Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Theses/Dissertations

2004

Institution
Keyword
Publication

Articles 1 - 30 of 34

Full-Text Articles in Engineering

Device Discovery In Frequency Hopping Wireless Ad Hoc Networks, Brian S. Peterson Sep 2004

Device Discovery In Frequency Hopping Wireless Ad Hoc Networks, Brian S. Peterson

Theses and Dissertations

This research develops a method for efficient discovery of wireless devices for a frequency hopping spread spectrum, synchronous, ad hoc network comprised of clustered sub-networks. The Bluetooth wireless protocol serves as the reference protocol. The development of a discovery, or outreach, method for scatternets requires the characterization of performance metrics of Bluetooth piconets, many of which are unavailable in literature. Precise analytical models characterizing the interference caused to Bluetooth network traffic by inquiring devices, the probability mass function of packet error rates between arbitrary pairs of Bluetooth networks, and Bluetooth discovery time distribution are developed. Based on the characterized performance …


Ultra Wideband Communication Link, Preeti Singh Aug 2004

Ultra Wideband Communication Link, Preeti Singh

Theses

Ultra-wideband communication (UWB) has been a topic of extensive research in recent years especially for its short-range communication and indoor applications. The preliminary objective of the project was to develop a description and understanding of the basic components of the communication link at microwave frequencies in order to achieve the primary objective of establishing a communication setup at a bandwidth of 2.5 GHz for testing Ultra Wideband (UWB) antennas. This was achieved with the aid of commercially available optical system which was modified for the purpose. Beginning with the generation of baseband narrow pulses with energy spanning over a broad …


Teabag: A Debugger For Curry, Stephen Lee Johnson Jul 2004

Teabag: A Debugger For Curry, Stephen Lee Johnson

Dissertations and Theses

This thesis describes TeaBag, which is a debugger for functional logic computations. TeaBag is an accessory of a virtual machine currently under development. A distinctive feature of this machine is its operational completeness of computations, which places novel demands on a debugger. This thesis describes the features of TeaBag, in particular the handling of non-determinism, the ability to control nondeterministic steps, to remove context information, to toggle eager evaluation, and to set breakpoints on both functions and terms. This thesis also describes TeaBag's architecture and its interaction with the associated virtual machine. Finally, some debugging sessions of defective programs are …


Qos Provisioning For Multi-Class Traffic In Wireless Networks, Mona El-Kadi Rizvi Jul 2004

Qos Provisioning For Multi-Class Traffic In Wireless Networks, Mona El-Kadi Rizvi

Computer Science Theses & Dissertations

Physical constraints, bandwidth constraints and host mobility all contribute to the difficulty of providing Quality of Service (QoS) guarantees in wireless networks. There is a growing demand for wireless networks to support all the services that are available on wired networks. These diverse services, such as email, instant messaging, web browsing, video conferencing, telephony and paging all place different demands on the network, making QoS provisioning for wireless networks that carry multiple classes of traffic a complex problem. We have developed a set of admission control and resource reservation schemes for QoS provisioning in multi-class wireless networks.

We present three …


Variations On Particle Swarm Optimization And Their Experimental Evaluation On Maximum Satisfiability, Susan A Abdelshahid Jun 2004

Variations On Particle Swarm Optimization And Their Experimental Evaluation On Maximum Satisfiability, Susan A Abdelshahid

Archived Theses and Dissertations

No abstract provided.


Mobile Agent Based Distributed Network Management : Modeling, Methodologies And Applications, Jian Ye May 2004

Mobile Agent Based Distributed Network Management : Modeling, Methodologies And Applications, Jian Ye

Dissertations

The explosive growth of the Internet and the continued dramatic increase for all wireless services are fueling the demand for increased capacity, data rates, support of multimedia services, and support for different Quality of Services (QoS) requirements for different classes of services. Furthermore future communication networks will be strongly characterized by heterogeneity. In order to meet the objectives of instant adaptability to the users' requirements and of interoperability and seamless operation within the heterogeneous networking environments, flexibility in terms of network and resource management will be a key design issue. The new emerging technology of mobile agent (MA) has arisen …


A Fleet Tracking System Using G.P.S. And Radios, John Mulholland, Matthew Warner, Matthew Waldron, Eric Widdison May 2004

A Fleet Tracking System Using G.P.S. And Radios, John Mulholland, Matthew Warner, Matthew Waldron, Eric Widdison

Undergraduate Honors Capstone Projects

Doc Warner's Alaska Fishing LLC is a growing business operating out of Excursion Inlet, Alaska. Based in Bountiful, Utah, this company has experienced large amounts of growth in the past few years, and as a result has needed to make quick adaptations to accommodate larger groups of people fishing with them. Doc Warner's offers a unique experience in that they do not charter boats, but rather allow their guests to captain the boats. The number of vessels that might be fishing at any time has increased from four to more than twenty in the last three years. This large increase …


Models, Composability, And Validity, Eric Werner Weisel Apr 2004

Models, Composability, And Validity, Eric Werner Weisel

Computational Modeling & Simulation Engineering Theses & Dissertations

Composability is the capability to select and assemble simulation components in various combinations into simulation systems to satisfy specific user requirements. The defining characteristic of composability is the ability to combine and recombine components into different simulation systems for different purposes. The ability to compose simulation systems from repositories of reusable components has been a highly sought after goal among modeling and simulation developers. The expected benefits of robust, general composability include reduced simulation development cost and time, increased validity and reliability of simulation results, and increased involvement of simulation users in the process. Consequently, composability is an active research …


An Analysis Of Electromagnetic Interference (Emi) Of Ultra Wideband(Uwb) And Ieee 802.11a Wireless Local Area Network (Wlan) Employing Orthogonal Frequency Division Multiplexing (Ofdm), Juan Lopez Jr. Mar 2004

An Analysis Of Electromagnetic Interference (Emi) Of Ultra Wideband(Uwb) And Ieee 802.11a Wireless Local Area Network (Wlan) Employing Orthogonal Frequency Division Multiplexing (Ofdm), Juan Lopez Jr.

Theses and Dissertations

Military communications require the rapid deployment of mobile, high-bandwidth systems. These systems must provide anytime, anywhere capabilities with minimal interference to existing military, private, and commercial communications. Ultra Wideband (UWB) technology is being advanced as the next generation radio technology and has the potential to revolutionize indoor wireless communications. The ability of UWB to mitigate multipath fading, provide high-throughput data rates (e.g., greater than 100 Mbps), provide excellent signal penetration (e.g., through walls), and low implementation costs makes it an ideal technology for a wide range of private and public sector applications. Preliminary UWB studies conducted by The Institute for …


Interference Suppression In Multiple Access Communications Using M-Ary Phase Shift Keying Generated Via Spectral Encoding, Abel S. Nunez Mar 2004

Interference Suppression In Multiple Access Communications Using M-Ary Phase Shift Keying Generated Via Spectral Encoding, Abel S. Nunez

Theses and Dissertations

A conceptual transform domain communication system (TDCS) is shown capable of operating successfully using M-Ary phase shift keying (MPSK) data modulation in a multiple access environment. Using spectral encoding, the conceptual TDCS provides an effective means for mitigating interference affects while achieving multiple access communications. The use of transform domain processing with MPSK data modulation (TD-MPSK) provides higher spectral efficiency relative to other modulation techniques (antipodal signaling and cyclic shift keying) considered previously for TDCS applications. The proposed TD-MPSK technique uses spectral encoding for both data and multiple access phase modulations. Demodulation of the spectrally encoded TD-MPSK communication symbols is …


A Step Towards A Well Engineered Component Based Extensible Operating System, Mohamed Fathey Abdel Fattah Feb 2004

A Step Towards A Well Engineered Component Based Extensible Operating System, Mohamed Fathey Abdel Fattah

Archived Theses and Dissertations

Operating systems are the first developed piece of software for a computer and it is still the first application to run over our computers. Software developers spent a lot of time and efforts to build reliable systems using different philosophies and software engineering strategies. They built monolithic kernels, micro-kernels, pico-kernels, etc. to fulfill users' requirements and hardware developments as well. However, Most of the proposed solutions for operating systems design and implementation are for solving traditional problems. Operating systems are still constructed as a general piece of software used for either machine's resource management or as a virtual machine for …


Performance Evaluation Of Auc Backbone Network Using Simulation And Monitoring Tools, Nabawia Khalil Abdel-Karim Feb 2004

Performance Evaluation Of Auc Backbone Network Using Simulation And Monitoring Tools, Nabawia Khalil Abdel-Karim

Archived Theses and Dissertations

Networks in the past were defined by the traffic they carried. The network management systems that can track performance statistics, alarms and diagnostics are usually called operations support systems. As number of applications carried over a network grew, networks cannot scale economically. They become large, complex and expensive. Network performance became an important issue to network designers, operators and implementers to design, implement and maintain scalable, reliable and resilient networks. In this research, we developed a comparative analysis for two tools commonly utilized to aid network operations support to arrive at decisions related to network scalability, performance evaluation and renewal. …


Ip Traceback Of Denial Of Service Attacks Using Mobile Agents Technology, Ghada Magdi Hashem El-Keissi Feb 2004

Ip Traceback Of Denial Of Service Attacks Using Mobile Agents Technology, Ghada Magdi Hashem El-Keissi

Archived Theses and Dissertations

Denial of Service (DoS) attack is considered a critical threat to networks. A DoS is a destructive attack aiming at denying services to legitimate users. An attacker could create an attack that floods a network, disrupts a connection between two computers, or even crashes a computer. Accordingly, legitimate users will not be able to have access to services needed. DoS attacks could originate from a single attacker or it could originate from multiple attackers creating Distributed Denial of Service (DDoS) attacks towards a target victim. One of the main problems ofDoS attacks is the ability of an attacker to forge …


Text Categorization Based On Phrase Indexing, Hany Seif Habib Feb 2004

Text Categorization Based On Phrase Indexing, Hany Seif Habib

Archived Theses and Dissertations

This thesis investigates Information Retrieval (IR) field of research with focus on Text Categorization (TC) area. We study the available techniques and models used for classification of text documents to a predefined set of categories. We use a subset of Reuters - 21578 test collection for our research. We use the first 150 documents for training and the following 100 for testing. We use pre-processing steps such as parsmg, stop-word removal, and stemming using porter stemmer. We identify all possible phrases in a document during the pre-processing stage. We use only adjacent phrases of size two. We learn frequency information …


Connectionist Approaches To Cost-Based Abduction, Emad Abdel-Thalooth Massry Andrews Feb 2004

Connectionist Approaches To Cost-Based Abduction, Emad Abdel-Thalooth Massry Andrews

Archived Theses and Dissertations

No abstract provided.


Adaptive Turn-Prohibition Routing Algorithm For The Networks Of Workstations, Amey Bhaskar Shevtekar Jan 2004

Adaptive Turn-Prohibition Routing Algorithm For The Networks Of Workstations, Amey Bhaskar Shevtekar

Theses

Deadlock occurrence is a critical problem for any computer network. Various solutions have been proposed over last two decades to solve problem of deadlocks in networks using different routing schemes, like up/down routing algorithm used in Myrinet switches. However, most of existing approaches for deadlock-free routing either try to eliminate any possibility of deadlock occurrence, which can result in putting extra restrictions on the routing in the networks or put no restrictions on routing, which leads to other approach namely deadlock recovery. In this thesis emphasis is on developing hybrid approach for routing in wormhole networks, wherein some prohibition is …


Expression Morphing Between Different Orientations, Tao Fu Jan 2004

Expression Morphing Between Different Orientations, Tao Fu

Electronic Theses and Dissertations

How to generate new views based on given reference images has been an important and interesting topic in the area of image-based rendering. Two important algorithms that can be used are field morphing and view morphing. Field morphing, which is an algorithm of image morphing, generates new views based on two reference images which were taken at the same viewpoint. The most successful result of field morphing is morphing from one person's face to the other one's face. View morphing, which is an algorithm of view synthesis, generates in between views based on two reference views which were taken at …


Bidirectional Lao* Algorithm (A Faster Approach To Solve Goal-Directed Mdps), Venkata Deepti Kiran Bhuma Jan 2004

Bidirectional Lao* Algorithm (A Faster Approach To Solve Goal-Directed Mdps), Venkata Deepti Kiran Bhuma

University of Kentucky Master's Theses

Uncertainty is a feature of many AI applications. While there are polynomial-time algorithms for planning in stochastic systems, planning is still slow, in part because most algorithms plan for all eventualities. Algorithms such as LAO* are able to find good or optimal policies more quickly when the starting state of the system is known.

In this thesis we present an extension to LAO*, called BLAO*. BLAO* is an extension of the LAO* algorithm to a bidirectional search. We show that BLAO* finds optimal or E-optimal solutions for goal-directed MDPs without necessarily evaluating the entire state space. BLAO* …


A Genetic Algorithms Approach To Learning Communication And Coordination In Simulated Robots, Chris Sotzing Jan 2004

A Genetic Algorithms Approach To Learning Communication And Coordination In Simulated Robots, Chris Sotzing

Senior Scholar Papers

This project is motivated by an existing robot system for mapping unknown environments and attempts to improve its effectiveness through the use of genetic algorithms. Using a robot simulator, the mapping system is created using simulated robots and a simulated environment. The robots are controlled by a supervisor agent that makes the high-level decisions about tasks for individual robots to complete to accomplish the mapping effort. This research investigates the ability of adding a genetic algorithm learning component to the supervisor to improve its ability to coordinate the robotic agents.


Creating A Video Device Application, Kevin Septor Jan 2004

Creating A Video Device Application, Kevin Septor

Honors Theses

A video device, such as a webcam, has the capability to be used in many ways, including recording video and behaving like a security camera. A TV tuner card can also record video, and in addition be used for watching television. However, the video hardware and device driver the operating system uses to access it are only capable of delivering raw frames of video. A user space application is necessary for exploiting the capabilities of such a device beyond reading sequential frames of video. This research explores the desiderata in a powerful video device application, and introduces a program that …


Web-Based Circuit Design Simulation Package For Solving Electrical Eng, Shadi Harb Jan 2004

Web-Based Circuit Design Simulation Package For Solving Electrical Eng, Shadi Harb

Electronic Theses and Dissertations

A Web-based circuit design package has been improved and evaluated to provide students with an enhanced and innovative teaching tools package for the electrical circuit design course. The project objectives can be summarized as follows: 1) developing enhanced problem solving skills using a Web-based environment, 2) developing the design skills and sharpening the critical thinking process, 3) developing a generic and comprehensive teaching/learning circuit package as an extention to the Electrical Engineering virtual lab environment, which gives students the capability to practice and experience all the circuit design skills with minimum cost and effort. The project provides the students with …


A Book Management System Elibrary, Shanpeng Song Jan 2004

A Book Management System Elibrary, Shanpeng Song

Theses Digitization Project

"eLibrary" is a book management software application that runs on Microsoft Windows platforms. The software incorporates a Windows Explorer like interface and XML/XSL to display book details. The purpose of this project is to build a full-featured, commerical-quality software package to help people manage their books (either printed or electronic). The goal is for eLibrary to be a complete solution for people who wish to build their own personal electronic library catalog.


Data Transmission Scheduling For Distributed Simulation Using Packet A, Juan Vargas-Morales Jan 2004

Data Transmission Scheduling For Distributed Simulation Using Packet A, Juan Vargas-Morales

Electronic Theses and Dissertations

Communication bandwidth and latency reduction techniques are developed for Distributed Interactive Simulation (DIS) protocols. Using logs from vignettes simulated by the OneSAF Testbed Baseline (OTB), a discrete event simulator based on the OMNeT++ modeling environment is developed to analyze the Protocol Data Unit (PDU) traffic over a wireless flying Local Area Network (LAN). Alternative PDU bundling and compression techniques are studied under various metrics including slack time, travel time, queue length, and collision rate. Based on these results, Packet Alloying, a technique for the optimized bundling of packets, is proposed and evaluated. Packet Alloying becomes more active when it is …


Future Of Asynchronous Transfer Mode Networking, Fakhreddine Mohamed Hachfi Jan 2004

Future Of Asynchronous Transfer Mode Networking, Fakhreddine Mohamed Hachfi

Theses Digitization Project

The growth of Asynchronous Transfer Mode (ATM) was considered to be the ideal carrier of the high bandwidth applications like video on demand and multimedia e-learning. ATM emerged commercially in the beginning of the 1990's. It was designed to provide a different quality of service at a speed up 100 Gbps for both real time and non real time application. The turn of the 90's saw a variety of technologies being developed. This project analyzes these technologies, compares them to the Asynchronous Transfer Mode and assesses the future of ATM.


Infrastructure For Performance Tuning Mpi Applications, Kathryn Marie Mohror Jan 2004

Infrastructure For Performance Tuning Mpi Applications, Kathryn Marie Mohror

Dissertations and Theses

Clusters of workstations are becoming increasingly popular as a low-budget alternative for supercomputing power. In these systems,message-passing is often used to allow the separate nodes to act as a single computing machine. Programmers of such systems face a daunting challenge in understanding the performance bottlenecks of their applications. This is largely due to the vast amount of performance data that is collected, and the time and expertise necessary to use traditional parallel performance tools to analyze that data.

The goal of this project is to increase the level of performance tool support for message-passing application programmers on clusters of workstations. …


Data Bandwidth Reduction Techniques For Distributed Embedded Simulatio, Hubert Bahr Jan 2004

Data Bandwidth Reduction Techniques For Distributed Embedded Simulatio, Hubert Bahr

Electronic Theses and Dissertations

Maintaining coherence between the independent views of multiple participants at distributed locations is essential in an Embedded Simulation environment. Currently, the Distributed Interactive Simulation (DIS) protocol maintains coherence by broadcasting the entity state streams from each simulation station. In this dissertation, a novel alternative to DIS that replaces the transmitting sources with local sources is developed, validated, and assessed by analytical and experimental means. The proposed Concurrent Model approach reduces the communication burden to transmission of only synchronization and model-update messages. Necessary and sufficient conditions for the correctness of Concurrent Models in a discrete event simulation environment are established by …


A Mobile Robotic Computing Platform For Three-Dimensional Indoor Mappi, Kenneth Mccoig Jan 2004

A Mobile Robotic Computing Platform For Three-Dimensional Indoor Mappi, Kenneth Mccoig

Electronic Theses and Dissertations

There are several industries exploring solutions to quickly and accurately digitize unexplored indoor environments, into useable three-dimensional databases. Unfortunately, there are inherent challenges to the indoor mapping process such as, scanning limitations and environment complexity, which require a specific application of tools to map an environment precisely with low cost and high speed. This thesis successfully demonstrates the design and implementation of a low cost mobile robotic computing platform with laser scanner, for quickly mapping with high resolution, urban and/or indoor environments using a gyro-enhanced orientation sensor and selectable levels of detail. In addition, a low cost alternative solution to …


An Approach For Computing Intervisibility Using Graphical Processing U, Judd Tracy Jan 2004

An Approach For Computing Intervisibility Using Graphical Processing U, Judd Tracy

Electronic Theses and Dissertations

In large scale entity-level military force-on-force simulations it is essential to know when one entity can visibly see another entity. This visibility determination plays an important role in the simulation and can affect the outcome of the simulation. When virtual Computer Generated Forces (CGF) are introduced into the simulation these intervisibilities must now be calculated by the virtual entities on the battlefield. But as the simulation size increases so does the complexity of calculating visibility between entities. This thesis presents an algorithm for performing these visibility calculations using Graphical Processing Units (GPU) instead of the Central Processing Units (CPU) that …


Address Assignment In Ad-Hoc Networks, John Paul O'Grady Jan 2004

Address Assignment In Ad-Hoc Networks, John Paul O'Grady

Theses

A wireless ad-hoc network is a collection of autonomous nodes or terminals that communicate with each other by forming a multi-hop radio network and maintaining connectivity in a decentralised manner. In an ad hoc network routing is used to find and maintain a path through the network. Routing requires each node to have a unique identifier, to ensure that packets sent to a particular node reach their intended destination. Most ad-hoc routing protocols assume that a node already has an address prior to its entry into a network and so the issue of address assignment is largely ignored. This however …


Performance Estimation Of A Sip Based Push-To-Talk Service For 3g Wireless Networks, Eoin O'Regan Jan 2004

Performance Estimation Of A Sip Based Push-To-Talk Service For 3g Wireless Networks, Eoin O'Regan

Theses

Push To Talk (PTT) services have been in existence for several decades providing dispatch services via two-way radio such as walkie-talkies. For a number of years now PTT services have been available for use over mobile phone networks. These mobile PTT services have occupied a niche market with business users and have been provided on proprietary networks that do not enable roaming.

Over the past year there has been an explosion of interest in the concept of PTT provided over mobile networks using Internet Protocol (IP) technology. This service uses cellular access and radio resources more efficiently than circuit-switched cellular …