Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Electronic Theses and Dissertations

Telecommunications

Articles 1 - 3 of 3

Full-Text Articles in Engineering

Adaptive Encryption Techniques In Wireless Communication Channels With Tradeoffs Between Communication Reliability And Security, Walid Al Zibideh Jan 2013

Adaptive Encryption Techniques In Wireless Communication Channels With Tradeoffs Between Communication Reliability And Security, Walid Al Zibideh

Electronic Theses and Dissertations

Encryption is a vital process to ensure the confidentiality of the information transmitted over an insecure wireless channel. However, the nature of the wireless channel tends to deteriorate because of noise, interference and fading. Therefore, a symmetrically encrypted transmitted signal will be received with some amount of error. Consequently, due to the strict avalanche criterion (sac), this error propagates during the decryption process, resulting in half the bits (on average) after decryption to be in error. In order to alleviate this amount of error, smart coding techniques and/or new encryption algorithms that take into account the nature of wireless channels …


Lt Code Equations, Stanley Truitt Jan 2011

Lt Code Equations, Stanley Truitt

Electronic Theses and Dissertations

The LT Code equations describe the process of encoding input symbols into an error correcting code that requires no feedback from the receiver. The mathematical process involved the development of LT Codes is important. This thesis address the issue of improving the understanding of the LT Code equations presented in the original paper. This task is accomplished by inserting the mathematical details when possible, providing graphical results to the equations, and comparing the equations results against random computer generated simulations results. This thesis will improve the understanding of how LT Codes equations related to actual results.


Network Performance Management Using Application-Centric Key Performance Indicators, Susan Mcgill Jan 2007

Network Performance Management Using Application-Centric Key Performance Indicators, Susan Mcgill

Electronic Theses and Dissertations

The Internet and intranets are viewed as capable of supplying "Anything, Anywhere, Anytime" and e-commerce, e-government, e-community, and military C4I are now deploying many and varied applications to serve their needs. Network management is currently centralized in operations centers. To assure customer satisfaction with the network performance they typically plan, configure and monitor the network devices to insure an excess of bandwidth, that is overprovision. If this proves uneconomical or if complex and poorly understood interactions of equipment, protocols and application traffic degrade performance creating customer dissatisfaction, another more application-centric, way of managing the network will be needed. This research …