Current Search: Mobile communication systems (x)
View All Items
Pages
- Title
- Augmented reality methods and algorithms for hearing augmentation.
- Creator
- Carmigniani, Julie., Charles E. Schmidt College of Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
While new technologies are often used to facilitate regular people's lives, they often fail to see their potential in helping disabled people. Augmented reality, one of the newest state-of-the-art technologies, offers users the opportunity to add virtual information to their real world surroundings in real time. It also has the potential to not only augment the sense of sight, but also other senses such as hearing. Augmented reality could be used to offer the opportunity to complement users'...
Show moreWhile new technologies are often used to facilitate regular people's lives, they often fail to see their potential in helping disabled people. Augmented reality, one of the newest state-of-the-art technologies, offers users the opportunity to add virtual information to their real world surroundings in real time. It also has the potential to not only augment the sense of sight, but also other senses such as hearing. Augmented reality could be used to offer the opportunity to complement users' missing sense. In this thesis, we study augmented reality technologies, systems and applications, and suggest the future of AR applications. We explain how to integrate augmented reality into iOS applications and propose an augmented reality application for hearing augmentation using an iPad2. We believe mobile devices are the best platform for augmented reality as they are widespread and their computational power is rapidly growing to be able to handle true AR applications.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3332178
- Subject Headings
- Mobile communication systems, Augmented reality, Computer graphics, Virtual reality, Human-computer interaction, User interfaces (Computer systems), Application software, Development
- Format
- Document (PDF)
- Title
- A Study on Random Sum Statistics: Application to Wireless Network Performance Analysis.
- Creator
- Pattaramalai, Suwat, Aalo, Valentine A., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The statistics of random sum is studied and used to evaluate performance metrics in wireless networks. Pertinent wireless network performance measures such as call completion/dropping probabilities and the average number of handovers usually require the probability distributions of the cell dwell time and call holding time; and are therefore not easy to evaluate. The proposed performance evaluation technique requires the moments of the cell dwell time and is given in terms of the Laplace...
Show moreThe statistics of random sum is studied and used to evaluate performance metrics in wireless networks. Pertinent wireless network performance measures such as call completion/dropping probabilities and the average number of handovers usually require the probability distributions of the cell dwell time and call holding time; and are therefore not easy to evaluate. The proposed performance evaluation technique requires the moments of the cell dwell time and is given in terms of the Laplace transform function of the call holding time. Multimedia services that have Weibull and generalized gamma distributed call holding times are investigated. The proposed approximation method uses the compound geometric random sum distribution and requires that the geometric parameter be very small. For applications in which this parameter is not sufficiently small, a result is derived that improves the accuracy (to order of the geometric parameter) of the performance measures evaluated.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012575
- Subject Headings
- Mobile communication systems--Technological innovations, Computer network protocols, Local area networks (Computer networks), Differentiable dynamical systems
- Format
- Document (PDF)
- Title
- Adaptive Routing Protocols for VANET.
- Creator
- Skiles, Joanne, Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A Vehicular Ad-hoc Network (VANET) is a wireless ad-hoc network that provides communications among vehicles with on-board units and between vehicles and nearby roadside units. The success of a VANET relies on the ability of a routing protocol to ful ll the throughput and delivery requirements of any applications operating on the network. Currently, most of the proposed VANET routing protocols focus on urban or highway environments. This dissertation addresses the need for an adaptive routing...
Show moreA Vehicular Ad-hoc Network (VANET) is a wireless ad-hoc network that provides communications among vehicles with on-board units and between vehicles and nearby roadside units. The success of a VANET relies on the ability of a routing protocol to ful ll the throughput and delivery requirements of any applications operating on the network. Currently, most of the proposed VANET routing protocols focus on urban or highway environments. This dissertation addresses the need for an adaptive routing protocol in VANETs which is able to tolerate low and high-density network tra c with little throughput and delay variation. This dissertation proposes three Geographic Ad-hoc On-Demand Distance Vector (GEOADV) protocols. These three GEOADV routing protocols are designed to address the lack of exibility and adaptability in current VANET routing protocols. The rst protocol, GEOADV, is a hybrid geographic routing protocol. The second protocol, GEOADV-P, enhances GEOADV by introducing predictive features. The third protocol, GEOADV-PF improves optimal route selection by utilizing fuzzy logic in addition to GEOADV-P's predictive capabilities. To prove that GEOADV and GEOADV-P are adaptive their performance is demonstrated by both urban and highway simulations. When compared to existing routing protocols, GEOADV and GEOADV-P lead to less average delay and a higher average delivery ratio in various scenarios. These advantages allow GEOADV- P to outperform other routing protocols in low-density networks and prove itself to be an adaptive routing protocol in a VANET environment. GEOADV-PF is introduced to improve GEOADV and GEOADV-P performance in sparser networks. The introduction of fuzzy systems can help with the intrinsic demands for exibility and adaptability necessary for VANETs. An investigation into the impact adaptive beaconing has on the GEOADV protocol is conducted. GEOADV enhanced with an adaptive beacon method is compared against GEOADV with three xed beacon rates. Our simulation results show that the adaptive beaconing scheme is able to reduce routing overhead, increase the average delivery ratio, and decrease the average delay.
Show less - Date Issued
- 2017
- PURL
- http://purl.flvc.org/fau/fd/FA00004926, http://purl.flvc.org/fau/fd/FA00004926
- Subject Headings
- Vehicular ad hoc networks (Computer networks)--Design and construction., Routing protocols (Computer network protocols), Wireless sensor networks., Computer algorithms., Mobile computing., Mobile communication systems--Technological innovations., Wireless communication systems--Technological innovations., Intelligent transportation systems--Mathematical models.
- Format
- Document (PDF)
- Title
- Implementations Of The DTM, DADCQ And SLAB VANET Broadcast Protocols For The Ns-3 Simulator.
- Creator
- Alwakeel, Ahmed M., Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This work presents the implementations of three adaptive broadcast protocols for vehicular ad hoc networks (VANET) using the Network Simulator 3 (Ns-3). Performing real life tests for VANET protocols is very costly and risky, so simulation becomes a viable alternative technique. Ns-3 is one of the most advanced open source network simulators. Yet Ns-3 lacks implementations of broadcast protocols for VANET. We first implement the Distance to Mean (DTM) protocol, which uses the distance to mean...
Show moreThis work presents the implementations of three adaptive broadcast protocols for vehicular ad hoc networks (VANET) using the Network Simulator 3 (Ns-3). Performing real life tests for VANET protocols is very costly and risky, so simulation becomes a viable alternative technique. Ns-3 is one of the most advanced open source network simulators. Yet Ns-3 lacks implementations of broadcast protocols for VANET. We first implement the Distance to Mean (DTM) protocol, which uses the distance to mean to determine if a node should rebroadcast or not. We then implement the Distribution-Adaptive Distance with Channel Quality (DADCQ) protocol, which uses node distribution, channel quality and distance to determine if a node should favor rebroadcasting. The third protocol, Statistical Location-Assisted Broadcast protocol (SLAB), is an improvement of DADCQ which automates the threshold function design using machine learning. Our NS-3 implementations of the three protocols have been validated against their JiST/SWANS implementations.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004565, http://purl.flvc.org/fau/fd/FA00004565
- Subject Headings
- Vehicular ad hoc networks (Computer networks)--Technological innovations., Wireless communication systems--Technological innovations., Mobile communication systems--Technological innovations., Mobile computing., Intelligent transportation systems--Mathematical models., Routing protocols (Computer network protocols)
- Format
- Document (PDF)
- Title
- Effects of Adaptive Antenna Array Beamforming and Power Management with Antenna Element Selection.
- Creator
- Abazari Aghdam, Sajjad, Bagby, Jonathan S., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This research is the array processing help wireless communication techniques to increase the signal accuracy. This technique has an important part of prevalent applications. The wireless communication system, radar, and sonar. Beamforming is one of methods in array processing that filters signals based on their capture time at each element in an array of antennas spatially. Numerous studies in adaptive array processing have been proposed in the last several decades, which are divided in two...
Show moreThis research is the array processing help wireless communication techniques to increase the signal accuracy. This technique has an important part of prevalent applications. The wireless communication system, radar, and sonar. Beamforming is one of methods in array processing that filters signals based on their capture time at each element in an array of antennas spatially. Numerous studies in adaptive array processing have been proposed in the last several decades, which are divided in two parts. The first one related to non-adaptive beamforming techniques and the next one related to digitally adaptive Beamforming methods. The trade-off between computational complexity and performance make them different. In this thesis, we concentrate on the expansion of array processing algorithms in both non-adaptive and adaptive ones with application of beamforming in 4G mobile antenna and radar systems. The conventional and generalized side-lobe canceller (GSC) structures beamforming algorithms were employed with a phase array antenna that changed the phase of arrivals in array antenna with common phased array structure antennas. An eight-element uniform linear array (ULA), consisting of di-pole antennas, represented as the antenna array. An anechoic chamber measures the operation of beamforming algorithms performance. An extended modified Kaiser weighting function is proposed to make a semi-adaptive structure in phased array beamforming. This technique is extended to low complexity functions like hyperbolic cosine and exponential functions. Furthermore, these algorithms are used in GSC beamforming. The side-lobe levels were so lower than other algorithms in conventional beamforming around -10 dB. On the other hand, a uniform linear arrays for smart antenna purposes designed to utilize in implementing and testing the proposed algorithms. In this thesis, performance of smart antenna with rectangular aperture coupled microstrip linear array which experimental investigations carried out for obtaining X-band operation of rectangular microstrip antenna by using aperture coupled feeding technique. Frequency range set at approximately 8.6 to 10.9 GHz, by incorporating frequency range of the antenna resonates for single wideband with an impedance bandwidth of 23%. The enhancement of impedance bandwidth and gain does not affect the nature of broadside radiation characteristics. This thesis describes the design, operation, and realization of the beamforming such as Sidelobe level (SLL) control and null forming array antenna are examined with the prototype. An antenna radiation pattern beam maximum can be simultaneously placed towards the intended user or Signal of interest (SOl), and, ideally nulls can be positioned towards directions of interfering signals or signals not of interest (SNOIs). Finally, we focused on the adaptive digitally algorithms in compact antenna that faces with mutual coupling. The variable step-size normalized lease mean square (VS-NLMS) algorithm is implemented in beamforming. This algorithm utilizes continuous adaptation. The weights are attuned that the final weight vector to the most satisfied result. The gradient vector can be achieved by iterative beamforming algorithm from the available data. This algorithm is compared with LMS, NLMS, VSS-NLMS algorithms, it is determined that the VSS-NLMS algorithm is better performance to other algorithms. Finally, we introduced novel adaptive IP-NNLMS beamformer. This beamformer reaches to faster convergence and lower error floor than the previous adaptive beamformers even at low SNRs in presence of mutual coupling. The experimental results verified the simulation results that the proposed technique has better performance than other algorithms in various situations.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004789, http://purl.flvc.org/fau/fd/FA00004789
- Subject Headings
- Global system for mobile communications., Long-Term Evolution (Telecommunications), Wireless communication systems., Antennas (Electronics), Antenna arrays., Array processors., Time-domain analysis.
- Format
- Document (PDF)
- Title
- An uncertainty-aware reputation system in mobile networks: analysis and applications.
- Creator
- Li, Feng., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Many emerging mobile networks aim to provide wireless network services without relying on any infrastructure. The main challenge in these networks comes from their self-organized and distributed nature. There is an inherent reliance on collaboration among the participants in order to achieve the aimed functionalities. Therefore, establishing and quantifying trust, which is the driving force for collaboration, is important for applications in mobile networks. This dissertation focuses on...
Show moreMany emerging mobile networks aim to provide wireless network services without relying on any infrastructure. The main challenge in these networks comes from their self-organized and distributed nature. There is an inherent reliance on collaboration among the participants in order to achieve the aimed functionalities. Therefore, establishing and quantifying trust, which is the driving force for collaboration, is important for applications in mobile networks. This dissertation focuses on evaluating and quantifying trust to stimulate collaboration in mobile networks, introducing uncertainty concepts and metrics, as well as providing the various analysis and applications of uncertainty-aware reputation systems. Many existing reputation systems sharply divide the trust value into right or wrong, thus ignoring another core dimension of trust: uncertainty. As uncertainty deeply impacts a node's anticipation of others' behavior and decisions during interaction, we include it in the reputation system. Specifically, we use an uncertainty metric to directly reflect a node's confidence in the sufficiency of its past experience, and study how the collection of trust information may affect uncertainty in nodes' opinions. Higher uncertainty leads to higher transaction cost and reduced acceptance of communication. We exploit mobility to efficiently reduce uncertainty and to speed up trust convergence. We also apply the new reputation system to enhance the analysis of the interactions among mobile nodes, and present three sample uncertainty-aware applications. We integrate the uncertainty-aware reputation model with game theory tools, and enhance the analysis on interactions among mobile nodes., Instead of reactively protecting the mobile networks from existing attacks as in the traditional security paradigms, the analysis in this dissertation gives more insights on nodes' rationality in the interaction, which will enable the mechanism design in mobile networks to be security and incentive compatible. Moreover, we present three sample applications, in which we clearly identify the challenges, specifically formalize the problems, and cleverly employ the uncertainty mitigation schemes. These applications show that the uncertainty definition and mitigation schemes can benefit a broad range of applications, including fields such as security, network services, and routing.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/210520
- Subject Headings
- Wireless communication systems, Security measures, Wireless communication systems, Technological innovations, Computer network architectures, Mobile computing, Ad hoc networks (Computer networks), Security measures
- Format
- Document (PDF)
- Title
- Joint TCP congestion control and wireless-link scheduling for mobile Internet applications.
- Creator
- Li, Zhaoquan., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite, which is used by major Internet applications such as World Wide Web, email, remote administration and file transfer. TCP implements scalable and distributed end-to-end congestion control algorithms to share network resources among competing users. TCP was originally designed primarily for wired networks, and it has performed remarkably well as the Internet scaled up by six orders of magnitude...
Show moreThe Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite, which is used by major Internet applications such as World Wide Web, email, remote administration and file transfer. TCP implements scalable and distributed end-to-end congestion control algorithms to share network resources among competing users. TCP was originally designed primarily for wired networks, and it has performed remarkably well as the Internet scaled up by six orders of magnitude in the past decade. However, many studies have shown that the unmodified standard TCP performs poorly in networks with large bandwidth-delay products and/or lossy wireless links. In this thesis, we analyze the problems TCP exhibits in the wireless communication environment, and develop joint TCP congestion control and wireless-link scheduling schemes for mobile applications. ... Different from the existing solutions, the proposed schemes can be asynchronously implemented without message passing among network nodes; thus they are readily deployable with current infrastructure. Moreover, global convergence/stability of the proposed schemes to optimal equilibrium is established using the Lyapunov method in the network fluid model. Simulation results are provided to evaluate the proposed schemes in practical networks.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fcla/dt/3362481
- Subject Headings
- Wireless communication systems, Quality control, Mobile communication systems, Technological innovations, TCP/IP (Computer network protocol), Ad hoc networks (Computer networks), Computer network protocols, Wireless Internet
- Format
- Document (PDF)
- Title
- Secure routing in wireless sensor networks.
- Creator
- Ibriq, Jamil, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This research addresses communication security in the highly constrained wireless sensor environment. The goal of the research is twofold: (1) to develop a key management scheme that provides these constrained systems with the basic security requirements and evaluate its effectiveness in terms of scalability, efficiency, resiliency, connectivity, and flexibility, and (2) to implement this scheme on an appropriate routing platform and measure its efficiency., The proposed key management scheme...
Show moreThis research addresses communication security in the highly constrained wireless sensor environment. The goal of the research is twofold: (1) to develop a key management scheme that provides these constrained systems with the basic security requirements and evaluate its effectiveness in terms of scalability, efficiency, resiliency, connectivity, and flexibility, and (2) to implement this scheme on an appropriate routing platform and measure its efficiency., The proposed key management scheme is called Hierarchical Key Establishment Scheme (HIKES). In HIKES, the base station, acting as the central trust authority, empowers randomly selected sensors to act as local trust authorities, authenticating on its behalf the cluster members and issuing to them all secret keys necessary to secure their communications. HIKES uses a novel key escrow scheme that enables any sensor node selected as a cluster head to generate all the cryptographic keys needed to authenticate other sensors within its cluster. This scheme localizes secret key issuance and reduces the communication cost with the base station. The key escrow scheme also provides the HIKES with as large an addressing mechanism as needed. HIKES also provides a one-step broadcast authentication mechanism. HIKES provides entity authentication to every sensor in the network and is robust against most known attacks. We propose a hierarchical routing mechanism called Secure Hierarchical Energy-Efficient Routing protocol (SHEER). SHEER implements HIKES, which provides the communication security from the inception of the network. SHEER uses a probabilistic broadcast mechanism and a three-level hierarchical clustering architecture to improve the network energy performance and increase its lifetime., Simulation results have shown that HIKES provides an energy-efficient and scalable solution to the key management problem. Cost analysis shows that HIKES is computationally efficient and has low storage requirement. Furthermore, high degree of address flexibility can be achieved in HIKES. Therefore, this scheme meets the desired criteria set forth in this work. Simulation studies also show that SHEER is more energy-efficient and has better scalability than the secure version of LEACH using HIKES.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/FAU/42771
- Subject Headings
- Sensor networks, Security measures, Ad hoc networks (Computer networks), Security measures, Wireless communication systems, Security measures, Wireless communication systems, Technological innovations, Mobile computing
- Format
- Document (PDF)
- Title
- Energy cost evaluation of a secure 802.11 wireless transmission using NS-2.
- Creator
- Martins, Joao Marcelo Galindo., Florida Atlantic University, Mahgoub, Imad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Mobile devices capable of transmitting and receiving data over an 802.11 network have become very common gadgets in our society. Most small mobile devices available in the market today come with integrated 802.11 radio. The extraordinary growth of this technology has also introduced several worries regarding the vulnerabilities that exist by transmitting data over the air. In order to minimize such problems, encryption algorithms were added as an option to be used with 802.11. Unfortunately,...
Show moreMobile devices capable of transmitting and receiving data over an 802.11 network have become very common gadgets in our society. Most small mobile devices available in the market today come with integrated 802.11 radio. The extraordinary growth of this technology has also introduced several worries regarding the vulnerabilities that exist by transmitting data over the air. In order to minimize such problems, encryption algorithms were added as an option to be used with 802.11. Unfortunately, the usage of encryption algorithms also causes a faster depletion of the energy resources available to a mobile device. Depending on the encryption algorithm implementation, a greater number of packets may be required in order to transmit the same amount of data that would be transmitted with less packets over a non-encrypted channel. The objective of this research is to analyze and evaluate the affects that the encryption algorithms used by wireless security protocols can have during data transmission over a wireless medium.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13292
- Subject Headings
- Wireless communication systems--Security measurer--Evaluation, Coding theory--Evaluation, Computer architecture--Standards--Evaluation, IEEE 80211 (Standard), Mobile communication systems--Power supply--Evaluation
- Format
- Document (PDF)
- Title
- Face Processing Using Mobile Devices.
- Creator
- James, Jhanon, Marques, Oge, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Image Processing and Computer Vision solutions have become commodities for software developers, thanks to the growing availability of Application Program- ming Interfaces (APIs) that encapsulate rich functionality, powered by advanced al- gorithms. To understand and create an e cient method to process faces in images by computers, one must understand how the human visual system processes them. Face processing by computers has been an active research area for about 50 years now. Face detection...
Show moreImage Processing and Computer Vision solutions have become commodities for software developers, thanks to the growing availability of Application Program- ming Interfaces (APIs) that encapsulate rich functionality, powered by advanced al- gorithms. To understand and create an e cient method to process faces in images by computers, one must understand how the human visual system processes them. Face processing by computers has been an active research area for about 50 years now. Face detection has become a commodity and is now incorporated into simple devices such as digital cameras and smartphones. An iOS app was implemented in Objective-C using Microsoft Cognitive Ser- vices APIs, as a tool for human vision and face processing research. Experimental work on image compression, upside-down orientation, the Thatcher e ect, negative inversion, high frequency, facial artifacts, caricatures and image degradation were completed on the Radboud and 10k US Adult Faces Databases along with other images.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004770, http://purl.flvc.org/fau/fd/FA00004770
- Subject Headings
- Image processing--Digital techniques., Mobile communication systems., Mobile computing., Artificial intelligence., Human face recognition (Computer science), Computer vision., Optical pattern recognition.
- Format
- Document (PDF)
- Title
- Adaptive power control in 802.11 networks.
- Creator
- Dural, Serkan., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
IEEE 802.11 networks successfully satisfy high data demands and are cheaper compared to cellular networks. Modern mobile computers and phones are equipped with 802.11 and are VoIP capable. Current network designs do not dynamically accommodate changes in the usage. We propose a dynamic power control algorithm that provides greater capacity within a limited geographic region. Most other power algorithms necessitate changes in 802.11 requiring hardware changes. Proposed algorithm only requires...
Show moreIEEE 802.11 networks successfully satisfy high data demands and are cheaper compared to cellular networks. Modern mobile computers and phones are equipped with 802.11 and are VoIP capable. Current network designs do not dynamically accommodate changes in the usage. We propose a dynamic power control algorithm that provides greater capacity within a limited geographic region. Most other power algorithms necessitate changes in 802.11 requiring hardware changes. Proposed algorithm only requires firmware updates to enable dynamic control of APs transmit power. We use earlier studies to determine the limit of the number of users to optimize power. By lowering transmit power of APs with large number of users, we can effectively decrease the cell size. The resulting gap is then covered by dynamically activating additional APs. This also provides greater flexibility and reduces the network planning costs.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/221941
- Subject Headings
- IEEE 802.11 (Standard), Computer networks, Security measures, Computer network protocols, Mobile communication systems, Power supply
- Format
- Document (PDF)
- Title
- Traffic congestion detection using VANET.
- Creator
- Padron, Francisco M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
We propose a distributed, collaborative traffic congestion detection and dissemination system using VANET that makes efficient use of the communication channel, maintains location privacy, and provides drivers with real-time information on traffic congestions over long distances. The system uses vehicles themselves, equipped with simple inexpensive devices, as gatherers and distributors of information without the need for costly road infrastructure such as sensors, cameras or external...
Show moreWe propose a distributed, collaborative traffic congestion detection and dissemination system using VANET that makes efficient use of the communication channel, maintains location privacy, and provides drivers with real-time information on traffic congestions over long distances. The system uses vehicles themselves, equipped with simple inexpensive devices, as gatherers and distributors of information without the need for costly road infrastructure such as sensors, cameras or external communication equipment. Additionally, we present a flexible simulation and visualization framework we designed and developed to validate our system by showing its effectiveness in multiple scenarios and to aid in the research and development of this and future VANET applications.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/186684
- Subject Headings
- Vehicular ad-hoc networks (Computer networks), Traffic congestion, Mathematical models, Mobile communication systems, Evaluation, Traffic congestion, Prevention
- Format
- Document (PDF)
- Title
- An Android approach to web services resource framework.
- Creator
- Garcia-Kunzel, Adriana., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Web services have become increasingly important over the past decades. Versatility and platform independence are just some of their advantages. On the other hand, grid computing enables the efficient distribution of computing resources. Together, they provide a great source of computing power that can be particularly leveraged by mobile devices. Mobile computing enables information creation, processing, storage and communication without location constraints [63], not only improving business'...
Show moreWeb services have become increasingly important over the past decades. Versatility and platform independence are just some of their advantages. On the other hand, grid computing enables the efficient distribution of computing resources. Together, they provide a great source of computing power that can be particularly leveraged by mobile devices. Mobile computing enables information creation, processing, storage and communication without location constraints [63], not only improving business' operational efficiency [63] but actually changing a way of life. However, the convenience of anytime and anywhere communication is counterbalanced by small screens, limited computing power and battery life. Despite these limitations, mobile devices can extend grid functionality by bringing to the mix not only mobile access but sensing capabilities as well, gathering information from their surroundings through built in mechanisms, such as microphone, camera, GPS and even accelerometers. Prior work has already demonstrated the possibility of enabling Web Services Resource Framework (WSRF) access to grid resources from mobile device clients in the WSRF-ME project [39], where a representative Nokia S60 Smartphone application was created on a framework, which extends the JSR-172 functionality to achieve WSRF compliance. In light of today's mobile phone market diversity, this thesis extends the solution proposed by WSRF-ME to non-Java ME phones and to Android devices in particular. Android-based device numbers have grown considerably over the past couple of years despite its recent creation and reduced availability of mature software tools., Therefore, Android's web service capabilities are studied and the original framework is analyzed in order to propose a modified framework version that achieves and documents WSRF compliant communication form Android for the first time. As a case study, an illustrative mobile File Explorer application is developed to match the mod framework' functionality to the original WSRF-ME's use case. An additional case study, the LIGO Monitor application, shows the viability of mobile web services for monitoring purposes in the Laser Interferometer Gravitational Observatory (LIGO) grid environment for the first time. The context that an actual application implementation such as LIGO provides, allows some of the challenges of real mobile grid clients to surface. As a result, the observations made during this development give way to the drafting of a preliminary set of guidelines for Globus service implementation suitable for Android consumption that still remain open for proof in future works.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/2684891
- Subject Headings
- Application software, Development, Mobile communication systems, User interfaces (Computer systems), Computational grids (Computer systems), Data structures (Computer science)
- Format
- Document (PDF)
- Title
- Combined spatial diversity and time equalization for broadband multiple channel underwater acoustic communications.
- Creator
- Skoro Kaskarovska, Violeta, Beaujean, Pierre-Philippe, Florida Atlantic University, College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
High data rate acoustic communications become feasible with the use of communication systems that operate at high frequency. The high frequency acoustic transmission in shallow water endures severe distortion as a result of the extensive intersymbol interference and Doppler shift, caused by the time variable multipath nature of the channel. In this research a Single Input Multiple Output (SIMO) acoustic communication system is developed to improve the reliability of the high data rate...
Show moreHigh data rate acoustic communications become feasible with the use of communication systems that operate at high frequency. The high frequency acoustic transmission in shallow water endures severe distortion as a result of the extensive intersymbol interference and Doppler shift, caused by the time variable multipath nature of the channel. In this research a Single Input Multiple Output (SIMO) acoustic communication system is developed to improve the reliability of the high data rate communications at short range in the shallow water acoustic channel. The proposed SIMO communication system operates at very high frequency and combines spatial diversity and decision feedback equalizer in a multilevel adaptive configuration. The first configuration performs selective combining on the equalized signals from multiple receivers and generates quality feedback parameter for the next level of combining.
Show less - Date Issued
- 2015
- PURL
- http://purl.flvc.org/fau/fd/FA00004411, http://purl.flvc.org/fau/fd/FA00004411
- Subject Headings
- Adaptive signal processing, MIMO systems, Mobile geographic information systems, Signal processing -- Digital techniques, Underwater acoustic telemetry, Underwater acoustics -- Evaluation, Wireless communication systems
- Format
- Document (PDF)
- Title
- Statistical broadcast protocol design for VANET.
- Creator
- Slavik, Michael J., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This work presents the development of the Statistical Location-Assisted Broadcast (SLAB) protocol, a multi-hop wireless broadcast protocol designed for vehicular ad-hoc networking (VANET). Vehicular networking is an important emerging application of wireless communications. Data dissemination applications using VANET promote the ability for vehicles to share information with each other and the wide-area network with the goal of improving navigation, fuel consumption, public safety, and...
Show moreThis work presents the development of the Statistical Location-Assisted Broadcast (SLAB) protocol, a multi-hop wireless broadcast protocol designed for vehicular ad-hoc networking (VANET). Vehicular networking is an important emerging application of wireless communications. Data dissemination applications using VANET promote the ability for vehicles to share information with each other and the wide-area network with the goal of improving navigation, fuel consumption, public safety, and entertainment. A critical component of these data dissemination schemes is the multi-hop wireless broadcast protocol. Multi-hop broadcast protocols for these schemes must reliably deliver broadcast packets to vehicles in a geographically bounded region while consuming as little wireless bandwidth as possible. This work contains substantial research results related to development of multi-hop broadcast protocols for VANET, culminating in the design of SLAB. Many preliminary research and development efforts have been required to arrive at SLAB. First, a high-level wireless broadcast simulation tool called WiBDAT is developed. Next, a manual optimization procedure is proposed to create efficient threshold functions for statistical broadcast protocols. This procedure is then employed to design the Distribution-Adaptive Distance with Channel Quality (DADCQ) broadcast protocol, a preliminary cousin of SLAB. DADCQ is highly adaptive to node density, node spatial distribution pattern, and wireless channel quality in realistic VANET scenarios. However, the manual design process used to create DADCQ has a few deficiencies. In response to these problems, an automated design procedure is created that uses a black-box global optimization algorithm to search for efficient threshold functions that are evaluated using WiBDAT. SLAB is finally designed using this procedure., Expansive simulation results are presented comparing the performance of SLAB to two well-published VANET broadcast protocols, p -persistence and Advanced Adaptive Gossip (AAG), and to DADCQ. The four protocols are evaluated under varying node density and speed on five different road topologies with varying wireless channel fading conditions. The results demonstrate that unlike p-persistence and AAG, SLAB performs well across a very broad range of environmental conditions. Compared to its cousin protocol DADCQ, SLAB achieves similar reachability while using around 30% less wireless bandwidth, highlighting the improvement in the automated design methodology over the manual design.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3172947
- Subject Headings
- Vehicular ad-hoc networks (Computer networks), Design and construction, Vehicular ad-hoc networks (Computer networks), Technological innovations, Wireless communication systems, Technological innovations, Wireless communication systems, Security measures, Mobile communication systems, Evaluation
- Format
- Document (PDF)
- Title
- Smart Broadcast Protocol Design For Vehicular Ad hoc Networks.
- Creator
- Limouchi, Elnaz, Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Multi-hop broadcast is one of the main approaches to disseminate data in VANET. Therefore, it is important to design a reliable multi-hop broadcast protocol, which satis es both reachability and bandwidth consumption requirements. In a dense network, where vehicles are very close to each other, the number of vehicles needed to rebroadcast the message should be small enough to avoid a broad- cast storm, but large enough to meet the reachability requirement. If the network is sparse, a higher...
Show moreMulti-hop broadcast is one of the main approaches to disseminate data in VANET. Therefore, it is important to design a reliable multi-hop broadcast protocol, which satis es both reachability and bandwidth consumption requirements. In a dense network, where vehicles are very close to each other, the number of vehicles needed to rebroadcast the message should be small enough to avoid a broad- cast storm, but large enough to meet the reachability requirement. If the network is sparse, a higher number of vehicles is needed to retransmit to provide a higher reachability level. So, it is obvious that there is a tradeo between reachability and bandwidth consumption. In this work, considering the above mentioned challenges, we design a number of smart broadcast protocols and evaluate their performance in various network den- sity scenarios. We use fuzzy logic technique to determine the quali cation of vehicles to be forwarders, resulting in reachability enhancement. Then we design a band- width e cient fuzzy logic-assisted broadcast protocol which aggressively suppresses the number of retransmissions. We also propose an intelligent hybrid protocol adapts to local network density. In order to avoid packet collisions and enhance reachability, we design a cross layer statistical broadcast protocol, in which the contention window size is adjusted based on the local density information. We look into the multi-hop broadcast problem with an environment based on game theory. In this scenario, vehicles are players and their strategy is either to volunteer and rebroadcast the received message or defect and wait for others to rebroadcast. We introduce a volunteer dilemma game inspired broadcast scheme to estimate the probability of forwarding for the set of potential forwarding vehicles. In this scheme we also introduce a fuzzy logic-based contention window size adjustment system. Finally, based on the estimated spatial distribution of vehicles, we design a transmission range adaptive scheme with a fuzzy logic-assisted contention window size system, in which a bloom lter method is used to mitigate overhead. Extensive experimental work is obtained using simulation tools to evaluate the performance of the proposed schemes. The results con rm the relative advantages of the proposed protocols for di erent density scenarios.
Show less - Date Issued
- 2017
- PURL
- http://purl.flvc.org/fau/fd/FA00004902, http://purl.flvc.org/fau/fd/FA00004902
- Subject Headings
- Vehicular ad hoc networks (Computer networks)--Design and construction., Mobile communication systems., Wireless communication systems--Technological innovations., Wireless sensor networks., Routing protocols (Computer network protocols), Computer algorithms.
- Format
- Document (PDF)
- Title
- Going on the Grid: Secondary Teachers’ Implementation of Mobile Handheld Devices as Instructional Tools.
- Creator
- Berger, Allison S., Weber, Roberta K., Florida Atlantic University, College of Education, Department of Curriculum, Culture, and Educational Inquiry
- Abstract/Description
-
This mixed methods study examined secondary teachers’ technology selfefficacy, their professional development activities regarding mobile handheld devices, and how those activities affect their use of mobile devices as instructional tools. Additionally, this study also explored teachers’ perceptions of other factors that act as barriers or enablers to their use of such devices. The study included 104 middle and high school teachers who taught in a large, urban public school district in the...
Show moreThis mixed methods study examined secondary teachers’ technology selfefficacy, their professional development activities regarding mobile handheld devices, and how those activities affect their use of mobile devices as instructional tools. Additionally, this study also explored teachers’ perceptions of other factors that act as barriers or enablers to their use of such devices. The study included 104 middle and high school teachers who taught in a large, urban public school district in the Southeastern United States. Data were collected through the administration of an electronic survey and semi-structured interviews. The researcher utilized multiple regression and moderator analyses, as well as qualitative analysis of the interview data. The results of the multiple regression analysis revealed teachers’ technologyrelated self-efficacy to be a significant predictor of their instructional use of mobile handheld devices. However, secondary teachers’ level of professional development was found not to contribute significantly to the model. The moderator analysis too revealed professional development to be a nonsignificant factor. The findings of the qualitative phase of the study revealed secondary teachers’ awareness of their varied and fluid technology-related self-efficacy, as well as those factors that modify it. Qualitative data also revealed four categories of essential elements that teachers must have in order to most effectively implement mobile handheld devices within their pedagogy: intellectual capital, emotional capital, social-cultural capital, and technological capital. When lacking, these elements can represent barriers to teachers’ implementation of mobile handheld devices. Targeted professional development and increased funding to minimize the digital divide are recommended to reduce these barriers. The findings of the study inform designers of professional development programs, school and district and secondary teachers, as they are all stakeholders in the process of increasing the effective implementation of mobile handheld devices as instructional tools.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004649, http://purl.flvc.org/fau/fd/FA00004649
- Subject Headings
- Computer assisted instruction, Education -- Effect of technological innovations on, Educational innovations, Educational technology, Internet in education, Mobile communication systems in education, Pocket computers
- Format
- Document (PDF)
- Title
- Investigating Approaches to Media Literacy: An Analysis of Media Literacy Organizations.
- Creator
- Francis, Michael, Hyslop-Margison, Emery, Florida Atlantic University, College of Education, Department of Curriculum, Culture, and Educational Inquiry
- Abstract/Description
-
Media literacy is a competency needed for success in the 21st century yet a clear purpose does not exist that is useful in curriculum design. The purpose of this study was to investigate a combined (eclectic) approach to media literacy education according to selected international media literacy organizations. Determining an eclectic approach from subject area experts will be useful in designing and integrating media literacy curriculum. Methodologically, this study was a qualitative content...
Show moreMedia literacy is a competency needed for success in the 21st century yet a clear purpose does not exist that is useful in curriculum design. The purpose of this study was to investigate a combined (eclectic) approach to media literacy education according to selected international media literacy organizations. Determining an eclectic approach from subject area experts will be useful in designing and integrating media literacy curriculum. Methodologically, this study was a qualitative content analysis and is thematic in nature using a constant comparative method of analysis. Supporting frameworks were established through standards based curriculum development and Schwab’s (1969, 1971, 1973, 1983) ideas of practical deliberation. Purposive heterogeneous sampling was utilized in identifying media literacy organizations from countries considered leaders in media education. This included organizations from Australia, Canada, and the United Kingdom. The primary approaches throughout all identified countries include an arts, critical, literacy, protectionist, and tool approach to media literacy. Through the process of curriculum deliberation, it is necessary to reconcile these approaches into one eclectic approach. Although individual subject areas may focus on one approach, it is important to consider all approaches equally during curriculum deliberation. In comparing an eclectic approach to Florida language arts standards (modeled after the Common Core State Standards), it was discovered that an eclectic approach to media literacy is not present. These standards focus almost exclusively on a literacy approach despite state statue requiring the full integration of media literacy. Language arts standards also remain focused on print media despite acknowledging that students should be prepared for success in the 21st century. This is a media saturated world and every subject should implement media literacy principles and approaches that prepare students to succeed in it.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004592, http://purl.flvc.org/fau/fd/FA00004592
- Subject Headings
- Mass media in education., Media literacy--Curricula., Visual learning., Information technology--Management., Mobile communication systems in education., Creative thinking--Study and teaching.
- Format
- Document (PDF)
- Title
- Simulator and location-aware routing protocol for mobile ad hoc acoustic networks of AUVs.
- Creator
- Carlson, Edward A., College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
Acoustic networks of autonomous underwater vehicles (AUVs) show great promise, but a lack of simulation tools and reliance on protocols originally developed for terrestrial radio networks has hindered progress. This work addresses both issues. A new simulator of underwater communication among AUVs provides accurate communication modeling and flexible vehicle behavior, while a new routing protocol, location-aware source routing (LASR) provides superior network performance. The new simulator...
Show moreAcoustic networks of autonomous underwater vehicles (AUVs) show great promise, but a lack of simulation tools and reliance on protocols originally developed for terrestrial radio networks has hindered progress. This work addresses both issues. A new simulator of underwater communication among AUVs provides accurate communication modeling and flexible vehicle behavior, while a new routing protocol, location-aware source routing (LASR) provides superior network performance. The new simulator was used to evaluate communication without networking, and then with networking using the coding or dynamic source routing (DSR) protocols. The results confirmed that a network was essential to ensure effective fleet-wide communication. The flooding protocol provided extremely reliable communication but with low message volumes. The DSR protocol, a popular routing protocol due to its effectiveness in terrestrial radio networks, proved to be a bad choice in an acoustic environment: in most cases, it suffered from both poor reliability and low message volumes. Due to the high acoustic latency, even moderate vehicle speeds caused the network topology to change faster than DSR could adapt. DSR's reliance on shortest-path routing also proved to be a significant disadvantage. Several DSR optimizations were also tested; most proved to be unhelpful or actually harmful in an underwater acoustic network. LASR was developed to address the problems noted in flooding and DSR. LASR was loosely derived from DSR, most significantly retaining source routes and the reply/request route discovery technique. However, LASR added features which proved, in simulation, to be significant advantages -- two of the most effective were a link/route metric and a node tracking system. To replace shortest-path routing, LASR used the expected transmission count (ETX) metric., This allowed LASR to make more informed routing decisions which greatly increased performance compared to DSR. The node tracking system was the most novel addition: using only implicit communication coupled with the use of time-division multiple access (TDMA), the tracking system provided predicted node locations. These predictions made it possible for LASR to proactively respond to topology changes. In most cases, LASR outperformed flooding and DSR in message delivery reliability and message delivery volume.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/187208
- Subject Headings
- Ad hoc networks (Computer networks), Computer network protocols, Routers (Computer networks), Mobile communication systems, Design and construction, Remote submersibles, Design and construction
- Format
- Document (PDF)
- Title
- Task allocation and path planning for acoustic networks of AUVs.
- Creator
- Deng, Yueyue, College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
Controlling the cooperative behaviors of a fleet of autonomous underwater vehicles in a stochastic, complex environment is a formidable challenge in artificial intelligence. The complexity arises from the challenges of limited navigation and communication capabilities of underwater environment. A time critical cooperative operation by acoustic networks of Multiple Cooperative Vehicles (MCVs) necessitates a robust task allocation mechanism and an efficient path planning model. In this work, we...
Show moreControlling the cooperative behaviors of a fleet of autonomous underwater vehicles in a stochastic, complex environment is a formidable challenge in artificial intelligence. The complexity arises from the challenges of limited navigation and communication capabilities of underwater environment. A time critical cooperative operation by acoustic networks of Multiple Cooperative Vehicles (MCVs) necessitates a robust task allocation mechanism and an efficient path planning model. In this work, we present solutions to investigate two aspects of the cooperative schema for multiple underwater vehicles under realistic underwater acoustic communications: a Location-aided Task Allocation Framework (LAAF) algorithm for multi-target task assignment and a mathematical programming model, the Grid-based Multi-Objective Optimal Programming (GMOOP), for finding an optimal vehicle command decision given a set of objectives and constraints. We demonstrate that, the location-aided auction strategies perform significantly better than the generic auction algorithm in terms of effective task allocation time and information bandwidth requirements. In a typical task assignment scenario, the time needed in the LAAF algorithm is only a fraction compared to the generic auction algorithm. On the other hand; the GMOOP path planning technique provides a unique means for multi-objective tasks by cooperative agents with limited communication capabilities. Under different environmental settings, the GMOOP path planning technique is proved to provide a method with balance of sufficient expressive power and flexibility, and its solution algorithms tractable in terms of mission completion time, with a limited increase of overhead in acoustic communication. Prior to this work, existing multi-objective action selection methods were limited to robust networks where constant communication available., The dynamic task allocation, together with the GMOOP path planning controller, provides a comprehensive solution to the search-classify tasks for cooperative AUVs.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/1927865
- Subject Headings
- Computer network protocols, Routers (Computer networks), Remote submersibles, Design and construction, Mobile communication systems, Design and construction, Ad hoc networks (Computer networks)
- Format
- Document (PDF)