Open Access. Powered by Scholars. Published by Universities.®

Systems and Communications Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical & Computer Engineering Theses & Dissertations

Discipline
Keyword
Publication Year

Articles 1 - 30 of 36

Full-Text Articles in Systems and Communications

Virtual Satcom, Long Range Broadband Digital Communications, Dennis George Watson Apr 2020

Virtual Satcom, Long Range Broadband Digital Communications, Dennis George Watson

Electrical & Computer Engineering Theses & Dissertations

The current naval strategy is based on a distributed force, networked together with high-speed communications that enable operations as an intelligent, fast maneuvering force. Satellites, the existing network connector, are weak and vulnerable to attack. HF is an alternative, but it does not have the information throughput to meet the distributed warfighting need. The US Navy does not have a solution to reduce dependency on space-based communication systems while providing the warfighter with the required information speed.

Virtual SATCOM is a solution that can match satellite communications (SATCOM) data speed without the vulnerable satellite. It is wireless communication on a …


A Multi-Agent Systems Approach For Analysis Of Stepping Stone Attacks, Marco Antonio Gamarra Oct 2019

A Multi-Agent Systems Approach For Analysis Of Stepping Stone Attacks, Marco Antonio Gamarra

Electrical & Computer Engineering Theses & Dissertations

Stepping stone attacks are one of the most sophisticated cyber-attacks, in which attackers make a chain of compromised hosts to reach a victim target. In this Dissertation, an analytic model with Multi-Agent systems approach has been proposed to analyze the propagation of stepping stones attacks in dynamic vulnerability graphs. Because the vulnerability configuration in a network is inherently dynamic, in this Dissertation a biased min-consensus technique for dynamic graphs with fixed and switching topology is proposed as a distributed technique to calculate the most vulnerable path for stepping stones attacks in dynamic vulnerability graphs. We use min-plus algebra to analyze …


Coexistence And Secure Communication In Wireless Networks, Saygin Bakşi Jan 2018

Coexistence And Secure Communication In Wireless Networks, Saygin Bakşi

Electrical & Computer Engineering Theses & Dissertations

In a wireless system, transmitted electromagnetic waves can propagate in all directions and can be received by other users in the system. The signals received by unintended receivers pose two problems; increased interference causing lower system throughput or successful decoding of the information which removes secrecy of the communication. Radio frequency spectrum is a scarce resource and it is allocated by technologies already in use. As a result, many communication systems use the spectrum opportunistically whenever it is available in cognitive radio setting or use unlicensed bands. Hence, efficient use of spectrum by sharing users is crucial to increase maximize …


Analysis And Implementation Of Communications Systems For Small Satellite Missions, Jason S. Harris Jul 2016

Analysis And Implementation Of Communications Systems For Small Satellite Missions, Jason S. Harris

Electrical & Computer Engineering Theses & Dissertations

Nano satellites are becoming more and more popular space platforms due to their relatively low cost. Constellations of many of these small satellites are being launched for scientific and research purposes. This thesis has examined implementing a communications system for small satellites that can be used to maintain constant contact with satellites as they orbit the Earth. It analyzes the various components of a small satellite and how they integrate. It then discusses the different abstraction layers that will be required in order to support the same software architecture across various types of hardware. An orbital analysis was performed to …


Classification Of Digital Communication Signal Modulation Schemes In Multipath Environments Using Higher Order Statistics, Meena Sreekantamurthy Jul 2015

Classification Of Digital Communication Signal Modulation Schemes In Multipath Environments Using Higher Order Statistics, Meena Sreekantamurthy

Electrical & Computer Engineering Theses & Dissertations

Automatic identification and classification of modulation schemes in communication signals and decoding of information from the captured signals has assumed great importance recently in the wireless communication industry. Advancements in communications have introduced a large variety of modulation schemes in the transmitted signals; consequently, reliable detection of the modulation scheme in the intercepted signal has become an important issue in communications. It is the aim of this thesis to address this issue of reliable detection. Therefore, this research is focused on modeling and simulation of an automatic modulation classifier and, in particular, on the development of algorithms to use higher …


Camera Viewpoint Invariant Vehicular Traffic Segmentation And Classification, Jeffrey B. Flora Oct 2014

Camera Viewpoint Invariant Vehicular Traffic Segmentation And Classification, Jeffrey B. Flora

Electrical & Computer Engineering Theses & Dissertations

The goal of this intelligent transportation systems work is to develop a computer vision method that is view angle independent for segmenting and classifying vehicular traffic on highway systems. In order to achieve this goal, this work implements an algorithm for vehicle segmentation, feature extraction, and classification using the existing Virginia Department of Transportation (VDOT) infrastructure on networked traffic cameras. The VDOT traffic video is analyzed for vehicle detection and segmentation using an adaptive Gaussian mixture model algorithm. Speed estimation is performed using a single camera calibration. Size and shape features from morphological properties and texture features from histogram of …


Time Synchronization For Ofdm Transmission With Applications To 4g Wimax Wireless Systems, Hamad Alhajri Apr 2013

Time Synchronization For Ofdm Transmission With Applications To 4g Wimax Wireless Systems, Hamad Alhajri

Electrical & Computer Engineering Theses & Dissertations

Orthogonal Frequency Division Multiplexing (OFDM) has recently gained a lot of attention as a promising new technology for Broadband Wireless Access. OFDM-based communication systems decompose a high rate data stream into a set of lower data rate streams that are transmitted simultaneously over multiple subcarriers. WiMAX is an efficient and reliable wireless transmission standard that employs OFDM transmission. Due to its flexibility and mobility, WiMAX is becoming a preferred air interface for next generation broadband wireless systems. OFDM systems, including WiMAX, are very sensitive to time offsets introduced by radio signal propagation between transmitters and receivers. The lack of time …


Impact Of Primary User Activity On The Performance Of Energy-Based Spectrum Sensing In Cognitive Radio Systems, Sara L. Macdonald Apr 2013

Impact Of Primary User Activity On The Performance Of Energy-Based Spectrum Sensing In Cognitive Radio Systems, Sara L. Macdonald

Electrical & Computer Engineering Theses & Dissertations

Increasing numbers of wireless devices and mobile data requirements have led to a spectrum shortage. However spectrum utilization percentages are often low due to the current static spectrum allocation process where primary users (PUs) are given exclusive use to spectrum. Several mechanisms to increase spectrum utilization have been proposed including opportunistic spectrum access (OSA). Cognitive Radio (CR) is an emerging concept in wireless communication systems that aims to enable OSA in licensed frequencies by secondary users (SUs). CR systems are expected to sense the spectrum in order to determine if the PU is transmitting. Therefore OSA performance relies on the …


A Study Of Diversity Techniques For Lte Wireless Systems, Ferhat Kaplan Apr 2011

A Study Of Diversity Techniques For Lte Wireless Systems, Ferhat Kaplan

Electrical & Computer Engineering Theses & Dissertations

The demand of attaining information and the wish to communicating anytime and anywhere has caused numerous innovations in the digital communication world. Today, approximately half of the people on earth somehow use wireless technology which is in every part of our lives. LTE (Long Term Evolution) and WIMAX (Worldwide Interoperability for Microwave Access) standards are the two leading wireless technologies, which support high data rates, multimedia applications, and voice video communications at very high speeds, also called 4G cellular systems in the global market.

These high expectations from wireless technology have revealed multiple antenna techniques which improve the performance and …


Economic Optimization Of Offshore Wind Farms Using The Geometric Algorithm, Mahidhar Nandigam Oct 2010

Economic Optimization Of Offshore Wind Farms Using The Geometric Algorithm, Mahidhar Nandigam

Electrical & Computer Engineering Theses & Dissertations

The research project related to this thesis focuses on the optimization of electrical systems for offshore wind farms for a given capacity. The optimal design and planning is a critical issue for developing cost effectively Offshore Wind Farms in energy systems. The Geometric Optimization Algorithms approach has been adopted to develop an optimization program, where the main components of the electrical system of an offshore wind farm and key technical specifications are used as parameters to be optimized for a minimum cost with necessary constraints. The effectiveness of the optimization program can be evaluated with real-time comparison between offshore wind …


Fault-Injection Experiment For The Statistical Characterization Of Faults In Avionics Communication System, Amy M. Yates Oct 2010

Fault-Injection Experiment For The Statistical Characterization Of Faults In Avionics Communication System, Amy M. Yates

Electrical & Computer Engineering Theses & Dissertations

Since flight control systems perform safety-critical functions, it is important to understand the possible effects on the closed-loop dynamical system's performance caused by these faults. The purpose of this project is to design the software and hardware needed to add fault-injection and monitoring capabilities to ROBUS-2, a flight communication system. ROBUS-2 is the current version of the fault-tolerant computer communication system used by the Scalable Processor-Independent Design for Enhanced Reliability (SPIDER), a general-purpose fault-tolerant integrated modular architecture (IMA) developed at the NASA Langley Research Center. The major components of SPIDER include processing elements (PEs) to perform calculations, bus interface units …


Embedding Gps Data Into Speech Signal, Kagan Can Apr 2010

Embedding Gps Data Into Speech Signal, Kagan Can

Electrical & Computer Engineering Theses & Dissertations

Communication between deployed troops is very important on a battlefield. The real time knowledge of the location of the communicating patter is also very important in many situations because if you do not know the exact position of your units you cannot give correct orders. A minor error in an order can cause fatal results or lead to defeat. In many cases the position of the units is given through the speech channel by simply speaking the coordinates of the location. This can cause misunderstandings due to misinterpretation of the speech and makes it unsafe to rely on such communications. …


A Novel Digital Audio Watermarking Approach By Embedding Coefficients In Discrete Cosine Transform Domain, Erol Duymaz Apr 2010

A Novel Digital Audio Watermarking Approach By Embedding Coefficients In Discrete Cosine Transform Domain, Erol Duymaz

Electrical & Computer Engineering Theses & Dissertations

Watermarking is a basic secure communication method. It is used for embedding a recognizable pattern in media in such a manner that modification of the media also modifies the pattern, thus making it easy to detect the modification. This technique and its variants have many practical applications pertaining to secure communications, media verification, etc. Digital audio watermarking is a technique for embedding data within an audio signal in such a way that the original and the modified audio signals are essentially identical. The embedded data can be used for various purposes such as secure communication in military applications, owner identification …


A Smart-Phone Application For Improving Communication Skills In Children With Autism, Lakshmi Padmaja Battagiri Oct 2009

A Smart-Phone Application For Improving Communication Skills In Children With Autism, Lakshmi Padmaja Battagiri

Electrical & Computer Engineering Theses & Dissertations

The prevalence of autism, a complex neurobiological disorder, has grown at a staggering rate in the recent past. Today, one out of 150 American children is diagnosed with autism. Generally, the disorder appears during an individual's first three years of life of and persists through his/her entire life span. The individual faces various social interaction, communication and behavioral problems. Developmental disabilities, extreme withdrawal, lack of social behaviour, severe language and attention deficits, repetitive behaviours and limited interests are the characteristics of this disorder. There is no verified cure yet, but several therapies and intervention systems especially focused on the early …


A Simulation Study Of Convergence Speed For Distributed Codeword Adaptation Algorithms In Cdma Wireless Systems, Sahana Maharjan Jul 2009

A Simulation Study Of Convergence Speed For Distributed Codeword Adaptation Algorithms In Cdma Wireless Systems, Sahana Maharjan

Electrical & Computer Engineering Theses & Dissertations

In this thesis we present a side-by-side comparison of interference avoidance (IA) algorithms for distributed codeword adaptation in Code Division Multiple Access (CDMA) systems. In CDMA systems, the interference is determined by the values of the cross-correlation of codewords assigned to users, and various algorithms can be used for codeword optimization. The IA algorithms for codeword adaptation considered are the eigen-algorithm, the Minimum Mean Square Error (MMSE) update, and the adaptive IA algorithm, for which we investigate convergence speed using the extensive simulations of several uplink CDMA system scenarios. The results of this thesis were presented at the Fourth IEEE …


Implementation Requirements For The Notice Architecture In Vehicular Communications, Dusadee Treeumnuk Apr 2009

Implementation Requirements For The Notice Architecture In Vehicular Communications, Dusadee Treeumnuk

Electrical & Computer Engineering Theses & Dissertations

Many studies have been focusing on Vehicular Ad-Hoc Networking (VANET) in order to increase the quality of traffic and life on the road. An important aspect in vehicular communications is maintaining the privacy and security of VANET. NOTICE is an emerging architecture promising efficient traffic notification as well as strong immunity to malicious attacks, leading to improvement of safety and reduction of traffic congestion on roadways. To enable secure traffic notification, the NOTICE system employs vehicle-to-infrastructure (V2I) communication rather than vehicle-to-vehicle (V2V) communication like in traditional VANET. The infrastructure consists of sensor belts which are embedded in the roadway and …


Distributed Cluster-Based Outlier Detection In Wireless Sensor Networks, Swetha Gali Oct 2007

Distributed Cluster-Based Outlier Detection In Wireless Sensor Networks, Swetha Gali

Electrical & Computer Engineering Theses & Dissertations

Wireless sensor networks find several potential applications in a variety of fields, such as environmental monitoring and control, battlefields, surveillance, smart buildings, human health monitoring, etc. These sensor networks consist of a large number of very tiny, inexpensive, and low power sensor nodes, which are deployed in a variety of harsh environments that may result in the sensor data getting corrupted. It is thus critical to detect and report these abnormal values in the sensor data, in order to have a better understanding of the monitored environment. Detection of the abnormal values is of special interest for the sensor network …


Performance Analysis Of Ieee 802.11b Devices In The Presence Of Interference Aware Scheduling-Adaptive Frequency Hopping Enabled Bluetooth Devices, Deepthi Gopalpet Apr 2007

Performance Analysis Of Ieee 802.11b Devices In The Presence Of Interference Aware Scheduling-Adaptive Frequency Hopping Enabled Bluetooth Devices, Deepthi Gopalpet

Electrical & Computer Engineering Theses & Dissertations

Wireless Local Area networks (WLAN) and Wireless Personal Area Networks (WPAN) provide complimentary services using the same unlicensed radio frequency band of operation. The 802.11b WLAN operates in the 2.4 GHz band and uses a Direct Sequence Spread Spectrum technique. It is designed to cover large areas ranging up to 100 meters in diameter, which may connect hundreds of computers. Bluetooth (BT) WPAN also operates in the same frequency band as the IEEE 802.lib and it uses a Frequency Hopping Spread Spectrum technique. BT is primarily used for communications between notebooks, palm units and other personal computing devices within relatively …


Fault Arrangements And Their Effect On The Performance Of Wireless Sensor Networks, Dwayne Sayone Blai Oct 2006

Fault Arrangements And Their Effect On The Performance Of Wireless Sensor Networks, Dwayne Sayone Blai

Electrical & Computer Engineering Theses & Dissertations

Wireless sensor networks face many reliability challenges. The networks are deployed in open, hostile environments, making them easily susceptible to network failure. As a result, there are countless faults that can occur in sensor networks, from component failure to outside attacks. Outside attacks take place when an adversary gains control over a node or set of nodes in the network. Outside attackers can destroy a network in numerous ways such as random attacks, clustering attacks, search-based attacks, etc. The method and strategy used in each of these attacks directly affects the network's reliability. Understanding how these adversaries are positioned is …


An Operational Model For Mobile Sensor Cloud Management, Indrajeet Kalyankar Jul 2006

An Operational Model For Mobile Sensor Cloud Management, Indrajeet Kalyankar

Electrical & Computer Engineering Theses & Dissertations

Mobile sensors provide a safe, cost effective method for gathering information in hazardous environments. When the hazardous environment is either unexplored, such as the surface of Mars, or unanticipated, such as the result of chemical contamination, it is desirable for a system to gather information with a minimal amount of outside control (localization, decision control, etc.) and prepositioned sensors. If one takes a look at the number of the sensors deployed on a scale, at the lower end is the sole, multipurpose sensor unit. The upper end deals with hordes of inexpensive, expendable sensors. In the middle, a cluster of …


Mobius: An Omnidirectional Robotic Platform And Software Architecture For Network Teleoperation, Samuel Aaron Miller Apr 2006

Mobius: An Omnidirectional Robotic Platform And Software Architecture For Network Teleoperation, Samuel Aaron Miller

Electrical & Computer Engineering Theses & Dissertations

The following thesis presents the results of a project to develop and test an omnidirectional robotic system (hardware and software) at NASA Langley Research Center's Robotics and Intelligent Machines Lab. The impetus for the project was the unique capabilities of omnidirectional systems. Some of the many potential benefits these systems have include improved material-handling capabilities in constrained environments (such as might be found in extraterrestrial manned habitats), efficient camera-based vehicle teleoperation, and simplified route planning for autonomous robot operations.

The project's focus was to design, build, and test a system that used Mecanum wheels to achieve omnidirectional motion. In addition …


The Reliability Of The Computer Communication Networks Including Mobile Nodes, Sahin Yasar Apr 2006

The Reliability Of The Computer Communication Networks Including Mobile Nodes, Sahin Yasar

Electrical & Computer Engineering Theses & Dissertations

The wireless computer networks have an uncertainty in their structures aside from their big advantages for the users. The environmental conditions, changing locations of the mobile hosts and the changing components in the system can easily affect their reliability. In order to know a system capability performing its functions, keep the reliability at a certain level and/or detect the deficiency of the system, it is necessary to analyze the reliability of a computer communication network including the wired and wireless parts. But the above reasons also make the analysis and a unique solution difficult so a set of algorithms is …


A Multiplier-Less Architecture For High Speed Computation Of Multi-Dimensional Convolution, Ming Zhu Zhang Jul 2005

A Multiplier-Less Architecture For High Speed Computation Of Multi-Dimensional Convolution, Ming Zhu Zhang

Electrical & Computer Engineering Theses & Dissertations

One of the most computationally intensive operations in digital image/video processing systems is multi-dimensional convolution. Every image/video processor needs the convolution module in its pre-processing stage. Fast and efficient design of the convolution module in an application specific system is a great challenge in VLSI (Very Large Scale Integration) design. Convolution operator requires a large set of multipliers and accumulators. A high precision multiplier takes enormous amount of VLSI area and it consumes more power. Hence reduction of the number of multipliers is another important challenge in VLSI design. A multiplier-less architecture for the design of a multi-dimensional convolution module …


Mobility-Pattern Based Localization Update Algorithm For Mobile Wireless Sensor Networks, Mohammad Yacoub Al-Laho Jul 2005

Mobility-Pattern Based Localization Update Algorithm For Mobile Wireless Sensor Networks, Mohammad Yacoub Al-Laho

Electrical & Computer Engineering Theses & Dissertations

In mobile wireless sensor networks, sensors move in the monitored area at any direction and speed. Unlike many other networking hosts, sensor nodes do not have global addresses. They are often identified by using a location-based addressing scheme. Therefore, it is important to have the knowledge of the sensor location indicating where the data came from. In this thesis, three localization update algorithms were designed, Specifically, a sensor movement is divided into three states: Pause, Linear, and Random. Each state adopts different localization update algorithm. Since complex movement involves different mobility patterns, a state transition model is developed to …


Programmable Process Flow Networks, Filip D. Cuckov Apr 2005

Programmable Process Flow Networks, Filip D. Cuckov

Electrical & Computer Engineering Theses & Dissertations

A model that introduces programmability to processes occurring in a cargo terminal simulation through the use of a process language is presented in this thesis. The model provides a means for a straight-forward definition, and redefinition of changing processes, their incorporation in the simulation architecture and efficient execution. The model was built to investigate a solution for transforming the cargo terminal simulation CPortS into a process-oriented simulation without hard-coded processes. The approach taken separates the system into an architecture and a set of processes which utilize and interact with the architecture's resources and infrastructure. The processes that take place within …


Hierarchical Hybrid Multicast An End System Multicast Algorithm Approach, Guillermo Loaisiga Oct 2004

Hierarchical Hybrid Multicast An End System Multicast Algorithm Approach, Guillermo Loaisiga

Electrical & Computer Engineering Theses & Dissertations

Due to the rapid development in the computer and communication technologies, the Internet is experiencing an increasing demand of high-speed, real-time distributed applications, such as live streaming multimedia, videoconferencing, distributed simulations, and multiparty games. Multicast is an efficient transmission mechanism to support these applications. Historically, IP Multicast (IPM) has provided multicast support with well-known benefits, especially in bandwidth savings. However, it has experienced little deployment due to economic and architectural limitations.

Overlay multicast holds promise for the implementation of large scale Internet multicast services. An overlay network is a virtual topology constructed on top of the Internet infrastructure. This concept …


Traffic Simulation Using Arena, Shanti Yelamanchi Apr 2002

Traffic Simulation Using Arena, Shanti Yelamanchi

Electrical & Computer Engineering Theses & Dissertations

Many traffic simulation tools exist for developing traffic simulations; these tools can be divided broadly into two categories — macro simulation tools and micro simulation tools. These two categories of simulation tools are directed at modeling the extremes of traffic systems: very large systems and very small systems. There is a class of intermediate-sized transportation networks for which neither category of simulation tools might perform adequately. Additionally these specialized traffic simulation tools have a high learning curve. For developing medium sized traffic simulations in a short period of time, one might choose to use a familiar general-purpose discrete event simulation …


Newton Parameter Update Algorithm For Recurrent Neural Networks Applied To Adaptive System Identification And Control, Donald Allen Gates Jul 1999

Newton Parameter Update Algorithm For Recurrent Neural Networks Applied To Adaptive System Identification And Control, Donald Allen Gates

Electrical & Computer Engineering Theses & Dissertations

This paper shows that the combination of a second-order neural network parameter update algorithm and internal network feedback can be effectively used for adaptive, nonlinear, dynamical system identification and control. Adaptive neural identification and control algorithms are typically utilized for real-time applications where the rate of adaptation is often critical. A fast, adaptive network parameter update algorithm is presented.

Simulation results show that this algorithm is capable of quickly identifying and adapting to changes in system parameters, making it feasible to use for real-time control and fault accommodation applications.


Real-Time Visual Speech Articulation Training Aid, Neiyer S. Correal Oct 1996

Real-Time Visual Speech Articulation Training Aid, Neiyer S. Correal

Electrical & Computer Engineering Theses & Dissertations

A real-time visual articulation training aid has been implemented. It provides instantaneous visual feedback of vowel and stop-consonant production on a computer screen. The vowel training system corresponds to an improved floating-point implementation of a previous fixed-point system developed by Beck (1992). The new implementation provides better accuracy and an approximate five-fold increase in speed. Acoustic features computed from global short-time spectral shape are used for classification of vowels. Temporal spectral trajectories timed to begin with burst onset are used for stop consonants. A neural network is used to transform measurements of auditory stimuli from the feature space to a …


Resource/Dataflow Graph Operating System Development, Sriram J. Coimbatore Oct 1996

Resource/Dataflow Graph Operating System Development, Sriram J. Coimbatore

Electrical & Computer Engineering Theses & Dissertations

Implementation of a new dataflow schedule model is the objective of this thesis. The dataflow model algorithm called the resource/dataflow graph model is implemented on a peer-to-peer communication network comprising of six personal computers. This dataflow model is implemented making use of an earlier dataflow model called ATAMM (Algorithm to Architecture Mapping Model) developed by ODU and National Aeronautics and Space Administration (NASA). Development issues include modification of the RDFG testbed operating system and a scheme to transfer data buffers using the ethernet channel from one processor to another processor. This, in turn, equips each sub-module of an application with …