Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

University of Central Florida

Theses/Dissertations

Wireless

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Engineering

A Third-Order Differential Steering Robot And Trajectory Generation In The Presence Of Moving Obstacles, Vatana An Jan 2006

A Third-Order Differential Steering Robot And Trajectory Generation In The Presence Of Moving Obstacles, Vatana An

Electronic Theses and Dissertations

In this thesis, four robots will be used to implement a collision-free trajectory planning/replanning algorithm. The existence of a chained form transformation so that the robot's model can be control in canonical form will be analyzed and proved. A trajectory generation for obstacles avoidance will be derived, simulated, and implemented. A specific PC based control algorithm will be developed. Chapter two describes two wheels differential drive robot modeling and existence of controllable canonical chained form. Chapter 3 describes criterion for avoiding dynamic objects, a feasible collision-free trajectory parameterization, and solution to steering velocity. Chapter 4 describes robot implementation, pc wireless …


Design And Hardware Implementation Of A Novel Scrambling Security Algorithm For Robust Wireless Local Area Networks, Mohit Jagetia Jan 2004

Design And Hardware Implementation Of A Novel Scrambling Security Algorithm For Robust Wireless Local Area Networks, Mohit Jagetia

Electronic Theses and Dissertations

The IEEE802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, which is a popular wireless secure communication stream cipher protocol approach to network security used to protect link-layer communications from eavesdropping and other attacks. It allows user to communicate with the user; sharing the public key over a network. It provides authentication and encrypted communications over unsecured channels. However, WEP protocol has an inherent security flaw. It is vulnerable to the various attacks, various experiments has proved that WEP fails to achieve its security goals. This thesis entails designing, evaluating and prototyping a wireless security infrastructure that …