Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Computer Engineering

Text Categorization Based On Apriori Algorithm's Frequent Itemsets, Prathima Madadi May 2009

Text Categorization Based On Apriori Algorithm's Frequent Itemsets, Prathima Madadi

UNLV Theses, Dissertations, Professional Papers, and Capstones

Automatic Text categorization is the task of assigning an electronic document to one or more categories, based on its contents. There are many known techniques to efficiently solve categorization problems. Typically these techniques fall into two distinct methodologies which are either logic based or probabilistic. In recent years, many researchers have tried approaches which area hybrid of these two methodologies.

In this thesis, we deal with document categorization using Apriori Algorithm. The Apriori algorithm was initially developed for data mining and basket analysis applications in the relational databases. Although the technique is logic based, it also relies on the statistical …


Using A Multiobjective Approach To Balance Mission And Network Goals Within A Delay Tolerant Network Topology, Anthony L. Larweck Mar 2009

Using A Multiobjective Approach To Balance Mission And Network Goals Within A Delay Tolerant Network Topology, Anthony L. Larweck

Theses and Dissertations

This thesis investigates how to incorporate aspects of an Air Tasking Order (ATO), a Communications Tasking Order (CTO), and a Network Tasking Order (NTO) within a cognitive network framework. This was done in an effort to aid the commander and or network operator by providing automation for battlespace management to improve response time and potential inconsistent problem resolution. In particular, autonomous weapon systems such as unmanned aerial vehicles (UAVs) were the focus of this research This work implemented a simple cognitive process by incorporating aspects of behavior based robotic control principles to solve the multi-objective optimization problem of balancing both …


The Benefits Of A Network Tasking Order In Combat Search And Rescue Missions, Murat Gocmen Mar 2009

The Benefits Of A Network Tasking Order In Combat Search And Rescue Missions, Murat Gocmen

Theses and Dissertations

Networked communications play a crucial role in United States Armed Forces operations. As the military moves towards more network centric (Net-Centric) operations, it becomes increasingly important to use the network as effectively as possible with respect to the overall mission. This thesis advocates the use of a Network Tasking Order (NTO), which allows operators to reason about the network based on asset movement, capabilities, and communication requirements. These requirements are likely to be derived from the Air Tasking Order (ATO), which gives insight into the plan for physical assets in a military mission. In this research we illustrate the benefit …


Voice Traffic Over Mobile Ad Hoc Networks: A Performance Analysis Of The Optimized Link State Routing Protocol, Lady Noreen P. Santos Mar 2009

Voice Traffic Over Mobile Ad Hoc Networks: A Performance Analysis Of The Optimized Link State Routing Protocol, Lady Noreen P. Santos

Theses and Dissertations

This thesis investigates the performance of the Optimized Link State Routing (OLSR) protocol on Voice over Internet Protocol (VoIP) applications in Mobile Ad hoc Networks (MANETs). Using VoIP over MANETs takes advantage of the mobility and versatility of a MANET environment and the flexibility and interoperability a digital voice format affords. Research shows that VoIP-like traffic can be routed through an ad hoc network using the Ad hoc On-demand Distance Vector routing protocol. This research determines the suitability of OLSR as a routing protocol for MANETs running VoIP applications. Representative VoIP traffic is submitted to a MANET and end-to-end delay …


The Evaluation Of Rekeying Protocols Within The Hubenko Architecture As Applied To Wireless Sensor Networks, Cory J. Antosh Mar 2009

The Evaluation Of Rekeying Protocols Within The Hubenko Architecture As Applied To Wireless Sensor Networks, Cory J. Antosh

Theses and Dissertations

This thesis investigates the impact of using three different rekeying protocols–pair-wise, hierarchical, and Secure Lock within a wireless sensor network (WSN) under the Hubenko architecture. Using a Matlab computer simulation, the impact of the three rekeying protocols on the number of bits transmitted across the network and the amount of battery power consumed in WSN nodes during rekey operations is investigated. Baseline pair-wise rekeying performance can be improved by using either Secure Lock or hierarchical rekeying. The best choice depends on the size of the WSN and the size of the key used. Hierarchical rekeying is the best choice for …