Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

FIU Electronic Theses and Dissertations

2004

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Finite Difference Time Domain Analysis Of Fractal Antennas Used In Wireless Communications, Chritz Adenauer Duncan Dec 2004

Finite Difference Time Domain Analysis Of Fractal Antennas Used In Wireless Communications, Chritz Adenauer Duncan

FIU Electronic Theses and Dissertations

The advances in wireless technology and the ever-growing demand for multiband and smaller antennas in wireless communications has led to the field of mathematics known as fractal. The use of fractal geometry in antenna design has created a significant amount of interest within the wireless communications societies and most importantly, antenna design.

This thesis investigates the performance and optimization of fractal antennas used in wireless communications. The principle analytical tool utilized in the study is the Finite Difference Time Domain technique (FDTD). This numerical method was applied to calculate the electromagnetic propagation characteristics of the Sierpinski gasket and Koch snowflake …


A Novel Neural Network Based System For Assessing Risks Associated With Information Technology Security Breaches, Monica Dezulueta Nov 2004

A Novel Neural Network Based System For Assessing Risks Associated With Information Technology Security Breaches, Monica Dezulueta

FIU Electronic Theses and Dissertations

Security remains a top priority for organizations as their information systems continue to be plagued by security breaches. This dissertation developed a unique approach to assess the security risks associated with information systems based on dynamic neural network architecture. The risks that are considered encompass the production computing environment and the client machine environment. The risks are established as metrics that define how susceptible each of the computing environments is to security breaches.

The merit of the approach developed in this dissertation is based on the design and implementation of Artificial Neural Networks to assess the risks in the computing …