Open Access. Powered by Scholars. Published by Universities.®

Systems and Communications Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

2022

Discipline
Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 85

Full-Text Articles in Systems and Communications

Red Comunitaria Bosachoque-Libre Ingeniería Al Servicio De La Brecha Digital Rural, Universidad De Cundinamarca Sede Fusagasugá, Ángela Patricia Arenas Amado, Eva Patricia Vásquez Gómez, Marcia Catalina Pulido Córdoba, Wilson Daniel Gordillo Ochoa Dec 2022

Red Comunitaria Bosachoque-Libre Ingeniería Al Servicio De La Brecha Digital Rural, Universidad De Cundinamarca Sede Fusagasugá, Ángela Patricia Arenas Amado, Eva Patricia Vásquez Gómez, Marcia Catalina Pulido Córdoba, Wilson Daniel Gordillo Ochoa

Ingeniería

En materia de conectividad y accesibilidad digital la pandemia por COVID – 19 expuso la exclusión digital en la cual se encuentran sumidos los territorios rurales de Colombia y el mundo. Pese a los ingentes esfuerzos del gobierno nacional a través de procesos institucionalizados para garantizar la inclusión de la tecnología en zonas rurales, no se logra una cobertura óptima, lo cual genera una afectación tecnológica, educativa y de salud pública para comunidades en situación de desventaja social, como es el caso de la ruralidad.
En este documento se muestran los resultados del trabajo de investigación llevado a cabo en …


Optical Control System For Atmospheric Turbulence Mitigation, Martyn Lemon Dec 2022

Optical Control System For Atmospheric Turbulence Mitigation, Martyn Lemon

All Theses

Propagation of laser light is distorted in the presence of atmospheric turbulence. This poses an issue for sensing, free-space optical communications, and transmission of power. With an ever-increasing demand for high-speed data communications, particularly between satellites, unmanned vehicles, and other systems that benefit from a point-to-point link, this issue is critical for the field. A variety of methods have been proposed to circumvent this issue. Some major categories include the manipulation of the light’s structure, an adaptive scheme at the optical receiver, scanning mirror systems, or a transmission of simultaneous signals with a goal to improve robustness.

There is an …


A Retrospective On 2022 Cyber Incidents In The Wind Energy Sector And Building Future Cyber Resilience, Megan Egan Dec 2022

A Retrospective On 2022 Cyber Incidents In The Wind Energy Sector And Building Future Cyber Resilience, Megan Egan

Cyber Operations and Resilience Program Graduate Projects

Between February and June 2022, multiple wind energy sector companies were hit by cyber-attacks impacting their ability to monitor and control wind turbines. With projected growth in the United States of 110.66 GW from 2020 to 2030, wind energy will increasingly be a critical source of electricity for the United States and an increasingly valuable target for cyberattacks. This paper shows the importance of redundant remote communications, secure third-party providers, and improving response and recovery processes that would ensure this growth period fulfills its potential as a unique opportunity to build in cyber resilience from the outset of new installations …


Low Overhead And Application-Oriented Synchronization In Heterogeneous Internet Of Things Systems, Haide Wang Nov 2022

Low Overhead And Application-Oriented Synchronization In Heterogeneous Internet Of Things Systems, Haide Wang

Electronic Thesis and Dissertation Repository

Recent evolution in the Internet of Things (IoT) and Cyber–physical systems (CPS) is expected to change everyday life of its users by enabling low latency and reliable communication, coordinated task execution and real time data processing among pervasive intelligence through the communication network. Precise time synchronization, as a prerequisite for a chronological ordering of information or synchronous execution, has become a vital constituent for many time-sensitive applications.

On one hand, Internet of Things (IoT) systems rely heavily on the temporal coherence among its distributed constituents during data fusion and analysis, however the existing solutions for data synchronization, do not easily …


Deepdemod: Bpsk Demodulation Using Deep Learning Over Software-Defined Radio, Arhum Ahmad, Satyam Agarwal, Sam Darshi, Sumit Chakravarty Nov 2022

Deepdemod: Bpsk Demodulation Using Deep Learning Over Software-Defined Radio, Arhum Ahmad, Satyam Agarwal, Sam Darshi, Sumit Chakravarty

Faculty Open Access Publishing Fund Collection

In wireless communication, signal demodulation under non-ideal conditions is one of the important research topic. In this paper, a novel non-coherent binary phase shift keying demodulator based on deep neural network, namely DeepDeMod, is proposed. The proposed scheme makes use of neural network to decode the symbols from the received sampled signal. The proposed scheme is developed to demodulate signal under fading channel with additive white Gaussian noise along with hardware imperfections, such as phase and frequency offset. The time varying nature of hardware imperfections and channel poses a additional challenge in signal demodulation. In order to address this issue, …


A Socio-Economic Analysis Of Automated Container Terminal (Act) Concept In Indonesia : Case Study : New Priok Container Terminal One, Febri Triana Hartami Siagian Oct 2022

A Socio-Economic Analysis Of Automated Container Terminal (Act) Concept In Indonesia : Case Study : New Priok Container Terminal One, Febri Triana Hartami Siagian

World Maritime University Dissertations

No abstract provided.


Device Free Indoor Localization Of Human Target Using Wifi Fingerprinting, Prasanga Neupane Oct 2022

Device Free Indoor Localization Of Human Target Using Wifi Fingerprinting, Prasanga Neupane

LSU Master's Theses

Indoor localization of human objects has many important applications nowadays. Proposed here is a new device free approach where all the transceiver devices are fixed in an indoor environment so that the human target doesn't need to carry any transceiver device with them. This work proposes radio-frequency fingerprinting for the localization of human targets which makes this even more convenient as radio-frequency wireless signals can be easily acquired using an existing wireless network in an indoor environment. This work explores different avenues for optimal and effective placement of transmitter devices for better localization. In this work, an experimental environment is …


Detection Of Data Over Wireless Mobile Channels Based On Maximum Likelihood Technique, Mohd Israil Oct 2022

Detection Of Data Over Wireless Mobile Channels Based On Maximum Likelihood Technique, Mohd Israil

Al-Bahir Journal for Engineering and Pure Sciences

Next generation wireless systems are characterized by very high transmission bit rates which gives rise to severe Intersymbol interference (ISI) and this makes the detection process very challenging. Hence, assessment of performance of near-optimal detectors like Near Maximum Likelihood Detectors (NMLD) over such channels assumes great importance. This paper deals with the detection of data in the presence of Noise and ISI with NMLD. Performance improvement of NMLD, as compared to nonlinear equalization, has been assessed in terms of BER versus SNR curves obtained through computer simulation. A number of different cases of mobile radio channels have been simulated in …


Hardware Security For Wireless Communications Systems Using Antenna-Based Radio Frequency Fingerprint Engineering, Noemi Miguelez Gomez Oct 2022

Hardware Security For Wireless Communications Systems Using Antenna-Based Radio Frequency Fingerprint Engineering, Noemi Miguelez Gomez

Doctoral Dissertations and Master's Theses

The design and application of novel physical-layer security techniques have been increasing in the last decades as means to enhance the security that more traditional techniques provide to wireless communications systems. Well-known hardware security techniques, such as radio frequency fingerprinting, use unintended manufacturing process variations and unique hardware structures in the semiconductors for applications such as identification and classification of the source of different transmitted signals, and detection of hardware modifications. The uniqueness of the features that two different modules present, even maintaining the same design, can be used for modules characterization at a lower cost and complexity than other …


A Design Flow For Additively Manufactured 3d Metasurface Antennas​, Justin Parkhurst Oct 2022

A Design Flow For Additively Manufactured 3d Metasurface Antennas​, Justin Parkhurst

Doctoral Dissertations and Master's Theses

Metasurface (MTS) antennas are complex arrays consisting of hundreds or thousands of individual elements that each exert their own influence on the performance of the antenna. Due to this, the process of designing and developing a MTS antenna can be intensive in terms of both the time to understand the how these antennas operate and time running calculations that achieve optimal performance. Through the use of automation for geometry creation in ANSYS HFSS, the work involved in making a MTS antenna can be greatly simplified. The overall objective of this thesis is to reduce the burden of constructing a MTS …


Evaluating Large Delay Estimation Techniques For Assisted Living Environments, Swarnadeep Bagchi, Ruairí De Fréin Sep 2022

Evaluating Large Delay Estimation Techniques For Assisted Living Environments, Swarnadeep Bagchi, Ruairí De Fréin

Articles

Abstract Phase wraparound due to large inter-sensor spacings in multi-channel demixing limits the range of relative delays that many time–frequency relative delay estimators can estimate. The performance of a large relative delay estimation method, called the elevatogram, is evaluated in the presence of significant phase wraparound. This paper compares the elevatogram with the popular relative delay estimator used in DUET and the brute-force approach in D-AdRess and analyses its computational efficiency. The elevatogram can accurately estimate relative delays of speech signals of up to 800 samples, whereas DUET and D-AdRess were limited to delays of 7 and 35 samples, given …


Studying Routing Issues In Vanets Using Ns-3 And Sumo, Mohammad Mahmoud Abdellatif, Omar E. Aly Sep 2022

Studying Routing Issues In Vanets Using Ns-3 And Sumo, Mohammad Mahmoud Abdellatif, Omar E. Aly

Electrical Engineering

ehicular Ad-hoc Networks VANETs are normally sparse, highly dense, and highly mobile with many different and ever-changing topologies. These characteristics impose a challenge on finding a routing algorithm that fits the requirements of such network. The aim of this work is to study the performance issues of VANETs under different scenarios using realistic mobility models. In this paper, a comparative study is done among Ad-hoc On- Demand Distance Vector (AODV), Optimized Link State Routing (OLSR) and position-based routing protocols, namely Greedy Perimeter stateless routing (GPSR), and Max duration Min angle GPSR (MMGPSR). The comparison is done using key quality of …


An Empirical Comparison Of The Security And Performance Characteristics Of Topology Formation Algorithms For Bitcoin Networks, Muntadher Sallal, Ruairí De Fréin, Ali Malik, Benjamin Aziz Sep 2022

An Empirical Comparison Of The Security And Performance Characteristics Of Topology Formation Algorithms For Bitcoin Networks, Muntadher Sallal, Ruairí De Fréin, Ali Malik, Benjamin Aziz

Articles

There is an increasing demand for digital crypto-currencies to be more secure and robust to meet the following business requirements: (1) low transaction fees and (2) the privacy of users. Nowadays, Bitcoin is gaining traction and wide adoption. Many well-known businesses have begun accepting bitcoins as a means of making financial payments. However, the susceptibility of Bitcoin networks to information propagation delay, increases the vulnerability to attack of the Bitcoin network, and decreases its throughput performance. This paper introduces and critically analyses new network clustering methods, named Locality Based Clustering (LBC), Ping Time Based Approach (PTBC), Super Node Based Clustering …


Development Of A Security-Focused Multi-Channel Communication Protocol And Associated Quality Of Secure Service (Qoss) Metrics, Paul M. Simon Sep 2022

Development Of A Security-Focused Multi-Channel Communication Protocol And Associated Quality Of Secure Service (Qoss) Metrics, Paul M. Simon

Theses and Dissertations

The threat of eavesdropping, and the challenge of recognizing and correcting for corrupted or suppressed information in communication systems is a consistent challenge. Effectively managing protection mechanisms requires an ability to accurately gauge the likelihood or severity of a threat, and adapt the security features available in a system to mitigate the threat. This research focuses on the design and development of a security-focused communication protocol at the session-layer based on a re-prioritized communication architecture model and associated metrics. From a probabilistic model that considers data leakage and data corruption as surrogates for breaches of confidentiality and integrity, a set …


Resource Allocation, User Association And Placement For Uav-Assisted Communications, Shuai Zhang Aug 2022

Resource Allocation, User Association And Placement For Uav-Assisted Communications, Shuai Zhang

Dissertations

In the past few years, unmanned aerial vehicle (UAV)-assisted heterogeneous network has attracted significant attention due to its wide range of applications, such as disaster rescue and recovery, ground macro base station (MBS) traffic offloading, communications for temporary events, and data collection for further processing in Internet of Things (IoT). A UAV can act as a flying base station (BS) to quickly recover the communication coverage in the disaster area when the regular terrestrial infrastructure is malfunctioned. The UAV-assisted heterogeneous network can effectively provision line of sight (LoS) communication links and therefore can mitigate potential signal shadowing and blockage. The …


Efficient Discovery And Utilization Of Radio Information In Ultra-Dense Heterogeneous 3d Wireless Networks, Mattaka Gamage Samantha Sriyananda Aug 2022

Efficient Discovery And Utilization Of Radio Information In Ultra-Dense Heterogeneous 3d Wireless Networks, Mattaka Gamage Samantha Sriyananda

Electronic Thesis and Dissertation Repository

Emergence of new applications, industrial automation and the explosive boost of smart concepts have led to an environment with rapidly increasing device densification and service diversification. This revolutionary upward trend has led the upcoming 6th-Generation (6G) and beyond communication systems to be globally available communication, computing and intelligent systems seamlessly connecting devices, services and infrastructure facilities. In this kind of environment, scarcity of radio resources would be upshot to an unimaginably high level compelling them to be very efficiently utilized. In this case, timely action is taken to deviate from approximate site-specific 2-Dimensional (2D) network concepts in radio resource utilization …


Low Cost And Reliable Wireless Sensor Networks For Environmental Monitoring, Sonia Naderi Aug 2022

Low Cost And Reliable Wireless Sensor Networks For Environmental Monitoring, Sonia Naderi

Electronic Theses and Dissertations

This thesis utilizes wireless sensor network systems to learn of changes in wireless network performance and environment, establishing power efficient systems that are low cost and are able to perform large scale monitoring. The proposed system was built at the University of Maine’s Wireless Sensor Networks (WiSe-Net) laboratory in collaboration with University of New Hampshire and University of Vermont researchers. The system was configured to perform soil moisture measurement with provision to include other sensor types at later stages in collaboration with Alabama A & M University. In the research associated with this thesis, a general relay energy assisted scenario …


Introduction To Pub/Sub Systems Using Opcua, Mete Isiksalan Aug 2022

Introduction To Pub/Sub Systems Using Opcua, Mete Isiksalan

Undergraduate Student Research Internships Conference

The purpose of the project was to learn and implement the fundamental basics of OPCUA system architecture using pub/sub systems. The system allows the users to create multiple different publishers and subscribers while accessing data from a local server and a primary HTTP server. The system is designed to be a multi-client and multi-server system to simulate real-life scenarios while having two different sources of generated values to send via sockets in OPCUA protocols, multiple different APIs were used for the clients on how they retrieve data as well.


Effective Resource Scheduling For Collaborative Computing In Edge-Assisted Internet Of Things Systems, Qianqian Wang Aug 2022

Effective Resource Scheduling For Collaborative Computing In Edge-Assisted Internet Of Things Systems, Qianqian Wang

Electronic Thesis and Dissertation Repository

Along with rapidly evolving communications technologies and data analytics, Internet of Things (IoT) systems interconnect billions of smart devices to gather, exchange, analyze data, and perform tasks autonomously, which poses a huge pressure on IoT devices' computing capabilities. Taking advantage of collaborative computing enabled by cloud computing and edge computing technologies, IoT devices can offload computation tasks to idle computing devices and remote servers, thus alleviating their pressure. However, scheduling resources effectively to realize collaborative computing remains a severe challenge due to diverse application objectives, limited distributed resources, and unpredictable environments. To overcome the above challenges, this thesis aims to …


Reduced Fuel Emissions Through Connected Vehicles And Truck Platooning, Paul D. Brummitt Aug 2022

Reduced Fuel Emissions Through Connected Vehicles And Truck Platooning, Paul D. Brummitt

Electronic Theses and Dissertations

Vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) communication enable the sharing, in real time, of vehicular locations and speeds with other vehicles, traffic signals, and traffic control centers. This shared information can help traffic to better traverse intersections, road segments, and congested neighborhoods, thereby reducing travel times, increasing driver safety, generating data for traffic planning, and reducing vehicular pollution. This study, which focuses on vehicular pollution, used an analysis of data from NREL, BTS, and the EPA to determine that the widespread use of V2V-based truck platooning—the convoying of trucks in close proximity to one another so as to reduce air drag …


A Memory-Centric Customizable Domain-Specific Fpga Overlay For Accelerating Machine Learning Applications, Atiyehsadat Panahi Aug 2022

A Memory-Centric Customizable Domain-Specific Fpga Overlay For Accelerating Machine Learning Applications, Atiyehsadat Panahi

Graduate Theses and Dissertations

Low latency inferencing is of paramount importance to a wide range of real time and userfacing Machine Learning (ML) applications. Field Programmable Gate Arrays (FPGAs) offer unique advantages in delivering low latency as well as energy efficient accelertors for low latency inferencing. Unfortunately, creating machine learning accelerators in FPGAs is not easy, requiring the use of vendor specific CAD tools and low level digital and hardware microarchitecture design knowledge that the majority of ML researchers do not possess. The continued refinement of High Level Synthesis (HLS) tools can reduce but not eliminate the need for hardware-specific design knowledge. The designs …


Deep Learning Based Localization Of Zigbee Interference Sources Using Channel State Information, Dylan Kensler Aug 2022

Deep Learning Based Localization Of Zigbee Interference Sources Using Channel State Information, Dylan Kensler

All Theses

As the field of Internet of Things (IoT) continues to grow, a variety of wireless signals fill the ambient wireless environment. These signals are used for communication, however, recently wireless sensing has been studied, in which these signals can be used to gather information about the surrounding space. With the development of 802.11n, a newer standard of WiFi, more complex information is available about the environment a signal propagates through. This information called Channel State Information (CSI) can be used in wireless sensing. With the help of Deep Learning, this work attempts to generate a fingerprinting technique for localizing a …


An Evaluation Of Wi-Fi 802.11b Backscatter, Anthony Chen Aug 2022

An Evaluation Of Wi-Fi 802.11b Backscatter, Anthony Chen

All Theses

Internet of Things (IoT) devices are in need of low-power communications systems with longevity and reliability. With the use of backscatter technology, IoT devices can communicate at the cost of almost no power and can last for up to a decade. Furthermore, backscatter technology is compatible with everyday wireless signals such as Wi-Fi and Bluetooth, allowing for easy communication without specific hardware constraints. This thesis aims to evaluate a Wi-Fi backscatter system and analyze its ease in triggering off of such ambient signals and sources. The system will utilize Wi-Fi 802.11b as a backscatter source to trigger the backscatter system …


Algorithm Optimization And Hardware Acceleration For Machine Learning Applications On Low-Energy Systems, Jianchi Sun Aug 2022

Algorithm Optimization And Hardware Acceleration For Machine Learning Applications On Low-Energy Systems, Jianchi Sun

All Dissertations

Machine learning (ML) has been extensively employed for strategy optimization, decision making, data classification, etc. While ML shows great triumph in its application field, the increasing complexity of the learning models introduces neoteric challenges to the ML system designs. On the one hand, the applications of ML on resource-restricted terminals, like mobile computing and IoT devices, are prevented by the high computational complexity and memory requirement. On the other hand, the massive parameter quantity for the modern ML models appends extra demands on the system's I/O speed and memory size. This dissertation investigates feasible solutions for those challenges with software-hardware …


Snap : A Software-Defined & Named-Data Oriented Publish-Subscribe Framework For Emerging Wireless Application Systems, Manveen Kaur Aug 2022

Snap : A Software-Defined & Named-Data Oriented Publish-Subscribe Framework For Emerging Wireless Application Systems, Manveen Kaur

All Dissertations

The evolution of Cyber-Physical Systems (CPSs) has given rise to an emergent class of CPSs defined by ad-hoc wireless connectivity, mobility, and resource constraints in computation, memory, communications, and battery power. These systems are expected to fulfill essential roles in critical infrastructure sectors. Vehicular Ad-Hoc Network (VANET) and a swarm of Unmanned Aerial Vehicles (UAV swarm) are examples of such systems. The significant utility of these systems, coupled with their economic viability, is a crucial indicator of their anticipated growth in the future. Typically, the tasks assigned to these systems have strict Quality-of-Service (QoS) requirements and require sensing, perception, and …


Load Modeling And Evaluation Of Leds For Hardware Test Bed Application, Jillian M. Ruff Aug 2022

Load Modeling And Evaluation Of Leds For Hardware Test Bed Application, Jillian M. Ruff

Masters Theses

The lighting industry was revolutionized with the emergence of LED lighting. Over the last 15 years, LED lighting device sales and utilization have grown immensely. The growth and popularity of LEDs is due to improved operation of the device when compared to previous lighting technologies. Efficient performance of the device is critical due to the growth of global energy consumption.

As nonrenewable generation fuel is finite, utilities have begun the transition to renewable energy generation. Generation and distribution systems become inherently complex to comprehend and maintain with incorporation of emerging supply and load technologies. With the unprecedented growth of LED …


Towards A Low-Cost Solution For Gait Analysis Using Millimeter Wave Sensor And Machine Learning, Mubarak A. Alanazi, Abdullah K. Alhazmi, Osama Alsattam, Kara Gnau, Meghan Brown, Shannon Thiel, Kurt Jackson, Vamsy P. Chodavarapu Aug 2022

Towards A Low-Cost Solution For Gait Analysis Using Millimeter Wave Sensor And Machine Learning, Mubarak A. Alanazi, Abdullah K. Alhazmi, Osama Alsattam, Kara Gnau, Meghan Brown, Shannon Thiel, Kurt Jackson, Vamsy P. Chodavarapu

Electrical and Computer Engineering Faculty Publications

Human Activity Recognition (HAR) that includes gait analysis may be useful for various rehabilitation and telemonitoring applications. Current gait analysis methods, such as wearables or cameras, have privacy and operational constraints, especially when used with older adults. Millimeter-Wave (MMW) radar is a promising solution for gait applications because of its low-cost, better privacy, and resilience to ambient light and climate conditions. This paper presents a novel human gait analysis method that combines the micro-Doppler spectrogram and skeletal pose estimation using MMW radar for HAR. In our approach, we used the Texas Instruments IWR6843ISK-ODS MMW radar to obtain the micro-Doppler spectrogram …


Non-Orthogonal Multi-Dimensional Modulation And Nonlinear Distortion Compensation For Beyond 5g, Thakshanth Uthayakumar Jul 2022

Non-Orthogonal Multi-Dimensional Modulation And Nonlinear Distortion Compensation For Beyond 5g, Thakshanth Uthayakumar

Electronic Thesis and Dissertation Repository

The introduction of new advanced technologies such as higher carrier frequencies, ultra-wide bandwidth, and increased transmission rate in 5G to support ever growing quality-of-service (QoS) demands have brought new challenges such as transmitter-receiver pair specific and domain specific non-orthogonality induced among spatial, time-frequency, and delay-doppler domain radio resource blocks and nonlinear distortions induced among multiple-input multiple-output (MIMO) antennas in spatial domain. In such conditions, current communication systems encounter severe performance degradation and incur higher operational cost. Based on this observation, this thesis aims at creating new multi-dimensional modulation techniques and nonlinear predistortion architectures to achieve higher communication performance with less …


Load-Adjusted Prediction For Proactive Resource Management And Video Server Demand Profiling, Obinna Izima, Ruairí De Fréin Jul 2022

Load-Adjusted Prediction For Proactive Resource Management And Video Server Demand Profiling, Obinna Izima, Ruairí De Fréin

Articles

To lower costs associated with providing cloud resources, a network manager would like to estimate how busy the servers will be in the near future. This is a necessary input in deciding whether to scale up or down computing requirements. We formulate the problem of estimating cloud computational requirements as an integrated framework comprising of a learning and an action stage. In the learning stage, we use Machine Learning (ML) models to predict the video Quality of Delivery (QoD) metric for cloud-hosted servers and use the knowledge gained from the process to make resource management decisions during the action stage. …


A Stochastic Spectrum Trading And Resource Allocation Framework For Opportunistic Dynamic Spectrum Access Networks, Mohamed Abdelraheem, Mohammad Mahmoud Abdellatif Jul 2022

A Stochastic Spectrum Trading And Resource Allocation Framework For Opportunistic Dynamic Spectrum Access Networks, Mohamed Abdelraheem, Mohammad Mahmoud Abdellatif

Electrical Engineering

In this article, the spectrum trading problem between primary users and secondary networks is investigated. The secondary network requests multiple channels with the targeted availability to satisfy its users’ demands. Due to the uncertainty about the channels availability, stochastic optimization techniques are adopted to find the optimal set of channels for each secondary network for the lowest cost. Two different constraints on the secondary demand are defined. The first one is when the throughput has to be fully satisfied for a certain percentage of time, and the second one is when the expected value of the throughput has to exceed …