Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Systems and Communications (2)
- 3D localization (1)
- 5G (1)
- 6G (1)
- Analog Beamforming (1)
-
- Controls and Control Theory (1)
- Digital Beamforming (1)
- Downlink (1)
- Drone (1)
- Drone antenna array (DAA) (1)
- Electrical and Computer Engineering (1)
- Electrical and Electronics (1)
- Hardware security (1)
- In-band (1)
- Integrated access and backhaul (IAB) (1)
- Intrusion detection (1)
- Machine learning (1)
- Multibeams (1)
- Optimization (1)
- Power and Energy (1)
- UAV. (1)
- USB (1)
- Wideband Multibeams (1)
Articles 1 - 6 of 6
Full-Text Articles in Engineering
Algorithms And Circuits For Analog-Digital Hybrid Multibeam Arrays, Paboda Viduneth A. Beruwawela Pathiranage
Algorithms And Circuits For Analog-Digital Hybrid Multibeam Arrays, Paboda Viduneth A. Beruwawela Pathiranage
FIU Electronic Theses and Dissertations
Fifth generation (5G) and beyond wireless communication systems will rely heavily on larger antenna arrays combined with beamforming to mitigate the high free-space path-loss that prevails in millimeter-wave (mmW) and above frequencies. Sharp beams that can support wide bandwidths are desired both at the transmitter and the receiver to leverage the glut of bandwidth available at these frequency bands. Further, multiple simultaneous sharp beams are imperative for such systems to exploit mmW/sub-THz wireless channels using multiple reflected paths simultaneously. Therefore, multibeam antenna arrays that can support wider bandwidths are a key enabler for 5G and beyond systems.
In general, N- …
Edge Iot Driven Framework For Experimental Investigation And Computational Modeling Of Integrated Food, Energy, And Water System, Yemeserach Taye Mekonnen
Edge Iot Driven Framework For Experimental Investigation And Computational Modeling Of Integrated Food, Energy, And Water System, Yemeserach Taye Mekonnen
FIU Electronic Theses and Dissertations
As the global population soars from today’s 7.3 billion to an estimated 10 billion by 2050, the demand for Food, Energy, and Water (FEW) resources is expected to more than double. Such a sharp increase in demand for FEW resources will undoubtedly be one of the biggest global challenges. The management of food, energy, water for smart, sustainable cities involves a multi-scale problem. The interactions of these three dynamic infrastructures require a robust mathematical framework for analysis. Two critical solutions for this challenge are focused on technology innovation on systems that integrate food-energy-water and computational models that can quantify the …
Protection Of Active Distribution Networks And Their Cyber Physical Infrastructure, Hany Fawzy Kamel Habib
Protection Of Active Distribution Networks And Their Cyber Physical Infrastructure, Hany Fawzy Kamel Habib
FIU Electronic Theses and Dissertations
Today’s Smart Grid constitutes several smaller interconnected microgrids. However, the integration of converter-interfaced distributed generation (DG) in microgrids has raised several issues such as the fact that fault currents in these systems in islanded mode are way less than those in grid connected microgrids. Therefore, microgrid protection schemes require a fast, reliable and robust communication system, with backup, to automatically adjust relay settings for the appropriate current levels according to the microgrid’s operation mode. However, risks of communication link failures, cyber security threats and the high cost involved to avoid them are major challenges for the implementation of an economic …
A Hardware-Assisted Insider Threat Detection And Prevention Framework, Kyle W. Denney
A Hardware-Assisted Insider Threat Detection And Prevention Framework, Kyle W. Denney
FIU Electronic Theses and Dissertations
Today, the USB protocol is among the most widely used protocols. However, the mass-proliferation of USB has led to a threat vector wherein USB devices are assumed innocent, leaving computers open to an attack. Malicious USB devices can disguise themselves as benign devices to insert malicious commands to connected end devices. A rogue device appears benign to the average OS, requiring advanced detection schemes to identify malicious devices. However, using system-level hooks, advanced threats may subvert OS-reliant detection schemes. This thesis showcases USB-Watch, a hardware-based USB threat detection framework. The hardware can collect live USB traffic before the data can …
Ultra-Wideband Secure Communications And Direct Rf Sampling Transceivers, Dimitrios Siafarikas
Ultra-Wideband Secure Communications And Direct Rf Sampling Transceivers, Dimitrios Siafarikas
FIU Electronic Theses and Dissertations
Larger wireless device bandwidth results in new capabilities in terms of higher data rates and security. The 5G evolution is focus on exploiting larger bandwidths for higher though-puts. Interference and co-existence issues can also be addressed by the larger bandwidth in the 5G and 6G evolution. This dissertation introduces of a novel Ultra-wideband (UWB) Code Division Multiple Access (CDMA) technique to exploit the largest bandwidth available in the upcoming wireless connectivity scenarios. The dissertation addresses interference immunity, secure communication at the physical layer and longer distance communication due to increased receiver sensitivity. The dissertation presents the design, workflow, simulations, hardware …
Unmanned Aerial Vehicles (Uavs) For Integrated Access And Backhaul (Iab) Communications In Wireless Cellular Networks, Abdurrahman Fouda
Unmanned Aerial Vehicles (Uavs) For Integrated Access And Backhaul (Iab) Communications In Wireless Cellular Networks, Abdurrahman Fouda
FIU Electronic Theses and Dissertations
An integrated access and backhaul (IAB) network architecture can enable flexible and fast deployment of next-generation cellular networks. However, mutual interference between access and backhaul links, small inter-site distance and spatial dynamics of user distribution pose major challenges in the practical deployment of IAB networks. To tackle these problems, we leverage the flying capabilities of unmanned aerial vehicles (UAVs) as hovering IAB-nodes and propose an interference management algorithm to maximize the overall sum rate of the IAB network. In particular, we jointly optimize the user and base station associations, the downlink power allocations for access and backhaul transmissions, and the …