Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Security (13)
- Wireless Networks (12)
- Directional Antennas (10)
- Performance of Wireless Networks (10)
- Cyber-Physical Systems (8)
-
- Network Control Systems (8)
- Mobility (7)
- Patents (7)
- Security of Wireless Networks (7)
- Context-Aware (6)
- New Wireless Network Architecture (5)
- Beamforming (4)
- Control Systems (4)
- Cyber Security (4)
- Disaster Management (4)
- Eavesdropping (4)
- Medium Access Control (4)
- Open Source Software (4)
- Road Network Databases (4)
- Wireless Control Systems (4)
- Wireless Network Control (4)
- Books (3)
- Cyber security (3)
- Digital preservation (3)
- Invited Talks (3)
- Jamming (3)
- Multiple channels (3)
- Node capture attacks (3)
- Performance (3)
- Social media (3)
- Publication Year
- Publication
-
- Patrick Tague (26)
- Hong-Ning Dai (21)
- Robert A Iannucci (13)
- Martin L Griss (10)
- Kyriakos MOURATIDIS (7)
-
- Ray Bareiss (7)
- George J. Pappas (6)
- Tony Wasserman (6)
- Matt Schultz (4)
- Maurice Dawson (4)
- Radhey Shyam Meena (4)
- Arcot Desai NARASIMHALU (3)
- Borislav D Dimitrov (2)
- C. Jason Woodard (2)
- Carol A. Watson (2)
- Dr Guilin Wang (2)
- Dr. Chen Ling (2)
- Houbing Song (2)
- Hwee-Joo Kam (2)
- Ilker Karaca (2)
- Ivan M. Jorrín Abellán (2)
- Ole J Mengshoel (2)
- Rahul Mangharam (2)
- Sanaz Asadinia (2)
- Ted Selker (2)
- Wenbing Zhao (2)
- Amean S Al_Safi (1)
- Carl Heine (1)
- Cheryl B. Truesdell (1)
- Christine L. Borgman (1)
- File Type
Articles 1 - 30 of 168
Full-Text Articles in Engineering
Guest Editorial Special Issue On Toward Securing Internet Of Connected Vehicles (Iov) From Virtual Vehicle Hijacking, Yue Cao, Houbing Song, Omprakash Kaiwartya, Sinem Coleri Ergen, Jaime Lloret, Naveed Ahmad
Guest Editorial Special Issue On Toward Securing Internet Of Connected Vehicles (Iov) From Virtual Vehicle Hijacking, Yue Cao, Houbing Song, Omprakash Kaiwartya, Sinem Coleri Ergen, Jaime Lloret, Naveed Ahmad
Houbing Song
Today’s vehicles are no longer stand-alone transportation means, due to the advancements on vehicle-tovehicle (V2V) and vehicle-to-infrastructure (V2I) communications enabled to access the Internet via recent technologies in mobile communications, including WiFi, Bluetooth, 4G, and even 5G networks. The Internet of vehicles was aimed toward sustainable developments in transportation by enhancing safety and efficiency. The sensor-enabled intelligent automation of vehicles’ mechanical operations enhances safety in on-road traveling, and cooperative traffic information sharing in vehicular networks improves traveling efficiency.
Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen
Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen
Houbing Song
With the rapid development of Internet of Things, massive mobile intelligent terminals are ready to access edge servers for real-time data calculation and interaction. However, the risk of private data leakage follows simultaneously. As the administrator of all intelligent terminals in a region, the edge server needs to clarify the ability of the managed intelligent terminals to defend against malicious attacks. Therefore, the security level classification for mobile intelligent terminals before accessing the network is indispensable. In this paper, we firstly propose a safety assessment method to detect the weakness of mobile intelligent terminals. Secondly, we match the evaluation results …
Transportation Safety Performance Of Us Bus Transit Agencies And Population Density: A Cross-Sectional Analysis (2008-2014), Ilker Karaca, Peter T. Savolainen
Transportation Safety Performance Of Us Bus Transit Agencies And Population Density: A Cross-Sectional Analysis (2008-2014), Ilker Karaca, Peter T. Savolainen
Ilker Karaca
The paper examines the transportation safety performance of transit agencies providing public bus service in the US by using data from the National Transit Database (NTD)
Uses NTD data for a seven-year period from 2008 to 2014 • 3,853 observations for 651 public transportation agencies in 50 states
Seven types of bus transit fatalities and injuries (including passengers, operators, pedestrians, bicyclists)
Main explanatory variable: urban density obtained from the US Census figures
Other explanatory variables: total agency revenue miles, unlinked passenger trips, agency fleet size, and urban population
Top-Down Construction Cost Estimating Model Using An Artificial Neural Network, Douglas D. Gransberg, H. David Jeong, Ilker Karaca, Brendon Gardner
Top-Down Construction Cost Estimating Model Using An Artificial Neural Network, Douglas D. Gransberg, H. David Jeong, Ilker Karaca, Brendon Gardner
Ilker Karaca
This report contains the information and background on top-down cost estimating using artificial neural networks (ANN)_to enhance the accuracy of MDT early estimates of construction costs. Upon conducting an extensive review of MDT’s budgeting and cost estimating efforts, and following a survey of agency experts on the identification of the most salient project attributes with the dual-objectives of low effort and high accuracy, a rational method for top-down variable selection is proposed. Selected variables were further tested in their explanatory power of construction costs through the application of two cost estimating methodologies—multiple regression and artificial neural network methodologies. Both methods …
Web Archiving At Gvsu, Annie Benefiel, Matt Schultz
Web Archiving At Gvsu, Annie Benefiel, Matt Schultz
Matt Schultz
Access Update For Gvsu, Matt Schultz, Kyle Felker
Access Update For Gvsu, Matt Schultz, Kyle Felker
Matt Schultz
Network Connection Blocker, Method, And Computer Readable Memory For Monitoring Connections In A Computer Network And Blocking The Unwanted Connections, Douglas W. Jacobson, James A. Davis
Network Connection Blocker, Method, And Computer Readable Memory For Monitoring Connections In A Computer Network And Blocking The Unwanted Connections, Douglas W. Jacobson, James A. Davis
Douglas Jacobson
A network connection blocker for monitoring connections between host computers in a network and blocking the unwanted connections. The host computers transmit connection packets between each other in accordance with a network protocol suite when seeking to establish, providing network services with, and close the connections. The network protocol suite includes a connection oriented transport layer protocol. The network connection blocker comprises a network interface that receives the connection packets transmitted between the host computers. It also comprises a blocking module that processes the received connection packets to detect the unwanted connections. The blocking module then generates connection packets in …
Research Poster.Pdf, Desiree Dominguez
Research Poster.Pdf, Desiree Dominguez
Desiree Dominguez
Lomcf: Forwarding And Caching In Named Data Networking-Based Manets, Rana Asif Rehman, Byung-Seo Kim
Lomcf: Forwarding And Caching In Named Data Networking-Based Manets, Rana Asif Rehman, Byung-Seo Kim
Rana Asif Rehman
Maa & Mmdp: Fall Workshop 2016 With Mid-Michigan Digital Practitioners, Matt Schultz, Annie Benefiel
Maa & Mmdp: Fall Workshop 2016 With Mid-Michigan Digital Practitioners, Matt Schultz, Annie Benefiel
Matt Schultz
Animal Rights Talk: Moral Debate Over The Internet, Harold A. Herzog Jr., Beth Dinoff, Jessica R. Page
Animal Rights Talk: Moral Debate Over The Internet, Harold A. Herzog Jr., Beth Dinoff, Jessica R. Page
Harold Herzog, PhD
Messages sent over Animal Rights-Talk, an electronic mail network devoted to the discussion of issues related to the animal rights movement, were analyzed. Messages typically fell into the following categories: questions and information, discussions of philosophical issues, ethical problems associated with the treatment of particular species, the politics of the animal rights movement, problems of moral consistency, the ethics of particular uses of non-human species (e.g., meat consumption, biomedical research with animal subjects), and matters pertaining to the internal life of the network (e.g., efforts at control of perceived norm violations). Debates between animal activists and animal researchers over the …
Joining The Table: Advancing Digital Discussions At Gvsu, Matt Schultz, Kyle Felker
Joining The Table: Advancing Digital Discussions At Gvsu, Matt Schultz, Kyle Felker
Matt Schultz
Development Of Compressive Sensing Techniques For Wideband Spectrum Scanning In Cognitive Radio Networks, Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi
Development Of Compressive Sensing Techniques For Wideband Spectrum Scanning In Cognitive Radio Networks, Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi
fatima salahdine
Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar
Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar
Maurice Dawson
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …
Data And Network Optimization Effect On Web Performance, Steven Rosenberg, Surbhi Dangi, Isuru Warnakulasooriya
Data And Network Optimization Effect On Web Performance, Steven Rosenberg, Surbhi Dangi, Isuru Warnakulasooriya
Surbhi Dangi
In this study, we measure the effects of two software approaches to improving data and network performance: 1. Content optimization and compression; and 2. Optimizing network protocols. We achieve content optimization and compression by means of BoostEdge by ActivNetworks and employ the SPDY network protocol by Google to lower the round trip time for HTTP transactions. Since the data and transport layers are separate, we conclude our investigation by studying the combined effect of these two techniques on web performance. Using document mean load time as the measure, we found that with and without packet loss, both BoostEdge and SPDY …
Parallel Computation In Communication And Signal Processing, Amean Al_Safi, Bradley Bazuin, Liqaa Alhafadhi
Parallel Computation In Communication And Signal Processing, Amean Al_Safi, Bradley Bazuin, Liqaa Alhafadhi
Amean S Al_Safi
The powerful computation of GPU has increased the computation speed up of many systems. This paper summarize some of the most important work in the field of communication and signal processing using GPU
Session D-4: Coolhub.Imsa: Collaborative Innovation In Action, Carl Heine, James Gerry
Session D-4: Coolhub.Imsa: Collaborative Innovation In Action, Carl Heine, James Gerry
Carl Heine
Transform STEM teaching and learning with CoolHub.IMSA, a free virtual platform where youth and adults collaborate on projects they create. Explore the site through the eyes of project members and discover powerful ways to collaborate, innovate and network for learning.
Diversified Users' Satisfaction With Advanced Mobile Phone Features, Chen Ling, Wonil Hwang, Gavriel Salvendy
Diversified Users' Satisfaction With Advanced Mobile Phone Features, Chen Ling, Wonil Hwang, Gavriel Salvendy
Dr. Chen Ling
Mobile phones are widely used all over the world, and with their increasing number of value-added features, they are becoming far more than a mere mobile voice communication device. Rather, they provide a powerful platform for accessing information universally. This paper reports a study which scrutinized users’ preference levels with five new mobile phone design features facilitating universal information access through mobile phones: camera, colour screen, voice-activated dialing, Internet browsing, and wireless connectivity (e.g. Bluetooth, infrared, etc.). The survey study involved college students and investigated the degree to which each of the above features impacts the users’ overall satisfaction and …
Effect Of Glance Duration On Perceived Complexity And Segmentation Of User Interfaces, Yifei Dong, Chen Ling, Lesheng Hua
Effect Of Glance Duration On Perceived Complexity And Segmentation Of User Interfaces, Yifei Dong, Chen Ling, Lesheng Hua
Dr. Chen Ling
Computer users who handle complex tasks like air traffic control (ATC) need to quickly detect updated information from multiple displays of graphical user interface. The objectives of this study are to investigate how much computer users can segment GUI display into distinctive objects within very short glances and whether human perceives complexity differently after different durations of exposure. Subjects in this empirical study were presented with 20 screenshots of web pages and software interfaces for different short durations (100ms, 500ms, 1000ms) and were asked to recall the visual objects and rate the complexity of the images. The results indicate that …
Crowdsourced Earthquake Early Warning, Sarah Minson, Benjamin Brooks, Craig Glennie, Jessica Murray, John Langbein, Susan Owen, Thomas Heaton, Robert Iannucci, Darren Hauser
Crowdsourced Earthquake Early Warning, Sarah Minson, Benjamin Brooks, Craig Glennie, Jessica Murray, John Langbein, Susan Owen, Thomas Heaton, Robert Iannucci, Darren Hauser
Robert A Iannucci
Earthquake early warning (EEW) can reduce harm to people and infrastructure from earthquakes and tsunamis, but it has not been implemented in most high earthquake-risk regions because of prohibitive cost. Common consumer devices such as smartphones contain low-cost versions of the sensors used in EEW. Although less accurate than scientific-grade instruments, these sensors are globally ubiquitous. Through controlled tests of consumer devices, simulation of an Mw (moment magnitude) 7 earthquake on California’s Hayward fault, and real data from the Mw 9 Tohoku-oki earthquake, we demonstrate that EEW could be achieved via crowdsourcing.
Analyzing WiFi P2p In The Context Of A Hangman Game, William L. Honig
Analyzing WiFi P2p In The Context Of A Hangman Game, William L. Honig
William L Honig
WiFi P2P , which complies with the WiFi Alliance's WiFi Direct™ certification
2 3
program, is a relatively new addition to wireless communications systems. It is now
supported in Android operating system (since version 4.0). In theory, WiFi Direct offers
advantages for ad hoc communications between mobile apps. A key goal of this project
was to evaluate the ability of WiFi P2P for interconnecting mobile apps by using a
common game suitable to mobile screens and devices.
The application allows the user to interconnect two devices using WiFi P2P and
play the classic hangman game. The players search for devices …
Supporting Teacher Orchestration In Ubiquitous Learning Environments: A Study In Primary Education, Juan Muñoz Cristóbal, Ivan Jorrín Abellán, Juan Asensio Perez, Alejandra Martínez Monés, Luis Prieto, Yannis Dimitriadis
Supporting Teacher Orchestration In Ubiquitous Learning Environments: A Study In Primary Education, Juan Muñoz Cristóbal, Ivan Jorrín Abellán, Juan Asensio Perez, Alejandra Martínez Monés, Luis Prieto, Yannis Dimitriadis
Ivan M. Jorrín Abellán
During the last decades, educational contexts have transformed into complex technological and social ecologies, with mobile devices expanding the scope of education beyond the traditional classroom, creating so-called Ubiquitous Learning Environments (ULEs). However, these new technological opportunities entail an additional burden for teachers, who need to manage and coordinate the resources involved in such complex educational scenarios in a process known as “orchestration”. This paper presents the evaluation of the orchestration support provided by GLUEPS-AR, a system aimed to help teachers in the coordination of across-spaces learning situations carried out in ULEs. The evaluation, following an interpretive research perspective, relied …
Coming Down To Earth: Helping Teachers Use 3d Virtual Worlds In Across-Spaces Learning Situations, Juan Muñoz Cristóbal, Luis Prieto, Juan Asensio Pérez, Alejandra Martínez Monés, Ivan Jorrín Abellán, Yannis Dimitriadis
Coming Down To Earth: Helping Teachers Use 3d Virtual Worlds In Across-Spaces Learning Situations, Juan Muñoz Cristóbal, Luis Prieto, Juan Asensio Pérez, Alejandra Martínez Monés, Ivan Jorrín Abellán, Yannis Dimitriadis
Ivan M. Jorrín Abellán
Different approaches have explored how to provide seamless learning across multiple ICT-enabled physical and virtual spaces, including three-dimensional virtual worlds (3DVW). However, these approaches present limitations that may reduce their acceptance in authentic educational practice: The difficulties of authoring and sharing teacher-created designs across different 3DVW platforms, or the lack of integration of 3DVWs with existing technologies in the classroom ecosystem (e.g., widespread web-based learning platforms such as Moodle, or mobile augmented reality applications). Focusing on a specific kind of 3DVW (virtual globes, such as Google Earth, used like 3DVWs), we propose a system that enables teachers to deploy across-spaces …
Wikis For Group Work: Encouraging Transparency, Benchmarking And Feedback, Amir Abdekhodaee, Dini Kourosh, Farnaz Modarres, Anne-Marie Chase, Bella Ross
Wikis For Group Work: Encouraging Transparency, Benchmarking And Feedback, Amir Abdekhodaee, Dini Kourosh, Farnaz Modarres, Anne-Marie Chase, Bella Ross
Dr Anne-Marie Chase
Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson
Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson
Maurice Dawson
Cyber security has become a matter of national, international, economic, and societal importance that affects multiple nations (Walker, 2012). Since the 1990s users have exploited vulnerabilities to gain access to networks for malicious purposes. In recent years the number of attacks on U.S. networks has continued to grow at an exponential rate. This includes malicious embedded code, exploitation of backdoors, and more. These attacks can be initiated from anywhere in the world from behind a computer with a masked Internet Protocol (IP) address. This type of warfare, cyber warfare, changes the landscape of war itself (Beidleman, 2009). This type of …
On Modeling Eavesdropping Attacks In Wireless Networks, Xuran Li, Jianlong Xu, Hong-Ning Dai, Qinglin Zhao, Chak Fong Cheang, Qiu Wang
On Modeling Eavesdropping Attacks In Wireless Networks, Xuran Li, Jianlong Xu, Hong-Ning Dai, Qinglin Zhao, Chak Fong Cheang, Qiu Wang
Hong-Ning Dai
This paper concerns the eavesdropping attacks from the eavesdroppers’ perspective, which is new since most of current studies consider the problem from the good nodes’ perspective. In this paper, we originally propose an analytical framework to quantify the effective area and the probability of the eavesdropping attacks. This framework enables us to theoretically evaluate the impact of node density, antenna model, and wireless channel model on the eavesdropping attacks. We verify via extensive simulations that the proposed analytical framework is very accurate. Our results show that the probability of eavesdropping attacks significantly vary, depending on the wireless environments (such as …
Sptf: Smart Photo-Tagging Framework On Smart Phones, Hao Xu, Hong-Ning Dai, Walter Hon-Wai Lau
Sptf: Smart Photo-Tagging Framework On Smart Phones, Hao Xu, Hong-Ning Dai, Walter Hon-Wai Lau
Hong-Ning Dai
Smart phones, as one of the most important platforms for personal communications and mobile computing, have evolved with various embedded devices, such as cameras, Wi-Fi transceivers, Bluetooth transceivers and sensors. Specifically, the photos taken by a smart phone has the approximate or even equivalent image quality to that of a professional camera. As a result, smart phones have become the first choice for people to take photos to record their ordinary life. However, how to manage thousands of photos on a smart phone becomes a challenge. In this paper, we propose a new architecture in terms of Smart Photo-Tagging Framework …
Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang
Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang
Wenbing Zhao
A proactive recovery scheme based on service migration for long-running Byzantine fault-tolerant systems is described. Proactive recovery is an essential method for ensuring the long-term reliability of fault-tolerant systems that are under continuous threats from malicious adversaries. The primary benefit of our proactive recovery scheme is a reduced vulnerability window under normal operation. This is achieved in two ways. First, the time-consuming reboot step is removed from the critical path of proactive recovery. Second, the response time and the service migration latency are continuously profiled and an optimal service migration interval is dynamically determined during runtime based on the observed …
End-To-End Latency Of A Fault-Tolerant Corba Infrastructure, Wenbing Zhao, Louise E. Moser, P. Michale Melliar-Smith
End-To-End Latency Of A Fault-Tolerant Corba Infrastructure, Wenbing Zhao, Louise E. Moser, P. Michale Melliar-Smith
Wenbing Zhao
This paper presents an evaluation of the end-to-end latency of a fault-tolerant CORBA infrastructure that we have implemented. The fault-tolerant infrastructure replicates the server applications using active, passive and semi-active replication, and maintains strong replica consistency of the server replicas. By analyses and by measurements of the running fault-tolerant infrastructure, we characterize the end-to-end latency under fault-free conditions. The main determining factor of the run-time performance of the fault-tolerant infrastructure is the Totem group communication protocol, which contributes to the end-to-end latency primarily in two ways: the delay in sending messages and the processing cost of the rotating token. To …
Understanding The Influence Of Blog On The Development Of Social Capital, Reza Vaezi, Gholamreza Torkzadeh, Jerry Cha-Jan Chang
Understanding The Influence Of Blog On The Development Of Social Capital, Reza Vaezi, Gholamreza Torkzadeh, Jerry Cha-Jan Chang
Reza Vaezi
The rapid use and application of blogs in diverse areas such as education, marketing, journalism, and human resource management in recent years underlines the need for a better understanding of the impact of this new technology on social capital. Social capital reflects the norm of reciprocity and the level of trust among individuals who connect, interact, and benefit from one another. Blog is expected to influence the extent and the scope of this interaction by providing new means of networking among people. This paper examines the relationship between blog use and social capital and reports on the results of an …