Iowa State University

Displaying 1-40 of 140 results

  • White Papers // May 2013

    Replication Based Storage Systems With Local Repair

    The authors consider the design of regenerating codes for distributed storage systems that enjoy the property of local, exact and uncoded repair, i.e., upon failure, a node can be regenerated by simply downloading packets from the surviving nodes and the number of surviving nodes contacted is strictly smaller than the...

    Provided By Iowa State University

  • White Papers // Oct 2012

    Repairable Replication-Based Storage Systems Using Resolvable Designs

    The authors consider the design of regenerating codes for distributed storage systems at the Minimum Bandwidth Regeneration (MBR) point. The codes allow for a repair process that is exact and uncoded, but table-based. These codes were introduced in prior work and consist of an outer MDS code followed by an...

    Provided By Iowa State University

  • White Papers // Aug 2012

    ZigBee-Assisted Power Saving Management for Mobile Devices

    WiFi transmission can consume much energy on energy-constrained mobile devices. To improve energy efficiency, the Power Saving Management (PSM) has been standardized and applied. The standard PSM, however, may not deliver satisfactory energy efficiency in many cases as the wakeup strategy adopted by it cannot adapt dynamically to traffic pattern...

    Provided By Iowa State University

  • White Papers // Jul 2012

    Impact of Network Conditions on Delay-Stable Communications in Closed Industrial Control Networks

    To properly operate closed industrial control networks, it is required that communication with nearly constant delay bounds be supported. The authors introduced FlexTDMA in order to provide this support, and with minimal delay-jitter in an asynchronous network, under unicast communication. In this paper the authors consider how periodic on-off traffic...

    Provided By Iowa State University

  • White Papers // Jul 2012

    Delay-Stable Communications in Simultaneous Multicast Networks

    To properly operate closed industrial control networks, it is required that communication with nearly constant delay bounds be supported. The authors introduced FlexTDMA in order to provide this support, and with minimal delay-jitter in an asynchronous network, under unicast communication. In this paper, the authors consider providing this support for...

    Provided By Iowa State University

  • White Papers // May 2012

    Trustworthiness of Random Network Coded Information in Untrustworthy Networks

    The authors examine the trustworthiness of random network coded information in untrustworthy networks, where the network nodes provide false data purposely or unknowingly and data transmissions are subject to channel errors. The trustworthiness of information x is defined as the probability of x being true. They show that the trustworthiness...

    Provided By Iowa State University

  • White Papers // May 2012

    An Ad Hoc Group Signature Scheme for Accountable and Anonymous Access to Outsourced Data

    This paper presents a group signature scheme called adhoc sign for dynamically formed groups, to support accountable and anonymous access to outsourced data. Each user is assigned a certain set of attributes and the secrets associated with these attributes when joining the system; the access to outsourced data is regulated...

    Provided By Iowa State University

  • White Papers // Apr 2012

    Spectrum Decision for Efficient Routing in Cognitive Radio Network

    The Cognitive Radio (CR) nodes in a Cognitive Radio Network (CRN) do not have license to use specific spectrum band. Instead, they use the spectrum bands of the licensed Primary Users (PU) without interfering with the PU. When the PU becomes active, interfering CRs should leave to another available spectrum...

    Provided By Iowa State University

  • White Papers // Apr 2012

    Dynamic Test Input Generation for Database Applications to Achieve High Mutation Score

    Automatic generation of test cases for database applications has attracted researchers from both academia and industry. Typically in database application, the quality of test cases for the host language (e.g., Java) is evaluated on the basis of the number of lines, statements and blocks covered by the test cases, whereas,...

    Provided By Iowa State University

  • White Papers // Mar 2012

    Hybrid Network-Erasure Coding Protection of Multi-Source, Multi-Sink Multicast Sessions in WSNs

    In this paper, the authors consider the problem of providing fault tolerant operation for multicast networks with multiple sources, e.g., sensors, and delivering data to a pre-defined set of destinations, e.g., sinks. They propose an algorithm that combines network and erasure coding to provide resilience against a predefined number of...

    Provided By Iowa State University

  • White Papers // Feb 2012

    Field Size of Random Network Coding in Untrustworthy Networks

    The authors examine the probability of symbol error and the throughput with random network coding in untrustworthy networks, where the network nodes provide false data purposely or unknowingly and the information transmission is subject to channel error. They show that there exists an optimum field size that maximizes the throughput...

    Provided By Iowa State University

  • White Papers // Jan 2012

    LBA: Lifetime Balanced Data Aggregation in Low Duty Cycle Sensor Networks

    This paper proposes LBA, a lifetime balanced data aggregation scheme for asynchronous and duty cycle sensor networks under an application-specific requirement of end-to-end data delivery delay bound. In contrast to existing aggregation schemes that focus on reducing the energy consumption and extending the operational lifetime of each individual node, LBA...

    Provided By Iowa State University

  • White Papers // Nov 2011

    Modeling Web Usage Profiles of Cloud Services for Utility Cost Analysis

    Early proponents of public cloud computing have come to identify cost savings a key factor for adoption. However, the adoption and hosting of a web application in the cloud does not provide any such guarantees. This is in part due to the utility pricing model that dictates the cost of...

    Provided By Iowa State University

  • White Papers // Nov 2011

    ZigBee-Assisted WiFi Transmission for Multi-Interface Mobile Devices

    It has been common for a mobile device to have WiFi and Bluetooth interfaces. As the ZigBee technology becomes more mature, it will not be surprising to see the ZigBee interface commonly embedded in mobile devices together with WiFi and other interfaces in the near future. To leverage the ZigBee...

    Provided By Iowa State University

  • White Papers // Sep 2011

    Real Interference Alignment and Degrees of Freedom Region of Wireless X Networks

    The authors consider a single hop wireless X network with K transmitters and J receivers, all with single antenna. Each transmitter conveys for each receiver an independent message. The channel is assumed to have constant coefficients. They develop interference alignment scheme for this setup and derived several achievable degrees of...

    Provided By Iowa State University

  • White Papers // Aug 2011

    Distributed Power Control and Coding-Modulation Adaptation in Wireless Networks Using Annealed Gibbs Sampling

    In wireless networks, the transmission rate of a link is determined by received signal strength, interference from simultaneous transmissions, and available coding-modulation schemes. Rate allocation is a key problem in wireless network design, but a very challenging problem because: wireless interference is global, i.e., a transmission interfere all other simultaneous...

    Provided By Iowa State University

  • White Papers // Aug 2011

    J-RoC: A Joint Routing and Charging Scheme to Prolong Sensor Network Lifetime

    The emerging wireless charging technology creates a controllable and perpetual energy source to provide wireless power over distance. Schemes have been proposed to make use of wireless charging to prolong the sensor network lifetime. Unfortunately, existing schemes only passively replenish sensors that are deficient in energy supply, and cannot fully...

    Provided By Iowa State University

  • White Papers // Aug 2011

    Heterogeneity-Aware Design for Automatic Detection of Problematic Road Conditions

    Improving driving safety is one major objective of forming Vehicular Ad hoc NETworks (VANETs). Existing VANETs usually assume drivers detect and report safety-related road conditions. However, drivers may not be willing to perform these duties; even they are, these duties may distract them from driving and thus make driving unsafe....

    Provided By Iowa State University

  • White Papers // Aug 2011

    Efficient Spectrum Searching and Monitoring in Cognitive Radio Network

    Wireless spectrum is highly underutilized, where significant parts of it are used only for some time periods in an on/off manner and with large geographical variations. Such low utilization in spectrum usage resulted from currently deployed static frequency allocation policy. Apparently, in order to increase wireless spectrum utilization, more flexible...

    Provided By Iowa State University

  • White Papers // Aug 2011

    A Wireless Sensor Network for Precision Agriculture and Its Performance

    The use of wireless sensor networks is essential for implementation of information and control technologies in precision agriculture. The authors present their design of network stack for such an application where sensor nodes periodically collect data from fixed locations in a field. Their design of the PHYsical (PHY) layer consists...

    Provided By Iowa State University

  • White Papers // Jun 2011

    An Automatic, Time-Based, Secure Pairing Protocol for Passive RFID

    This paper introduces the Adopted-Pet (AP) protocol, an automatic (i.e. requiring no human interaction) secure pairing protocol, adequate for the pairing between a passive RFID tag and a reader. Most pairing protocols rely for their security on a certain advantage that the legitimate devices have over any malicious users. Such...

    Provided By Iowa State University

  • White Papers // Jun 2011

    A Light-Weight Solution to Preservation of Access Pattern Privacy in Un-Trusted Clouds

    Cloud computing is a new computing paradigm that is gaining in-creased popularity. More and more sensitive user data are stored in the cloud. The privacy of users' access pattern to the data should be protected to prevent un-trusted cloud servers from inferring users' private information or launching stealthy attacks. Meanwhile,...

    Provided By Iowa State University

  • White Papers // May 2011

    Hardware Architecture for Simultaneous Arithmetic Coding and Encryption

    Arithmetic coding is increasingly being used in upcoming image and video compression standards such as JPEG2000, and MPEG-4/H.264 AVC and SVC standards. It provides an efficient way of loss-less compression and recently, it has been used for joint compression and encryption of video data. In this paper, the authors present...

    Provided By Iowa State University

  • White Papers // May 2011

    Global Biofuel Expansion And The Demand For Brazilian Land: Intensification Versus Expansion

    The authors use a spatially disaggregated model of Brazilian agriculture to assess the implications of global biofuel expansion on Brazilian land usage at the regional level. This Brazilian model is part of the FAPRI agricultural modeling system, a multimarket, multi-commodity international agricultural model, used to quantify the emergence of biofuels...

    Provided By Iowa State University

  • White Papers // Apr 2011

    Architecture for Simultaneous Coding and Encryption Using Chaotic Maps

    In this paper, the authors discuss an interpretation of arithmetic coding using chaotic maps. They present a hardware implementation using 64 bit fixed point arithmetic on Virtex- 6 FPGA (with and without using DSP slices). The encoder resources are slightly higher than a traditional AC encoder, but there are savings...

    Provided By Iowa State University

  • White Papers // Apr 2011

    Performance Modeling and Simulation Studies of MAC Protocols in Sensor Network Performance

    The use of wireless sensor networks is essential for implementation of information and control technologies in precision agriculture. The authors present their design of network stack for such an application where sensor nodes periodically collect data from fixed locations in a field. Their design of the PHYsical (PHY) layer consists...

    Provided By Iowa State University

  • White Papers // Mar 2011

    Interference Alignment and Degrees of Freedom Region of Cellular Sigma Channel

    The authors investigate the Degrees of Freedom (DoF) region of a cellular network, where the cells can have overlapping areas. Within an overlapping area, the mobile users can access multiple base stations. They consider a case where there are two base stations both equipped with multiple antennas. The mobile stations...

    Provided By Iowa State University

  • White Papers // Feb 2011

    Superposition Noisy Network Coding

    The authors present a superposition coding scheme for communication over a network, which combines partial decode and forward and noisy network coding. This hybrid scheme is termed as superposition noisy network coding. The scheme is designed and analyzed for single relay channel, single source multicast network and multiple source multicast...

    Provided By Iowa State University

  • White Papers // Feb 2011

    Uplink Channel Assignment in Cognitive Radio WMNs Using Physical Layer Network Coding

    In this paper, the authors introduce a low overhead scheme for the uplink channel allocation within a single cell of Cognitive Radio Wireless Mesh Network (CR-WMNs). The scheme does not rely on using a Common Control Channel (CCC). The mechanism is based on Physical layer Network Coding (PNC), in which...

    Provided By Iowa State University

  • White Papers // Jan 2011

    Content-Based Network Adaptive Wireless Transmission of Remote Surveillance Video

    Due to advances in network technology and the prevalence of wireless networks, it has become possible to realize Remote Video Surveillance (RVS) applications as a low cost system using existing infrastructure. However such applications require enormous bandwidth for video transmission and a serious bottleneck is the non-availability of required bandwidth,...

    Provided By Iowa State University

  • White Papers // Jan 2011

    Local and On-the-Fly Choreography-Based Web Service Composition

    The authors present a goal-directed, local and on-the-fly algorithm for verifying the existence of and synthesizing a choreographer for Web service composition. They use i/o-automata to represent the (existing/component) services, the desired functionality of the composition, and a choreographer to achieve the desired service by composing the existing ones. As...

    Provided By Iowa State University

  • White Papers // Jan 2011

    Condition Data Aggregation With Application to Failure Rate Calculation of Power Transformers

    Cost-effective equipment maintenance for electric power transmission systems requires ongoing integration of information from multiple, highly distributed, and heterogeneous data sources storing various information about equipment. This paper describes a federated, query-centric data integration and knowledge acquisition framework for condition monitoring and failure rate prediction of power transformers. Specifically, the...

    Provided By Iowa State University

  • White Papers // Jan 2011

    High Speed Pattern Matching for Network IDS/IPS

    The phenomenal growth of the Internet in the last decade and society's increasing dependence on it has brought along with it, a flood of security attacks on the networking and computing infrastructure. Intrusion detection and prevention systems provide security defenses against these attacks by monitoring the headers and payload of...

    Provided By Iowa State University

  • White Papers // Jan 2011

    Secure DVR Protocol Using Factual Correctness

    The routing protocols in use today operate on implicit trust among the different routing elements. Specifically, the Distance Vector Routing (DVR) protocols compute updates and routing tables in a distributed manner, and consequently fail to ensure the factual correctness of the routing updates, which is very critical for secure routing....

    Provided By Iowa State University

  • White Papers // Jan 2011

    Eliminating SQL Injection Attacks - A Transparent Defense Mechanism

    The widespread adoption of web services as an instant means of information dissemination and various other transactions, has essentially made them a key component of today's Internet infrastructure. Web-based systems comprise both of infrastructure components and of application specific code. Various organizations have started extensively deploying Intrusion Detection/Prevention Systems and...

    Provided By Iowa State University

  • White Papers // Jan 2011

    Assembling Composite Web Services From Autonomous Components

    Web services are fast emerging as the technology of choice to build distributed information systems in multiple domains including e-Business and e-Science. An important challenge is to develop methodologies and tools that enable (semi-) automatic composition of services by taking into account the functional, non-functional and behavioral requirements of the...

    Provided By Iowa State University

  • White Papers // Dec 2010

    A Strategy-Proof and Non-Monetary Admission Control Mechanism for Wireless Access Networks

    The authors study admission control mechanisms for wireless access networks where each user has a minimum service requirement, the capacity of the access network is limited, and the access point is not allowed to use monetary mechanisms to guarantee that users do not lie when disclosing their minimum service requirements....

    Provided By Iowa State University

  • White Papers // Dec 2010

    Analyzing Software Updates: Should You Build a Dynamic Updating Infrastructure?

    The ability to adapt software systems to fix bugs, add/change features without restarting it is becoming important for many domains including but not limited to finance, social networking, control systems, etc. Fortunately, many ideas have begun to emerge under the umbrella term "Dynamic updating" to solve this problem. Dynamic updating...

    Provided By Iowa State University

  • White Papers // Nov 2010

    Assigning Spots for Persistent Data Dissemination to All the Vehicles in VANET

    Persistent data dissemination to a geographical area enjoys wide applicability in VANET. For a dissemination area, to guarantee the posted message being disseminated to every vehicle driving in the area during dissemination time is challenging and critical to many promised services. This paper, for the first time, achieves full area...

    Provided By Iowa State University

  • White Papers // Nov 2010

    GOT: Grid-Based On-Road Localization Through Inter-Vehicle Collaboration

    GPS navigators have been widely adopted by drivers. However, due to the sensibility of GPS signals to terrain, vehicles cannot get their locations when they are inside a tunnel or on a road surrounded by high-rises where the satellite signal is blocked. This incurs the safety and convenience problems. To...

    Provided By Iowa State University

  • White Papers // Apr 2012

    Dynamic Test Input Generation for Database Applications to Achieve High Mutation Score

    Automatic generation of test cases for database applications has attracted researchers from both academia and industry. Typically in database application, the quality of test cases for the host language (e.g., Java) is evaluated on the basis of the number of lines, statements and blocks covered by the test cases, whereas,...

    Provided By Iowa State University

  • White Papers // Apr 2011

    Performance Modeling and Simulation Studies of MAC Protocols in Sensor Network Performance

    The use of wireless sensor networks is essential for implementation of information and control technologies in precision agriculture. The authors present their design of network stack for such an application where sensor nodes periodically collect data from fixed locations in a field. Their design of the PHYsical (PHY) layer consists...

    Provided By Iowa State University

  • White Papers // Jul 2010

    FlexTDMA for Delay-Stable Communications in Asynchronous Industrial Control Networks

    To support closed industrial control networks the authors consider constant end-to-end delay with minimal delay-jitter support in an asynchronous network. The Rate Constrained Static Priority Rate-Jitter (RCSP-RJ) minimizes jitter while not providing full restoration of traffic at each switch. RCSP-DelayJitter (-DJ) provides jitter free network communication but requires a means...

    Provided By Iowa State University

  • White Papers // Jul 2010

    1+N Protection in Polynomial Time: A Heuristic Approach

    The generalized 1+N protection, protects N unicast connections by a single Steiner tree connecting all end points of the connections. By sending network coded packets on the protection Steiner tree in parallel with the working traffic, 1+N is able to recover from any single link failure without enduring the delay...

    Provided By Iowa State University

  • White Papers // May 2010

    Dynamic Provisioning of Optical Networks With Many-to-Many Traffic Grooming

    A large number of network applications today allow several users to interact together using the many-to-many service mode. In many-to-many communication, a session consists of a group of users, where each member transmits its traffic to all other members in the same group. In this paper, the authors address the...

    Provided By Iowa State University

  • White Papers // Apr 2010

    An Energy-Efficient Wireless Sensor Network for Precision Agriculture

    The use of wireless sensor networks is essential to implementation of information and control technologies in application areas such as precision agriculture. The authors design MAC and Network layers for a wireless sensor network deployed for a precision agriculture application which requires periodic collection of sensor readings from fixed locations...

    Provided By Iowa State University

  • White Papers // Sep 2009

    P2-Cycles: P-Cycles With Parasitic Protection Links

    The p-cycle and its Failure Independent Path Protection (FIPP) extension are known to be efficient and agile protection strategies. The p-cycle is preconfigured such that if there is a failure, only the switches at two end nodes need to be reconfigured. In this paper, the authors extend the p-cycle by...

    Provided By Iowa State University

  • White Papers // May 2012

    Trustworthiness of Random Network Coded Information in Untrustworthy Networks

    The authors examine the trustworthiness of random network coded information in untrustworthy networks, where the network nodes provide false data purposely or unknowingly and data transmissions are subject to channel errors. The trustworthiness of information x is defined as the probability of x being true. They show that the trustworthiness...

    Provided By Iowa State University

  • White Papers // Jan 2009

    Routing Techniques in Wireless Sensor Networks: A Survey

    Wireless Sensor Networks (WSNs) consist of small nodes with sensing, computation, and wireless communications capabilities. Many routing, power management, and data dissemination protocols have been specifically designed for WSNs where energy awareness is an essential design issue. The focus, however, has been given to the routing protocols which might differ...

    Provided By Iowa State University

  • White Papers // Jul 2008

    Efficient Broadcasting in Homogeneous and Heterogeneous Wireless Ad Hoc Network

    Network-wide broadcasting is a fundamental and frequently invoked communication primitive in wireless ad hoc networks where there are no pre-existing communication infrastructures. Existing broadcasting techniques perform well with respect to two out of the three performance goals (low broadcast latency, low retransmission overhead, and high broadcast reachability), but require each...

    Provided By Iowa State University

  • White Papers // Mar 2010

    Using New JMP Interactive Modules to Teach Concepts in Introductory Statistics

    Simulation has become an important tool in teaching topics related to sampling distributions and inference in the introductory statistics class. Many of these simulations have been developed with Java applets and made available on the web. While these applets are easy to use and readily available to statistics instructors, they...

    Provided By Iowa State University

  • White Papers // Jan 2010

    Distribution-Free Learning of Bayesian Network Structure in Continuous Domains

    In this paper authors present a method for learning the structure of Bayesian networks (BNs) without making any assumptions on the probability distribution of the domain. This is mainly useful for continuous domains, where there is little guidance and many choices for the parametric distribution families to be used for...

    Provided By Iowa State University

  • White Papers // Jul 2008

    Implementing Augmented Reality Into the Gaming Industry on a Desktop Display Interface

    This project focuses on the use of desktop display interfaces for augmented reality (AR) gaming. With this type of interface, the user is able to look at a screen and see the computer-generated graphics displayed above markers. The desktop display interface alleviates most of the problems associated with head mounted...

    Provided By Iowa State University

  • White Papers // Apr 2010

    Improving VoIP Capacity in Multi-Rate IEEE 802.11e WLANs Via Relay

    In order to improve the Voice over IP (VoIP) capacity of a Wireless Local Area Network (WLAN), the paper develops a relay-aided solution, which includes a relay-aided admission control scheme, a packet aggregation scheme, and a protocol for packet relay without sacrificing the voice quality. Basically, the admission control scheme...

    Provided By Iowa State University

  • White Papers // Sep 2009

    Supporting VoIP Services in IEEE 802.11e WLANs

    Voice over Internet Protocol (VoIP) over Wireless Local Area Network (WLAN) is becoming popular thanks to its cost efficiency. How-ever, it has been a challenge to provide good quality of VoIP services in WLANs, which is due mainly to the nature of contention-based channel access of WLAN Medium Access Control...

    Provided By Iowa State University

  • White Papers // Mar 2009

    Ea1uatmg Data Collection Qualit3 After Piotocol Changes

    It is important to evaluate data quality in any survey, but especially after changes in protocols and measurement systems. When revisions have been made in a longitudinal survey, it can be particularly important to make estimates of error rates for the entire data collection process and possibly for specific domains...

    Provided By Iowa State University

  • White Papers // Jan 2010

    Heterogeneous QoS Multicast in DiffServ-Like Networks

    Multicasting in DiffServ networks is a challenging problem due to the architectural conflicts between them, namely, stateful vs. stateless core. This paper assumes an Edge-Based Multicast (EBM) model wherein the multicast tree is constructed such that the branching occurs only at the edge routers. This paper proposes an algorithm to...

    Provided By Iowa State University

  • White Papers // Jan 2010

    Managing Group Dynamics and Failures in QoS Multicasting

    The recent proliferation of QoS-aware group applications over the Internet has accelerated the need for scalable and efficient multicast support. This paper presents a multicast "Life-Cycle" model which identifies the various issues that are involved in a typical multicast session. During the life-cycle of a multicast session, three important events...

    Provided By Iowa State University

  • White Papers // Jan 2010

    A Case for Tree Migration and Integrated Tree Maintenance in QoS Multicasting

    The proliferation of QoS-aware group applications coupled with the limited availability of network resources demands for efficient mechanisms to support QoS multicasting. During a life-cycle of a multicast session, three important events can occur: membership dynamics, network dynamics, and traffic dynamics. The first two are concerned with maintaining a good...

    Provided By Iowa State University

  • White Papers // Jan 2010

    Dual-Crosshatch Disk Array: A Highly Reliable-RAID Architecture

    This paper proposes a highly reliable RAID architecture called a Dual-Crosshatch Disk Array. It used the proposed interleaved 2d-parity scheme, a low overhead triple-erasure correcting parity organization. It is a hybrid approach of RAID-4 and RAID-5 with one dedicated parity group and another parity group using block interleaved data and...

    Provided By Iowa State University

  • White Papers // Jan 2010

    Stimulating Node Cooperation in Mobile Ad Hoc Networks

    Mobile Ad hoc NETworks (MANETs) rely on the cooperation of nodes for packet routing and forwarding. However, much of the existing works in MANETs assume that mobile nodes (possibly owned by selfish users) will follow prescribed protocols without deviation. However, a user may misbehave due to several advantages resulting from...

    Provided By Iowa State University

  • White Papers // May 2009

    A Survey: Routing Metrics for Wireless Mesh Networks

    This paper provides a comprehensive survey of various routing metrics that have been proposed for wireless mesh networks and two new routing metrics have been proposed. Avoidance of congestion at nodes, high throughput, low levels of interference, isotonicity, efficient utilization of channel capacity, minimal transmission delay are some of the...

    Provided By Iowa State University

  • White Papers // Aug 2009

    The Current International Quality Standard, ISO 9001:2008

    Changes in ISO standards are routine. But they still manage to cause a fair amount of trepidation. For example, anyone who experienced the 1994 version of the ISO 9000 Quality Management Standard might have worried about the shift to ISO 9001:2000. The 1994 standard focused largely on traditional manufacturing activities...

    Provided By Iowa State University

  • White Papers // Feb 2010

    Integrated Retail And Wholesale Power System Operation With Smart-Grid Functionality

    The research team is developing an agent-based test bed for the integrated study of retail and wholesale power markets operating over transmission and distribution networks with smart-grid functionality. This test bed seams together two existing test beds, the AMES Wholesale Power Market Test Bed and the Grid LAB-D distribution platform....

    Provided By Iowa State University

  • White Papers // Dec 2009

    Understanding Cash Flow Analysis

    A cash flow statement is a listing of cash flows that occurred during the past accounting period. A cash flow statement is not only concerned with the amount of the cash flows but also the timing of the flows. Many cash flows are constructed with multiple time periods. For example,...

    Provided By Iowa State University

  • White Papers // Jan 2010

    Financial Perspectives On The Use Of Vegetative Environmental Buffers For Swine Odor Management

    Multi-scale financial analysis begins at the farm level using discounted cash-flow methods to examine the costs of establishing and managing Vegetative Environmental Buffer (VEB) systems for swine odor mitigation in Iowa. Using a random sample of existing hog confinements throughout Iowa (n=60), site specific VEB systems were designed for each...

    Provided By Iowa State University

  • White Papers // Nov 2008

    An Agent-Based Test Bed Study Of Wholesale Power Market Performance Measures

    Wholesale power markets operating over transmission grids subject to congestion have distinctive features that complicate the detection of market power and operational inefficiency. This paper uses a wholesale power market test bed with strategically learning traders to experimentally test the extent to which market performance measures commonly used for other...

    Provided By Iowa State University

  • White Papers // May 2008

    Cyber-Vulnerability of Power Grid Monitoring and Control Systems

    In this paper, a methodology is proposed for the evaluation of the impact of cyber attacks on the power grid. This is a systematical approach to evaluate the vulnerabilities of SCADA system at three levels, i.e., system, scenario, and access points. The impact of potential intrusion is evaluated based on...

    Provided By Iowa State University

  • White Papers // Nov 2010

    Assigning Spots for Persistent Data Dissemination to All the Vehicles in VANET

    Persistent data dissemination to a geographical area enjoys wide applicability in VANET. For a dissemination area, to guarantee the posted message being disseminated to every vehicle driving in the area during dissemination time is challenging and critical to many promised services. This paper, for the first time, achieves full area...

    Provided By Iowa State University

  • White Papers // Nov 2010

    DOVE: Data Dissemination to a Fixed Number of Receivers in VANET

    Efficient data dissemination to a fixed number of receivers in VANET is a new issue and has two challenges. First, it is hard to accurately control the number of receivers and achieve low dissemination delay, with small communication overhead, simultaneously. Second, the total number of receivers that disseminators can actually...

    Provided By Iowa State University

  • White Papers // Nov 2010

    GOT: Grid-Based On-Road Localization Through Inter-Vehicle Collaboration

    GPS navigators have been widely adopted by drivers. However, due to the sensibility of GPS signals to terrain, vehicles cannot get their locations when they are inside a tunnel or on a road surrounded by high-rises where the satellite signal is blocked. This incurs the safety and convenience problems. To...

    Provided By Iowa State University

  • White Papers // Aug 2012

    ZigBee-Assisted Power Saving Management for Mobile Devices

    WiFi transmission can consume much energy on energy-constrained mobile devices. To improve energy efficiency, the Power Saving Management (PSM) has been standardized and applied. The standard PSM, however, may not deliver satisfactory energy efficiency in many cases as the wakeup strategy adopted by it cannot adapt dynamically to traffic pattern...

    Provided By Iowa State University

  • White Papers // May 2012

    An Ad Hoc Group Signature Scheme for Accountable and Anonymous Access to Outsourced Data

    This paper presents a group signature scheme called adhoc sign for dynamically formed groups, to support accountable and anonymous access to outsourced data. Each user is assigned a certain set of attributes and the secrets associated with these attributes when joining the system; the access to outsourced data is regulated...

    Provided By Iowa State University

  • White Papers // Oct 2009

    Tree-Based Protection of Multicast Services in WDM Mesh Networks

    In this paper, the authors address the multicast survivability problem of using minimum resources to provision a multicast session and its protection paths (trees) in a network such that the session is protected against any single-link failure. They propose a new protection scheme, namely, Segment-based Protection Tree (SPT). In SPT...

    Provided By Iowa State University

  • White Papers // Oct 2009

    Design and Provisioning of WDM Networks for Many-to-Many Traffic Grooming

    A large number of network applications today allow several users to interact together using the many-to-many service mode. A many-to-many session consists of group of users (the authors refer to them as members), where each member transmits its traffic to all other members in the same group. They address the...

    Provided By Iowa State University

  • White Papers // Feb 2012

    Field Size of Random Network Coding in Untrustworthy Networks

    The authors examine the probability of symbol error and the throughput with random network coding in untrustworthy networks, where the network nodes provide false data purposely or unknowingly and the information transmission is subject to channel error. They show that there exists an optimum field size that maximizes the throughput...

    Provided By Iowa State University

  • White Papers // Feb 2011

    Superposition Noisy Network Coding

    The authors present a superposition coding scheme for communication over a network, which combines partial decode and forward and noisy network coding. This hybrid scheme is termed as superposition noisy network coding. The scheme is designed and analyzed for single relay channel, single source multicast network and multiple source multicast...

    Provided By Iowa State University

  • White Papers // Mar 2010

    Networked Distributed Source Coding

    The data sensed by different sensors in a sensor network is typically correlated. A natural question is whether the data correlation can be exploited in innovative ways along with network information transfer techniques to design efficient and distributed schemes for the operation of such networks. This necessarily involves a coupling...

    Provided By Iowa State University

  • White Papers // Aug 2009

    Design and Analysis of E2RC Codes Using EXIT Chart

    In this paper, the authors propose a new technique for computing EXIT functions of the structured parity part without resorting to Monte Carlo simulations. Their method provides smoother EXIT functions in substantially lesser time. Furthermore, they pose and solve the problem of designing good codes using linear programming. Next, they...

    Provided By Iowa State University

  • White Papers // Jun 2008

    Trusted User Authentication Scheme Combining Password with Fingerprint for Mobile Devices

    Mobile Equipment (ME) playing an important role of bridge between wireless network and mobile user has been facing more and more security threats. Trusted Mobile Platform (TMP) was proposed by TCG (Trusted Computing Group) as a new mechanism to enhance the security of the resource-constrained ME. In this paper, the...

    Provided By Iowa State University