Current Search: info:fedora/fau:hbtr (x) » Department of Computer and Electrical Engineering and Computer Science (x)
View All Items
Pages
- Title
- Ensemble-classifier approach to noise elimination: A case study in software quality classification.
- Creator
- Joshi, Vedang H., Florida Atlantic University, Khoshgoftaar, Taghi M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis presents a noise handling technique that attempts to improve the quality of training data for classification purposes by eliminating instances that are likely to be noise. Our approach uses twenty five different classification techniques to create an ensemble of classifiers that acts as a noise filter on real-world software measurement datasets. Using a relatively large number of base-level classifiers for the ensemble-classifier filter facilitates in achieving the desired level...
Show moreThis thesis presents a noise handling technique that attempts to improve the quality of training data for classification purposes by eliminating instances that are likely to be noise. Our approach uses twenty five different classification techniques to create an ensemble of classifiers that acts as a noise filter on real-world software measurement datasets. Using a relatively large number of base-level classifiers for the ensemble-classifier filter facilitates in achieving the desired level of noise removal conservativeness with several possible levels of filtering. It also provides a higher degree of confidence in the noise elimination procedure as the results are less likely to get influenced by (possible) inappropriate learning bias of a few algorithms with twenty five base-level classifiers than with a relatively smaller number of base-level classifiers. Empirical case studies of two different high assurance software projects demonstrate the effectiveness of our noise elimination approach by the significant improvement achieved in classification accuracies at various levels of filtering.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/13144
- Subject Headings
- Computer interfaces--Software--Quality control, Acoustical engineering, Noise control--Case studies, Expert systems (Computer science), Software documentation
- Format
- Document (PDF)
- Title
- Active networking and innovation: An evaluation of active networking as a driver of accelerated Internet innovation.
- Creator
- Wood, James L., Florida Atlantic University, Wu, Jie, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Innovation has flourished at the edge of the Internet; however, the core has experienced a slower pace of innovation. This lag is impacting the pace of innovation at the edge and threatening quality as ad hoc solutions are implemented to overcome core network barriers to innovation. Active networking technology, which opens up the architecture of routers, is proposed as a standard solution. Researchers draw an analogy to the computer industry where innovation is claimed to be accelerated by...
Show moreInnovation has flourished at the edge of the Internet; however, the core has experienced a slower pace of innovation. This lag is impacting the pace of innovation at the edge and threatening quality as ad hoc solutions are implemented to overcome core network barriers to innovation. Active networking technology, which opens up the architecture of routers, is proposed as a standard solution. Researchers draw an analogy to the computer industry where innovation is claimed to be accelerated by modularization. This argument is valid to the extent that the router market is similar to the computer market; however, contemporary innovation theories cast doubt on this likelihood. These theories indicate that for active networking technology to accelerate Internet innovation, extraordinary measures will be required to break the status quo. This paper analyzes this situation and makes recommendations, based on innovation theory, on how active networking can be successful in accelerating Internet innovation.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/13161
- Subject Headings
- Computer industry--Technological innovations, Computer networks--Management, Computer networks--Software, Routers (Computer networks), Internetworking (Telecommunication)
- Format
- Document (PDF)
- Title
- Modeling access control of medical information.
- Creator
- Sorgente, Tami W., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Medical information is very private and sensitive. With the digitization of medical data, it is becoming accessible through distributed systems, including the Internet. Access to all this information and appropriate exchange of data makes the job of health providers more effective, however, the number of people that can potentially access this information increases by orders of magnitude. Private health information is not well protected. We present guidelines for security models for medical...
Show moreMedical information is very private and sensitive. With the digitization of medical data, it is becoming accessible through distributed systems, including the Internet. Access to all this information and appropriate exchange of data makes the job of health providers more effective, however, the number of people that can potentially access this information increases by orders of magnitude. Private health information is not well protected. We present guidelines for security models for medical information systems. First, we model the structure of the medical information in the form of object-oriented patterns. Second, we study models and patterns in use today and compare them to our patterns. Next we define requirements necessary for controlling access, and describe the common policies and restrictions of security models for medical applications. We present some of the medical record access control restrictions directly in a conceptual model of the medical information.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/13163
- Subject Headings
- Medical records--Access control, Privacy, Right of, Freedom of information, Medical records--Data processing, Medicine--Research--Moral and ethical aspects, Confidential communications, Medical ethics, Information storage and retrieval systems--Medical care, Medical informatics, Computer security, Medicine--Computer networks
- Format
- Document (PDF)
- Title
- Implementation of digital filters with LabVIEW.
- Creator
- Landrin, Thomas., Florida Atlantic University, Zilouchian, Ali, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In this thesis, realization and implementation of one-dimensional (1-D) and two-dimensional (2-D) recursive digital filters using LabVIEW are presented. A number of direct and state-space realizations for 1-D filters are implemented either as in general form or second-order modules. Implementation programs are provided and simulation results are presented to show the effectiveness of the proposed method. In addition, several realizations for 2-D separable-in-denominator filters are proposed....
Show moreIn this thesis, realization and implementation of one-dimensional (1-D) and two-dimensional (2-D) recursive digital filters using LabVIEW are presented. A number of direct and state-space realizations for 1-D filters are implemented either as in general form or second-order modules. Implementation programs are provided and simulation results are presented to show the effectiveness of the proposed method. In addition, several realizations for 2-D separable-in-denominator filters are proposed. These realizations have the properties of highly parallel structure and improved throughput delay. The performance as well as the implementation of 2-D filters using LabVIEW is also presented.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/13183
- Subject Headings
- LabVIEW, Computer programming, Computer graphics, Electric filters, Digital--Design and construction, Recursive functions--Data processing, Signal processing--Digital techniques
- Format
- Document (PDF)
- Title
- A low power and high performance centralized full adder.
- Creator
- Srivastav, Sidharth., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In this thesis, we proposed a low power and high performance architecture for 1-bit full adder design. The proposed architecture was proven to offer a wide range of performance ability in terms of power consumption and speed. We implemented the architecture using a 2-input 2 multiplexers, an XOR and an XNOR gate. The proposed architecture and the Standard full adder were designed and simulated using Lasi, Winspice and Silos. Silos, a logic simulation environment was used in the design and...
Show moreIn this thesis, we proposed a low power and high performance architecture for 1-bit full adder design. The proposed architecture was proven to offer a wide range of performance ability in terms of power consumption and speed. We implemented the architecture using a 2-input 2 multiplexers, an XOR and an XNOR gate. The proposed architecture and the Standard full adder were designed and simulated using Lasi, Winspice and Silos. Silos, a logic simulation environment was used in the design and verification of the proposed architecture and the standard full adder that were modeled with Verilog hardware description language. Lasi was used for the layout design of the proposed architecture and the standard full adder. After the layout, both the architectures were compiled separately using LASICKT and a corresponding .CIR file was generated. The .CIR file was imported and executed into WINSPICE3 for the simulation of the circuit.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/13188
- Subject Headings
- Digital integrated circuits, Metal oxide semiconductors, Complementary, Integrated circuits--Design and contruction, Verilog (Computer hardware description language), Mixed signal circuits--Design and construction--Computer-aided design
- Format
- Document (PDF)
- Title
- Using classification and regression tree to detect hematology abnormalities.
- Creator
- Qian, Cheng., Florida Atlantic University, Wu, Jie, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The detection of the abnormal blood cells and particles in a blood test is essential in medical diagnosis. The detection rules, which are usually implemented in the widely used automated hematology analyzer, are therefore critical for the health and even lives of millions of people. The research endeavor of this thesis is on generating such detection rules using a supervised machine learning algorithm. The first part of this thesis studies the hematology data and surveys the popular...
Show moreThe detection of the abnormal blood cells and particles in a blood test is essential in medical diagnosis. The detection rules, which are usually implemented in the widely used automated hematology analyzer, are therefore critical for the health and even lives of millions of people. The research endeavor of this thesis is on generating such detection rules using a supervised machine learning algorithm. The first part of this thesis studies the hematology data and surveys the popular classification algorithms. In the second part, the selected algorithm, CART, is implemented with deliberately selected parameters. In the third part, a modification of the algorithm, logical pruning with Enclose the Normal principle, is exercised. To extend the algorithm and to achieve better performance, I developed and implemented the idea of decision tree combinations. The research has proven to be successful by the achievement of good performance and reasonable detection rules.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/13189
- Subject Headings
- Regression analysis, Health survey--Statistical methods, Medical statistics, Blood--Diseases--Diagnosis, Hematology, Blood--Examination
- Format
- Document (PDF)
- Title
- Security in voice over IP networks.
- Creator
- Pelaez, Juan C., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Voice over IP (VoIP) is revolutionizing the global communications system by allowing human voice and fax information to travel over existing packet data networks along with traditional data packets. The convergence of voice and data in one simplified network brings both benefits and constraints to users. Among the several issues that need to be addressed when deploying this technology, security is one of the most critical. This thesis will present a combination of security patterns based on...
Show moreVoice over IP (VoIP) is revolutionizing the global communications system by allowing human voice and fax information to travel over existing packet data networks along with traditional data packets. The convergence of voice and data in one simplified network brings both benefits and constraints to users. Among the several issues that need to be addressed when deploying this technology, security is one of the most critical. This thesis will present a combination of security patterns based on the systematic analysis of attacks against a VoIP network and the existing techniques to mitigate these attacks, providing good practices for all IP telephony systems. The VoIP Security Patterns which are based on object-oriented modeling, will help network designers to improve the level of security not only in voice but also in data, video, and fax over IP networks.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/13190
- Subject Headings
- Internet telephony--Security measures, Computer network protocols, Multimedia systems
- Format
- Document (PDF)
- Title
- Web log analysis: Experimental studies.
- Creator
- Yang, Zhijian., Florida Atlantic University, Zhong, Shi, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
With rapid growth of the World Wide Web, web performance becomes increasingly important for modern businesses, especially for e-commerce. As we all know, web server logs contain potentially useful empirical data to improve web server performance. In this thesis, we discuss some topics related to the analysis of a website's server logs for enhancing server performance, which will benefit some applications in business. Markov chain models are used and allow us to dynamically model page...
Show moreWith rapid growth of the World Wide Web, web performance becomes increasingly important for modern businesses, especially for e-commerce. As we all know, web server logs contain potentially useful empirical data to improve web server performance. In this thesis, we discuss some topics related to the analysis of a website's server logs for enhancing server performance, which will benefit some applications in business. Markov chain models are used and allow us to dynamically model page sequences extracted from server logs. My experimental studies contain three major parts. First, I present a workload characterization study of the website used for my research. Second, Markov chain models are constructed for both page request and page-visiting sequence prediction. Finally, I carefully evaluate the constructed models using an independent test data set, which is from server logs on a different day. The research results demonstrate the effectiveness of Markov chain models for characterizing page-visiting sequences.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13202
- Subject Headings
- Markov processes, Operations research, Business enterprises--Computer networks, Electronic commerce--Data processing
- Format
- Document (PDF)
- Title
- Correcting noisy data and expert analysis of the correction process.
- Creator
- Seiffert, Christopher N., Florida Atlantic University, Khoshgoftaar, Taghi M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis expands upon an existing noise cleansing technique, polishing, enabling it to be used in the Software Quality Prediction domain, as well as any other domain where the data contains continuous values, as opposed to categorical data for which the technique was originally designed. The procedure is applied to a real world dataset with real (as opposed to injected) noise as determined by an expert in the domain. This, in combination with expert assessment of the changes made to the...
Show moreThis thesis expands upon an existing noise cleansing technique, polishing, enabling it to be used in the Software Quality Prediction domain, as well as any other domain where the data contains continuous values, as opposed to categorical data for which the technique was originally designed. The procedure is applied to a real world dataset with real (as opposed to injected) noise as determined by an expert in the domain. This, in combination with expert assessment of the changes made to the data, provides not only a more realistic dataset than one in which the noise (or even the entire dataset) is artificial, but also a better understanding of whether the procedure is successful in cleansing the data. Lastly, this thesis provides a more in-depth view of the process than previously available, in that it gives results for different parameters and classifier building techniques. This allows the reader to gain a better understanding of the significance of both model generation and parameter selection.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13223
- Subject Headings
- Computer interfaces--Software--Quality control, Acoustical engineering, Noise control--Computer programs, Expert systems (Computer science), Software documentation
- Format
- Document (PDF)
- Title
- Simulation study of beacon time synchronization algorithm in low rate wireless personal area networks.
- Creator
- Shrivastav, Madhu., Florida Atlantic University, Mahgoub, Imad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In a beacon-enabled network, nodes send beacons when they are ready to transmit or receive messages from the other sensors in their communication range. If the beacons are not synchronized in time, a sensor might receive more than one beacon and hence will not be able to demodulate the beacon, thereby, being isolated from the network. As a result coverage nulls are introduced in the system. To address the above mentioned issues, Motorola Labs have proposed an algorithm for synchronizing the...
Show moreIn a beacon-enabled network, nodes send beacons when they are ready to transmit or receive messages from the other sensors in their communication range. If the beacons are not synchronized in time, a sensor might receive more than one beacon and hence will not be able to demodulate the beacon, thereby, being isolated from the network. As a result coverage nulls are introduced in the system. To address the above mentioned issues, Motorola Labs have proposed an algorithm for synchronizing the beacons in a wireless personal area network. In this thesis, extensive study of the proposed beacon time synchronization algorithm is done using OPNET as a simulation tool. Simulation is carried out by designing a detailed model of the algorithm using IEEE 802.15.4 as a reference. In depth analysis of the simulation results has been carried out. The results obtained are compared with those of existing time synchronization methods.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13227
- Subject Headings
- Wireless LANs, Extranets (Computer networks), Wireless communication systems, Data transmission systems, Computer network protocols, Home computer networks
- Format
- Document (PDF)
- Title
- Concord: A proactive lightweight middleware to enable seamless connectivity in a pervasive environment.
- Creator
- Mutha, Mahesh., Florida Atlantic University, Hsu, Sam, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
One of the major components of any pervasive system is its proactive behavior. Various models have been developed to provide system wide changes which would enable proactive behavior. A major drawback of these approaches is that they do not address the need to make use of existing applications whose design cannot be changed. To overcome this drawback, a middleware architecture called "Concord" is proposed. Concord is based on a simple model which consists of Lookup Server and Database. The...
Show moreOne of the major components of any pervasive system is its proactive behavior. Various models have been developed to provide system wide changes which would enable proactive behavior. A major drawback of these approaches is that they do not address the need to make use of existing applications whose design cannot be changed. To overcome this drawback, a middleware architecture called "Concord" is proposed. Concord is based on a simple model which consists of Lookup Server and Database. The rewards for this simple model are many. First, Concord uses the existing computing infrastructure. Second, Concord standardizes the interfaces for all services and platforms. Third new services can be added dynamically without any need for reconfiguration. Finally, Concord consists of Database that can maintain and publish the active set of available resources. Thus Concord provides a solid system for integration of various entities to provide seamless connectivity and enable proactive behavior.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13234
- Subject Headings
- CONCORD (Computer architecture), Middleware, Computer architecture, Database management
- Format
- Document (PDF)
- Title
- Performance analysis of multitaper spectrum estimation.
- Creator
- Skoro Kaskarovska, Violeta, Florida Atlantic University, Erdol, Nurgun, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
We characterize the Multitaper Spectral Estimation method as a tool for stationary signal analysis. We compare its performance to the conventional periodogram, the parametric autoregressive and multitaper autoregressive spectral estimates. We analyze single and two frequency sinusoids with additive Gaussian white noise and autoregressive processes of orders 2, 4 and 24. We extend its application to non-stationary signals and develop the multitaper spectrogram. We test the spectrograms with...
Show moreWe characterize the Multitaper Spectral Estimation method as a tool for stationary signal analysis. We compare its performance to the conventional periodogram, the parametric autoregressive and multitaper autoregressive spectral estimates. We analyze single and two frequency sinusoids with additive Gaussian white noise and autoregressive processes of orders 2, 4 and 24. We extend its application to non-stationary signals and develop the multitaper spectrogram. We test the spectrograms with simulated non-stationary autoregressive process of order 2 as the magnitude of its poles vary between 0 and 1 and the angle of the poles vary between 0 and pi. Our results show that the multitaper spectral estimate can be parameterized and is more accurate than others tested for non-sinusoidal signals. We also show applications to aero-acoustic data analysis.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13235
- Subject Headings
- Spectral theory (Mathematics), Signal processing--Mathematics, System identification, Power spectra
- Format
- Document (PDF)
- Title
- Intrusion detection in wireless networks: A data mining approach.
- Creator
- Nath, Shyam Varan., Florida Atlantic University, Khoshgoftaar, Taghi M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The security of wireless networks has gained considerable importance due to the rapid proliferation of wireless communications. While computer network heuristics and rules are being used to control and monitor the security of Wireless Local Area Networks (WLANs), mining and learning behaviors of network users can provide a deeper level of security analysis. The objective and contribution of this thesis is three fold: exploring the security vulnerabilities of the IEEE 802.11 standard for...
Show moreThe security of wireless networks has gained considerable importance due to the rapid proliferation of wireless communications. While computer network heuristics and rules are being used to control and monitor the security of Wireless Local Area Networks (WLANs), mining and learning behaviors of network users can provide a deeper level of security analysis. The objective and contribution of this thesis is three fold: exploring the security vulnerabilities of the IEEE 802.11 standard for wireless networks; extracting features or metrics, from a security point of view, for modeling network traffic in a WLAN; and proposing a data mining-based approach to intrusion detection in WLANs. A clustering- and expert-based approach to intrusion detection in a wireless network is presented in this thesis. The case study data is obtained from a real-word WLAN and contains over one million records. Given the clusters of network traffic records, a distance-based heuristic measure is proposed for labeling clusters as either normal or intrusive. The empirical results demonstrate the promise of the proposed approach, laying the groundwork for a clustering-based framework for intrusion detection in computer networks.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13246
- Subject Headings
- Wireless communication systems, Data warehousing, Data mining, Telecommunication--Security measures, Computer networks--Security measures, Computer security
- Format
- Document (PDF)
- Title
- A study on glucose metabolism: Computer simulation and modeling.
- Creator
- Leesirikul, Meta., Florida Atlantic University, Neelakanta, Perambur S., Roth, Zvi S., Morgera, Salvatore D., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Sorensen's model of glucose metabolism and regulation is reconstructed using SimulinkRTM. Most of the existing glucose metabolism models consist of several mass balance equations that interact with each others. Graphical format used by SimulinkRTM provides a visualized perspective of such relations so that it is easier to modify the model on ad hoc basis. Type-I and Type-II diabetes with relevant clinical details are simulated. Further, a control strategy is introduced in order to simulate...
Show moreSorensen's model of glucose metabolism and regulation is reconstructed using SimulinkRTM. Most of the existing glucose metabolism models consist of several mass balance equations that interact with each others. Graphical format used by SimulinkRTM provides a visualized perspective of such relations so that it is easier to modify the model on ad hoc basis. Type-I and Type-II diabetes with relevant clinical details are simulated. Further, a control strategy is introduced in order to simulate the control of exogenous insulin pump. Simulated results are consistent with available clinical data. Living systems in general, exhibit both stochastical and deterministic characteristics. Activities such as glucose metabolism traditionally modeled do not include stochastical properties, nor that they are viewed in the large framework of complex system with explicit interaction details. Currently, a complexity system model is developed to describe the glucose metabolism related activities. The simulation results obtained thereof illustrate the bounding domain of variations in some clinically observed details.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13254
- Subject Headings
- Glucose--Metabolism, Computer simulation, Diabetes--Metabolism, Computer modeling
- Format
- Document (PDF)
- Title
- XYZ: A scalable, partially centralized lookup service for large-scale peer-to-peer systems.
- Creator
- Zhang, Jianying., Florida Atlantic University, Wu, Jie, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Peer-to-Peer (P2P) systems are characterized by direct access between peer computers, rather than through a centralized server. File sharing is the dominant P2P application on the Internet, allowing users to easily contribute, search and obtain content. The objective of this thesis was to design XYZ, a partially centralized, scalable and self-organizing lookup service for wide area P2P systems. The XYZ system is based on distributed hash table (DHT). A unique ID and a color assigned to each...
Show morePeer-to-Peer (P2P) systems are characterized by direct access between peer computers, rather than through a centralized server. File sharing is the dominant P2P application on the Internet, allowing users to easily contribute, search and obtain content. The objective of this thesis was to design XYZ, a partially centralized, scalable and self-organizing lookup service for wide area P2P systems. The XYZ system is based on distributed hash table (DHT). A unique ID and a color assigned to each node and each file. The author uses clustering method to create the system backbone by connecting the cluster heads together and uses color clustering method to create color overlays. Any lookup for a file with a color will only be forwarded in the color overlay with the same color so that the searching space is minimized. Simulations and analysis are also provided in this thesis.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13263
- Subject Headings
- Wireless communication systems, Peer-to-peer architecture (Computer networks), Computational grids (Computer systems)
- Format
- Document (PDF)
- Title
- Design and implementation of an energy model for JiST/SWANS simulator.
- Creator
- Sutaria, Trishla., Florida Atlantic University, Mahgoub, Imad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Wireless sensor networks are one of the first real world examples of pervasive computing, the notion that small, smart, and cheap sensing and computing devices will eventually permeate the environment. Sensor networks consist of very large number of energy constrained nodes and to properly evaluate these networks a scalable ad-hoc wireless network simulator with an energy model is needed. Since most of the existing simulators have been designed for ad-hoc network with low scalability they can...
Show moreWireless sensor networks are one of the first real world examples of pervasive computing, the notion that small, smart, and cheap sensing and computing devices will eventually permeate the environment. Sensor networks consist of very large number of energy constrained nodes and to properly evaluate these networks a scalable ad-hoc wireless network simulator with an energy model is needed. Since most of the existing simulators have been designed for ad-hoc network with low scalability they can not be used to accurately simulate sensor networks. The JiST/SWANS simulator is one of the newer simulators that has been developed by Cornell University for simulating ad-hoc networks and is highly scalable which makes it appropriate for use in evaluating sensor networks. Since this simulator lack energy model our objective is to design and implement an energy model for JiST/SWANS so that it can adequately and accurately calculate the amount of energy consumption in the simulation of sensor networks.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13275
- Subject Headings
- Sensor networks, Wireless LANs, Computer network protocols, Wireless communication systems
- Format
- Document (PDF)
- Title
- Simulation-based performance evaluation of packet-switched H.264/AVC video streaming on WCDMA networks.
- Creator
- Murillo, Carlos A., Florida Atlantic University, Iskander, Cyril-Daniel, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis presents the simulation based performance evaluation on the transmission of multimedia services (H.264/AVC video streaming) to a mobile user over a packet-switched wireless network based on the WCDMA standard. The H.264/AVC refers to the codec, which is used as the main tool for video compression. It enables the transport of high bandwidth video data over Third Generation (3G) wireless systems by offering a high video compression rate, adaptability to the channel, and error...
Show moreThis thesis presents the simulation based performance evaluation on the transmission of multimedia services (H.264/AVC video streaming) to a mobile user over a packet-switched wireless network based on the WCDMA standard. The H.264/AVC refers to the codec, which is used as the main tool for video compression. It enables the transport of high bandwidth video data over Third Generation (3G) wireless systems by offering a high video compression rate, adaptability to the channel, and error resilience. It is transported using the RTP/UDP/IP protocol stack over the 3G wireless system. The WCDMA technology is simulated with special emphasis on the upper layers of the wireless channel. The performance of the WCDMA system is studied when transporting RTP/UDP/IP packets of H.264/AVC compressed video data under diverse configuration scenarios, namely, ARQ schemes and variable length of the transmitted frame at the link layer. These components of a packet-switched streaming service are integrated into a software simulation model, which is used to evaluate the end-to-end H.264/AVC video quality in a WCDMA wireless network.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13291
- Subject Headings
- Wireless communication systems, Mobile communication systems, Global system for mobile communications, Code division multiple access, Streaming technology (Telecommunications)
- Format
- Document (PDF)
- Title
- Energy cost evaluation of a secure 802.11 wireless transmission using NS-2.
- Creator
- Martins, Joao Marcelo Galindo., Florida Atlantic University, Mahgoub, Imad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Mobile devices capable of transmitting and receiving data over an 802.11 network have become very common gadgets in our society. Most small mobile devices available in the market today come with integrated 802.11 radio. The extraordinary growth of this technology has also introduced several worries regarding the vulnerabilities that exist by transmitting data over the air. In order to minimize such problems, encryption algorithms were added as an option to be used with 802.11. Unfortunately,...
Show moreMobile devices capable of transmitting and receiving data over an 802.11 network have become very common gadgets in our society. Most small mobile devices available in the market today come with integrated 802.11 radio. The extraordinary growth of this technology has also introduced several worries regarding the vulnerabilities that exist by transmitting data over the air. In order to minimize such problems, encryption algorithms were added as an option to be used with 802.11. Unfortunately, the usage of encryption algorithms also causes a faster depletion of the energy resources available to a mobile device. Depending on the encryption algorithm implementation, a greater number of packets may be required in order to transmit the same amount of data that would be transmitted with less packets over a non-encrypted channel. The objective of this research is to analyze and evaluate the affects that the encryption algorithms used by wireless security protocols can have during data transmission over a wireless medium.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13292
- Subject Headings
- Wireless communication systems--Security measurer--Evaluation, Coding theory--Evaluation, Computer architecture--Standards--Evaluation, IEEE 80211 (Standard), Mobile communication systems--Power supply--Evaluation
- Format
- Document (PDF)
- Title
- Determination of receptive fields in neural networks using Alopex.
- Creator
- Shah, Gaurang G., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This research aims at proposing a model for visual pattern recognition inspired by the neural circuitry in the brain. Our attempt is to propose few modifications in the Alopex algorithm and try to use it for the calculations of the receptive fields of neurons in the trained network. We have developed a small-scale, four-layered neural network model for simple character recognition as well as complex image patterns, which can recognize the patterns transformed by affine conversion. Here Alopex...
Show moreThis research aims at proposing a model for visual pattern recognition inspired by the neural circuitry in the brain. Our attempt is to propose few modifications in the Alopex algorithm and try to use it for the calculations of the receptive fields of neurons in the trained network. We have developed a small-scale, four-layered neural network model for simple character recognition as well as complex image patterns, which can recognize the patterns transformed by affine conversion. Here Alopex algorithm is presented as an iterative and stochastic processing method, which was proposed for optimization of a given cost function over hundreds or thousands of iterations. In this case the receptive fields of the neurons in the output layers are obtained using the Alopex algorithm.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13298
- Subject Headings
- Pattern recognition systems, Neural networks (Computer science), Computer algorithms, Neuroanatomy, Image processing
- Format
- Document (PDF)
- Title
- Label routing protocol: A new cross-layer protocol for multi-hop ad hoc wireless network.
- Creator
- Wang, Yu., Florida Atlantic University, Wu, Jie, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Compared to the traditional wireless network, the multi-hop ad hoc wireless network (simply called ad hoc networks) is self-configurable, dynamic, and distributed. During the past few years, many routing protocols have been proposed for this particular network environment. While in wired and optical networks, multi-protocol label switching (MPLS) has clearly shown its advantages in routing and switching such as flexibility, high efficiency, scalability, and low cost, however MPLS is complex...
Show moreCompared to the traditional wireless network, the multi-hop ad hoc wireless network (simply called ad hoc networks) is self-configurable, dynamic, and distributed. During the past few years, many routing protocols have been proposed for this particular network environment. While in wired and optical networks, multi-protocol label switching (MPLS) has clearly shown its advantages in routing and switching such as flexibility, high efficiency, scalability, and low cost, however MPLS is complex and does not consider the mobility issue for wireless networks, especially for ad hoc networks. This thesis migrates the label concept into the ad hoc network and provides a framework for the efficient Label Routing Protocol (LRP) in such a network. The MAC layer is also optimized with LRP for shorter delay, power saving, and higher efficiency. The simulation results show that the delay is improved significantly with this cross-layer routing protocol.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/13321
- Subject Headings
- Computer network protocols, Wireless communication systems, Mobile computing, Computer algorithms, MPLS standard, Operating systems (Computers)
- Format
- Document (PDF)