Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Electrical and Computer Engineering (5)
- Fading (4)
- Wireless communication (2)
- Wireless sensor networks (2)
- AWGN (1)
-
- Ad hoc networks (1)
- Bandwidth (1)
- Base stations (1)
- Blood donation booking (1)
- Certificate-based signature (1)
- Channel capacity (1)
- Computational Diffie–Hellman assumption (1)
- Computer networks (1)
- Computer science (1)
- Delay effects (1)
- Delay lines (1)
- Detectors (1)
- Dispersion (1)
- Distributed computing (1)
- Electrical and Computer Engineering, Physics (1)
- Electrical and Computer engineering (1)
- Engineering, Computer Engineering, Computer Sciences, Digital Communications and Networking, Information Security (1)
- Forward security (1)
- Frequency (1)
- Frequency measurement (1)
- Integrated circuits (1)
- Intelligent transportation systems (1)
- Loss measurement (1)
- Maximum likelihood detection (1)
- Maximum likelihood estimation (1)
Articles 1 - 9 of 9
Full-Text Articles in Computer Engineering
Securing Information On A Web Application System To Facilitate Online Blood Donation Booking, Hrishitva Patel
Securing Information On A Web Application System To Facilitate Online Blood Donation Booking, Hrishitva Patel
Faculty Publications
Blood donation has saved many lives in the past. According to statistics presented by the American Red Cross, a patient is in need of a blood transfusion every two seconds. There are many benefits that arise from blood donation to both the donor and the blood recipients. With blood donation, cancer patients, people involved in accidents, or those battling diseases that require blood donation have access to enough blood to sustain their survival. There is a need to digitize the blood donation booking to facilitate blood donation across the United States, and ensure patients in need of blood, receive their …
A Forward-Secure Certificate-Based Signature Scheme, Jiguo Li, Huiyun Teng, Xinyu Huang, Yichen Zhang, Jianying Zhou
A Forward-Secure Certificate-Based Signature Scheme, Jiguo Li, Huiyun Teng, Xinyu Huang, Yichen Zhang, Jianying Zhou
Faculty Publications
Cryptographic computations are often carried out on insecure devices for which the threat of key exposure raises a serious concern. In an effort to address the key exposure problem, the notion of forward security was first presented by Günther in 1990. In a forward-secure scheme, secret keys are updated at regular periods of time; exposure of the secret key corresponding to a given time period does not enable an adversary to ‘break’ the scheme for any prior time period. In this paper, we first introduce forward security into certificate-based cryptography and define the security model of forward-secure certificate-based signatures (CBSs). …
Path Loss In An Urban Peer-To-Peer Channel For Six Public-Safety Frequency Bands, David W. Matolak, Qian Zhang, Qiong Wu
Path Loss In An Urban Peer-To-Peer Channel For Six Public-Safety Frequency Bands, David W. Matolak, Qian Zhang, Qiong Wu
Faculty Publications
We provide path loss data and models for a peer-to-peer wireless channel for an urban environment in six public safety bands, for simultaneous transmission to five spatially separated receiving sites. Results are from measurements in Denver, Colorado. The six frequencies at which we measured are (in MHz) 430, 750, 905, 1834, 2400, and 4860. Both line-of-sight and non-line-of-sight conditions were covered, and we quantify path loss exponents and linear-fit standard deviations as functions of frequency and location. Line-of-sight results agree with prior work, but non-line-of-sight exponents, from 3.6-7.3, are generally larger than in most other references.
Wireless Networks-On-Chips: Architecture, Wireless Channel, And Devices, David W. Matolak, Avinash Kodi, Savas Kaya, Dominic Ditomaso, Soumyasanta Laha, William Rayess
Wireless Networks-On-Chips: Architecture, Wireless Channel, And Devices, David W. Matolak, Avinash Kodi, Savas Kaya, Dominic Ditomaso, Soumyasanta Laha, William Rayess
Faculty Publications
Wireless networks-on-chips (WINoCs) hold substantial promise for enhancing multicore integrated circuit performance, by augmenting conventional wired interconnects. As the number of cores per IC grows, intercore communication requirements will also grow, and WINoCs can be used to both save power and reduce latency. In this article, we briefly describe some of the key challenges with WINoC implementation, and also describe our example design, iWISE, which is a scalable wireless interconnect design. We show that the integration of wireless interconnects with wired interconnects in NoCs can reduce overall network power by 34 percent while achieving a speedup of 2.54 on real …
Worse-Than-Rayleigh Fading: Experimental Results And Theoretical Models, David W. Matolak, Jeff Frolik
Worse-Than-Rayleigh Fading: Experimental Results And Theoretical Models, David W. Matolak, Jeff Frolik
Faculty Publications
This article is motivated by the recent recognition that channel fading for new wireless applications is not always well described by traditional models used for mobile communication systems. In particular, fading data collected for vehicleto- vehicle and wireless sensor network applications has motivated new models for conditions in which channel fading statistics can be worse than Rayleigh. We review the use of statistical channel models, describe our example applications, and provide both measured and modeling results for these severe fading conditions.
5 Ghz Band Vehicle-To-Vehicle Channels: Models For Multiple Values Of Channel Bandwidth, Qiong Wu, David W. Matolak, Indranil Sen
5 Ghz Band Vehicle-To-Vehicle Channels: Models For Multiple Values Of Channel Bandwidth, Qiong Wu, David W. Matolak, Indranil Sen
Faculty Publications
In Sen and Matolak's earlier paper, 5-GHz-band vehicle-to-vehicle (V2V) channel models were presented for channel bandwidths of 5 and 10 MHz. In this paper, we provide additional tapped delay line models for bandwidths of 1, 20, 33.33, and 50 MHz based upon the data used in Sen and Matolak's paper. We provide tables of channel parameters for five types of V2V channel classes and also include example tap correlation coefficients. Root-mean-square delay spread values are summarized, as are values of bandwidth for which the channel frequency correlation takes values of 0.7 and 0.5. As with the results from Sen and …
Reverberation-Chamber Test Environment For Outdoor Urban Wireless Propagation Studies, Helge Fielitz, Kate A. Remley, Christopher L. Holloway, Qian Zhang, Qiong Wu, David W. Matolak
Reverberation-Chamber Test Environment For Outdoor Urban Wireless Propagation Studies, Helge Fielitz, Kate A. Remley, Christopher L. Holloway, Qian Zhang, Qiong Wu, David W. Matolak
Faculty Publications
We introduce a test environment to replicate the well-known clustering of reflections in power delay profiles arising from late-time delays and reflections. Urban wireless propagation environments are known to exhibit such clustering. The test setup combines discrete reflections generated by a fading simulator with the continuous distribution of reflections created in a reverberation chamber. We describe measurements made in an urban environment in Denver, CO, that illustrate these multiple distributions of reflections. Our comparison of measurements made in the urban environment to those made in the new test environment shows good agreement.
3d Outside Cell Interference Factor For An Air-Ground Cdma ‘Cellular’ System, David W. Matolak
3d Outside Cell Interference Factor For An Air-Ground Cdma ‘Cellular’ System, David W. Matolak
Faculty Publications
We compute the outside-cell interference factor of a code-division multiple-access (CDMA) system for a three-dimensional (3-D) air-to-ground (AG) "cellular-like" network consisting of a set of uniformly distributed ground base stations and airborne mobile users. The CDMA capacity is roughly inversely proportional to the outside-cell interference factor. It is shown that for the nearly free-space propagation environment of these systems, the outside-cell interference factor can be larger than that for terrestrial propagation models (as expected) and depends approximately logarithmically upon both the cell height and cell radius.
Detection For A Statistically-Known, Time-Varying Dispersive Channel, David W. Matolak, S. G. Wilson
Detection For A Statistically-Known, Time-Varying Dispersive Channel, David W. Matolak, S. G. Wilson
Faculty Publications
Detection for the statistically known channel (SKC) is aimed at obtaining good performance in situations where our statistical knowledge of a time-varying channel is good, and where other equalization/detection schemes are either too complex to implement, or their performance is limited due to the rapidity of channel fading, or where we are simply unable to perform channel estimation. By using a statistical characterization of the channel, we develop a new detector that performs maximum-likelihood sequence estimation (MLSE) (given the channel model) on blocks of N symbols. Both symbol-spaced and fractionally spaced samples are used, to obtain two different detectors, that …