Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Optimisation (3)
- Power Transmission Control (3)
- Access Protocols (2)
- Ad Hoc Networks (2)
- Ad hoc networks (Computer networks) (2)
-
- Energy conservation (2)
- Lyapunov Methods (2)
- Neural Network (2)
- Peer-To-Peer Computing (2)
- Replicated Databases (2)
- , Neural networks (NNs) (1)
- <p>Clonal selection theory<br />Flexible AC transmission systems<br />Pattern recognition systems<br />Evolutionary computation</p> (1)
- Ad Hoc Wireless Network (1)
- Adaptive Control (1)
- Adaptive Neural Network (NN) Controller (1)
- Adaptive Replication (1)
- Adaptive-Critic NN Controller (1)
- Adjacent Channel Interference (1)
- Artificial intelligence (1)
- Atomic Force Microscope (AFM) (1)
- Authorisation (1)
- Back-Off Scheme (1)
- Backpressure Mechanism (1)
- Channel Allocation (1)
- Channel Estimation (1)
- Closed Loop Systems (1)
- Cluster analysis (1)
- Clustering (1)
- Collaborative Global Software Development (1)
- Combinatories (1)
- Publication
- Publication Type
Articles 1 - 27 of 27
Full-Text Articles in Entire DC Network
New Graph Model For Channel Assignment In Ad Hoc Wireless Networks, Maggie Xiaoyan Cheng, S. C. Huang, X. Huang, Weili Wu
New Graph Model For Channel Assignment In Ad Hoc Wireless Networks, Maggie Xiaoyan Cheng, S. C. Huang, X. Huang, Weili Wu
Computer Science Faculty Research & Creative Works
The channel assignment problem in ad hoc wireless networks is investigated. The problem is to assign channels to hosts in such a way that interference among hosts is eliminated and the total number of channels is minimised. Interference is caused by direct collisions from hosts that can hear each other or indirect collisions from hosts that cannot hear each other, but simultaneously transmit to the same destination. A new class of disk graphs (FDD: interFerence Double Disk graphs) is proposed that include both kinds of interference edges. Channel assignment in wireless networks is a vertex colouring problem in FDD graphs. …
A Scalable Correlation Aware Aggregation Strategy For Wireless Sensor Networks, Yujie Zhu, Ramanuja Vedantham, Seung Jong Park, Raghupathy Sivakumar
A Scalable Correlation Aware Aggregation Strategy For Wireless Sensor Networks, Yujie Zhu, Ramanuja Vedantham, Seung Jong Park, Raghupathy Sivakumar
Computer Science Faculty Research & Creative Works
Sensors-to-sink data in wireless sensor networks (WSNs) are typically correlated with each other. Exploiting such correlation when performing data aggregation can result in considerable improvements in the bandwidth and energy performance of WSNs. In order to exploit such correlation, we present a scalable and distributed correlation-aware aggregation structure that addresses the practical challenges in the context of aggregation in WSNs. Through simulations and analysis, we evaluate the performance of the proposed approach with centralized and distributed correlation aware and unaware structures.
Marketing Military Service Benefits Segmentation Based On Generalized And Restricted Exchange, Caroline Fisher, Kimball P. Marshall
Marketing Military Service Benefits Segmentation Based On Generalized And Restricted Exchange, Caroline Fisher, Kimball P. Marshall
Business and Information Technology Faculty Research & Creative Works
Willingness to engage in exchange is based on desired benefits. In typical commercial transactions, restricted exchange benefits dominate. However, public policy, social marketing situations might require consideration of both restricted and generalized exchange benefits. Applying factor analysis, cluster analysis and cross-tabulation, this paper reports research that has successfully segmented a young adult target market regarding interest in military service based on considerations of generalized and restricted exchange motivations. This research contributes to a growing body of literature on generalized exchange as a key conceptual element for social marketing. Results demonstrate the utility of the generalized exchange concept in identifying amarket …
The Maximum Flow Algorithm Applied To The Placement And Distributed Steady-State Control Of Upfcs, Austin Armbruster, Bruce M. Mcmillin, Mariesa Crow, Michael R. Gosnell
The Maximum Flow Algorithm Applied To The Placement And Distributed Steady-State Control Of Upfcs, Austin Armbruster, Bruce M. Mcmillin, Mariesa Crow, Michael R. Gosnell
Computer Science Faculty Research & Creative Works
The bulk power system is one of the largest man-made networks and its size makes control an extremely difficult task. This paper presents a method to control a power network using UPFCs set to levels determined by a maximum flow (max-flow) algorithm. The graph-theory-based max-flow is applied to the power system for UPFC placement and scheduling. A distributed version of max-flow is described to coordinate the actions of the UPFCs distributed in a power network. Two sample power systems were tested using max-flow for UPFC placement and settings. The resulting system characteristics are examined over all single-line contingencies and the …
Location Management In Mobile Ad Hoc Wireless Networks Using Quorums And Clusters, Maggie Xiaoyan Cheng, David H.-C. Du, Ding-Zhu Du
Location Management In Mobile Ad Hoc Wireless Networks Using Quorums And Clusters, Maggie Xiaoyan Cheng, David H.-C. Du, Ding-Zhu Du
Computer Science Faculty Research & Creative Works
Position-based reactive routing is a scalable solution for routing in mobile ad hoc networks. The route discovery algorithm in position-based routing can be efficiently implemented only if the source knows the current address of the destination. In this paper, a quorum-based location management scheme is proposed. Location servers are selected using the minimum dominating set (MDS) approach, and are further organized into quorums for location update and location query. when a mobile node moves, it updates its location servers in the update quorum; when a node requests the location information of another node, it will send a query message to …
Structured Object-Oriented Co-Analysis/Co-Design Of Hardware/Software For The Facts Powers System, Matt Ryan, Sojan Markose, Xiaoqing Frank Liu, Bruce M. Mcmillin
Structured Object-Oriented Co-Analysis/Co-Design Of Hardware/Software For The Facts Powers System, Matt Ryan, Sojan Markose, Xiaoqing Frank Liu, Bruce M. Mcmillin
Computer Science Faculty Research & Creative Works
There are several approaches to the hardware/software design in embedded systems, ranging from the traditional sequential methods which focus on the determination of the hardware architecture prior to software design, to newer object-oriented approaches that attempt to apply software engineering methods to hardware design without a systematic process. This paper discusses a structured object-oriented methodology for the integrated co-analysis and co-design of hardware/software systems using an extended high order object-oriented modeling technique (HOOMT). This methodology offers a uniform method for hardware and software developers to jointly develop the specifications for and partitioning of the hardware and software components of a …
Sink-To-Sensors Congestion Control, Ramanuja Vedantham, Raghupathy Sivakumar, Seung Jong Park
Sink-To-Sensors Congestion Control, Ramanuja Vedantham, Raghupathy Sivakumar, Seung Jong Park
Computer Science Faculty Research & Creative Works
The problem of congestion in sensor networks is significantly different from conventional ad-hoc networks and has not been studied to any great extent thus far. In this paper, we focus on providing congestion control from the sink to the sensors in a sensor field. We identify the different reasons for congestion from the sink to the sensors and show the uniqueness of the problem in sensor network environments. We propose a scalable, distributed approach that addresses congestion from the sink to the sensors in a sensor network. Through ns2 based simulations, we evaluate the proposed framework, and show that it …
Achieving Minimum Coverage Breach Under Bandwidth Constraints In Wireless Sensor Networks, Maggie Xiaoyan Cheng, Lu Ruan, Weili Wu
Achieving Minimum Coverage Breach Under Bandwidth Constraints In Wireless Sensor Networks, Maggie Xiaoyan Cheng, Lu Ruan, Weili Wu
Computer Science Faculty Research & Creative Works
This paper addresses the coverage breach problem in wireless sensor networks with limited bandwidths. In wireless sensor networks, sensor nodes are powered by batteries. To make efficient use of battery energy is critical to sensor network lifetimes. When targets are redundantly covered by multiple sensors, especially in stochastically deployed sensor networks, it is possible to save battery energy by organizing sensors into mutually exclusive subsets and alternatively activating only one subset at any time. Active nodes are responsible for sensing, computing and communicating. While the coverage of each subset is an important metric for sensor organization, the size of each …
Proving Secure Properties Of Cryptographic Protocols With Knowledge Based Approach, Xiaochun Cheng, Xiaoqi Ma, Maggie Xiaoyan Cheng, Scott C.-H. Huang
Proving Secure Properties Of Cryptographic Protocols With Knowledge Based Approach, Xiaochun Cheng, Xiaoqi Ma, Maggie Xiaoyan Cheng, Scott C.-H. Huang
Computer Science Faculty Research & Creative Works
Cryptographic protocols have been widely used to protect communications over insecure network environments. Existing cryptographic protocols usually contain flaws. To analyze these protocols and find potential flaws in them, the secure properties of them need be studied in depth. This paper attempts to provide a new framework to analyze and prove the secure properties in these protocols. A number of predicates and action functions are used to model the network communication environment. Domain rules are given to describe the transitions of principals' knowledge and belief states. An example of public key authentication protocols has been studied and analysed.
Power Transmission Control Using Distributed Max-Flow, Bruce M. Mcmillin, Austin Armbruster, Mariesa Crow, Michael R. Gosnell
Power Transmission Control Using Distributed Max-Flow, Bruce M. Mcmillin, Austin Armbruster, Mariesa Crow, Michael R. Gosnell
Computer Science Faculty Research & Creative Works
Existing maximum flow algorithms use one processor for all calculations or one processor per vertex in a graph to calculate the maximum possible flow through a graph's vertices. This is not suitable for practical implementation. We extend the max-flow work of Goldberg and Tarjan to a distributed algorithm to calculate maximum flow where the number of processors is less than the number of vertices in a graph. Our algorithm is applied to maximizing electrical flow within a power network where the power grid is modeled as a graph. Error detection measures are included to detect problems in a simulated power …
Evaluation Of Glycine Max Mrna Clusters, Ronald L. Frank, Fikret Erçal
Evaluation Of Glycine Max Mrna Clusters, Ronald L. Frank, Fikret Erçal
Biological Sciences Faculty Research & Creative Works
Background: Clustering the ESTs from a large dataset representing a single species is a convenient starting point for a number of investigations into gene discovery, genome evolution, expression patterns, and alternatively spliced transcripts. Several methods have been developed to accomplish this, the most widely available being UniGene, a public domain collection of gene-oriented clusters for over 45 different species created and maintained by NCBI. The goal is for each cluster to represent a unique gene, but currently it is not known how closely the overall results represent that reality. UniGene's build procedure begins with initial mRNA clusters before joining ESTs. …
Perceived Impacts Of Government Regulations On Technolgoy Transfers, Caroline Fisher, Jing Li, Marina Onken
Perceived Impacts Of Government Regulations On Technolgoy Transfers, Caroline Fisher, Jing Li, Marina Onken
Business and Information Technology Faculty Research & Creative Works
This paper examines the effects of government regulation on the technology transfer process. Technology transfer is an important component of an economic development effort in communities, states, and nations. Understanding the process used to transfer technology is needed to promote policies that develop an effective infrastructure to encourage technology transfer. This paper uses qualitative and quantitative methodologies to examine managerial perceptions of the effects of government policies on the technology transfer process. The impacts of tax policies, environmental regulations, health and safety regulations, labor regulations, international trade regulations, and the differences in regulations between countries are studied. Items used to …
Energy Balanced Broadcasting Through Delayed Intelligence, Michael R. Gosnell, Ryan Arbarelli, Maggie Xiaoyan Cheng, Bruce M. Mcmillin
Energy Balanced Broadcasting Through Delayed Intelligence, Michael R. Gosnell, Ryan Arbarelli, Maggie Xiaoyan Cheng, Bruce M. Mcmillin
Computer Science Faculty Research & Creative Works
Ad hoc wireless networks are growing in popularity and usefulness, however they rely on broadcasting as a fundamental process for routing. Improvements to broadcasting have made ad hoc networks more feasible, but sometimes benefit only specific situations. Delayed intelligence (DI) is proposed as a new load balancing approach where small delays are introduced to allow distributed responsibility delegation. Preliminary results show delayed intelligence, when applied in existing broadcasting methods such as passive clustering, can be used to improve the energy disparity and therefore extend ad hoc network lifetime.
Retesting A Model Of The Deming Management Method, Jesse Barfield, Caroline Fisher, Jing Li, Rajiv Mehta
Retesting A Model Of The Deming Management Method, Jesse Barfield, Caroline Fisher, Jing Li, Rajiv Mehta
Business and Information Technology Faculty Research & Creative Works
Anderson et al. (1994) developed a model of the theory of quality management underlying the Deming management method; Anderson et al. (1995) tested that model using path analysis. They used data from an existing database collected from 41 manufacturing plants in the electronics, machinery, and transportation industries with 100 or more employees. In this study, which retests their model, data were gathered from over 100 manufacturing and service companies of all sizes across the US and Canada. The measures used in the original study were modified to apply to both service and manufacturing organizations. The data were analysed using similar …
Reinforcement Learning-Based Output Feedback Control Of Nonlinear Systems With Input Constraints, Pingan He, Jagannathan Sarangapani
Reinforcement Learning-Based Output Feedback Control Of Nonlinear Systems With Input Constraints, Pingan He, Jagannathan Sarangapani
Electrical and Computer Engineering Faculty Research & Creative Works
A novel neural network (NN) -based output feedback controller with magnitude constraints is designed to deliver a desired tracking performance for a class of multi-input-multi-output (MIMO) discrete-time strict feedback nonlinear systems. Reinforcement learning in discrete time is proposed for the output feedback controller, which uses three NN: 1) a NN observer to estimate the system states with the input-output data; 2) a critic NN to approximate certain strategic utility function; and 3) an action NN to minimize both the strategic utility function and the unknown dynamics estimation errors. The magnitude constraints are manifested as saturation nonlinearities in the output feedback …
Consistency Management Among Replicas In Peer-To-Peer Mobile Ad Hoc Networks, Sanjay Kumar Madria, Takahiro Hara
Consistency Management Among Replicas In Peer-To-Peer Mobile Ad Hoc Networks, Sanjay Kumar Madria, Takahiro Hara
Computer Science Faculty Research & Creative Works
Recent advances in wireless communication along with peer-to-peer (P2P) paradigm have led to increasing interest in P2P mobile ad hoc networks. In this paper, we assume an environment where each mobile peer accesses data items held by other peers which are connected by a mobile ad hoc network. Since peers' mobility causes frequent network partitions, replicas of a data item may be inconsistent due to write operations performed by mobile peers. In such an environment, the global consistency of data items is not desirable by many applications. Thus, new consistency maintenance based on local conditions such as location and time …
Neural Network-Based Control Of Nonlinear Discrete-Time Systems In Non-Strict Form, Jagannathan Sarangapani, Zheng Chen, Pingan He
Neural Network-Based Control Of Nonlinear Discrete-Time Systems In Non-Strict Form, Jagannathan Sarangapani, Zheng Chen, Pingan He
Electrical and Computer Engineering Faculty Research & Creative Works
A novel reinforcement learning-based adaptive neural network (NN) controller, also referred as the adaptive-critic NN controller, is developed to deliver a desired tracking performance for a class of non-strict feedback nonlinear discrete-time systems in the presence of bounded and unknown disturbances. The adaptive critic NN controller architecture includes a critic NN and two action NNs. The critic NN approximates certain strategic utility function whereas the action neural networks are used to minimize both the strategic utility function and the unknown dynamics estimation errors. The NN weights are tuned online so as to minimize certain performance index. By using gradient descent-based …
A Multi-Hypothesis Approach For Salient Object Tracking In Visual Surveillance, Filiz Bunyak, Ilker Ersoy, S. R. Subramanya
A Multi-Hypothesis Approach For Salient Object Tracking In Visual Surveillance, Filiz Bunyak, Ilker Ersoy, S. R. Subramanya
Electrical and Computer Engineering Faculty Research & Creative Works
In this paper, a multiple object tracking method for visual surveillance applications is presented. Moving objects are detected by adaptive background subtraction and tracked by using a multi-hypothesis testing approach. Object matching between frames is done based on proximity and appearance similarity. a new confidence measure is assigned to each possible match. This information is arranged into a graph structure where vertices represent blobs in consecutive frames and edges represent match confidence values. This graph is later used to prune and refine trajectories to obtain the salient object trajectories. Occlusions are handled through position prediction using Kalman filter and robust …
The Inns President's Welcome, Donald C. Wunsch
The Inns President's Welcome, Donald C. Wunsch
Electrical and Computer Engineering Faculty Research & Creative Works
No abstract provided.
A Robust Controller For The Manipulation Of Micro Scale Objects, Qinmin Yang, Jagannathan Sarangapani
A Robust Controller For The Manipulation Of Micro Scale Objects, Qinmin Yang, Jagannathan Sarangapani
Electrical and Computer Engineering Faculty Research & Creative Works
A suite of novel robust controllers is presented for the manipulation and handling of micro-scale objects in a micro-electromechanical system (MEMS) where adhesive, surface tension, friction and van der Waals forces are dominant. Moreover, these forces are typically unknown. The robust controller overcomes the unknown system dynamics and ensures the performance in the presence of actuator constraints by assuming that the upper bounds on these forces are known. On the other hand, for the robust adaptive controller, the unknown forces are estimated online. Using the Lyapunov approach, the uniformly ultimate boundedness (UUB) of the closed-loop manipulation error is shown for …
Energy-Efficient Rate Adaptation Mac Protocol For Ad Hoc Wireless Networks, Maciej Jan Zawodniok, Jagannathan Sarangapani
Energy-Efficient Rate Adaptation Mac Protocol For Ad Hoc Wireless Networks, Maciej Jan Zawodniok, Jagannathan Sarangapani
Electrical and Computer Engineering Faculty Research & Creative Works
Resource constraints in ad hoc wireless networks require that they are energy efficient during both transmission and rate adaptation. In this paper, we propose a novel energy-efficient rate adaptation protocol that selects modulation schemes online to maximize throughput based on channel state while saving energy. This protocol uses the distributed power control (DPC) algorithm (M. Zawodniok et al., 2004) to accurately determine the necessary transmission power and to reduce the energy consumption. Additionally, the transmission rate is altered using energy efficiency as a constraint to meet the required throughput, which is estimated with queue fill ratio. Moreover, back-off scheme is …
Predictive Congestion Control Mac Protocol For Wireless Sensor Networks, Maciej Jan Zawodniok, Jagannathan Sarangapani
Predictive Congestion Control Mac Protocol For Wireless Sensor Networks, Maciej Jan Zawodniok, Jagannathan Sarangapani
Electrical and Computer Engineering Faculty Research & Creative Works
Available congestion control schemes, for example transport control protocol (TCP), when applied to wireless networks results in a large number of packet drops, unfairness with a significant amount of wasted energy due to retransmissions. To fully utilize the hop by hop feedback information, a suite of novel, decentralized, predictive congestion control schemes are proposed for wireless sensor networks in concert with distributed power control (DPC). Besides providing energy efficient solution, embedded channel estimator in DPC predicts the channel quality. By using the channel quality and node queue utilizations, the onset of network congestion is predicted and congestion control is initiated. …
Adaptive Replication And Access Control Of Multimedia Data In A P2p Environment, Sanjay Kumar Madria, Sanjeev Agarwal
Adaptive Replication And Access Control Of Multimedia Data In A P2p Environment, Sanjay Kumar Madria, Sanjeev Agarwal
Computer Science Faculty Research & Creative Works
This paper explores some of the ideas and solutions related to replication and access control of multimedia data in a hierarchical P2P environment. We provided overview of the techniques to generate multiresolution of multimedia data and explored error recovery and access control issues.
Collaborative Global Software Development And Education, Xiaoqing Frank Liu
Collaborative Global Software Development And Education, Xiaoqing Frank Liu
Computer Science Faculty Research & Creative Works
In this position paper, challenges and issues with collaborative global software development and education are discussed. Suggestions are made to improve and strengthen software engineering education to adapt to it.
Decentralized Discrete-Time Neural Network Controller For A Class Of Nonlinear Systems With Unknown Interconnections, Jagannathan Sarangapani
Decentralized Discrete-Time Neural Network Controller For A Class Of Nonlinear Systems With Unknown Interconnections, Jagannathan Sarangapani
Electrical and Computer Engineering Faculty Research & Creative Works
A novel decentralized neural network (NN) controller in discrete-time is designed for a class of uncertain nonlinear discrete-time systems with unknown interconnections. Neural networks are used to approximate both the uncertain dynamics of the nonlinear systems and the unknown interconnections. Only local signals are needed for the decentralized controller design and the stability of the overall system can be guaranteed using the Lyapunov analysis. Further, controller redesign for the original subsystems is not required when additional subsystems are appended. Simulation results demonstrate the effectiveness of the proposed controller. The NN does not require an offline learning phase and the weights …
Block Phase Correlation-Based Automatic Drift Compensation For Atomic Force Microscopes, Qinmin Yang, Eric W. Bohannan, Jagannathan Sarangapani
Block Phase Correlation-Based Automatic Drift Compensation For Atomic Force Microscopes, Qinmin Yang, Eric W. Bohannan, Jagannathan Sarangapani
Electrical and Computer Engineering Faculty Research & Creative Works
Automatic nanomanipulation and nanofabrication with an Atomic Force Microscope (AFM) is a precursor for nanomanufacturing. In ambient conditions without stringent environmental controls, nanomanipulation tasks require extensive human intervention to compensate for the many spatial uncertainties of the AFM. Among these uncertainties, thermal drift is especially hard to solve because it tends to increase with time and cannot be compensated simultaneously by feedback. In this paper, an automatic compensation scheme is introduced to measure and estimate drift. This information can be subsequently utilized to compensate for the thermal drift so that a real-time controller for nanomanipulation can be designed as if …
Bio-Inspired Approaches For Critical Infrastructure Protection: Application Of Clonal Selection Principle For Intrusion Detection And Facts Placement, Kasthurirangan Parthasarathy
Bio-Inspired Approaches For Critical Infrastructure Protection: Application Of Clonal Selection Principle For Intrusion Detection And Facts Placement, Kasthurirangan Parthasarathy
Masters Theses
"In this research, Clonal Selection, an immune system inspired approach, is utilized along with Evolutionary Algorithms to solve complex engineering problems such as Intrusion Detection and optimization of Flexible AC Transmission System (FACTS) device placement in a power grid. The clonal selection principle increases the strength of good solutions and alters their properties to find better solutions in a problem space. A special class of evolutionary algorithms that utilizes the clonal selection principle to guide its heuristic search process is termed Clonal EA. Clonal EAs can be used to solve complex pattern recognition and function optimization problems, which involve searching …