Current Search: Technological innovations. (x)
View All Items
Pages
- Title
- Design issues for interactive television systems.
- Creator
- Furht, Borko, Kalra, Deven, Kitson, Frederick L., Rodriquez, Arturo A., Wall, William E.
- Date Issued
- 1995
- PURL
- http://purl.flvc.org/fcla/dt/341753
- Subject Headings
- Multimedia systems., Broadcasting --Technological innovations.
- Format
- Document (PDF)
- Title
- A new approach in radio and television broadcasting over the Internet.
- Creator
- Furht, Borko, Westwater, Raymond, Ice, Jeffrey
- Date Issued
- 1999
- PURL
- http://purl.flvc.org/fcla/dt/345861
- Subject Headings
- Broadcasting --Technological innovations., Multimedia systems., Webcasting.
- Format
- Document (PDF)
- Title
- Ensemble Learning Algorithms for the Analysis of Bioinformatics Data.
- Creator
- Fazelpour, Alireza, Khoshgoftaar, Taghi M., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Developments in advanced technologies, such as DNA microarrays, have generated tremendous amounts of data available to researchers in the field of bioinformatics. These state-of-the-art technologies present not only unprecedented opportunities to study biological phenomena of interest, but significant challenges in terms of processing the data. Furthermore, these datasets inherently exhibit a number of challenging characteristics, such as class imbalance, high dimensionality, small dataset...
Show moreDevelopments in advanced technologies, such as DNA microarrays, have generated tremendous amounts of data available to researchers in the field of bioinformatics. These state-of-the-art technologies present not only unprecedented opportunities to study biological phenomena of interest, but significant challenges in terms of processing the data. Furthermore, these datasets inherently exhibit a number of challenging characteristics, such as class imbalance, high dimensionality, small dataset size, noisy data, and complexity of data in terms of hard to distinguish decision boundaries between classes within the data. In recognition of the aforementioned challenges, this dissertation utilizes a variety of machine-learning and data-mining techniques, such as ensemble classification algorithms in conjunction with data sampling and feature selection techniques to alleviate these problems, while improving the classification results of models built on these datasets. However, in building classification models researchers and practitioners encounter the challenge that there is not a single classifier that performs relatively well in all cases. Thus, numerous classification approaches, such as ensemble learning methods, have been developed to address this problem successfully in a majority of circumstances. Ensemble learning is a promising technique that generates multiple classification models and then combines their decisions into a single final result. Ensemble learning often performs better than single-base classifiers in performing classification tasks. This dissertation conducts thorough empirical research by implementing a series of case studies to evaluate how ensemble learning techniques can be utilized to enhance overall classification performance, as well as improve the generalization ability of ensemble models. This dissertation investigates ensemble learning techniques of the boosting, bagging, and random forest algorithms, and proposes a number of modifications to the existing ensemble techniques in order to improve further the classification results. This dissertation examines the effectiveness of ensemble learning techniques on accounting for challenging characteristics of class imbalance and difficult-to-learn class decision boundaries. Next, it looks into ensemble methods that are relatively tolerant to class noise, and not only can account for the problem of class noise, but improves classification performance. This dissertation also examines the joint effects of data sampling along with ensemble techniques on whether sampling techniques can further improve classification performance of built ensemble models.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004588
- Subject Headings
- Bioinformatics., Data mining -- Technological innovations., Machine learning.
- Format
- Document (PDF)
- Title
- The impact of national culture and other national-level indicators on information technology (IT) diffusion.
- Creator
- Bagchi, Kallol Kumar., Florida Atlantic University, Cerveny, Robert
- Abstract/Description
-
The contribution of this research is in positing that national level indicators matter in IT adoption and diffusion and providing empirical support for this theory. National level indicators are scantily represented in IT adoption or diffusion theory. Empirical results on this are almost absent in literature. Diffusion theory models of Rogers (1985) and Kwon and Zmud (1987) do not address national level attributes. National level indicators like culture, economy, institutional factors,...
Show moreThe contribution of this research is in positing that national level indicators matter in IT adoption and diffusion and providing empirical support for this theory. National level indicators are scantily represented in IT adoption or diffusion theory. Empirical results on this are almost absent in literature. Diffusion theory models of Rogers (1985) and Kwon and Zmud (1987) do not address national level attributes. National level indicators like culture, economy, institutional factors, physical distance from the innovating nation, IT infrastructure etc., could all be relevant to IT diffusion. Three types of major models (models based on adoption and growth rate factors and diffusion rate) are introduced and the effects of national indicators are examined. First, a general model is developed showing the relationship of various national factors with IT adoption and growth rate. The adoption and growth rates of nine IT products/paradigms are examined in context of the model posited. The hypotheses tested include: (1) IT adoption and growth rate is related to national value systems based on Inglehart's and Hofstede's dimensions, even after controlling for major economic and other indicators; (2) IT adoption and growth rate is related to economic as well as institutional and other national level factors; (3) The factors of adoption and growth rate of IT products/phenomena are different for different products/paradigms. Next, non-linear (temporal as well as space-time) diffusion models are used for modeling the diffusion process. For this purpose, mathematical models are developed and assessed. These models provide additional contributions in the area of diffusion model development. Time-series data on various countries are researched and gathered for this purpose. Preliminary empirical results show support for the hypothesis that national level indicators do exert influence on growth and diffusion of various IT products and paradigms.
Show less - Date Issued
- 2001
- PURL
- http://purl.flvc.org/fcla/dt/11966
- Subject Headings
- Information technology, Diffusion of innovations, Culture diffusion
- Format
- Document (PDF)
- Title
- The creative process is profoundly altered by changes in technology.
- Creator
- Hieronymus, Bruce, Florida Atlantic University, Keaton, Kenneth
- Abstract/Description
-
Individuals throughout time have had a desire to reach beyond their surrounding intellectual and physical environment and explore new territories. Throughout their lives they have continually acquired knowledge. Technology is the application of this knowledge to solve problems. As the knowledge base of humankind has grown at an exponential rate, the presence of technology has also grown. Today technology has surpassed controls and is moving at a rampant rate of speed permitting the...
Show moreIndividuals throughout time have had a desire to reach beyond their surrounding intellectual and physical environment and explore new territories. Throughout their lives they have continually acquired knowledge. Technology is the application of this knowledge to solve problems. As the knowledge base of humankind has grown at an exponential rate, the presence of technology has also grown. Today technology has surpassed controls and is moving at a rampant rate of speed permitting the introduction of new levels of knowledge in all different layers of society. This, however, permits the creation and expression of new thoughts without the acquisition of previously required knowledge. Creativity is progressing rapidly without controls and the objects being created are somewhat questionable.
Show less - Date Issued
- 1999
- PURL
- http://purl.flvc.org/fcla/dt/15690
- Subject Headings
- Technological innovations, Computer music, Technology--Social aspects, Creative ability
- Format
- Document (PDF)
- Title
- Evaluation of power function approximation of NEXRAD and rain gauge based precipitation estimates.
- Creator
- Mayes-Fernandez, Mario., College of Engineering and Computer Science, Department of Civil, Environmental and Geomatics Engineering
- Abstract/Description
-
Radar rainfall estimates have become a decision making tool for scientists, engineers and water managers in their tasks for developing hydrologic models, water supply planning, restoration of ecosystems, and flood control. In the present study, the utility of a power function for linking the rain gauge and radar estimates has been assessed. Mean daily rainfall data from 163 rain gauges installed within the South Florida Water Management District network have been used and their records from...
Show moreRadar rainfall estimates have become a decision making tool for scientists, engineers and water managers in their tasks for developing hydrologic models, water supply planning, restoration of ecosystems, and flood control. In the present study, the utility of a power function for linking the rain gauge and radar estimates has been assessed. Mean daily rainfall data from 163 rain gauges installed within the South Florida Water Management District network have been used and their records from January 1st, 2002 to October 31st, 2007 analyzed. Results indicate that the power function coefficients and exponents obtained by using a non-linear optimization formulation, show spatial variability mostly affected by type of rainfall events occurring in the dry or wet seasons, and that the linear distance from the radar location to the rain gauge has a significant effect on the computed values of the coefficients and exponents.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/367761
- Subject Headings
- Radar meteorology, Technological innovations, Weather forecasting, Technological innovations, Precipitation (Meteorology), Measurement, Weather control, Mathematical models
- Format
- Document (PDF)
- Title
- Development of functional relationships between radar and rain gage data using inductive modeling techniques.
- Creator
- Peters, Delroy., College of Engineering and Computer Science, Department of Civil, Environmental and Geomatics Engineering
- Abstract/Description
-
Traditional methods such as distance weighing, correlation and data driven methods have been used in the estimation of missing precipitation data. Also common is the use of radar (NEXRAD) data to provide better spatial distribution of precipitation as well as infilling missing rain gage data. Conventional regression models are often used to capture highly variant nonlinear spatial and temporal relationships between NEXRAD and rain gage data. This study aims to understand and model the...
Show moreTraditional methods such as distance weighing, correlation and data driven methods have been used in the estimation of missing precipitation data. Also common is the use of radar (NEXRAD) data to provide better spatial distribution of precipitation as well as infilling missing rain gage data. Conventional regression models are often used to capture highly variant nonlinear spatial and temporal relationships between NEXRAD and rain gage data. This study aims to understand and model the relationships between radar (NEXRAD) estimated rainfall data and the data measured by conventional rain gages. The study is also an investigation into the use of emerging computational data modeling (inductive) techniques and mathematical programming formulations to develop new optimal functional approximations. Radar based rainfall data and rain gage data are analyzed to understand the spatio-temporal associations, as well as the effect of changes in the length or availability of data on the models. The upper and lower Kissimmee basins of south Florida form the test-bed to evaluate the proposed and developed approaches and also to check the validity and operational applicability of these functional relationships among NEXRAD and rain gage data for infilling of missing data.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/FAU/166454
- Subject Headings
- Weather control, Mathematical models, Radar meteorology, Technological innovations, Precipitation (Meteorology), Measurement, Weather forecasting, Technological innovations
- Format
- Document (PDF)
- Title
- Individual profiling of perceived tinnitus by developing tinnitus analyzer software.
- Creator
- Chaudbury, Baishali., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Tinnitus is a conscious perception of phantom sounds in the absence of external acoustic stimuli, and masking is one of the popular ways to treat it. Due to the variation in the perceived tinnitus sound from patient to patient, the usefulness of masking therapy cannot be generalized. Thus, it is important to first determine the feasibility of masking therapy on a particular patient, by quantifying the tinnitus sound, and then generate an appropriate masking signal. This paper aims to achieve...
Show moreTinnitus is a conscious perception of phantom sounds in the absence of external acoustic stimuli, and masking is one of the popular ways to treat it. Due to the variation in the perceived tinnitus sound from patient to patient, the usefulness of masking therapy cannot be generalized. Thus, it is important to first determine the feasibility of masking therapy on a particular patient, by quantifying the tinnitus sound, and then generate an appropriate masking signal. This paper aims to achieve this kind of individual profiling by developing interactive software -Tinnitus Analyzer, based on clinical approach. The developed software has been proposed to be used in place of traditional clinical methods and this software (as a part of the future work) will be implemented in the practical scenario involving real tinnitus patients.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/1927612
- Subject Headings
- Medical care, Technological innovations, Tinnitus, Diagnosis, Aids and devices, Hearing disorders, Diagnosis, Technological innovations, Psychoacoustics, Research
- Format
- Document (PDF)
- Title
- Impacts of queue jumpers and transit signal priority on bus rapid transit.
- Creator
- Reza, R.M. Zahid., College of Engineering and Computer Science, Department of Civil, Environmental and Geomatics Engineering
- Abstract/Description
-
Exclusive bus lanes and the Transit Signal Priority are often not effective in saturated peak-traffic conditions. An alternative way of providing priority for transit can be queue jumpers, which allows buses to bypass and then cut out in front of waiting queue by getting an early green signal. Utah Transit authority deployed Bus Rapid Transit system at Salt Lake County, Utah along W 3500 S. This research evaluates the impacts of queue jumpers with TSP on Bus Rapid Transit (BRT) and private...
Show moreExclusive bus lanes and the Transit Signal Priority are often not effective in saturated peak-traffic conditions. An alternative way of providing priority for transit can be queue jumpers, which allows buses to bypass and then cut out in front of waiting queue by getting an early green signal. Utah Transit authority deployed Bus Rapid Transit system at Salt Lake County, Utah along W 3500 S. This research evaluates the impacts of queue jumpers with TSP on Bus Rapid Transit (BRT) and private vehicular traffic. Four VISSIM models were developed for analysis : Basic scenario, no TSP with queue jumpers, TSP with no queue jumbers, and TSP with queue jumpers. In TQ scenario travel time was reduced between 13.2-19.82% with respect to basic scenario. At the same time, travel time of private traffic increased very little 0.38-3.28%. Two TSP strategies : green extension and red truncation are implemented in this research work.
Show less - Date Issued
- 2012
- PURL
- http://purl.flvc.org/FAU/3355877
- Subject Headings
- Bus lines, Technological innovations, Traffic signs and signals, Technological innovations, Traffic signal preemption, Traffic congestion
- Format
- Document (PDF)
- Title
- Relationships among crime analysis, accountability, and innovative policing strategies: results from a national survey.
- Creator
- Smith, Justin James, Santos, Rachel, Florida Atlantic University, College for Design and Social Inquiry, School of Criminology and Criminal Justice
- Abstract/Description
-
Over the years, innovations such as community-oriented policing, problem-oriented policing, and hot spots policing have enabled the police to make substantial crime control and reduction gains. However, empirical research has shown that police occasionally misuse these strategies in practice. One possible solution is the co-implementation of these strategies with crime analysis. Yet, little is known about this relationship in practice. Using national survey data collected by the Police...
Show moreOver the years, innovations such as community-oriented policing, problem-oriented policing, and hot spots policing have enabled the police to make substantial crime control and reduction gains. However, empirical research has shown that police occasionally misuse these strategies in practice. One possible solution is the co-implementation of these strategies with crime analysis. Yet, little is known about this relationship in practice. Using national survey data collected by the Police Executive Research Forum in 2008 from a sample of over 1,000 United States police agencies this thesis explores this relationship. Results of bivariate analysis between agency commitment to and integration of crime analysis within operations and the use of innovative strategies revealed positive relationships. Additionally, bivariate analysis between agency use of accountability mechanisms and innovative strategies revealed a strong positive relationship. Multivariate regression analysis revealed the use of accountability mechanisms and commitment to crime analysis as strong positive predictors of police agency innovation.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004332, http://purl.flvc.org/fau/fd/FA00004332
- Subject Headings
- Crime analysis -- Data processing, Crime prevention, Criminal investigation -- Technological innovations, Criminal justice, Administration of, Law enforcement, Police -- Effect of technological innovations on, Police administration -- Technological innovations
- Format
- Document (PDF)
- Title
- Upgrading the electrical and electronic systems of the manned research submersibleCLELIA.
- Creator
- Tusting, Robert F., Adams, M., Kennedy, G., Caimi, F. M., Chiong, B., Spytek, J., Harbor Branch Oceanographic Institute
- Date Issued
- 1994
- PURL
- http://purl.flvc.org/fau/fd/FA00007309
- Subject Headings
- Submersibles, Submersibles--Technological innovations, Submersibles--Design and construction
- Format
- Document (PDF)
- Title
- A system for dynamic stress analysis of a launch & recovery crane at sea with some preliminary results.
- Creator
- Stewart, Ken
- Date Issued
- 1981
- PURL
- http://purl.flvc.org/fcla/dt/3358773
- Subject Headings
- Submersibles, Submersibles--Design and construction, Submersibles--Technological innovations
- Format
- Document (PDF)
- Title
- Application of video error resilience techniques for mobile broadcast multicast services (MBMS).
- Creator
- Furht, Borko, Praveenkumar, Sanigepalli, Kalva, Hari
- Abstract/Description
-
With data throughput for mobile devices constantly increasing, services such as video broadcast and multicast are becoming feasible. The 3GPP (3rd Generation Partnership Project) committee is currently working on a standard for mobile broadcast and multicast services (MBMS). MBMS is expected to enable easier deployment of video and multimedia services on 3G networks. We present an overview of the standard including the proposed architecture and requirements focusing on radio aspects. We...
Show moreWith data throughput for mobile devices constantly increasing, services such as video broadcast and multicast are becoming feasible. The 3GPP (3rd Generation Partnership Project) committee is currently working on a standard for mobile broadcast and multicast services (MBMS). MBMS is expected to enable easier deployment of video and multimedia services on 3G networks. We present an overview of the standard including the proposed architecture and requirements focusing on radio aspects. We discuss the issue of video error resilience in such services that is critical to maintain consistent quality for terminals. The error resilience techniques currently used in video streamingservices are not suitable for MBMS services. We analyze the error resilience techniques that are applicable within the context of MBMS standard and present our early research in this area.
Show less - Date Issued
- 2004-12-13 - 2004-12-15
- PURL
- http://purl.flvc.org/fcla/dt/347823
- Subject Headings
- Multimedia systems., Broadcasting --Technological innovations., Wireless communication systems., Multimedia communications.
- Format
- Document (PDF)
- Title
- Multimedia systems: an overview.
- Creator
- Furht, Borko
- Date Issued
- 1994
- PURL
- http://purl.flvc.org/fcla/dt/358140
- Subject Headings
- Multimedia systems., Broadcasting --Technological innovations., Internetworking (Telecommunication) --Computer programs.
- Format
- Document (PDF)
- Title
- Adaptive hierarchical weighted fair queuing scheduling in WiMAX networks.
- Creator
- AL-Ghanem, Waleed Khalid, Ilyas, Mohammad, Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The growing demand for faster connection to the Internet service and wireless multimedia applications has motivated the development of broadband wireless access technologies in recent years. WiMAX has enabled convergence of mobile and fixed broadband networks through a common wide-area radio-access technology and flexible network architecture. Scheduling is a fundamental component in resource management in WiMAX networks and plays the main role in meeting QoS requirements such as delay,...
Show moreThe growing demand for faster connection to the Internet service and wireless multimedia applications has motivated the development of broadband wireless access technologies in recent years. WiMAX has enabled convergence of mobile and fixed broadband networks through a common wide-area radio-access technology and flexible network architecture. Scheduling is a fundamental component in resource management in WiMAX networks and plays the main role in meeting QoS requirements such as delay, throughput and packet loss for different classes of service. In this dissertation work, the performance of uplink schedulers at the fixed WiMAX MAC layer has been considered, we proposed an Adaptive Hierarchical Weighted Fair Queuing Scheduling algorithm, the new scheduling algorithm adapts to changes in traffic, at the same time; it is able to heuristically enhance the performance of WiMAX network under most circumstances. The heuristic nature of this scheduling algorithm enables the MAC layer to meet the QoS requirements of the users. The performance of this adaptive WiMAX Uplink algorithm has been evaluated by simulation using MATLAB. Results indicate that the algorithm is efficient in scheduling the Base Stations’ traffic loads, and improves QoS. The utilization of relay stations is studied and simulation results are compared with the case without using relay stations. The results show that the proposed scheduling algorithm improves Quality of Service of WiMAX system.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004178, http://purl.flvc.org/fau/fd/FA00004178
- Subject Headings
- Computer networks -- Technological innovations, Optical fiber communication, Wireless communication systems -- Technological innovations, Wireless metropolitan area networks -- Security measures
- Format
- Document (PDF)
- Title
- Implementation of a mobile data collector in wireless sensor networks for energy conservation.
- Creator
- Heshike, Pedro L., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A Wireless Sensor Network (WSN) is composed of low-cost electronic devices with sensing, data storage and transmitting capabilities, powered by batteries. There are extensive studies in the field of WSN investigating different algorithms and protocols for data collection. A data collector can be static or mobile. Using a mobile data collector can extend network lifetime and can be used to collect sensor data in hardly accessible locations, partitioned networks, and delay-tolerant networks....
Show moreA Wireless Sensor Network (WSN) is composed of low-cost electronic devices with sensing, data storage and transmitting capabilities, powered by batteries. There are extensive studies in the field of WSN investigating different algorithms and protocols for data collection. A data collector can be static or mobile. Using a mobile data collector can extend network lifetime and can be used to collect sensor data in hardly accessible locations, partitioned networks, and delay-tolerant networks. The implementation of the mobile data collector in our study consists of combining two different platforms: the Crossbow sensor hardware and the NXT Legos. We developed an application for data collection and sensor querying support. Another important contribution is designing a semi-autonomous robot control. This hardware prototype implementation shows the benefits of using a mobile data collector in WSN. It also serves as a reference in developing future applications for mobile WSNs.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3171401
- Subject Headings
- Wireless communication systems, Technological innovations, Sensor networks, Design and construction, Compter network protocols, Ad hoc networks (Computer networks), Technological innovations
- Format
- Document (PDF)
- Title
- Real-Time Data Analytics and Optimization for Computational Advertising.
- Creator
- Liu, Hui, Zhu, Xingquan, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Online advertising has built a market of hundreds of billions of dollars and still continues to grow. With well developed techniques in big data storage, data mining and analytics, online advertising is able to reach targeted audiences e ctively. Real- time bidding refers to the buying and selling of online ad impressions through ad inventory auctions which occur in the time it takes a webpage to load. How to de- termine the bidding price and how to allocate the budget of advertising is the...
Show moreOnline advertising has built a market of hundreds of billions of dollars and still continues to grow. With well developed techniques in big data storage, data mining and analytics, online advertising is able to reach targeted audiences e ctively. Real- time bidding refers to the buying and selling of online ad impressions through ad inventory auctions which occur in the time it takes a webpage to load. How to de- termine the bidding price and how to allocate the budget of advertising is the key to successful ad campaigns. Both of these aspects are fundamental to most campaign optimizations and we will introduce both of them in this thesis. For bidding price determination, we improved the estimation of CTR (Click Through Rate) (one of the most important factors of determining the bidding price) by using a re ned hierar- chical tree structure for the estimation. The result of the experiment and the A/B test showed our proposal can provide stable improvement. For budget allocation, we introduce SCO (Single Campaign Optimization) and CCO (Cross Campaign Opti- mization). SCO has been applied by our commercial partner while CCO needs more research. We will rst introduce the methods of SCO and then give our proposal about CCO. We modeled CCO as a LP (Linear Programming) problem as well as designed an e ective procedure to implement optimal impressions distribution. Our simulation showed our proposal can signi cantly increase global Gross Pro t (GP).
Show less - Date Issued
- 2017
- PURL
- http://purl.flvc.org/fau/fd/FA00004940, http://purl.flvc.org/fau/fd/FA00004940
- Subject Headings
- Internet marketing--Technological innovations., Internet advertising--Technological innovations., Data mining., Web usage mining., Business--Data processing.
- Format
- Document (PDF)
- Title
- Low complexity H.264 video encoder design using machine learning techniques.
- Creator
- Carrillo, Paula., Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
H.264/AVC encoder complexity is mainly due to variable size in Intra and Inter frames. This makes H.264/AVC very difficult to implement, especially for real time applications and mobile devices. The current technological challenge is to conserve the compression capacity and quality that H.264 offers but reduce the encoding time and, therefore, the processing complexity. This thesis applies machine learning technique for video encoding mode decisions and investigates ways to improve the...
Show moreH.264/AVC encoder complexity is mainly due to variable size in Intra and Inter frames. This makes H.264/AVC very difficult to implement, especially for real time applications and mobile devices. The current technological challenge is to conserve the compression capacity and quality that H.264 offers but reduce the encoding time and, therefore, the processing complexity. This thesis applies machine learning technique for video encoding mode decisions and investigates ways to improve the process of generating more general low complexity H.264/AVC video encoders. The proposed H.264 encoding method decreases the complexity in the mode decision inside the Inter frames. Results show, at least, a 150% average reduction of complexity and, at most, 0.6 average increases in PSNR for different kinds of videos and formats.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/FAU/166448
- Subject Headings
- Code division multiple access, Digital media, Technological innovations, Image transmission, Technological innovations, Coding theory, Data structures (Computer science)
- Format
- Document (PDF)
- Title
- Cross-domain authentication for multi-protocol phones.
- Creator
- Thakker, Chetan., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The last decade has seen a surge in demand for cellular and WLAN networks. With the introduction of Voice Over IP, cellular companies are looking at WLAN-Cellular integrated networks that shall provide users with economical voice and data services. These networks shall be complimentary to the existing cellular networks. A lot of money is spent in registering and authenticating new users, since they are separately authenticated and registered on the WLAN and Cellular domains. This leads to...
Show moreThe last decade has seen a surge in demand for cellular and WLAN networks. With the introduction of Voice Over IP, cellular companies are looking at WLAN-Cellular integrated networks that shall provide users with economical voice and data services. These networks shall be complimentary to the existing cellular networks. A lot of money is spent in registering and authenticating new users, since they are separately authenticated and registered on the WLAN and Cellular domains. This leads to extra costs for the company. Thus for the integrated networks to have an impact on the market some issues such as simpler authentication and registration must be resolved. Therefore we propose a new inter-working model that shall addresses the authentication and registration problem for an integrated network for voice and data. The Single authentication system of the new inter-working model, shall authenticate the user in an integrated network using the SIM credentials, this authentication shall be valid for both voice and data. Also registration costs will be saved by preventing separate registration of users in the WLAN and Cellular domain.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13260
- Subject Headings
- Integrated services digital networks, Digital telephone systems, Wireless communication systems--Technological innovations, Mobile communication systems--Technological innovations
- Format
- Document (PDF)
- Title
- Key management in mobile ad hoc networks.
- Creator
- Wu, Bing., Florida Atlantic University, Wu, Jie, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In mobile ad hoc networks (MANETs), providing secure communications is a big challenge due to unreliable wireless media, host mobility and lack of infrastructure. Usually, cryptographic techniques are used for secure communications in wired networks. Symmetric and asymmetric cryptography have their advantages and disadvantages. In fact, any cryptographic means is ineffective if its key management is weak. Key management is also a central aspect for security in mobile ad hoc networks. In...
Show moreIn mobile ad hoc networks (MANETs), providing secure communications is a big challenge due to unreliable wireless media, host mobility and lack of infrastructure. Usually, cryptographic techniques are used for secure communications in wired networks. Symmetric and asymmetric cryptography have their advantages and disadvantages. In fact, any cryptographic means is ineffective if its key management is weak. Key management is also a central aspect for security in mobile ad hoc networks. In MANETs, the computational load and complexity for key management are strongly subject to restriction by the node's available resources and the dynamic nature of network topology. We proposed a secure and efficient key management framework (SEKM) for MANETs. SEKM builds a PKI by applying a secret sharing scheme and using an underlying multicast server groups. In SEKM, each server group creates a view of the certificate authority (CA) and provides certificate update service for all nodes, including the servers themselves. Motivated by the distributed key management service, we introduced k-Anycast concept and proposed three k-anycast routing schemes for MANETs. k-anycast is proposed to deliver a packet to any threshold k members of a set of hosts. Our goal is to reduce the routing control messages and network delay to reach any k servers. The first scheme is called controlled flooding. The second scheme, called component-based scheme I, is to form multiple components such that each component has at least k members. The third scheme, called component-based scheme II, in which the membership a component maintains is relaxed to be less than k. Collaborative and group-oriented applications in MANETs is an active research area. Group key management is a central building block in securing group communications in MANETs. However, group key management for large and dynamic groups in MANETs is a difficult problem. We propose a simple and efficient group key management scheme that we named SEGK for MANETs, which is based on n-party Diffie-Hellman (DH). The basic idea of our scheme is that a physical multicast tree is formed in MANETs for efficiency. To achieve fault tolerance, double multicast trees are constructed and maintained. A group coordinator computes and distributes intermediate keying materials to all members through multicast tree links. All group members take turns acting as group coordinator and distributing the workload of group rekeying during any change of group membership. Every group member computes the group key in a distributed manner.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/12234
- Subject Headings
- Electronic commerce--Technological innovations, Mobile commerce--Technological innovations, Wireless communication systems--Management, Mobile communication systems--Management
- Format
- Document (PDF)