Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

13,206 Full-Text Articles 16,750 Authors 4,117,996 Downloads 202 Institutions

All Articles in Computer Engineering

Faceted Search

13,206 full-text articles. Page 438 of 450.

Providing Location Security In Vehicular Ad Hoc Networks, Gongjun Yan 2010 Old Dominion University

Providing Location Security In Vehicular Ad Hoc Networks, Gongjun Yan

Computer Science Theses & Dissertations

Location is fundamental information in Vehicular Ad-hoc Networks (VANETs). Almost all VANET applications rely on location information. Therefore it is of importance to ensure location information integrity, meaning that location information is original (from the generator), correct (not bogus or fabricated) and unmodified (value not changed). We present validation mechanisms to provide location integrity for VANETs. In the initial mechanism, we assume that all vehicles are equipped with a radar, a GPS receiver, and a transceiver. Since radar has a limited radar range and transceiver has a limited transmission range, we build network cells as a security unit as well ...


Embedded Virtual Machines For Robust Wireless Control And Actuation, Miroslav Pajic, Rahul Mangharam 2010 University of Pennsylvania

Embedded Virtual Machines For Robust Wireless Control And Actuation, Miroslav Pajic, Rahul Mangharam

Departmental Papers (ESE)

Embedded wireless networks have largely focused on open-loop sensing and monitoring. To address actuation in closed-loop wireless control systems there is a strong need to re-think the communication architectures and protocols for reliability, coordination and control. As the links, nodes and topology of wireless systems are inherently unreliable, such time-critical and safety-critical applications require programming abstractions and runtime systems where the tasks are assigned to the sensors, actuators and controllers as a single component rather than statically mapping a set of tasks to a specific physical node at design time. To this end, we introduce the Embedded Virtual Machine (EVM ...


Continuous Spatial Assignment Of Moving Users, Hou U LEONG, Kyriakos MOURATIDIS, Nikos MAMOULIS 2010 University of Hong Kong

Continuous Spatial Assignment Of Moving Users, Hou U Leong, Kyriakos Mouratidis, Nikos Mamoulis

Research Collection School Of Information Systems

Consider a set of servers and a set of users, where each server has a coverage region (i.e., an area of service) and a capacity (i.e., a maximum number of users it can serve). Our task is to assign every user to one server subject to the coverage and capacity constraints. To offer the highest quality of service, we wish to minimize the average distance between users and their assigned server. This is an instance of a well-studied problem in operations research, termed optimal assignment. Even though there exist several solutions for the static case (where user locations ...


Managing Media Rich Geo-Spatial Annotations For A Map-Based Mobile Application Using Clustering, Khasfariyati RAZIKIN, Dion Hoe-Lian GOH, Ee Peng LIM, Aixin SUN, Yin-Leng THENG, Thi Nhu Quynh KIM, Kalyani CHATTERJEA, Chew-Hung CHANG 2010 Nanyang Technological University

Managing Media Rich Geo-Spatial Annotations For A Map-Based Mobile Application Using Clustering, Khasfariyati Razikin, Dion Hoe-Lian Goh, Ee Peng Lim, Aixin Sun, Yin-Leng Theng, Thi Nhu Quynh Kim, Kalyani Chatterjea, Chew-Hung Chang

Research Collection School Of Information Systems

With the prevalence of mobile devices that are equipped with wireless Internet capabilities and Global Positioning System (GPS) functionality, the creation and access of user-generated content are extended to users on the go. Such content are tied to real world objects, in the form of geospatial annotations, and it is only natural that these annotations are visualized using a map-based approach. However, viewing maps that are filled with annotations could hinder the serendipitous discovery of data, especially on the small screens of mobile devices. This calls for a need to manage the annotations. In this paper, we introduce a mobile ...


Forecast For The Future: Emerging Legal Technologies, Carol A. Watson 2010 University of Georgia School of Law Library

Forecast For The Future: Emerging Legal Technologies, Carol A. Watson

Continuing Legal Education Presentations

Begins by discussing technologies that are currently available on the web that can reduce office overhead. Also highlights current general technology trends and still-developing technologies. Concludes with a list of frivolous gadgets to provide food for thought about the coming prospects of technology.


Dsfs: Decentralized Security For Large Parallel File Systems, Zhongying Niu, Hong Jiang, Ke Zhou, Dan Feng, Tianming Yang, Dongliang Lei, Anli Chen 2010 Huazhong University of Science and Technology

Dsfs: Decentralized Security For Large Parallel File Systems, Zhongying Niu, Hong Jiang, Ke Zhou, Dan Feng, Tianming Yang, Dongliang Lei, Anli Chen

CSE Technical reports

This paper describes DSFS, a decentralized security system for large parallel file system. DSFS stores global access control lists (ACLs) in a centralized decisionmaking server and pushes pre-authorization lists (PALs) into storage devices. Thus DSFS allows users to flexibly set any access control policy for the global ACL or even change the global ACL system without having to upgrade the security code in their storage devices. With pre-authorization lists, DSFS enables a networkattached storage device to immediately authorize I/O, instead of demanding a client to acquire an authorization from a centralized authorization server at a crucial time. The client ...


A Novel Eight Switches Inverter Topology For Plug-In Hybrid Electric Vehicle, Omar Hegazy, Joeri Van Mierlo 2010 Vrije Universiteit Brussel (VUB), Belgium

A Novel Eight Switches Inverter Topology For Plug-In Hybrid Electric Vehicle, Omar Hegazy, Joeri Van Mierlo

Dr. Eng. Omar Hegazy

In this paper, a novel inverter topology, Eight Switches Inverter (ESI), is proposed for HEV, especially PHEV system to reduce the number of switches, and to achieve high performance during discharging mode, braking mode and charging mode from grid. Thereby, this topology gives the ability to connect the vehicle with grid at home or at work to charge the Energy Storage System (ESS) easily, especially the battery unit. In addition, the cost and the volume of the power electronics unit (PEU) have reduced. In this research, there are two control strategies have tested to validate the performance of the proposed ...


Adaptive Robot Deployment Algorithms, Jerome LE NY, George J. Pappas 2010 University of Pennsylvania

Adaptive Robot Deployment Algorithms, Jerome Le Ny, George J. Pappas

Technical Reports (ESE)

In robot deployment problems, the fundamental issue is to optimize a steady state performance measure that depends on the spatial configuration of a group of robots. For static deployment problems, a classical way of designing high- level feedback motion planners is to implement a gradient descent scheme on a suitably chosen objective function. This can lead to computationally expensive deployment algorithms that may not be adaptive to uncertain dynamic environments. We address this challenge by showing that algorithms for a variety of deployment scenarios in stochastic environments and with noisy sensor measurements can be designed as stochastic gradient descent algorithms ...


Rwanda National Customer Satisfaction Survey: Results And Conclusions, Deogratias Harorimana 2010 The University of the South Pacific

Rwanda National Customer Satisfaction Survey: Results And Conclusions, Deogratias Harorimana

Dr Deogratias Harorimana

It can be said that development practice requires more than financial and manpower inputs. Rwanda, in 1994 suffered a Genocide. The Society,collectively and under the leadership of His Excellence Paul Kagame the current elected President of Rwanda came together and designed strategies that would propel Rwanda to a Middle-Income, Private Sector Led Economy by the Year 2020.

In 2009, a client seating in one of the Hotels in a Suburb of Remera, in Kigali City, complained about poor service delivery he was experiencing from the waitress staff.Using his Blackberry message, the client forwarded an email to some of ...


Modeling Computer Communication Networks In A Realistic 3d Environment, Charles R. Rowell Jr. 2010 Air Force Institute of Technology

Modeling Computer Communication Networks In A Realistic 3d Environment, Charles R. Rowell Jr.

Theses and Dissertations

Communication network simulations have typically been visualized in the past through 2D representations, but this is insufficient for battlefield network scenarios. Visual representations of battlefield networks greatly benefit from 3D visualization due to its ability to retain asset location. This research investigates the feasibility of modeling a typical battlefield communication network in a realistic 3D manner and discusses the effects of doing so. The result is an open source, 3D network visualization tool that can create highly intuitive connected battlefield scenes, enabling the user to quickly comprehend network state. It highlights mobile assets, packet movement, and node connectivity while allowing ...


Component Hiding Using Identification And Boundary Blurring Techniques, James D. Parham Jr. 2010 Air Force Institute of Technology

Component Hiding Using Identification And Boundary Blurring Techniques, James D. Parham Jr.

Theses and Dissertations

Protecting software from adversarial attacks is extremely important for DoD technologies. When systems are compromised, the possibility exists for recovery costing millions of dollars and countless labor hours. Circuits implemented on embedded systems utilizing FPGA technology are the result of downloading software for instantiating circuits with specific functions or components. We consider the problem of component hiding a form of software protection. Component identification is a well studied problem. However, we use component identification as a metric for driving the cost of reverse engineering to an unreasonable level. We contribute to protection of software and circuitry by implementing a Java ...


Flexible Computing Architecture For Real Time Skin Detection, Matthew P. Hornung 2010 Air Force Institute of Technology

Flexible Computing Architecture For Real Time Skin Detection, Matthew P. Hornung

Theses and Dissertations

In both the Air Force and Search and Rescue Communities, there is a current need to detect and characterize persons. Existing methods use red-green-blue (RGB) imagery, but produce high false alarm rates. New technology in multi-spectral skin detection is better than the existing RGB methods, but lacks a control and processing architecture to make them efficient for real time problems. We hypothesize that taking a minimalistic approach to the software design, we can perform image preprocessing, feature computation, and skin detection in real time. A number of applications require accurate detection and characterization of persons, human measurement and signature intelligence ...


Real Time Fault Detection And Diagnostics Using Fpga-Based Architecture, Nathan P. Naber 2010 Air Force Institute of Technology

Real Time Fault Detection And Diagnostics Using Fpga-Based Architecture, Nathan P. Naber

Theses and Dissertations

Errors within circuits caused by radiation continue to be an important concern to developers. A new methodology of real time fault detection and diagnostics utilizing FPGA based architectures while under radiation were investigated in this research. The contributions of this research are focused on three areas; a full test platform to evaluate a circuit while under irradiation, an algorithm to detect and diagnose fault locations within a circuit, and finally to characterize Triple Design Triple Modular Redundancy (TDTMR), a new form of TMR. Five different test setups, injected fault test, gamma radiation test, thermal radiation test, optical laser test, and ...


Reputation-Based Trust For A Cooperative, Agent-Based Backup Protection Scheme For Power Networks, John F. Borowski 2010 Air Force Institute of Technology

Reputation-Based Trust For A Cooperative, Agent-Based Backup Protection Scheme For Power Networks, John F. Borowski

Theses and Dissertations

This thesis research explores integrating a reputation-based trust mechanism with an agent-based backup protection system to improve the performance of traditional backup relay methods that are currently in use in power transmission systems. Integrating agent technology into relay protection schemes has been previously proposed to clear faults more rapidly and to add precision by enabling the use of adaptive protection methods. A distributed, cooperative trust system such as that used in peer-to-peer file sharing networks has the potential to add an additional layer of defense in a protection system designed to operate with greater autonomy. This trust component enables agents ...


A Distributed Network Logging Topology, Nicholas E. Fritts 2010 Air Force Institute of Technology

A Distributed Network Logging Topology, Nicholas E. Fritts

Theses and Dissertations

Network logging is used to monitor computer systems for potential problems and threats by network administrators. Research has found that the more logging enabled, the more potential threats can be detected in the logs (Levoy, 2006). However, generally it is considered too costly to dedicate the manpower required to analyze the amount of logging data that it is possible to generate. Current research is working on different correlation and parsing techniques to help filter the data, but these methods function by having all of the data dumped in to a central repository. Central repositories are limited in the amount of ...


Visually Managing Ipsec, Peter J. Dell'Accio 2010 Air Force Institute of Technology

Visually Managing Ipsec, Peter J. Dell'accio

Theses and Dissertations

The United States Air Force relies heavily on computer networks to transmit vast amounts of information throughout its organizations and with agencies throughout the Department of Defense. The data take many forms, utilize different protocols, and originate from various platforms and applications. It is not practical to apply security measures specific to individual applications, platforms, and protocols. Internet Protocol Security (IPsec) is a set of protocols designed to secure data traveling over IP networks, including the Internet. By applying security at the network layer of communications, data packets can be secured regardless of what application generated the data or which ...


Codifying Information Assurance Controls For Department Of Defense (Dod) Supervisory Control And Data Acquisition (Scada) Systems (U), Eddie A. Mendezllovet 2010 Air Force Institute of Technology

Codifying Information Assurance Controls For Department Of Defense (Dod) Supervisory Control And Data Acquisition (Scada) Systems (U), Eddie A. Mendezllovet

Theses and Dissertations

Protecting DoD critical infrastructure resources and Supervisory Control and Data Acquisition (SCADA) systems from cyber attacks is becoming an increasingly challenging task. DoD Information Assurance controls provide a sound framework to achieve an appropriate level of confidentiality, integrity, and availability. However, these controls have not been updated since 2003 and currently do not adequately address the security of DoD SCADA systems. This research sampled U.S. Air Force Civil Engineering subject matter experts representing eight Major Commands that manage and operate SCADA systems. They ranked 30 IA controls in three categories, and evaluated eight SCADA specific IA controls for inclusion ...


Developing Cyberspace Data Understanding: Using Crisp-Dm For Host-Based Ids Feature Mining, Joseph R. Erskine 2010 Air Force Institute of Technology

Developing Cyberspace Data Understanding: Using Crisp-Dm For Host-Based Ids Feature Mining, Joseph R. Erskine

Theses and Dissertations

Current intrusion detection systems generate a large number of specific alerts, but do not provide actionable information. Many times, these alerts must be analyzed by a network defender, a time consuming and tedious task which can occur hours or days after an attack occurs. Improved understanding of the cyberspace domain can lead to great advancements in Cyberspace situational awareness research and development. This thesis applies the Cross Industry Standard Process for Data Mining (CRISP-DM) to develop an understanding about a host system under attack. Data is generated by launching scans and exploits at a machine outfitted with a set of ...


Augmenting Latent Dirichlet Allocation And Rank Threshold Detection With Ontologies, Laura A. Isaly 2010 Air Force Institute of Technology

Augmenting Latent Dirichlet Allocation And Rank Threshold Detection With Ontologies, Laura A. Isaly

Theses and Dissertations

In an ever-increasing data rich environment, actionable information must be extracted, filtered, and correlated from massive amounts of disparate often free text sources. The usefulness of the retrieved information depends on how we accomplish these steps and present the most relevant information to the analyst. One method for extracting information from free text is Latent Dirichlet Allocation (LDA), a document categorization technique to classify documents into cohesive topics. Although LDA accounts for some implicit relationships such as synonymy (same meaning) it often ignores other semantic relationships such as polysemy (different meanings), hyponym (subordinate), meronym (part of), and troponomys (manner). To ...


Scalable And Fault Tolerant Group Key Management, Nicholas A. Lupien 2010 Air Force Institute of Technology

Scalable And Fault Tolerant Group Key Management, Nicholas A. Lupien

Theses and Dissertations

To address the group key management problem for modern networks this research proposes a lightweight group key management protocol with a gossip-based dissemination routine. Experiments show that by slightly increasing workload for the key update mechanism, this protocol is superior to currently available tree-based protocols with respect to reliability and fault tolerance, while remaining scalable to large groups. Java simulations show that the protocol efficiently distributes keys to large groups in the midst of up to 35 percent node failure rates. In addition, it eliminates the need for logical key hierarchy while preserving an overall reduction in rekey messages to ...


Digital Commons powered by bepress