Open Access. Powered by Scholars. Published by Universities.®

Systems and Communications Commons

Open Access. Powered by Scholars. Published by Universities.®

1,216 Full-Text Articles 1,534 Authors 663,093 Downloads 78 Institutions

All Articles in Systems and Communications

Faceted Search

1,216 full-text articles. Page 1 of 47.

Interferometric Detection Of Pinned Interactions In Bismuth-Substituted Iron Garnet, L. Bauer, Neelam G. Prabhu Gaunkar, Mani Mina, J. W. Pritchard 2019 Iowa State University

Interferometric Detection Of Pinned Interactions In Bismuth-Substituted Iron Garnet, L. Bauer, Neelam G. Prabhu Gaunkar, Mani Mina, J. W. Pritchard

Industrial Design Publications

The utilization of a bismuth-substituted iron garnet as a magnetooptic Faraday rotator (MOFR) has been reported for all-optical networking purposes as well as for other applications. Our measurements and observations demonstrate that the MOFR saturates once a significantly large magnetic field (>225 G) is applied. After the applied magnetic field enters the saturation region, the material's magnetic domains can become pinned at intermediate levels of magnetization. Pinning in this form has not been reported nor well studied for this application. In this paper, a method to detect and describe anomalous pinning in terms of Faraday rotation is presented. Measurements ...


Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick 2019 University of Pennsylvania Law School

Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick

Faculty Scholarship at Penn Law

Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.

This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews ...


Exploring Critical Success Factors For Data Integration And Decision-Making In Law Enforcement, Marquay Edmondson, Walter R. McCollum, Mary-Margaret Chantre, Gregory Campbell 2019 Capitol Technology University

Exploring Critical Success Factors For Data Integration And Decision-Making In Law Enforcement, Marquay Edmondson, Walter R. Mccollum, Mary-Margaret Chantre, Gregory Campbell

International Journal of Applied Management and Technology

Agencies from various disciplines supporting law enforcement functions and processes have integrated, shared, and communicated data through ad hoc methods to address crime, terrorism, and many other threats in the United States. Data integration in law enforcement plays a critical role in the technical, business, and intelligence processes created by users to combine data from various sources and domains to transform them into valuable information. The purpose of this qualitative phenomenological study was to explore the current conditions of data integration frameworks through user and system interactions among law enforcement organizational processes. Further exploration of critical success factors used to ...


Camr: Coded Aggregated Mapreduce, Konstantinos Konstantinidis, Aditya Ramamoorthy 2019 Iowa State University

Camr: Coded Aggregated Mapreduce, Konstantinos Konstantinidis, Aditya Ramamoorthy

Electrical and Computer Engineering Publications

Many big data algorithms executed on MapReduce-like systems have a shuffle phase that often dominates the overall job execution time. Recent work has demonstrated schemes where the communication load in the shuffle phase can be traded off for the computation load in the map phase. In this work, we focus on a class of distributed algorithms, broadly used in deep learning, where intermediate computations of the same task can be combined. Even though prior techniques reduce the communication load significantly, they require a number of jobs that grows exponentially in the system parameters. This limitation is crucial and may diminish ...


Data-Driven Nonlinear Stabilization Using Koopman Operator, Bowen Huang, Xu Ma, Umesh Vaidya 2019 Iowa State University

Data-Driven Nonlinear Stabilization Using Koopman Operator, Bowen Huang, Xu Ma, Umesh Vaidya

Electrical and Computer Engineering Publications

We propose the application of Koopman operator theory for the design of stabilizing feedback controller for a nonlinear control system. The proposed approach is data-driven and relies on the use of time-series data generated from the control dynamical system for the lifting of a nonlinear system in the Koopman eigenfunction coordinates. In particular, a finite-dimensional bilinear representation of a control-affine nonlinear dynamical system is constructed in the Koopman eigenfunction coordinates using time-series data. Sample complexity results are used to determine the data required to achieve the desired level of accuracy for the approximate bilinear representation of the nonlinear system in ...


Distributed Matrix-Vector Multiplication: A Convolutional Coding Approach, Anindya B. Das, Aditya Ramamoorthy 2019 Iowa State University

Distributed Matrix-Vector Multiplication: A Convolutional Coding Approach, Anindya B. Das, Aditya Ramamoorthy

Electrical and Computer Engineering Publications

Distributed computing systems are well-known to suffer from the problem of slow or failed nodes; these are referred to as stragglers. Straggler mitigation (for distributed matrix computations) has recently been investigated from the standpoint of erasure coding in several works. In this work we present a strategy for distributed matrix-vector multiplication based on convolutional coding. Our scheme can be decoded using a low-complexity peeling decoder. The recovery process enjoys excellent numerical stability as compared to Reed-Solomon coding based approaches (which exhibit significant problems owing their badly conditioned decoding matrices). Finally, our schemes are better matched to the practically important case ...


Universally Decodable Matrices For Distributed Matrix-Vector Multiplication, Aditya Ramamoorthy, Li Tang, Pascal O. Vontobel 2019 Iowa State University

Universally Decodable Matrices For Distributed Matrix-Vector Multiplication, Aditya Ramamoorthy, Li Tang, Pascal O. Vontobel

Electrical and Computer Engineering Publications

Coded computation is an emerging research area that leverages concepts from erasure coding to mitigate the effect of stragglers (slow nodes) in distributed computation clusters, especially for matrix computation problems. In this work, we present a class of distributed matrix-vector multiplication schemes that are based on codes in the Rosenbloom-Tsfasman metric and universally decodable matrices. Our schemes take into account the inherent computation order within a worker node. In particular, they allow us to effectively leverage partial computations performed by stragglers (a feature that many prior works lack). An additional main contribution of our work is a companion matrix-based embedding ...


Current Implementation Of The Flooding Time Synchronization Protocol In Wireless Sensor Networks, Asma Khalil 2018 The University of Western Ontario

Current Implementation Of The Flooding Time Synchronization Protocol In Wireless Sensor Networks, Asma Khalil

Electronic Thesis and Dissertation Repository

Time synchronization is an issue that affects data accuracy within wireless sensor networks (WSNs). This issue is due to the complex nature of the wireless medium and can be mitigated with accurate time synchronization. This research focuses on the Flooding Time Synchronization Protocol (FTSP) since it is considered as the gold standard for accuracy in WSNs. FTSP minimizes the synchronization error by executing an algorithm that creates a unified time for the network reporting micro-second accuracy. Most synchronization protocols use the FTSP implementation as a benchmark for comparison. The current and only FTSP implementation runs on the TinyOS platform and ...


3d Signal Strength Mapping Of 2.4ghz Wifi Networks, Brett D. Glidden 2018 California Polytechnic State University, San Luis Obispo

3d Signal Strength Mapping Of 2.4ghz Wifi Networks, Brett D. Glidden

Electrical Engineering

Many commercial businesses operate out of multi-story office buildings. These companies often use many Wi-Fi access points to set up their own wireless network. IT personnel determine proper Wi-Fi access point placement using Wi-Fi strength maps. Conventional Wi-Fi strength maps only provide a two-dimensional view representing the wireless access point's effective range. The signal quality and strength measurements do not include changing vertical elevation. Efficient network layout in a multi-story building requires a system calculating signal quality metrics in three dimensions.

This project involves designing and prototyping a system to achieve 2.4GHz Wi-Fi signal quality measurements in a ...


Distance-Based Cluster Head Election For Mobile Sensing, Ruairí de Fréin, Liam O'Farrell 2018 Technological University Dublin

Distance-Based Cluster Head Election For Mobile Sensing, Ruairí De Fréin, Liam O'Farrell

Conference papers

Energy-efficient, fair, stochastic leader-selection algorithms are designed for mobile sensing scenarios which adapt the sensing strategy depending on the mobile sensing topology. Methods for electing a cluster head are crucially important when optimizing the trade-off between the number of peer-to- peer interactions between mobiles and client-server interactions with a cloud-hosted application server. The battery-life of mobile devices is a crucial constraint facing application developers who are looking to use the convergence of mobile computing and cloud computing to perform environmental sensing. We exploit the mobile network topology, specifically the location of mobiles with respect to the gateway device, to stochastically ...


Demand Response Management In Smart Grid Networks: A Two-Stage Game-Theoretic Learning-Based Approach, Pavlos Athanasios Apostolopoulos 2018 University of New Mexico

Demand Response Management In Smart Grid Networks: A Two-Stage Game-Theoretic Learning-Based Approach, Pavlos Athanasios Apostolopoulos

Shared Knowledge Conference

In this paper, the combined problem of power company selection and demand response management (DRM) in a smart grid network consisting of multiple power companies and multiple customers is studied via adopting a reinforcement learning and game-theoretic technique. Each power company is characterized by its reputation and competitiveness. The customers, acting as learning automata select the most appropriate power company to be served, in terms of price and electricity needs’ fulfillment, via a reinforcement learning based mechanism. Given customers’ power company selection, the DRM problem is formulated as a two-stage game theoretic optimization framework. At the first stage the optimal ...


1 - A Comprehensive Study Of Motor Imagery Eeg-Based Classification Using Computational Analysis, Justin McCorkle, Andrew Kalaani 2018 Georgia Southern University

1 - A Comprehensive Study Of Motor Imagery Eeg-Based Classification Using Computational Analysis, Justin Mccorkle, Andrew Kalaani

Georgia Undergraduate Research Conference (GURC)

Brain computer interfaces (BCI) are systems that integrate a user’s neural features with robotic machines to perform tasks. BCI systems are very unstable still due to Electroencephalography (EEG) having interference from unanticipated noise. Using Independent Component Analysis (ICA), a novel variable threshold model for noise feature extraction. The de-noised EEG data is classified with a high accuracy of more than 94% when using artificial neural networks. The effectiveness of the proposed variable threshold model is validated by the significant reduction in the variance of user classification accuracy across multiple sessions. Nonetheless, based on the variance and classification, subjects are ...


Optical Wireless Data Center Networks, Abdelbaset S. Hamza 2018 University of Nebraska - Lincoln

Optical Wireless Data Center Networks, Abdelbaset S. Hamza

Computer Science and Engineering: Theses, Dissertations, and Student Research

Bandwidth and computation-intensive Big Data applications in disciplines like social media, bio- and nano-informatics, Internet-of-Things (IoT), and real-time analytics, are pushing existing access and core (backbone) networks as well as Data Center Networks (DCNs) to their limits. Next generation DCNs must support continuously increasing network traffic while satisfying minimum performance requirements of latency, reliability, flexibility and scalability. Therefore, a larger number of cables (i.e., copper-cables and fiber optics) may be required in conventional wired DCNs. In addition to limiting the possible topologies, large number of cables may result into design and development problems related to wire ducting and maintenance ...


Spectral And Energy Efficient Communication Systems And Networks, Abdulbaset Hamed 2018 The University of Western Ontario

Spectral And Energy Efficient Communication Systems And Networks, Abdulbaset Hamed

Electronic Thesis and Dissertation Repository

In this thesis, design and analysis of energy- and spectral-efficient communication and cellular systems in micro wave and millimeter wave bands are considered using the following system performance metrics: i) Energy efficiency; ii) Spectral efficiency; iii) Spatial spectral efficiency; iv) Spatial energy efficiency, and v) Bit error rate. Statistical channel distributions, Nakagami-m and Generalized-K, and path loss models, Line of Sight (LOS) and Non-Line of Sight (NLOS), are used to represent the propagation environment in these systems. Adaptive M-QAM and M-CPFSK communication systems are proposed to enhance their efficiency metrics as a function of Signal-to-Noise Ratio (SNR) over the channel ...


Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne 2018 NC A&T State Unversity

Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne

KSU Proceedings on Cybersecurity Education, Research and Practice

In most wireless channels, the signals propagate in all directions. For the communication between Alice and Bob, an Eavesdropper can receive the signals from both Alice and Bob as far as the Eavesdropper is in the range determined by the transmitting power. Through phased array antenna with beam tracking circuits or cooperative iteration, the signals are confined near the straight line connecting the positions of Alice and Bob, so it will largely reduce the valid placement of an Eavesdropper. Sometimes, this reduction can be prohibitive for Eavesdropper to wiretap the channel since the reduced space can be readily protected. Two ...


Wireless Sensor Networks For Smart Communications, Mu Zhou, Qilian Liang, Hongyi Wu, Weixiao Meng, Kunjie Xu 2018 Old Dominion University

Wireless Sensor Networks For Smart Communications, Mu Zhou, Qilian Liang, Hongyi Wu, Weixiao Meng, Kunjie Xu

Electrical & Computer Engineering Faculty Publications

(First paragraph) In the first edition of the special issue titled “Wireless Sensor Networks for Smart Communications”, a total of 22 manuscripts were received and 6 of these were accepted. This issue demonstrated that network congestion, user mobility, and adjacent spectrum interference are the main reasons for the degradation ofcommunication quality inWireless Sensor Networks (WSNs).


Plagiarism Detection Avoidance Methods And Countermeasures, Brian R. Snider 2018 George Fox University

Plagiarism Detection Avoidance Methods And Countermeasures, Brian R. Snider

Faculty Publications - Department of Electrical Engineering and Computer Science

Plagiarism is a major problem that educators face in the information age. Today's plagiarist has a near limitless supply of well-written articles via the internet. Due to the scale of the problem, detecting plagiarism has now become the domain of the computer scientist rather than the educator. With the use of computers, documents can be conveniently scanned into a plagiarism detection system that references public web pages, academic journals, and even previous students' papers, acting as an "all-seeing eye."

However, plagiarists can overcome these digital content detection systems with the use of clever masking and substitutions techniques. These systems ...


Real-Time Intrusion Detection Using Multidimensional Sequence-To-Sequence Machine Learning And Adaptive Stream Processing, Gobinath Loganathan 2018 The University of Western Ontario

Real-Time Intrusion Detection Using Multidimensional Sequence-To-Sequence Machine Learning And Adaptive Stream Processing, Gobinath Loganathan

Electronic Thesis and Dissertation Repository

A network intrusion is any unauthorized activity on a computer network. There are host-based and network-based Intrusion Detection Systems (IDS's), of which there are each signature-based and anomaly-based detection methods. An anomalous network behavior can be defined as an intentional violation of the expected sequence of packets. In a real-time network-based IDS, incoming packets are treated as a stream of data. A stream processor takes any stream of data or events and extracts interesting patterns on the fly. This representation allows applying statistical anomaly detection using sequence prediction algorithms as well as using a stream processor to perform signature-based ...


Cmos Radioactive Isotope Identification With Multichannel Analyzer And Embedded Neural Network, Samuel Murray 2018 University of Nebraska-Lincoln

Cmos Radioactive Isotope Identification With Multichannel Analyzer And Embedded Neural Network, Samuel Murray

Theses, Dissertations, and Student Research from Electrical & Computer Engineering

A radiation detection and identification system is designed and implemented to perform gamma ray spectroscopy on radioactive sources and identify which isotopes are present in the sources. A multichannel analyzer is implemented on an ASIC to process the signal produced from gamma rays detected by a scintillator and photomultiplier tube and to quantize the gamma ray energies to build a histogram. A fast, low memory embedded neural network is implemented on a microcontroller ASIC to identify the isotopes present in the gamma ray histogram produced by the multichannel analyzer in real time.

Advisors: Sina Balkir and Michael Homan


Integration Of Rfid And Industrial Wsns To Create A Smart Industrial Environment, Ning Pan 2018 The University of Western Ontario

Integration Of Rfid And Industrial Wsns To Create A Smart Industrial Environment, Ning Pan

Electronic Thesis and Dissertation Repository

A smart environment is a physical space that is seamlessly embedded with sensors, actuators, displays, and computing devices, connected through communication networks for data collection, to enable various pervasive applications. Radio frequency identification (RFID) and Wireless Sensor Networks (WSNs) can be used to create such smart environments, performing sensing, data acquisition, and communication functions, and thus connecting physical devices together to form a smart environment.

This thesis first examines the features and requirements a smart industrial environment. It then focuses on the realization of such an environment by integrating RFID and industrial WSNs. ISA100.11a protocol is considered in particular ...


Digital Commons powered by bepress