Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

Systems and Communications

2010

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 17 of 17

Full-Text Articles in Digital Communications and Networking

Self-Stabilizing Group Membership Protocol, Mahesh Subedi Dec 2010

Self-Stabilizing Group Membership Protocol, Mahesh Subedi

UNLV Theses, Dissertations, Professional Papers, and Capstones

In this thesis, we consider the problem of partitioning a network into groups of bounded diameter.

Given a network of processes X and a constant D, the group partition problem is the problem of finding a D-partition of X, that is, a partition of X into disjoint connected subgraphs, which we call groups, each of diameter no greater than D. The minimal group partition problem is to find a D-partition {G1, ... Gm} of X such that no two groups can be combined; that is, for any Gi and Gj, where i ≠ j, either Gi U Gj is disconnected …


Software Engineering Issues For Mobile Application Development, Tony Wasserman Oct 2010

Software Engineering Issues For Mobile Application Development, Tony Wasserman

Tony Wasserman

This paper provides an overview of important software engineering research issues related to the development of applications that run on mobile devices. Among the topics are development processes, tools, user interface design, application portability, quality, and security.


Applying Image Matching To Video Analysis, Adam J. Behring Sep 2010

Applying Image Matching To Video Analysis, Adam J. Behring

Theses and Dissertations

Dealing with the volume of multimedia collected on a daily basis for intelligence gathering and digital forensics investigations requires significant manual analysis. A component of this problem is that a video may be reanalyzed that has already been analyzed. Identifying duplicate video sequences is difficult due to differences in videos of varying quality and size. This research uses a kd-tree structure to increase image matching speed. Keypoints are generated and added to a kd-tree of a large dimensionality (128 dimensions). All of the keypoints for the set of images are used to construct a global kd-tree, which allows nearest neighbor …


Attaining Realistic Simulations Of Mobile Ad-Hoc Networks, Derek J. Huber Jun 2010

Attaining Realistic Simulations Of Mobile Ad-Hoc Networks, Derek J. Huber

Theses and Dissertations

Mobile Ad-hoc Networks (MANET) are comprised of wireless systems that communicate without the assistance of centrally managed routers or base stations. MANET research and development has increased due to computing technologies offering smaller, faster, smarter, and more power efficient platforms to operate on. Largely the testing and evaluation of new and existing MANET protocols has resided in simulation environments. This is due in part to the complexities and expenses incurred when conducting real world tests. Many researchers have come to recognize that these current simulations tend to assume away critical components of the MANET domain. These assumptions are made either …


Characterization Of The Rfx400 For Use In Software Defined Radio, Edward Adams Jun 2010

Characterization Of The Rfx400 For Use In Software Defined Radio, Edward Adams

Computer Engineering

While software defined radio is an extremely flexible technology that is fairly rarely used, as a single purpose radio is much cheaper, it provides an excellent means of learning RF and communications skills through the lens of digital electronics, and it would behoove a Cal Poly student interested in these areas to take on a project in software defined radio. This project aims to lower the barrier to entry for future students to undertake such a project. The use of an up-converter/down-converter is documented for future students to interface with.


Ofdm Simulation In Matlab, Paul Guanming Lin Jun 2010

Ofdm Simulation In Matlab, Paul Guanming Lin

Electrical Engineering

The objective of this project is to demonstrate the concept and feasibility of an OFDM system, and investigate how its performance is changed by varying some of its major parameters. This objective is met by developing a MATLAB program to simulate a basic OFDM system. From the process of this development, the mechanism of an OFDM system can be studied; and with a completed MATLAB program, the characteristics of an OFDM system can be explored.


Touch Screen Sound Controller, James Fenley, Jonathan Law Jun 2010

Touch Screen Sound Controller, James Fenley, Jonathan Law

Electrical Engineering

The Touch Screen Sound Controller sets out to explore the use of a touch screen as a sound control interface for the disk jockey profession. In addition, the project aims to provide an alternate means of transferring audio data by way of TCP/IP communications as opposed to MIDI. By applying our method, a user may stream pulse-code modulated data from a server onto a client’s RAM via an Ethernet connection. A 32bit, 200MHz ARM9 microprocessor addresses data from the RAM and proceeds with executing DSP instructions from the user. The connection between the touch screen and the central microprocessor is …


5 Ghz Band Vehicle-To-Vehicle Channels: Models For Multiple Values Of Channel Bandwidth, Qiong Wu, David W. Matolak, Indranil Sen Jun 2010

5 Ghz Band Vehicle-To-Vehicle Channels: Models For Multiple Values Of Channel Bandwidth, Qiong Wu, David W. Matolak, Indranil Sen

Faculty Publications

In Sen and Matolak's earlier paper, 5-GHz-band vehicle-to-vehicle (V2V) channel models were presented for channel bandwidths of 5 and 10 MHz. In this paper, we provide additional tapped delay line models for bandwidths of 1, 20, 33.33, and 50 MHz based upon the data used in Sen and Matolak's paper. We provide tables of channel parameters for five types of V2V channel classes and also include example tap correlation coefficients. Root-mean-square delay spread values are summarized, as are values of bandwidth for which the channel frequency correlation takes values of 0.7 and 0.5. As with the results from Sen and …


Static And Dynamic Component Obfuscation On Reconfigurable Devices, Camdon R. Cady Mar 2010

Static And Dynamic Component Obfuscation On Reconfigurable Devices, Camdon R. Cady

Theses and Dissertations

Computing systems are used in virtually every aspect of our lives. Technology such as smart phones and electronically controlled subsystems in cars is becoming so commonly used that it is virtually ubiquitous. Sometimes, this technology can be exploited to perform functions that it was never intended to perform, or fail to provide information that it is supposed to protect. X-HIA was shown to be effective at identifying several circuit components in a significantly shorter time than previous identification methods. Instead of requiring a number of input/output pairings that grows factorially or exponentially as the circuit size grows, it requires only …


Modeling Computer Communication Networks In A Realistic 3d Environment, Charles R. Rowell Jr. Mar 2010

Modeling Computer Communication Networks In A Realistic 3d Environment, Charles R. Rowell Jr.

Theses and Dissertations

Communication network simulations have typically been visualized in the past through 2D representations, but this is insufficient for battlefield network scenarios. Visual representations of battlefield networks greatly benefit from 3D visualization due to its ability to retain asset location. This research investigates the feasibility of modeling a typical battlefield communication network in a realistic 3D manner and discusses the effects of doing so. The result is an open source, 3D network visualization tool that can create highly intuitive connected battlefield scenes, enabling the user to quickly comprehend network state. It highlights mobile assets, packet movement, and node connectivity while allowing …


Reverberation-Chamber Test Environment For Outdoor Urban Wireless Propagation Studies, Helge Fielitz, Kate A. Remley, Christopher L. Holloway, Qian Zhang, Qiong Wu, David W. Matolak Mar 2010

Reverberation-Chamber Test Environment For Outdoor Urban Wireless Propagation Studies, Helge Fielitz, Kate A. Remley, Christopher L. Holloway, Qian Zhang, Qiong Wu, David W. Matolak

Faculty Publications

We introduce a test environment to replicate the well-known clustering of reflections in power delay profiles arising from late-time delays and reflections. Urban wireless propagation environments are known to exhibit such clustering. The test setup combines discrete reflections generated by a fading simulator with the continuous distribution of reflections created in a reverberation chamber. We describe measurements made in an urban environment in Denver, CO, that illustrate these multiple distributions of reflections. Our comparison of measurements made in the urban environment to those made in the new test environment shows good agreement.


A Graduate Education In Software Management And The Software Business For Mid-Career Professionals, Ray Bareiss, Gladys Mercier Feb 2010

A Graduate Education In Software Management And The Software Business For Mid-Career Professionals, Ray Bareiss, Gladys Mercier

Ray Bareiss

Given the unique nature of the software business, the faculty of Carnegie Mellon University’s Silicon Valley campus concluded that mid-career software professionals would be better served by a tailored master’s degree focusing on software management and more broadly on the business of software than by a typical MBA. Our software management master’s program integrates business, technical, and soft skills to prepare our students for technical leadership in their current companies or in entrepreneurial ventures. Our initial program built on the strengths of Carnegie Mellon’s world-class software engineering education. We targeted students working in large companies, engaged in large-scale enterprise software …


Coaching Via Cognitive Apprenticeship, Ray Bareiss, Martin Radley Feb 2010

Coaching Via Cognitive Apprenticeship, Ray Bareiss, Martin Radley

Ray Bareiss

At Carnegie Mellon’s Silicon Valley campus we employ a learn by- doing educational approach in which nearly all student learning, and thus instruction, is in the context of realistic, team based projects. Consequently, we have adopted coaching as our predominant teaching model. In this paper we reflect on our experience with the nature of teaching by coaching using a framework derived from Cognitive Apprenticeship, and explain how we employ the techniques it suggests in our teaching. We also discuss a range of instructional tensions that arise in teaching by coaching and present a survey of student attitudes regarding the effectiveness …


E-Fraud Prevention Based On The Self-Authentication Of E-Documents, Jonathan Blackledge, Eugene Coyle Jan 2010

E-Fraud Prevention Based On The Self-Authentication Of E-Documents, Jonathan Blackledge, Eugene Coyle

Conference papers

We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bit array generating a binary image ciphertext. The output is then ‘embedded’ in a host image to hide the encrypted information. Embedding is undertaken either in the lowest 1-bit layer or multiple 1-bit layers. Decryption is accomplished by: (i) extracting the binary image from the host image; (ii) correlating the result with the original cipher. In principle, any cipher generator can be used for this purpose and the method has been …


The Changing Patterns Of Internet Usage, Christopher S. Yoo Jan 2010

The Changing Patterns Of Internet Usage, Christopher S. Yoo

All Faculty Scholarship

The Internet unquestionably represents one of the most important technological developments in recent history. It has revolutionized the way people communicate with one another and obtain information and created an unimaginable variety of commercial and leisure activities. Interestingly, many members of the engineering community often observe that the current network is ill-suited to handle the demands that end users are placing on it. Indeed, engineering researchers often describe the network as ossified and impervious to significant architectural change. As a result, both the U.S. and the European Commission are sponsoring “clean slate” projects to study how the Internet might be …


Embedded Systems As Datacenters, Robert Iannucci Dec 2009

Embedded Systems As Datacenters, Robert Iannucci

Robert A Iannucci

No abstract provided.


Upper Bounds On The Number Of Channels To Ensure Collision-Free Communications In Multi-Channel Wireless Networks Using Directional Antennas, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu Dec 2009

Upper Bounds On The Number Of Channels To Ensure Collision-Free Communications In Multi-Channel Wireless Networks Using Directional Antennas, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu

Hong-Ning Dai

Recent studies have found that using multiple channels can separate concurrent transmissions and significantly improve network throughput. However, these studies have only considered wireless nodes that are equipped with omni-directional antennas, which have high interference. On the other hand, other researchers have found that using directional antennas in wireless networks can reduce interference and improve the network performance. But their studies have only considered single channel to be used in wireless networks with directional antennas. Thus, integrating the two technologies of multiple channels and directional antennas together can potentially bring more benefits. Some previous works have studies the capacity on …