Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

2005

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 38

Full-Text Articles in Digital Communications and Networking

Robust And Efficient Localization Techniques For Cellular And Wireless Sensor Networks, Haseebulla M. Khan Dec 2005

Robust And Efficient Localization Techniques For Cellular And Wireless Sensor Networks, Haseebulla M. Khan

Computer Science Theses & Dissertations

Localization in wireless networks refers to a collection of tasks that, collectively, determines the location of a mobile user, striving to hide the effects of mobility from the user and/or application. Localization has become an important issue and has drawn considerable attention, as many applications including E-911, cargo tracking, locating patients, location-sensitive billing, etc., require knowledge of the location of user/objects. It was realized, quite a while back, that extending emergency 911-like services (E-911) to continually growing mobile population is one of the extremely important localization applications. The bulk of the proposed solutions to emergency location management in wireless environments …


Radar - A Novel Admission Control And Handoff Management Scheme For Multimedia Leo Satellite Networks, Syed Rashidali Rizvi Dec 2005

Radar - A Novel Admission Control And Handoff Management Scheme For Multimedia Leo Satellite Networks, Syed Rashidali Rizvi

Computer Science Theses & Dissertations

Low Earth Orbit (LEO) satellite networks are deployed as an enhancement to terrestrial wireless networks in order to provide broadband services to users regardless of their location. In addition to global coverage, these satellite systems support communications with hand-held devices and offer low cost-per-minute access cost, making them promising platforms for Personal Communication Services (PCS). LEO satellites are expected to support multimedia traffic and to provide their users with some form of Quality of Service (QoS) guarantees. However, the limited bandwidth of the satellite channel, satellite rotation around the Earth and mobility of end-users makes QoS provisioning and mobility management …


A Performance Evaluation Of A Homogeneous Wireless Network Using Opnet It Guru, Roy Lee Gentry Jr. Nov 2005

A Performance Evaluation Of A Homogeneous Wireless Network Using Opnet It Guru, Roy Lee Gentry Jr.

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Science and Technology at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Roy Lee Gentry Jr. on November 30, 2005.


Can Infopipes Facilitate Reuse In A Traffic Application?, Emerson Murphy-Hill, Chuan-Kai Lin, Andrew P. Black, Jonathan Walpole Oct 2005

Can Infopipes Facilitate Reuse In A Traffic Application?, Emerson Murphy-Hill, Chuan-Kai Lin, Andrew P. Black, Jonathan Walpole

Computer Science Faculty Publications and Presentations

Infopipes are presented as reusable building blocks for streaming applications. To evaluate this claim, we have built a significant traffic application in Smalltalk using Infopipes. This poster presents a traffic problem and solution, a short introduction to Infopipes, and the types of reuse Infopipes facilitate in our implementation.


Inventions On Expressing Emotions In Graphical User Interface, Umakant Mishra Sep 2005

Inventions On Expressing Emotions In Graphical User Interface, Umakant Mishra

Umakant Mishra

The conventional GUI is more mechanical and does not recognize or communicate emotions. The modern GUIs are trying to infer the likely emotional state and personality of the user and communicate through a corresponding emotional state. Emotions are expressed in graphical icons, sounds, pictures and other means. The emotions are found to be useful in especially in communication software, interactive learning systems, robotics and other adaptive environments. Various mechanisms have been developed to express emotions through graphical user interfaces. This article illustrates some interesting inventions selected from US patent database.


An Analytical Model Of Mac Protocol Dependant Power Consumption In Multi-Hop Ad Hoc Wireless Sensor Networks, Komlan Egoh Aug 2005

An Analytical Model Of Mac Protocol Dependant Power Consumption In Multi-Hop Ad Hoc Wireless Sensor Networks, Komlan Egoh

Theses

Power efficiency is the most constraining requirement for viable operation of battery-powered networked sensors. Conventionally, dynamic power management (DPM) is used to put sensor nodes into different states such as active, idle, and sleep, each consuming a certain level of power. Within the active state, communication operational states, such as receive and transmit consume different levels of nodal power. This thesis shows how DPM states and protocol operational states can be combined into a single stochastic model to finely evaluate the power consumption performance of a medium access control (MAC) protocol. The model is formulated as a semi-Markov decision process …


Evaluation Of Coding Scheme For Mimo Radar, Suresh Kumar Harikrishnan Aug 2005

Evaluation Of Coding Scheme For Mimo Radar, Suresh Kumar Harikrishnan

Theses

Multiple Input Multiple Output (MIMO) antenna systems have shown a great potential for wireless communication. These systems support high capacity, increased diversity and interference suppression. Recently it has been proposed MIMO constellations for Radar. MIMO Radar is not only a new research field, but also a very promising approach in terms of overcoming Radar Cross Section (RCS) fluctuations with diversity. This thesis explores the potential of coding schemes for MIMO Radar.

The ambiguity functions measures related to MIMO Radar are used to evaluate how much diversity gain can be coherently achieved with certain coding schemes. The results of this analysis …


Poster Session A: A Multi-Priority Application Framework For Mobile Ad Hoc Networks, M. Ibrahim Channa, Ahsan Chaudhry, Kashif Sharif, Irum Memon Aug 2005

Poster Session A: A Multi-Priority Application Framework For Mobile Ad Hoc Networks, M. Ibrahim Channa, Ahsan Chaudhry, Kashif Sharif, Irum Memon

International Conference on Information and Communication Technologies

The fast spread of small wireless computers has enabled the design and deployment of wireless Ad Hoc networks. Typical applications proposed for such networks include both Real Time and Non-Real Time applications. We propose an architecture that provides a complete framework for Real Time applications and Best Effort traffic. The proposed architecture comprises of an Ad Hoc Routing Protocol for route setup and route repair, a Bandwidth Allocation and Reservation Scheme for Real Time traffic, and a MAC layer protocol that provides traffic differentiation. The Admission Control module is used to admit or reject a new Real Time flow request …


Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad Aug 2005

Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad

International Conference on Information and Communication Technologies

Secured flow of information through the network and play important role in the management information systems. In this paper I describe Secured Network Model For Corporate & Business Organization In Based On Network Level IP Security (IPSec) Encryption & Its Physical Layout Using Multilayered Approach. I have four important considerations for adoption of secured network model as secured network model for management information system.


G-Value Decoding Of Greedy Codes, Khalil Ahmad Aug 2005

G-Value Decoding Of Greedy Codes, Khalil Ahmad

International Conference on Information and Communication Technologies

Error-correcting codes are widely used to increase the reliability of transmission of information over various forms of communication channels. Codes with a given minimum distance d can be constructed by a greedy algorithm [2]. In this paper, I proposed a new algorithm for the allocation of g-values to the binary vectors. Hamming (7, 4, 3) code can be generated by the application of greedy algorithm on the binary vectors of length 7 arranged in B-ordering. This code is used to demonstrate a new decoding technique for linear codes in addition to the schemes already known for decoding such as Syndrome …


A Review Study On Digital Watermarking, Jian Liu, Xiangjian He Aug 2005

A Review Study On Digital Watermarking, Jian Liu, Xiangjian He

International Conference on Information and Communication Technologies

There has been a rapid development in the growth of multimedia and communications in the past few years. With the widespread use of the networks, intellectual properties can be obtained, reproduced or redistributed easily. This creates a high demand for content protection techniques. Watermarking, one of the most efficient ways to protect the digital properties has won more and more concern in recent years. This paper reviews several aspects about digital watermarking. Among them, we mainly focus on three processes of digital watermarking. Also, we will examine the properties of watermarking and several applications of watermarking. At last, this paper …


Keynote: Role Of Values & Culture In Information Technology, Prof. Dr. Anis Ahmad Aug 2005

Keynote: Role Of Values & Culture In Information Technology, Prof. Dr. Anis Ahmad

International Conference on Information and Communication Technologies

It is no longer unusual to see, in a remote town in northern area in Pakistan, a practically non-literate wagon driver calling from his Nokia cell phone his uncle in Dubai or in Karachi. He enjoys sharing with him about his success in business and the settlement of family disputes. While he is driving on dangerous curvy roads and having this conversation, in the back seat of the wagon a comparatively young person is playing games on his cell phone. All this was unimaginable a quarter of a century ago.


Keynote: Research And Education In Telecommunication Engineering, Akhtar Kalam Aug 2005

Keynote: Research And Education In Telecommunication Engineering, Akhtar Kalam

International Conference on Information and Communication Technologies

Telecommunications over the past one hundred years has had a major influence on the development of society. Telecommunications will continue to play an increasingly important role in nearly every human endeavour in all nations of the earth. Telecommunication industry is currently facing a technological revolution. In many countries, the number of cellular radio subscribers exceeds the subscribers of fixed telephony services. Internet technologies, such as VoIP and SIP, allow the convergence of traditional switched telephony services and data services of the internet to converge. New wireless access technologies compete and complete the services provided by the modern cellular radio networks. …


A Conceptual Framework For Analysis Of System Safety Interoperability Of United States Navy's Combat Systems, Showkat Shanaz Alborzi Jul 2005

A Conceptual Framework For Analysis Of System Safety Interoperability Of United States Navy's Combat Systems, Showkat Shanaz Alborzi

Engineering Management & Systems Engineering Theses & Dissertations

Today's political and military reality requires the optimal use of our legacy systems. The objective is to maximize the effectiveness of our operations by efficient allocation, placement and the use of our forces and war-fighting systems. The synergism drawn from the capabilities of the legacy complex systems enables today's war-fighting needs to be met without substantial increase in cost or resources. This synergism can be realized by the effective integration and interoperation of legacy systems into a larger, more complex system of systems.

However, the independently developed legacy systems in this new tactical environment often have different data types, languages, …


Opal: In Vivo Based Preservation Framework For Locating Lost Web Pages, Terry L. Harrison Jul 2005

Opal: In Vivo Based Preservation Framework For Locating Lost Web Pages, Terry L. Harrison

Computer Science Theses & Dissertations

We present Opal, a framework for interactively locating missing web pages (http status code 404). Opal is an example of "in vivo" preservation: harnessing the collective behavior of web archives, commercial search engines, and research projects for the purpose of preservation. Opal servers learn from their experiences and are able to share their knowledge with other Opal servers using the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH). Using cached copies that can be found on the web, Opal creates lexical signatures which are then used to search for similar versions of the web page. Using the OAI-PMH to facilitate …


Dream: A Theoretical Analysis, Xueying Qi Jul 2005

Dream: A Theoretical Analysis, Xueying Qi

Computer Science Theses & Dissertations

A Mobile Ad-hoc Network (MANET, for short) is a collection of mobile nodes deployed in support of a short-lived special-purpose operation. Examples include search-and-rescue missions, law-enforcement, multimedia classrooms, and among many others. Unlike cellular or satellite networks, MANET do not rely on any form of pre-existing infrastructure. The mobility of nodes combined with the lack of infrastructure makes routing in MANET notoriously difficult. It was recently suggested that routing in MANET can use to advantage geographic information that the nodes may acquire either by endowing them with a GPS chip or simply by using known localization algorithms. Distance Routing Effect …


Cluster-Based Wireless Mobile Ad-Hoc Network Security, Mandur Bajra Bajracharya May 2005

Cluster-Based Wireless Mobile Ad-Hoc Network Security, Mandur Bajra Bajracharya

Theses

A wireless ad-hoc network is a cooperative communication network deployed with a specific purpose. It is characterized by dynamically changing topology with no fixed infrastructure which exhibits a perfectly vulnerable state for a number of different kinds of attacks.

This thesis proposes a novel technique of achieving security in wireless mobile ad hoc networks by integrating a simple clustering and a voting mechanism together. The purpose of forming a cluster is to facilitate security in the network and the voting is performed to support the decision making process in the cluster. A procedure of forming small homogenous clusters throughout the …


Using A Pda To Control Home Appliances, Atif Albraiki May 2005

Using A Pda To Control Home Appliances, Atif Albraiki

Honors Capstone Projects - All

The Personal Digital Assistant (PDA) is a handheld device that gives users different organizational capabilities. Over the years, the functionality of PDAs has expanded tremendously to include internet connectivity and different computer applications. The purpose of my honors thesis, combined with my engineering senior design project, was to include a new functionality to the PDA and use it to control different home appliances. The goal of the project was to develop a PDA program that will communicate with a PC program, and have the PC program communicate with a microcontroller to control home appliances. My part of the project was …


Clustering And Hybrid Routing In Mobile Ad Hoc Networks, Lan Wang Apr 2005

Clustering And Hybrid Routing In Mobile Ad Hoc Networks, Lan Wang

Computer Science Theses & Dissertations

This dissertation focuses on clustering and hybrid routing in Mobile Ad Hoc Networks (MANET). Specifically, we study two different network-layer virtual infrastructures proposed for MANET: the explicit cluster infrastructure and the implicit zone infrastructure. In the first part of the dissertation, we propose a novel clustering scheme based on a number of properties of diameter-2 graphs to provide a general-purpose virtual infrastructure for MANET. Compared to virtual infrastructures with central nodes, our virtual infrastructure is more symmetric and stable, but still light-weight. In our clustering scheme, cluster initialization naturally blends into cluster maintenance, showing the unity between these two operations. …


Lightweight Federation Of Non-Cooperating Digital Libraries, Rong Shi Apr 2005

Lightweight Federation Of Non-Cooperating Digital Libraries, Rong Shi

Computer Science Theses & Dissertations

This dissertation studies the challenges and issues faced in federating heterogeneous digital libraries (DLs). The objective of this research is to demonstrate the feasibility of interoperability among non-cooperating DLs by presenting a lightweight, data driven approach, or Data Centered Interoperability (DCI). We build a Lightweight Federated Digital Library (LFDL) system to provide federated search service for existing digital libraries with no prior coordination.

We describe the motivation, architecture, design and implementation of the LFDL. We develop, deploy, and evaluate key services of the federation. The major difference to existing DL interoperability approaches is one where we do not insist on …


Mil-Std-188-125-1, High-Altitude Emp Protection For Fixed Ground-Based Facilities Mar 2005

Mil-Std-188-125-1, High-Altitude Emp Protection For Fixed Ground-Based Facilities

George H Baker

MIL-STD-188-125-1 establishes minimum requirements and design objectives for high-altitude electromagnetic pulse (HEMP) hardening of fixed ground-based facilities that perform critical, time-urgent command, control, communications, computer, and intelligence (C4I) missions. The standard prescribes minimum performance requirements for low-risk protection from mission-aborting damage or upset due to HEMP environments. It also addresses minimum testing requirements for demonstrating that prescribed performance has been achieved and for verifying that the installed protection subsystem provides the operationally required hardness for the completed facility. Covered fixed ground-based facility types include subscriber terminals and data processing centers, transmitting and receiving communications stations, and relay facilities. Use of …


Geolocation Of A Node On A Local Area Network, John R. Clarson Mar 2005

Geolocation Of A Node On A Local Area Network, John R. Clarson

Theses and Dissertations

Geolocation is the process of identifying a node using only its Internet Protocol (IP) address. Locating a node on a LAN poses particular challenges due to the small scale of the problem and the increased significance of queuing delay. This study builds upon existing research in the area of geolocation and develops a heuristic tailored to the difficulties inherent in LANs called the LAN Time to Location Heuristic (LTTLH). LTTLH uses several polling nodes to measure latencies to end nodes, known locations within the LAN. The Euclidean distance algorithm is used to compare the results with the latency of a …


Online Multimedia Communication System, Yin-Wei Yang Jan 2005

Online Multimedia Communication System, Yin-Wei Yang

Theses Digitization Project

Online Multimedia Communication System is a project aimed at providing people the ability to store and share their multimedia files. The users and administrator can modify and view the files and database information from a normal web browser. Furthermore, this site offers a secure environment to keep all the users' information private.


Websat: Web-Based Systems Administration Tool, Juyong Jeong Jan 2005

Websat: Web-Based Systems Administration Tool, Juyong Jeong

Theses Digitization Project

Discusses the development of WebSAT (Web-based systems administration tool), a computer network tool that allows systems administrators to create and delete accounts, disable and enable existing accounts, manage disk space conveniently, monitor the status of all network printers, and monitor network security. The WebSAT application was implemented using PHP, a server-side embedded scripting language, with a MySQL database.


Stabilizing Inter-Domain Routing In The Internet, Yu Chen, Ajoy K. Datta, Sebastien Tixeuil Jan 2005

Stabilizing Inter-Domain Routing In The Internet, Yu Chen, Ajoy K. Datta, Sebastien Tixeuil

Mechanical Engineering Faculty Research

This paper reports the first self-stabilizing Border Gateway Protocol (BGP). BGP is the standard inter-domain routing protocol in the Internet. Self-stabilization is a technique to tolerate arbitrary transient faults.

The routing instability in the Internet can occur due to errors in configuring the routing data structures, the routing policies, transient physical and data link problems, software bugs, and memory corruption. This instability can increase the network latency, slow down the convergence of the routing data structures, and can also cause the partitioning of networks. Most of the previous studies concentrated on routing policies to achieve the convergence of BGP while …


An Investigation Into The Use Of B-Nodes And State Models For Computer Network Technology And Education, Gurpreet Kohli Jan 2005

An Investigation Into The Use Of B-Nodes And State Models For Computer Network Technology And Education, Gurpreet Kohli

Theses: Doctorates and Masters

This thesis consists of a series of internationally published, peer reviewed, conference research papers and one journal paper. The papers evaluate and further develop two modelling methods for use in Information Technology (IT) design and for the educational and training needs of students within the area of computer and network technology. The IT age requires technical talent to fill positions such as network managers, web administrators, e-commerce consultants and network security experts as IT is changing rapidly, and this is placing considerable demands on higher educational institutions, both within Australia and internationally, to respond to these changes.


Management Of Extremes In The Configuration Of Interoffice Telephone Switch & Priority Systems, C. Ariel Pinto Jan 2005

Management Of Extremes In The Configuration Of Interoffice Telephone Switch & Priority Systems, C. Ariel Pinto

Engineering Management & Systems Engineering Faculty Publications

This paper describes how to enable diverse enterprise customers for voice-data switch to achieve in configuration a balance among users, features, and perceived reliability subject to extremes of traffic. The analysis entailed the simulation of the voice-data switch with embedded priority system, generation of latency times for various configurations and transaction traffic rates, and the development of a framework and theoretical propositions for configuration of super-saturated systems. It was shown that the concept of tolerance levels defined in the risk of extreme events can be applied for embedded priority systems and was the basis for the application of the zone-configuration …


Final Report For The Development Of The Nasa Technical Report Server (Ntrs), Michael L. Nelson Jan 2005

Final Report For The Development Of The Nasa Technical Report Server (Ntrs), Michael L. Nelson

Computer Science Faculty Publications

The author performed a variety of research, development and consulting tasks for NASA Langley Research Center in the area of digital libraries (DLs) and supporting technologies, such as the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH). In particular, the development focused on the NASA Technical Report Server (NTRS) and its transition from a distributed searching model to one that uses the OAI-PMH. The Open Archives Initiative (OAI) is an international consortium focused on furthering the interoperability of DLs through the use of "metadata harvesting". The OAI-PMH version of NTRS went into public production on April 28, 2003. Since that …


Non-Verbal Communication With Autistic Children Using Digital Libraries, Gondy A. Leroy, John Huang '05, Serena Chuang '05, Marjorie H. Charlop Jan 2005

Non-Verbal Communication With Autistic Children Using Digital Libraries, Gondy A. Leroy, John Huang '05, Serena Chuang '05, Marjorie H. Charlop

CGU Faculty Publications and Research

Autism spectrum disorder (ASD) has become one of the most prevalent mental disorders over the last few years and its prevalence is still growing. The disorder is characterized by a wide variety of symptoms such as lack of social behavior, extreme withdrawal, and problems communicating. Because of the diversity in symptoms and the wide variety in severity for those, each autistic child has different needs and requires individualized therapy. This leads to long waiting lists for therapy.


Reconsidering The Dmca, R. Polk Wagner Jan 2005

Reconsidering The Dmca, R. Polk Wagner

All Faculty Scholarship

patents, Law and economics, prosecution history estoppel, doctrine of equivalents, ex ante, ex post, default rules, PTO, Federal Circuit, patent prosecution, patent litigation, intellectual property, patent reform, patent administration, patent office