Current Search: Cardei, Ionut (x)
View All Items
- Title
- Automation of the S.H.I.E.L.D. methodology for system hazard analysis and resilient design.
- Creator
- Marcus, Anthony M., Cardei, Ionut E., Alsenas, Gabriel, Graduate College
- Date Issued
- 2013-04-12
- PURL
- http://purl.flvc.org/fcla/dt/3361327
- Subject Headings
- System analysis, System design
- Format
- Document (PDF)
- Title
- Indoor Localization using WiFi Wireless LANs.
- Creator
- Azandaryani, Saeid Mirzaei, Cardei, Ionut E., Graduate College
- Date Issued
- 2013-04-12
- PURL
- http://purl.flvc.org/fcla/dt/3361902
- Subject Headings
- Wireless LANs, Mobile communication systems
- Format
- Document (PDF)
- Title
- Prognosis and health management communications quality of service.
- Creator
- Tavtilov, Timur, Cardei, Ionut E., Graduate College
- Date Issued
- 2011-04-08
- PURL
- http://purl.flvc.org/fcla/dt/3164701
- Subject Headings
- Ocean energy resources, Computational linguistics, XML (Document markup language)
- Format
- Document (PDF)
- Title
- Web-based wireless sensor network monitoring using an android smartphone.
- Creator
- Marcus, Anthony M., Tavtilov, Timur, Cardei, Ionut E., Cardei, Mihaela, Graduate College
- Date Issued
- 2011-04-08
- PURL
- http://purl.flvc.org/fcla/dt/3164625
- Subject Headings
- Sensor networks, Mobile computing, Droid (Smartphone)
- Format
- Document (PDF)
- Title
- Energy-Constrained Drone Delivery Scheduling.
- Creator
- Papa, Rafael, Cardei, Ionut, Cardei, Mihaela
- Abstract/Description
-
In recent years drones have been used in many applications such as surveillance, geographic mapping, search and rescue, and weather forecast. Motivated by the increased use of drones in shipping and delivery, in this paper we tackle the problem of parcel delivery by taking into consideration important aspects such as serving on-demand requests, flight duration limitation due to energy constraints, maintaining the safety distance to avoid collisions, and using warehouses as starting and ending...
Show moreIn recent years drones have been used in many applications such as surveillance, geographic mapping, search and rescue, and weather forecast. Motivated by the increased use of drones in shipping and delivery, in this paper we tackle the problem of parcel delivery by taking into consideration important aspects such as serving on-demand requests, flight duration limitation due to energy constraints, maintaining the safety distance to avoid collisions, and using warehouses as starting and ending points in parcel delivery. In this paper we define the UAS Energy-constrained Delivery Scheduling problem and propose a scheduling mechanism using a multi-source A* algorithm variant. Simulation results show that our algorithm is efficient and scalable with the number of requests and network size. Keywords: UAS scheduling Traffic management system Energy constraints Multi-source A* Graph search
Show less - PURL
- http://purl.flvc.org/fau/fd/FAUIR000384
- Format
- Document (PDF)
- Title
- Indoor localization using Wi-Fi fingerprinting.
- Creator
- Mirzaei, Azandaryani Saeid, Cardei, Ionut E., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Nowadays the widespread availability of wireless networks has created an interest in using them for other purposes, such as localization of mobile devices in indoor environments because of the lack of GPS signal reception indoors. Indoor localization has received great interest recently for the many context-aware applications it could make possible. We designed and implemented an indoor localization platform for Wi-Fi nodes (such as smartphones and laptops) that identifies the building name,...
Show moreNowadays the widespread availability of wireless networks has created an interest in using them for other purposes, such as localization of mobile devices in indoor environments because of the lack of GPS signal reception indoors. Indoor localization has received great interest recently for the many context-aware applications it could make possible. We designed and implemented an indoor localization platform for Wi-Fi nodes (such as smartphones and laptops) that identifies the building name, floor number, and room number where the user is located based on a Wi-Fi access point signal fingerprint pattern matching. We designed and evaluated a new machine learning algorithm, KRedpin, and developed a new web-services architecture for indoor localization based on J2EE technology with the Apache Tomcat web server for managing Wi-Fi signal data from the FAU WLAN. The prototype localization client application runs on Android cellphones and operates in the East Engineering building at FAU. More sophisticated classifiers have also been used to improve the localization accuracy using the Weka data mining tool.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fau/fd/FA0004038
- Subject Headings
- Location based services, Mobile geographic information systems, Wireless LANs, Wireless communication systems
- Format
- Document (PDF)
- Title
- Resilient system design and efficient link management for the wireless communication of an ocean current turbine test bed.
- Creator
- Marcus, Anthony M., Cardei, Ionut E., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
To ensure that a system is robust and will continue operation even when facing disruptive or traumatic events, we have created a methodology for system architects and designers which may be used to locate risks and hazards in a design and enable the development of more robust and resilient system architectures. It uncovers design vulnerabilities by conducting a complete exploration of a systems’ component operational state space by observing the system from multi-dimensional perspectives and...
Show moreTo ensure that a system is robust and will continue operation even when facing disruptive or traumatic events, we have created a methodology for system architects and designers which may be used to locate risks and hazards in a design and enable the development of more robust and resilient system architectures. It uncovers design vulnerabilities by conducting a complete exploration of a systems’ component operational state space by observing the system from multi-dimensional perspectives and conducts a quantitative design space analysis by means of probabilistic risk assessment using Bayesian Networks. Furthermore, we developed a tool which automated this methodology and demonstrated its use in an assessment of the OCTT PHM communication system architecture. To boost the robustness of a wireless communication system and efficiently allocate bandwidth, manage throughput, and ensure quality of service on a wireless link, we created a wireless link management architecture which applies sensor fusion to gather and store platform networked sensor metrics, uses time series forecasting to predict the platform position, and manages data transmission for the links (class based, packet scheduling and capacity allocation). To validate our architecture, we developed a link management tool capable of forecasting the link quality and uses cross-layer scheduling and allocation to modify capacity allocation at the IP layer for various packet flows (HTTP, SSH, RTP) and prevent congestion and priority inversion. Wireless sensor networks (WSN) are vulnerable to a plethora of different fault types and external attacks after their deployment. To maintain trust in these systems and increase WSN reliability in various scenarios, we developed a framework for node fault detection and prediction in WSNs. Individual wireless sensor nodes sense characteristics of an object or environment. After a smart device successfully connects to a WSN’s base station, these sensed metrics are gathered, sent to and stored on the device from each node in the network, in real time. The framework issues alerts identifying nodes which are classified as faulty and when specific sensors exceed a percentage of a threshold (normal range), it is capable of discerning between faulty sensor hardware and anomalous sensed conditions. Furthermore we developed two proof of concept, prototype applications based on this framework.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fau/fd/FA0004035
- Subject Headings
- Fault tolerance (Engineering), Reliability (Engineering), Sensor networks -- Security measures, Systems engineering, Wireless communication systems -- Technological innovations
- Format
- Document (PDF)
- Title
- Patterns for Enterprise Application Design and Development.
- Creator
- Rubis, Ruslan, Cardei, Ionut E., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Designing and developing enterprise applications is a complex and resource intensive process, as it often must address thousands of requirements. At the same time, the software architecture of most enterprise applications at their core have many features and structures in common. Designers from different teams do not normally share design elements because of the competitive and proprietary nature of development, and enterprise applications design and development teams end up re-inventing the...
Show moreDesigning and developing enterprise applications is a complex and resource intensive process, as it often must address thousands of requirements. At the same time, the software architecture of most enterprise applications at their core have many features and structures in common. Designers from different teams do not normally share design elements because of the competitive and proprietary nature of development, and enterprise applications design and development teams end up re-inventing the wheel when tackling a new product. My objective is to formulate new design patterns for enterprise application architectures that assist software architects with reusable solutions to improve design quality and productivity. I achieve this by presenting seven patterns, each providing a solution to a specific challenge or a problem that is common to many enterprise applications. The Business Object Pattern provides a generic approach to design extensible Business Objects and their frameworks for enterprise applications. The pattern covers a number of concepts, including the Dynamic business object, the Static business object, constraints for validity, editability, and attribute visibility, as well as the mechanisms for workflow. The Business Object Life Cycle Pattern introduces the concept of stages which comprise a business object’s life cycle, and their relation to the business object’s integrity during that life cycle. The Simple Change History Pattern provides a concept of enforcing record keeping of the owner and date of the last change performed on a given business data object. The Business Data Object Versioning Pattern offers a solution by introducing a new version of a given business data object which allows for preservation of the original data. The Change History Record Pattern defines a solution for cases when there is a need to capture detailed information about the changes performed on a given business object, such as who made the changes, when, and what changes were made. The Permission Based Granular Access Control Pattern offers a basic approach for access control to objects and their attributes. Finally, the Money Object Pattern offers a language neutral approach to internationalization and globalization of business applications which require multi-currency capability. It is hoped that applying these patterns will provide many advantages, ranging from quicker delivery times to a more reliable software, and ultimately help achieve a systematic approach to designing and building complex enterprise applications.
Show less - Date Issued
- 2017
- PURL
- http://purl.flvc.org/fau/fd/FA00004976, http://purl.flvc.org/fau/fd/FA00004966
- Subject Headings
- Dissertations, Academic -- Florida Atlantic University, Enterprise application integration (Computer systems), Software architecture--Development., Software Design., Application software--Design., Patterns.
- Format
- Document (PDF)
- Title
- NETWORK INTRUSION DETECTION AND DEEP LEARNING MECHANISMS.
- Creator
- Chatterjee, Suvosree, Cardei, Ionut, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
Cyber attack is a strong threat to the digital world. So, it’s very essential to keep the network safe. Network Intrusion Detection system is the system to address this problem. Network Intrusion Detection system functions like a firewall, and monitors incoming and outgoing traffic like ingress and egress filtering fire wall. Network Intrusion Detection System does anomaly and hybrid detection for detecting known and unknown attacks. My thesis discusses about the several network cyber attacks...
Show moreCyber attack is a strong threat to the digital world. So, it’s very essential to keep the network safe. Network Intrusion Detection system is the system to address this problem. Network Intrusion Detection system functions like a firewall, and monitors incoming and outgoing traffic like ingress and egress filtering fire wall. Network Intrusion Detection System does anomaly and hybrid detection for detecting known and unknown attacks. My thesis discusses about the several network cyber attacks we face nowadays and I created several Deep learning models to detect accurately, I used NSL-KDD dataset which is a popular dataset, that contains several network attacks. After experimenting with different deep learning models I found some disparities in the training accuracy and validation accuracy, which is a clear indication of overfitting. To reduce the overfitting I introduced regularization and dropout in the models and experimented with different hyperparameters.
Show less - Date Issued
- 2023
- PURL
- http://purl.flvc.org/fau/fd/FA00014128
- Subject Headings
- Deep learning (Machine learning), Cyberterrorism, Intrusion detection systems (Computer security)
- Format
- Document (PDF)
- Title
- PATH PLANNING ALGORITHMS FOR UNMANNED AIRCRAFT SYSTEMS WITH A SPACE-TIME GRAPH.
- Creator
- Steinberg, Andrew, Cardei, Mihaela, Cardei, Ionut, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
Unmanned Aircraft Systems (UAS) have grown in popularity due to their widespread potential applications, including efficient package delivery, monitoring, surveillance, search and rescue operations, agricultural uses, along with many others. As UAS become more integrated into our society and airspace, it is anticipated that the development and maintenance of a path planning collision-free system will become imperative, as the safety and efficiency of the airspace represents a priority. The...
Show moreUnmanned Aircraft Systems (UAS) have grown in popularity due to their widespread potential applications, including efficient package delivery, monitoring, surveillance, search and rescue operations, agricultural uses, along with many others. As UAS become more integrated into our society and airspace, it is anticipated that the development and maintenance of a path planning collision-free system will become imperative, as the safety and efficiency of the airspace represents a priority. The dissertation defines this problem as the UAS Collision-free Path Planning Problem. The overall objective of the dissertation is to design an on-demand, efficient and scalable aerial highway path planning system for UAS. The dissertation explores two solutions to this problem. The first solution proposes a space-time algorithm that searches for shortest paths in a space-time graph. The solution maps the aerial traffic map to a space-time graph that is discretized on the inter-vehicle safety distance. This helps compute safe trajectories by design. The mechanism uses space-time edge pruning to maintain the dynamic availability of edges as vehicles move on a trajectory. Pruning edges is critical to protect active UAS from collisions and safety hazards. The dissertation compares the solution with another related work to evaluate improvements in delay, run time scalability, and admission success while observing up to 9000 flight requests in the network. The second solution to the path planning problem uses a batch planning algorithm. This is a new mechanism that processes a batch of flight requests with prioritization on the current slack time. This approach aims to improve the planning success ratio. The batch planning algorithm is compared with the space-time algorithm to ascertain improvements in admission ratio, delay ratio, and running time, in scenarios with up to 10000 flight requests.
Show less - Date Issued
- 2021
- PURL
- http://purl.flvc.org/fau/fd/FA00013696
- Subject Headings
- Unmanned aerial vehicles, Drone aircraft, Drone aircraft--Automatic control, Space and time, Algorithms
- Format
- Document (PDF)
- Title
- SPACE-TIME GRAPH PATH PLANNING FOR UAS TRAFFIC MANAGEMENT SYSTEMS.
- Creator
- Papa, Rafael, Cardei, Mihaela, Cardei, Ionut, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
The unmanned aerial vehicle (UAV) technology has evolved considerably in recent years and the global demand for package delivery is expected to grow even more during COVID-19 and the social distance era. The low cost of acquisition, payload capacity, maneuverability, and the ability to y at low-altitude with a very low cost of operation, make UAVs a perfect fit to revolutionize the payload transportation of small items. The large-scale adoption of drone package delivery in high-density urban...
Show moreThe unmanned aerial vehicle (UAV) technology has evolved considerably in recent years and the global demand for package delivery is expected to grow even more during COVID-19 and the social distance era. The low cost of acquisition, payload capacity, maneuverability, and the ability to y at low-altitude with a very low cost of operation, make UAVs a perfect fit to revolutionize the payload transportation of small items. The large-scale adoption of drone package delivery in high-density urban areas can be challenging and the Unmanned Aircraft Systems (UAS) operators must ensure safety, security, efficiency and equity of the airspace system. In order to address some of these challenges, FAA and NASA have developed a new architecture that will support a set of services to enable cooperative management of low-altitude operations between UAS operators. The architecture is still in its conceptual stage and designing a mechanism that ensures the fair distribution of the available airspace to commercial applications has become increasingly important. Considering that, the path planning is one of the most important problems to be explored. The objective is not only to find an optimal and shortest path but also to provide a collision-free environment to the UAVs. Taking into consideration all these important aspects and others such as serving on-demand requests, flight duration limitation due to energy constraints, maintaining the safety distance to avoid collisions, and using warehouses as starting and ending points in parcel delivery, this dissertation proposes: (i) an energy-constrained scheduling mechanism using a multi-source A* algorithm variant, and (ii) a generalized path planning mechanism using a space-time graph with multi-source multi-destination BFS generalization to ensure pre-flight UAV collision-free trajectories. This dissertation also uses the generalized path planning mechanism to solve the energy-constrained drone delivery problem. The experimental results show that the proposed algorithms are computationally efficient and scalable with the number of requests and graph size.
Show less - Date Issued
- 2021
- PURL
- http://purl.flvc.org/fau/fd/FA00013861
- Subject Headings
- Unmanned aerial vehicles, Drone aircraft, Space and time
- Format
- Document (PDF)