Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

2005

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 28 of 28

Full-Text Articles in Computer Engineering

New Hybrid Automatic Repeat Request (Harq) Combining With Space Time Block Coding (Stbc) In Invariant And Variant Fading Channel, Guillem Ernest Malagarriga Vilella Dec 2005

New Hybrid Automatic Repeat Request (Harq) Combining With Space Time Block Coding (Stbc) In Invariant And Variant Fading Channel, Guillem Ernest Malagarriga Vilella

Theses

Hybrid Automatic Repeat reQuest (HARQ) combining for space time block coding Multiple Input Multiple Output (MIMO) system consisting of N transmit antennas and M receive antennas (NxM) in a time invariant channel and in a time varying channel is proposed and its performance is analyzed. Based on the measured channel matrix, the receiver chooses the best retransmission order and communicated it to the transmitter.

The scheme, where this algorithm is performed, is a combination of a precombining HARQ scheme and the Multiple Alamouti Space-Time Block Coding (MASTBC), which is suitable for more than 2 transmit antennas. The combination of this ...


Can Infopipes Facilitate Reuse In A Traffic Application?, Emerson Murphy-Hill, Chuan-Kai Lin, Andrew P. Black, Jonathan Walpole Oct 2005

Can Infopipes Facilitate Reuse In A Traffic Application?, Emerson Murphy-Hill, Chuan-Kai Lin, Andrew P. Black, Jonathan Walpole

Computer Science Faculty Publications and Presentations

Infopipes are presented as reusable building blocks for streaming applications. To evaluate this claim, we have built a significant traffic application in Smalltalk using Infopipes. This poster presents a traffic problem and solution, a short introduction to Infopipes, and the types of reuse Infopipes facilitate in our implementation.


Inventions On Expressing Emotions In Graphical User Interface, Umakant Mishra Sep 2005

Inventions On Expressing Emotions In Graphical User Interface, Umakant Mishra

Umakant Mishra

The conventional GUI is more mechanical and does not recognize or communicate emotions. The modern GUIs are trying to infer the likely emotional state and personality of the user and communicate through a corresponding emotional state. Emotions are expressed in graphical icons, sounds, pictures and other means. The emotions are found to be useful in especially in communication software, interactive learning systems, robotics and other adaptive environments. Various mechanisms have been developed to express emotions through graphical user interfaces. This article illustrates some interesting inventions selected from US patent database.


Evaluation Of Coding Scheme For Mimo Radar, Suresh Kumar Harikrishnan Aug 2005

Evaluation Of Coding Scheme For Mimo Radar, Suresh Kumar Harikrishnan

Theses

Multiple Input Multiple Output (MIMO) antenna systems have shown a great potential for wireless communication. These systems support high capacity, increased diversity and interference suppression. Recently it has been proposed MIMO constellations for Radar. MIMO Radar is not only a new research field, but also a very promising approach in terms of overcoming Radar Cross Section (RCS) fluctuations with diversity. This thesis explores the potential of coding schemes for MIMO Radar.

The ambiguity functions measures related to MIMO Radar are used to evaluate how much diversity gain can be coherently achieved with certain coding schemes. The results of this analysis ...


An Analytical Model Of Mac Protocol Dependant Power Consumption In Multi-Hop Ad Hoc Wireless Sensor Networks, Komlan Egoh Aug 2005

An Analytical Model Of Mac Protocol Dependant Power Consumption In Multi-Hop Ad Hoc Wireless Sensor Networks, Komlan Egoh

Theses

Power efficiency is the most constraining requirement for viable operation of battery-powered networked sensors. Conventionally, dynamic power management (DPM) is used to put sensor nodes into different states such as active, idle, and sleep, each consuming a certain level of power. Within the active state, communication operational states, such as receive and transmit consume different levels of nodal power. This thesis shows how DPM states and protocol operational states can be combined into a single stochastic model to finely evaluate the power consumption performance of a medium access control (MAC) protocol. The model is formulated as a semi-Markov decision process ...


A Conceptual Framework For Analysis Of System Safety Interoperability Of United States Navy's Combat Systems, Showkat Shanaz Alborzi Jul 2005

A Conceptual Framework For Analysis Of System Safety Interoperability Of United States Navy's Combat Systems, Showkat Shanaz Alborzi

Engineering Management & Systems Engineering Theses & Dissertations

Today's political and military reality requires the optimal use of our legacy systems. The objective is to maximize the effectiveness of our operations by efficient allocation, placement and the use of our forces and war-fighting systems. The synergism drawn from the capabilities of the legacy complex systems enables today's war-fighting needs to be met without substantial increase in cost or resources. This synergism can be realized by the effective integration and interoperation of legacy systems into a larger, more complex system of systems.

However, the independently developed legacy systems in this new tactical environment often have different data ...


Opal: In Vivo Based Preservation Framework For Locating Lost Web Pages, Terry L. Harrison Jul 2005

Opal: In Vivo Based Preservation Framework For Locating Lost Web Pages, Terry L. Harrison

Computer Science Theses & Dissertations

We present Opal, a framework for interactively locating missing web pages (http status code 404). Opal is an example of "in vivo" preservation: harnessing the collective behavior of web archives, commercial search engines, and research projects for the purpose of preservation. Opal servers learn from their experiences and are able to share their knowledge with other Opal servers using the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH). Using cached copies that can be found on the web, Opal creates lexical signatures which are then used to search for similar versions of the web page. Using the OAI-PMH to facilitate ...


Dream: A Theoretical Analysis, Xueying Qi Jul 2005

Dream: A Theoretical Analysis, Xueying Qi

Computer Science Theses & Dissertations

A Mobile Ad-hoc Network (MANET, for short) is a collection of mobile nodes deployed in support of a short-lived special-purpose operation. Examples include search-and-rescue missions, law-enforcement, multimedia classrooms, and among many others. Unlike cellular or satellite networks, MANET do not rely on any form of pre-existing infrastructure. The mobility of nodes combined with the lack of infrastructure makes routing in MANET notoriously difficult. It was recently suggested that routing in MANET can use to advantage geographic information that the nodes may acquire either by endowing them with a GPS chip or simply by using known localization algorithms. Distance Routing Effect ...


Cluster-Based Wireless Mobile Ad-Hoc Network Security, Mandur Bajra Bajracharya May 2005

Cluster-Based Wireless Mobile Ad-Hoc Network Security, Mandur Bajra Bajracharya

Theses

A wireless ad-hoc network is a cooperative communication network deployed with a specific purpose. It is characterized by dynamically changing topology with no fixed infrastructure which exhibits a perfectly vulnerable state for a number of different kinds of attacks.

This thesis proposes a novel technique of achieving security in wireless mobile ad hoc networks by integrating a simple clustering and a voting mechanism together. The purpose of forming a cluster is to facilitate security in the network and the voting is performed to support the decision making process in the cluster. A procedure of forming small homogenous clusters throughout the ...


Using A Pda To Control Home Appliances, Atif Albraiki May 2005

Using A Pda To Control Home Appliances, Atif Albraiki

Syracuse University Honors Program Capstone Projects

The Personal Digital Assistant (PDA) is a handheld device that gives users different organizational capabilities. Over the years, the functionality of PDAs has expanded tremendously to include internet connectivity and different computer applications. The purpose of my honors thesis, combined with my engineering senior design project, was to include a new functionality to the PDA and use it to control different home appliances. The goal of the project was to develop a PDA program that will communicate with a PC program, and have the PC program communicate with a microcontroller to control home appliances. My part of the project was ...


Lightweight Federation Of Non-Cooperating Digital Libraries, Rong Shi Apr 2005

Lightweight Federation Of Non-Cooperating Digital Libraries, Rong Shi

Computer Science Theses & Dissertations

This dissertation studies the challenges and issues faced in federating heterogeneous digital libraries (DLs). The objective of this research is to demonstrate the feasibility of interoperability among non-cooperating DLs by presenting a lightweight, data driven approach, or Data Centered Interoperability (DCI). We build a Lightweight Federated Digital Library (LFDL) system to provide federated search service for existing digital libraries with no prior coordination.

We describe the motivation, architecture, design and implementation of the LFDL. We develop, deploy, and evaluate key services of the federation. The major difference to existing DL interoperability approaches is one where we do not insist on ...


Clustering And Hybrid Routing In Mobile Ad Hoc Networks, Lan Wang Apr 2005

Clustering And Hybrid Routing In Mobile Ad Hoc Networks, Lan Wang

Computer Science Theses & Dissertations

This dissertation focuses on clustering and hybrid routing in Mobile Ad Hoc Networks (MANET). Specifically, we study two different network-layer virtual infrastructures proposed for MANET: the explicit cluster infrastructure and the implicit zone infrastructure. In the first part of the dissertation, we propose a novel clustering scheme based on a number of properties of diameter-2 graphs to provide a general-purpose virtual infrastructure for MANET. Compared to virtual infrastructures with central nodes, our virtual infrastructure is more symmetric and stable, but still light-weight. In our clustering scheme, cluster initialization naturally blends into cluster maintenance, showing the unity between these two operations ...


Mil-Std-188-125-1, High-Altitude Emp Protection For Fixed Ground-Based Facilities Mar 2005

Mil-Std-188-125-1, High-Altitude Emp Protection For Fixed Ground-Based Facilities

George H Baker

MIL-STD-188-125-1 establishes minimum requirements and design objectives for high-altitude electromagnetic pulse (HEMP) hardening of fixed ground-based facilities that perform critical, time-urgent command, control, communications, computer, and intelligence (C4I) missions. The standard prescribes minimum performance requirements for low-risk protection from mission-aborting damage or upset due to HEMP environments. It also addresses minimum testing requirements for demonstrating that prescribed performance has been achieved and for verifying that the installed protection subsystem provides the operationally required hardness for the completed facility. Covered fixed ground-based facility types include subscriber terminals and data processing centers, transmitting and receiving communications stations, and relay facilities. Use of ...


Reconsidering The Dmca, R. Polk Wagner Jan 2005

Reconsidering The Dmca, R. Polk Wagner

Faculty Scholarship at Penn Law

No abstract provided.


Non-Verbal Communication With Autistic Children Using Digital Libraries, Gondy A. Leroy, John Huang '05, Serena Chuang '05, Marjorie H. Charlop Jan 2005

Non-Verbal Communication With Autistic Children Using Digital Libraries, Gondy A. Leroy, John Huang '05, Serena Chuang '05, Marjorie H. Charlop

CGU Faculty Publications and Research

Autism spectrum disorder (ASD) has become one of the most prevalent mental disorders over the last few years and its prevalence is still growing. The disorder is characterized by a wide variety of symptoms such as lack of social behavior, extreme withdrawal, and problems communicating. Because of the diversity in symptoms and the wide variety in severity for those, each autistic child has different needs and requires individualized therapy. This leads to long waiting lists for therapy.


On The Regulation Of Networks As Complex Systems: A Graph Theory Approach, Daniel F. Spulber, Christopher S. Yoo Jan 2005

On The Regulation Of Networks As Complex Systems: A Graph Theory Approach, Daniel F. Spulber, Christopher S. Yoo

Faculty Scholarship at Penn Law

No abstract provided.


Architectural Censorship And The Fcc, Christopher S. Yoo Jan 2005

Architectural Censorship And The Fcc, Christopher S. Yoo

Faculty Scholarship at Penn Law

No abstract provided.


Archive Ingest And Handling Test, Michael L. Nelson, Johan Bollen, Giridhar Manepalli, Rabia Haq Jan 2005

Archive Ingest And Handling Test, Michael L. Nelson, Johan Bollen, Giridhar Manepalli, Rabia Haq

Computer Science Faculty Publications

The Archive Ingest and Handling Test (AIHT) was a Library of Congress (LC) sponsored research project administered by Information Systems and Support Inc. (ISS). The project featured five participants: Old Dominion University Computer Science Department; Harvard University Library; Johns Hopkins University Library; Stanford University Library; Library of Congress. All five participants received identical disk drives containing copies of the 911.gmu.edu web site, a collection of 9/11 materials maintained by George Mason University (GMU). The purpose of the AIHT experiment was to perform archival forensics to determine the nature of the archive, ingest it, simulate at least one ...


Beyond Network Neutrality, Christopher S. Yoo Jan 2005

Beyond Network Neutrality, Christopher S. Yoo

Faculty Scholarship at Penn Law

No abstract provided.


Final Report For The Development Of The Nasa Technical Report Server (Ntrs), Michael L. Nelson Jan 2005

Final Report For The Development Of The Nasa Technical Report Server (Ntrs), Michael L. Nelson

Computer Science Faculty Publications

The author performed a variety of research, development and consulting tasks for NASA Langley Research Center in the area of digital libraries (DLs) and supporting technologies, such as the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH). In particular, the development focused on the NASA Technical Report Server (NTRS) and its transition from a distributed searching model to one that uses the OAI-PMH. The Open Archives Initiative (OAI) is an international consortium focused on furthering the interoperability of DLs through the use of "metadata harvesting". The OAI-PMH version of NTRS went into public production on April 28, 2003. Since that ...


Lessons Learned With Arc, An Oai-Pmh Service Provider, Xiaoming Liu, Kurt Maly, Michael L. Nelson Jan 2005

Lessons Learned With Arc, An Oai-Pmh Service Provider, Xiaoming Liu, Kurt Maly, Michael L. Nelson

Computer Science Faculty Publications

Web-based digital libraries have historically been built in isolation utilizing different technologies, protocols, and metadata. These differences hindered the development of digital library services that enable users to discover information from multiple libraries through a single unified interface. The Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH) is a major, international effort to address technical interoperability among distributed repositories. Arc debuted in 2000 as the first end-user OAI-PMH service provider. Since that time, Arc has grown to include nearly 7,000,000 metadata records. Arc has been deployed in a number of environments and has served as the basis for ...


Introduction: Data Communication And Topology Algorithms For Sensor Networks, Stephan Olariu, David Simplot-Ryl, Ivan Stojmenovic Jan 2005

Introduction: Data Communication And Topology Algorithms For Sensor Networks, Stephan Olariu, David Simplot-Ryl, Ivan Stojmenovic

Computer Science Faculty Publications

(First paragraph) We are very proud and honored to have been entrusted to be Guest Editors for this special issue. Papers were sought to comprehensively cover the algorithmic issues in the “hot” area of sensor networking. The concentration was on network layer problems, which can be divided into two groups: data communication problems and topology control problems. We wish to briefly introduce the five papers appearing in this special issue. They cover specific problems such as time division for reduced collision, fault tolerant clustering, self-stabilizing graph optimization algorithms, key pre-distribution for secure communication, and distributed storage based on spanning trees ...


Online Multimedia Communication System, Yin-Wei Yang Jan 2005

Online Multimedia Communication System, Yin-Wei Yang

Theses Digitization Project

Online Multimedia Communication System is a project aimed at providing people the ability to store and share their multimedia files. The users and administrator can modify and view the files and database information from a normal web browser. Furthermore, this site offers a secure environment to keep all the users' information private.


Stabilizing Inter-Domain Routing In The Internet, Yu Chen, Ajoy K. Datta, Sebastien Tixeuil Jan 2005

Stabilizing Inter-Domain Routing In The Internet, Yu Chen, Ajoy K. Datta, Sebastien Tixeuil

Mechanical Engineering Faculty Publications

This paper reports the first self-stabilizing Border Gateway Protocol (BGP). BGP is the standard inter-domain routing protocol in the Internet. Self-stabilization is a technique to tolerate arbitrary transient faults.

The routing instability in the Internet can occur due to errors in configuring the routing data structures, the routing policies, transient physical and data link problems, software bugs, and memory corruption. This instability can increase the network latency, slow down the convergence of the routing data structures, and can also cause the partitioning of networks. Most of the previous studies concentrated on routing policies to achieve the convergence of BGP while ...


Websat: Web-Based Systems Administration Tool, Juyong Jeong Jan 2005

Websat: Web-Based Systems Administration Tool, Juyong Jeong

Theses Digitization Project

Discusses the development of WebSAT (Web-based systems administration tool), a computer network tool that allows systems administrators to create and delete accounts, disable and enable existing accounts, manage disk space conveniently, monitor the status of all network printers, and monitor network security. The WebSAT application was implemented using PHP, a server-side embedded scripting language, with a MySQL database.


An Investigation Into The Use Of B-Nodes And State Models For Computer Network Technology And Education, Gurpreet Kohli Jan 2005

An Investigation Into The Use Of B-Nodes And State Models For Computer Network Technology And Education, Gurpreet Kohli

Theses: Doctorates and Masters

This thesis consists of a series of internationally published, peer reviewed, conference research papers and one journal paper. The papers evaluate and further develop two modelling methods for use in Information Technology (IT) design and for the educational and training needs of students within the area of computer and network technology. The IT age requires technical talent to fill positions such as network managers, web administrators, e-commerce consultants and network security experts as IT is changing rapidly, and this is placing considerable demands on higher educational institutions, both within Australia and internationally, to respond to these changes.


Energy-Efficient Self-Organization Protocols For Sensor Networks, Qingwen Xu Jan 2005

Energy-Efficient Self-Organization Protocols For Sensor Networks, Qingwen Xu

Computer Science Theses & Dissertations

A Wireless Sensor Network (WSN, for short) consists of a large number of very small sensor devices deployed in an area of interest for gathering and delivery information. The fundamental goal of a WSN is to produce, over an extended period of time, global information from local data obtained by individual sensors. The WSN technology will have a significant impact on a wide array of applications on the efficiency of many civilian and military applications including combat field surveillance, intrusion detection, disaster management among many others. The basic management problem in the WSN is to balance the utility of the ...


Platform Thinking In Embedded Systems, Robert Iannucci Dec 2004

Platform Thinking In Embedded Systems, Robert Iannucci

Robert A Iannucci

No abstract provided.