Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Engineering

Fostering Collaboration In Emerging Three-Tiered Spectrum Markets, Anindo Mahmood Dec 2022

Fostering Collaboration In Emerging Three-Tiered Spectrum Markets, Anindo Mahmood

Theses and Dissertations

Ensuring optimum spectral efficiency is a critical requirement for current wireless networks to cope with the ever-growing flow of wireless data traffic, using limited spectral resources. As such, spectrum sharing, which allows different grades of users, as well as multiple networking standards to co-exist and utilize in the same frequency band, has become a topic of great intrigue. Due to the inherent advantages of these schemes, the US government has opened up vast amounts of federal spectrum that supports spectrum sharing. The Citizens Broadband Radio Service (CBRS) proposed by the Federal Communications Commission (FCC) is one of them. A tiered …


Blind Separation For Intermittent Sources Via Sparse Dictionary Learning, Annan Dong May 2019

Blind Separation For Intermittent Sources Via Sparse Dictionary Learning, Annan Dong

Dissertations

Radio frequency sources are observed at a fusion center via sensor measurements made over slow flat-fading channels. The number of sources may be larger than the number of sensors, but their activity is sparse and intermittent with bursty transmission patterns. To account for this, sources are modeled as hidden Markov models with known or unknown parameters. The problem of blind source estimation in the absence of channel state information is tackled via a novel algorithm, consisting of a dictionary learning (DL) stage and a per-source stochastic filtering (PSF) stage. The two stages work in tandem, with the latter operating on …


Passive Radiolocation Of Ieee 802.11 Emitters Using Directional Antennae, Bradford E. Law Mar 2018

Passive Radiolocation Of Ieee 802.11 Emitters Using Directional Antennae, Bradford E. Law

Theses and Dissertations

Low-cost commodity hardware and cheaper, more capable consumer-grade drones make the threat of home-made, inexpensive drone-mounted wireless attack platforms (DWAPs) greater than ever. Fences and physical security do little to impede a drone from approaching private, commercial, or government wireless access points (WAPs) and conducting wireless attacks. At the same time, unmanned aerial vehicles (UAVs) present a valuable tool for network defenders conducting site surveys and emulating threats. These platforms present near-term dangers and opportunities for corporations and governments. Despite the vast leaps in technology these capabilities represent, UAVs are noisy and consequently difficult to conceal as they approach a …


Adaptive Relay Techniques For Ofdm-Based Cooperative Communication Systems, Xin Gao Aug 2014

Adaptive Relay Techniques For Ofdm-Based Cooperative Communication Systems, Xin Gao

Electronic Thesis and Dissertation Repository

Cooperative communication has been considered as a cost-effective manner to exploit the spatial diversity, improve the quality-of-service and extend transmission coverage. However, there are many challenges faced by cooperative systems which use relays to forward signals to the destination, such as the accumulation of multipath channels, complex resource allocation with the bidirectional asymmetric traffic and reduction of transmission efficiency caused by additional relay overhead. In this thesis, we aim to address the above challenges of cooperative communications, and design the efficient relay systems.

Starting with the channel accumulation problem in the amplify-and-forward relay system, we proposed two adaptive schemes for …


Design And Implementation Of Wireless Point-Of-Care Health Monitoring Systems: Diagnosis For Sleep Disorders And Cardiovascular Diseases, Se Chang Oh May 2013

Design And Implementation Of Wireless Point-Of-Care Health Monitoring Systems: Diagnosis For Sleep Disorders And Cardiovascular Diseases, Se Chang Oh

Graduate Theses and Dissertations

Chronic sleep disorders are present in 40 million people in the United States. More than 25 million people remain undiagnosed and untreated, which accounts for over $22 billion in unnecessary healthcare costs. In addition, another major chronic disease is the heart diseases which cause 23.8% of the deaths in the United States. Thus, there is a need for a low cost, reliable, and ubiquitous patient monitoring system. A remote point-of-care system can satisfy this need by providing real time monitoring of the patient's health condition at remote places. However, the currently available POC systems have some drawbacks; the fixed number …


Distributed Synchronization Algorithms For Wireless Sensor Networks, Nicola Varanese Jan 2011

Distributed Synchronization Algorithms For Wireless Sensor Networks, Nicola Varanese

Dissertations

The ability to distribute time and frequency among a large population of interacting agents is of interest for diverse disciplines, inasmuch as it enables to carry out complex cooperative tasks. In a wireless sensor network (WSN), time/frequency synchronization allows the implementation of distributed signal processing and coding techniques, and the realization of coordinated access to the shared wireless medium. Large multi-hop WSN's constitute a new regime for network synchronization, as they call for the development of scalable, fully distributed synchronization algorithms. While most of previous research focused on synchronization at the application layer, this thesis considers synchronization at the lowest …


Selection Of Channel-Access And Routing Protocols For Mobile Ad Hoc Networks With Frequency-Agile Radios And Directional Antennas, Rebekah Schloemann Aug 2010

Selection Of Channel-Access And Routing Protocols For Mobile Ad Hoc Networks With Frequency-Agile Radios And Directional Antennas, Rebekah Schloemann

All Theses

In this thesis, ad hoc networks with frequency-agile radios utilizing omni-directional and directional antennas form the basis of study. This work focuses on the selection of channel-access and routing protocols for these networks. Findings demonstrate that protocol selection must occur jointly in order to increase the efficient utilization of available spectrum while achieving maximum network performance.
In this thesis, we investigate several channel-access methods that provide different ways of selecting one of the heterogeneous non-overlapping channels for transmission. We also investigate a modification of least-resistance routing that accounts for the variations in transmission channels. Through simulation, we find that better …


Mitigating Misbehavior In Wireless Networks: A Game Theoretic Approach, Wenjing Wang Jan 2010

Mitigating Misbehavior In Wireless Networks: A Game Theoretic Approach, Wenjing Wang

Electronic Theses and Dissertations

In a distributed wireless system, multiple network nodes behave cooperatively towards a common goal. Though such assumptions on cooperation are desirable (e.g., controlling the transmit power level, reducing interference for each other, revealing private information, adhering to network policies) for analyzing and modeling, certain nodes belonging to a real-world system have often shown to deviate. These nodes, known as misbehaving nodes, bring more challenges to the design of the wireless network because the unreliable channel makes the actions of the nodes hidden from each other. In this dissertation, we analyze two types of misbehavior, namely, selfish noncooperation and malicious attacking. …


Physical Layer Security In Wireless Networks: Intelligent Jamming And Eavesdropping, George Traian Amariucai Jan 2009

Physical Layer Security In Wireless Networks: Intelligent Jamming And Eavesdropping, George Traian Amariucai

LSU Doctoral Dissertations

This work aims at addressing two critical security issues residing in the physical layer of wireless networks, namely intelligent jamming and eavesdropping. In the first two chapters we study the problem of jamming in a fixed-rate transmission system with fading, under the general assumption that the jammer has no knowledge about either the codebook used by the legitimate communication terminals, or the source’s output. Both transmitter and jammer are subject to power constraints which can be enforced over each codeword (peak) or over all codewords (average). All our jamming problems are formulated as zero-sum games, having the probability of outage …


Optimizing Wireless Network Throughput: Methods And Applications, Pengchang Zhan Dec 2007

Optimizing Wireless Network Throughput: Methods And Applications, Pengchang Zhan

Theses and Dissertations

Ever since Marconi succeeded in his first demonstration on the possibility to communicate over the air overseas about a century ago, wireless communications have experienced dramatic improvements. Today's world sees the penetration of wireless communications into human life almost everywhere, from a simple remote control for TV to a cellular phone. With a better understanding of the adverse nature of the wireless propagation channels, engineers have been able to invent various clever techniques, i.e. Multiple Input Multiple Output (MIMO) technology, spread spectrum communications, Orthogonal Frequency Division Multiplexing (OFDM) to name a few, to achieve fast and reliable communications over each …


Channel-Predictive Link Layer Arq Protocols In Wireless Networks, Huseyin Dogukan Cavdar Jan 2007

Channel-Predictive Link Layer Arq Protocols In Wireless Networks, Huseyin Dogukan Cavdar

Theses

Communication performance over a wireless channel should be considered according to two main parameters: energy and throughput. The reliable data transfer is a key to these goals. The reliable node-to-node data transfer is performed by link layer protocols. One prominent approach is Automatic Repeat Request (ARQ) protocol. The traditional ARQ protocols attempt to recover the erroneously transmitted frames by retransmitting those frames, regardless of the channel state. Since this channel state unaware behaviour may cause unnecessary retransmissions, traditional ARQ protocols are expected to be energy inefficient. Some ideas have been proposed such as stochastic learning automaton based ARQ, and channel …


Opportunistic Transmission Scheduling For Next Generation Wireless Communication Systems With Multimedia Services, Chengzhou Li Aug 2005

Opportunistic Transmission Scheduling For Next Generation Wireless Communication Systems With Multimedia Services, Chengzhou Li

Dissertations

The explosive growth of the Internet and the continued dramatic increase for all wireless services are fueling the demand for increased capacity, data rates, and support of different quality of service (QoS) requirements for different classes of services. Since in the current and future wireless communication infrastructures, the performances of the various services are strongly correlated, as the resources are shared among them, dynamic resource allocation methods should be employed. With the demand for high data rate and support of multiple QoS, the transmission scheduling plays a key role in the efficient resource allocation process in wireless systems. The fundamental …


Performance Of Multi-User Codes In Wireless Communications, Muhammad Tauseef Ulislam May 2005

Performance Of Multi-User Codes In Wireless Communications, Muhammad Tauseef Ulislam

Theses

Multi-user codes are a widely used in transmitting user data from base station to mobile station and vice versa. In wireless communications a signal received by a mobile station goes through different fading channels resulting. These multi-paths add constructively and destructively with different delays and attenuation at the mobile station. The autocorrelation and cross correlation properties of the Multi-user codes play a significant role in extracting the user data from the signal corrupted by multipath fading channel.

The thesis presents a comparison of different Multi-user codes based on their autocorrelation and cross correlation properties. These codes are passed through a …