Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

Systems and Communications

2013

Institution
Keyword
Publication
Publication Type

Articles 1 - 22 of 22

Full-Text Articles in Digital Communications and Networking

A Study On Countermeasures Against Steganography: An Active Warden Approach, Qilin Qi Dec 2013

A Study On Countermeasures Against Steganography: An Active Warden Approach, Qilin Qi

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

Digital steganography is a method used for hiding information in digital images. It can be used for secure communication. There have been many robust digital steganography methods invented in recent decades. The steganographic message can be inserted in multimedia cover signal such as audio, image and video. However, this technique also may be used by malicious users to transmit dangerous information through the Internet beyond the control of security agencies. How to detect and/or block potentially dangerous information transmission on the Internet through billions of multimedia files while not affecting innocent multimedia communications becomes a challenging problem. Existing steganalysis methods …


Novel Online Data Cleaning Protocols For Data Streams In Trajectory, Wireless Sensor Networks, Sitthapon Pumpichet Nov 2013

Novel Online Data Cleaning Protocols For Data Streams In Trajectory, Wireless Sensor Networks, Sitthapon Pumpichet

FIU Electronic Theses and Dissertations

The promise of Wireless Sensor Networks (WSNs) is the autonomous collaboration of a collection of sensors to accomplish some specific goals which a single sensor cannot offer. Basically, sensor networking serves a range of applications by providing the raw data as fundamentals for further analyses and actions. The imprecision of the collected data could tremendously mislead the decision-making process of sensor-based applications, resulting in an ineffectiveness or failure of the application objectives. Due to inherent WSN characteristics normally spoiling the raw sensor readings, many research efforts attempt to improve the accuracy of the corrupted or “dirty” sensor data. The dirty …


Trajectory Privacy Preservation In Mobile Wireless Sensor Networks, Xinyu Jin Oct 2013

Trajectory Privacy Preservation In Mobile Wireless Sensor Networks, Xinyu Jin

FIU Electronic Theses and Dissertations

In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". …


An Ant-Based Sensor Measurement Data Gathering System, Bolun Zhang, Dimitrios Peroulis Oct 2013

An Ant-Based Sensor Measurement Data Gathering System, Bolun Zhang, Dimitrios Peroulis

The Summer Undergraduate Research Fellowship (SURF) Symposium

Large-scale industries involved with a great amount of sensor measurements in their work are facing many challenges in data collection. Sensors are not on the same network; therefore each measurement has to be managed separately. Gathering all the measurement data to one terminal could be difficult. Once a measurement is obtained, it takes significant amount of time to process the data.The approaches our group takes here is to build a giant ANT wireless network that holds all the sensors’ measurements. To be more specific, every sensor has an ANT chip set up on its side. Each ANT chip is as …


Adaptive Ofdm For Wireless Interconnect In Confined Enclosures, Vit Sipal, Javier Gelabert, Christopher J. Stevens, Ben Allen, David Edwards Jul 2013

Adaptive Ofdm For Wireless Interconnect In Confined Enclosures, Vit Sipal, Javier Gelabert, Christopher J. Stevens, Ben Allen, David Edwards

Articles

This letter considers and recommends OFDM with adaptive subcarrier modulation as a suitable candidate for wireless UWB communication in computer chassis. A rigorous measurement campaign studies the guaranteed spectral efficiency. It concludes that enhancement of the existing WiMedia OFDM systems with a bandwidth of 528 MHz in order to support adaptive OFDM would enable data-rates above 1 Gbps over short ranges, i.e. the spectral efficiency would be doubled. Moreover, the guaranteed spectral efficiency is shown to increase with bandwidth, i.e. the guaranteed data-rate increases better than linearly with bandwidth.


Pier Portal Project Ii, Andy Lam, Brian Markwart Jun 2013

Pier Portal Project Ii, Andy Lam, Brian Markwart

Computer Engineering

The goal of this project is to design and build a remotely controllable camera system that will be deployed at the Cal Poly Pier located in Avila Beach. The system is composed of a camera and all of its lighting and movement controlling hardware enclosed into a waterproof acrylic tube, allowing it to be lowered underwater. The camera will stream its video feed onto a website where any user will be able to watch a live video stream from the pod. In addition, users with the correct privileges will be able to remotely control of the camera system via the …


Design Of An Energy Efficient Virtual End Node Client Using Openadr2.0a And Smap, Kevin Navero Jun 2013

Design Of An Energy Efficient Virtual End Node Client Using Openadr2.0a And Smap, Kevin Navero

BioResource and Agricultural Engineering

Demand Response (DR) describes the set of actions taken to impose a reduction in electrical loads to stabilize the power grid and decrease costs. It is used when power grid emergencies or extremely high demand and congestion, threaten the electricity supply-demand balance. Automated Demand Response (ADR) describes a web-based control system that triggers DR events automatically by signaling other pre-programmed control systems. This project intends to use the OpenADR2.0 specifications provided by the OpenADR Alliance to construct an open source Virtual End Node (VEN) client to retrieve DR signals. The Simple Measurement and Actuation Profile (sMAP) software is also used …


Path Loss In An Urban Peer-To-Peer Channel For Six Public-Safety Frequency Bands, David W. Matolak, Qian Zhang, Qiong Wu Jun 2013

Path Loss In An Urban Peer-To-Peer Channel For Six Public-Safety Frequency Bands, David W. Matolak, Qian Zhang, Qiong Wu

Faculty Publications

We provide path loss data and models for a peer-to-peer wireless channel for an urban environment in six public safety bands, for simultaneous transmission to five spatially separated receiving sites. Results are from measurements in Denver, Colorado. The six frequencies at which we measured are (in MHz) 430, 750, 905, 1834, 2400, and 4860. Both line-of-sight and non-line-of-sight conditions were covered, and we quantify path loss exponents and linear-fit standard deviations as functions of frequency and location. Line-of-sight results agree with prior work, but non-line-of-sight exponents, from 3.6-7.3, are generally larger than in most other references.


Adaptive Control Of Apache Web Server, Erik Reed, Abe Ishihara, Ole J. Mengshoel May 2013

Adaptive Control Of Apache Web Server, Erik Reed, Abe Ishihara, Ole J. Mengshoel

Ole J Mengshoel

Traffic to a Web site can vary dramatically. At the same time it is highly desirable that a Web site is reactive. To provide crisp interaction on thin clients, 150 milliseconds has been suggested as an upper bound on response time. Unfortunately, the popular Apache Web server is limited in its capabilities to be reactive under varying traffic. To address this problem, we design in this paper an adaptive controller for the Apache Web server. A modified recursive least squares algorithm is used to identify system dynamics and a minimum degree pole placement controller is implemented to adjust the maximum …


Wireless Transmission Network : A Imagine, Radhey Shyam Meena Engineer, Neeraj Kumar Garg Asst.Prof Apr 2013

Wireless Transmission Network : A Imagine, Radhey Shyam Meena Engineer, Neeraj Kumar Garg Asst.Prof

Radhey Shyam Meena

World cannot be imagined without electrical power. Generally the power is transmitted through transmission networks. This paper describes an original idea to eradicate the hazardous usage of electrical wires which involve lot of confusion in particularly organizing them. Imagine a future in which wireless power transfer is feasible: cell phones, household robots, mp3 players, laptop computers and other portable electronic devices capable of charging themselves without ever being plugged in freeing us from that final ubiquitous power wire. This paper includes the techniques of transmitting power without using wires with an efficiency of about 95% with non-radioactivemethods. In this paper …


Stochastic Modeling And Time-To-Event Analysis Of Voip Traffic, Imad Al Ajarmeh Mar 2013

Stochastic Modeling And Time-To-Event Analysis Of Voip Traffic, Imad Al Ajarmeh

College of Computing and Digital Media Dissertations

Voice over IP (VoIP) systems are gaining increased popularity due to the cost effectiveness, ease of management, and enhanced features and capabilities. Both enterprises and carriers are deploying VoIP systems to replace their TDM-based legacy voice networks. However, the lack of engineering models for VoIP systems has been realized by many researchers, especially for large-scale networks. The purpose of traffic engineering is to minimize call blocking probability and maximize resource utilization. The current traffic engineering models are inherited from the legacy PSTN world, and these models fall short from capturing the characteristics of new traffic patterns. The objective of this …


Battery Energy Storage System In Solar Power Generation, Radhey Shyam Meena Er., Deepa Sharma Mar 2013

Battery Energy Storage System In Solar Power Generation, Radhey Shyam Meena Er., Deepa Sharma

Radhey Shyam Meena

Grid-connected solar PV dramatically changes the load profile of an electric utility customer. The expected widespread adoption of solar generation by customers on the distribution system poses significant challenges to system operators both in transient and steady state operation, from issues including voltage swings, sudden weather-induced changes in generation, and legacy protective devices designed with one-way power flow in mind


On Spectrum Probing In Cognitive Radio Networks: Does Randomization Matter, Chao Chen, Zesheng Chen, Todor Cooklev, Carlos Pomalaza-Ráez Feb 2013

On Spectrum Probing In Cognitive Radio Networks: Does Randomization Matter, Chao Chen, Zesheng Chen, Todor Cooklev, Carlos Pomalaza-Ráez

Todor Cooklev

In cognitive radio networks, dynamic spectrumaccess is achieved by allowing secondary users (SUs) to probethe spectrum and utilize available channels opportunistically.Spectrum probing mechanisms should be efficient and fast toavoid harmful interference with primary users (PUs). Periodicprobing has been commonly adopted as a default spectrumprobing mechanism. In this paper, we attempt to study differentspectrum probing mechanisms and evaluate a performance metriccalled the probing delay, i.e., how quickly a probing mechanismcan detect a channel change. We find that randomization in theprobing strategy does affect the probing delay. Specifically, in theindependent sensing scenario, periodic probing indeed achievesthe smallest probing delay. In the cooperative …


Greek Patent Protection System And The Impacts Of Information Technology Industry, Emmanouil Alexander Zografakis Ez Feb 2013

Greek Patent Protection System And The Impacts Of Information Technology Industry, Emmanouil Alexander Zografakis Ez

Emmanouil Alexander Zografakis EZ

Our era can be characterized as the era of knowledge proliferation and bountifulness. That has marked our era as the era following the pace of the Information Society Development. Information Society has also brought about a remarkable IT development pace over countries. Thereby, it is greatly important all that raw knowledge to become mind figments, ideas and even inventions and innovations. It is also essential to highlight that such a beneficial process will ensure the continuity of the IT development. The only way to achieve that goal is to find a way to secure all that aforementioned knowledge which is …


Battery Energy Storage System In Solar Power Generation, Radhey Shyam Meena Er. Jan 2013

Battery Energy Storage System In Solar Power Generation, Radhey Shyam Meena Er.

Radhey Shyam Meena

As solar photovoltaic power generation becomes more commonplace, the inherent intermittency of the solar resource poses one of the great challenges to those who would design and implement the next generation smart grid. Specifically, grid-tied solar power generation is a distributed resource whose output can change extremely rapidly, resulting in many issues for the distribution system operator with a large quantity of installed photovoltaic devices. Battery energy storage systems are increasingly being used to help integrate solar power into the grid. These systems are capable of absorbing and delivering both real and reactive power with sub-second response times. With these …


Independent Component Analysis Enhancements For Source Separation In Immersive Audio Environments, Yue Zhao Jan 2013

Independent Component Analysis Enhancements For Source Separation In Immersive Audio Environments, Yue Zhao

Theses and Dissertations--Electrical and Computer Engineering

In immersive audio environments with distributed microphones, Independent Component Analysis (ICA) can be applied to uncover signals from a mixture of other signals and noise, such as in a cocktail party recording. ICA algorithms have been developed for instantaneous source mixtures and convolutional source mixtures. While ICA for instantaneous mixtures works when no delays exist between the signals in each mixture, distributed microphone recordings typically result various delays of the signals over the recorded channels. The convolutive ICA algorithm should account for delays; however, it requires many parameters to be set and often has stability issues. This thesis introduces the …


Connectivity Of Wireless Ad Hoc Networks: Impacts Of Antenna Models, Qiu Wang, Hong-Ning Dai, Qinglin Zhao Dec 2012

Connectivity Of Wireless Ad Hoc Networks: Impacts Of Antenna Models, Qiu Wang, Hong-Ning Dai, Qinglin Zhao

Hong-Ning Dai

This paper concerns the impact of various antenna models on the network connectivity of wireless ad hoc networks. Existing antenna models have their pros and cons in the accuracy reflecting realistic antennas and the computational complexity. We therefore propose a new directional antenna model called Approx-real to balance the accuracy against the complexity. We then run extensive simulations to compare the existing models and the Approx-real model in terms of the network connectivity. The study results show that the Approx-real model can better approximate the best accurate existing antenna models than other simplified antenna models, while introducing no high computational …


On Busy-Tone Based Mac Protocol For Wireless Networks With Directional Antennas, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu Dec 2012

On Busy-Tone Based Mac Protocol For Wireless Networks With Directional Antennas, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu

Hong-Ning Dai

The application of directional antennas in wireless ad hoc networks offers numerous benefits, such as the extended communication range, the increased spatial reuse, the improved capacity and the suppressed interference. However, directional antennas can cause new location-dependent carrier sensing problems, such as new hidden terminal and deafness problems, which can severely degrade the network performance. Recently, a few schemes have been proposed to address these problems. However, most of these existing methods can only partially solve the hidden terminal and deafness problems. Some of them even bring significant performance overhead. In this paper, we propose a novel MAC protocol, in …


Eavesdropping Security In Wireless Ad Hoc Networks With Directional Antennas, Qiu Wang, Hong-Ning Dai, Qinglin Zhao Dec 2012

Eavesdropping Security In Wireless Ad Hoc Networks With Directional Antennas, Qiu Wang, Hong-Ning Dai, Qinglin Zhao

Hong-Ning Dai

The eavesdropping security of wireless ad hoc networks has attracted considerable attention recently. However, most of current studies only consider OMN networks, where each node is mounted with a single omni-directional antenna, which radiates radio signals in all directions and consequently leads to the high eavesdropping possibility. Compared with an omnidirectional antenna, a directional antenna can concentrate the radio signals on some desired directions so that it can potentially reduce the eavesdropping possibility. This paper investigates the eavesdropping security of wireless ad hoc networks equipped with directional antennas. In particular, we study the eavesdropping possibility of OMN networks, SDA networks …


An Overview Of Using Directional Antennas In Wireless Networks, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu Dec 2012

An Overview Of Using Directional Antennas In Wireless Networks, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu

Hong-Ning Dai

Compared with omni-directional antennas, directional antennas have many merits, such as lower interference, better spatial reuse, longer transmission range and the improved network capacity. Directional antennas enable numerous emerging outdoor and indoor applications, which have been addressed in many recent studies. Despite the advances in wireless networks with directional antennas (DAWNs), there are many research challenges in all layers of DAWNs. This paper presents a detailed study on recent advances and open research issues on DAWNs. Firstly, we briefly introduce the classification of directional antennas, antenna radiation patterns, antenna modes as well as the challenges in the physical layer of …


Channel Allocation In Wireless Networks With Directional Antennas, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu Dec 2012

Channel Allocation In Wireless Networks With Directional Antennas, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu

Hong-Ning Dai

In this paper, we study the channel allocation in multi-channel wireless ad hoc networks with directional antennas. In particular, we investigate the problem: given a set of wireless nodes equipped with directional antennas, how many channels are needed to ensure collision-free communications? We derive the upper bounds on the number of channels, which heavily depend on the node density and the interference ratio (i.e., the ratio of the interference range to the transmission range). We construct several scenarios to examine the tightness of the derived bounds. We also take the side-lobes and back-lobes as well as the signal path loss …


On Eavesdropping Attacks In Wireless Sensor Networks With Directional Antennas, Hong-Ning Dai, Qiu Wang, Dong Li, Raymond Chi-Wing Wong Dec 2012

On Eavesdropping Attacks In Wireless Sensor Networks With Directional Antennas, Hong-Ning Dai, Qiu Wang, Dong Li, Raymond Chi-Wing Wong

Hong-Ning Dai

The eavesdropping attack is a serious security threat to a wireless sensor network (WSN) since the eavesdropping attack is a prerequisite for other attacks. Conventional WSNs consist of wireless nodes equipped with omnidirectional antennas, which broadcast radio signals in all directions and are consequently prone to the eavesdropping attacks. Different from omnidirectional antennas, directional antennas radiate radio signals on desired directions and potentially reduce the possibility of the eavesdropping attacks. In this paper, we propose a model to analyze the eavesdropping probability in both single-hop WSNs and multihop WSNs with omnidirectional antennas and directional antennas. We verify the correctness of …