Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Systems and Communications

PDF

Series

2019

Institution
Keyword
Publication

Articles 1 - 30 of 42

Full-Text Articles in Engineering

The Challenges Facing Autonomous Vehicles And The Progress In Addressing Them, Garrett Johnson Dec 2019

The Challenges Facing Autonomous Vehicles And The Progress In Addressing Them, Garrett Johnson

Senior Honors Theses

Autonomous vehicles are an emerging technology that faces challenges, both technical and socioeconomic. This paper first addresses specific technical challenges, such as parsing visual data, communicating with other entities, and making decisions based on environmental knowledge. The technical challenges are to be addressed by the fields of image processing, Vehicle to Everything Communication (V2X), and decision-making systems. Non-technical challenges such as ethical decision making, social acceptance, and economic pushback are also discussed. Ethical decision making is discussed in the framework of deontology vs utilitarianism, while social acceptance of utilitarian autonomous vehicles is also investigated. Last, the likely economic impact is …


Ldakm-Eiot: Lightweight Device Authentication And Key Management Mechanism For Edge-Based Iot Deployment, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park Dec 2019

Ldakm-Eiot: Lightweight Device Authentication And Key Management Mechanism For Edge-Based Iot Deployment, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park

VMASC Publications

In recent years, edge computing has emerged as a new concept in the computing paradigm that empowers several future technologies, such as 5G, vehicle-to-vehicle communications, and the Internet of Things (IoT), by providing cloud computing facilities, as well as services to the end users. However, open communication among the entities in an edge based IoT environment makes it vulnerable to various potential attacks that are executed by an adversary. Device authentication is one of the prominent techniques in security that permits an IoT device to authenticate mutually with a cloud server with the help of an edge node. If authentication …


Security Of The Internet Of Things: Vulnerabilities, Attacks And Countermeasures, Ismail Butun, Houbing Song, Patrik Osterberg Nov 2019

Security Of The Internet Of Things: Vulnerabilities, Attacks And Countermeasures, Ismail Butun, Houbing Song, Patrik Osterberg

Publications

Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium technologies and have wide range of applications in our surrounding environment. The reason behind the vast adoption of WSNs in various applications is that they have tremendously appealing features, e.g., low production cost, low installation cost, unattended network operation, autonomous and longtime operation. WSNs have started to merge with the Internet of Things (IoT) through the introduction of Internet access capability in sensor nodes and sensing ability in Internet-connected devices. Thereby, the IoT is providing access to huge amount of data, collected by the WSNs, over the Internet. Hence, …


Algorithms And Circuits For Analog-Digital Hybrid Multibeam Arrays, Paboda Viduneth A. Beruwawela Pathiranage Nov 2019

Algorithms And Circuits For Analog-Digital Hybrid Multibeam Arrays, Paboda Viduneth A. Beruwawela Pathiranage

FIU Electronic Theses and Dissertations

Fifth generation (5G) and beyond wireless communication systems will rely heavily on larger antenna arrays combined with beamforming to mitigate the high free-space path-loss that prevails in millimeter-wave (mmW) and above frequencies. Sharp beams that can support wide bandwidths are desired both at the transmitter and the receiver to leverage the glut of bandwidth available at these frequency bands. Further, multiple simultaneous sharp beams are imperative for such systems to exploit mmW/sub-THz wireless channels using multiple reflected paths simultaneously. Therefore, multibeam antenna arrays that can support wider bandwidths are a key enabler for 5G and beyond systems.

In general, N- …


Edge Iot Driven Framework For Experimental Investigation And Computational Modeling Of Integrated Food, Energy, And Water System, Yemeserach Taye Mekonnen Nov 2019

Edge Iot Driven Framework For Experimental Investigation And Computational Modeling Of Integrated Food, Energy, And Water System, Yemeserach Taye Mekonnen

FIU Electronic Theses and Dissertations

As the global population soars from today’s 7.3 billion to an estimated 10 billion by 2050, the demand for Food, Energy, and Water (FEW) resources is expected to more than double. Such a sharp increase in demand for FEW resources will undoubtedly be one of the biggest global challenges. The management of food, energy, water for smart, sustainable cities involves a multi-scale problem. The interactions of these three dynamic infrastructures require a robust mathematical framework for analysis. Two critical solutions for this challenge are focused on technology innovation on systems that integrate food-energy-water and computational models that can quantify the …


Analog Communication Lab, Yi Sun Sep 2019

Analog Communication Lab, Yi Sun

Open Educational Resources

No abstract provided.


A Harmless Wireless Quantum Alternative To Cell Phones Based On Quantum Noise, Florentin Smarandache, Robert Neil Boyd, Victor Christianto Sep 2019

A Harmless Wireless Quantum Alternative To Cell Phones Based On Quantum Noise, Florentin Smarandache, Robert Neil Boyd, Victor Christianto

Branch Mathematics and Statistics Faculty and Staff Publications

In the meantime we know that 4G and 5G technologies cause many harms to human health. Therefore, here we submit a harmless wireless quantum alternative to cell phones. It is our hope that this alternative


Communication Theory, Yi Sun Sep 2019

Communication Theory, Yi Sun

Open Educational Resources

No abstract provided.


Subsurface Mimo: A Beamforming Design In Internet Of Underground Things For Digital Agriculture Applications, Abdul Salam Aug 2019

Subsurface Mimo: A Beamforming Design In Internet Of Underground Things For Digital Agriculture Applications, Abdul Salam

Faculty Publications

In underground (UG) multiple-input and multiple-output (MIMO), the transmit beamforming is used to focus energy in the desired direction. There are three different paths in the underground soil medium through which the waves propagates to reach at the receiver. When the UG receiver receives a desired data stream only from the desired path, then the UG MIMO channel becomes three path (lateral, direct, and reflected) interference channel. Accordingly, the capacity region of the UG MIMO three path interference channel and degrees of freedom (multiplexing gain of this MIMO channel requires careful modeling). Therefore, expressions are required for the degree of …


Guest Editorial Special Issue On Toward Securing Internet Of Connected Vehicles (Iov) From Virtual Vehicle Hijacking, Yue Cao, Houbing Song, Omprakash Kaiwartya, Sinem Coleri Ergen, Jaime Lloret, Naveed Ahmad Aug 2019

Guest Editorial Special Issue On Toward Securing Internet Of Connected Vehicles (Iov) From Virtual Vehicle Hijacking, Yue Cao, Houbing Song, Omprakash Kaiwartya, Sinem Coleri Ergen, Jaime Lloret, Naveed Ahmad

Publications

Today’s vehicles are no longer stand-alone transportation means, due to the advancements on vehicle-tovehicle (V2V) and vehicle-to-infrastructure (V2I) communications enabled to access the Internet via recent technologies in mobile communications, including WiFi, Bluetooth, 4G, and even 5G networks. The Internet of vehicles was aimed toward sustainable developments in transportation by enhancing safety and efficiency. The sensor-enabled intelligent automation of vehicles’ mechanical operations enhances safety in on-road traveling, and cooperative traffic information sharing in vehicular networks improves traveling efficiency.


Dripline: A Distributed Experiment Control System, Eric Gonzalez, Ben Laroque, Noah Oblath Aug 2019

Dripline: A Distributed Experiment Control System, Eric Gonzalez, Ben Laroque, Noah Oblath

STAR Program Research Presentations

Project 8 is a nuclear physics experiment which seeks to measure the mass of neutrinos. The experiment requires the use of various pieces of hardware which need to be controlled, and from this need, a software system named Dripline is being developed. Because most researchers have some knowledge in Python and it is easier to understand the syntax of Python as opposed to C++, a Python application programming interface (API) is being created to allow any researcher working with Dripline ease of use. As development progresses, features may be added or removed as needed which requires constant testing, debugging, and …


Protection Of Active Distribution Networks And Their Cyber Physical Infrastructure, Hany Fawzy Kamel Habib Jun 2019

Protection Of Active Distribution Networks And Their Cyber Physical Infrastructure, Hany Fawzy Kamel Habib

FIU Electronic Theses and Dissertations

Today’s Smart Grid constitutes several smaller interconnected microgrids. However, the integration of converter-interfaced distributed generation (DG) in microgrids has raised several issues such as the fact that fault currents in these systems in islanded mode are way less than those in grid connected microgrids. Therefore, microgrid protection schemes require a fast, reliable and robust communication system, with backup, to automatically adjust relay settings for the appropriate current levels according to the microgrid’s operation mode. However, risks of communication link failures, cyber security threats and the high cost involved to avoid them are major challenges for the implementation of an economic …


A Hardware-Assisted Insider Threat Detection And Prevention Framework, Kyle W. Denney Jun 2019

A Hardware-Assisted Insider Threat Detection And Prevention Framework, Kyle W. Denney

FIU Electronic Theses and Dissertations

Today, the USB protocol is among the most widely used protocols. However, the mass-proliferation of USB has led to a threat vector wherein USB devices are assumed innocent, leaving computers open to an attack. Malicious USB devices can disguise themselves as benign devices to insert malicious commands to connected end devices. A rogue device appears benign to the average OS, requiring advanced detection schemes to identify malicious devices. However, using system-level hooks, advanced threats may subvert OS-reliant detection schemes. This thesis showcases USB-Watch, a hardware-based USB threat detection framework. The hardware can collect live USB traffic before the data can …


Ultra-Wideband Secure Communications And Direct Rf Sampling Transceivers, Dimitrios Siafarikas Jun 2019

Ultra-Wideband Secure Communications And Direct Rf Sampling Transceivers, Dimitrios Siafarikas

FIU Electronic Theses and Dissertations

Larger wireless device bandwidth results in new capabilities in terms of higher data rates and security. The 5G evolution is focus on exploiting larger bandwidths for higher though-puts. Interference and co-existence issues can also be addressed by the larger bandwidth in the 5G and 6G evolution. This dissertation introduces of a novel Ultra-wideband (UWB) Code Division Multiple Access (CDMA) technique to exploit the largest bandwidth available in the upcoming wireless connectivity scenarios. The dissertation addresses interference immunity, secure communication at the physical layer and longer distance communication due to increased receiver sensitivity. The dissertation presents the design, workflow, simulations, hardware …


Unmanned Aerial Vehicles (Uavs) For Integrated Access And Backhaul (Iab) Communications In Wireless Cellular Networks, Abdurrahman Fouda Jun 2019

Unmanned Aerial Vehicles (Uavs) For Integrated Access And Backhaul (Iab) Communications In Wireless Cellular Networks, Abdurrahman Fouda

FIU Electronic Theses and Dissertations

An integrated access and backhaul (IAB) network architecture can enable flexible and fast deployment of next-generation cellular networks. However, mutual interference between access and backhaul links, small inter-site distance and spatial dynamics of user distribution pose major challenges in the practical deployment of IAB networks. To tackle these problems, we leverage the flying capabilities of unmanned aerial vehicles (UAVs) as hovering IAB-nodes and propose an interference management algorithm to maximize the overall sum rate of the IAB network. In particular, we jointly optimize the user and base station associations, the downlink power allocations for access and backhaul transmissions, and the …


Influence Spread In Two-Layer Interdependent Networks: Designed Single-Layer Or Random Two-Layer Initial Spreaders?, Hana Khamfroush, Nathaniel Hudson, Samuel Iloo, Mahshid R. Naeini Jun 2019

Influence Spread In Two-Layer Interdependent Networks: Designed Single-Layer Or Random Two-Layer Initial Spreaders?, Hana Khamfroush, Nathaniel Hudson, Samuel Iloo, Mahshid R. Naeini

Computer Science Faculty Publications

Influence spread in multi-layer interdependent networks (M-IDN) has been studied in the last few years; however, prior works mostly focused on the spread that is initiated in a single layer of an M-IDN. In real world scenarios, influence spread can happen concurrently among many or all components making up the topology of an M-IDN. This paper investigates the effectiveness of different influence spread strategies in M-IDNs by providing a comprehensive analysis of the time evolution of influence propagation given different initial spreader strategies. For this study we consider a two-layer interdependent network and a general probabilistic threshold influence spread model …


A Traffic-Aware Approach For Enabling Unmanned Aerial Vehicles (Uavs) In Smart City Scenarios, Hesham El-Sayed, Moumena Chaqfa, Sherali Zeadally, Deepak Puthal Jun 2019

A Traffic-Aware Approach For Enabling Unmanned Aerial Vehicles (Uavs) In Smart City Scenarios, Hesham El-Sayed, Moumena Chaqfa, Sherali Zeadally, Deepak Puthal

Information Science Faculty Publications

In smart cities, vehicular applications require high computation capabilities and low-latency communication. Edge computing offers promising solutions for addressing these requirements because of several features, such as geo-distribution, mobility, low latency, heterogeneity, and support for real-time interactions. To employ network edges, existing fixed roadside units can be equipped with edge computing servers. Nevertheless, there are situations where additional infrastructure units are required to handle temporary high traffic loads during public events, unexpected weather conditions, or extreme traffic congestion. In such cases, the use of flying roadside units are carried by unmanned aerial vehicles (UAVs), which provide the required infrastructure for …


A Cooperative Overlay Approach At The Physical Layer Of Cognitive Radio For Digital Agriculture, Abdul Salam, Umit Karabiyik May 2019

A Cooperative Overlay Approach At The Physical Layer Of Cognitive Radio For Digital Agriculture, Abdul Salam, Umit Karabiyik

Faculty Publications

In digital agriculture, the cognitive radio technology is being envisaged as solution to spectral shortage problems by allowing agricultural cognitive users to co-exist with noncognitive users in the same spectrum on the field. Cognitive radios increase system capacity and spectral efficiency by sensing the spectrum and adapting the transmission parameters. This design requires a robust, adaptable and flexible physical layer to support cognitive radio functionality. In this paper, a novel physical layer architecture for cognitive radio based on cognition, cooperation, and cognitive interference avoidance has been developed by using power control for digital agriculture applications. The design is based on …


Bamorc: A Software Package For Accurate And Robust 13C Reference Correction Of Protein Nmr Spectra, Xi Chen, Andrey Smelter, Hunter N. B. Moseley May 2019

Bamorc: A Software Package For Accurate And Robust 13C Reference Correction Of Protein Nmr Spectra, Xi Chen, Andrey Smelter, Hunter N. B. Moseley

Molecular and Cellular Biochemistry Faculty Publications

We describe Bayesian Model Optimized Reference Correction (BaMORC), a software package that performs 13C chemical shifts reference correction for either assigned or unassigned peak lists derived from protein NMR spectra. BaMORC provides an intuitive command line interface that allows non-nuclear magnetic resonance (NMR) experts to detect and correct 13C chemical shift referencing errors of unassigned peak lists at the very beginning of NMR data analysis, further lowering the bar of expertise required for effective protein NMR analysis. Furthermore, BaMORC provides an application programming interface for integration into sophisticated protein NMR data analysis pipelines, both before and after the …


Urban Underground Infrastructure Monitoring Iot: The Path Loss Analysis, Abdul Salam, Syed Shah Apr 2019

Urban Underground Infrastructure Monitoring Iot: The Path Loss Analysis, Abdul Salam, Syed Shah

Faculty Publications

The extra quantities of wastewater entering the pipes can cause backups that result in sanitary sewer overflows. Urban underground infrastructure monitoring is important for controlling the flow of extraneous water into the pipelines. By combining the wireless underground communications and sensor solutions, the urban underground IoT applications such as real time wastewater and storm water overflow monitoring can be developed. In this paper, the path loss analysis of wireless underground communications in urban underground IoT for wastewater monitoring has been presented. It has been shown that the communication range of up to 4 kilometers can be achieved from an underground …


Implementing Wifi Ax In Sdr, Elijah Barker Apr 2019

Implementing Wifi Ax In Sdr, Elijah Barker

Senior Honors Theses

Both Carrier Sensing Multiple Access (CSMA) and Orthogonal Frequency Division Multiple Access (OFDMA) are vital techniques for WiFi radio operations. CSMA deals with decentralized sharing of the medium, and OFDMA deals with dividing up the channel into multiple smaller allocations of the channel to transmit data from multiple users simultaneously. OFDMA is a new multiple access scheme introduced in the upcoming IEEE 802.11ax standard. This paper details research with Dr. Bae in implementing portions of the upcoming 802.11ax standard using software defined radio. First, this paper provides in-depth setup information for the Wime Project and explains the Wime Project implementation …


An Underground Radio Wave Propagation Prediction Model For Digital Agriculture, Abdul Salam Apr 2019

An Underground Radio Wave Propagation Prediction Model For Digital Agriculture, Abdul Salam

Faculty Publications

Underground sensing and propagation of Signals in the Soil (SitS) medium is an electromagnetic issue. The path loss prediction with higher accuracy is an open research subject in digital agriculture monitoring applications for sensing and communications. The statistical data are predominantly derived from site-specific empirical measurements, which is considered an impediment to universal application. Nevertheless, in the existing literature, statistical approaches have been applied to the SitS channel modeling, where impulse response analysis and the Friis open space transmission formula are employed as the channel modeling tool in different soil types under varying soil moisture conditions at diverse communication distances …


Asme Student Design Competition, Marcus Todd Apr 2019

Asme Student Design Competition, Marcus Todd

Mahurin Honors College Capstone Experience/Thesis Projects

For the completion of my capstone project with the Western Kentucky University Honors College, the following document details my experience with the American Society of Mechanical Engineer (ASME) Student Design Competition. This project was completed in a two semester sequence through working with a team of four. One semester focusing primarily on the design and the other on fabrication and evaluation. The 2019 ASME competition was the Pick and Place Race. In this event, 46 teams were challenged to design and construct a device having the ability to pick up balls of varying size. Both the design and assembly process …


2019 Ieee Southeastcon Hardware Competition: A Systems Engineering Approach, Emily Sage Apr 2019

2019 Ieee Southeastcon Hardware Competition: A Systems Engineering Approach, Emily Sage

Mahurin Honors College Capstone Experience/Thesis Projects

The Institute for Electrical and Electronics Engineers (IEEE) Huntsville section invites college students to participate in their annual SoutheastCon Conference. Western Kentucky University sends a team of engineering students to the hardware competition, an opportunity for students to design and build autonomous robots. The 2019 hardware competition called for students to develop a robot that could collect and sort debris by color. This thesis outlines the project lifecycle of the WKU 2019 SoutheastCon robot with an emphasis on implemented systems engineering tools and techniques. Systems Engineering is an interdisciplinary approach to project management that focuses on treating the overall project …


Underground Environment Aware Mimo Design Using Transmit And Receive Beamforming In Internet Of Underground Things, Abdul Salam Apr 2019

Underground Environment Aware Mimo Design Using Transmit And Receive Beamforming In Internet Of Underground Things, Abdul Salam

Faculty Publications

In underground (UG) multiple-input and multiple-output (MIMO), the transmit beamforming is used to focus energy in the desired direction. There are three different paths in the underground soil medium through which the waves propagates to reach at the receiver. When the UG receiver receives a desired data stream only from the desired path, then the UG MIMO channel becomes three path (lateral, direct, and reflected) interference channel. Accordingly, the capacity region of the UG MIMO three path interference channel and degrees of freedom (multiplexing gain of this MIMO channel requires careful modeling). Therefore, expressions are required derived the degrees of …


Feasibility And Security Analysis Of Wideband Ultrasonic Radio For Smart Home Applications, Qi Xia Apr 2019

Feasibility And Security Analysis Of Wideband Ultrasonic Radio For Smart Home Applications, Qi Xia

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Smart home Internet-of-Things (IoT) accompanied by smart home apps has witnessed tremendous growth in the past few years. Yet, the security and privacy of the smart home IoT devices and apps have raised serious concerns, as they are getting increasingly complicated each day, expected to store and exchange extremely sensitive personal data, always on and connected, and commonly exposed to any users in a sensitive environment. Nowadays wireless smart home IoT devices rely on electromagnetic wave-based radio-frequency (RF) technology to establish fast and reliable quality network connections. However, RF has its limitations that can negatively affect the smart home user …


Ka-Band Planar Vivaldi Antenna With A Core For High-Gain, Manh Ha Hoang, Kansheng Yang, Matthias John, Patrick Mcevoy, Max Ammann Mar 2019

Ka-Band Planar Vivaldi Antenna With A Core For High-Gain, Manh Ha Hoang, Kansheng Yang, Matthias John, Patrick Mcevoy, Max Ammann

Articles

A planar Vivaldi antenna structure with a core element is proposed for high gain. Techniques to achieve a significant gain improvement over the full Ka (24-40 GHz) band are implemented; including a frequency-independent excitation method, the introduction of logarithmic ripple on the lateral edges and enclosing the antenna in a dielectric material.


A State-Of-The-Art Survey On Deep Learning Theory And Architectures, Md Zahangir Alom, Tarek M. Taha, Christopher Yakopcic, Stefan Westberg, Paheding Sidike, Mst Shamima Nasrin, Mahmudul Hasan, Brian C. Van Essen, Abdul A. S. Awwal, Vijayan K. Asari Mar 2019

A State-Of-The-Art Survey On Deep Learning Theory And Architectures, Md Zahangir Alom, Tarek M. Taha, Christopher Yakopcic, Stefan Westberg, Paheding Sidike, Mst Shamima Nasrin, Mahmudul Hasan, Brian C. Van Essen, Abdul A. S. Awwal, Vijayan K. Asari

Electrical and Computer Engineering Faculty Publications

In recent years, deep learning has garnered tremendous success in a variety of application domains. This new field of machine learning has been growing rapidly and has been applied to most traditional application domains, as well as some new areas that present more opportunities. Different methods have been proposed based on different categories of learning, including supervised, semi-supervised, and un-supervised learning. Experimental results show state-of-the-art performance using deep learning when compared to traditional machine learning approaches in the fields of image processing, computer vision, speech recognition, machine translation, art, medical imaging, medical information processing, robotics and control, bioinformatics, natural language …


A Theoretical Model Of Underground Dipole Antennas For Communications In Internet Of Underground Things, Abdul Salam, Mehmet C. Vuran, Xin Dong, Christos Argyropoulos, Suat Irmak Feb 2019

A Theoretical Model Of Underground Dipole Antennas For Communications In Internet Of Underground Things, Abdul Salam, Mehmet C. Vuran, Xin Dong, Christos Argyropoulos, Suat Irmak

Faculty Publications

The realization of Internet of Underground Things (IOUT) relies on the establishment of reliable communication links, where the antenna becomes a major design component due to the significant impacts of soil. In this paper, a theoretical model is developed to capture the impacts of change of soil moisture on the return loss, resonant frequency, and bandwidth of a buried dipole antenna. Experiments are conducted in silty clay loam, sandy, and silt loam soil, to characterize the effects of soil, in an indoor testbed and field testbeds. It is shown that at subsurface burial depths (0.1-0.4m), change in soil moisture impacts …


Mesh Node Communication System For Fire Figthers, Eric E. Hamke, Trace Norris, Jessica E. Ladd, Jeffrey K. Eaton, Jicard J. Malveaux, Manish Bhattarai, Ramiro Jordan, Manel Martinez-Ramon Jan 2019

Mesh Node Communication System For Fire Figthers, Eric E. Hamke, Trace Norris, Jessica E. Ladd, Jeffrey K. Eaton, Jicard J. Malveaux, Manish Bhattarai, Ramiro Jordan, Manel Martinez-Ramon

Electrical & Computer Engineering Technical Reports

This report describes the prototype and demonstration of a reliable local area network (LAN) of devices able to interconnect a crew of fire fighters with a communications node. The data consists of images for thermal cameras at a given rate and other low bandwith data taken from the different sensors of the fire fighter gear, that are connected to the transmitter using a Bluetooth personal area network (PAN). The physical environment is indoors and it is expected that all nodes of the communication networks are distributed in different positions into a building.