Current Search: Chatterjee, Mainak (x)
View All Items
Pages
- Title
- DIFFERENTIAL RADIO LINK PROTOCOL: AN IMPROVEMENT TO TCP OVER WIRELESS NETWORKS.
- Creator
-
Sarkar, Jaideep, Chatterjee, Mainak, University of Central Florida
- Abstract / Description
-
New generations of wireless cellular networks, including 3G and 4G technologies, are envisaged to support more mobile users and a variety of wireless multimedia services. With an increasing demand for wireless multimedia services, the performance of TCP becomes a bottleneck as it cannot differentiate between the losses due to the nature of air as a medium and high data load on the network that leads to congestion. This misinterpretation by TCP leads to a reduction in the congestion window...
Show moreNew generations of wireless cellular networks, including 3G and 4G technologies, are envisaged to support more mobile users and a variety of wireless multimedia services. With an increasing demand for wireless multimedia services, the performance of TCP becomes a bottleneck as it cannot differentiate between the losses due to the nature of air as a medium and high data load on the network that leads to congestion. This misinterpretation by TCP leads to a reduction in the congestion window size thereby resulting in reduced throughput of the system. To overcome this scenario Radio Link Protocols are used at a lower layer which hides from TCP the channel related losses and effectively increases the throughput. This thesis proposes enhancements to the radio link protocol that works underneath TCP by identifying decisive frames and categorizing them as {\em crucial} and {\em non-crucial}. The fact that initial frames from the same upper layer segment can afford a few trials of retransmissions and the later frames cannot, motivates this work. The frames are treated differentially with respect to FEC coding and ARQ schemes. Specific cases of FEC and ARQ strategies are then considered and it is shown qualitatively as how the differential treatment of frames can improve the performance of the RLP and in effect that of TCP over wireless networks.
Show less - Date Issued
- 2005
- Identifier
- CFE0000480, ucf:46352
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0000480
- Title
- AN ECONOMIC FRAMEWORK FOR RESOURCE MANAGEMENT AND PRICING IN WIRELESS NETWORKS WITH COMPETITIVE SERVICE PROVIDERS.
- Creator
-
SENGUPTA, SHAMIK, Chatterjee, Mainak, University of Central Florida
- Abstract / Description
-
A paradigm shift from static spectrum allocation to dynamic spectrum access (DSA) is becoming a reality due to the recent advances in cognitive radio, wide band spectrum sensing, and network aware real--time spectrum access. It is believed that DSA will allow wireless service providers (WSPs) the opportunity to dynamically access spectrum bands as and when they need it. Moreover, due to the presence of multiple WSPs in a region, it is anticipated that dynamic service pricing would be offered...
Show moreA paradigm shift from static spectrum allocation to dynamic spectrum access (DSA) is becoming a reality due to the recent advances in cognitive radio, wide band spectrum sensing, and network aware real--time spectrum access. It is believed that DSA will allow wireless service providers (WSPs) the opportunity to dynamically access spectrum bands as and when they need it. Moreover, due to the presence of multiple WSPs in a region, it is anticipated that dynamic service pricing would be offered that will allow the end-users to move from long-term service contracts to more flexible short-term service models. In this research, we develop a unified economic framework to analyze the trading system comprising two components: i) spectrum owner--WSPs interactions with regard to dynamic spectrum allocation, and ii) WSP--end-users interactions with regard to dynamic service pricing. For spectrum owner--WSPs interaction, we investigate various auction mechanisms for finding bidding strategies of WSPs and revenue generated by the spectrum owner. We show that sequential bidding provides better result than the concurrent bidding when WSPs are constrained to at most single unit allocation. On the other hand, when the bidders request for multiple units, (i.e., they are not restricted by allocation constraints) synchronous auction mechanism proves to be beneficial than asynchronous auctions. In this regard, we propose a winner determination sealed-bid knapsack auction mechanism that dynamically allocates spectrum to the WSPs based on their bids. As far as dynamic service pricing is concerned, we use game theory to capture the conflict of interest between WSPs and end--users, both of whom try to maximize their respective net utilities. We deviate from the traditional per--service static pricing towards a more dynamic model where the WSPs might change the price of a service almost on a session by session basis. Users, on the other hand, have the freedom to choose their WSP based on the price offered. It is found that in such a greedy and non-cooperative behavioral game model, it is in the best interest of the WSPs to adhere to a price threshold which is a consequence of a price (Nash) equilibrium. We conducted extensive simulation experiments, the results of which show that the proposed auction model entices WSPs to participate in the auction, makes optimal use of the common spectrum pool, and avoids collusion among WSPs. We also demonstrate how pricing can be used as an effective tool for providing incentives to the WSPs to upgrade their network resources and offer better services.
Show less - Date Issued
- 2007
- Identifier
- CFE0001848, ucf:47364
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0001848
- Title
- SUPPORTING REAL-TIME PDA INTERACTION WITH VIRTUAL ENVIRONMENT.
- Creator
-
Shah, Radhey, Chatterjee, Mainak, University of Central Florida
- Abstract / Description
-
Personal Digital Assistants (PDAs) are becoming more and more powerful with advances in technology and are expanding their applications in a variety of fields. This work explores the use of PDAs in Virtual Environments (VE). The goal is to support highly interactive bi-directional user interactions in Virtual Environments in more natural and less cumbersome ways. A proxy-based approach is adopted to support a wide-range of handheld devices and have a multi-PDA interaction with the virtual...
Show morePersonal Digital Assistants (PDAs) are becoming more and more powerful with advances in technology and are expanding their applications in a variety of fields. This work explores the use of PDAs in Virtual Environments (VE). The goal is to support highly interactive bi-directional user interactions in Virtual Environments in more natural and less cumbersome ways. A proxy-based approach is adopted to support a wide-range of handheld devices and have a multi-PDA interaction with the virtual world. The architecture consists of three components in the complete system, a PDA, a desktop that acts as a proxy and Virtual Environment Software Sandbox (VESS), software developed at the Institute for Simulation and Training (IST). The purpose of the architecture is to enable issuing text and voice commands from PDA to virtual entities in VESS through the proxy. The commands are a pre-defined set of simple words such as 'move forward', 'turn right', 'go', and 'stop'. These commands are matched at the proxy and sent to VESS as text in XML format. The response from VESS is received at the proxy and forwarded back to the PDA. Performance measures with respect to response time characteristics of text messages between PDA and proxy over Wi-Fi networks are conducted. The results are discussed with respect to the acceptable delays for human perception in order to have real-time interaction between a PDA and an avatar in virtual world.
Show less - Date Issued
- 2004
- Identifier
- CFE0000195, ucf:46158
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0000195
- Title
- DELAY SENSITIVE ROUTING FOR REAL TIME TRAFFIC OVER AD-HOC NETWORKS.
- Creator
-
Darshana, Dipika, Chatterjee, Mainak, University of Central Florida
- Abstract / Description
-
Wireless ad hoc network consists of inexpensive nodes that form a mobile communication network. Due to limitations of the transmission range, the nodes rely on each other to forward packets such that messages can be delivered across the network. The selection of the path along which a packet is forwarded from the source node to the destination node is done by the routing algorithm. Most commonly used routing algorithms, though effective for non-real time applications, cannot handle real-time...
Show moreWireless ad hoc network consists of inexpensive nodes that form a mobile communication network. Due to limitations of the transmission range, the nodes rely on each other to forward packets such that messages can be delivered across the network. The selection of the path along which a packet is forwarded from the source node to the destination node is done by the routing algorithm. Most commonly used routing algorithms, though effective for non-real time applications, cannot handle real-time applications that require strict delay bounds on packet delivery. In this thesis, we propose a routing protocol that ensures timely delivery of real time data packets. The idea is to route packets in such a way that irrespective of factors like traffic load and node density, the average delay remains within acceptable bounds. This is done by carefully accessing the resources available to a route before a session is admitted along that route. Each link in the route is checked for sufficient bandwidth not only for the new session to be admitted but also for the sessions that are already using that link. The new session is admitted only if the admission does not violate the delay bounds of any on-going sessions. This method of route selection coupled with per-hop link reservations allows us to provide bounds on the delay performance. Extensive simulation experiments have been conducted that demonstrate the performance of the proposed routing protocol in terms of throughput, session blocking probability, packet drop probability, average path length, and delay.
Show less - Date Issued
- 2008
- Identifier
- CFE0002355, ucf:47796
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0002355
- Title
- MEASURING AND IMPROVING INTERNET VIDEO QUALITY OF EXPERIENCE.
- Creator
-
Iyengar, Mukundan, Chatterjee, Mainak, University of Central Florida
- Abstract / Description
-
Streaming multimedia content over the IP-network is poised to be the dominant Internet traffic for the coming decade, predicted to account for more than 91% of all consumer traffic in the coming years. Streaming multimedia content ranges from Internet television (IPTV), video on demand (VoD), peer-to-peer streaming, and 3D television over IP to name a few. Widespread acceptance, growth, and subscriber retention are contingent upon network providers assuring superior Quality of Experience (QoE...
Show moreStreaming multimedia content over the IP-network is poised to be the dominant Internet traffic for the coming decade, predicted to account for more than 91% of all consumer traffic in the coming years. Streaming multimedia content ranges from Internet television (IPTV), video on demand (VoD), peer-to-peer streaming, and 3D television over IP to name a few. Widespread acceptance, growth, and subscriber retention are contingent upon network providers assuring superior Quality of Experience (QoE) on top of todays Internet. This work presents the first empirical understanding of Internet's video-QoE capabilities, and tools and protocols to efficiently infer and improve them. To infer video-QoE at arbitrary nodes in the Internet, we design and implement MintMOS: a lightweight, real-time, no-reference framework for capturing perceptual quality. We demonstrate that MintMOS's projections closely match with subjective surveys in accessing perceptual quality. We use MintMOS to characterize Internet video-QoE both at the link level and end-to-end path level. As an input to our study, we use extensive measurements from a large number of Internet paths obtained from various measurement overlays deployed using PlanetLab. Link level degradations of intra-- and inter--ISP Internet links are studied to create an empirical understanding of their shortcomings and ways to overcome them. Our studies show that intra--ISP links are often poorly engineered compared to peering links, and that degradations are induced due to transient network load imbalance within an ISP. Initial results also indicate that overlay networks could be a promising way to avoid such ISPs in times of degradations. A large number of end-to-end Internet paths are probed and we measure delay, jitter, and loss rates. The measurement data is analyzed offline to identify ways to enable a source to select alternate paths in an overlay network to improve video-QoE, without the need for background monitoring or apriori knowledge of path characteristics. We establish that for any unstructured overlay of N nodes, it is sufficient to reroute key frames using a random subset of k nodes in the overlay, where k is bounded by O(lnN). We analyze various properties of such random subsets to derive simple, scalable, and an efficient path selection strategy that results in a k-fold increase in path options for any source-destination pair; options that consistently outperform Internet path selection. Finally, we design a prototype called source initiated frame restoration (SIFR) that employs random subsets to derive alternate paths and demonstrate its effectiveness in improving Internet video-QoE.
Show less - Date Issued
- 2011
- Identifier
- CFE0004012, ucf:49168
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0004012
- Title
- SPECTRUM SHARING AND SERVICE PRICING IN DYNAMIC SPECTRUM ACCESS NETWORKS.
- Creator
-
Brahma, Swastik, Chatterjee, Mainak, University of Central Florida
- Abstract / Description
-
Traditionally, radio spectrum has been statically allocated to wireless service providers (WSPs). Regulators, like FCC, give wireless service providers exclusive long term licenses for using specific range of frequencies in particular geographic areas. Moreover, restrictions are imposed on the technologies to be used and the services to be provided. The lack of flexibility in static spectrum allocation constrains the ability to make use of new technologies and the ability to redeploy the...
Show moreTraditionally, radio spectrum has been statically allocated to wireless service providers (WSPs). Regulators, like FCC, give wireless service providers exclusive long term licenses for using specific range of frequencies in particular geographic areas. Moreover, restrictions are imposed on the technologies to be used and the services to be provided. The lack of flexibility in static spectrum allocation constrains the ability to make use of new technologies and the ability to redeploy the spectrum to higher valued uses, thereby resulting in inefficient spectrum utilization [23, 38, 42, 62, 67]. These limitations have motivated a paradigm shift from static spectrum allocation towards a more 'liberalized' notion of spectrum management in which secondary users can borrow idle spectrum from primary spectrum licensees, without causing harmful interference to the latter- a notion commonly referred to as dynamic spectrum access (DSA) or open spectrum access ,. Cognitive radio [30, 47], empowered by Software Defined Radio (SDR), is poised to promote the efficient use of spectrum by adopting this open spectrum approach. In this dissertation, we first address the problem of dynamic channel (spectrum) access by a set of cognitive radio enabled nodes, where each node acting in a selfish manner tries to access and use as many channels as possible, subject to the interference constraints. We model the dynamic channel access problem as a modified Rubinstein-Stahl bargaining game. In our model, each node negotiates with the other nodes to obtain an agreeable sharing rule of the available channels, such that, no two interfering nodes use the same channel. We solve the bargaining game by finding Subgame Perfect Nash Equilibrium (SPNE) strategies of the nodes. First, we consider finite horizon version of the bargaining game and investigate its SPNE strategies that allow each node to maximize its utility against the other nodes (opponents). We then extend these results to the infinite horizon bargaining game. Furthermore, we identify Pareto optimal equilibria of the game for improving spectrum utilization. The bargaining solution ensures that no node is starved of channels. The spectrum that a secondary node acquires comes to it at a cost. Thus it becomes important to study the 'end system' perspective of such a cost, by focusing on its implications. Specifically, we consider the problem of incentivizing nodes to provide the service of routing using the acquired spectrum. In this problem, each secondary node having a certain capacity incurs a cost for routing traffic through it. Secondary nodes will not have an incentive to relay traffic unless they are compensated for the costs they incur in forwarding traffic. We propose a path auction scheme in which each secondary node announces its cost and capacity to the routing mechanism, both of which are considered as private information known only to the node. We design a route selection mechanism and a pricing function that can induce nodes to reveal their cost and capacity honestly (making our auction truthful), while minimizing the payment that needs to be given to the nodes (making our auction optimal). By considering capacity constraint of the nodes, we explicitly support multiple path routing. For deploying our path auction based routing mechanism in DSA networks, we provide polynomial time algorithms to find the optimal route over which traffic should be routed and to compute the payment that each node should receive. All our proposed algorithms have been evaluated via extensive simulation experiments. These results help to validate our design philosophy and also illustrate the effectiveness of our solution approach.
Show less - Date Issued
- 2011
- Identifier
- CFE0004049, ucf:49125
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0004049
- Title
- MITIGATING MISBEHAVIOR IN WIRELESS NETWORKS: A GAME THEORETIC APPROACH.
- Creator
-
Wang, Wenjing, Chatterjee, Mainak, University of Central Florida
- Abstract / Description
-
In a distributed wireless system, multiple network nodes behave cooperatively towards a common goal. Though such assumptions on cooperation are desirable (e.g., controlling the transmit power level, reducing interference for each other, revealing private information, adhering to network policies) for analyzing and modeling, certain nodes belonging to a real-world system have often shown to deviate. These nodes, known as misbehaving nodes, bring more challenges to the design of the wireless...
Show moreIn a distributed wireless system, multiple network nodes behave cooperatively towards a common goal. Though such assumptions on cooperation are desirable (e.g., controlling the transmit power level, reducing interference for each other, revealing private information, adhering to network policies) for analyzing and modeling, certain nodes belonging to a real-world system have often shown to deviate. These nodes, known as misbehaving nodes, bring more challenges to the design of the wireless network because the unreliable channel makes the actions of the nodes hidden from each other. In this dissertation, we analyze two types of misbehavior, namely, selfish noncooperation and malicious attacking. We apply game theoretic techniques to model the interactions among the nodes in the network. First, we consider a homogeneous unreliable channel and analyze the necessary and sufficient conditions to enforce cooperative packet forwarding among a node pair. We formulate an anti-collusion game and derive the conditions that achieve full cooperation when the non-cooperative nodes collude. In addition, we consider multi-hop communication with a heterogeneous channel model. We refine our game model as a hidden action game with imperfect private monitoring. A state machine based strategy is proposed to reach Nash Equilibrium. The strategy attains cooperative packet forwarding with heterogeneous channel and requires only partial and imperfect information. Furthermore, it also enforces cooperation in multi-hop packet forwarding. To tackle the malicious attacks, we use Bayesian game analysis to show the existence of equilibrium in the detection game and argue that it might not be profitable to isolate the malicious nodes upon detection. We propose the concept of "coexistence with malicious nodes" by proving the co-existence equilibrium and derive the conditions that achieve the equilibrium. This research is further accomplished by extensive simulation studies. Simulation results illustrate the properties of the games and the derived equilibria. The results validate our design philosophy and clearly indicate that the proposed game theoretic solutions can be effectively used to enforce cooperation and mitigate attacks.
Show less - Date Issued
- 2010
- Identifier
- CFE0003080, ucf:48294
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0003080
- Title
- Trust-Based Rating Prediction and Malicious Profile Detection in Online Social Recommender Systems.
- Creator
-
Davoudi, Anahita, Chatterjee, Mainak, Hu, Haiyan, Zou, Changchun, Rahnavard, Nazanin, University of Central Florida
- Abstract / Description
-
Online social networks and recommender systems have become an effective channel for influencing millions of users by facilitating exchange and spread of information. This dissertation addresses multiple challenges that are faced by online social recommender systems such as: i) finding the extent of information spread; ii) predicting the rating of a product; and iii) detecting malicious profiles. Most of the research in this area do not capture the social interactions and rely on empirical or...
Show moreOnline social networks and recommender systems have become an effective channel for influencing millions of users by facilitating exchange and spread of information. This dissertation addresses multiple challenges that are faced by online social recommender systems such as: i) finding the extent of information spread; ii) predicting the rating of a product; and iii) detecting malicious profiles. Most of the research in this area do not capture the social interactions and rely on empirical or statistical approaches without considering the temporal aspects. We capture the temporal spread of information using a probabilistic model and use non-linear differential equations to model the diffusion process. To predict the rating of a product, we propose a social trust model and use the matrix factorization method to estimate user's taste by incorporating user-item rating matrix. The effect of tastes of friends of a user is captured using a trust model which is based on similarities between users and their centralities. Similarity is modeled using Vector Space Similarity and Pearson Correlation Coefficient algorithms, whereas degree, eigen-vector, Katz, and PageRank are used to model centrality. As rating of a product has tremendous influence on its saleability, social recommender systems are vulnerable to profile injection attacks that affect user's opinion towards favorable or unfavorable recommendations for a product. We propose a classification approach for detecting attackers based on attributes that provide the likelihood of a user profile of that of an attacker. To evaluate the performance, we inject push and nuke attacks, and use precision and recall to identify the attackers. All proposed models have been validated using datasets from Facebook, Epinions, and Digg. Results exhibit that the proposed models are able to better predict the information spread, rating of a product, and identify malicious user profiles with high accuracy and low false positives.
Show less - Date Issued
- 2018
- Identifier
- CFE0007168, ucf:52245
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0007168
- Title
- Analysis of Driver Behavior Modeling in Connected Vehicle Safety Systems Through High Fidelity Simulation.
- Creator
-
Jamialahmadi, Ahmad, Pourmohammadi Fallah, Yaser, Rahnavard, Nazanin, Chatterjee, Mainak, University of Central Florida
- Abstract / Description
-
A critical aspect of connected vehicle safety analysis is understanding the impact of human behavior on the overall performance of the safety system. Given the variation in human driving behavior and the expectancy for high levels of performance, it is crucial for these systems to be flexible to various driving characteristics. However, design, testing, and evaluation of these active safety systems remain a challenging task, exacerbated by the lack of behavioral data and practical test...
Show moreA critical aspect of connected vehicle safety analysis is understanding the impact of human behavior on the overall performance of the safety system. Given the variation in human driving behavior and the expectancy for high levels of performance, it is crucial for these systems to be flexible to various driving characteristics. However, design, testing, and evaluation of these active safety systems remain a challenging task, exacerbated by the lack of behavioral data and practical test platforms. Additionally, the need for the operation of these systems in critical and dangerous situations makes the burden of their evaluation very costly and time-consuming. As an alternative option, researchers attempt to use simulation platforms to study and evaluate their algorithms. In this work, we introduce a high fidelity simulation platform, designed for a hybrid transportation system involving both human-driven and automated vehicles. We decompose the human driving task and offer a modular approach in simulating a large-scale traffic scenario, making it feasible for extensive studying of automated and active safety systems. Furthermore, we propose a human-interpretable driver model represented as a closed-loop feedback controller. For this model, we analyze a large driving dataset to extract expressive parameters that would best describe different driving characteristics. Finally, we recreate a similarly dense traffic scenario within our simulator and conduct a thorough analysis of different human-specific and system-specific factors and study their effect on the performance and safety of the traffic network.
Show less - Date Issued
- 2018
- Identifier
- CFE0007573, ucf:52578
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0007573
- Title
- Learning Dynamic Network Models for Complex Social Systems.
- Creator
-
Hajibagheri, Alireza, Sukthankar, Gita, Turgut, Damla, Chatterjee, Mainak, Lakkaraju, Kiran, University of Central Florida
- Abstract / Description
-
Human societies are inherently complex and highly dynamic, resulting in rapidly changing social networks, containing multiple types of dyadic interactions. Analyzing these time-varying multiplex networks with approaches developed for static, single layer networks often produces poor results. To address this problem, our approach is to explicitly learn the dynamics of these complex networks. This dissertation focuses on five problems: 1) learning link formation rates; 2) predicting changes in...
Show moreHuman societies are inherently complex and highly dynamic, resulting in rapidly changing social networks, containing multiple types of dyadic interactions. Analyzing these time-varying multiplex networks with approaches developed for static, single layer networks often produces poor results. To address this problem, our approach is to explicitly learn the dynamics of these complex networks. This dissertation focuses on five problems: 1) learning link formation rates; 2) predicting changes in community membership; 3) using time series to predict changes in network structure; 4) modeling coevolution patterns across network layers and 5) extracting information from negative layers of a multiplex network.To study these problems, we created a rich dataset extracted from observing social interactions in the massively multiplayer online game Travian. Most online social media platforms are optimized to support a limited range of social interactions, primarily focusing on communication and information sharing. In contrast, relations in massively-multiplayer online games (MMOGs) are often formed during the course of gameplay and evolve as the game progresses. To analyze the players' behavior, we constructed multiplex networks with link types for raid, communication, and trading.The contributions of this dissertation include 1) extensive experiments on the dynamics of networks formed from diverse social processes; 2) new game theoretic models for community detection in dynamic networks; 3) supervised and unsupervised methods for link prediction in multiplex coevolving networks for both positive and negative links. We demonstrate that our holistic approach for modeling network dynamics in coevolving, multiplex networks outperforms factored methods that separately consider temporal and cross-layer patterns.
Show less - Date Issued
- 2017
- Identifier
- CFE0006598, ucf:51306
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0006598
- Title
- SPS: an SMS-based Push Service for Energy Saving in Smartphone's Idle State.
- Creator
-
Dondyk, Erich, Zou, Changchun, Chatterjee, Mainak, Hua, Kien, University of Central Florida
- Abstract / Description
-
Despite of all the advances in smartphone technology in recent years, smartphones still remain limited by their battery life. Unlike other power hungry components in the smartphone, the cellular data and Wi-Fi interfaces often continue to be used even while the phone is in the idle state to accommodate unnecessary data traffic produced by some applications. In addition, bad reception has been proven to greatly increase energy consumed by the radio, which happens quite often when smartphone...
Show moreDespite of all the advances in smartphone technology in recent years, smartphones still remain limited by their battery life. Unlike other power hungry components in the smartphone, the cellular data and Wi-Fi interfaces often continue to be used even while the phone is in the idle state to accommodate unnecessary data traffic produced by some applications. In addition, bad reception has been proven to greatly increase energy consumed by the radio, which happens quite often when smartphone users are inside buildings. In this paper, we present a Short message service Push based Service (SPS) to save unnecessary power consumption when smartphones are in idle state, especially in bad reception areas. First, SPS disables a smartphone's data interfaces whenever the phone is in idle state. Second, to preserve the real-time notification functionality required by some apps, such as new email arrivals and social media updates, when a notification is needed, a wakeup text message will be received by the phone, and then SPS enables the phone's data interfaces to connect to the corresponding server to retrieve notification data via the normal data network. Once the notification data has been retrieved, SPS will disable the data interfaces again if the phone is still in idle state. We have developed a complete prototype for Android smartphones. Our experiments show that SPS consumes less energy than the current approach. In areas with bad reception, the SPS prototype can double the battery life of a smartphone.
Show less - Date Issued
- 2014
- Identifier
- CFE0005157, ucf:50718
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0005157
- Title
- Verification and Automated Synthesis of Memristor Crossbars.
- Creator
-
Pourtabatabaie, Arya, Jha, Sumit Kumar, Chatterjee, Mainak, Pattanaik, Sumanta, University of Central Florida
- Abstract / Description
-
The Memristor is a newly synthesized circuit element correlating differences in electrical charge and magnetic flux, which effectively acts as a nonlinear resistor with memory. The small size of this element and its potential for passive state preservation has opened great opportunities for data-level parallel computation, since the functions of memory and processing can be realized on the same physical device.In this research we present an in-depth study of memristor crossbars for...
Show moreThe Memristor is a newly synthesized circuit element correlating differences in electrical charge and magnetic flux, which effectively acts as a nonlinear resistor with memory. The small size of this element and its potential for passive state preservation has opened great opportunities for data-level parallel computation, since the functions of memory and processing can be realized on the same physical device.In this research we present an in-depth study of memristor crossbars for combinational and sequential logic. We outline the structure of formulas which they are able to produce and henceforth the inherent powers and limitations of Memristive Crossbar Computing.As an improvement on previous methods of automated crossbar synthesis, a method for symbolically verifying crossbars is proposed, proven and analysed.
Show less - Date Issued
- 2016
- Identifier
- CFE0006840, ucf:51765
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0006840
- Title
- Placement of Mode and Wavelength Converters for Throughput Enhancement in Optical Networks.
- Creator
-
Abdulrahman, Ruaa, Bassiouni, Mostafa, Chatterjee, Mainak, Zou, Changchun, University of Central Florida
- Abstract / Description
-
The success of recent experiments to transport data using combined wavelength division multiplexed (WDM) and mode-division multiplexed (MDM) transmission has generated optimism for the attainment of optical networks with unprecedented bandwidth capacity, exceeding the fundamental Shannon capacity limit attained by WDM alone. Optical mode converters and wavelength converters are devices that can be placed in future optical nodes (routers) to prevent or reduce the connection blocking rate and...
Show moreThe success of recent experiments to transport data using combined wavelength division multiplexed (WDM) and mode-division multiplexed (MDM) transmission has generated optimism for the attainment of optical networks with unprecedented bandwidth capacity, exceeding the fundamental Shannon capacity limit attained by WDM alone. Optical mode converters and wavelength converters are devices that can be placed in future optical nodes (routers) to prevent or reduce the connection blocking rate and consequently increase network throughput. In this thesis, the specific problem of the placement of mode converters (MC) and mode-wavelength converters (MWC) in combined mode and wavelength division multiplexing (MWDM) networks is investigated. Four previously proposed wavelength converter placement heuristics are extended to handle the placement of MC and MWC in MWDM networks. A simple but effective method for the placement of mode and wavelength converters in MWDM networks is proposed based on ranking the nodes with respect to the volume of received connection requests. The results of extensive simulation tests to evaluate the new method and compare its performance with the performance of the other four heuristics are presented. The thesis provides extensive comparison results among the five converter placement methods using different network topologies and under different network loads. The results demonstrate the effectiveness of the new proposed method in achieving lower blocking rates compared to the other more-complex converter placement heuristics.
Show less - Date Issued
- 2014
- Identifier
- CFE0005118, ucf:50756
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0005118
- Title
- A(&)nbsp;Framework For Modeling Attacker Capabilities with Deception.
- Creator
-
Hassan, Sharif, Guha, Ratan, Bassiouni, Mostafa, Chatterjee, Mainak, DeMara, Ronald, University of Central Florida
- Abstract / Description
-
In this research we built a custom experimental range using opensource emulated and custom pure honeypots designed to detect or capture attacker activity. The focus is to test the effectiveness of a deception in its ability to evade detection coupled with attacker skill levels. The range consists of three zones accessible via virtual private networking. The first zone houses varying configurations of opensource emulated honeypots, custom built pure honeypots, and real SSH servers. The second...
Show moreIn this research we built a custom experimental range using opensource emulated and custom pure honeypots designed to detect or capture attacker activity. The focus is to test the effectiveness of a deception in its ability to evade detection coupled with attacker skill levels. The range consists of three zones accessible via virtual private networking. The first zone houses varying configurations of opensource emulated honeypots, custom built pure honeypots, and real SSH servers. The second zone acts as a point of presence for attackers. The third zone is for administration and monitoring. Using the range, both a control and participant-based experiment were conducted. We conducted control experiments to baseline and empirically explore honeypot detectability amongst other systems through adversarial testing. We executed a series of tests such as network service sweep, enumeration scanning, and finally manual execution. We also selected participants to serve as cyber attackers against the experiment range of varying skills having unique tactics, techniques and procedures in attempting to detect the honeypots. We have concluded the experiments and performed data analysis. We measure the anticipated threat by presenting the Attacker Bias Perception Profile model. Using this model, each participant is ranked based on their overall threat classification and impact. This model is applied to the results of the participants which helps align the threat to likelihood and impact of a honeypot being detected. The results indicate the pure honeypots are significantly difficult to detect. Emulated honeypots are grouped in different categories based on the detection and skills of the attackers. We developed a framework abstracting the deceptive process, the interaction with system elements, the use of intelligence, and the relationship with attackers. The framework is illustrated by our experiment case studies and the attacker actions, the effects on the system, and impact to the success.
Show less - Date Issued
- 2019
- Identifier
- CFE0007467, ucf:52659
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0007467
- Title
- Scalable Map Information Dissemination for Connected and Automated Vehicle Systems.
- Creator
-
Gani, S M Osman, Pourmohammadi Fallah, Yaser, Vosoughi, Azadeh, Yuksel, Murat, Chatterjee, Mainak, Hasan, Samiul, University of Central Florida
- Abstract / Description
-
Situational awareness in connected and automated vehicle (CAV) systems becomes particularly challenging in the presence of non-line of sight objects and/or objects beyond the sensing range of local onboard sensors. Despite the fact that fully autonomous driving requires the use of multiple redundant sensor systems, primarily including camera, radar, and LiDAR, the non-line of sight object detection problem still persists due to the inherent limitations of those sensing techniques. To tackle...
Show moreSituational awareness in connected and automated vehicle (CAV) systems becomes particularly challenging in the presence of non-line of sight objects and/or objects beyond the sensing range of local onboard sensors. Despite the fact that fully autonomous driving requires the use of multiple redundant sensor systems, primarily including camera, radar, and LiDAR, the non-line of sight object detection problem still persists due to the inherent limitations of those sensing techniques. To tackle this challenge, the inter-vehicle communication system is envisioned that allows vehicles to exchange self-status updates aiming to extend their effective field of view and thus compensate for the limitations of the vehicle tracking subsystem that relies substantially on onboard sensing devices. Tracking capability in such systems can be further improved through the cooperative sharing of locally created map data instead of transmitting only self-update messages containing core basic safety message (BSM) data. In the cooperative sharing of safety messages, it is imperative to have a scalable communication protocol to ensure optimal use of the communication channel. This dissertation contributes to the analysis of the scalability issue in vehicle-to-everything (V2X) communication and then addresses the range issue of situational awareness in CAV systems by proposing a content-adaptive V2X communication architecture. To that end, we first analyze the BSM scheduling protocol standardized in the SAE J2945/1 and present large-scale scalability results obtained from a high-fidelity simulation platform to demonstrate the protocol's efficacy to address the scalability issues in V2X communication. By employing a distributed opportunistic approach, the SAE J2945/1 congestion control algorithm keeps the overall offered channel load within an optimal operating range, while meeting the minimum tracking requirements set forth by upper-layer applications. This scheduling protocol allows event-triggered and vehicle-dynamics driven message transmits that further the situational awareness in a cooperative V2X context. Presented validation results of the congestion control algorithm include position tracking errors as the performance measure, with the age of communicated information as the evaluation measure. In addition, we examine the optimality of the default settings of the congestion control parameters. Comprehensive analysis and trade-off study of the control parameters reveal some areas of improvement to further the algorithm's efficacy. Motivated by the effectiveness of channel congestion control mechanism, we further investigate message content and length adaptations, together with transmit rate control. Reasonably, the content of the exchanged information has a significant impact on the map accuracy in cooperative driving systems. We investigate different content control schemes for a communication architecture aimed at map sharing and evaluate their performance in terms of position tracking error. This dissertation determines that message content should be concentrated to mapped objects that are located farther away from the sender to the edge of the local sensor range. This dissertation also finds that optimized combination of message length and transmit rate ensures the optimal channel utilization for cooperative vehicular communication, which in turn improves the situational awareness of the whole system.
Show less - Date Issued
- 2019
- Identifier
- CFE0007634, ucf:52470
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0007634
- Title
- Masquerading Techniques in IEEE 802.11 Wireless Local Area Networks.
- Creator
-
Nakhila, Omar, Zou, Changchun, Turgut, Damla, Bassiouni, Mostafa, Chatterjee, Mainak, Wang, Chung-Ching, University of Central Florida
- Abstract / Description
-
The airborne nature of wireless transmission offers a potential target for attackers to compromise IEEE 802.11 Wireless Local Area Network (WLAN). In this dissertation, we explore the current WLAN security threats and their corresponding defense solutions. In our study, we divide WLAN vulnerabilities into two aspects, client, and administrator. The client-side vulnerability investigation is based on examining the Evil Twin Attack (ETA) while our administrator side research targets Wi-Fi...
Show moreThe airborne nature of wireless transmission offers a potential target for attackers to compromise IEEE 802.11 Wireless Local Area Network (WLAN). In this dissertation, we explore the current WLAN security threats and their corresponding defense solutions. In our study, we divide WLAN vulnerabilities into two aspects, client, and administrator. The client-side vulnerability investigation is based on examining the Evil Twin Attack (ETA) while our administrator side research targets Wi-Fi Protected Access II (WPA2). Three novel techniques have been presented to detect ETA. The detection methods are based on (1) creating a secure connection to a remote server to detect the change of gateway's public IP address by switching from one Access Point (AP) to another. (2) Monitoring multiple Wi-Fi channels in a random order looking for specific data packets sent by the remote server. (3) Merging the previous solutions into one universal ETA detection method using Virtual Wireless Clients (VWCs). On the other hand, we present a new vulnerability that allows an attacker to force the victim's smartphone to consume data through the cellular network by starting the data download on the victim's cell phone without the victim's permission. A new scheme has been developed to speed up the active dictionary attack intensity on WPA2 based on two novel ideas. First, the scheme connects multiple VWCs to the AP at the same time-each VWC has its own spoofed MAC address. Second, each of the VWCs could try many passphrases using single wireless session. Furthermore, we present a new technique to avoid bandwidth limitation imposed by Wi-Fi hotspots. The proposed method creates multiple VWCs to access the WLAN. The combination of the individual bandwidth of each VWC results in an increase of the total bandwidth gained by the attacker. All proposal techniques have been implemented and evaluated in real-life scenarios.
Show less - Date Issued
- 2018
- Identifier
- CFE0007063, ucf:51979
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0007063
- Title
- Algorithms for Community Identification in Complex Networks.
- Creator
-
Vasudevan, Mahadevan, Deo, Narsingh, Hughes, Charles, Guha, Ratan, Chatterjee, Mainak, Zhao, Yue, University of Central Florida
- Abstract / Description
-
Complex networks such as the Internet, the World Wide Web (WWW), and various social and biological networks, are viewed as large, dynamic, random graphs, with properties significantly different from those of the Erd(&)#246;s-R(&)#233;nyi random graphs. In particular, properties such as degree distribution, network distance, transitivity and clustering coefficient of these networks have been empirically shown to diverge from classical random networks. Existence of communities is one such...
Show moreComplex networks such as the Internet, the World Wide Web (WWW), and various social and biological networks, are viewed as large, dynamic, random graphs, with properties significantly different from those of the Erd(&)#246;s-R(&)#233;nyi random graphs. In particular, properties such as degree distribution, network distance, transitivity and clustering coefficient of these networks have been empirically shown to diverge from classical random networks. Existence of communities is one such property inherent to these networks. A community may informally be defined as a locally-dense induced subgraph, of significant size, in a large globally-sparse graph. Recent empirical results reveal communities in networks spanning across different disciplines (-) physics, statistics, sociology, biology, and linguistics. At least two different questions may be posed on the community structure in large networks: (i) Given a network, detect or extract all (i.e., sets of nodes that constitute) communities; and (ii) Given a node in the network, identify the best community that the given node belongs to, if there exists one. Several algorithms have been proposed to solve the former problem, known as Community Discovery. The latter problem, known as Community Identification, has also been studied, but to a much smaller extent. Both these problems have been shown to be NP-complete, and a number of approximate algorithms have been proposed in recent years. A comprehensive taxonomy of the existing community detection algorithms is presented in this work. Global exploration of these complex networks to pull out communities (community discovery) is time and memory consuming. A more confined approach to mine communities in a given network is investigated in this research. Identifying communities does not require the knowledge of the entire graph. Community identification algorithms exist in the literature, but to a smaller extent. The dissertation presents a thorough description and analysis of the existing techniques to identify communities in large networks. Also a novel heuristic for identifying the community to which a given seed node belongs using only its neighborhood information is presented. An improved definition of a community based on the average degree of the induced subgraph is discussed thoroughly and it is compared with the various definitions in the literature. Next, a faster and accurate algorithm to identify communities in complex networks based on maximizing the average degree is described. The divisive nature of the algorithm (as against the existing agglomerative methods) efficiently identifies communities in large complex networks. The performance of the algorithm on several synthetic and real-world complex networks has also been thoroughly investigated.
Show less - Date Issued
- 2012
- Identifier
- CFE0004294, ucf:49463
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0004294
- Title
- Pervasive Secure Content Delivery Networks Implementation.
- Creator
-
Lugo-Cordero, Hector, Guha, Ratan, Stanley, Kenneth, Chatterjee, Mainak, Wu, Annie, Lu, Kejie, University of Central Florida
- Abstract / Description
-
Over the years, communication networks have been shifting their focus from providing connectivity in a client/server model to providing a service or content. This shift has led to topic areas like Service-Oriented Architecture (SOA), Heterogeneous Wireless Mesh Networks, and Ubiquitous Computing. Furthermore, probably the broadest of these areas which embarks all is the Internet of Things (IoT). The IoT is defined as an Internet where all physical entities (e.g., vehicles, appliances, smart...
Show moreOver the years, communication networks have been shifting their focus from providing connectivity in a client/server model to providing a service or content. This shift has led to topic areas like Service-Oriented Architecture (SOA), Heterogeneous Wireless Mesh Networks, and Ubiquitous Computing. Furthermore, probably the broadest of these areas which embarks all is the Internet of Things (IoT). The IoT is defined as an Internet where all physical entities (e.g., vehicles, appliances, smart phones, smart homes, computers, etc.), which we interact daily are connected and exchanging data among themselves and users. The IoT has become a global goal for companies, researchers, and users alike due to its different implementation and functional benefits: performance efficiency, coverage, economic and health. Due to the variety of devices which connect to it, it is expected that the IoT is composed of multiple technologies interacting together, to deliver a service. This technologies interactions renders an important challenge that must be overcome: how to communicate these technologies effectively and securely? The answer to this question is vital for a successful deployment of IoT and achievement of all the potential benefits that the IoT promises.This thesis proposes a SOA approach at the Network Layer to be able to integrate all technologies involved, in a transparent manner. The proposed set of solutions is composed of primarily the secure implementation of a unifying routing algorithm and a layered messaging model to standardizecommunication of all devices. Security is targeted to address the three main security concerns (i.e., confidentiality, integrity, and availability), with pervasive schemes that can be employed for any kind of device on the client, backbone, and server side. The implementation of such schemes is achieved by standard current security mechanisms (e.g., encryption), in combination with novel context and intelligent checks that detect compromised devices. Moreover, a decentralized content processing design is presented. In such design, content processing is handled at the client side, allowing server machines to serve more content, while being more reliable and capable of processing complete security checks on data and client integrity.
Show less - Date Issued
- 2017
- Identifier
- CFE0006620, ucf:51268
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0006620
- Title
- Performance Evaluation of Connectivity and Capacity of Dynamic Spectrum Access Networks.
- Creator
-
Al-tameemi, Osama, Chatterjee, Mainak, Bassiouni, Mostafa, Jha, Sumit, Wei, Lei, Choudhury, Sudipto, University of Central Florida
- Abstract / Description
-
Recent measurements on radio spectrum usage have revealed the abundance of under- utilized bands of spectrum that belong to licensed users. This necessitated the paradigm shift from static to dynamic spectrum access (DSA) where secondary networks utilize unused spectrum holes in the licensed bands without causing interference to the licensed user. However, wide scale deployment of these networks have been hindered due to lack of knowledge of expected performance in realistic environments and...
Show moreRecent measurements on radio spectrum usage have revealed the abundance of under- utilized bands of spectrum that belong to licensed users. This necessitated the paradigm shift from static to dynamic spectrum access (DSA) where secondary networks utilize unused spectrum holes in the licensed bands without causing interference to the licensed user. However, wide scale deployment of these networks have been hindered due to lack of knowledge of expected performance in realistic environments and lack of cost-effective solutions for implementing spectrum database systems. In this dissertation, we address some of the fundamental challenges on how to improve the performance of DSA networks in terms of connectivity and capacity. Apart from showing performance gains via simulation experiments, we designed, implemented, and deployed testbeds that achieve economics of scale. We start by introducing network connectivity models and show that the well-established disk model does not hold true for interference-limited networks. Thus, we characterize connectivity based on signal to interference and noise ratio (SINR) and show that not all the deployed secondary nodes necessarily contribute towards the network's connectivity. We identify such nodes and show that even-though a node might be communication-visible it can still be connectivity-invisible. The invisibility of such nodes is modeled using the concept of Poisson thinning. The connectivity-visible nodes are combined with the coverage shrinkage to develop the concept of effective density which is used to characterize the con- nectivity. Further, we propose three techniques for connectivity maximization. We also show how traditional flooding techniques are not applicable under the SINR model and analyze the underlying causes for that. Moreover, we propose a modified version of probabilistic flooding that uses lower message overhead while accounting for the node outreach and in- terference. Next, we analyze the connectivity of multi-channel distributed networks and show how the invisibility that arises among the secondary nodes results in thinning which we characterize as channel abundance. We also capture the thinning that occurs due to the nodes' interference. We study the effects of interference and channel abundance using Poisson thinning on the formation of a communication link between two nodes and also on the overall connectivity of the secondary network. As for the capacity, we derive the bounds on the maximum achievable capacity of a randomly deployed secondary network with finite number of nodes in the presence of primary users since finding the exact capacity involves solving an optimization problem that shows in-scalability both in time and search space dimensionality. We speed up the optimization by reducing the optimizer's search space. Next, we characterize the QoS that secondary users can expect. We do so by using vector quantization to partition the QoS space into finite number of regions each of which is represented by one QoS index. We argue that any operating condition of the system can be mapped to one of the pre-computed QoS indices using a simple look-up in Olog (N) time thus avoiding any cumbersome computation for QoS evaluation. We implement the QoS space on an 8-bit microcontroller and show how the mathematically intensive operations can be computed in a shorter time. To demonstrate that there could be low cost solutions that scale, we present and implement an architecture that enables dynamic spectrum access for any type of network ranging from IoT to cellular. The three main components of this architecture are the RSSI sensing network, the DSA server, and the service engine. We use the concept of modular design in these components which allows transparency between them, scalability, and ease of maintenance and upgrade in a plug-n-play manner, without requiring any changes to the other components. Moreover, we provide a blueprint on how to use off-the-shelf commercially available software configurable RF chips to build low cost spectrum sensors. Using testbed experiments, we demonstrate the efficiency of the proposed architecture by comparing its performance to that of a legacy system. We show the benefits in terms of resilience to jamming, channel relinquishment on primary arrival, and best channel determination and allocation. We also show the performance gains in terms of frame error rater and spectral efficiency.
Show less - Date Issued
- 2016
- Identifier
- CFE0006063, ucf:50980
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0006063
- Title
- On Distributed Estimation for Resource Constrained Wireless Sensor Networks.
- Creator
-
Sani, Alireza, Vosoughi, Azadeh, Rahnavard, Nazanin, Wei, Lei, Atia, George, Chatterjee, Mainak, University of Central Florida
- Abstract / Description
-
We study Distributed Estimation (DES) problem, where several agents observe a noisy version of an underlying unknown physical phenomena (which is not directly observable), and transmit a compressed version of their observations to a Fusion Center (FC), where collective data is fused to reconstruct the unknown. One of the most important applications of Wireless Sensor Networks (WSNs) is performing DES in a field to estimate an unknown signal source. In a WSN battery powered geographically...
Show moreWe study Distributed Estimation (DES) problem, where several agents observe a noisy version of an underlying unknown physical phenomena (which is not directly observable), and transmit a compressed version of their observations to a Fusion Center (FC), where collective data is fused to reconstruct the unknown. One of the most important applications of Wireless Sensor Networks (WSNs) is performing DES in a field to estimate an unknown signal source. In a WSN battery powered geographically distributed tiny sensors are tasked with collecting data from the field. Each sensor locally processes its noisy observation (local processing can include compression,dimension reduction, quantization, etc) and transmits the processed observation over communication channels to the FC, where the received data is used to form a global estimate of the unknown source such that the Mean Square Error (MSE) of the DES is minimized. The accuracy of DES depends on many factors such as intensity of observation noises in sensors, quantization errors in sensors, available power and bandwidth of the network, quality of communication channels between sensors and the FC, and the choice of fusion rule in the FC. Taking into account all of these contributing factors and implementing a DES system which minimizes the MSE and satisfies all constraints is a challenging task. In order to probe into different aspects of this challenging task we identify and formulate the following three problems and address them accordingly:1- Consider an inhomogeneous WSN where the sensors' observations is modeled linear with additive Gaussian noise. The communication channels between sensors and FC are orthogonal power and bandwidth-constrained erroneous wireless fading channels. The unknown to be estimated is a Gaussian vector. Sensors employ uniform multi-bit quantizers and BPSK modulation. Given this setup, we ask: what is the best fusion rule in the FC? what is the best transmit power and quantization rate (measured in bits per sensor) allocation schemes that minimize the MSE? In order to answer these questions, we derive some upper bounds on global MSE and through minimizing those bounds, we propose various resource allocation schemes for the problem, through which we investigate the effect of contributing factors on the MSE.2- Consider an inhomogeneous WSN with an FC which is tasked with estimating a scalar Gaussian unknown. The sensors are equipped with uniform multi-bit quantizers and the communication channels are modeled as Binary Symmetric Channels (BSC). In contrast to former problem the sensors experience independent multiplicative noises (in addition to additive noise). The natural question in this scenario is: how does multiplicative noise affect the DES system performance? how does it affect the resource allocation for sensors, with respect to the case where there is no multiplicative noise? We propose a linear fusion rule in the FC and derive the associated MSE in closed-form. We propose several rate allocation schemes with different levels of complexity which minimize the MSE. Implementing the proposed schemes lets us study the effect of multiplicative noise on DES system performance and its dynamics. We also derive Bayesian Cramer-Rao Lower Bound (BCRLB) and compare the MSE performance of our porposed methods against the bound.As a dual problem we also answer the question: what is the minimum required bandwidth of thenetwork to satisfy a predetermined target MSE?3- Assuming the framework of Bayesian DES of a Gaussian unknown with additive and multiplicative Gaussian noises involved, we answer the following question: Can multiplicative noise improve the DES performance in any case/scenario? the answer is yes, and we call the phenomena as 'enhancement mode' of multiplicative noise. Through deriving different lower bounds, such as BCRLB,Weiss-Weinstein Bound (WWB), Hybrid CRLB (HCRLB), Nayak Bound (NB), Yatarcos Bound (YB) on MSE, we identify and characterize the scenarios that the enhancement happens. We investigate two situations where variance of multiplicative noise is known and unknown. Wealso compare the performance of well-known estimators with the derived bounds, to ensure practicability of the mentioned enhancement modes.
Show less - Date Issued
- 2017
- Identifier
- CFE0006913, ucf:51698
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0006913