Now showing items 153-172 of 213

  • Performance analysis of security mechanism during handoff in Mobile IP 

    Shah, Anant (Wichita State University, 2007-12)
    With the advent of wireless devices, such as PDA, palmtops, the demand for staying connected to the internet have steadily increased. The traditional TCP/IP stack does not have support for mobility. In order to address ...
  • Performance enhancement of the EPCglobal network by aggregating data at the EPCIS 

    Conganige, Ruvin Anthony (Wichita State University, 2008-05)
    RFID is a well known acronym for Radio-Frequency Identification, which is a technology similar to the existing bar code identification. This particular technology is capable of uniquely identifying tagged objects, which ...
  • Performance of slotted aloha anti-collision protocol for RFID systems under interfering environments 

    Deegala, Kavindya (Wichita State University, 2010-08)
    Radio Frequency Identification (RFID) is a wireless technology that has replaced barcodes. This technology is used in today’s world to track assets and people. An RFID system consists of three components: the tag, the ...
  • Piggybacking of UDP and TCP packets 

    Bangalore Vijayakumar, Pooja (Wichita State University, 2011-12)
    In this research, the concept of piggybacking has been extended to concatenate Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) packets. In any given network scenario, voice (UDP) is given priority ...
  • Power management of access points 

    Uddin, Minhaj (Wichita State University, 2010-12)
    The evolution of hand-held devices and portable machines started the increase in demand for reliable, secure, and faster means of communication from wireless LAN infrastructures. This has lead to an enormous increase in ...
  • Predicting recloser failure rates from field condition assessment 

    Warner, Joseph M (2005-12)
    This research develops a technique to predict the failure rate of a power distribution system recloser. The prediction is based on suggested criterion given and defined within this paper. Because inspection practices differ ...
  • Preserving query privacy with a query-based memorizing algorithm 

    Cheng, Jiang (Wichita State University, 2014-05)
    Query privacy is a critical concern to users of location-based services. A majority of existing query privacy protection techniques are based on the notion of k-anonymity, wherein a user's exact location is obfuscated into ...
  • Probability based cache replacement algorithm for the hypervisor cache 

    Madhugiri Shamsundar, Abhiram (Wichita State University, 2012-07)
    Virtualization is one of the key technologies which help in server consolidation, disaster recovery, and dynamic load balancing. The ratio of virtual machine to physical machine can be as high as 1:10, and this makes caching ...
  • Proportional-Integral-Derivative (PID) controller design for robust stability of arbitrary order plants with time-delay and additive uncertainty 

    Gogoi, Manoj (Wichita State University, 2010-08)
    In the process control industry, majority of control loops are based on Proportional-Integral-Derivative (PID) controllers. The basic structure of the PID controllers makes it easy to regulate the process output. Design ...
  • Provisioning task based symmetric QoS in iSCSI SAN 

    Ramaswamy, Padmanabhan (Wichita State University, 2008-12)
    This thesis examines Internet Small Computer System Interface (iSCSI) storage architecture and introduces a framework to furnish Quality of Service (QoS) for the qualified storage traffic. The framework incorporates IO ...
  • Quantitative analysis of frame inter-arrival times in saturated ad hoc networks 

    Chandna, Nidhi (Wichita State University, 2011-05)
    Medium Access Control (MAC) delays increase the frame inter-arrival time on the destination node in saturated ad hoc networks. With the increase in the network size more and more nodes contend for the medium which increases ...
  • The quantitative analysis of medium access delays in saturated ad hoc networks and their impact on the packet service-time 

    Paradi, Santosh (Wichita State University, 2010-12)
    This thesis presents a quantitative analysis of medium access control (MAC) delays in saturated ad hoc networks and their impact on node packet service-time. First, the medium access delay at an ad hoc node was modeled in ...
  • Ranked selection indexes for linear preference queries 

    Singh, Sanjaya (Wichita State University, 2011-12)
    Data entities from various data sources could be ordered according to a variety of attributes associated with those entities. These orderings result in a ranking of entities in terms of the values in the attribute domains. ...
  • Rate distortion analysis for conditional motion estimation 

    Mitikiri, Praveen Kumar (Wichita State University, 2008-08)
    Rate Distortion analysis is a branch of information theory that predicts the tradeoffs between rate and distortion in source coding. In this thesis, we present the rate distortion analysis for conditional motion estimation, ...
  • RDMA based IP routing protocols and router architecture 

    Chinthalapani, Nishanth (Wichita State University, 2008-08)
    The Ethernet technology has advanced from the era of fast Ethernet to the era of gigabit ethernet. The gigabit routers currently available in the market are employing expensive hardware based implementations for improving ...
  • Reaction mechanism for packet size-based misbehavior in wireless networks 

    Govindarajulu, Sree Sharanya (Wichita State University, 2011-05)
    Since the field of wireless technology is growing rapidly, security is becoming a major concern. A variety of security problems are being addressed, and much research work is taking place in order to provide adequate ...
  • Reactive power control functions for distributed PV sources 

    Ravindran, Vinoth Kumar (Wichita State University, 2013-05)
    The integration of distributed generation is one of the biggest changes facing the power industry, with greenhouse gas mitigation and the smart grid initiative. With result of the increasing penetration of grid-connected ...
  • Real-time optimal trajectory smoothing for Unmanned Aerial Vehicle in three dimensions 

    Malisetty, Saideepthi (Wichita State University, 2011-07)
    This thesis presents a dynamically feasible and real-time trajectory path generation algorithm for unmanned aerial vehicles (UAVs) flying through a sequence of a random N number of waypoints (WPs) in three dimensions. ...
  • Relay network under broadband jamming 

    Sonawane, Jayesh Murlidhar (Wichita State University, 2010-12)
    In this thesis, the bit error rate (BER) performance of a relay network using binary phase shift keying (BPSK) and quadrature phase shift keying (QPSK) modulation was compared under broadband jamming with a normalized ...
  • Revisiting network flows: a sensor network perspective 

    Nilofar, FNU (Wichita State University, 2012-12)
    In wireless sensor networks, data preservation has become a key challenging problem. Data generated by some sensor nodes is huge and due to limited storage space in a sensor node, the data generating nodes have to offload ...