Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

2003

Institution
Keyword
Publication
Publication Type

Articles 1 - 18 of 18

Full-Text Articles in Computer Engineering

Combined Beamforming And Space-Time Block Coding With A Sparse Array Antenna, Robert H. Morelos-Zaragoza, Mohammad Ghavami Oct 2003

Combined Beamforming And Space-Time Block Coding With A Sparse Array Antenna, Robert H. Morelos-Zaragoza, Mohammad Ghavami

Robert Henry Morelos-Zaragoza

In this paper, we continue our investigation of joint beamforming and transmit diversity with space-time block coding. In particular, the performance of a four-element array antenna is considered, in the context of an indoor wireless communication system. The main contribution is to show that transmit diversity may be practically achieved, even with correlated beams produced by a sparse array antenna.


Combined Beamforming And Space-Time Block Coding With Sparse Array Antennas, Robert H. Morelos-Zaragoza Oct 2003

Combined Beamforming And Space-Time Block Coding With Sparse Array Antennas, Robert H. Morelos-Zaragoza

Robert Henry Morelos-Zaragoza

In this paper, the combination of beamforming and space-time block coding is investigated. An adaptive scheme for the assignment of transmission beams is proposed. Data for the determination of beams are obtained using a triangular switch-beam array antenna at the transmitter. The number of peak points is determined from the data and a prescribed threshold level. Orthogonal space-time block coding is then applied to the transmission beams. We examine the distribution of the number of assigned beams as a function of indoor wireless channel parameters. Also, the effects of a small number of array elements and associated correlated beams, and …


A Communications Modeling System For Swarm-Based Sensors, Brian A. Kadrovach Sep 2003

A Communications Modeling System For Swarm-Based Sensors, Brian A. Kadrovach

Theses and Dissertations

Today's information age has exploded the amount of data available to decision makers at all levels of the control hierarchy. The miniaturization and proliferation of sensor technology has enabled extensive detection and monitoring and advances in computational capabilities have provided for embedded data analysis and the generation of information from raw data. Additionally, with the miniaturization of mechanical systems it is possible to provide platforms for sensor suites that are capable of mobility and limited autonomy. Swarming or bio-emergent behavior problems, provides a robust scalable mechanism for organizing large numbers of mobile sensor platforms. However, the mobility dynamics of swarm …


Low Interference Routing For Wireless Ad-Hoc Networks, Mohit Gupta Aug 2003

Low Interference Routing For Wireless Ad-Hoc Networks, Mohit Gupta

Theses

In this thesis the primary focus is on the problem of interference between messages. The thesis discusses why the messages are blocked in a system? How adding a message impacts the cost of all other available links, which can be established in the system.

This thesis analyzes how the availability of channels, increase in number of nodes and increase in the transmission range help in increasing the number of messages that can be handled in the network. It is also analyzes how critical is the selection of the maximum transmission range MTR, transmission range TR and required transmission range RTR. …


Hop-Limited Routing For Multihop Cellular Networks, Cem Dincer May 2003

Hop-Limited Routing For Multihop Cellular Networks, Cem Dincer

Theses

In recent years, conventional cellular systems have experienced evolution in fields of data oriented services. During this period, the requirement for high data-rate stimulated new research proposals, which resulted in a new architecture: Multihop Cellular Networks (MCN), where multihop structure enables mobile stations to forward packets from other mobile stations to the base station on the uplink, and in turn, forward packets to other mobile stations from the base station on the downlink. In this thesis, a new routing algorithm is introduced for MCNs in order to limit the number of hops between the base station and the mobile stations …


Intrusion Detection System For Ad Hoc Mobile Networks Using Neighborhood Watch Theory, Ramani Rajagopalan May 2003

Intrusion Detection System For Ad Hoc Mobile Networks Using Neighborhood Watch Theory, Ramani Rajagopalan

Theses

This study describes several experiments to simulate and study temperature sensor networks. The ultimate goal of this study is to accurately predict a temperature sensor failure in a sensor network, using Network Neighborhood Watch theory. Simulated temperature measurements are used to compare the results of accuracy, and quickness in detecting a failure in a malfunctioning sensor node. This is done by changing the intervals between temperature sampling, by considering different rates of temperature raise, as well as varying the number of nodes in the network neighborhood (deployment density). The thesis studies the threshold for temperature sensor failure by computing a …


Reduction Of False Positives In Fault Detection System Using A Low Pass Data Filter, Ranjit Salunkhe May 2003

Reduction Of False Positives In Fault Detection System Using A Low Pass Data Filter, Ranjit Salunkhe

Theses

Network traffic is bursty in nature and exhibits the property of self-similarity, the degree of which is measured by the Hurst parameter. Now, in any network there is always the possibility of the occurrence of fault traffic that can be caused due to faults or malfunction of a network component. Fault Detection Systems that check for traffic anomalies can trigger off an alert on the detection of any traffic behavior that deviates from normal. Such deviation is usually caused when a fault occurs. But in network traffic sudden bursts may occur due to the inherent behavior of a network application. …


Wlan Csma/Ca Performance In A Bluetooth Interference Environment, Randall B. Noel Mar 2003

Wlan Csma/Ca Performance In A Bluetooth Interference Environment, Randall B. Noel

Theses and Dissertations

IEEE 802.11 WLANs and Bluetooth piconets both operate in the 2.4 GHz Industrial Scientific and Medical (ISM) radio band. When operating in close proximity, these two technologies interfere with each other. Current literature suggests that IEEE 802.11 (employing direct sequence spread spectrum technology) is more susceptible to this interference than Bluetooth, which uses frequency hopping spread spectrum technology, resulting in reduced throughput. Current research tends to focus on the issue of packet collisions, and not the fact that IEEE 802.11 may also delay its transmissions while the radio channel is occupied by a Bluetooth signal. This research characterizes previously neglected …


Characterizing Data Streams Over Ieee 802.11b Ad-Hoc Wireless Networks, John T. Wagnon Mar 2003

Characterizing Data Streams Over Ieee 802.11b Ad-Hoc Wireless Networks, John T. Wagnon

Theses and Dissertations

Soon, advancements in data encryption technology will make real-time decryption of the contents of network packets virtually impossible. This research anticipates this development and extracts useful information based on packet level characteristics. Distinguishing characteristics from e-mail, HTTP, print, and FTP applications are identified and analyzed. The analysis of collected data from an ad-hoc wireless network reveals that distinguishing characteristics of network traffic do indeed exist. These characteristics include packet size, packet frequency, inter-packet correlation, and channel utilization. Without knowing the contents of packets or the direction of the traffic flow, the applications accessing the wireless network can be determined.


The Rise And Demise Of The Technology-Specific Approach To The First Amendment, Christopher S. Yoo Jan 2003

The Rise And Demise Of The Technology-Specific Approach To The First Amendment, Christopher S. Yoo

All Faculty Scholarship

This article examines how analytical, technological, and doctrinal developments are forcing the courts to reconsider their media-specific approach to assessing the constitutionality of media regulation. In particular, it offers a comprehensive reevaluation of the continuing validity of the Broadcast Model of regulation, which contains features, such as licensing and direct content regulation, that normally would be considered paradigmatic violations of the First Amendment. Specifically, the analysis assesses the theoretical coherence of the traditional justification for extending a lesser degree of First Amendment protection to broadcasting than to other media (i.e., the physical scarcity of the electromagnetic spectrum) as well as …


A Framework For Aggregating Network Performance In Distributed Brokering Systems, Gurhan Gunduz, Shrideep Pallickara, Geoffrey C. Fox Jan 2003

A Framework For Aggregating Network Performance In Distributed Brokering Systems, Gurhan Gunduz, Shrideep Pallickara, Geoffrey C. Fox

Electrical Engineering and Computer Science - All Scholarship

The Internet is presently being used to support increasingly complex interaction models as a result of more and more applications, services and frameworks becoming network-centric. Efficient utilization of network and networked resources is of paramount importance. Network performance gathering is a precursor to any scheme that seeks to provide adaptive routing capabilities for interactions. In this paper we present a network performance aggregation framework that is extensible and appropriate for distributed messaging systems that span multiple realms, disparate communication protocols and support different applications.


Report On The Third Acm/Ieee Joint Conference On Digital Libraries (Jcdl), Michael L. Nelson Jan 2003

Report On The Third Acm/Ieee Joint Conference On Digital Libraries (Jcdl), Michael L. Nelson

Computer Science Faculty Publications

The Third ACM/IEEE Joint Conference on Digital Libraries (JCDL 2003) was held on the campus of Rice University in Houston, Texas, May 27 - 31. Regarding the merging of the ACM and IEEE conference series, in the JCDL 2002 conference report published last year in D-Lib Magazine Edie Rasmussen noted, "Perhaps by next year...no one will remember that it wasn't always so" [1]. Judging by the number of participants I met who did not know that the ACM and IEEE used to hold separate digital library conferences, Rasmussen's prediction has come to pass.


Frequency-Hopped Multiple-Access Communications With Noncoherent M-Ary Ofdm-Ask, A. Al-Dweik, Fuqin Xiong Jan 2003

Frequency-Hopped Multiple-Access Communications With Noncoherent M-Ary Ofdm-Ask, A. Al-Dweik, Fuqin Xiong

Electrical and Computer Engineering Faculty Publications

A noncoherent, bandwidth-efficient modulation scheme is proposed for frequency-hopping multiple-access (FH-MA) networks. The proposed scheme is a combination of noncoherent M-ary amplitude-shift keying (NMASK) and orthogonal frequency-division multiplexing (OFDM). Using this scheme minimizes the required data bandwidth. The number of frequency slots available to the users increases significantly for a fixed spread-spectrum bandwidth (BWSS). The effect of the multiple-access interference is reduced. Simple and accurate bit error rate expressions have been derived for FH-OFDM-MASK in additive white Gaussian noise channels and for FH-OFDM-ASK in Rayleigh fading channels.


Automated Distribution And Management Of Software And Hardware Configurations For Heterogeneous Wireless Devices, Grainne Foley Jan 2003

Automated Distribution And Management Of Software And Hardware Configurations For Heterogeneous Wireless Devices, Grainne Foley

Theses

The continuing evolution of wireless networks and services has increased the complexity and diversity of wireless networks and devices, placing significant emphasis on the need for flexible device configuration management. Widely varying wireless technologies currently operate independently worldwide, making global wireless network access for the mobile user confusing and unwieldy. New technologies, network access methodologies and improved services further obscure the evolving environment. The focus of effort for this thesis is the development of a system to automate the distribution and management of software and hardware configurations that enable different levels of wireless device reconfiguration. The scope of investigation will …


Wireless Local Area Network Security : An Investigation Into Security Tool Usage In Wireless Networks, Susan Webb Jan 2003

Wireless Local Area Network Security : An Investigation Into Security Tool Usage In Wireless Networks, Susan Webb

Theses : Honours

Many organisations and individuals installing wireless local area networks (WLANs), which are based on the IEEE 802.11 b standard, have little understanding of the security issues that surround this technology.

This study was initiated to determine how WLAN security issues affect organisations in Perth, Western Australia. The scope of the study was restricted to 802.llb WLANs operating in infrastructure mode, where all traffic is transmitted by wireless access points (APs). This study was conducted in two phases. The general aims of the first phase were to determine the number of detectable WLANs in the Perth Central Business District (CBD) and …


New Models Of Regulation And Interagency Governance, Christopher S. Yoo Jan 2003

New Models Of Regulation And Interagency Governance, Christopher S. Yoo

All Faculty Scholarship

No abstract provided.


Access To Networks: Economic And Constitutional Connections, Daniel F. Spulber, Christopher S. Yoo Jan 2003

Access To Networks: Economic And Constitutional Connections, Daniel F. Spulber, Christopher S. Yoo

All Faculty Scholarship

A fundamental transformation is taking place in the basic approach to regulating network industries. Policy makers are in the process of abandoning their century-old commitment to rate regulation in favor of a new regulatory approach known as access regulation. Rather than controlling the price of outputs, the new approach focuses on compelling access to and mandating the price of inputs. Unfortunately, this shift in regulatory policy has not been met with an accompanying shift in the manner in which regulatory authorities regulate prices. Specifically, policy makers have continued to base rates on either historical or replacement cost. We argue that …


The Mediated Data Integration (Medint) : An Approach To The Integration Of Database And Legacy Systems, Suvimol Mukviboonchai Jan 2003

The Mediated Data Integration (Medint) : An Approach To The Integration Of Database And Legacy Systems, Suvimol Mukviboonchai

Theses: Doctorates and Masters

The information required for decision making by executives in organizations is normally scattered across disparate data sources including databases and legacy systems. To gain a competitive advantage, it is extremely important for executives to be able to obtain one unique view of information in an accurate and timely manner. To do this, it is necessary to interoperate multiple data sources, which differ structurally and semantically. Particular problems occur when applying traditional integration approaches, for example, the global schema needs to be recreated when the component schema has been modified. This research investigates the following heterogeneities between heterogeneous data sources: Data …