Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Engineering

Digital And Mixed Domain Hardware Reduction Algorithms And Implementations For Massive Mimo, Najath A. Mohomed Nov 2020

Digital And Mixed Domain Hardware Reduction Algorithms And Implementations For Massive Mimo, Najath A. Mohomed

FIU Electronic Theses and Dissertations

Emerging 5G and 6G based wireless communications systems largely rely on multiple-input-multiple-output (MIMO) systems to reduce inherently extensive path losses, facilitate high data rates, and high spatial diversity. Massive MIMO systems used in mmWave and sub-THz applications consists of hundreds perhaps thousands of antenna elements at base stations. Digital beamforming techniques provide the highest flexibility and better degrees of freedom for phased antenna arrays as compared to its analog and hybrid alternatives but has the highest hardware complexity.

Conventional digital beamformers at the receiver require a dedicated analog to digital converter (ADC) for every antenna element, leading to ADCs for …


Geographic Data Mining And Knowledge Discovery, Liangdong Deng Nov 2020

Geographic Data Mining And Knowledge Discovery, Liangdong Deng

FIU Electronic Theses and Dissertations

Geographic data are information associated with a location on the surface of the Earth. They comprise spatial attributes (latitude, longitude, and altitude) and non-spatial attributes (facts related to a location). Traditionally, Physical Geography datasets were considered to be more valuable, thus attracted most research interest. But with the advancements in remote sensing technologies and widespread use of GPS enabled cellphones and IoT (Internet of Things) devices, recent years witnessed explosive growth in the amount of available Human Geography datasets. However, methods and tools that are capable of analyzing and modeling these datasets are very limited. This is because Human Geography …


A Structural Equation Model Analysis Of Computing Identity Sub-Constructs And Student Academic Persistence, Mohsen Taheri Nov 2020

A Structural Equation Model Analysis Of Computing Identity Sub-Constructs And Student Academic Persistence, Mohsen Taheri

FIU Electronic Theses and Dissertations

This dissertation explores the impact of computing identity sub-constructs on the academic persistence of computing students. This research provides models, quantified relationships, and insights to increase the number of graduates with the intention of pursuing a career in computing. Despite the growing significance of computer science and all the projected new jobs in computer science, many university and college programs suffer from low student persistence rates. One theoretical framework used to better understand persistence in other STEM disciplines is disciplinary identity. Disciplinary identity refers to how students see themselves with respect to a discipline. This study examines the effects of …


Understanding Event Structure In Text, Mohammed Aldawsari Oct 2020

Understanding Event Structure In Text, Mohammed Aldawsari

FIU Electronic Theses and Dissertations

Stories often appear in textual form, for example, news stories are found in the form of newspaper articles, blogs, or broadcast transcripts, and so forth. These contain descriptions of current, past, or future events. Automatically extracting knowledge from these events descriptions is an important natural language processing (NLP) task, and understanding event structure aids in this knowledge extraction. Event structure is the fact that events may have relationships or internal structure, for example, be in a co-reference relationship with another event mention, or composed of subevents.

Understanding event structure has received less attention in NLP than is due. This work …


Interactive Virtual Training: Implementation For Early Career Teachers To Practice Classroom Behavior Management, Alban Delamarre Oct 2020

Interactive Virtual Training: Implementation For Early Career Teachers To Practice Classroom Behavior Management, Alban Delamarre

FIU Electronic Theses and Dissertations

Teachers that are equipped with the skills to manage and prevent disruptive behaviors increase the potential for their students to achieve academically and socially. Student success increases when prevention strategies and effective classroom behavior management (CBM) are implemented in the classroom. However, teachers with less than 5 years of experience, early career teachers (ECTs), are ill equipped to handle disruptive students. ECTs describe disruptive behaviors as a major factor for stress given their limited training in CBM. As a result, disruptive behaviors are reported by ECTs as one of the main reasons for leaving the field.

Virtual training environments (VTEs) …


Solving Complex Data-Streaming Problems By Applying Economic-Based Principles To Mobile And Wireless Resource Constraint Networks, Concepcion Z. Sanchez Aleman Jul 2020

Solving Complex Data-Streaming Problems By Applying Economic-Based Principles To Mobile And Wireless Resource Constraint Networks, Concepcion Z. Sanchez Aleman

FIU Electronic Theses and Dissertations

The applications that employ mobile networks depend on the continuous input of reliable data collected by sensing devices. A common application is in military systems, where as an example, drones that are sent on a mission can communicate with each other, exchange sensed data, and autonomously make decisions. Although the mobility of nodes enhances the network coverage, connectivity, and scalability, it introduces pressing issues in data reliability compounded by restrictions in sensor energy resources, as well as limitations in available memory, and computational capacity.

This dissertation investigates the issues that mobile networks encounter in providing reliable data. Our research goal …


A Comprehensive Security Framework For Securing Sensors In Smart Devices And Applications, Amit Kumar Sikder Jul 2020

A Comprehensive Security Framework For Securing Sensors In Smart Devices And Applications, Amit Kumar Sikder

FIU Electronic Theses and Dissertations

This doctoral dissertation introduces novel security frameworks to detect sensor-based threats on smart devices and applications in smart settings such as smart home, smart office, etc. First, we present a formal taxonomy and in-depth impact analysis of existing sensor-based threats to smart devices and applications based on attack characteristics, targeted components, and capabilities. Then, we design a novel context-aware intrusion detection system, 6thSense, to detect sensor-based threats in standalone smart devices (e.g., smartphone, smart watch, etc.). 6thSense considers user activity-sensor co-dependence in standalone smart devices to learn the ongoing user activity contexts and builds a context-aware model to distinguish malicious …


A Deep-Learning Based Robust Framework Against Adversarial P.E. And Cryptojacking Malware, Faraz Amjad Naseem Jul 2020

A Deep-Learning Based Robust Framework Against Adversarial P.E. And Cryptojacking Malware, Faraz Amjad Naseem

FIU Electronic Theses and Dissertations

This graduate thesis introduces novel, deep-learning based frameworks that are resilient to adversarial P.E. and cryptojacking malware. We propose a method that uses a convolutional neural network (CNN) to classify image representations of malware, that provides robustness against numerous adversarial attacks. Our evaluation concludes that the image-based malware classifier is significantly more robust to adversarial attacks than a state-of-the-art ML-based malware classifier, and remarkably drops the evasion rate of adversarial samples to 0% in certain attacks. Further, we develop MINOS, a novel, lightweight cryptojacking detection system that accurately detects the presence of unwarranted mining activity in real-time. MINOS can detect …


Design Of A Robotic Inspection Platform For Structural Health Monitoring, Jason R. Soto Jun 2020

Design Of A Robotic Inspection Platform For Structural Health Monitoring, Jason R. Soto

FIU Electronic Theses and Dissertations

Actively monitoring infrastructure is key to detecting and correcting problems before they become costly. The vast scale of modern infrastructure poses a challenge to monitoring due to insufficient personnel. Certain structures, such as refineries, pose additional challenges and can be expensive, time-consuming, and hazardous to inspect.

This thesis outlines the development of an autonomous robot for structural-health-monitoring. The robot is capable of operating autonomously in level indoor environments and can be controlled manually to traverse difficult terrain. Both visual and lidar SLAM, along with a procedural-mapping technique, allow the robot to capture colored-point-clouds.

The robot is successfully able to automate …


A Private Bitcoin Payment Network With Reduced Transaction Fees And Confirmation Times, Enes Erdin Jun 2020

A Private Bitcoin Payment Network With Reduced Transaction Fees And Confirmation Times, Enes Erdin

FIU Electronic Theses and Dissertations

Since its introduction, Bitcoin cryptocurrency has revolutionized the way payment systems can be designed in a purely distributed manner through its novel Blockchain data structure. While Bitcoin has opened new opportunities, it has been long criticized for its slow transaction confirmation times and high transaction fees. To address this issue, one of the recently emerging solutions is to build a payment channel network (PCN) on top of Bitcoin where the transactions can be made without writing to blockchain. Specifically, a PCN is a network where the users connect either directly or indirectly to send payments to each other in a …


Support Efficient, Scalable, And Online Social Spam Detection In System, Hailu Xu Jun 2020

Support Efficient, Scalable, And Online Social Spam Detection In System, Hailu Xu

FIU Electronic Theses and Dissertations

The broad success of online social networks (OSNs) has created fertile soil for the emergence and fast spread of social spam. Fake news, malicious URL links, fraudulent advertisements, fake reviews, and biased propaganda are bringing serious consequences for both virtual social networks and human life in the real world. Effectively detecting social spam is a hot topic in both academia and industry. However, traditional social spam detection techniques are limited to centralized processing on top of one specific data source but ignore the social spam correlations of distributed data sources. Moreover, a few research efforts are conducting in integrating the …


Mitigating Stealthy Link Flooding Ddos Attacks Using Sdn-Based Moving Target Defense, Abdullah Aydeger Jun 2020

Mitigating Stealthy Link Flooding Ddos Attacks Using Sdn-Based Moving Target Defense, Abdullah Aydeger

FIU Electronic Theses and Dissertations

With the increasing diversity and complication of Distributed Denial-of-Service (DDoS) attacks, it has become extremely challenging to design a fully protected network. For instance, recently, a new type of attack called Stealthy Link Flooding Attack (SLFA) has been shown to cause critical network disconnection problems, where the attacker targets the communication links in the surrounding area of a server. The existing defense mechanisms for this type of attack are based on the detection of some unusual traffic patterns; however, this might be too late as some severe damage might already be done. These mechanisms also do not consider countermeasures during …


Privacy-Aware Security Applications In The Era Of Internet Of Things, Abbas Acar Apr 2020

Privacy-Aware Security Applications In The Era Of Internet Of Things, Abbas Acar

FIU Electronic Theses and Dissertations

In this dissertation, we introduce several novel privacy-aware security applications. We split these contributions into three main categories: First, to strengthen the current authentication mechanisms, we designed two novel privacy-aware alternative complementary authentication mechanisms, Continuous Authentication (CA) and Multi-factor Authentication (MFA). Our first system is Wearable-assisted Continuous Authentication (WACA), where we used the sensor data collected from a wrist-worn device to authenticate users continuously. Then, we improved WACA by integrating a noise-tolerant template matching technique called NTT-Sec to make it privacy-aware as the collected data can be sensitive. We also designed a novel, lightweight, Privacy-aware Continuous Authentication (PACA) protocol. PACA …


A System-Level Perspective Towards Efficient, Reliable And Secure Neural Network Computing, Tao Liu Mar 2020

A System-Level Perspective Towards Efficient, Reliable And Secure Neural Network Computing, Tao Liu

FIU Electronic Theses and Dissertations

The Digital Era is now evolving into the Intelligence Era, driven overwhelmingly by the revolution of Deep Neural Network (DNN), which opens the door for intelligent data interpretation, turning the data and information into actions that create new capabilities, richer experiences, and unprecedented economic opportunities, achieving game-changing outcomes spanning from image recognition, natural language processing, self-driving cars to biomedical analysis. Moreover, the emergence of deep learning accelerators and neuromorphic computing further pushes DNN computation from cloud to the edge devices for the low-latency scalable on-device neural network computing. However, such promising embedded neural network computing systems are subject to various …


Scalable Profiling And Visualization For Characterizing Microbiomes, Camilo Valdes Mar 2020

Scalable Profiling And Visualization For Characterizing Microbiomes, Camilo Valdes

FIU Electronic Theses and Dissertations

Metagenomics is the study of the combined genetic material found in microbiome samples, and it serves as an instrument for studying microbial communities, their biodiversities, and the relationships to their host environments. Creating, interpreting, and understanding microbial community profiles produced from microbiome samples is a challenging task as it requires large computational resources along with innovative techniques to process and analyze datasets that can contain terabytes of information.

The community profiles are critical because they provide information about what microorganisms are present in the sample, and in what proportions. This is particularly important as many human diseases and environmental disasters …


Customized Wireless Mesh Routing Metric For Swarm Of Drones Applications, Oscar G. Bautista Chia Mar 2020

Customized Wireless Mesh Routing Metric For Swarm Of Drones Applications, Oscar G. Bautista Chia

FIU Electronic Theses and Dissertations

With the proliferation of drones applications, there is an increasing need for handling their numerous challenges. One of such challenges arises when a swarm-of-drones is deployed to accomplish a specific task which requires coordination and communication. While this swarm-of-drones is essentially a special form of mobile ad hoc networks (MANETs) which has been studied for many years, there are still some unique requirements of drone applications that necessitates re-visiting MANET approaches. These challenges stem from 3-D environments the drones are deployed in, and their specific way of mobility which adds to the wireless link management challenges. In this thesis, we …