Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Engineering

Blind Separation For Intermittent Sources Via Sparse Dictionary Learning, Annan Dong May 2019

Blind Separation For Intermittent Sources Via Sparse Dictionary Learning, Annan Dong

Dissertations

Radio frequency sources are observed at a fusion center via sensor measurements made over slow flat-fading channels. The number of sources may be larger than the number of sensors, but their activity is sparse and intermittent with bursty transmission patterns. To account for this, sources are modeled as hidden Markov models with known or unknown parameters. The problem of blind source estimation in the absence of channel state information is tackled via a novel algorithm, consisting of a dictionary learning (DL) stage and a per-source stochastic filtering (PSF) stage. The two stages work in tandem, with the latter operating on …


Distributed Synchronization Algorithms For Wireless Sensor Networks, Nicola Varanese Jan 2011

Distributed Synchronization Algorithms For Wireless Sensor Networks, Nicola Varanese

Dissertations

The ability to distribute time and frequency among a large population of interacting agents is of interest for diverse disciplines, inasmuch as it enables to carry out complex cooperative tasks. In a wireless sensor network (WSN), time/frequency synchronization allows the implementation of distributed signal processing and coding techniques, and the realization of coordinated access to the shared wireless medium. Large multi-hop WSN's constitute a new regime for network synchronization, as they call for the development of scalable, fully distributed synchronization algorithms. While most of previous research focused on synchronization at the application layer, this thesis considers synchronization at the lowest …


Channel-Predictive Link Layer Arq Protocols In Wireless Networks, Huseyin Dogukan Cavdar Jan 2007

Channel-Predictive Link Layer Arq Protocols In Wireless Networks, Huseyin Dogukan Cavdar

Theses

Communication performance over a wireless channel should be considered according to two main parameters: energy and throughput. The reliable data transfer is a key to these goals. The reliable node-to-node data transfer is performed by link layer protocols. One prominent approach is Automatic Repeat Request (ARQ) protocol. The traditional ARQ protocols attempt to recover the erroneously transmitted frames by retransmitting those frames, regardless of the channel state. Since this channel state unaware behaviour may cause unnecessary retransmissions, traditional ARQ protocols are expected to be energy inefficient. Some ideas have been proposed such as stochastic learning automaton based ARQ, and channel …


Probabilistic Approaches To The Design Of Wireless Ad Hoc And Sensor Networks, Zhen Guo Jan 2006

Probabilistic Approaches To The Design Of Wireless Ad Hoc And Sensor Networks, Zhen Guo

Dissertations

The emerging wireless technologies has made ubiquitous wireless access a reality and enabled wireless systems to support a large variety of applications. Since the wireless self-configuring networks do not require infrastructure and promise greater flexibility and better coverage, wireless ad hoc and sensor networks have been under intensive research. It is believed that wireless ad hoc and sensor networks can become as important as the Internet. Just as the Internet allows access to digital information anywhere, ad hoc and sensor networks will provide remote interaction with the physical world.

Dynamics of the object distribution is one of the most important …


Opportunistic Transmission Scheduling For Next Generation Wireless Communication Systems With Multimedia Services, Chengzhou Li Aug 2005

Opportunistic Transmission Scheduling For Next Generation Wireless Communication Systems With Multimedia Services, Chengzhou Li

Dissertations

The explosive growth of the Internet and the continued dramatic increase for all wireless services are fueling the demand for increased capacity, data rates, and support of different quality of service (QoS) requirements for different classes of services. Since in the current and future wireless communication infrastructures, the performances of the various services are strongly correlated, as the resources are shared among them, dynamic resource allocation methods should be employed. With the demand for high data rate and support of multiple QoS, the transmission scheduling plays a key role in the efficient resource allocation process in wireless systems. The fundamental …


Performance Of Multi-User Codes In Wireless Communications, Muhammad Tauseef Ulislam May 2005

Performance Of Multi-User Codes In Wireless Communications, Muhammad Tauseef Ulislam

Theses

Multi-user codes are a widely used in transmitting user data from base station to mobile station and vice versa. In wireless communications a signal received by a mobile station goes through different fading channels resulting. These multi-paths add constructively and destructively with different delays and attenuation at the mobile station. The autocorrelation and cross correlation properties of the Multi-user codes play a significant role in extracting the user data from the signal corrupted by multipath fading channel.

The thesis presents a comparison of different Multi-user codes based on their autocorrelation and cross correlation properties. These codes are passed through a …


Low Interference Routing For Wireless Ad-Hoc Networks, Mohit Gupta Aug 2003

Low Interference Routing For Wireless Ad-Hoc Networks, Mohit Gupta

Theses

In this thesis the primary focus is on the problem of interference between messages. The thesis discusses why the messages are blocked in a system? How adding a message impacts the cost of all other available links, which can be established in the system.

This thesis analyzes how the availability of channels, increase in number of nodes and increase in the transmission range help in increasing the number of messages that can be handled in the network. It is also analyzes how critical is the selection of the maximum transmission range MTR, transmission range TR and required transmission range RTR. …


Efficient Resource Allocation And Call Admission Control In High Capacity Wireless Networks, Jiongkuan Hou May 2003

Efficient Resource Allocation And Call Admission Control In High Capacity Wireless Networks, Jiongkuan Hou

Dissertations

Resource Allocation (RA) and Call Admission Control (CAC) in wireless networks are processes that control the allocation of the limited radio resources to mobile stations (MS) in order to maximize the utilization efficiency of radio resources and guarantee the Quality of Service (QoS) requirements of mobile users. In this dissertation, several distributed, adaptive and efficient RA/CAC schemes are proposed and analyzed, in order to improve the system utilization while maintaining the required QoS.

Since the most salient feature of the mobile wireless network is that users are moving, a Mobility Based Channel Reservation (MBCR) scheme is proposed which takes the …


Detecting Malfunction In Wireless Sensor Networks, Pablito C. Lake May 2003

Detecting Malfunction In Wireless Sensor Networks, Pablito C. Lake

Theses

The objective of this thesis is to detect malfunctioning sensors in wireless sensor networks. The ability to detect abnormality is critical to the security of any sensor network. However, the ability to detect a faulty wireless sensor is not trivial. Controlled repeatable experiments are difficult in wireless channels. A Redhat Linux. 7.0 Wireless Emulation Dynamic Switch software was used to solve this problem.

Six nodes were configured with a node acting as a base station. The nodes were all part of a cell. This means that every node could communicate with all other nodes. A client-server program simulated the background …


Comparative Studies Of Network Traffic In Actual And Emulated Wireless Networks, Curtis Salley Jr. May 2003

Comparative Studies Of Network Traffic In Actual And Emulated Wireless Networks, Curtis Salley Jr.

Theses

Wireless networks are becoming more popular in all types of environments from home office, to business infrastructure, to mobile computing. As more of these networks flourish, so does the attraction for hackers. The thesis examines the bandwidth of wireless networks and the effects of intrusions in three different scenarios. First, it looks at a wireless network that is connected to a wired infrastructure. Next, the thesis examines a wireless ad hoc network and how bandwidth plays a valuable part in the communication with neighboring nodes. And finally, the thesis attempts to simulate a wireless network by using a bandwidth configuration …


Tracking The Path Of A Mobile Radioactive Source Using A Wireless Sensor Network, Nipa Shah May 2003

Tracking The Path Of A Mobile Radioactive Source Using A Wireless Sensor Network, Nipa Shah

Theses

This report describes several experiments used to characterize and test a network of radiation sensors. The purpose of these tests is to assess the feasibility of using these sensors to detect and track radioactive sources in a large field, as in a battlefield or on a military campus. Simulated radiation measurements are used to compare the result of radiation detection accuracy in tracking the moving target and to find its path as early as possible. This is done via changing the number of sensing nodes deployed (deployment density), as well as the models of the detectors. This thesis describes algorithms …


Sub-Segment Based Transport Layer Protocol For Wireless Medium, Som Sengupta May 2003

Sub-Segment Based Transport Layer Protocol For Wireless Medium, Som Sengupta

Theses

This thesis discusses the techniques to improve the TCP over wireless. The loss-intensive wireless communication results in high retransmission rates to recover lost packets and bandwidth consumption. In addition, the retransmitted segments have significant chance of being dropped. To make the retransmission process more granular, large segments at the transport layer (540 bytes, by default) can be subdivided into smaller sub-segments. This document introduces a split TCP based solution and describes how to produce a series of smaller-sized segments that share the same transport layer header. A new header format is introduced to support the transmission of smaller segments …