Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Automatic speech recognition | Speech synthesis | Neural networks (Computer science) (1)
- Computer network architectures | Business networks | Mobile computing | Wide area networks (Computer networks) (1)
- Cryptography | Cell phone systems | Wireless communication systems (1)
- Local area networks (Computer networks) | Wireless communication systems | Wireless LAN's | Radio frequency identification systems (1)
- Radio frequency identification systems | Sensor networks | Freight and freightage -- Management | Inventory control -- Automation | Business logistics | Computer vision | Business logistics | Physical distribution of goods (1)
Articles 1 - 7 of 7
Full-Text Articles in Engineering
Lightweight Objective Quality Of Voice Estimation Through Machine Learning, Daniel Riordan
Lightweight Objective Quality Of Voice Estimation Through Machine Learning, Daniel Riordan
Theses
Communication systems are undergoing constant and rapid innovation, both at the design stage and in the field. This in turn has led to an inereasing need for fast, efficient, portable and economic methods for the testing of these systems. For voice carrying communication systems the quality of the transmitted voice that the system produces is a large factor in the overall performance rating of the system. This measure is known as the ‘Quality of Voice’ (QoV) and can be evaluated either subjectively or objectively.
Speech quality is a complex subjective phenomenon that can be best quantified by subjective testing. A …
Elliptic Curve Cryptography Security On Restricted Mobile Devices, Debbie Mccann
Elliptic Curve Cryptography Security On Restricted Mobile Devices, Debbie Mccann
Theses
Mobile technologies with limited resources, such as smart phones or PDAs, have increased dramatically in popularity. However, the level of security provided for these technologies has not kept pace with the value of the data that they contain or transmit.
Wireless networks usually provide some security, in the form of encryption. GSM and GPRS use different forms of the A5 algorithm, and Wi-Fi uses WEP or WPA. These encryption algorithms have proven weaknesses and in some cases have been efficiently cracked. To improve the security of wireless networks, stronger encryption algorithms need to be developed. One of the most attractive …
Mesh Mac Enabling Mesh Networking Over Ieee 802.15.4 Mac Layer, Panneer Selvan Muthukumaran
Mesh Mac Enabling Mesh Networking Over Ieee 802.15.4 Mac Layer, Panneer Selvan Muthukumaran
Theses
Wireless sensor network is a network of sensor nodes that function in a cooperative manner to monitor the changes in the physical environment. Wireless sensor networks are used in environment and habitat monitoring, healthcare applications, building automation, and traffic control to name a few. Typically, wireless sensor node is a low power embedded device which consists of a microcontroller, sensors, wireless transceiver and a battery. These devices are usually distributed in a physical environment which makes it difficult to maintain the network manually.
The IEEE 802.15.4 and Zigbee are considered as standard protocols for wireless sensor networks. The IEEE 802.15.4 …
Management Framework For Hybrid Wireless Networks, Chong Shen
Management Framework For Hybrid Wireless Networks, Chong Shen
Theses
The objective of the Hybrid Wireless Network with dedicated Relay Nodes (HWN*) architecture is to interface the Base Station (BS) Oriented Mobile Network (BSON) and the 802.fix based Mobile Ad hoc Wireless Network (MANET) so that one system can be utilised as an alternative radio access network for data transmissions, while the incorporation of Relay Nodes (RN) is to extend the communication coverage, optimise medium resource sharing, increase spatial reuse opportunity, stabilise MANET link and create more micro-cells. The HWN* keeps the existing cellular infrastructure and a Mobile Terminal (MT) can borrow radio resources from other cells via secure multi-hop …
A Distributed Ai Approach For Large-Scale Wlan Design, Alan Mcgibney
A Distributed Ai Approach For Large-Scale Wlan Design, Alan Mcgibney
Theses
The recent dramatic trend towards always-on-connectivity has driven the need for mobile ubiquitous computing environments with the advent of the Wireless Local Area Network (WLAN) seeing a shift from traditional wired networks to wireless networking. A WLAN typically contains a number of access points that allow wireless enabled clients access information and network resources such as the internet without the need for wires, offering flexibility and mobility to the users. Initial wireless networks were convenience based allowing users access to the primary wired network, and involved little planning prior to roll-out. The proliferation of low cost wireless devices combined wdth …
Container Management And Monitoring Using Sensor Networks, Daniel Rogóz
Container Management And Monitoring Using Sensor Networks, Daniel Rogóz
Theses
The purpose of this project was to develop a functional prototype of a container management and monitoring system, which allows identification and tracking of shipping containers in a port terminal from the moment they enter a port to when they depart for their final destination.
Such system can significantly reduce the labor and time costs associated with organizational mistakes that can occur when containers are being on/off-loaded, moved and stacked in tiers for transfer to the rail or road network. It can be used to streamline the container transport, optimize the order of container on/off-loading and placement, as well as …
Design, Implementation And Evaluation Of A Networking Context Aware Policy Environment, Asanga Dhammika Udugama
Design, Implementation And Evaluation Of A Networking Context Aware Policy Environment, Asanga Dhammika Udugama
Theses
Future mobile networks are anticipated to have support to access heterogeneous access technologies. An important question in such environments is the decisions on when to use what access network. These decisions must take the users and mobile network operators’ perspectives into consideration. The operators usually have a focus of always-best-managed networks while the users have an always-best-connected focus. A key enabler of such environments is the use of policies to perform these handover decisions. These policies, which must be dynamic in nature, should be configurable when the requirements change. Policy decisions are always made based on the current context of …