An advanced forward 'area tactical radar network, now under
conceptual development by the Air Force Electronic Systems Division,
can be viewed as a novel form of computer network but with
other unique problems resulting from the specialized nature of the
application. The proposed network will link together a number of...
This qualitative study describes and interprets the interactions of participants in a
community college writing class delivered by computer-mediated communication
(CMC). The class represented a best practice model of learner-centered instruction in a
CMC class. The description and the discussion are framed by five aspects of CMC
instruction: (1) context;...
Published 2000. Facts and recommendations in this publication may no longer be valid. Please look for up-to-date information in the OSU Extension Catalog: http://extension.oregonstate.edu/catalog
This paper is concerned with the application of
hierarchial and parallel computing structures to digital
data communications processing in a multi-access telecommunications
environment. Designs are analyzed and
evaluated in terms of data collected from remote access
tele-communications traffic and in terms of the application
to several processing problems in the...
Interconnection networks play important roles in designing high performance computers. Recently two new classes of interconnection networks based on the concept of Gaussian and Eisenstein-Jacobi integers were introduced. In this research, efficient routing and broadcasting algorithms for these networks are developed. Furthermore, constructing edge disjoint Hamiltonian cycles in Gaussian networks...
It is well known that multipath effects cause inter-symbol interference (ISI) for high-speed signaling and ultimately limit the achievable data rate at any frequency band. In this thesis, we study several different methods to tackle this issue and provide solutions for establishing efficient wireless links that can provide several Gbps...
We describe a software mechanism that simplifies the implementation of real-time distributed object-oriented applications. The distributed observable/observer mechanism extends the Observable/Observer concept of Java to a distributed environment, encapsulating the communication protocol used by networking. The mechanism supports the distributed model/view-controller (M/VC) paradigm, allowing view-controllers to be attached to remote...
The application of information theory and digital signal processing techniques to digital
communication has resulted in robust methods for reliable high speed data transmission
over noisy channels environments. Among these methods, multicarrier systems have
become a viable solution for exploiting maximum spectral efficiency over both wideband
highly dispersive static and...
Recent developments in computing technology have generated a demand for more streamlined and effective test systems. By replacing traditional in-chassis wired interconnects with a broadcast wireless system, fault detection and error susceptibility will drastically improve, input/output capabilities will expand, and routing complexity will decrease. Ultra-wideband impulse radio's (UWB-IR) characteristic multipath-immunity...
In this paper, based on coding theory concepts, new time scheduling algorithms for multihop packet radio networks are described. Each mobile host is assigned a word from an appropriate constant weight code of length n, distance d and weight w. The host can send a message at the j[superscipt th]...
This dissertation focuses on indoor free-space optical communications systems for use in short range wireless networks. We propose that current radio frequency wireless links be augmented or replaced with optical frequency links due to overcrowding in the radio frequency spectrum. Optical frequencies contain hundreds of terahertz of unregulated bandwidth and...
The US military is evaluating the capabilities of emerging technologies based on IEEE 802.16 standard as a potential commercial off-the-shelf solution to support the communication requirements of the future war.
In the last few years, development in military and telecommunication industries have focused on an intensive use of broadband systems,...
Multiple-input multiple-output wireless systems promise significant capacity gain
and/or diversity gain over single antenna systems. If channel state information (CSI)
is available at both the transmitter and the receiver, the performance can be further
improved. In this thesis, first, we study binary index feedback problem in beamforming
systems when the...
The problem of broadcasting in faulty hypercubes is considered, based upon a strategy of partitioning the faulty hypercube into subcubes in which currently known algorithms can be implemented. Three similar partitioning and broadcasting algorithms for an n-dimensional hypercube in the presence of up to (n² + 2n - c) /...
A new technique of implementing the object-oriented language Little Smalltalk is developed using tuple space communication of Linda. In this implementation, the language's abstract constructs such as object, class, and method are naturally mapped into tuple space. Since Linda's tuple space is designed to facilitate parallel processing, this implementation technique...
Recently, the demand for higher data rates of transmission has increased in
many wireless communication applications. Using multi-transmit and multi-receive
antennas has been shown to be a solution, since it can increase the channel capacity to
accommodate higher transmission rates. Among the popular techniques developed to
exploit the use of...
This paper describes the design and implementation of
"A multiprocessor node for communication and control"
(MPCC). MPCC is a high speed, high performance local area
network capable of performing real time control tasks. This
is achieved by the concurrent operation of two 8051
microcontrollers, a dual port RAM and the...
Optical wireless communication (OWC) is an alternative to radio frequency (RF)communication with a signi cantly larger and unregulated spectrum. In OWC systems, optical orthogonal frequency division multiplexing (O-OFDM) with intensity modulation and direct detection (IM/DD) is commonly used. There are two common signal structures in most OWC systems based on...
In this paper, we propose a credit-based resource allocation technique for dynamic spectrum access (DSA) systems that is robust against malicious and selfi sh behaviors and ensures good overall system fairness performance while also allowing spectrum users to achieve high amounts of service. We also propose a new objective function...
Transmission over wireless networks presents multiple technical challenges due to
noise, interference, fading, power constraints and bandwidth limitation. Different
solutions have been propposed to overcome these issues and some of them are
treated here. Cooperative diversity has been proposed as an implementation for
networks where terminals are restricted to using...
Rapid advances in wireless networking have led to more mobile phones, PDAs, and other digital mobile devices becoming ubiquitously connected to the Internet. As the demand of delay sensitive real-time applications for these portable devices increases, providing seamless connectivity to wireless networks becomes a critical issue. For this reason, a...
Multicomputers and multiprocessors, first introduced in the mid 1980s, employ large numbers of microprocessors working in parallel to achieve high performance at low cost. These parallel machines represent an exciting new generation in supercomputing, but their usefulness is currently limited by inadequate programming languages and environments. This problem is being...
Proxy Pipe is designed to be a bus in the transport layer of the communication between the two different processes. Its major function is to transfer bytes. When the client process tries to send a command to the server process, it will talk to a proxy as if it were...
We will describe two known strategies for static processor
allocation in an n-cube multiprocessor, namely the buddy system
strategy and the gray code strategy, and then propose a new strategy
that outperforms the first by (n-k+1) and the second by (n-k+1)/2 in
cube recognition. Furthermore, our strategy is suitable for...
Published January 1985. Facts and recommendations in this publication may no longer be valid. Please look for up-to-date information in the OSU Extension Catalog: http://extension.oregonstate.edu/catalog
Impulse-radio ultra-wide-band (IR-UWB) signaling is a promising technique
for high-speed, short-range relay communications networks. Depending on how
the relay node retransmits the signal, there are two main relay schemes: conventional
one-directional (one-way) relay model, and bi-directional (two-way) relay
model. In bi-directional relay communications, wireless network coding (WNC),
also called physical-layer...
Published April 1991. Facts and recommendations in this publication may no longer be valid. Please look for up-to-date information in the OSU Extension Catalog: http://extension.oregonstate.edu/catalog
Published February 1991. Facts and recommendations in this publication may no longer be valid. Please look for up-to-date information in the OSU Extension Catalog: http://extension.oregonstate.edu/catalog
Published April 1991. Facts and recommendations in this publication may no longer be valid. Please look for up-to-date information in the OSU Extension Catalog: http://extension.oregonstate.edu/catalog
Published June 1986. Facts and recommendations in this publication may no longer be valid. Please look for up-to-date information in the OSU Extension Catalog: http://extension.oregonstate.edu/catalog
Artificial collectives are useful for accomplishing tasks that require teamwork from multiple simple robots. Multiple robot and collective testbeds have been developed, yet none stay committed to leverage the local interactions, group size, and imperfect information assumptions that strengthen biological collectives. A review of the collective and multiple robot literature,...
Popular applications such as P2P file sharing, multiplayer gaming, videoconferencing, etc. rely on the efficiency of content distribution from a single source to multiple receivers. Most users of these applications are on the widely prevalent source constraint networks such as the Digital Subscriber Line (DSL) and wireless networks. Overlay multicast...
This thesis discusses the design and development of a
viable local area network (LAN) which supports both
communications and control applications. The emphasis was
to develop a practical and cost effective system which
offered high performance while utilizing low cost
components. System cost was kept low by utilizing a
twisted-pair...
An increased cross-cultural interaction around the world is
being dictated by the ever increasing communication needs required
by business and national concerns. This increased interaction, and its
resultant inter-dependence, is often referred to as "Globalization."
Due to the effect of globalization on the business and education
environments, this study was...
Power is a valuable resource. It is invaluable when for mobile devices. Mobile devices, due to their mobility cannot get a continuous source of power and derive their power from a battery contained in them. The main consumer of power in the mobile is its transmitter. With a limited power...
Dynamic DC offset is one of the biggest problems preventing the implementation of single chip receivers. This thesis presents a 2.4GHz downconversion mixer designed to work with adaptive DC offset cancellation for a fully integrated direct conversion receiver. Offset can be removed by dynamically changing the PFET load bias in...
This grant supported acquisition of a minicomputer system for departmental research. The equipment selected is a DEC VAX-11/750 system, installed in remodeled space in the Computer Science (formerly Farm Crops) Building. Grant funds for equipment acquisition were supplemented by support from the Tektronix Foundation.
After completion of the physical facilities...
This paper describes the design and implementation of
COLAN V, a High Performance Local Area Network for
Communications and Control utilizing a Communications Coprocessor.
The main objective of this thesis is to improve upon
the performance of previous COLANs in speed, switching
techniques and error detection techniques. This was
possible...
Relay-assisted cooperative communications are promising solutions for error-performance improvement and cell coverage extension. In this thesis, we propose several efficient cooperative relay communication schemes. First, an efficient space-time coded cooperative relay communications scheme that employs linear precoding and transmission-pattern selection is proposed. This is built upon an existing block linear...
In this work, we study network coding technique, its relation to random matrices, and their applications to communication systems. The dissertation consists of three main contributions. First, we propose efficient algorithms for data synchronization via a broadcast channel using random network coding. Second, we study the resiliency of network coding...
The widespread use of TCP as a transport layer protocol for mobile ad-hoc networks and wireline networks has motivated the need to make its implementation highly power efficient specially with respect to ad hoc radio networks. Over the past years many researchers have developed energy efficient protocols for mobile ad-hoc...
Powerline communication (PLC), is becoming a more commonplace method for data transmission, however it is still a very new medium for data transmission, and international standards for powerline communication are still in the process of being developed and established. PLC can provide a means of simplifying the device connectivity to...
This thesis proposes a novel technique that exploits spectrum occupancy behaviors inherent to wideband spectrum access to enable efficient cooperative spectrum sensing. The proposed technique reduces the number of required sensing measurements while accurately recovering spectrum occupancy information. It does so by leveraging compressive sampling theory to exploit the block-like...
A new algorithm, the Horizontal and Vertical Algorithm, for
on-line detection of deadlocks in distributed computer systems, is
presented. Two protocols for implementing the algorithm are given.
The first protocol, the centralized protocol, is based on the
assumption that one site in the network acts as the controller for
global...
In modern telecommunication applications, the need for high-reliability and high data rate is important because of factors such as a higher demand in multimedia capability of mobile devices and the exponentially increasing number of subscribers. Wireless communications in today’s technology have many limitations due to channel imperfections, which result in...
This thesis work researches the theory and application
of systems performing omnidirectional, non-direct
path optical data communication (ONP systems). Such
systems are characterized by 1) the communication involves
a local, usually circular area; 2) Obstacles are allowed
between a transmitter and the receivers. This is in
contrast to the point-to-point...
Trends in wireless networks are increasingly pointing towards a future with multi-hop
networks deployed in multi-channel environments. In this thesis, we present the design
for iMAC—a protocol targeted at medium access control in such environments. iMAC
uses control packets on a common control channel to faciliate a three-way handshake
between...
A Mobile Ad-hoc NETwork (MANET) is collection of wireless mobile nodes without a network infrastructure or centralized administration. Although MANETs can be used in many applications, such as mobile Internet, military communication, and disaster relief networks, a number of challenges remain. These include routing, medium access control, security, scalability, energy...
As computation power continues to grow, the demand for data transfer bandwidth is also rising. This is reflected in the increasing data-rate of high-speed links. However, the increase in data-rate is sustainable only if the I/O energy efficiency improves as well. This dissertation explores several techniques to enable high-speed links...
This research solves the problem of connecting a Macintosh to a Unix machine and presenting the Macintosh Desktop to Unix. Unix Files can be viewed. copied. renamed and opened in the same manner as Macintosh files. Unix programs and shell commands can be defined and attached to Macintosh menus and...
Secure Computation is a powerful tool that enables a set of parties to jointly compute any function over their private inputs, without a trusted third party. Private Set Intersection is a specific case of two-party Secure Computation, where Alice (with private set X) and Bob (with private set Y) specifically...
In this paper, we describe a software mechanism, a software channel, that allows a group of distributed objects to communicate with each other automatically once they are connected to it. Software channels and predesigned distributed objects that are connected to them encapsulate the communication protocol and the network topology to...
Facts and recommendations in this publication may no longer be valid. Please look for up-to-date information in the OSU Extension Catalog: http://extension.oregonstate.edu/catalog
In a wireless sensor network, sensor nodes are deployed in an ad hoc fashion and they deliver data packets using multihop transmission. However, transmission failures occur frequently in the multihop transmission over wireless media. Thus, a loss recovery mechanism is required to provide end-to-end reliability. In addition, because the sensor...
Published May 1971. Facts and recommendations in this publication may no longer be valid. Please look for up-to-date information in the OSU Extension Catalog: http://extension.oregonstate.edu/catalog
The increased use of mobile wireless devices that we have recently been witnessing, such as smartphones, tablets, e-readers, and WiFi enabled devices in general, is driving an unprecedented increase in the amount of data traffic. This fast market adoption of the wireless technology along with the tremendous success of multimedia...
Proceedings of a workshop held November 15 and 16 1983. This is the first in a series of Regional Publications by the Western Computer Consortium. The Consortium is comprised of Western Land Grant Universities and is designed to share computer related information between faculty and staff of the member institutions....
A simple approach to developing approximate analytical
performance models for complex systems (such as distributed
processing systems or computer networks) is presented.
The approach is applicable in cases where measurement
or simulation data describing system performance are
available but the system is too complex for exact analytical
models to be...
A long-standing approach to deal with complex product development is to divide the system into smaller parts
and assign responsibility for developing those parts to particular teams. Conventional wisdom suggests that by
doing so, we reduce the communication overhead in the development project by making the separate
development teams as...
Ad Hoc networks are multi-hop wireless networks consisting of mobile hosts. They do not have any pre-existing network infrastructure and are characterized by constantly changing topology, limited battery power and bandwidth. Typical applications of such networks are battlefield networks, medical relief during natural calamities or disasters, conference room networking, and...
The broadband wireless interference in a computer platform is resulted by multiple electro-magnetic emission sources. This non-Gaussian interference is proved to be double-sided K-distributed in previous research. With the limitation of transmission power and dimension of the device, interference mitigation is an efficient way to improve received signal bit error...
The current state of research on gossip techniques for wireless broadcasting is very limited because past research efforts have mostly focused on using gossip techniques for multicast communication. On the other hand, those research efforts that have focused on using gossip techniques for wireless broadcast communications ignore energy efficiency and...
As the price of broadband access service becomes more affordable, the number of homes with WiFi and public WiFi hotspots in the US are projected to increase significantly in the next few years. However, limited capacity of existing WiFi networks fail to provide adequate bandwidth for densely populated areas. Therefore,...
Until a few years ago, wireless-capable laptops were considered novelties by many. It is now hard to find a laptop or a hand-held computing device that is not wireless-ready. As wireless devices are becoming commodities, they have also become an indispensable part of the modern society. Not surprisingly, research in...
High speed and high resolution analog-to-digital converter is a key building block for broadband wireless communications, high definition video applications, medical images and so on. By leveraging the down scaling of the latest CMOS technology and the noise shaping properties, delta-sigma (ΔΣ) ADCs are able to achieve wide-band operation and...
Cognitive radio technology emerges as a promising solution for overcoming shortage and inefficient use of spectrum resources. In cognitive radio networks, secondary users, which are users equipped with cognitive radios, can opportunistically access spectrum assigned to primary users, the spectrum license holders. Although it improves spectrum utilization efficiency, this opportunistic...
Several hardware-based security improvements to Near Field Communication (NFC) and Radio-Frequency Identification (RFID) systems are developed and presented. The improvements are intended to be used in conjunction with software encryption to ensure robust security. Two main implementations for a more secure NFC or RFID system are presented: a jamming system,...
The ability to accurately convey an intended nonverbal emotional message is critical for competent interpersonal functioning. To examine encoding ability, a replication of Noller’s (1980) study employing content standard methodology was conducted. This method is essentially an acting task where participants are given a hypothetical social scene within which they...
The world's demand for energy is an ongoing challenge, which has yet to be overcome.
The efforts to find clean energy alternatives to fossil fuels have been hampered by the
lack of investment in technology and research. Among these clean energy alternatives
are ocean waves and wind. Wind power is...
High bandwidth of networks demands high performance communication processors that integrate application processing, network processing, and system support functions into a single, low cost System-On-Chip (SOC) solution. However, conventional processors, when used in network related applications, are beset by the overhead of save/restore of register context, cache misses due to...
The exponential rate of advances in modern communication devices in the last several years have brought us higher levels of functionality and performance as well as reductions in physical size and power consumption. To continue this rate of advancement, next generation systems require wider bandwidth and higher resolution ADCs. Additionally,...
Published April 1999. Facts and recommendations in this publication may no longer be valid. Please look for up-to-date information in the OSU Extension Catalog: http://extension.oregonstate.edu/catalog
IS-95, an interim standard proposed for future digital personal communications
systems, uses two levels of encoding of digital data for error control and compatibility
with code-division multiple access (CDMA) transmission. The data is first
convolutionally encoded and the resulting symbols are interleaved and then groups are
encoded as orthogonal Walsh...
Estimating the carrier frequency from a modulated waveform is one of the most important functions of a coherent signal receiver. Good performance and low bit error rates are obtained by coherent demodulation. Therefore, exact knowledge of the received signal carrier frequency is critical for communication systems. Also due to the...
The proliferation of mobile users and internet content has advanced a plethora of research areas. Among these areas include mobile networks, transport layer protocols, and smart cities. Research shows that global mobile data traffic will increase sevenfold reaching 49 exabytes per month by 2021, most of which will be mobile...
This annotated bibliography is collected from professional journals in natural resource management and sociology, conference proceedings, and technical reports. It is categorized into thirteen sections: acceptability, fire in wilderness, general, history, institutions, media, policy, public attitude toward wildfire, public involvement, public perception of prescribed burning, risk perception, social psychology, and...
Standard accounts of women's relationship with technology stress women's need to overcome anxiety to achieve competence with computers. Recent studies provide evidence that this woman-anxiety-technology connection is an oversimplification of the relationship between women and computers. New literature also suggests that making computers more appealing will help girls overcome computational...
Welcome to the fascinating world of computers. Computers play an active role in everyone's life. Think about the things you do every day. You will soon realize that computers affect you directly in many ways. Banks, restaurants, department stores, toys, games, and even automobiles use computers in some form.
As...
This article describes the motivation, design, and progress of the Journal of Open Source Software (JOSS). JOSS is a free and open-access journal that publishes articles describing research software. It has the dual goals of improving the quality of the software submitted and providing a mechanism for research software developers...
This exploratory investigation focused on the validity of the concepts of high-context and low-context as a meaningful and powerful construct for examining cultural differences. Specifically, American and
Japanese value differences and communication patterns were examined.
The study tested the hypotheses that Japanese students would rank
high-context group orientation values higher...
Due to the rapid growth of wireless technology, there has been a growing interest in the capabilities of ad hoc networks connecting mobile phones, PDAs and laptop computers. The distributed and self-configurable capabilities of ad hoc networks make them very attractive for some applications such as tactical communication for military,...
The widespread use of Wireless Local Area Networks (WLAN) and the desire for such products from different vendors to operate together has generated a movement towards standardization. Over the last decade, several organizations worldwide have researched and developed such standards, this includes the IEEE 802.11 committee. One of the important...
Recently, with the realization of the World Wide Web, the tremendous need for high-speed data communications has grown. Several access techniques have been proposed which utilize the existing copper twisted pair cabling. Of these, the xDSL family, particularly ADSL and VDSL, have shown great promise in providing broadband or near-broadband...
In recent years, the elliptic curve cryptosystems (ECC) have received attention
due to their increased security with smaller key size which brings the advantage of less
storage area and less bandwidth. Elliptic curve cryptography provides a methodology
for obtaining high-speed, efficient, and scalable implementations of network security
protocols. In addition...
The thesis presents a new algorithm and structure that is to be used in conjunction with a specially modified CMOS Gilbert cell mixer to remove time-varying DC offsets in direct conversion receivers. In our approach, the DC offset is detected at the output of the mixer using a dedicated coarse...
Published July 1988. Facts and recommendations in this publication may no longer be valid. Please look for up-to-date information in the OSU Extension Catalog: http://extension.oregonstate.edu/catalog
Published February 1990. Facts and recommendations in this publication may no longer be valid. Please look for up-to-date information in the OSU Extension Catalog: http://extension.oregonstate.edu/catalog
In this creative non-fiction thesis, I present a collection of personal essays that examine my significant moments of awkwardness with failed communications or frustrated relationships when I wanted to draw people closer with language, but was unsuccessful. In the twelve stories, I discuss these issues in my interpersonal communication interwoven...
Secure two-party computation (2PC) is the task of performing arbitrary calculations on secret inputs provided by two parties, while maintaining secrecy if at least one party is honest. 2PC has been applied to privacy-preserving record linkage and machine learning, in areas such as medicine where maintaining privacy is crucial. One...
Ideal for personal-growth study groups, for staff in business or agency human-resource departments, and for organizations that work on diversity issues. A gentle yet challenging look at ways to change the world by changing one's own intercultural relationships. Discusses differences in communication styles, sense of time and space, and power...
Published January 1988. Facts and recommendations in this publication may no longer be valid. Please look for up-to-date information in the OSU Extension Catalog: http://extension.oregonstate.edu/catalog
In current practice, design documentation often fails
to support the activities of design understanding,
communication, and redesign. A Design History Tool has been
developed to improve current design documentation. This
tool is a computerized design history that represents and
plays back important information generated during the
process of designing a...
The problem of ensuring Quality of Service (QoS) on a TCP/IP based fixed-infrastructure network has been well studied and several working proposals exist. An allied problem is that of ensuring QoS on an ad-hoc wireless network, where the requirements are similar, but the operating conditions are different enough to warrant...