Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Telecommunications

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 39

Full-Text Articles in Engineering

Development Of A Constellation Simulator For A 5g/Iot Mission Planning System, Franco Criscola Dec 2023

Development Of A Constellation Simulator For A 5g/Iot Mission Planning System, Franco Criscola

Doctoral Dissertations and Master's Theses

The advancement of 5G and Internet-of-Things technologies has presented new challenges for telecommunications providers. One of the challenges is integrating these technologies with present networks. A solution has been found in low-Earth orbit satellite constellations. On one hand, this method increases coverage and reduces costs, but on the other it raises new problems like how to efficiently manage large constellations of spacecraft. This thesis introduces the Constellation Management System, developed in collaboration with i2Cat foundation. This novel tool is composed of two modules: the simulator and the scheduler. The former propagates satellite motion and computes visibility events to various targets …


Implementation Of Distance Learning At Universities Using The Experience Of The Honeywell Process Control Laboratory At Tashkent State Technical University, Nodirbek Rustambekovich Yusupbekov, Adilov Tulkunovich Farukh, Isakova Ismailovna Sitora Oct 2021

Implementation Of Distance Learning At Universities Using The Experience Of The Honeywell Process Control Laboratory At Tashkent State Technical University, Nodirbek Rustambekovich Yusupbekov, Adilov Tulkunovich Farukh, Isakova Ismailovna Sitora

Chemical Technology, Control and Management

The experience of modernization of the Honeywell Process Control Laboratory at Tashkent State Technical University has been considered (which is equipped with upgraded equipment (simulators for simulating various technological processes, distance learning tools). As a result, the quality of the demonstration of process control mechanisms increased the availability of theoretical and practical knowledge in the field of automated control systems. They also considered the teaching methods necessary for a modern student – remote access in real time, when students pass a knowledge test, consult with teachers, etc.


Deal: Differentially Private Auction For Blockchain Based Microgrids Energy Trading, Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen Mar 2020

Deal: Differentially Private Auction For Blockchain Based Microgrids Energy Trading, Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen

Publications

Modern smart homes are being equipped with certain renewable energy resources that can produce their own electric energy. From time to time, these smart homes or microgrids are also capable of supplying energy to other houses, buildings, or energy grid in the time of available self-produced renewable energy. Therefore, researches have been carried out to develop optimal trading strategies, and many recent technologies are also being used in combination with microgrids. One such technology is blockchain, which works over decentralized distributed ledger. In this paper, we develop a blockchain based approach for microgrid energy auction. To make this auction more …


Differential Privacy Techniques For Cyber Physical Systems: A Survey, Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen Mar 2020

Differential Privacy Techniques For Cyber Physical Systems: A Survey, Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen

Publications

Modern cyber physical systems (CPSs) has widely being used in our daily lives because of development of information and communication technologies (ICT).With the provision of CPSs, the security and privacy threats associated to these systems are also increasing. Passive attacks are being used by intruders to get access to private information of CPSs. In order to make CPSs data more secure, certain privacy preservation strategies such as encryption, and k-anonymity have been presented in the past. However, with the advances in CPSs architecture, these techniques also need certain modifications. Meanwhile, differential privacy emerged as an efficient technique to protect CPSs …


A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo Jan 2020

A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo

Computational Modeling & Simulation Engineering Faculty Publications

The Internet of Intelligent Things (IoIT) communication environment can be utilized in various types of applications (for example, intelligent battlefields, smart healthcare systems, the industrial internet, home automation, and many more). Communications that happen in such environments can have different types of security and privacy issues, which can be resolved through the utilization of blockchain. In this paper, we propose a tutorial that aims in desiging a generalized blockchain-based secure authentication key management scheme for the IoIT environment. Moreover, some issues with using blockchain for a communication environment are discussed as future research directions. The details of different types of …


Effective Capacity In Wireless Networks: A Comprehensive Survey, Muhammad Amjad, Mubashir Husain Rehmani, Leila Musavian Oct 2019

Effective Capacity In Wireless Networks: A Comprehensive Survey, Muhammad Amjad, Mubashir Husain Rehmani, Leila Musavian

Publications

Low latency applications, such as multimedia communications, autonomous vehicles, and Tactile Internet are the emerging applications for next-generation wireless networks, such as 5th generation (5G) mobile networks. Existing physical layer channel models, however, do not explicitly consider quality of service (QoS) aware related parameters under specific delay constraints. To investigate the performance of low-latency applications in future networks, a new mathematical framework is needed. Effective capacity (EC), which is a link-layer channel model with QoS-awareness, can be used to investigate the performance of wireless networks under certain statistical delay constraints. In this paper, we provide a comprehensive survey on existing …


Software Defined Networks Based Smart Grid Communication: A Comprehensive Survey, Mubashir Husain Rehmani, Alan Davy, Brendan Jennings, Chadi Assi Jan 2019

Software Defined Networks Based Smart Grid Communication: A Comprehensive Survey, Mubashir Husain Rehmani, Alan Davy, Brendan Jennings, Chadi Assi

Publications

The current power grid is no longer a feasible solution due to ever-increasing user demand of electricity, old infrastructure, and reliability issues and thus require transformation to a better grid a.k.a., smart grid (SG). The key features that distinguish SG from the conventional electrical power grid are its capability to perform two-way communication, demand side management, and real time pricing. Despite all these advantages that SG will bring, there are certain issues which are specific to SG communication system. For instance, network management of current SG systems is complex, time consuming, and done manually. Moreover, SG communication (SGC) system is …


Ieee Access Special Section Editorial: Wirelessly Powered Networks, And Technologies, Theofanis P. Raptis, Nuno B. Carvalho, Diego Masotti, Lei Shu, Cong Wang, Yuanyuan Yang Jan 2019

Ieee Access Special Section Editorial: Wirelessly Powered Networks, And Technologies, Theofanis P. Raptis, Nuno B. Carvalho, Diego Masotti, Lei Shu, Cong Wang, Yuanyuan Yang

Computer Science Faculty Publications

Wireless Power Transfer (WPT) is, by definition, a process that occurs in any system where electrical energy is transmitted from a power source to a load without the connection of electrical conductors. WPT is the driving technology that will enable the next stage in the current consumer electronics revolution, including battery-less sensors, passive RF identification (RFID), passive wireless sensors, the Internet of Things and 5G, and machine-to-machine solutions. WPT-enabled devices can be powered by harvesting energy from the surroundings, including electromagnetic (EM) energy, leading to a new communication networks paradigm, the Wirelessly Powered Networks.


Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework, Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Lior Rokach, Yuval Elovici, Lee Giles Jan 2019

Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework, Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Lior Rokach, Yuval Elovici, Lee Giles

Computer Science Faculty Publications

Researchers from academia and the corporate-sector rely on scholarly digital libraries to access articles. Attackers take advantage of innocent users who consider the articles' files safe and thus open PDF-files with little concern. In addition, researchers consider scholarly libraries a reliable, trusted, and untainted corpus of papers. For these reasons, scholarly digital libraries are an attractive-target and inadvertently support the proliferation of cyber-attacks launched via malicious PDF-files. In this study, we present related vulnerabilities and malware distribution approaches that exploit the vulnerabilities of scholarly digital libraries. We evaluated over two-million scholarly papers in the CiteSeerX library and found the library …


Surgical And Medical Applications Of Drones: A Comprehensive Review, Brent Terwilliger, James C. Rosser Jr., Vudatha Vignesh, Brett C. Parker Jul 2018

Surgical And Medical Applications Of Drones: A Comprehensive Review, Brent Terwilliger, James C. Rosser Jr., Vudatha Vignesh, Brett C. Parker

Publications

Drones have the ability to gather real time data cost effectively, to deliver payloads and have initiated the rapid evolution of many industrial, commercial, and recreational applications. Unfortunately, there has been a slower expansion in the field of medicine. This article provides a comprehensive review of current and future drone applications in medicine, in hopes of empowering and inspiring more aggressive investigation.


Interference Analysis And Mitigation Of Telemetry (Tm) And 4g Long-Term Evolution (Lte) Systems In Adjacent Spectrum Bands, Juan Francisco Gonzalez Jan 2018

Interference Analysis And Mitigation Of Telemetry (Tm) And 4g Long-Term Evolution (Lte) Systems In Adjacent Spectrum Bands, Juan Francisco Gonzalez

Open Access Theses & Dissertations

Currently, the telecommunications, radio systems, and many other wireless services in the United States are using the spectrum from the 6 kHz to the 300 GHz frequencies. Although it may seem enough for said systems, as more users and devices are being introduced into the market, the spectrum is limiting the faster introduction of these devices and/or systems. The radio frequency spectrum is home to many transmissions, from amateur radio to cellphone applications, which all share similar frequency bands. By sharing, the number of applications can be increased in a single band, but their performance may be affected. Herein, experiments …


Industrial Wireless Sensor Networks 2016, Qindong Sun, Schancang Li, Shanshan Zhao, Hongjian Sun, Li Xu, Arumugam Nallamathan Jan 2017

Industrial Wireless Sensor Networks 2016, Qindong Sun, Schancang Li, Shanshan Zhao, Hongjian Sun, Li Xu, Arumugam Nallamathan

Information Technology & Decision Sciences Faculty Publications

The industrial wireless sensor network (IWSN) is the next frontier in the Industrial Internet of Things (IIoT), which is able to help industrial organizations to gain competitive advantages in industrial manufacturing markets by increasing productivity, reducing the costs, developing new products and services, and deploying new business models.


Unified Messaging Systems: An Evolutionary Overview, Declan Barber Nov 2015

Unified Messaging Systems: An Evolutionary Overview, Declan Barber

The ITB Journal

Over the last decade, the widespread demand and use of the internet has changed the direction of the telecommunications industry as it was recognised that the internet could be used as an inexpensive way to handle not only data but also voice communications. This convergence of traditional voice and data technologies towards an IP-based open architecture has been paralleled by a convergence of the internet and mobile communications. As a result of these convergences, unified messaging has emerged as a technically viable service. Integrated messaging services that offer partial unification of different message types are already in the marketplace. This …


Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo Apr 2015

Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo

All Faculty Scholarship

The emergence of the cloud is heightening the demands on the network in terms of bandwidth, ubiquity, reliability, latency, and route control. Unfortunately, the current architecture was not designed to offer full support for all of these services or to permit money to flow through it. Instead of modifying or adding specific services, the architecture could redesigned to make Internet services contractible by making the relevant information associated with these services both observable and verifiable. Indeed, several on-going research programs are exploring such strategies, including the NSF’s NEBULA, eXpressive Internet Architecture (XIA), ChoiceNet, and the IEEE’s Intercloud projects.


Using Online And Multimedia Resources To Enhance The Student Learning Experience In A Telecommunications Laboratory Within An Australian University, Peter J. Vial, Sasha Nikolic, Montserrat Ros, David Stirling, Parviz Doulai Jan 2015

Using Online And Multimedia Resources To Enhance The Student Learning Experience In A Telecommunications Laboratory Within An Australian University, Peter J. Vial, Sasha Nikolic, Montserrat Ros, David Stirling, Parviz Doulai

Faculty of Engineering and Information Sciences - Papers: Part A

A laboratory component of an undergraduate telecommunications course consistently scored poorly for student learning experience on student surveys at an Australian university. Consultation with experienced academic staff revealed the need to modify the teaching resources available for the laboratory to include web-based multimedia and interactive resources. This new material was developed and made available to students and teaching staff in early 2011 via an Australian university e-learning package which was used to deliver the subject. The students and demonstrators were then encouraged to use this new resource to prepare for the three hour laboratory sessions. Surveys of students who took …


Packaged Silica And Chalcogenide Microspheres And Their Applications For Telecommunications, Pengfei Wang Jan 2015

Packaged Silica And Chalcogenide Microspheres And Their Applications For Telecommunications, Pengfei Wang

Conference papers

To investigate, both theoretically and experimentally, packaged silica and chalcogenide microsphere and their potential applications in telecommunications.


Using Grounded Theory To Develop A Framework For Software Testing Best Practice In A Telecommunications Company, David Hendrick Jan 2013

Using Grounded Theory To Develop A Framework For Software Testing Best Practice In A Telecommunications Company, David Hendrick

Dissertations

Software testing is a key part of the software development process, irrespective of the development methodology being followed. Estimates suggest that testing can account for more than 50% of the cost of a software development project. However, the cost of inadequate testing or verifying software can be far greater; this can result in losses that could total more than 10% of an organisation’s turnover. It is clear that software testing is essential; but while many companies implement different forms of testing, there is often no structure or best practice followed to this testing. There appears to be a gap in …


Maine’S Three Ring Binder, Fletcher Kittredge Jan 2013

Maine’S Three Ring Binder, Fletcher Kittredge

Maine Policy Review

Although Maine is a rural state, it has had success in keeping pace with technological changes since the rise of the Internet 20 years ago. In this section, authors describe some of these successes and the challenges faced by both consumers and libraries in the new digital environment. Fletcher Kittredge presents the history and promise of Maine’s “Three Ring Binder,” a new and important fiber optic network that will bring high-speed broadband connectivity to rural parts of the state. The Three Ring Binder is expected both to improve economic opportunities for businesses and to increase high-speed Internet access for underserved …


Adaptive Encryption Techniques In Wireless Communication Channels With Tradeoffs Between Communication Reliability And Security, Walid Al Zibideh Jan 2013

Adaptive Encryption Techniques In Wireless Communication Channels With Tradeoffs Between Communication Reliability And Security, Walid Al Zibideh

Electronic Theses and Dissertations

Encryption is a vital process to ensure the confidentiality of the information transmitted over an insecure wireless channel. However, the nature of the wireless channel tends to deteriorate because of noise, interference and fading. Therefore, a symmetrically encrypted transmitted signal will be received with some amount of error. Consequently, due to the strict avalanche criterion (sac), this error propagates during the decryption process, resulting in half the bits (on average) after decryption to be in error. In order to alleviate this amount of error, smart coding techniques and/or new encryption algorithms that take into account the nature of wireless channels …


Slides: Impacts Of Energy Deficits In Cooking, Illumination, Water, Sanitation, And Motive Power, Paul S. Chinowsky Sep 2012

Slides: Impacts Of Energy Deficits In Cooking, Illumination, Water, Sanitation, And Motive Power, Paul S. Chinowsky

2012 Energy Justice Conference and Technology Exposition (September 17-18)

Presenter: Dr. Paul Chinowsky, Director, Mortenson Center in Engineering for Developing Communities; Professor, University of Colorado

25 slides


Like Deck Chairs On The Titanic: Why Spectrum Reallocation Won’T Avert The Coming Data Crunch But Technology Might Keep The Wireless Industry Afloat, Brian J. Love, David J. Love, James V. Krogmeier Dec 2011

Like Deck Chairs On The Titanic: Why Spectrum Reallocation Won’T Avert The Coming Data Crunch But Technology Might Keep The Wireless Industry Afloat, Brian J. Love, David J. Love, James V. Krogmeier

Brian J. Love

Skyrocketing mobile data demands caused by increasing adoption of smartphones, tablet computers, and broadband-equipped laptops will soon swamp the capacity of our nation’s wireless networks, a fact that promises to stagnate a $1 trillion slice on the nation’s economy. Among scholars and policymakers studying this looming “spectrum crisis,” consensus is developing that regulators must swiftly reclaim spectrum licensed to other industries and reallocate those rights to wireless providers. In this interdisciplinary piece, we explain in succinct terms why this consensus is wrong. With data demands increasing at an exponential rate, spectrum reallocation plans that promise only linear growth are destined …


A Novel Telecommunications-Based Approach To Mathematical Modeling Of Hiv Infection, Aaron T. Sharp Dec 2011

A Novel Telecommunications-Based Approach To Mathematical Modeling Of Hiv Infection, Aaron T. Sharp

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

It is well known that biological systems utilize communication in some form, one prolific example of this is the propagation of HIV (Human Immunodeficiency Virus) in the human body. By modeling HIV infection as a communication system, we hope to gain a unique insight into HIV and biological communication systems in general. Such a model would provide researchers a platform for experimenting and simulating various biological communication systems. We have previously developed a layered communication protocol for interpreting biological communication systems using telecommunications paradigms and will apply said model to HIV proliferation. We will also demonstrate the effectiveness of the …


Lt Code Equations, Stanley Truitt Jan 2011

Lt Code Equations, Stanley Truitt

Electronic Theses and Dissertations

The LT Code equations describe the process of encoding input symbols into an error correcting code that requires no feedback from the receiver. The mathematical process involved the development of LT Codes is important. This thesis address the issue of improving the understanding of the LT Code equations presented in the original paper. This task is accomplished by inserting the mathematical details when possible, providing graphical results to the equations, and comparing the equations results against random computer generated simulations results. This thesis will improve the understanding of how LT Codes equations related to actual results.


The Convergence Of Broadcasting And Telephony: Legal And Regulatory Implications, Christopher S. Yoo Dec 2009

The Convergence Of Broadcasting And Telephony: Legal And Regulatory Implications, Christopher S. Yoo

All Faculty Scholarship

This article, written for the inaugural issue of a new journal, analyzes the extent to which the convergence of broadcasting and telephony induced by the digitization of communications technologies is forcing policymakers to rethink their basic approach to regulating these industries. Now that voice and video are becoming available through every transmission technology, policymakers can no longer define the scope of regulatory obligations in terms of the mode of transmission. In addition, jurisdictions that employ separate agencies to regulate broadcasting and telephony must reform their institutional structures to bring both within the ambit of a single regulatory agency. The emergence …


Rethinking Broadband Internet Access, Daniel F. Spulber, Christopher S. Yoo Jun 2008

Rethinking Broadband Internet Access, Daniel F. Spulber, Christopher S. Yoo

All Faculty Scholarship

The emergence of broadband Internet technologies, such as cable modem and digital subscriber line (DSL) systems, has reopened debates over how the Internet should be regulated. Advocates of network neutrality and open access to cable modem systems have proposed extending the regulatory regime developed to govern conventional telephone and narrowband Internet service to broadband. A critical analysis of the rationales traditionally invoked to justify the regulation of telecommunications networks--such as natural monopoly, network economic effects, vertical exclusion, and the dangers of ruinous competition--reveals that those rationales depend on empirical and theoretical preconditions that do not apply to broadband. In addition, …


Resource Sharing Via Planed Relay For Hwn, Chong Shen, Susan Rea, Dirk Pesch Apr 2008

Resource Sharing Via Planed Relay For Hwn, Chong Shen, Susan Rea, Dirk Pesch

NIMBUS Articles

We present an improved version of adaptive distributed cross-layer routing algorithm (ADCR) for hybrid wireless network with dedicated relay stations () in this paper. A mobile terminal (MT) may borrow radio resources that are available thousands mile away via secure multihop RNs, where RNs are placed at pre-engineered locations in the network. In rural places such as mountain areas, an MT may also communicate with the core network, when intermediate MTs act as relay node with mobility. To address cross-layer network layers routing issues, the cascaded ADCR establishes routing paths across MTs, RNs, and cellular base stations (BSs) and provides …


Emergent Behavior In Massively-Deployed Sensor Networks, Ekaterina Shurkova, Ruzana Ishak, Stephan Olariu, Shaharuddin Salleh Jan 2008

Emergent Behavior In Massively-Deployed Sensor Networks, Ekaterina Shurkova, Ruzana Ishak, Stephan Olariu, Shaharuddin Salleh

Computer Science Faculty Publications

The phenomenal advances in MEMS and nanotechnology make it feasible to build small devices, referred to as sensors that are able to sense, compute and communicate over small distances. The massive deployment of these small devices raises the fascinating question of whether or not the sensors, as a collectivity, will display emergent behavior, just as living organisms do. In this work we report on a recent effort intended to observe emerging behavior of large groups of sensor nodes, like living cells demonstrate. Imagine a massive deployment of sensors that can be in two states "red" and "blue". At deployment time …


Strategic Alliances In Greek Mobile Telephony, Ioanna Stoili, Anastasios A. Economides Jan 2007

Strategic Alliances In Greek Mobile Telephony, Ioanna Stoili, Anastasios A. Economides

Journal of International Technology and Information Management

The mobile telephony market is a very competitive market. Mobile telephony companies try to expand by forming strategic alliances with companies from various industries. The objective of this paper is to analyze the motives, the actions and the results of the collaborations and alliances of two Greek mobile telephony companies (Cosmote and Vodafone Hellas). In addition, this paper illustrates examples of how the technology change and the technological convergence (Internet, computers, and mobile telephony) affected and activated the proliferation of these alliances. The entry of I-mode and Vodafone Live! in the Greek market caused an increase in the number of …


Mandating Access To Telecom And The Internet: The Hidden Side Of Trinko, Daniel F. Spulber, Christopher S. Yoo Jan 2007

Mandating Access To Telecom And The Internet: The Hidden Side Of Trinko, Daniel F. Spulber, Christopher S. Yoo

All Faculty Scholarship

Antitrust has long played a major role in telecommunications policy, demonstrated most dramatically by the equal access mandate imposed during the breakup of AT&T. In this Article we explore the extent to which antitrust can continue to serve as a source of access mandates following the Supreme Court's 2004 Trinko decision. Although Trinko sharply criticized access remedies and antitrust courts' ability to enforce them, it is not yet clear whether future courts will interpret the opinion as barring all antitrust access claims. Even more importantly, the opinion contains language hinting at possible bases for differentiating among different types of access, …


Network Performance Management Using Application-Centric Key Performance Indicators, Susan Mcgill Jan 2007

Network Performance Management Using Application-Centric Key Performance Indicators, Susan Mcgill

Electronic Theses and Dissertations

The Internet and intranets are viewed as capable of supplying "Anything, Anywhere, Anytime" and e-commerce, e-government, e-community, and military C4I are now deploying many and varied applications to serve their needs. Network management is currently centralized in operations centers. To assure customer satisfaction with the network performance they typically plan, configure and monitor the network devices to insure an excess of bandwidth, that is overprovision. If this proves uneconomical or if complex and poorly understood interactions of equipment, protocols and application traffic degrade performance creating customer dissatisfaction, another more application-centric, way of managing the network will be needed. This research …