Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

Series

2008

Institution
Keyword
Publication

Articles 1 - 24 of 24

Full-Text Articles in Computer Engineering

A Three-Dimensional Pattern-Space Representation For Volumetric Arrays, William C. Barott, Paul G. Steffes Dec 2008

A Three-Dimensional Pattern-Space Representation For Volumetric Arrays, William C. Barott, Paul G. Steffes

Publications

A three-dimensional pattern-space representation is presented for volumetric arrays. In this representation, the radiation pattern of an array is formed by the evaluation of the three-dimensional pattern-space on a spherical surface. The scan angle of the array determines the position of this surface within the pattern-space. This pattern-space representation is used in conjunction with a genetic algorithm to minimize the sidelobe levels exhibited by a thinned volumetric array during scanning.


Optimisation Of Multicast Routing In Wireless Mesh Networks, Brian Keegan, Karol Kowalik, Mark Davis Oct 2008

Optimisation Of Multicast Routing In Wireless Mesh Networks, Brian Keegan, Karol Kowalik, Mark Davis

Conference papers

In recent years Wireless Mesh Networks have been deployed and grown in popularity in many metropolitan areas. The deployment of such networks has allowed clients to gain access to publicly available broadband networks. The implementation of wireless mesh networks requires that backhaul services (traditionally carried by wired networks) be maintained via wireless mesh points. Because of their structure, wireless mesh networks provide an excellent means for targeting a large group of end users or simply to relay data. This may be achieved by means of broadcasting or more specifically multicasting. The lack of standards and support for multicasting over wireless …


The Interactive Research Guide: Will Function Bring Users Content? A Project Model Illustrated By A Proposed Paper-Writing Guide, Barry J. Bailey Sep 2008

The Interactive Research Guide: Will Function Bring Users Content? A Project Model Illustrated By A Proposed Paper-Writing Guide, Barry J. Bailey

Library Papers and Presentations

After reviewing the history of subject guides and their movement into an electronic format, their is an opportunity to change the format of information providing. Whereas a user goes to guides for lists of content, perhaps a user can go to guides to execute a function. By walking through the creation of a paper-writing guide, this idea of a functioning guide is illustrated.


Network Neutrality, Consumers, And Innovation, Christopher S. Yoo Aug 2008

Network Neutrality, Consumers, And Innovation, Christopher S. Yoo

All Faculty Scholarship

In this Article, Professor Christopher Yoo directly engages claims that mandating network neutrality is essential to protect consumers and to promote innovation on the Internet. It begins by analyzing the forces that are placing pressure on the basic network architecture to evolve, such as the emergence of Internet video and peer-to-peer architectures and the increasing heterogeneity in business relationships and transmission technologies. It then draws on the insights of demand-side price discrimination (such as Ramsey pricing) and the two-sided markets, as well as the economics of product differentiation and congestion, to show how deviating from network neutrality can benefit consumers, …


Building A Blog From Scratch, Jonathan Bacon Aug 2008

Building A Blog From Scratch, Jonathan Bacon

SIDLIT Conference Proceedings

The presenter takes the audience step-by-step through the creation of a Weblog, a tool which can be used for distance education.


E-Transcript Web Services System Supporting Dynamic Conversion Between Xml And Edi, Myungjae Kwak '11, Woohyun Kang '14, Gondy Leroy, Samir Chatterjee Aug 2008

E-Transcript Web Services System Supporting Dynamic Conversion Between Xml And Edi, Myungjae Kwak '11, Woohyun Kang '14, Gondy Leroy, Samir Chatterjee

CGU Faculty Publications and Research

As XML becomes a standard for communications between distributed heterogeneous machines, many schools plan to implement Web Services systems using the XML e-transcript (electronic transcript) standard. We propose a framework that supports both XML e-transcript Web Services and existing EDI e-transcript systems. The framework uses the workflow engine to exploit the benefits of workflow management mechanisms. The workflow engine manages the e-transcript business process by enacting and completing the tasks and sub-processes within the main business process. We implemented the proposed framework by using various open source projects including Java, Eclipse, and Apache Software Foundation’s Web Services projects. Compared with …


Searching Blogs And News: A Study On Popular Queries, Aixin Sun, Meishan Hu, Ee Peng Lim Jul 2008

Searching Blogs And News: A Study On Popular Queries, Aixin Sun, Meishan Hu, Ee Peng Lim

Research Collection School Of Computing and Information Systems

Blog/news search engines are very important channels to reach information about the real-time happenings. In this paper, we study the popular queries collected over one year period and compare their search results returned by a blog search engine (i.e., Technorati) and a news search engine (i.e., Google News). We observed that the numbers of hits returned by the two search engines for the same set of queries were highly correlated, suggesting that blogs often provide commentary to current events reported in news. As many popular queries are related to some events, we further observed a high cohesiveness among the returned …


Rethinking Broadband Internet Access, Daniel F. Spulber, Christopher S. Yoo Jun 2008

Rethinking Broadband Internet Access, Daniel F. Spulber, Christopher S. Yoo

All Faculty Scholarship

The emergence of broadband Internet technologies, such as cable modem and digital subscriber line (DSL) systems, has reopened debates over how the Internet should be regulated. Advocates of network neutrality and open access to cable modem systems have proposed extending the regulatory regime developed to govern conventional telephone and narrowband Internet service to broadband. A critical analysis of the rationales traditionally invoked to justify the regulation of telecommunications networks--such as natural monopoly, network economic effects, vertical exclusion, and the dangers of ruinous competition--reveals that those rationales depend on empirical and theoretical preconditions that do not apply to broadband. In addition, …


Resource Sharing Via Planed Relay For Hwn, Chong Shen, Susan Rea, Dirk Pesch Apr 2008

Resource Sharing Via Planed Relay For Hwn, Chong Shen, Susan Rea, Dirk Pesch

NIMBUS Articles

We present an improved version of adaptive distributed cross-layer routing algorithm (ADCR) for hybrid wireless network with dedicated relay stations () in this paper. A mobile terminal (MT) may borrow radio resources that are available thousands mile away via secure multihop RNs, where RNs are placed at pre-engineered locations in the network. In rural places such as mountain areas, an MT may also communicate with the core network, when intermediate MTs act as relay node with mobility. To address cross-layer network layers routing issues, the cascaded ADCR establishes routing paths across MTs, RNs, and cellular base stations (BSs) and provides …


Antennas For Portable Communications In The Uwb And Gps Spectra., Giuseppe Ruvio Jan 2008

Antennas For Portable Communications In The Uwb And Gps Spectra., Giuseppe Ruvio

Doctoral

The thesis describes a study of antennas for solutions in emerging systems. An account of the fundamental principles of these antennas is given together with an outline of the basic electromagnetic theory on which the designs are based. While the main focus is on antennas for Ultra Wideband (UWB) systems, some additional work was carried out on enhancing performance of circularly polarised antennas for satellite navigation systems. The study focussed on the design of highly efficient broadband antennas with particular requirements for size compactness, gain stability, phase-linearity, and the use of low-cost materials. These requirements are particularly important for UWB …


Technology-Aided Participative Methods In Environmental Assessment: An International Perspective, Ainhoa Gonzalez, Alan Gilmer, Ronan Foley, John Sweeney, John Fry Jan 2008

Technology-Aided Participative Methods In Environmental Assessment: An International Perspective, Ainhoa Gonzalez, Alan Gilmer, Ronan Foley, John Sweeney, John Fry

Articles

Provisions for citizen involvement in the assessment of potential environmental effects of certain plans, programmes and projects are present in current legislation. An international survey revealed that public participation is common practice in European and some other countries worldwide. However, a number of issues are observed to affect public involvement in EIA/SEA processes and expert opinion differs when evaluating the effectiveness of existing participative methods. Results suggest that technology-aided methods can improve traditional participation processes. In particular, GIS has the potential to increase community knowledge and enhance involvement by communicating information more effectively. Variable accessibility to technology and data quality …


The Videoconferencing Classroom: What Do Students Think?, Dr. Anthony Mark Doggett Jan 2008

The Videoconferencing Classroom: What Do Students Think?, Dr. Anthony Mark Doggett

Architectural and Manufacturing Sciences Faculty Publications

The advantages of video conferencing in educational institutions are well documented. Scholarly literature has indicated that videoconferencing technology reduces time and costs between remote locations, fill gaps in teaching services, increases training productivity, enables meetings that would not be possible due to prohibitive travel costs, and improves access to learning (Martin, 2005; Rose, Furner, Hall, Montgomery, Katsavras, & Clarke, 2000; Townes-Young & Ewing, 2005; West, 1999). However, there are few studies that analyze the effectiveness of videoconferencing from the student’s perspective. Videoconferencing technology is often touted as a method to connect with previously inaccessible student populations, but does it adequately …


Economic Sustainability Of Remote Access Networking Classrooms, C Nuangjamnong, S P. Maj, D Veal Jan 2008

Economic Sustainability Of Remote Access Networking Classrooms, C Nuangjamnong, S P. Maj, D Veal

EDU-COM International Conference

Within the higher education domain, there is a prevalent belief that e-learning, virtual classroom and tele-education are essential requirements for the long-term effectiveness and success of educational institutions. Many information technologies have been adopted to assist studying and learning remotely and are hence potentially beneficial to students, teachers and educational providers. For educational providers, the benefits are that there are no physical or geographical limits to the number of students that can be enrolled in a course of study. However, within the field of network technology, students must actually use network devices during their studies. This is important not only …


Creating Preservation-Ready Web Resources, Joan A. Smith, Michael L. Nelson Jan 2008

Creating Preservation-Ready Web Resources, Joan A. Smith, Michael L. Nelson

Computer Science Faculty Publications

There are innumerable departmental, community, and personal web sites worthy of long-term preservation but proportionally fewer archivists available to properly prepare and process such sites. We propose a simple model for such everyday web sites which takes advantage of the web server itself to help prepare the site's resources for preservation. This is accomplished by having metadata utilities analyze the resource at the time of dissemination. The web server responds to the archiving repository crawler by sending both the resource and the just-in-time generated metadata as a straight-forward XML-formatted response. We call this complex object (resource + metadata) a CRATE. …


Self-Restraint Admission Control For Ad-Hoc Wlans, Hushairi Zen, Daryoush Habibi, Iftekhar Ahmad Jan 2008

Self-Restraint Admission Control For Ad-Hoc Wlans, Hushairi Zen, Daryoush Habibi, Iftekhar Ahmad

Research outputs pre 2011

Admission control is an important mechanism for sustaining throughput and supporting quality of service (QoS) for real-time traffic in a wireless local area network (WLAN). In an adhoc WLAN scenario where no access point (AP) is available, admission control has to be self-managed by each node. We propose a self-restraining admission control mechanism that works by monitoring the congestion level of the network in the adhoc WLAN. Wireless nodes can listen to all nodes within their range and be aware of the collision rates. A node wishing to join the network measures the current collision rate, and predicts the post-admission …


Source Localisation In Wireless Sensor Networks Based On Optimised Maximum Likelihood, Mohammed Rahman, Daryoush Habibi, Iftekhar Ahmad Jan 2008

Source Localisation In Wireless Sensor Networks Based On Optimised Maximum Likelihood, Mohammed Rahman, Daryoush Habibi, Iftekhar Ahmad

Research outputs pre 2011

Maximum likelihood (ML) is a popular and effective estimator for a wide range of diverse applications and currently affords the most accurate estimation for source localisation in wireless sensor networks (WSN). ML however has two major shortcomings namely, that it is a biased estimator and is also highly sensitive to parameter perturbations. An Optimisation to ML (OML) algorithm was introduced that minimises the sum-of-squares bias and exhibits superior performance to ML in statistical estimation, particularly with finite datasets. This paper proposes a new model for acoustic source localisation in WSN, based upon the OML estimation process. In addition to the …


Analysis Of Information Remaining On Hand Held Devices For Sale On The Second Hand Market, Andrew Jones, Craig Valli, Iain Sutherland Jan 2008

Analysis Of Information Remaining On Hand Held Devices For Sale On The Second Hand Market, Andrew Jones, Craig Valli, Iain Sutherland

Research outputs pre 2011

The ownership and use of mobile phones, Personal Digital Assistants and other hand held devices is now ubiquitous both for home and business use. The majority of these devices have a high initial cost, a relatively short period before they become obsolescent and a relatively low second hand value. As a result of this, when the devices are replaced, there are indications that they tend to be discarded. As technology has continued to develop, it has led to an increasing diversity in the number and type of devices that are available, and the processing power and the storage capacity of …


Converging Voice, Video And Data In Wlan With Qos Support, Hushairi Zen, Daryoush Habibi, Justin Wyatt, Iftekhar Ahmad Jan 2008

Converging Voice, Video And Data In Wlan With Qos Support, Hushairi Zen, Daryoush Habibi, Justin Wyatt, Iftekhar Ahmad

Research outputs pre 2011

Providing quality of service (QoS) for converging traffic in wireless local area network (WLAN) is still a major issue for the researchers and industries. Due to the limited bandwidth and exposure to unpredictable interferences in a wireless environment, efficient management and optimization of the access protocols are essential to provide acceptable QoS for real-time traffic and fairness to best-effort traffic. In this paper, we investigate the throughput and delay performance of the legacy IEEE 802.11 and the 802.11e when carrying converging data in WLAN. We evaluate our recently proposed protocol known as wireless token network protocol (WTN) and show that …


An Improved Fec Scheme For Mobile Wireless Communication At Vehicular Speeds, Iftekhar Ahmad, Daryoush Habibi, Ziaur Rahman Jan 2008

An Improved Fec Scheme For Mobile Wireless Communication At Vehicular Speeds, Iftekhar Ahmad, Daryoush Habibi, Ziaur Rahman

Research outputs pre 2011

WiMAX has emerged as a promising wireless communication technology with potential to deliver high throughput and guaranteed quality of service to the end applications. Recent studies suggest that while WiMAX (802.16e) is capable of delivering a data rate of up to 75 Mbps for fixed wireless communications, data rate decreases drastically for mobile wireless communications, often providing a data rate less than 1 Mb/s when the mobile nodes travel at vehicular speeds. High bit error rate caused at high vehicular speeds is the key reason for low throughput. In noisy mobile communication environments, standard error control mechanisms like the transmission …


Efficient Corona Training Protocols For Sensor Networks, Alan A. Bertossi, Stephan Olariu, Cristina M. Pinotti Jan 2008

Efficient Corona Training Protocols For Sensor Networks, Alan A. Bertossi, Stephan Olariu, Cristina M. Pinotti

Computer Science Faculty Publications

Phenomenal advances in nano-technology and packaging have made it possible to develop miniaturized low-power devices that integrate sensing, special-purpose computing, and wireless communications capabilities. It is expected that these small devices, referred to as sensors, will be mass-produced and deployed, making their production cost negligible. Due to their small form factor and modest non-renewable energy budget, individual sensors are not expected to be GPS-enabled. Moreover, in most applications, exact geographic location is not necessary, and all that the individual sensors need is a coarse-grain location awareness. The task of acquiring such a coarse-grain location awareness is referred to as training. …


Performance Evaluation Of Ieee 802.15.4 For Mobile Sensor Network, Kartinah Zen, Daryoush Habibi, Alexander Rassau, Iftekhar Ahmad Jan 2008

Performance Evaluation Of Ieee 802.15.4 For Mobile Sensor Network, Kartinah Zen, Daryoush Habibi, Alexander Rassau, Iftekhar Ahmad

Research outputs pre 2011

The IEEE 802.15.4 standard medium access control (MAC) protocol for low rate wireless personal area networks (LRWPAN) is design mainly for static sensor networks and its capability to support mobile sensor networks has not yet been established. To the best knowledge of authors, this is the first paper that evaluates the suitability of IEEE 802.15.4 MAC in mobile sensor networks environment. We evaluate the performance based on node's speed and beacon order, and observe the effect on energy usage, packet delivery ratio and time required to associate with its coordinator. From the experiment we observe that the moving nodes experienced …


Improving Mobile Sensor Connectivity Time In The Ieee 802.15.4 Networks, Kartinah Zen, Daryoush Habibi, Iftekhar Ahmad Jan 2008

Improving Mobile Sensor Connectivity Time In The Ieee 802.15.4 Networks, Kartinah Zen, Daryoush Habibi, Iftekhar Ahmad

Research outputs pre 2011

In the IEEE 802.15.4 medium access control (MAC) protocol for wireless sensor networks, a sensor node needs to associate with a coordinator before it starts sending or receiving data. The sensor node will mostly choose the nearest coordinator to associate with. However, this method is not suitable for a constantly moving sensor node because it will end up switching coordinators too often due to short connectivity time. The IEEE 802.15.4 has a simplistic and inadequate method of choosing a coordinator in this context. In this paper, we introduce a method to increase the mobile sensor node connectivity time with its …


New Classes Of Codes For Cryptologists And Computer Scientists, Florentin Smarandache, W.B. Vasantha Kandasamy Jan 2008

New Classes Of Codes For Cryptologists And Computer Scientists, Florentin Smarandache, W.B. Vasantha Kandasamy

Branch Mathematics and Statistics Faculty and Staff Publications

Historically a code refers to a cryptosystem that deals with linguistic units: words, phrases etc. We do not discuss such codes in this book. Here codes are message carriers or information storages or information transmitters which in time of need should not be decoded or read by an enemy or an intruder. When we use very abstract mathematics in using a specific code, it is difficult for non-mathematicians to make use of it. At the same time, one cannot compromise with the capacity of the codes. So the authors in this book have introduced several classes of codes which are …


Network Formation Using Ant Colony Optimization -- A Systematic Review, Steven C. Oimoen, Gilbert L. Peterson, Kenneth M. Hopkinson Jan 2008

Network Formation Using Ant Colony Optimization -- A Systematic Review, Steven C. Oimoen, Gilbert L. Peterson, Kenneth M. Hopkinson

Faculty Publications

A significant area of research in the field of hybrid communications is the Network Design Problem (NDP) [1]. The NDP is an NP complete problem [1] that focuses on identifying the optimal network topology for transmitting commodities between nodes, under constraints such as bandwidth, limited compatible directed channels, and link and commodity costs. The NDP focuses on designing a flexible network while trying to achieve optimal flow or routing. If a link (or arc) is used, then an associated fixed cost of the edge is incurred. In addition, there is a cost for using the arc depending on the flow. …