Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Computer Engineering

Effective Short Text Classification Via The Fusion Of Hybrid Features For Iot Social Data, Xiong Luo, Zhijian Yu, Zhigang Zhao, Wenbing Zhao, Jenq-Haur Wang Dec 2022

Effective Short Text Classification Via The Fusion Of Hybrid Features For Iot Social Data, Xiong Luo, Zhijian Yu, Zhigang Zhao, Wenbing Zhao, Jenq-Haur Wang

Electrical and Computer Engineering Faculty Publications

Nowadays short texts can be widely found in various social data in relation to the 5G-enabled Internet of Things (IoT). Short text classification is a challenging task due to its sparsity and the lack of context. Previous studies mainly tackle these problems by enhancing the semantic information or the statistical information individually. However, the improvement achieved by a single type of information is limited, while fusing various information may help to improve the classification accuracy more effectively. To fuse various information for short text classification, this article proposes a feature fusion method that integrates the statistical feature and the comprehensive …


Fault Identification And Location For Distribution Network With Distributed Generations, Wen Fan, Yuan Liao May 2018

Fault Identification And Location For Distribution Network With Distributed Generations, Wen Fan, Yuan Liao

Electrical and Computer Engineering Faculty Publications

Power distribution networks with distributed generations may experience faults. It is essential to promptly locate the fault for fast repair and restoration. This paper presents a novel method for identifying the faulted section and accurate location of faults that occur on power distribution grid. Appropriate matrices are set up to represent meter locations on the grid and the topology of the grid. The voltage and current measurements obtained are utilized to decide the fault sections. Then fault location is determined by solving equations that link measurements and fault locations through bus impedance matrix. The method is applicable to both single …


A Fast And Robust Extrinsic Calibration For Rgb-D Camera Networks, Po-Chang Su, Ju Shen, Wanxin Xu, Sen-Ching S. Cheung, Ying Luo Jan 2018

A Fast And Robust Extrinsic Calibration For Rgb-D Camera Networks, Po-Chang Su, Ju Shen, Wanxin Xu, Sen-Ching S. Cheung, Ying Luo

Electrical and Computer Engineering Faculty Publications

From object tracking to 3D reconstruction, RGB-Depth (RGB-D) camera networks play an increasingly important role in many vision and graphics applications. Practical applications often use sparsely-placed cameras to maximize visibility, while using as few cameras as possible to minimize cost. In general, it is challenging to calibrate sparse camera networks due to the lack of shared scene features across different camera views. In this paper, we propose a novel algorithm that can accurately and rapidly calibrate the geometric relationships across an arbitrary number of RGB-D cameras on a network. Our work has a number of novel features. First, to cope …


Energy-Efficient Soft Real-Time Scheduling For Parameter Estimation In Wsns, Senlin Zhang, Zixiang Wang, Meikang Qiu, Meiqin Liu Apr 2013

Energy-Efficient Soft Real-Time Scheduling For Parameter Estimation In Wsns, Senlin Zhang, Zixiang Wang, Meikang Qiu, Meiqin Liu

Electrical and Computer Engineering Faculty Publications

In wireless sensor networks (WSNs), homogeneous or heterogenous sensor nodes are deployed at a certain area to monitor our curious target. The sensor nodes report their observations to the base station (BS), and the BS should implement the parameter estimation with sensors’ data. Best linear unbiased estimation (BLUE) is a common estimator in the parameter estimation. Due to the end-to-end packet delay, it takes some time for the BS to receive sufficient data for the estimation. In some soft real-time applications, we expect that the estimation can be completed before the deadline with a probability. The existing approaches usually guarantee …


An Probability-Based Energy Model On Cache Coherence Protocol With Mobile Sensor Network, Jihe Wang, Bing Guo, Meikang Qiu Apr 2013

An Probability-Based Energy Model On Cache Coherence Protocol With Mobile Sensor Network, Jihe Wang, Bing Guo, Meikang Qiu

Electrical and Computer Engineering Faculty Publications

Mobile sensor networks (MSNs) are widely used in various domains to monitor, record, compute, and interact the information within an environment. To prolong the life time of each node in MSNs, energy model and conservation should be considered carefully when designing the data communication mechanism in the network. The limited battery volume and high workload on channels worsen the life times of the busy nodes. In this paper, we propose a new energy evaluating methodology of packet transmissions in MSNs, which is based on redividing network layers and describing the synchronous data flow with matrix form. We first introduce the …


Cache Invalidation Strategies For Internet-Based Vehicular Ad Hoc Networks, Sunho Lim, Chansu Yu, Chita R. Das Feb 2012

Cache Invalidation Strategies For Internet-Based Vehicular Ad Hoc Networks, Sunho Lim, Chansu Yu, Chita R. Das

Electrical and Computer Engineering Faculty Publications

Internet-based vehicular ad hoc network (Ivanet) is an emerging technique that combines a wired Internet and a vehicular ad hoc network (Vanet) for developing an ubiquitous communication infrastructure and improving universal information and service accessibility. A key design optimization technique in Ivanets is to cache the frequently accessed data items in a local storage of vehicles. Since vehicles are not critically limited by the storage/memory space and power consumption, selecting proper data items for caching is not very critical. Rather, an important design issue is how to keep the cached copies valid when the original data items are updated. This …


Many-To-One Communication Protocol For Wireless Sensor Networks, Chansu Yu, Robert Fiske, Seungmin Park, Won-Tae Kim Jan 2012

Many-To-One Communication Protocol For Wireless Sensor Networks, Chansu Yu, Robert Fiske, Seungmin Park, Won-Tae Kim

Electrical and Computer Engineering Faculty Publications

This paper proposes a novel communication protocol, called Many-to-One Sensors-to-Sink (MOSS), tailored to wireless sensor networks (WSNs). It exploits the unique sensors-to-sink traffic pattern to realize low-overhead medium access and low- latency sensors-to-sink routing paths. In conventional schedule-based MAC protocols such as S-MAC, sensor nodes in the proximity of the event generate reports simultaneously, causing unreliable and unpredictable performance during a brief but critical period of time when an event of interest occurs. MOSS is based on time division multiple access (TDMA) that avoids energy waste due to collisions, idle listening and overhearing and avoids unreliable behavior mentioned above. A …


Quasi-Orthogonal Space-Time Block Coding Using Polynomial Phase Modulation, Omar Granados, Jean Andrian Apr 2011

Quasi-Orthogonal Space-Time Block Coding Using Polynomial Phase Modulation, Omar Granados, Jean Andrian

Electrical and Computer Engineering Faculty Publications

Recently, polynomial phase modulation (PPM) was shown to be a power- and bandwidth-efficient modulation format. These two characteristics are in high demand nowadays specially in mobile applications, where devices with size, weight, and power (SWaP) constraints are common. In this paper, we propose implementing a full-diversity quasiorthogonal space-time block code (QOSTBC) using polynomial phase signals as modulation format. QOSTBCs along with PPM are used in order to improve the power efficiency of communication systems with four transmit antennas. We obtain the optimal PPM constellations that ensure full diversity and maximize the QOSTBC's minimum coding gain distance. Simulation results show that …


Behavior-Based Mobility Prediction For Seamless Handoffs In Mobile Wireless Networks, Weetit Wanalertlak, Ben Lee, Chansu Yu, Myungchul Kim, Seung-Min Park, Won-Tae Kim Apr 2011

Behavior-Based Mobility Prediction For Seamless Handoffs In Mobile Wireless Networks, Weetit Wanalertlak, Ben Lee, Chansu Yu, Myungchul Kim, Seung-Min Park, Won-Tae Kim

Electrical and Computer Engineering Faculty Publications

The field of wireless networking has received unprecedented attention from the research community during the last decade due to its great potential to create new horizons for communicating beyond the Internet. Wireless LANs (WLANs) based on the IEEE 802.11 standard have become prevalent in public as well as residential areas, and their importance as an enabling technology will continue to grow for future pervasive computing applications. However, as their scale and complexity continue to grow, reducing handoff latency is particularly important. This paper presents the Behavior-based Mobility Prediction scheme to eliminate the scanning overhead incurred in IEEE 802.11 networks. This …


A Cooperative Diversity-Based Robust Mac Protocol In Wireless Ad Hoc Networks, Sangman Moh, Chansu Yu Mar 2011

A Cooperative Diversity-Based Robust Mac Protocol In Wireless Ad Hoc Networks, Sangman Moh, Chansu Yu

Electrical and Computer Engineering Faculty Publications

In interference-rich and noisy environment, wireless communication is often hampered by unreliable communication links. Recently, there has been active research on cooperative communication that improves the communication reliability by having a collection of radio terminals transmit signals in a cooperative way. This paper proposes a medium access control (MAC) algorithm, called Cooperative Diversity MAC (CD-MAC), which exploits the cooperative communication capability of the physical (PHY) layer to improve robustness in wireless ad hoc networks. In CD-MAC, each terminal proactively selects a partner for cooperation and lets it transmit simultaneously so that this mitigates interference from nearby terminals, and thus, improves …


On Reducing Communication Energy Using Cross-Sensor Coding Technique, Kien Nguyen, Thinh Nguyen, Sen-Ching Cheung Feb 2011

On Reducing Communication Energy Using Cross-Sensor Coding Technique, Kien Nguyen, Thinh Nguyen, Sen-Ching Cheung

Electrical and Computer Engineering Faculty Publications

This paper addresses the uneven communication energy problem in data gathering sensor networks where the nodes closer to the sink tend to consume more energy than those of the farther nodes. Consequently, the lifetime of a network is significantly shortened. We propose a cross-sensor coding technique using On-Off keying which exploits (a) the tradeoff between delay and energy consumption and (b) the network topology in order to alleviate the problem of unequal energy consumption. We formulate our coding problem as an integer linear programming problem and show how to construct a number of codes based on different criteria. We show …


Adaptive Multicast On Mobile Ad Hoc Networks Using Tree-Based Meshes With Variable Density Of Redundant Paths, Sangman Moh, Sang Jun Lee, Chansu Yu Nov 2009

Adaptive Multicast On Mobile Ad Hoc Networks Using Tree-Based Meshes With Variable Density Of Redundant Paths, Sangman Moh, Sang Jun Lee, Chansu Yu

Electrical and Computer Engineering Faculty Publications

Multicasting has been extensively studied for mobile ad hoc networks (MANETs) because it is fundamental to many ad hoc network applications requiring close collaboration of multiple nodes in a group. A general approach is to construct an overlay structure such as multicast tree or mesh and to deliver a multicast packet to multiple receivers over the overlay structure. However, it either incurs a lot of overhead (multicast mesh) or performs poorly in terms of delivery ratio (multicast tree). This paper proposes an adaptive multicast scheme, called tree-based mesh with k-hop redundant paths (TBM k ), …


Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang Apr 2009

Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang

Electrical and Computer Engineering Faculty Publications

A proactive recovery scheme based on service migration for long-running Byzantine fault-tolerant systems is described. Proactive recovery is an essential method for ensuring the long-term reliability of fault-tolerant systems that are under continuous threats from malicious adversaries. The primary benefit of our proactive recovery scheme is a reduced vulnerability window under normal operation. This is achieved in two ways. First, the time-consuming reboot step is removed from the critical path of proactive recovery. Second, the response time and the service migration latency are continuously profiled and an optimal service migration interval is dynamically determined during runtime based on the observed …


Minimizing Spatial And Time Reservation With Collision-Aware Dcf In Mobile Ad Hoc Networks, Lubo Song, Chansu Yu Jan 2009

Minimizing Spatial And Time Reservation With Collision-Aware Dcf In Mobile Ad Hoc Networks, Lubo Song, Chansu Yu

Electrical and Computer Engineering Faculty Publications

Carrier sensing is widely adopted in wireless communication to protect data transfers from collisions. For example, distributed coordination function (DCF) in IEEE 802.11 standard renders a node to defer its communication if it senses the medium busy. For the duration of deferment, each frame carries, in its MAC header, a 16-bit number in microseconds during which any overhearing node must defer. However, even if the carrier signal is detected, both ongoing and a new communication can be simultaneously successful depending on their relative positions in the network or equivalently, their mutual interference level. Supporting multiple concurrent communications is …


Maximizing Communication Concurrency Via Link-Layer Packet Salvaging In Mobile Ad Hoc Networks, Chansu Yu, Kang G. Shin, Lubo Song Apr 2007

Maximizing Communication Concurrency Via Link-Layer Packet Salvaging In Mobile Ad Hoc Networks, Chansu Yu, Kang G. Shin, Lubo Song

Electrical and Computer Engineering Faculty Publications

Carrier-sense medium access control (MAC) protocols such as the IEEE 802.11 distributed coordination function (DCF) avoid collisions by holding up pending packet transmission requests when a carrier signal is observed above a certain threshold. However, this often results in unnecessarily conservative communication, thus making it difficult to maximize the utilization of the spatial spectral resource. This paper shows that a higher aggregate throughput can be achieved by allowing more concurrent communications and adjusting the communication distance on the fly, which needs provisions for the following two areas. On the one hand, carrier sense-based MAC protocols do not allow aggressive communication …


End-To-End Latency Of A Fault-Tolerant Corba Infrastructure, Wenbing Zhao, Louise E. Moser, P. Michale Melliar-Smith May 2006

End-To-End Latency Of A Fault-Tolerant Corba Infrastructure, Wenbing Zhao, Louise E. Moser, P. Michale Melliar-Smith

Electrical and Computer Engineering Faculty Publications

This paper presents an evaluation of the end-to-end latency of a fault-tolerant CORBA infrastructure that we have implemented. The fault-tolerant infrastructure replicates the server applications using active, passive and semi-active replication, and maintains strong replica consistency of the server replicas. By analyses and by measurements of the running fault-tolerant infrastructure, we characterize the end-to-end latency under fault-free conditions. The main determining factor of the run-time performance of the fault-tolerant infrastructure is the Totem group communication protocol, which contributes to the end-to-end latency primarily in …


Power-Stepped Protocol: Enhancing Spatial Utilization In A Clustered Mobile Ad Hoc Network, Chansu Yu, Kang G. Shin, Ben Lee Sep 2004

Power-Stepped Protocol: Enhancing Spatial Utilization In A Clustered Mobile Ad Hoc Network, Chansu Yu, Kang G. Shin, Ben Lee

Electrical and Computer Engineering Faculty Publications

While most previous studies on mobile ad hoc networks (MANETs) rely on the assumption that nodes are randomly distributed in the network coverage area, this assumption is unlikely to hold, as nodes tend to be cluttered around hot spots like the site of an accident or disaster. We refer to this as a clustered layout. Intuitively, a MANET with the clustered layout may suffer from serious performance degradation due to the excessive collisions in congested hot spots and space underutilization of sparse areas. In this paper, we propose a power-controlled network protocol, called the power-stepped protocol (PSP), that maximizes the …


Frequency-Hopped Multiple-Access Communications With Noncoherent M-Ary Ofdm-Ask, A. Al-Dweik, Fuqin Xiong Jan 2003

Frequency-Hopped Multiple-Access Communications With Noncoherent M-Ary Ofdm-Ask, A. Al-Dweik, Fuqin Xiong

Electrical and Computer Engineering Faculty Publications

A noncoherent, bandwidth-efficient modulation scheme is proposed for frequency-hopping multiple-access (FH-MA) networks. The proposed scheme is a combination of noncoherent M-ary amplitude-shift keying (NMASK) and orthogonal frequency-division multiplexing (OFDM). Using this scheme minimizes the required data bandwidth. The number of frequency slots available to the users increases significantly for a fixed spread-spectrum bandwidth (BWSS). The effect of the multiple-access interference is reduced. Simple and accurate bit error rate expressions have been derived for FH-OFDM-MASK in additive white Gaussian noise channels and for FH-OFDM-ASK in Rayleigh fading channels.


Training Radial Basis Neural Networks With The Extended Kalman Filter, Daniel J. Simon Oct 2002

Training Radial Basis Neural Networks With The Extended Kalman Filter, Daniel J. Simon

Electrical and Computer Engineering Faculty Publications

Radial basis function (RBF) neural networks provide attractive possibilities for solving signal processing and pattern classification problems. Several algorithms have been proposed for choosing the RBF prototypes and training the network. The selection of the RBF prototypes and the network weights can be viewed as a system identification problem. As such, this paper proposes the use of the extended Kalman filter for the learning procedure. After the user chooses how many prototypes to include in the network, the Kalman filter simultaneously solves for the prototype vectors and the weight matrix. A decoupled extended Kalman filter is then proposed in order …


An Adaptive Scheme For Admission Control In Atm Networks, Saragur M. Srinidhi, William H. Thesling, Vijaya K. Konangi Apr 1997

An Adaptive Scheme For Admission Control In Atm Networks, Saragur M. Srinidhi, William H. Thesling, Vijaya K. Konangi

Electrical and Computer Engineering Faculty Publications

This paper presents a real time front-end admission control scheme for ATM networks. A call management scheme which uses the burstiness associated with traffic sources in a heterogeneous ATM environment to effect dynamic assignment of bandwidth is presented. In the proposed scheme, call acceptance is based on an on-line evaluation of the upper bound on cell loss probability which is derived from the estimated distribution of the number of calls arriving. Using this scheme, the negotiated quality of service will be assured when there is no estimation error. The control mechanism is effective when the number of …


Navigation Satellite Selection Using Neural Networks, Daniel J. Simon, Hossny El-Sherief May 1995

Navigation Satellite Selection Using Neural Networks, Daniel J. Simon, Hossny El-Sherief

Electrical and Computer Engineering Faculty Publications

The application of neural networks to optimal satellite subset selection for navigation use is discussed. The methods presented in this paper are general enough to be applicable regardless of how many satellite signals are being processed by the receiver. The optimal satellite subset is chosen by minimizing a quantity known as Geometric Dilution of Precision (GDOP), which is given by the trace of the inverse of the measurement matrix. An artificial neural network learns the functional relationships between the entries of a measurement matrix and the eigenvalues of its inverse, and thus generates GDOP without inverting a matrix. Simulation results …