about.jpg

Filter by

Knowledge management in contract administration: An ontological engineering approach

Knowledge has been identified to be a significant organizational resource, which if used effectively can provide competitive advantage. Construction contract administration is a complex, knowledge-intensive process that if properly managed can mitigate the contractor's risk exposure. Challenges in proper knowledge management of contract administration are due to: 1) Large amount of fragmented

Energy and Water

On the utility of primary side information in cognitive sensing

In this paper, we study the impact of the knowledge of primary side information on the efficiency of spectrum sensing for cognitive radio networks. In particular, assuming that the secondary transmitter knows the modulation and/or coding scheme used in the primary transmissions, we evaluate the efficiency of spectrum sensing in terms of maximizing the overall achievable throughput of the system

Software and Communications

Impact of the human motion on the variance of the received signal strength of wireless links

Human motion has strong impact on the received signal strength (RSS) of indoor wireless links that can be exploited for variance-based device-free positioning. In this paper, we investigate the effect of human motion on the variance of the RSS of wireless local area networks (WLAN) operating at 2.4 GHz. Using measurements, the RSS variance for human in-place motion is determined as a function of

Software and Communications

SANC: Source authentication using network coding

In this paper, we explore the security merits of network coding and potential trade-offs with the widely accepted throughput benefits, especially in multicast scenarios. In particular, we propose a novel Source Authentication using Network Coding (SANC) scheme that can either complement state-of-the-art application-layer authentication schemes proposed in the literature or be used as a stand-alone

Software and Communications

Comparison of statistical deterioration models for water distribution networks

The use of water main break history as a proxy for condition has become common practice because of the high costs associated with direct assessments. Statistical deterioration models predict future water main breaks on the basis of historical patterns. Many municipalities are beginning to understand the value of utilizing water pipe break histories to manage their noncritical distribution networks

Energy and Water

Constrained interference alignment and the spatial degrees of freedom of mimo cognitive networks

An interference alignment (IA) scheme is presented that allows multiple opportunistic transmitters (secondary users) to use the same frequency band of a pre-existing primary link without generating any interference. The primary and secondary transmit-receive pairs are equipped with multiple antennas. Under power constraints on the primary transmitter, the rate of the primary user is maximized by

Software and Communications

DPSK receiver-sensitivity enhancement using an SOA in front of the receiver

A technique for DPSK receiver-sensitivity improvement is demonstrated using numerical simulations. It is based on reshaping and reamplifying of received 80 Gbit/s DPSK using an SOA before a one bit delay interferometer. The SOA re-amplifies data without adding amplitude or differential phase noise due to its gain-compression. The system is tested using 231-1 PRBS RZ-DPSK (NRZ-DPSK) loaded with

Software and Communications

Proactive resource allocation in cognitive networks

Recently we have introduced the notion of proactive resource allocation and predictive wireless networks, where intelligent wireless networks are capable of tracking and exploiting the repetition patterns in human behavior while accessing the network resources. This predictability advantage grants the network more flexibility to schedule users' requests over a longer time horizon, and thereby

Software and Communications

Practical provably secure communication for half-duplex radios

In this paper, we present a practical and provably secure two-way wireless communication scheme in the presence of a passive eavesdropper. The scheme implements a randomized scheduling and power allocation mechanism, where each legitimate node transmits in random time slots and with random transmit power. Such randomization results in ambiguity at the eavesdropper with regard to the origin of each

Software and Communications

Cooperative sensing with sequential ordered transmissions to secondary fusion center

Successful spectrum sharing in a cognitive radio network depends on the correct and quick detection of primary activity. Cooperative spectrum sensing is therefore suggested to enhance the reliability of such detection. However, it renders another significant problem of increased detection delay and traffic burden. Moreover, efficient schemes for multi-sensor data fusion should be designed. In this

Software and Communications