Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Software Defined Radio (2)
- Active storage (1)
- Caching (1)
- Communication (1)
- DSRC. WiFi (1)
-
- Digital Image Processing (1)
- Digital Signal Synthesizer (1)
- Drones (1)
- Filesystem (1)
- IEEE 802.15.4 (1)
- Jammer (1)
- Location Privacy (1)
- Matlab (1)
- Modeling and Simulation (1)
- OSD (1)
- Physical Implementation (1)
- Prototyping (1)
- Pseudonym (1)
- Radar (1)
- Regional Area Network (1)
- Risk Analysis (1)
- Robotics (1)
- SAR (1)
- Sensor Deployment (1)
- Signal Processign (1)
- Spectrum Management (1)
- Ssd (1)
- Testbed (1)
- Transportation Network Security (1)
- UAS (1)
Articles 1 - 7 of 7
Full-Text Articles in Computer Engineering
Scalable Cognitive Radio Network Testbed In Real Time, Kevin Z. Yu
Scalable Cognitive Radio Network Testbed In Real Time, Kevin Z. Yu
Master's Theses
Modern society places an increasingly high demand on data transmission. Much of that data transmission takes place through communication over the frequency spectrum. The channels on the spectrum are limited resources. Researchers realize that at certain times of day some channels are overloaded, while others are not being fully utilized. A spectrum management system may be beneficial to remedy this efficiency issue. One of the proposed systems, Cognitive Radio Network (CRN), has progressed over the years thanks to studies on a wide range of subjects, including geolocation, data throughput rate, and channel handoff selection algorithm, which provide fundamental support for …
Involuntary Signal-Based Grounding Of Civilian Unmanned Aerial Systems (Uas) In Civilian Airspace, Keith Conley
Involuntary Signal-Based Grounding Of Civilian Unmanned Aerial Systems (Uas) In Civilian Airspace, Keith Conley
Master's Theses
This thesis investigates the involuntary signal-based grounding of civilian unmanned aerial systems (UAS) in unauthorized air spaces. The technique proposed here will forcibly land unauthorized UAS in a given area in such a way that the UAS will not be harmed, and the pilot cannot stop the landing. The technique will not involuntarily ground authorized drones which will be determined prior to the landing. Unauthorized airspaces include military bases, university campuses, areas affected by a natural disaster, and stadiums for public events. This thesis proposes an early prototype of a hardware-based signal based involuntary grounding technique to handle the problem …
Vehicle Pseudonym Association Attack Model, Pierson Yieh
Vehicle Pseudonym Association Attack Model, Pierson Yieh
Master's Theses
With recent advances in technology, Vehicular Ad-hoc Networks (VANETs) have grown in application. One of these areas of application is Vehicle Safety Communication (VSC) technology. VSC technology allows for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that enhance vehicle safety and driving experience. However, these newly developing technologies bring with them a concern for the vehicular privacy of drivers. Vehicles already employ the use of pseudonyms, unique identifiers used with signal messages for a limited period of time, to prevent long term tracking. But can attackers still attack vehicular privacy even when vehicles employ a pseudonym change strategy? The major contribution …
The Design, Building, And Testing Of A Constant On Discreet Jammer For The Ieee 802.15.4/Zigbee Wireless Communication Protocol, Alexandre J. Marette
The Design, Building, And Testing Of A Constant On Discreet Jammer For The Ieee 802.15.4/Zigbee Wireless Communication Protocol, Alexandre J. Marette
Master's Theses
As wireless protocols become easier to implement, more products come with wireless connectivity. This latest push for wireless connectivity has left a gap in the development of the security and the reliability of some protocols. These wireless protocols can be used in the growing field of IoT where wireless sensors are used to share information throughout a network. IoT is being implemented in homes, agriculture, manufactory, and in the medical field. Disrupting a wireless device from proper communication could potentially result in production loss, security issues, and bodily harm. The 802.15.4/ZigBee protocol is used in low power, low data rate, …
Synthetic Aperture Radar: Rapid Detection Of Target Motion In Matlab, Daniel S. Kassen
Synthetic Aperture Radar: Rapid Detection Of Target Motion In Matlab, Daniel S. Kassen
Master's Theses
Synthetic Aperture Radar (SAR) has come into widespread use in several civilian and military applications. The focus of this paper is the military application of imaging point targets captured by an airborne SAR platform. Using the traditional SAR method of determining target motion by analyzing the difference between subsequent images takes a relatively large amount of processing resources. Using methods in this thesis, target motion can be estimated before even a single image is obtained, reducing the amount of time and power used by a significantly large amount. This thesis builds on work done by Brain Zaharri and David So. …
Active Storage And Ssd Caching In An Object Storage Environment, Michael T. Runde
Active Storage And Ssd Caching In An Object Storage Environment, Michael T. Runde
Master's Theses
The advancing performance and lowering costs required to implement additional processing power on system peripherals such as disk drives are increasingly allowing additional computing ability to be located directly on individual drives. Active Storage attempts to take advantage of this excess by moving some computationally intensive applications directly to the disk drives. This can remove the bottlenecks seen through interconnects between the drives and the CPU of an initiating system as well as remove the need for systems to handle these applications.
The contributions of this thesis are in two areas. The first is the development of a framework designed …
Computational Modeling For Transportation Network Security, Sherif A. Tolba
Computational Modeling For Transportation Network Security, Sherif A. Tolba
Master's Theses
No abstract provided.