Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (168)
- Air Force Institute of Technology (160)
- Old Dominion University (141)
- California State University, San Bernardino (137)
- California Polytechnic State University, San Luis Obispo (126)
-
- Singapore Management University (112)
- University of Nebraska - Lincoln (69)
- Technological University Dublin (60)
- University of Pennsylvania Carey Law School (54)
- New Jersey Institute of Technology (53)
- University for Business and Technology in Kosovo (51)
- Purdue University (43)
- University of Arkansas, Fayetteville (43)
- University of Kentucky (42)
- SelectedWorks (38)
- Edith Cowan University (35)
- Embry-Riddle Aeronautical University (35)
- Portland State University (32)
- University of Massachusetts Amherst (29)
- Western University (29)
- University of New Mexico (28)
- Institute of Business Administration (26)
- Association of Arab Universities (24)
- The University of Akron (24)
- University of Nevada, Las Vegas (24)
- Florida International University (23)
- Kennesaw State University (23)
- University of Tennessee, Knoxville (17)
- Cleveland State University (15)
- University of Georgia School of Law (15)
- Keyword
-
- Security (52)
- Internet (42)
- Computer networks (41)
- Cybersecurity (36)
- Internet of Things (33)
-
- Machine learning (33)
- Computerized Conferencing & Communications Center (31)
- IoT (31)
- Blockchain (27)
- Privacy (27)
- #antcenter (25)
- Wireless communication systems (24)
- Networking (23)
- Wireless sensor networks (23)
- Routing (22)
- Deep Learning (19)
- Digital libraries (19)
- Machine Learning (18)
- Technology (18)
- Android (17)
- Communication (17)
- Computer networks--Security measures (17)
- Wireless (16)
- Cloud computing (15)
- Deep learning (15)
- Social media (15)
- Authentication (14)
- Wireless Networks (14)
- Algorithms (13)
- Automation (13)
- Publication Year
- Publication
-
- Theses and Dissertations (165)
- Journal of International Technology and Information Management (115)
- Research Collection School Of Computing and Information Systems (97)
- Computer Engineering (56)
- All Faculty Scholarship (54)
-
- Faculty Publications (51)
- Computer Science Faculty Publications (41)
- UBT International Conference (38)
- Theses (36)
- Computerized Conferencing and Communications Center Reports (33)
- Computer Science Theses & Dissertations (32)
- Master's Theses (31)
- Electronic Thesis and Dissertation Repository (26)
- Patrick Tague (26)
- Conference papers (25)
- International Conference on Information and Communication Technologies (24)
- Williams Honors College, Honors Research Projects (24)
- FIU Electronic Theses and Dissertations (22)
- Library Philosophy and Practice (e-journal) (22)
- Electrical and Computer Engineering Faculty Publications (21)
- Hong-Ning Dai (21)
- Doctoral Dissertations (20)
- Graduate Theses and Dissertations (20)
- Computer Science and Software Engineering (18)
- Theses Digitization Project (18)
- Articles (17)
- Cybersecurity Undergraduate Research Showcase (17)
- Applied Mathematics & Information Sciences (16)
- Branch Mathematics and Statistics Faculty and Staff Publications (16)
- Computer Science Faculty Publications and Presentations (16)
- Publication Type
Articles 31 - 60 of 2125
Full-Text Articles in Computer Engineering
Workshop On Data For Ai In Network Systems - Event Summary, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich
Workshop On Data For Ai In Network Systems - Event Summary, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich
Workshop on Data for AI in Network Systems
No abstract provided.
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Journal of Cybersecurity Education, Research and Practice
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …
Smart Service Function Chain System For Dynamic Traffic Steering Using Reinforcement Learning (Chrl), Ahmed Nadhum, Ahmed Al-Saadi
Smart Service Function Chain System For Dynamic Traffic Steering Using Reinforcement Learning (Chrl), Ahmed Nadhum, Ahmed Al-Saadi
Karbala International Journal of Modern Science
The rapid development of the Internet and network services coupled with the growth of communication infrastructure necessitates the employment of intelligent systems. The complexity of the network is heightened by these systems, as they offer diverse services contingent on traffic type, user needs, and security considerations. In this context, a service function chain offers a toolkit to facilitate the management of intricate network systems. However, various traffic types require dynamic adaptation in the sets of function chains. The problem of optimizing the order of service functions in the chain must be solved using the proposed approach, along with balancing the …
Enabling Intelligent Network Management Through Multi-Agent Systems: An Implementation Of Autonomous Network System, Petro Mushidi Tshakwanda
Enabling Intelligent Network Management Through Multi-Agent Systems: An Implementation Of Autonomous Network System, Petro Mushidi Tshakwanda
Electrical and Computer Engineering ETDs
This Ph.D. dissertation presents a pioneering Multi-Agent System (MAS) approach for intelligent network management, particularly suited for next-generation networks like 5G and 6G. The thesis is segmented into four critical parts. Firstly, it contrasts the benefits of agent-based design over traditional micro-service architectures. Secondly, it elaborates on the implementation of network service agents in Python Agent Development Environment (PADE), employing machine learning and deep learning algorithms for performance evaluation. Thirdly, a new scalable approach, Scalable and Efficient DevOps (SE-DO), is introduced to optimize agent performance in resource-constrained settings. Fourthly, the dissertation delves into Quality of Service (QoS) and Radio Resource …
Designing Tomorrow's Reality: The Development And Validation Of An Augmented And Mixed Reality Heuristic Checklist, Jessyca Derby
Designing Tomorrow's Reality: The Development And Validation Of An Augmented And Mixed Reality Heuristic Checklist, Jessyca Derby
Doctoral Dissertations and Master's Theses
Augmented (AR) and Mixed Reality (MR) are new and currently developing technologies. They have been used and shown promise and popularity in the domains of education, training, enterprise, retail, consumer products, and more. However, there is a lack of consistency and standards in AR and MR devices and applications. Interactions and standards in one application may drastically differ from another. This may make it difficult for users, especially those new to these technologies, to learn and feel comfortable using the devices or applications. It may also hinder the usability of the applications as designers may not follow proven techniques to …
A Novel Approach For Enhancing Routing In Wireless Sensor Networks Using Aco Algorithm, Sihem Goumiri, Maohamed Amine Riahla, M'Hamed Hamadouche
A Novel Approach For Enhancing Routing In Wireless Sensor Networks Using Aco Algorithm, Sihem Goumiri, Maohamed Amine Riahla, M'Hamed Hamadouche
Emirates Journal for Engineering Research
Wireless Sensors Network (WSN) is an emergent technology that aims to offer innovative capacities. In the last decade, the use of these networks increased in various fields like military, science, and health due to their fast and inexpressive deployment and installation. However, the limited sensor battery lifetime poses many technical challenges and affects essential services like routing. This issue is a hot topic of search, many researchers have proposed various routing protocols aimed at reducing the energy consumption in WSNs. The focus of this work is to investigate the effectiveness of integrating ACO algorithm with routing protocols in WSNs. Moreover, …
Forecasting Economic Growth And Movements With Wavelet Transform And Arima Model, Omar Alsinglawi, Omar Alsinglawi, Mohammad Aladwan, Mohammad Aladwan, Saddam Alwadi, Saddam Alwadi
Forecasting Economic Growth And Movements With Wavelet Transform And Arima Model, Omar Alsinglawi, Omar Alsinglawi, Mohammad Aladwan, Mohammad Aladwan, Saddam Alwadi, Saddam Alwadi
Applied Mathematics & Information Sciences
This study uses historical data and modern statistical models to forecast future Gross Domestic Product (GDP) in Jordan. The Wavelet Transformation model (WT) and Autoregressive Integrated Moving Average (ARIMA) model were applied to the time series data and yielded a best-fitting result of (2,1,1) for estimating GDP between 2022-2031. The study concludes that GDP is expected to increase with a positive growth rate of around 3.22%, and recommends government agencies to monitor GDP, strengthen existing policies, and adopt necessary economic reforms to support growth. Additionally, the private sector is encouraged to enhance production tools to achieve economic growth that benefits …
Neutrosophic Adaptive Lsb And Deep Learning Hybrid Framework For Ecg Signal Classification, Abdallah Rezk, Ahmed S. Sakr, H. M. Abdulkader
Neutrosophic Adaptive Lsb And Deep Learning Hybrid Framework For Ecg Signal Classification, Abdallah Rezk, Ahmed S. Sakr, H. M. Abdulkader
Applied Mathematics & Information Sciences
This paper proposes a novel hybrid framework for ECG signal classification and privacy preservation. The framework includes two phases: the first phase uses LSTM+CNN with attention gate for ECG classification, while the second phase utilizes adaptive least signal bit with neutrosophic for hiding important data during transmission. The proposed framework converts data into three sets of degrees (true, false, and intermediate) using neutrosophic and passes them to an embedding layer. In the sender part, the framework hides important data in ECG signal as true and false degrees, using the intermediate set as a shared dynamic key between sender and receiver. …
Compatibility Of Clique Clustering Algorithm With Dimensionality Reduction, Ug ̆Ur Madran, Duygu Soyog ̆Lu
Compatibility Of Clique Clustering Algorithm With Dimensionality Reduction, Ug ̆Ur Madran, Duygu Soyog ̆Lu
Applied Mathematics & Information Sciences
In our previous work, we introduced a clustering algorithm based on clique formation. Cliques, the obtained clusters, are constructed by choosing the most dense complete subgraphs by using similarity values between instances. The clique algorithm successfully reduces the number of instances in a data set without substantially changing the accuracy rate. In this current work, we focused on reducing the number of features. For this purpose, the effect of the clique clustering algorithm on dimensionality reduction has been analyzed. We propose a novel algorithm for support vector machine classification by combining these two techniques and applying different strategies by differentiating …
The Influence Of Supply Chain Management Strategies On Organizational Performance In Hospitality Industry, Omar Jawabreh, Abdullah Mahfoud Baadhem, Basel J. A. Ali, Anas Ahmad Bani Atta, Anis Ali, Fahmi Fadhl Al- Hosaini
The Influence Of Supply Chain Management Strategies On Organizational Performance In Hospitality Industry, Omar Jawabreh, Abdullah Mahfoud Baadhem, Basel J. A. Ali, Anas Ahmad Bani Atta, Anis Ali, Fahmi Fadhl Al- Hosaini
Applied Mathematics & Information Sciences
The studys primary goal is to analyze the connection between SCM practices and organizational performance, and it also aims to evaluate the moderating role of management type. Quantitative data collected from Jordans hotel and restaurant workers via questionnaire. Structural equation modeling is used to examine the hypothesized relationships. Organizational Performance is positively impacted by effective information sharing. Information Quality (IQ) positively affects Organizational Performance (OP), and Strategic Supplier Partnerships (SSP) play a crucial role. Customer Relationship Management (CRM) had no discernible effect on OP, according to the study. OP is positively impacted by Postponement (POS) techniques. When implemented, postponement increases …
The Effect Of System Quality And User Quality Of Information Technology On Internal Audit Effectiveness In Jordan, And The Moderating Effect Of Management Support, Ahmad Yahiya Ahmad Bani Ahmad (Ayassrah), Anas Ahmad Mahmoud Bani Atta, Hanan Ali Alawawdeh, Nawaf Abdallah Aljundi, Amer Morshed, Saleh Amin Dahbour
The Effect Of System Quality And User Quality Of Information Technology On Internal Audit Effectiveness In Jordan, And The Moderating Effect Of Management Support, Ahmad Yahiya Ahmad Bani Ahmad (Ayassrah), Anas Ahmad Mahmoud Bani Atta, Hanan Ali Alawawdeh, Nawaf Abdallah Aljundi, Amer Morshed, Saleh Amin Dahbour
Applied Mathematics & Information Sciences
The goal of this study is to ascertain the moderating role that management support has in internal audit effectiveness in Jordan, as well as the impact of system quality and user quality of information technology. There were 172 responders in all, and they were split across Jordanian auditors. In the data analysis process, the quantitative analysis test— which consists of the validity test, reliability test, test of conventional assumptions, and hypothesis test—is applied. Information technology system and user quality are independent variables in this study. The dependent variable in this study is internal audit effectiveness, and the moderating variable is …
Optimal Control Analysis Of The Dynamics Of Covid-19 With Application To Ethiopian Data, Temesgen Duresa Keno, Fekadu Mosisa Legesse, Ebisa Olana Bajira
Optimal Control Analysis Of The Dynamics Of Covid-19 With Application To Ethiopian Data, Temesgen Duresa Keno, Fekadu Mosisa Legesse, Ebisa Olana Bajira
Applied Mathematics & Information Sciences
In this paper, we proposed an optimal control of the COVID-19 transmission dynamics. First, we investigated system features such as solution boundedness, positivity, disease-free and endemic equilibrium, and the local and global stability of equilibrium points. Besides, a disease-free equilibrium point is globally asymptotically stable if the basic reproduction number is less than one, and an endemic equilibrium point exists otherwise. Secondly, we have shown the sensitivity analysis of the basic reproduction number. Also the model is then fitted using COVID-19 infected reported in Ethiopia from February 1,2023 to March 2,2023. The values of model parameters are then estimated from …
Nexus Between Intellectual Capital And Financial Performance Sustainability: Evidence From Listed Jordanian Firms, Ali M. Alrabei, Leqaa N. Al-Othman, Thaer A. Abutaber, Mustafa S. Alathamneh, Tareq M. Almomani, Mohammed H. Qeshta
Nexus Between Intellectual Capital And Financial Performance Sustainability: Evidence From Listed Jordanian Firms, Ali M. Alrabei, Leqaa N. Al-Othman, Thaer A. Abutaber, Mustafa S. Alathamneh, Tareq M. Almomani, Mohammed H. Qeshta
Applied Mathematics & Information Sciences
Purpose: The authors observe the effect of exploring the reality of Intellectual Capital (IC) and its impact on the financial performance of Jordanian industrial firms in Amman Stock Exchange. This empirical research explores the effect of intellectual capital on financial performance using data from 36 Jordanian industrial firms listed in Amman Stock Exchange for the period 2016-2020. The Value-Added Intellectual coefficient (VAIC) was adopted to measure the intellectual capital, while the return on assets (ROA), return on equity (ROE), and earnings per share (EPS) were adopted as measures of the companys financial performance. The effect of IC was tested by …
Assessing The Moderating Effect Of Innovation On The Relationship Between Information Technology And Supply Chain Management: An Empirical Examination, Heba Hatamlah, Mahmoud Allahham, Ibrahim A. Abu-Alsondos, Alaa S. Mushtaha, Ghadeer M. Al-Anati, Mustafa Al-Shaikh
Assessing The Moderating Effect Of Innovation On The Relationship Between Information Technology And Supply Chain Management: An Empirical Examination, Heba Hatamlah, Mahmoud Allahham, Ibrahim A. Abu-Alsondos, Alaa S. Mushtaha, Ghadeer M. Al-Anati, Mustafa Al-Shaikh
Applied Mathematics & Information Sciences
This study examines how innovation (INN) influences the relationship between supply chain management and information technology in Jordan. 211 employees of Jordanian industrial enterprises who work in the Operations Department provided information for the study, which examines this subject. The findings indicate a close connection between information technology and supply chain management. Innovation also dramatically modifies the interaction between supply chain management and information technology. Management help may be the subject of future research.
The Role Of Business Intelligence Adoption As A Mediator Of Big Data Analytics In The Management Of Outsourced Reverse Supply Chain Operations, Heba Hatamlah, Mahmoud Allahham, Ibrahim A. Abu-Alsondos, Alaa Al-Junaidi, Ghadeer M. Al-Anati, Mustafa Al-Shaikh
The Role Of Business Intelligence Adoption As A Mediator Of Big Data Analytics In The Management Of Outsourced Reverse Supply Chain Operations, Heba Hatamlah, Mahmoud Allahham, Ibrahim A. Abu-Alsondos, Alaa Al-Junaidi, Ghadeer M. Al-Anati, Mustafa Al-Shaikh
Applied Mathematics & Information Sciences
The fluctuating and disorganized state of todays global markets is the result of several factors. COVID-19 is an illustration. Supply chain managers should re-evaluate their competitive strategy and leverage big data analytics in light of the rising volatility in demand and supply, rivalry among supply chain partners, and the requirement to deliver tailored goods and services (BDA). Supply chain firms require sophisticated BDA processes and procedures to provide useful insights from big data to better decision-making and supply chain operations, as many leaders in the sector have acknowledged the necessity for improving with data" (SCO). This research gives theoretical justification …
The Artificial Intelligence As A Decision-Making Instrument For Modeling And Predicting Small Cities’ Attractiveness: Evidence From Morocco, Sohaib Khalid, Driss Effina, Khaoula Rihab Khalid, Mohamed Salem Chaabane
The Artificial Intelligence As A Decision-Making Instrument For Modeling And Predicting Small Cities’ Attractiveness: Evidence From Morocco, Sohaib Khalid, Driss Effina, Khaoula Rihab Khalid, Mohamed Salem Chaabane
Applied Mathematics & Information Sciences
This study analyzes residential attractiveness in small Moroccan cities using statistical models. Net migration rates are commonly used to assess attractiveness. The study estimated net migration rates for each city and employed a structural econometric model with logistic regression to identify influential variables that affect the net migration rate. These variables were then used in a predictive model with an artificial neural network algorithm. The logistic model revealed insights, highlighting the complexity of residential attractiveness influenced by factors like job supply, accessibility, and housing conditions. The artificial neural network model provided accurate predictions (over 80%), aiding policymakers in decision-making and …
Improving The Performance Of A Series-Parallel System Based On Lindley Distribution, Abdelfattah Mustafa, M. I. Khan, Maher. A. Alraddadi
Improving The Performance Of A Series-Parallel System Based On Lindley Distribution, Abdelfattah Mustafa, M. I. Khan, Maher. A. Alraddadi
Applied Mathematics & Information Sciences
In this article, the performance of a series-parallel system is improved. The system components are assumed to follows independently and identically Lindley distributed with three parameters. The system reliability for the given system will be improved by using reduction method, hot, cold and imperfect duplication method. Some reliability measures are derived. Two types of reliability equivalence factors and gamma fractiles are calculated. A numerical example is introduced to explain the theoretical results.
Quantization Of Fractional Constrained Systems With Wkb Approximation, Ola A. Jarabah
Quantization Of Fractional Constrained Systems With Wkb Approximation, Ola A. Jarabah
Applied Mathematics & Information Sciences
In this paper the constrained systems with two primary first class constraints are studied using fractional Lagrangian, after that we find the fractional Hamiltonian and the corresponding Hamilton Jacobi equation. Using separation of variables technique, we can find the action function S this function helps us to formulate the wave function which describe the behavior of our systems also from the action function S we can find the equations of motion and the corresponding momenta in fractional form. This work is illustrated using one example.
Applications Of The Ara-Residual Power Series Technique To Physical Phenomena, Aliaa Burqan
Applications Of The Ara-Residual Power Series Technique To Physical Phenomena, Aliaa Burqan
Applied Mathematics & Information Sciences
In this paper, a new analytical method called the ARA-Residual power series method (ARA- RPSM) is implemented to solve some fractional physical equations. The methodology of the proposed method based on applying the ARA-transform to the given fractional differential equations, followed by the creation of approximate series solutions using Taylor’s expansion. Then the series solution is transformed using the inverse of the ARA-transform to get the solution in the original space. Accuracy, effectiveness, and validity of the suggested method are demonstrated through the discussion of three attractive applications. The solution obtained using ARA-RPSM demonstrates good agreement when compared to the …
Generalization Of Renyi’S Entropy And Its Application In Source Coding, Ashiq Hussain Bhat, Niyamat Ali Siddiqui, Ismail A Mageed, Shawkat Alkhazaleh, Vidyanand Rabi Das, M. A. K Baig
Generalization Of Renyi’S Entropy And Its Application In Source Coding, Ashiq Hussain Bhat, Niyamat Ali Siddiqui, Ismail A Mageed, Shawkat Alkhazaleh, Vidyanand Rabi Das, M. A. K Baig
Applied Mathematics & Information Sciences
In this paper, we introduce a new generalization of Renyis entropy β(P) and the most important feature of this generalized entropy Rαβ (P) is that it derives most important entropies that are well known and influence information theory and applied mathematics. Some significant properties of Rαβ (P) has been undertaken in this article. In addition, we introduce a new generalized exponentiated mean codeword length Lβα (P) in this article then determine how Rβα (P) and Lβα (P) are related in terms of source coding theorem.
Toward Building An Intelligent And Secure Network: An Internet Traffic Forecasting Perspective, Sajal Saha
Toward Building An Intelligent And Secure Network: An Internet Traffic Forecasting Perspective, Sajal Saha
Electronic Thesis and Dissertation Repository
Internet traffic forecast is a crucial component for the proactive management of self-organizing networks (SON) to ensure better Quality of Service (QoS) and Quality of Experience (QoE). Given the volatile and random nature of traffic data, this forecasting influences strategic development and investment decisions in the Internet Service Provider (ISP) industry. Modern machine learning algorithms have shown potential in dealing with complex Internet traffic prediction tasks, yet challenges persist. This thesis systematically explores these issues over five empirical studies conducted in the past three years, focusing on four key research questions: How do outlier data samples impact prediction accuracy for …
Watch: A Distributed Clock Time Offset Estimation Tool On The Platform For Open Wireless Data-Driven Experimental Research, Cassie Jeng
McKelvey School of Engineering Theses & Dissertations
The synchronization of the clocks used at different devices across space is of critical importance in wireless communications networks. Each device’s local clock differs slightly, affecting the times at which packets are transmitted from different nodes in the network. This thesis provides experimentation and software development on POWDER, the Platform for Open, Wireless Data-driven Experimental Research, an open wireless testbed across the University of Utah campus. We build upon Shout, a suite of Python scripts that allow devices to iteratively transmit and receive with each other and save the collected data. We introduce WATCH, an experimental method to estimate clock …
Classification Of Ddos Attack With Machine Learning Architectures And Exploratory Analysis, Amreen Anbar
Classification Of Ddos Attack With Machine Learning Architectures And Exploratory Analysis, Amreen Anbar
Electronic Thesis and Dissertation Repository
The ever-increasing frequency of occurrence and sophistication of DDoS attacks pose a serious threat to network security. Accurate classification of DDoS attacks with efficiency is crucial in order to develop effective defense mechanisms. In this thesis, we propose a novel approach for DDoS classification using the CatBoost algorithm, on CICDDoS2019, a benchmark dataset containing 12 variations of DDoS attacks and legitimate traffic using real-world traffic traces. With a developed ensemble feature selection method and feature engineering, our model proves to be a good fit for DDoS attack type prediction. Our experimental results demonstrate that our proposed approach achieves high classification …
Graph Modeling For Openflow Switch Monitoring, Ali Malik, Ruairí De Fréin
Graph Modeling For Openflow Switch Monitoring, Ali Malik, Ruairí De Fréin
Articles
Network monitoring allows network administrators to facilitate network activities and to resolve issues in a timely fashion. Monitoring techniques in software-defined networks are either (i) active, where probing packets are sent periodically, or (ii) passive, where traffic statistics are collected from the network forwarding elements. The centralized nature of software-defined networking implies the implementation of monitoring techniques imposes additional overhead on the network controller. We propose Graph Modeling for OpenFlow Switch Monitoring (GMSM), which is a lightweight monitoring technique. GMSM constructs a flow-graph overview using two types of asynchronous OpenFlow messages: packet-in and flow-removed, which improve monitoring and decision making. …
Transforming Large-Scale Virtualized Networks: Advancements In Latency Reduction, Availability Enhancement, And Security Fortification, Ibrahim Tamim
Transforming Large-Scale Virtualized Networks: Advancements In Latency Reduction, Availability Enhancement, And Security Fortification, Ibrahim Tamim
Electronic Thesis and Dissertation Repository
In today’s digital age, the increasing demand for networks, driven by the proliferation of connected devices, data-intensive applications, and transformative technologies, necessitates robust and efficient network infrastructure. This thesis addresses the challenges posed by virtualization in 5G networking and focuses on enhancing next-generation Radio Access Networks (RANs), particularly Open-RAN (O-RAN). The objective is to transform virtualized networks into highly reliable, secure, and latency-aware systems. To achieve this, the thesis proposes novel strategies for virtual function placement, traffic steering, and virtual function security within O-RAN. These solutions utilize optimization techniques such as binary integer programming, mixed integer binary programming, column generation, …
Design And Analysis Of Content Caching Systems, Anirudh Sabnis
Design And Analysis Of Content Caching Systems, Anirudh Sabnis
Doctoral Dissertations
Caching is a simple yet powerful technique that has had a significant impact on improving the performance of various computer systems. From internet content delivery to CPUs, domain name systems, and database systems, caching has played a pivotal role in making these systems faster and more efficient. The basic idea behind caching is to store frequently accessed data locally, so that future requests for that data can be served more quickly. For example, a Content Delivery Network (CDN) like Akamai deploys thousands of edge caches across the globe, so that end-user requests can be served from a nearby cache, rather …
Generalizable Deep-Learning-Based Wireless Indoor Localization, Ali Owfi
Generalizable Deep-Learning-Based Wireless Indoor Localization, Ali Owfi
All Theses
The growing interest in indoor localization has been driven by its wide range of applications in areas such as smart homes, industrial automation, and healthcare. With the increasing reliance on wireless devices for location-based services, accurate estimation of device positions within indoor environments has become crucial. Deep learning approaches have shown promise in leveraging wireless parameters like Channel State Information (CSI) and Received Signal Strength Indicator (RSSI) to achieve precise localization. However, despite their success in achieving high accuracy, these deep learning models suffer from limited generalizability, making them unsuitable for deployment in new or dynamic environments without retraining. To …
A Study Of 5g Cellular Connectivity To Unmanned Aerial Vehicles, Jackson Murrin
A Study Of 5g Cellular Connectivity To Unmanned Aerial Vehicles, Jackson Murrin
All Theses
The market of unmanned aerial vehicles (UAVs) has seen significant growth in the past ten years on both the commercial and military sides. The applications for UAVs are endless and options by manufacturers allow users to modify their drones for their specific goals. This industry has opened up the excitement of piloting vehicles in the air, photography, videography, exploration of nature from a different point of view and many other hobbies assisted by the emergence of UAVs. The growth of this industry coincides with the roll out of new 5G cellular network technology. This upgrade in cellular network infrastructure allows …
Context-Aware Event Forecasting Via Graph Disentanglement, Yunshan Ma, Chenchen Ye, Zijian Wu, Xiang Wang, Yixin Cao, Tat-Seng Chua
Context-Aware Event Forecasting Via Graph Disentanglement, Yunshan Ma, Chenchen Ye, Zijian Wu, Xiang Wang, Yixin Cao, Tat-Seng Chua
Research Collection School Of Computing and Information Systems
Event forecasting has been a demanding and challenging task throughout the entire human history. It plays a pivotal role in crisis alarming and disaster prevention in various aspects of the whole society. The task of event forecasting aims to model the relational and temporal patterns based on historical events and makes forecasting to what will happen in the future. Most existing studies on event forecasting formulate it as a problem of link prediction on temporal event graphs. However, such pure structured formulation suffers from two main limitations: 1) most events fall into general and high-level types in the event ontology, …
Designing Intelligent Energy Efficient Scheduling Algorithm To Support Massive Iot Communication In Lora Networks, Jui Mhatre
Master of Science in Computer Science Theses
We are about to enter a new world with sixth sense ability – “Network as a sensor -6G”. The driving force behind digital sensing abilities is IoT. Due to their capacity to work in high frequency, 6G devices have voracious energy demand. Hence there is a growing need to work on green solutions to support the underlying 6G network by making it more energy efficient. Low cost, low energy, and long-range communication capability make LoRa the most adopted and promising network for IoT devices. Since LoRaWAN uses ALOHA for multi-access of channels, collision management is an important task. Moreover, in …