Current trends show that 3G cellular network and WLAN will co-exist and work together to support more users with higher data rate services over a wider area. In this hybrid mobile network, the WLAN provides high bandw...
详细信息
Current trends show that 3G cellular network and WLAN will co-exist and work together to support more users with higher data rate services over a wider area. In this hybrid mobile network, the WLAN provides high bandwidth data service over a small area while the 3G cellular network provides a higher mobility with lower bandwidth data service. To provide seamless data service to mobile users, vertical handoff between WLAN and 3G cellular network has to be implemented. We present the challenges in the vertical handoff. We propose a TCP sch.me for a seamless vertical handoff, and present a performance evaluation. In the proposed sch.me, the TCP sender and receiver use the Handoff (HO) option field in TCP header to recognize an impending handoff and a completing handoff. After a vertical handoff, the sender tries to re-adjust its data rate, since the new network has drastically different characteristics in contrast with horizontal handoff where keeping the same data rate improves performance. The proposed sch.me can be implemented incrementally. It is not necessary to change all of the TCP senders for compatibility since it uses an optional field in TCP header.
This paper presents a half-rate clock and data recovery circuit (CDR) that combines the best features, fast acquisition and low jitter, of digital phase selec.ion and phase-lock-loop (PLL) CDR circuits. This CDR circu...
详细信息
This paper presents a half-rate clock and data recovery circuit (CDR) that combines the best features, fast acquisition and low jitter, of digital phase selec.ion and phase-lock-loop (PLL) CDR circuits. This CDR circuit consists of a phase selec.or, which can lock to the data in just a few clock cycles but has high jitter, and a PLL, which requires a much longer lock time but provides a low-jitter clock after locking. Simulations in 1/2 micrometer CMOS technology show operation up to 800 Mbps, a 6% acquisition range, an initial acquisition time of 4 bit times with 211 ps rms jitter, and jitter of 7.5 ps after a PLL lock time of 650 ns. A phase-frequency magnitude detector (PFMD) is added to the combined CDR to improve the lock time by feeding back an estimate of the magnitude of the frequency offset in addition to the sign. Simulations show that the 650ns lock time is reduced by about a factor of 4 to under 200ns from an initial 6% frequency difference.
The widespread use of wireless technologies in our everyday lives has made their application to elec.roniclearning (e-learning) environments, such as the classroom, imminent. However, there are several security and au...
详细信息
ISBN:
(纸本)0780379616
The widespread use of wireless technologies in our everyday lives has made their application to elec.roniclearning (e-learning) environments, such as the classroom, imminent. However, there are several security and authentication issues that must be addressed before wireless devices can be used in any teaching scenarios including those requiring examination/testing. This paper addresses some of the issues that currently hinder (and complicate) the introduction of such devices to the classroom. We discuss and propose solutions to the challenges of providing a secure, non-distracting, web-based wireless environment suitable for both class lectures and quizzing scenarios. We present a novel system which, regardless of class size, authoritatively determines who is logging on to utilize an elearning application and whether a student is accessing the application from the classroom or otherwise. The system also allows for the instructor to monitor the ways students use their wireless devices, an issue critical to maintaining integrity especially in quizzing situations. In addition to being secure, we propose a system flexible enough to allow an instructor to selec.ively control Internet, intranet or Virtual LAN (VLAN) resources students have access to. Our proposed system provides a secure and easily adaptable environment that allows for the development of secure elearning applications which will significantly enhance the classroom experience for both instructors and students.
We consider the problem of reconstructing a signal field measured by a large scale sensor network with mobile agents. Sensors transmit packets containing measurement data to mobile agents using either random or determ...
详细信息
We consider the problem of reconstructing a signal field measured by a large scale sensor network with mobile agents. Sensors transmit packets containing measurement data to mobile agents using either random or deterministic medium access control (MAC) sch.mes, and the signal field is reconstructed by mobile agents that minimize the mean square error of the reconstruction. For the one-dimensional Gauss-Markov field, we investigate the relation between the system throughput and reconstruction distortion, for different types of MAC sch.mes. We show that at low throughput level, increasing system throughput decreases the reconstruction distortion considerably. But the improvement is much less when the throughput is relatively high. We also show that the choice of MAC sch.mes can affect the reconstruction performance significantly, especially when the measurement noise is low.
In this paper, we describe the effects of substrate parasitics in silicon-based processes and present a methodology for designing low-noise amplifiers (LNA's) in silicon processes. Our techniques resulted in excel...
详细信息
In this paper, we describe the effects of substrate parasitics in silicon-based processes and present a methodology for designing low-noise amplifiers (LNA's) in silicon processes. Our techniques resulted in excellent agreement between simulations and measurements for a test case LNA design for 802.11a. This LNA, which covers 5-6 GHz and has gain switching is designed in a 0.8μm SiGe bipolar technology with fT of 50 GHz. The LNA exhibits a gain of more than 24dB in the 5-6 GHz band with a Noise Figure (NF) less than 2.5dB. The agreement between simulation and measured data is demonstrated.
We present a novel receding horizon control strategy for constrained linear systems, based on a suboptimal solution to the fixed horizon optimization problem considered in Model Predictive Control (MPC). The proposed ...
详细信息
We present a novel receding horizon control strategy for constrained linear systems, based on a suboptimal solution to the fixed horizon optimization problem considered in Model Predictive Control (MPC). The proposed strategy relies on a basis function expansion of the unconstrained optimal solution in terms of the singular vectors of the Hessian of the performance index. At each sampling time, the strategy ensures that the constraints are not violated by considering a variable subset of the basis representation. For cases in which the Hessian is ill-conditioned, the proposed strategy delivers a feasible solution without excessively compromising performance. We also show that the singular values of the Hessian are related to the frequency response of the plant.
Laser ablation, a material removal process that uses localized thermal energy caused by stimulated radiation, has become an important process in the fabrication of microelec.ronic packaging substrates, particularly in...
详细信息
Laser ablation, a material removal process that uses localized thermal energy caused by stimulated radiation, has become an important process in the fabrication of microelec.ronic packaging substrates, particularly in the fabrication of vias. During laser ablation, debris in the form of carbon residue is generated as a by-product. In this paper, resistance measurements on metal deposited in ablated vias are conducted to characterize the degree to which debris remaining inside the vias affects their quality. Vias with diameters of 10 -50 μm are ablated in DuPont Kapton® E polyimide using an Anvik HexScan™ 2150 SXE excimer laser. A statistical experiment using a 25-1 fractional factorial design is conducted to characterize five process conditions, namely: laser energy, shot frequency, number of pulses, and the vertical and horizontal positions of the debris removal system in the laser tool. Measurements indicate that 10, 20, and 30 μm vias are not opened by any combination of the five process conditions. As for the 40 and 50 μm vias, both number of pulses and the horizontal position of the debris removal system, as well as their two-term interaction, are found to be statistically significant (p-value < 0.05). Following the collection of the experimental data, neural networks are trained and subsequently tested to model the measured resistance through the metallized 40 and 50 μm vias. Results indicate that the prediction error of these models is less than 15%.
Premature Ventricular Contraction (PVC) beats are of great importantance in evaluating and predicting life-threatening ventricular arrhythmias. In this paper, an algorithm is proposed for the identificaton of PVC beat...
详细信息
ISBN:
(纸本)0889863512
Premature Ventricular Contraction (PVC) beats are of great importantance in evaluating and predicting life-threatening ventricular arrhythmias. In this paper, an algorithm is proposed for the identificaton of PVC beats. ECG signal is first conveted into a symbolic string sequence of '0's and '1's using a thresholding algorithm;Secondly, the length of all substrings composed only with the symbol '1' is estimated;thirdly, the lengths of these substrings are theresholded to detect the PVC beats. Compared to other PVC beat detectors, the proposed algorithm decreases the computational burden, and furthermore, doesn't require for QRS complex detection or calculation of morphological features of the ECG signal. The proposed algorithm has a gross sensitivity of 98.8% for ten patients from the MIT Arrhythmia Database.
The importance of applying abstract concepts in programming since first years of a computerengineering course, plus the contribution to learning provided by visual resources, has been a concern in teaching data struc...
详细信息
ISBN:
(纸本)088986361X
The importance of applying abstract concepts in programming since first years of a computerengineering course, plus the contribution to learning provided by visual resources, has been a concern in teaching data structures. Teaching data structures is more than showing how to push information in a stack or how eliminate the first one of a queue. The goal is to aid students in acquiring good comprehension of data structures as abstract data types (ADT). This means to teach the student that is possible to create a function using stack operations, for example, without knowing where the information will be stored. The student does not need to know if a stack is stored in the array or in a linked list. He just needs to know how to use the push operation to resolve a problem that needs a stack to work. A useful tool was implemented to support this approach. It is a tool to test a function that contains abstract data types before the implementation phase. ADTTool (Abstract Data Type Tool) is an auxiliary educational software to aid students to acquire good comprehension of abstract data types. The goal is to teach a student to think differently and concentrate on the outside view while ignoring implementation details.
Policy specification for securing Web services is fast emerging as a key research area due to rapid proliferation of Web services in modern day enterprise applications. Whilst the use of XML technology to support thes...
详细信息
ISBN:
(纸本)1892512491
Policy specification for securing Web services is fast emerging as a key research area due to rapid proliferation of Web services in modern day enterprise applications. Whilst the use of XML technology to support these Web services has resulted in their tremendous growth, it has also introduced a new set of security challenges specific to these Web services. Though there has been recent research in areas of XML-based document security, these challenges have not been addressed within the XML framework. In this paper, we present X-RBAC, an XML-based RBAC policy specification framework for enforcing access control in dynamic XML-based Web services. An X-RBAC system has been implemented as a Java application, and is based on a specification language that addresses specific security requirements of these Web services. We discuss the salient features of the specification language, and present the software architecture of our X-RBAC system.
暂无评论