Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Computer Engineering

Upgrading Of A Data Communication And Computer Networks Course In Engineering Technology Program, Murat Kuzlu, Otilia Popescu Jun 2020

Upgrading Of A Data Communication And Computer Networks Course In Engineering Technology Program, Murat Kuzlu, Otilia Popescu

Engineering Technology Faculty Publications

Data network communications is traditionally a course offered by computer engineering technology curricula, with the primary objective to introduce to the fundamental concepts in data communication and computer networks, as well as some level of hands-on component related to this area. Typical topics in such courses are the layered model of data communication, specifically the OSI seven-layered model, Internet routing, communication standards, protocols and technologies, and learning methods used to design the network and send data over the network in a secure manner. In the last decades, the data communication and applications have grown and become ubiquitous in both industry …


Minding Morality: Ethical Artificial Societies For Public Policy Modeling, Saikou Y. Diallo, F. Leron Shults, Wesley J. Wildman Jan 2020

Minding Morality: Ethical Artificial Societies For Public Policy Modeling, Saikou Y. Diallo, F. Leron Shults, Wesley J. Wildman

VMASC Publications

Public policies are designed to have an impact on particular societies, yet policy-oriented computer models and simulations often focus more on articulating the policies to be applied than on realistically rendering the cultural dynamics of the target society. This approach can lead to policy assessments that ignore crucial social contextual factors. For example, by leaving out distinctive moral and normative dimensions of cultural contexts in artificial societies, estimations of downstream policy effectiveness fail to account for dynamics that are fundamental in human life and central to many public policy challenges. In this paper, we supply evidence that incorporating morally salient …


Exploring The Relationship Between Teamwork Skills And Team Members' Centrality, Francisco Cima, Pilar Pazos, Ana Maria Canto Jan 2020

Exploring The Relationship Between Teamwork Skills And Team Members' Centrality, Francisco Cima, Pilar Pazos, Ana Maria Canto

Engineering Management & Systems Engineering Faculty Publications

The present paper describes an exploratory study of small teams working on a four-month project as part of a graduate engineering program. The research had two primary goals. The first was to utilize the log files from shared repositories used for team collaboration to describe the network structure of the teams. The second was to determine whether the network centrality of any individual team member is associated with their teamwork skills and attitudes towards the collaboration platform. The relationship between teamwork skills, attitudes towards the collaboration technology, and the centrality index was explored using Pearson correlations. A total of 35 …


Smart Communities: From Sensors To Internet Of Things And To A Marketplace Of Services, Stephan Olariu, Nirwan Ansari (Editor), Andreas Ahrens (Editor), Cesar Benavente-Preces (Editor) Jan 2020

Smart Communities: From Sensors To Internet Of Things And To A Marketplace Of Services, Stephan Olariu, Nirwan Ansari (Editor), Andreas Ahrens (Editor), Cesar Benavente-Preces (Editor)

Computer Science Faculty Publications

Our paper was inspired by the recent Society 5.0 initiative of the Japanese Government that seeks to create a sustainable human-centric society by putting to work recent advances in technology: sensor networks, edge computing, IoT ecosystems, AI, Big Data, robotics, to name just a few. The main contribution of this work is a vision of how these technological advances can contribute, directly or indirectly, to making Society 5.0 reality. For this purpose we build on a recently-proposed concept of Marketplace of Services that, in our view, will turn out to be one of the cornerstones of Society 5.0. Instead of …


Deepmag+ : Sniffing Mobile Apps In Magnetic Field Through Deep Learning, Rui Ning, Cong Wang, Chunsheng Xin, Jiang Li, Hongyi Wu Jan 2020

Deepmag+ : Sniffing Mobile Apps In Magnetic Field Through Deep Learning, Rui Ning, Cong Wang, Chunsheng Xin, Jiang Li, Hongyi Wu

Electrical & Computer Engineering Faculty Publications

This paper reports a new side-channel attack to smartphones using the unrestricted magnetic sensor data. We demonstrate that attackers can effectively infer the Apps being used on a smartphone with an accuracy of over 80%, through training a deep Convolutional Neural Networks (CNN). Various signal processing strategies have been studied for feature extractions, including a tempogram based scheme. Moreover, by further exploiting the unrestricted motion sensor to cluster magnetometer data, the sniffing accuracy can increase to as high as 98%. To mitigate such attacks, we propose a noise injection scheme that can effectively reduce the App sniffing accuracy to only …


A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo Jan 2020

A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo

Computational Modeling & Simulation Engineering Faculty Publications

The Internet of Intelligent Things (IoIT) communication environment can be utilized in various types of applications (for example, intelligent battlefields, smart healthcare systems, the industrial internet, home automation, and many more). Communications that happen in such environments can have different types of security and privacy issues, which can be resolved through the utilization of blockchain. In this paper, we propose a tutorial that aims in desiging a generalized blockchain-based secure authentication key management scheme for the IoIT environment. Moreover, some issues with using blockchain for a communication environment are discussed as future research directions. The details of different types of …