Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

Old Dominion University

Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 91

Full-Text Articles in Computer Engineering

A Companion Study Guide For The Cisco Dcicn Data Center Certification Exam (200-150), Miguel Ramlatchan Dec 2018

A Companion Study Guide For The Cisco Dcicn Data Center Certification Exam (200-150), Miguel Ramlatchan

Distance Learning Faculty & Staff Books

The official Cisco DCICN book and practice exams are great resources, but this is not an easy exam. This study guide is a companion to those resources and summarizes the subject areas into additional review questions with an answer description for each item. This book is not a "braindump" and it is not bootleg screenshots of the actual exam. Instead, this book provides additional context and examples, serves to complement other study guides, and provides additional examples. If you are getting ready to take the exam for the first time, I hope that this guide provides the extra help to ...


Wireless Sensor Networks For Smart Communications, Mu Zhou, Qilian Liang, Hongyi Wu, Weixiao Meng, Kunjie Xu Oct 2018

Wireless Sensor Networks For Smart Communications, Mu Zhou, Qilian Liang, Hongyi Wu, Weixiao Meng, Kunjie Xu

Electrical & Computer Engineering Faculty Publications

(First paragraph) In the first edition of the special issue titled “Wireless Sensor Networks for Smart Communications”, a total of 22 manuscripts were received and 6 of these were accepted. This issue demonstrated that network congestion, user mobility, and adjacent spectrum interference are the main reasons for the degradation ofcommunication quality inWireless Sensor Networks (WSNs).


To Relive The Web: A Framework For The Transformation And Archival Replay Of Web Pages, John Andrew Berlin Apr 2018

To Relive The Web: A Framework For The Transformation And Archival Replay Of Web Pages, John Andrew Berlin

Computer Science Theses & Dissertations

When replaying an archived web page (known as a memento), the fundamental expectation is that the page should be viewable and function exactly as it did at archival time. However, this expectation requires web archives to modify the page and its embedded resources, so that they no longer reference (link to) the original server(s) they were archived from but back to the archive. Although these modifications necessarily change the state of the representation, it is understood that without them the replay of mementos from the archive would not be possible. Unfortunately, because the replay of mementos and the modifications ...


A Reliable Data Provenance And Privacy Preservation Architecture For Business-Driven Cyber-Physical Systems Using Blockchain, Xueping Liang, Sachin Shetty, Deepak K. Tosh, Juan Zhao, Danyi Li, Jihong Liu Jan 2018

A Reliable Data Provenance And Privacy Preservation Architecture For Business-Driven Cyber-Physical Systems Using Blockchain, Xueping Liang, Sachin Shetty, Deepak K. Tosh, Juan Zhao, Danyi Li, Jihong Liu

VMASC Publications

Cyber-physical systems (CPS) including power systems, transportation, industrial control systems, etc. support both advanced control and communications among system components. Frequent data operations could introduce random failures and malicious attacks or even bring down the whole system. The dependency on a central authority increases the risk of single point of failure. To establish an immutable data provenance scheme for CPS, the authors adopt blockchain and propose a decentralized architecture to assure data integrity. In business-driven CPS, end users are required to share their personal information with multiple third parties. To prevent data leakage and preserve user privacy, the authors isolate ...


Applying Machine Learning To Advance Cyber Security: Network Based Intrusion Detection Systems, Hassan Hadi Latheeth Al-Maksousy Jan 2018

Applying Machine Learning To Advance Cyber Security: Network Based Intrusion Detection Systems, Hassan Hadi Latheeth Al-Maksousy

Computer Science Theses & Dissertations

Many new devices, such as phones and tablets as well as traditional computer systems, rely on wireless connections to the Internet and are susceptible to attacks. Two important types of attacks are the use of malware and exploiting Internet protocol vulnerabilities in devices and network systems. These attacks form a threat on many levels and therefore any approach to dealing with these nefarious attacks will take several methods to counter. In this research, we utilize machine learning to detect and classify malware, visualize, detect and classify worms, as well as detect deauthentication attacks, a form of Denial of Service (DoS ...


Coexistence And Secure Communication In Wireless Networks, Saygin Bakşi Jan 2018

Coexistence And Secure Communication In Wireless Networks, Saygin Bakşi

Electrical & Computer Engineering Theses & Disssertations

In a wireless system, transmitted electromagnetic waves can propagate in all directions and can be received by other users in the system. The signals received by unintended receivers pose two problems; increased interference causing lower system throughput or successful decoding of the information which removes secrecy of the communication. Radio frequency spectrum is a scarce resource and it is allocated by technologies already in use. As a result, many communication systems use the spectrum opportunistically whenever it is available in cognitive radio setting or use unlicensed bands. Hence, efficient use of spectrum by sharing users is crucial to increase maximize ...


Scalable And Fully Distributed Localization In Large-Scale Sensor Networks, Miao Jin, Su Xia, Hongyi Wu, Xianfeng David Gu Jun 2017

Scalable And Fully Distributed Localization In Large-Scale Sensor Networks, Miao Jin, Su Xia, Hongyi Wu, Xianfeng David Gu

Electrical & Computer Engineering Faculty Publications

This work proposes a novel connectivity-based localization algorithm, well suitable for large-scale sensor networks with complex shapes and a non-uniform nodal distribution. In contrast to current state-of-the-art connectivity-based localization methods, the proposed algorithm is highly scalable with linear computation and communication costs with respect to the size of the network; and fully distributed where each node only needs the information of its neighbors without cumbersome partitioning and merging process. The algorithm is theoretically guaranteed and numerically stable. Moreover, the algorithm can be readily extended to the localization of networks with a one-hop transmission range distance measurement, and the propagation of ...


Qos Recommendation In Cloud Services, Xianrong Zheng, Li Da Xu, Sheng Chai Jan 2017

Qos Recommendation In Cloud Services, Xianrong Zheng, Li Da Xu, Sheng Chai

Information Technology & Decision Sciences Faculty Publications

As cloud computing becomes increasingly popular, cloud providers compete to offer the same or similar services over the Internet. Quality of service (QoS), which describes how well a service is performed, is an important differentiator among functionally equivalent services. It can help a firm to satisfy and win its customers. As a result, how to assist cloud providers to promote their services and cloud consumers to identify services that meet their QoS requirements becomes an important problem. In this paper, we argue for QoS-based cloud service recommendation, and propose a collaborative filtering approach using the Spearman coefficient to recommend cloud ...


Industrial Wireless Sensor Networks 2016, Qindong Sun, Schancang Li, Shanshan Zhao, Hongjian Sun, Li Xu, Arumugam Nallamathan Jan 2017

Industrial Wireless Sensor Networks 2016, Qindong Sun, Schancang Li, Shanshan Zhao, Hongjian Sun, Li Xu, Arumugam Nallamathan

Information Technology & Decision Sciences Faculty Publications

The industrial wireless sensor network (IWSN) is the next frontier in the Industrial Internet of Things (IIoT), which is able to help industrial organizations to gain competitive advantages in industrial manufacturing markets by increasing productivity, reducing the costs, developing new products and services, and deploying new business models.


A Mobile Platform Using Software Defined Radios For Wireless Communication Systems Experimentation, Otilia Popescu, Shiny Abraham, Samy El-Tawab Jan 2017

A Mobile Platform Using Software Defined Radios For Wireless Communication Systems Experimentation, Otilia Popescu, Shiny Abraham, Samy El-Tawab

Engineering Technology Faculty Publications

A distinctive feature of wireless communication systems is implied by the fact that there is no physical connection between the transmitter and its corresponding receiver, which enables user mobility. However, experimenting with wireless communication systems is mostly done in the lab, where transmitters and receivers are setup on benches, in stationary settings. This prevents students from experiencing fading and other propagation effects associated with mobile wireless channels. This paper describes a mobile platform for wireless communication experimentation that enables students to run experiments beyond the confines of a traditional lab, in realistic settings that cover indoor and outdoor scenarios with ...


Hoeffding Tree Algorithms For Anomaly Detection In Streaming Datasets: A Survey, Asmah Muallem, Sachhin Shetty, Jan W. Pan, Juan Zhao, Biswajit Biswal Jan 2017

Hoeffding Tree Algorithms For Anomaly Detection In Streaming Datasets: A Survey, Asmah Muallem, Sachhin Shetty, Jan W. Pan, Juan Zhao, Biswajit Biswal

Computational Modeling and Simulation Engineering Faculty Publications

This survey aims to deliver an extensive and well-constructed overview of using machine learning for the problem of detecting anomalies in streaming datasets. The objective is to provide the effectiveness of using Hoeffding Trees as a machine learning algorithm solution for the problem of detecting anomalies in streaming cyber datasets. In this survey we categorize the existing research works of Hoeffding Trees which can be feasible for this type of study into the following: surveying distributed Hoeffding Trees, surveying ensembles of Hoeffding Trees and surveying existing techniques using Hoeffding Trees for anomaly detection. These categories are referred to as compositions ...


Secrecy Rates And Optimal Power Allocation For Full-Duplex Decode-And-Forward Relay Wire-Tap Channels, Lubna Elsaid, Leonardo Jimenez-Rodriguez, Nghi H. Tran, Sachhin Shetty, Shivakumar Sastry Jan 2017

Secrecy Rates And Optimal Power Allocation For Full-Duplex Decode-And-Forward Relay Wire-Tap Channels, Lubna Elsaid, Leonardo Jimenez-Rodriguez, Nghi H. Tran, Sachhin Shetty, Shivakumar Sastry

Computational Modeling and Simulation Engineering Faculty Publications

This paper investigates the secrecy rates and optimal power allocation schemes for a decode-and-forward wiretap relay channel where the transmission from a source to a destination is aided by a relay operating in a full-duplex (FD) mode under practical residual self-interference. By first considering static channels, we address the non-convex optimal power allocation problems between the source and relay nodes under individual and joint power constraints to establish closed-form solutions. An asymptotic analysis is then given to provide important insights on the derived power allocation solutions. Specifically, by using the method of dominant balance, it is demonstrated that full power ...


Leveraging Heritrix And The Wayback Machine On A Corporate Intranet: A Case Study On Improving Corporate Archives, Justin F. Brunelle, Krista Ferrante, Eliot Wilczek, Michele C. Weigle, Michael L. Nelson Jan 2016

Leveraging Heritrix And The Wayback Machine On A Corporate Intranet: A Case Study On Improving Corporate Archives, Justin F. Brunelle, Krista Ferrante, Eliot Wilczek, Michele C. Weigle, Michael L. Nelson

Computer Science Faculty Publications

In this work, we present a case study in which we investigate using open-source, web-scale web archiving tools (i.e., Heritrix and the Wayback Machine installed on the MITRE Intranet) to automatically archive a corporate Intranet. We use this case study to outline the challenges of Intranet web archiving, identify situations in which the open source tools are not well suited for the needs of the corporate archivists, and make recommendations for future corporate archivists wishing to use such tools. We performed a crawl of 143,268 URIs (125 GB and 25 hours) to demonstrate that the crawlers are easy ...


Detecting, Modeling, And Predicting User Temporal Intention, Hany M. Salaheldeen Jul 2015

Detecting, Modeling, And Predicting User Temporal Intention, Hany M. Salaheldeen

Computer Science Theses & Dissertations

The content of social media has grown exponentially in the recent years and its role has evolved from narrating life events to actually shaping them. Unfortunately, content posted and shared in social networks is vulnerable and prone to loss or change, rendering the context associated with it (a tweet, post, status, or others) meaningless. There is an inherent value in maintaining the consistency of such social records as in some cases they take over the task of being the first draft of history as collections of these social posts narrate the pulse of the street during historic events, protest, riots ...


Reminiscing About 15 Years Of Interoperability Efforts, Herbert Van De Sompel, Michael L. Nelson Jan 2015

Reminiscing About 15 Years Of Interoperability Efforts, Herbert Van De Sompel, Michael L. Nelson

Computer Science Faculty Publications

Over the past fifteen years, our perspective on tackling information interoperability problems for web-based scholarship has evolved significantly. In this opinion piece, we look back at three efforts that we have been involved in that aptly illustrate this evolution: OAI-PMH, OAI-ORE, and Memento. Understanding that no interoperability specification is neutral, we attempt to characterize the perspectives and technical toolkits that provided the basis for these endeavors. With that regard, we consider repository-centric and web-centric interoperability perspectives, and the use of a Linked Data or a REST/HATEAOS technology stack, respectively. We also lament the lack of interoperability across nodes that ...


Wireless Networking For Vehicle To Infrastructure Communication And Automatic Incident Detection, Sarwar Aziz Sha-Mohammad Jan 2015

Wireless Networking For Vehicle To Infrastructure Communication And Automatic Incident Detection, Sarwar Aziz Sha-Mohammad

Computer Science Theses & Dissertations

Vehicular wireless communication has recently generated wide interest in the area of wireless network research. Automatic Incident Detection (AID), which is the recent focus of research direction in Intelligent Transportation System (ITS), aims to increase road safety. These advances in technology enable traffic systems to use data collected from vehicles on the road to detect incidents. We develop an automatic incident detection method that has a significant active road safety application for alerting drivers about incidents and congestion. Our method for detecting traffic incidents in a highway scenario is based on the use of distance and time for changing lanes ...


Strategies For Sensor Data Aggregation In Support Of Emergency Response, X. Wang, A. Walden, M. Weigle, S. Olariu Oct 2014

Strategies For Sensor Data Aggregation In Support Of Emergency Response, X. Wang, A. Walden, M. Weigle, S. Olariu

Computer Science Presentations

PDF of a powerpoint presentation from the Military Communications Conference (MILCOM), Baltimore, Maryland, October 7, 2014. Also available on Slideshare.


A Framework For Web Object Self-Preservation, Charles L. Cartledge Jul 2014

A Framework For Web Object Self-Preservation, Charles L. Cartledge

Computer Science Theses & Dissertations

We propose and develop a framework based on emergent behavior principles for the long-term preservation of digital data using the web infrastructure. We present the development of the framework called unsupervised small-world (USW) which is at the nexus of emergent behavior, graph theory, and digital preservation. The USW algorithm creates graph based structures on the Web used for preservation of web objects (WOs). Emergent behavior activities, based on Craig Reynolds’ “boids” concept, are used to preserve WOs without the need for a central archiving authority. Graph theory is extended by developing an algorithm that incrementally creates small-world graphs. Graph theory ...


Transparent Spectrum Co-Access In Cognitive Radio Networks, Jonathan Daniel Backens Apr 2014

Transparent Spectrum Co-Access In Cognitive Radio Networks, Jonathan Daniel Backens

Electrical & Computer Engineering Theses & Disssertations

The licensed wireless spectrum is currently under-utilized by as much as 85%. Cognitive radio networks have been proposed to employ dynamic spectrum access to share this under-utilized spectrum between licensed primary user transmissions and unlicensed secondary user transmissions. Current secondary user opportunistic spectrum access methods, however, remain limited in their ability to provide enough incentive to convince primary users to share the licensed spectrum, and they rely on primary user absence to guarantee secondary user performance. These challenges are addressed by developing a Dynamic Spectrum Co-Access Architecture (DSCA) that allows secondary user transmissions to co-access transparently and concurrently with primary ...


Web Archive Services Framework For Tighter Integration Between The Past And Present Web, Ahmed Alsum Apr 2014

Web Archive Services Framework For Tighter Integration Between The Past And Present Web, Ahmed Alsum

Computer Science Theses & Dissertations

Web archives have contained the cultural history of the web for many years, but they still have a limited capability for access. Most of the web archiving research has focused on crawling and preservation activities, with little focus on the delivery methods. The current access methods are tightly coupled with web archive infrastructure, hard to replicate or integrate with other web archives, and do not cover all the users' needs. In this dissertation, we focus on the access methods for archived web data to enable users, third-party developers, researchers, and others to gain knowledge from the web archives. We build ...


Http Mailbox - Asynchronous Restful Communication, Sawood Alam Jul 2013

Http Mailbox - Asynchronous Restful Communication, Sawood Alam

Computer Science Theses & Dissertations

Traditionally, general web services used only the GET and POST methods of HTTP while several other HTTP methods like PUT, PATCH, and DELETE were rarely utilized. Additionally, the Web was mainly navigated by humans using web browsers and clicking on hyperlinks or submitting HTML forms. Clicking on a link is always a GET request while HTML forms only allow GET and POST methods. Recently, several web frameworks/libraries have started supporting RESTful web services through APIs. To support HTTP methods other than GET and POST in browsers, these frameworks have used hidden HTML form fields as a workaround to convey ...


The Influence Of Social Networking Technology In An Engineering Organization, Derrick Marcus Tepaske Apr 2013

The Influence Of Social Networking Technology In An Engineering Organization, Derrick Marcus Tepaske

Engineering Management & Systems Engineering Projects for D. Eng. Degree

Computer facilitated Social Networking (SN) is becoming more prevalent in our society, both in our personal and professional lives. As its use grows, there is a desire to determine how it will impact an organization. If it can positively impact an organization then it is an initiative that could be embraced and leveraged for any number of business related activities from marketing to engineering. This project develops and implements a social networking treatment for an engineering organization in order to determine how it impacts the responsiveness and performance of the organization. The treatment includes an online tool, a training package ...


Tdma Slot Reservation In Cluster-Based Vanets, Mohammad Salem Almalag Apr 2013

Tdma Slot Reservation In Cluster-Based Vanets, Mohammad Salem Almalag

Computer Science Theses & Dissertations

Vehicular Ad Hoc Networks (VANETs) are a form of Mobile Ad Hoc Networks (MANETs) in which vehicles on the road form the nodes of the network. VANETs provide several services to enhance the safety and comfort of drivers and passengers. These services can be obtained by the wireless exchange of information among the vehicles driving on the road. In particular, the transmission of two different types of messages, safety/update and non-safety messages.

The transmission of safety/update message aims to inform the nearby vehicles about the sender's current status and/or a detected dangerous situation. This type of ...


A Method For Identifying Personalized Representations In Web Archives, Mat Kelly, Justin F. Brunelle, Michele C. Weigle, Michael L. Nelson Jan 2013

A Method For Identifying Personalized Representations In Web Archives, Mat Kelly, Justin F. Brunelle, Michele C. Weigle, Michael L. Nelson

Computer Science Faculty Publications

Web resources are becoming increasingly personalized — two different users clicking on the same link at the same time can see content customized for each individual user. These changes result in multiple representations of a resource that cannot be canonicalized in Web archives. We identify characteristics of this problem by presenting a potential solution to generalize personalized representations in archives. We also present our proof-of-concept prototype that analyzes WARC (Web ARChive) format files, inserts metadata establishing relationships, and provides archive users the ability to navigate on the additional dimension of environment variables in a modified Wayback Machine.


Impact Of Data Resolution On Peak Hour Factor Estimation For Transportation Decisions, Jan-Mou Li, Lee D. Han, Chung-Hao Chen Jan 2013

Impact Of Data Resolution On Peak Hour Factor Estimation For Transportation Decisions, Jan-Mou Li, Lee D. Han, Chung-Hao Chen

Electrical & Computer Engineering Faculty Publications

Inductance loop detection systems serve as a primary data source to contemporary traffic information systems. Measures like 20-second or 30-second average velocity, flow, and lane occupancy can be aggregated from individual loop detector actuation sampled at 60 Hz typically. Practically, these measures would sometimes be further aggregated into a much lower, e.g. 15-minute, resolution and then the raw data were lost. Valuable traffic information like flow variation may be distorted when the lower resolution aggregation is practiced. A biased conclusion could be drawn from a data integration system consisted of this kind of distortions. Three approaches estimating a peak ...


Communications And Energy-Harvesting In Nanosensor Networks, Michele C. Weigle Nov 2012

Communications And Energy-Harvesting In Nanosensor Networks, Michele C. Weigle

Computer Science Presentations

PDF of a powerpoint presentation from the National Science Foundation (NSF) Workshop on Biological Computations and Communications in Boston, Massachusetts, November 9, 2012. Also available on Slideshare.


Meta-Heuristics Analysis For Technologically Complex Programs: Understanding The Impact Of Total Constraints For Schedule, Quality And Cost, Henry Darrel Webb Jul 2012

Meta-Heuristics Analysis For Technologically Complex Programs: Understanding The Impact Of Total Constraints For Schedule, Quality And Cost, Henry Darrel Webb

Engineering Management & Systems Engineering Projects for D. Eng. Degree

Program management data associated with a technically complex radio frequency electronics base communication system has been collected and analyzed to identify heuristics which may be utilized in addition to existing processes and procedures to provide indicators that a program is trending to failure. Analysis of the collected data includes detailed schedule analysis, detailed earned value management analysis and defect analysis within the framework of a Firm Fixed Price (FFP) incentive fee contract.

This project develops heuristics and provides recommendations for analysis of complex project management efforts such as those discussed herein. The analysis of the effects of the constraints on ...


Performance Optimization Over Wireless Links With Operating Constraints, Shiny Abraham Jul 2012

Performance Optimization Over Wireless Links With Operating Constraints, Shiny Abraham

Electrical & Computer Engineering Theses & Disssertations

Wireless communication is one of the most active areas of technological innovations and groundbreaking research ranging from simple cellular phones to highly complex military monitoring devices. The emergence of radios with cognitive capabilities like software defined radios has revolutionized modern communication systems by providing transceivers which can vary their output waveforms as well as their demodulation methods. This adaptability plays a pivotal role in efficient utilization of radio spectrum in an intelligent way while simultaneously not interfering with other radio devices operating on the same frequency band. Thus, it is safe to say that current and future wireless systems and ...


Visualizing Digital Collections At Archive-It, Kalpesh Padia Jul 2012

Visualizing Digital Collections At Archive-It, Kalpesh Padia

Computer Science Theses & Dissertations

Archive-It, a subscription service from the Internet Archive, allows users to create,maintain, and view digital collections of web resources. The current interface of Archive-It is largely text-based, supporting drill-down navigation using lists of URIs.While this interface provides good searching capabilities, it is not efficient for browsing. In the absence of keywords, a user has to spend large amount of time trying to locate a web page of interest. In order to provide a better visual experience to the user, we have studied the underlying characteristics of Archive-It collections and implemented six different visualizations (treemap, time cloud, bubble chart ...


An Extensible Framework For Creating Personal Archives Of Web Resources Requiring Authentication, Matthew Ryan Kelly Jul 2012

An Extensible Framework For Creating Personal Archives Of Web Resources Requiring Authentication, Matthew Ryan Kelly

Computer Science Theses & Dissertations

The key factors for the success of the World Wide Web are its large size and the lack of a centralized control over its contents. In recent years, many advances have been made in preserving web content but much of this content (namely, social media content) was not archived, or still to this day is not being archived,for various reasons. Tools built to accomplish this frequently break because of the dynamic structure of social media websites. Because many social media websites exhibit a commonality in hierarchy of the content, it would be worthwhile to setup a means to reference ...