Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Engineering
Adaptive Encryption Techniques In Wireless Communication Channels With Tradeoffs Between Communication Reliability And Security, Walid Al Zibideh
Adaptive Encryption Techniques In Wireless Communication Channels With Tradeoffs Between Communication Reliability And Security, Walid Al Zibideh
Electronic Theses and Dissertations
Encryption is a vital process to ensure the confidentiality of the information transmitted over an insecure wireless channel. However, the nature of the wireless channel tends to deteriorate because of noise, interference and fading. Therefore, a symmetrically encrypted transmitted signal will be received with some amount of error. Consequently, due to the strict avalanche criterion (sac), this error propagates during the decryption process, resulting in half the bits (on average) after decryption to be in error. In order to alleviate this amount of error, smart coding techniques and/or new encryption algorithms that take into account the nature of wireless channels …
Lt Code Equations, Stanley Truitt
Lt Code Equations, Stanley Truitt
Electronic Theses and Dissertations
The LT Code equations describe the process of encoding input symbols into an error correcting code that requires no feedback from the receiver. The mathematical process involved the development of LT Codes is important. This thesis address the issue of improving the understanding of the LT Code equations presented in the original paper. This task is accomplished by inserting the mathematical details when possible, providing graphical results to the equations, and comparing the equations results against random computer generated simulations results. This thesis will improve the understanding of how LT Codes equations related to actual results.
Network Performance Management Using Application-Centric Key Performance Indicators, Susan Mcgill
Network Performance Management Using Application-Centric Key Performance Indicators, Susan Mcgill
Electronic Theses and Dissertations
The Internet and intranets are viewed as capable of supplying "Anything, Anywhere, Anytime" and e-commerce, e-government, e-community, and military C4I are now deploying many and varied applications to serve their needs. Network management is currently centralized in operations centers. To assure customer satisfaction with the network performance they typically plan, configure and monitor the network devices to insure an excess of bandwidth, that is overprovision. If this proves uneconomical or if complex and poorly understood interactions of equipment, protocols and application traffic degrade performance creating customer dissatisfaction, another more application-centric, way of managing the network will be needed. This research …