Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (3)
- Systems Architecture (3)
- Computer Engineering (2)
- Databases and Information Systems (2)
- Software Engineering (2)
-
- Artificial Intelligence and Robotics (1)
- Computational Engineering (1)
- Computer and Systems Architecture (1)
- Digital Communications and Networking (1)
- Electrical and Computer Engineering (1)
- Information Security (1)
- Numerical Analysis and Scientific Computing (1)
- Systems and Communications (1)
- Theory and Algorithms (1)
- Keyword
-
- Active power filters; harmonics; hysteresis current control; neural networks; radial basis function; power quality (1)
- Buffer estimation (1)
- Client-side monitoring (1)
- Cloud resource management (1)
- Cognitive radio networks (1)
-
- Extreme value theorem (1)
- Intelligent transportation systems (1)
- Markov games (1)
- Multi-agent systems (1)
- Multiple-agent systems (1)
- Network management (1)
- Network performance (1)
- Network security (1)
- Opportunistic service differentiation (1)
- QoS (1)
- Quality of Service (QoS) (1)
- RSU clouds (1)
- Reinforcement learning (1)
- Scheduling (1)
- Vehicular ad hoc networks (1)
- Wireless access in vehicular environment (1)
Articles 1 - 7 of 7
Full-Text Articles in OS and Networks
Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad
Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad
Dissertations
Abstract
Sensor nodes collect data from the physical world then exchange it until it reaches the intended destination. This information can be sensitive, such as battlefield surveillance. Therefore, providing secure and continuous data transmissions among sensor nodes in wireless network environments is crucial. Wireless sensor networks (WSN) have limited resources, limited computation capabilities, and the exchange of data through the air and deployment in accessible areas makes the energy, security, and routing major concerns in WSN. In this research we are looking at security issues for the above reasons. WSN is susceptible to malicious activities such as hacking and physical …
Opportunistic Service Differentiation And Cloud Resource Management In Support Of Enhanced Vehicular Applications, Mohammad Ali Salahuddin
Opportunistic Service Differentiation And Cloud Resource Management In Support Of Enhanced Vehicular Applications, Mohammad Ali Salahuddin
Dissertations
An integral part of Intelligent Transportation Systems (ITS) are Vehicular Ad hoc Networks (VANETs), which consist of vehicles with on-board units (OBUs) and fixed road-side units (RSUs). Wireless Access in Vehicular Environment (WAVE) offers QoS via service differentiation by using application defined priorities. However, WAVE has unbounded delay and is oblivious to network load and severity of vehicles with respect to their environment. Our context severity metric innovatively enhances WAVE to be sensitive to vehicle and environment interactions. Our novel Opportunistic Service Differentiation (OSD) technique, dynamically readjusts the WAVE packet priorities to improve utilization of lower latency queues, prioritizing packets …
Client-Based Qos Monitoring And Evaluation Architecture For Network Infrastructure And Services, Ammar Mohammed Kamel
Client-Based Qos Monitoring And Evaluation Architecture For Network Infrastructure And Services, Ammar Mohammed Kamel
Dissertations
Providing an efficient Quality-of-Service (QoS) measurement model is a challenging problem in today’s mobile computing and telecommunications networks. Currently, most of QoS techniques utilize service measurements that are collected by the network elements (i.e., network-side monitoring) to evaluate the network performance. However, this process does not take into account the service performance from the clients' perspective and might contradict with the Service Level Agreement (SLA). In order to overcome the limitations of service-side QoS monitoring, a number of research studies have been conducted to present alternative architectures and algorithms for client-side QoS service assessment in computer networks. The client-side QoS …
Adaptive Security-Aware Scheduling For Packet Switched Networks Using Real-Time Multi-Agent Systems, Ma'en Saleh Saleh
Adaptive Security-Aware Scheduling For Packet Switched Networks Using Real-Time Multi-Agent Systems, Ma'en Saleh Saleh
Dissertations
Conventional real-time scheduling algorithms are in care of timing constraints; they don’t pay any attention to enhance or optimize the real-time packet’s security performance. In this work, we propose an adaptive security-aware scheduling with congestion control mechanism for packet switching networks using real-time agentbased systems. The proposed system combines the functionality of real-time scheduling with the security service enhancement, where the real-time scheduling unit uses the differentiated-earliest-deadline-first (Diff-EDF) scheduler, while the security service enhancement scheme adopts a congestion control mechanism based on a resource estimation methodology.
The security service enhancement unit was designed based on two models: singlelayer and weighted …
Adaptive Radial Basis Function Neural Networks-Based Real Time Harmonics Estimation And Pwm Control For Active Power Filters, Eyad Kh Almaita
Adaptive Radial Basis Function Neural Networks-Based Real Time Harmonics Estimation And Pwm Control For Active Power Filters, Eyad Kh Almaita
Dissertations
With the proliferation of nonlinear loads in the power system, harmonic pollution becomes a serious problem that affects the power quality in both transmission and distribution systems. Active power filters (APF) have been proven to be one of the most successful methods for mitigating harmonics problems. So far, different techniques have been used in harmonics extraction and control of APF to satisfy the fast response and the accuracy required by the APF. Neural networks techniques have been used successfully in different real-time and complex situations. This dissertation demonstrates four main tasks; (i) a novel adaptive radial basis function neural networks …
Efficient Reinforcement Learning In Multiple-Agent Systems And Its Application In Cognitive Radio Networks, Jing Zhang
Efficient Reinforcement Learning In Multiple-Agent Systems And Its Application In Cognitive Radio Networks, Jing Zhang
Dissertations
The objective of reinforcement learning in multiple-agent systems is to find an efficient learning method for the agents to behave optimally. Finding Nash equilibrium has become the common learning target for the optimality. However, finding Nash equilibrium is a PPAD (Polynomial Parity Arguments on Directed graphs)-complete problem. The conventional methods can find Nash equilibrium for some special types of Markov games.
This dissertation proposes a new reinforcement learning algorithm to improve the search efficiency and effectiveness for multiple-agent systems. This algorithm is based on the definition of Nash equilibrium and utilizes the greedy and rational features of the agents. When …
Load Balancing And Congestion Avoidance Routing, Konstantinos N. Kokkinos
Load Balancing And Congestion Avoidance Routing, Konstantinos N. Kokkinos
Dissertations
Today’s high speed backbone networks are expected to support a wide range of communication-intensive applications. One of the most important issues in Quality of Service (QoS) is efficient routing. Many QoS routing solutions have been published lately for different criteria of QoS requirements and resource constraints. In this dissertation we focus on the design of regular network topologies and suggest efficient routing schemes to reduce the probability of hot spot creation in the network. Furthermore, we provide a detection of congestion mechanism that reroutes traffic to maintain balancing with small communication cost. Several theoretical results relatively to network traffic balancing …