon. There are numerous commercial tools available for simulation, analysis and visualization. However any particular tool does not provide all the functionalities. The main objective of this work is the development of the visualization tool customized for our research needs to view the three dimensional orientation of the atom, process the simulation results offline, able to handle large volume of data, ability to display complete frame, atomic trails, and runtime response to the researchers' query with low processing time. This thesis forms the basis for the development of such an in-house tool for analysis and display of simulation results based on Open GL and MFC. Advantages, limitations, capabilities and future aspects are also discussed. The result is the system capable of processing large amount of simulation result data in 11 minutes and query response and display in less than 1 second.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/1927308
- Subject Headings
- Molecular dynamics, Computer simulation, Condensed matter, Computer simulation, Intermolecular forces, Computer simulation, Molecules, Mathematical models
- Format
- Document (PDF)
- Title
- An integrated framework for home healthcare delivery.
- Creator
- Conaster, Mark., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
With the increasing demands of rising medical costs in combination with a boom in elderly patients in need of quality patient care medical practices are being stressed. Patient to nurse ratios are increasing and government spending in the medical domain is at an all-time high threatening the futures of government medical programs such as Medicare and Medicaid. In this thesis we propose a framework for the monitoring of a patient's vital statistics in a home-based setting using a mobile smart...
Show moreWith the increasing demands of rising medical costs in combination with a boom in elderly patients in need of quality patient care medical practices are being stressed. Patient to nurse ratios are increasing and government spending in the medical domain is at an all-time high threatening the futures of government medical programs such as Medicare and Medicaid. In this thesis we propose a framework for the monitoring of a patient's vital statistics in a home-based setting using a mobile smart device. We believe that in taking advantage of the wireless sensor technology which is readily available today we can provide a solution that is both economically and socially viable offering a solid quality of healthcare in a comfortable and familiar environment. Our framework exposes both 802.11 and Bluetooth wireless protocol transmitting medical sensor devices using an Android platform device as a monitoring hub.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3174510
- Subject Headings
- Home care services, Technological innovations, Telecommunication in medicine, Internet in medicine, Medical informatics, Medical telematics
- Format
- Document (PDF)
- Title
- A reference architecture for cloud computing and its security applications.
- Creator
- Hashizume, Keiko., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Cloud Computing is security. In complex systems such as Cloud Computing, parts of a system are secured by using specific products, but there is rarely a global security analysis of the complete system. We have described how to add security to cloud systems and evaluate its security levels using a reference architecture. A reference architecture provides a framework for relating threats to the structure of the system and makes their numeration more systematic and complete. In order to secure a...
Show moreCloud Computing is security. In complex systems such as Cloud Computing, parts of a system are secured by using specific products, but there is rarely a global security analysis of the complete system. We have described how to add security to cloud systems and evaluate its security levels using a reference architecture. A reference architecture provides a framework for relating threats to the structure of the system and makes their numeration more systematic and complete. In order to secure a cloud framework, we have enumerated cloud threats by combining several methods because it is not possible to prove that we have covered all the threats. We have done a systematic enumeration of cloud threats by first identifying them in the literature and then by analyzing the activities from each of their use cases in order to find possible threats. These threats are realized in the form of misuse cases in order to understand how an attack happens from the point of view of an attacker. The reference architecture is used as a framework to determine where to add security in order to stop or mitigate these threats. This approach also implies to develop some security patterns which will be added to the reference architecture to design a secure framework for clouds. We finally evaluate its security level by using misuse patterns and considering the threat coverage of the models.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fcla/dt/3360787
- Subject Headings
- Computer networks, Design and construction, Cloud computing, Electronic data processing, Distributed processing
- Format
- Document (PDF)
- Title
- A patient-centric hurricane evacuation management system.
- Creator
- Ambrose, Arny Isonja, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The use of wireless sensor networks for a myriad of applications is increasing. They can be used in healthcare for emergency management. In Florida, hurricanes are the main source of natural disasters. There has been a high incidence of hurricanes over the past decade. When a hurricane warning is issued it is important that people who live in potentially dangerous areas, such as along the coast, evacuate for their safety. Nursing homes and other care facilities for elderly or disabled people...
Show moreThe use of wireless sensor networks for a myriad of applications is increasing. They can be used in healthcare for emergency management. In Florida, hurricanes are the main source of natural disasters. There has been a high incidence of hurricanes over the past decade. When a hurricane warning is issued it is important that people who live in potentially dangerous areas, such as along the coast, evacuate for their safety. Nursing homes and other care facilities for elderly or disabled people experience difficulty with the evacuation as their residents require additional assistance. The characteristics and challenges of a hurricane evacuation are investigated. A patient-centric hurricane evacuation management system is proposed to allow healthcare providers the ability to continuously monitor and track patients. During a hurricane there are usually scarce energy resources and a loss of basic communication services such as cellular service and Internet access. We propose the architecture of the system that allows it to operate in the absence of these services. The hardware and software architectures are also presented along with the main phases of operation. The system was then validated and the performance evaluated via simulation using the OPNET Modeler.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3329832
- Subject Headings
- Emergency management, Planning, Evacuation of civilians, Planning, Emergency medical services, Planning, Disaster medicine, Planning, Medical informatics, Wireless communication systems, Internet in medicine, Telecommunication in medicine
- Format
- Document (PDF)
- Title
- A novel NN paradigm for the prediction of hematocrit value during blood transfusion.
- Creator
- Thakkar, Jay., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
During the Leukocytapheresis (LCAP) process used to treat patients suffering from acute Ulcerative Colitis, medical practitioners have to continuously monitor the Hematocrit (Ht) level in the blood to ensure it is within the acceptable range. The work done, as a part of this thesis, attempts to create an early warning system that can be used to predict if and when the Ht values will deviate from the acceptable range. To do this we have developed an algorithm based on the Group Method of Data...
Show moreDuring the Leukocytapheresis (LCAP) process used to treat patients suffering from acute Ulcerative Colitis, medical practitioners have to continuously monitor the Hematocrit (Ht) level in the blood to ensure it is within the acceptable range. The work done, as a part of this thesis, attempts to create an early warning system that can be used to predict if and when the Ht values will deviate from the acceptable range. To do this we have developed an algorithm based on the Group Method of Data Handling (GMDH) and compared it to other Neural Network algorithms, in particular the Multi Layer Perceptron (MLP). The standard GMDH algorithm captures the fluctuation very well but there is a time lag that produces larger errors when compared to MLP. To address this drawback we modified the GMDH algorithm to reduce the prediction error and produce more accurate results.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3174078
- Subject Headings
- Neural networks (Computer science), Scientific applications, GMDH algorithms, Pattern recognition systems, Genetic algorithms, Fuzzy logic
- Format
- Document (PDF)
- Title
- A pattern-driven process for secure service-oriented applications.
- Creator
- Delessy, Nelly A., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
During the last few years, Service-Oriented Architecture (SOA) has been considered to be the new phase in the evolution of distributed enterprise applications. Even though there is a common acceptance of this concept, a real problem hinders the widespread use of SOA : A methodology to design and build secure service-oriented applications is needed. In this dissertation, we design a novel process to secure service-oriented applications. Our contribution is original not only because it applies...
Show moreDuring the last few years, Service-Oriented Architecture (SOA) has been considered to be the new phase in the evolution of distributed enterprise applications. Even though there is a common acceptance of this concept, a real problem hinders the widespread use of SOA : A methodology to design and build secure service-oriented applications is needed. In this dissertation, we design a novel process to secure service-oriented applications. Our contribution is original not only because it applies the MDA approach to the design of service-oriented applications but also because it allows their securing by dynamically applying security patterns throughout the whole process. Security patterns capture security knowledge and describe security mechanisms. In our process, we present a structured map of security patterns for SOA and web services and its corresponding catalog. At the different steps of a software lifecycle, the architect or designer needs to make some security decisions., An approach using a decision tree made of security pattern nodes is proposed to help making these choices. We show how to extract a decision tree from our map of security patterns. Model-Driven Architecture (MDA) is an approach which promotes the systematic use of models during a system's development lifecycle. In the dissertation we describe a chain of transformations necessary to obtain secure models of the service-oriented application. A main benefit of this process is that it decouples the application domain expertise from the security expertise that are both needed to build a secure application. Security knowledge is captured by pre-defined security patterns, their selection is rendered easier by using the decision trees and their application can be automated. A consequence is that the inclusion of security during the software development process becomes more convenient for the architects/designers., A second benefit is that the insertion of security is semi-automated and traceable. Thus, the process is flexible and can easily adapt to changing requirements. Given that SOA was developed in order to provide enterprises with modular, reusable and adaptable architectures, but that security was the principal factor that hindered its use, we believe that our process can act as an enabler for service-oriented applications.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/FAU/58003
- Subject Headings
- Computer network architectures, Web servers, Management, Software engineering, Expert systems (Computer science)
- Format
- Document (PDF)
- Title
- An integrated component selection framework for system level design.
- Creator
- Calvert, Chad., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The increasing system design complexity is negatively impacting the overall system design productivity by increasing the cost and time of product development. One key to overcoming these challenges is exploiting Component Based Engineering practices. However it is a challenge to select an optimum component from a component library that will satisfy all system functional and non-functional requirements, due to varying performance parameters and quality of service requirements. In this thesis...
Show moreThe increasing system design complexity is negatively impacting the overall system design productivity by increasing the cost and time of product development. One key to overcoming these challenges is exploiting Component Based Engineering practices. However it is a challenge to select an optimum component from a component library that will satisfy all system functional and non-functional requirements, due to varying performance parameters and quality of service requirements. In this thesis we propose an integrated framework for component selection. The framework is a two phase approach that includes a system modeling and analysis phase and a component selection phase. Three component selection algorithms have been implemented for selecting components for a Network on Chip architecture. Two algorithms are based on a standard greedy method, with one being enhanced to produce more intelligent behavior. The third algorithm is based on simulated annealing. Further, a prototype was developed to evaluate the proposed framework and compare the performance of all the algorithms.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/368608
- Subject Headings
- High performance computing, Computer architecture, Engineering design, Data processing, Computer-aided design
- Format
- Document (PDF)