Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Engineering

Lightweight Objective Quality Of Voice Estimation Through Machine Learning, Daniel Riordan Jan 2008

Lightweight Objective Quality Of Voice Estimation Through Machine Learning, Daniel Riordan

Theses

Communication systems are undergoing constant and rapid innovation, both at the design stage and in the field. This in turn has led to an inereasing need for fast, efficient, portable and economic methods for the testing of these systems. For voice carrying communication systems the quality of the transmitted voice that the system produces is a large factor in the overall performance rating of the system. This measure is known as the ‘Quality of Voice’ (QoV) and can be evaluated either subjectively or objectively.

Speech quality is a complex subjective phenomenon that can be best quantified by subjective testing. A …


Optimization In Multi-Agent Systems : Structures And Procedures, Ingo Stengel Jan 2008

Optimization In Multi-Agent Systems : Structures And Procedures, Ingo Stengel

Theses

The main advantage for the use of agent technology is in the capacity of agents to represent the interests of individual entities and to act autonomously on their behalf. In multi-agent systems this involves communication, coordination and negotiation.

The focus of this dissertation is to find ways to optimize multi-agent systems at different levels by taking into consideration their structure and the procedures used. As optimization depends to a large extent on the problem to be solved, group forming scenarios, in which self-interested agents compete to form and join groups, have been selected here for consideration. Optimization issues are discussed …


Elliptic Curve Cryptography Security On Restricted Mobile Devices, Debbie Mccann Jan 2008

Elliptic Curve Cryptography Security On Restricted Mobile Devices, Debbie Mccann

Theses

Mobile technologies with limited resources, such as smart phones or PDAs, have increased dramatically in popularity. However, the level of security provided for these technologies has not kept pace with the value of the data that they contain or transmit.

Wireless networks usually provide some security, in the form of encryption. GSM and GPRS use different forms of the A5 algorithm, and Wi-Fi uses WEP or WPA. These encryption algorithms have proven weaknesses and in some cases have been efficiently cracked. To improve the security of wireless networks, stronger encryption algorithms need to be developed. One of the most attractive …


Management Framework For Hybrid Wireless Networks, Chong Shen Jan 2008

Management Framework For Hybrid Wireless Networks, Chong Shen

Theses

The objective of the Hybrid Wireless Network with dedicated Relay Nodes (HWN*) architecture is to interface the Base Station (BS) Oriented Mobile Network (BSON) and the 802.fix based Mobile Ad hoc Wireless Network (MANET) so that one system can be utilised as an alternative radio access network for data transmissions, while the incorporation of Relay Nodes (RN) is to extend the communication coverage, optimise medium resource sharing, increase spatial reuse opportunity, stabilise MANET link and create more micro-cells. The HWN* keeps the existing cellular infrastructure and a Mobile Terminal (MT) can borrow radio resources from other cells via secure multi-hop …


A Distributed Ai Approach For Large-Scale Wlan Design, Alan Mcgibney Jan 2008

A Distributed Ai Approach For Large-Scale Wlan Design, Alan Mcgibney

Theses

The recent dramatic trend towards always-on-connectivity has driven the need for mobile ubiquitous computing environments with the advent of the Wireless Local Area Network (WLAN) seeing a shift from traditional wired networks to wireless networking. A WLAN typically contains a number of access points that allow wireless enabled clients access information and network resources such as the internet without the need for wires, offering flexibility and mobility to the users. Initial wireless networks were convenience based allowing users access to the primary wired network, and involved little planning prior to roll-out. The proliferation of low cost wireless devices combined wdth …