Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Beamforming (2)
- Computer networks (2)
- Network traffic (2)
- Space-Time Block Coding (2)
- Wireless communication systems (2)
-
- ACM/IEEE Joint Conference on Digital Libraries (1)
- Ad-hoc networks (1)
- Amplitude-shift keying (ASK) (1)
- Automatic data collection systems (1)
- Bluetooth technology (1)
- Computer networks--Security measures (1)
- Conference mergers (1)
- Database management (1)
- Detectors (1)
- Digital libraries (1)
- Distributed messaging (1)
- Fault detection systems (1)
- Frequency hopping (FH) (1)
- Houston (Texas) (1)
- Information networks (1)
- Interference (1)
- Local area networks (1)
- M-ary amplitude-shift keying (MASK) (1)
- Management information systems. (1)
- Mobil networks (1)
- Multihop Cellular Networks (MCN) (1)
- Network intrusion detection (1)
- Network monitoring (1)
- Noncoherent (1)
- Orthogonal frequency-division multiplexing (OFDM) (1)
- Publication
- Publication Type
Articles 1 - 18 of 18
Full-Text Articles in Computer Engineering
Combined Beamforming And Space-Time Block Coding With A Sparse Array Antenna, Robert H. Morelos-Zaragoza, Mohammad Ghavami
Combined Beamforming And Space-Time Block Coding With A Sparse Array Antenna, Robert H. Morelos-Zaragoza, Mohammad Ghavami
Robert Henry Morelos-Zaragoza
In this paper, we continue our investigation of joint beamforming and transmit diversity with space-time block coding. In particular, the performance of a four-element array antenna is considered, in the context of an indoor wireless communication system. The main contribution is to show that transmit diversity may be practically achieved, even with correlated beams produced by a sparse array antenna.
Combined Beamforming And Space-Time Block Coding With Sparse Array Antennas, Robert H. Morelos-Zaragoza
Combined Beamforming And Space-Time Block Coding With Sparse Array Antennas, Robert H. Morelos-Zaragoza
Robert Henry Morelos-Zaragoza
In this paper, the combination of beamforming and space-time block coding is investigated. An adaptive scheme for the assignment of transmission beams is proposed. Data for the determination of beams are obtained using a triangular switch-beam array antenna at the transmitter. The number of peak points is determined from the data and a prescribed threshold level. Orthogonal space-time block coding is then applied to the transmission beams. We examine the distribution of the number of assigned beams as a function of indoor wireless channel parameters. Also, the effects of a small number of array elements and associated correlated beams, and …
A Communications Modeling System For Swarm-Based Sensors, Brian A. Kadrovach
A Communications Modeling System For Swarm-Based Sensors, Brian A. Kadrovach
Theses and Dissertations
Today's information age has exploded the amount of data available to decision makers at all levels of the control hierarchy. The miniaturization and proliferation of sensor technology has enabled extensive detection and monitoring and advances in computational capabilities have provided for embedded data analysis and the generation of information from raw data. Additionally, with the miniaturization of mechanical systems it is possible to provide platforms for sensor suites that are capable of mobility and limited autonomy. Swarming or bio-emergent behavior problems, provides a robust scalable mechanism for organizing large numbers of mobile sensor platforms. However, the mobility dynamics of swarm …
Low Interference Routing For Wireless Ad-Hoc Networks, Mohit Gupta
Low Interference Routing For Wireless Ad-Hoc Networks, Mohit Gupta
Theses
In this thesis the primary focus is on the problem of interference between messages. The thesis discusses why the messages are blocked in a system? How adding a message impacts the cost of all other available links, which can be established in the system.
This thesis analyzes how the availability of channels, increase in number of nodes and increase in the transmission range help in increasing the number of messages that can be handled in the network. It is also analyzes how critical is the selection of the maximum transmission range MTR, transmission range TR and required transmission range RTR. …
Hop-Limited Routing For Multihop Cellular Networks, Cem Dincer
Hop-Limited Routing For Multihop Cellular Networks, Cem Dincer
Theses
In recent years, conventional cellular systems have experienced evolution in fields of data oriented services. During this period, the requirement for high data-rate stimulated new research proposals, which resulted in a new architecture: Multihop Cellular Networks (MCN), where multihop structure enables mobile stations to forward packets from other mobile stations to the base station on the uplink, and in turn, forward packets to other mobile stations from the base station on the downlink. In this thesis, a new routing algorithm is introduced for MCNs in order to limit the number of hops between the base station and the mobile stations …
Intrusion Detection System For Ad Hoc Mobile Networks Using Neighborhood Watch Theory, Ramani Rajagopalan
Intrusion Detection System For Ad Hoc Mobile Networks Using Neighborhood Watch Theory, Ramani Rajagopalan
Theses
This study describes several experiments to simulate and study temperature sensor networks. The ultimate goal of this study is to accurately predict a temperature sensor failure in a sensor network, using Network Neighborhood Watch theory. Simulated temperature measurements are used to compare the results of accuracy, and quickness in detecting a failure in a malfunctioning sensor node. This is done by changing the intervals between temperature sampling, by considering different rates of temperature raise, as well as varying the number of nodes in the network neighborhood (deployment density). The thesis studies the threshold for temperature sensor failure by computing a …
Reduction Of False Positives In Fault Detection System Using A Low Pass Data Filter, Ranjit Salunkhe
Reduction Of False Positives In Fault Detection System Using A Low Pass Data Filter, Ranjit Salunkhe
Theses
Network traffic is bursty in nature and exhibits the property of self-similarity, the degree of which is measured by the Hurst parameter. Now, in any network there is always the possibility of the occurrence of fault traffic that can be caused due to faults or malfunction of a network component. Fault Detection Systems that check for traffic anomalies can trigger off an alert on the detection of any traffic behavior that deviates from normal. Such deviation is usually caused when a fault occurs. But in network traffic sudden bursts may occur due to the inherent behavior of a network application. …
Wlan Csma/Ca Performance In A Bluetooth Interference Environment, Randall B. Noel
Wlan Csma/Ca Performance In A Bluetooth Interference Environment, Randall B. Noel
Theses and Dissertations
IEEE 802.11 WLANs and Bluetooth piconets both operate in the 2.4 GHz Industrial Scientific and Medical (ISM) radio band. When operating in close proximity, these two technologies interfere with each other. Current literature suggests that IEEE 802.11 (employing direct sequence spread spectrum technology) is more susceptible to this interference than Bluetooth, which uses frequency hopping spread spectrum technology, resulting in reduced throughput. Current research tends to focus on the issue of packet collisions, and not the fact that IEEE 802.11 may also delay its transmissions while the radio channel is occupied by a Bluetooth signal. This research characterizes previously neglected …
Characterizing Data Streams Over Ieee 802.11b Ad-Hoc Wireless Networks, John T. Wagnon
Characterizing Data Streams Over Ieee 802.11b Ad-Hoc Wireless Networks, John T. Wagnon
Theses and Dissertations
Soon, advancements in data encryption technology will make real-time decryption of the contents of network packets virtually impossible. This research anticipates this development and extracts useful information based on packet level characteristics. Distinguishing characteristics from e-mail, HTTP, print, and FTP applications are identified and analyzed. The analysis of collected data from an ad-hoc wireless network reveals that distinguishing characteristics of network traffic do indeed exist. These characteristics include packet size, packet frequency, inter-packet correlation, and channel utilization. Without knowing the contents of packets or the direction of the traffic flow, the applications accessing the wireless network can be determined.
The Rise And Demise Of The Technology-Specific Approach To The First Amendment, Christopher S. Yoo
The Rise And Demise Of The Technology-Specific Approach To The First Amendment, Christopher S. Yoo
All Faculty Scholarship
This article examines how analytical, technological, and doctrinal developments are forcing the courts to reconsider their media-specific approach to assessing the constitutionality of media regulation. In particular, it offers a comprehensive reevaluation of the continuing validity of the Broadcast Model of regulation, which contains features, such as licensing and direct content regulation, that normally would be considered paradigmatic violations of the First Amendment. Specifically, the analysis assesses the theoretical coherence of the traditional justification for extending a lesser degree of First Amendment protection to broadcasting than to other media (i.e., the physical scarcity of the electromagnetic spectrum) as well as …
A Framework For Aggregating Network Performance In Distributed Brokering Systems, Gurhan Gunduz, Shrideep Pallickara, Geoffrey C. Fox
A Framework For Aggregating Network Performance In Distributed Brokering Systems, Gurhan Gunduz, Shrideep Pallickara, Geoffrey C. Fox
Electrical Engineering and Computer Science - All Scholarship
The Internet is presently being used to support increasingly complex interaction models as a result of more and more applications, services and frameworks becoming network-centric. Efficient utilization of network and networked resources is of paramount importance. Network performance gathering is a precursor to any scheme that seeks to provide adaptive routing capabilities for interactions. In this paper we present a network performance aggregation framework that is extensible and appropriate for distributed messaging systems that span multiple realms, disparate communication protocols and support different applications.
Report On The Third Acm/Ieee Joint Conference On Digital Libraries (Jcdl), Michael L. Nelson
Report On The Third Acm/Ieee Joint Conference On Digital Libraries (Jcdl), Michael L. Nelson
Computer Science Faculty Publications
The Third ACM/IEEE Joint Conference on Digital Libraries (JCDL 2003) was held on the campus of Rice University in Houston, Texas, May 27 - 31. Regarding the merging of the ACM and IEEE conference series, in the JCDL 2002 conference report published last year in D-Lib Magazine Edie Rasmussen noted, "Perhaps by next year...no one will remember that it wasn't always so" [1]. Judging by the number of participants I met who did not know that the ACM and IEEE used to hold separate digital library conferences, Rasmussen's prediction has come to pass.
Frequency-Hopped Multiple-Access Communications With Noncoherent M-Ary Ofdm-Ask, A. Al-Dweik, Fuqin Xiong
Frequency-Hopped Multiple-Access Communications With Noncoherent M-Ary Ofdm-Ask, A. Al-Dweik, Fuqin Xiong
Electrical and Computer Engineering Faculty Publications
A noncoherent, bandwidth-efficient modulation scheme is proposed for frequency-hopping multiple-access (FH-MA) networks. The proposed scheme is a combination of noncoherent M-ary amplitude-shift keying (NMASK) and orthogonal frequency-division multiplexing (OFDM). Using this scheme minimizes the required data bandwidth. The number of frequency slots available to the users increases significantly for a fixed spread-spectrum bandwidth (BWSS). The effect of the multiple-access interference is reduced. Simple and accurate bit error rate expressions have been derived for FH-OFDM-MASK in additive white Gaussian noise channels and for FH-OFDM-ASK in Rayleigh fading channels.
Automated Distribution And Management Of Software And Hardware Configurations For Heterogeneous Wireless Devices, Grainne Foley
Automated Distribution And Management Of Software And Hardware Configurations For Heterogeneous Wireless Devices, Grainne Foley
Theses
The continuing evolution of wireless networks and services has increased the complexity and diversity of wireless networks and devices, placing significant emphasis on the need for flexible device configuration management. Widely varying wireless technologies currently operate independently worldwide, making global wireless network access for the mobile user confusing and unwieldy. New technologies, network access methodologies and improved services further obscure the evolving environment. The focus of effort for this thesis is the development of a system to automate the distribution and management of software and hardware configurations that enable different levels of wireless device reconfiguration. The scope of investigation will …
Wireless Local Area Network Security : An Investigation Into Security Tool Usage In Wireless Networks, Susan Webb
Wireless Local Area Network Security : An Investigation Into Security Tool Usage In Wireless Networks, Susan Webb
Theses : Honours
Many organisations and individuals installing wireless local area networks (WLANs), which are based on the IEEE 802.11 b standard, have little understanding of the security issues that surround this technology.
This study was initiated to determine how WLAN security issues affect organisations in Perth, Western Australia. The scope of the study was restricted to 802.llb WLANs operating in infrastructure mode, where all traffic is transmitted by wireless access points (APs). This study was conducted in two phases. The general aims of the first phase were to determine the number of detectable WLANs in the Perth Central Business District (CBD) and …
New Models Of Regulation And Interagency Governance, Christopher S. Yoo
New Models Of Regulation And Interagency Governance, Christopher S. Yoo
All Faculty Scholarship
No abstract provided.
Access To Networks: Economic And Constitutional Connections, Daniel F. Spulber, Christopher S. Yoo
Access To Networks: Economic And Constitutional Connections, Daniel F. Spulber, Christopher S. Yoo
All Faculty Scholarship
A fundamental transformation is taking place in the basic approach to regulating network industries. Policy makers are in the process of abandoning their century-old commitment to rate regulation in favor of a new regulatory approach known as access regulation. Rather than controlling the price of outputs, the new approach focuses on compelling access to and mandating the price of inputs. Unfortunately, this shift in regulatory policy has not been met with an accompanying shift in the manner in which regulatory authorities regulate prices. Specifically, policy makers have continued to base rates on either historical or replacement cost. We argue that …
The Mediated Data Integration (Medint) : An Approach To The Integration Of Database And Legacy Systems, Suvimol Mukviboonchai
The Mediated Data Integration (Medint) : An Approach To The Integration Of Database And Legacy Systems, Suvimol Mukviboonchai
Theses: Doctorates and Masters
The information required for decision making by executives in organizations is normally scattered across disparate data sources including databases and legacy systems. To gain a competitive advantage, it is extremely important for executives to be able to obtain one unique view of information in an accurate and timely manner. To do this, it is necessary to interoperate multiple data sources, which differ structurally and semantically. Particular problems occur when applying traditional integration approaches, for example, the global schema needs to be recreated when the component schema has been modified. This research investigates the following heterogeneities between heterogeneous data sources: Data …