Current Search: Department of Computer and Electrical Engineering and Computer Science (x)
View All Items
Pages
- Title
- A neural network-based receiver for interference cancellation in multi-user environment for DS/CDMA systems.
- Creator
- Shukla, Kunal Hemang., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The objective of this work is to apply and investigate the performance of a neural network-based receiver for interference cancellation in multiuser direct sequence code division multiple access (DSCDMA) wireless networks. This research investigates a Receiver model which uses Neural Network receiver in combination with a conventional receiver system to provide an efficient mechanism for the Interference Suppression in DS/CDMA systems. The Conventional receiver is used for the time during...
Show moreThe objective of this work is to apply and investigate the performance of a neural network-based receiver for interference cancellation in multiuser direct sequence code division multiple access (DSCDMA) wireless networks. This research investigates a Receiver model which uses Neural Network receiver in combination with a conventional receiver system to provide an efficient mechanism for the Interference Suppression in DS/CDMA systems. The Conventional receiver is used for the time during which the neural network receiver is being trained. Once the NN receiver is trained the conventional receiver system is deactivated. It is demonstrated that this receiver when used along with an efficient Neural network model can outperform MMSE receiver or DFFLE receiver with significant advantages, such as improved bit-error ratio (BER) performance, adaptive operation, single-user detection in DS/CDMA environment and a near far resistant system.
Show less - Date Issued
- 2003
- PURL
- http://purl.flvc.org/fcla/dt/12975
- Subject Headings
- Neural networks (Computer science), Wireless communication systems, Code division multiple access
- Format
- Document (PDF)
- Title
- A metrics-based software quality modeling tool.
- Creator
- Rajeevalochanam, Jayanth Munikote., Florida Atlantic University, Khoshgoftaar, Taghi M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In today's world, high reliability has become an essential component of almost every software system. However, since the reliability-enhancement activities entail enormous costs, software quality models, based on the metrics collected early in the development life cycle, serve as handy tools for cost-effectively guiding such activities to the software modules that are likely to be faulty. Case-Based Reasoning (CBR) is an attractive technique for software quality modeling. Software Measurement...
Show moreIn today's world, high reliability has become an essential component of almost every software system. However, since the reliability-enhancement activities entail enormous costs, software quality models, based on the metrics collected early in the development life cycle, serve as handy tools for cost-effectively guiding such activities to the software modules that are likely to be faulty. Case-Based Reasoning (CBR) is an attractive technique for software quality modeling. Software Measurement Analysis and Reliability Toolkit (SMART) is a CBR tool customized for metrics-based software quality modeling. Developed for the NASA IV&V Facility, SMART supports three types of software quality models: quantitative quality prediction, classification, and module-order models. It also supports a goal-oriented selection of classification models. An empirical case study of a military command, control, and communication system demonstrates the accuracy and usefulness of SMART, and also serves as a user-guide for the tool.
Show less - Date Issued
- 2002
- PURL
- http://purl.flvc.org/fcla/dt/12967
- Subject Headings
- Software measurement, Computer software--Quality control, Case-based reasoning
- Format
- Document (PDF)
- Title
- A noninvasive technique for early detection of atherosclerosis using the impedance plethysmograph: Longitudinal study on cynomolgus monkeys.
- Creator
- Kolluri, Sai M. S., Florida Atlantic University, Shankar, Ravi, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This study evaluates the use of an electrical impedance plethysmograph as a noninvasive technique for early detection of atherosclerosis. The instrument is inexpensive, easily portable and causes no health risks. Thus, the system is ideally suited for mass screemng and epidemiological studies, if proven to be effective. We have conducted experiments usmg a three-channel impedance plethysmograph once every 8 - 10 weeks on a colony of 20 male cynomolgus monkeys (macaca fascicularis). Five...
Show moreThis study evaluates the use of an electrical impedance plethysmograph as a noninvasive technique for early detection of atherosclerosis. The instrument is inexpensive, easily portable and causes no health risks. Thus, the system is ideally suited for mass screemng and epidemiological studies, if proven to be effective. We have conducted experiments usmg a three-channel impedance plethysmograph once every 8 - 10 weeks on a colony of 20 male cynomolgus monkeys (macaca fascicularis). Five monkeys were on a control diet (monkey chow) and fifteen on a high cholesterol diet (1 mg cholesterol/Kcal with 40% of the calories derived from fat). The diet period for the monkeys ranged from 16-28 months (25 months typically). We wrapped a pressure cuff with one pair of electrodes around the upper left leg of the monkey. Two other sets of electrodes were wrapped, one distal to the pressure cuff on the lower left leg and the other as reference on the upper arm. We measured impedance pulses at these three different sites simultaneously using a three channel impedance plethysmograph. The signals were recorded when the pressure in the pressure cuff was changed from 200 mm Hg to 20 mm Hg in steps of 10 mm Hg. Arterial volume change was evaluated from this. Experiments were repeated with the cuffed segment on the right leg, and then on the left arm. The arterial volume change vs cuff pressure (V- Pc) characteristics were used to follow the progression of the disease. The V- Pc characteristic, initially with a well defined peak, changed to a flatter characteristic with increased period on the cholesterol diet. Monkeys on the control diet showed no flattening of the curve with time. In order to understand theoretically the effect of disease on the compliance - transmural pressure (C-Pt) characteristic (and hence V - Pc characteristic), we developed an arterial model to study the pressure - radius relationship of an artery under different disease states. We have also developed an expression for the equivalent incremental modulus of elasticity based on the incremental modulus of elasticity of the individual arterial wall layers. The resulting expressions were used to study the effect of increase in stenosis and calcification on the V - Pc and C-Pt characteristics. The simulation results obtained using the arterial model match our experimentally observed data of decrease m peak compliance with disease. The peak compliance was seen to decrease m amplitude and shift left (towards decreasing transmural pressure) as the artery got thicker with atherosclerotic disease. The V - Pc characteristic, initially with a well defined peak, got flatter with disease. Our simulation results lead us to believe that the noninvasive technique 1s sensitive enough to follow progressiOn of the atherosclerotic disease. Morphometric and histochemical data were collected subsequent to the sacrifice of the monkeys. Evaluation of these data and correlations with our compliance data will lead us to a more definitive statement on the method's sensitivity. This however, is beyond the scope of this dissertation.
Show less - Date Issued
- 1991
- PURL
- http://purl.flvc.org/fcla/dt/12281
- Subject Headings
- Impedance plethysmography, Atherosclerosis--Diagnosis, Atherosclerosis--Animal models, Impedance, Bioelectric, Diagnosis, Noninvasive
- Format
- Document (PDF)
- Title
- A new methodology to predict certain characteristics of stock market using time-series phenomena.
- Creator
- Shah, Trupti U., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The goal of time series forecasting is to identify the underlying pattern and use these patterns to predict the future path of the series. To capture the future path of a dynamic stock market variable is one of the toughest challenges. This thesis is about the development of a new methodology in financial forecasting. An effort is made to develop a neural network forecaster using time-series phenomena. The main outcome of this new approach for financial forecasting is a systematic way of...
Show moreThe goal of time series forecasting is to identify the underlying pattern and use these patterns to predict the future path of the series. To capture the future path of a dynamic stock market variable is one of the toughest challenges. This thesis is about the development of a new methodology in financial forecasting. An effort is made to develop a neural network forecaster using time-series phenomena. The main outcome of this new approach for financial forecasting is a systematic way of constructing a Neural Network Forecaster for nonlinear and non-stationary time-series data that leads to very good out-of-sample prediction. The tool used for the validation of this research is "Brainmaker". This thesis also contains a small survey of available tools used for financial forecasting.
Show less - Date Issued
- 1999
- PURL
- http://purl.flvc.org/fcla/dt/15677
- Subject Headings
- Time-series analysis, Neural networks (Computer science), Stock price forecasting
- Format
- Document (PDF)
- Title
- The notion of aggregation.
- Creator
- Saksena, Monika., Florida Atlantic University, France, Robert B., Larrondo-Petrie, Maria M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Most popular object-oriented modeling techniques (OOMTs) provide good support for the creation of conceptual models of system behavior and structure. A serious drawback of these techniques is that the concepts and notations used are not rigorously defined. This can lead to the creation of ambiguous models, and to disagreements over the proper use and interpretation of modeling constructs. An important modeling construct that is often loosely defined is aggregation. This thesis presents a...
Show moreMost popular object-oriented modeling techniques (OOMTs) provide good support for the creation of conceptual models of system behavior and structure. A serious drawback of these techniques is that the concepts and notations used are not rigorously defined. This can lead to the creation of ambiguous models, and to disagreements over the proper use and interpretation of modeling constructs. An important modeling construct that is often loosely defined is aggregation. This thesis presents a precise characterization of aggregation that can help developers identify appropriate applications of the concept. Our characterization is the result of careful analysis of literature on conceptual modeling, knowledge representation and object-oriented (OO) modeling. We discuss primary and secondary properties of aggregation and propose annotations for UML (Unified Modeling Language). An extensive discussion of the more useful patterns of aggregation helps developers pick a suitable prescription of aggregation.
Show less - Date Issued
- 1998
- PURL
- http://purl.flvc.org/fcla/dt/15537
- Subject Headings
- Object-oriented methods (Computer science), UML (Computer science)
- Format
- Document (PDF)
- Title
- A study of Internet-based control of processes.
- Creator
- Popescu, Cristian., Florida Atlantic University, Zhuang, Hanqi, Wang, Yuan, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In certain applications, one needs to control physical plants that operate in hazardous conditions. In such situations, it is necessary to acquire access to the controller from a different (remote) location through data communication networks, in order to interconnect the remote location and the controller. The use of such network linking between the plant and the controller may introduce network delays, which would affect adversely the performance of the process control. The main theoretical...
Show moreIn certain applications, one needs to control physical plants that operate in hazardous conditions. In such situations, it is necessary to acquire access to the controller from a different (remote) location through data communication networks, in order to interconnect the remote location and the controller. The use of such network linking between the plant and the controller may introduce network delays, which would affect adversely the performance of the process control. The main theoretical contribution of this thesis is to answer the following question: How large can a network delay be tolerated such that the delayed closed-loop system is locally asymptotically stable? An explicit time-independent bound for the delay is derived. In addition, various practical realizations for the remote control tasks are presented, utilizing a set of predefined classes for serial communication, data-acquisition modules and stream-based sockets. Due to the presence of a network, implementing an efficient control scheme is a not trivial problem. Hence, two practical frameworks for Internet-based control are illustrated in this thesis. Related implementation issues are addressed in detail. Examples and case studies are provided to demonstrate the effectiveness of the proposal approach.
Show less - Date Issued
- 2003
- PURL
- http://purl.flvc.org/fcla/dt/13073
- Subject Headings
- Time delay systems, Process control, Computer networks--Remote access, World Wide Web
- Format
- Document (PDF)
- Title
- A simplistic approach to reactive multi-robot navigation in unknown environments.
- Creator
- MacKunis, William Thomas., Florida Atlantic University, Raviv, Daniel, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Multi-agent control is a very promising area of robotics. In applications for which it is difficult or impossible for humans to intervene, the utilization of multi-agent, autonomous robot groups is indispensable. This thesis presents a novel approach to reactive multi-agent control that is practical and elegant in its simplicity. The basic idea upon which this approach is based is that a group of robots can cooperate to determine the shortest path through a previously unmapped environment by...
Show moreMulti-agent control is a very promising area of robotics. In applications for which it is difficult or impossible for humans to intervene, the utilization of multi-agent, autonomous robot groups is indispensable. This thesis presents a novel approach to reactive multi-agent control that is practical and elegant in its simplicity. The basic idea upon which this approach is based is that a group of robots can cooperate to determine the shortest path through a previously unmapped environment by virtue of redundant sharing of simple data between multiple agents. The idea was implemented with two robots. In simulation, it was tested with over sixty agents. The results clearly show that the shortest path through various environments emerges as a result of redundant sharing of information between agents. In addition, this approach exhibits safeguarding techniques that reduce the risk to robot agents working in unknown and possibly hazardous environments. Further, the simplicity of this approach makes implementation very practical and easily expandable to reliably control a group comprised of many agents.
Show less - Date Issued
- 2003
- PURL
- http://purl.flvc.org/fcla/dt/13013
- Subject Headings
- Robots--Control systems, Intelligent control systems, Genetic algorithms, Parallel processing (Electronic computers)
- Format
- Document (PDF)
- Title
- A transputer-based fault-tolerant robot controller.
- Creator
- Kulkarni, Shubhada R., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In recent years robots have become increasingly important in many areas. A robotic controller requires high speed and high reliability and its design must continue these two aspects. This thesis presents a design for a Transputer based fault tolerant robot controller. For concreteness, we have designed this controller for a specific robot, the SEDAB, a prototype developed by IBM Corp. This design attempts to satisfy the two requirements of speed and reliability. Speed is achieved by the use...
Show moreIn recent years robots have become increasingly important in many areas. A robotic controller requires high speed and high reliability and its design must continue these two aspects. This thesis presents a design for a Transputer based fault tolerant robot controller. For concreteness, we have designed this controller for a specific robot, the SEDAB, a prototype developed by IBM Corp. This design attempts to satisfy the two requirements of speed and reliability. Speed is achieved by the use of a concurrent structure composed of Transputers. Reliability is provided by a self-testing mechanism and a multiprocessor system architecture. The Occam implementation of the robot processes is described. We have evaluated the reliability of this controller. The reliability study shows that there is a significant increase in the reliability of this controller due to the new architecture and proposed fault detection mechanism. While we have not been able to actually control this robot, we have shown that some scheduling heuristics can be effectively used to provide a higher level of performance.
Show less - Date Issued
- 1990
- PURL
- http://purl.flvc.org/fcla/dt/14616
- Subject Headings
- Robots--Control systems, Automatic control--Computer programs
- Format
- Document (PDF)
- Title
- A procedure for evaluation and selection of computer-aided software engineering (CASE) tools for analysis and design.
- Creator
- Phillips, Steven David., Florida Atlantic University, Levow, Roy B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Due to the relative youth of the computer-aided software engineering (CASE) market and the lack of standards, evaluation of CASE tools is a difficult problem. This problem is made more difficult by the fact that no single CASE tool is able to satisfy the needs of all potential users. In addition, an incorrect choice is expensive in terms of money and time invested. In this thesis, the literature is surveyed and synthesized to produce procedures and criteria to be used in the evaluation and...
Show moreDue to the relative youth of the computer-aided software engineering (CASE) market and the lack of standards, evaluation of CASE tools is a difficult problem. This problem is made more difficult by the fact that no single CASE tool is able to satisfy the needs of all potential users. In addition, an incorrect choice is expensive in terms of money and time invested. In this thesis, the literature is surveyed and synthesized to produce procedures and criteria to be used in the evaluation and selection of CASE tools intended for the analysis and design phases of the software development life cycle.
Show less - Date Issued
- 1991
- PURL
- http://purl.flvc.org/fcla/dt/14701
- Subject Headings
- Electronic data processing--Structured techniques, System analysis, Computer software--Development, Computer-aided software engineering
- Format
- Document (PDF)
- Title
- A recovery metaprogram for fault diagnosis in a network of processors.
- Creator
- Pendse, Sateesh V., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Recent advances in computer technology have increased the performance of computers, but application requirements will always exceed the performance level available today. This requires the use of multiprocessors. The importance of multiprocessor systems is increasing due to many reasons, one of which is reliability. Reliability is also an important aspect in any computer system design. For reliable operation the system should be able to detect and locate most of its faults. The idea of using...
Show moreRecent advances in computer technology have increased the performance of computers, but application requirements will always exceed the performance level available today. This requires the use of multiprocessors. The importance of multiprocessor systems is increasing due to many reasons, one of which is reliability. Reliability is also an important aspect in any computer system design. For reliable operation the system should be able to detect and locate most of its faults. The idea of using a set of processes collectively known as a Recovery Metaprogram (RMP) is applied in this thesis to system diagnosis. Several error location algorithms are analyzed and compared. Most of them are comparison methods. A new algorithm, called Duplication algorithm, is developed and analyzed. Primitives, oriented to the specific functions of error diagnosis, required by the RMP to coordinate recovery functions are also developed in this thesis.
Show less - Date Issued
- 1990
- PURL
- http://purl.flvc.org/fcla/dt/14656
- Subject Headings
- Fault location (Engineering)--Data processing, Multiprocessors
- Format
- Document (PDF)
- Title
- A practical methodology for strong LL(k) parsing.
- Creator
- Feriozi, Dan T., Florida Atlantic University, Levow, Roy B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A new method of analyzing and parsing the strong LL(k) class of the deterministic context-free grammars is presented. The method is shown to be efficient when applied to many typical parsing applications such as compilers for common programming languages. Another advantage of the method is that it uses the familiar LL(1) parse table as a base. Parse conflicts that are found in the LL(1) parse table are treated as exceptions, and are resolved by consulting another table. This extension to the...
Show moreA new method of analyzing and parsing the strong LL(k) class of the deterministic context-free grammars is presented. The method is shown to be efficient when applied to many typical parsing applications such as compilers for common programming languages. Another advantage of the method is that it uses the familiar LL(1) parse table as a base. Parse conflicts that are found in the LL(1) parse table are treated as exceptions, and are resolved by consulting another table. This extension to the traditional LL(1) methodology increases its power significantly. Both the space and the time efficiency of the new method are shown to be much greater than that of the standard strong LL(k) method, when used on common grammars. Since the recognition problem for the strong LL(k) grammars is known to be NP-complete, the worst-case complexity of the new method is exponential, as is the case with the standard method. However, the complexity of the new method is highly dependent on the form of the grammar that is being analyzed. Both the space requirements and the time complexity of the new method are polynomial functions of the size of the input to the problem for common grammars, such as those used for programming languages. This is in contrast to the standard method that has been used for parsing the strong LL(k) languages. That method always uses space and time that is an exponential function of the size of the input.
Show less - Date Issued
- 1996
- PURL
- http://purl.flvc.org/fcla/dt/12488
- Subject Headings
- Parsing (Computer grammar), Formal languages
- Format
- Document (PDF)
- Title
- PATH PLANNING ALGORITHMS FOR UNMANNED AIRCRAFT SYSTEMS WITH A SPACE-TIME GRAPH.
- Creator
- Steinberg, Andrew, Cardei, Mihaela, Cardei, Ionut, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
Unmanned Aircraft Systems (UAS) have grown in popularity due to their widespread potential applications, including efficient package delivery, monitoring, surveillance, search and rescue operations, agricultural uses, along with many others. As UAS become more integrated into our society and airspace, it is anticipated that the development and maintenance of a path planning collision-free system will become imperative, as the safety and efficiency of the airspace represents a priority. The...
Show moreUnmanned Aircraft Systems (UAS) have grown in popularity due to their widespread potential applications, including efficient package delivery, monitoring, surveillance, search and rescue operations, agricultural uses, along with many others. As UAS become more integrated into our society and airspace, it is anticipated that the development and maintenance of a path planning collision-free system will become imperative, as the safety and efficiency of the airspace represents a priority. The dissertation defines this problem as the UAS Collision-free Path Planning Problem. The overall objective of the dissertation is to design an on-demand, efficient and scalable aerial highway path planning system for UAS. The dissertation explores two solutions to this problem. The first solution proposes a space-time algorithm that searches for shortest paths in a space-time graph. The solution maps the aerial traffic map to a space-time graph that is discretized on the inter-vehicle safety distance. This helps compute safe trajectories by design. The mechanism uses space-time edge pruning to maintain the dynamic availability of edges as vehicles move on a trajectory. Pruning edges is critical to protect active UAS from collisions and safety hazards. The dissertation compares the solution with another related work to evaluate improvements in delay, run time scalability, and admission success while observing up to 9000 flight requests in the network. The second solution to the path planning problem uses a batch planning algorithm. This is a new mechanism that processes a batch of flight requests with prioritization on the current slack time. This approach aims to improve the planning success ratio. The batch planning algorithm is compared with the space-time algorithm to ascertain improvements in admission ratio, delay ratio, and running time, in scenarios with up to 10000 flight requests.
Show less - Date Issued
- 2021
- PURL
- http://purl.flvc.org/fau/fd/FA00013696
- Subject Headings
- Unmanned aerial vehicles, Drone aircraft, Drone aircraft--Automatic control, Space and time, Algorithms
- Format
- Document (PDF)
- Title
- ILLUMINATING CYBER THREATS FOR SMART CITIES: A DATA-DRIVEN APPROACH FOR CYBER ATTACK DETECTION WITH VISUAL CAPABILITIES.
- Creator
- Neshenko, Nataliia, Furht, Borko, Bou-Harb, Elias, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
A modern urban infrastructure no longer operates in isolation but instead leverages the latest technologies to collect, process, and distribute aggregated knowledge to improve the quality of the provided services and promote the efficiency of resource consumption. However, the ambiguity of ever-evolving cyber threats and their debilitating consequences introduce new barriers for decision-makers. Numerous techniques have been proposed to address the cyber misdemeanors against such critical...
Show moreA modern urban infrastructure no longer operates in isolation but instead leverages the latest technologies to collect, process, and distribute aggregated knowledge to improve the quality of the provided services and promote the efficiency of resource consumption. However, the ambiguity of ever-evolving cyber threats and their debilitating consequences introduce new barriers for decision-makers. Numerous techniques have been proposed to address the cyber misdemeanors against such critical realms and increase the accuracy of attack inference; however, they remain limited to detection algorithms omitting attack attribution and impact interpretation. The lack of the latter prompts the transition of these methods to operation difficult to impossible. In this dissertation, we first investigate the threat landscape of smart cities, survey and reveal the progress in data-driven methods for situational awareness and evaluate their effectiveness when addressing various cyber threats. Further, we propose an approach that integrates machine learning, the theory of belief functions, and dynamic visualization to complement available attack inference for ICS deployed in the realm of smart cities. Our framework offers an extensive scope of knowledge as opposed to solely evident indicators of malicious activity. It gives the cyber operators and digital investigators an effective tool to dynamically and visually interact, explore and analyze heterogeneous, complex data, and provide rich context information. Such an approach is envisioned to facilitate the cyber incident interpretation and support a timely evidence-based decision-making process.
Show less - Date Issued
- 2021
- PURL
- http://purl.flvc.org/fau/fd/FA00013813
- Subject Headings
- Smart cities, Cyber intelligence (Computer security), Visual analytics, Threats
- Format
- Document (PDF)
- Title
- SPACE-TIME GRAPH PATH PLANNING FOR UAS TRAFFIC MANAGEMENT SYSTEMS.
- Creator
- Papa, Rafael, Cardei, Mihaela, Cardei, Ionut, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
The unmanned aerial vehicle (UAV) technology has evolved considerably in recent years and the global demand for package delivery is expected to grow even more during COVID-19 and the social distance era. The low cost of acquisition, payload capacity, maneuverability, and the ability to y at low-altitude with a very low cost of operation, make UAVs a perfect fit to revolutionize the payload transportation of small items. The large-scale adoption of drone package delivery in high-density urban...
Show moreThe unmanned aerial vehicle (UAV) technology has evolved considerably in recent years and the global demand for package delivery is expected to grow even more during COVID-19 and the social distance era. The low cost of acquisition, payload capacity, maneuverability, and the ability to y at low-altitude with a very low cost of operation, make UAVs a perfect fit to revolutionize the payload transportation of small items. The large-scale adoption of drone package delivery in high-density urban areas can be challenging and the Unmanned Aircraft Systems (UAS) operators must ensure safety, security, efficiency and equity of the airspace system. In order to address some of these challenges, FAA and NASA have developed a new architecture that will support a set of services to enable cooperative management of low-altitude operations between UAS operators. The architecture is still in its conceptual stage and designing a mechanism that ensures the fair distribution of the available airspace to commercial applications has become increasingly important. Considering that, the path planning is one of the most important problems to be explored. The objective is not only to find an optimal and shortest path but also to provide a collision-free environment to the UAVs. Taking into consideration all these important aspects and others such as serving on-demand requests, flight duration limitation due to energy constraints, maintaining the safety distance to avoid collisions, and using warehouses as starting and ending points in parcel delivery, this dissertation proposes: (i) an energy-constrained scheduling mechanism using a multi-source A* algorithm variant, and (ii) a generalized path planning mechanism using a space-time graph with multi-source multi-destination BFS generalization to ensure pre-flight UAV collision-free trajectories. This dissertation also uses the generalized path planning mechanism to solve the energy-constrained drone delivery problem. The experimental results show that the proposed algorithms are computationally efficient and scalable with the number of requests and graph size.
Show less - Date Issued
- 2021
- PURL
- http://purl.flvc.org/fau/fd/FA00013861
- Subject Headings
- Unmanned aerial vehicles, Drone aircraft, Space and time
- Format
- Document (PDF)
- Title
- SPATIAL NETWORK BIG DATABASE APPROACH TO RESOURCE ALLOCATION PROBLEMS.
- Creator
- Qutbuddin, Ahmad, Yang, KwangSoo, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
Resource allocation for Spatial Network Big Database is challenging due to the large size of spatial networks, variety of types of spatial data, a fast update rate of spatial and temporal elements. It is challenging to learn, manage and process the collected data and produce meaningful information in a limited time. Produced information must be concise and easy to understand. At the same time, the information must be very descriptive and useful. My research aims to address these challenges...
Show moreResource allocation for Spatial Network Big Database is challenging due to the large size of spatial networks, variety of types of spatial data, a fast update rate of spatial and temporal elements. It is challenging to learn, manage and process the collected data and produce meaningful information in a limited time. Produced information must be concise and easy to understand. At the same time, the information must be very descriptive and useful. My research aims to address these challenges through the development of fundamental data processing components for advanced spatial network queries that clearly and briefly deliver critical information. This thesis proposal studied two challenging Spatial Network Big Database problems: (1) Multiple Resource Network Voronoi Diagram and (2) Node-attributed Spatial Graph Partitioning. To address the challenge of query processing for multiple resource allocation in preparing for or after a disaster, we investigated the problem of the Multiple Resource Network Voronoi Diagram (MRNVD). Given a spatial network and a set of service centers from k different resource types, a Multiple Resource Network Voronoi Diagram (MRNVD) partitions the spatial network into a set of Service Areas that can minimize the total cycle-distances of graph-nodes to allotted k service centers with different resource types. The MRNVD problem is important for critical societal applications such as assigning essential survival supplies (e.g., food, water, gas, and medical assistance) to residents impacted by man-made or natural disasters. The MRNVD problem is NP-hard; it is computationally challenging due to the large size of the transportation network. Previous work proposed the Distance bounded Pruning (DP) approach to produce an optimal solution for MRNVD. However, we found that DP can be generalized to reduce the computational cost for the minimum cycle-distance. We extend our prior work and propose a novel approach that reduces the computational cost. Experiments using real-world datasets from five different regions demonstrate that the proposed approach creates MRNVD and significantly reduces the computational cost.
Show less - Date Issued
- 2021
- PURL
- http://purl.flvc.org/fau/fd/FA00013854
- Subject Headings
- Spatial data infrastructures, Big data--Data processing, Resource allocation, Voronoi polygons
- Format
- Document (PDF)
- Title
- A REVIEW AND ANALYSIS OF BOT-IOT SECURITY DATA FOR MACHINE LEARNING.
- Creator
- Peterson, Jared M., Khoshgoftaar, Taghi M., Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
Machine learning is having an increased impact on the Cyber Security landscape. The ability for predictive models to accurately identify attack patterns in security data is set to overtake more traditional detection methods. Industry demand has led to an uptick in research in the application of machine learning for Cyber Security. To facilitate this research many datasets have been created and made public. This thesis provides an in-depth analysis of one of the newest datasets, Bot-IoT. The...
Show moreMachine learning is having an increased impact on the Cyber Security landscape. The ability for predictive models to accurately identify attack patterns in security data is set to overtake more traditional detection methods. Industry demand has led to an uptick in research in the application of machine learning for Cyber Security. To facilitate this research many datasets have been created and made public. This thesis provides an in-depth analysis of one of the newest datasets, Bot-IoT. The full dataset contains about 73 million instances (big data), 3 dependent features, and 43 independent features. The purpose of this thesis is to provide researchers with a foundational understanding of Bot-IoT, its development, its features, its composition, and its pitfalls. It will also summarize many of the published works that utilize Bot-IoT and will propose new areas of research based on the issues identified in the current research and in the dataset.
Show less - Date Issued
- 2021
- PURL
- http://purl.flvc.org/fau/fd/FA00013838
- Subject Headings
- Machine learning, Cyber security, Big data
- Format
- Document (PDF)
- Title
- Electrical characterization of an innovative pad array carrier package for application specific electronic modules (ASEMs).
- Creator
- Nagaraja, Padma S., Florida Atlantic University, Barrett, Raymond L. Jr., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Pad Array Carrier (PAC) packaging is used for surface mounting of modules on printed circuit cards. The package described in this study has an added feature that allows for the testing of the package through the holes laid along the periphery of the package board. MAGIC was used in the design and layout of an 8 x 8 array size PAC. Two key contributors to electrical noise in the package, viz., cross talk and signal reflections were analyzed. Transmission line models were developed for...
Show morePad Array Carrier (PAC) packaging is used for surface mounting of modules on printed circuit cards. The package described in this study has an added feature that allows for the testing of the package through the holes laid along the periphery of the package board. MAGIC was used in the design and layout of an 8 x 8 array size PAC. Two key contributors to electrical noise in the package, viz., cross talk and signal reflections were analyzed. Transmission line models were developed for analyzing these parameters. HSPICE and HP 85150B Microwave Design Systems (MDS) were used to simulate the transmission line models to evaluate the effects of cross talk and signal reflections on the package board. The performance of the package for the speed and maintenance of signal integrity was evaluated. Guidelines specifying the physical geometry limitations for line length, line width, line spacing, and layout configurations required to meet specific noise budget (cross talk and signal reflection considerations) were established.
Show less - Date Issued
- 1992
- PURL
- http://purl.flvc.org/fcla/dt/14856
- Subject Headings
- Electronic packaging, Multichip modules (Microelectronics)
- Format
- Document (PDF)
- Title
- Industrial-strength formalization of object-oriented real-time systems.
- Creator
- Raghavan, Gopalakrishna., Florida Atlantic University, Larrondo-Petrie, Maria M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The goal of this dissertation is to propose an industrial-strength formal model for object-oriented real-time systems that captures real-time constraints using industry standard notations and tools. A light-weight formalization process is proposed that is semi-formal, graphical and easier to read and understand. This process supports formal behavior analysis, verification and validation. It is very effective in early detection of incompleteness and ambiguities in the specifications. The...
Show moreThe goal of this dissertation is to propose an industrial-strength formal model for object-oriented real-time systems that captures real-time constraints using industry standard notations and tools. A light-weight formalization process is proposed that is semi-formal, graphical and easier to read and understand. This process supports formal behavior analysis, verification and validation. It is very effective in early detection of incompleteness and ambiguities in the specifications. The proposed process uses industry standard tools and fits well within stringent industrial schedules. Formal requirements analysis is conducted using High Level Message Sequencing Chart (HMSC) and Message Sequencing Chart (MSC). In the formal analysis phase, the static structures are modeled using Unified Modeling Language (UML) and the constraints are formalized using Object Constraint Language (OCL). System behavior is formally modeled using Specification and Description Language (SDL) during the formal design phase. SDL is used for behavior modeling due to wide commercial availability of SDL-based tools for formal behavior analysis and validation. Transition rules mapping from UML Class Diagrams and Statecharts to SDL models are proposed. SDL models are formally simulated and validated during the formal validation phase. Using the proposed process real-time clock, timer, periodic process, aperiodic process, resource and precedence constraints were formalized. Different types of timers, such as periodic, aperiodic, one-shot, fixed-interval and variable-interval timers are derived using inheritance models. Semaphore wait and signal operations are formalized as part of the resource constraint. Pre-conditions, post-conditions and invariants for the real-time constraints were captured using OCL. Behavior of the proposed models were captured using Statecharts. The proposed mapping rules were used to translate the behavior models to SDL. The SDL models were formally simulated and validated using Telelogic Software Development Tool (SDT). The tools allowed extensive model analysis and helped uncover several design flaws. The real-time constraints were stereotyped and packaged into reusable formal components. These components can be easily imported by applications. Two case studies, Cruise Control System and Bottle Filling System, are included to illustrate the use of the proposed process and the real-time package. The "industrial-strength" of the process was validated by utilizing the proposed process in an industrial project where it was found to accelerate the development process.
Show less - Date Issued
- 2000
- PURL
- http://purl.flvc.org/fcla/dt/12632
- Subject Headings
- Object-oriented programming (Computer science), Real-time data processing, Formal methods (Computer science)
- Format
- Document (PDF)
- Title
- Intrusion detection in wireless networks: A data mining approach.
- Creator
- Nath, Shyam Varan., Florida Atlantic University, Khoshgoftaar, Taghi M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The security of wireless networks has gained considerable importance due to the rapid proliferation of wireless communications. While computer network heuristics and rules are being used to control and monitor the security of Wireless Local Area Networks (WLANs), mining and learning behaviors of network users can provide a deeper level of security analysis. The objective and contribution of this thesis is three fold: exploring the security vulnerabilities of the IEEE 802.11 standard for...
Show moreThe security of wireless networks has gained considerable importance due to the rapid proliferation of wireless communications. While computer network heuristics and rules are being used to control and monitor the security of Wireless Local Area Networks (WLANs), mining and learning behaviors of network users can provide a deeper level of security analysis. The objective and contribution of this thesis is three fold: exploring the security vulnerabilities of the IEEE 802.11 standard for wireless networks; extracting features or metrics, from a security point of view, for modeling network traffic in a WLAN; and proposing a data mining-based approach to intrusion detection in WLANs. A clustering- and expert-based approach to intrusion detection in a wireless network is presented in this thesis. The case study data is obtained from a real-word WLAN and contains over one million records. Given the clusters of network traffic records, a distance-based heuristic measure is proposed for labeling clusters as either normal or intrusive. The empirical results demonstrate the promise of the proposed approach, laying the groundwork for a clustering-based framework for intrusion detection in computer networks.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13246
- Subject Headings
- Wireless communication systems, Data warehousing, Data mining, Telecommunication--Security measures, Computer networks--Security measures, Computer security
- Format
- Document (PDF)
- Title
- Kinematic modeling, identification and compensation of robot manipulators.
- Creator
- Zhuang, Hanqi, Florida Atlantic University, Hamano, Fumio, Roth, Zvi S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Theoretical and practical issues of kinematic modeling, measurement, identification and compensation are addressed in this dissertation. A comprehensive robot calibration methodology using a new Complete and Parametrically Continuous (CPC) kinematic model is presented. The dissertation focuses on model-based robot calibration techniques. Parametric continuity of a kinematic model is defined and discussed to characterize model singularity. Irreducibility is defined to facilitate error model...
Show moreTheoretical and practical issues of kinematic modeling, measurement, identification and compensation are addressed in this dissertation. A comprehensive robot calibration methodology using a new Complete and Parametrically Continuous (CPC) kinematic model is presented. The dissertation focuses on model-based robot calibration techniques. Parametric continuity of a kinematic model is defined and discussed to characterize model singularity. Irreducibility is defined to facilitate error model reduction. Issues of kinematic parameter identification are addressed by utilizing generic forms of linearized kinematic error models. The CPC model is a complete and parametrically continuous kinematic model capable of describing geometry and motion of a robot manipulator. Owing to the completeness of the CPC model, the transformation from the base frame to the world frame and from the tool frame to the last link frame can be modeled with the same modeling convention as the one used for internal link transformations. Due to the parametric continuity of the CPC model, numerical difficulties in kinematic parameter identification using error models are reduced. The CPC model construction, computation of the link parameters from a given link transformation, inverse kinematics, transformations between the CPC model and the Denavit-Hartenberg model, and linearized CPC error model construction are investigated. New methods for self-calibration of a laser tracking coordinate-measuring-machine are reported. Two calibration methods, one based on a four-tracker system and the other based on three trackers with a precision plane, are proposed. Iterative estimation algorithms along with simulation results are presented. Linear quadratic regulator (LQR) theory is applied to design robot accuracy compensators. In the LQR algorithm, additive corrections of joint commands are found without explicitly solving the inverse kinematic problem for an actual robot; a weighting matrix and coefficients in the cost function can be chosen systematically to achieve specific objective such as emphasizing the positioning accuracy of the end-effector over its orientation accuracy and vice versa and taking into account joint travelling limits as well as singularity zones of the robot. The results of the kinematic identification and compensation experiments using the PUMA robot have shown that the CPC modeling technique presented in this dissertation is a convenient and effective means for accuracy improvements of industrial robots.
Show less - Date Issued
- 1989
- PURL
- http://purl.flvc.org/fcla/dt/12243
- Subject Headings
- Robotics, Manipulators (Mechanism)
- Format
- Document (PDF)