Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Networks

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 24 of 24

Full-Text Articles in Electrical and Computer Engineering

Investigating The Effects Of Network Dynamics On Quality Of Delivery Prediction And Monitoring For Video Delivery Networks, Obinna C. Izima Jan 2023

Investigating The Effects Of Network Dynamics On Quality Of Delivery Prediction And Monitoring For Video Delivery Networks, Obinna C. Izima

Doctoral

Video streaming over the Internet requires an optimized delivery system given the advances in network architecture, for example, Software Defined Networks. Machine Learning (ML) models have been deployed in an attempt to predict the quality of the video streams. Some of these efforts have considered the prediction of Quality of Delivery (QoD) metrics of the video stream in an effort to measure the quality of the video stream from the network perspective. In most cases, these models have either treated the ML algorithms as black-boxes or failed to capture the network dynamics of the associated video streams.

This PhD investigates …


Robust Control Strategies For Optimal Operation Of Distributed Generation In Smart Microgrids, Chi-Thang Phan-Tan Jan 2022

Robust Control Strategies For Optimal Operation Of Distributed Generation In Smart Microgrids, Chi-Thang Phan-Tan

Theses

The high penetration of PV systems and fast communications networks increase the potential for PV inverters to support the stability and performance of smart grids and microgrids. PV inverters in the distribution network can work cooperatively and follow centralized and decentralized control commands to optimize energy production while meeting grid code requirements. However, there are older autonomous inverters that have already been installed and will operate in the same network as smart controllable ones. This research proposes a decentralized optimal control (DOC) that performs multi-objective optimization for a group of PV inverters in a network of existing residential loads and …


Smart Energy Harvesting For Internet Of Things Networks, Fisayo Sangoleye Oct 2021

Smart Energy Harvesting For Internet Of Things Networks, Fisayo Sangoleye

Electrical and Computer Engineering ETDs

In this thesis, we address the problem of prolonging the battery life of Internet of Things (IoT) nodes by introducing a smart energy harvesting framework for IoT networks supported by femtocell access points (FAPs) based on the principles of Contract Theory and Reinforcement Learning. Initially, the IoT nodes’ social and physical characteristics are identified and captured through the concept of IoT node types. Then, Contract Theory is adopted to capture the interactions among the FAPs, who provide personalized rewards, i.e., charging power, to the IoT nodes to incentivize them to invest their effort, i.e., transmission power, to report their data …


Multimedia Networks And Communications, Houbing Song Jul 2021

Multimedia Networks And Communications, Houbing Song

Publications

Sight and sound is a type of correspondence that joins distinctive substance structures like content, sound, pictures, liveliness, or video into a solitary show, rather than customary broad communications, like written word or sound chronicles. Famous instances of interactive media incorporate video web recordings, sound slideshows and animated videos. Multimedia can be recorded for playback on PCs, workstations, cell phones, and other electronic gadgets, either on request or progressively (streaming). In the early long stretches of sight and sound, the expression "rich media" was inseparable from intuitive mixed media. Over the long run. Improved degrees of intuitiveness are made conceivable …


Assessment Of Cable Length Limit For Effective Protection By Z-Source Circuit Breakers In Dc Power Networks, Ruiyun Fu, Sagar Bhatta, Joseph M. Keller, Yucheng Zhang Jan 2021

Assessment Of Cable Length Limit For Effective Protection By Z-Source Circuit Breakers In Dc Power Networks, Ruiyun Fu, Sagar Bhatta, Joseph M. Keller, Yucheng Zhang

Electrical & Computer Engineering Faculty Publications

This paper introduces groundbreaking research on how to assess the Cable Length Limit (CLL) to ensure effective protection by Z-source Circuit Breakers (ZCBs) in DC power networks. It has been revealed that the line parameters of power cables have a significant impact on the cutoff performance of ZCBs. The question of assessing the CLL has been raised as an unsolved problem. In this paper, a method of CLL assessment is proposed based on physical models and simulation tests. To verify the proposed method, two studies were performed to assess the Cable Length Limits depending on fault levels and power delivery …


Optical Wireless Data Center Networks, Abdelbaset S. Hamza Oct 2018

Optical Wireless Data Center Networks, Abdelbaset S. Hamza

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Bandwidth and computation-intensive Big Data applications in disciplines like social media, bio- and nano-informatics, Internet-of-Things (IoT), and real-time analytics, are pushing existing access and core (backbone) networks as well as Data Center Networks (DCNs) to their limits. Next generation DCNs must support continuously increasing network traffic while satisfying minimum performance requirements of latency, reliability, flexibility and scalability. Therefore, a larger number of cables (i.e., copper-cables and fiber optics) may be required in conventional wired DCNs. In addition to limiting the possible topologies, large number of cables may result into design and development problems related to wire ducting and maintenance, heat …


Electrical & Computer Engineering News, Georgia Southern University May 2018

Electrical & Computer Engineering News, Georgia Southern University

Electrical & Computer Engineering News (2014-2023)

  • Data-driven Adaptive Optimal Control and Its Applications
  • Delivering Ultra-Reliable, LowLatency Communications, by Dr. Omid Semiari
  • “Human RF Exposure to Cellular Communication Networks, BY Dr. Kim”


Making Sense Of Email Addresses On Drives, Neil C. Rowe, Riqui Schwamm, Michael R. Mccarrin, Ralucca Gera Jan 2016

Making Sense Of Email Addresses On Drives, Neil C. Rowe, Riqui Schwamm, Michael R. Mccarrin, Ralucca Gera

Journal of Digital Forensics, Security and Law

Drives found during investigations often have useful information in the form of email addresses which can be acquired by search in the raw drive data independent of the file system. Using this data we can build a picture of the social networks that a drive owner participated in, even perhaps better than investigating their online profiles maintained by social-networking services because drives contain much data that users have not approved for public display. However, many addresses found on drives are not forensically interesting, such as sales and support links. We developed a program to filter these out using a Naïve …


Reducing Multiple Access Interference In Broadband Multi-User Wireless Networks, Ali Nayef Alqatawneh Jul 2015

Reducing Multiple Access Interference In Broadband Multi-User Wireless Networks, Ali Nayef Alqatawneh

Graduate Theses and Dissertations

This dissertation is devoted to developing multiple access interference (MAI) reduction techniques for multi-carrier multi-user wireless communication networks.

In multi-carrier code division multiple access (MC-CDMA) systems, a full multipath diversity can be achieved by transmitting one symbol over multiple orthogonal subcarriers by means of spreading codes. However, in frequency selective fading channels, orthogonality among users can be destroyed leading to MAI. MAI represents the main obstacle to support large number of users in multi-user wireless systems. Consequently, MAI reduction becomes a main challenge when designing multi-carrier multi-user wireless networks. In this dissertation, first, we study MC-CDMA systems with different existing …


Openness, Intellectual Property And Standardization In The European Ict Sector, Carl Mair Jan 2012

Openness, Intellectual Property And Standardization In The European Ict Sector, Carl Mair

IP Theory

No abstract provided.


Decision Strategies For A P2p Computing System, Grzegorz Chmaj, Krzysztof Walkowiak Jan 2012

Decision Strategies For A P2p Computing System, Grzegorz Chmaj, Krzysztof Walkowiak

Electrical & Computer Engineering Faculty Research

Peer-to-Peer (P2P) computing (also called ‘public-resource computing’) is an effective approach to perform computation of large tasks. Currently used P2P computing systems (e.g., BOINC) are most often centrally managed, i.e., the final result of computations is created at a central node using partial results – what may be not efficient in the case when numerous participants are willing to download the final result. In this paper, we propose a novel approach to P2P computing systems. We assume that results can be delivered to all peers in a distributed way using three types of network flows: unicast, Peer-to-Peer and anycast. We …


P2pstm: A Peer-To-Peer Software Transactional Memory, Phil Pratt-Szeliga, Jim Fawcett Oct 2010

P2pstm: A Peer-To-Peer Software Transactional Memory, Phil Pratt-Szeliga, Jim Fawcett

Electrical Engineering and Computer Science - All Scholarship

Peer-to-Peer network topologies are such that there is no centralized server in a distributed system but rather each peer is part server and part client. This idea was originally popularized with peer-to-peer file sharing. If one were to distribute computation on a peer-to-peer network topology, consistency of shared data among peers is a problem. Software Transactional Memory (STM) is a lock free mechanism of assuring consistency of memory among threads of execution that has favorable performance over locked methods when the number of threads is large. This paper presents a method to use STM methods with a peer-to-peer network architecture …


Wireless Sensor Network Approach To Aeronautical Telemetry, Oluwasegun Babatunde Tinubi Jul 2010

Wireless Sensor Network Approach To Aeronautical Telemetry, Oluwasegun Babatunde Tinubi

Theses and Dissertations

Wireless sensor networks have become a rapidly growing research field in recent years. They are envisioned to have a wide range of applications in military, environmental and many other fields. We examine the performance of wireless sensor network applications to aeronautical telemetry. To date, test ranges have relied on a single telemetry ground station for the reception of packets from all air borne transmitters. We researched an alternate means of achieving this same goal with fewer resources. It is a well known fact that communication power and bandwidth are the most expensive commodities in wireless communications. The telemetry world is …


Meshscan: A Fast And Efficient Handoff Scheme For Ieee 802.11 Wireless Mesh Networks, Yin Chen Apr 2010

Meshscan: A Fast And Efficient Handoff Scheme For Ieee 802.11 Wireless Mesh Networks, Yin Chen

Masters

As a next generation network solution, Wireless Mesh Networks (WMN) provides fast Internet access to a large area, which is from university campus to city scale. In order to provide an uninterrupted Internet experience to a mobile client, a process called handoff is required to maintain the network connection from one Mesh Node (MN) to another MN. Ideally, handoff should be completely transparent to mobile users. A critical application like VoIP will require a handoff capability that transfers a call from one mesh node (MN) to another in less than 50 msec. However the current IEEE 802.11 standards do not …


Feasibility Of Using Passive Monitoring Techniques In Mesh Networks For The Support Of Routing, Chenzhe Zhang Jan 2010

Feasibility Of Using Passive Monitoring Techniques In Mesh Networks For The Support Of Routing, Chenzhe Zhang

Masters

In recent years, Wireless Mesh Networks (WMNs) have emerged as a promising solution to provide low cost access networks that extend Internet access and other networking services. Mesh routers form the backbone connectivity through cooperative routing in an often unstable wireless medium. Therefore, the techniques used to monitor and manage the performance of the wireless network are expected to play a significant role in providing the necessary performance metrics to help optimize the link performance in WMNs. This thesis initially presents an assessment of the correlation between passive monitoring and active probing techniques used for link performance measurement in single …


Dual-Use Of Compact Hf Radars For The Detection Of Mid- And Large-Size Vessels, Hugh Roarty, Don Barrick, Josh Kohut, Scott Glenn Jan 2010

Dual-Use Of Compact Hf Radars For The Detection Of Mid- And Large-Size Vessels, Hugh Roarty, Don Barrick, Josh Kohut, Scott Glenn

Turkish Journal of Electrical Engineering and Computer Sciences

This paper describes the development of the SeaSonde High Frequency Radar system into a dual-use application for the mapping of ocean surface currents and detection of ships at sea. This development entailed the creation of a new radar waveform that would permit this dual-use as well as a detection algorithm to identify the ships in the radar spectra. The detection algorithm utilizes two methods for calculating a background signal level: an infinite impulse response (IIR) filter and a two-dimensional median filter. These two methods are employed simultaneously with multiple length averaging times to maximize the number of detections. The initial …


Network Optimization Of Dynamically Complex Systems, Ramez Ahmed Shamseldin Apr 2009

Network Optimization Of Dynamically Complex Systems, Ramez Ahmed Shamseldin

Engineering Management & Systems Engineering Theses & Dissertations

The aim of this research is to optimize large scale network handling capabilities for large system inventories and to implement strategies for the purpose of reducing capital expenses. As computers become more and more networked, it is easier to share files among storage media. In addition, more bandwidth will be consumed by network flow because customers will be connected through networks which will transfer files and data, such as video files (MPEGn, AVI, WMV, etc.) to be watched at a customer's computer (host). Furthermore, these networks terminals will be used as mini warehouses to save files and data. Selective files …


Game Theoretic Approach In Routing Protocol For Wireless Ad Hoc Networks, Mohammad Naserian, Kemal Tepe Jan 2009

Game Theoretic Approach In Routing Protocol For Wireless Ad Hoc Networks, Mohammad Naserian, Kemal Tepe

Electrical and Computer Engineering Publications

This paper introduces a game theoretic method, called forwarding dilemma game (FDG), which controls routing overhead in dense multi-hop wireless ad hoc networks. The players of the game are the wireless nodes with set of strategies {Forward, Not forward}. The game is played whenever an arbitrary node in the network receives a flooding packet. In FDG, every player needs to know the number of players of the game. That is why a neighbor discovery protocol (NDP) is introduced. In order for NDP to function, a field is attached to the flooding packets (routing overhead packets). The mixed strategy Nash equilibrium …


Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala Jan 2008

Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala

Journal of Digital Forensics, Security and Law

That “knowledge is power” is fast becoming a cliché within the intelligentsia. Such power however, depends largely on how knowledge itself is exchanged and used, which says a lot about the tools of its transmission, exchange, and storage. Information and communication technology (ICT) plays a significant role in this respect. As a networked tool, it enables efficient exchanges of video, audio and text data beyond geographical and time constraints. Since this data is exchanged over the worldwide web (www), it can be accessible by anyone in the world using the internet. The risk of unauthorised access, interception, modification, or even …


Effect Of Free Bandwidth On Voip Performance In 802.11b Wlan Networks, Miroslaw Narbutt, Mark Davis Jun 2006

Effect Of Free Bandwidth On Voip Performance In 802.11b Wlan Networks, Miroslaw Narbutt, Mark Davis

Conference papers

In this paper we experimentally study the relationship between bandwidth utilization in the wireless LAN and the quality of VoIP calls transmitted over the wireless medium. Specifically we evaluate how the amount of free bandwidth decreases as the number of calls increases and how this influences transmission impairments (i.e. delay, loss and jitter) and thus degrades call quality. We show that the amount of free bandwidth is a good indicator for predicting VoIP call quality.


A Formal Object Model For Layered Networks To Support Verification And Simulation, Rasha M. B. E. Morsi Apr 2002

A Formal Object Model For Layered Networks To Support Verification And Simulation, Rasha M. B. E. Morsi

Electrical & Computer Engineering Theses & Dissertations

This work presents an abstract formal model of the interconnection structure of the Open Systems Interconnection Reference Model (OSI-RM) developed using Object-Oriented modeling principles permitting it to serve as a re-usable platform in supporting the development of simulations and formal methods applied to layered network protocols. A simulation of the object model using MODSIM III was developed and Prototype Verification System (PVS) was used to show the applicability of the object model to formal methods by formally specifying and verifying a Global Systems for Mobile communications (GSM) protocol. This application has proved to be successful in two aspects. The first …


Channel-Mismatch Compensation In Speaker Identification Feature Selection And Adaptation With Artificial Neural Networks, Edmund A. Fitzgerald Mar 1998

Channel-Mismatch Compensation In Speaker Identification Feature Selection And Adaptation With Artificial Neural Networks, Edmund A. Fitzgerald

Theses and Dissertations

We develop and present results of an artificial neural network (ANN) based compensation technique for mismatched classifier training and testing conditions in speaker identification (SID). One ANN per feature per speaker is trained to perform a mapping of that feature from a corrupted condition to an undistorted condition. Therefore, a classifier trained under one condition may be used to classify data collected under a different condition. Speech utterances from 168 speakers, collected in a studio, and also re-recorded after transmission over telephone networks, are used for developing and testing the method. Peak formant resonant frequencies, their bandwidths, and pitch are …


A Complexity Analysis Of Smart Pixel Switching Nodes For Photonic Extended Generalized Shuffle Switching Networks, Thomas J. Cloonan, Gaylord W. Richards, Anthony L. Lentine, Frederick B. Mccormick, Harvard Scott Hinton, Stephen J. Hinterlong Jan 1993

A Complexity Analysis Of Smart Pixel Switching Nodes For Photonic Extended Generalized Shuffle Switching Networks, Thomas J. Cloonan, Gaylord W. Richards, Anthony L. Lentine, Frederick B. Mccormick, Harvard Scott Hinton, Stephen J. Hinterlong

Electrical and Computer Engineering Faculty Publications

This paper studies the architectural tradeoffs found in the use of smart pixels for nodes within photonic switching interconnection networks are discussed. The particular networks of interest within the analysis are strictly nonblocking extended generalized shuffle (EGS) networks. Several performance metrics are defined for the analysis, and the effect of node size on these metrics is studied. Optimum node sizes are defined for each of the performance metrics and system-level limitations are identified.


Architectural Considerations For Photonic Switching Networks, Harvard S. Hinton Jan 1988

Architectural Considerations For Photonic Switching Networks, Harvard S. Hinton

Electrical and Computer Engineering Faculty Publications

Photonic technologies are reviewed that could become important components of future telecommunication systems. Photonic devices and systems are divided into two classes according to the function they perform. The first class, relational, refers to devices, that map the input channels to the output channels under external control. The second class, logic, perform some type or combination of Boolean logic functions. Some of the strengths and weaknesses of operating in the photonic domain are presented. Relational devices and their applications are discussed. Optical logic devices and their potential applications are reviewed.