Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Computer Engineering

Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi Dec 2016

Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi

UNLV Theses, Dissertations, Professional Papers, and Capstones

Securing IoT (Internet of Things) systems in general, regardless of the communication technology used, has been the concern of many researchers and private companies. As for ZigBee security concerns, much research and many experiments have been conducted to better predict the nature of potential security threats. In this research we are addressing several ZigBee vulnerabilities by performing first hand experiments and attack simulations on ZigBee protocol. This will allow us to better understand the security issues surveyed and find ways to mitigate them. Based on the attack simulations performed and the survey conducted, we have developed a ZigBee IoT framework …


Efficient Algorithms For Clustering Polygonal Obstacles, Sabbir Kumar Manandhar May 2016

Efficient Algorithms For Clustering Polygonal Obstacles, Sabbir Kumar Manandhar

UNLV Theses, Dissertations, Professional Papers, and Capstones

Clustering a set of points in Euclidean space is a well-known problem having applications in pattern recognition, document image analysis, big-data analytics, and robotics. While there are a lot of research publications for clustering point objects, only a few articles have been reported for clustering a given distribution of obstacles. In this thesis we examine the development of efficient algorithms for clustering a given set of convex obstacles in the 2D plane. One of the methods presented in this work uses a Voronoi diagram to extract obstacle clusters. We also consider the implementation issues of point/obstacle clustering algorithms.


Mcnp6 Computational-Based Sensitivity Propagation Analysis Of Continuous Neutron Cross-Sections Using The Godiva (Hmf-001) And The Godiver (Hmf-004) Benchmark Criticality Study Cases, Lawrence James Lakeotes May 2016

Mcnp6 Computational-Based Sensitivity Propagation Analysis Of Continuous Neutron Cross-Sections Using The Godiva (Hmf-001) And The Godiver (Hmf-004) Benchmark Criticality Study Cases, Lawrence James Lakeotes

UNLV Theses, Dissertations, Professional Papers, and Capstones

There has been a reduction in funding for theoretical and applied research for improving the nation's database of continuous neutron cross-sections at BNL-NNDC. From 1940 through the late 1980s, research and applied development produced volumes of reliable neutron continuous cross-sections for many isotopes. Currently, the cross-section work has been mainly computational. The focus of this research is mainly centered on the requirements for improving thermal cross-sections to support reactor operations and fuel storage. The research efforts will also helpfully aid in the fast fission spectrum in order to support fast reactor designs for improving safety analysis and feedback coefficients.

This …