Open Access. Powered by Scholars. Published by Universities.®
Digital Communications and Networking Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Electrical and Computer Engineering (30)
- Physical Sciences and Mathematics (23)
- Computer Sciences (17)
- Other Computer Engineering (15)
- Computer and Systems Architecture (13)
-
- Systems and Communications (12)
- Controls and Control Theory (10)
- Hardware Systems (9)
- Data Storage Systems (7)
- Other Electrical and Computer Engineering (6)
- Social and Behavioral Sciences (6)
- Digital Circuits (5)
- Law (5)
- Science and Technology Law (5)
- VLSI and Circuits, Embedded and Hardware Systems (5)
- Computer Law (4)
- Electrical and Electronics (4)
- Electronic Devices and Semiconductor Manufacturing (4)
- Medicine and Health Sciences (4)
- Business (3)
- Communication (3)
- Computational Engineering (3)
- Engineering Education (3)
- Internet Law (3)
- Mathematics (3)
- Signal Processing (3)
- Communication Technology and New Media (2)
- Institution
-
- Selected Works (32)
- California Polytechnic State University, San Luis Obispo (10)
- Old Dominion University (5)
- Singapore Management University (5)
- SelectedWorks (4)
-
- University of Pennsylvania Carey Law School (4)
- University of New Mexico (3)
- Air Force Institute of Technology (2)
- California State University, San Bernardino (2)
- Cleveland State University (2)
- Purdue University (2)
- San Jose State University (2)
- University of Massachusetts Amherst (2)
- University of Nebraska - Lincoln (2)
- University of Nevada, Las Vegas (2)
- Edith Cowan University (1)
- Illinois Wesleyan University (1)
- Maurer School of Law: Indiana University (1)
- Munster Technological University (1)
- Pace University (1)
- Sacred Heart University (1)
- Technological University Dublin (1)
- The University of Maine (1)
- The University of San Francisco (1)
- University of Arkansas, Fayetteville (1)
- University of Georgia School of Law (1)
- University of Kentucky (1)
- University of North Florida (1)
- University of South Carolina (1)
- University of Tennessee, Knoxville (1)
- Keyword
-
- Cyber-Physical Systems (8)
- Network Control Systems (8)
- Security (5)
- Control Systems (4)
- Wireless Control Systems (4)
-
- Wireless Network Control (4)
- Audio (3)
- Bluetooth (3)
- Wireless (3)
- #antcenter (2)
- A2DP (2)
- Android (2)
- Articles (2)
- BlueBeats (2)
- Internet (2)
- Interoperability (2)
- Mobile computing (2)
- Other research (2)
- Radio-Frequency Identification (2)
- SPP (2)
- Virtualization (2)
- Web sites (2)
- Wifi (2)
- Wireless Communication (2)
- Wireless communications (2)
- 700 MHz auction (1)
- 802.11 (1)
- Academic – UNF – Computing; Cloud Computing; High Performance Computing; HPC; HPC Benchmarks; Windows Azure; Amazon EC2 (1)
- Academic – UNF – Master of Science in Computer and Information Sciences; Dissertations (1)
- Acquisition (1)
- Publication
-
- Patrick Tague (9)
- Computer Engineering (7)
- George J. Pappas (6)
- Research Collection School Of Computing and Information Systems (5)
- All Faculty Scholarship (4)
-
- Branch Mathematics and Statistics Faculty and Staff Publications (3)
- Borislav D Dimitrov (2)
- C. Jason Woodard (2)
- College of Engineering: Graduate Celebration Programs (2)
- Computer Science Theses & Dissertations (2)
- Dr Guilin Wang (2)
- Electrical and Computer Engineering Faculty Publications (2)
- Faculty Publications (2)
- Masters Theses 1911 - February 2014 (2)
- Rahul Mangharam (2)
- Theses Digitization Project (2)
- Theses and Dissertations (2)
- Arcot Desai NARASIMHALU (1)
- Computer Science Presentations (1)
- Computer Science and Software Engineering (1)
- Computer and Electronics Engineering: Dissertations, Theses, and Student Research (1)
- Conference Papers (1)
- Continuing Legal Education Presentations (1)
- Cornerstone 2 Reports : Community Outreach and Empowerment Through Service Learning and Volunteerism (1)
- Department of Computer Graphics Technology Degree Theses (1)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (1)
- Electrical & Computer Engineering Theses & Dissertations (1)
- Electrical Engineering (1)
- Electronic Thesis and Dissertation Repository (1)
- Engineering Management & Systems Engineering Projects for D. Eng. Degree (1)
- Publication Type
- File Type
Articles 1 - 30 of 95
Full-Text Articles in Digital Communications and Networking
An Ultra-Low Power Communication Protocol For A Self-Powered Wireless Sensor Based Animal Monitoring System, Tao Ma
Computer and Electronics Engineering: Dissertations, Theses, and Student Research
To prevent and control the outbreak of contagious animal disease, many countries have developed animal identification and tracking systems. However, the current animal identification and tracking system, which is based on passive RFID technology, has many limitations such as the short communication range and incapability of automatically monitoring the animal. To overcome these limitations, our Advanced Telecommunications Engineering Laboratory (TEL) in Department of Computer and Electronics Engineering (CEEN), University of Nebraska-Lincoln took the mission of developing a more advanced monitoring system for animal identification and tracking. This dissertation work as a part of this mission was focusing on developing an …
Comments On "A Practical (T, N) Threshold Proxy Signature Scheme Based On The Rsa Cryptosystem", Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
Comments On "A Practical (T, N) Threshold Proxy Signature Scheme Based On The Rsa Cryptosystem", Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
Dr Guilin Wang
In a (t, n) threshold proxy signature scheme based on RSA, any t or more proxy signers can cooperatively generate a proxy signature while t-1 or fewer of them can't do it. The threshold proxy signature scheme uses the RSA cryptosystem to generate the private and the public key of the signers. In this article, we discuss the implementation and comparison of some threshold proxy signature schemes that are based on the RSA cryptosystem. Comparison is done on the basis of time complexity, space complexity and communication overhead. We compare the performance of four schemes: Hwang et al., Wen et …
Proxy Signature Scheme With Multiple Original Signers For Wireless E-Commerce Applications, Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
Proxy Signature Scheme With Multiple Original Signers For Wireless E-Commerce Applications, Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
Dr Guilin Wang
In a proxy signature scheme, a user delegates his/her signing capability to another user in such a way that the latter can sign messages on behalf of the former. We propose an efficient and secure proxy signature scheme with multiple original signers. Our scheme is suitable for wireless electronic commerce applications, since the overheads of computation and communication are low. As an example, we present an electronic air ticket booking scheme for wireless customers.
Casting A Wider Net, Lynn Stein
Casting A Wider Net, Lynn Stein
Lynn Andrea Stein
This article is a book review of Mung Chiang's book Networked Life: 20 Questions and Answers. In this text intended for both classroom and online learning, Chiang uses questions about our online lives to explore the technology and computer science behind the Internet, wireless, and Web industries.
Collaborative Research: North East Cyberinfrastructure Consortium, Michael Eckardt
Collaborative Research: North East Cyberinfrastructure Consortium, Michael Eckardt
University of Maine Office of Research Administration: Grant Reports
EPS-0918284, University of Vermont & State Agricultural College, J. L. Van Houten, linked to EPS-0918033 (University of New Hampshire), EPS-0918078 (University of Delaware), EPS-0918018 (University of Maine), EPS-0918061 (University of Rhode Island)
Collaborative Research: North East Cyberinfrastructure Consortium
This award is funded under the American Recovery and Reinvestment Act of 2009 (Public Law 111-5).
The North East Cyberinfrastructure Consortium (NECC) unites Maine (ME), New Hampshire (NH), Vermont (VT), Rhode Island (RI), and Delaware (DE) to support cyber-enabled research that requires analyses of large datasets. The project is organized around sharing resources, expertise and facilities in order to make cyber-enabled collaborative …
Is Tech M&A Value-Additive?, Ani Deshmukh
Is Tech M&A Value-Additive?, Ani Deshmukh
Undergraduate Economic Review
Given rising M&A deal volume across all high-tech subsectors, the ability to measure post-acquisition performance becomes critical. Despite this growth, the relevant academic literature is severely lacking (Kohers and Kohers 2000). Using an event-study approach, I find that acquirers and targets both realize statistically significant day-0 abnormal returns (1.23% [p<0.1] and 8.1% [p<0.01], respectively). As positive stock returns signal positive growth prospects in a semi-strong efficient market, AR regressions found that firms' technological relatedness, deal financing, purchase price premiums, and the relative book to market ratio, explained most variance. Overall, high-tech transactions are value-additive for both targets and acquirers.
Communications And Energy-Harvesting In Nanosensor Networks, Michele C. Weigle
Communications And Energy-Harvesting In Nanosensor Networks, Michele C. Weigle
Computer Science Presentations
PDF of a powerpoint presentation from the National Science Foundation (NSF) Workshop on Biological Computations and Communications in Boston, Massachusetts, November 9, 2012. Also available on Slideshare.
At The Tone, The Time Will Be... Unknown – A Perspective On The Evolution Of Time In Telecommunications, Robert Iannucci
At The Tone, The Time Will Be... Unknown – A Perspective On The Evolution Of Time In Telecommunications, Robert Iannucci
Robert A Iannucci
No abstract provided.
Efficient Delay And Energy Based Routing In Cognitive Radio Ad Hoc Networks, Rana Asif Rehman, Muhammad Sher, Muhammad Khalil Afzal
Efficient Delay And Energy Based Routing In Cognitive Radio Ad Hoc Networks, Rana Asif Rehman, Muhammad Sher, Muhammad Khalil Afzal
Rana Asif Rehman
Cognitive radio ad hoc networks (CRAHNs) are multi-hop, dynamic and self-configurable networks, which can communicate without any infrastructure support. Most of the research in CRAHNs has been already carried out on physical and media access control layers, but without effective routing protocols we cannot take full advantage of CRAHNs. In this paper, we discuss the problems in already proposed routing protocols for cognitive radio networks and proposed a novel protocol: Delay and Energy based Spectrum Aware Routing Protocol (DESAR), which consider both delay and energy for the computation of efficient path between source and destination. Simulation results show that DESAR …
The Wireless Control Network: Synthesis And Robustness, Miroslav Pajic, Shreyas Sundaram, Jerome Le Ny, George J. Pappas, Rahul Mangharam
The Wireless Control Network: Synthesis And Robustness, Miroslav Pajic, Shreyas Sundaram, Jerome Le Ny, George J. Pappas, Rahul Mangharam
Rahul Mangharam
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. Traditional networked control schemes are designed with one of the nodes in the network acting as a dedicated controller, while the other nodes simply route information to and from the controller and the plant. We introduce the concept of a Wireless Control Network (WCN) where the entire network itself acts as the controller. Specifically, at each time-step, each node updates its internal state to be a linear combination of the states of the nodes in its neighborhood. We show that this causes the entire …
The Wireless Control Network: Monitoring For Malicious Behavior, Shreyas Sundaram, Miroslav Pajic, Christoforos Hadjicostis, Rahul Mangharam, George Pappas
The Wireless Control Network: Monitoring For Malicious Behavior, Shreyas Sundaram, Miroslav Pajic, Christoforos Hadjicostis, Rahul Mangharam, George Pappas
Rahul Mangharam
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly transmits a linear combination of the values in its neighborhood. For certain topologies, we showed that these linear combinations can be designed so that the closed loop system is stable (i.e., the wireless network itself acts as a controller for the plant). In this paper, we design a Intrusion Detection System (IDS) for this control scheme, which observes the transmissions of certain nodes in the network and uses that information to (a) …
Large Scale Processing And Storage Solution: Dna Safeguard Project, Eric Copp
Large Scale Processing And Storage Solution: Dna Safeguard Project, Eric Copp
Eric Copp
The DNA Safeguard project involves processing DNA sequence data in order to find nullomer sequences (non-existent short DNA sequences). While the fundamental algorithm for finding nullomer sequences is simple, it is complicated by the amount of data that must be handled. Four methods for handling terabytes of of data are investigated, single instance of a MySQL database, PVFS (Parallel Virtual File System), Hadoop, and a custom MPI (Message Passing Interface) program.
A Probabilistic Graphical Model For Topic And Preference Discovery On Social Media, Lu Liu, Feida Zhu, Lei Zhang, Shiqiang Yang
A Probabilistic Graphical Model For Topic And Preference Discovery On Social Media, Lu Liu, Feida Zhu, Lei Zhang, Shiqiang Yang
Research Collection School Of Computing and Information Systems
Many web applications today thrive on offering services for large-scale multimedia data, e.g., Flickr for photos and YouTube for videos. However, these data, while rich in content, are usually sparse in textual descriptive information. For example, a video clip is often associated with only a few tags. Moreover, the textual descriptions are often overly specific to the video content. Such characteristics make it very challenging to discover topics at a satisfactory granularity on this kind of data. In this paper, we propose a generative probabilistic model named Preference-Topic Model (PTM) to introduce the dimension of user preferences to enhance the …
Wireless Networks-On-Chips: Architecture, Wireless Channel, And Devices, David W. Matolak, Avinash Kodi, Savas Kaya, Dominic Ditomaso, Soumyasanta Laha, William Rayess
Wireless Networks-On-Chips: Architecture, Wireless Channel, And Devices, David W. Matolak, Avinash Kodi, Savas Kaya, Dominic Ditomaso, Soumyasanta Laha, William Rayess
Faculty Publications
Wireless networks-on-chips (WINoCs) hold substantial promise for enhancing multicore integrated circuit performance, by augmenting conventional wired interconnects. As the number of cores per IC grows, intercore communication requirements will also grow, and WINoCs can be used to both save power and reduce latency. In this article, we briefly describe some of the key challenges with WINoC implementation, and also describe our example design, iWISE, which is a scalable wireless interconnect design. We show that the integration of wireless interconnects with wired interconnects in NoCs can reduce overall network power by 34 percent while achieving a speedup of 2.54 on real …
Stir-Ing The Wireless Medium With Self-Tuned, Inference-Based, Real-Time Jamming, Bruce Debruhl, Yu Seung Kim, Zachary Weinberg, Patrick Tague
Stir-Ing The Wireless Medium With Self-Tuned, Inference-Based, Real-Time Jamming, Bruce Debruhl, Yu Seung Kim, Zachary Weinberg, Patrick Tague
Patrick Tague
Jamming, broadcasting to intentionally interfere with wireless reception, has long been a problem for wireless systems. Recent research demonstrates numerous advances in jamming techniques that increase attack efficiency or reduce the probability an attack will be detected by choosing attack parameters based on a system’s configuration. In this work, we extend the attacker’s capabilities by modifying the attack parameters in response to the observed performance of the target system, effectively creating a feedback loop in our attack model. This framework allows for more intricate attack models that are tuned online allowing for closer to optimal attacks against legitimate systems. To …
Contextualized Mobile Support For Learning By Doing In The Real World, Ray Bareiss, Natalie Linnell, Martin L. Griss
Contextualized Mobile Support For Learning By Doing In The Real World, Ray Bareiss, Natalie Linnell, Martin L. Griss
Martin L Griss
This research addresses the use of mobile devices with both embedded and external sensors to provide contextualized help, advice, and remediation to learners engaged in real-world learn-by-doing tasks. This work is situated within the context of learning a complex procedure, in particular emergency responders learning to conduct urban search and rescue operations. Research issues include the design and delivery of contextualized performance support and the inferring of learner actions and intentions from sensor data to ensure that the right support is delivered just in time, as it is relevant to what the learner is doing.
Passive Synthetic Aperture Radar Imaging Using Commercial Ofdm Communication Networks, Jose R. Gutierrez Del Arroyo
Passive Synthetic Aperture Radar Imaging Using Commercial Ofdm Communication Networks, Jose R. Gutierrez Del Arroyo
Theses and Dissertations
Modern communication systems provide myriad opportunities for passive radar applications. OFDM is a popular waveform used widely in wireless communication networks today. Understanding the structure of these networks becomes critical in future passive radar systems design and concept development. This research develops collection and signal processing models to produce passive SAR ground images using OFDM communication networks. The OFDM-based WiMAX network is selected as a relevant example and is evaluated as a viable source for radar ground imaging. The monostatic and bistatic phase history models for OFDM are derived and validated with experimental single dimensional data. An airborne passive collection …
Security Aspects Of Smart Grid Communication, Pubudu E. Weerathunga
Security Aspects Of Smart Grid Communication, Pubudu E. Weerathunga
Electronic Thesis and Dissertation Repository
As the grid becomes highly interconnected, power protection, control, and monitoring in transmission and distribution substations are increasingly relying on digital controls and digital communication. Rapid penetrations of communication into power grid, and growing concerns about cyber security have attracted significant attention towards smart grid cyber security. Cyber security in the smart grid must be carefully designed to meet power system operation’s functional and reliability requirements.
This thesis discusses issues related to the security of power system communication and their counter measures. It focuses on development of security mechanisms for secure substation communication, and analyzes the impact of security overhead …
Unlibguiding Libguides: Using Jquery And Css With Campus Guides To Make Libguides A True Web Cms, M Ryan Hess
Unlibguiding Libguides: Using Jquery And Css With Campus Guides To Make Libguides A True Web Cms, M Ryan Hess
M Ryan Hess
DePaul University's Library Web Services team investigated the potential of Springshare CampusGuides for serving as a web content management system. The team overrode system CSS, added JQuery libraries and features, integrated an external SQL database into the site and leveraged the workflows and functionalities of Campus Guides to make it a more powerful WCMS.
International Ict Research Collaboration: Experiences And Recommendations, Erich Prem, Emma Barron, Arcot Desai Narasimhalu, Ian Morgan
International Ict Research Collaboration: Experiences And Recommendations, Erich Prem, Emma Barron, Arcot Desai Narasimhalu, Ian Morgan
Arcot Desai NARASIMHALU
This paper presents results of a study into the collaboration experiences of researchers. The focus is on long-distance collaboration in information and communication technologies (ICT) research and technology development, i.e. between the EU on the one side and Australia, Singapore or New Zealand on the other. The aim of the study was to provide useful recommendations for researchers who engage in international collaboration and to improve the quality of international co-operation projects. The emphasis here is on the views and experiences of Europe"s international partners. The paper analysis collaboration motives, challenges, co-operation types and provides recommendations for project initiation, networking, …
A Long-Duration Study Of User-Trained 802.11 Localization, Andrew Barry, Benjamin Fisher, Mark Chang
A Long-Duration Study Of User-Trained 802.11 Localization, Andrew Barry, Benjamin Fisher, Mark Chang
Mark L. Chang
We present an indoor wireless localization system that is capable of room-level localization based solely on 802.11 network signal strengths and user-supplied training data. Our system naturally gathers dense data in places that users frequent while ignoring unvisited areas. By utilizing users, we create a comprehensive localization system that requires little off-line operation and no access to private locations to train. We have operated the system for over a year with more than 200 users working on a variety of laptops. To encourage use, we have implemented a live map that shows user locations in real-time, allowing for quick and …
Switch Yard Operation In Thermal Power Plant(Katpp Jhalawar Rajasthan), Radhey Shyam Meena Er.
Switch Yard Operation In Thermal Power Plant(Katpp Jhalawar Rajasthan), Radhey Shyam Meena Er.
Radhey Shyam Meena
Switchyard Provides the facilities for switching ,protection & Control of electric power. To handle high Voltage power with proper Safety measures. To isolate the noises coming from the grid with true 50Hz power SWITCH YARD IS IMPORTANT PART IN THERMAL PLANT. IN KALISINDH THERMAL 400KV AND 220KV SWITCH YARD LOCATED.
On Heterogeneous User Demands In Peer-To-Peer Video Streaming Systems, Zhipeng Ouyang
On Heterogeneous User Demands In Peer-To-Peer Video Streaming Systems, Zhipeng Ouyang
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
A Peer-to-Peer (P2P) video streaming system usually consists of a large number of peers, which have heterogeneous physical properties. Orthogonal to the physical heterogeneity, there is another type of heterogeneity called demand heterogeneity. Namely, peers have their own demands on the quality and type of the streaming service. The problem of demand heterogeneity has received little attention and as a result current P2P video streaming systems cannot achieve satisfactory performance due to demand heterogeneity. In this dissertation, we study how to design efficient P2P video streaming systems with heterogeneous user demands.
First, we study the problem of heterogeneous user demands …
Meta-Heuristics Analysis For Technologically Complex Programs: Understanding The Impact Of Total Constraints For Schedule, Quality And Cost, Henry Darrel Webb
Meta-Heuristics Analysis For Technologically Complex Programs: Understanding The Impact Of Total Constraints For Schedule, Quality And Cost, Henry Darrel Webb
Engineering Management & Systems Engineering Projects for D. Eng. Degree
Program management data associated with a technically complex radio frequency electronics base communication system has been collected and analyzed to identify heuristics which may be utilized in addition to existing processes and procedures to provide indicators that a program is trending to failure. Analysis of the collected data includes detailed schedule analysis, detailed earned value management analysis and defect analysis within the framework of a Firm Fixed Price (FFP) incentive fee contract.
This project develops heuristics and provides recommendations for analysis of complex project management efforts such as those discussed herein. The analysis of the effects of the constraints on …
When Antitrust Met Facebook, Christopher S. Yoo
When Antitrust Met Facebook, Christopher S. Yoo
All Faculty Scholarship
Social networks are among the hottest phenomena on the Internet. Facebook eclipsed Google as the most visited website in both 2010 and 2011. Moreover, according to Nielsen estimates, as of the end of 2011 the average American spent nearly seven hours per month on Facebook, which is more time than they spent on Google, Yahoo!, YouTube, Microsoft, and Wikipedia combined. LinkedIn’s May 19, 2011 initial public offering (“IPO”) surpassed expectations, placing the value of the company at nearly $9 billion, and approximately a year later, its stock price had risen another 20 percent. Facebook followed suit a year later with …
An Extensible Framework For Creating Personal Archives Of Web Resources Requiring Authentication, Matthew Ryan Kelly
An Extensible Framework For Creating Personal Archives Of Web Resources Requiring Authentication, Matthew Ryan Kelly
Computer Science Theses & Dissertations
The key factors for the success of the World Wide Web are its large size and the lack of a centralized control over its contents. In recent years, many advances have been made in preserving web content but much of this content (namely, social media content) was not archived, or still to this day is not being archived,for various reasons. Tools built to accomplish this frequently break because of the dynamic structure of social media websites. Because many social media websites exhibit a commonality in hierarchy of the content, it would be worthwhile to setup a means to reference this …
Extended Pcr Rules For Dynamic Frames, Florentin Smarandache, Jean Dezert
Extended Pcr Rules For Dynamic Frames, Florentin Smarandache, Jean Dezert
Branch Mathematics and Statistics Faculty and Staff Publications
In most of classical fusion problems modeled from belief functions, the frame of discernment is considered as static. This means that the set of elements in the frame and the underlying integrity constraints of the frame are fixed forever and they do not change with time. In some applications, like in target tracking for example, the use of such invariant frame is not very appropriate because it can truly change with time. So it is necessary to adapt the Proportional Conflict Redistribution fusion rules (PCR5 and PCR6) for working with dynamical frames. In this paper, we propose an extension of …
Performance Optimization Over Wireless Links With Operating Constraints, Shiny Abraham
Performance Optimization Over Wireless Links With Operating Constraints, Shiny Abraham
Electrical & Computer Engineering Theses & Dissertations
Wireless communication is one of the most active areas of technological innovations and groundbreaking research ranging from simple cellular phones to highly complex military monitoring devices. The emergence of radios with cognitive capabilities like software defined radios has revolutionized modern communication systems by providing transceivers which can vary their output waveforms as well as their demodulation methods. This adaptability plays a pivotal role in efficient utilization of radio spectrum in an intelligent way while simultaneously not interfering with other radio devices operating on the same frequency band. Thus, it is safe to say that current and future wireless systems and …
Visualizing Digital Collections At Archive-It, Kalpesh Padia
Visualizing Digital Collections At Archive-It, Kalpesh Padia
Computer Science Theses & Dissertations
Archive-It, a subscription service from the Internet Archive, allows users to create,maintain, and view digital collections of web resources. The current interface of Archive-It is largely text-based, supporting drill-down navigation using lists of URIs.While this interface provides good searching capabilities, it is not efficient for browsing. In the absence of keywords, a user has to spend large amount of time trying to locate a web page of interest. In order to provide a better visual experience to the user, we have studied the underlying characteristics of Archive-It collections and implemented six different visualizations (treemap, time cloud, bubble chart, image plot, …
A Wireless And Digital Electrode Bus Topology For Biopotential Measurement, Mark Nolan, Edward Burke, Eugene Coyle
A Wireless And Digital Electrode Bus Topology For Biopotential Measurement, Mark Nolan, Edward Burke, Eugene Coyle
Conference Papers
The conventional biopotential measurement configuration utilises long lead wires which connect measuring electrodes to signal conditioning circuitry. The majority of bioelectric signals that are measured from the human body have a tiny signal amplitude (5µV-5mV range) and thus any interference that is induced on the lead wires can have a detrimental effect on the original signal. In this paper, we present an alternative configuration, in which digitisation occurs on the electrode, potentially providing enhanced signal measurement as well as significant benefits in terms of the simplification of the physical interconnections between electrodes. Multiple electrodes are combined to form a digital …