Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Thesis; University of North Florida; UNF; Dissertations (6)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (5)
- Academic -- UNF -- Computing; Block Sorting; Approximation Algorithms; Run Merging (1)
- Academic -- UNF -- Computing; RFID; RFID security; NFC; anomaly detection; security; Bayesian blocks; Bayesian statistics; Knuth; Knuth's rule; RFID traffic; piecewise constant models; security standards; RFID networks; ISO standards; IEC 29167 standards; tag-reader sessions; active attacks; tag cloning; replay attacks; piecewise linear models; RFID command arrivals; traffic characterization; intrusion detection; Radiofrequency identification; Bayes methods; Data models; mathematical model; telecommunication traffic; telecommunication security (1)
- Academic -- UNF -- Computing; coalition formation; multi-robot system; task allocation; hedonic coalition (1)
-
- Academic -- UNF -- Computing; geometric graph; geometric spanner; plane spanner; network construction; stretch factor; experimental algorithmics (1)
- Academic -- UNF -- Computing; music; collaborative filtering; collective intelligence; content-based filtering; MFCC; recommend; information retrieval; database; Pandora; Last.fm; music recommendation system; UNF (1)
- Academic -- UNF -- Master of Science in Mathematical Science; Dissertations (1)
- Academic -- UNF -- Mathematics; Finite State Automata; Regular Languages; Subword Closure; Involution Mappings; Strictly Locally Testable Languages; DNA Code Words (1)
- Academic – UNF -- Computer Science (1)
- Academic – UNF – Computer science; Department of Computer and Information Sciences (1)
- Autonomous flight (1)
- Dissertations, Academic -- UNF -- Engineering (1)
- Dissertations, Academic -- UNF -- Master of Science in Electrical Engineering (1)
- Flying Ad Hoc Networks (FANETs) (1)
- Internet of Things (IoT) (1)
- Low Power Wide Area Networks (LPWANs) (1)
- Mobility models (1)
- Particle Swarm Optimization (PSO) (1)
- Thesis (1)
- Thesis; University of North Florida; UNF; Dissertations; Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations; Academic -- UNF -- Computing; cloud; database; security; algorithm (1)
- UNF (1)
- UNF; University of North Florida; Dissertations (1)
- UNF; University of North Florida; School of Computing; Dissertations (1)
- University of North Florida (1)
- Wireless Sensor Networks (WSNs) (1)
Articles 1 - 10 of 10
Full-Text Articles in Physical Sciences and Mathematics
Assessing The Performance Of A Particle Swarm Optimization Mobility Algorithm In A Hybrid Wi-Fi/Lora Flying Ad Hoc Network, William David Paredes
Assessing The Performance Of A Particle Swarm Optimization Mobility Algorithm In A Hybrid Wi-Fi/Lora Flying Ad Hoc Network, William David Paredes
UNF Graduate Theses and Dissertations
Research on Flying Ad-Hoc Networks (FANETs) has increased due to the availability of Unmanned Aerial Vehicles (UAVs) and the electronic components that control and connect them. Many applications, such as 3D mapping, construction inspection, or emergency response operations could benefit from an application and adaptation of swarm intelligence-based deployments of multiple UAVs. Such groups of cooperating UAVs, through the use of local rules, could be seen as network nodes establishing an ad-hoc network for communication purposes.
One FANET application is to provide communication coverage over an area where communication infrastructure is unavailable. A crucial part of a FANET implementation is …
Bounded-Degree Plane Geometric Spanners: Connecting The Dots Between Theory And Practice, Matthew Alexander Graham
Bounded-Degree Plane Geometric Spanners: Connecting The Dots Between Theory And Practice, Matthew Alexander Graham
UNF Graduate Theses and Dissertations
The construction of bounded-degree plane geometric spanners has been a focus of interest since 2002 when Bose, Gudmundsson, and Smid proposed the first algorithm to construct such spanners. To date, eleven algorithms have been designed with various trade-offs in degree and stretch factor. We have implemented these sophisticated algorithms in C++ using the CGAL library and experimented with them using large synthetic and real-world pointsets. Our experiments have revealed their practical behavior and real-world efficacy. We share the implementations via GitHub for broader uses and future research.
We present a simple practical algorithm, named AppxStretchFactor, that can estimate stretch factors …
Maximality And Applications Of Subword-Closed Languages, Rhys Davis Jones
Maximality And Applications Of Subword-Closed Languages, Rhys Davis Jones
UNF Graduate Theses and Dissertations
Characterizing languages D that are maximal with the property that D* ⊆ S⊗ is an important problem in formal language theory with applications to coding theory and DNA codewords. Given a finite set of words of a fixed length S, the constraint, we consider its subword closure, S⊗, the set of words whose subwords of that fixed length are all in the constraint. We investigate these maximal languages and present characterizations for them. These characterizations use strongly connected components of deterministic finite automata and lead to polynomial time algorithms for generating such languages. We prove that …
Hedonic Coalition Formation For Task Allocation With Heterogeneous Robots, Emily Czarnecki
Hedonic Coalition Formation For Task Allocation With Heterogeneous Robots, Emily Czarnecki
UNF Graduate Theses and Dissertations
Tasks in the real world are complex in nature and often require multiple robots to collaborate in order to be accomplished. However, multiple robots with the same set of sensors working together might not be the optimal solution. In many cases a task might require different sensory inputs and outputs. However, allocating a large variety of sensors on each robot is not a cost-effective solution. As such, robots with different attributes must be considered. In this thesis we study the coalition formation problem for task allocation with multiple heterogeneous (equipped with a different set of sensors) robots. The proposed solution …
Anomaly Detection In Rfid Networks, Alaa Alkadi
Anomaly Detection In Rfid Networks, Alaa Alkadi
UNF Graduate Theses and Dissertations
Available security standards for RFID networks (e.g. ISO/IEC 29167) are designed to secure individual tag-reader sessions and do not protect against active attacks that could also compromise the system as a whole (e.g. tag cloning or replay attacks). Proper traffic characterization models of the communication within an RFID network can lead to better understanding of operation under “normal” system state conditions and can consequently help identify security breaches not addressed by current standards. This study of RFID traffic characterization considers two piecewise-constant data smoothing techniques, namely Bayesian blocks and Knuth’s algorithms, over time-tagged events and compares them in the context …
Sorting By Block Moves, Jici Huang
Sorting By Block Moves, Jici Huang
UNF Graduate Theses and Dissertations
The research in this thesis is focused on the problem of Block Sorting, which has applications in Computational Biology and in Optical Character Recognition (OCR). A block in a permutation is a maximal sequence of consecutive elements that are also consecutive in the identity permutation. BLOCK SORTING is the process of transforming an arbitrary permutation to the identity permutation through a sequence of block moves. Given an arbitrary permutation π and an integer m, the Block Sorting Problem, or the problem of deciding whether the transformation can be accomplished in at most m block moves has been shown to be …
A Comparison Of Cloud Computing Database Security Algorithms, Joseph A. Hoeppner
A Comparison Of Cloud Computing Database Security Algorithms, Joseph A. Hoeppner
UNF Graduate Theses and Dissertations
The cloud database is a relatively new type of distributed database that allows companies and individuals to purchase computing time and memory from a vendor. This allows a user to only pay for the resources they use, which saves them both time and money. While the cloud in general can solve problems that have previously been too costly or time-intensive, it also opens the door to new security problems because of its distributed nature. Several approaches have been proposed to increase the security of cloud databases, though each seems to fall short in one area or another.
This thesis presents …
A Hybrid Approach To Music Recommendation: Exploiting Collaborative Music Tags And Acoustic Features, Jaime C. Kaufman
A Hybrid Approach To Music Recommendation: Exploiting Collaborative Music Tags And Acoustic Features, Jaime C. Kaufman
UNF Graduate Theses and Dissertations
Recommendation systems make it easier for an individual to navigate through large datasets by recommending information relevant to the user. Companies such as Facebook, LinkedIn, Twitter, Netflix, Amazon, Pandora, and others utilize these types of systems in order to increase revenue by providing personalized recommendations. Recommendation systems generally use one of the two techniques: collaborative filtering (i.e., collective intelligence) and content-based filtering.
Systems using collaborative filtering recommend items based on a community of users, their preferences, and their browsing or shopping behavior. Examples include Netflix, Amazon shopping, and Last.fm. This approach has been proven effective due to increased popularity, and …
Dual Constraint Problem Optimization Using A Natural Approach: Genetic Algorithm And Simulated Annealing, James P. Sweeney
Dual Constraint Problem Optimization Using A Natural Approach: Genetic Algorithm And Simulated Annealing, James P. Sweeney
UNF Graduate Theses and Dissertations
Constraint optimization problems with multiple constraints and a large solution domain are NP hard and span almost all industries in a variety of applications. One such application is the optimization of resource scheduling in a "pay per use" grid environment. Charging for these resources based on demand is often referred to as Utility Computing, where resource providers lease computing power with varying costs based on processing speed. Consumers using this resource have time and cost constraints associated with each job they submit. Determining the optimal way to divide the job among the available resources with regard to the time and …
A Performance Analysis Of Distributed Algorithms In Javaspaces, Corba Services And Web Services, Suresh Sunku
A Performance Analysis Of Distributed Algorithms In Javaspaces, Corba Services And Web Services, Suresh Sunku
UNF Graduate Theses and Dissertations
Implementation of distributed parallel algorithms on networked computers has always been very difficult until the introduction of service-oriented architectures (SOA) like JavaSpaces service, CORBA services and Web Services. Algorithms of the type Master/Worker pattern are implemented with relative ease using the SOAs. This project analyzes the performance of such algorithms on three contemporary SOAs namely JavaSpaces service, CORBA services and Web Services. These architectures make the implementations of distributed algorithms reasonably fault tolerant and highly and dynamically scalable. Also, the systems built on these architectures are generally loosely coupled and operate asynchronously.
In this project we measure and analyze the …