Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Small Spacecraft (2)
- Small spacecraft (2)
- AI Decision Making (1)
- AI testing (1)
- Academic -- UNF -- Computing; Message Oriented Middleware (1)
-
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (1)
- Adaptive OFDM (1)
- Alfalfa (1)
- Artificial Intelligence & Robotic Control (1)
- Autonomous system verification (1)
- Buddy breathalyzer iphone arduino firmware ios (1)
- Clinical toxicology (1)
- Coefficient (1)
- Computer chassis (1)
- Crop (1)
- CubeSat (1)
- Data mining (1)
- Data processing (1)
- Decision support systems (1)
- Differential diagnosis (1)
- Elm327 (1)
- Gamma Distribution (1)
- Irrigation (1)
- Knowledge-based systems (1)
- Motion sensor (1)
- Multiple disorder diagnosis (1)
- OBD2 (1)
- PIC18F242 microcontroller (1)
- Passive infrared (1)
- Scheduling (1)
- Publication
- Publication Type
Articles 1 - 13 of 13
Full-Text Articles in Other Computer Engineering
Vehicular Motion Sensor: Developing A Wide-Range Motion Sensing Alarm System, Joshua Isaacson
Vehicular Motion Sensor: Developing A Wide-Range Motion Sensing Alarm System, Joshua Isaacson
Senior Honors Theses
Vehicular safety has become a serious concern in recent years. Many drivers have difficulty backing out of parking spaces, especially when large trucks and sport utility vehicles block the peripheral view from smaller vehicles. This can lead to accidents and pedestrian injuries when drivers are unable to see or do not pay careful attention to their surroundings.
Vehicular motion sensor systems can alert drivers of approaching obstacles when attempting to back out of parking spaces with limited visibility. This thesis aims to explain the limitations of current systems and the research conducted by the author to develop a prototype for …
Enhancing Electromagnetic Side-Channel Analysis In An Operational Environment, David P. Montminy
Enhancing Electromagnetic Side-Channel Analysis In An Operational Environment, David P. Montminy
Theses and Dissertations
Side-channel attacks exploit the unintentional emissions from cryptographic devices to determine the secret encryption key. This research identifies methods to make attacks demonstrated in an academic environment more operationally relevant. Algebraic cryptanalysis is used to reconcile redundant information extracted from side-channel attacks on the AES key schedule. A novel thresholding technique is used to select key byte guesses for a satisfiability solver resulting in a 97.5% success rate despite failing for 100% of attacks using standard methods. Two techniques are developed to compensate for differences in emissions from training and test devices dramatically improving the effectiveness of cross device template …
Reliability Models Applied To Smartphone Applications, Sonia Meskini
Reliability Models Applied To Smartphone Applications, Sonia Meskini
Electronic Thesis and Dissertation Repository
Smartphones have become the most used electronic devices. They carry out most of the functionalities of desktops, offering various useful applications that suit the user’s needs. Therefore, instead of the operator, the user has been the main controller of the device and its applications, therefore its reliability has become an emergent requirement. As a first step, based on collected smartphone applications failure data, we investigated and evaluated the efficacy of Software Reliability Growth Models (SRGMs) when applied to these smartphone data in order to check whether they achieve the same accuracy as in the desktop/laptop area. None of the selected …
Adaptive Ofdm For Wireless Interconnect In Confined Enclosures, Vit Sipal, Javier Gelabert, Christopher J. Stevens, Ben Allen, David Edwards
Adaptive Ofdm For Wireless Interconnect In Confined Enclosures, Vit Sipal, Javier Gelabert, Christopher J. Stevens, Ben Allen, David Edwards
Articles
This letter considers and recommends OFDM with adaptive subcarrier modulation as a suitable candidate for wireless UWB communication in computer chassis. A rigorous measurement campaign studies the guaranteed spectral efficiency. It concludes that enhancement of the existing WiMedia OFDM systems with a bandwidth of 528 MHz in order to support adaptive OFDM would enable data-rates above 1 Gbps over short ranges, i.e. the spectral efficiency would be doubled. Moreover, the guaranteed spectral efficiency is shown to increase with bandwidth, i.e. the guaranteed data-rate increases better than linearly with bandwidth.
Obd2 Pid Reader, Andrew Fong
Obd2 Pid Reader, Andrew Fong
Computer Engineering
The most current standard on automobiles for monitoring data is OBD-II. Using On board diagnostic Parameter ID (OBD PID) codes hobbyists and mechanics have the ability to monitor, chart, and obtain data on cars by communicating to the ECU. The OBD-II connector is often located under the driver’s side inside of the car. The hardware will consist of a generic Bluetooth OBD2 connector and a laptop running windows. The software will be an program exe created by visual basic. The software created in visual basic will allow the user to examine PID codes in order to record and discover new …
Practical Irrigation Scheduling Program, Dominic Sween
Practical Irrigation Scheduling Program, Dominic Sween
BioResource and Agricultural Engineering
This senior project discusses the design, construction, and evaluation of an irrigation scheduling program that aids users in alfalfa irrigation management, with the potential for application with other crops. The program uses a very accurate irrigation prediction model that forecasts what the estimated irrigation need of each week will be, as well as the number of irrigations needed to satisfy the requirement. The model was found to predict the sum of the actual required weekly irrigation amount within less than 1% of the true value. The program was based off the single crop coefficient approach that was outlined previously by …
Buddy: A Breathalyzer For Iphone, Douglas Blaalid, Brandon Bevans
Buddy: A Breathalyzer For Iphone, Douglas Blaalid, Brandon Bevans
Electrical Engineering
Buddy is a Breathalyzer for the iPhone designed to be more a product than a project. Through proprietary hardware and a custom iOS application, Buddy provides users with a previously untapped link from the alcohol in their body to the display on their phones. Buddy uses an alcohol sensor connected to an Arduino Uno to accurately detect the BAC of the user’s breath. The BAC is then transmitted to an iPhone via the headphone jack where it is displayed and logged in a captivating app. The finished prototype successfully measured the approximate BAC of intoxicated users. The product website has …
A Knowledge-Based Clinical Toxicology Consultant For Diagnosing Multiple Exposures, Joel D. Schipper, Douglas D. Dankel Ii, A. Antonio Arroyo, Jay L. Schauben
A Knowledge-Based Clinical Toxicology Consultant For Diagnosing Multiple Exposures, Joel D. Schipper, Douglas D. Dankel Ii, A. Antonio Arroyo, Jay L. Schauben
Publications
Objective: This paper presents continued research toward the development of a knowledge-based system for the diagnosis of human toxic exposures. In particular, this research focuses on the challenging task of diagnosing exposures to multiple toxins. Although only 10% of toxic exposures in the United States involve multiple toxins, multiple exposures account for more than half of all toxin-related fatalities. Using simple medical mathematics, we seek to produce a practical decision support system capable of supplying useful information to aid in the diagnosis of complex cases involving multiple unknown substances.
Methods: The system is automatically trained using data mining …
A Human Proximity Operations System Test Case Validation Approach, Justin Huber, Jeremy Straub
A Human Proximity Operations System Test Case Validation Approach, Justin Huber, Jeremy Straub
Jeremy Straub
A Human Proximity Operations System (HPOS) poses numerous risks in a real world environment. These risks range from mundane tasks such as avoiding walls and fixed obstacles to the critical need to keep people and processes safe in the context of the HPOS’s situation-specific decision making. Validating the performance of an HPOS, which must operate in a real-world environment, is an ill posed problem due to the complexity that is introduced by erratic (non-computer) actors. In order to prove the HPOS’s usefulness, test cases must be generated to simulate possible actions of these actors, so the HPOS can be shown …
Exposing Multiple User-Specific Data Denominated Products From A Single Small Satellite Data Stream, Atif F. Mohammad,, Emanuel Grant, Jeremy Straub, Ronald Marsh, Scott Kerlin
Exposing Multiple User-Specific Data Denominated Products From A Single Small Satellite Data Stream, Atif F. Mohammad,, Emanuel Grant, Jeremy Straub, Ronald Marsh, Scott Kerlin
Jeremy Straub
This paper presents a research work on small satellite data stream and related distribution to associated stakeholders, which is a field that needs to get explored in more detail. The algorithm that is presented to extract USDDP (User-Specific Data Denominated Products) is a self managing body, which will be within as Open Space Box environment or OSBE as a novel idea. It contains an individual stream transmitted by the small satellite, which later is to be converted into USDDP. The context defined here deals with area in detail. Contexts are vitally important because they control, influence and affect everything within …
Greek Patent Protection System And The Impacts Of Information Technology Industry, Emmanouil Alexander Zografakis Ez
Greek Patent Protection System And The Impacts Of Information Technology Industry, Emmanouil Alexander Zografakis Ez
Emmanouil Alexander Zografakis EZ
Our era can be characterized as the era of knowledge proliferation and bountifulness. That has marked our era as the era following the pace of the Information Society Development. Information Society has also brought about a remarkable IT development pace over countries. Thereby, it is greatly important all that raw knowledge to become mind figments, ideas and even inventions and innovations. It is also essential to highlight that such a beneficial process will ensure the continuity of the IT development. The only way to achieve that goal is to find a way to secure all that aforementioned knowledge which is …
Open Space Box Model: Service Oriented Architecture Framework For Small Spacecraft Collaboration And Control, Atif F. Mohammad, Jeremy Straub
Open Space Box Model: Service Oriented Architecture Framework For Small Spacecraft Collaboration And Control, Atif F. Mohammad, Jeremy Straub
Jeremy Straub
A Cubesat is a small satellite with very less competence to compute, it requires software engineering techniques, which can enhance the computational power for this small box. A model-driven approach of software engineering, which is called OSBM or Open Space Box Modeling technique, is an excellent solution to this re-source maximization challenge. OSBM facilitates apparition of the key solution pro-cesses computation and satellite related data elements using Service Oriented Ar-chitecture 3.0 (SOA 3.0) as base to work on to design services. The key challenges that can be handled by utilizing OSBM include concurrent operation and tasking of few as five …
Performance Evaluation And Comparison Of Distributed Messaging Using Message Oriented Middleware, Naveen Mupparaju
Performance Evaluation And Comparison Of Distributed Messaging Using Message Oriented Middleware, Naveen Mupparaju
UNF Graduate Theses and Dissertations
Message Oriented Middleware (MOM) is an enabling technology for modern event- driven applications that are typically based on publish/subscribe communication [Eugster03]. Enterprises typically contain hundreds of applications operating in environments with diverse databases and operating systems. Integration of these applications is required to coordinate the business process. Unfortunately, this is no easy task. Enterprise Integration, according to Brosey et al. (2001), "aims to connect and combines people, processes, systems, and technologies to ensure that the right people and the right processes have the right information and the right resources at the right time"[Brosey01]. Communication between different applications can be achieved …