Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Engineering

Optimal And Secure Electricity Market Framework For Market Operation Of Multi-Microgrid Systems, Mohammad Mahmoudian Esfahani Jul 2020

Optimal And Secure Electricity Market Framework For Market Operation Of Multi-Microgrid Systems, Mohammad Mahmoudian Esfahani

FIU Electronic Theses and Dissertations

Traditional power systems were typically based on bulk energy services by large utility companies. However, microgrids and distributed generations have changed the structure of modern power systems as well as electricity markets. Therefore, restructured electricity markets are needed to address energy transactions in modern power systems.

In this dissertation, we developed a hierarchical and decentralized electricity market framework for multi-microgrid systems, which clears energy transactions through three market levels; Day-Ahead-Market (DAM), Hour-Ahead-Market (HAM) and Real-Time-Market (RTM). In this market, energy trades are possible between all participants within the microgrids as well as inter-microgrids transactions. In this approach, we developed a …


Privacy-Aware Security Applications In The Era Of Internet Of Things, Abbas Acar Apr 2020

Privacy-Aware Security Applications In The Era Of Internet Of Things, Abbas Acar

FIU Electronic Theses and Dissertations

In this dissertation, we introduce several novel privacy-aware security applications. We split these contributions into three main categories: First, to strengthen the current authentication mechanisms, we designed two novel privacy-aware alternative complementary authentication mechanisms, Continuous Authentication (CA) and Multi-factor Authentication (MFA). Our first system is Wearable-assisted Continuous Authentication (WACA), where we used the sensor data collected from a wrist-worn device to authenticate users continuously. Then, we improved WACA by integrating a noise-tolerant template matching technique called NTT-Sec to make it privacy-aware as the collected data can be sensitive. We also designed a novel, lightweight, Privacy-aware Continuous Authentication (PACA) protocol. PACA …


Does The Age Of An It Executive Impact Adoption Levels Of Cloud Computing Services?, Marcus L. Smith Mar 2020

Does The Age Of An It Executive Impact Adoption Levels Of Cloud Computing Services?, Marcus L. Smith

Faculty Publications

This author researched previously the personal decision factors considered by information technology (IT) executives when making the cloud computing services adoptionchoice. The conclusions in that work (Smith, Jr., 2016) supported four hypotheses, namely, (a) advancement, recognition and satisfaction from accomplishments, (b) top management support, (c) diminishment of personal image, and (d) a pattern of technology readiness have a positive influence on business intentions to adopt cloud computing services. Interestingly, a fifth hypothesis, diminishment of personal image, was found to have a negative influence on business intentions. The relationship between age of the survey respondents and adoption levels was highlighted in …


Crime And Harassment On Public Transportation: A Survey Of Sjsu Students Set In International Context, Asha Weinstein Agrawal, Anastasia Loukaitou-Sideris, Cristina Tortora, Yajing Hu Mar 2020

Crime And Harassment On Public Transportation: A Survey Of Sjsu Students Set In International Context, Asha Weinstein Agrawal, Anastasia Loukaitou-Sideris, Cristina Tortora, Yajing Hu

Mineta Transportation Institute

Communities around the world are gradually becoming aware that transit riders, and especially women, are often victims of a wide range of offenses of a sexual nature that happen on buses and trains, and at bus stops and train stations. Better understanding the extent and nature of sexual harassment on transit is a critical issue for transit operators and society at large. If fear of sexual crime limits if and how people ride transit, the result is reduced mobility for certain segments of the population, as well as lost ridership for transit agencies.

For this study, we surveyed 891 students …


Revisiting Lightweight Encryption For Iot Applications: Error Performance And Throughput In Wireless Fading Channels With And Without Coding, Yazid M. Khattabi, Mustafa M. Matalgah, Mohammed M. Olama Jan 2020

Revisiting Lightweight Encryption For Iot Applications: Error Performance And Throughput In Wireless Fading Channels With And Without Coding, Yazid M. Khattabi, Mustafa M. Matalgah, Mohammed M. Olama

Faculty and Student Publications

© 2013 IEEE. Employing heavy conventional encryption algorithms in communications suffers from added overhead and processing time delay; and in wireless communications, in particular, suffers from severe performance deterioration (avalanche effect) due to fading. Consequently, a tremendous reduction in data throughput and increase in complexity and time delay may occur especially when information traverse resource-limited devices as in Internet-of-Things (IoT) applications. To overcome these drawbacks, efficient lightweight encryption algorithms have been recently proposed in literature. One of those, that is of particular interest, requires using conventional encryption only for the first block of data in a given frame being transmitted. …


Green And Secure Computation Offloading For Cache-Enabled Iot Networks, M. Ishtiaque A. Zahed, Iftekhar Ahmad, Daryoush Habibi, Quoc Viet Phung Jan 2020

Green And Secure Computation Offloading For Cache-Enabled Iot Networks, M. Ishtiaque A. Zahed, Iftekhar Ahmad, Daryoush Habibi, Quoc Viet Phung

Research outputs 2014 to 2021

The ever-increasing number of diverse and computation-intensive Internet of things (IoT) applications is bringing phenomenal growth in global Internet traffic. Mobile devices with limited resource capacity (i.e., computation and storage resources) and battery lifetime are experiencing technical challenges to satisfy the task requirements. Mobile edge computing (MEC) integrated with IoT applications offloads computation-intensive tasks to the MEC servers at the network edge. This technique shows remarkable potential in reducing energy consumption and delay. Furthermore, caching popular task input data at the edge servers reduces duplicate content transmission, which eventually saves associated energy and time. However, the offloaded tasks are exposed …