Open Access. Powered by Scholars. Published by Universities.®

Systems and Communications Commons

Open Access. Powered by Scholars. Published by Universities.®

1,184 Full-Text Articles 1,443 Authors 663,093 Downloads 73 Institutions

All Articles in Systems and Communications

Faceted Search

1,184 full-text articles. Page 1 of 46.

Efficient Traffic Management Algorithms For The Core Network Using Device-To-Device Communication And Edge Caching, Hessam Yousefi 2018 The University of Western Ontario

Efficient Traffic Management Algorithms For The Core Network Using Device-To-Device Communication And Edge Caching, Hessam Yousefi

Electronic Thesis and Dissertation Repository

Exponentially growing number of communicating devices and the need for faster, more reliable and secure communication are becoming major challenges for current mobile communication architecture. More number of connected devices means more bandwidth and a need for higher Quality of Service (QoS) requirements, which bring new challenges in terms of resource and traffic management. Traffic offload to the edge has been introduced to tackle this demand-explosion that let the core network offload some of the contents to the edge to reduce the traffic congestion. Device-to-Device (D2D) communication and edge caching, has been proposed as promising solutions for offloading data. D2D ...


Algorithms For Asynchronous Coded Caching, Hooshang Ghasemi, Aditya Ramamoorthy 2018 Iowa State University

Algorithms For Asynchronous Coded Caching, Hooshang Ghasemi, Aditya Ramamoorthy

Electrical and Computer Engineering Conference Papers, Posters and Presentations

The original formulation of the coded caching problem assumes that the file requests from the users are synchronized, i.e., they arrive at the server at the same time. Several subsequent contributions work under the same assumption. Furthermore, the majority of prior work does not consider a scenario where users have deadlines. In our previous work we formulated the asynchronous coded caching problem where user requests arrive at different times. Furthermore, the users have specified deadlines. We proposed a linear program for obtaining its optimal solution. However, the size of the LP (number of constraints and variables) grows rather quickly ...


Multitarget Joint Delay And Doppler Shift Estimation In Bistatic Passive Radar, Mohammed Rashid 2018 Louisiana State University and Agricultural and Mechanical College

Multitarget Joint Delay And Doppler Shift Estimation In Bistatic Passive Radar, Mohammed Rashid

LSU Master's Theses

Bistatic passive radar (BPR) system does not transmit any electromagnetic signal unlike the active radar, but employs an existing Illuminator of opportunity (IO) in the environment, for instance, a broadcast station, to detect and track the targets of interest. Therefore, a BPR system is comprised of two channels. One is the reference channel that collects only the IO signal, and the other is the surveillance channel which is used to capture the targets' reflected signals. When the IO signal reflected from multiple targets is captured in the surveillance channel (SC) then estimating the delays and Doppler shifts of all the ...


Implementing A Total Productive Maintenance Approach Into An Improvement At S Company, Xiaomeng Sun 2018 Western Kentucky University

Implementing A Total Productive Maintenance Approach Into An Improvement At S Company, Xiaomeng Sun

Masters Theses & Specialist Projects

The study improved the overall equipment effectiveness (OEE) of machines and processes through the implementation of a total productive maintenance (TPM) approach at Company S over a three-month period. By comparing the OEE of equipment before and after the implementation of autonomous maintenance, this study concluded that autonomous maintenance improves OEE. The target of this study was one general product line at a polytetrafluoroethylene (PTFE) plant. Due to time limitations, the study only applied autonomous maintenance to operational activities. This research involved machine and processes selection, condition assessment, baseline OEE assessment, operator training, execution of autonomous maintenance, and OEE measurement ...


Transactive Energy Design For Integrated Transmission And Distribution Systems, Hieu Trung Nguyen, Swathi Battula, Rohit Reddy Takkala, Zhaoyu Wang, Leigh Tesfatsion 2018 Iowa State University

Transactive Energy Design For Integrated Transmission And Distribution Systems, Hieu Trung Nguyen, Swathi Battula, Rohit Reddy Takkala, Zhaoyu Wang, Leigh Tesfatsion

Economics Working Papers

The increasing deployment of distributed energy resources (DERs) is disrupting every aspect of power system operations, from retail distribution to wholesale production and transmission. This paper reports on the development of an agentbased test system enabling the study of new transactive energy system (TES) designs to ensure the reliable efficient operation of integrated transmission and distribution (ITD) systems with growing DER penetration. This ITD test system is used to explore the ability of a non-profit Distribution System Operator (DSO), participating within an ITD system, to use an innovative TES design to manage the power usage of DER devices in accordance ...


Leveraging Coding Techniques For Speeding Up Distributed Computing, Aditya Ramamoorthy, Konstantinos Konstantinidis 2018 Iowa State University

Leveraging Coding Techniques For Speeding Up Distributed Computing, Aditya Ramamoorthy, Konstantinos Konstantinidis

Electrical and Computer Engineering Publications

Large scale clusters leveraging distributed computing frameworks such as MapReduce routinely process data that are on the orders of petabytes or more. The sheer size of the data precludes the processing of the data on a single computer. The philosophy in these methods is to partition the overall job into smaller tasks that are executed on different servers; this is called the map phase. This is followed by a data shuffling phase where appropriate data is exchanged between the servers. The final so-called reduce phase, completes the computation.

One potential approach, explored in prior work for reducing the overall execution ...


Mean-Field Analysis Of Coding Versus Replication In Large Data Storage Systems, Bin Li, Aditya Ramamoorthy, R. Srikant 2018 University of Rhode Island

Mean-Field Analysis Of Coding Versus Replication In Large Data Storage Systems, Bin Li, Aditya Ramamoorthy, R. Srikant

Electrical and Computer Engineering Publications

We study cloud storage systems with a very large number of files stored in a very large number of servers. In such systems, files are either replicated or coded to ensure reliability, i.e., to guarantee file recovery from server failures. This redundancy in storage can further be exploited to improve system performance (mean file-access delay) through appropriate load-balancing (routing) schemes. However, it is unclear whether coding or replication is better from a system performance perspective since the corresponding queueing analysis of such systems is, in general, quite difficult except for the trivial case when the system load asymptotically tends ...


Collaborative Appearance-Based Place Recognition And Improving Place Recognition Using Detection Of Dynamic Objects, Juan Pablo Munoz 2018 The Graduate Center, City University of New York

Collaborative Appearance-Based Place Recognition And Improving Place Recognition Using Detection Of Dynamic Objects, Juan Pablo Munoz

All Dissertations, Theses, and Capstone Projects

This dissertation makes contributions to the problem of Long-Term Appearance-Based Place Recognition. We present a framework for place recognition in a collaborative scheme and a method to reduce the impact of dynamic objects on place representations. We demonstrate our findings using a state-of-the-art place recognition approach.

We begin in Part I by describing the general problem of place recognition and its importance in applications where accurate localization is crucial. We discuss feature detection and description and also explain the functioning of several place recognition frameworks.

In Part II, we present a novel framework for collaboration between agents from a pure ...


Big Data And Parkinson’S Disease: Exploration, Analyses, And Data Challenges, Mahalakshmi SenthilarumugamVeilukandammal, Sree Nilakanta, Baskar Ganapathysubramanian, Vellareddy Anantharam, Anumantha Kanthasamy, Auriel A. Willette 2018 Iowa State University

Big Data And Parkinson’S Disease: Exploration, Analyses, And Data Challenges, Mahalakshmi Senthilarumugamveilukandammal, Sree Nilakanta, Baskar Ganapathysubramanian, Vellareddy Anantharam, Anumantha Kanthasamy, Auriel A. Willette

Mechanical Engineering Conference Presentations, Papers, and Proceedings

In healthcare, a tremendous amount of clinical and laboratory tests, imaging, prescription and medication data are being collected. Big data analytics on these data aim at early detection of disease which will help in developing preventive measures and in improving patient care. Parkinson disease is the second-most common neurodegenerative disorder in the United States. To find a cure for Parkinson's disease biological, clinical and behavioral data of different cohorts are collected, managed and propagated through Parkinson’s Progression Markers Initiative (PPMI). Applying big data technology to this data will lead to the identification of the potential biomarkers of Parkinson ...


Ball Oscillating Bouncer, Eric Blok, Daniel Altemese, Ryan Nowacki, Maram Qurban 2018 The University of Akron

Ball Oscillating Bouncer, Eric Blok, Daniel Altemese, Ryan Nowacki, Maram Qurban

Honors Research Projects

The purpose of this report is to document the need, objectives, marketing and engineering requirements, as well as validate the design of an autonomous control device capable of continuously bouncing a table tennis ball on a paddle. This includes the design of a self correcting system using lightweight materials, and as few sensors and components as possible to achieve a compact, portable design. To accomplish this, the system is designed to react to a ball falling from as short a distance as 10 centimeters above the paddle, meaning all sensor processing, control processing, and motor drives should be able to ...


Sports Spectator Beacon, Alexander Connelly 2018 The University of Akron

Sports Spectator Beacon, Alexander Connelly

Honors Research Projects

The objective of this design project is to develop a system that can determine the location of an implemented beacon. The main operating technique used in determining the location is RSSI multilateration. The system consists of a beacon, network transmitters, mobile users, core processing and an interface with each software component for data transmission. The beacon is only an RF transmitter; therefore, receivers need to be able to interpret the signal of the beacon. In order to determine the location of the beacon from the receivers, the locations of the receivers must be known. The network transmitters’ act as a ...


The Silver Lining: A Novel, Inkjet-Printed Mesh Coplanar-Slot Antenna For The Uhf Band, Anastasios C. Karles 2018 Virginia Commonwealth University

The Silver Lining: A Novel, Inkjet-Printed Mesh Coplanar-Slot Antenna For The Uhf Band, Anastasios C. Karles

Undergraduate Research Posters

The Federal Communications Commission (FCC) is opening up frequencies within the television range (400MHz to 700MHz) of the Ultra High Frequency (UHF) band for use in emerging technologies, such as cognitive radio networks and machine-to-machine communication. In order for manufacturers to produce affordable antennas that can be used in these emerging technologies, inexpensive antennas are required that meet these new spectrum needs. This paper presents a mesh coplanar-slot bowtie patch antenna fabricated using commercially available inkjet-printing technology. Two antennas were fabricated: a 27x21cm copper FR4 antenna with .25mm lines and a 27x21cm silver antenna with 2mm lines fabricated using inkjet-printing ...


Convergence-Based Exploration Algorithm For Reinforcement Learning, Ala'Eddin Masadeh, Zhengdao Wang, Ahmed E. Kamal 2018 Iowa State University

Convergence-Based Exploration Algorithm For Reinforcement Learning, Ala'eddin Masadeh, Zhengdao Wang, Ahmed E. Kamal

Electrical and Computer Engineering Technical Reports and White Papers

Reinforcement learning (RL) can be defined as a technique for learning in an unknown environment. Through learning, two main modes select actions, exploration and exploitation. The exploration is to investigate unexplored actions. The exploitation is to exploit current best actions. Balancing between exploration and exploitation is a challenge for RL. In this work, an exploration algorithm for RL is designed. This algorithm introduces two parameters for balancing purpose, which are the action-value function convergence error, and the exploration time threshold. The first parameter evaluates actions and selects the best ones based on the convergent values of their action-value functions. The ...


Low-Cost Multimode Patch Antenna For Dual Mimo And Enhanced Localization Use, Adam Narbudowicz, Max Ammann 2018 Dublin Institute of Technology

Low-Cost Multimode Patch Antenna For Dual Mimo And Enhanced Localization Use, Adam Narbudowicz, Max Ammann

Articles

This paper proposes a simple, low-cost multi-mode patch antenna combining good MIMO performance with precise Angle of Arrival (AoA) estimation. The AoA is based on the monopulse antenna concept, however, unlike in radar applications, the necessity for complex circuitry is replaced by the intrinsic properties of even and odd resonant patch modes. This capability is advantageous for future “Internet of Things” antennas, embedded into low-cost and size-constrained devices. The envelope correlation coefficient, measured in an anechoic chamber, is below 1.5 %, ensuring good MIMO performance. An exemplary addition to localization algorithm exploiting antenna properties is demonstrated.


Zero-Error Function Computation On A Directed Acyclic Network, Ardhendu Tripathy, Aditya Ramamoorthy 2018 Iowa State University

Zero-Error Function Computation On A Directed Acyclic Network, Ardhendu Tripathy, Aditya Ramamoorthy

Electrical and Computer Engineering Publications

We study the rate region of variable-length source-network codes that are used to compute a function of messages observed over a network. The particular network considered here is the simplest instance of a directed acyclic graph (DAG) that is not a tree. Existing work on zero-error function computation in DAG networks provides bounds on the \textit{computation capacity}, which is a measure of the amount of communication required per edge in the worst case. This work focuses on the average case: an achievable rate tuple describes the expected amount of communication required on each edge, where the expectation is over ...


Variance-Optimal Offline And Streaming Stratified Random Sampling, Trong Duc Nguyen, Ming-Hung Shih, AT&T Labs–Research, Srikanta Tirthapura, Bojian Xu 2018 Iowa State University

Variance-Optimal Offline And Streaming Stratified Random Sampling, Trong Duc Nguyen, Ming-Hung Shih, At&T Labs–Research, Srikanta Tirthapura, Bojian Xu

Electrical and Computer Engineering Publications

Stratified random sampling (SRS) is a fundamental sampling technique that provides accurate estimates for aggregate queries using a small size sample, and has been used widely for approximate query processing. A key question in SRS is how to partition a target sample size among different strata. While Neyman's allocation provides a solution that minimizes the variance of an estimate using this sample, it works under the assumption that each stratum is abundant, i.e. has a large number of data points to choose from. This assumption may not hold in general: one or more strata may be bounded, and ...


International Journal Of Information Privacy, Security And Integrity, James Stewart, Maurice Dawson 2017 Roosevelt University

International Journal Of Information Privacy, Security And Integrity, James Stewart, Maurice Dawson

Maurice Dawson

Research on cyber security related to social engineering has expanded from its purely technological orientation into explaining the role of human behavior in detecting deception. In the broadest definition, social engineering, in the context of information security, is the manipulation of individuals to perform actions that cause harm or increase the probability of causing future harm. Human personality traits significantly contribute to the probability that an individual is susceptible to manipulation related to social engineering deception attacks and exploits (Maurya, 2013). The outcome of the attacks and objective is the alteration of normal and rational decision making as described in ...


Femtosecond Laser Micromachining Of Low-Temperature Co-Fired Ceramic And Glass Fiber Reinforced Polymer Printed Circuit Boards Materials, Raif Farkouh 2017 University of Nebraska - Lincoln

Femtosecond Laser Micromachining Of Low-Temperature Co-Fired Ceramic And Glass Fiber Reinforced Polymer Printed Circuit Boards Materials, Raif Farkouh

Theses, Dissertations, and Student Research from Electrical & Computer Engineering

Low-temperature co-fired ceramic (LTCC), and glass fiber reinforced polymer (GFRP) printed circuit boards (PCBs) are two materials used for the packaging of electronics. The excellent mechanical and electrical properties of LTCC, combined with the ability to embed passive components offer superior radio frequency (RF) performance and device miniaturization for high-frequency applications. Due to its unique properties, LTCC provides superior performance in applications as diverse as military radar, imaging systems, advanced automotive sensing, telecommunications, and satellites. The use of LTCC in these applications has created a demand for the micromachining of holes, channels, and cavities with specific geometries and structures. Likewise ...


Tiled Time Delay Estimation In Mobile Cloud Computing Environments, Ruairí de Fréin 2017 Dublin Institute of Technology

Tiled Time Delay Estimation In Mobile Cloud Computing Environments, Ruairí De Fréin

Conference papers

We present a tiled delay estimation technique in the context of Mobile Cloud Computing (MCC) environments. We examine its accuracy in the presence of multiple sources for (1) sub-sample delays and also (2) in the presence of phase-wrap around. Phase wrap-around is prevalent in MCC because the separation of acoustic sources may be large. We show that tiling a histogram of instantaneous phase estimates can improve delay estimates when phase-wrap around is sig- nificantly present and also when multiple sources are present. We report that error in the delay estimator is generally less than 5% of a sample, when the ...


Application Of Real Field Connected Vehicle Data For Aggressive Driving Identification On Horizontal Curves, Arash Jahangiri, Vincent Berardi, Sahar Ghanipoor Machiani 2017 San Diego State University

Application Of Real Field Connected Vehicle Data For Aggressive Driving Identification On Horizontal Curves, Arash Jahangiri, Vincent Berardi, Sahar Ghanipoor Machiani

Psychology Faculty Articles and Research

The emerging technology of connected vehicles generates a vast amount of data that could be used to enhance roadway safety. In this paper, we focused on safety applications of a real field connected vehicle data on a horizontal curve. The database contains connected vehicle data that were collected on public roads in Ann Arbor, Michigan with instrumented vehicles. Horizontal curve negotiations are associated with a great number of accidents, which are mainly attributed to driving errors. Aggressive/risky driving is a contributing factor to the high rate of crashes on horizontal curves. Using basic safety message data in connected vehicle ...


Digital Commons powered by bepress