Current Search: Graduate College (x)
View All Items
Pages
- Title
- Multivariate modeling of software engineering measures.
- Creator
- Lanning, David Lee., Florida Atlantic University, Khoshgoftaar, Taghi M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
One goal of software engineers is to produce software products. An additional goal, that the software production must lead to profit, releases the power of the software product market. This market demands high quality products and tight cycles in the delivery of new and enhanced products. These market conditions motivate the search for engineering methods that help software producers ship products quicker, at lower cost, and with fewer defects. The control of software defects is key to...
Show moreOne goal of software engineers is to produce software products. An additional goal, that the software production must lead to profit, releases the power of the software product market. This market demands high quality products and tight cycles in the delivery of new and enhanced products. These market conditions motivate the search for engineering methods that help software producers ship products quicker, at lower cost, and with fewer defects. The control of software defects is key to meeting these market conditions. Thus, many software engineering tasks are concerned with software defects. This study considers two sources of variation in the distribution of software defects: software complexity and enhancement activity. Multivariate techniques treat defect activity, software complexity, and enhancement activity as related multivariate concepts. Applied techniques include principal components analysis, canonical correlation analysis, discriminant analysis, and multiple regression analysis. The objective of this study is to improve our understanding of software complexity and software enhancement activity as sources of variation in defect activity, and to apply this understanding to produce predictive and discriminant models useful during testing and maintenance tasks. These models serve to support critical software engineering decisions.
Show less - Date Issued
- 1994
- PURL
- http://purl.flvc.org/fcla/dt/12383
- Subject Headings
- Software engineering, Computer software--Testing, Computer software--Quality control
- Format
- Document (PDF)
- Title
- OPTIMAL SCHEDULING OF PROCESSES FOR A NETWORK OF TRANSPUTERS (MULTIPROCESSOR, OCCAM, CONCURRENT PROCESSING).
- Creator
- NGO, TON ANH., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Concurrency at both the hardware and software level has recently been considered as the solution to the classic Von Neuman bottleneck in system design. Introduced by Inmos, the Occam language and the Transputer microprocessor provide simple and elegant building blocks for a concurrent system. This thesis proposes a set of algorithms to find an optimal deterministic schedule for an Occam program executed on a network of Transputers. Also discussed are features of the network relevant to the...
Show moreConcurrency at both the hardware and software level has recently been considered as the solution to the classic Von Neuman bottleneck in system design. Introduced by Inmos, the Occam language and the Transputer microprocessor provide simple and elegant building blocks for a concurrent system. This thesis proposes a set of algorithms to find an optimal deterministic schedule for an Occam program executed on a network of Transputers. Also discussed are features of the network relevant to the problem of scheduling, and a complete example is provided to illustrate the scheduler. The approaches described can be used as a basis for implementing a flexible general purpose multiprocessor system.
Show less - Date Issued
- 1986
- PURL
- http://purl.flvc.org/fcla/dt/14351
- Subject Headings
- Multiprocessors, Computer networks
- Format
- Document (PDF)
- Title
- Object-oriented models for manufacturing inventory control systems.
- Creator
- Peng, ZhiWei., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The inventory is a key element in modern manufacturing systems. We present here object-oriented manufacturing inventory models, including detailed static and dynamic models. Three different representations of the object model are presented and compared. Two case studies are given to verify the extensibility and reusability of the models. One of the models is developed into a pattern, that can be used as a prototype for similar type of systems, e.g., an inventory of the books in a library....
Show moreThe inventory is a key element in modern manufacturing systems. We present here object-oriented manufacturing inventory models, including detailed static and dynamic models. Three different representations of the object model are presented and compared. Two case studies are given to verify the extensibility and reusability of the models. One of the models is developed into a pattern, that can be used as a prototype for similar type of systems, e.g., an inventory of the books in a library. Comparison of our inventory model with other inventory data models is also presented.
Show less - Date Issued
- 1997
- PURL
- http://purl.flvc.org/fcla/dt/15394
- Subject Headings
- Object-oriented methods (Computer science), Inventory control
- Format
- Document (PDF)
- Title
- Object-oriented analysis and design of a serial peripheral interface monitor.
- Creator
- Scharf, Sherri Hannah., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Presented here is an object-oriented design for a real-time system used to monitor bus activity on a microcontroller via a PC. This system could prove to be an inexpensive and user-friendly alternative to existing hardware used for this purpose. The use of an object-oriented design methodology and the application of two Model-View-Controller architectures as well as a layered approach aided in producing a system composed of reusable components that is flexible and easily extensible....
Show morePresented here is an object-oriented design for a real-time system used to monitor bus activity on a microcontroller via a PC. This system could prove to be an inexpensive and user-friendly alternative to existing hardware used for this purpose. The use of an object-oriented design methodology and the application of two Model-View-Controller architectures as well as a layered approach aided in producing a system composed of reusable components that is flexible and easily extensible. Additionally, a reusable pattern can be extracted from the architecture presented here that could be utilized in designing similar software applications for communicating with peripheral hardware devices.
Show less - Date Issued
- 1998
- PURL
- http://purl.flvc.org/fcla/dt/15538
- Subject Headings
- Object-oriented methods (Computer science), User interfaces (Computer systems)
- Format
- Document (PDF)
- Title
- Polling models: Decomposition of waiting times and effects of switchover and setup times.
- Creator
- Yehia, Ramzi Riad., Florida Atlantic University, Cooper, Robert B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A polling model is a queueing model in which a single server visits N queues, traveling from queue to queue and "polling" each queue to ascertain whether customers are waiting to be served. When the server leaves a queue, it requires a switchover time to move to the next queue in the polling sequence; then, it requires a setup time to prepare to serve the customers in the polled queue. Two particular models are of interest. In the state-independent (SI) model, the server sets up whether or...
Show moreA polling model is a queueing model in which a single server visits N queues, traveling from queue to queue and "polling" each queue to ascertain whether customers are waiting to be served. When the server leaves a queue, it requires a switchover time to move to the next queue in the polling sequence; then, it requires a setup time to prepare to serve the customers in the polled queue. Two particular models are of interest. In the state-independent (SI) model, the server sets up whether or not there are customers waiting in the polled queue at the polling epoch, whereas in the state-dependent (SD) model, the server will not set up if the polled queue is empty. Recently, it was discovered that a decomposition phenomenon applies to switchover times in some polling models. It was proved for the cyclic exhaustive-service and gated-service polling models that the mean waiting time in the nonzero-switchover-time model can be decomposed into two terms, (i) the mean waiting time in a "corresponding" zero switchover-times model, and (ii) a term that depends essentially on only the sum of the mean switchover times per cycle. Another interesting phenomenon of polling models, discovered via numerical examples, is that reducing setup (or switchover) times in the SI model can, surprisingly, produce an increase in mean waiting times (Anomaly1, AN1). Equations were derived that explicitly characterize this anomaly. Also, numerical analysis of a 2-queue model showed that the SD model sometimes produces larger mean waiting times than the corresponding SI model (Anomaly 2, AN2). Explicit characterization of this anomaly for the symmetric case was done. In this dissertation we analyze and give extensions of both phenomena: decomposition and effects of setup time. Our contributions include: (1) We extend the decomposition theorem to include polling according to an order table (PAOT). (2) We generalize the decomposition theorem through providing a basic proof that applies to a variety of polling models. Models considered include (1) PAOT, (2) binomial service, (3) batch arrivals and (4) random polling. (3) We analyze the PAOT model using the buffer occupancy approach. This approach produces a set of equations that are applicable to our generalized proof of the decomposition theorem. (4) We prove that AN1 applies to the PAOT model, and use these results to obtain explicit formulas for the symmetric case that characterize this anomaly in the SI model. (5) We show via simulation that, under certain conditions, the anomalous result AN1, and AN2 uncovered for the SD model when N = 2 persist for models with N > 2.
Show less - Date Issued
- 1998
- PURL
- http://purl.flvc.org/fcla/dt/12577
- Subject Headings
- Queuing theory
- Format
- Document (PDF)
- Title
- Remote database access over Internet in Windows environment.
- Creator
- Ren, Yongjian., Florida Atlantic University, Hsu, Sam, Solomon, Martin K., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis deals with remote database access over the Internet. Three different approaches to remote database access, the CGI-based approach, the Oracle Webserver-based approach and the CORBA-based approach, are discussed. Experiments are conducted to compare the pros and cons of each approach. The Oracle database and Microsoft Access database are utilized as the target database systems. For the CGI-based approach, the CGI programs are coded with ProC, Oracle's SQL-embedded C language, in...
Show moreThis thesis deals with remote database access over the Internet. Three different approaches to remote database access, the CGI-based approach, the Oracle Webserver-based approach and the CORBA-based approach, are discussed. Experiments are conducted to compare the pros and cons of each approach. The Oracle database and Microsoft Access database are utilized as the target database systems. For the CGI-based approach, the CGI programs are coded with ProC, Oracle's SQL-embedded C language, in Microsoft Visual C++ developer's studio, and a Student Record example is demonstrated. For the Oracle Webserver-based approach, the Oracle Webserver 1.1 has been setup and an Online Shopping Club example is demonstrated. For the CORBA-based approach, Orbix Web 2.0.1 and JDK 1.1.1 are utilized as the CORBA system and the development language, respectively, and several examples including single server, multiple servers and multiple databases are presented. An extended SQL syntax is proposed to manipulate data from multiple database systems residing on different hosts in one SQL statement. The implementation of extended SQL statements in CORBA's server/client application is also suggested. With the help of extended SQL syntax and CORBA's multiple server access feature, an example of the client application accessing two databases at a time is illustrated. The pros and cons are discussed of the three remote database access approaches studied in the thesis: (I) The CGI-based approach, which is the most generic and widely used approach. (II) The Oracle Webserver approach, which is a relatively simplified way of the CGI approach, easy to apply but limited in applications. (III) The CORBA-based approach, which is the most powerful and sophisticated approach for remote database access.
Show less - Date Issued
- 1998
- PURL
- http://purl.flvc.org/fcla/dt/15590
- Subject Headings
- Database management, World Wide Web, Microsoft network (Online service)
- Format
- Document (PDF)
- Title
- Security in voice over IP networks.
- Creator
- Pelaez, Juan C., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Voice over IP (VoIP) is revolutionizing the global communications system by allowing human voice and fax information to travel over existing packet data networks along with traditional data packets. The convergence of voice and data in one simplified network brings both benefits and constraints to users. Among the several issues that need to be addressed when deploying this technology, security is one of the most critical. This thesis will present a combination of security patterns based on...
Show moreVoice over IP (VoIP) is revolutionizing the global communications system by allowing human voice and fax information to travel over existing packet data networks along with traditional data packets. The convergence of voice and data in one simplified network brings both benefits and constraints to users. Among the several issues that need to be addressed when deploying this technology, security is one of the most critical. This thesis will present a combination of security patterns based on the systematic analysis of attacks against a VoIP network and the existing techniques to mitigate these attacks, providing good practices for all IP telephony systems. The VoIP Security Patterns which are based on object-oriented modeling, will help network designers to improve the level of security not only in voice but also in data, video, and fax over IP networks.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/13190
- Subject Headings
- Internet telephony--Security measures, Computer network protocols, Multimedia systems
- Format
- Document (PDF)
- Title
- Security Enhancement in Plastic Cards Using an Invisible "Watermark" Emulated by an Embedded set of Electromagnetic Material: An Overlay Strategy to Prevailing Security Features.
- Creator
- Lim, Swee Hock, Neelakanta, Perambur S., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis addresses a passive, economical strategy towards enhancing the security feature of conventional plastic cards by embedding a set of electromagnetic (EM) material that emulates an invisible "watermarking". It is an overlay strategy to prevailing security measures. Proposed method consists of incorporating (embedding) a set of metallic (foil-like) sheet of high-mu material or high-conductivity metal, or a conducting-fiber interwoven fabric. The test card when exposed to a suitable...
Show moreThis thesis addresses a passive, economical strategy towards enhancing the security feature of conventional plastic cards by embedding a set of electromagnetic (EM) material that emulates an invisible "watermarking". It is an overlay strategy to prevailing security measures. Proposed method consists of incorporating (embedding) a set of metallic (foil-like) sheet of high-mu material or high-conductivity metal, or a conducting-fiber interwoven fabric. The test card when exposed to a suitable excitation of high frequency EM excitation (with or without superimposing a static magnetic field), the plastic part yields a distinct path-reluctance to the EM energy when compared to the embedded EM material section. Sensing the resulting EM reaction with an appropriate circuit, delivers an output signal depicting the presence of the embedded "watermarking" and any encoded signature in it. The underlying concept is theoretically analyzed, relevant card-reading methods are suggested and prototype (experimental) results are presented.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012534
- Subject Headings
- Crime prevention, Multimedia systems, Information security applications, Digital watermarking
- Format
- Document (PDF)
- Title
- Reliability modeling of fault-tolerant software.
- Creator
- Leu, Shao-Wei., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
We have developed reliability models for a variety of fault-tolerant software constructs including those based on two well-known methodologies: recovery block and N-version programming, and their variations. We also developed models for the conversation scheme which provides fault tolerance for concurrent software and a newly proposed system architecture, the recovery metaprogram, which attempts to unify most of the existing fault-tolerant strategies. Each model is evaluated using either GSPN...
Show moreWe have developed reliability models for a variety of fault-tolerant software constructs including those based on two well-known methodologies: recovery block and N-version programming, and their variations. We also developed models for the conversation scheme which provides fault tolerance for concurrent software and a newly proposed system architecture, the recovery metaprogram, which attempts to unify most of the existing fault-tolerant strategies. Each model is evaluated using either GSPN, a software package based on Generalized Stochastic Petri Nets, or Sharpe, an evaluation tool for Markov models. The numerical results are then analyzed and compared. Major results derived from this process include the identification of critical parameters for each model, the comparisons of relative performance among different software constructs, the justification of a preliminary approach to the modeling of complex conversations, and the justification of recovery metaprogram regarding improvement of reliability.
Show less - Date Issued
- 1990
- PURL
- http://purl.flvc.org/fcla/dt/12256
- Subject Headings
- Fault-tolerant computing, Computer software--Reliability
- Format
- Document (PDF)
- Title
- Secure access of legacy databases from the Web using CORBA.
- Creator
- Xue, Richard Zhihuai., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
After comparing general architectures for accessing business databases from the Web, we propose a platform-independent, language-independent, object-oriented, fourtier CORBA-based architecture. The proposed architecture is presented in pattern format. Several security mechanisms are incorporated into the proposed architecture. A Web Reservation System (WRS) was created to test this architecture. Starting from an analysis pattern, a design model for the WRS was developed using the CORBA Object...
Show moreAfter comparing general architectures for accessing business databases from the Web, we propose a platform-independent, language-independent, object-oriented, fourtier CORBA-based architecture. The proposed architecture is presented in pattern format. Several security mechanisms are incorporated into the proposed architecture. A Web Reservation System (WRS) was created to test this architecture. Starting from an analysis pattern, a design model for the WRS was developed using the CORBA Object Request Broker (ORB); this was a Virtual Car Reservation System (VCRS). In the VCRS system, a user can get a reservation number when necessary information is entered from a Web browser. The user can also retrieve the reservation information by using the reservation number. All reservation information is stored in a distributed database system at a remote site. A realistic application of the proposed architecture is also described. We also provide an evaluation and comparison of the proposed architecture with other architectures.
Show less - Date Issued
- 2000
- PURL
- http://purl.flvc.org/fcla/dt/15756
- Subject Headings
- Computer security, CORBA (Computer architecture), World Wide Web, Distributed databases, Internet, Business--Data processing
- Format
- Document (PDF)
- Title
- Robot singularities under small perturbations in the kinematic parameters.
- Creator
- Mohile, Ajey Avinash., Florida Atlantic University, Roth, Zvi S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
When small perturbations in the kinematic parameters of a robot are taken into consideration, the model of a robot no longer contains perfect parallelism and perpendicularity that makes the nominal inverse kinematics so simple. In particular, the effect of joint axis misalignments and small perturbations in the kinematic parameters on the robot singularities is of interest. This aspect is particularly important when planning the workspace of a robot that must undergo calibration. To utilize...
Show moreWhen small perturbations in the kinematic parameters of a robot are taken into consideration, the model of a robot no longer contains perfect parallelism and perpendicularity that makes the nominal inverse kinematics so simple. In particular, the effect of joint axis misalignments and small perturbations in the kinematic parameters on the robot singularities is of interest. This aspect is particularly important when planning the workspace of a robot that must undergo calibration. To utilize the work volume most efficiently, one must know exactly what points are permissible as taught points. In other words, reachable workspace must be clearly defined to avoid the robot from entering the singularity zones not only of the nominal robot but also of all future actual robots. Once singularity zones for the actual robot are correctly identified, workspace planning becomes a simple task. In this thesis the relationship between small perturbations in kinematic parameters and singularities of a simple three-revolute articulated arm are studied. It is shown that singularities in such a robot do shift to new locations.
Show less - Date Issued
- 1989
- PURL
- http://purl.flvc.org/fcla/dt/14476
- Subject Headings
- Robots--Dynamics, Robots--Motion
- Format
- Document (PDF)
- Title
- Sartre's existentialist Oresteia.
- Creator
- Benham, Timothy Lee., Florida Atlantic University, Hokenson, Jan W., Dorothy F. Schmidt College of Arts and Letters, Department of Languages, Linguistics and Comparative Literature
- Abstract/Description
-
Les Mouches is a modern reconstruction of the ancient myth embodied in the The Oresteia of Aeschylus. Jean-Paul Sartre not only rewrote the legend of Orestes; he remodeled it. Orestes is not just a new man; he is his own man. The play, therefore, is not a mere pastiche in modern dress. Sartre infuses Orestes with an unprecendented "Existentialist" consciousness, and this transformation adds new complexities to the ancient text. This Existentialist reworking of Hellenistic images is...
Show moreLes Mouches is a modern reconstruction of the ancient myth embodied in the The Oresteia of Aeschylus. Jean-Paul Sartre not only rewrote the legend of Orestes; he remodeled it. Orestes is not just a new man; he is his own man. The play, therefore, is not a mere pastiche in modern dress. Sartre infuses Orestes with an unprecendented "Existentialist" consciousness, and this transformation adds new complexities to the ancient text. This Existentialist reworking of Hellenistic images is distinguished from the classically "tragic" elements in Aeschylus as well as later modifications in Sophocles and Euripides. Sartre's early introduction into the lore of Hellenism is considered, and a discussion of Sartre's theoretical and philosophical perspective on theater suggests which Greek elements Sartre was disposed to incorporate into his script.
Show less - Date Issued
- 1990
- PURL
- http://purl.flvc.org/fcla/dt/14607
- Subject Headings
- Literature, Classical, Literature, Comparative, Literature, Romance
- Format
- Document (PDF)
- Title
- PALSAM INPUT DATA FILE GENERATOR.
- Creator
- ROBINSON, WILLIAM ROBERT, JR., Florida Atlantic University, Marcovitz, Alan B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The capabilities and limitations of Programmable Array Logic devices (PALs) are presented and compared to other logic devices. PALs are field programmable devices and a program called PALSAM exists to assist the designer in programming PALs. The attributes and limitations of PALSAM are discussed. The PALSAM Input Data File Generator program was written to eliminate many of the limitations of PALSAM. The need for an algorithmic method of reducing a general logic expression to a minimal sum-of...
Show moreThe capabilities and limitations of Programmable Array Logic devices (PALs) are presented and compared to other logic devices. PALs are field programmable devices and a program called PALSAM exists to assist the designer in programming PALs. The attributes and limitations of PALSAM are discussed. The PALSAM Input Data File Generator program was written to eliminate many of the limitations of PALSAM. The need for an algorithmic method of reducing a general logic expression to a minimal sum-of-products form is demonstrated. Several algorithms are discussed. The Zissos, Duncan and Jones Algorithm, which claims to produce a minimal sum-of-products expression but is presented without proof by its authors, is disproved by example. A modification of this algorithm is presented without proof. When tested in the 276 possible cases involving up to three variables, this new algorithm always produced a minimal sum-of-products expression, while the original algorithm failed in six of these cases. Finally, the PALSAM Input Data File Generator program which uses the modified algorithm is presented and documented.
Show less - Date Issued
- 1984
- PURL
- http://purl.flvc.org/fcla/dt/14199
- Subject Headings
- Programmable array logic, Microprocessors--Programming, Algorithms
- Format
- Document (PDF)
- Title
- Workspace evaluation and kinematic calibration of Stewart platform.
- Creator
- Wang, Jian., Florida Atlantic University, Masory, Oren, Roth, Zvi S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Parallel manipulators have their special characteristics in contrast to the traditional serial type of robots. Stewart platform is a typical six degree of freedom fully parallel robot manipulator. The goal of this research is to enhance the accuracy and the restricted workspace of the Stewart platform. The first part of the dissertation discusses the effect of three kinematic constraints: link length limitation, joint angle limitation and link interference, and kinematic parameters on the...
Show moreParallel manipulators have their special characteristics in contrast to the traditional serial type of robots. Stewart platform is a typical six degree of freedom fully parallel robot manipulator. The goal of this research is to enhance the accuracy and the restricted workspace of the Stewart platform. The first part of the dissertation discusses the effect of three kinematic constraints: link length limitation, joint angle limitation and link interference, and kinematic parameters on the workspace of the platform. An algorithm considering the above constraints for the determination of the volume and the envelop of Stewart platform workspace is developed. The workspace volume is used as a criterion to evaluate the effects of the platform dimensions and kinematic constraints on the workspace and the dexterity of the Stewart platform. The analysis and algorithm can be used as a design tool to select dimensions, actuators and joints in order to maximize the workspace. The remaining parts of the dissertation focus on the accuracy enhancement. Manufacturing tolerances, installation errors and link offsets cause deviations with respect to the nominal parameters of the platform. As a result, if nominal parameters are being used, the resulting platform pose will be inaccurate. An accurate kinematic model of Stewart platform which accommodates all manufacturing and installation errors is developed. In order to evaluate the effects of the above factors on the accuracy, algorithms for the forward and inverse kinematics solutions of the accurate model are developed. The effects of different manufacturing tolerances and installation errors on the platform accuracy are investigated based on this model. Simulation results provide insight into the expected accuracy and indicate the major factors contributing to the inaccuracies. In order to enhance the accuracy, there is a need to calibrate the platform, or to determine the actual values of the kinematic parameters (Parameter Identification) and to incorporate these into the inverse kinematic solution (Accuracy Compensation). An error-model based algorithm for the parameter identification is developed. Procedures for the formulation of the identification Jacobian and for accuracy compensation are presented. The algorithms are tested using simulated measurements in which the realistic measurement noise is included. As a result, pose error of the platform are significantly reduced.
Show less - Date Issued
- 1992
- PURL
- http://purl.flvc.org/fcla/dt/12316
- Subject Headings
- Robots--Control systems, Manipulators (Mechanism), Robotics--Calibration
- Format
- Document (PDF)
- Title
- A VLSI implementable learning algorithm.
- Creator
- Ruiz, Laura V., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A top-down design methodology using hardware description languages (HDL's) and powerful design, analysis, synthesis and layout software tools for electronic circuit design is described and applied to the design of a single layer artificial neural network that incorporates on-chip learning. Using the perception learning algorithm, these simple neurons learn a classification problem in 10.55 microseconds in one application. The objective is to describe a methodology by following the design of a...
Show moreA top-down design methodology using hardware description languages (HDL's) and powerful design, analysis, synthesis and layout software tools for electronic circuit design is described and applied to the design of a single layer artificial neural network that incorporates on-chip learning. Using the perception learning algorithm, these simple neurons learn a classification problem in 10.55 microseconds in one application. The objective is to describe a methodology by following the design of a simple network. This methodology is later applied in the design of a novel architecture, a stochastic neural network. All issues related to algorithmic design for VLSI implementability are discussed and results of layout and timing analysis given over software simulations. A top-down design methodology is presented, including a brief introduction to HDL's and an overview of the software tools used throughout the design process. These tools make it possible now for a designer to complete a design in a relative short period of time. In-depth knowledge of computer architecture, VLSI fabrication, electronic circuits and integrated circuit design is not fundamental to accomplish a task that a few years ago would have required a large team of specialized experts in many fields. This may appeal to researchers from a wide background of knowledge, including computer scientists, mathematicians, and psychologists experimenting with learning algorithms. It is only in a hardware implementation of artificial neural network learning algorithms that the true parallel nature of these architectures could be fully tested. Most of the applications of neural networks are basically software simulations of the algorithms run on a single CPU executing sequential simulations of a parallel, richly interconnected architecture. This dissertation describes a methodology whereby a researcher experimenting with a known or new learning algorithm will be able to test it as it was intentionally designed for, on a parallel hardware architecture.
Show less - Date Issued
- 1996
- PURL
- http://purl.flvc.org/fcla/dt/12453
- Subject Headings
- Integrated circuits--Very large scale integration--Design and construction, Neural networks (Computer science)--Design and construction, Computer algorithms, Machine learning
- Format
- Document (PDF)
- Title
- Web log analysis: Experimental studies.
- Creator
- Yang, Zhijian., Florida Atlantic University, Zhong, Shi, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
With rapid growth of the World Wide Web, web performance becomes increasingly important for modern businesses, especially for e-commerce. As we all know, web server logs contain potentially useful empirical data to improve web server performance. In this thesis, we discuss some topics related to the analysis of a website's server logs for enhancing server performance, which will benefit some applications in business. Markov chain models are used and allow us to dynamically model page...
Show moreWith rapid growth of the World Wide Web, web performance becomes increasingly important for modern businesses, especially for e-commerce. As we all know, web server logs contain potentially useful empirical data to improve web server performance. In this thesis, we discuss some topics related to the analysis of a website's server logs for enhancing server performance, which will benefit some applications in business. Markov chain models are used and allow us to dynamically model page sequences extracted from server logs. My experimental studies contain three major parts. First, I present a workload characterization study of the website used for my research. Second, Markov chain models are constructed for both page request and page-visiting sequence prediction. Finally, I carefully evaluate the constructed models using an independent test data set, which is from server logs on a different day. The research results demonstrate the effectiveness of Markov chain models for characterizing page-visiting sequences.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13202
- Subject Headings
- Markov processes, Operations research, Business enterprises--Computer networks, Electronic commerce--Data processing
- Format
- Document (PDF)
- Title
- An artificial neural network architecture for interpolation, function approximation, time series modeling and control applications.
- Creator
- Luebbers, Paul Glenn., Florida Atlantic University, Pandya, Abhijit S., Sudhakar, Raghavan, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A new artificial neural network architecture called Power Net (PWRNET) and Orthogonal Power Net (OPWRNET) has been developed. Based on the Taylor series expansion of the hyperbolic tangent function, this novel architecture can approximate multi-input multi-layer artificial networks, while requiring only a single layer of hidden nodes. This allows a compact network representation with only one layer of hidden layer weights. The resulting trained network can be expressed as a polynomial...
Show moreA new artificial neural network architecture called Power Net (PWRNET) and Orthogonal Power Net (OPWRNET) has been developed. Based on the Taylor series expansion of the hyperbolic tangent function, this novel architecture can approximate multi-input multi-layer artificial networks, while requiring only a single layer of hidden nodes. This allows a compact network representation with only one layer of hidden layer weights. The resulting trained network can be expressed as a polynomial function of the input nodes. Applications which cannot be implemented with conventional artificial neural networks, due to their intractable nature, can be developed with these network architectures. The degree of nonlinearity of the network can be directly controlled by adjusting the number of hidden layer nodes, thus avoiding problems of over-fitting which restrict generalization. The learning algorithm used for adapting the network is the familiar error back propagation training algorithm. Other learning algorithms may be applied and since only one hidden layer is to be trained, the training performance of the network is expected to be comparable to or better than conventional multi-layer feed forward networks. The new architecture is explored by applying OPWRNET to classification, function approximation and interpolation problems. These applications show that the OPWRNET has comparable performance to multi-layer perceptrons. The OPWRNET was also applied to the prediction of noisy time series and the identification of nonlinear systems. The resulting trained networks, for system identification tasks, can be expressed directly as discrete nonlinear recursive polynomials. This characteristic was exploited in the development of two new neural network based nonlinear control algorithms, the Linearized Self-Tuning Controller (LSTC) and a variation of a Neural Adaptive Controller (NAC). These control algorithms are compared to a linear self-tuning controller and an artificial neural network based Inverse Model Controller. The advantages of these new controllers are discussed.
Show less - Date Issued
- 1994
- PURL
- http://purl.flvc.org/fcla/dt/12357
- Subject Headings
- Neural networks (Computer science)
- Format
- Document (PDF)
- Title
- An empirical study of analogy-based software quality classification models.
- Creator
- Ross, Fletcher Douglas., Florida Atlantic University, Khoshgoftaar, Taghi M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Time and cost are among the most important elements in a software project. By efficiently using time and resources we can reduce costs. Any program can potentially contain faults. If we can identify those program modules that have better quality and are less likely to be fault-prone, then we can reduce the effort and cost required in testing these modules. This thesis presents a series of studies evaluating the use of Case-Based Reasoning (CBR ) as an effective method for classifying program...
Show moreTime and cost are among the most important elements in a software project. By efficiently using time and resources we can reduce costs. Any program can potentially contain faults. If we can identify those program modules that have better quality and are less likely to be fault-prone, then we can reduce the effort and cost required in testing these modules. This thesis presents a series of studies evaluating the use of Case-Based Reasoning (CBR ) as an effective method for classifying program modules based upon their quality. We believe that this is the first time that the mahalanobis distance, a distance measure utilizing the covariance matrix of the independent variables which accounts for the multi-colinearity of the data without the necessity for preprocessing, and data clustering, wherein the data was separated into groups based on a dependent variable have been used as modeling techniques in conjunction with (CBR).
Show less - Date Issued
- 2001
- PURL
- http://purl.flvc.org/fcla/dt/12817
- Subject Headings
- Modular programming, Computer software--Quality control, Software measurement
- Format
- Document (PDF)
- Title
- A feedback-based multimedia synchronization technique for distributed systems.
- Creator
- Ehley, Lynnae Anne., Florida Atlantic University, Ilyas, Mohammad, Furht, Borko, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Multimedia applications incorporate the use of more than one type of media, i.e., voice, video, data, text and image. With the advances in high-speed communication, the ability to transmit multimedia is becoming widely available. One of the means of transport for multimedia in distributed networks is Broadband Integrated Services Digital Network (B-ISDN). B-ISDN supports the transport of large volumes of data with a low error rate. It also handles the burstiness of multimedia traffic by...
Show moreMultimedia applications incorporate the use of more than one type of media, i.e., voice, video, data, text and image. With the advances in high-speed communication, the ability to transmit multimedia is becoming widely available. One of the means of transport for multimedia in distributed networks is Broadband Integrated Services Digital Network (B-ISDN). B-ISDN supports the transport of large volumes of data with a low error rate. It also handles the burstiness of multimedia traffic by providing dynamic bandwidth allocation. When multimedia is requested for transport in a distributed network, different Quality of Service (QOS) may be required for each type of media. For example, video can withstand more errors than voice. In order to provide, the most efficient form of transfer, different QOS media are sent using different channels. By using different channels for transport, jitter can impose skews on the temporal relations between the media. Jitter is caused by errors and buffering delays. Since B-ISDN uses Asynchronous Transfer Mode (ATM) as its transfer mode, the jitter that is incurred can be assumed to be bounded if traffic management principles such as admission control and resource reservation are employed. Another network that can assume bounded buffering is the 16 Mbps token-ring LAN when the LAN Server (LS) Ultimedia(TM) software is applied over the OS/2 LAN Server(TM) (using OS/2(TM)). LS Ultimedia(TM) reserves critical resources such as disk, server processor, and network resources for multimedia use. In addition, it also enforces admission control(1). Since jitter is bounded on the networks chosen, buffers can be used to realign the temporal relations in the media. This dissertation presents a solution to this problem by proposing a Feedback-based Multimedia Synchronization Technique (FMST) to correct and compensate for the jitter that is incurred when media are received over high speed communication channels and played back in real time. FMST has been implemented at the session layer for the playback of the streams. A personal computer was used to perform their synchronized playback from a 16 Mbps token-ring and from a simulated B-ISDN network.
Show less - Date Issued
- 1994
- PURL
- http://purl.flvc.org/fcla/dt/12382
- Subject Headings
- Multimedia systems, Broadband communication systems, Data transmission systems, Integrated services digital networks, Electronic data processing--Distributed processing
- Format
- Document (PDF)
- Title
- The finite element method as a parametric tool in the design and analysis of a pressure vessel having a threaded closure.
- Creator
- Merkl, Garrett Andrew., Florida Atlantic University, Case, Robert O., Tsai, Chi-Tay, College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
The finite element method is a very powerful tool used to analyze a variety of problems in engineering. This thesis looks at the finite element method as a tool and several important modeling features of concern. A well known finite element software package, ANSYS, will be used to demonstrate a diverse number of its capabilities, and several procedures followed in solving a specific engineering problem. The subject matter involves a nonlinear contact analysis of a pressure vessel having a...
Show moreThe finite element method is a very powerful tool used to analyze a variety of problems in engineering. This thesis looks at the finite element method as a tool and several important modeling features of concern. A well known finite element software package, ANSYS, will be used to demonstrate a diverse number of its capabilities, and several procedures followed in solving a specific engineering problem. The subject matter involves a nonlinear contact analysis of a pressure vessel having a threaded closure. The choice of this application is prompted by an interest in better understanding how the finite element method is implemented in the design and analysis of different pressure vessel parameters. A parametric finite element analysis was performed. Load and stress distributions along the threaded region of the vessel were examined for parameters including number of threads, thread pitch, diameter ratio, closure plug length, and thread profile.
Show less - Date Issued
- 1996
- PURL
- http://purl.flvc.org/fcla/dt/15243
- Subject Headings
- Finite element method, Pressure vessels--Design and construction, Strains and stresses--Mathematical models
- Format
- Document (PDF)