Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Physical Sciences and Mathematics

Autonomous Pipeline Monitoring And Maintenance System: A Rfid-Based Approach, Jong-Hoon Kim, Gokarna Sharma, Noureddine Boudriga, S.S. Iyengar, Nagarajan Prabakar Dec 2015

Autonomous Pipeline Monitoring And Maintenance System: A Rfid-Based Approach, Jong-Hoon Kim, Gokarna Sharma, Noureddine Boudriga, S.S. Iyengar, Nagarajan Prabakar

School of Computing and Information Sciences

Pipeline networks are one of the key infrastructures of our modern life. Proactive monitoring and frequent inspection of pipeline networks are very important for sustaining their safe and efficient functionalities. Existing monitoring and maintenance approaches are costly and inefficient because pipelines can be installed in large scale and in an inaccessible and hazardous environment. To overcome these challenges, we propose a novel Radio Frequency IDentification (RFID)-based Autonomous Maintenance system for Pipelines, called RAMP, which combines robotic, sensing, and RFID technologies for efficient and accurate inspection, corrective reparation, and precise geo-location information. RAMP can provide not only economical and scalable remedy …


Paris Talks: Securing The Future, Phaedra Pezzullo Nov 2015

Paris Talks: Securing The Future, Phaedra Pezzullo

Sea Level Rise Collection

No abstract provided.


Online Moving Object Visualization With Geo-Referenced Data, Guangqiang Zhao Nov 2015

Online Moving Object Visualization With Geo-Referenced Data, Guangqiang Zhao

FIU Electronic Theses and Dissertations

As a result of the rapid evolution of smart mobile devices and the wide application of satellite-based positioning devices, the moving object database (MOD) has become a hot research topic in recent years. The moving objects generate a large amount of geo-referenced data in different types, such as videos, audios, images and sensor logs. In order to better analyze and utilize the data, it is useful and necessary to visualize the data on a map.

With the rise of web mapping, visualizing the moving object and geo-referenced data has never been so easy. While displaying the trajectory of a moving …


Data Verifications For Online Social Networks, Mahmudur Rahman Nov 2015

Data Verifications For Online Social Networks, Mahmudur Rahman

FIU Electronic Theses and Dissertations

Social networks are popular platforms that simplify user interaction and encourage collaboration. They collect large amounts of media from their users, often reported from mobile devices. The value and impact of social media makes it however an attractive attack target. In this thesis, we focus on the following social media vulnerabilities. First, review centered social networks such as Yelp and Google Play have been shown to be the targets of significant search rank and malware proliferation attacks. Detecting fraudulent behaviors is thus paramount to prevent not only public opinion bias, but also to curb the distribution of malware. Second, the …


Modeling, Designing, And Implementing An Ad-Hoc M-Learning Platform That Integrates Sensory Data To Support Ubiquitous Learning, Hien M. Nguyen Sep 2015

Modeling, Designing, And Implementing An Ad-Hoc M-Learning Platform That Integrates Sensory Data To Support Ubiquitous Learning, Hien M. Nguyen

FIU Electronic Theses and Dissertations

Learning at any-time, at anywhere, using any mobile computing platform learning (which we refer to as “education in your palm”) empowers informal and formal education. It supports the continued creation of knowledge outside a classroom, after-school programs, community-based organizations, museums, libraries, and shopping malls with under-resourced settings. In doing so, it fosters the continued creation of a cumulative body of knowledge in informal and formal education. Anytime, anywhere, using any device computing platform learning means that students are not required to attend traditional classroom settings in order to learn. Instead, students will be able to access and share learning resources …


Modeling Security And Resource Allocation For Mobile Multi-Hop Wireless Neworks Using Game Theory, Laurent L. Y. Njilla Sep 2015

Modeling Security And Resource Allocation For Mobile Multi-Hop Wireless Neworks Using Game Theory, Laurent L. Y. Njilla

FIU Electronic Theses and Dissertations

This dissertation presents novel approaches to modeling and analyzing security and resource allocation in mobile ad hoc networks (MANETs). The research involves the design, implementation and simulation of different models resulting in resource sharing and security’s strengthening of the network among mobile devices. Because of the mobility, the network topology may change quickly and unpredictably over time. Moreover, data-information sent from a source to a designated destination node, which is not nearby, has to route its information with the need of intermediary mobile nodes. However, not all intermediary nodes in the network are willing to participate in data-packet transfer of …


Integrating Deep Learning With Correlation-Based Multimedia Semantic Concept Detection, Hsin-Yu Ha Sep 2015

Integrating Deep Learning With Correlation-Based Multimedia Semantic Concept Detection, Hsin-Yu Ha

FIU Electronic Theses and Dissertations

The rapid advances in technologies make the explosive growth of multimedia data possible and available to the public. Multimedia data can be defined as data collection, which is composed of various data types and different representations. Due to the fact that multimedia data carries knowledgeable information, it has been widely adopted to different genera, like surveillance event detection, medical abnormality detection, and many others. To fulfil various requirements for different applications, it is important to effectively classify multimedia data into semantic concepts across multiple domains. In this dissertation, a correlation-based multimedia semantic concept detection framework is seamlessly integrated with the …


A Multiple Resonant Frequencies Circular Reconfigurable Antenna Investigated With Wireless Powering In A Concrete Block, Shishir Shanker Punjala, Nikki Pissinou, Kia Makki Apr 2015

A Multiple Resonant Frequencies Circular Reconfigurable Antenna Investigated With Wireless Powering In A Concrete Block, Shishir Shanker Punjala, Nikki Pissinou, Kia Makki

School of Computing and Information Sciences

A novel broadband reconfigurable antenna design that can cover different frequency bands is presented.This antenna has multiple resonant frequencies. The reflection coefficient graphs for this antenna are presented in this paper. The new proposed design was investigated along with RFMEMS switches and the results are also presented. Investigations were carried out to check the efficiency of the antenna in the wireless powering domain. The antenna was placed in a concrete block and its result comparison to that of a dipole antenna is also presented in this paper.


Diffeomorphism Spline, Wei Zeng, Muhammad Razib, Abdur Bin Shahid Apr 2015

Diffeomorphism Spline, Wei Zeng, Muhammad Razib, Abdur Bin Shahid

School of Computing and Information Sciences

Conventional splines offer powerful means for modeling surfaces and volumes in three-dimensional Euclidean space. A one-dimensional quaternion spline has been applied for animation purpose, where the splines are defined to model a one-dimensional submanifold in the three-dimensional Lie group. Given two surfaces, all of the diffeomorphisms between them form an infinite dimensional manifold, the so-called diffeomorphism space. In this work, we propose a novel scheme to model finite dimensional submanifolds in the diffeomorphism space by generalizing conventional splines. According to quasiconformal geometry theorem, each diffeomorphism determines a Beltrami differential on the source surface. Inversely, the diffeomorphism is determined by its …


Constructing Secure Mapreduce Framework In Cloud-Based Environment, Yongzhi Wang Mar 2015

Constructing Secure Mapreduce Framework In Cloud-Based Environment, Yongzhi Wang

FIU Electronic Theses and Dissertations

MapReduce, a parallel computing paradigm, has been gaining popularity in recent years as cloud vendors offer MapReduce computation services on their public clouds. However, companies are still reluctant to move their computations to the public cloud due to the following reason: In the current business model, the entire MapReduce cluster is deployed on the public cloud. If the public cloud is not properly protected, the integrity and the confidentiality of MapReduce applications can be compromised by attacks inside or outside of the public cloud. From the result integrity’s perspective, if any computation nodes on the public cloud are compromised,thosenodes can …


Learning Data-Driven Models Of Non-Verbal Behaviors For Building Rapport Using An Intelligent Virtual Agent, Reza Amini Mar 2015

Learning Data-Driven Models Of Non-Verbal Behaviors For Building Rapport Using An Intelligent Virtual Agent, Reza Amini

FIU Electronic Theses and Dissertations

There is a growing societal need to address the increasing prevalence of behavioral health issues, such as obesity, alcohol or drug use, and general lack of treatment adherence for a variety of health problems. The statistics, worldwide and in the USA, are daunting. Excessive alcohol use is the third leading preventable cause of death in the United States (with 79,000 deaths annually), and is responsible for a wide range of health and social problems. On the positive side though, these behavioral health issues (and associated possible diseases) can often be prevented with relatively simple lifestyle changes, such as losing weight …


Temporal Mining For Distributed Systems, Yexi Jiang Mar 2015

Temporal Mining For Distributed Systems, Yexi Jiang

FIU Electronic Theses and Dissertations

Many systems and applications are continuously producing events. These events are used to record the status of the system and trace the behaviors of the systems. By examining these events, system administrators can check the potential problems of these systems. If the temporal dynamics of the systems are further investigated, the underlying patterns can be discovered. The uncovered knowledge can be leveraged to predict the future system behaviors or to mitigate the potential risks of the systems. Moreover, the system administrators can utilize the temporal patterns to set up event management rules to make the system more intelligent.

With the …


Statistical Methods In Ai: Rare Event Learning Using Associative Rules And Higher-Order Statistics, V. Iyer, S. Shetty, S.S. Iyengar Jan 2015

Statistical Methods In Ai: Rare Event Learning Using Associative Rules And Higher-Order Statistics, V. Iyer, S. Shetty, S.S. Iyengar

School of Computing and Information Sciences

No abstract provided.