Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 32

Full-Text Articles in Engineering

Data Management System For A Semiautonomous Shuttle Car For Underground Room And Pillar Coal Mines, Vasilis Androulakis, Steven Schafrik, Joseph Sottile, Zacharias Agioutantis Aug 2021

Data Management System For A Semiautonomous Shuttle Car For Underground Room And Pillar Coal Mines, Vasilis Androulakis, Steven Schafrik, Joseph Sottile, Zacharias Agioutantis

Mining Engineering Faculty Publications

In recent years, autonomous solutions in the multidisciplinary field of mining engineering have been an extremely popular applied research topic. This is a result of the increasing demands of society on mineral resources along with the accelerating exploitation of the currently economically viable resources, which lead the mining sector to turn to deeper, more-difficult-to-mine orebodies. An appropriate data management system comprises a crucial aspect of the designing and the engineering of a system that involves autonomous or semiautonomous vehicles. The vast volume of data collected from onboard sensors, as well as from a potential IoT network dispersed around a smart …


On The Impact Of Gravity Compensation On Reinforcement Learning In Goal-Reaching Tasks For Robotic Manipulators, Jonathan Fugal, Hasan A. Poonawala, Jihye Bae Mar 2021

On The Impact Of Gravity Compensation On Reinforcement Learning In Goal-Reaching Tasks For Robotic Manipulators, Jonathan Fugal, Hasan A. Poonawala, Jihye Bae

Electrical and Computer Engineering Faculty Publications

Advances in machine learning technologies in recent years have facilitated developments in autonomous robotic systems. Designing these autonomous systems typically requires manually specified models of the robotic system and world when using classical control-based strategies, or time consuming and computationally expensive data-driven training when using learning-based strategies. Combination of classical control and learning-based strategies may mitigate both requirements. However, the performance of the combined control system is not obvious given that there are two separate controllers. This paper focuses on one such combination, which uses gravity-compensation together with reinforcement learning (RL). We present a study of the effects of gravity …


A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jaouad A. Mouloud Oct 2020

A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jaouad A. Mouloud

Information Science Faculty Publications

The privacy of users and information are becoming increasingly important with the growth and pervasive use of mobile devices such as wearables, mobile phones, drones, and Internet of Things (IoT) devices. Today many of these mobile devices are equipped with cameras which enable users to take pictures and record videos anytime they need to do so. In many such cases, bystanders’ privacy is not a concern, and as a result, audio and video of bystanders are often captured without their consent. We present results from a user study in which 21 participants were asked to use a wearable system called …


Influence Spread In Two-Layer Interdependent Networks: Designed Single-Layer Or Random Two-Layer Initial Spreaders?, Hana Khamfroush, Nathaniel Hudson, Samuel Iloo, Mahshid R. Naeini Jun 2019

Influence Spread In Two-Layer Interdependent Networks: Designed Single-Layer Or Random Two-Layer Initial Spreaders?, Hana Khamfroush, Nathaniel Hudson, Samuel Iloo, Mahshid R. Naeini

Computer Science Faculty Publications

Influence spread in multi-layer interdependent networks (M-IDN) has been studied in the last few years; however, prior works mostly focused on the spread that is initiated in a single layer of an M-IDN. In real world scenarios, influence spread can happen concurrently among many or all components making up the topology of an M-IDN. This paper investigates the effectiveness of different influence spread strategies in M-IDNs by providing a comprehensive analysis of the time evolution of influence propagation given different initial spreader strategies. For this study we consider a two-layer interdependent network and a general probabilistic threshold influence spread model …


Anonymous And Efficient Message Authentication Scheme For Smart Grid, Libing Wu, Jing Wang, Sherali Zeadally, Debiao He May 2019

Anonymous And Efficient Message Authentication Scheme For Smart Grid, Libing Wu, Jing Wang, Sherali Zeadally, Debiao He

Information Science Faculty Publications

Smart grid has emerged as the next-generation electricity grid with power flow optimization and high power quality. Smart grid technologies have attracted the attention of industry and academia in the last few years. However, the tradeoff between security and efficiency remains a challenge in the practical deployment of the smart grid. Most recently, Li et al. proposed a lightweight message authentication scheme with user anonymity and claimed that their scheme is provably secure. But we found that their scheme fails to achieve mutual authentication and mitigate some typical attacks (e.g., impersonation attack, denial of service attack) in the smart grid …


A Generative Human-Robot Motion Retargeting Approach Using A Single Rgbd Sensor, Sen Wang, Xinxin Zuo, Runxiao Wang, Ruigang Yang Apr 2019

A Generative Human-Robot Motion Retargeting Approach Using A Single Rgbd Sensor, Sen Wang, Xinxin Zuo, Runxiao Wang, Ruigang Yang

Computer Science Faculty Publications

The goal of human-robot motion retargeting is to let a robot follow the movements performed by a human subject. Typically in previous approaches, the human poses are precomputed from a human pose tracking system, after which the explicit joint mapping strategies are specified to apply the estimated poses to a target robot. However, there is not any generic mapping strategy that we can use to map the human joint to robots with different kinds of configurations. In this paper, we present a novel motion retargeting approach that combines the human pose estimation and the motion retargeting procedure in a unified …


Is Dns Ready For Ubiquitous Internet Of Things?, Zhiwei Yan, Hongtao Li, Sherali Zeadally, Yu Zheng, Guanggang Geng Feb 2019

Is Dns Ready For Ubiquitous Internet Of Things?, Zhiwei Yan, Hongtao Li, Sherali Zeadally, Yu Zheng, Guanggang Geng

Information Science Faculty Publications

The vision of the Internet of Things (IoT) covers not only the well-regulated processes of specific applications in different areas but also includes ubiquitous connectivity of more generic objects (or things and devices) in the physical world and the related information in the virtual world. For example, a typical IoT application, such as a smart city, includes smarter urban transport networks, upgraded water supply, and waste-disposal facilities, along with more efficient ways to light and heat buildings. For smart city applications and others, we require unique naming of every object and a secure, scalable, and efficient name resolution which can …


A Hierarchical Spectrum Access Scheme For Tv White Space Coexistence In Hetergeneous Networks, Mohammad Zaeri-Amirani, Fatemeh Afghah, Sherali Zeadally Dec 2018

A Hierarchical Spectrum Access Scheme For Tv White Space Coexistence In Hetergeneous Networks, Mohammad Zaeri-Amirani, Fatemeh Afghah, Sherali Zeadally

Information Science Faculty Publications

Among current techniques for dynamic access to television (TV) white space (TVWS), geolocation database-based access provides a promising performance in protecting the TV-band incumbents from interference that cannot be efficiently achieved in other license-exempt models. However, in heterogeneous wireless networks, most portable devices do not have such access and may cause interference to TV incumbents. We propose a hierarchical model for spectrum sharing in TVWS that includes a wide range of fixed and portable devices. In the first tier, the TV broadcaster can lease the spectrum bands to local fixed users based on a soft license agreement. The fixed users …


Facepet: Enhancing Bystanders' Facial Privacy With Smart Wearables/Internet Of Things, Alfredo J. Perez, Sherali Zeadally, Luis Y. Matos Garcia, Jaouad A. Mouloud, Scott Griffith Dec 2018

Facepet: Enhancing Bystanders' Facial Privacy With Smart Wearables/Internet Of Things, Alfredo J. Perez, Sherali Zeadally, Luis Y. Matos Garcia, Jaouad A. Mouloud, Scott Griffith

Information Science Faculty Publications

Given the availability of cameras in mobile phones, drones and Internet-connected devices, facial privacy has become an area of major interest in the last few years, especially when photos are captured and can be used to identify bystanders’ faces who may have not given consent for these photos to be taken and be identified. Some solutions to protect facial privacy in photos currently exist. However, many of these solutions do not give a choice to bystanders because they rely on algorithms that de-identify photos or protocols to deactivate devices and systems not controlled by bystanders, thereby being dependent on the …


Advanced Recurrent Network-Based Hybrid Acoustic Models For Low Resource Speech Recognition, Jian Kang, Wei-Qiang Zhang, Wei-Wei Liu, Jia Liu, Michael T. Johnson Jul 2018

Advanced Recurrent Network-Based Hybrid Acoustic Models For Low Resource Speech Recognition, Jian Kang, Wei-Qiang Zhang, Wei-Wei Liu, Jia Liu, Michael T. Johnson

Electrical and Computer Engineering Faculty Publications

Recurrent neural networks (RNNs) have shown an ability to model temporal dependencies. However, the problem of exploding or vanishing gradients has limited their application. In recent years, long short-term memory RNNs (LSTM RNNs) have been proposed to solve this problem and have achieved excellent results. Bidirectional LSTM (BLSTM), which uses both preceding and following context, has shown particularly good performance. However, the computational requirements of BLSTM approaches are quite heavy, even when implemented efficiently with GPU-based high performance computers. In addition, because the output of LSTM units is bounded, there is often still a vanishing gradient issue over multiple layers. …


Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally Jul 2018

Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally

Information Science Faculty Publications

One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments of small scale smart sensors in WBSNs, security, and privacy guarantees (e.g., security and safety-critical data, sensitive private information) are becoming a challenging issue because these sensor nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious tampering) using the secure hash algorithm 3 (SHA-3) when smart sensors in WBSNs communicate with each other using the Internet. Due to the limited resources (i.e., storage, …


Spatial Distribution Of Partner-Seeking Men Who Have Sex With Men Using Geosocial Networking Apps: Epidemiologic Study, Angel B. Algarin, Patrick J. Ward, W. Jay Christian, Abby E. Rudolph, Ian W. Holloway, April M. Young May 2018

Spatial Distribution Of Partner-Seeking Men Who Have Sex With Men Using Geosocial Networking Apps: Epidemiologic Study, Angel B. Algarin, Patrick J. Ward, W. Jay Christian, Abby E. Rudolph, Ian W. Holloway, April M. Young

Epidemiology and Environmental Health Faculty Publications

Background: Geosocial networking apps have made sexual partner-seeking easier for men who have sex with men, raising both challenges and opportunities for human immunodeficiency virus and sexually transmitted infection prevention and research. Most studies on men who have sex with men geosocial networking app use have been conducted in large urban areas, despite research indicating similar patterns of online- and app-based sex-seeking among men who have sex with men in rural and midsize cities.

Objective: The goal of our research was to examine the spatial distribution of geosocial networking app usage and characterize areas with increasing numbers of partner-seeking men …


Fault Identification And Location For Distribution Network With Distributed Generations, Wen Fan, Yuan Liao May 2018

Fault Identification And Location For Distribution Network With Distributed Generations, Wen Fan, Yuan Liao

Electrical and Computer Engineering Faculty Publications

Power distribution networks with distributed generations may experience faults. It is essential to promptly locate the fault for fast repair and restoration. This paper presents a novel method for identifying the faulted section and accurate location of faults that occur on power distribution grid. Appropriate matrices are set up to represent meter locations on the grid and the topology of the grid. The voltage and current measurements obtained are utilized to decide the fault sections. Then fault location is determined by solving equations that link measurements and fault locations through bus impedance matrix. The method is applicable to both single …


Optimizing The Use Of A Liquid Handling Robot To Conduct A High Throughput Forward Chemical Genetics Screen Of Arabidopsis Thaliana, B. Kirtley Amos, Victoria G. Pook, Seth Debolt Apr 2018

Optimizing The Use Of A Liquid Handling Robot To Conduct A High Throughput Forward Chemical Genetics Screen Of Arabidopsis Thaliana, B. Kirtley Amos, Victoria G. Pook, Seth Debolt

Horticulture Faculty Publications

Chemical genetics is increasingly being employed to decode traits in plants that may be recalcitrant to traditional genetics due to gene redundancy or lethality. However, the probability of a synthetic small molecule being bioactive is low; therefore, thousands of molecules must be tested in order to find those of interest. Liquid handling robotics systems are designed to handle large numbers of samples, increasing the speed with which a chemical library can be screened in addition to minimizing/standardizing error. To achieve a high-throughput forward chemical genetics screen of a library of 50,000 small molecules on Arabidopsis thaliana (Arabidopsis), protocols using a …


A Fast And Robust Extrinsic Calibration For Rgb-D Camera Networks, Po-Chang Su, Ju Shen, Wanxin Xu, Sen-Ching S. Cheung, Ying Luo Jan 2018

A Fast And Robust Extrinsic Calibration For Rgb-D Camera Networks, Po-Chang Su, Ju Shen, Wanxin Xu, Sen-Ching S. Cheung, Ying Luo

Electrical and Computer Engineering Faculty Publications

From object tracking to 3D reconstruction, RGB-Depth (RGB-D) camera networks play an increasingly important role in many vision and graphics applications. Practical applications often use sparsely-placed cameras to maximize visibility, while using as few cameras as possible to minimize cost. In general, it is challenging to calibrate sparse camera networks due to the lack of shared scene features across different camera views. In this paper, we propose a novel algorithm that can accurately and rapidly calibrate the geometric relationships across an arbitrary number of RGB-D cameras on a network. Our work has a number of novel features. First, to cope …


Multiple Attributes Decision Fusion For Wireless Sensor Networks Based On Intuitionistic Fuzzy Set, Zhenjiang Zhang, Ziqi Hao, Sherali Zeadally, Jing Zhang, Bowen Han, Han-Chieh Chao Jul 2017

Multiple Attributes Decision Fusion For Wireless Sensor Networks Based On Intuitionistic Fuzzy Set, Zhenjiang Zhang, Ziqi Hao, Sherali Zeadally, Jing Zhang, Bowen Han, Han-Chieh Chao

Information Science Faculty Publications

Decision fusion is an important issue in wireless sensor networks (WSN), and intuitionistic fuzzy set (IFS) is a novel method for dealing with uncertain data. We propose a multi-attribute decision fusion model based on IFS, which includes two aspects: data distribution-based IFS construction algorithm (DDBIFCA) and the category similarity weight-based TOPSIS intuitionistic fuzzy decision algorithm (CSWBT-IFS). The DDBIFCA is an IFS construction algorithm that transforms the original attribute values into intuitionistic fuzzy measures, and the CSWBT-IFS is an intuitionistic fuzzy aggregation algorithm improved by the traditional TOPSIS algorithm, which combines intuitionistic fuzzy values of different attributes and obtains a final …


Lightweight Data Aggregation Scheme Against Internal Attackers In Smart Grid Using Elliptic Curve Cryptography, Debiao He, Sherali Zeadally, Huaqun Wang, Qin Liu May 2017

Lightweight Data Aggregation Scheme Against Internal Attackers In Smart Grid Using Elliptic Curve Cryptography, Debiao He, Sherali Zeadally, Huaqun Wang, Qin Liu

Information Science Faculty Publications

Recent advances of Internet and microelectronics technologies have led to the concept of smart grid which has been a widespread concern for industry, governments, and academia. The openness of communications in the smart grid environment makes the system vulnerable to different types of attacks. The implementation of secure communication and the protection of consumers’ privacy have become challenging issues. The data aggregation scheme is an important technique for preserving consumers’ privacy because it can stop the leakage of a specific consumer’s data. To satisfy the security requirements of practical applications, a lot of data aggregation schemes were presented over the …


Expression And Reception: An Analytic Method For Assessing Message Production And Consumption In Cmc, Kang Namkoong, Dhavan V. Shah, Bryan Mclaughlin, Ming-Yuan Chih, Tae Joon Moon, Shawnika Hull, David H. Gustafson Apr 2017

Expression And Reception: An Analytic Method For Assessing Message Production And Consumption In Cmc, Kang Namkoong, Dhavan V. Shah, Bryan Mclaughlin, Ming-Yuan Chih, Tae Joon Moon, Shawnika Hull, David H. Gustafson

Community & Leadership Development Faculty Publications

This article presents an innovative methodology to study computer-mediated communication (CMC), which allows analysis of the multi-layered effects of online expression and reception. The methodology is demonstrated by combining the following three data sets collected from a widely tested eHealth system, the Comprehensive Health Enhancement Support System (CHESS): (1) a flexible and precise computer-aided content analysis; (2) a record of individual message posting and reading; and (3) longitudinal survey data. Further, this article discusses how the resulting data can be applied to online social network analysis and demonstrates how to construct two distinct types of online social networks—open and targeted …


A Fast And Efficient Python Library For Interfacing With The Biological Magnetic Resonance Data Bank, Andrey Smelter, Morgan Astra, Hunter N. B. Moseley Mar 2017

A Fast And Efficient Python Library For Interfacing With The Biological Magnetic Resonance Data Bank, Andrey Smelter, Morgan Astra, Hunter N. B. Moseley

Center for Environmental and Systems Biochemistry Faculty Publications

Background: The Biological Magnetic Resonance Data Bank (BMRB) is a public repository of Nuclear Magnetic Resonance (NMR) spectroscopic data of biological macromolecules. It is an important resource for many researchers using NMR to study structural, biophysical, and biochemical properties of biological macromolecules. It is primarily maintained and accessed in a flat file ASCII format known as NMR-STAR. While the format is human readable, the size of most BMRB entries makes computer readability and explicit representation a practical requirement for almost any rigorous systematic analysis.

Results:To aid in the use of this public resource, we have developed a package called …


Lightweight Three-Factor Authentication And Key Agreement Protocol For Internet-Integrated Wireless Sensor Networks, Qi Jiang, Sherali Zeadally, Jianfeng Ma, Debiao He Mar 2017

Lightweight Three-Factor Authentication And Key Agreement Protocol For Internet-Integrated Wireless Sensor Networks, Qi Jiang, Sherali Zeadally, Jianfeng Ma, Debiao He

Information Science Faculty Publications

Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the components of the Internet of Things, and will become globally addressable by any entity connected to the Internet. Despite the great potential of this integration, it also brings new threats, such as the exposure of sensor nodes to attacks originating from the Internet. In this context, lightweight authentication and key agreement protocols must be in place to enable end-to-end secure communication. Recently, Amin et al. proposed a three-factor mutual authentication protocol for WSNs. However, we identified several flaws in their protocol. We found that their …


Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li Mar 2017

Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li

Information Science Faculty Publications

Over the last few years, identity-based cryptosystem (IBC) has attracted widespread attention because it avoids the high overheads associated with public key certificate management. However, an unsolved but critical issue about IBC is how to revoke a misbehaving user. There are some revocable identity-based encryption schemes that have been proposed recently, but little work on the revocation problem of identity-based signature has been undertaken so far. One approach for revocation in identity-based settings is to update users' private keys periodically, which is usually done by the key generation center (KGC). But with this approach, the load on the KGC will …


Isbord: Internet Searching Based On Resource Description, Zhiwei Yan, Sherali Zeadally, Guanggang Geng Mar 2017

Isbord: Internet Searching Based On Resource Description, Zhiwei Yan, Sherali Zeadally, Guanggang Geng

Information Science Faculty Publications

Based on the Information-Centric Networking (ICN) concept and the mature model of the current TCP/IP-based Internet, we propose content searching based on universal and scalable resource description, namely ISBORD (Internet Searching based on Resource Description). This novel concept aims to improve the efficiency of content searching and simplifies the end-user functionality to support the evolution of the content-centric Internet.


Distributed All-Ip Mobility Management Architecture Supported By The Ndn Overlay, Zhiwei Yan, Guanggang Geng, Sherali Zeadally, Yong-Jin Park Dec 2016

Distributed All-Ip Mobility Management Architecture Supported By The Ndn Overlay, Zhiwei Yan, Guanggang Geng, Sherali Zeadally, Yong-Jin Park

Information Science Faculty Publications

Two of the most promising candidate solutions for realizing the next-generation all-IP mobile networks are Mobile IPv6 (MIPv6), which is the host-based and global mobility supporting protocol, and Proxy MIPv6 (PMIPv6), which is the network-based and localized mobility supporting protocol. However, the unprecedented growth of mobile Internet traffic has resulted in the development of distributed mobility management (DMM) architecture by the Internet engineering task force DMM working group. The extension of the basic MIPv6 and PMIPv6 to support their distributed and scalable deployment in the future is one of the major goals of the DMM working group. We propose an …


Electronic Signatures: Review And Analysis, Bryan Gibson Sep 2015

Electronic Signatures: Review And Analysis, Bryan Gibson

Kentucky Transportation Center Technical Assistance Report

Electronic signatures, or e-signatures, are an increasingly ubiquitous component of a rapidly digitizing world. Compared to traditional paper signature, e-signatures have emerged as a viable, potentially more efficient method of entering into a contract. An e-signature can be thought of as an electronic symbol or marking associated with the signer. It acts as a signature and functions in lieu of a manual paper signature. This technical assistance report briefly reviews relevant Kentucky statutes and guidelines regarding e-signatures and public recordkeeping as well as applicable federal law. Following this, the report presents conclusions and points for continued discussion. Relevant statues and …


Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally Apr 2015

Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally

Information Science Faculty Publications

Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines. As such, employing cloud-based laboratories can have clear advantages over using classical ones, which impose major hindrances against fulfilling pedagogical objectives and do not scale well when the number of students and distant university campuses grows up. We show how the cloud paradigm can be leveraged to teach a cybersecurity course. Specifically, we share our …


Magnetic Response Of Aperiodic Wire Networks Based On Fibonacci Distortions Of Square Antidot Lattices, Barry Farmer, Vinayak Bhat, J. Sklenar, Eric Teipel, Justin Woods, J. B. Ketterson, J. Todd Hastings, Lance Delong Mar 2015

Magnetic Response Of Aperiodic Wire Networks Based On Fibonacci Distortions Of Square Antidot Lattices, Barry Farmer, Vinayak Bhat, J. Sklenar, Eric Teipel, Justin Woods, J. B. Ketterson, J. Todd Hastings, Lance Delong

Physics and Astronomy Faculty Publications

The static and dynamic magnetic responses of patterned ferromagnetic thin films are uniquely altered in the case of aperiodic patterns that retain long-range order (e.g., quasicrystals). We have fabricated permalloy wire networks based on periodic square antidot lattices (ADLs) distorted according to an aperiodic Fibonacci sequence applied to two lattice translations, d1  = 1618 nm and d2  = 1000 nm. The wire segment thickness is fixed at t = 25 nm, and the width W varies from 80 to 510 nm. We measured the DC magnetization between room temperature and 5 K. Room-temperature, narrow-band (9.7 GHz) ferromagnetic resonance …


Automating Deployment Of Several Gbrowse Instances, Neil Moore, Jerzy W. Jaromczyk, Christopher L. Schardl, Joedocei Hill, Devin Wright Sep 2014

Automating Deployment Of Several Gbrowse Instances, Neil Moore, Jerzy W. Jaromczyk, Christopher L. Schardl, Joedocei Hill, Devin Wright

Computer Science Presentations

Background

As part of the fungal endophyte genomes project, we maintain genome browsers for several dozen strains of fungi from the Clavicipitaceae and related families. These genome browsers are based on the GBrowse software, with a large collection of in-house software for visualization, analysis, and searching of genome features.

Although GBrowse supports serving multiple data sources, such as distinct genome assemblies, from a single GBrowse instance, there are advantages to maintaining separate instances for each genome. Besides permitting per-genome customizations of the software, page layout, and database schemas, our use of separate instances also allows us to maintain different security …


Broadcasting With Prediction And Selective Forwarding In Vehicular Networks, Jainjun Yang, Zongming Fei Dec 2013

Broadcasting With Prediction And Selective Forwarding In Vehicular Networks, Jainjun Yang, Zongming Fei

Computer Science Faculty Publications

Broadcasting in vehicular networks has attracted great interest in research community and industry. Broadcasting on disseminating information to individual vehicle beyond the transmission range is based on inter-vehicle communication systems. It is crucial to broadcast messages to other vehicles as fast as possible because the messages in vehicle communication systems are often emergency messages such as accident warning or alarm. In many current approaches, the message initiator or sender selects the node among its neighbors that is farthest away from it in the broadcasting direction and then assigns the node to rebroadcast the message once the node gets out of …


Approximate Techniques In Solving Optimal Camera Placement Problems, Jian Zhao, Ruriko Yoshida, Sen-Ching Samson Cheung, David Haws Nov 2013

Approximate Techniques In Solving Optimal Camera Placement Problems, Jian Zhao, Ruriko Yoshida, Sen-Ching Samson Cheung, David Haws

Statistics Faculty Publications

While the theoretical foundation of the optimal camera placement problem has been studied for decades, its practical implementation has recently attracted significant research interest due to the increasing popularity of visual sensor networks. The most flexible formulation of finding the optimal camera placement is based on a binary integer programming (BIP) problem. Despite the flexibility, most of the resulting BIP problems are NP-hard and any such formulations of reasonable size are not amenable to exact solutions. There exists a myriad of approximate algorithms for BIP problems, but their applications, efficiency, and scalability in solving camera placement are poorly understood. Thus, …


Energy-Efficient Soft Real-Time Scheduling For Parameter Estimation In Wsns, Senlin Zhang, Zixiang Wang, Meikang Qiu, Meiqin Liu Apr 2013

Energy-Efficient Soft Real-Time Scheduling For Parameter Estimation In Wsns, Senlin Zhang, Zixiang Wang, Meikang Qiu, Meiqin Liu

Electrical and Computer Engineering Faculty Publications

In wireless sensor networks (WSNs), homogeneous or heterogenous sensor nodes are deployed at a certain area to monitor our curious target. The sensor nodes report their observations to the base station (BS), and the BS should implement the parameter estimation with sensors’ data. Best linear unbiased estimation (BLUE) is a common estimator in the parameter estimation. Due to the end-to-end packet delay, it takes some time for the BS to receive sufficient data for the estimation. In some soft real-time applications, we expect that the estimation can be completed before the deadline with a probability. The existing approaches usually guarantee …