Current Search: College of Engineering and Computer Science (x) » Pandya, Abhijit S. (x)
View All Items
Pages
- Title
- A Biometrics Based Secure Communication Scheme for Bluetooth Environment.
- Creator
- Soni, Puneet, Pandya, Abhijit S., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A novel personnel authentication and verification system for devices communicating through Bluetooth protocol has been proposed in this thesis. Unlike existing verification systems which provide password or a PIN as a key, the system uses biometrics features as a key. In the implementation of the scheme, ridges and bifurcation based parameters are derived to generate a 128 bit Bluetooth pairing PIN. In this thesis a unique translational and rotational invariant feature set has been developed....
Show moreA novel personnel authentication and verification system for devices communicating through Bluetooth protocol has been proposed in this thesis. Unlike existing verification systems which provide password or a PIN as a key, the system uses biometrics features as a key. In the implementation of the scheme, ridges and bifurcation based parameters are derived to generate a 128 bit Bluetooth pairing PIN. In this thesis a unique translational and rotational invariant feature set has been developed. These extracted feature data, unlike traditional systems which include the extracted data into payload, is used for device connection by generating the 128 bit PIN. The system performance is analyzed using the pairing PIN for inter-sample and intra-sample recognition. To validate the stability of the system the performance is analyzed with external samples which are not a part of the internal database.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012556
- Subject Headings
- Bluetooth technology--Security measures, Network performance (Telecommunication), Computer network protocols
- Format
- Document (PDF)
- Title
- Artificial Intelligence Based Electrical Impedance Tomography for Local Tissue.
- Creator
- Rao, Manasa, Pandya, Abhijit S., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This research aims at proposing the use of Electrical Impedance Tomography (EIT), a non-invasive technique that makes it possible to measure two or three dimensional impedance of living local tissue in a human body which is applied for medical diagnosis of diseases. In order to achieve this, electrodes are attached to the part of human body and an image of the conductivity or permittivity of living tissue is deduced from surface electrodes. In this thesis we have worked towards alleviating...
Show moreThis research aims at proposing the use of Electrical Impedance Tomography (EIT), a non-invasive technique that makes it possible to measure two or three dimensional impedance of living local tissue in a human body which is applied for medical diagnosis of diseases. In order to achieve this, electrodes are attached to the part of human body and an image of the conductivity or permittivity of living tissue is deduced from surface electrodes. In this thesis we have worked towards alleviating drawbacks of EIT such as estimating parameters by incorporating it in an electrode structure and determining a solution to spatial distribution of bio-impedance to a close proximity. We address the issue of initial parameter estimation and spatial resolution accuracy of an electrode structure by using an arrangement called "divided electrode" for measurement of bio-impedance in a cross section of a local tissue. Its capability is examined by computer simulations, where a distributed equivalent circuit is utilized as a model for the cross section tissue. Further, a novel hybrid model is derived which is a combination of artificial intelligence based gradient free optimization technique and numerical integration in order to estimate parameters. This arne! iorates the achievement of spatial resolution of equivalent circuit model to the closest accuracy.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/fau/fd/FA00012544
- Subject Headings
- Electrical impedance tomography, Diagnostic imaging--Data processing, Computational intelligence
- Format
- Document (PDF)
- Title
- A Novel Method for Human Face Enhancement for Video Images.
- Creator
- Salas, Ernesto Anel, Pandya, Abhijit S., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The focus of this research is on images extracted from surveillance videos that have a low resolution and are taken under low illumination. In recent years, great advances have been made in face recognition and many studies mention results of 80% and 90% of recognition efficiency, however, most of these studies reported results using face images under controlled conditions. Current surveillance systems are equipped with low resolution cameras and are located in places with changing...
Show moreThe focus of this research is on images extracted from surveillance videos that have a low resolution and are taken under low illumination. In recent years, great advances have been made in face recognition and many studies mention results of 80% and 90% of recognition efficiency, however, most of these studies reported results using face images under controlled conditions. Current surveillance systems are equipped with low resolution cameras and are located in places with changing illumination, as opposed to a controlled environment. To be used in face recognition, images extracted from videos need to be normalized, enlarged and preprocessed. There is a multitude of processing algorithms for image enhancement, and each algorithm faces its advantages and disadvantages. This thesis presents a novel method for image enlargement of human faces applied to low quality video recordings. Results and comparison to traditional methods are also presented.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012547
- Subject Headings
- Human face recognition (Computer science), Biometric identification, Image processing--Digital techniques, Pattern recognition systems
- Format
- Document (PDF)
- Title
- Knowledge Discovery Through Drive Test Data Visualization.
- Creator
- Saxena, Shalini, Pandya, Abhijit S., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
With the increasing number of cellular phone service subscribers, the telecommunications service providers have placed immense emphasis on improving audio quality and ensure fewer dropped calls. Handoff behavior of all handsets is an important factor in quality of service of a mobile phone service. This thesis focuses on the analysis of large volumes of diagnostic data collected from mobile phones in the real world and the identification of aberrant behavior of a mobile handset under test by...
Show moreWith the increasing number of cellular phone service subscribers, the telecommunications service providers have placed immense emphasis on improving audio quality and ensure fewer dropped calls. Handoff behavior of all handsets is an important factor in quality of service of a mobile phone service. This thesis focuses on the analysis of large volumes of diagnostic data collected from mobile phones in the real world and the identification of aberrant behavior of a mobile handset under test by means of drive test data visualization. Our target was to identify poor mobility decisions that are made by the handsets in calls. Premature, delayed or exceedingly sensitive decisions are considered poor mobility decisions. The goal was to compare a set of behaviors from a baseline unit (one accepted to generally operate well). We were able to identify a particular call that was exhibiting a different path (talking to a different cell than expected or taking longer to move to a new cell). We designed a chi-square statistical test to evaluate the performance of specific mobile handset models. We also developed a mobility tool that evaluated the handset's performance by means of mapping the handoffs on the Google Maps. The mapping of the handoffs by means of the Google Maps were very powerful in identifying the above mentioned mobility patterns.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012548
- Subject Headings
- Mobile communication systems--Quality control, Wireless communication systems--Technological innovations, Cellular telephones--Design
- Format
- Document (PDF)
- Title
- A Phased Approach to Evaluate the Performance of Handoff by Mobile Handsets.
- Creator
- Siddiqui, Arjumand Fatima, Pandya, Abhijit S., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The ever increasing demand for capacity in wireless cellular networks is resolved by decreasing the size of the cells. The smaller cells created inside large cells are called microcells and they cover smaller and dense areas. As a result of this, the mobile device ends up changing the base stations or performing handover at a much higher rate. To maintain the reliability and quality of the call, it is obligatory to ascertain that the handover is performed at a proper location. If the handover...
Show moreThe ever increasing demand for capacity in wireless cellular networks is resolved by decreasing the size of the cells. The smaller cells created inside large cells are called microcells and they cover smaller and dense areas. As a result of this, the mobile device ends up changing the base stations or performing handover at a much higher rate. To maintain the reliability and quality of the call, it is obligatory to ascertain that the handover is performed at a proper location. If the handover is delayed or the mobile handset drags its base station, it is more probable that either the call will drop or the quality of the call will be compromised. The last thing a mobile handset user would want is to experience any of these two consequences. In this thesis we study the methods to analyze the performance ofhandover by the mobile handsets in the drive setup under test. This thesis presents a model for analyzing the performance ofhandoffbased on the measurements ofthe received signal strength indicator and the color code recorded by the mobile handset in the drive test field path. The model from the simulations is seen to yield results that agree with other research about the performance of mobile handsets.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012551
- Subject Headings
- Mobile communication systems--Design, Wireless communication systems--Technological innovations, Cellular telephones--Design
- Format
- Document (PDF)
- Title
- Visualization as a Qualitative Method for Analysis of Data from Location Tracking Technologies.
- Creator
- Mani, Mohan, VanHilst, Michael, Pandya, Abhijit S., Hsu, Sam, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
One of the biggest factors in the quest to better wireless communication is cellular call handoff, which in tum, is a function of geographic location. In this thesis, our fundamental goal was to demonstrate the value addition brought forth by spatial data visualization techniques for the analysis of geo-referenced data from two different location tracking technologies: GPS and cellular systems. Through our efforts, we unearthed some valuable and surprising insights from the data being...
Show moreOne of the biggest factors in the quest to better wireless communication is cellular call handoff, which in tum, is a function of geographic location. In this thesis, our fundamental goal was to demonstrate the value addition brought forth by spatial data visualization techniques for the analysis of geo-referenced data from two different location tracking technologies: GPS and cellular systems. Through our efforts, we unearthed some valuable and surprising insights from the data being analyzed that led to interesting observations about the data itself as opposed to the entity, or entities, that the data is supposed to describe. In doing so, we underscored the value addition brought forth by spatial data visualization techniques even in the incipient stages of analysis of georeferenced data from cellular networks. We also demonstrated the value of visualization techniques as a verification tool to verify the results of analysis done through other methods, such as statistical analysis.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/fau/fd/FA00012536
- Subject Headings
- Mobile communication systems, Algorithms--Data analysis, Radio--Transmitters and transmissions, Code division multiple access
- Format
- Document (PDF)
- Title
- Modeling Perceived Audio for Cellular Phones Based on Field Data.
- Creator
- Kitbamrung, Pateep, Pandya, Abhijit S., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Even though, the current cellular network provides the user with a wide array of services, for a typical user voice communication is still the primary usage. It has become increasingly important for a cellular network provider to provide the customers with the clearest possible end-to-end speech during a call. However, this perceptually motivated QoS is hard to measure. While the main goal of this research has been on the modeling of the perceptual audio quality, this thesis focuses on the...
Show moreEven though, the current cellular network provides the user with a wide array of services, for a typical user voice communication is still the primary usage. It has become increasingly important for a cellular network provider to provide the customers with the clearest possible end-to-end speech during a call. However, this perceptually motivated QoS is hard to measure. While the main goal of this research has been on the modeling of the perceptual audio quality, this thesis focuses on the discovery of procedures for collecting audio and diagnostic data, the evaluation of the captured audio, and the mapping and visualization of the diagnostic and audio related data. The correct application of these modified procedures should increase the productivity of the drive test team as well as provides a platform for the accurate assessment of the data collected.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012530
- Subject Headings
- Computer network protocols, Wireless communication systems--Quality control, Routers (Computer networks), Mobile communication systems--Quality control
- Format
- Document (PDF)
- Title
- iVEST A: Interactive Data Visualization and Analysis for Drive Test Data Evaluation.
- Creator
- Lee, Yongsuk, Zhu, Xingquan, Pandya, Abhijit S., Hsu, Sam, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In this thesis, a practical solution for drive test data evaluation and a real application are studied. We propose a system framework to project high dimensional Drive Test Data (DTD) to well-organized web pages, such that users can visually review phone performance with respect to different factors. The proposed application, iVESTA (interactive Visualization and Evaluation System for driven Test dAta), employs a web-based architecture which enables users to upload DTD and immediately...
Show moreIn this thesis, a practical solution for drive test data evaluation and a real application are studied. We propose a system framework to project high dimensional Drive Test Data (DTD) to well-organized web pages, such that users can visually review phone performance with respect to different factors. The proposed application, iVESTA (interactive Visualization and Evaluation System for driven Test dAta), employs a web-based architecture which enables users to upload DTD and immediately visualize the test results and observe phone and network performances with respect to different factors such as dropped call rate, signal quality, vehicle speed, handover and network delays. iVESTA provides practical solutions for mobile phone manufacturers and network service providers to perform comprehensive study on their products from the real-world DTD.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012532
- Subject Headings
- Information visualization--Data processing, Object-oriented programming (Computer science), Information technology--Management, Application software--Development
- Format
- Document (PDF)
- Title
- Low complexity scalable video encoding.
- Creator
- Jillani, Rashad M., Kalva, Hari, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The emerging Scalable Video Coding (SVC) extends the H.264/AVC video coding standard with new tools designed to efficiently support temporal, spatial and SNR scalability. In real-time multimedia systems, the coding performance of video encoders and decoders is limited by computational complexity. This thesis presents techniques to manage computational complexity of H.264/AVC and SVC video encoders. These techniques aim to provide significant complexity saving as well as a framework for...
Show moreThe emerging Scalable Video Coding (SVC) extends the H.264/AVC video coding standard with new tools designed to efficiently support temporal, spatial and SNR scalability. In real-time multimedia systems, the coding performance of video encoders and decoders is limited by computational complexity. This thesis presents techniques to manage computational complexity of H.264/AVC and SVC video encoders. These techniques aim to provide significant complexity saving as well as a framework for efficient use of SVC.
Show less - Date Issued
- 2012
- PURL
- http://purl.flvc.org/fau/fd/FA00004252
- Format
- Document (PDF)
- Title
- An intelligent system for predicting bridge condition rating.
- Creator
- Thiruppathi, Arulseelan., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A neural network based model for prediction of bridge condition rating is proposed. The back-propagation algorithm is used to train the network to recognize the pattern of deterioration of bridges and use this knowledge in predicting the future condition rating of a bridge. The various factors which influence the deterioration rate are considered as input to the system. The model then predicts the condition rating of the three major sub-components of a bridge viz. the deck, sub-structure and...
Show moreA neural network based model for prediction of bridge condition rating is proposed. The back-propagation algorithm is used to train the network to recognize the pattern of deterioration of bridges and use this knowledge in predicting the future condition rating of a bridge. The various factors which influence the deterioration rate are considered as input to the system. The model then predicts the condition rating of the three major sub-components of a bridge viz. the deck, sub-structure and the super-structure. Fuzzy logic is used to evaluate the overall condition rating of the bridge using the condition rating of the components. To demonstrate the superiority of the neural network model over the traditional models, the history of the deterioration rates for the components were also considered in the prediction of their future condition. The proposed system is versatile and can be easily extended to include other parameters and updated from time to time without much effort.
Show less - Date Issued
- 1994
- PURL
- http://purl.flvc.org/fcla/dt/15096
- Subject Headings
- Bridges--Maintenance and repair, Neural networks (Computer science)
- Format
- Document (PDF)
- Title
- Cross-domain authentication for multi-protocol phones.
- Creator
- Thakker, Chetan., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The last decade has seen a surge in demand for cellular and WLAN networks. With the introduction of Voice Over IP, cellular companies are looking at WLAN-Cellular integrated networks that shall provide users with economical voice and data services. These networks shall be complimentary to the existing cellular networks. A lot of money is spent in registering and authenticating new users, since they are separately authenticated and registered on the WLAN and Cellular domains. This leads to...
Show moreThe last decade has seen a surge in demand for cellular and WLAN networks. With the introduction of Voice Over IP, cellular companies are looking at WLAN-Cellular integrated networks that shall provide users with economical voice and data services. These networks shall be complimentary to the existing cellular networks. A lot of money is spent in registering and authenticating new users, since they are separately authenticated and registered on the WLAN and Cellular domains. This leads to extra costs for the company. Thus for the integrated networks to have an impact on the market some issues such as simpler authentication and registration must be resolved. Therefore we propose a new inter-working model that shall addresses the authentication and registration problem for an integrated network for voice and data. The Single authentication system of the new inter-working model, shall authenticate the user in an integrated network using the SIM credentials, this authentication shall be valid for both voice and data. Also registration costs will be saved by preventing separate registration of users in the WLAN and Cellular domain.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13260
- Subject Headings
- Integrated services digital networks, Digital telephone systems, Wireless communication systems--Technological innovations, Mobile communication systems--Technological innovations
- Format
- Document (PDF)
- Title
- An intelligent neural network forecaster to predict the Standard & Poor 500's index.
- Creator
- Shah, Sulay Bipin., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In this thesis we present an intelligent forecaster based on neural network technology to capture the future path of the market indicator. This thesis is about the development of a new methodology in financial forecasting. An effort is made to develop a neural network forecaster using the financial indicators as the input variables. A complex recurrent neural network is used to capture the behavior of the nonlinear characteristics of the S&P 500. The main outcome of this research is, a...
Show moreIn this thesis we present an intelligent forecaster based on neural network technology to capture the future path of the market indicator. This thesis is about the development of a new methodology in financial forecasting. An effort is made to develop a neural network forecaster using the financial indicators as the input variables. A complex recurrent neural network is used to capture the behavior of the nonlinear characteristics of the S&P 500. The main outcome of this research is, a systematic way of constructing a forecaster for nonlinear and non-stationary data series of S&P 500 that leads to very good out-of-sample prediction. The results of the training and testing of the network are presented along with conclusion. The tool used for the validation of this research is "Brainmaker". This thesis also contains a brief survey of available tools for financial forecasting.
Show less - Date Issued
- 1999
- PURL
- http://purl.flvc.org/fcla/dt/15741
- Subject Headings
- Neural networks (Computer science), Stock price forecasting, Time-series analysis
- Format
- Document (PDF)
- Title
- A new methodology to predict certain characteristics of stock market using time-series phenomena.
- Creator
- Shah, Trupti U., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The goal of time series forecasting is to identify the underlying pattern and use these patterns to predict the future path of the series. To capture the future path of a dynamic stock market variable is one of the toughest challenges. This thesis is about the development of a new methodology in financial forecasting. An effort is made to develop a neural network forecaster using time-series phenomena. The main outcome of this new approach for financial forecasting is a systematic way of...
Show moreThe goal of time series forecasting is to identify the underlying pattern and use these patterns to predict the future path of the series. To capture the future path of a dynamic stock market variable is one of the toughest challenges. This thesis is about the development of a new methodology in financial forecasting. An effort is made to develop a neural network forecaster using time-series phenomena. The main outcome of this new approach for financial forecasting is a systematic way of constructing a Neural Network Forecaster for nonlinear and non-stationary time-series data that leads to very good out-of-sample prediction. The tool used for the validation of this research is "Brainmaker". This thesis also contains a small survey of available tools used for financial forecasting.
Show less - Date Issued
- 1999
- PURL
- http://purl.flvc.org/fcla/dt/15677
- Subject Headings
- Time-series analysis, Neural networks (Computer science), Stock price forecasting
- Format
- Document (PDF)
- Title
- A connectionist approach to adaptive reasoning: An expert system to predict skid numbers.
- Creator
- Reddy, Mohan S., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This project illustrates the neural network approach to constructing a fuzzy logic decision system. This technique employs an artificial neural network (ANN) to recognize the relationships that exit between the various inputs and outputs. An ANN is constructed based on the variables present in the application. The network is trained and tested. Various training methods are explored, some of which include auxiliary input and output columns. After successful testing, the ANN is exposed to new...
Show moreThis project illustrates the neural network approach to constructing a fuzzy logic decision system. This technique employs an artificial neural network (ANN) to recognize the relationships that exit between the various inputs and outputs. An ANN is constructed based on the variables present in the application. The network is trained and tested. Various training methods are explored, some of which include auxiliary input and output columns. After successful testing, the ANN is exposed to new data and the results are grouped into fuzzy membership sets based membership evaluation rules. This data grouping forms the basis of a new ANN. The network is now trained and tested with the fuzzy membership data. New data is presented to the trained network and the results form the fuzzy implications. This approach is used to compute skid resistance values from G-analyst accelerometer readings on open grid bridge decks.
Show less - Date Issued
- 1996
- PURL
- http://purl.flvc.org/fcla/dt/15239
- Subject Headings
- Artificial intelligence, Fuzzy logic, Neural networks (Computer science), Pavements--Skid resistance
- Format
- Document (PDF)
- Title
- A visual perception threshold matching algorithm for real-time video compression.
- Creator
- Noll, John M., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A barrier to the use of digital imaging is the vast storage requirements involved. One solution is compression. Since imagery is ultimately subject to human visual perception, it is worthwhile to design and implement an algorithm which performs compression as a function of perception. The underlying premise of the thesis is that if the algorithm closely matches visual perception thresholds, then its coded images contain only the components necessary to recreate the perception of the visual...
Show moreA barrier to the use of digital imaging is the vast storage requirements involved. One solution is compression. Since imagery is ultimately subject to human visual perception, it is worthwhile to design and implement an algorithm which performs compression as a function of perception. The underlying premise of the thesis is that if the algorithm closely matches visual perception thresholds, then its coded images contain only the components necessary to recreate the perception of the visual stimulus. Psychophysical test results are used to map the thresholds of visual perception, and develop an algorithm that codes only the image content exceeding those thresholds. The image coding algorithm is simulated in software to demonstrate compression of a single frame image. The simulation results are provided. The algorithm is also adapted to real-time video compression for implementation in hardware.
Show less - Date Issued
- 1992
- PURL
- http://purl.flvc.org/fcla/dt/14857
- Subject Headings
- Image processing--Digital techniques, Computer algorithms, Visual perception, Data compression (Computer science)
- Format
- Document (PDF)
- Title
- Path selection through a three-stage switching network using neural networks.
- Creator
- Keskiner, Haluk., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Several neural network applications solving practical problems in communications are presented. A neural network algorithm to select paths through a three stage switching network is developed. An analysis of the dynamics of the neural network and a convergence proof are provided. With the help of computer simulations, a four dimensional region for the valid combinations of the neural network parameters was discovered. An analysis is performed to determine the characteristics of this region....
Show moreSeveral neural network applications solving practical problems in communications are presented. A neural network algorithm to select paths through a three stage switching network is developed. An analysis of the dynamics of the neural network and a convergence proof are provided. With the help of computer simulations, a four dimensional region for the valid combinations of the neural network parameters was discovered. An analysis is performed to determine the characteristics of this region. The behavior of the neural network algorithm for different switching network configurations and varying traffic patterns were investigated. The effect of initial state of the neural network and heuristic improvements to the algorithm is provided. A comparative analysis of the neural network path selection algorithm against a sequential search method is also given.
Show less - Date Issued
- 1991
- PURL
- http://purl.flvc.org/fcla/dt/14741
- Subject Headings
- Neural networks (Computer science), Packet switching (Data transmission)
- Format
- Document (PDF)
- Title
- PRGMDH algorithm for neural network development and its applications.
- Creator
- Tangadpelli, Chetan., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The existing Group Method of Data Handling (GMDH) algorithm has characteristics that are ideal for neural network design. This thesis introduces a new algorithm that applies some of the best characteristics of GMDH to neural network design and develops a Pruning based Regenerated Network by discarding the neurons in a layer which don't contribute for the creation of neurons in next layer. Unlike other conventional algorithms, which generate a network which is a black box, the new algorithm...
Show moreThe existing Group Method of Data Handling (GMDH) algorithm has characteristics that are ideal for neural network design. This thesis introduces a new algorithm that applies some of the best characteristics of GMDH to neural network design and develops a Pruning based Regenerated Network by discarding the neurons in a layer which don't contribute for the creation of neurons in next layer. Unlike other conventional algorithms, which generate a network which is a black box, the new algorithm provides visualization of the network displaying all the neurons in the network. The algorithm is general enough that it will accept any number of inputs and any sized training set. To show the flexibility of the Pruning based Regenerated Network, this algorithm is used to analyze different combinations of drugs and determine which pathways in these networks interact and determine the combination of drugs that take advantage of these interactions to maximize a desired effect on genes.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/13397
- Subject Headings
- Neural networks (Computer science), GMDH algorithms, Pattern recognition systems
- Format
- Document (PDF)
- Title
- Fuzzy vault fingerprint cryptography: Experimental and simulation studies.
- Creator
- Kotlarchyk, Alex J., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The fuzzy vault scheme introduced by Juels and Sudan [Jue02] was implemented in a fingerprint cryptography system using COTS software. This system proved to be unsuccessful. Failure analysis led to a series of simulations to investigate the parameters and system thresholds necessary for such a system to perform adequately and as guidance for constructing similar systems in the future. First, a discussion of the role of biometrics in data security and cryptography is presented, followed by a...
Show moreThe fuzzy vault scheme introduced by Juels and Sudan [Jue02] was implemented in a fingerprint cryptography system using COTS software. This system proved to be unsuccessful. Failure analysis led to a series of simulations to investigate the parameters and system thresholds necessary for such a system to perform adequately and as guidance for constructing similar systems in the future. First, a discussion of the role of biometrics in data security and cryptography is presented, followed by a review of the key developments leading to the development of the fuzzy vault scheme. The relevant mathematics and algorithms are briefly explained. This is followed by a detailed description of the implementation and simulation of the fuzzy vault scheme. Finally, conclusions drawn from analysis of the results of this research are presented.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/13360
- Subject Headings
- Computer networks--Security measures, Computer security, Data encryption (Computer science)
- Format
- Document (PDF)
- Title
- Firewall formulation driven by risk analysis.
- Creator
- Srinivasan, Sriram, Jr., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
At the turn of the new millennium, the focus of Information Technology Management turned to Information and Systems Security, as opposed to competitive advantage investment. In catering to the security needs of various firms and institutions, it is seen that different entities require varying Information Security configurations. This thesis attempts to utilize Risk Analysis, a commonly used procedure in business realms, to formulate customized Firewalls based on the specific needs of a...
Show moreAt the turn of the new millennium, the focus of Information Technology Management turned to Information and Systems Security, as opposed to competitive advantage investment. In catering to the security needs of various firms and institutions, it is seen that different entities require varying Information Security configurations. This thesis attempts to utilize Risk Analysis, a commonly used procedure in business realms, to formulate customized Firewalls based on the specific needs of a network, subsequently building an effective system following the "Defense in Depth" strategy. This is done by first choosing an efficient Risk Analysis model which suits the process of creating Firewall policies, and then applying it to a particular case study. A network within Florida Atlantic University is used as an experimental test case, and by analyzing the traffic to which it is subject while behind a single Firewall layer, a specific Security Policy is arrived at and implemented.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/13348
- Subject Headings
- Computer networks--Security measures, Electronic data processing departments--Security measures, Firewalls (Computer security), Risk assessment
- Format
- Document (PDF)
- Title
- Determination of receptive fields in neural networks using Alopex.
- Creator
- Shah, Gaurang G., Florida Atlantic University, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This research aims at proposing a model for visual pattern recognition inspired by the neural circuitry in the brain. Our attempt is to propose few modifications in the Alopex algorithm and try to use it for the calculations of the receptive fields of neurons in the trained network. We have developed a small-scale, four-layered neural network model for simple character recognition as well as complex image patterns, which can recognize the patterns transformed by affine conversion. Here Alopex...
Show moreThis research aims at proposing a model for visual pattern recognition inspired by the neural circuitry in the brain. Our attempt is to propose few modifications in the Alopex algorithm and try to use it for the calculations of the receptive fields of neurons in the trained network. We have developed a small-scale, four-layered neural network model for simple character recognition as well as complex image patterns, which can recognize the patterns transformed by affine conversion. Here Alopex algorithm is presented as an iterative and stochastic processing method, which was proposed for optimization of a given cost function over hundreds or thousands of iterations. In this case the receptive fields of the neurons in the output layers are obtained using the Alopex algorithm.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13298
- Subject Headings
- Pattern recognition systems, Neural networks (Computer science), Computer algorithms, Neuroanatomy, Image processing
- Format
- Document (PDF)