Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 25 of 25

Full-Text Articles in Physical Sciences and Mathematics

New Graph Model For Channel Assignment In Ad Hoc Wireless Networks, Maggie Xiaoyan Cheng, S. C. Huang, X. Huang, Weili Wu Dec 2005

New Graph Model For Channel Assignment In Ad Hoc Wireless Networks, Maggie Xiaoyan Cheng, S. C. Huang, X. Huang, Weili Wu

Computer Science Faculty Research & Creative Works

The channel assignment problem in ad hoc wireless networks is investigated. The problem is to assign channels to hosts in such a way that interference among hosts is eliminated and the total number of channels is minimised. Interference is caused by direct collisions from hosts that can hear each other or indirect collisions from hosts that cannot hear each other, but simultaneously transmit to the same destination. A new class of disk graphs (FDD: interFerence Double Disk graphs) is proposed that include both kinds of interference edges. Channel assignment in wireless networks is a vertex colouring problem in FDD graphs. …


A Scalable Correlation Aware Aggregation Strategy For Wireless Sensor Networks, Yujie Zhu, Ramanuja Vedantham, Seung Jong Park, Raghupathy Sivakumar Dec 2005

A Scalable Correlation Aware Aggregation Strategy For Wireless Sensor Networks, Yujie Zhu, Ramanuja Vedantham, Seung Jong Park, Raghupathy Sivakumar

Computer Science Faculty Research & Creative Works

Sensors-to-sink data in wireless sensor networks (WSNs) are typically correlated with each other. Exploiting such correlation when performing data aggregation can result in considerable improvements in the bandwidth and energy performance of WSNs. In order to exploit such correlation, we present a scalable and distributed correlation-aware aggregation structure that addresses the practical challenges in the context of aggregation in WSNs. Through simulations and analysis, we evaluate the performance of the proposed approach with centralized and distributed correlation aware and unaware structures.


Marketing Military Service Benefits Segmentation Based On Generalized And Restricted Exchange, Caroline Fisher, Kimball P. Marshall Nov 2005

Marketing Military Service Benefits Segmentation Based On Generalized And Restricted Exchange, Caroline Fisher, Kimball P. Marshall

Business and Information Technology Faculty Research & Creative Works

Willingness to engage in exchange is based on desired benefits. In typical commercial transactions, restricted exchange benefits dominate. However, public policy, social marketing situations might require consideration of both restricted and generalized exchange benefits. Applying factor analysis, cluster analysis and cross-tabulation, this paper reports research that has successfully segmented a young adult target market regarding interest in military service based on considerations of generalized and restricted exchange motivations. This research contributes to a growing body of literature on generalized exchange as a key conceptual element for social marketing. Results demonstrate the utility of the generalized exchange concept in identifying amarket …


Location Management In Mobile Ad Hoc Wireless Networks Using Quorums And Clusters, Maggie Xiaoyan Cheng, David H.-C. Du, Ding-Zhu Du Oct 2005

Location Management In Mobile Ad Hoc Wireless Networks Using Quorums And Clusters, Maggie Xiaoyan Cheng, David H.-C. Du, Ding-Zhu Du

Computer Science Faculty Research & Creative Works

Position-based reactive routing is a scalable solution for routing in mobile ad hoc networks. The route discovery algorithm in position-based routing can be efficiently implemented only if the source knows the current address of the destination. In this paper, a quorum-based location management scheme is proposed. Location servers are selected using the minimum dominating set (MDS) approach, and are further organized into quorums for location update and location query. when a mobile node moves, it updates its location servers in the update quorum; when a node requests the location information of another node, it will send a query message to …


The Maximum Flow Algorithm Applied To The Placement And Distributed Steady-State Control Of Upfcs, Austin Armbruster, Bruce M. Mcmillin, Mariesa Crow, Michael R. Gosnell Oct 2005

The Maximum Flow Algorithm Applied To The Placement And Distributed Steady-State Control Of Upfcs, Austin Armbruster, Bruce M. Mcmillin, Mariesa Crow, Michael R. Gosnell

Computer Science Faculty Research & Creative Works

The bulk power system is one of the largest man-made networks and its size makes control an extremely difficult task. This paper presents a method to control a power network using UPFCs set to levels determined by a maximum flow (max-flow) algorithm. The graph-theory-based max-flow is applied to the power system for UPFC placement and scheduling. A distributed version of max-flow is described to coordinate the actions of the UPFCs distributed in a power network. Two sample power systems were tested using max-flow for UPFC placement and settings. The resulting system characteristics are examined over all single-line contingencies and the …


Structured Object-Oriented Co-Analysis/Co-Design Of Hardware/Software For The Facts Powers System, Matt Ryan, Sojan Markose, Xiaoqing Frank Liu, Bruce M. Mcmillin Sep 2005

Structured Object-Oriented Co-Analysis/Co-Design Of Hardware/Software For The Facts Powers System, Matt Ryan, Sojan Markose, Xiaoqing Frank Liu, Bruce M. Mcmillin

Computer Science Faculty Research & Creative Works

There are several approaches to the hardware/software design in embedded systems, ranging from the traditional sequential methods which focus on the determination of the hardware architecture prior to software design, to newer object-oriented approaches that attempt to apply software engineering methods to hardware design without a systematic process. This paper discusses a structured object-oriented methodology for the integrated co-analysis and co-design of hardware/software systems using an extended high order object-oriented modeling technique (HOOMT). This methodology offers a uniform method for hardware and software developers to jointly develop the specifications for and partitioning of the hardware and software components of a …


Sink-To-Sensors Congestion Control, Ramanuja Vedantham, Raghupathy Sivakumar, Seung Jong Park Sep 2005

Sink-To-Sensors Congestion Control, Ramanuja Vedantham, Raghupathy Sivakumar, Seung Jong Park

Computer Science Faculty Research & Creative Works

The problem of congestion in sensor networks is significantly different from conventional ad-hoc networks and has not been studied to any great extent thus far. In this paper, we focus on providing congestion control from the sink to the sensors in a sensor field. We identify the different reasons for congestion from the sink to the sensors and show the uniqueness of the problem in sensor network environments. We propose a scalable, distributed approach that addresses congestion from the sink to the sensors in a sensor network. Through ns2 based simulations, we evaluate the proposed framework, and show that it …


Achieving Minimum Coverage Breach Under Bandwidth Constraints In Wireless Sensor Networks, Maggie Xiaoyan Cheng, Lu Ruan, Weili Wu Aug 2005

Achieving Minimum Coverage Breach Under Bandwidth Constraints In Wireless Sensor Networks, Maggie Xiaoyan Cheng, Lu Ruan, Weili Wu

Computer Science Faculty Research & Creative Works

This paper addresses the coverage breach problem in wireless sensor networks with limited bandwidths. In wireless sensor networks, sensor nodes are powered by batteries. To make efficient use of battery energy is critical to sensor network lifetimes. When targets are redundantly covered by multiple sensors, especially in stochastically deployed sensor networks, it is possible to save battery energy by organizing sensors into mutually exclusive subsets and alternatively activating only one subset at any time. Active nodes are responsible for sensing, computing and communicating. While the coverage of each subset is an important metric for sensor organization, the size of each …


Proving Secure Properties Of Cryptographic Protocols With Knowledge Based Approach, Xiaochun Cheng, Xiaoqi Ma, Maggie Xiaoyan Cheng, Scott C.-H. Huang Jul 2005

Proving Secure Properties Of Cryptographic Protocols With Knowledge Based Approach, Xiaochun Cheng, Xiaoqi Ma, Maggie Xiaoyan Cheng, Scott C.-H. Huang

Computer Science Faculty Research & Creative Works

Cryptographic protocols have been widely used to protect communications over insecure network environments. Existing cryptographic protocols usually contain flaws. To analyze these protocols and find potential flaws in them, the secure properties of them need be studied in depth. This paper attempts to provide a new framework to analyze and prove the secure properties in these protocols. A number of predicates and action functions are used to model the network communication environment. Domain rules are given to describe the transitions of principals' knowledge and belief states. An example of public key authentication protocols has been studied and analysed.


Evaluation Of Glycine Max Mrna Clusters, Ronald L. Frank, Fikret Erçal Jul 2005

Evaluation Of Glycine Max Mrna Clusters, Ronald L. Frank, Fikret Erçal

Biological Sciences Faculty Research & Creative Works

Background: Clustering the ESTs from a large dataset representing a single species is a convenient starting point for a number of investigations into gene discovery, genome evolution, expression patterns, and alternatively spliced transcripts. Several methods have been developed to accomplish this, the most widely available being UniGene, a public domain collection of gene-oriented clusters for over 45 different species created and maintained by NCBI. The goal is for each cluster to represent a unique gene, but currently it is not known how closely the overall results represent that reality. UniGene's build procedure begins with initial mRNA clusters before joining ESTs. …


Power Transmission Control Using Distributed Max-Flow, Bruce M. Mcmillin, Austin Armbruster, Mariesa Crow, Michael R. Gosnell Jul 2005

Power Transmission Control Using Distributed Max-Flow, Bruce M. Mcmillin, Austin Armbruster, Mariesa Crow, Michael R. Gosnell

Computer Science Faculty Research & Creative Works

Existing maximum flow algorithms use one processor for all calculations or one processor per vertex in a graph to calculate the maximum possible flow through a graph's vertices. This is not suitable for practical implementation. We extend the max-flow work of Goldberg and Tarjan to a distributed algorithm to calculate maximum flow where the number of processors is less than the number of vertices in a graph. Our algorithm is applied to maximizing electrical flow within a power network where the power grid is modeled as a graph. Error detection measures are included to detect problems in a simulated power …


Perceived Impacts Of Government Regulations On Technolgoy Transfers, Caroline Fisher, Jing Li, Marina Onken Jun 2005

Perceived Impacts Of Government Regulations On Technolgoy Transfers, Caroline Fisher, Jing Li, Marina Onken

Business and Information Technology Faculty Research & Creative Works

This paper examines the effects of government regulation on the technology transfer process. Technology transfer is an important component of an economic development effort in communities, states, and nations. Understanding the process used to transfer technology is needed to promote policies that develop an effective infrastructure to encourage technology transfer. This paper uses qualitative and quantitative methodologies to examine managerial perceptions of the effects of government policies on the technology transfer process. The impacts of tax policies, environmental regulations, health and safety regulations, labor regulations, international trade regulations, and the differences in regulations between countries are studied. Items used to …


Energy Balanced Broadcasting Through Delayed Intelligence, Michael R. Gosnell, Ryan Arbarelli, Maggie Xiaoyan Cheng, Bruce M. Mcmillin May 2005

Energy Balanced Broadcasting Through Delayed Intelligence, Michael R. Gosnell, Ryan Arbarelli, Maggie Xiaoyan Cheng, Bruce M. Mcmillin

Computer Science Faculty Research & Creative Works

Ad hoc wireless networks are growing in popularity and usefulness, however they rely on broadcasting as a fundamental process for routing. Improvements to broadcasting have made ad hoc networks more feasible, but sometimes benefit only specific situations. Delayed intelligence (DI) is proposed as a new load balancing approach where small delays are introduced to allow distributed responsibility delegation. Preliminary results show delayed intelligence, when applied in existing broadcasting methods such as passive clustering, can be used to improve the energy disparity and therefore extend ad hoc network lifetime.


Retesting A Model Of The Deming Management Method, Jesse Barfield, Caroline Fisher, Jing Li, Rajiv Mehta May 2005

Retesting A Model Of The Deming Management Method, Jesse Barfield, Caroline Fisher, Jing Li, Rajiv Mehta

Business and Information Technology Faculty Research & Creative Works

Anderson et al. (1994) developed a model of the theory of quality management underlying the Deming management method; Anderson et al. (1995) tested that model using path analysis. They used data from an existing database collected from 41 manufacturing plants in the electronics, machinery, and transportation industries with 100 or more employees. In this study, which retests their model, data were gathered from over 100 manufacturing and service companies of all sizes across the US and Canada. The measures used in the original study were modified to apply to both service and manufacturing organizations. The data were analysed using similar …


Reinforcement Learning-Based Output Feedback Control Of Nonlinear Systems With Input Constraints, Pingan He, Jagannathan Sarangapani Feb 2005

Reinforcement Learning-Based Output Feedback Control Of Nonlinear Systems With Input Constraints, Pingan He, Jagannathan Sarangapani

Electrical and Computer Engineering Faculty Research & Creative Works

A novel neural network (NN) -based output feedback controller with magnitude constraints is designed to deliver a desired tracking performance for a class of multi-input-multi-output (MIMO) discrete-time strict feedback nonlinear systems. Reinforcement learning in discrete time is proposed for the output feedback controller, which uses three NN: 1) a NN observer to estimate the system states with the input-output data; 2) a critic NN to approximate certain strategic utility function; and 3) an action NN to minimize both the strategic utility function and the unknown dynamics estimation errors. The magnitude constraints are manifested as saturation nonlinearities in the output feedback …


Neural Network-Based Control Of Nonlinear Discrete-Time Systems In Non-Strict Form, Jagannathan Sarangapani, Zheng Chen, Pingan He Jan 2005

Neural Network-Based Control Of Nonlinear Discrete-Time Systems In Non-Strict Form, Jagannathan Sarangapani, Zheng Chen, Pingan He

Electrical and Computer Engineering Faculty Research & Creative Works

A novel reinforcement learning-based adaptive neural network (NN) controller, also referred as the adaptive-critic NN controller, is developed to deliver a desired tracking performance for a class of non-strict feedback nonlinear discrete-time systems in the presence of bounded and unknown disturbances. The adaptive critic NN controller architecture includes a critic NN and two action NNs. The critic NN approximates certain strategic utility function whereas the action neural networks are used to minimize both the strategic utility function and the unknown dynamics estimation errors. The NN weights are tuned online so as to minimize certain performance index. By using gradient descent-based …


Decentralized Discrete-Time Neural Network Controller For A Class Of Nonlinear Systems With Unknown Interconnections, Jagannathan Sarangapani Jan 2005

Decentralized Discrete-Time Neural Network Controller For A Class Of Nonlinear Systems With Unknown Interconnections, Jagannathan Sarangapani

Electrical and Computer Engineering Faculty Research & Creative Works

A novel decentralized neural network (NN) controller in discrete-time is designed for a class of uncertain nonlinear discrete-time systems with unknown interconnections. Neural networks are used to approximate both the uncertain dynamics of the nonlinear systems and the unknown interconnections. Only local signals are needed for the decentralized controller design and the stability of the overall system can be guaranteed using the Lyapunov analysis. Further, controller redesign for the original subsystems is not required when additional subsystems are appended. Simulation results demonstrate the effectiveness of the proposed controller. The NN does not require an offline learning phase and the weights …


A Robust Controller For The Manipulation Of Micro Scale Objects, Qinmin Yang, Jagannathan Sarangapani Jan 2005

A Robust Controller For The Manipulation Of Micro Scale Objects, Qinmin Yang, Jagannathan Sarangapani

Electrical and Computer Engineering Faculty Research & Creative Works

A suite of novel robust controllers is presented for the manipulation and handling of micro-scale objects in a micro-electromechanical system (MEMS) where adhesive, surface tension, friction and van der Waals forces are dominant. Moreover, these forces are typically unknown. The robust controller overcomes the unknown system dynamics and ensures the performance in the presence of actuator constraints by assuming that the upper bounds on these forces are known. On the other hand, for the robust adaptive controller, the unknown forces are estimated online. Using the Lyapunov approach, the uniformly ultimate boundedness (UUB) of the closed-loop manipulation error is shown for …


Consistency Management Among Replicas In Peer-To-Peer Mobile Ad Hoc Networks, Sanjay Kumar Madria, Takahiro Hara Jan 2005

Consistency Management Among Replicas In Peer-To-Peer Mobile Ad Hoc Networks, Sanjay Kumar Madria, Takahiro Hara

Computer Science Faculty Research & Creative Works

Recent advances in wireless communication along with peer-to-peer (P2P) paradigm have led to increasing interest in P2P mobile ad hoc networks. In this paper, we assume an environment where each mobile peer accesses data items held by other peers which are connected by a mobile ad hoc network. Since peers' mobility causes frequent network partitions, replicas of a data item may be inconsistent due to write operations performed by mobile peers. In such an environment, the global consistency of data items is not desirable by many applications. Thus, new consistency maintenance based on local conditions such as location and time …


Bio-Inspired Approaches For Critical Infrastructure Protection: Application Of Clonal Selection Principle For Intrusion Detection And Facts Placement, Kasthurirangan Parthasarathy Jan 2005

Bio-Inspired Approaches For Critical Infrastructure Protection: Application Of Clonal Selection Principle For Intrusion Detection And Facts Placement, Kasthurirangan Parthasarathy

Masters Theses

"In this research, Clonal Selection, an immune system inspired approach, is utilized along with Evolutionary Algorithms to solve complex engineering problems such as Intrusion Detection and optimization of Flexible AC Transmission System (FACTS) device placement in a power grid. The clonal selection principle increases the strength of good solutions and alters their properties to find better solutions in a problem space. A special class of evolutionary algorithms that utilizes the clonal selection principle to guide its heuristic search process is termed Clonal EA. Clonal EAs can be used to solve complex pattern recognition and function optimization problems, which involve searching …


Energy-Efficient Rate Adaptation Mac Protocol For Ad Hoc Wireless Networks, Maciej Jan Zawodniok, Jagannathan Sarangapani Jan 2005

Energy-Efficient Rate Adaptation Mac Protocol For Ad Hoc Wireless Networks, Maciej Jan Zawodniok, Jagannathan Sarangapani

Electrical and Computer Engineering Faculty Research & Creative Works

Resource constraints in ad hoc wireless networks require that they are energy efficient during both transmission and rate adaptation. In this paper, we propose a novel energy-efficient rate adaptation protocol that selects modulation schemes online to maximize throughput based on channel state while saving energy. This protocol uses the distributed power control (DPC) algorithm (M. Zawodniok et al., 2004) to accurately determine the necessary transmission power and to reduce the energy consumption. Additionally, the transmission rate is altered using energy efficiency as a constraint to meet the required throughput, which is estimated with queue fill ratio. Moreover, back-off scheme is …


Predictive Congestion Control Mac Protocol For Wireless Sensor Networks, Maciej Jan Zawodniok, Jagannathan Sarangapani Jan 2005

Predictive Congestion Control Mac Protocol For Wireless Sensor Networks, Maciej Jan Zawodniok, Jagannathan Sarangapani

Electrical and Computer Engineering Faculty Research & Creative Works

Available congestion control schemes, for example transport control protocol (TCP), when applied to wireless networks results in a large number of packet drops, unfairness with a significant amount of wasted energy due to retransmissions. To fully utilize the hop by hop feedback information, a suite of novel, decentralized, predictive congestion control schemes are proposed for wireless sensor networks in concert with distributed power control (DPC). Besides providing energy efficient solution, embedded channel estimator in DPC predicts the channel quality. By using the channel quality and node queue utilizations, the onset of network congestion is predicted and congestion control is initiated. …


Block Phase Correlation-Based Automatic Drift Compensation For Atomic Force Microscopes, Qinmin Yang, Eric W. Bohannan, Jagannathan Sarangapani Jan 2005

Block Phase Correlation-Based Automatic Drift Compensation For Atomic Force Microscopes, Qinmin Yang, Eric W. Bohannan, Jagannathan Sarangapani

Electrical and Computer Engineering Faculty Research & Creative Works

Automatic nanomanipulation and nanofabrication with an Atomic Force Microscope (AFM) is a precursor for nanomanufacturing. In ambient conditions without stringent environmental controls, nanomanipulation tasks require extensive human intervention to compensate for the many spatial uncertainties of the AFM. Among these uncertainties, thermal drift is especially hard to solve because it tends to increase with time and cannot be compensated simultaneously by feedback. In this paper, an automatic compensation scheme is introduced to measure and estimate drift. This information can be subsequently utilized to compensate for the thermal drift so that a real-time controller for nanomanipulation can be designed as if …


Adaptive Replication And Access Control Of Multimedia Data In A P2p Environment, Sanjay Kumar Madria, Sanjeev Agarwal Jan 2005

Adaptive Replication And Access Control Of Multimedia Data In A P2p Environment, Sanjay Kumar Madria, Sanjeev Agarwal

Computer Science Faculty Research & Creative Works

This paper explores some of the ideas and solutions related to replication and access control of multimedia data in a hierarchical P2P environment. We provided overview of the techniques to generate multiresolution of multimedia data and explored error recovery and access control issues.


Collaborative Global Software Development And Education, Xiaoqing Frank Liu Jan 2005

Collaborative Global Software Development And Education, Xiaoqing Frank Liu

Computer Science Faculty Research & Creative Works

In this position paper, challenges and issues with collaborative global software development and education are discussed. Suggestions are made to improve and strengthen software engineering education to adapt to it.