Current Search: Graduate College (x)
View All Items
Pages
- Title
- Visualization of Impact Analysis on Configuration Management Data for Software Process Improvement.
- Creator
- Lo, Christopher Hoi-Yin, Huang, Shihong, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The software development process is an incremental and iterative activity. Source code is constantly altered to reflect changing requirements, to respond to testing results, and to address problem reports. Proper software measurement that derives meaningful numeric values for some attributes of a software product or process can help in identifying problem areas and development bottlenecks. Impact analysis is the evaluation of the risks associated with change requests or problem reports,...
Show moreThe software development process is an incremental and iterative activity. Source code is constantly altered to reflect changing requirements, to respond to testing results, and to address problem reports. Proper software measurement that derives meaningful numeric values for some attributes of a software product or process can help in identifying problem areas and development bottlenecks. Impact analysis is the evaluation of the risks associated with change requests or problem reports, including estimates of effects on resources, effort, and schedule. This thesis presents a methodology called VITA for applying software analysis techniques to configuration management repository data with the aim of identifying the impact on file changes due to change requests and problem reports. The repository data can be analyzed and visualized in a semi-automated manner according to user-selectable criteria. The approach is illustrated with a model problem concerning software process improvement of an embedded software system in the context of performing high-quality software maintenance.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012535
- Subject Headings
- Software mesurement, Software engineering--Quality control, Data mining--Quality control
- Format
- Document (PDF)
- Title
- Visualization of search engine query result using region-based document model on XML documents.
- Creator
- Parikh, Sunish Umesh., Florida Atlantic University, Horton, Thomas, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Information access systems have traditionally focused on retrieval of documents consisting of titles and abstracts. The underlying assumptions of such systems are not necessarily appropriate for full text, structured documents. Context and structure should play an important role in information access from full text document collections. When a system retrieves a document in response to a query, it is important to indicate not only how strong the match is (e.g., how many terms from the query...
Show moreInformation access systems have traditionally focused on retrieval of documents consisting of titles and abstracts. The underlying assumptions of such systems are not necessarily appropriate for full text, structured documents. Context and structure should play an important role in information access from full text document collections. When a system retrieves a document in response to a query, it is important to indicate not only how strong the match is (e.g., how many terms from the query are present in the document), but also how frequent each term is, how each term is distributed in the text and where the terms overlap within the document. This information is especially important in long texts, since it is less clear how the terms in the query contribute to the ranking of a long text than a short abstract. This thesis does research in the application of information visualization techniques to the problem of navigating and finding information in XML files which are becoming available in increasing quantities on the World Wide Web (WWW). It provides a methodology for presenting detailed information about a specific topic while also presenting a complete overview of all the information available. A prototype has been developed for visualization of search query results. Limitations of the prototype developed and future direction of work have also been discussed.
Show less - Date Issued
- 2000
- PURL
- http://purl.flvc.org/fcla/dt/12694
- Subject Headings
- XML (Document markup language), Web search engines
- Format
- Document (PDF)
- Title
- Visualization as a Qualitative Method for Analysis of Data from Location Tracking Technologies.
- Creator
- Mani, Mohan, VanHilst, Michael, Pandya, Abhijit S., Hsu, Sam, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
One of the biggest factors in the quest to better wireless communication is cellular call handoff, which in tum, is a function of geographic location. In this thesis, our fundamental goal was to demonstrate the value addition brought forth by spatial data visualization techniques for the analysis of geo-referenced data from two different location tracking technologies: GPS and cellular systems. Through our efforts, we unearthed some valuable and surprising insights from the data being...
Show moreOne of the biggest factors in the quest to better wireless communication is cellular call handoff, which in tum, is a function of geographic location. In this thesis, our fundamental goal was to demonstrate the value addition brought forth by spatial data visualization techniques for the analysis of geo-referenced data from two different location tracking technologies: GPS and cellular systems. Through our efforts, we unearthed some valuable and surprising insights from the data being analyzed that led to interesting observations about the data itself as opposed to the entity, or entities, that the data is supposed to describe. In doing so, we underscored the value addition brought forth by spatial data visualization techniques even in the incipient stages of analysis of georeferenced data from cellular networks. We also demonstrated the value of visualization techniques as a verification tool to verify the results of analysis done through other methods, such as statistical analysis.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/fau/fd/FA00012536
- Subject Headings
- Mobile communication systems, Algorithms--Data analysis, Radio--Transmitters and transmissions, Code division multiple access
- Format
- Document (PDF)
- Title
- An intelligent neural network forecaster to predict the Standard & Poor 500's index.
- Creator
- Shah, Sulay Bipin., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In this thesis we present an intelligent forecaster based on neural network technology to capture the future path of the market indicator. This thesis is about the development of a new methodology in financial forecasting. An effort is made to develop a neural network forecaster using the financial indicators as the input variables. A complex recurrent neural network is used to capture the behavior of the nonlinear characteristics of the S&P 500. The main outcome of this research is, a...
Show moreIn this thesis we present an intelligent forecaster based on neural network technology to capture the future path of the market indicator. This thesis is about the development of a new methodology in financial forecasting. An effort is made to develop a neural network forecaster using the financial indicators as the input variables. A complex recurrent neural network is used to capture the behavior of the nonlinear characteristics of the S&P 500. The main outcome of this research is, a systematic way of constructing a forecaster for nonlinear and non-stationary data series of S&P 500 that leads to very good out-of-sample prediction. The results of the training and testing of the network are presented along with conclusion. The tool used for the validation of this research is "Brainmaker". This thesis also contains a brief survey of available tools for financial forecasting.
Show less - Date Issued
- 1999
- PURL
- http://purl.flvc.org/fcla/dt/15741
- Subject Headings
- Neural networks (Computer science), Stock price forecasting, Time-series analysis
- Format
- Document (PDF)
- Title
- The cochlea: A signal processing paradigm.
- Creator
- Barrett, Raymond L. Jr., Florida Atlantic University, Erdol, Nurgun, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The cochlea provides frequency selectivity for acoustic input signal processing in mammals. The excellent performance of human hearing for speech processing leads to examination of the cochlea as a paradigm for signal processing. The components of the hearing process are examined and suitable models are selected for each component's function. The signal processing function is simulated by a computer program and the ensemble is examined for behavior and improvement. The models reveal that the...
Show moreThe cochlea provides frequency selectivity for acoustic input signal processing in mammals. The excellent performance of human hearing for speech processing leads to examination of the cochlea as a paradigm for signal processing. The components of the hearing process are examined and suitable models are selected for each component's function. The signal processing function is simulated by a computer program and the ensemble is examined for behavior and improvement. The models reveal that the motion of the basilar membrane provides a very selective low pass transmission characteristic. Narrowband frequency resolution is obtained from the motion by computation of spatial differences in the magnitude of the motion as energy propagates along the membrane. Basilar membrane motion is simulated using the integrable model of M. R. Schroeder, but the paradigm is useful for any model that exhibits similar high selectivity. Support is shown for an hypothesis that good frequency discrimination is possible without highly resonant structure. The nonlinear magnitude calculation is performed on signals developed without highly resonant structure, and differences in those magnitudes are signals shown to have good narrowband selectivity. Simultaneously, good transient behavior is preserved due to the avoidance of highly resonant structure. The cochlear paradigm is shown to provide a power spectrum with serendipitous good frequency selectivity and good transient response simultaneously.
Show less - Date Issued
- 1990
- PURL
- http://purl.flvc.org/fcla/dt/12251
- Subject Headings
- Engineering, Electronics and Electrical, Computer Science
- Format
- Document (PDF)
- Title
- A connectionist approach to adaptive reasoning: An expert system to predict skid numbers.
- Creator
- Reddy, Mohan S., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This project illustrates the neural network approach to constructing a fuzzy logic decision system. This technique employs an artificial neural network (ANN) to recognize the relationships that exit between the various inputs and outputs. An ANN is constructed based on the variables present in the application. The network is trained and tested. Various training methods are explored, some of which include auxiliary input and output columns. After successful testing, the ANN is exposed to new...
Show moreThis project illustrates the neural network approach to constructing a fuzzy logic decision system. This technique employs an artificial neural network (ANN) to recognize the relationships that exit between the various inputs and outputs. An ANN is constructed based on the variables present in the application. The network is trained and tested. Various training methods are explored, some of which include auxiliary input and output columns. After successful testing, the ANN is exposed to new data and the results are grouped into fuzzy membership sets based membership evaluation rules. This data grouping forms the basis of a new ANN. The network is now trained and tested with the fuzzy membership data. New data is presented to the trained network and the results form the fuzzy implications. This approach is used to compute skid resistance values from G-analyst accelerometer readings on open grid bridge decks.
Show less - Date Issued
- 1996
- PURL
- http://purl.flvc.org/fcla/dt/15239
- Subject Headings
- Artificial intelligence, Fuzzy logic, Neural networks (Computer science), Pavements--Skid resistance
- Format
- Document (PDF)
- Title
- A communication protocol for wireless sensor networks.
- Creator
- Callaway, Edgar Herbert, Jr., Florida Atlantic University, Shankar, Ravi, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Many wireless network applications, such as wireless computing on local area networks, employ data throughput as a primary performance metric. The data throughput on such networks has therefore been increasing in recent years. However, there are other potential wireless network applications, such as industrial monitoring and control, consumer home automation, and military remote sensing, that have relaxed throughput requirements, often measured in bits/day. Such networks have power...
Show moreMany wireless network applications, such as wireless computing on local area networks, employ data throughput as a primary performance metric. The data throughput on such networks has therefore been increasing in recent years. However, there are other potential wireless network applications, such as industrial monitoring and control, consumer home automation, and military remote sensing, that have relaxed throughput requirements, often measured in bits/day. Such networks have power consumption and cost as primary performance metrics, rather than data throughput, and have been called wireless sensor networks. This work describes a physical layer, a data link layer, and a network layer design suitable for use in wireless sensor networks. To minimize node duty cycle and therefore average power consumption, while minimizing the symbol rate, the proposed physical layer employs a form of orthogonal multilevel signaling in a direct sequence spread spectrum format. Results of Signal Processing Worksystem (SPW, Cadence, Inc.) simulations are presented showing a 4-dB sensitivity advantage of the proposed modulation method compared to binary signaling, in agreement with theory. Since the proposed band of operation is the 2.4 GHz unlicensed band, interference from other services is possible; to address this, SPW simulations of the proposed modulation method in the presence of Bluetooth interference are presented. The processing gain inherent in the proposed spread spectrum scheme is shown to require the interferer to be significantly stronger than the desired signal before materially affecting the received bit error rate. The proposed data link layer employs a novel distributed mediation device (MD) technique to enable networked nodes to synchronize to each other, even when the node duty cycle is arbitrarily low (e.g., <0.1%). This technique enables low-cost devices, which may employ only low-stability time bases, to remain asynchronous to one another, becoming synchronized only when communication is necessary between them. Finally, a wireless sensor network design is presented. A cluster-type architecture is chosen; the clusters are organized in a hierarchical tree to simplify the routing algorithm. Results of several network performance metrics simulations, including the effects of the distributed MD dynamic synchronization scheme, are presented, including the average message latency, node duty cycle, and data throughput. The architecture is shown to represent a practical alternative for the design of wireless sensor networks.
Show less - Date Issued
- 2002
- PURL
- http://purl.flvc.org/fcla/dt/11991
- Subject Headings
- Wireless communication systems, Computer network protocols, Radio detectors
- Format
- Document (PDF)
- Title
- A critical comparison of three user interface architectures in object-oriented design.
- Creator
- Walls, David Paul., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Frameworks for the development of object-oriented, user interactive applications have been examined. Three alternate approaches have been explored; the Model-View-Controller (MVC) approach, the MVC++ approach and the Presentation-Abstraction-Control (PAC) approach. For the purpose of assessing the approaches, a simple engineering application was selected for object-oriented analysis using the three techniques. The utility of each technique was compared on the basis of complexity,...
Show moreFrameworks for the development of object-oriented, user interactive applications have been examined. Three alternate approaches have been explored; the Model-View-Controller (MVC) approach, the MVC++ approach and the Presentation-Abstraction-Control (PAC) approach. For the purpose of assessing the approaches, a simple engineering application was selected for object-oriented analysis using the three techniques. The utility of each technique was compared on the basis of complexity, extensibility and reusability. While the approaches aim to provide reusable user interface components and extensibility through incorporation of an additional class, only MVC++ and PAC truly achieve this goal, although at the expense of introducing additional messaging complexity. It was also noted that, in general, decoupling of the GUI classes, while providing increased extensibility and reusability, increases the inter-object messaging requirement.
Show less - Date Issued
- 1999
- PURL
- http://purl.flvc.org/fcla/dt/15747
- Subject Headings
- User interfaces (Computer systems), Object-oriented methods (Computer science)
- Format
- Document (PDF)
- Title
- A comparative study of attribute selection techniques for CBR-based software quality classification models.
- Creator
- Nguyen, Laurent Quoc Viet., Florida Atlantic University, Khoshgoftaar, Taghi M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
To achieve high reliability in software-based systems, software metrics-based quality classification models have been explored in the literature. However, the collection of software metrics may be a hard and long process, and some metrics may not be helpful or may be harmful to the classification models, deteriorating the models' accuracies. Hence, methodologies have been developed to select the most significant metrics in order to build accurate and efficient classification models. Case...
Show moreTo achieve high reliability in software-based systems, software metrics-based quality classification models have been explored in the literature. However, the collection of software metrics may be a hard and long process, and some metrics may not be helpful or may be harmful to the classification models, deteriorating the models' accuracies. Hence, methodologies have been developed to select the most significant metrics in order to build accurate and efficient classification models. Case-Based Reasoning is the classification technique used in this thesis. Since it does not provide any metric selection mechanisms, some metric selection techniques were studied. In the context of CBR, this thesis presents a comparative evaluation of metric selection methodologies, for raw and discretized data. Three attribute selection techniques have been studied: Kolmogorov-Smirnov Two-Sample Test, Kruskal-Wallis Test, and Information Gain. These techniques resulted in classification models that are useful for software quality improvement.
Show less - Date Issued
- 2002
- PURL
- http://purl.flvc.org/fcla/dt/12944
- Subject Headings
- Case-based reasoning, Software engineering, Computer software--Quality control
- Format
- Document (PDF)
- Title
- GENERALIZED PADE APPROXIMATION TECHNIQUES AND MULTIDIMENSIONAL SYSTEMS.
- Creator
- MESSITER, MARK A., Florida Atlantic University, Shamash, Yacov A., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Two algorithms for greatest common factor (GCF) extraction from two multivariable polynomials, based on generalized Pade approximation, are presented. The reduced transfer matrices for two-dimensional (20) systems are derived from two 20 state-space models. Tests for product and sum separabilities of multivariable functions are also given.
- Date Issued
- 1983
- PURL
- http://purl.flvc.org/fcla/dt/14175
- Subject Headings
- Multivariate analysis, Padé approximant, Polynomials
- Format
- Document (PDF)
- Title
- GENERIC NETWORK EXECUTIVE.
- Creator
- SARMIENTO, JESUS LEOPOLDO., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A Generic Network Executive (GNE) package is presented in this thesis. It encompasses the strategy and methodology to follow when implementing data communication software. GNE was designed for portability and high utilization of available resources (efficiency). It does not impose implementation constraints because it does not include features specific to any system (hardware or operating system}. It uses a highly concurrent process model with a pipelined structure . It is not protocol...
Show moreA Generic Network Executive (GNE) package is presented in this thesis. It encompasses the strategy and methodology to follow when implementing data communication software. GNE was designed for portability and high utilization of available resources (efficiency). It does not impose implementation constraints because it does not include features specific to any system (hardware or operating system}. It uses a highly concurrent process model with a pipelined structure . It is not protocol dependent, rather it is meant to be used to implement low level services for higher level communic ation protocols. It is intended to provide interprocess communication in distributed systems by coupling application programs with a general purpose packet delivery system, i.e., a datagram service.
Show less - Date Issued
- 1986
- PURL
- http://purl.flvc.org/fcla/dt/14321
- Subject Headings
- Computer networks, Data transmission systems
- Format
- Document (PDF)
- Title
- Fuzzy identification of processes on finite training sets with known features.
- Creator
- Diaz-Robainas, Regino R., Florida Atlantic University, Huang, Ming Z., Zilouchian, Ali, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A methodology is presented to construct an approximate fuzzy-mapping algorithm that maps multiple inputs to single outputs given a finite training set of argument vectors functionally linked to corresponding scalar outputs. Its scope is limited to problems where the features are known in advance, or equivalently, where the expected functional representation is known to depend exclusively on the known selected variables. Programming and simulations to implement the methodology make use of...
Show moreA methodology is presented to construct an approximate fuzzy-mapping algorithm that maps multiple inputs to single outputs given a finite training set of argument vectors functionally linked to corresponding scalar outputs. Its scope is limited to problems where the features are known in advance, or equivalently, where the expected functional representation is known to depend exclusively on the known selected variables. Programming and simulations to implement the methodology make use of Matlab Fuzzy and Neural toolboxes and a PC application of Prolog, and applications range from approximate representations of the direct kinematics of parallel manipulators to fuzzy controllers.
Show less - Date Issued
- 1996
- PURL
- http://purl.flvc.org/fcla/dt/12487
- Subject Headings
- Fuzzy algorithms, Set theory, Logic, Symbolic and mathematical, Finite groups, Representations of groups
- Format
- Document (PDF)
- Title
- Fuzzy vault fingerprint cryptography: Experimental and simulation studies.
- Creator
- Kotlarchyk, Alex J., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The fuzzy vault scheme introduced by Juels and Sudan [Jue02] was implemented in a fingerprint cryptography system using COTS software. This system proved to be unsuccessful. Failure analysis led to a series of simulations to investigate the parameters and system thresholds necessary for such a system to perform adequately and as guidance for constructing similar systems in the future. First, a discussion of the role of biometrics in data security and cryptography is presented, followed by a...
Show moreThe fuzzy vault scheme introduced by Juels and Sudan [Jue02] was implemented in a fingerprint cryptography system using COTS software. This system proved to be unsuccessful. Failure analysis led to a series of simulations to investigate the parameters and system thresholds necessary for such a system to perform adequately and as guidance for constructing similar systems in the future. First, a discussion of the role of biometrics in data security and cryptography is presented, followed by a review of the key developments leading to the development of the fuzzy vault scheme. The relevant mathematics and algorithms are briefly explained. This is followed by a detailed description of the implementation and simulation of the fuzzy vault scheme. Finally, conclusions drawn from analysis of the results of this research are presented.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/13360
- Subject Headings
- Computer networks--Security measures, Computer security, Data encryption (Computer science)
- Format
- Document (PDF)
- Title
- Generating formal models from UML class diagrams.
- Creator
- Shroff, Malcolm Keki., Florida Atlantic University, France, Robert B., Larrondo-Petrie, Maria M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The rich structuring mechanisms, and abstract modeling constructs available in most graphical object-oriented modeling methods (OOMs) facilitate the creation of abstract, visually-appealing, highly-structured graphical models. On the other hand, lack of formal semantics for the modeling notation can severely limit the utility of OOMs. Formal specification techniques (FSTs) support the creation of precise and analyzable specifications, but they can be tedious to create and difficult to read,...
Show moreThe rich structuring mechanisms, and abstract modeling constructs available in most graphical object-oriented modeling methods (OOMs) facilitate the creation of abstract, visually-appealing, highly-structured graphical models. On the other hand, lack of formal semantics for the modeling notation can severely limit the utility of OOMs. Formal specification techniques (FSTs) support the creation of precise and analyzable specifications, but they can be tedious to create and difficult to read, especially by system developers not trained in formal methods. The complementary strengths of OOMs and FSTs suggest that their integration can result in techniques that can be used to create precise and analyzable models. This thesis describes a technique for integrating analysis level UML (Unified Modeling Language) Class Diagrams with the formal notation Object-Z.
Show less - Date Issued
- 1997
- PURL
- http://purl.flvc.org/fcla/dt/15514
- Subject Headings
- UML (Computer science), Object-oriented methods (Computer science)
- Format
- Document (PDF)
- Title
- Low latency and energy efficient MAC protocols for wireless sensor networks.
- Creator
- Abu-El Humos, Ali M., Florida Atlantic University, Alhalabi, Bassem A., Cardei, Mihaela, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Energy consumption is a critical design issue in Wireless Sensor Networks (WSNs), since sensor nodes are battery operated, and replacing or recharging the battery is usually infeasible. Energy efficient solutions are sought at all network levels, especially at the medium access level. The IEEE 802.11 MAC protocol is optimized for Ad hoc Wireless Networks, but cannot be adopted for WSNs because it has the idle listening problem, which is a major source of energy waste. Several Medium Access...
Show moreEnergy consumption is a critical design issue in Wireless Sensor Networks (WSNs), since sensor nodes are battery operated, and replacing or recharging the battery is usually infeasible. Energy efficient solutions are sought at all network levels, especially at the medium access level. The IEEE 802.11 MAC protocol is optimized for Ad hoc Wireless Networks, but cannot be adopted for WSNs because it has the idle listening problem, which is a major source of energy waste. Several Medium Access Control (MAC) protocols have been proposed for WSNs to save the transceiver energy by introducing periodic listen/sleep cycles, and thus overcome the idle listing problem. The periodic listen sleep cycles, however, will increase the network latency and require extra overhead to establish and maintain synchronization among nodes in the network. This dissertation introduces a new MAC protocol for WSNs based on the SMAC protocol to improve its latency performance without compromising its energy consumption. The original SMAC provides an efficient solution for the energy consumption problem due to idle listening, but it increases latency especially in low duty cycle applications. TMAC was proposed to further reduce the energy consumption in SMAC and introduced the Forward Request-To-Send (FRTS) packet to solve the early sleep problem observed in TMAC. Later, Adaptive SMAC was proposed to reduce the latency problem in SMAC by at least 50% at light traffic load. Our new protocol, FASMAC, combines the advantages of both adaptive listening and the usage of FRTS packet in TMAC to further reduce the latency of SMAC. In FASMAC, a packet can travel at least three hops away from its source node within one time cycle. This results in at least 67% reduction in latency at light traffic when compared with the original SMAC. We also propose an energy model for performance evaluation of WSNs protocols using the network simulator NS2. The current energy model of NS2 was designed to handle Ad hoc Wireless Networks where the low power consumption sleep mode was not an issue. However, this is not the case in WSNs. We show that NS2 energy model is not suitable to evaluate the performance of WSNs protocols because it does not account for the low power sleep mode. This dissertation proposes a solution to this deficiency and provides simulation results that match real experimental results performed on the actual sensor motes.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/12149
- Subject Headings
- Wireless communication systems, Sensor networks, Power resources--Efficiency
- Format
- Document (PDF)
- Title
- A MAINTENANCE PROCESSOR FOR THE IBM SERIES/1 (SERVICE, DIAGNOSTIC).
- Creator
- MURPHY, DAVID JAMES, III., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
As the Series/1 is used in more complex, unattended, or critical applications, users of the product cannot tolerate the mean time to repair of the current field service support. Long waits for technicians to arrive, troubleshoot the system, and repair or replace parts are no longer acceptable. This thesis presents the system architecture and functional capabilities of a maintenance processor for the Series/1. The maintenance processor designed herein can be used as the focal point of most...
Show moreAs the Series/1 is used in more complex, unattended, or critical applications, users of the product cannot tolerate the mean time to repair of the current field service support. Long waits for technicians to arrive, troubleshoot the system, and repair or replace parts are no longer acceptable. This thesis presents the system architecture and functional capabilities of a maintenance processor for the Series/1. The maintenance processor designed herein can be used as the focal point of most system support activities. This approach has been used in mainframe systems for some time but has not, in the past, been deemed feasible for smaller systerns such as the Series/1. This effort demonstrates the feasibility of a maintenance processor in such systems, resulting in a simplification of hardware and software while providing a significant improvement in total system reliability, availability, and serviceability.
Show less - Date Issued
- 1985
- PURL
- http://purl.flvc.org/fcla/dt/14248
- Subject Headings
- IBM Series/1 (Computer), Software maintenance
- Format
- Document (PDF)
- Title
- Learning in connectionist networks using the Alopex algorithm.
- Creator
- Venugopal, Kootala Pattath., Florida Atlantic University, Pandya, Abhijit S., Sudhakar, Raghavan, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The Alopex algorithm is presented as a universal learning algorithm for connectionist models. It is shown that the Alopex procedure could be used efficiently as a supervised learning algorithm for such models. The algorithm is demonstrated successfully on a variety of network architectures. Such architectures include multilayer perceptrons, time-delay models, asymmetric, fully recurrent networks and memory neuron networks. The learning performance as well as the generation capability of the...
Show moreThe Alopex algorithm is presented as a universal learning algorithm for connectionist models. It is shown that the Alopex procedure could be used efficiently as a supervised learning algorithm for such models. The algorithm is demonstrated successfully on a variety of network architectures. Such architectures include multilayer perceptrons, time-delay models, asymmetric, fully recurrent networks and memory neuron networks. The learning performance as well as the generation capability of the Alopex algorithm are compared with those of the backpropagation procedure, concerning a number of benchmark problems, and it is shown that the Alopex has specific advantages over the backpropagation. Two new architectures (gain layer schemes) are proposed for the on-line, direct adaptive control of dynamical systems using neural networks. The proposed schemes are shown to provide better dynamic response and tracking characteristics, than the other existing direct control schemes. A velocity reference scheme is introduced to improve the dynamic response of on-line learning controllers. The proposed learning algorithm and architectures are studied on three practical problems; (i) Classification of handwritten digits using Fourier Descriptors; (ii) Recognition of underwater targets from sonar returns, considering temporal dependencies of consecutive returns and (iii) On-line learning control of autonomous underwater vehicles, starting with random initial conditions. Detailed studies are conducted on the learning control applications. Effect of the network learning rate on the tracking performance and dynamic response of the system are investigated. Also, the ability of the neural network controllers to adapt to slow and sudden varying parameter disturbances and measurement noise is studied in detail.
Show less - Date Issued
- 1993
- PURL
- http://purl.flvc.org/fcla/dt/12325
- Subject Headings
- Computer algorithms, Computer networks, Neural networks (Computer science), Machine learning
- Format
- Document (PDF)
- Title
- MEMORY LOADER SYSTEM FOR AN AUTOMATIC TEST SET.
- Creator
- MASKASKY, ROBERT JAY., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The STS 6003500 computerized automatic teat set is used to support the AH/ASN-91 computer used in the Navy's A-7 attack aircraft. The teat set currently loads teat programs from an IBM 2415 Magnetic tape unit which is obsolete. A new memory loader system is needed to load test programs into the teat set. Using modern Personal Computer technology, this can be accomplished economically with a personal computer and a hard disk drive. The personal computer will act as an intelligent interface...
Show moreThe STS 6003500 computerized automatic teat set is used to support the AH/ASN-91 computer used in the Navy's A-7 attack aircraft. The teat set currently loads teat programs from an IBM 2415 Magnetic tape unit which is obsolete. A new memory loader system is needed to load test programs into the teat set. Using modern Personal Computer technology, this can be accomplished economically with a personal computer and a hard disk drive. The personal computer will act as an intelligent interface between the bard disk drive and the teat set. The personal computer can also provide numerous functions for the convenience of the teat set operator. The flexibility of the personal computer allows easy adaptation to other computerized automatic test sets which are faced with similar problems.
Show less - Date Issued
- 1986
- PURL
- http://purl.flvc.org/fcla/dt/14345
- Subject Headings
- Computer interfaces, Microcomputers
- Format
- Document (PDF)
- Title
- Measurement of brain activity using an ultrasonic measure of localized blood flow.
- Creator
- Dinev, Petko Dimitrov., Florida Atlantic University, Glenn, William E., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This dissertation presents a new type of two-dimensional, real time, color ultrasonic scanner able to measure and display brain metabolism by monitoring amplitudes of localized changes of intracranial interfaces. A real time image is obtained with a flexible array of transducers which eliminates the strong reflection from the skull due to a shape mismatch, and reduces the topological mislocations in the image. The image is generated by a superposition of a gray scale image representing static...
Show moreThis dissertation presents a new type of two-dimensional, real time, color ultrasonic scanner able to measure and display brain metabolism by monitoring amplitudes of localized changes of intracranial interfaces. A real time image is obtained with a flexible array of transducers which eliminates the strong reflection from the skull due to a shape mismatch, and reduces the topological mislocations in the image. The image is generated by a superposition of a gray scale image representing static structures, and a color coded pattern representing motion information. The new technique of motion detection based on image subtraction features high accuracy and gives the scanner the unique capability to detect multidirectional motion of the intracranial interfaces, and to display the amplitude of the motion in real time. A series of experiments performed with the scanner demonstrates outstanding agreement between theoretical design and hardware performance. The scanner has been measured to have a lateral resolution of 4 mm, a temporal resolution of 30 fr/s, a motion detection resolution of 5 $\mu$m, a time gain compensation of 40 dB, and a signal/noise ratio of more than 40 dB. Successful tests, performed on a live human brain, show a well defined echo pattern arising from intracranial structures within the brain, and a strong correlation between the detected surface pulsations and heart beat has been observed. Monitoring the image synchronously with the heart beat and the external stimulus presence gives clinicians the unique opportunity of visualization of detailed cross-sectional anatomy of portions of the human brain, permitting direct observation, mapping the structure and function in a normal human brain, and studying the pathophysiology of mental illness by demonstrating structural metabolic, and neurochemical abnormalities. Additional experiments, performed on other parts of the human body, demonstrated clearly the advanced features of the scanner and its successful application to other areas of medicine beyond neurology. Furthermore, this new real time, two-dimensional brain scanner will be suitable for remote diagnosis and consultation, and long-distance delivery of quality health care via teleconferencing and telecommunication equipment. The modular design of the scanner allows blocks, such as multidirectional motion detection, and the flexible transducer array to be used as stand alone units or to be built into already existing ultrasonic equipment such as sonars, motion sensors, nondestructive testing of materials, etc.
Show less - Date Issued
- 1996
- PURL
- http://purl.flvc.org/fcla/dt/12485
- Subject Headings
- Diagnosis, Ultrasonic, Blood-vessels--Ultrasonic imaging, Ultrasonics in medicine
- Format
- Document (PDF)
- Title
- Maximum entropy-based optimization of artificial neural networks: An application to ATM telecommunication parameter predictions.
- Creator
- Sundaram, Karthik., Florida Atlantic University, De Groff, Dolores F., Neelakanta, Perambur S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis addresses studies on cost-functions developed on the basis of maximum entropy principle, for applications in artificial neural network (ANN) optimization endeavors. The maximization of entropy refers to maximizing Shannon information pertinent to the difference in the output and the teacher value of an ANN. Apart from the Shannon format of the negative entropy formulation a set of Csiszar family functions are also considered. The error-measures obtained, via these maximum entropy...
Show moreThis thesis addresses studies on cost-functions developed on the basis of maximum entropy principle, for applications in artificial neural network (ANN) optimization endeavors. The maximization of entropy refers to maximizing Shannon information pertinent to the difference in the output and the teacher value of an ANN. Apart from the Shannon format of the negative entropy formulation a set of Csiszar family functions are also considered. The error-measures obtained, via these maximum entropy formulations are adopted as cost-functions in the training and prediction schedules of a test perceptron. A comparative study is done on the performance of these cost-functions in facilitating the test network towards optimization so as to predict a standard teacher function sin (.). The study is also extended to predict a parameter (such as cell delay variation) in a practical ATM telecommunication system. Concluding remarks and scope for an extended study are also indicated.
Show less - Date Issued
- 1999
- PURL
- http://purl.flvc.org/fcla/dt/15660
- Subject Headings
- Neural network (Computer science), Asynchronous transfer mode
- Format
- Document (PDF)