Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Reliable message delivery (2)
- Ad hoc cell phone revocation (1)
- Ad hoc cell phones (1)
- Adaptive architecture (1)
- CAD (1)
-
- Cross-layer optimizations (1)
- Ellipse (1)
- Embedded processor (1)
- Embedded systems (1)
- Hardware in the loop (1)
- High speed networks (1)
- Key predistribution (1)
- Mammography (1)
- NACK based rerouting (1)
- Nack based rerouting (1)
- Real time communication (1)
- Secure continuity (1)
- Segmented key pool (1)
- Separate key pool (1)
- Spatial authentication (1)
- Tcp variants (1)
- Virtual testbed (1)
Articles 1 - 6 of 6
Full-Text Articles in Entire DC Network
An Architecture For Adaptive Real Time Communication With Embedded Devices, Amol S. Patwardhan
An Architecture For Adaptive Real Time Communication With Embedded Devices, Amol S. Patwardhan
LSU Master's Theses
The virtual testbed is designed to be a cost-effective rapid development environment as well as a teaching tool for embedded systems. Teaching and development of embedded systems otherwise requires dedicated real time operating systems and costly infrastructure for hardware simulation. Writing control software for embedded systems with such a setup takes prolonged development cycles. Moreover, actual hardware may get damaged while writing the control software. On the contrary, in a virtual testbed environment, a simulator running on the host machine is used instead of the actual hardware, which then interacts with an embedded processor through serial communication. This hardware-in-the-loop setup …
Security In Heterogeneous Wireless Networks, Vijay Bulusu
Security In Heterogeneous Wireless Networks, Vijay Bulusu
LSU Master's Theses
The proliferation of a range of wireless devices, from the cheap low power resource starved sensor nodes to the ubiquitous cell phones and PDA's has resulted in their use in many applications. Due to their inherent broadcast nature Security and Privacy in wireless networks is harder than the wired networks. Along with the traditional security requirements like confidentiality, integrity and non-repudiation new requirements like privacy and anonymity are important in wireless networks. These factors combined with the fact that nodes in a wireless network may have different resource availabilities and trust levels makes security in wireless networks extremely challenging. The …
Study Of Reliable Data Communication In Wireless Sensor Networks, Ravilochan Shamanna
Study Of Reliable Data Communication In Wireless Sensor Networks, Ravilochan Shamanna
LSU Master's Theses
A distributed wireless sensor network consists of numerous tiny autonomous sensing nodes deployed across a wide geographical area. These sensor nodes self organize and establish radio communication links with the neighboring nodes to form multi-hop routing paths to the central base station. The dynamic and lossy nature of wireless communication poses several challenges in reliable transfer of data from the sensor nodes to the sink. There are several applications of sensor networks wherein the data collected by the sensors in the network are critical and hence have to be reliably transported to the sink. An example of such an application …
Computer-Aided Diagnostic Systems For Digital Mammograms, Nicholas Jabari Lee
Computer-Aided Diagnostic Systems For Digital Mammograms, Nicholas Jabari Lee
LSU Master's Theses
A computer-aided diagnostic (CAD) system that uses a unique shape-based classification scheme, the Ellipse-Closed Curve Fitting (ECCF) algorithm, is developed for digital mammogram image analysis. The system is developed to work as a post-processing extension to a previously developed CAD system that locates and segments mass lesions, or tumors, found in digital mammograms into separate images. The ECCF system is implemented in the MATLAB mathematical scripting language and is thus capable of running on multiple platforms. The ECCF algorithm detects edges in tumor images and casts them into closed curve functions. Parameters for an ellipse of best fit for a …
Evaluation Of Tcp Based Congestion Control Algorithms Over High-Speed Networks, Yaaser Ahmed Mohammed
Evaluation Of Tcp Based Congestion Control Algorithms Over High-Speed Networks, Yaaser Ahmed Mohammed
LSU Master's Theses
The Additive Increase Multiplicative Decrease (AIMD) algorithm of the Transport Control Protocol (TCP) had worked remarkably well over low speed networks and had guaranteed fairness to the users all over these years, but at present, the demands for transferring large quantities of data over very high-speed networks are increasing at a tremendous rate. Because of its AIMD algorithm to control its window growth function accompanied by a slow response function which is inadequate over high-speed links, TCP has been proven to underutilize the available network bandwidth and leave a considerable amount of unused bandwidth. To overcome this limitation of TCP, …
Study Of Reliable Data Communication In Wireless Sensor Networks, Ravilochan G. Shamanna
Study Of Reliable Data Communication In Wireless Sensor Networks, Ravilochan G. Shamanna
LSU Master's Theses
A distributed wireless sensor network consists of numerous tiny autonomous sensing nodes deployed across a wide geographical area. These sensor nodes self organize and establish radio communication links with the neighboring nodes to form multi-hop routing paths to the central base station. The dynamic and lossy nature of wireless communication poses several challenges in reliable transfer of data from the sensor nodes to the sink. There are several applications of sensor networks wherein the data collected by the sensors in the network are critical and hence have to be reliably transported to the sink. An example of such an application …