Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Systems and Communications

Theses/Dissertations

#antcenter

Publication Year

Articles 1 - 3 of 3

Full-Text Articles in Computer Engineering

Routing Uavs To Co-Optimize Mission Effectiveness And Network Performance With Dynamic Programming, Spenser D. Lee Mar 2011

Routing Uavs To Co-Optimize Mission Effectiveness And Network Performance With Dynamic Programming, Spenser D. Lee

Theses and Dissertations

In support of the Air Force Research Laboratory's (AFRL) vision of the layered sensing operations center, command and control intelligence surveillance and reconnaissance (C2ISR) more focus must be placed on architectures that support information systems, rather than just the information systems themselves. By extending the role of UAVs beyond simply intelligence, surveillance, and reconnaissance (ISR) operations and into a dual-role with networking operations we can better utilize our information assets. To achieve the goal of dual-role UAVs, a concrete approach to planning must be taken. This research defines a mathematical model and a non-trivial deterministic algorithmic approach to determining UAV …


Using A Multiobjective Approach To Balance Mission And Network Goals Within A Delay Tolerant Network Topology, Anthony L. Larweck Mar 2009

Using A Multiobjective Approach To Balance Mission And Network Goals Within A Delay Tolerant Network Topology, Anthony L. Larweck

Theses and Dissertations

This thesis investigates how to incorporate aspects of an Air Tasking Order (ATO), a Communications Tasking Order (CTO), and a Network Tasking Order (NTO) within a cognitive network framework. This was done in an effort to aid the commander and or network operator by providing automation for battlespace management to improve response time and potential inconsistent problem resolution. In particular, autonomous weapon systems such as unmanned aerial vehicles (UAVs) were the focus of this research This work implemented a simple cognitive process by incorporating aspects of behavior based robotic control principles to solve the multi-objective optimization problem of balancing both …


The Evaluation Of Rekeying Protocols Within The Hubenko Architecture As Applied To Wireless Sensor Networks, Cory J. Antosh Mar 2009

The Evaluation Of Rekeying Protocols Within The Hubenko Architecture As Applied To Wireless Sensor Networks, Cory J. Antosh

Theses and Dissertations

This thesis investigates the impact of using three different rekeying protocols–pair-wise, hierarchical, and Secure Lock within a wireless sensor network (WSN) under the Hubenko architecture. Using a Matlab computer simulation, the impact of the three rekeying protocols on the number of bits transmitted across the network and the amount of battery power consumed in WSN nodes during rekey operations is investigated. Baseline pair-wise rekeying performance can be improved by using either Secure Lock or hierarchical rekeying. The best choice depends on the size of the WSN and the size of the key used. Hierarchical rekeying is the best choice for …