Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

PDF

2007

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 34

Full-Text Articles in Computer Engineering

Using Gis To Optimize The Design And Implementation Of The Rtk Reference Network In Abu Dhabi, Mustafa Abdulla Mohammed Almusawa Dec 2007

Using Gis To Optimize The Design And Implementation Of The Rtk Reference Network In Abu Dhabi, Mustafa Abdulla Mohammed Almusawa

Theses

Several challenging applications and construction works demand real-time measurements for positioning at the centimeter-level accuracy. This positioning accuracy can be obtained by using a Global Positioning System (GPS) roving unit and employing a single reference station (base-station) or through utilizing the service of multiple reference stations forming a Real-Time Kinematics (RTK) Reference Network.

The limitation of the single reference approach is that measurement errors are distance dependent and good accuracy can be only obtained when distances are less than 10 kms. In addition, this method requires a nearby Geodetic Control Point (GCP). Recently, RTK reference networks are widely established in …


The Effects Of Contention Among Stations On Video Streaming Applications Over Wireless Local Area Networks: An Experimental Approach, Nicola Cranley, Tanmoy Debnath Oct 2007

The Effects Of Contention Among Stations On Video Streaming Applications Over Wireless Local Area Networks: An Experimental Approach, Nicola Cranley, Tanmoy Debnath

Conference papers

Multimedia streaming applications have a large impact on the resource requirements of the WLAN. There are many variables involved in video streaming, such as the video content being streamed, how the video is encoded and how it is sent. This makes the role of radio resource management and the provision of QoS guarantees extremely difficult. For video streaming applications, packet loss and packets dropped due to excessive delay are the primary factors that affect the received video quality. In this paper, we experimentally analyse the effects of contention on the performance of video streaming applications with a given delay constraint …


Lazy Preservation: Reconstructing Websites From The Web Infrastructure, Frank Mccown Oct 2007

Lazy Preservation: Reconstructing Websites From The Web Infrastructure, Frank Mccown

Computer Science Theses & Dissertations

Backup or preservation of websites is often not considered until after a catastrophic event has occurred. In the face of complete website loss, webmasters or concerned third parties have attempted to recover some of their websites from the Internet Archive. Still others have sought to retrieve missing resources from the caches of commercial search engines. Inspired by these post hoc reconstruction attempts, this dissertation introduces the concept of lazy preservation{ digital preservation performed as a result of the normal operations of the Web Infrastructure (web archives, search engines and caches). First, the Web Infrastructure (WI) is characterized by its preservation …


Insults In Your Inbox, M. Thulasidas Sep 2007

Insults In Your Inbox, M. Thulasidas

Research Collection School Of Computing and Information Systems

Email is a boon at work, but aggressive staff may use it to inflict humiliation. Most of its impact has been positive. An email from the big boss to all@yourcompany, for instance, is a fair substitute for a general communication meet- ing. In smaller teams, email often saves meetings and increases productivity.


Cognitive Radio: Fundamentals And Opportunities, Robert H. Morelos-Zaragoza Aug 2007

Cognitive Radio: Fundamentals And Opportunities, Robert H. Morelos-Zaragoza

Robert Henry Morelos-Zaragoza

This talk is aimed at MSEE students in San Jose State University. It provides an overview of cognitive radio concepts and technologies. A MATLAB Simulink of demonstration of digital channel selection using a low IF radio architecture is presented. Technical challenges that remain to be solved in this area are identified.


What Can Antitrust Contribute To The Network Neutrality Debate?, Christopher S. Yoo Aug 2007

What Can Antitrust Contribute To The Network Neutrality Debate?, Christopher S. Yoo

All Faculty Scholarship

Over the course of the last year, policymakers have begun to consider whether antitrust can play a constructive role in the network neutrality debate. A review of both the theory and the practice of antitrust suggests that it does have something to contribute. As an initial matter, antitrust underscores that standardization and interoperability are not always beneficial and provides a framework for determining the optimal level of standardization. In addition, the economic literature and legal doctrine on vertical exclusion reveal how compelling network neutrality could reduce static efficiency and show how mandating network neutrality could impair dynamic efficiency by deterring …


Channel Management In Heterogeneous Cellular Networks, Mohammad Hadi Arbabi Aug 2007

Channel Management In Heterogeneous Cellular Networks, Mohammad Hadi Arbabi

Computer Science Theses & Dissertations

Motivated by the need to increase system capacity in the face of tight FCC regulations, modem cellular systems are under constant pressure to increase the sharing of the frequency spectrum among the users of the network.

Key to increasing system capacity is an efficient channel management strategy that provides higher capacity for the system while, at the same time, providing the users with Quality of Service guarantees. Not surprisingly, dynamic channel management has become a high profile topic in wireless communications. Consider a highly populated urban area, where mobile traffic loads are increased due to highway backups or sporting events. …


Building National Digital Infrastructure: A Case Study Of Semiconductor Complex Limited, Deepak Kappor Jul 2007

Building National Digital Infrastructure: A Case Study Of Semiconductor Complex Limited, Deepak Kappor

Business Review

The digital revolution and the rapid technology developments thereafter created a real danger of the modem world getting divided into a new type of 'digital-haves and digital-have not's'. It was feared that developing countries like India may not be able to reap the benefits of the 'information age' because of the ever widening gap in technology and relevant infrastructure. As a strategic step to bridge the growing digital divide between India and the technologically advanced economies, the Government of India (GO I) decided to set up Semiconductor Complex Limited (SCL) in the year 1983 to develop Indian capabilities in the …


Voice And Video Capacity Of A Secure Wireless System, Jason R. Seyba Jun 2007

Voice And Video Capacity Of A Secure Wireless System, Jason R. Seyba

Theses and Dissertations

Improving the security and availability of secure wireless multimedia systems is the purpose of this thesis. Specifically, this thesis answered research questions about the capacity of wireless multimedia systems and how three variables relate to this capacity. The effects of securing the voice signal, real-time traffic originating foreign to a wireless local area network and use of an audio-only signal compared with a combined signal were all studied. The research questions were answered through a comprehensive literature review in addition to an experiment which had thirty-six subjects using a secure wireless multimedia system which was developed as part of this …


Performance Analysis And Comparison Of Multiple Routing Protocols In A Large-Area, High Speed Mobile Node Ad Hoc Network, Daniel K. Roberts Jun 2007

Performance Analysis And Comparison Of Multiple Routing Protocols In A Large-Area, High Speed Mobile Node Ad Hoc Network, Daniel K. Roberts

Theses and Dissertations

The U.S. Air Force is interested in developing a standard ad hoc framework using "heavy" aircraft to route data across large regions. The Zone Routing Protocol (ZRP) has the potential to provide seamless large-scale routing for DOD under the Joint Tactical Radio System program. The goal of this study is to determine if there is a difference between routing protocol performance when operating in a large-area MANET with high-speed mobile nodes. This study analyzes MANET performance when using reactive, proactive, and hybrid routing protocols, specifically AODV, DYMO, Fisheye, and ZRP. This analysis compares the performance of the four routing protocols …


Distributed Web Services Firewall, Hesham Samy Sabry Jun 2007

Distributed Web Services Firewall, Hesham Samy Sabry

Archived Theses and Dissertations

No abstract provided.


Maximizing Broadcast And Multicast Traffic Load Through Link-Rate Diversity In Wireless Mesh Networks, Chun Tung Chou, Bao Hua Liu, Archan Misra Jun 2007

Maximizing Broadcast And Multicast Traffic Load Through Link-Rate Diversity In Wireless Mesh Networks, Chun Tung Chou, Bao Hua Liu, Archan Misra

Research Collection School Of Computing and Information Systems

This paper studies some of the fundamental challenges and opportunities associated with the network-layer broadcast and multicast in a multihop multirate wireless mesh network (WMN). In particular, we focus on exploiting the ability of nodes to perform link-layer broadcasts at different rates (with correspondingly different coverage areas). We first show how, in the broadcast wireless medium, the available capacity at a mesh node for a multicast transmission is not just a function of the aggregate pre-existing traffic load of other interfering nodes, but intricately coupled to the actual (sender, receiver) set and the link-layer rate of each individual transmission. We …


Evaluating Software Engineering Processes In Commercial And Community Open Source Projects, Tony Wasserman, Eugenio Capra Apr 2007

Evaluating Software Engineering Processes In Commercial And Community Open Source Projects, Tony Wasserman, Eugenio Capra

Tony Wasserman

We describe a current study for obtaining information about management of commercial and community open source projects. We have interviewed and surveyed leaders of more than 75 open source projects. Questions focused on the styles of leadership and communication, with a technical focus on testing and quality assurance processes. This paper describes the methods used to identify and contact subjects, as well as the questions posed and some results.


Maximizing Communication Concurrency Via Link-Layer Packet Salvaging In Mobile Ad Hoc Networks, Chansu Yu, Kang G. Shin, Lubo Song Apr 2007

Maximizing Communication Concurrency Via Link-Layer Packet Salvaging In Mobile Ad Hoc Networks, Chansu Yu, Kang G. Shin, Lubo Song

Electrical and Computer Engineering Faculty Publications

Carrier-sense medium access control (MAC) protocols such as the IEEE 802.11 distributed coordination function (DCF) avoid collisions by holding up pending packet transmission requests when a carrier signal is observed above a certain threshold. However, this often results in unnecessarily conservative communication, thus making it difficult to maximize the utilization of the spatial spectral resource. This paper shows that a higher aggregate throughput can be achieved by allowing more concurrent communications and adjusting the communication distance on the fly, which needs provisions for the following two areas. On the one hand, carrier sense-based MAC protocols do not allow aggressive communication …


Detecting Compromised Nodes In Wireless Sensor Networks, Mary Lisa Mathews Apr 2007

Detecting Compromised Nodes In Wireless Sensor Networks, Mary Lisa Mathews

Electrical & Computer Engineering Theses & Dissertations

While wireless sensor networks are proving to be a versatile tool, many of the applications in which they are utilized have sensitive data. Therefore, security is crucial in many of these applications. Once a sensor node has been compromised, the security of the network degrades quickly if measures are not taken to deal with this event. There have been many approaches researched to tackle the issue. In this thesis, an anomaly-based intrusion detection protocol is developed to detect compromised nodes in wireless sensor networks.

The proposed protocol is implemented after the sensors are deployed into the environment in which they …


A Grid Computing Network Platform For Enhanced Data Management And Visualization, Javier Delgado Mar 2007

A Grid Computing Network Platform For Enhanced Data Management And Visualization, Javier Delgado

FIU Electronic Theses and Dissertations

This thesis presents a novel approach towards providing a collaboration environment by using Grid Computing. The implementation includes the deployment of a cluster attached to a mural display for high performance computing and visualization and a Grid-infrastructure for sharing storage space across a wide area network and easing the remote use of the computing resources. A medical data processing application is implemented on the platform. The outcome is enhanced use of remote storage facilities and quick return time for computationally-intensive problems.

The central issue of this thesis work is thus one that focuses on the development of a secure distributed …


Distributed Fault-Tolerant Quality Of Service Routing In Hybrid Directional Wireless Networks, Larry C. Llewellyn Ii Mar 2007

Distributed Fault-Tolerant Quality Of Service Routing In Hybrid Directional Wireless Networks, Larry C. Llewellyn Ii

Theses and Dissertations

This thesis presents a distributed fault-tolerant routing protocol (EFDCB) for QoS supporting hybrid mobile ad hoc networks with the aim of mitigating QoS disruption time when network failures occur. The experimental design presented in this thesis describes 22 experiments aimed at illustrating EFDCB's ability to handle fault-tolerance. The interpreted results show that EFDCB excels over a global rerouting protocol at this challenge which is the goal of this work.


Effective Mobile Routing Through Dynamic Addressing, Heungsoon Park Mar 2007

Effective Mobile Routing Through Dynamic Addressing, Heungsoon Park

Theses and Dissertations

Military communications has always been an important factor in military victory and will surely play an important part in future combat. In modern warfare, military units are usually deployed without existing network infrastructure. The IP routing protocol, designed for hierarchical networks cannot easily be applied in military networks due to the dynamic topology expected in military environments. Mobile ad-hoc networks (MANETs) represent an appropriate network for small military networks. But, most ad-hoc routing protocols suffer from the problem of scalability for large networks. Hierarchical routing schemes based on the IP address structure are more scalable than ad-hoc routing but are …


Performance Evaluation Of Ad Hoc Routing In A Swarm Of Autonomous Aerial Vehicles, Matthew T. Hyland Mar 2007

Performance Evaluation Of Ad Hoc Routing In A Swarm Of Autonomous Aerial Vehicles, Matthew T. Hyland

Theses and Dissertations

This thesis investigates the performance of three mobile ad hoc routing protocols in the context of a swarm of autonomous unmanned aerial vehicles (UAVs). It is proposed that a wireless network of nodes having an average of 5.1774 log n neighbors, where n is the total number of nodes in the network, has a high probability of having no partitions. By decreasing transmission range while ensuring network connectivity, and implementing multi-hop routing between nodes, spatial multiplexing is exploited whereby multiple pairs of nodes simultaneously transmit on the same channel. The proposal is evaluated using the Greedy Perimeter Stateless Routing (GPSR), …


On-Demand Key Distribution For Mobile Ad-Hoc Networks, Daniel F. Graham Mar 2007

On-Demand Key Distribution For Mobile Ad-Hoc Networks, Daniel F. Graham

Theses and Dissertations

Mobile ad-hoc networks offer dynamic portable communication with little or no infrastructure. While this has many benefits, there are additional shortcomings specific to wireless communication that must be addressed. This research proposes gossip-based on-demand key distribution as a means to provide data encryption for mobile ad-hoc networks. This technique uses message keys to avoid encrypting and decrypting a message at every node. Other optimizations used include secure channel caching and joint rekey messages. The use of gossip makes the scheme robust to node failure. Experimental results show only a 15% increase in end-to-end delay with a node failure rate of …


Overcoming Tcp Degradation In The Presence Of Multiple Intermittent Link Failures Utilizing Intermediate Buffering, Duane F. Harmon Mar 2007

Overcoming Tcp Degradation In The Presence Of Multiple Intermittent Link Failures Utilizing Intermediate Buffering, Duane F. Harmon

Theses and Dissertations

It is well documented that assumptions made in the popular Transmission Control Protocol's (TCP) development, while essential in the highly reliable wired environment, are incompatible with today's wireless network realities in what we refer to as a challenged environment. Challenged environments severely degrade the capability of TCP to establish and maintain a communication connection with reasonable throughput. This thesis proposes and implements an intermediate buffering scheme, implemented at the transport layer, which serves as a TCP helper protocol for use in network routing equipment to overcome short and bursty, but regular, link failures. Moreover, the implementation requires no modifications to …


Analysis Of Routing Worm Infection Rates On An Ipv4 Network, James Gorsuch Mar 2007

Analysis Of Routing Worm Infection Rates On An Ipv4 Network, James Gorsuch

Theses and Dissertations

Malicious logic, specifically worms, has caused monetary expenditure problems to network users in the past. Worms, like Slammer and Code Red, have infected thousands of systems and brought the Internet to a standstill. This research examines the ability of the original Slammer worm, the Slammer based routing worm proposed by Zou et al, and a new Single Slash Eight (SSE) routing worm proposed by this research to infect vulnerable systems within a given address space. This research investigates the Slammer worm's ability to generate a uniform random IP addresses in a given address space. Finally, a comparison of the speed …


Optimal Layout Of Multicast Groups Using Network Embedded Multicast Security In Ad Hoc Sensor Networks, Richard R. Brooks, Brijesh Pillai, Michele C. Weigle, Matthew Pirretti Jan 2007

Optimal Layout Of Multicast Groups Using Network Embedded Multicast Security In Ad Hoc Sensor Networks, Richard R. Brooks, Brijesh Pillai, Michele C. Weigle, Matthew Pirretti

Computer Science Faculty Publications

This paper considers the security of sensor network applications. Our approach creates multicast regions that use symmetric key cryptography for communications. Each multicast region contains a single keyserver that is used to perform key management and maintain the integrity of a multicast region. Communications between two multicast regions is performed by nodes that belong to both regions. To ease the network management burden, it is desirable for the networks to self-organize into regions and dynamically select their keyservers. This paper shows how to determine the number of keyservers (k) to use and the size in the number of hops (h) …


User Security Behavior On Wireless Networks: An Empirical Study, Tim Chenoweth, Robert Minch, Sharon Tabor Jan 2007

User Security Behavior On Wireless Networks: An Empirical Study, Tim Chenoweth, Robert Minch, Sharon Tabor

IT and Supply Chain Management Faculty Publications and Presentations

Wireless networks are rapidly becoming ubiquitous but are often insecure and leave users responsible for their own security. We empirically study whether users are successfully securing their client computers when using wireless networks. Automated techniques are used that scan users' machines after they associate with a university wireless network. This determines whether a firewall is being used and what TCP ports are open. Results show that over 9% of 3,331 unique computers scanned were not using a properly configured firewall. In addition, almost 9% had at least one TCP port open, with almost 6% having open ports with significant security …


Investigating Text Message Classification Using Case-Based Reasoning, Matt Healy Jan 2007

Investigating Text Message Classification Using Case-Based Reasoning, Matt Healy

Masters

Text classification is the categorization of text into a predefined set of categories. Text classification is becoming increasingly important given the large volume of text stored electronically e.g. email, digital libraries and the World Wide Web (WWW). These documents represent a massive amount of information that can be accessed easily. To gain benefit from using this information requires organisation. One way of organising it automatically is to use text classification. A number of well known machine learning techniques have been used in text classification including Naïve Bayes, Support Vector Machines and Decision Trees, and the less commonly used are k-Nearest …


Use Of The Wfg Toolkit And Pisa For Comparison Of Moeas, Lucas Bradstreet, Luigi Barone, Lyndon While, Simon Huband, Philip Hingston Jan 2007

Use Of The Wfg Toolkit And Pisa For Comparison Of Moeas, Lucas Bradstreet, Luigi Barone, Lyndon While, Simon Huband, Philip Hingston

Research outputs pre 2011

Understanding the behaviour of different optimisation algorithms is important in order to apply the best algorithm to a particular problem. The WFG toolkit was designed to aid this task for multi-objective evolutionary algorithms (MOEAs), offering an easily modifiable framework that allows practitioners the ability to test different features by "plugging" in different forms of transformations. In doing so, the WFG toolkit provides a set of problems that exhibit a variety of different characteristics. This paper presents a comparison between two state of the art MOEAs (NSGA-II and SPEA2) that exemplifies the unique capabilities of the WFG toolkit. By altering the …


Passive And Active Optical Bit-Pattern Recognition Structures For Multiwavelength Optical Packet Switching Networks, Muhsen Aljada, Kamal Alameh Jan 2007

Passive And Active Optical Bit-Pattern Recognition Structures For Multiwavelength Optical Packet Switching Networks, Muhsen Aljada, Kamal Alameh

Research outputs pre 2011

Next generation High-Speed optical packet switching networks require components capable of recognising the optical header to enable on-the-fly accurate switching of incoming data packets to their destinations. This paper experimentally demonstrates a comparison between two different optical header recognition structures; A passive structure based on the use of Fiber Bragg Gratings (FBGs), whereas the active structure employs Opto-VLSI processors that synthesise dynamic wavelength profile through digital phase holograms. The structures are experimentally demonstrated at 10Gbps. Performance comparison between the two structures is also discussed. These optical header recognition structures are attractive for multiwavelength optical network and applications.


Applying The Levels Of Conceptual Interoperability Model In Support Of Integratability, Interoperability, And Composability For System-Of-Systems Engineering, Andreas Tolk, Saikou Y. Diallo, Charles D. Turnitsa Jan 2007

Applying The Levels Of Conceptual Interoperability Model In Support Of Integratability, Interoperability, And Composability For System-Of-Systems Engineering, Andreas Tolk, Saikou Y. Diallo, Charles D. Turnitsa

Computational Modeling & Simulation Engineering Faculty Publications

The Levels of Conceptual Interoperability Model (LCIM) was developed to cope with the different layers of interoperation of modeling & simulation applications. It introduced technical, syntactic, semantic, pragmatic, dynamic, and conceptual layers of interoperation and showed how they are related to the ideas of integratability, interoperability, and composability. The model was successfully applied in various domains of systems, cybernetics, and informatics.


Keeping The Internet Neutral?: Tim Wu And Christopher Yoo Debate, Tim Wu, Christopher S. Yoo Jan 2007

Keeping The Internet Neutral?: Tim Wu And Christopher Yoo Debate, Tim Wu, Christopher S. Yoo

All Faculty Scholarship

"Net neutrality" has been among the leading issues of telecommunications policy this decade. Is the neutrality of the Internet fundamental to its success, and worth regulating to protect, or simply a technical design subject to improvement? In this debate-form commentary, Tim Wu and Christopher Yoo make clear the connection between net neutrality and broader issues of national telecommunications policy.


Introduction: Special Issue For The Selected Papers In The Fourth International Conference On Intelligent Multimedia Computing And Networking (Immcn) 2005, Chong-Wah Ngo, Hong-Va Leong Jan 2007

Introduction: Special Issue For The Selected Papers In The Fourth International Conference On Intelligent Multimedia Computing And Networking (Immcn) 2005, Chong-Wah Ngo, Hong-Va Leong

Research Collection School Of Computing and Information Systems

This special issue introduces seven papers selected from the IMMCN’ 2005, covering a wide range of emerging topics in multimedia field. These papers receive high scores and good comments from the reviewers in their respective areas of intelligent and nextgeneration networking, technology and application, multimedia coding, content analysis and retrieval. The seven papers are extended to 20 pages and then gone through another review process before the final publication. In this issue, we have two papers for video streaming, two papers for multimedia applications, one paper for video coding, and two papers for image and video retrieval.