Current Search: Department of Computer and Electrical Engineering and Computer Science (x)
View All Items
Pages
- Title
- Performance of wireless communication systems under various data traffic density distributions.
- Creator
- Kyperountas, Spyros C., Florida Atlantic University, Aalo, Valentine A., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis is concerned with the performance analysis of mobile cellular systems under various distributions of portable users. The performance measure used is the average outage probability. Performance analysis is performed for macrocellular as well as microcellular systems, for different distributions of mobile users such as uniform, ring, and bell distribution. The outage probability is evaluated for systems with hexagonal, triangular, and square grid layouts. The effect of macroscopic...
Show moreThis thesis is concerned with the performance analysis of mobile cellular systems under various distributions of portable users. The performance measure used is the average outage probability. Performance analysis is performed for macrocellular as well as microcellular systems, for different distributions of mobile users such as uniform, ring, and bell distribution. The outage probability is evaluated for systems with hexagonal, triangular, and square grid layouts. The effect of macroscopic diversity on system performance is also considered. Finally, computer simulations are used to verify the evaluated results.
Show less - Date Issued
- 1998
- PURL
- http://purl.flvc.org/fcla/dt/15578
- Subject Headings
- Wireless communication systems, Cellular radio, Mobile communication systems
- Format
- Document (PDF)
- Title
- Performance analysis of K-means algorithm and Kohonen networks.
- Creator
- Syed, Afzal A., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
K-means algorithm and Kohonen network possess self-organizing characteristics and are widely used in different fields currently. The factors that influence the behavior of K-means are the choice of initial cluster centers, number of cluster centers and the geometric properties of the input data. Kohonen networks have the ability of self-organization without any prior input about the number of clusters to be formed. This thesis looks into the performances of these algorithms and provides a...
Show moreK-means algorithm and Kohonen network possess self-organizing characteristics and are widely used in different fields currently. The factors that influence the behavior of K-means are the choice of initial cluster centers, number of cluster centers and the geometric properties of the input data. Kohonen networks have the ability of self-organization without any prior input about the number of clusters to be formed. This thesis looks into the performances of these algorithms and provides a unique way of combining them for better clustering. A series of benchmark problem sets are developed and run to obtain the performance analysis of the K-means algorithm and Kohonen networks. We have attempted to obtain the better of these two self-organizing algorithms by providing the same problem sets and extract the best results based on the users needs. A toolbox, which is user-friendly and written in C++ and VC++ is developed for applications on both images and feature data sets. The tool contains K-means algorithm and Kohonen networks code for clustering and pattern classification.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/13112
- Subject Headings
- Self-organizing maps, Neural networks (Computer science), Cluster analysis--Computer programs, Computer algorithms
- Format
- Document (PDF)
- Title
- Performance analysis of a new object-based I/O architecture for PCs and workstations.
- Creator
- Huynh, Khoa Dang., Florida Atlantic University, Khoshgoftaar, Taghi M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In this dissertation, an object-based I/O architecture for personal computers (PCs) and workstations is proposed. The proposed architecture allows the flexibility of having I/O processing performed as much as possible by intelligent I/O adapters, or by the host processor, or by any processor in the system, depending on application requirements and underlying hardware capabilities. It keeps many good features of current I/O architectures, while providing more flexibility to take advantage of...
Show moreIn this dissertation, an object-based I/O architecture for personal computers (PCs) and workstations is proposed. The proposed architecture allows the flexibility of having I/O processing performed as much as possible by intelligent I/O adapters, or by the host processor, or by any processor in the system, depending on application requirements and underlying hardware capabilities. It keeps many good features of current I/O architectures, while providing more flexibility to take advantage of new hardware technologies, promote architectural openness, provide better performance and higher reliability. The proposed architecture introduces a new definition of I/O subsystems and makes use of concurrent object-oriented technology. It combines the notions of object and thread into something called an active object. All concurrency abstractions required by the proposed architecture are provided through external libraries on top of existing sequential object-oriented languages, without any changes to the syntax and semantics of these languages. We also evaluate the performance of optimal implementations of the proposed I/O architecture against other I/O architectures in three popular, PC-based, distributed environments: network file server, video server, and video conferencing. Using the RESearch Queueing Modeling Environment (RESQME), we have developed detailed simulation models for various implementations of the proposed I/O architecture and two other existing I/O architectures: a conventional, interrupt-based I/O architecture and a peer-to-peer I/O architecture. Our simulation results indicate that, on several different hardware platforms, the proposed I/O architecture outperforms both existing architectures in all three distributed environments considered.
Show less - Date Issued
- 1994
- PURL
- http://purl.flvc.org/fcla/dt/12386
- Subject Headings
- Local area networks (Computer networks), Computer input-output equipment, Computer networks, Videoconferencing, Client/server computing, Object-oriented programming (Computer science)
- Format
- Document (PDF)
- Title
- Performance analysis of a very fast packet switching system for broadband ISDN.
- Creator
- Rao, Radha Nallur Seshagiri., Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Rapid advances in technology have resulted in the evolution of Integrated Services Digital Networks (ISDNs) to Broadband ISDNs (BISDNs). This thesis discusses and evaluates the performance of a high speed and high capacity packet switching system architecture for BISDNs. This system supports various high speed communication services like data, voice, and video services. The main performance criterion is the mean switching delay, which is defined as the packet transfer delay through the bus...
Show moreRapid advances in technology have resulted in the evolution of Integrated Services Digital Networks (ISDNs) to Broadband ISDNs (BISDNs). This thesis discusses and evaluates the performance of a high speed and high capacity packet switching system architecture for BISDNs. This system supports various high speed communication services like data, voice, and video services. The main performance criterion is the mean switching delay, which is defined as the packet transfer delay through the bus and through the loop connecting various switch modules in the system. Other performance criteria are power and system throughput. The performance parameters are evaluated separately for both data and control (signaling) packets. The effects of the number of switch modules in the system, the data packet length, and the ratio of arrival rate of data to control packets are examined. It is observed that the switching delay and throughput increase with an increase in the traffic intensity for any number of switching modules and the ratio of arrival rate of data to control packets. The delay for data packets is found to be higher for lower values of this ratio and vice versa. The power is found to be maximum for about 70% load. The switching delay in this simulation model is found to be less than one millisecond for data packets.
Show less - Date Issued
- 1990
- PURL
- http://purl.flvc.org/fcla/dt/14603
- Subject Headings
- Packet switching (Data transmission), Integrated services digital networks, Broadband communication systems
- Format
- Document (PDF)
- Title
- Permutation-based transformations for digital multimedia encryption and steganography.
- Creator
- Socek, Daniel, Florida Atlantic University, Furht, Borko, Magliveras, Spyros S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The aim of this work is to explore the utilization of permutation-based transformations to achieve compression, encryption and steganography in the domain of digital videos. The main contribution of this dissertation is a novel type of digital video encryption that has several advantages over other currently available digital video encryption methods. An extended classification of digital video encryption algorithms is presented in order to clarify these advantages. The classification itself...
Show moreThe aim of this work is to explore the utilization of permutation-based transformations to achieve compression, encryption and steganography in the domain of digital videos. The main contribution of this dissertation is a novel type of digital video encryption that has several advantages over other currently available digital video encryption methods. An extended classification of digital video encryption algorithms is presented in order to clarify these advantages. The classification itself represents an original work, since to date, no such comprehensive classification is provided in known scientific literature. Both security and performance aspects of the proposed method are thoroughly analyzed to provide evidence for high security and performance efficiency. Since the basic model is feasible only for a certain class of video sequences and video codecs, several extensions providing broader applicability are described along with the basic algorithm. An additional significant contribution is the proposition of a novel type of digital video steganography based on disguising a given video by another video. Experimental results are generated for a number of video sequences to demonstrate the performance of proposed methods.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/12225
- Subject Headings
- Image processing--Security measures, Data encryption (Computer science), Computer security, Multimedia systems--Security measures
- Format
- Document (PDF)
- Title
- PERFORMANCE EVALUATION OF A RIDGE 32 COMPUTER SYSTEM (RISC (REDUCED INSTRUCTION SET COMPUTER)).
- Creator
- YOON, SEOK TAE., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
As a new trend in designing a computer architecture, Reduced Instruction set Computers(RISC) have been proposed recently. This thesis reviews the new design approach behind the RISC and discuss the controversy between the proponents of the RISC approach and those of the traditional Complex Instruction set COmputer(CISC) approach. Ridge 32 is selected as a case study of the RISCs. Architectural parameters to evaluate the computer performance are considered to analyze the performance of the...
Show moreAs a new trend in designing a computer architecture, Reduced Instruction set Computers(RISC) have been proposed recently. This thesis reviews the new design approach behind the RISC and discuss the controversy between the proponents of the RISC approach and those of the traditional Complex Instruction set COmputer(CISC) approach. Ridge 32 is selected as a case study of the RISCs. Architectural parameters to evaluate the computer performance are considered to analyze the performance of the Ridge 32. A simulator for the Ridge 32 was implemented in PASCAL as a way of measuring those parameters. Measurement results on the several selected benchmark programs are given and analyzed to evaluate the characteristics of the Ridge 32.
Show less - Date Issued
- 1986
- PURL
- http://purl.flvc.org/fcla/dt/14348
- Subject Headings
- Computer architecture, Microprocessors
- Format
- Document (PDF)
- Title
- Prediction of software quality using classification tree modeling.
- Creator
- Naik, Archana B., Florida Atlantic University, Khoshgoftaar, Taghi M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Reliability of software systems is one of the major concerns in today's world as computers have really become an integral part of our lives. Society has become so dependent on reliable software systems that failures can be dangerous in terms of worsening a company's business, human relationships or affecting human lives. Software quality models are tools for focusing efforts to find faults early in the development. In this experiment, we used classification tree modeling techniques to predict...
Show moreReliability of software systems is one of the major concerns in today's world as computers have really become an integral part of our lives. Society has become so dependent on reliable software systems that failures can be dangerous in terms of worsening a company's business, human relationships or affecting human lives. Software quality models are tools for focusing efforts to find faults early in the development. In this experiment, we used classification tree modeling techniques to predict the software quality by classifying program modules either as fault-prone or not fault-prone. We introduced the Classification And Regression Trees (scCART) algorithm as a tool to generate classification trees. We focused our experiments on very large telecommunications system to build quality models using set of product and process metrics as independent variables.
Show less - Date Issued
- 1998
- PURL
- http://purl.flvc.org/fcla/dt/15600
- Subject Headings
- Computer software--Quality control, Computer software--Evaluation, Software measurement
- Format
- Document (PDF)
- Title
- Power system modeling and optimization methods vis-a-vis integrated resource planning (IRP).
- Creator
- Arsali, Mohammad H., Florida Atlantic University, Neelakanta, Perambur S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The state-of-the-art restructuring of power industries is changing the fundamental nature of retail electricity business. As a result, the so-called Integrated Resource Planning (IRP) strategies implemented on electric utilities are also undergoing modifications. Such modifications evolve from the imminent considerations to minimize the revenue requirements and maximize electrical system reliability vis-a-vis capacity-additions (viewed as potential investments). IRP modifications also provide...
Show moreThe state-of-the-art restructuring of power industries is changing the fundamental nature of retail electricity business. As a result, the so-called Integrated Resource Planning (IRP) strategies implemented on electric utilities are also undergoing modifications. Such modifications evolve from the imminent considerations to minimize the revenue requirements and maximize electrical system reliability vis-a-vis capacity-additions (viewed as potential investments). IRP modifications also provide service-design bases to meet the customer needs towards profitability. The purpose of this research as deliberated in this dissertation is to propose procedures for optimal IRP intended to expand generation facilities of a power system over a stretched period of time. Relevant topics addressed in this research towards IRP optimization are as follows: (1) Historical prospective and evolutionary aspects of power system production-costing models and optimization techniques; (2) A survey of major U.S. electric utilities adopting IRP under changing socioeconomic environment; (3) A new technique designated as the Segmentation Method for production-costing via IRP optimization; (4) Construction of a fuzzy relational database of a typical electric power utility system for IRP purposes; (5) A genetic algorithm based approach for IRP optimization using the fuzzy relational database.
Show less - Date Issued
- 1998
- PURL
- http://purl.flvc.org/fcla/dt/12567
- Subject Headings
- Electric utilities--United States, Electric power system--United States
- Format
- Document (PDF)
- Title
- Multivariate modeling of software engineering measures.
- Creator
- Lanning, David Lee., Florida Atlantic University, Khoshgoftaar, Taghi M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
One goal of software engineers is to produce software products. An additional goal, that the software production must lead to profit, releases the power of the software product market. This market demands high quality products and tight cycles in the delivery of new and enhanced products. These market conditions motivate the search for engineering methods that help software producers ship products quicker, at lower cost, and with fewer defects. The control of software defects is key to...
Show moreOne goal of software engineers is to produce software products. An additional goal, that the software production must lead to profit, releases the power of the software product market. This market demands high quality products and tight cycles in the delivery of new and enhanced products. These market conditions motivate the search for engineering methods that help software producers ship products quicker, at lower cost, and with fewer defects. The control of software defects is key to meeting these market conditions. Thus, many software engineering tasks are concerned with software defects. This study considers two sources of variation in the distribution of software defects: software complexity and enhancement activity. Multivariate techniques treat defect activity, software complexity, and enhancement activity as related multivariate concepts. Applied techniques include principal components analysis, canonical correlation analysis, discriminant analysis, and multiple regression analysis. The objective of this study is to improve our understanding of software complexity and software enhancement activity as sources of variation in defect activity, and to apply this understanding to produce predictive and discriminant models useful during testing and maintenance tasks. These models serve to support critical software engineering decisions.
Show less - Date Issued
- 1994
- PURL
- http://purl.flvc.org/fcla/dt/12383
- Subject Headings
- Software engineering, Computer software--Testing, Computer software--Quality control
- Format
- Document (PDF)
- Title
- OPTIMAL SCHEDULING OF PROCESSES FOR A NETWORK OF TRANSPUTERS (MULTIPROCESSOR, OCCAM, CONCURRENT PROCESSING).
- Creator
- NGO, TON ANH., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Concurrency at both the hardware and software level has recently been considered as the solution to the classic Von Neuman bottleneck in system design. Introduced by Inmos, the Occam language and the Transputer microprocessor provide simple and elegant building blocks for a concurrent system. This thesis proposes a set of algorithms to find an optimal deterministic schedule for an Occam program executed on a network of Transputers. Also discussed are features of the network relevant to the...
Show moreConcurrency at both the hardware and software level has recently been considered as the solution to the classic Von Neuman bottleneck in system design. Introduced by Inmos, the Occam language and the Transputer microprocessor provide simple and elegant building blocks for a concurrent system. This thesis proposes a set of algorithms to find an optimal deterministic schedule for an Occam program executed on a network of Transputers. Also discussed are features of the network relevant to the problem of scheduling, and a complete example is provided to illustrate the scheduler. The approaches described can be used as a basis for implementing a flexible general purpose multiprocessor system.
Show less - Date Issued
- 1986
- PURL
- http://purl.flvc.org/fcla/dt/14351
- Subject Headings
- Multiprocessors, Computer networks
- Format
- Document (PDF)
- Title
- Object-oriented models for manufacturing inventory control systems.
- Creator
- Peng, ZhiWei., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The inventory is a key element in modern manufacturing systems. We present here object-oriented manufacturing inventory models, including detailed static and dynamic models. Three different representations of the object model are presented and compared. Two case studies are given to verify the extensibility and reusability of the models. One of the models is developed into a pattern, that can be used as a prototype for similar type of systems, e.g., an inventory of the books in a library....
Show moreThe inventory is a key element in modern manufacturing systems. We present here object-oriented manufacturing inventory models, including detailed static and dynamic models. Three different representations of the object model are presented and compared. Two case studies are given to verify the extensibility and reusability of the models. One of the models is developed into a pattern, that can be used as a prototype for similar type of systems, e.g., an inventory of the books in a library. Comparison of our inventory model with other inventory data models is also presented.
Show less - Date Issued
- 1997
- PURL
- http://purl.flvc.org/fcla/dt/15394
- Subject Headings
- Object-oriented methods (Computer science), Inventory control
- Format
- Document (PDF)
- Title
- Object-oriented analysis and design of a serial peripheral interface monitor.
- Creator
- Scharf, Sherri Hannah., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Presented here is an object-oriented design for a real-time system used to monitor bus activity on a microcontroller via a PC. This system could prove to be an inexpensive and user-friendly alternative to existing hardware used for this purpose. The use of an object-oriented design methodology and the application of two Model-View-Controller architectures as well as a layered approach aided in producing a system composed of reusable components that is flexible and easily extensible....
Show morePresented here is an object-oriented design for a real-time system used to monitor bus activity on a microcontroller via a PC. This system could prove to be an inexpensive and user-friendly alternative to existing hardware used for this purpose. The use of an object-oriented design methodology and the application of two Model-View-Controller architectures as well as a layered approach aided in producing a system composed of reusable components that is flexible and easily extensible. Additionally, a reusable pattern can be extracted from the architecture presented here that could be utilized in designing similar software applications for communicating with peripheral hardware devices.
Show less - Date Issued
- 1998
- PURL
- http://purl.flvc.org/fcla/dt/15538
- Subject Headings
- Object-oriented methods (Computer science), User interfaces (Computer systems)
- Format
- Document (PDF)
- Title
- Polling models: Decomposition of waiting times and effects of switchover and setup times.
- Creator
- Yehia, Ramzi Riad., Florida Atlantic University, Cooper, Robert B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A polling model is a queueing model in which a single server visits N queues, traveling from queue to queue and "polling" each queue to ascertain whether customers are waiting to be served. When the server leaves a queue, it requires a switchover time to move to the next queue in the polling sequence; then, it requires a setup time to prepare to serve the customers in the polled queue. Two particular models are of interest. In the state-independent (SI) model, the server sets up whether or...
Show moreA polling model is a queueing model in which a single server visits N queues, traveling from queue to queue and "polling" each queue to ascertain whether customers are waiting to be served. When the server leaves a queue, it requires a switchover time to move to the next queue in the polling sequence; then, it requires a setup time to prepare to serve the customers in the polled queue. Two particular models are of interest. In the state-independent (SI) model, the server sets up whether or not there are customers waiting in the polled queue at the polling epoch, whereas in the state-dependent (SD) model, the server will not set up if the polled queue is empty. Recently, it was discovered that a decomposition phenomenon applies to switchover times in some polling models. It was proved for the cyclic exhaustive-service and gated-service polling models that the mean waiting time in the nonzero-switchover-time model can be decomposed into two terms, (i) the mean waiting time in a "corresponding" zero switchover-times model, and (ii) a term that depends essentially on only the sum of the mean switchover times per cycle. Another interesting phenomenon of polling models, discovered via numerical examples, is that reducing setup (or switchover) times in the SI model can, surprisingly, produce an increase in mean waiting times (Anomaly1, AN1). Equations were derived that explicitly characterize this anomaly. Also, numerical analysis of a 2-queue model showed that the SD model sometimes produces larger mean waiting times than the corresponding SI model (Anomaly 2, AN2). Explicit characterization of this anomaly for the symmetric case was done. In this dissertation we analyze and give extensions of both phenomena: decomposition and effects of setup time. Our contributions include: (1) We extend the decomposition theorem to include polling according to an order table (PAOT). (2) We generalize the decomposition theorem through providing a basic proof that applies to a variety of polling models. Models considered include (1) PAOT, (2) binomial service, (3) batch arrivals and (4) random polling. (3) We analyze the PAOT model using the buffer occupancy approach. This approach produces a set of equations that are applicable to our generalized proof of the decomposition theorem. (4) We prove that AN1 applies to the PAOT model, and use these results to obtain explicit formulas for the symmetric case that characterize this anomaly in the SI model. (5) We show via simulation that, under certain conditions, the anomalous result AN1, and AN2 uncovered for the SD model when N = 2 persist for models with N > 2.
Show less - Date Issued
- 1998
- PURL
- http://purl.flvc.org/fcla/dt/12577
- Subject Headings
- Queuing theory
- Format
- Document (PDF)
- Title
- Remote database access over Internet in Windows environment.
- Creator
- Ren, Yongjian., Florida Atlantic University, Hsu, Sam, Solomon, Martin K., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis deals with remote database access over the Internet. Three different approaches to remote database access, the CGI-based approach, the Oracle Webserver-based approach and the CORBA-based approach, are discussed. Experiments are conducted to compare the pros and cons of each approach. The Oracle database and Microsoft Access database are utilized as the target database systems. For the CGI-based approach, the CGI programs are coded with ProC, Oracle's SQL-embedded C language, in...
Show moreThis thesis deals with remote database access over the Internet. Three different approaches to remote database access, the CGI-based approach, the Oracle Webserver-based approach and the CORBA-based approach, are discussed. Experiments are conducted to compare the pros and cons of each approach. The Oracle database and Microsoft Access database are utilized as the target database systems. For the CGI-based approach, the CGI programs are coded with ProC, Oracle's SQL-embedded C language, in Microsoft Visual C++ developer's studio, and a Student Record example is demonstrated. For the Oracle Webserver-based approach, the Oracle Webserver 1.1 has been setup and an Online Shopping Club example is demonstrated. For the CORBA-based approach, Orbix Web 2.0.1 and JDK 1.1.1 are utilized as the CORBA system and the development language, respectively, and several examples including single server, multiple servers and multiple databases are presented. An extended SQL syntax is proposed to manipulate data from multiple database systems residing on different hosts in one SQL statement. The implementation of extended SQL statements in CORBA's server/client application is also suggested. With the help of extended SQL syntax and CORBA's multiple server access feature, an example of the client application accessing two databases at a time is illustrated. The pros and cons are discussed of the three remote database access approaches studied in the thesis: (I) The CGI-based approach, which is the most generic and widely used approach. (II) The Oracle Webserver approach, which is a relatively simplified way of the CGI approach, easy to apply but limited in applications. (III) The CORBA-based approach, which is the most powerful and sophisticated approach for remote database access.
Show less - Date Issued
- 1998
- PURL
- http://purl.flvc.org/fcla/dt/15590
- Subject Headings
- Database management, World Wide Web, Microsoft network (Online service)
- Format
- Document (PDF)
- Title
- Security in voice over IP networks.
- Creator
- Pelaez, Juan C., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Voice over IP (VoIP) is revolutionizing the global communications system by allowing human voice and fax information to travel over existing packet data networks along with traditional data packets. The convergence of voice and data in one simplified network brings both benefits and constraints to users. Among the several issues that need to be addressed when deploying this technology, security is one of the most critical. This thesis will present a combination of security patterns based on...
Show moreVoice over IP (VoIP) is revolutionizing the global communications system by allowing human voice and fax information to travel over existing packet data networks along with traditional data packets. The convergence of voice and data in one simplified network brings both benefits and constraints to users. Among the several issues that need to be addressed when deploying this technology, security is one of the most critical. This thesis will present a combination of security patterns based on the systematic analysis of attacks against a VoIP network and the existing techniques to mitigate these attacks, providing good practices for all IP telephony systems. The VoIP Security Patterns which are based on object-oriented modeling, will help network designers to improve the level of security not only in voice but also in data, video, and fax over IP networks.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/13190
- Subject Headings
- Internet telephony--Security measures, Computer network protocols, Multimedia systems
- Format
- Document (PDF)
- Title
- Security Enhancement in Plastic Cards Using an Invisible "Watermark" Emulated by an Embedded set of Electromagnetic Material: An Overlay Strategy to Prevailing Security Features.
- Creator
- Lim, Swee Hock, Neelakanta, Perambur S., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis addresses a passive, economical strategy towards enhancing the security feature of conventional plastic cards by embedding a set of electromagnetic (EM) material that emulates an invisible "watermarking". It is an overlay strategy to prevailing security measures. Proposed method consists of incorporating (embedding) a set of metallic (foil-like) sheet of high-mu material or high-conductivity metal, or a conducting-fiber interwoven fabric. The test card when exposed to a suitable...
Show moreThis thesis addresses a passive, economical strategy towards enhancing the security feature of conventional plastic cards by embedding a set of electromagnetic (EM) material that emulates an invisible "watermarking". It is an overlay strategy to prevailing security measures. Proposed method consists of incorporating (embedding) a set of metallic (foil-like) sheet of high-mu material or high-conductivity metal, or a conducting-fiber interwoven fabric. The test card when exposed to a suitable excitation of high frequency EM excitation (with or without superimposing a static magnetic field), the plastic part yields a distinct path-reluctance to the EM energy when compared to the embedded EM material section. Sensing the resulting EM reaction with an appropriate circuit, delivers an output signal depicting the presence of the embedded "watermarking" and any encoded signature in it. The underlying concept is theoretically analyzed, relevant card-reading methods are suggested and prototype (experimental) results are presented.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012534
- Subject Headings
- Crime prevention, Multimedia systems, Information security applications, Digital watermarking
- Format
- Document (PDF)
- Title
- Reliability modeling of fault-tolerant software.
- Creator
- Leu, Shao-Wei., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
We have developed reliability models for a variety of fault-tolerant software constructs including those based on two well-known methodologies: recovery block and N-version programming, and their variations. We also developed models for the conversation scheme which provides fault tolerance for concurrent software and a newly proposed system architecture, the recovery metaprogram, which attempts to unify most of the existing fault-tolerant strategies. Each model is evaluated using either GSPN...
Show moreWe have developed reliability models for a variety of fault-tolerant software constructs including those based on two well-known methodologies: recovery block and N-version programming, and their variations. We also developed models for the conversation scheme which provides fault tolerance for concurrent software and a newly proposed system architecture, the recovery metaprogram, which attempts to unify most of the existing fault-tolerant strategies. Each model is evaluated using either GSPN, a software package based on Generalized Stochastic Petri Nets, or Sharpe, an evaluation tool for Markov models. The numerical results are then analyzed and compared. Major results derived from this process include the identification of critical parameters for each model, the comparisons of relative performance among different software constructs, the justification of a preliminary approach to the modeling of complex conversations, and the justification of recovery metaprogram regarding improvement of reliability.
Show less - Date Issued
- 1990
- PURL
- http://purl.flvc.org/fcla/dt/12256
- Subject Headings
- Fault-tolerant computing, Computer software--Reliability
- Format
- Document (PDF)
- Title
- Secure access of legacy databases from the Web using CORBA.
- Creator
- Xue, Richard Zhihuai., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
After comparing general architectures for accessing business databases from the Web, we propose a platform-independent, language-independent, object-oriented, fourtier CORBA-based architecture. The proposed architecture is presented in pattern format. Several security mechanisms are incorporated into the proposed architecture. A Web Reservation System (WRS) was created to test this architecture. Starting from an analysis pattern, a design model for the WRS was developed using the CORBA Object...
Show moreAfter comparing general architectures for accessing business databases from the Web, we propose a platform-independent, language-independent, object-oriented, fourtier CORBA-based architecture. The proposed architecture is presented in pattern format. Several security mechanisms are incorporated into the proposed architecture. A Web Reservation System (WRS) was created to test this architecture. Starting from an analysis pattern, a design model for the WRS was developed using the CORBA Object Request Broker (ORB); this was a Virtual Car Reservation System (VCRS). In the VCRS system, a user can get a reservation number when necessary information is entered from a Web browser. The user can also retrieve the reservation information by using the reservation number. All reservation information is stored in a distributed database system at a remote site. A realistic application of the proposed architecture is also described. We also provide an evaluation and comparison of the proposed architecture with other architectures.
Show less - Date Issued
- 2000
- PURL
- http://purl.flvc.org/fcla/dt/15756
- Subject Headings
- Computer security, CORBA (Computer architecture), World Wide Web, Distributed databases, Internet, Business--Data processing
- Format
- Document (PDF)
- Title
- Robot singularities under small perturbations in the kinematic parameters.
- Creator
- Mohile, Ajey Avinash., Florida Atlantic University, Roth, Zvi S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
When small perturbations in the kinematic parameters of a robot are taken into consideration, the model of a robot no longer contains perfect parallelism and perpendicularity that makes the nominal inverse kinematics so simple. In particular, the effect of joint axis misalignments and small perturbations in the kinematic parameters on the robot singularities is of interest. This aspect is particularly important when planning the workspace of a robot that must undergo calibration. To utilize...
Show moreWhen small perturbations in the kinematic parameters of a robot are taken into consideration, the model of a robot no longer contains perfect parallelism and perpendicularity that makes the nominal inverse kinematics so simple. In particular, the effect of joint axis misalignments and small perturbations in the kinematic parameters on the robot singularities is of interest. This aspect is particularly important when planning the workspace of a robot that must undergo calibration. To utilize the work volume most efficiently, one must know exactly what points are permissible as taught points. In other words, reachable workspace must be clearly defined to avoid the robot from entering the singularity zones not only of the nominal robot but also of all future actual robots. Once singularity zones for the actual robot are correctly identified, workspace planning becomes a simple task. In this thesis the relationship between small perturbations in kinematic parameters and singularities of a simple three-revolute articulated arm are studied. It is shown that singularities in such a robot do shift to new locations.
Show less - Date Issued
- 1989
- PURL
- http://purl.flvc.org/fcla/dt/14476
- Subject Headings
- Robots--Dynamics, Robots--Motion
- Format
- Document (PDF)
- Title
- PALSAM INPUT DATA FILE GENERATOR.
- Creator
- ROBINSON, WILLIAM ROBERT, JR., Florida Atlantic University, Marcovitz, Alan B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The capabilities and limitations of Programmable Array Logic devices (PALs) are presented and compared to other logic devices. PALs are field programmable devices and a program called PALSAM exists to assist the designer in programming PALs. The attributes and limitations of PALSAM are discussed. The PALSAM Input Data File Generator program was written to eliminate many of the limitations of PALSAM. The need for an algorithmic method of reducing a general logic expression to a minimal sum-of...
Show moreThe capabilities and limitations of Programmable Array Logic devices (PALs) are presented and compared to other logic devices. PALs are field programmable devices and a program called PALSAM exists to assist the designer in programming PALs. The attributes and limitations of PALSAM are discussed. The PALSAM Input Data File Generator program was written to eliminate many of the limitations of PALSAM. The need for an algorithmic method of reducing a general logic expression to a minimal sum-of-products form is demonstrated. Several algorithms are discussed. The Zissos, Duncan and Jones Algorithm, which claims to produce a minimal sum-of-products expression but is presented without proof by its authors, is disproved by example. A modification of this algorithm is presented without proof. When tested in the 276 possible cases involving up to three variables, this new algorithm always produced a minimal sum-of-products expression, while the original algorithm failed in six of these cases. Finally, the PALSAM Input Data File Generator program which uses the modified algorithm is presented and documented.
Show less - Date Issued
- 1984
- PURL
- http://purl.flvc.org/fcla/dt/14199
- Subject Headings
- Programmable array logic, Microprocessors--Programming, Algorithms
- Format
- Document (PDF)