Search
Now showing items 21-30 of 197
GENERTIA: A System for Vulnerability Analysis, Design and Redesign of Immunity-Based Anomaly Detection System
(2008-09-09)
The principles of immunology have been applied to the design and implementation of artificial systems and algorithms for solving a broad range of mathematical and engineering problems, which results in a new computation ...
Algorithms for Task Scheduling in Heterogeneous Computing Environments
(2008-09-09)
Current heterogeneous meta-computing systems, such as computational clusters and grids offer a low cost alternative to supercomputers. In addition they are highly scalable and flexible. They consist of a host of diverse ...
Improving System Performance for Wireless Networks
(2009-02-23)
In this dissertation, we solve two problems in wireless networks: Transmission Control Protocol
(TCP) enhancement and cluster node sleep scheduling.
When TCP is deployed in a wireless mesh network, it encounters several ...
Effects of Delay Variation of IEEE 802.11 on Synchronization in Ad Hoc Networks
(2009-02-23)
The 802.11 MAC protocol, extensively used in wireless networks, handles the problem of collisions over a shared medium in part by avoiding them through the use of a random backoff counter drawn from an exponentially ...
Investigation of EtherYatri’s Compatibility with IPV6
(2008-09-09)
Internet Protocol version six (IPv6) enjoys only a scant existence today. Many universities, companies and other organizations are building protocol stacks, hardware and applications to support IPv6, awaiting its full-fledged ...
Energy-Efficient Traffic-Aware Routing in Underwater
(2009-02-23)
Underwater acoustic networks are a special type of wireless sensor networks deployed in a harsh oceanic environment for mission critical tasks. In this unique sensor network, energy efficiency is the most critical problem. ...
Multiple UAV Simulation with Multiresolution Multistage Models and Decision Support
(2009-02-23)
Multi UAV simulation is a dynamic multi-simulation of multiple Unmanned Aerial Vehicles (UAV) activities in the battlefield with multiresolution multistage models. Decision support is implemented under this simulation. It ...
Multi Initiator Connected Dominating Set Construction for Mobile Ad Hoc Networks
(2009-02-23)
Connected dominating set (CDS) has been extensively used for routing and broadcast in mobile ad hoc networks. While existing CDS protocols are successful in constructing CDS of competitive size with localized information, ...
Bandwidth-Aware Routing Tree (BART) for Underwater 3-D Geographic Routing
(2009-02-23)
The limited bandwidth and power resources in underwater sensor networks have made geographic routing a favorite choice. While many detouring strategies in geographic routing do not work for 3-D underwater network topology, ...
Clustering and Predictive Modeling: An Ensemble Approach
(2009-02-23)
Today’s data storage and collection abilities have allowed the accumulation of enormous amounts of data. Data mining can be a useful tool in transforming these large amounts of raw data into useful information. Predictive ...