Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

University of Central Florida

Electronic Theses and Dissertations

Theses/Dissertations

2018

Articles 1 - 11 of 11

Full-Text Articles in Engineering

Autonomous Discovery And Maintenance Of Mobile Frees-Space-Optical Links, Mahmudur Khan Aug 2018

Autonomous Discovery And Maintenance Of Mobile Frees-Space-Optical Links, Mahmudur Khan

Electronic Theses and Dissertations

Free-Space-Optical (FSO) communication has the potential to play a significant role in future generation wireless networks. It is advantageous in terms of improved spectrum utilization, higher data transfer rate, and lower probability of interception from unwanted sources. FSO communication can provide optical-level wireless communication speeds and can also help solve the wireless capacity problem experienced by the traditional RF-based technologies. Despite these advantages, communications using FSO transceivers require establishment and maintenance of line-of-sight (LOS). We consider autonomous mobile nodes (Unmanned Ground Vehicles or Unmanned Aerial Vehicles), each with one FSO transceiver mounted on a movable head capable of scanning in …


Categorical Range Reporting In 2d Using Wavelet Tree, Swathi Kanthareddy Sumithra Jan 2018

Categorical Range Reporting In 2d Using Wavelet Tree, Swathi Kanthareddy Sumithra

Electronic Theses and Dissertations

The research involved optimizing the space and bounding the output time by the output size in categorical range reporting of points within the given rectangle query Q in two dimension using wavelet trees and range counting. The time taken to report those points and space to tore n points in set S can be done using wavelet tree and range counting. Consider set S consisting of n points in two-dimension. An orthogonal range reporting query rectangle Q = [a,b] x [c,d] on set S is sent to report the set of points in S which interacts with the query rectangle[Q]. …


Managing Io Resource For Co-Running Data Intensive Applications In Virtual Clusters, Dan Huang Jan 2018

Managing Io Resource For Co-Running Data Intensive Applications In Virtual Clusters, Dan Huang

Electronic Theses and Dissertations

Today Big Data computer platforms employ resource management systems such as Yarn, Torque, Mesos, and Google Borg to enable sharing the physical computing among many users or applications. Given virtualization and resource management systems, users are able to launch their applications on the same node with low mutual interference and management overhead on CPU and memory. However, there are still challenges to be addressed before these systems can be fully adopted to manage the IO resources in Big Data File Systems (BDFS) and shared network facilities. In this study, we mainly study on three IO management problems systematically, in terms …


Joint Optimization Of Illumination And Communication For A Multi-Element Vlc Architecture, Sifat Ibne Mushfique Jan 2018

Joint Optimization Of Illumination And Communication For A Multi-Element Vlc Architecture, Sifat Ibne Mushfique

Electronic Theses and Dissertations

Because of the ever increasing demand wireless data in the modern era, the Radio Frequency (RF) spectrum is becoming more congested. The remaining RF spectrum is being shrunk at a very heavy rate, and spectral management is becoming more difficult. Mobile data is estimated to grow more than 10 times between 2013 and 2019, and due to this explosion in data usage, mobile operators are having serious concerns focusing on public Wireless Fidelity (Wi-Fi) and other alternative technologies. Visible Light Communication (VLC) is a recent promising technology complementary to RF spectrum which operates at the visible light spectrum band (roughly …


A Game-Theoretic Model For Regulating Freeriding In Subsidy-Based Pervasive Spectrum Sharing Markets, Mostafizur Rahman Jan 2018

A Game-Theoretic Model For Regulating Freeriding In Subsidy-Based Pervasive Spectrum Sharing Markets, Mostafizur Rahman

Electronic Theses and Dissertations

Cellular spectrum is a limited natural resource becoming scarcer at a worrisome rate. To satisfy users' expectation from wireless data services, researchers and practitioners recognized the necessity of more utilization and pervasive sharing of the spectrum. Though scarce, spectrum is underutilized in some areas or within certain operating hours due to the lack of appropriate regulatory policies, static allocation and emerging business challenges. Thus, finding ways to improve the utilization of this resource to make sharing more pervasive is of great importance. There already exists a number of solutions to increase spectrum utilization via increased sharing. Dynamic Spectrum Access (DSA) …


Energy Efficient And Secure Wireless Sensor Networks Design, Afraa Attiah Jan 2018

Energy Efficient And Secure Wireless Sensor Networks Design, Afraa Attiah

Electronic Theses and Dissertations

Wireless Sensor Networks (WSNs) are emerging technologies that have the ability to sense, process, communicate, and transmit information to a destination, and they are expected to have significant impact on the efficiency of many applications in various fields. The resource constraint such as limited battery power, is the greatest challenge in WSNs design as it affects the lifetime and performance of the network. An energy efficient, secure, and trustworthy system is vital when a WSN involves highly sensitive information. Thus, it is critical to design mechanisms that are energy efficient and secure while at the same time maintaining the desired …


Masquerading Techniques In Ieee 802.11 Wireless Local Area Networks, Omar Nakhila Jan 2018

Masquerading Techniques In Ieee 802.11 Wireless Local Area Networks, Omar Nakhila

Electronic Theses and Dissertations

The airborne nature of wireless transmission offers a potential target for attackers to compromise IEEE 802.11 Wireless Local Area Network (WLAN). In this dissertation, we explore the current WLAN security threats and their corresponding defense solutions. In our study, we divide WLAN vulnerabilities into two aspects, client, and administrator. The client-side vulnerability investigation is based on examining the Evil Twin Attack (ETA) while our administrator side research targets Wi-Fi Protected Access II (WPA2). Three novel techniques have been presented to detect ETA. The detection methods are based on (1) creating a secure connection to a remote server to detect the …


Real-Time Sil Emulation Architecture For Cooperative Automated Vehicles, Nitish Gupta Jan 2018

Real-Time Sil Emulation Architecture For Cooperative Automated Vehicles, Nitish Gupta

Electronic Theses and Dissertations

This thesis presents a robust, flexible and real-time architecture for Software-in-the-Loop (SIL) testing of connected vehicle safety applications. Emerging connected and automated vehicles (CAV) use sensing, communication and computing technologies in the design of a host of new safety applications. Testing and verification of these applications is a major concern for the automotive industry. The CAV safety applications work by sharing their state and movement information over wireless communication links. Vehicular communication has fueled the development of various Cooperative Vehicle Safety (CVS) applications. Development of safety applications for CAV requires testing in many different scenarios. However, the recreation of test …


Enhancing Cognitive Algorithms For Optimal Performance Of Adaptive Networks, Hector Lugo-Cordero Jan 2018

Enhancing Cognitive Algorithms For Optimal Performance Of Adaptive Networks, Hector Lugo-Cordero

Electronic Theses and Dissertations

This research proposes to enhance some Evolutionary Algorithms in order to obtain optimal and adaptive network configurations. Due to the richness in technologies, low cost, and application usages, we consider Heterogeneous Wireless Mesh Networks. In particular, we evaluate the domains of Network Deployment, Smart Grids/Homes, and Intrusion Detection Systems. Having an adaptive network as one of the goals, we consider a robust noise tolerant methodology that can quickly react to changes in the environment. Furthermore, the diversity of the performance objectives considered (e.g., power, coverage, anonymity, etc.) makes the objective function non-continuous and therefore not have a derivative. For these …


Bridging The Gap Between Application And Solid-State-Drives, Jian Zhou Jan 2018

Bridging The Gap Between Application And Solid-State-Drives, Jian Zhou

Electronic Theses and Dissertations

Data storage is one of the important and often critical parts of the computing system in terms of performance, cost, reliability, and energy. Numerous new memory technologies, such as NAND flash, phase change memory (PCM), magnetic RAM (STT-RAM) and Memristor, have emerged recently. Many of them have already entered the production system. Traditional storage optimization and caching algorithms are far from optimal because storage I/Os do not show simple locality. To provide optimal storage we need accurate predictions of I/O behavior. However, the workloads are increasingly dynamic and diverse, making the long and short time I/O prediction challenge. Because of …


Security Of Autonomous Systems Under Physical Attacks: With Application To Self-Driving Cars, Raj Gautam Dutta Jan 2018

Security Of Autonomous Systems Under Physical Attacks: With Application To Self-Driving Cars, Raj Gautam Dutta

Electronic Theses and Dissertations

The drive to achieve trustworthy autonomous cyber-physical systems (CPS), which can attain goals independently in the presence of significant uncertainties and for long periods of time without any human intervention, has always been enticing. Significant progress has been made in the avenues of both software and hardware for fulfilling these objectives. However, technological challenges still exist and particularly in terms of decision making under uncertainty. In an autonomous system, uncertainties can arise from the operating environment, adversarial attacks, and from within the system. As a result of these concerns, human-beings lack trust in these systems and hesitate to use them …