Current Search: Dynamic Networks (x)
View All Items
- Title
- DYNAMIC ENTREPRENEURIAL NETWORKS: AN INVESTIGATION OF ENTREPRENEURS, NEW VENTURES AND THEIR NETWORKS.
- Creator
-
Sullivan, Diane, Ford, Cameron, University of Central Florida
- Abstract / Description
-
Entrepreneurs need resources to organize new venture offerings into marketplace-acceptable forms. Entrepreneurs use others' assistance via networks to obtain these resources. Research indicates that firms face resource dependencies, that likely change over time, where they must respond to those controlling resources. Although some work has investigated implications of new ventures' networks at one time period, little work has investigated the dynamic nature and associated outcomes of networks...
Show moreEntrepreneurs need resources to organize new venture offerings into marketplace-acceptable forms. Entrepreneurs use others' assistance via networks to obtain these resources. Research indicates that firms face resource dependencies, that likely change over time, where they must respond to those controlling resources. Although some work has investigated implications of new ventures' networks at one time period, little work has investigated the dynamic nature and associated outcomes of networks as they change due to different resource requirements as the venture develops. This research examines the dynamic nature of networks, due different resource requirements over time, and how these changes impact entrepreneurial outcomes via interactions with entrepreneurs' existing networks. In order to account for the dynamic nature of entrepreneurial new ventures and their networks of resource providers, a model is presented that investigates antecedents to subsequent entrepreneurial network characteristics. The model also anticipates changes eminent to the founder as a consequence of interactions with their networks due to experiences associated with the new venture development process. This work relies on network theory integrated with resource dependence theory arguments, work that examines founder attributes as associated with entrepreneurial outcomes and research that investigates the stages of new venture development. Predictions developed from the model were tested in two studies. The first study utilized the Panel Study of Entrepreneurial Dynamics, an existing panel database containing information about nascent entrepreneurs, as its data source to test predictions examining the dynamics of entrepreneurs' networks across two time frames. The second study used a cross-sectional mass mail survey design to investigate all of the model's predictions on a random sample of newly incorporated firms in the state of Florida. The results of the studies provided support for about one third of the predictions and there were a few contrasting findings across studies. Overall, the results of the studies suggest that some conceptualizations presented in the theoretical model should be reevaluated and that the applicability of some constructs when studying firms in the organizing stages of development should be reconsidered.
Show less - Date Issued
- 2006
- Identifier
- CFE0001173, ucf:46863
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0001173
- Title
- Online Neuro-Adaptive Learning For Power System Dynamic State Estimation.
- Creator
-
Birari, Rahul, Zhou, Qun, Sun, Wei, Dimitrovski, Aleksandar, University of Central Florida
- Abstract / Description
-
With the increased penetration of renewable generation in the smart grid , it is crucial to have knowledge of rapid changes of system states. The information of real-time electro-mechanical dynamic states of generators are essential to ensuring reliability and detecting instability of the grid. The conventional SCADA based Dynamic State Estimation (DSE) was limited by the slow sampling rates (2-4 Hz). With the advent of PMU based synchro-phasor technology in tandem with Wide Area Monitoring...
Show moreWith the increased penetration of renewable generation in the smart grid , it is crucial to have knowledge of rapid changes of system states. The information of real-time electro-mechanical dynamic states of generators are essential to ensuring reliability and detecting instability of the grid. The conventional SCADA based Dynamic State Estimation (DSE) was limited by the slow sampling rates (2-4 Hz). With the advent of PMU based synchro-phasor technology in tandem with Wide Area Monitoring System (WAMS), it has become possible to avail rapid real-time measurements at the network nodes. These measurements can be exploited for better estimates of system dynamic states. In this research, we have proposed a novel Artificial Intelligence (AI) based real-time neuro-adaptive algorithm for rotor angle and speed estimation of synchronous generators. Generator swing equations and power flow models are incorporated in the online learning. The algorithm learns and adapts in real-time to achieve accurate estimates. Simulation is carried out on 68 bus 16 generator NETS-NYPS model. The neuro-adaptive algorithm is compared with classical Kalman Filter based DSE. Applicability and accuracy of the proposed method is demonstrated under the influence of noise and faulty conditions.
Show less - Date Issued
- 2017
- Identifier
- CFE0006858, ucf:51747
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0006858
- Title
- Performance Evaluation of Connectivity and Capacity of Dynamic Spectrum Access Networks.
- Creator
-
Al-tameemi, Osama, Chatterjee, Mainak, Bassiouni, Mostafa, Jha, Sumit, Wei, Lei, Choudhury, Sudipto, University of Central Florida
- Abstract / Description
-
Recent measurements on radio spectrum usage have revealed the abundance of under- utilized bands of spectrum that belong to licensed users. This necessitated the paradigm shift from static to dynamic spectrum access (DSA) where secondary networks utilize unused spectrum holes in the licensed bands without causing interference to the licensed user. However, wide scale deployment of these networks have been hindered due to lack of knowledge of expected performance in realistic environments and...
Show moreRecent measurements on radio spectrum usage have revealed the abundance of under- utilized bands of spectrum that belong to licensed users. This necessitated the paradigm shift from static to dynamic spectrum access (DSA) where secondary networks utilize unused spectrum holes in the licensed bands without causing interference to the licensed user. However, wide scale deployment of these networks have been hindered due to lack of knowledge of expected performance in realistic environments and lack of cost-effective solutions for implementing spectrum database systems. In this dissertation, we address some of the fundamental challenges on how to improve the performance of DSA networks in terms of connectivity and capacity. Apart from showing performance gains via simulation experiments, we designed, implemented, and deployed testbeds that achieve economics of scale. We start by introducing network connectivity models and show that the well-established disk model does not hold true for interference-limited networks. Thus, we characterize connectivity based on signal to interference and noise ratio (SINR) and show that not all the deployed secondary nodes necessarily contribute towards the network's connectivity. We identify such nodes and show that even-though a node might be communication-visible it can still be connectivity-invisible. The invisibility of such nodes is modeled using the concept of Poisson thinning. The connectivity-visible nodes are combined with the coverage shrinkage to develop the concept of effective density which is used to characterize the con- nectivity. Further, we propose three techniques for connectivity maximization. We also show how traditional flooding techniques are not applicable under the SINR model and analyze the underlying causes for that. Moreover, we propose a modified version of probabilistic flooding that uses lower message overhead while accounting for the node outreach and in- terference. Next, we analyze the connectivity of multi-channel distributed networks and show how the invisibility that arises among the secondary nodes results in thinning which we characterize as channel abundance. We also capture the thinning that occurs due to the nodes' interference. We study the effects of interference and channel abundance using Poisson thinning on the formation of a communication link between two nodes and also on the overall connectivity of the secondary network. As for the capacity, we derive the bounds on the maximum achievable capacity of a randomly deployed secondary network with finite number of nodes in the presence of primary users since finding the exact capacity involves solving an optimization problem that shows in-scalability both in time and search space dimensionality. We speed up the optimization by reducing the optimizer's search space. Next, we characterize the QoS that secondary users can expect. We do so by using vector quantization to partition the QoS space into finite number of regions each of which is represented by one QoS index. We argue that any operating condition of the system can be mapped to one of the pre-computed QoS indices using a simple look-up in Olog (N) time thus avoiding any cumbersome computation for QoS evaluation. We implement the QoS space on an 8-bit microcontroller and show how the mathematically intensive operations can be computed in a shorter time. To demonstrate that there could be low cost solutions that scale, we present and implement an architecture that enables dynamic spectrum access for any type of network ranging from IoT to cellular. The three main components of this architecture are the RSSI sensing network, the DSA server, and the service engine. We use the concept of modular design in these components which allows transparency between them, scalability, and ease of maintenance and upgrade in a plug-n-play manner, without requiring any changes to the other components. Moreover, we provide a blueprint on how to use off-the-shelf commercially available software configurable RF chips to build low cost spectrum sensors. Using testbed experiments, we demonstrate the efficiency of the proposed architecture by comparing its performance to that of a legacy system. We show the benefits in terms of resilience to jamming, channel relinquishment on primary arrival, and best channel determination and allocation. We also show the performance gains in terms of frame error rater and spectral efficiency.
Show less - Date Issued
- 2016
- Identifier
- CFE0006063, ucf:50980
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0006063
- Title
- A HYBRID SIMULATION METHODOLOGY TO EVALUATE NETWORK CENTRICDECISION MAKING UNDER EXTREME EVENTS.
- Creator
-
Quijada, Sergio, Sepulveda, Jose, University of Central Florida
- Abstract / Description
-
Currently the network centric operation and network centric warfare have generated a new area of research focused on determining how hierarchical organizations composed by human beings and machines make decisions over collaborative environments. One of the most stressful scenarios for these kinds of organizations is the so-called extreme events. This dissertation provides a hybrid simulation methodology based on classical simulation paradigms combined with social network analysis for...
Show moreCurrently the network centric operation and network centric warfare have generated a new area of research focused on determining how hierarchical organizations composed by human beings and machines make decisions over collaborative environments. One of the most stressful scenarios for these kinds of organizations is the so-called extreme events. This dissertation provides a hybrid simulation methodology based on classical simulation paradigms combined with social network analysis for evaluating and improving the organizational structures and procedures, mainly the incident command systems and plans for facing those extreme events. According to this, we provide a methodology for generating hypotheses and afterwards testing organizational procedures either in real training systems or simulation models with validated data. As long as the organization changes their dyadic relationships dynamically over time, we propose to capture the longitudinal digraph in time and analyze it by means of its adjacency matrix. Thus, by using an object oriented approach, three domains are proposed for better understanding the performance and the surrounding environment of an emergency management organization. System dynamics is used for modeling the critical infrastructure linked to the warning alerts of a given organization at federal, state and local levels. Discrete simulations based on the defined concept of "community of state" enables us to control the complete model. Discrete event simulation allows us to create entities that represent the data and resource flows within the organization. We propose that cognitive models might well be suited in our methodology. For instance, we show how the team performance decays in time, according to the Yerkes-Dodson curve, affecting the measures of performance of the whole organizational system. Accordingly we suggest that the hybrid model could be applied to other types of organizations, such as military peacekeeping operations and joint task forces. Along with providing insight about organizations, the methodology supports the analysis of the "after action review" (AAR), based on collection of data obtained from the command and control systems or the so-called training scenarios. Furthermore, a rich set of mathematical measures arises from the hybrid models such as triad census, dyad census, eigenvalues, utilization, feedback loops, etc., which provides a strong foundation for studying an emergency management organization. Future research will be necessary for analyzing real data and validating the proposed methodology.
Show less - Date Issued
- 2006
- Identifier
- CFE0001243, ucf:46926
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0001243
- Title
- ALGEBRAIC ASPECTS OF (BIO) NANO-CHEMICAL REACTION NETWORKS AND BIFURCATIONS IN VARIOUS DYNAMICAL SYSTEMS.
- Creator
-
Chen, Teng, Brennan, Joseph, University of Central Florida
- Abstract / Description
-
The dynamics of (bio) chemical reaction networks have been studied by different methods. Among these methods, the chemical reaction network theory has been proven to successfully predicate important qualitative properties, such as the existence of the steady state and the asymptotic behavior of the steady state. However, a constructive approach to the steady state locus has not been presented. In this thesis, with the help of toric geometry, we propose a generic strategy towards this question...
Show moreThe dynamics of (bio) chemical reaction networks have been studied by different methods. Among these methods, the chemical reaction network theory has been proven to successfully predicate important qualitative properties, such as the existence of the steady state and the asymptotic behavior of the steady state. However, a constructive approach to the steady state locus has not been presented. In this thesis, with the help of toric geometry, we propose a generic strategy towards this question. This theory is applied to (bio)nano particle con gurations. We also investigate Hopf bifurcation surfaces of various dynamical systems.
Show less - Date Issued
- 2011
- Identifier
- CFE0003933, ucf:48689
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0003933
- Title
- Quantifying Trust and Reputation for Defense against Adversaries in Multi-Channel Dynamic Spectrum Access Networks.
- Creator
-
Bhattacharjee, Shameek, Chatterjee, Mainak, Guha, Ratan, Zou, Changchun, Turgut, Damla, Catbas, Necati, University of Central Florida
- Abstract / Description
-
Dynamic spectrum access enabled by cognitive radio networks are envisioned to drivethe next generation wireless networks that can increase spectrum utility by opportunisticallyaccessing unused spectrum. Due to the policy constraint that there could be no interferenceto the primary (licensed) users, secondary cognitive radios have to continuously sense forprimary transmissions. Typically, sensing reports from multiple cognitive radios are fusedas stand-alone observations are prone to errors...
Show moreDynamic spectrum access enabled by cognitive radio networks are envisioned to drivethe next generation wireless networks that can increase spectrum utility by opportunisticallyaccessing unused spectrum. Due to the policy constraint that there could be no interferenceto the primary (licensed) users, secondary cognitive radios have to continuously sense forprimary transmissions. Typically, sensing reports from multiple cognitive radios are fusedas stand-alone observations are prone to errors due to wireless channel characteristics. Suchdependence on cooperative spectrum sensing is vulnerable to attacks such as SecondarySpectrum Data Falsification (SSDF) attacks when multiple malicious or selfish radios falsifythe spectrum reports. Hence, there is a need to quantify the trustworthiness of radios thatshare spectrum sensing reports and devise malicious node identification and robust fusionschemes that would lead to correct inference about spectrum usage.In this work, we propose an anomaly monitoring technique that can effectively cap-ture anomalies in the spectrum sensing reports shared by individual cognitive radios duringcooperative spectrum sensing in a multi-channel distributed network. Such anomalies areused as evidence to compute the trustworthiness of a radio by its neighbours. The proposedanomaly monitoring technique works for any density of malicious nodes and for any physicalenvironment. We propose an optimistic trust heuristic for a system with a normal risk attitude and show that it can be approximated as a beta distribution. For a more conservativesystem, we propose a multinomial Dirichlet distribution based conservative trust framework,where Josang's Belief model is used to resolve any uncertainty in information that mightarise during anomaly monitoring. Using a machine learning approach, we identify maliciousnodes with a high degree of certainty regardless of their aggressiveness and variations intro-duced by the pathloss environment. We also propose extensions to the anomaly monitoringtechnique that facilitate learning about strategies employed by malicious nodes and alsoutilize the misleading information they provide. We also devise strategies to defend against a collaborative SSDF attack that islaunched by a coalition of selfish nodes. Since, defense against such collaborative attacks isdifficult with popularly used voting based inference models or node centric isolation techniques, we propose a channel centric Bayesian inference approach that indicates how much the collective decision on a channels occupancy inference can be trusted. Based on the measured observations over time, we estimate the parameters of the hypothesis of anomalous andnon-anomalous events using a multinomial Bayesian based inference. We quantitatively define the trustworthiness of a channel inference as the difference between the posterior beliefsassociated with anomalous and non-anomalous events. The posterior beliefs are updated based on a weighted average of the prior information on the belief itself and the recently observed data.Subsequently, we propose robust fusion models which utilize the trusts of the nodes to improve the accuracy of the cooperative spectrum sensing decisions. In particular, we propose three fusion models: (i) optimistic trust based fusion, (ii) conservative trust based fusion, and (iii) inversion based fusion. The former two approaches exclude untrustworthy sensing reports for fusion, while the last approach utilizes misleading information. Allschemes are analyzed under various attack strategies. We propose an asymmetric weightedmoving average based trust management scheme that quickly identifies on-off SSDF attacks and prevents quick trust redemption when such nodes revert back to temporal honest behavior. We also provide insights on what attack strategies are more effective from the adversaries' perspective.Through extensive simulation experiments we show that the trust models are effective in identifying malicious nodes with a high degree of certainty under variety of network and radio conditions. We show high true negative detection rates even when multiple malicious nodes launch collaborative attacks which is an improvement over existing voting based exclusion and entropy divergence techniques. We also show that we are able to improve the accuracy of fusion decisions compared to other popular fusion techniques. Trust based fusion schemes show worst case decision error rates of 5% while inversion based fusion show 4% as opposed majority voting schemes that have 18% error rate. We also show that the proposed channel centric Bayesian inference based trust model is able to distinguish between attacked and non-attacked channels for both static and dynamic collaborative attacks. We are also able to show that attacked channels have significantly lower trust values than channels that are not(-) a metric that can be used by nodes to rank the quality of inference on channels.
Show less - Date Issued
- 2015
- Identifier
- CFE0005764, ucf:50081
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0005764
- Title
- ANALYZING THE COMMUNITY STRUCTURE OF WEB-LIKE NETWORKS: MODELS AND ALGORITHMS.
- Creator
-
Cami, Aurel, Deo, Narsingh, University of Central Florida
- Abstract / Description
-
This dissertation investigates the community structure of web-like networks (i.e., large, random, real-life networks such as the World Wide Web and the Internet). Recently, it has been shown that many such networks have a locally dense and globally sparse structure with certain small, dense subgraphs occurring much more frequently than they do in the classical Erdös-Rényi random graphs. This peculiarity--which is commonly referred to as community structure--has been observed in...
Show moreThis dissertation investigates the community structure of web-like networks (i.e., large, random, real-life networks such as the World Wide Web and the Internet). Recently, it has been shown that many such networks have a locally dense and globally sparse structure with certain small, dense subgraphs occurring much more frequently than they do in the classical Erdös-Rényi random graphs. This peculiarity--which is commonly referred to as community structure--has been observed in seemingly unrelated networks such as the Web, email networks, citation networks, biological networks, etc. The pervasiveness of this phenomenon has led many researchers to believe that such cohesive groups of nodes might represent meaningful entities. For example, in the Web such tightly-knit groups of nodes might represent pages with a common topic, geographical location, etc., while in the neural networks they might represent evolved computational units. The notion of community has emerged in an effort to formalize the empirical observation of the locally dense globally sparse structure of web-like networks. In the broadest sense, a community in a web-like network is defined as a group of nodes that induces a dense subgraph which is sparsely linked with the rest of the network. Due to a wide array of envisioned applications, ranging from crawlers and search engines to network security and network compression, there has recently been a widespread interest in finding efficient community-mining algorithms. In this dissertation, the community structure of web-like networks is investigated by a combination of analytical and computational techniques: First, we consider the problem of modeling the web-like networks. In the recent years, many new random graph models have been proposed to account for some recently discovered properties of web-like networks that distinguish them from the classical random graphs. The vast majority of these random graph models take into account only the addition of new nodes and edges. Yet, several empirical observations indicate that deletion of nodes and edges occurs frequently in web-like networks. Inspired by such observations, we propose and analyze two dynamic random graph models that combine node and edge addition with a uniform and a preferential deletion of nodes, respectively. In both cases, we find that the random graphs generated by such models follow power-law degree distributions (in agreement with the degree distribution of many web-like networks). Second, we analyze the expected density of certain small subgraphs--such as defensive alliances on three and four nodes--in various random graphs models. Our findings show that while in the binomial random graph the expected density of such subgraphs is very close to zero, in some dynamic random graph models it is much larger. These findings converge with our results obtained by computing the number of communities in some Web crawls. Next, we investigate the computational complexity of the community-mining problem under various definitions of community. Assuming the definition of community as a global defensive alliance, or a global offensive alliance we prove--using transformations from the dominating set problem--that finding optimal communities is an NP-complete problem. These and other similar complexity results coupled with the fact that many web-like networks are huge, indicate that it is unlikely that fast, exact sequential algorithms for mining communities may be found. To handle this difficulty we adopt an algorithmic definition of community and a simpler version of the community-mining problem, namely: find the largest community to which a given set of seed nodes belong. We propose several greedy algorithms for this problem: The first proposed algorithm starts out with a set of seed nodes--the initial community--and then repeatedly selects some nodes from community's neighborhood and pulls them in the community. In each step, the algorithm uses clustering coefficient--a parameter that measures the fraction of the neighbors of a node that are neighbors themselves--to decide which nodes from the neighborhood should be pulled in the community. This algorithm has time complexity of order , where denotes the number of nodes visited by the algorithm and is the maximum degree encountered. Thus, assuming a power-law degree distribution this algorithm is expected to run in near-linear time. The proposed algorithm achieved good accuracy when tested on some real and computer-generated networks: The fraction of community nodes classified correctly is generally above 80% and often above 90% . A second algorithm based on a generalized clustering coefficient, where not only the first neighborhood is taken into account but also the second, the third, etc., is also proposed. This algorithm achieves a better accuracy than the first one but also runs slower. Finally, a randomized version of the second algorithm which improves the time complexity without affecting the accuracy significantly, is proposed. The main target application of the proposed algorithms is focused crawling--the selective search for web pages that are relevant to a pre-defined topic.
Show less - Date Issued
- 2005
- Identifier
- CFE0000900, ucf:46726
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0000900
- Title
- COLLABORATION ENFORCEMENT IN MOBILE AD HOC NETWORKS.
- Creator
-
Jiang, Ning, Hua, Kien, University of Central Florida
- Abstract / Description
-
Mobile Ad hoc NETworks (MANETs) have attracted great research interest in recent years. Among many issues, lack of motivation for participating nodes to collaborate forms a major obstacle to the adoption of MANETs. Many contemporary collaboration enforcement techniques employ reputation mechanisms for nodes to avoid and penalize malicious participants. Reputation information is propagated among participants and updated based on complicated trust relationships to thwart false accusation of...
Show moreMobile Ad hoc NETworks (MANETs) have attracted great research interest in recent years. Among many issues, lack of motivation for participating nodes to collaborate forms a major obstacle to the adoption of MANETs. Many contemporary collaboration enforcement techniques employ reputation mechanisms for nodes to avoid and penalize malicious participants. Reputation information is propagated among participants and updated based on complicated trust relationships to thwart false accusation of benign nodes. The aforementioned strategy suffers from low scalability and is likely to be exploited by adversaries. To address these problems, we first propose a finite state model. With this technique, no reputation information is propagated in the network and malicious nodes cannot cause false penalty to benign hosts. Misbehaving node detection is performed on-demand; and malicious node punishment and avoidance are accomplished by only maintaining reputation information within neighboring nodes. This scheme, however, requires that each node equip with a tamper-proof hardware. In the second technique, no such restriction applies. Participating nodes classify their one-hop neighbors through direct observation and misbehaving nodes are penalized within their localities. Data packets are dynamically rerouted to circumvent selfish nodes. In both schemes, overall network performance is greatly enhanced. Our approach significantly simplifies the collaboration enforcement process, incurs low overhead, and is robust against various malicious behaviors. Simulation results based on different system configurations indicate that the proposed technique can significantly improve network performance with very low communication cost.
Show less - Date Issued
- 2006
- Identifier
- CFE0001047, ucf:46820
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0001047
- Title
- SPECTRUM SHARING AND SERVICE PRICING IN DYNAMIC SPECTRUM ACCESS NETWORKS.
- Creator
-
Brahma, Swastik, Chatterjee, Mainak, University of Central Florida
- Abstract / Description
-
Traditionally, radio spectrum has been statically allocated to wireless service providers (WSPs). Regulators, like FCC, give wireless service providers exclusive long term licenses for using specific range of frequencies in particular geographic areas. Moreover, restrictions are imposed on the technologies to be used and the services to be provided. The lack of flexibility in static spectrum allocation constrains the ability to make use of new technologies and the ability to redeploy the...
Show moreTraditionally, radio spectrum has been statically allocated to wireless service providers (WSPs). Regulators, like FCC, give wireless service providers exclusive long term licenses for using specific range of frequencies in particular geographic areas. Moreover, restrictions are imposed on the technologies to be used and the services to be provided. The lack of flexibility in static spectrum allocation constrains the ability to make use of new technologies and the ability to redeploy the spectrum to higher valued uses, thereby resulting in inefficient spectrum utilization [23, 38, 42, 62, 67]. These limitations have motivated a paradigm shift from static spectrum allocation towards a more 'liberalized' notion of spectrum management in which secondary users can borrow idle spectrum from primary spectrum licensees, without causing harmful interference to the latter- a notion commonly referred to as dynamic spectrum access (DSA) or open spectrum access ,. Cognitive radio [30, 47], empowered by Software Defined Radio (SDR), is poised to promote the efficient use of spectrum by adopting this open spectrum approach. In this dissertation, we first address the problem of dynamic channel (spectrum) access by a set of cognitive radio enabled nodes, where each node acting in a selfish manner tries to access and use as many channels as possible, subject to the interference constraints. We model the dynamic channel access problem as a modified Rubinstein-Stahl bargaining game. In our model, each node negotiates with the other nodes to obtain an agreeable sharing rule of the available channels, such that, no two interfering nodes use the same channel. We solve the bargaining game by finding Subgame Perfect Nash Equilibrium (SPNE) strategies of the nodes. First, we consider finite horizon version of the bargaining game and investigate its SPNE strategies that allow each node to maximize its utility against the other nodes (opponents). We then extend these results to the infinite horizon bargaining game. Furthermore, we identify Pareto optimal equilibria of the game for improving spectrum utilization. The bargaining solution ensures that no node is starved of channels. The spectrum that a secondary node acquires comes to it at a cost. Thus it becomes important to study the 'end system' perspective of such a cost, by focusing on its implications. Specifically, we consider the problem of incentivizing nodes to provide the service of routing using the acquired spectrum. In this problem, each secondary node having a certain capacity incurs a cost for routing traffic through it. Secondary nodes will not have an incentive to relay traffic unless they are compensated for the costs they incur in forwarding traffic. We propose a path auction scheme in which each secondary node announces its cost and capacity to the routing mechanism, both of which are considered as private information known only to the node. We design a route selection mechanism and a pricing function that can induce nodes to reveal their cost and capacity honestly (making our auction truthful), while minimizing the payment that needs to be given to the nodes (making our auction optimal). By considering capacity constraint of the nodes, we explicitly support multiple path routing. For deploying our path auction based routing mechanism in DSA networks, we provide polynomial time algorithms to find the optimal route over which traffic should be routed and to compute the payment that each node should receive. All our proposed algorithms have been evaluated via extensive simulation experiments. These results help to validate our design philosophy and also illustrate the effectiveness of our solution approach.
Show less - Date Issued
- 2011
- Identifier
- CFE0004049, ucf:49125
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0004049
- Title
- Reliable Spectrum Hole Detection in Spectrum-Heterogeneous Mobile Cognitive Radio Networks via Sequential Bayesian Non-parametric Clustering.
- Creator
-
Zaeemzadeh, Alireza, Rahnavard, Nazanin, Vosoughi, Azadeh, Qi, GuoJun, University of Central Florida
- Abstract / Description
-
In this work, the problem of detecting radio spectrum opportunities in spectrum-heterogeneous cognitive radio networks is addressed. Spectrum opportunities are the frequency channels that are underutilized by the primary licensed users. Thus, by enabling the unlicensed users to detect and utilize them, we can improve the efficiency, reliability, and the flexibility of the radio spectrum usage. The main objective of this work is to discover the spectrum opportunities in time, space, and...
Show moreIn this work, the problem of detecting radio spectrum opportunities in spectrum-heterogeneous cognitive radio networks is addressed. Spectrum opportunities are the frequency channels that are underutilized by the primary licensed users. Thus, by enabling the unlicensed users to detect and utilize them, we can improve the efficiency, reliability, and the flexibility of the radio spectrum usage. The main objective of this work is to discover the spectrum opportunities in time, space, and frequency domains, by proposing a low-cost and practical framework. Spectrum-heterogeneous networks are the networks in which different sensors experience different spectrum opportunities. Thus, the sensing data from sensors cannot be combined to reach consensus and to detect the spectrum opportunities. Moreover, unreliable data, caused by noise or malicious attacks, will deteriorate the performance of the decision-making process. The problem becomes even more challenging when the locations of the sensors are unknown. In this work, a probabilistic model is proposed to cluster the sensors based on their readings, not requiring any knowledge of location of the sensors. The complexity of the model, which is the number of clusters, is automatically inferred from the sensing data. The processing node, also referred to as the base station or the fusion center, infers the probability distributions of cluster memberships, channel availabilities, and devices' reliability in an online manner. After receiving each chunk of sensing data, the probability distributions are updated, without requiring to repeat the computations on previous sensing data. All the update rules are derived mathematically, by employing Bayesian data analysis techniques and variational inference.Furthermore, the inferred probability distributions are employed to assign unique spectrum opportunities to each of the sensors. To avoid interference among the sensors, physically adjacent devices should not utilize the same channels. However, since the location of the devices is not known, cluster membership information is used as a measure of adjacency. This is based on the assumption that the measurements of the devices are spatially correlated. Thus, adjacent devices, which experience similar spectrum opportunities, belong to the same cluster. Then, the problem is mapped into a energy minimization problem and solved via graph cuts. The goal of the proposed graph-theory-based method is to assign each device an available channel, while avoiding interference among neighboring devices. The numerical simulations illustrates the effectiveness of the proposed methods, compared to the existing frameworks.
Show less - Date Issued
- 2017
- Identifier
- CFE0006963, ucf:51639
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0006963
- Title
- VIRTUALIZATION AND SELF-ORGANIZATION FOR UTILITY COMPUTING.
- Creator
-
Saleh, Mehdi, Marinescu, Dan, University of Central Florida
- Abstract / Description
-
We present an alternative paradigm for utility computing when the delivery of service is subject to binding contracts; the solution we propose is based on resource virtualization and a self-management scheme. A virtual cloud aggregates set virtual machines to work in concert for the tasks specified by the service agreement. A first step for the establishment of a virtual cloud is to create a scale-free overlay network through a biased random walk; scale-free networks enjoy a set of remarkable...
Show moreWe present an alternative paradigm for utility computing when the delivery of service is subject to binding contracts; the solution we propose is based on resource virtualization and a self-management scheme. A virtual cloud aggregates set virtual machines to work in concert for the tasks specified by the service agreement. A first step for the establishment of a virtual cloud is to create a scale-free overlay network through a biased random walk; scale-free networks enjoy a set of remarkable properties such as: robustness against random failures, favorable scaling, and resilience to congestion, small diameter, and average path length. Constrains such as limits on the cost of per unit of service, total cost, or the requirement to use only "green" computing cycles are then considered when a node of this overlay network decides whether to join the virtual cloud or not. A VIRTUAL CLOUD consists of a subset of the nodes assigned to the tasks specified by a Service Level Agreement, SLA, as well as a virtual interconnection network, or overlay network, for the virtual cloud. SLAs could serve as a congestion control mechanism for an organization providing utility computing; this mechanism allows the system to reject new contracts when there is the danger of overloading the system and failing to fulfill existing contractual obligations. The objective of this thesis is to show that biased random walks in power law networks are capable of responding to dynamic changes of the workload in utility computing.
Show less - Date Issued
- 2011
- Identifier
- CFE0003725, ucf:48768
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0003725
- Title
- The effects of chronic sleep deprivation on sustained attention: A study of brain dynamic functional connectivity.
- Creator
-
He, Yiling, Karwowski, Waldemar, Xanthopoulos, Petros, Hancock, Peter, Mikusinski, Piotr, University of Central Florida
- Abstract / Description
-
It is estimated that about 35-40% of adults in the U.S. suffer from insufficient sleep. Chronic sleep deprivation has become a prevalent phenomenon because of contemporary lifestyle and work-related factors. Sleep deprivation can reduce the capabilities and efficiency of attentional performance by impairing perception, increasing effort to maintain concentration, as well as introducing vision disturbance. Thus, it is important to understand the neural mechanisms behind how chronic sleep...
Show moreIt is estimated that about 35-40% of adults in the U.S. suffer from insufficient sleep. Chronic sleep deprivation has become a prevalent phenomenon because of contemporary lifestyle and work-related factors. Sleep deprivation can reduce the capabilities and efficiency of attentional performance by impairing perception, increasing effort to maintain concentration, as well as introducing vision disturbance. Thus, it is important to understand the neural mechanisms behind how chronic sleep deprivation impairs sustained attention.In recent years, more attention has been paid to the study of the integration between anatomically distributed and functionally connected brain regions. Functional connectivity has been widely used to characterize brain functional integration, which measures the statistical dependency between neurophysiological events of the human brain. Further, evidence from recent studies has shown the non-stationary nature of brain functional connectivity, which may reveal more information about the human brain. Thus, the objective of this thesis is to investigate the effects of chronic sleep deprivation on sustained attention from the perspective of dynamic functional connectivity.A modified spatial cueing paradigm was used to assess human sustained attention in rested wakefulness and chronic sleep deprivation conditions. Partial least squares approach was applied to distinguish brain functional connectivity for the experimental conditions. With the integration of a sliding-window approach, dynamic patterns of brain functional connectivity were identified in two experimental conditions. The brain was modeled as a series of dynamic functional networks in each experimental condition. Graph theoretic analysis was performed to investigate the dynamic properties of brain functional networks, using network measures of clustering coefficient and characteristics path length.In the chronic sleep deprivation condition, a compensation mechanism between highly clustered organization and ineffective adaptability of brain functional networks was observed. Specifically, a highly clustered organization of brain functional networks was illustrated with a large clustering coefficient. This organization suggested that brain utilizes more connections to maintain attention in the chronic sleep deprivation condition. A smaller impact of clustering coefficient variation on characteristics path lengths indicated an ineffective adaptability of brain functional networks in the chronic sleep deprivation condition. In the rested wakefulness condition, brain functional networks showed the small-world topology in general, with the average small-world topology index larger than one. Small-world topology was identified as an optimal network structure with the balance between local information processing and global integration. Given the fluctuating values of the index over time, small-world brain networks were observed in most cases, indicating an effective adaptability of the human brain to maintain the dominance of small-world networks in the rested wakefulness condition. On the contrary, given that the average small-world topology index was smaller than one, brain functional networks generally exhibited random network structure. From the perspective of dynamic functional networks, even though there were few cases showing small-world brain networks, brain functional networks failed to maintain the dominance of small-world topology in the chronic sleep deprivation condition.In conclusion, to the best of our knowledge this thesis was the first to investigate the effects of chronic sleep deprivation on sustained attention from the perspective of dynamic brain functional connectivity. A compensation mechanism between highly clustered organization and ineffective adaptability of brain functional networks was observed in the chronic sleep deprivation condition. Furthermore, chronic sleep deprivation impaired sustained attention by reducing the effectiveness of brain functional networks' adaptability, resulting in the disrupted dominance of small-world brain networks.
Show less - Date Issued
- 2015
- Identifier
- CFE0006036, ucf:50990
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0006036
- Title
- Learning Dynamic Network Models for Complex Social Systems.
- Creator
-
Hajibagheri, Alireza, Sukthankar, Gita, Turgut, Damla, Chatterjee, Mainak, Lakkaraju, Kiran, University of Central Florida
- Abstract / Description
-
Human societies are inherently complex and highly dynamic, resulting in rapidly changing social networks, containing multiple types of dyadic interactions. Analyzing these time-varying multiplex networks with approaches developed for static, single layer networks often produces poor results. To address this problem, our approach is to explicitly learn the dynamics of these complex networks. This dissertation focuses on five problems: 1) learning link formation rates; 2) predicting changes in...
Show moreHuman societies are inherently complex and highly dynamic, resulting in rapidly changing social networks, containing multiple types of dyadic interactions. Analyzing these time-varying multiplex networks with approaches developed for static, single layer networks often produces poor results. To address this problem, our approach is to explicitly learn the dynamics of these complex networks. This dissertation focuses on five problems: 1) learning link formation rates; 2) predicting changes in community membership; 3) using time series to predict changes in network structure; 4) modeling coevolution patterns across network layers and 5) extracting information from negative layers of a multiplex network.To study these problems, we created a rich dataset extracted from observing social interactions in the massively multiplayer online game Travian. Most online social media platforms are optimized to support a limited range of social interactions, primarily focusing on communication and information sharing. In contrast, relations in massively-multiplayer online games (MMOGs) are often formed during the course of gameplay and evolve as the game progresses. To analyze the players' behavior, we constructed multiplex networks with link types for raid, communication, and trading.The contributions of this dissertation include 1) extensive experiments on the dynamics of networks formed from diverse social processes; 2) new game theoretic models for community detection in dynamic networks; 3) supervised and unsupervised methods for link prediction in multiplex coevolving networks for both positive and negative links. We demonstrate that our holistic approach for modeling network dynamics in coevolving, multiplex networks outperforms factored methods that separately consider temporal and cross-layer patterns.
Show less - Date Issued
- 2017
- Identifier
- CFE0006598, ucf:51306
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0006598
- Title
- A Comparative Evaluation of FDSA,GA, and SA Non-Linear Programming Algorithms and Development of System-Optimal Dynamic Congestion Pricing Methodology on I-95 Express.
- Creator
-
Graham, Don, Radwan, Ahmed, Abdel-Aty, Mohamed, Al-Deek, Haitham, Uddin, Nizam, University of Central Florida
- Abstract / Description
-
As urban population across the globe increases, the demand for adequatetransportation grows. Several strategies have been suggested as a solution to the congestion which results from this high demand outpacing the existing supply of transportation facilities.High (-)Occupancy Toll (HOT) lanes have become increasingly more popular as a feature on today's highway system. The I-95 Express HOT lane in Miami Florida, which is currently being expanded from a single Phase (Phase I) into two Phases,...
Show moreAs urban population across the globe increases, the demand for adequatetransportation grows. Several strategies have been suggested as a solution to the congestion which results from this high demand outpacing the existing supply of transportation facilities.High (-)Occupancy Toll (HOT) lanes have become increasingly more popular as a feature on today's highway system. The I-95 Express HOT lane in Miami Florida, which is currently being expanded from a single Phase (Phase I) into two Phases, is one such HOT facility. With the growing abundance of such facilities comes the need for in- depth study of demand patterns and development of an appropriate pricing scheme which reduces congestion.This research develops a method for dynamic pricing on the I-95 HOT facility such as to minimize total travel time and reduce congestion. We apply non-linear programming (NLP) techniques and the finite difference stochastic approximation (FDSA), genetic algorithm (GA) and simulated annealing (SA) stochastic algorithms to formulate and solve the problem within a cell transmission framework. The solution produced is the optimal flow and optimal toll required to minimize total travel time and thus is the system-optimal solution.We perform a comparative evaluation of FDSA, GA and SA non-linear programmingalgorithms used to solve the NLP and the ANOVA results show that there are differences in the performance of the NLP algorithms in solving this problem and reducing travel time. We then conclude by demonstrating that econometric forecasting methods utilizing vector autoregressive (VAR) techniques can be applied to successfully forecast demand for Phase 2 of the 95 Express which is planned for 2014.
Show less - Date Issued
- 2013
- Identifier
- CFE0005000, ucf:50019
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0005000