Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

University of North Florida

Keyword
Publication Year

Articles 1 - 14 of 14

Full-Text Articles in Computer Engineering

Energy-Efficient Hmac For Wireless Communications, Cesar Enrique Castellon Escobar Jan 2023

Energy-Efficient Hmac For Wireless Communications, Cesar Enrique Castellon Escobar

UNF Graduate Theses and Dissertations

This thesis introduces the Farming Lightweight Protocol (FLP) optimized for energy-restricted environments that depend upon secure communication, such as multi-robot information gathering systems within the vision of ``smart'' agriculture. FLP uses a hash-based message authentication code (HMAC) to achieve data integrity. HMAC implementations, resting upon repeated use of the SHA256 hashing operator, impose additional resource requirements and thus also impact system availability. We address this particular integrity/availability trade-off by proposing an energy-saving algorithmic engineering method on the internal SHA256 hashing operator. The energy-efficient hash is designed to maintain the original security benefits yet reduce the negative effects on system availability. …


Assessing The Performance Of A Particle Swarm Optimization Mobility Algorithm In A Hybrid Wi-Fi/Lora Flying Ad Hoc Network, William David Paredes Jan 2023

Assessing The Performance Of A Particle Swarm Optimization Mobility Algorithm In A Hybrid Wi-Fi/Lora Flying Ad Hoc Network, William David Paredes

UNF Graduate Theses and Dissertations

Research on Flying Ad-Hoc Networks (FANETs) has increased due to the availability of Unmanned Aerial Vehicles (UAVs) and the electronic components that control and connect them. Many applications, such as 3D mapping, construction inspection, or emergency response operations could benefit from an application and adaptation of swarm intelligence-based deployments of multiple UAVs. Such groups of cooperating UAVs, through the use of local rules, could be seen as network nodes establishing an ad-hoc network for communication purposes.

One FANET application is to provide communication coverage over an area where communication infrastructure is unavailable. A crucial part of a FANET implementation is …


Modeling Context-Adaptive Energy-Aware Security In Mobile Devices, Preeti Singh Jan 2019

Modeling Context-Adaptive Energy-Aware Security In Mobile Devices, Preeti Singh

UNF Graduate Theses and Dissertations

As increasing functionality in mobile devices leads to rapid battery drain, energy management has gained increasing importance. However, differences in user’s usage contexts and patterns can be leveraged for saving energy. On the other hand, the increasing sensitivity of users’ data, coupled with the need to ensure security in an energy-aware manner, demands careful analyses of trade-offs between energy and security. The research described in this thesis addresses this challenge by 1)modeling the problem of context-adaptive energy-aware security as a combinatorial optimization problem (Context-Sec); 2) proving that the decision version of this problem is NP-Complete, via a reduction from a …


Architectures For Real-Time Automatic Sign Language Recognition On Resource-Constrained Device, James M. Blair Jan 2018

Architectures For Real-Time Automatic Sign Language Recognition On Resource-Constrained Device, James M. Blair

UNF Graduate Theses and Dissertations

Powerful, handheld computing devices have proliferated among consumers in recent years. Combined with new cameras and sensors capable of detecting objects in three-dimensional space, new gesture-based paradigms of human computer interaction are becoming available. One possible application of these developments is an automated sign language recognition system. This thesis reviews the existing body of work regarding computer recognition of sign language gestures as well as the design of systems for speech recognition, a similar problem. Little work has been done to apply the well-known architectural patterns of speech recognition systems to the domain of sign language recognition. This work creates …


Implementation Of Cache Attack On Real Information Centric Networking System, Faustina J. Anto Morais Jan 2018

Implementation Of Cache Attack On Real Information Centric Networking System, Faustina J. Anto Morais

UNF Graduate Theses and Dissertations

Network security is an ongoing major problem in today’s Internet world. Even though there have been simulation studies related to denial of service and cache attacks, studies of attacks on real networks are still lacking in the research. In this thesis, the effects of cache attacks in real information-centric networking systems were investigated. Cache attacks were implemented in real networks with different cache sizes and with Least Recently Used, Random and First In First Out algorithms to fill the caches in each node. The attacker hits the cache with unpopular content, making the user request that the results be fetched …


Towards Designing Energy Efficient Symmetric Key Protocols, Sai Raghu Talluri Jan 2018

Towards Designing Energy Efficient Symmetric Key Protocols, Sai Raghu Talluri

UNF Graduate Theses and Dissertations

Energy consumption by various modern symmetric key encryption protocols (DES,

3-DES, AES and, Blowfish) is studied from an algorithmic perspective. The work

is directed towards redesigning or modifying the underlying algorithms for these

protocols to make them consume less energy than they currently do. This research

takes the approach of reducing energy consumption by parallelizing the

consecutive memory accesses of symmetric key encryption algorithms. To achieve

parallelization, an existing energy complexity model is applied to symmetric key

encryption algorithms. Inspired by the popular DDR3 architecture, the model assumes

that main memory is divided into multiple banks, each of which can …


Performance Evaluation Of Hadoop Based Big Data Applications With Hibench Benchmarking Tool On Iaas Cloud Platforms, Karthika Muthiah Ms. Jan 2017

Performance Evaluation Of Hadoop Based Big Data Applications With Hibench Benchmarking Tool On Iaas Cloud Platforms, Karthika Muthiah Ms.

UNF Graduate Theses and Dissertations

Cloud computing is a computing paradigm where large numbers of devices are connected through networks that provide a dynamically scalable infrastructure for applications, data and storage. Currently, many businesses, from small scale to big companies and industries, are changing their operations to utilize cloud services because cloud platforms could increase company’s growth through process efficiency and reduction in information technology spending [Coles16]. Companies are relying on cloud platforms like Amazon Web Services, Google Compute Engine, and Microsoft Azure, etc., for their business development.

Due to the emergence of new technologies, devices, and communications, the amount of data produced is growing …


Empirical Evaluation Of Cloud Iaas Platforms Using System-Level Benchmarks, Niharika Deval Jan 2017

Empirical Evaluation Of Cloud Iaas Platforms Using System-Level Benchmarks, Niharika Deval

UNF Graduate Theses and Dissertations

Cloud Computing is an emerging paradigm in the field of computing where scalable IT enabled capabilities are delivered ‘as-a-service’ using Internet technology. The Cloud industry adopted three basic types of computing service models based on software level abstraction: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS). Infrastructure-as-a-Service allows customers to outsource fundamental computing resources such as servers, networking, storage, as well as services where the provider owns and manages the entire infrastructure. This allows customers to only pay for the resources they consume. In a fast-growing IaaS market with multiple cloud platforms offering IaaS services, the user's decision on the selection …


Improving Search Ranking Using A Composite Scoring Approach, Larry D. Snedden Jan 2017

Improving Search Ranking Using A Composite Scoring Approach, Larry D. Snedden

UNF Graduate Theses and Dissertations

In this thesis, the improvement to relevance in computerized search results is studied. Information search tools return ranked lists of documents ordered by the relevance of the documents to the user supplied search. Using a small number of words and phrases to represent complex ideas and concepts causes user search queries to be information sparse. This sparsity challenges search tools to locate relevant documents for users. A review of the challenges to information searches helps to identify the problems and offer suggestions in improving current information search tools. Using the suggestions put forth by the Strategic Workshop on Information Retrieval …


Active Analytics: Adapting Web Pages Automatically Based On Analytics Data, William R. Carle Ii Jan 2016

Active Analytics: Adapting Web Pages Automatically Based On Analytics Data, William R. Carle Ii

UNF Graduate Theses and Dissertations

Web designers are expected to perform the difficult task of adapting a site’s design to fit changing usage trends. Web analytics tools give designers a window into website usage patterns, but they must be analyzed and applied to a website's user interface design manually. A framework for marrying live analytics data with user interface design could allow for interfaces that adapt dynamically to usage patterns, with little or no action from the designers. The goal of this research is to create a framework that utilizes web analytics data to automatically update and enhance web user interfaces. In this research, we …


An Empirical Performance Analysis Of Iaas Clouds With Cloudstone Web 2.0 Benchmarking Tool, Neha Soni Jan 2015

An Empirical Performance Analysis Of Iaas Clouds With Cloudstone Web 2.0 Benchmarking Tool, Neha Soni

UNF Graduate Theses and Dissertations

Web 2.0 applications have become ubiquitous over the past few years because they provide useful features such as a rich, responsive graphical user interface that supports interactive and dynamic content. Social networking websites, blogs, auctions, online banking, online shopping and video sharing websites are noteworthy examples of Web 2.0 applications. The market for public cloud service providers is growing rapidly, and cloud providers offer an ever-growing list of services. As a result, developers and researchers find it challenging when deciding which public cloud service to use for deploying, experimenting or testing Web 2.0 applications. This study compares the scalability and …


Empirical Performance Analysis Of High Performance Computing Benchmarks Across Variations In Cloud Computing, Sindhu Mani Jan 2012

Empirical Performance Analysis Of High Performance Computing Benchmarks Across Variations In Cloud Computing, Sindhu Mani

UNF Graduate Theses and Dissertations

High Performance Computing (HPC) applications are data-intensive scientific software requiring significant CPU and data storage capabilities. Researchers have examined the performance of Amazon Elastic Compute Cloud (EC2) environment across several HPC benchmarks; however, an extensive HPC benchmark study and a comparison between Amazon EC2 and Windows Azure (Microsoft’s cloud computing platform), with metrics such as memory bandwidth, Input/Output (I/O) performance, and communication computational performance, are largely absent. The purpose of this study is to perform an exhaustive HPC benchmark comparison on EC2 and Windows Azure platforms.

We implement existing benchmarks to evaluate and analyze performance of two public clouds spanning …


On The Performance Evaluation Of High-Speed Transport Protocols, Bridget Hillyer Jan 2006

On The Performance Evaluation Of High-Speed Transport Protocols, Bridget Hillyer

UNF Graduate Theses and Dissertations

As high-speed networks with large bandwidth delay products (BDP) become more common, high-speed transport protocols must be developed that perform well in these contexts. TCP has limitations in high BDP networks. A number of high-speed TCP proposals have emerged, including BIC TCP, High Speed TCP, and H-TCP. XCP is an intraprotocol communication mechanism that promises even greater performance by providing explicit feedback from routers about congestion. It requires changes to routers and end hosts, though, whereas the other experimental protocols only require changes to an end host. We evaluated the performance ofXCP against BIC TCP, High Speed TCP, H-TCP, and …


Compiling Unit Clauses For The Warren Abstract Machine, George D. Herbert Jan 1987

Compiling Unit Clauses For The Warren Abstract Machine, George D. Herbert

UNF Graduate Theses and Dissertations

This thesis describes the design, development, and installation of a computer program which compiles unit clauses generated in a Prolog-based environment at Argonne National Laboratories into Warren Abstract Machine (WAM) code. The program enhances the capabilities of the environment by providing rapid unification and subsumption tests for the very significant class of unit clauses. This should improve performance substantially for large programs that generate and use many unit clauses.