Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Audio (3)
- Bluetooth (3)
- #antcenter (2)
- A2DP (2)
- Android (2)
-
- BlueBeats (2)
- SPP (2)
- Wifi (2)
- Wireless Communication (2)
- Academic – UNF – Computing; Cloud Computing; High Performance Computing; HPC; HPC Benchmarks; Windows Azure; Amazon EC2 (1)
- Academic – UNF – Master of Science in Computer and Information Sciences; Dissertations (1)
- Anywhere (1)
- Applied sciences (1)
- Archive-It (1)
- Arduino (1)
- Authentication (1)
- Automation (1)
- Autonomous System (1)
- Border Gateway Protocol (1)
- Broadcasting (1)
- Cell phones (1)
- Cognitive radios (1)
- Communication and technology (1)
- Compact Routing (1)
- Control (1)
- Cyber-security (1)
- Data (1)
- Data clustering (1)
- Dsp (1)
- EDCA (1)
- Publication
-
- Computer Engineering (7)
- Computer Science Theses & Dissertations (2)
- Theses Digitization Project (2)
- Theses and Dissertations (2)
- Computer Science and Software Engineering (1)
-
- Electrical & Computer Engineering Theses & Dissertations (1)
- Electrical Engineering (1)
- Electronic Thesis and Dissertation Repository (1)
- Engineering Management & Systems Engineering Projects for D. Eng. Degree (1)
- Graduate Theses and Dissertations (1)
- Master's Theses (1)
- Masters Theses (1)
- Theses (1)
- Theses and Dissertations--Computer Science (1)
- Theses: Doctorates and Masters (1)
- UNF Graduate Theses and Dissertations (1)
Articles 1 - 25 of 25
Full-Text Articles in Engineering
Passive Synthetic Aperture Radar Imaging Using Commercial Ofdm Communication Networks, Jose R. Gutierrez Del Arroyo
Passive Synthetic Aperture Radar Imaging Using Commercial Ofdm Communication Networks, Jose R. Gutierrez Del Arroyo
Theses and Dissertations
Modern communication systems provide myriad opportunities for passive radar applications. OFDM is a popular waveform used widely in wireless communication networks today. Understanding the structure of these networks becomes critical in future passive radar systems design and concept development. This research develops collection and signal processing models to produce passive SAR ground images using OFDM communication networks. The OFDM-based WiMAX network is selected as a relevant example and is evaluated as a viable source for radar ground imaging. The monostatic and bistatic phase history models for OFDM are derived and validated with experimental single dimensional data. An airborne passive collection …
Security Aspects Of Smart Grid Communication, Pubudu E. Weerathunga
Security Aspects Of Smart Grid Communication, Pubudu E. Weerathunga
Electronic Thesis and Dissertation Repository
As the grid becomes highly interconnected, power protection, control, and monitoring in transmission and distribution substations are increasingly relying on digital controls and digital communication. Rapid penetrations of communication into power grid, and growing concerns about cyber security have attracted significant attention towards smart grid cyber security. Cyber security in the smart grid must be carefully designed to meet power system operation’s functional and reliability requirements.
This thesis discusses issues related to the security of power system communication and their counter measures. It focuses on development of security mechanisms for secure substation communication, and analyzes the impact of security overhead …
Meta-Heuristics Analysis For Technologically Complex Programs: Understanding The Impact Of Total Constraints For Schedule, Quality And Cost, Henry Darrel Webb
Meta-Heuristics Analysis For Technologically Complex Programs: Understanding The Impact Of Total Constraints For Schedule, Quality And Cost, Henry Darrel Webb
Engineering Management & Systems Engineering Projects for D. Eng. Degree
Program management data associated with a technically complex radio frequency electronics base communication system has been collected and analyzed to identify heuristics which may be utilized in addition to existing processes and procedures to provide indicators that a program is trending to failure. Analysis of the collected data includes detailed schedule analysis, detailed earned value management analysis and defect analysis within the framework of a Firm Fixed Price (FFP) incentive fee contract.
This project develops heuristics and provides recommendations for analysis of complex project management efforts such as those discussed herein. The analysis of the effects of the constraints on …
Visualizing Digital Collections At Archive-It, Kalpesh Padia
Visualizing Digital Collections At Archive-It, Kalpesh Padia
Computer Science Theses & Dissertations
Archive-It, a subscription service from the Internet Archive, allows users to create,maintain, and view digital collections of web resources. The current interface of Archive-It is largely text-based, supporting drill-down navigation using lists of URIs.While this interface provides good searching capabilities, it is not efficient for browsing. In the absence of keywords, a user has to spend large amount of time trying to locate a web page of interest. In order to provide a better visual experience to the user, we have studied the underlying characteristics of Archive-It collections and implemented six different visualizations (treemap, time cloud, bubble chart, image plot, …
An Extensible Framework For Creating Personal Archives Of Web Resources Requiring Authentication, Matthew Ryan Kelly
An Extensible Framework For Creating Personal Archives Of Web Resources Requiring Authentication, Matthew Ryan Kelly
Computer Science Theses & Dissertations
The key factors for the success of the World Wide Web are its large size and the lack of a centralized control over its contents. In recent years, many advances have been made in preserving web content but much of this content (namely, social media content) was not archived, or still to this day is not being archived,for various reasons. Tools built to accomplish this frequently break because of the dynamic structure of social media websites. Because many social media websites exhibit a commonality in hierarchy of the content, it would be worthwhile to setup a means to reference this …
Performance Optimization Over Wireless Links With Operating Constraints, Shiny Abraham
Performance Optimization Over Wireless Links With Operating Constraints, Shiny Abraham
Electrical & Computer Engineering Theses & Dissertations
Wireless communication is one of the most active areas of technological innovations and groundbreaking research ranging from simple cellular phones to highly complex military monitoring devices. The emergence of radios with cognitive capabilities like software defined radios has revolutionized modern communication systems by providing transceivers which can vary their output waveforms as well as their demodulation methods. This adaptability plays a pivotal role in efficient utilization of radio spectrum in an intelligent way while simultaneously not interfering with other radio devices operating on the same frequency band. Thus, it is safe to say that current and future wireless systems and …
Adaptive Routing Algorithm For Priority Flows In A Network, Timothy J. Carbino
Adaptive Routing Algorithm For Priority Flows In A Network, Timothy J. Carbino
Theses and Dissertations
This research presents the development of an Adaptive Routing Algorithm for Priority (ARAP) flows in a Network. Devices in today's battle space require information to function. Additional bandwidth requirements for such devices place an increased burden on the already congested networks in the battle space. Some devices require real time information (high priority) and other devices will not require real time information (low priority). Existing protocols treat the network like an opaque entity and have little knowledge of user requirements. User requirement information is available in tactical networks and we can take advantage of the known requirements to better optimize …
A Web-Based Approach To Music Library Management, Jason Young
A Web-Based Approach To Music Library Management, Jason Young
Computer Engineering
This application utilizes modern standards developing in web browsers to create a desktop-like application for managing a music library online. The server side application is written in a model-view-controller style using Python backed by a MySQL database. The client side JavaScript was designed around a modular concept interfacing several third-party frameworks and libraries. By taking advantage of developing browser features such as persistent local storage, this web application was designed to handle a large library of music.
Wireless Sensor Network For Wine Fermentation, Kerry Scharfglass, Andrew Lehmer
Wireless Sensor Network For Wine Fermentation, Kerry Scharfglass, Andrew Lehmer
Computer Engineering
This project implements an automated temperature monitoring system for wine fermentation which is affordable, easy to use, and scalable to typical small winery setups. To realize these requirements, we implemented the system as a wireless sensor network utilizing commercial off-the-shelf hardware. Temperature and system diagnostic information is communicated wirelessly in a peer-to-peer network topology such that all information flows toward an aggregating server. The server makes the temperature information available over the Internet via a web application and alerts the winemaker by email when the temperature has left acceptable bounds that the winemaker may configure. This project also involved materials …
Wireless Ad Hoc Networks For Mobile Devices Via High Frequency Sound Waves, Yashar Bahman
Wireless Ad Hoc Networks For Mobile Devices Via High Frequency Sound Waves, Yashar Bahman
Computer Engineering
The purpose of this research it to give mobile phones the ability to create a cross-platfor wireless ad-hoc network. To accomplish this the phone’s speaker/microphone will be treated as a modulator/demodulator (or modem for short). The idea is that the phone will generate sine waves at various frequencies to output them on the speaker on one end and also record audio with the microphone to analyze and decode it into data on the other.
Once complete, these functionalities will all be rolled up into one easy to use library named Wave, which can be used to send data back and …
Frg Turbojet, Tyler Vitti
Frg Turbojet, Tyler Vitti
Computer Engineering
Members of the Cal Poly SLO campus club FRG work together with students of several different disciplines to build a functional turbojet engine. Engineering approaches include design, fabrication, testing, and computer sensing, control, and integration. The goal of the project is to produce a running turbojet engine monitored and controlled by embedded hardware and specialized PC software. This project is to be used by later groups for further research and development.
Lyfi, Kianoosh Salami, Justin Cotton, Elush Shirazpour
Lyfi, Kianoosh Salami, Justin Cotton, Elush Shirazpour
Electrical Engineering
This paper will cover the steps necessary to design, build, and manage networkable smart light switches over WiFi via a mobile application. It contains a microcontroller running a real time operating system, a WiFi module, a Java server with SQLite databasing, and a mobile phone application.
LyFi is designed to turn on/off and dim household lights while only requiring the same installation procedure as a less capable dimmer switch. Once installed and connected to a network, LyFi will self-discover and configure. The server automatically propogates a database of nodes where any mobile device running an application can receive an updated …
The Micro Check-In Framework For The Next Generation Of Location-Based Applications, Shraddha Kacha
The Micro Check-In Framework For The Next Generation Of Location-Based Applications, Shraddha Kacha
Master's Theses
Today's mobile computing platforms provide new, convenient possibilities for location-based commercial activity. In particular, the global positioning system (GPS) provides location data for local advertising and retail activity. In this thesis, we take the next step and introduce the concept of micro check-in. Micro check-in is a simple framework that allows users to match their current location to specific objects or places at a resolution much finer than that allowed by GPS based check-in. We show that micro check-in enables customers to reveal their location at a fine level of granularity. By describing the concepts of points of service, service …
Bluebeats, Jake Muir, Aaron Martinez, Mishal Shah, Richard Wissemann
Bluebeats, Jake Muir, Aaron Martinez, Mishal Shah, Richard Wissemann
Computer Engineering
Our group’s senior project is called BlueBeats. The BlueBeats product was created in order to provide a wireless audio gateway between Bluetooth enabled devices. Users of BlueBeats can use an Android or computer application to interface with the BlueBeats device. The Android and computer applications allow the user to easily scan for devices, add/remove devices from their personal list, and pair/connect with a selected Bluetooth enabled device. Once the user is connected to the BlueBeats device, he/she has two options. The first option occurs when the user connects the BlueBeats device to a device with speakers (using 3.5mm audio jack …
Bluebeats, Aaron Martinez, Jake Muir, Mishal Shah, Richard Wissemann
Bluebeats, Aaron Martinez, Jake Muir, Mishal Shah, Richard Wissemann
Computer Science and Software Engineering
Our group’s senior project is called BlueBeats. The BlueBeats product was created in order to provide a wireless audio gateway between Bluetooth enabled devices. Users of BlueBeats can use an Android or computer application to interface with the BlueBeats device. The Android and computer applications allow the user to easily scan for devices, add/remove devices from their personal list, and pair/connect with a selected Bluetooth enabled device. Once the user is connected to the BlueBeats device, he/she has two options. The first option occurs when the user connects the BlueBeats device to a device with speakers (using 3.5mm audio jack …
A Framework For Federated Two-Factor Authentication Enabling Cost-Effective Secure Access To Distributed Cyberinfrastructure, Matthew Allan Ezell
A Framework For Federated Two-Factor Authentication Enabling Cost-Effective Secure Access To Distributed Cyberinfrastructure, Matthew Allan Ezell
Masters Theses
As cyber attacks become increasingly sophisticated, the security measures used to mitigate the risks must also increase in sophistication. One time password (OTP) systems provide strong authentication because security credentials are not reusable, thus thwarting credential replay attacks. The credential changes regularly, making brute-force attacks significantly more difficult. In high performance computing, end users may require access to resources housed at several different service provider locations. The ability to share a strong token between multiple computing resources reduces cost and complexity.
The National Science Foundation (NSF) Extreme Science and Engineering Discovery Environment (XSEDE) provides access to digital resources, including supercomputers, …
Extending The Hybridthread Smp Model For Distributed Memory Systems, Eugene Anthony Cartwright Iii
Extending The Hybridthread Smp Model For Distributed Memory Systems, Eugene Anthony Cartwright Iii
Graduate Theses and Dissertations
Memory Hierarchy is of growing importance in system design today. As Moore's Law allows system designers to include more processors within their designs, data locality becomes a priority. Traditional multiprocessor systems on chip (MPSoC) experience difficulty scaling as the quantity of processors increases. This challenge is common behavior of memory accesses in a shared memory environment and causes a decrease in memory bandwidth as processor numbers increase. In order to provide the necessary levels of scalability, the computer architecture community has sought to decentralize memory accesses by distributing memory throughout the system. Distributed memory offers greater bandwidth due to decoupled …
Bluemote!, Philip Kaye
Bluemote!, Philip Kaye
Computer Engineering
In today’s society, our mobile phones are an extremely useful device when we are on the go and away from our homes; however, when we return home, our smart phone becomes just a communication tool again. Home automation is inevitable, and it will find its way into every house. The first person to commercialize it to the point where it is as easy to set-up and as affordable as a home router will end up breaking this slow trend. The key to this success is the smart phone; this should end up being the most expensive piece of hardware for …
Kreative Outlets, Travis Crist, Steve Clark, Jason Peressini
Kreative Outlets, Travis Crist, Steve Clark, Jason Peressini
Computer Engineering
With the widespread use of smart phones and the advancement of WiFi technologies, people now have the Internet at their fingertips at all times. Home automation and control has the possibility of becoming the next big technology that can utilize the abundant availability of the Internet. This paper documents the findings and results of a project aimed at developing the infrastructure needed for a home automation system that is accessible anywhere. We implemented a system that utilized a web enabled ethernet connection and RF wireless technology to control AC outlets and provide the user with feedback information about the status …
Cell Broadcast Simulation In Android, Uzzal Chandra Das
Cell Broadcast Simulation In Android, Uzzal Chandra Das
Theses Digitization Project
The purpose of this study is to show since no promising application of broadcasting exists and service providers do not provide broadcast channels in the US, a prototype can be very helpful to investigate the applications of broadcasting, and Cell Broadcast Simulation app will serve this purpose. The Cell Broadcast Simulation App on Android platform is an attempt to make cell broadcasting possible in the USA. The main focus of this app is to make cell broadcasting possible by giving the user a positive experience and expose them to its many potential uses.
Empirical Performance Analysis Of High Performance Computing Benchmarks Across Variations In Cloud Computing, Sindhu Mani
Empirical Performance Analysis Of High Performance Computing Benchmarks Across Variations In Cloud Computing, Sindhu Mani
UNF Graduate Theses and Dissertations
High Performance Computing (HPC) applications are data-intensive scientific software requiring significant CPU and data storage capabilities. Researchers have examined the performance of Amazon Elastic Compute Cloud (EC2) environment across several HPC benchmarks; however, an extensive HPC benchmark study and a comparison between Amazon EC2 and Windows Azure (Microsoft’s cloud computing platform), with metrics such as memory bandwidth, Input/Output (I/O) performance, and communication computational performance, are largely absent. The purpose of this study is to perform an exhaustive HPC benchmark comparison on EC2 and Windows Azure platforms.
We implement existing benchmarks to evaluate and analyze performance of two public clouds spanning …
Auto Smart Text And E-Mail Notification System (Astens), Ahmed Abdulghaffar Algadi
Auto Smart Text And E-Mail Notification System (Astens), Ahmed Abdulghaffar Algadi
Theses Digitization Project
The purpose of Auto Smart Text and E-mail Notification System (ASTENS) project is to provide the California State University San Bernardino and other universities with a new easy, fast, and convenient way of communication between the faculty members and their students. ASTENS (Auto Smart Text and E-mail Notification System) provides two types of communication: class notifications and grade notifications. First, the class notifications allow an instructor to communicate with students registered in his/her class by using his/her cell phone or email. These notifications could be any message related to class (e.g. notes, reminder, announcement, etc.) and every student will be …
A Design Tool For Wsn Design In Buildings, Antony Guinard
A Design Tool For Wsn Design In Buildings, Antony Guinard
Theses
The combination of sensing, processing, communication and actuation has made the monitoring and operation of buildings a significant emerging application area for Wireless Sensor Networks (WSN). The design, implementation and management of WSN is a complex task requiring a broad spectrum of disciplines such as networking and protocols, information management and embedding engineering to be successful. Indoor environments in particular pose a number of challenges that make the design of wireless networks a difficult task. These include the influence of obstacles and people on radio propagation, ever evolving building layout and interference from other wireless networks. The large-scale adoption of …
Measuring Effectiveness Of Address Schemes For As-Level Graphs, Yinfang Zhuang
Measuring Effectiveness Of Address Schemes For As-Level Graphs, Yinfang Zhuang
Theses and Dissertations--Computer Science
This dissertation presents measures of efficiency and locality for Internet addressing schemes.
Historically speaking, many issues, faced by the Internet, have been solved just in time, to make the Internet just work~\cite{justWork}. Consensus, however, has been reached that today's Internet routing and addressing system is facing serious scaling problems: multi-homing which causes finer granularity of routing policies and finer control to realize various traffic engineering requirements, an increased demand for provider-independent prefix allocations which injects unaggregatable prefixes into the Default Free Zone (DFZ) routing table, and ever-increasing Internet user population and mobile edge devices. As a result, the DFZ routing …
An Improved Medium Access Control Protocol For Real-Time Applications In Wlans And Its Firmware Development, Sushil Dutt
An Improved Medium Access Control Protocol For Real-Time Applications In Wlans And Its Firmware Development, Sushil Dutt
Theses: Doctorates and Masters
The IEEE 802.11 Wireless Local Area Network (WLAN), commonly known as Wi-Fi, has emerged as a popular internet access technology and researchers are continuously working on improvement of the quality of service (QoS) in WLAN by proposing new and efficient schemes. Voice and video over Internet Protocol (VVoIP) applications are becoming very popular in Wi-Fi enabled portable/handheld devices because of recent technological advancements and lower service costs. Different from normal voice and video streaming, these applications demand symmetric throughput for the upstream and downstream. Existing Wi-Fi standards are optimised for generic internet applications and fail to provide symmetric throughput due …