Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

Series

2011

Institution
Keyword
Publication

Articles 1 - 30 of 30

Full-Text Articles in Computer Engineering

Building Effective Ontology For Semantic Web: A Discussion Based On Practical Examples, Tianmu Zhang Dec 2011

Building Effective Ontology For Semantic Web: A Discussion Based On Practical Examples, Tianmu Zhang

School of Information Sciences -- Faculty Publications and Other Works

The study aims to investigate semantic web and create useful ontology as a teaching and educational tool for others interested in learning more about Semantic web. This paper discussed several emerging issues about the semantic web and ontology building. This paper combines ontology implementation examples with research topics to identify current issues and potential solution in both application and theoretical level. It concludes that although semantic web and ontology technology are not mature enough currently, there is a clear tendency for them to be integrated into various applications to exert synergies.


A Novel Telecommunications-Based Approach To Mathematical Modeling Of Hiv Infection, Aaron T. Sharp Dec 2011

A Novel Telecommunications-Based Approach To Mathematical Modeling Of Hiv Infection, Aaron T. Sharp

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

It is well known that biological systems utilize communication in some form, one prolific example of this is the propagation of HIV (Human Immunodeficiency Virus) in the human body. By modeling HIV infection as a communication system, we hope to gain a unique insight into HIV and biological communication systems in general. Such a model would provide researchers a platform for experimenting and simulating various biological communication systems. We have previously developed a layered communication protocol for interpreting biological communication systems using telecommunications paradigms and will apply said model to HIV proliferation. We will also demonstrate the effectiveness of the …


Wireless Embedded Smart Cameras: Performance Analysis And Their Application To Fall Detection For Eldercare., Alvaro Pinto Jul 2011

Wireless Embedded Smart Cameras: Performance Analysis And Their Application To Fall Detection For Eldercare., Alvaro Pinto

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Wireless Embedded Smart Camera Networks has received a lot of attention from academia and industry because they are small in size and easy to deploy, and they offer a multitude of attractive applications. They can be used for embedded single unit applications, or can be networked for multi-camera applications.

We first analyze three different operation scenarios for a wireless vision sensor network wherein different levels of local processing is performed. A detailed quantitative comparison of three operation scenarios are presented in terms of energy consumption and latency. This quantitative analysis provides the motivation for performing high-level local processing and decision …


Quasi-Orthogonal Space-Time Block Coding Using Polynomial Phase Modulation, Omar Granados, Jean Andrian Apr 2011

Quasi-Orthogonal Space-Time Block Coding Using Polynomial Phase Modulation, Omar Granados, Jean Andrian

Electrical and Computer Engineering Faculty Publications

Recently, polynomial phase modulation (PPM) was shown to be a power- and bandwidth-efficient modulation format. These two characteristics are in high demand nowadays specially in mobile applications, where devices with size, weight, and power (SWaP) constraints are common. In this paper, we propose implementing a full-diversity quasiorthogonal space-time block code (QOSTBC) using polynomial phase signals as modulation format. QOSTBCs along with PPM are used in order to improve the power efficiency of communication systems with four transmit antennas. We obtain the optimal PPM constellations that ensure full diversity and maximize the QOSTBC's minimum coding gain distance. Simulation results show that …


Understanding User Generated Content Characteristics : A Hot-Event Perspective, Miao Wang, Guodong Li, Jie Feng, Lisong Xu, Byrav Ramamurthy, Wei Li, Xiaohong Guan Apr 2011

Understanding User Generated Content Characteristics : A Hot-Event Perspective, Miao Wang, Guodong Li, Jie Feng, Lisong Xu, Byrav Ramamurthy, Wei Li, Xiaohong Guan

CSE Conference and Workshop Papers

Nowadays, millions of Internet users watch and upload a large number of videos on User Generated Content (UGC) sites (e.g., Youtube) everyday. Moreover, online videos about hot events, such as breaking news and Olympic games, attract lots of users. In this paper, we study the characteristics of hot-event videos by collecting video traces of the largest UGC site in China for 28 days. We first empirically study statistical properties of such videos and find that hot-event videos contribute a large number of views, even though the total number of hotevent videos is relatively small. In addition, there exist extremely active …


Using Textual Features To Predict Popular Content On Digg, Paul H. Miller Apr 2011

Using Textual Features To Predict Popular Content On Digg, Paul H. Miller

Department of English: Dissertations, Theses, and Student Research

Over the past few years, collaborative rating sites, such as Netflix, Digg and Stumble, have become increasingly prevalent sites for users to find trending content. I used various data mining techniques to study Digg, a social news site, to examine the influence of content on popularity. What influence does content have on popularity, and what influence does content have on users’ decisions? Overwhelmingly, prior studies have consistently shown that predicting popularity based on content is difficult and maybe even inherently impossible. The same submission can have multiple outcomes and content neither determines popularity, nor individual user decisions. My results show …


Optimized Delay-Sensitive Multimedia Communications Over Wireless Networks, Haiyan Luo Apr 2011

Optimized Delay-Sensitive Multimedia Communications Over Wireless Networks, Haiyan Luo

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

Multimedia communication is expected to be the major application of the next-generation wireless networks. However, providing delay-sensitive, loss-tolerant and resource-guzzling multimedia services over the current resource-limited wireless networks is still a very challenging task. In addition to their heterogeneous nature and resource limitation, wireless networks also suffer from channel variations and environmental changes. In this dissertation, we study the optimization techniques for wireless multimedia communications and address the issues from different theoretical and practical perspectives.

To solve the issues resulting from the increasingly heterogeneous wireless networks, we propose a framework for error resilient source coding and distributed application-layer error control, …


Behavior-Based Mobility Prediction For Seamless Handoffs In Mobile Wireless Networks, Weetit Wanalertlak, Ben Lee, Chansu Yu, Myungchul Kim, Seung-Min Park, Won-Tae Kim Apr 2011

Behavior-Based Mobility Prediction For Seamless Handoffs In Mobile Wireless Networks, Weetit Wanalertlak, Ben Lee, Chansu Yu, Myungchul Kim, Seung-Min Park, Won-Tae Kim

Electrical and Computer Engineering Faculty Publications

The field of wireless networking has received unprecedented attention from the research community during the last decade due to its great potential to create new horizons for communicating beyond the Internet. Wireless LANs (WLANs) based on the IEEE 802.11 standard have become prevalent in public as well as residential areas, and their importance as an enabling technology will continue to grow for future pervasive computing applications. However, as their scale and complexity continue to grow, reducing handoff latency is particularly important. This paper presents the Behavior-based Mobility Prediction scheme to eliminate the scanning overhead incurred in IEEE 802.11 networks. This …


A High-Throughput Routing Metric For Reliable Multicast In Multi-Rate Wireless Mesh Networks, Xin Zhao, Jun Guo, Chun Tung Chou, Archan Misra, Sanjay Jha Apr 2011

A High-Throughput Routing Metric For Reliable Multicast In Multi-Rate Wireless Mesh Networks, Xin Zhao, Jun Guo, Chun Tung Chou, Archan Misra, Sanjay Jha

Research Collection School Of Computing and Information Systems

We propose a routing metric for enabling highthroughput reliable multicast in multi-rate wireless mesh networks. This new multicast routing metric, called expected multicast transmission time (EMTT), captures the combined effects of 1) MAC-layer retransmission-based reliability, 2) transmission rate diversity, 3) wireless broadcast advantage, and 4) link quality awareness. The EMTT of one-hop transmission of a multicast packet minimizes the amount of expected transmission time (including that required for retransmissions). This is achieved by allowing the sender to adapt its bit-rate for each ongoing transmission/retransmission, optimized exclusively for its nexthop receivers that have not yet received the multicast packet. We model …


Worse-Than-Rayleigh Fading: Experimental Results And Theoretical Models, David W. Matolak, Jeff Frolik Apr 2011

Worse-Than-Rayleigh Fading: Experimental Results And Theoretical Models, David W. Matolak, Jeff Frolik

Faculty Publications

This article is motivated by the recent recognition that channel fading for new wireless applications is not always well described by traditional models used for mobile communication systems. In particular, fading data collected for vehicleto- vehicle and wireless sensor network applications has motivated new models for conditions in which channel fading statistics can be worse than Rayleigh. We review the use of statistical channel models, describe our example applications, and provide both measured and modeling results for these severe fading conditions.


A Cooperative Diversity-Based Robust Mac Protocol In Wireless Ad Hoc Networks, Sangman Moh, Chansu Yu Mar 2011

A Cooperative Diversity-Based Robust Mac Protocol In Wireless Ad Hoc Networks, Sangman Moh, Chansu Yu

Electrical and Computer Engineering Faculty Publications

In interference-rich and noisy environment, wireless communication is often hampered by unreliable communication links. Recently, there has been active research on cooperative communication that improves the communication reliability by having a collection of radio terminals transmit signals in a cooperative way. This paper proposes a medium access control (MAC) algorithm, called Cooperative Diversity MAC (CD-MAC), which exploits the cooperative communication capability of the physical (PHY) layer to improve robustness in wireless ad hoc networks. In CD-MAC, each terminal proactively selects a partner for cooperation and lets it transmit simultaneously so that this mitigates interference from nearby terminals, and thus, improves …


Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo Mar 2011

Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo

All Faculty Scholarship

This is the introduction to a symposium issue for a conference designed to bring the engineering community, policymakers, legal academics, and industry participants together in an attempt to provide policymakers with a better understanding of the Internet’s technical aspects and to explore emerging issues of particular importance to current broadband policy.


On Reducing Communication Energy Using Cross-Sensor Coding Technique, Kien Nguyen, Thinh Nguyen, Sen-Ching Cheung Feb 2011

On Reducing Communication Energy Using Cross-Sensor Coding Technique, Kien Nguyen, Thinh Nguyen, Sen-Ching Cheung

Electrical and Computer Engineering Faculty Publications

This paper addresses the uneven communication energy problem in data gathering sensor networks where the nodes closer to the sink tend to consume more energy than those of the farther nodes. Consequently, the lifetime of a network is significantly shortened. We propose a cross-sensor coding technique using On-Off keying which exploits (a) the tradeoff between delay and energy consumption and (b) the network topology in order to alleviate the problem of unequal energy consumption. We formulate our coding problem as an integer linear programming problem and show how to construct a number of codes based on different criteria. We show …


Pgtp: Power Aware Game Transport Protocol For Multi-Player Mobile Games, Bhojan Anand, Jeena Sebastian, Soh Yu Ming, Akhihebbal L. Ananda, Mun Choon Chan, Rajesh Krishna Balan Feb 2011

Pgtp: Power Aware Game Transport Protocol For Multi-Player Mobile Games, Bhojan Anand, Jeena Sebastian, Soh Yu Ming, Akhihebbal L. Ananda, Mun Choon Chan, Rajesh Krishna Balan

Research Collection School Of Computing and Information Systems

Applications on the smartphones are able to capitalize on the increasingly advanced hardware to provide a user experience reasonably impressive. However, the advancement of these applications are hindered battery lifetime of the smartphones. The battery technologies have a relatively low growth rate. Applications like mobile multiplayer games are especially power hungry as they maximize the use of the network, display and CPU resources. The PGTP, presented in this paper is aware of both the transport requirement of these multiplayer mobile games and the limitation posed by battery resource. PGTP dynamically controls the transport based on the criticality of game state …


Simulating A Universal Geocast Scheme For Vehicular Ad Hoc Networks, Benjamin L. Bovee Jan 2011

Simulating A Universal Geocast Scheme For Vehicular Ad Hoc Networks, Benjamin L. Bovee

Masters Theses 1911 - February 2014

Recently a number of communications schemes have been proposed for Vehicular Ad hoc Networks (VANETs). One of these, the Universal Geocast Scheme (UGS) proposed by Hossein Pishro-Nik and Mohammad Nekoui, provides for a diverse variety of VANET-specific characteristics such as time-varying topology, protocol variation based on road congestion, and support for non line-of-sight communication. In this research, the UGS protocol is extended to consider inter-vehicle multi-hop connections in intersections with surrounding obstructions along with single-hop communications in an open road scenario. Since UGS is a probabilistic, repetition-based scheme, it supports the capacity-delay tradeoffs crucial for periodic safety message exchange. The …


Addressing/Exploiting Transceiver Imperfections In Wireless Communication Systems, Lihao Wang Jan 2011

Addressing/Exploiting Transceiver Imperfections In Wireless Communication Systems, Lihao Wang

Masters Theses 1911 - February 2014

This thesis consists of two research projects on wireless communication systems. In the first project, we propose a fast inphase and quadrature (I/Q) imbalance compensation technique for the analog quadrature modulators in direct conversion transmitters. The method needs no training sequence, no extra background data gathering process and no prior perfect knowledge of the envelope detector characteristics. In contrast to previous approaches, it uses points from both the linear and predictable nonlinear regions of the envelope detector to hasten convergence. We provide a least mean square (LMS) version and demonstrate that the quadrature modulator compensator converges.

In the second project, …


Leveraging Multi-Radio Communication For Mobile Wireless Sensor Networks, Jeremy J. Gummeson Jan 2011

Leveraging Multi-Radio Communication For Mobile Wireless Sensor Networks, Jeremy J. Gummeson

Masters Theses 1911 - February 2014

An important challenge in mobile sensor networks is to enable energy-efficient communication over a diversity of distances while being robust to wireless effects caused by node mobility. In this thesis, we argue that the pairing of two complementary radios with heterogeneous range characteristics enables greater range and interference diversity at lower energy cost than a single radio. We make three contributions towards the design of such multi-radio mobile sensor systems. First, we present the design of a novel reinforcement learning-based link layer algorithm that continually learns channel characteristics and dynamically decides when to switch between radios. Second, we describe a …


Hardware Implementation Of Queue Length Based Pacing On Netfpga, Abhishek Dwaraki Jan 2011

Hardware Implementation Of Queue Length Based Pacing On Netfpga, Abhishek Dwaraki

Masters Theses 1911 - February 2014

Optical packet switching networks are the foundation for next generation high speed Internet and are fast becoming the norm rather than an option. When such high speed optical networks are taken into account, one of the key considerations is packet buffering. The importance of packet buffering plays an even bigger role in optical networks because of the physical and technological constraints on the buffer sizes that can be implemented. Existing protocols, in many real world scenarios do not perform well in such networks. To eliminate such scenarios where there is a high possibility of packet loss, we use packet pacing. …


Understanding The Influence Of Blog On The Development Of Social Capital, Reza Vaezi, Gholamreza Torkzadeh, Jerry Cha-Jan Chang Jan 2011

Understanding The Influence Of Blog On The Development Of Social Capital, Reza Vaezi, Gholamreza Torkzadeh, Jerry Cha-Jan Chang

Management, Entrepreneurship and Technology Faculty Publications

The rapid use and application of blogs in diverse areas such as education, marketing, journalism, and human resource management in recent years underlines the need for a better understanding of the impact of this new technology on social capital. Social capital reflects the norm of reciprocity and the level of trust among individuals who connect, interact, and benefit from one another. Blog is expected to influence the extent and the scope of this interaction by providing new means of networking among people. This paper examines the relationship between blog use and social capital and reports on the results of an …


Investigations Into Library Web Scale Discovery Services, Jason Vaughan Jan 2011

Investigations Into Library Web Scale Discovery Services, Jason Vaughan

Library Faculty Publications

Web scale discovery services for libraries provide deep discovery to a library’s local and licensed content, and represent an evolution, perhaps a revolution, for end user information discovery as pertains to library collections. This article frames the topic of Web scale discovery, and begins by illuminating Web scale discovery from an academic library’s perspective – that is, the internal perspective seeking widespread staff participation in the discovery conversation. This included the creation of a Discovery Task Force, a group which educated library staff, conducted internal staff surveys, and gathered observations from early adopters. The article next addresses the substantial research …


On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn Jan 2011

On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn

Conference papers

Cloud computing is expected to grow considerably in the future because it has so many advantages with regard to sale and cost, change management, next generation architectures, choice and agility. However, one of the principal concerns for users of the Cloud is lack of control and above all, data security. This paper considers an approach to encrypting information before it is ‘placed’ on the Cloud where each user has access to their own encryption algorithm, an algorithm that is based on a set of iterated function systems that outputs a chaotic number stream, designed to produce a cryptographically secure cipher. …


Application Of Stochastic Diffusion For Hiding High Fidelity Encrypted Images, Jonathan Blackledge, Abdulrahman Al-Rawi Jan 2011

Application Of Stochastic Diffusion For Hiding High Fidelity Encrypted Images, Jonathan Blackledge, Abdulrahman Al-Rawi

Articles

Cryptography coupled with information hiding has received increased attention in recent years and has become a major research theme because of the importance of protecting encrypted information in any Electronic Data Interchange system in a way that is both discrete and covert. One of the essential limitations in any cryptography system is that the encrypted data provides an indication on its importance which arouses suspicion and makes it vulnerable to attack. Information hiding of Steganography provides a potential solution to this issue by making the data imperceptible, the security of the hidden information being a threat only if its existence …


Vehicular Ad Hoc Networks, Syed R. Rizvi, Stephan Olariu, Christina M. Oinotti, Shaharuddin Salleh, Mona E. Rizvi, Zainab Zaidi Jan 2011

Vehicular Ad Hoc Networks, Syed R. Rizvi, Stephan Olariu, Christina M. Oinotti, Shaharuddin Salleh, Mona E. Rizvi, Zainab Zaidi

Computer Science Faculty Publications

(First paragraph) Vehicular ad hoc networks (VANETs) have recently been proposed as one of the promising ad hoc networking techniques that can provide both drivers and passengers with a safe and enjoyable driving experience. VANETs can be used for many applications with vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications. In the United States, motor vehicle traffic crashes are the leading cause of death for all motorists between two and thirty-four years of age. In 2009, the National Highway Traffic Safety Administration (NHTSA) reported that 33,808 people were killed in motor vehicle traffic crashes. The US Department of Transportation (US-DOT) estimates that …


The Best Available Technology Standard, Lital Helman, Gideon Parchomovsky Jan 2011

The Best Available Technology Standard, Lital Helman, Gideon Parchomovsky

All Faculty Scholarship

Copyright liability for web-hosting will be a key determinant of the evolution of the Internet in years to come. Depending on their design, the legal rules that shape the liability of web-hosts can stunt the development of the Internet as a medium of expression or enhance it. Hence, adopting the optimal liability regime is a matter of crucial importance. This Article proposes a radical change in web-hosts’ copyright liability for illegal content posted by users. Our main thesis is that web-hosts’ liability should be guided by the “Best Available Technology” principle, according to which web-hosts that employ the best filtering …


Evidence Supporting Measure Of Similarity For Reducing The Complexity In Information Fusion, Florentin Smarandache, Jean Dezert, Xinde Li, Xinhan Huang Jan 2011

Evidence Supporting Measure Of Similarity For Reducing The Complexity In Information Fusion, Florentin Smarandache, Jean Dezert, Xinde Li, Xinhan Huang

Branch Mathematics and Statistics Faculty and Staff Publications

This paper presents a new method for reducing the number of sources of evidence to combine in order to reduce the complexity of the fusion processing. Such a complexity reduction is often required in many applications where the real-time constraint and limited computing resources are of prime importance. The basic idea consists in selecting, among all sources available, only a subset of sources of evidence to combine. The selection is based on an evidence supporting measure of similarity (ESMS) criterion which is an efficient generic tool for outlier sources identification and rejection. The ESMS between two sources of evidence can …


Evidence Supporting Measure Of Similarity For Reducing The Complexity In Information Fusion, Xinde Li, Jean Dezert, Florentin Smarandache, Xinhan Huang Jan 2011

Evidence Supporting Measure Of Similarity For Reducing The Complexity In Information Fusion, Xinde Li, Jean Dezert, Florentin Smarandache, Xinhan Huang

Branch Mathematics and Statistics Faculty and Staff Publications

This paper proposes a new solution for reducing the number of sources of evidence to be combined in order to diminish the complexity of the fusion process required in some applications where the real-time constraint and strong computing resource limitation are of prime importance. The basic idea consists in selecting, among the whole set of sources of evidence, only the biggest subset of sources which are not too contradicting based on a criterion of Evidence Supporting Measure of Similarity (ESMS) in order to process solely the coherent information received. The ESMS criterion serves actually as a generic tool for outlier …


Special Issue On Information Dissemination And New Services In P2p Systems, Min Song, Sachin Shetty, Wenbin Jiang, E. K. Park Jan 2011

Special Issue On Information Dissemination And New Services In P2p Systems, Min Song, Sachin Shetty, Wenbin Jiang, E. K. Park

Electrical & Computer Engineering Faculty Publications

Information dissemination is an important P2P application that has received considerable research attention in recent years. P2P information dissemination systems range from simple file sharing applications to more complex systems that allows users to securely and efficiently publish, organize, index, search, update and retrieve data in a distributed storage medium. For complex P2P information dissemination systems, there is a need for features which include security, anonymity, fairness, scalability, resource management, and organization capabilities. For effective information dissemination, following features of P2P systems and infrastructure need to be updated: distributed object location and routing mechanisms, novel approaches to content replication, caching …


Design And Implement A Cost-Effective Wireless Communication Project On A Pic Training System, Steve Hsiung, Walter F. Deal, Lacides Agustin Osorio, Mathew Henderson Jan 2011

Design And Implement A Cost-Effective Wireless Communication Project On A Pic Training System, Steve Hsiung, Walter F. Deal, Lacides Agustin Osorio, Mathew Henderson

Engineering Technology Faculty Publications

Wireless communication becomes popular and widely used in almost every electronic product in our daily life. The RF communication is one of the major wireless applications in consumer products. Usually, it is integrated with an embedded system (microcontroller) to control various applications such as temperature sensing, data logging, data exchange, actuator activation, and user interaction wirelessly. A project based model can be used as an effective instructional strategy to enhance learning about complex RF concepts and technologies. The project method can lead to improved understanding and create interest by actively engaging the student with hands-on and problem solving and critical …


Development Of Visualization Facility At The Gis And Remote Sensing Core Lab, University Of Nevada, Las Vegas, Haroon Stephen, William J. Smith, Zhongwei Liu Jan 2011

Development Of Visualization Facility At The Gis And Remote Sensing Core Lab, University Of Nevada, Las Vegas, Haroon Stephen, William J. Smith, Zhongwei Liu

Public Policy and Leadership Faculty Presentations

Visualization using advanced computational and graphic equipment has become a standard way of present day research. Availability of low cost and fast processing units, high resolution displays with graphic processing units, and specialized software has brought complex visualization capabilities to an office desktop. Nevertheless, when dealing with large datasets such as, global climate, geospatial, and social data the office desktop falls short and calls for a centralized visualization facility with high end computing and graphics equipment.

Visualization Facility at GIS and Remote Sensing Core Lab would be a useful and important addition to the UNLV IT infrastructure. It would provide …


Promoting The Buildout Of New Networks Vs. Compelling Access To The Monopoly Loop: A Clash Of Regulatory Paradigms, Christopher S. Yoo Jan 2011

Promoting The Buildout Of New Networks Vs. Compelling Access To The Monopoly Loop: A Clash Of Regulatory Paradigms, Christopher S. Yoo

All Faculty Scholarship

No abstract provided.