Current Search: Electronic systems (x)
View All Items
Pages
- Title
- Studies on transreceive diversity schemes (including "polarization-sense" antenna diversity) for wireless communication systems.
- Creator
- Preedalumpabut, Wichean., Florida Atlantic University, Neelakanta, Perambur S., Morgera, Salvatore D., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The research addressed in this study and deliberated in the dissertation is broadly tied to finding hybrid methods of diversity compatible for modern wireless applications. The hybrid strategy advocated thereof involves a combined use of space- (antenna and polarization), frequency-, and time-diversity schemes in a judicious manner so as to realize a desirable BER versus Eb/No performance across RF links that face multipath and other unwanted EM artifacts. The underlying reason for the hybrid...
Show moreThe research addressed in this study and deliberated in the dissertation is broadly tied to finding hybrid methods of diversity compatible for modern wireless applications. The hybrid strategy advocated thereof involves a combined use of space- (antenna and polarization), frequency-, and time-diversity schemes in a judicious manner so as to realize a desirable BER versus Eb/No performance across RF links that face multipath and other unwanted EM artifacts. The underlying reason for the hybrid scheme as above is to replace multiple-antenna based transreceive diversity. Such multiple antennas would otherwise require large base station real estate and may not be compatible for hand-held (space-constrained) RF units. On the contrary, use of hybrid schemes would restrict multiple number of antennas and conserves the space. After analyzing a set of plausible techniques of hybrid diversity compatible for modern wireless techniques, a focused study has been done on polarization-sense (PS) antenna diversity scheme. Its fruitful application for indoor systems (like Bluetooth(TM)/ZigBee(TM)) against multipath effects is demonstrated via simulation and experimental studies. Further, the PS-antenna diversity is shown to offer improved BER versus Eb/N o performance in pilot channels used in CDMA2000 systems. Also, such PS-diversity is shown to help improving the GPS receiver performance under RFI/jamming environment. The technique and heuristics proposed towards the PS-antenna diversity scheme imply novel and hitherto unexplored efforts in wireless communications. Lastly the dissertation concludes summarizing the results and offers open-questions for further studies.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/12104
- Subject Headings
- Wireless communication systems, Antennas (Electronics)
- Format
- Document (PDF)
- Title
- Performance evaluation of blind equalization techniques in the digital cellular environment.
- Creator
- Boccuzzi, Joseph., Florida Atlantic University, Sudhakar, Raghavan
- Abstract/Description
-
This thesis presents simulation results evaluating the performance of blind equalization techniques in the Digital Cellular environment. A new method of a simple zero memory non-linear detector for complex signals is presented for various forms of Fractionally Spaced Equalizers (FSE). Initial simulations are conducted with Binary Phase Shift Keying (BPSK) to study the characteristics of FSEs. The simulations are then extended to complex case via $\pi/$4-Differential Quaterny Phase Shift...
Show moreThis thesis presents simulation results evaluating the performance of blind equalization techniques in the Digital Cellular environment. A new method of a simple zero memory non-linear detector for complex signals is presented for various forms of Fractionally Spaced Equalizers (FSE). Initial simulations are conducted with Binary Phase Shift Keying (BPSK) to study the characteristics of FSEs. The simulations are then extended to complex case via $\pi/$4-Differential Quaterny Phase Shift Keying ($\pi/$4-DQPSK) modulation. The primary focus in this thesis is the performance of this complex case when operating in Additive White Gaussian Noise (AWGN) and Rayleigh Multipath Fading channels.
Show less - Date Issued
- 1992
- PURL
- http://purl.flvc.org/fcla/dt/14859
- Subject Headings
- Equalizers (Electronics), Computer algorithms, Data transmission systems, Programming electronic computers
- Format
- Document (PDF)
- Title
- Comparison of different realizations and adaptive algorithms for channel equalization.
- Creator
- Kamath, Anuradha K., Florida Atlantic University, Sudhakar, Raghavan, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis presents simulation results comparing the performance of different realizations and adaptive algorithms for channel equalization. An attempt is made to study and compare the performance of some filter structures used as an equalizer in fast data transmission over the baseband channel. To this end, simulation experiments are performed using minimum and non minimum phase channel models with adaptation algorithms such as the least mean square (LMS) and recursive least square (RLS)...
Show moreThis thesis presents simulation results comparing the performance of different realizations and adaptive algorithms for channel equalization. An attempt is made to study and compare the performance of some filter structures used as an equalizer in fast data transmission over the baseband channel. To this end, simulation experiments are performed using minimum and non minimum phase channel models with adaptation algorithms such as the least mean square (LMS) and recursive least square (RLS) algorithms, filter structures such as the lattice and transversal filters and the input signals such as the binary phase shift keyed (BPSK) and quadrature phase shift keyed (QPSK) signals. Based on the simulation studies, conclusions are drawn regarding the performance of various adaptation algorithms.
Show less - Date Issued
- 1993
- PURL
- http://purl.flvc.org/fcla/dt/14974
- Subject Headings
- Computer algorithms, Data transmission systems, Equalizers (Electronics)
- Format
- Document (PDF)
- Title
- A study of the impact of using electronic mail to disseminate nursing research on nurses' perceptions of barriers to research utilization.
- Creator
- Bobo, Charles M., Florida Atlantic University, Freeman, Edward
- Abstract/Description
-
Bridging the gap between the extant body of nursing research and clinical staff at the patient bedside remains a current problem, despite almost two decades of studies. This study examined the impact of using electronic mail to disseminate nursing research on nurses' perceptions of barriers to research utilization. The BARRIERS Scale tool was used to measure the nurses' perceptions of barriers to research utilization. Forty subjects, from a one-thousand bed Medical Center, comprised the...
Show moreBridging the gap between the extant body of nursing research and clinical staff at the patient bedside remains a current problem, despite almost two decades of studies. This study examined the impact of using electronic mail to disseminate nursing research on nurses' perceptions of barriers to research utilization. The BARRIERS Scale tool was used to measure the nurses' perceptions of barriers to research utilization. Forty subjects, from a one-thousand bed Medical Center, comprised the sample. The design for this study was pre-test and post-test design involving a treatment and control group. The treatment consisted of four summarized research articles disseminated via electronic mail (E-mail), over a four week time period. An existing hospital information system E-mail was used to disseminate the research synopsis. This study's use of an E-mail system to deliver research synopsis proved successful in decreasing the nurses' perceptions of barriers to research utilization.
Show less - Date Issued
- 1997
- PURL
- http://purl.flvc.org/fcla/dt/15398
- Subject Headings
- Nursing--Research, Clinical medicine, Electronic mail systems
- Format
- Document (PDF)
- Title
- Group structures in object-oriented database authorization.
- Creator
- Fernandez, Minjie Hua., Florida Atlantic University, Wu, Jie
- Abstract/Description
-
When there are a large number and a variety of users in a system, the authorization rules for these users will become too difficult and cumbersome to maintain and the evaluation algorithm would not be efficient. Also, it is hard for security administrators to understand why a specific user is given a set of rights. In this thesis we develop group structures to solve these problems. Groups of users rather than individual users are subjects that receive access rights from the authorization...
Show moreWhen there are a large number and a variety of users in a system, the authorization rules for these users will become too difficult and cumbersome to maintain and the evaluation algorithm would not be efficient. Also, it is hard for security administrators to understand why a specific user is given a set of rights. In this thesis we develop group structures to solve these problems. Groups of users rather than individual users are subjects that receive access rights from the authorization system. We present structurings and primitives for user groups. Although they are presented in the context of an object-oriented database system they are general and could be applied to other data model, and even in operating systems.
Show less - Date Issued
- 1992
- PURL
- http://purl.flvc.org/fcla/dt/14878
- Subject Headings
- Electronic data processing--Security measures, User interfaces (Computer systems)
- Format
- Document (PDF)
- Title
- A simplistic approach to reactive multi-robot navigation in unknown environments.
- Creator
- MacKunis, William Thomas., Florida Atlantic University, Raviv, Daniel, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Multi-agent control is a very promising area of robotics. In applications for which it is difficult or impossible for humans to intervene, the utilization of multi-agent, autonomous robot groups is indispensable. This thesis presents a novel approach to reactive multi-agent control that is practical and elegant in its simplicity. The basic idea upon which this approach is based is that a group of robots can cooperate to determine the shortest path through a previously unmapped environment by...
Show moreMulti-agent control is a very promising area of robotics. In applications for which it is difficult or impossible for humans to intervene, the utilization of multi-agent, autonomous robot groups is indispensable. This thesis presents a novel approach to reactive multi-agent control that is practical and elegant in its simplicity. The basic idea upon which this approach is based is that a group of robots can cooperate to determine the shortest path through a previously unmapped environment by virtue of redundant sharing of simple data between multiple agents. The idea was implemented with two robots. In simulation, it was tested with over sixty agents. The results clearly show that the shortest path through various environments emerges as a result of redundant sharing of information between agents. In addition, this approach exhibits safeguarding techniques that reduce the risk to robot agents working in unknown and possibly hazardous environments. Further, the simplicity of this approach makes implementation very practical and easily expandable to reliably control a group comprised of many agents.
Show less - Date Issued
- 2003
- PURL
- http://purl.flvc.org/fcla/dt/13013
- Subject Headings
- Robots--Control systems, Intelligent control systems, Genetic algorithms, Parallel processing (Electronic computers)
- Format
- Document (PDF)
- Title
- An Android approach to web services resource framework.
- Creator
- Garcia-Kunzel, Adriana., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Web services have become increasingly important over the past decades. Versatility and platform independence are just some of their advantages. On the other hand, grid computing enables the efficient distribution of computing resources. Together, they provide a great source of computing power that can be particularly leveraged by mobile devices. Mobile computing enables information creation, processing, storage and communication without location constraints [63], not only improving business'...
Show moreWeb services have become increasingly important over the past decades. Versatility and platform independence are just some of their advantages. On the other hand, grid computing enables the efficient distribution of computing resources. Together, they provide a great source of computing power that can be particularly leveraged by mobile devices. Mobile computing enables information creation, processing, storage and communication without location constraints [63], not only improving business' operational efficiency [63] but actually changing a way of life. However, the convenience of anytime and anywhere communication is counterbalanced by small screens, limited computing power and battery life. Despite these limitations, mobile devices can extend grid functionality by bringing to the mix not only mobile access but sensing capabilities as well, gathering information from their surroundings through built in mechanisms, such as microphone, camera, GPS and even accelerometers. Prior work has already demonstrated the possibility of enabling Web Services Resource Framework (WSRF) access to grid resources from mobile device clients in the WSRF-ME project [39], where a representative Nokia S60 Smartphone application was created on a framework, which extends the JSR-172 functionality to achieve WSRF compliance. In light of today's mobile phone market diversity, this thesis extends the solution proposed by WSRF-ME to non-Java ME phones and to Android devices in particular. Android-based device numbers have grown considerably over the past couple of years despite its recent creation and reduced availability of mature software tools., Therefore, Android's web service capabilities are studied and the original framework is analyzed in order to propose a modified framework version that achieves and documents WSRF compliant communication form Android for the first time. As a case study, an illustrative mobile File Explorer application is developed to match the mod framework' functionality to the original WSRF-ME's use case. An additional case study, the LIGO Monitor application, shows the viability of mobile web services for monitoring purposes in the Laser Interferometer Gravitational Observatory (LIGO) grid environment for the first time. The context that an actual application implementation such as LIGO provides, allows some of the challenges of real mobile grid clients to surface. As a result, the observations made during this development give way to the drafting of a preliminary set of guidelines for Globus service implementation suitable for Android consumption that still remain open for proof in future works.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/2684891
- Subject Headings
- Application software, Development, Mobile communication systems, User interfaces (Computer systems), Computational grids (Computer systems), Data structures (Computer science)
- Format
- Document (PDF)
- Title
- A feedback-based multimedia synchronization technique for distributed systems.
- Creator
- Ehley, Lynnae Anne., Florida Atlantic University, Ilyas, Mohammad, Furht, Borko, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Multimedia applications incorporate the use of more than one type of media, i.e., voice, video, data, text and image. With the advances in high-speed communication, the ability to transmit multimedia is becoming widely available. One of the means of transport for multimedia in distributed networks is Broadband Integrated Services Digital Network (B-ISDN). B-ISDN supports the transport of large volumes of data with a low error rate. It also handles the burstiness of multimedia traffic by...
Show moreMultimedia applications incorporate the use of more than one type of media, i.e., voice, video, data, text and image. With the advances in high-speed communication, the ability to transmit multimedia is becoming widely available. One of the means of transport for multimedia in distributed networks is Broadband Integrated Services Digital Network (B-ISDN). B-ISDN supports the transport of large volumes of data with a low error rate. It also handles the burstiness of multimedia traffic by providing dynamic bandwidth allocation. When multimedia is requested for transport in a distributed network, different Quality of Service (QOS) may be required for each type of media. For example, video can withstand more errors than voice. In order to provide, the most efficient form of transfer, different QOS media are sent using different channels. By using different channels for transport, jitter can impose skews on the temporal relations between the media. Jitter is caused by errors and buffering delays. Since B-ISDN uses Asynchronous Transfer Mode (ATM) as its transfer mode, the jitter that is incurred can be assumed to be bounded if traffic management principles such as admission control and resource reservation are employed. Another network that can assume bounded buffering is the 16 Mbps token-ring LAN when the LAN Server (LS) Ultimedia(TM) software is applied over the OS/2 LAN Server(TM) (using OS/2(TM)). LS Ultimedia(TM) reserves critical resources such as disk, server processor, and network resources for multimedia use. In addition, it also enforces admission control(1). Since jitter is bounded on the networks chosen, buffers can be used to realign the temporal relations in the media. This dissertation presents a solution to this problem by proposing a Feedback-based Multimedia Synchronization Technique (FMST) to correct and compensate for the jitter that is incurred when media are received over high speed communication channels and played back in real time. FMST has been implemented at the session layer for the playback of the streams. A personal computer was used to perform their synchronized playback from a 16 Mbps token-ring and from a simulated B-ISDN network.
Show less - Date Issued
- 1994
- PURL
- http://purl.flvc.org/fcla/dt/12382
- Subject Headings
- Multimedia systems, Broadband communication systems, Data transmission systems, Integrated services digital networks, Electronic data processing--Distributed processing
- Format
- Document (PDF)
- Title
- Progress towards push button verification for business process execution language artifacts.
- Creator
- Vargas, Augusto., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Web Service Business Process Execution Language (BPEL) has become a standard language in the world of Service Oriented Architecture (SOA) for specifying interactions between internet services. This standard frees developers from low-level concerns involving platform, implementation, and versioning. These freedoms risk development of less robust artifacts that may even become part of a mission-critical system. Model checking a BPEL artifact for correctness with respect to temporal logic...
Show moreWeb Service Business Process Execution Language (BPEL) has become a standard language in the world of Service Oriented Architecture (SOA) for specifying interactions between internet services. This standard frees developers from low-level concerns involving platform, implementation, and versioning. These freedoms risk development of less robust artifacts that may even become part of a mission-critical system. Model checking a BPEL artifact for correctness with respect to temporal logic properties is computationally complex, since it requires enumerating all communication and synchronization amongst various services with itself. This entails modeling BPEL features such as concurrency, hierarchy, interleaving, and non-deterministic choice. The thesis will provide rules and procedures for translating these features to a veriable model written in Promela. We will use these rules to build a program which automates the translation process, bringing us one step closer to push button verification. Finally, two BPEL artifacts will be translated, manually edited, verified, and analyzed.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/369386
- Subject Headings
- Electronic commerce, Computer programs, Computer network architectures, Expert systems (Computer science), Web servers, Management, Computer systems, Verification
- Format
- Document (PDF)
- Title
- An intelligent approach to system identification.
- Creator
- Saravanan, Natarajan, Florida Atlantic University, Duyar, Ahmet, College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
System identification methods are frequently used to obtain appropriate models for the purpose of control, fault detection, pattern recognition, prediction, adaptive filtering and other purposes. A number of techniques exist for the identification of linear systems. However, real-world and complex systems are often nonlinear and there exists no generic methodology for the identification of nonlinear systems with unknown structure. A recent approach makes use of highly interconnected networks...
Show moreSystem identification methods are frequently used to obtain appropriate models for the purpose of control, fault detection, pattern recognition, prediction, adaptive filtering and other purposes. A number of techniques exist for the identification of linear systems. However, real-world and complex systems are often nonlinear and there exists no generic methodology for the identification of nonlinear systems with unknown structure. A recent approach makes use of highly interconnected networks of simple processing elements, which can be programmed to approximate nonlinear functions to identify nonlinear dynamic systems. This thesis takes a detailed look at identification of nonlinear systems with neural networks. Important questions in the application of neural networks for nonlinear systems are identified; concerning the excitation properties of input signals, selection of an appropriate neural network structure, estimation of the neural network weights, and the validation of the identified model. These questions are subsequently answered. This investigation leads to a systematic procedure for identification using neural networks and this procedure is clearly illustrated by modeling a complex nonlinear system; the components of the space shuttle main engine. Additionally, the neural network weights are determined by using a general purpose optimization technique known as evolutionary programming which is based on the concept of simulated evolution. The evolutionary programming algorithm is modified to include self-adapting step sizes. The effectiveness of the evolutionary programming algorithm as a general purpose optimization algorithm is illustrated on a test suite of problems including function optimization, neural network weight optimization, optimal control system synthesis and reinforcement learning control.
Show less - Date Issued
- 1994
- PURL
- http://purl.flvc.org/fcla/dt/12371
- Subject Headings
- Neural networks (Computer science), System identification, Nonlinear theories, System analysis, Space shuttles--Electronic equipment, Algorithms--Computer programs
- Format
- Document (PDF)
- Title
- Key management in mobile ad hoc networks.
- Creator
- Wu, Bing., Florida Atlantic University, Wu, Jie, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In mobile ad hoc networks (MANETs), providing secure communications is a big challenge due to unreliable wireless media, host mobility and lack of infrastructure. Usually, cryptographic techniques are used for secure communications in wired networks. Symmetric and asymmetric cryptography have their advantages and disadvantages. In fact, any cryptographic means is ineffective if its key management is weak. Key management is also a central aspect for security in mobile ad hoc networks. In...
Show moreIn mobile ad hoc networks (MANETs), providing secure communications is a big challenge due to unreliable wireless media, host mobility and lack of infrastructure. Usually, cryptographic techniques are used for secure communications in wired networks. Symmetric and asymmetric cryptography have their advantages and disadvantages. In fact, any cryptographic means is ineffective if its key management is weak. Key management is also a central aspect for security in mobile ad hoc networks. In MANETs, the computational load and complexity for key management are strongly subject to restriction by the node's available resources and the dynamic nature of network topology. We proposed a secure and efficient key management framework (SEKM) for MANETs. SEKM builds a PKI by applying a secret sharing scheme and using an underlying multicast server groups. In SEKM, each server group creates a view of the certificate authority (CA) and provides certificate update service for all nodes, including the servers themselves. Motivated by the distributed key management service, we introduced k-Anycast concept and proposed three k-anycast routing schemes for MANETs. k-anycast is proposed to deliver a packet to any threshold k members of a set of hosts. Our goal is to reduce the routing control messages and network delay to reach any k servers. The first scheme is called controlled flooding. The second scheme, called component-based scheme I, is to form multiple components such that each component has at least k members. The third scheme, called component-based scheme II, in which the membership a component maintains is relaxed to be less than k. Collaborative and group-oriented applications in MANETs is an active research area. Group key management is a central building block in securing group communications in MANETs. However, group key management for large and dynamic groups in MANETs is a difficult problem. We propose a simple and efficient group key management scheme that we named SEGK for MANETs, which is based on n-party Diffie-Hellman (DH). The basic idea of our scheme is that a physical multicast tree is formed in MANETs for efficiency. To achieve fault tolerance, double multicast trees are constructed and maintained. A group coordinator computes and distributes intermediate keying materials to all members through multicast tree links. All group members take turns acting as group coordinator and distributing the workload of group rekeying during any change of group membership. Every group member computes the group key in a distributed manner.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/12234
- Subject Headings
- Electronic commerce--Technological innovations, Mobile commerce--Technological innovations, Wireless communication systems--Management, Mobile communication systems--Management
- Format
- Document (PDF)
- Title
- Applications of pulse width modulation to LEDs, fuel cells and battery technology.
- Creator
- Watt, Wayne W., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
It has become a case of great desire and, in some instances, a requirement to have systems in engineering be energy efficient, in addition to being effectively powerful. It is rare that there is a single technique that has the range to make this possible in a wide collection of areas in the field. The work done in this thesis exhibits how Pulse Width Modulation (PWM) bridges LEDs, plug in vehicles, fuel cells and batteries, all seemingly different sub categories of electrical engineering. It...
Show moreIt has become a case of great desire and, in some instances, a requirement to have systems in engineering be energy efficient, in addition to being effectively powerful. It is rare that there is a single technique that has the range to make this possible in a wide collection of areas in the field. The work done in this thesis exhibits how Pulse Width Modulation (PWM) bridges LEDs, plug in vehicles, fuel cells and batteries, all seemingly different sub categories of electrical engineering. It stems from an undergraduate directed independent study supervised by Dr. Zilouchian that encircled LEDs and electric vehicles and how they contribute to a smart electric grid. This thesis covers the design and development of a prototype board that test how PWM saves energy, prolongs lifespan and provides a host of customizable features in manufactured LED lights that are used in the marine industry. Additionally, the concept of charging batteries that provide power to electric vehicles was explored. It is stressed that consumers who are interested in electric vehicles are concerned about refueling and recharge times. It is natural that a competing product, such as the electric vehicle in a world dominated by internal combustion engines, will perform on par if not better than existing choices. Tests are conducted to investigate the methods of fast battery charging and the challenges this technique creates. Attention is also given to the development of a pulsed Proton Exchange Membrane (PEM) fuel cell, specifically to prove whether pulse modulation is more efficient in a hydrogen producing fuel cell as opposed to direct-driven voltage and current alternatives.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3174313
- Subject Headings
- Power electronics, Digital control systems, Electric current converters, Fuel cells, Economic aspects
- Format
- Document (PDF)
- Title
- Developing a photovoltaic MPPT system.
- Creator
- Bennett, Thomas, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Many issues related to the design and implementation of a maximum power point tracking (MPPT) converter as part of a photovoltaic (PV) system are addressed. To begin with, variations of the single diode model for a PV module are compared, to determine whether the simplest variation may be used for MPPT PV system modeling and analysis purposes. As part ot this determination, four different DC/DC converters are used in conjunction with these different PV models. This is to verify consistent...
Show moreMany issues related to the design and implementation of a maximum power point tracking (MPPT) converter as part of a photovoltaic (PV) system are addressed. To begin with, variations of the single diode model for a PV module are compared, to determine whether the simplest variation may be used for MPPT PV system modeling and analysis purposes. As part ot this determination, four different DC/DC converters are used in conjunction with these different PV models. This is to verify consistent behavior across the different PV models, as well as across the different converter topologies. Consistent results across the different PV models, will allow a simpler model to be used for simulation ana analysis. Consistent results with the different converters will verify that MPPT algorithms are converter independent. Next, MPPT algorithms are discussed. In particular,the differences between the perturb and observe, and the incremental conductance algorithms are explained and illustrated. A new MPPT algorithm is then proposed based on the deficiencies of the other algorithms. The proposed algorithm's parameters are optimized, and the results for different PV modules obtained. Realistic system losses are then considered, and their effect on the PV system is analyzed ; especially in regards to the MPPT algorithm. Finally, a PV system is implemented and the theoretical results, as well as the behavior of the newly proposed MPPT algorithm, are verified.
Show less - Date Issued
- 2012
- PURL
- http://purl.flvc.org/FAU/3356887
- Subject Headings
- Photovoltaic power systems, Design, Electronic circuits, Electric current converters, Power (Mechanics), Renewable energy sources
- Format
- Document (PDF)
- Title
- Development of a Mobile Mapping System for Road Corridor Mapping.
- Creator
- Sairam, Nivedita, Nagarajan, Sudhagar, Florida Atlantic University, College of Engineering and Computer Science, Department of Civil, Environmental and Geomatics Engineering
- Abstract/Description
-
In any infrastructure project, managing the built assets is an important task. In the case of transportation asset inventories, a significant cost and effort is spent on recording and storing the asset information. In order to reduce the time and cost involved in road corridor mapping, this paper proposes a low cost MMS (Mobile Mapping System) using an equipped laser scanner and cameras. The process of building the MMS, components and sensors involved and calibration procedures are discussed....
Show moreIn any infrastructure project, managing the built assets is an important task. In the case of transportation asset inventories, a significant cost and effort is spent on recording and storing the asset information. In order to reduce the time and cost involved in road corridor mapping, this paper proposes a low cost MMS (Mobile Mapping System) using an equipped laser scanner and cameras. The process of building the MMS, components and sensors involved and calibration procedures are discussed. The efficiency of this Mobile Mapping System is experimented by mounting it on a truck and golf cart. The paper also provides a framework to extract road assets both automatically and manually using stateof- the-art techniques. The efficiency of this method is compared with traditional field survey methods. Quality of collected data, data integrity and process flow are experimented with a sample asset management framework and a spatial database structure for mapping road corridor features.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004629, http://purl.flvc.org/fau/fd/FA00004629
- Subject Headings
- Transportation engineering., Electronics in engineering., Geographic information systems--Software., Internetworking (Telecommuniation), Geospatial data.
- Format
- Document (PDF)
- Title
- Enhancing performance in publish/subscribe systems.
- Creator
- Kamdar, Akshay., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Publish/subscribe is a powerful paradigm for distributed applications based on decoupled clients of information. In pub/sub applications, there exist a large amount of publishers and subscribes ranging from hundreds to millions. Publish/subscribe systems need to disseminate numerous events through a network of brokers. Due to limited resources of brokers, there may be lots of events that cannot be handled in time which in turn causes overload problem. Here arises the need of admission control...
Show morePublish/subscribe is a powerful paradigm for distributed applications based on decoupled clients of information. In pub/sub applications, there exist a large amount of publishers and subscribes ranging from hundreds to millions. Publish/subscribe systems need to disseminate numerous events through a network of brokers. Due to limited resources of brokers, there may be lots of events that cannot be handled in time which in turn causes overload problem. Here arises the need of admission control mechanism to provide guaranteed services in publish/subscribe systems. Our approach gives the solution to this overload problem in the network of brokers by limiting the incoming subscriptions by certain criteria. The criteria are the factors like resources which include bandwidth, CPU, memory (in broker network), resource requirements by the subscription.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/329842
- Subject Headings
- Electronic data processing, Distributed processing, Embedded computer systems, Text processing (Computer science)
- Format
- Document (PDF)
- Title
- Predicting failure of remote battery backup systems.
- Creator
- Aranguren, Pachano Liz Jeannette, Khoshgoftaar, Taghi M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Uninterruptable Power Supply (UPS) systems have become essential to modern industries that require continuous power supply to manage critical operations. Since a failure of a single battery will affect the entire backup system, UPS systems providers must replace any battery before it runs dead. In this regard, automated monitoring tools are required to determine when a battery needs replacement. Nowadays, a primitive method for monitoring the battery backup system is being used for this task....
Show moreUninterruptable Power Supply (UPS) systems have become essential to modern industries that require continuous power supply to manage critical operations. Since a failure of a single battery will affect the entire backup system, UPS systems providers must replace any battery before it runs dead. In this regard, automated monitoring tools are required to determine when a battery needs replacement. Nowadays, a primitive method for monitoring the battery backup system is being used for this task. This thesis presents a classification model that uses data mining cleansing and processing techniques to remove useless information from the data obtained from the sensors installed in the batteries in order to improve the quality of the data and determine at a given moment in time if a battery should be replaced or not. This prediction model will help UPS systems providers increase the efficiency of battery monitoring procedures.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fau/fd/FA0004002
- Subject Headings
- Electric power systems -- Equipment and supplies, Energy storing -- Testing, Lead acid batteries, Power electronics, Protective relays
- Format
- Document (PDF)
- Title
- Application level intrusion detection using a sequence learning algorithm.
- Creator
- Dong, Yuhong., Florida Atlantic University, Hsu, Sam, Rajput, Saeed, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
An un-supervised learning algorithm on application level intrusion detection, named Graph Sequence Learning Algorithm (GSLA), is proposed in this dissertation. Experiments prove its effectiveness. Similar to most intrusion detection algorithms, in GSLA, the normal profile needs to be learned first. The normal profile is built using a session learning method, which is combined with the one-way Analysis of Variance method (ANOVA) to determine the value of an anomaly threshold. In the proposed...
Show moreAn un-supervised learning algorithm on application level intrusion detection, named Graph Sequence Learning Algorithm (GSLA), is proposed in this dissertation. Experiments prove its effectiveness. Similar to most intrusion detection algorithms, in GSLA, the normal profile needs to be learned first. The normal profile is built using a session learning method, which is combined with the one-way Analysis of Variance method (ANOVA) to determine the value of an anomaly threshold. In the proposed approach, a hash table is used to store a sparse data matrix in triple data format that is collected from a web transition log instead of an n-by-n dimension matrix. Furthermore, in GSLA, the sequence learning matrix can be dynamically changed according to a different volume of data sets. Therefore, this approach is more efficient, easy to manipulate, and saves memory space. To validate the effectiveness of the algorithm, extensive simulations have been conducted by applying the GSLA algorithm to the homework submission system at our computer science and engineering department. The performance of GSLA is evaluated and compared with traditional Markov Model (MM) and K-means algorithms. Specifically, three major experiments have been done: (1) A small data set is collected as a sample data, and is applied to GSLA, MM, and K-means algorithms to illustrate the operation of the proposed algorithm and demonstrate the detection of abnormal behaviors. (2) The Random Walk-Through sampling method is used to generate a larger sample data set, and the resultant anomaly score is classified into several clusters in order to visualize and demonstrate the normal and abnormal behaviors with K-means and GSLA algorithms. (3) Multiple professors' data sets are collected and used to build the normal profiles, and the ANOVA method is used to test the significant difference among professors' normal profiles. The GSLA algorithm can be made as a module and plugged into the IDS as an anomaly detection system.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/12220
- Subject Headings
- Data mining, Parallel processing (Electronic computers), Computer algorithms, Computer security, Pattern recognition systems
- Format
- Document (PDF)
- Title
- Energy-efficient routing in ad hoc wireless networks.
- Creator
- Dai, Qing., Florida Atlantic University, Wu, Jie
- Abstract/Description
-
The ad hoc wireless network is an infrastructureless network, where mobile stations are typically powered by batteries. Energy conservation has therefore becomes a very important issue. In this thesis, we discuss our work on several problems in energy-efficient routing. Chapter 3 focuses on how to compute the minimum uniform broadcast transmission power in an ad hoc wireless network. Several algorithms are proposed and their running time compared through simulation. It is shown that Prim's...
Show moreThe ad hoc wireless network is an infrastructureless network, where mobile stations are typically powered by batteries. Energy conservation has therefore becomes a very important issue. In this thesis, we discuss our work on several problems in energy-efficient routing. Chapter 3 focuses on how to compute the minimum uniform broadcast transmission power in an ad hoc wireless network. Several algorithms are proposed and their running time compared through simulation. It is shown that Prim's Minimum Spanning Tree (MST) has better performance than Kruskal's MST and the two binary search algorithms. In the following two chapters, routing algorithms are studied for specific situations, when directional antenna is used (Chapter 4) or when partial signal could be collected, stored and integrated (Chapter 5). Different algorithms are discussed and their energy performance illustrated by simulation study. Their application and limitation are also discussed in the thesis.
Show less - Date Issued
- 2003
- PURL
- http://purl.flvc.org/fcla/dt/13077
- Subject Headings
- Wireless communication systems, Routers (Computer networks), Electronic digital computers--Power supply, Mobile computing
- Format
- Document (PDF)
- Title
- Parallel-computing concepts and methods toward large-scale floquet analysis of helicopter trim and stability.
- Creator
- Nakadi, Rajesh Mohan., Florida Atlantic University, Gaonkar, Gopal H., College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
The rotorcraft trim solution involves a search for control inputs for required flight conditions as well as for corresponding initial conditions for periodic response or orbit. The control inputs are specified indirectly to satisfy flight conditions of prescribed thrust levels, rolling and pitching moments etc. In addition to the nonlinearity of the equations of motion and control inputs, the control inputs appear not only in damping and stiffness matrices but also in the forcing-function or...
Show moreThe rotorcraft trim solution involves a search for control inputs for required flight conditions as well as for corresponding initial conditions for periodic response or orbit. The control inputs are specified indirectly to satisfy flight conditions of prescribed thrust levels, rolling and pitching moments etc. In addition to the nonlinearity of the equations of motion and control inputs, the control inputs appear not only in damping and stiffness matrices but also in the forcing-function or input matrix; they must be found concomitantly with the periodic response from external constraints on the flight conditions. The Floquet Transition Matrix (FTM) is generated for perturbations about that periodic response; usually, a byproduct of the trim analysis. The damping levels or stability margins are computed from an eigenanalysis of the FTM. The Floquet analysis comprises the trim analysis and eigenanalysis and is routinely used for small order systems (order N < 100). However, it is practical for neither design applications nor comprehensive analysis models that lead to large systems (N > 100); the execution time on a sequential computer is prohibitive. The trim analysis takes the bulk of this execution time. Accordingly, this thesis develops concepts and methods of parallelism toward Floquet analysis of large systems with computational reliability comparable to that of sequential computations. A parallel shooting scheme with damped Newton iteration is developed for the trim analysis. The scheme uses parallel algorithms of Runge-Kutta integration and linear equations solution. A parallel QR algorithm is used for the eigenanalysis of the FTM. Additional parallelism in each iteration cycle is achieved by concurrent operations such as perturbations of initial conditions and control inputs, follow-up integrations and formations of the columns of the Jacobian matrix. These parallel shooting and eigenanalysis schemes are applied to the nonlinear flap-lag stability with a three-dimensional dynamic wake (N ~ 150). The stability also is investigated by widely used sequential schemes of shooting with damped Newton iteration and QR eigenanalysis. The computational reliability is quantified by the maximum condition number of the Jacobian matrices in the Newton iteration, the eigenvalue condition numbers and the residual errors of the eigenpairs. The saving in computer time is quantified by the speedup, which is the ratio of the execution times of Floquet analysis by sequential and parallel schemes. The work is carried out on massively parallel MasPar MP-1, a distributed-memory, single-instruction multiple-data or SIMD computer. A major finding is that with increasing system order, while the parallel execution time remains nearly constant, the sequential execution time increases nearly cubically with N. Thus, parallelism promises to make large-scale Floquet analysis practical.
Show less - Date Issued
- 1994
- PURL
- http://purl.flvc.org/fcla/dt/15085
- Subject Headings
- Floquet theory, Helicopters--Control systems, Rotors (Helicopters), Parallel processing (Electronic computers)
- Format
- Document (PDF)
- Title
- Power-aware broadcasting and activity scheduling in ad hoc wireless networks using connected dominating sets.
- Creator
- Wu, Bing., Florida Atlantic University, Wu, Jie, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In mobile ad hoc wireless networks (MANET), due to host mobility, broadcasting is expected to be frequently used to find a route to a particular host, to page a host, and to alarm all hosts. A straightforward broadcasting by flooding is usually very costly and results in substantial redundancy and more energy consumption. Power consumption is an important issue since most mobile hosts operate on battery. Broadcasting based on a connected dominating set (CDS) is a promising approach, where...
Show moreIn mobile ad hoc wireless networks (MANET), due to host mobility, broadcasting is expected to be frequently used to find a route to a particular host, to page a host, and to alarm all hosts. A straightforward broadcasting by flooding is usually very costly and results in substantial redundancy and more energy consumption. Power consumption is an important issue since most mobile hosts operate on battery. Broadcasting based on a connected dominating set (CDS) is a promising approach, where only nodes inside CDS need to relay the broadcast packet. Wu and Li proposed a simple distributed algorithm for calculating CDS in MANET. In general, nodes inside CDS consume more energy to handle various bypass traffics than nodes outside the set. To prolong the life span of each node and, hence, the network by balancing the energy consumption in the system, nodes should be alternated in being chosen to form a CDS. Activity scheduling deals with the way to rotate the role of each node among a set of given operation modes. In thesis I propose to apply power-aware CDS notions to broadcasting and activity scheduling. I also introduce distance rule and extended rules to further reduce broadcasting energy consumption. The effectiveness of the proposed method are confirmed through my simulation experiment.
Show less - Date Issued
- 2002
- PURL
- http://purl.flvc.org/fcla/dt/12958
- Subject Headings
- Mobile computing, Wireless communication systems, Electronic digital computers--Power supply
- Format
- Document (PDF)