ASU Electronic Theses and Dissertations
This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.
In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.
Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.
and cellular UMTS MAC protocols) across multiple unreliable communication links (such as Ethernet). The purpose is to introduce the appropriate hardware, software, and system architecture required to provide the basis for a wireless system (using a 802.11a/b/g
and cellular protocols as a model) that can scale to support thousands of users simultaneously (say in a large office building, super chain store, etc.) or in a small, but very dense communication RF region. Elements of communication between a base station and a Mobile Station will be analyzed statistically to demonstrate higher throughput, fewer collisions and lower bit error rates (BER) with the given bandwidth defined by the 802.11n wireless specification (use of MIMO channels will be evaluated). A new network nodal paradigm will be presented. Alternative link layer communication techniques will be recommended and analyzed for the affect on mobile devices. The analysis will describe how the algorithms used by state machines implemented on Mobile Stations and Wi-Fi client devices will be influenced by new base station transmission behavior. New hardware design techniques that can be used to optimize this architecture as well as hardware design principles in regard to the minimal hardware functional blocks required to support such a system design will be described. Hardware design and verification simulation techniques to prove the hardware design will accommodate an acceptable level of performance to meet the strict timing as it relates to this new system architecture.
order to access air pollutants with high spatial and temporal resolutions, it is
necessary to develop an affordable, small size and weight, low power, high
sensitivity and selectivity, and wireless enable device that can provide real time
monitoring of air pollutants. Three different kind of such devices are presented, they
are targeting environmental pollutants such as volatile organic components (VOCs),
nitrogen dioxide (NO2) and ozone. These devices employ innovative detection
methods, such as quartz crystal tuning fork coated with molecularly imprinted
polymer and chemical reaction induced color change colorimetric sensing. These
portable devices are validated using the gold standards in the laboratory, and their
functionality and capability are proved during the field tests, make them great tools
for various air quality monitoring applications.
transmitted according to multi-channel slotted Aloha principles. The
random access is controlled through a limit W on the number of
transmission attempts and a timeout period for uniform backoff after a
collision. We model the LTE-Advanced random access system by formulating
the equilibrium condition for the ratio of the number of requests
successful within the permitted number of transmission attempts to those
successful in one attempt. We prove that for W≤8 there is only one
equilibrium operating point and for W≥9 there are three operating
points if the request load ρ is between load boundaries ρ1
and ρ2. We analytically identify these load boundaries as well as
the corresponding system operating points. We analyze the throughput and
delay of successful requests at the operating points and validate the
analytical results through simulations. Further, we generalize the
results using a steady-state equilibrium based approach and develop
models for single-channel and multi-channel systems, incorporating the
barring probability PB. Ultimately, we identify the de-correlating
effect of parameters O, PB, and Tomax and introduce the
Poissonization effect due to the backlogged requests in a slot. We
investigate the impact of Poissonization on different traffic and
conclude this thesis.
In this dissertation, I am interested in the special authentication demands of smart devices and about to satisfy the demands. First, I study how the features of smart devices affect user identity authentications. For identity authentication domain, I aim to design a continuous, forge-resistant authentication mechanism that does not interrupt user-device interactions. I propose a mechanism that authenticates user identity based on the user's finger movement patterns. Next, I study a smart-device-specific authentication, proximity authentication, which authenticates whether two devices are in close proximity. For prox- imity authentication domain, I aim to design a user-friendly authentication mechanism that can defend against relay attacks. In addition, I restrict the authenticated distance to the scale of near field, i.e., a few centimeters. My first design utilizes a user's coherent two-finger movement on smart device screen to restrict the distance. To achieve a fully-automated system, I explore acoustic communications and propose a novel near field authentication system.