Open Access. Powered by Scholars. Published by Universities.®

Systems and Communications Commons

Open Access. Powered by Scholars. Published by Universities.®

1,155 Full-Text Articles 1,453 Authors 663,093 Downloads 72 Institutions

All Articles in Systems and Communications

Faceted Search

1,155 full-text articles. Page 1 of 45.

Transactive Energy Design For Integrated Transmission And Distribution Systems, Hieu Trung Nguyen, Swathi Battula, Rohit Reddy Takkala, Zhaoyu Wang, Leigh Tesfatsion 2018 Iowa State University

Transactive Energy Design For Integrated Transmission And Distribution Systems, Hieu Trung Nguyen, Swathi Battula, Rohit Reddy Takkala, Zhaoyu Wang, Leigh Tesfatsion

Economics Working Papers

The increasing deployment of distributed energy resources (DERs) is disrupting every aspect of power system operations, from retail distribution to wholesale production and transmission. This paper reports on the development of an agentbased test system enabling the study of new transactive energy system (TES) designs to ensure the reliable efficient operation of integrated transmission and distribution (ITD) systems with growing DER penetration. This ITD test system is used to explore the ability of a non-profit Distribution System Operator (DSO), participating within an ITD system, to use an innovative TES design to manage the power usage of DER devices in accordance ...


Real-Time Intrusion Detection Using Multidimensional Sequence-To-Sequence Machine Learning And Adaptive Stream Processing, Gobinath Loganathan 2018 The University of Western Ontario

Real-Time Intrusion Detection Using Multidimensional Sequence-To-Sequence Machine Learning And Adaptive Stream Processing, Gobinath Loganathan

Electronic Thesis and Dissertation Repository

A network intrusion is any unauthorized activity on a computer network. There are host-based and network-based Intrusion Detection Systems (IDS's), of which there are each signature-based and anomaly-based detection methods. An anomalous network behavior can be defined as an intentional violation of the expected sequence of packets. In a real-time network-based IDS, incoming packets are treated as a stream of data. A stream processor takes any stream of data or events and extracts interesting patterns on the fly. This representation allows applying statistical anomaly detection using sequence prediction algorithms as well as using a stream processor to perform signature-based ...


Cmos Radioactive Isotope Identification With Multichannel Analyzer And Embedded Neural Network, Samuel Murray 2018 University of Nebraska-Lincoln

Cmos Radioactive Isotope Identification With Multichannel Analyzer And Embedded Neural Network, Samuel Murray

Theses, Dissertations, and Student Research from Electrical & Computer Engineering

A radiation detection and identification system is designed and implemented to perform gamma ray spectroscopy on radioactive sources and identify which isotopes are present in the sources. A multichannel analyzer is implemented on an ASIC to process the signal produced from gamma rays detected by a scintillator and photomultiplier tube and to quantize the gamma ray energies to build a histogram. A fast, low memory embedded neural network is implemented on a microcontroller ASIC to identify the isotopes present in the gamma ray histogram produced by the multichannel analyzer in real time.

Advisors: Sina Balkir and Michael Homan


Integration Of Rfid And Industrial Wsns To Create A Smart Industrial Environment, Ning Pan 2018 The University of Western Ontario

Integration Of Rfid And Industrial Wsns To Create A Smart Industrial Environment, Ning Pan

Electronic Thesis and Dissertation Repository

A smart environment is a physical space that is seamlessly embedded with sensors, actuators, displays, and computing devices, connected through communication networks for data collection, to enable various pervasive applications. Radio frequency identification (RFID) and Wireless Sensor Networks (WSNs) can be used to create such smart environments, performing sensing, data acquisition, and communication functions, and thus connecting physical devices together to form a smart environment.

This thesis first examines the features and requirements a smart industrial environment. It then focuses on the realization of such an environment by integrating RFID and industrial WSNs. ISA100.11a protocol is considered in particular ...


Constant Envelope Dct- And Fft- Based Multicarrier Systems, Rayan Alsisi 2018 The University of Western Ontario

Constant Envelope Dct- And Fft- Based Multicarrier Systems, Rayan Alsisi

Electronic Thesis and Dissertation Repository

Discrete Cosine Transform (DCT)- and Fast Fourier Transform (FFT)- based Orthogonal Frequency Division Multiplexing (OFDM) systems with a variety of angle modulations are considered for data transmission. These modulations are used with the purpose of achieving Constant Envelope (CE) transmitted signals, for superior power efficiency with nonlinear High Power Amplifier (HPA), typically used at the transmitter in OFDM systems. Specifically, four angle modulations are considered: i) Phase Modulation (PM); ii) Frequency Modulation (FM); iii) Continuous Phase Modulation (CPM); and iv) Continuous Phase Chirp Modulation (CPCM). Descriptions of DCT- and FFT- based OFDM systems with M-ary Pulse Amplitude Modulation (MPAM) mapper ...


Vehicle Pseudonym Association Attack Model, Pierson Yieh, Pierson Yieh 2018 California Polytechnic State University, San Luis Obispo

Vehicle Pseudonym Association Attack Model, Pierson Yieh, Pierson Yieh

Master's Theses and Project Reports

With recent advances in technology, Vehicular Ad-hoc Networks (VANETs) have grown in application. One of these areas of application is Vehicle Safety Communication (VSC) technology. VSC technology allows for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that enhance vehicle safety and driving experience. However, these newly developing technologies bring with them a concern for the vehicular privacy of drivers. Vehicles already employ the use of pseudonyms, unique identifiers used with signal messages for a limited period of time, to prevent long term tracking. But can attackers still attack vehicular privacy even when vehicles employ a pseudonym change strategy? The major contribution ...


Applications Of Complex Network Analysis In Electric Power Systems, Mahmoud Saleh, Yusef Esa, Ahmed Mohamed 2018 CUNY City College

Applications Of Complex Network Analysis In Electric Power Systems, Mahmoud Saleh, Yusef Esa, Ahmed Mohamed

Publications and Research

This paper provides a review of the research conducted on complex network analysis (CNA) in electric power systems. Moreover, a new approach is presented to find optimal locations for microgrids (MGs) in electric distribution systems (EDS) utilizing complex network analysis. The optimal placement in this paper points to the location that will result in enhanced grid resilience, reduced power losses and line loading, better voltage stability, and a supply to critical loads during a blackout. The criteria used to point out the optimal placement of the MGs were predicated on the centrality analysis selected from the complex network theory, the ...


Stochastic Modeling Of Wireless Energy Transfer With Applications In Wireless Displacement Sensing Of Structures, Shaun G. Veilleux 2018 University of Maine

Stochastic Modeling Of Wireless Energy Transfer With Applications In Wireless Displacement Sensing Of Structures, Shaun G. Veilleux

Electronic Theses and Dissertations

Wireless communications are being utilized in nearly every field of work and impact virtually everyone's daily life. With the increased use of wireless sensors, the difficulty of powering them becomes more apparent. One emerging technology is the use of wireless energy transfer which utilizes either a designated transmitter or harvests otherwise wasted energy. Since the amount of transferable wireless energy is limited modeling and simulating a system's probability of operation is desired in order to maximize the run time of the sensor. These simulations allow for the investigation into the impact of a smart scheduling algorithm that can ...


Design Of An All-Dielectric Sublayer For Enhanced Transmittance In Stacked Antenna Array Applications, Matthew Bester 2018 The University of Western Ontario

Design Of An All-Dielectric Sublayer For Enhanced Transmittance In Stacked Antenna Array Applications, Matthew Bester

Electronic Thesis and Dissertation Repository

In spatially constrained applications, the overlapping of antenna arrays can be unavoidable and its presence can lead to a blockage in the line-of-sight for the underlying antennas. Although previous investigations focused predominantly on the contribution of the ground plane and feed network-which were resolved through the use of frequency selective surfaces and proper feed network design, respectively-it is believed that the ground plane, substrate, and patch regions can emplace a substantial combined impedance. To rectify the transmission through these layers, an all-dielectric implementation is suggested based on the properties of complementary media and Fabry-Perot resonance shifting phenomena. Consequently, both spherical ...


Software Defined Radar For Vital Sign Detection, Chandler J. Bauder, James Bates, Steven Engel, James S. Tucker, Fangzhou Liu 2018 University of Tennessee, Knoxville

Software Defined Radar For Vital Sign Detection, Chandler J. Bauder, James Bates, Steven Engel, James S. Tucker, Fangzhou Liu

University of Tennessee Honors Thesis Projects

No abstract provided.


Performance Enhancement By Exploiting The Spatial Domain For Cost, Space And Spectrum Constraint 5g Communication, Golara Zafari 2018 The University of Western Ontario

Performance Enhancement By Exploiting The Spatial Domain For Cost, Space And Spectrum Constraint 5g Communication, Golara Zafari

Electronic Thesis and Dissertation Repository

With everlasting increase of connectivity demand and high speed data communication, lots of progresses have been made to provide a sufficient quality of services (QoS). Several advanced technologies have been the cornerstone of this trend in academia as well as in industry. Nevertheless, there are some implementation challenges, which needs to be closely investigated. In this thesis, among all challenges, we elaborate on those related to number of radio frequency (RF) chains and resource scarcity.

The principle idea behind our proposed initial solution is to exploit the spatial domain as an additional degree of freedom. To be more specific, we ...


Efficient Traffic Management Algorithms For The Core Network Using Device-To-Device Communication And Edge Caching, Hessam Yousefi 2018 The University of Western Ontario

Efficient Traffic Management Algorithms For The Core Network Using Device-To-Device Communication And Edge Caching, Hessam Yousefi

Electronic Thesis and Dissertation Repository

Exponentially growing number of communicating devices and the need for faster, more reliable and secure communication are becoming major challenges for current mobile communication architecture. More number of connected devices means more bandwidth and a need for higher Quality of Service (QoS) requirements, which bring new challenges in terms of resource and traffic management. Traffic offload to the edge has been introduced to tackle this demand-explosion that let the core network offload some of the contents to the edge to reduce the traffic congestion. Device-to-Device (D2D) communication and edge caching, has been proposed as promising solutions for offloading data. D2D ...


Algorithms For Asynchronous Coded Caching, Hooshang Ghasemi, Aditya Ramamoorthy 2018 Iowa State University

Algorithms For Asynchronous Coded Caching, Hooshang Ghasemi, Aditya Ramamoorthy

Electrical and Computer Engineering Conference Papers, Posters and Presentations

The original formulation of the coded caching problem assumes that the file requests from the users are synchronized, i.e., they arrive at the server at the same time. Several subsequent contributions work under the same assumption. Furthermore, the majority of prior work does not consider a scenario where users have deadlines. In our previous work we formulated the asynchronous coded caching problem where user requests arrive at different times. Furthermore, the users have specified deadlines. We proposed a linear program for obtaining its optimal solution. However, the size of the LP (number of constraints and variables) grows rather quickly ...


A Low-Cost Arduino-Based Home Security System, Qi Lu 2018 University of Northern Iowa

A Low-Cost Arduino-Based Home Security System, Qi Lu

Annual Graduate Student Symposium

Home security is important for every family, especially for the family which lives in a big house. Because the house is much bigger than apartment or dorm, it is hard for the owner to notice if someone is intruding into their house. On the other hand, the home security systems sell in in the market are usually expensive. To address this problem, a low-cost home security system is designed and implemented. When the system is armed, infrared sensors are used to detect intruders. When a person is detected, sensors will send the signal to the user wirelessly, and indoor alarm ...


Multitarget Joint Delay And Doppler Shift Estimation In Bistatic Passive Radar, Mohammed Rashid 2018 Louisiana State University and Agricultural and Mechanical College

Multitarget Joint Delay And Doppler Shift Estimation In Bistatic Passive Radar, Mohammed Rashid

LSU Master's Theses

Bistatic passive radar (BPR) system does not transmit any electromagnetic signal unlike the active radar, but employs an existing Illuminator of opportunity (IO) in the environment, for instance, a broadcast station, to detect and track the targets of interest. Therefore, a BPR system is comprised of two channels. One is the reference channel that collects only the IO signal, and the other is the surveillance channel which is used to capture the targets' reflected signals. When the IO signal reflected from multiple targets is captured in the surveillance channel (SC) then estimating the delays and Doppler shifts of all the ...


Implementing A Total Productive Maintenance Approach Into An Improvement At S Company, Xiaomeng Sun 2018 Western Kentucky University

Implementing A Total Productive Maintenance Approach Into An Improvement At S Company, Xiaomeng Sun

Masters Theses & Specialist Projects

The study improved the overall equipment effectiveness (OEE) of machines and processes through the implementation of a total productive maintenance (TPM) approach at Company S over a three-month period. By comparing the OEE of equipment before and after the implementation of autonomous maintenance, this study concluded that autonomous maintenance improves OEE. The target of this study was one general product line at a polytetrafluoroethylene (PTFE) plant. Due to time limitations, the study only applied autonomous maintenance to operational activities. This research involved machine and processes selection, condition assessment, baseline OEE assessment, operator training, execution of autonomous maintenance, and OEE measurement ...


Generalized Robust Mtl Semantics For Problems In Cardiac Electrophysiology, Houssam Abbas, Rahul Mangharam 2018 University of Pennsylvania

Generalized Robust Mtl Semantics For Problems In Cardiac Electrophysiology, Houssam Abbas, Rahul Mangharam

Real-Time and Embedded Systems Lab (mLAB)

Robustness-Guided Falsification (RGF) is an efficient

testing technique that tries to find a system execution that

violates some formal specification, by minimizing the robustness

of the specification over the set of initial conditions of the

system. Robustness uses an underlying distance function on

the space of system executions. As RGF is applied to new fields

like medicine, it is essential to determine whether our distances

still capture the domain expert’s intuition of which executions

are similar and which are not. Motivated by the problem of

testing the algorithms of cardiac defibrillators implanted in

millions of patients worldwide, this work ...


Leveraging Coding Techniques For Speeding Up Distributed Computing, Aditya Ramamoorthy, Konstantinos Konstantinidis 2018 Iowa State University

Leveraging Coding Techniques For Speeding Up Distributed Computing, Aditya Ramamoorthy, Konstantinos Konstantinidis

Electrical and Computer Engineering Publications

Large scale clusters leveraging distributed computing frameworks such as MapReduce routinely process data that are on the orders of petabytes or more. The sheer size of the data precludes the processing of the data on a single computer. The philosophy in these methods is to partition the overall job into smaller tasks that are executed on different servers; this is called the map phase. This is followed by a data shuffling phase where appropriate data is exchanged between the servers. The final so-called reduce phase, completes the computation.

One potential approach, explored in prior work for reducing the overall execution ...


Holistic Resource Allocation For Multicore Real-Time Systems, Meng Xu, Linh T.X. Phan 2018 University of Pennsylvania

Holistic Resource Allocation For Multicore Real-Time Systems, Meng Xu, Linh T.X. Phan

Technical Reports (CIS)

This paper presents CaM, a holistic cache and memory bandwidth resource allocation strategy for multicore real-time systems. CaM is designed for partitioned scheduling, where tasks are mapped onto cores, and the shared cache and memory bandwidth resources are partitioned among cores to reduce resource interferences due to concurrent accesses. Based on our extension of LITMUSRT with Intel’s Cache Allocation Technology and MemGuard, we present an experimental evaluation of the relationship between the allocation of cache and memory bandwidth resources and a task’s WCET. Our resource allocation strategy exploits this relationship to map tasks onto cores, and to compute ...


Mean-Field Analysis Of Coding Versus Replication In Large Data Storage Systems, Bin Li, Aditya Ramamoorthy, R. Srikant 2018 University of Rhode Island

Mean-Field Analysis Of Coding Versus Replication In Large Data Storage Systems, Bin Li, Aditya Ramamoorthy, R. Srikant

Electrical and Computer Engineering Publications

We study cloud storage systems with a very large number of files stored in a very large number of servers. In such systems, files are either replicated or coded to ensure reliability, i.e., to guarantee file recovery from server failures. This redundancy in storage can further be exploited to improve system performance (mean file-access delay) through appropriate load-balancing (routing) schemes. However, it is unclear whether coding or replication is better from a system performance perspective since the corresponding queueing analysis of such systems is, in general, quite difficult except for the trivial case when the system load asymptotically tends ...


Digital Commons powered by bepress