Current Search: Hsu, Sam (x)
-
-
Title
-
System, Apparatus, and Methods for Performing State-Based Authentication, 2007.
-
Creator
-
Chen, Jihong, Hsu, Sam, Florida Atlantic University, Rajput, Saeed
-
Abstract/Description
-
A system for authenticating access to a data processing device or database is provided. The system includes a comparison module for comparing an attempt identifier with an account identifier, and a state-determining module for determining a state variable associated with at least one of the attempt identifier and the account identifier. The statedetermining module determines the state variable by incrementing the state variable if the attempt identifier does not match the account identifier...
Show moreA system for authenticating access to a data processing device or database is provided. The system includes a comparison module for comparing an attempt identifier with an account identifier, and a state-determining module for determining a state variable associated with at least one of the attempt identifier and the account identifier. The statedetermining module determines the state variable by incrementing the state variable if the attempt identifier does not match the account identifier and if the state variable is less than a predetermined upper bound threshold, decrementing the state variable if the attempt identifier does match the account identifier and if the state variable is greater than a predetermined lower bound threshold, and authenticating the attempt identifier if the attempt identifier does match the account identifier and if the state variable equals the predetermined lower bound threshold.
Show less
-
Date Issued
-
2007
-
PURL
-
http://purl.flvc.org/fau/fd/FAUIR000250
-
Format
-
Document (PDF)
-
-
Title
-
Design of a signaling gateway to interoperate H.323 and SIP protocols.
-
Creator
-
Akbarian, Hamid., Florida Atlantic University, Hsu, Sam
-
Abstract/Description
-
This thesis proposes a design for a signaling gateway to address the issues of interoperability between H.323 and SIP. The two IP Telephony standards currently compete for the dominance of IP telephony protocols. We investigate and study these two protocols in terms of interoperability. The question central to this thesis is the issue of interoperability between H.323 and SIP. A signaling gateway model is proposed and designed to address and solve this issue. The proposed model includes Call...
Show moreThis thesis proposes a design for a signaling gateway to address the issues of interoperability between H.323 and SIP. The two IP Telephony standards currently compete for the dominance of IP telephony protocols. We investigate and study these two protocols in terms of interoperability. The question central to this thesis is the issue of interoperability between H.323 and SIP. A signaling gateway model is proposed and designed to address and solve this issue. The proposed model includes Call Initialization, Call Setup and Control, Capability Exchange and Call Termination, which are the four fundamental features supported by H.323 and SIP for establishing calls. Furthermore, we design the four internal components, which are common to the four main functions mentioned above. These four components are type checking, decomposition, conversion and reformatting. In addition, we illustrate in six different cases the functionality of the proposed signaling gateway for establishing calls between H.323 and SIP. These six cases also demonstrate the conversion capability of the proposed signaling gateway during a call between H.323 and SIP endpoints.
Show less
-
Date Issued
-
2001
-
PURL
-
http://purl.flvc.org/fcla/dt/12784
-
Subject Headings
-
Internet telephony, Computer network protocols, Packet switching (Data transmission)
-
Format
-
Document (PDF)
-
-
Title
-
Web-based academic advising system.
-
Creator
-
Ding, Xundong., Florida Atlantic University, Hsu, Sam, Marques, Oge
-
Abstract/Description
-
Academic advising is an important and time-consuming task and different tools and techniques can be used to make it an effective and efficient process. This thesis describes the design and development of a Web-based advising system that supplements the conventional advising process. The goals of the system include: to minimize repetitive tasks performed by advisors, to encourage students to adopt a proactive attitude towards advising, to make advising-related information available to remote...
Show moreAcademic advising is an important and time-consuming task and different tools and techniques can be used to make it an effective and efficient process. This thesis describes the design and development of a Web-based advising system that supplements the conventional advising process. The goals of the system include: to minimize repetitive tasks performed by advisors, to encourage students to adopt a proactive attitude towards advising, to make advising-related information available to remote students in a single place, in electronic format, and to minimize inconsistencies in the advising process. The system supports three different types of users (students, advisors, and secretaries). This thesis proposes a new Web-based advising system model. It also presents its architecture and an implementation of a prototype. Web-based advising system introduces a new approach towards advising over the Internet. Lessons learned from various experiments of the prototype are discussed in this thesis.
Show less
-
Date Issued
-
2002
-
PURL
-
http://purl.flvc.org/fcla/dt/12880
-
Subject Headings
-
Counseling in higher education--Computer network resources, World Wide Web, Faculty advisors--Computer network resources
-
Format
-
Document (PDF)
-
-
Title
-
Estimation of information: Theoretics-based delay bounds of MPEG traffic over ATM networks.
-
Creator
-
Jagannathan, Shuba., Florida Atlantic University, Hsu, Sam, Neelakanta, Perambur S.
-
Abstract/Description
-
This thesis addresses a method to deduce the statistical bounds associated with the cell-transfer delay variations (CDVs) encountered by the cells of MPEG traffic, transmitted in the Asynchronous Transfer Mode (ATM) networks. This study focuses on: (1) Estimating CDV arising from multiplexing/switching for both constant bit rate (CBR) and variable bit rate (VBR) traffics via priority allocation based simulations. (2) Developing an information-theoretics based technique to get an insight of...
Show moreThis thesis addresses a method to deduce the statistical bounds associated with the cell-transfer delay variations (CDVs) encountered by the cells of MPEG traffic, transmitted in the Asynchronous Transfer Mode (ATM) networks. This study focuses on: (1) Estimating CDV arising from multiplexing/switching for both constant bit rate (CBR) and variable bit rate (VBR) traffics via priority allocation based simulations. (2) Developing an information-theoretics based technique to get an insight of the combined BER-induced and multiplexing/switching-induced CDVs in ATM networks. Algorithms pertinent to CDV statistics are derived and the lower and upper bounds of the statistics are obtained via simulations in respect of CBR and VBR traffics. Ascertaining these bounds is useful in the cell admission control (CAC) strategies adopted in ATM transmissions. Inferential remarks indicating the effects of traffic parameters (such as bandwidth, burstiness etc.) on the values of the statistical bounds are presented, and scope for further work are presented.
Show less
-
Date Issued
-
1998
-
PURL
-
http://purl.flvc.org/fcla/dt/15577
-
Subject Headings
-
Asynchronous transfer mode, Broadband communication systems, Integrated services digital networks, Information theory
-
Format
-
Document (PDF)
-
-
Title
-
Studies on traffic characteristics in asynchronous transfer mode telecommunications.
-
Creator
-
Abeygunawardana, Sumudi Man., Florida Atlantic University, Neelakanta, Perambur S., Hsu, Sam
-
Abstract/Description
-
This thesis is concerned with an outline survey on the modern aspects of asynchronous transmission mode (ATM) telecommunication; also considered are certain specific issues such as the performance characteristics of ATM-based telecommunication networks under fluctuating workloads. Estimation of the stochasticity of the jitter associated with the cell-delay arising out of buffering within the network as well as due to signal-to-noise considerations which induce bit-errors and eventually lead...
Show moreThis thesis is concerned with an outline survey on the modern aspects of asynchronous transmission mode (ATM) telecommunication; also considered are certain specific issues such as the performance characteristics of ATM-based telecommunication networks under fluctuating workloads. Estimation of the stochasticity of the jitter associated with the cell-delay arising out of buffering within the network as well as due to signal-to-noise considerations which induce bit-errors and eventually lead to cell-losses manifesting as delay(s) in the cells being transmitted, is also addressed as a part of this thesis efforts. Relevant theoretical models are proposed, algorithms are developed and simulations are done on the above considerations. Based on these efforts, inferential conclusions are drawn and discussed. Scope for future research and developments towards engineering design of softwares suitable for practical applications by ATM networking planners and traffic forecasters is indicated. Merits and shortcomings of the models are proposed and algorithmic approaches pursued in the present study are also specified with relevant discussions.
Show less
-
Date Issued
-
1996
-
PURL
-
http://purl.flvc.org/fcla/dt/15247
-
Subject Headings
-
Asynchronous transfer mode, Telecommunication--Traffic, Telematics
-
Format
-
Document (PDF)
-
-
Title
-
SoftBoard: A Web-based application sharing system for distance learning.
-
Creator
-
Adusumilli, Krishna K., Florida Atlantic University, Chung Hsu, Sam
-
Abstract/Description
-
The thesis describes the development of SoftBoard, a Web-based application sharing system. The main goal is to create a convenient tool for conducting virtual office hours for distance education over the Internet. It has been reported in the recent research papers that the current Internet is still not suitable for supporting collaborative tools such as audio/video conferencing and some advanced application sharing features as proclaimed by developers. However the Internet can be used to a...
Show moreThe thesis describes the development of SoftBoard, a Web-based application sharing system. The main goal is to create a convenient tool for conducting virtual office hours for distance education over the Internet. It has been reported in the recent research papers that the current Internet is still not suitable for supporting collaborative tools such as audio/video conferencing and some advanced application sharing features as proclaimed by developers. However the Internet can be used to a lesser degree to fulfill needs of smaller application sharing systems which are not very network bandwidth intensive. SoftBoard is designed to be used over today's Internet, and can be easily invoked from a standard Web browser. It is developed in Java and is implemented using Java's Remote Method Invocation (RMI) for networking. A light pen can be used with SoftBoard to provide a convenient way for creating non-textual contents free hand. The thesis is part of the ongoing research work at Florida Atlantic University's Center for Innovative Distance Education Technologies (CIDET). Research work has been done to validate the present Internet for its capabilities to hold a true distance education program using various available collaborative tools.
Show less
-
Date Issued
-
1999
-
PURL
-
http://purl.flvc.org/fcla/dt/15705
-
Subject Headings
-
Internet in education, Distance education
-
Format
-
Document (PDF)
-
-
Title
-
An XML-based data exchange model.
-
Creator
-
Sreenivasan, Sridhar., Florida Atlantic University, Hsu, Sam, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
Data are the backbone to any organization. In some organizations there are applications that operate on a distributed platform. These applications might often communicate with applications on a different platform, that structures data in a different format. The manner in which data is transferred between such applications can become complex, because there will be many platform dependent applications that need to process the data transferred. Hence a mechanism for exchange of data in a simple,...
Show moreData are the backbone to any organization. In some organizations there are applications that operate on a distributed platform. These applications might often communicate with applications on a different platform, that structures data in a different format. The manner in which data is transferred between such applications can become complex, because there will be many platform dependent applications that need to process the data transferred. Hence a mechanism for exchange of data in a simple, effective manner for such applications is a basic necessity. In this thesis, such a mechanism to deal with data exchange in a platform independent manner is discussed. The proposed model is XML-based, and data between the applications is exchanged in the form of XML documents. XML is text-based and can be processed by any application existing on any platform. The model has an interface that processes the XML documents transferred between the client applications and the underlying database systems. The model is implemented in a System administration application. The application is a Web application that transfers data in the XML format. This is processed by the interface and transferred to the database. Data from the database is retrieved and converted to XML documents by the interface and transferred to the client (Web) applications.
Show less
-
Date Issued
-
2002
-
PURL
-
http://purl.flvc.org/fcla/dt/12926
-
Subject Headings
-
XML (Document markup language)
-
Format
-
Document (PDF)
-
-
Title
-
YACAD: Yet Another Congestion Avoidance Design for ATM-based networks.
-
Creator
-
Hsu, Sam, Florida Atlantic University, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
This dissertation proposes YACAD (Yet Another Congestion Avoidance Design for ATM-based Networks), a congestion prevention model that includes admission control, traffic shaping, and link-by-link flow control for ATM-based networks. Network traffic in this model is composed of real-time traffic and data traffic. As real-time traffic is delay-sensitive and connection-oriented, its call acceptance is based upon the effective bandwidth at all nodes. Effective bandwidth is defined as a vector of...
Show moreThis dissertation proposes YACAD (Yet Another Congestion Avoidance Design for ATM-based Networks), a congestion prevention model that includes admission control, traffic shaping, and link-by-link flow control for ATM-based networks. Network traffic in this model is composed of real-time traffic and data traffic. As real-time traffic is delay-sensitive and connection-oriented, its call acceptance is based upon the effective bandwidth at all nodes. Effective bandwidth is defined as a vector of bandwidth and maximum node delay. As data traffic can be either connection-oriented or connectionless, it is subject to link-by-link flow control based on a criterion known as effective buffer which is defined as a scalar of buffer size. Data traffic is not delay-sensitive but is loss-sensitive. Traffic shaping is imposed on real-time traffic to ensure a smooth inflow of real-time cells. YACAD also allocates a large buffer (fat bucket) to data traffic to accommodate sudden long bursts of data cells. Absence of data cell loss is a major feature of YACAD. Two simulation studies on the performance of the model are conducted. Analyses of the simulation results show that the proposed congestion avoidance model can achieve congestion-free networking and bounded network delays for real-time traffic at high levels of channel utilization. The maximum buffer requirements for loss-free cell delivery for data traffic, and the cell loss probabilities for real-time traffic are also obtained. In addition, results of performance comparisons to other similar models have shown that YACAD outperforms several other leaky-bucket based congestion control methods in terms of cell loss probability for real-time traffic. The simulation source program has also been verified using existing queueing theories, and the Paired-t Confidence Interval method with satisfactory results at 99% confidence level.
Show less
-
Date Issued
-
1993
-
PURL
-
http://purl.flvc.org/fcla/dt/12336
-
Subject Headings
-
Integrated services digital networks, Broadband communications systems, Packet switching (Data transmission), Computer networks--Management
-
Format
-
Document (PDF)
-
-
Title
-
VCOIN: Virtual Classroom Over the Internet.
-
Creator
-
Patel, Rajesh Jivanbhai., Florida Atlantic University, Hsu, Sam, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
Today we live in the world where geographic distances on this planet are no longer big hurdles for information exchange. This has been possible due to widespread use of the Internet in recent years. Emergence of the Internet and the World Wide Web (WWW) have been significant in the development of low cost distance learning systems. In recent years, technologies for multimedia online publishing and online collaboration have developed significantly. Because of these developments, cost-effective...
Show moreToday we live in the world where geographic distances on this planet are no longer big hurdles for information exchange. This has been possible due to widespread use of the Internet in recent years. Emergence of the Internet and the World Wide Web (WWW) have been significant in the development of low cost distance learning systems. In recent years, technologies for multimedia online publishing and online collaboration have developed significantly. Because of these developments, cost-effective information exchange and two-way communication across the Internet is possible. This thesis proposes a new virtual classroom model named Virtual Classroom Over the Internet (VCOIN). It also presents a high-level architecture and a implementation of a prototype of VCOIN. VCOIN introduces a new approach towards teaching across the Internet. It also has some unique features that brings it one step closer to being a truly virtual classroom system over the Internet. Lessons learned from various experiments of the VCOIN prototype are described in this thesis.
Show less
-
Date Issued
-
1998
-
PURL
-
http://purl.flvc.org/fcla/dt/15530
-
Subject Headings
-
Internet in education, Telecommunication in education, Distance education--Computer-assisted instruction
-
Format
-
Document (PDF)
-
-
Title
-
Application level intrusion detection using a sequence learning algorithm.
-
Creator
-
Dong, Yuhong., Florida Atlantic University, Hsu, Sam, Rajput, Saeed, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
An un-supervised learning algorithm on application level intrusion detection, named Graph Sequence Learning Algorithm (GSLA), is proposed in this dissertation. Experiments prove its effectiveness. Similar to most intrusion detection algorithms, in GSLA, the normal profile needs to be learned first. The normal profile is built using a session learning method, which is combined with the one-way Analysis of Variance method (ANOVA) to determine the value of an anomaly threshold. In the proposed...
Show moreAn un-supervised learning algorithm on application level intrusion detection, named Graph Sequence Learning Algorithm (GSLA), is proposed in this dissertation. Experiments prove its effectiveness. Similar to most intrusion detection algorithms, in GSLA, the normal profile needs to be learned first. The normal profile is built using a session learning method, which is combined with the one-way Analysis of Variance method (ANOVA) to determine the value of an anomaly threshold. In the proposed approach, a hash table is used to store a sparse data matrix in triple data format that is collected from a web transition log instead of an n-by-n dimension matrix. Furthermore, in GSLA, the sequence learning matrix can be dynamically changed according to a different volume of data sets. Therefore, this approach is more efficient, easy to manipulate, and saves memory space. To validate the effectiveness of the algorithm, extensive simulations have been conducted by applying the GSLA algorithm to the homework submission system at our computer science and engineering department. The performance of GSLA is evaluated and compared with traditional Markov Model (MM) and K-means algorithms. Specifically, three major experiments have been done: (1) A small data set is collected as a sample data, and is applied to GSLA, MM, and K-means algorithms to illustrate the operation of the proposed algorithm and demonstrate the detection of abnormal behaviors. (2) The Random Walk-Through sampling method is used to generate a larger sample data set, and the resultant anomaly score is classified into several clusters in order to visualize and demonstrate the normal and abnormal behaviors with K-means and GSLA algorithms. (3) Multiple professors' data sets are collected and used to build the normal profiles, and the ANOVA method is used to test the significant difference among professors' normal profiles. The GSLA algorithm can be made as a module and plugged into the IDS as an anomaly detection system.
Show less
-
Date Issued
-
2006
-
PURL
-
http://purl.flvc.org/fcla/dt/12220
-
Subject Headings
-
Data mining, Parallel processing (Electronic computers), Computer algorithms, Computer security, Pattern recognition systems
-
Format
-
Document (PDF)
-
-
Title
-
Design and implementation of a wireless ad hoc network.
-
Creator
-
Neelakanta, Mahesh., Florida Atlantic University, Hsu, Sam, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
This thesis addresses issues faced in the practical implementation of a wireless ad hoc network (WAHN) protocol for data transmission. This study focuses on: (1) Evaluating existing hardware and software options available for the WAHN implementation. (2) Appraising the issues faced while implementing a practical wireless ad hoc protocol. (3) Applying a set of MAC protocol specifications developed for a wireless ad hoc data network to a practical test network. Specific to the above topics of...
Show moreThis thesis addresses issues faced in the practical implementation of a wireless ad hoc network (WAHN) protocol for data transmission. This study focuses on: (1) Evaluating existing hardware and software options available for the WAHN implementation. (2) Appraising the issues faced while implementing a practical wireless ad hoc protocol. (3) Applying a set of MAC protocol specifications developed for a wireless ad hoc data network to a practical test network. Specific to the above topics of interest, the following research tasks are performed: (1) An elaborate survey and relevant discussions on wireless MAC protocols. (2) A comprehensive study comparing various wireless transceivers is performed. Range, data rate, frequency, interfacing method and cost are the factors compared. (3) A simple, low-cost and low baud-rate transceiver is modified with appropriate interface circuits to support wireless communications. A more advanced transceiver is also considered and used for the software foundation of a practical implementation of the ad hoc and MAC protocols. The studies enable assessing the problems faced during the implementation and suggest solutions to resolve these problems. Further areas for study are also discussed.
Show less
-
Date Issued
-
1998
-
PURL
-
http://purl.flvc.org/fcla/dt/15615
-
Subject Headings
-
Wireless communication systems, Data transmission systems, Computer networks
-
Format
-
Document (PDF)
-
-
Title
-
Distributed management of heterogeneous networks using hypermedia data repositories.
-
Creator
-
Anderson, James M., Florida Atlantic University, Ilyas, Mohammad, Hsu, Sam, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
Current management architectures address portions of the problem of managing high speed distributed networks; however, they do not provide a scalable end-to-end solution that can be applied to both large LAN and WAN high speed distributed networks. A new management architecture, "Web Integrated Network for Distributed Management Including Logic" (WINDMIL), is proposed to address the challenges of managing complex heterogeneous networks. The three primary components of the system are the...
Show moreCurrent management architectures address portions of the problem of managing high speed distributed networks; however, they do not provide a scalable end-to-end solution that can be applied to both large LAN and WAN high speed distributed networks. A new management architecture, "Web Integrated Network for Distributed Management Including Logic" (WINDMIL), is proposed to address the challenges of managing complex heterogeneous networks. The three primary components of the system are the Network Management Server (NMS), the Network Element Web Server (NEWS), and the Operator's Logic and Processing Platform (OLAPP). The NMS stores the management functions used by both the NEWS and the user. The NEWS is a Web server which collects and processes network element data in order to support management functions. The OLAPP executes the management functions and interfaces with the user.
Show less
-
Date Issued
-
1997
-
PURL
-
http://purl.flvc.org/fcla/dt/12502
-
Subject Headings
-
Computer network architectures, Internetworking (Telecommunication), Computer network protocols
-
Format
-
Document (PDF)
-
-
Title
-
Concord: A proactive lightweight middleware to enable seamless connectivity in a pervasive environment.
-
Creator
-
Mutha, Mahesh., Florida Atlantic University, Hsu, Sam, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
One of the major components of any pervasive system is its proactive behavior. Various models have been developed to provide system wide changes which would enable proactive behavior. A major drawback of these approaches is that they do not address the need to make use of existing applications whose design cannot be changed. To overcome this drawback, a middleware architecture called "Concord" is proposed. Concord is based on a simple model which consists of Lookup Server and Database. The...
Show moreOne of the major components of any pervasive system is its proactive behavior. Various models have been developed to provide system wide changes which would enable proactive behavior. A major drawback of these approaches is that they do not address the need to make use of existing applications whose design cannot be changed. To overcome this drawback, a middleware architecture called "Concord" is proposed. Concord is based on a simple model which consists of Lookup Server and Database. The rewards for this simple model are many. First, Concord uses the existing computing infrastructure. Second, Concord standardizes the interfaces for all services and platforms. Third new services can be added dynamically without any need for reconfiguration. Finally, Concord consists of Database that can maintain and publish the active set of available resources. Thus Concord provides a solid system for integration of various entities to provide seamless connectivity and enable proactive behavior.
Show less
-
Date Issued
-
2005
-
PURL
-
http://purl.flvc.org/fcla/dt/13234
-
Subject Headings
-
CONCORD (Computer architecture), Middleware, Computer architecture, Database management
-
Format
-
Document (PDF)
-
-
Title
-
Development and simulation of vertical profiling capability for FAU autonomous underwater vehicles.
-
Creator
-
Lin, Huaying., Florida Atlantic University, Hsu, Sam, An, Edgar, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
This thesis describes the development of a simulation environment for Autonomous Underwater Vehicles (AUVs) on UNIX platforms. AUV missions can therefore be carried out without going to the sea. The Yoyo controller, a component for AUVs is also described in this thesis. The main function of Yoyo is to control the vertical profile of an AUV while it is navigating underwater performing data collection missions. The development of the controller is done in the simulation environment. Several...
Show moreThis thesis describes the development of a simulation environment for Autonomous Underwater Vehicles (AUVs) on UNIX platforms. AUV missions can therefore be carried out without going to the sea. The Yoyo controller, a component for AUVs is also described in this thesis. The main function of Yoyo is to control the vertical profile of an AUV while it is navigating underwater performing data collection missions. The development of the controller is done in the simulation environment. Several test cases have been performed, and the test results have clearly demonstrated the successful development of the controller.
Show less
-
Date Issued
-
1998
-
PURL
-
http://purl.flvc.org/fcla/dt/15599
-
Subject Headings
-
Oceanographic submersibles--Computer simulation, Underwater navigation
-
Format
-
Document (PDF)
-
-
Title
-
Remote database access over Internet in Windows environment.
-
Creator
-
Ren, Yongjian., Florida Atlantic University, Hsu, Sam, Solomon, Martin K., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
This thesis deals with remote database access over the Internet. Three different approaches to remote database access, the CGI-based approach, the Oracle Webserver-based approach and the CORBA-based approach, are discussed. Experiments are conducted to compare the pros and cons of each approach. The Oracle database and Microsoft Access database are utilized as the target database systems. For the CGI-based approach, the CGI programs are coded with ProC, Oracle's SQL-embedded C language, in...
Show moreThis thesis deals with remote database access over the Internet. Three different approaches to remote database access, the CGI-based approach, the Oracle Webserver-based approach and the CORBA-based approach, are discussed. Experiments are conducted to compare the pros and cons of each approach. The Oracle database and Microsoft Access database are utilized as the target database systems. For the CGI-based approach, the CGI programs are coded with ProC, Oracle's SQL-embedded C language, in Microsoft Visual C++ developer's studio, and a Student Record example is demonstrated. For the Oracle Webserver-based approach, the Oracle Webserver 1.1 has been setup and an Online Shopping Club example is demonstrated. For the CORBA-based approach, Orbix Web 2.0.1 and JDK 1.1.1 are utilized as the CORBA system and the development language, respectively, and several examples including single server, multiple servers and multiple databases are presented. An extended SQL syntax is proposed to manipulate data from multiple database systems residing on different hosts in one SQL statement. The implementation of extended SQL statements in CORBA's server/client application is also suggested. With the help of extended SQL syntax and CORBA's multiple server access feature, an example of the client application accessing two databases at a time is illustrated. The pros and cons are discussed of the three remote database access approaches studied in the thesis: (I) The CGI-based approach, which is the most generic and widely used approach. (II) The Oracle Webserver approach, which is a relatively simplified way of the CGI approach, easy to apply but limited in applications. (III) The CORBA-based approach, which is the most powerful and sophisticated approach for remote database access.
Show less
-
Date Issued
-
1998
-
PURL
-
http://purl.flvc.org/fcla/dt/15590
-
Subject Headings
-
Database management, World Wide Web, Microsoft network (Online service)
-
Format
-
Document (PDF)
-
-
Title
-
iVEST A: Interactive Data Visualization and Analysis for Drive Test Data Evaluation.
-
Creator
-
Lee, Yongsuk, Zhu, Xingquan, Pandya, Abhijit S., Hsu, Sam, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
In this thesis, a practical solution for drive test data evaluation and a real application are studied. We propose a system framework to project high dimensional Drive Test Data (DTD) to well-organized web pages, such that users can visually review phone performance with respect to different factors. The proposed application, iVESTA (interactive Visualization and Evaluation System for driven Test dAta), employs a web-based architecture which enables users to upload DTD and immediately...
Show moreIn this thesis, a practical solution for drive test data evaluation and a real application are studied. We propose a system framework to project high dimensional Drive Test Data (DTD) to well-organized web pages, such that users can visually review phone performance with respect to different factors. The proposed application, iVESTA (interactive Visualization and Evaluation System for driven Test dAta), employs a web-based architecture which enables users to upload DTD and immediately visualize the test results and observe phone and network performances with respect to different factors such as dropped call rate, signal quality, vehicle speed, handover and network delays. iVESTA provides practical solutions for mobile phone manufacturers and network service providers to perform comprehensive study on their products from the real-world DTD.
Show less
-
Date Issued
-
2007
-
PURL
-
http://purl.flvc.org/fau/fd/FA00012532
-
Subject Headings
-
Information visualization--Data processing, Object-oriented programming (Computer science), Information technology--Management, Application software--Development
-
Format
-
Document (PDF)
-
-
Title
-
Visualization as a Qualitative Method for Analysis of Data from Location Tracking Technologies.
-
Creator
-
Mani, Mohan, VanHilst, Michael, Pandya, Abhijit S., Hsu, Sam, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
One of the biggest factors in the quest to better wireless communication is cellular call handoff, which in tum, is a function of geographic location. In this thesis, our fundamental goal was to demonstrate the value addition brought forth by spatial data visualization techniques for the analysis of geo-referenced data from two different location tracking technologies: GPS and cellular systems. Through our efforts, we unearthed some valuable and surprising insights from the data being...
Show moreOne of the biggest factors in the quest to better wireless communication is cellular call handoff, which in tum, is a function of geographic location. In this thesis, our fundamental goal was to demonstrate the value addition brought forth by spatial data visualization techniques for the analysis of geo-referenced data from two different location tracking technologies: GPS and cellular systems. Through our efforts, we unearthed some valuable and surprising insights from the data being analyzed that led to interesting observations about the data itself as opposed to the entity, or entities, that the data is supposed to describe. In doing so, we underscored the value addition brought forth by spatial data visualization techniques even in the incipient stages of analysis of georeferenced data from cellular networks. We also demonstrated the value of visualization techniques as a verification tool to verify the results of analysis done through other methods, such as statistical analysis.
Show less
-
Date Issued
-
2008
-
PURL
-
http://purl.flvc.org/fau/fd/FA00012536
-
Subject Headings
-
Mobile communication systems, Algorithms--Data analysis, Radio--Transmitters and transmissions, Code division multiple access
-
Format
-
Document (PDF)
-
-
Title
-
Mitigating worm propagation on virtual LANs.
-
Creator
-
Sun, Xiaoguang., Florida Atlantic University, Rajput, Saeed, Hsu, Sam, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
Recent worms have used sophisticated propagation techniques to propagate faster than the patch distribution and have utilized previously unknown vulnerabilities. To mitigate repetition of such epidemics in future, active defense mechanisms are needed that not only identify malicious activity, but can also defend against widespread outbreak. We provide a framework capable of reacting quickly to quarantine infections. The fundamental components of our framework are detector and VLAN switch. We...
Show moreRecent worms have used sophisticated propagation techniques to propagate faster than the patch distribution and have utilized previously unknown vulnerabilities. To mitigate repetition of such epidemics in future, active defense mechanisms are needed that not only identify malicious activity, but can also defend against widespread outbreak. We provide a framework capable of reacting quickly to quarantine infections. The fundamental components of our framework are detector and VLAN switch. We have provided a proof of concept implementation, where we use the Blaster worm as an example, and demonstrate that detection of worms is possible, and individual infected hosts can be isolated quickly. Furthermore, using Monte Carlo simulations, we show that such containment of future epidemics is possible. In addition, we also compute the overhead of detection and mitigation approaches and have shown that our approach has lower overhead compared to the others.
Show less
-
Date Issued
-
2006
-
PURL
-
http://purl.flvc.org/fcla/dt/13369
-
Subject Headings
-
Wireless LANs--Security measures, Wireless communication systems--Security measures, Computer viruses--Prevention, Computer security
-
Format
-
Document (PDF)
-
-
Title
-
Estimation of information-theoretics-based delay-bounds in ATM networks.
-
Creator
-
Wei, Liqun., Florida Atlantic University, Hsu, Sam, Neelakanta, Perambur S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
This thesis addresses a method of deducing the statistical upper and lower bounds associated with the cell-transfer delay variations (CDVs) encountered by the cells transmitted in the asynchronous transfer mode (ATM) networks due to cell losses. This study focuses on: (1) Estimating CDV arising from multiplexing/switching for both constant bit rate and variable bit rate services via simulations. (2) Deducing an information-theoretics based new technique to get an insight of the combined BER...
Show moreThis thesis addresses a method of deducing the statistical upper and lower bounds associated with the cell-transfer delay variations (CDVs) encountered by the cells transmitted in the asynchronous transfer mode (ATM) networks due to cell losses. This study focuses on: (1) Estimating CDV arising from multiplexing/switching for both constant bit rate and variable bit rate services via simulations. (2) Deducing an information-theoretics based new technique to get an insight of the combined BER-induced and multiplexing/switching-induced CDVs in ATM networks. Algorithms on the CDV statistics are derived and the lower and upper bounds of the statistics are obtained via simulations in respect of CBR and VBR traffics. These bounds bounds are useful in the cell-admission control (CAC) strategies adapted in ATM transmissions. Inferential remarks indicating the effects of traffic parameters (such as bandwidth, burstiness etc.) on the values of the statistical bounds are presented, and scope for further work is indicated.
Show less
-
Date Issued
-
1997
-
PURL
-
http://purl.flvc.org/fcla/dt/15444
-
Subject Headings
-
Asynchronous transfer mode, Telecommunication, Computer networks, Broadband communication systems
-
Format
-
Document (PDF)
-
-
Title
-
Course scheduling support system.
-
Creator
-
Khan, Jawad Ahmed., Florida Atlantic University, Levow, Roy B., Hsu, Sam, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
The Course Scheduling Support System is designed to facilitate manual generation of the faculty course scheduling process. It aids in assigning faculty to courses and assigning each course section to their time block. It captures historic and current scheduling information in an organized manner making information needed to create new schedules more readily and quickly available. The interaction between user and database is made as friendly as possible so that managing, manipulating,...
Show moreThe Course Scheduling Support System is designed to facilitate manual generation of the faculty course scheduling process. It aids in assigning faculty to courses and assigning each course section to their time block. It captures historic and current scheduling information in an organized manner making information needed to create new schedules more readily and quickly available. The interaction between user and database is made as friendly as possible so that managing, manipulating, populating and retrieving scheduling data is simple and efficient. We have implemented an open source web-based prototype of the proposed system using PHP, MySQL, and the Apache Web Server. It can be invoked with a standard Web browser and has an intuitive user interface. It provides tools for customizing web forms that can be easily used by non-technical users. Our department plans to deploy this system by Fall 2006.
Show less
-
Date Issued
-
2006
-
PURL
-
http://purl.flvc.org/fcla/dt/13343
-
Subject Headings
-
Scheduling--Data processing, Constraints (Artificial intelligence), Electronic data processing--Distributed processing
-
Format
-
Document (PDF)