Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Computer Engineering

Scalable Cognitive Radio Network Testbed In Real Time, Kevin Z. Yu Jun 2021

Scalable Cognitive Radio Network Testbed In Real Time, Kevin Z. Yu

Master's Theses

Modern society places an increasingly high demand on data transmission. Much of that data transmission takes place through communication over the frequency spectrum. The channels on the spectrum are limited resources. Researchers realize that at certain times of day some channels are overloaded, while others are not being fully utilized. A spectrum management system may be beneficial to remedy this efficiency issue. One of the proposed systems, Cognitive Radio Network (CRN), has progressed over the years thanks to studies on a wide range of subjects, including geolocation, data throughput rate, and channel handoff selection algorithm, which provide fundamental support for …


Involuntary Signal-Based Grounding Of Civilian Unmanned Aerial Systems (Uas) In Civilian Airspace, Keith Conley Dec 2019

Involuntary Signal-Based Grounding Of Civilian Unmanned Aerial Systems (Uas) In Civilian Airspace, Keith Conley

Master's Theses

This thesis investigates the involuntary signal-based grounding of civilian unmanned aerial systems (UAS) in unauthorized air spaces. The technique proposed here will forcibly land unauthorized UAS in a given area in such a way that the UAS will not be harmed, and the pilot cannot stop the landing. The technique will not involuntarily ground authorized drones which will be determined prior to the landing. Unauthorized airspaces include military bases, university campuses, areas affected by a natural disaster, and stadiums for public events. This thesis proposes an early prototype of a hardware-based signal based involuntary grounding technique to handle the problem …


Vehicle Pseudonym Association Attack Model, Pierson Yieh Jun 2018

Vehicle Pseudonym Association Attack Model, Pierson Yieh

Master's Theses

With recent advances in technology, Vehicular Ad-hoc Networks (VANETs) have grown in application. One of these areas of application is Vehicle Safety Communication (VSC) technology. VSC technology allows for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that enhance vehicle safety and driving experience. However, these newly developing technologies bring with them a concern for the vehicular privacy of drivers. Vehicles already employ the use of pseudonyms, unique identifiers used with signal messages for a limited period of time, to prevent long term tracking. But can attackers still attack vehicular privacy even when vehicles employ a pseudonym change strategy? The major contribution …


The Design, Building, And Testing Of A Constant On Discreet Jammer For The Ieee 802.15.4/Zigbee Wireless Communication Protocol, Alexandre J. Marette Jun 2018

The Design, Building, And Testing Of A Constant On Discreet Jammer For The Ieee 802.15.4/Zigbee Wireless Communication Protocol, Alexandre J. Marette

Master's Theses

As wireless protocols become easier to implement, more products come with wireless connectivity. This latest push for wireless connectivity has left a gap in the development of the security and the reliability of some protocols. These wireless protocols can be used in the growing field of IoT where wireless sensors are used to share information throughout a network. IoT is being implemented in homes, agriculture, manufactory, and in the medical field. Disrupting a wireless device from proper communication could potentially result in production loss, security issues, and bodily harm. The 802.15.4/ZigBee protocol is used in low power, low data rate, …


Synthetic Aperture Radar: Rapid Detection Of Target Motion In Matlab, Daniel S. Kassen May 2015

Synthetic Aperture Radar: Rapid Detection Of Target Motion In Matlab, Daniel S. Kassen

Master's Theses

Synthetic Aperture Radar (SAR) has come into widespread use in several civilian and military applications. The focus of this paper is the military application of imaging point targets captured by an airborne SAR platform. Using the traditional SAR method of determining target motion by analyzing the difference between subsequent images takes a relatively large amount of processing resources. Using methods in this thesis, target motion can be estimated before even a single image is obtained, reducing the amount of time and power used by a significantly large amount. This thesis builds on work done by Brain Zaharri and David So. …


Active Storage And Ssd Caching In An Object Storage Environment, Michael T. Runde Aug 2012

Active Storage And Ssd Caching In An Object Storage Environment, Michael T. Runde

Master's Theses

The advancing performance and lowering costs required to implement additional processing power on system peripherals such as disk drives are increasingly allowing additional computing ability to be located directly on individual drives. Active Storage attempts to take advantage of this excess by moving some computationally intensive applications directly to the disk drives. This can remove the bottlenecks seen through interconnects between the drives and the CPU of an initiating system as well as remove the need for systems to handle these applications.

The contributions of this thesis are in two areas. The first is the development of a framework designed …


Computational Modeling For Transportation Network Security, Sherif A. Tolba Dec 2011

Computational Modeling For Transportation Network Security, Sherif A. Tolba

Master's Theses

No abstract provided.