Current Search: info:fedora/islandora:personCModel (x) » Broadsides --Florida --Miami (x) » Department of Computer and Electrical Engineering and Computer Science (x) » Mahgoub, Imad (x)
View All Items
Pages
- Title
- A body area network as a pre-screening surrogate to the polysomnography.
- Creator
- LaFleur, Sheryl, Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Out of 60 million Americans suffering from sleep disorder, an estimated 18 million have sleep apnea. According to the U.S. Department of Health & Human Services, sleep apnea is a chronic condition that disrupts a patient’s sleep. While the annual cost of treating sleep apnea patients in the United States is approximately $3.18 billion (including screening costs) it is estimated that untreated sleep apnea may cause $3.4 billion in additional medical costs. A polysomnography (PSG) is an all...
Show moreOut of 60 million Americans suffering from sleep disorder, an estimated 18 million have sleep apnea. According to the U.S. Department of Health & Human Services, sleep apnea is a chronic condition that disrupts a patient’s sleep. While the annual cost of treating sleep apnea patients in the United States is approximately $3.18 billion (including screening costs) it is estimated that untreated sleep apnea may cause $3.4 billion in additional medical costs. A polysomnography (PSG) is an all-night sleep study which monitors various physical functions during sleep including electrical activity of the heart, brain wave patterns, eye movement, muscle tone, body movements, and breathing. It is currently, the most accurate and sophisticated test for the diagnosis of sleep-disordered breathing (SDB), but also, the most expensive. The cost of an overnight sleep study is estimated between $900 and $3,000. In addition, the PSG is not mobile and has to be administered outside a patient’s home. The Long QT Syndrome (LQTS) is a rhythm disorder that causes erratic (unpredictable) heartbeats. The LQTS has been linked to patients with the most severe form of sleep apnea. If LQTS is left untreated, sudden cardiac death may occur.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004300
- Subject Headings
- Neurophysiology, Nevous system -- Diseases -- Diagnosis, Polysomnography, Sleep -- Physiological aspects, Sleep apnea syndromes -- Diagnosis, Sleep disorders -- Diagnosis
- Format
- Document (PDF)
- Title
- Adaptive hierarchical weighted fair queuing scheduling in WiMAX networks.
- Creator
- AL-Ghanem, Waleed Khalid, Ilyas, Mohammad, Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The growing demand for faster connection to the Internet service and wireless multimedia applications has motivated the development of broadband wireless access technologies in recent years. WiMAX has enabled convergence of mobile and fixed broadband networks through a common wide-area radio-access technology and flexible network architecture. Scheduling is a fundamental component in resource management in WiMAX networks and plays the main role in meeting QoS requirements such as delay,...
Show moreThe growing demand for faster connection to the Internet service and wireless multimedia applications has motivated the development of broadband wireless access technologies in recent years. WiMAX has enabled convergence of mobile and fixed broadband networks through a common wide-area radio-access technology and flexible network architecture. Scheduling is a fundamental component in resource management in WiMAX networks and plays the main role in meeting QoS requirements such as delay, throughput and packet loss for different classes of service. In this dissertation work, the performance of uplink schedulers at the fixed WiMAX MAC layer has been considered, we proposed an Adaptive Hierarchical Weighted Fair Queuing Scheduling algorithm, the new scheduling algorithm adapts to changes in traffic, at the same time; it is able to heuristically enhance the performance of WiMAX network under most circumstances. The heuristic nature of this scheduling algorithm enables the MAC layer to meet the QoS requirements of the users. The performance of this adaptive WiMAX Uplink algorithm has been evaluated by simulation using MATLAB. Results indicate that the algorithm is efficient in scheduling the Base Stations’ traffic loads, and improves QoS. The utilization of relay stations is studied and simulation results are compared with the case without using relay stations. The results show that the proposed scheduling algorithm improves Quality of Service of WiMAX system.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004178, http://purl.flvc.org/fau/fd/FA00004178
- Subject Headings
- Computer networks -- Technological innovations, Optical fiber communication, Wireless communication systems -- Technological innovations, Wireless metropolitan area networks -- Security measures
- Format
- Document (PDF)
- Title
- Adaptive on-demand routing protocol for mobile ad hoc networks.
- Creator
- Omer, Ismail., Florida Atlantic University, Mahgoub, Imad, Ilyas, Mohammad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Existing MANET routing protocols can be classified into three categories: On-demand, Proactive, and Proactive-On-demand hybrid protocols. This dissertation presents a novel hybrid MANET routing protocol, Adaptive On-demand MANET Routing (AOMAR) protocol. AOMAR borrowed the concepts of temporal location updates in operating systems and cache memories to reconstruct broken routes. Each route entry in a mobile host will have a reference field that is set to indicate whether the route is used...
Show moreExisting MANET routing protocols can be classified into three categories: On-demand, Proactive, and Proactive-On-demand hybrid protocols. This dissertation presents a novel hybrid MANET routing protocol, Adaptive On-demand MANET Routing (AOMAR) protocol. AOMAR borrowed the concepts of temporal location updates in operating systems and cache memories to reconstruct broken routes. Each route entry in a mobile host will have a reference field that is set to indicate whether the route is used within a certain period of time called refresh time. Using the refresh time parameter and the route reference field, AOMAR behavior can be controlled to behave as pure On-demand, Adaptive, or history related Proactive protocol. The three versions of AOMAR, On-demand, Adaptive and Proactive, have been simulated using different network sizes, loads and mobility patterns. Three performance metrics---throughput, delay and overhead---are collected. The results show that AOMAR on-demand has the same pattern of results when compared with other exiting on-demand protocols. On-demand AOMAR shows better performance when compared to Adaptive AOMAR for simulation sessions with uniform workloads. On the other hand Adaptive AOMAR outperforms On-demand AOMAR for simulation sessions with non-uniform workloads. Proactive AOMAR reconstructs recently used routes that have broken. Therefore, its routing overhead results change with the change of the network loads and mobility rates. This is not the case for traditional proactive protocols. Proactive AOMAR has lower control overhead and saves the bandwidth when compared with traditional existing proactive routing protocols. In addition to developing and simulating AOMAR, a new mobility model is proposed. Synchronized Random Direction Model of Motion with Constant Speed (SRDMCS) is a model that is suitable to emulate objects that move in random directions with a constant speed and within a certain area of movement. A new formula, Movement Related Update (MRU), is proposed and implemented. In MRU, the refresh period parameter value is linked to the network mobility level. Using MRU in the simulation gives AOMAR a third dimension such that the protocol not only adapts with how frequently the routes are used and how frequently they are broken, but also with how dynamic the network is.
Show less - Date Issued
- 2001
- PURL
- http://purl.flvc.org/fcla/dt/11972
- Subject Headings
- Mobile computing, Computer network protocols, Wireless communication systems
- Format
- Document (PDF)
- Title
- Adaptive Routing Protocols for VANET.
- Creator
- Skiles, Joanne, Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A Vehicular Ad-hoc Network (VANET) is a wireless ad-hoc network that provides communications among vehicles with on-board units and between vehicles and nearby roadside units. The success of a VANET relies on the ability of a routing protocol to ful ll the throughput and delivery requirements of any applications operating on the network. Currently, most of the proposed VANET routing protocols focus on urban or highway environments. This dissertation addresses the need for an adaptive routing...
Show moreA Vehicular Ad-hoc Network (VANET) is a wireless ad-hoc network that provides communications among vehicles with on-board units and between vehicles and nearby roadside units. The success of a VANET relies on the ability of a routing protocol to ful ll the throughput and delivery requirements of any applications operating on the network. Currently, most of the proposed VANET routing protocols focus on urban or highway environments. This dissertation addresses the need for an adaptive routing protocol in VANETs which is able to tolerate low and high-density network tra c with little throughput and delay variation. This dissertation proposes three Geographic Ad-hoc On-Demand Distance Vector (GEOADV) protocols. These three GEOADV routing protocols are designed to address the lack of exibility and adaptability in current VANET routing protocols. The rst protocol, GEOADV, is a hybrid geographic routing protocol. The second protocol, GEOADV-P, enhances GEOADV by introducing predictive features. The third protocol, GEOADV-PF improves optimal route selection by utilizing fuzzy logic in addition to GEOADV-P's predictive capabilities. To prove that GEOADV and GEOADV-P are adaptive their performance is demonstrated by both urban and highway simulations. When compared to existing routing protocols, GEOADV and GEOADV-P lead to less average delay and a higher average delivery ratio in various scenarios. These advantages allow GEOADV- P to outperform other routing protocols in low-density networks and prove itself to be an adaptive routing protocol in a VANET environment. GEOADV-PF is introduced to improve GEOADV and GEOADV-P performance in sparser networks. The introduction of fuzzy systems can help with the intrinsic demands for exibility and adaptability necessary for VANETs. An investigation into the impact adaptive beaconing has on the GEOADV protocol is conducted. GEOADV enhanced with an adaptive beacon method is compared against GEOADV with three xed beacon rates. Our simulation results show that the adaptive beaconing scheme is able to reduce routing overhead, increase the average delivery ratio, and decrease the average delay.
Show less - Date Issued
- 2017
- PURL
- http://purl.flvc.org/fau/fd/FA00004926, http://purl.flvc.org/fau/fd/FA00004926
- Subject Headings
- Vehicular ad hoc networks (Computer networks)--Design and construction., Routing protocols (Computer network protocols), Wireless sensor networks., Computer algorithms., Mobile computing., Mobile communication systems--Technological innovations., Wireless communication systems--Technological innovations., Intelligent transportation systems--Mathematical models.
- Format
- Document (PDF)
- Title
- An Ant Inspired Dynamic Traffic Assignment for VANETs: Early Notification of Traffic Congestion and Traffic Incidents.
- Creator
- Arellano, Wilmer, Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Vehicular Ad hoc NETworks (VANETs) are a subclass of Mobile Ad hoc NETworks and represent a relatively new and very active field of research. VANETs will enable in the near future applications that will dramatically improve roadway safety and traffic efficiency. There is a need to increase traffic efficiency as the gap between the traveled and the physical lane miles keeps increasing. The Dynamic Traffic Assignment problem tries to dynamically distribute vehicles efficiently on the road...
Show moreVehicular Ad hoc NETworks (VANETs) are a subclass of Mobile Ad hoc NETworks and represent a relatively new and very active field of research. VANETs will enable in the near future applications that will dramatically improve roadway safety and traffic efficiency. There is a need to increase traffic efficiency as the gap between the traveled and the physical lane miles keeps increasing. The Dynamic Traffic Assignment problem tries to dynamically distribute vehicles efficiently on the road network and in accordance with their origins and destinations. We present a novel dynamic decentralized and infrastructure-less algorithm to alleviate traffic congestions on road networks and to fill the void left by current algorithms which are either static, centralized, or require infrastructure. The algorithm follows an online approach that seeks stochastic user equilibrium and assigns traffic as it evolves in real time, without prior knowledge of the traffic demand or the schedule of the cars that will enter the road network in the future. The Reverse Online Algorithm for the Dynamic Traffic Assignment inspired by Ant Colony Optimization for VANETs follows a metaheuristic approach that uses reports from other vehicles to update the vehicle’s perceived view of the road network and change route if necessary. To alleviate the broadcast storm spontaneous clusters are created around traffic incidents and a threshold system based on the level of congestion is used to limit the number of incidents to be reported. Simulation results for the algorithm show a great improvement on travel time over routing based on shortest distance. As the VANET transceivers have a limited range, that would limit messages to reach at most 1,000 meters, we present a modified version of this algorithm that uses a rebroadcasting scheme. This rebroadcasting scheme has been successfully tested on roadways with segments of up to 4,000 meters. This is accomplished for the case of traffic flowing in a single direction on the roads. It is anticipated that future simulations will show further improvement when traffic in the other direction is introduced and vehicles travelling in that direction are allowed to use a store carry and forward mechanism.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004566, http://purl.flvc.org/fau/fd/FA00004566
- Subject Headings
- Vehicular ad hoc networks (Computer networks)--Technological innovations., Routing protocols (Computer network protocols), Artificial intelligence., Intelligent transportation systems., Intelligent control systems., Mobile computing., Computer algorithms., Combinatorial optimization.
- Format
- Document (PDF)
- Title
- An implementation of the IEEE 1609.4 wave standard for use in a vehicular networking testbed.
- Creator
- Kuffermann, Kyle, Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
We present an implementation of the IEEE WAVE (Wireless Access in Vehicular Environments) 1609.4 standard, Multichannel Operation. This implementation provides concurrent access to a control channel and one or more service channels, enabling vehicles to communicate among each other on multiple service channels while still being able to receive urgent and control information on the control channel. Also included is functionality that provides over-the-air timing synchronization, allowing...
Show moreWe present an implementation of the IEEE WAVE (Wireless Access in Vehicular Environments) 1609.4 standard, Multichannel Operation. This implementation provides concurrent access to a control channel and one or more service channels, enabling vehicles to communicate among each other on multiple service channels while still being able to receive urgent and control information on the control channel. Also included is functionality that provides over-the-air timing synchronization, allowing participation in alternating channel access in the absence of a reliable time source. Our implementation runs on embedded Linux and is built on top of IEEE 802.11p, as well as a customized device driver. This implementation will serve as a key compo- nent in our IEEE 1609-compliant Vehicular Multi-technology Communication Device (VMCD) that is being developed for a VANET testbed under the Smart Drive initiative, supported by the National Science Foundation.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004299, http://purl.flvc.org/fau/fd/FA00004299
- Subject Headings
- Vehicular ad hoc networks (Computer networks)., Wireless sensor networks., Wireless communication systems., Wireless LANs., Linux., Expert systems (Computer science), Operating systems (Computers)
- Format
- Document (PDF)
- Title
- Analysis of a cluster-based architecture for hypercube multicomputers.
- Creator
- Obeng, Morrison Stephen., Florida Atlantic University, Mahgoub, Imad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In this dissertation, we propose and analyze a cluster-based hypercube architecture in which each node of the hypercube is furnished with a cluster of n processors connected through a small crossbar switch with n memory modules. Topological analysis of the cluster-based hypercube architecture shows that it reduces the complexity of the basic hypercube architecture by reducing the diameter, the degree of a node and the number of links in the hypercube. The proposed architecture uses the higher...
Show moreIn this dissertation, we propose and analyze a cluster-based hypercube architecture in which each node of the hypercube is furnished with a cluster of n processors connected through a small crossbar switch with n memory modules. Topological analysis of the cluster-based hypercube architecture shows that it reduces the complexity of the basic hypercube architecture by reducing the diameter, the degree of a node and the number of links in the hypercube. The proposed architecture uses the higher processing power furnished by the cluster of execution processors in each node to address the needs of computation-intensive parallel application programs. It provides a smaller dimension hypercube with the same number of execution processors as a higher dimension conventional hypercube architecture. This scheme can be extended to meshes and other architectures. Mathematical analysis of the parallel simplex and parallel Gaussian elimination algorithms executing on the cluster-based hypercube show the order of complexity of executing an n x n matrix problem on the cluster-based hypercube using parallel simplex algorithm to be O(n^2) and that of the parallel Gaussian elimination algorithm to be O(n^3). The timing analysis derived from the mathematical analysis results indicate that for the same number of processors in the cluster-based hypercube system as the conventional hypercube system, the computation to communication ratio of the cluster-based hypercube executing a matrix problem by parallel simplex algorithm increases when the number of nodes of the cluster-based hypercube is decreased. Self-driven simulations were developed to run parallel simplex and parallel Gaussian elimination algorithms on the proposed cluster-based hypercube architecture and on the Intel Personal Supercomputer (iPSC/860), which is a conventional hypercube. The simulation results show a response time performance improvement of up to 30% in favor of the cluster-based hypercube. We also observe that for increased link delays, the performance gap increases significantly in favor of the cluster-based hypercube architecture when both the cluster-based hypercube and the Intel iPSC/860, a conventional hypercube, execute the same parallel simplex and Gaussian elimination algorithms.
Show less - Date Issued
- 1995
- PURL
- http://purl.flvc.org/fcla/dt/12435
- Subject Headings
- Computer architecture, Cluster analysis--Computer programs, Hypercube networks (Computer networks), Parallel computers
- Format
- Document (PDF)
- Title
- Analysis of a novel class of fault-tolerant multistage interconnection networks.
- Creator
- Huang, Chien-Jen, Florida Atlantic University, Mahgoub, Imad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Multistage interconnection networks (MINs) have become an important subset of the interconnection networks which are used to communicate between processors and memory modules for large scale multiprocessor systems. Unfortunately, unique path MINs lack fault tolerance. In this dissertation, a novel scheme for constructing fault-tolerant MINs is presented. We first partition the given MINs into even sized partitions and show some fault-tolerant properties of the partitioned MINs. Using three...
Show moreMultistage interconnection networks (MINs) have become an important subset of the interconnection networks which are used to communicate between processors and memory modules for large scale multiprocessor systems. Unfortunately, unique path MINs lack fault tolerance. In this dissertation, a novel scheme for constructing fault-tolerant MINs is presented. We first partition the given MINs into even sized partitions and show some fault-tolerant properties of the partitioned MINs. Using three stages of multiplexers/demultiplexers, an augmenting scheme which takes advantage of locality in program execution is then proposed to further improve the fault-tolerant ability and performance of the partitioned MINs. The topological characteristics of augmented partitioned multistage interconnection networks (APMINs) are analyzed. Based on switch fault model, simulations have been carried out to evaluate the full access and dynamic full access capabilities of APMINs. The results show that the proposed scheme significantly improves the fault-tolerant capability of MINs. Cost effectiveness of this new scheme in terms of cost, full access, dynamic full access, locality, and average path length has also been evaluated. It has been shown that this new scheme is more cost effective for high switch failure rate and/or large size networks. Analytical modeling techniques have been developed to evaluate the performance of AP-Omega network and AP-Omega network-based multiprocessor systems. The performance of Omega, modified Omega, and AP-Omega networks in terms of processor utilization and processor waiting time have been compared and the results show that the new scheme indeed, improves the performance both in network level and in system level. Finally, based on the reliability of serial/parallel network components, models for evaluating the terminal reliability and the network reliability of AP-Omega network using upper and lower bound measures have also been proposed and the results show that applying locality improve APMINs' reliability.
Show less - Date Issued
- 1993
- PURL
- http://purl.flvc.org/fcla/dt/12345
- Subject Headings
- Integratged circuits--Very large scale integration, Fault-tolerant computing, Computer architecture, Parallel processing (Electronic computers)
- Format
- Document (PDF)
- Title
- Certificate authentication security and the preservation of privacy in wireless access in vehicular environment (wave).
- Creator
- Kemp, Clifford Allen, Mahgoub, Imad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Future vehicles will exchange safety-critical information messages wirelessly with other vehicles on the road. We must provide secure mechanisms to validate the authenticity and integrity of these messages. The IEEE Standard 1609.2 defines the format of secure messages and identifies security algorithms and mechanism for use in Wireless Access in Vehicular Environment (WAVE). We propose an organizational structure for Central Management Entities (CMEs) to address these goals and functional...
Show moreFuture vehicles will exchange safety-critical information messages wirelessly with other vehicles on the road. We must provide secure mechanisms to validate the authenticity and integrity of these messages. The IEEE Standard 1609.2 defines the format of secure messages and identifies security algorithms and mechanism for use in Wireless Access in Vehicular Environment (WAVE). We propose an organizational structure for Central Management Entities (CMEs) to address these goals and functional requirements, and to balance the security of communications with protection of user privacy. A concern in vehicular communications is the privacy of vehicle owners. Privacy must be preserved and the user related information has to be protected from unauthorized access, while the authorities can trace the sender when there is a dispute. This thesis also presents a field operational test using IEEE 802.11a hardware. Vehicular test infrastructures can then be established in a cost effective manner to help support VANET research.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fau/fd/FA00004253
- Format
- Document (PDF)
- Title
- Context-aware hybrid data dissemination in vehicular networks.
- Creator
- Rathod, Monika M., Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This work presents the development of the Context-Aware Hybrid Data Dissemination protocol for vehicular networks. The importance of developing vehicular networking data dissemination protocols is exemplified by the recent announcement by the U.S. Department of Transportation (DOT) National Highway Traffic Safety Administration (NHTSA) to enable vehicle-to-vehicle (V2V) communication technology. With emphasis on safety, other useful applications of V2V communication include but are not...
Show moreThis work presents the development of the Context-Aware Hybrid Data Dissemination protocol for vehicular networks. The importance of developing vehicular networking data dissemination protocols is exemplified by the recent announcement by the U.S. Department of Transportation (DOT) National Highway Traffic Safety Administration (NHTSA) to enable vehicle-to-vehicle (V2V) communication technology. With emphasis on safety, other useful applications of V2V communication include but are not limited to traffic and routing, weather, construction and road hazard alerts, as well as advertisement and entertainment. The core of V2V communication relies on the efficient dispersion of relevant data through wireless broadcast protocols for these varied applications. The challenges of vehicular networks demand an adaptive broadcast protocol capable of handling diverse applications. This research work illustrates the design of a wireless broadcast protocol that is context-aware and adaptive to vehicular environments taking into consideration vehicle density, road topology, and type of data to be disseminated. The context-aware hybrid data dissemination scheme combines store-and-forward and multi-hop broadcasts, capitalizing on the strengths of both these categories and mitigates the weaknesses to deliver data with maximum efficiency to a widest possible reach. This protocol is designed to work in both urban and highway mobility models. The behavior and performance of the hybrid data dissemination scheme is studied by varying the broadcast zone radius, aggregation ratio, data message size and frequency of the broadcast messages. Optimal parameters are determined and the protocol is then formulated to become adaptive to node density by keeping the field size constant and increasing the number of nodes. Adding message priority levels to propagate safety messages faster and farther than non-safety related messages is the next context we add to our adaptive protocol. We dynamically set the broadcast region to use multi-hop which has lower latency to propagate safety-related messages. Extensive simulation results have been obtained using realistic vehicular network scenarios. Results show that Context-Aware Hybrid Data Dissemination Protocol benefits from the low latency characteristics of multi-hop broadcast and low bandwidth consumption of store-and-forward. The protocol is adaptive to both urban and highway mobility models.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004152, http://purl.flvc.org/fau/fd/FA00004152
- Subject Headings
- Context aware computing, Convergence (Telecommunication), Intelligent transportation systems, Internetworking (Telecommunication), Routing (Computer network management), Routing protocols (Computer network protocols), Vehicular ad hoc networks (Computer networks)
- Format
- Document (PDF)
- Title
- Cross-Layer Network Design using Controllers.
- Creator
- Slavik, Michael J., Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A cross-layer design architecture featuring a new network stack component called a controller is presented. The controller takes system status information from the protocol components and uses it to tune the behavior of the network stack to a given performance objective. A controller design strategy using a machine learning algorithm and a simulator is proposed, implemented, and tested. Results show the architecture and design strategy are capable of producing a network stack that outperforms...
Show moreA cross-layer design architecture featuring a new network stack component called a controller is presented. The controller takes system status information from the protocol components and uses it to tune the behavior of the network stack to a given performance objective. A controller design strategy using a machine learning algorithm and a simulator is proposed, implemented, and tested. Results show the architecture and design strategy are capable of producing a network stack that outperforms the existing protocol stack for arbitrary performance objectives. The techniques presented give network designers the flexibility to easily tune the performance of their networks to suit their application. This cognitive networking architecture has great potential for high performance in future wireless networks.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012555
- Subject Headings
- Computer architecture, Wireless communication systems--Design and construction, Evolutionary programming (Computer science), Mathematical optimization
- Format
- Document (PDF)
- Title
- Design and implementation of a test bed for proxy caching algorithms.
- Creator
- Sareen, Ashi., Florida Atlantic University, Mahgoub, Imad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
With the growth of the Internet and increasing, network traffic, latency has become a major issue. On the entrepreneur side bandwidth is a bottleneck. Web Caching helps to resolve both these issues. In recent years, many proxy caching algorithms and benchmarks to test them have been implemented. In this thesis, some of the existing proxy caching algorithms and related benchmarks have been examined. It has been observed that most of the benchmarks do not provide the developer/entrepreneur a...
Show moreWith the growth of the Internet and increasing, network traffic, latency has become a major issue. On the entrepreneur side bandwidth is a bottleneck. Web Caching helps to resolve both these issues. In recent years, many proxy caching algorithms and benchmarks to test them have been implemented. In this thesis, some of the existing proxy caching algorithms and related benchmarks have been examined. It has been observed that most of the benchmarks do not provide the developer/entrepreneur a customized environment to debug or deploy a proxy caching algorithm. Hence, this thesis implements a platform independent, easily extensible Test Bed that can be tailored to satisfy the needs of both the developers and the entrepreneurs. The thesis also implements two standard caching algorithms. To illustrate the application of the Test Bed, these algorithms are run on the Test Bed and results obtained are analyzed. Some of the results are then compared to existing behavioral patterns.
Show less - Date Issued
- 2001
- PURL
- http://purl.flvc.org/fcla/dt/12857
- Subject Headings
- Cache memory, Web servers
- Format
- Document (PDF)
- Title
- Design and implementation of an energy model for JiST/SWANS simulator.
- Creator
- Sutaria, Trishla., Florida Atlantic University, Mahgoub, Imad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Wireless sensor networks are one of the first real world examples of pervasive computing, the notion that small, smart, and cheap sensing and computing devices will eventually permeate the environment. Sensor networks consist of very large number of energy constrained nodes and to properly evaluate these networks a scalable ad-hoc wireless network simulator with an energy model is needed. Since most of the existing simulators have been designed for ad-hoc network with low scalability they can...
Show moreWireless sensor networks are one of the first real world examples of pervasive computing, the notion that small, smart, and cheap sensing and computing devices will eventually permeate the environment. Sensor networks consist of very large number of energy constrained nodes and to properly evaluate these networks a scalable ad-hoc wireless network simulator with an energy model is needed. Since most of the existing simulators have been designed for ad-hoc network with low scalability they can not be used to accurately simulate sensor networks. The JiST/SWANS simulator is one of the newer simulators that has been developed by Cornell University for simulating ad-hoc networks and is highly scalable which makes it appropriate for use in evaluating sensor networks. Since this simulator lack energy model our objective is to design and implement an energy model for JiST/SWANS so that it can adequately and accurately calculate the amount of energy consumption in the simulation of sensor networks.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13275
- Subject Headings
- Sensor networks, Wireless LANs, Computer network protocols, Wireless communication systems
- Format
- Document (PDF)
- Title
- Energy cost evaluation of a secure 802.11 wireless transmission using NS-2.
- Creator
- Martins, Joao Marcelo Galindo., Florida Atlantic University, Mahgoub, Imad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Mobile devices capable of transmitting and receiving data over an 802.11 network have become very common gadgets in our society. Most small mobile devices available in the market today come with integrated 802.11 radio. The extraordinary growth of this technology has also introduced several worries regarding the vulnerabilities that exist by transmitting data over the air. In order to minimize such problems, encryption algorithms were added as an option to be used with 802.11. Unfortunately,...
Show moreMobile devices capable of transmitting and receiving data over an 802.11 network have become very common gadgets in our society. Most small mobile devices available in the market today come with integrated 802.11 radio. The extraordinary growth of this technology has also introduced several worries regarding the vulnerabilities that exist by transmitting data over the air. In order to minimize such problems, encryption algorithms were added as an option to be used with 802.11. Unfortunately, the usage of encryption algorithms also causes a faster depletion of the energy resources available to a mobile device. Depending on the encryption algorithm implementation, a greater number of packets may be required in order to transmit the same amount of data that would be transmitted with less packets over a non-encrypted channel. The objective of this research is to analyze and evaluate the affects that the encryption algorithms used by wireless security protocols can have during data transmission over a wireless medium.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13292
- Subject Headings
- Wireless communication systems--Security measurer--Evaluation, Coding theory--Evaluation, Computer architecture--Standards--Evaluation, IEEE 80211 (Standard), Mobile communication systems--Power supply--Evaluation
- Format
- Document (PDF)
- Title
- Evaluation of usage scenarios in Mobile People Architecture.
- Creator
- Shang, Hongtao., Florida Atlantic University, Mahgoub, Imad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
With the explosive growth of the Internet and other types of networks, such as cell phones and pager networks, more and more people expect to communicate with each other personally anywhere and at anytime. This thesis studies a new architecture Mobile People Architecture (MPA) proposed by MosquitoNet research group at Stanford University, which is designed to put people, rather than the devices that people use, at the endpoints of communication session. Three usage scenarios in MPA are...
Show moreWith the explosive growth of the Internet and other types of networks, such as cell phones and pager networks, more and more people expect to communicate with each other personally anywhere and at anytime. This thesis studies a new architecture Mobile People Architecture (MPA) proposed by MosquitoNet research group at Stanford University, which is designed to put people, rather than the devices that people use, at the endpoints of communication session. Three usage scenarios in MPA are simulated using SES/Workbench. The Response Time and the Update Cost are used to evaluate the performance of above scenarios. The advantages and disadvantages of different scenarios are also analyzed and discussed in this thesis.
Show less - Date Issued
- 1999
- PURL
- http://purl.flvc.org/fcla/dt/15742
- Subject Headings
- TCP/IP (Computer network protocol), Mobile computing, Internetworking (Telecommunication)
- Format
- Document (PDF)
- Title
- Geographic Routing Reliability Enhancement in Urban Vehicular Ad Hoc Networks.
- Creator
- Alzamzami, Ohoud, Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Vehicular Ad hoc Networks (VANETs) have the potential to enable various kinds of applications aiming at improving road safety and transportation efficiency. These applications require uni-cast routing, which remains a significant challenge due to VANETs characteristics. Given VANET dynamic topology, geographic routing protocols are considered the most suitable for such network due to their scalability and low overhead. However, the optimal selection of next-hop nodes in geographic routing is...
Show moreVehicular Ad hoc Networks (VANETs) have the potential to enable various kinds of applications aiming at improving road safety and transportation efficiency. These applications require uni-cast routing, which remains a significant challenge due to VANETs characteristics. Given VANET dynamic topology, geographic routing protocols are considered the most suitable for such network due to their scalability and low overhead. However, the optimal selection of next-hop nodes in geographic routing is a challenging problem where the routing performance is highly affected by the variable link quality and bandwidth availability. In this dissertation, a number of enhancements to improve geographic routing reliability in VANETs are proposed. To minimize packet losses, the direction and link quality of next-hop nodes using the Expected Transmission Count (ETX) are considered to select links with low loss ratios. To consider the available bandwidth, a cross-layer enchantment of geographic routing, which can select more reliable links and quickly react to varying nodes load and channel conditions, is proposed. We present a novel model of the dynamic behavior of a wireless link. It considers the loss ratio on a link, in addition to transmission and queuing delays, and it takes into account the physical interference e ect on the link. Then, a novel geographic routing protocol based on fuzzy logic systems, which help in coordinating di erent contradicting metrics, is proposed. Multiple metrics related to vehicles' position, direction, link quality and achievable throughput are combined using fuzzy rules in order to select the more reliable next-hop nodes for packet forwarding. Finally, we propose a novel link utility aware geographic routing protocol, which extends the local view of the network topology using two-hop neighbor information. We present our model of link utility, which measures the usefulness of a two-hop neighbor link by considering its minimum residual bandwidth and packet loss rate. The proposed protocol can react appropriately to increased network tra c and to frequent topology dis-connectivity in VANETs. To evaluate the performance of the proposed protocols, extensive simulation experiments are performed using network and urban mobility simulation tools. Results confirm the advantages of the proposed schemes in increased traffic loads and network density.
Show less - Date Issued
- 2018
- PURL
- http://purl.flvc.org/fau/fd/FA00013037
- Subject Headings
- Vehicular ad hoc networks (Computer networks), Traffic safety, Routing protocols (Computer network protocols), Fuzzy logic
- Format
- Document (PDF)
- Title
- Image detection for a customizable user interface.
- Creator
- Polimeni, Joseph C., Florida Atlantic University, Mahgoub, Imad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A user interface that has objects familiar to the user will be easier to use. In this thesis, a user interface that is customizable to any color bitmap is proposed. The most significant problem with this approach is the problem of finding objects in a color bitmap. A solution to the problem is proposed and evaluated using an analysis tool, developed for this thesis, called Workbench. Current image detection methods are evaluated and compared to the solution proposed using Workbench. The...
Show moreA user interface that has objects familiar to the user will be easier to use. In this thesis, a user interface that is customizable to any color bitmap is proposed. The most significant problem with this approach is the problem of finding objects in a color bitmap. A solution to the problem is proposed and evaluated using an analysis tool, developed for this thesis, called Workbench. Current image detection methods are evaluated and compared to the solution proposed using Workbench. The proposed solution is then evaluated for the YIQ and HSI color mappings. The results of this investigation and recommendations for future work is proposed.
Show less - Date Issued
- 1995
- PURL
- http://purl.flvc.org/fcla/dt/15207
- Subject Headings
- User interfaces (Computer systems), Human-computer interaction, Image processing--Digital techniques
- Format
- Document (PDF)
- Title
- Implementation of a VANET Geo-Fence Based Adaptive Traffic Light Control Scheme.
- Creator
- Edwards, Alain D., Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In this thesis we extend the VANET-based approach to counting vehicles at a traffic light by implementing a Geo-fence Based Vehicle Counting Algorithm which supports the use of RFID technology. This implementation utilizes the concept of geo-fencing to create a Zone of Interest (ZOI) that sections off a roadway that is relevant to a traffic intersection. All vehicles in this ZOI are used to determine the required length of the green-cycle time. By utilizing vehicle-to-vehicle (V2V) and...
Show moreIn this thesis we extend the VANET-based approach to counting vehicles at a traffic light by implementing a Geo-fence Based Vehicle Counting Algorithm which supports the use of RFID technology. This implementation utilizes the concept of geo-fencing to create a Zone of Interest (ZOI) that sections off a roadway that is relevant to a traffic intersection. All vehicles in this ZOI are used to determine the required length of the green-cycle time. By utilizing vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) technologies, we broadcast beacons that are propagated to all vehicles in the ZOI from the infrastructure which in this case is the traffic light controller. These beacons are used to determine the last vehicle location in the ZOI. A timing algorithm ensures that the last vehicle broadcasts first. The beacons are sent using the IEEE 1609.4 Wireless Access in Vehicular Environments Standard Vendor Specific Action (VSA) frames on the Smart Drive Initiative Vehiclular Ad Hoc Networks testbed. This work is implemented in conjunction with the Vehicular Multi-technology Communication Device (VMCD) supported by the National Science Foundation.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004720
- Subject Headings
- Traffic engineering., Radio frequency identification systems.
- Format
- Document (PDF)
- Title
- Implementation of the IEEE 1609.2 WAVE Security Services Standard.
- Creator
- Mandy, Chad Christopher Jr., Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This work presents the implementation of the the IEEE 1609.2 WAVE Security Services Standard. This implementation provides the ability to generate a message signature, along with the capability to verify that signature for wave short messages transmitted over an unsecured medium. Only the original sender of the message can sign it, allowing for the authentication of a message to be checked. As hashing is used during the generation and verification of signatures, message integrity can be...
Show moreThis work presents the implementation of the the IEEE 1609.2 WAVE Security Services Standard. This implementation provides the ability to generate a message signature, along with the capability to verify that signature for wave short messages transmitted over an unsecured medium. Only the original sender of the message can sign it, allowing for the authentication of a message to be checked. As hashing is used during the generation and verification of signatures, message integrity can be verified because a failed signature verification is a result of a compromised message. Also provided is the ability to encrypt and decrypt messages using AES-CCM to ensure that sensitive information remains safe and secure from unwanted recipients. Additionally this implementation provides a way for the 1609.2 specific data types to be encoded and decoded for ease of message transmittance. This implementation was built to support the Smart Drive initiative’s VANET testbed, supported by the National Science Foundation and is intended to run on the Vehicular Multi-technology Communication Device (VMCD) that is being developed. The VMCD runs on the embedded Linux operating system and this implementation will reside inside of the Linux kernel.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004693, http://purl.flvc.org/fau/fd/FA00004693
- Subject Headings
- Application software -- Security measures, Expert systems (Computer science), Vehicular ad hoc networks (Computer networks), Wireless LANs, Wireless communication systems -- Security measures, Wireless sensor networks
- Format
- Document (PDF)
- Title
- Implementation of the Sensor-MAC protocol for the JiST/SWANS simulator.
- Creator
- Tippanagoudar, Veerendra., Florida Atlantic University, Mahgoub, Imad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In recent years, advances in wireless technologies have enabled novel applications for wireless devices. Sensor network is one such application that consists of large number of battery-operated nodes. To simulate such networks with large number of nodes, a wireless sensor network simulator that is highly scalable is vital. JiST/SWANS is one such simulator that is highly scalable. However, the JiST/SWANS MAC layer implementation of 802.11b is not suitable for sensor networks, which are energy...
Show moreIn recent years, advances in wireless technologies have enabled novel applications for wireless devices. Sensor network is one such application that consists of large number of battery-operated nodes. To simulate such networks with large number of nodes, a wireless sensor network simulator that is highly scalable is vital. JiST/SWANS is one such simulator that is highly scalable. However, the JiST/SWANS MAC layer implementation of 802.11b is not suitable for sensor networks, which are energy-constrained. Hence, our main focus is to implement the S-MAC protocol in JiST/SWANS. The S-MAC protocol allows the nodes to go to sleep and thereby it helps conserve energy. This subsequently helps the nodes to extend their effective lifetime. We validate our S-MAC protocol implementation in the JiST/SWANS through simulations.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/13396
- Subject Headings
- Wireless communication systems, Sensor networks, Wireless LANs
- Format
- Document (PDF)