Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

New Jersey Institute of Technology

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 61 - 90 of 166

Full-Text Articles in Computer Engineering

Route Recovery Schemes For Link And Node Failure And Link Congestion, Ibrahim Takouna Aug 2007

Route Recovery Schemes For Link And Node Failure And Link Congestion, Ibrahim Takouna

Theses

Link/Node failure occurs frequently causing service disruption in computer networks. Hardware techniques have been developed to protect the network from Link/Node failure. These techniques work in physical layer, therefore their convergence time is very small. On the other hand, many schemes have been proposed to mitigate the failure influence on the network. These schemes work in upper layers such as the network layer. However, hardware solutions faster than other schemes, but they are expensive. Link/Node failure causes all flows which were using the failed link/node are temporarily interrupted till a new path reestablished.

Three recovery algorithms have been proposed that …


Development And Evaluation Of A Simultaneous Multithreading Processor Simulator, Carla Verena S. Nunez May 2007

Development And Evaluation Of A Simultaneous Multithreading Processor Simulator, Carla Verena S. Nunez

Theses

Modem processors are designed to achieve greater amounts of instruction level parallelism (ILP) and thread level parallelism (TLP). Simultaneous multithreading (SMT) is an architecture that exploits both LLP and TLP. It improves the utilization of the processor resources by allowing multiple independent threads to reside in the pipeline and dynamically scheduling the available resources among the threads.

The first part of this thesis presents the development of a simultaneous multithreading processor simulator. The SMT simulator is derived from SimpleScalar, a superscalar processor simulator widely used in the computer architecture research field. The basic pipeline is expanded to allow multiple threads …


Doppler Spread Estimation In Mobile Fading Channels, Hong Zhang Jan 2007

Doppler Spread Estimation In Mobile Fading Channels, Hong Zhang

Dissertations

The Doppler spread, or equivalently, the mobile speed, is a measure of the spectral dispersion of a mobile fading channel. Accurate estimation of the mobile speed is important in wireless mobile applications which require such as knowledge of the rate of channel variations. In this dissertation, first the performance of classical crossing- and covariance-based speed estimators is studied. Next, the problem of mobile speed estimation using diversity combining is investigated. Then, a nonparametric estimation technique is proposed that is robust to different channel variations. Finally, cyclostationarity-based speed estimators which can be applied either blindly or with the aid of pilot …


Non-Repudiation Secure File Transfer Protocol (Nrsftp), Jerry Chen Jan 2007

Non-Repudiation Secure File Transfer Protocol (Nrsftp), Jerry Chen

Theses

Non Repudiation Secure File Transfer Protocol (NRSFTP) is designed to resolve three main concerns for today's electronic file transfer methodology. The three main concerns are Non-Repudiation, Secure, and Non-Real Time file transfer. Non-repudiation is to assure the receiver that the sender of the document is not an imposter. Secure document transfer is to assure the sender that only the intended receiver will be able to read the document. Non-real-time file transfer is to provide convenient and low cost transportability of the encrypted data from one party to another. With the above three concerns addressed, the NRSFTP protocol can be widely …


On Mitigating Distributed Denial Of Service Attacks, Zhiqiang Gao Aug 2006

On Mitigating Distributed Denial Of Service Attacks, Zhiqiang Gao

Dissertations

Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the wellbeing of the Internet. How to mitigate these attacks effectively and efficiently has become an active research area. The critical issues here include 1) IP spoofing, i.e., forged source lIP addresses are routinely employed to conceal the identities of the attack sources and deter the efforts of detection, defense, and tracing; 2) the distributed nature, that is, hundreds or thousands of compromised …


A Wireless Method For Monitoring Medication Compliance, Jeffrey Scott Jonas Aug 2006

A Wireless Method For Monitoring Medication Compliance, Jeffrey Scott Jonas

Theses

There are many devices on the market to help remind patients to take their pills, but most require observation by a caregiver to assure medication compliance. This project demonstrates three modes to detect pill removal from a pillbox: a switch under the pills, a reflective type photointerrupter and a transmissive "electric eye" photosensor. Each mode exhibited blind spots or other failures to detect pill presence, but by combining modes with complementary characteristics, the accuracy of pill detection is greatly increased.

Two methods of caregiver notification are demonstrated: text messages transmitted via an attached cellular phone, or the status is collected …


Fpga-Based Implementation Of Parallel Graph Partitioning, Mohammad Kharashgeh Aug 2006

Fpga-Based Implementation Of Parallel Graph Partitioning, Mohammad Kharashgeh

Theses

Graph partitioning is a very important application that can be found in numerous areas, from finite element methods to data processing and VLSI circuit design. Many algorithms have been developed to solve this problem. Of special interest is multilevel graph partitioning that provides a very efficient solution. This method can also be parallelized and implemented on various multiprocessor architectures. Unfortunately, the target of such implementations is often unavailable high-end multiprocessor systems. Here a parallel version of this method for an in-house developed multiprocessor system is implemented on an FPGA. The system designed provides a cost-effective solution.

The design is based …


Location Estimation In A 3d Environment Using Radio Frequency Identification Tags, Adwitiya Akash Jain May 2006

Location Estimation In A 3d Environment Using Radio Frequency Identification Tags, Adwitiya Akash Jain

Theses

RFID tag location estimation in a 3D environment is investigated. The location of the tag with unknown coordinates can be estimated with certain accuracy. However, accuracy can be improved using the knowledge based on measurement of additional reference tags with known location. This thesis studies the mathematical formulation and practical realization of location sensing using RFID tags.

Deviating from the standard use of RFID technology which employs one tag reader to identify the presence of tag, here multiple tag readers with known location are used to estimate the physical location of an individual tag, with/without the help of few reference …


Classification, Testing And Optimization Of Intrusion Detection Systems, Javier Leon May 2006

Classification, Testing And Optimization Of Intrusion Detection Systems, Javier Leon

Theses

Modem network security products vary greatly in their underlying technology and architecture. Since the introduction of intrusion detection decades ago, intrusion detection technologies have continued to evolve rapidly. This rapid change has led to the introduction of a wealth of security devices, technologies and algorithms that perform functions originally associated with intrusion detection systems.

This thesis offers an analysis of intrusion detection technologies, proposing a new classification system for intrusion detection systems. Working closely with the development of a new intrusion detection product, this thesis introduces a method of testing related technologies in a production environment by outlining and executing …


New Hybrid Automatic Repeat Request (Harq) Scheme For 4x4 Mimo System, Based On The Extended Alamouti Quasi-Orthogonal Space-Time Bloc Coding (Q-Stbc), In Invariant And Variant Fading Channel, Jordi Ferrer Torras May 2006

New Hybrid Automatic Repeat Request (Harq) Scheme For 4x4 Mimo System, Based On The Extended Alamouti Quasi-Orthogonal Space-Time Bloc Coding (Q-Stbc), In Invariant And Variant Fading Channel, Jordi Ferrer Torras

Theses

A new Hybrid Automatic Repeat reQuest (HARQ) combining scheme for a 4x4 Multiple Input Multiple Output (MIMO) system in invariant and variant fading channel conditions is proposed and analized. Based on the Extended Alamouti Quasi-orthogonal Space-Time Block Coding (Q-STBC), the use of the so-called Alternative Matrices for transmission, depending on the Channel State Information (CSI) received as feedback, is compared to other existing solutions.

Sign changes and permutations in the retransmission sequences allow reducing the interference while exploiting the spatial diversity to introduce some gain in the signal power. The best transmission order is selected by the Determinant Criterion, which …


Design And Stability Analysis Of High Performance Packet Switches, Zhen Guo Jan 2006

Design And Stability Analysis Of High Performance Packet Switches, Zhen Guo

Dissertations

With the rapid development of optical interconnection technology, high-performance packet switches are required to resolve contentions in a fast manner to satisfy the demand for high throughput and high speed rates. Combined input-crosspoint buffered (CICB) switches are an alternative to input-buffered (IB) packet switches to provide high-performance switching and to relax arbitration timing for packet switches with high-speed ports.

A maximum weight matching (MWM) scheme can provide 100% throughput under admissible traffic for lB switches. However, the high complexity of MWM prohibits its implementation in high-speed switches. In this dissertation, a feedback-based arbitration scheme for CICB switches is studied, where …


Probabilistic Approaches To The Design Of Wireless Ad Hoc And Sensor Networks, Zhen Guo Jan 2006

Probabilistic Approaches To The Design Of Wireless Ad Hoc And Sensor Networks, Zhen Guo

Dissertations

The emerging wireless technologies has made ubiquitous wireless access a reality and enabled wireless systems to support a large variety of applications. Since the wireless self-configuring networks do not require infrastructure and promise greater flexibility and better coverage, wireless ad hoc and sensor networks have been under intensive research. It is believed that wireless ad hoc and sensor networks can become as important as the Internet. Just as the Internet allows access to digital information anywhere, ad hoc and sensor networks will provide remote interaction with the physical world.

Dynamics of the object distribution is one of the most important …


Multilevel Adaptive Security System, Hongwei Li Jan 2006

Multilevel Adaptive Security System, Hongwei Li

Dissertations

Recent trends show increased demand for content-rich media such as images, videos and text in ad-hoc communication. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such information over resource constrained ad hoc networks. In this work, traditional data security mechanisms, existing ad hoc secure routing protocols and multilevel security are first reviewed. Then a new system, called the Multilevel Adaptive Security System, which incorporates the multilevel security concept at both the application layer and the network layer, is proposed to provide adaptive security services for data and routing processes.

MLASS …


Design And Resource Management Of Reconfigurable Multiprocessors For Data-Parallel Applications, Xiaofang Wang Jan 2006

Design And Resource Management Of Reconfigurable Multiprocessors For Data-Parallel Applications, Xiaofang Wang

Dissertations

FPGA (Field-Programmable Gate Array)-based custom reconfigurable computing machines have established themselves as low-cost and low-risk alternatives to ASIC (Application-Specific Integrated Circuit) implementations and general-purpose microprocessors in accelerating a wide range of computation-intensive applications. Most often they are Application Specific Programmable Circuiits (ASPCs), which are developer programmable instead of user programmable. The major disadvantages of ASPCs are minimal programmability, and significant time and energy overheads caused by required hardware reconfiguration when the problem size outnumbers the available reconfigurable resources; these problems are expected to become more serious with increases in the FPGA chip size. On the other hand, dominant high-performance computing …


Hfo2 As Gate Dielectric On Si And Ge Substrate, Reenu Garg Jan 2006

Hfo2 As Gate Dielectric On Si And Ge Substrate, Reenu Garg

Dissertations

Hafnium oxide HfO2 has been considered as an alternative to silicon dioxide SiO2 in future nano-scale complementary metal-oxide-semiconductor (CMOS) devices since it provides the required capacitance at the reduced device size because of its high dielectric constant. HfO2 films are currently deposited by various techniques. Many of them require high temperature annealing that can impact device performance and reliability.

In this research, electrical characteristics of capacitors with HfO2 as gate dielectric deposited by standard thermal evaporation and e-beam evaporation on Si and Ge substrates were investigated. The dielectric constant of HfO2 deposited by thermal evaporation …


Online Clustering With Single-Pass Topology Based Fuzzy Clustering Algorithm, Abhishek Jaiantilal Jan 2006

Online Clustering With Single-Pass Topology Based Fuzzy Clustering Algorithm, Abhishek Jaiantilal

Theses

Online clustering is of significant interest for real-time data analysis. Generic offline clustering methods such as K-Means, C-Means and others are computationally expensive. The computational burden of these methods increases non-linearly with the size of the data set. In addition these methods usually require a good amount of supervised knowledge yielding a non-unique solution. For real-time data analysis, there is an important tradeoff between accuracy and computational efficiency. An unsupervised one-pass clustering method that efficiently adapts to data distribution and evaluation is proposed. This method, Topology-Based Fuzzy Clustering (TFC), uses the topology of data to discover clusters. TFC uses the …


New Hybrid Automatic Repeat Request (Harq) Combining With Space Time Block Coding (Stbc) In Invariant And Variant Fading Channel, Guillem Ernest Malagarriga Vilella Jan 2006

New Hybrid Automatic Repeat Request (Harq) Combining With Space Time Block Coding (Stbc) In Invariant And Variant Fading Channel, Guillem Ernest Malagarriga Vilella

Theses

Hybrid Automatic Repeat reQuest (HARQ) combining for space time block coding Multiple Input Multiple Output (MIMO) system consisting of N transmit antennas and M receive antennas (NxM) in a time invariant channel and in a time varying channel is proposed and its performance is analyzed. Based on the measured channel matrix, the receiver chooses the best retransmission order and communicated it to the transmitter.

The scheme, where this algorithm is performed, is a combination of a precombining HARQ scheme and the Multiple Alamouti Space-Time Block Coding (MASTBC), which is suitable for more than 2 transmit antennas. The combination of this …


Evaluation Of Coding Scheme For Mimo Radar, Suresh Kumar Harikrishnan Aug 2005

Evaluation Of Coding Scheme For Mimo Radar, Suresh Kumar Harikrishnan

Theses

Multiple Input Multiple Output (MIMO) antenna systems have shown a great potential for wireless communication. These systems support high capacity, increased diversity and interference suppression. Recently it has been proposed MIMO constellations for Radar. MIMO Radar is not only a new research field, but also a very promising approach in terms of overcoming Radar Cross Section (RCS) fluctuations with diversity. This thesis explores the potential of coding schemes for MIMO Radar.

The ambiguity functions measures related to MIMO Radar are used to evaluate how much diversity gain can be coherently achieved with certain coding schemes. The results of this analysis …


An Analytical Model Of Mac Protocol Dependant Power Consumption In Multi-Hop Ad Hoc Wireless Sensor Networks, Komlan Egoh Aug 2005

An Analytical Model Of Mac Protocol Dependant Power Consumption In Multi-Hop Ad Hoc Wireless Sensor Networks, Komlan Egoh

Theses

Power efficiency is the most constraining requirement for viable operation of battery-powered networked sensors. Conventionally, dynamic power management (DPM) is used to put sensor nodes into different states such as active, idle, and sleep, each consuming a certain level of power. Within the active state, communication operational states, such as receive and transmit consume different levels of nodal power. This thesis shows how DPM states and protocol operational states can be combined into a single stochastic model to finely evaluate the power consumption performance of a medium access control (MAC) protocol. The model is formulated as a semi-Markov decision process …


Security Information Management With Frame-Based Attack Presentation And First-Order Reasoning, Wei Yan May 2005

Security Information Management With Frame-Based Attack Presentation And First-Order Reasoning, Wei Yan

Dissertations

Internet has grown by several orders of magnitude in recent years, and this growth has escalated the importance of computer security. Intrusion Detection System (IDS) is used to protect computer networks. However, the overwhelming flow of log data generated by IDS hamper security administrators from uncovering new insights and hidden attack scenarios. Security Information Management (SIM) is a new growing area of interest for intrusion detection. The research work in this dissertation explores the semantics of attack behaviors and designs Frame-based Attack Representation and First-order logic Automatic Reasoning (FAR-FAR) using linguistics and First-order Logic (FOL) based approaches. Techniques based on …


Tcp Performance Enhancement In Wireless Networks Via Adaptive Congestion Control And Active Queue Management, Kai Xu May 2005

Tcp Performance Enhancement In Wireless Networks Via Adaptive Congestion Control And Active Queue Management, Kai Xu

Dissertations

The transmission control protocol (TCP) exhibits poor performance when used in error-prone wireless networks. Remedy to this problem has been an active research area. However, a widely accepted and adopted solution is yet to emerge. Difficulties of an acceptable solution lie in the areas of compatibility, scalability, computational complexity and the involvement of intermediate routers and switches.

This dissertation rexriews the current start-of-the-art solutions to TCP performance enhancement, and pursues an end-to-end solution framework to the problem. The most noticeable cause of the performance degradation of TCP in wireless networks is the higher packet loss rate as compared to that …


A Versatile Programming Model For Dynamic Task Scheduling On Cluster Computers, Dejiang Jin May 2005

A Versatile Programming Model For Dynamic Task Scheduling On Cluster Computers, Dejiang Jin

Dissertations

This dissertation studies the development of application programs for parallel and distributed computer systems, especially PC clusters. A methodology is proposed to increase the efficiency of code development, the productivity of programmers and enhance performance of executing the developed programs on PC clusters while facilitating improvement of scalability and code portability of these programs. A new programming model, named the Super-Programming Model (SPM), is created. Programs are developed assuming an instruction set architecture comprised of SuperInstructions (SIs). SPM models the target system as a large Virtual Machine (VM); VM contains functional units which are underlain with sub-computer systems and SIs …


Enabling Cost Aware Routing With Auctions In Wireless Ad-Hoc Networks, Ali Yuksel May 2005

Enabling Cost Aware Routing With Auctions In Wireless Ad-Hoc Networks, Ali Yuksel

Theses

Battery power is a precious resource in wireless ad-hoc networks, and most routing protocols that have been proposed so far do not generate cost efficient routes. In this thesis, a novel auction-based cost-aware routing scheme, called CARA, is presented. CARA is designed as an extension of the MAC layer, and is shown to improve the cost efficiency of existing ad-hoc routing protocols through dynamic power control, while introducing only minimal additional overhead. The MAC layer at each node is given the capability to run local sealed-bid second-price auctions for the user data packets that need to be transmitted, and to …


Cluster-Based Wireless Mobile Ad-Hoc Network Security, Mandur Bajra Bajracharya May 2005

Cluster-Based Wireless Mobile Ad-Hoc Network Security, Mandur Bajra Bajracharya

Theses

A wireless ad-hoc network is a cooperative communication network deployed with a specific purpose. It is characterized by dynamically changing topology with no fixed infrastructure which exhibits a perfectly vulnerable state for a number of different kinds of attacks.

This thesis proposes a novel technique of achieving security in wireless mobile ad hoc networks by integrating a simple clustering and a voting mechanism together. The purpose of forming a cluster is to facilitate security in the network and the voting is performed to support the decision making process in the cluster. A procedure of forming small homogenous clusters throughout the …


Planar Visual Fusion Scintigraphy, Jacob Puthiamadathil May 2005

Planar Visual Fusion Scintigraphy, Jacob Puthiamadathil

Theses

Planar scintigraphy, while providing useful information about the distribution of the radiopharmaceutical being used, often does not provide adequate information about the surrounding anatomical structures. A proposed method to solve this problem is by registering and fusing a scintigraphic image with a digital visual image. Fusing planar scintigraphic images with visual photographic images to supply an anatomic correlate to regions of radiopharmaceutical accumulation has been explored in this study. The digital visual image will provide a context for the relevant structures in the scintigraphic image. The validity of using one set of affine transformation parameters for registering all patient data …


Qos Constrained Cellular Ad Hoc Augmented Networks, Chi-Tung Chen Jan 2005

Qos Constrained Cellular Ad Hoc Augmented Networks, Chi-Tung Chen

Dissertations

In this dissertation, based on different design criteria, three novel quality of service (QoS) constrained cellular ad hoc augmented network (CAHAN) architectures are proposed for next generation wireless networks. The CAHAN architectures have a hybrid architecture, in which each MT of CDMA cellular networks has ad hoc communication capability. The CAHAN architectures are an evolutionary approach to conventional cellular networks. The proposed architectures have good system scalability and high system reliability.

The first proposed architecture is the QoS constrained minimum-power cellular ad hoc augmented network architecture (QCMP CAHAN). The QCMP CAHAN can find the optimal minimum-power routes under the QoS …


Scalable Wide Area Ad-Hoc Networking, Nithin Bose Jan 2005

Scalable Wide Area Ad-Hoc Networking, Nithin Bose

Theses

The scalability problem of routing algorithms in Mobile Ad-hoc networks (MANET) has conventionally been addressed by introducing hierarchical architectures, clusters, and neighborhood zones. In all of these approaches, some nodes are assigned different routing related roles than others. Examples include cluster heads, virtual backbones and border nodes. The selection of these nodes on a fixed or dynamic basis adds complexity to the routing algorithm, in addition to placing significant demands on mobility and power consumption of these nodes. Furthermore, the scalability achieved with hierarchical architectures or partitions is limited.

This thesis demonstrates that location awareness can greatly aid in MANET …


An Autonomous Router-Based Solution To Detect And Defend Low Rate Ddos Attacks, Karunakar Anantharam Jan 2005

An Autonomous Router-Based Solution To Detect And Defend Low Rate Ddos Attacks, Karunakar Anantharam

Theses

Internet security was not a concern when the Internet was invented, but we cannot deny this fact anymore. Since all forms of businesses and communications are aligned to the Internet in one form or the other, the security of these assets (both infrastructure and content) is of prime importance. Some of the well known consequences of an attack include gaining access to a network, intellectual property thefts, and denial of service.

This thesis focuses on countering flood-type attacks that result in denial of service to end users. A new classification of this denial of service attacks, known as the low …


A Co-Processor Design To Support Mpi Primitives In Configurable Multiprocessor Designs, Rohan Bafna Jan 2005

A Co-Processor Design To Support Mpi Primitives In Configurable Multiprocessor Designs, Rohan Bafna

Theses

The Message-Passing Interface (MIPI) is a widely used standard for inter-processor communication in parallel computers. This standard is normally implemented in software, thus resulting in large communication latencies. A hardware implementation can reduce communication latencies significantly, thereby increasing the bandwidth. However, this approach cannot be applied in practice to the very large set of functions in MPI.

Reconfigurable computing has reached levels where entire parallel systems can be built inside one or more FPGAs (Field-Programmable Gate Arrays). In this scheme, specialized components must be built for inter-processor communication and the resulting code is difficult to port to other reconfigurable platforms. …


Ultra Wideband Communication Link, Preeti Singh Aug 2004

Ultra Wideband Communication Link, Preeti Singh

Theses

Ultra-wideband communication (UWB) has been a topic of extensive research in recent years especially for its short-range communication and indoor applications. The preliminary objective of the project was to develop a description and understanding of the basic components of the communication link at microwave frequencies in order to achieve the primary objective of establishing a communication setup at a bandwidth of 2.5 GHz for testing Ultra Wideband (UWB) antennas. This was achieved with the aid of commercially available optical system which was modified for the purpose. Beginning with the generation of baseband narrow pulses with energy spanning over a broad …