Current Search: Orientalism. (x)
View All Items
Pages
- Title
- A methodology for object-oriented modeling and design of real-time, fault-tolerant systems.
- Creator
- Hancock, Debera R., Florida Atlantic University, Fernandez, Eduardo B.
- Abstract/Description
-
Many methodologies for software modeling and design include some form of static and dynamic modeling to describe the structural and behavioral views respectively. Modeling and design of complex real-time software systems requires notations for describing concurrency, asynchronous event handling, communication between independent machines, timing properties, and accessing real time. Function-oriented structured analysis methodologies such as Ward and Mellor's SA/RT and Harel's Statecharts have...
Show moreMany methodologies for software modeling and design include some form of static and dynamic modeling to describe the structural and behavioral views respectively. Modeling and design of complex real-time software systems requires notations for describing concurrency, asynchronous event handling, communication between independent machines, timing properties, and accessing real time. Function-oriented structured analysis methodologies such as Ward and Mellor's SA/RT and Harel's Statecharts have provided extensions for real-time system modeling. Dynamic modeling of real time systems using object-oriented methodologies also requires extensions to the traditional state machine notations in order to convey the real time system characteristics and constraints. Shaw's Communicating Real Time State Machines (CRSM's), Harel's O-Chart notations, and the Octopus methodology provide methods for modeling real-time systems consistent with object-oriented methods. This thesis proposes an object-oriented analysis and design methodology that augments the traditional Object Modeling Technique (OMT) dynamic model with real-time extensions based on high-level parallel machines and communication notations from CRSM. An example of the proposed methodology is provided using a realistic but hypothetical example of an automated passenger train system. A design refinement step is included for fault tolerant considerations. An evaluation of the proposed methodology with its extended notations is provided.
Show less - Date Issued
- 1997
- PURL
- http://purl.flvc.org/fcla/dt/15405
- Subject Headings
- Object-oriented methods (Computer science), Fault-tolerant computing, Real-time programming
- Format
- Document (PDF)
- Title
- Industrial-strength formalization of object-oriented real-time systems.
- Creator
- Raghavan, Gopalakrishna., Florida Atlantic University, Larrondo-Petrie, Maria M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The goal of this dissertation is to propose an industrial-strength formal model for object-oriented real-time systems that captures real-time constraints using industry standard notations and tools. A light-weight formalization process is proposed that is semi-formal, graphical and easier to read and understand. This process supports formal behavior analysis, verification and validation. It is very effective in early detection of incompleteness and ambiguities in the specifications. The...
Show moreThe goal of this dissertation is to propose an industrial-strength formal model for object-oriented real-time systems that captures real-time constraints using industry standard notations and tools. A light-weight formalization process is proposed that is semi-formal, graphical and easier to read and understand. This process supports formal behavior analysis, verification and validation. It is very effective in early detection of incompleteness and ambiguities in the specifications. The proposed process uses industry standard tools and fits well within stringent industrial schedules. Formal requirements analysis is conducted using High Level Message Sequencing Chart (HMSC) and Message Sequencing Chart (MSC). In the formal analysis phase, the static structures are modeled using Unified Modeling Language (UML) and the constraints are formalized using Object Constraint Language (OCL). System behavior is formally modeled using Specification and Description Language (SDL) during the formal design phase. SDL is used for behavior modeling due to wide commercial availability of SDL-based tools for formal behavior analysis and validation. Transition rules mapping from UML Class Diagrams and Statecharts to SDL models are proposed. SDL models are formally simulated and validated during the formal validation phase. Using the proposed process real-time clock, timer, periodic process, aperiodic process, resource and precedence constraints were formalized. Different types of timers, such as periodic, aperiodic, one-shot, fixed-interval and variable-interval timers are derived using inheritance models. Semaphore wait and signal operations are formalized as part of the resource constraint. Pre-conditions, post-conditions and invariants for the real-time constraints were captured using OCL. Behavior of the proposed models were captured using Statecharts. The proposed mapping rules were used to translate the behavior models to SDL. The SDL models were formally simulated and validated using Telelogic Software Development Tool (SDT). The tools allowed extensive model analysis and helped uncover several design flaws. The real-time constraints were stereotyped and packaged into reusable formal components. These components can be easily imported by applications. Two case studies, Cruise Control System and Bottle Filling System, are included to illustrate the use of the proposed process and the real-time package. The "industrial-strength" of the process was validated by utilizing the proposed process in an industrial project where it was found to accelerate the development process.
Show less - Date Issued
- 2000
- PURL
- http://purl.flvc.org/fcla/dt/12632
- Subject Headings
- Object-oriented programming (Computer science), Real-time data processing, Formal methods (Computer science)
- Format
- Document (PDF)
- Title
- Analyzing software repository data to synthesize and visualize relationships between development artifacts.
- Creator
- Mulcahy, James J., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
As computing technology continues to advance, it has become increasingly difficult to find businesses that do not rely, at least in part, upon the collection and analysis of data for the purpose of project management and process improvement. The cost of software tends to increase over time due to its complexity and the cost of employing humans to develop, maintain, and evolve it. To help control the costs, organizations often seek to improve the process by which software systems are developed...
Show moreAs computing technology continues to advance, it has become increasingly difficult to find businesses that do not rely, at least in part, upon the collection and analysis of data for the purpose of project management and process improvement. The cost of software tends to increase over time due to its complexity and the cost of employing humans to develop, maintain, and evolve it. To help control the costs, organizations often seek to improve the process by which software systems are developed and evolved. Improvements can be realized by discovering previously unknown or hidden relationships between the artifacts generated as a result of developing a software system. The objective of the work described in this thesis is to provide a visualization tool that helps managers and engineers better plan for future projects by discovering new knowledge gained by synthesizing and visualizing data mined from software repository records from previous projects.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3333053
- Subject Headings
- Data mining, Mathematical models, Software engineering, Inofrmation visualization, Data processing, Application software, Development, Object-oriented programming (Computer science)
- Format
- Document (PDF)
- Title
- Object recognition on Android mobil platform using speeded up robust features.
- Creator
- Tyagi, Vivek K., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In recent years there has been great interest in implementing object recognition frame work on mobile phones. This has stemmed from the fact the advances in object recognition algorithm and mobile phone capabilities have built a congenial ecosystem. Application developers on mobile platforms are trying to utilize the object recognition technology to build better human computer interfaces. This approach is in the nascent phase and proper application framework is required. In this thesis, we...
Show moreIn recent years there has been great interest in implementing object recognition frame work on mobile phones. This has stemmed from the fact the advances in object recognition algorithm and mobile phone capabilities have built a congenial ecosystem. Application developers on mobile platforms are trying to utilize the object recognition technology to build better human computer interfaces. This approach is in the nascent phase and proper application framework is required. In this thesis, we propose a framework to overcome design challenges and provide an evaluation methodology to assess the system performance. We use the emerging Android mobile platform to implement and test the framework. We performed a case study using the proposal and reported the test result. This assessment will help developers make wise decisions about their application design. Furthermore, the Android API developers could use this information to provide better interfaces to the third party developers. The design and evaluation methodology could be extended to other mobile platforms for a wider consumer base.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/2683531
- Subject Headings
- Mobile computing, Application software, Development, Object-oriented programming (Computer software), Pattern recognition systems, Development
- Format
- Document (PDF)
- Title
- The role of air and waterborne odors in orientation and food detection in three species of marine turtles.
- Creator
- Kedzuf, Stephanie C., Salmon, Michael, Florida Atlantic University, Charles E. Schmidt College of Science, Department of Biological Sciences
- Abstract/Description
-
The cues used by marine turtles to locate foraging areas in the open ocean are largely unknown though some species (especially the green turtle [Chelonia mydas], the loggerhead [Caretta caretta], and the leatherback [Dermochelys coriacea]) somehow locate areas of high productivity. Loggerheads can detect airborne odors, but a capacity to orient has not yet been investigated. In this comparative study, tethered loggerheads and leatherbacks were exposed to dimethyl sulfide (DMS) or food odors...
Show moreThe cues used by marine turtles to locate foraging areas in the open ocean are largely unknown though some species (especially the green turtle [Chelonia mydas], the loggerhead [Caretta caretta], and the leatherback [Dermochelys coriacea]) somehow locate areas of high productivity. Loggerheads can detect airborne odors, but a capacity to orient has not yet been investigated. In this comparative study, tethered loggerheads and leatherbacks were exposed to dimethyl sulfide (DMS) or food odors in a laminar flow of air. Turtles did not orient into the air current. Free-swimming loggerheads and green turtles were also exposed to air- or waterborne food (squid) odor plus a neutral visual stimulus. Both species showed increases in swimming activity and biting behavior to both stimuli. These results suggest that airborne odors are likely not used to locate distant areas, but that they are used in localized food searching efforts.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004296
- Subject Headings
- Animal behavior, Animal orientation, Population genetics, Predation (Biology), Sea turtles -- Habitat, Sea turtles -- Life cycles, Wildlife conservation
- Format
- Document (PDF)
- Title
- Prognosis and health monitoring communications quality of service.
- Creator
- Tavtilov, Timur, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis research was funded by the Southeast National Marine Renewable Energy Center (SNMREC) at Florida Atlantic University. Its objective is the development of Quality of Service (QoS) mechanisms for the wireless communications architecture used by the Prognosis and Health Monitoring (PHM) subsystem. There are numerous technical challenges that the PHM Communications Subsystem tries to solve. Due to ocean platform mobility from waves, currents, and other environmental factors, signal...
Show moreThis thesis research was funded by the Southeast National Marine Renewable Energy Center (SNMREC) at Florida Atlantic University. Its objective is the development of Quality of Service (QoS) mechanisms for the wireless communications architecture used by the Prognosis and Health Monitoring (PHM) subsystem. There are numerous technical challenges that the PHM Communications Subsystem tries to solve. Due to ocean platform mobility from waves, currents, and other environmental factors, signal quality can vary significantly. As a result, the wireless link between the electric generator platform and shore systems will have variable quality in terms of data rate, delay, and availability. In addition, the data traffic that flows from generator sensors and PHM applications to the shore systems consists of numerous types of messages that have different QoS demands (e.g. delay) and priority that depends on the message type, user ID, sensor location, and application-dependent parameters. The PHM Communications subsystem must handle effectively high priority messages, such as alarms, alerts, and remote control commands from shore systems. It also performs QoS in the application layer, so it can read the contents of every message to prioritize them. In order to perform QoS in the application layer the PHM subsystem relies on Java Servlet multithreaded technology and different queuing techniques to control message transmission order. Furthermore, it compresses all traffic that comes from the ocean-based electric generator/turbine platform to reduce the load on the wireless link. The PHM Communications subsystem consists of three components: the wireless link, the Link Manager, and the Web Services Network Proxy. We present experimental results for the Web Services Network Proxy and demonstrate the effectiveness of XML data compression and semantic-based message scheduling over a link with variable capacity.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3334098
- Subject Headings
- Computer network architecture, Service-oriented architecture (Computer science), Wireless communication services, Technological innovations, Wireless communication services, Quality control
- Format
- Document (PDF)
- Title
- Design patterns and object oriented model of a biometric service system.
- Creator
- Blandon, Jatni., Florida Atlantic University, Han, Chingping (Jim)
- Abstract/Description
-
Continuous changes in the software development community require challenging conventional approaches resulting in techniques that allow for early decisions at the design level. This project is a demonstration of the use of design patterns as a common way to organize objects to make practical design decisions helping to generate flexible, manageable and agile software architectures. Due to the continuity and unpredictability of its requirements, the Biometric Industry is appropriate to...
Show moreContinuous changes in the software development community require challenging conventional approaches resulting in techniques that allow for early decisions at the design level. This project is a demonstration of the use of design patterns as a common way to organize objects to make practical design decisions helping to generate flexible, manageable and agile software architectures. Due to the continuity and unpredictability of its requirements, the Biometric Industry is appropriate to illustrate of the use of design patterns and object oriented analysis. First, the conceptual model of an Electronic Fingerprint Service establishes the vocabulary for discussing how a system is constructed. Since good design decisions eventually result in a good design model, this model is used to leverage the object reused when requirements change. The Electronic Biometric Services model demonstrates how by applying design patterns, the system can gain the flexibility and agility required to grow and change according to new requirements.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/13351
- Subject Headings
- Computer software--Development, Software architecture, Object-oriented programming (Computer science), Biometric identification, Pattern recognition systems--Development
- Format
- Document (PDF)
- Title
- Controlling access to physical locations.
- Creator
- Desouza-Doucet, Ana C., Florida Atlantic University, Fernandez, Eduardo B.
- Abstract/Description
-
The need to secure and control access to rooms in premises has shifted from allowing some people to enter a room to giving permission to specific persons to access a room and recording who entered the room and the time they spent in it. With such need for higher security in mind, we design an access control system for controlling physical access of people to locations or to specific units in these locations. Our study gives emphasis to the organization of physical locations, including nested...
Show moreThe need to secure and control access to rooms in premises has shifted from allowing some people to enter a room to giving permission to specific persons to access a room and recording who entered the room and the time they spent in it. With such need for higher security in mind, we design an access control system for controlling physical access of people to locations or to specific units in these locations. Our study gives emphasis to the organization of physical locations, including nested rooms, and the approach used to assign permission to people to access such locations. We also define some security policies to be used in such model as well as appropriate user interfaces. Finally, we develop two patterns based on our model.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/13328
- Subject Headings
- Software architecture, Computer networks--Access control, Computer security, Object-oriented programming (Computer science), Smart cards--Security measures
- Format
- Document (PDF)
- Title
- Object-oriented modeling of multimedia conferencing systems.
- Creator
- Chien, Pei-Der., Florida Atlantic University, Fernandez, Eduardo B.
- Abstract/Description
-
Multimedia conferencing has been making significant progress in recent years. There are many research projects and prototypes of this advance in interactive communications, however there is still no general abstract model. This thesis is primarily concerned with developing such a model that covers the major functions employed in a conference. Object Modeling Technique (OMT) is adopted here in describing both the static and dynamic aspects of this model. A relevant authorization system is also...
Show moreMultimedia conferencing has been making significant progress in recent years. There are many research projects and prototypes of this advance in interactive communications, however there is still no general abstract model. This thesis is primarily concerned with developing such a model that covers the major functions employed in a conference. Object Modeling Technique (OMT) is adopted here in describing both the static and dynamic aspects of this model. A relevant authorization system is also considered in this thesis. This system includes the description of an authorization model with general administration policies.
Show less - Date Issued
- 1994
- PURL
- http://purl.flvc.org/fcla/dt/15070
- Subject Headings
- Teleconferencing--Computer programs, Telecommunication systems, Multimedia systems--Computer programs, Object-oriented programming (Computer science)
- Format
- Document (PDF)
- Title
- iVEST A: Interactive Data Visualization and Analysis for Drive Test Data Evaluation.
- Creator
- Lee, Yongsuk, Zhu, Xingquan, Pandya, Abhijit S., Hsu, Sam, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In this thesis, a practical solution for drive test data evaluation and a real application are studied. We propose a system framework to project high dimensional Drive Test Data (DTD) to well-organized web pages, such that users can visually review phone performance with respect to different factors. The proposed application, iVESTA (interactive Visualization and Evaluation System for driven Test dAta), employs a web-based architecture which enables users to upload DTD and immediately...
Show moreIn this thesis, a practical solution for drive test data evaluation and a real application are studied. We propose a system framework to project high dimensional Drive Test Data (DTD) to well-organized web pages, such that users can visually review phone performance with respect to different factors. The proposed application, iVESTA (interactive Visualization and Evaluation System for driven Test dAta), employs a web-based architecture which enables users to upload DTD and immediately visualize the test results and observe phone and network performances with respect to different factors such as dropped call rate, signal quality, vehicle speed, handover and network delays. iVESTA provides practical solutions for mobile phone manufacturers and network service providers to perform comprehensive study on their products from the real-world DTD.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012532
- Subject Headings
- Information visualization--Data processing, Object-oriented programming (Computer science), Information technology--Management, Application software--Development
- Format
- Document (PDF)
- Title
- A comparison of Broward County, Florida high school and community college teachers' perceptions of reference skills.
- Creator
- Divine, Elizabeth Mack., Florida Atlantic University, Brown, Robert G.
- Abstract/Description
-
The purpose of this study was to examine and identify the reference skills taught at the high school level and compare these skills with the reference skills community college professors expect their students to have on entry to the community college. A survey instrument was designed listing reference skills needed to utilize library resources, to interpret, to locate information, and to write the information. High school and community college teachers scored each skill as to the degree each...
Show moreThe purpose of this study was to examine and identify the reference skills taught at the high school level and compare these skills with the reference skills community college professors expect their students to have on entry to the community college. A survey instrument was designed listing reference skills needed to utilize library resources, to interpret, to locate information, and to write the information. High school and community college teachers scored each skill as to the degree each skill is needed for academic enhancement and the degree each skill is taught to or exhibited by students. Independent variables were years taught, age, sex, content area, and the schools represented by the respondents. A correlation analysis was used to determine if there was a significant relationship between the scores of respondents and to the number of years they had taught. A t-test was performed on the variables of institution, area of instruction, and sex. An analysis of variance was performed on the variable of age. Results of the test showed that high school and community college teachers were in agreement as to the degree students need reference skills for academic enhancement. They were not in agreement as to the degree reference skills are taught at the high school level and exhibited by students at the community college level. The age, the sex, the number of years taught, and the area of instruction of the teacher did not produce a difference at the.05 level of significance.
Show less - Date Issued
- 1990
- PURL
- http://purl.flvc.org/fcla/dt/12264
- Subject Headings
- High school students--Florida--Broward County, Library orientation for high school students, Community college students--Florida--Broward County
- Format
- Document (PDF)
- Title
- A survey of object-oriented features in SQL3.
- Creator
- Wu, Zaiwu., Florida Atlantic University, Solomon, Martin K., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis, based on (ISO/ANSI) X3H2-93-091 Working Draft Database Language SQL (SQL3) (Melton, 1993, 1994), systematically specifies the characteristics and manipulation of object-oriented techniques in SQL3. An essential difference between SQL3 and the previous SQL standards lies in the fact that the abstract data type (ADT) facility supported in SQL3 causes SQL3 to become an extended relational data model rather than a "pure" relational data model. This master's thesis focuses on the...
Show moreThis thesis, based on (ISO/ANSI) X3H2-93-091 Working Draft Database Language SQL (SQL3) (Melton, 1993, 1994), systematically specifies the characteristics and manipulation of object-oriented techniques in SQL3. An essential difference between SQL3 and the previous SQL standards lies in the fact that the abstract data type (ADT) facility supported in SQL3 causes SQL3 to become an extended relational data model rather than a "pure" relational data model. This master's thesis focuses on the careful examination and explication of ADTs and the corresponding families--type templates as they are used in SQL3. These topics involve four aspects: (1) general concepts and technologies in object-oriented data models, (2) the definition of ADTs and their advantages, (3) the manipulation of ADTs in SQL3, including type templates (e.g., distinct types, explicit ADTs, user-defined type templates, standard type templates) and collection types, (4) "tables of ADTs" (row types with table), and (5) conclusions and challenges.
Show less - Date Issued
- 1994
- PURL
- http://purl.flvc.org/fcla/dt/15044
- Subject Headings
- Abstract data types (Computer science), Object-oriented programming (Computer science), Database management, SQL (Computer program language)
- Format
- Document (PDF)
- Title
- False crawls by loggerhead sea turtles in Palm Beach County, Florida.
- Creator
- Leech, Anna, Harriet L. Wilkes Honors College
- Abstract/Description
-
In Florida, loggerhead sea turtle (Caretta caretta) nesting populations are in decline, and human presence on beaches during nesting season can create an array of problems for the sea turtles. Volunteers and workers from the Loggerhead Marinelife Center collected nesting data from 2001 to 2005 along a 9.7 km stretch of Jupiter and Juno Beach, in Palm Beach County, Florida. Using these data, I found that human presence appears to have a negative impact on false crawl rates. The rate of false...
Show moreIn Florida, loggerhead sea turtle (Caretta caretta) nesting populations are in decline, and human presence on beaches during nesting season can create an array of problems for the sea turtles. Volunteers and workers from the Loggerhead Marinelife Center collected nesting data from 2001 to 2005 along a 9.7 km stretch of Jupiter and Juno Beach, in Palm Beach County, Florida. Using these data, I found that human presence appears to have a negative impact on false crawl rates. The rate of false crawl was significantly higher on weekends than on weekdays(χ2 = 6.3, p < 0.05), and in areas with continuous public access than in areas with no public access(χ2 = 69.0, p < 0.0001). However, there was no significant difference in the number of nests laid on weekends versus weekdays(χ2 = 0.6, p > 0.05), although there are still other, less obvious negative effects caused by false crawling, and even nesting, while humans are in the vicinity. Even though it is impractical to try to keep people off the beach at night, it is important to increase awareness of the negative impacts that human presence may have on sea turtle nesting in order to help reverse the decline in the population of loggerhead sea turtles.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/FAU/77673
- Subject Headings
- Sea turtles, Wildlife conservation, Loggerhead turtle, Sea turtles, Orientation
- Format
- Document (PDF)
- Title
- Cache optimization for real-time embedded systems.
- Creator
- Asaduzzaman, Abu Sadath Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Cache memory is used, in most single-core and multi-core processors, to improve performance by bridging the speed gap between the main memory and CPU. Even though cache increases performance, it poses some serious challenges for embedded systems running real-time applications. Cache introduces execution time unpredictability due to its adaptive and dynamic nature and cache consumes vast amount of power to be operated. Energy requirement and execution time predictability are crucial for the...
Show moreCache memory is used, in most single-core and multi-core processors, to improve performance by bridging the speed gap between the main memory and CPU. Even though cache increases performance, it poses some serious challenges for embedded systems running real-time applications. Cache introduces execution time unpredictability due to its adaptive and dynamic nature and cache consumes vast amount of power to be operated. Energy requirement and execution time predictability are crucial for the success of real-time embedded systems. Various cache optimization schemes have been proposed to address the performance, power consumption, and predictability issues. However, currently available solutions are not adequate for real-time embedded systems as they do not address the performance, power consumption, and execution time predictability issues at the same time. Moreover, existing solutions are not suitable for dealing with multi-core architecture issues. In this dissertation, we develop a methodology through cache optimization for real-time embedded systems that can be used to analyze and improve execution time predictability and performance/power ratio at the same time. This methodology is effective for both single-core and multi-core systems. First, we develop a cache modeling and optimization technique for single-core systems to improve performance. Then, we develop a cache modeling and optimization technique for multi-core systems to improve performance/power ratio. We develop a cache locking scheme to improve execution time predictability for real-time systems. We introduce Miss Table (MT) based cache locking scheme with victim cache (VC) to improve predictability and performance/power ratio. MT holds information about memory blocks, which may cause more misses if not locked, to improve cache locking performance., VC temporarily stores the victim blocks from level-1 cache to improve cache hits. In addition, MT is used to improve cache replacement performance and VC is used to improve cache hits by supporting stream buffering. We also develop strategies to generate realistic workload by characterizing applications to simulate cache optimization and cache locking schemes. Popular MPEG4, H.264/AVC, FFT, MI, and DFT applications are used to run the simulation programs. Simulation results show that newly introduced Miss Table based cache locking scheme with victim cache significantly improves the predictability and performance/power ratio. In this work, a reduction of 33% in mean delay per task and a reduction of 41% in total power consumption are achieved by using MT and VCs while locking 25% of level-2 cache size in an 4-core system. It is also observed that execution time predictability can be improved by avoiding more than 50% cache misses while locking one-fourth of the cache size.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/359919
- Subject Headings
- Real-time embedded systems and components, Embedded computer systems, Programming, Computer architecture, Integrated circuits, Design and construction, Signal processing, Digital techniques, Object-oriented methods (Computer science)
- Format
- Document (PDF)
- Title
- Evil done vulnerability assessment: examining terrorism targets through situational crime prevention.
- Creator
- Paton, Stacy, Santos, Rachel, College for Design and Social Inquiry, School of Criminology and Criminal Justice
- Abstract/Description
-
Following the events of September 11th, 2001, national attention has been captivated by terrorism and terrorism prevention. Parallel to this time of increased focus on terrorism prevention, adequate funding to support new departments or increased terrorism prevention efforts in existing departments was unattainable. Consequently, a strong need for prevention strategies that are affordable and highly applicable at the local level has resulted. Thus, it is the purpose of this study to examine...
Show moreFollowing the events of September 11th, 2001, national attention has been captivated by terrorism and terrorism prevention. Parallel to this time of increased focus on terrorism prevention, adequate funding to support new departments or increased terrorism prevention efforts in existing departments was unattainable. Consequently, a strong need for prevention strategies that are affordable and highly applicable at the local level has resulted. Thus, it is the purpose of this study to examine methods of risk assessment and test the accuracy of such methodologies in order to assist local organizations in effectively applying limited resources for opportunity reduction at vulnerable locations based on calculated risks. The primary goal of this thesis is to test the validity of the EVIL DONE vulnerability assessment and evaluate its ability to predict the number of fatalities and injured persons resulting from a terrorist attack.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fau/fd/FA0004044
- Subject Headings
- Emergency management -- United States, Problem oriented policing -- United States, September 11 Terrorist Attacks, 2001 -- Influence, Terrorism (International law), Terrorism -- United States -- Prevention
- Format
- Document (PDF)
- Title
- Implementation of an improved embedded SQL for Java.
- Creator
- Bradley, Louis M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The Java Devlopment Environment defines SQLJ as a standard way of embedding the relational database language SQL in the object-oriented programming language Java. Oracle Corporation provides an extension of SQLJ that supports dynamic SQL constructs for the processing of SQL commands that are not completely known at compile time. Unfortunately, these constructs are not sufficient to handle all dynamic situations, so that the programmer has to depend on other SQL embeddings, such as JDBC, in...
Show moreThe Java Devlopment Environment defines SQLJ as a standard way of embedding the relational database language SQL in the object-oriented programming language Java. Oracle Corporation provides an extension of SQLJ that supports dynamic SQL constructs for the processing of SQL commands that are not completely known at compile time. Unfortunately, these constructs are not sufficient to handle all dynamic situations, so that the programmer has to depend on other SQL embeddings, such as JDBC, in addition to Oracle's SQLJ. In this thesis we implement several extensions to Oracle's SQLJ so that all dynamic situations can be programmed in SQLJ, without resorting to other SQL embeddings. We also add a sub-query based for loop facility, similar to the one provided in Oracle's database programming language PL/SQL, as an improvement over the iterator constructs that SQLJ provides. This thesis discusses the design, development and implementation of these SQLJ extensions, and provided applications that show the utility of these extensions in terms of clarity and power.
Show less - Date Issued
- 2012
- PURL
- http://purl.flvc.org/FAU/3358327
- Subject Headings
- SQL (Computer program language), Java ( (Computer program language), Object-oriented programming ( (Computer science), Client/server computing, Application software, Development
- Format
- Document (PDF)
- Title
- Performance analysis of a new object-based I/O architecture for PCs and workstations.
- Creator
- Huynh, Khoa Dang., Florida Atlantic University, Khoshgoftaar, Taghi M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In this dissertation, an object-based I/O architecture for personal computers (PCs) and workstations is proposed. The proposed architecture allows the flexibility of having I/O processing performed as much as possible by intelligent I/O adapters, or by the host processor, or by any processor in the system, depending on application requirements and underlying hardware capabilities. It keeps many good features of current I/O architectures, while providing more flexibility to take advantage of...
Show moreIn this dissertation, an object-based I/O architecture for personal computers (PCs) and workstations is proposed. The proposed architecture allows the flexibility of having I/O processing performed as much as possible by intelligent I/O adapters, or by the host processor, or by any processor in the system, depending on application requirements and underlying hardware capabilities. It keeps many good features of current I/O architectures, while providing more flexibility to take advantage of new hardware technologies, promote architectural openness, provide better performance and higher reliability. The proposed architecture introduces a new definition of I/O subsystems and makes use of concurrent object-oriented technology. It combines the notions of object and thread into something called an active object. All concurrency abstractions required by the proposed architecture are provided through external libraries on top of existing sequential object-oriented languages, without any changes to the syntax and semantics of these languages. We also evaluate the performance of optimal implementations of the proposed I/O architecture against other I/O architectures in three popular, PC-based, distributed environments: network file server, video server, and video conferencing. Using the RESearch Queueing Modeling Environment (RESQME), we have developed detailed simulation models for various implementations of the proposed I/O architecture and two other existing I/O architectures: a conventional, interrupt-based I/O architecture and a peer-to-peer I/O architecture. Our simulation results indicate that, on several different hardware platforms, the proposed I/O architecture outperforms both existing architectures in all three distributed environments considered.
Show less - Date Issued
- 1994
- PURL
- http://purl.flvc.org/fcla/dt/12386
- Subject Headings
- Local area networks (Computer networks), Computer input-output equipment, Computer networks, Videoconferencing, Client/server computing, Object-oriented programming (Computer science)
- Format
- Document (PDF)
- Title
- Nest-to-surf mortality of loggerhead (Caretta caretta) sea turtle hatchlings on Florida’s east coast in 2016.
- Creator
- Erb, Victoria, Wyneken, Jeanette, Florida Atlantic University, Charles E. Schmidt College of Science, Department of Biological Sciences
- Abstract/Description
-
Worldwide, sea turtles are especially vulnerable immediately after emerging from nests. Many monitoring programs measure hatchling production from nest inventories. These inventories rarely account for mortality occurring post-emergence, leaving an incomplete estimate of hatchling production. This study addresses the nest-to-surf data gap for Florida’s east coast nesting assemblages of loggerhead sea turtles (Caretta caretta). Five locations were surveyed during the 2016 nesting season by...
Show moreWorldwide, sea turtles are especially vulnerable immediately after emerging from nests. Many monitoring programs measure hatchling production from nest inventories. These inventories rarely account for mortality occurring post-emergence, leaving an incomplete estimate of hatchling production. This study addresses the nest-to-surf data gap for Florida’s east coast nesting assemblages of loggerhead sea turtles (Caretta caretta). Five locations were surveyed during the 2016 nesting season by using infrared time-lapse imagery, night vision optics, and track maps. Over all beaches, 7.6% of the observed hatchlings did not survive to reach the water. Mortality sources varied by location. Observed predators included: foxes, bobcats, yellow-crowned night herons, ghost crabs, and gulls. Hatchling disorientation and misorientation occurred more frequently in urban areas than natural areas. Factors including number of hatchlings emerging, nest-to-surf distance, and urbanization may help managers estimate nest-to-surf mortality. This study will improve life history models that serve as foundations of conservation management.
Show less - Date Issued
- 2017
- PURL
- http://purl.flvc.org/fau/fd/FA00004934, http://purl.flvc.org/fau/fd/FA00004934
- Subject Headings
- Sea turtles--Mortality--Florida., Loggerhead turtle--Mortality., Predation (Biology), Sea turtles--Orientation., Animal navigation., Fire ants--Venom--Physiological effect.
- Format
- Document (PDF)
- Title
- The hawksbill rookery at Antigua, W.I.: nest success, hatchling behavior, and hatchling survival during offshore migration.
- Creator
- Reising, Megan, Salmon, Michael, Charles E. Schmidt College of Science, Department of Biological Sciences
- Abstract/Description
-
The younger life history stages of marine turtles (eggs, hatchlings) often fail to survive. To compensate, sea turtles nest several times/season and produce large clutches of eggs. The hawksbill produces the largest clutches (150 eggs) and the smallest hatchlings of any marine turtle. My study, done at Jumby Bay in Antigua, West Indies, was designed to determine whether they did so to compensate for loss in the nest, hatchling loss in the water, or both factors. I found that most of the eggs ...
Show moreThe younger life history stages of marine turtles (eggs, hatchlings) often fail to survive. To compensate, sea turtles nest several times/season and produce large clutches of eggs. The hawksbill produces the largest clutches (150 eggs) and the smallest hatchlings of any marine turtle. My study, done at Jumby Bay in Antigua, West Indies, was designed to determine whether they did so to compensate for loss in the nest, hatchling loss in the water, or both factors. I found that most of the eggs (79 %) survived to become hatchlings that left the nest and entered the sea. However, 88 % of the hatchlings swimming offshore were taken by predators within minutes after they began their migration. These results suggest that at Jumby Bay, large clutch size is favored in hawksbills because of predation pressures on the hatchlings.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fau/fd/FA0004049
- Subject Headings
- Animal migration -- Antigua -- Jumbo Bay, Animal orientation -- Antigua -- Jumbo Bay, Hawksbill turtle -- Research -- Antigua -- Jumbo Bay, Predation (Biology), Sea turtles -- Research -- Antigua -- Jumbo Bay, Wildlife conservation -- Antigua -- Jumbo Bay
- Format
- Document (PDF)