Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 28 of 28

Full-Text Articles in Engineering

Passive Synthetic Aperture Radar Imaging Using Commercial Ofdm Communication Networks, Jose R. Gutierrez Del Arroyo Sep 2012

Passive Synthetic Aperture Radar Imaging Using Commercial Ofdm Communication Networks, Jose R. Gutierrez Del Arroyo

Theses and Dissertations

Modern communication systems provide myriad opportunities for passive radar applications. OFDM is a popular waveform used widely in wireless communication networks today. Understanding the structure of these networks becomes critical in future passive radar systems design and concept development. This research develops collection and signal processing models to produce passive SAR ground images using OFDM communication networks. The OFDM-based WiMAX network is selected as a relevant example and is evaluated as a viable source for radar ground imaging. The monostatic and bistatic phase history models for OFDM are derived and validated with experimental single dimensional data. An airborne passive collection …


Passive Multistatic Radar Imaging Using An Ofdm Based Signal Of Opportunity, Matthew B. P. Rapson Mar 2012

Passive Multistatic Radar Imaging Using An Ofdm Based Signal Of Opportunity, Matthew B. P. Rapson

Theses and Dissertations

This paper demonstrates a proof of concept in using an OFDM-based signal of opportunity for SAR imaging purposes within a passive, multistatic radar construct. Two signal processing methods have been proposed to create phase history data. The same methods are applied in both a simulated software model and an experimental data collection environment to produce simulated SAR images using the CBP imaging algorithm. The images generated from both the experimental and simulated data were observed to be consistent with each other and with expectations in terms of resolution. Coherent addition of the images results in improved image resolution due to …


Toward A Mobile Agent Relay Network, Hyon H. Kwak Mar 2010

Toward A Mobile Agent Relay Network, Hyon H. Kwak

Theses and Dissertations

Although wireless communication provides connectivity where hardwired links are difficult or impractical, it is still hindered by the environmental conditions where the communicators reside. Signal loss over large distances or because of intervening obstacles can be mitigated by increasing the user's transmission power or adding repeater nodes between the users. Unfortunately, increasing the signal strength strains limited power resources and increases the likelihood of eavesdropping. Stationary repeaters are impractical for highly mobile users in dangerous environments. While mobile relay nodes might be a preferred solution, a centralized control scheme saps bandwidth from important traffic and introduces a single point of …


Spectral Domain Rf Fingerprinting For 802.11 Wireless Devices, Sheldon A. Munns Mar 2010

Spectral Domain Rf Fingerprinting For 802.11 Wireless Devices, Sheldon A. Munns

Theses and Dissertations

The increase in availability and reduction in cost of commercial communication devices (e.g. IEEE compliant such as 802.11, WiFi, 802.16, Bluetooth etc.) has increased wireless user exposure and the need for techniques to properly identify/classify signals for increased security measures. Communication device emissions include intentional modulation that enables correct device operation. Hardware and environmental factors alter the ideal response and induce unintentional modulation effects. If these effects (features) are sufficiently unique, it becomes possible to identify a device using its fingerprint, with potential discrimination of not only the manufacturer but possibly the serial number for a given manufacturer. Many techniques …


Dynamic Network Formation Using Ant Colony Optimization, Steven C. Oimoen Mar 2009

Dynamic Network Formation Using Ant Colony Optimization, Steven C. Oimoen

Theses and Dissertations

Military and industry are moving toward every device being network enabled and connected for reliable availability of communication and information. To make this type of system a reality, the devices must be capable of forming a network topology on their own in a dynamic environment to ensure that the correct information reaches a desired location and on-time. This research presents three contributions for solving highly dynamic (i.e. drastic change within the network) Multi-commodity Capacitated Network Design Problems (MCNDPs) resulting in a distributed multi-agent network design algorithm. The first contribution incorporates an Ant Colony Optimization (ACO) algorithm Ant Colony System (ACS) …


Dialable Cryptography For Wireless Networks, Marnita T. Eaddie Mar 2008

Dialable Cryptography For Wireless Networks, Marnita T. Eaddie

Theses and Dissertations

The objective of this research is to develop an adaptive cryptographic protocol, which allows users to select an optimal cryptographic strength and algorithm based upon the hardware and bandwidth available and allows users to reason about the level of security versus the system throughput. In this constantly technically-improving society, the ability to communicate via wireless technology provides an avenue for delivering information at anytime nearly anywhere. Sensitive or classified information can be transferred wirelessly across unsecured channels by using cryptographic algorithms. The research presented will focus on dynamically selecting optimal cryptographic algorithms and cryptographic strengths based upon the hardware and …


Priority Based Buffering Over Multiple Lossy Links Using Tcp Aware Layer Buffering, Kevin J. Savidge Mar 2008

Priority Based Buffering Over Multiple Lossy Links Using Tcp Aware Layer Buffering, Kevin J. Savidge

Theses and Dissertations

Wireless military information systems require high reliability, which is difficult to achieve in adverse conditions. To provide high reliability, one must overcome packet loss across multiple wireless hops. Buffering packets in a lossy environment is well explored; however, the ability to selectively buffer TCP traffic across multiple lossy links is a new area of research. This document seeks to explore the delivery of high priority traffic in a lossy environment and conclude that prioritized buffing can increase the probability that a high priority download will finish, where others will fail. It is shown that buffering provides six times the throughput …


Scripted Mobile Network Routing In A Contested Environment, Anthony R. Otto Mar 2008

Scripted Mobile Network Routing In A Contested Environment, Anthony R. Otto

Theses and Dissertations

Mobile wireless network protocols currently run on optimistic routing algorithms, adjusting node connectivity only when the chosen connectivity metrics, such as signal strength, pass beyond minimum thresholds. Optimistic routing has several weaknesses. Optimistic routing suffers from increased network overhead during increased frequency of node movement and increased node density per area, and optimistic routing also suffers from non-optimistic access change for individual nodes. The overall communication throughput of a network may be increased if the network topology change is scripted; a scripted plan can allow messages to travel along a more efficient topological path while creating less topology control traffic. …


Performance Analysis And Comparison Of Multiple Routing Protocols In A Large-Area, High Speed Mobile Node Ad Hoc Network, Daniel K. Roberts Jun 2007

Performance Analysis And Comparison Of Multiple Routing Protocols In A Large-Area, High Speed Mobile Node Ad Hoc Network, Daniel K. Roberts

Theses and Dissertations

The U.S. Air Force is interested in developing a standard ad hoc framework using "heavy" aircraft to route data across large regions. The Zone Routing Protocol (ZRP) has the potential to provide seamless large-scale routing for DOD under the Joint Tactical Radio System program. The goal of this study is to determine if there is a difference between routing protocol performance when operating in a large-area MANET with high-speed mobile nodes. This study analyzes MANET performance when using reactive, proactive, and hybrid routing protocols, specifically AODV, DYMO, Fisheye, and ZRP. This analysis compares the performance of the four routing protocols …


On-Demand Key Distribution For Mobile Ad-Hoc Networks, Daniel F. Graham Mar 2007

On-Demand Key Distribution For Mobile Ad-Hoc Networks, Daniel F. Graham

Theses and Dissertations

Mobile ad-hoc networks offer dynamic portable communication with little or no infrastructure. While this has many benefits, there are additional shortcomings specific to wireless communication that must be addressed. This research proposes gossip-based on-demand key distribution as a means to provide data encryption for mobile ad-hoc networks. This technique uses message keys to avoid encrypting and decrypting a message at every node. Other optimizations used include secure channel caching and joint rekey messages. The use of gossip makes the scheme robust to node failure. Experimental results show only a 15% increase in end-to-end delay with a node failure rate of …


Overcoming Tcp Degradation In The Presence Of Multiple Intermittent Link Failures Utilizing Intermediate Buffering, Duane F. Harmon Mar 2007

Overcoming Tcp Degradation In The Presence Of Multiple Intermittent Link Failures Utilizing Intermediate Buffering, Duane F. Harmon

Theses and Dissertations

It is well documented that assumptions made in the popular Transmission Control Protocol's (TCP) development, while essential in the highly reliable wired environment, are incompatible with today's wireless network realities in what we refer to as a challenged environment. Challenged environments severely degrade the capability of TCP to establish and maintain a communication connection with reasonable throughput. This thesis proposes and implements an intermediate buffering scheme, implemented at the transport layer, which serves as a TCP helper protocol for use in network routing equipment to overcome short and bursty, but regular, link failures. Moreover, the implementation requires no modifications to …


A General Framework For Analyzing, Characterizing, And Implementing Spectrally Modulated, Spectrally Encoded Signals, Marcus L. Roberts Sep 2006

A General Framework For Analyzing, Characterizing, And Implementing Spectrally Modulated, Spectrally Encoded Signals, Marcus L. Roberts

Theses and Dissertations

Fourth generation (4G) communications will support many capabilities while providing universal, high speed access. One potential enabler for these capabilities is software defined radio (SDR). When controlled by cognitive radio (CR) principles, the required waveform diversity is achieved via a synergistic union called CR-based SDR. Research is rapidly progressing in SDR hardware and software venues, but current CR-based SDR research lacks the theoretical foundation and analytic framework to permit efficient implementation. This limitation is addressed here by introducing a general framework for analyzing, characterizing, and implementing spectrally modulated, spectrally encoded (SMSE) signals within CR-based SDR architectures. Given orthogonal frequency division …


Evaluation Of The Effects Of Predicted Associativity On The Reliability And Performance Of Mobile Ad Hoc Networks, Esteban Francisco Sanchez Jun 2006

Evaluation Of The Effects Of Predicted Associativity On The Reliability And Performance Of Mobile Ad Hoc Networks, Esteban Francisco Sanchez

Theses and Dissertations

Routing in Mobile Ad Hoc Networks (MANETs) presents unique challenges not encountered in conventional networks. Predicted Associativity Routing (PAR) is a protocol designed to address reliability in MANETs. Using associativity information, PAR calculates the expected lifetime of neighboring links. Nodes use this expected lifetime, and their neighbor's connectivity to determine a residual lifetime. The routes are selected from those with the longest residual lifetimes. In this way, PAR attempts to improve the reliability of discovered routes. PAR is compared to AODV using a variety of reliability and performance metrics. Despite its focus on reliability, PAR does not provide more reliable …


Evaluation Of Energy Costs And Error Performance Of Range-Aware Anchor-Free Localization Algorithms For Wireless Sensor Networks, Gustav Julio Jordt Mar 2006

Evaluation Of Energy Costs And Error Performance Of Range-Aware Anchor-Free Localization Algorithms For Wireless Sensor Networks, Gustav Julio Jordt

Theses and Dissertations

This research examines energy and error tradeoffs in Anchor-Free Range-Aware Wireless Sensor Network (WSN) Localization algorithms. A concurrent and an incremental algorithm (Anchor Free Localization (AFL) and Map Growing) are examined under varying network sizes, densities, deployments, and range errors. Despite current expectations, even the most expensive configurations do not expend significant battery life (at most 0.4%), implying little energy can be conserved during localization. Due to refinement, AFL is twice as accurate, using 6 times the communication. For both, node degree affects communication most. As degree increases, Map Growing communication increases, while AFL transmissions drop. Nodes with more neighbors …


An Adaptable Energy-Efficient Medium Access Control Protocol For Wireless Sensor Networks, Justin T. Kautz Mar 2006

An Adaptable Energy-Efficient Medium Access Control Protocol For Wireless Sensor Networks, Justin T. Kautz

Theses and Dissertations

Wireless networks have become ubiquitous recently and therefore their usefulness has also become more extensive. Wireless sensor networks (WSN) detect environmental information with sensors in remote settings. One problem facing WSNs is the inability to resupply power to these energy-constrained devices due to their remoteness. Therefore to extend a WSN's effectiveness, the lifetime of the network must be increased by making them as energy efficient as possible. An energy efficient medium access control (MAC) can boost a WSN's lifetime. This research creates a MAC protocol called Adaptive sensor Medium Access Control (AMAC) which is based on Sensor Medium Access Control …


Exploiting Semi-Directional Transceivers For Localization In Communication Systems, Andrew S. Crockford Mar 2006

Exploiting Semi-Directional Transceivers For Localization In Communication Systems, Andrew S. Crockford

Theses and Dissertations

Localization is the process of determining relative, as well as absolute, positions of communicating devices. Traditionally, the process is conducted using range or directional estimates. In contrast, this research uses weak information to form relatively tight bounds on possible locations of communicating devices. Under certain conditions, achieved location estimation results are strong. However, these results are highly sensitive to the operating conditions of the proposed networks. More significant results were obtained from specialized cases and that the application yields somewhat limited information for a general randomized network topology. Feasible localization results were found to be attainable but not necessarily practical …


Supplementing An Ad-Hoc Wireless Network Routing Protocol With Radio Frequency Identification (Rfid) Tags, Leroy S. Willemsen Mar 2006

Supplementing An Ad-Hoc Wireless Network Routing Protocol With Radio Frequency Identification (Rfid) Tags, Leroy S. Willemsen

Theses and Dissertations

Wireless sensor networks (WSNs) have a broad and varied range of applications, yet all of these are limited by the resources available to the sensor nodes that make up the WSN. The most significant resource is energy. A WSN may be deployed to an inhospitable or unreachable area, leaving it with a non-replenishable power source. This research examines a way of reducing energy consumption by augmenting the nodes with radio frequency identification (RFID) tags that contain routing information. It was expected that RFID tags would reduce the network throughput, the ad hoc on-demand distance vector (AODV) routing traffic sent, and …


Evaluation And Analysis Of Node Localization Power Cost In Ad-Hoc Wireless Sensor Networks With Mobility, Brian A. Sessler Mar 2006

Evaluation And Analysis Of Node Localization Power Cost In Ad-Hoc Wireless Sensor Networks With Mobility, Brian A. Sessler

Theses and Dissertations

One of the key concerns with location-aware Ad-hoc Wireless Sensor Networks (AWSNs) is how sensor nodes determine their position. The inherent power limitations of an AWSN along with the requirement for long network lifetimes makes achieving fast and power-efficient localization vital. This research examines the cost (in terms of power) of network irregularities on communications and localization in an AWSN. The number of data bits transmitted and received are significantly affected by varying levels of mobility, node degree, and network shape. The concurrent localization approach, used by the APS-Euclidean algorithm, has significantly more accurate position estimates with a higher percentage …


Performance Analysis Of A Cooperative Search Algorithm For Multiple Unmanned Aerial Vehicles Under Limited Communication Conditions, Kevin M. Morris Mar 2006

Performance Analysis Of A Cooperative Search Algorithm For Multiple Unmanned Aerial Vehicles Under Limited Communication Conditions, Kevin M. Morris

Theses and Dissertations

This research investigates the impacts of realistic wireless communications upon a group of unmanned aerial vehicles (UAVs) utilizing a distributed search algorithm. The UAVs are used to survey an area for mobile targets and they require communication to cooperatively locate the targets. The mobile targets do not continually radiate energy, which exacerbates the search effort; a UAV could fly directly over a target and not detect it. A simulation of cooperative UAVs is implemented using the OPNET Modeler network simulation tool. The search performance of a group of UAVs is observed when communication range, data rate, and the number of …


Combining Quality Of Service And Topology Control In Directional Hybrid Wireless Networks, Michael C. Erwin Mar 2006

Combining Quality Of Service And Topology Control In Directional Hybrid Wireless Networks, Michael C. Erwin

Theses and Dissertations

Recent advancements in information and communications technology are changing the information environment in both quantitative and qualitative measures. The developments in directional wireless capabilities necessitate the ability to model these new capabilities, especially in dynamic environments typical of military combat operations. This thesis establishes a foundation for the definition and consideration of the unique network characteristics and requirements introduced by this novel instance of the Network Design Problem (NDP). Developed are a Mixed-Integer Linear Program (MILP) formulation and two heuristic strategies for solving the NDP. A third solution strategy using the MILP formulation with a degree-constrained Minimum Spanning Tree starting …


Device Discovery In Frequency Hopping Wireless Ad Hoc Networks, Brian S. Peterson Sep 2004

Device Discovery In Frequency Hopping Wireless Ad Hoc Networks, Brian S. Peterson

Theses and Dissertations

This research develops a method for efficient discovery of wireless devices for a frequency hopping spread spectrum, synchronous, ad hoc network comprised of clustered sub-networks. The Bluetooth wireless protocol serves as the reference protocol. The development of a discovery, or outreach, method for scatternets requires the characterization of performance metrics of Bluetooth piconets, many of which are unavailable in literature. Precise analytical models characterizing the interference caused to Bluetooth network traffic by inquiring devices, the probability mass function of packet error rates between arbitrary pairs of Bluetooth networks, and Bluetooth discovery time distribution are developed. Based on the characterized performance …


Ultra Wide Band Multiple Access Performance Using Th-Ppm And Ds-Bpsk Modulations, Courtney M. Canadeo Mar 2003

Ultra Wide Band Multiple Access Performance Using Th-Ppm And Ds-Bpsk Modulations, Courtney M. Canadeo

Theses and Dissertations

The increasing demand for portable, high data rate communications has focused much attention on wireless technology. Ultra Wide Band (UWB) waveforms have the ability to deliver megabits of information while maintaining low average power consumption. In accordance with recent FCC ruling, UWB systems are now allowed to operate in the unlicensed spectrum of 3.1 to 10.6 GHz, motivating renewed interest in the forty year old concept of impulse radio. Gaussian monocycles produce UWB waveforms occupying large bandwidths with multiple access (MA) capability enabled by spread spectrum techniques. Time Hopping (TH) and Direct Sequence (DS) modulations are considered here for UWB …


Wlan Csma/Ca Performance In A Bluetooth Interference Environment, Randall B. Noel Mar 2003

Wlan Csma/Ca Performance In A Bluetooth Interference Environment, Randall B. Noel

Theses and Dissertations

IEEE 802.11 WLANs and Bluetooth piconets both operate in the 2.4 GHz Industrial Scientific and Medical (ISM) radio band. When operating in close proximity, these two technologies interfere with each other. Current literature suggests that IEEE 802.11 (employing direct sequence spread spectrum technology) is more susceptible to this interference than Bluetooth, which uses frequency hopping spread spectrum technology, resulting in reduced throughput. Current research tends to focus on the issue of packet collisions, and not the fact that IEEE 802.11 may also delay its transmissions while the radio channel is occupied by a Bluetooth signal. This research characterizes previously neglected …


Performance Evaluation Of Hyperbolic Position Location Technique In Cellular Wireless Networks, Hakan Senturk Mar 2002

Performance Evaluation Of Hyperbolic Position Location Technique In Cellular Wireless Networks, Hakan Senturk

Theses and Dissertations

This study addresses the wireless geolocation problem that has been an attractive subject for the last few years after Federal Communications Commission (FCC) mandate for wireless service providers to locate emergency 911 users with a high degree of accuracy -within a radius of 125 meters, 67 percent of the time by October 2001. There are a number of different geolocation technologies that have been proposed. These include, Assisted GPS (A-GPS), network-based technologies such as Enhanced Observed Time Difference (E-OTD), Time Difference of Arrival (TDOA), Angle of Arrival (AOA), and Cell of Origin (COO). This research focuses on network based techniques, …


Integrated Manet Mutual Authentication System, Jason T. Ballah Mar 2002

Integrated Manet Mutual Authentication System, Jason T. Ballah

Theses and Dissertations

The Integrated MANET Mutual Authentication System (IMMAS) provides implied mutual authentication of all routing and data traffic within a Mobile Ad Hoc Network (MANET) by combining Elliptic Curve Cryptography, a public-key cryptosystem, with the Dynamic Source Routing (DSR) Protocol. IMMAS provides security by effectively hiding network topology from adversaries while reducing the potential for, among other things, traffic analysis and data tampering, all while providing a graceful degradation for each of the authentication components. Current research in MANETs tends to focus primarily on routing issues leaving topics such as security and authentication for future research. IMMAS focuses on achieving a …


Routing Of Time-Sensitive Data In Mobile Ad Hoc Networks, Necdet Kilic Mar 2001

Routing Of Time-Sensitive Data In Mobile Ad Hoc Networks, Necdet Kilic

Theses and Dissertations

This research focuses on routing of time-sensitive data in mobile ad hoc networks. Routing protocols that were developed for ad hoc networks have been reviewed. Ad Hoc On-demand Distance Vectoring (AODV) routing protocol, which is a prominent routing protocol among these protocols have been implemented in OPNET, a discrete-event simulation tool. Taking AODV as a point of departure, a routing protocol named Real Time Routing Protocol (RTRP) has been developed and also implemented in simulation environment. The performance of these routing protocols have been observed by simulating them in various experiments where the workload has been chosen to be time-sensitive …


Using Direct-Sequenced Spread Spectrum In A Wired Local Area Network, Robert J. Bonner Mar 2001

Using Direct-Sequenced Spread Spectrum In A Wired Local Area Network, Robert J. Bonner

Theses and Dissertations

Code division multiple access provides an ability to share channel bandwidth amongst users at the same time. Individual user performance is not degraded with the addition of more users, unlike traditional Ethernet. Using direct sequenced spread spectrum in a wired local area network, network performance is improved. For a network in overload conditions, individual station throughput is increased by nearly 212% while mean end-to-end delay was reduced by 800%. The vast improvement demonstrated by this research has the capability to extend legacy-cabling infrastructures for many years to come while easily accommodating new bandwidth intensive multimedia applications.


Turbo Codes For Wireless Mobile Communication Systems Applications, Moataz M. Salah Jun 2000

Turbo Codes For Wireless Mobile Communication Systems Applications, Moataz M. Salah

Theses and Dissertations

Research in coding theory has seen many proposals aimed at the construction of powerful codes using block and convolutional codes. Recently, a new forward error control code, known as turbo code, was introduced. This new code yields very good performance (near the Shannon limit) with relatively simple component codes and large interleavers in combination with an iterative decoding process. Among the most important applications of turbo codes are wireless mobile communication systems. A significant performance metric for this application is the minimization of end-to-end delay. In this dissertation, different ways to enhance the performance of turbo codes with short frames …