Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

Selected Works

Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 186

Full-Text Articles in Computer Engineering

Transportation Safety Performance Of Us Bus Transit Agencies And Population Density: A Cross-Sectional Analysis (2008-2014), Ilker Karaca, Peter T. Savolainen Jul 2019

Transportation Safety Performance Of Us Bus Transit Agencies And Population Density: A Cross-Sectional Analysis (2008-2014), Ilker Karaca, Peter T. Savolainen

Ilker Karaca

The paper examines the transportation safety performance of transit agencies providing public bus service in the US by using data from the National Transit Database (NTD)

Uses NTD data for a seven-year period from 2008 to 2014 • 3,853 observations for 651 public transportation agencies in 50 states

Seven types of bus transit fatalities and injuries (including passengers, operators, pedestrians, bicyclists)

Main explanatory variable: urban density obtained from the US Census figures

Other explanatory variables: total agency revenue miles, unlinked passenger trips, agency fleet size, and urban population


Top-Down Construction Cost Estimating Model Using An Artificial Neural Network, Douglas D. Gransberg, H. David Jeong, Ilker Karaca, Brendon Gardner Jun 2019

Top-Down Construction Cost Estimating Model Using An Artificial Neural Network, Douglas D. Gransberg, H. David Jeong, Ilker Karaca, Brendon Gardner

Ilker Karaca

This report contains the information and background on top-down cost estimating using artificial neural networks (ANN)_to enhance the accuracy of MDT early estimates of construction costs. Upon conducting an extensive review of MDT’s budgeting and cost estimating efforts, and following a survey of agency experts on the identification of the most salient project attributes with the dual-objectives of low effort and high accuracy, a rational method for top-down variable selection is proposed. Selected variables were further tested in their explanatory power of construction costs through the application of two cost estimating methodologies—multiple regression and artificial neural network ...


Impact Of The Application Layer Protocol On Energy Consumption, 4g Utilization And Performance How The Application Layer Protocol Strengthens Green Iot, Sachin Pawaskar, Johannes Hofer Jul 2018

Impact Of The Application Layer Protocol On Energy Consumption, 4g Utilization And Performance How The Application Layer Protocol Strengthens Green Iot, Sachin Pawaskar, Johannes Hofer

Sachin Pawaskar

The IoT communication over our data highways is growing tremendously. In future many device and machine manufacturers will transmit data from customer end-devices to data centers to improve and change the products to the customer’s needs. The focus of the next decades will be on reducing energy consumption and data overhead in order to keep utilization of 4G/5G networks low. This paper analyzes two different communication approaches often used in IoT scenarios. The benchmark compares the protocol MQTT against the RESTful approach which is based on HTTP(s) in terms of energy consumption and performance. The results of ...


Power-Stepped Protocol: Enhancing Spatial Utilization In A Clustered Mobile Ad Hoc Network, Chansu Yu, Kang G. Shin, Ben Lee May 2018

Power-Stepped Protocol: Enhancing Spatial Utilization In A Clustered Mobile Ad Hoc Network, Chansu Yu, Kang G. Shin, Ben Lee

Chansu Yu

While most previous studies on mobile ad hoc networks (MANETs) rely on the assumption that nodes are randomly distributed in the network coverage area, this assumption is unlikely to hold, as nodes tend to be cluttered around hot spots like the site of an accident or disaster. We refer to this as a clustered layout. Intuitively, a MANET with the clustered layout may suffer from serious performance degradation due to the excessive collisions in congested hot spots and space underutilization of sparse areas. In this paper, we propose a power-controlled network protocol, called the power-stepped protocol (PSP), that maximizes the ...


Many-To-One Communication Protocol For Wireless Sensor Networks, Chansu Yu, Robert Fiske, Seungmin Park, Won-Tae Kim May 2018

Many-To-One Communication Protocol For Wireless Sensor Networks, Chansu Yu, Robert Fiske, Seungmin Park, Won-Tae Kim

Chansu Yu

This paper proposes a novel communication protocol, called Many-to-One Sensors-to-Sink (MOSS), tailored to wireless sensor networks (WSNs). It exploits the unique sensors-to-sink traffic pattern to realize low-overhead medium access and low- latency sensors-to-sink routing paths. In conventional schedule-based MAC protocols such as S-MAC, sensor nodes in the proximity of the event generate reports simultaneously, causing unreliable and unpredictable performance during a brief but critical period of time when an event of interest occurs. MOSS is based on time division multiple access (TDMA) that avoids energy waste due to collisions, idle listening and overhearing and avoids unreliable behavior mentioned above. A ...


Cache Invalidation Strategies For Internet-Based Vehicular Ad Hoc Networks, Sunho Lim, Chansu Yu, Chita R. Das May 2018

Cache Invalidation Strategies For Internet-Based Vehicular Ad Hoc Networks, Sunho Lim, Chansu Yu, Chita R. Das

Chansu Yu

Internet-based vehicular ad hoc network (Ivanet) is an emerging technique that combines a wired Internet and a vehicular ad hoc network (Vanet) for developing an ubiquitous communication infrastructure and improving universal information and service accessibility. A key design optimization technique in Ivanets is to cache the frequently accessed data items in a local storage of vehicles. Since vehicles are not critically limited by the storage/memory space and power consumption, selecting proper data items for caching is not very critical. Rather, an important design issue is how to keep the cached copies valid when the original data items are updated ...


Teaching With Jupyter In-Class Activities: Lessons Learned And Next Steps, David C. Anastasiu Dec 2017

Teaching With Jupyter In-Class Activities: Lessons Learned And Next Steps, David C. Anastasiu

David C. Anastasiu

No abstract provided.


Web Archiving At Gvsu, Annie Benefiel, Matt Schultz Oct 2017

Web Archiving At Gvsu, Annie Benefiel, Matt Schultz

Matt Schultz

In 2017, GVSU Libraries began a web archiving initiative to capture our public-facing administrative, academic, arts, university publications and other websites and documents. In this presentation, Annie Benefiel (Archivist for Collection Management) and Matt Schultz (Metadata & Digital Curation Librarian) described the policy development process, the use of Archive-It as the web archiving solution, and the internal workflows followed to accomplish this important activity of capturing GVSU's institutional record.


Access Update For Gvsu, Matt Schultz, Kyle Felker Oct 2017

Access Update For Gvsu, Matt Schultz, Kyle Felker

Matt Schultz

By Fall 2016, GVSU Libraries began making a major strategic and technology shift toward the use of open source technologies versus commercial vendor solutions for digital preservation and access. In this presentation to the Mid-Michigan Digital Practitioners (MMDP) community, Matt Schultz (Metadata & Digital Curation Librarian) and Kyle Felker (Digital Initiatives Librarian) provide updates on these new directions.


Network Connection Blocker, Method, And Computer Readable Memory For Monitoring Connections In A Computer Network And Blocking The Unwanted Connections, Douglas W. Jacobson, James A. Davis Jun 2017

Network Connection Blocker, Method, And Computer Readable Memory For Monitoring Connections In A Computer Network And Blocking The Unwanted Connections, Douglas W. Jacobson, James A. Davis

Douglas Jacobson

A network connection blocker for monitoring connections between host computers in a network and blocking the unwanted connections. The host computers transmit connection packets between each other in accordance with a network protocol suite when seeking to establish, providing network services with, and close the connections. The network protocol suite includes a connection oriented transport layer protocol. The network connection blocker comprises a network interface that receives the connection packets transmitted between the host computers. It also comprises a blocking module that processes the received connection packets to detect the unwanted connections. The blocking module then generates connection packets in ...


Research Poster.Pdf, Desiree Dominguez Mar 2017

Research Poster.Pdf, Desiree Dominguez

Desiree Dominguez

Analyzing Wi-Fi probe request is essential for public safety and search and rescue missions. In this paper, we studied how Wi-Fi-probe requests are affected by different materials such as cloth, plastic, concrete, and metal when captured by Unmanned Aerial Serial (UAS) when having an attached a Wi-Fi Pineapple Tetra. Leaving the mobile devices active and setting them in a random position in an open zoned grid, the drone flying a mapping mission captured the Wi-Fi probe requests to determine the effect these materials have on the transmission of Wi-Fi probe requests. Through this method, the location of the Android Smartphones ...


Lomcf: Forwarding And Caching In Named Data Networking-Based Manets, Rana Asif Rehman, Byung-Seo Kim Dec 2016

Lomcf: Forwarding And Caching In Named Data Networking-Based Manets, Rana Asif Rehman, Byung-Seo Kim

Rana Asif Rehman

Named data networking (NDN) resolves the traditional TCP/IP based Internet problems (i.e., location dependent, complex usage, scalability, poor resource utilization etc.) and is considered as an eligible candidate for futuristic Internet paradigm. In NDN-based mobile ad hoc networks (MANETs), the participating nodes are operated in highly dynamic and challenge able environment such as low battery power, channel fluctuations, intermittent connectivity and so on. Due to the broadcast nature of the wireless channel, the NDN-based MANETs highlight severe issues (e.g., packet collisions, flooding, data redundancy, packet retransmissions), which further degrade the network performance. In this paper, to cope ...


Maa & Mmdp: Fall Workshop 2016 With Mid-Michigan Digital Practitioners, Matt Schultz, Annie Benefiel Nov 2016

Maa & Mmdp: Fall Workshop 2016 With Mid-Michigan Digital Practitioners, Matt Schultz, Annie Benefiel

Matt Schultz

In Summer 2016, GVSU Libraries was invited to submit a brief article for the Michigan Archival Association's Fall Open Entry newsletter on the background and impact of the Mid-Michigan Digital Practitioner's community. The article provides that background and several details and outcomes of the most recent meetings.


Animal Rights Talk: Moral Debate Over The Internet, Harold A. Herzog Jr., Beth Dinoff, Jessica R. Page Apr 2016

Animal Rights Talk: Moral Debate Over The Internet, Harold A. Herzog Jr., Beth Dinoff, Jessica R. Page

Harold Herzog, PhD

Messages sent over Animal Rights-Talk, an electronic mail network devoted to the discussion of issues related to the animal rights movement, were analyzed. Messages typically fell into the following categories: questions and information, discussions of philosophical issues, ethical problems associated with the treatment of particular species, the politics of the animal rights movement, problems of moral consistency, the ethics of particular uses of non-human species (e.g., meat consumption, biomedical research with animal subjects), and matters pertaining to the internal life of the network (e.g., efforts at control of perceived norm violations). Debates between animal activists and animal researchers ...


Joining The Table: Advancing Digital Discussions At Gvsu, Matt Schultz, Kyle Felker Mar 2016

Joining The Table: Advancing Digital Discussions At Gvsu, Matt Schultz, Kyle Felker

Matt Schultz

The digital curation and technology faculty/staff of GVSU Libraries began 2016 with a number of digital initiatives that engaged the Libraries with faculty and departments across the University. This presentation highlights these initiatives for the Mid-Michigan Digital Practitioners (MMDP) community. Specific initiatives covered include the new Digital Studies Minor, digital humanities projects, efforts to launch an electronic records management program, and many others.


Development Of Compressive Sensing Techniques For Wideband Spectrum Scanning In Cognitive Radio Networks, Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi Dec 2015

Development Of Compressive Sensing Techniques For Wideband Spectrum Scanning In Cognitive Radio Networks, Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi

fatima salahdine

Next generation of communication systems will be smart and frequency agile. They will be able to scan the wideband radio spectrum to find the available frequency channel. This process is called compressive sensing. Existing compressive sensing techniques are not accurate and have high processing time, hardware limitations, and computational cost. Thus, this project aims to develop efficient compressive sensing algorithms that deal with uncertainty and enhance the radio spectrum scanning.
 
 


Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar Dec 2015

Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar

Maurice Dawson

Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls ...


Data And Network Optimization Effect On Web Performance, Steven Rosenberg, Surbhi Dangi, Isuru Warnakulasooriya Dec 2015

Data And Network Optimization Effect On Web Performance, Steven Rosenberg, Surbhi Dangi, Isuru Warnakulasooriya

Surbhi Dangi

In this study, we measure the effects of two software approaches to improving data and network performance: 1. Content optimization and compression; and 2. Optimizing network protocols. We achieve content optimization and compression by means of BoostEdge by ActivNetworks and employ the SPDY network protocol by Google to lower the round trip time for HTTP transactions. Since the data and transport layers are separate, we conclude our investigation by studying the combined effect of these two techniques on web performance. Using document mean load time as the measure, we found that with and without packet loss, both BoostEdge and SPDY ...


Parallel Computation In Communication And Signal Processing, Amean Al_Safi, Bradley Bazuin, Liqaa Alhafadhi May 2015

Parallel Computation In Communication And Signal Processing, Amean Al_Safi, Bradley Bazuin, Liqaa Alhafadhi

Amean S Al_Safi

The powerful computation of GPU has increased the computation speed up of many systems. This paper summarize some of the most important work in the field of communication and signal processing using GPU


Session D-4: Coolhub.Imsa: Collaborative Innovation In Action, Carl Heine, James Gerry May 2015

Session D-4: Coolhub.Imsa: Collaborative Innovation In Action, Carl Heine, James Gerry

Carl Heine

Transform STEM teaching and learning with CoolHub.IMSA, a free virtual platform where youth and adults collaborate on projects they create. Explore the site through the eyes of project members and discover powerful ways to collaborate, innovate and network for learning.


Diversified Users' Satisfaction With Advanced Mobile Phone Features, Chen Ling, Wonil Hwang, Gavriel Salvendy Apr 2015

Diversified Users' Satisfaction With Advanced Mobile Phone Features, Chen Ling, Wonil Hwang, Gavriel Salvendy

Dr. Chen Ling

Mobile phones are widely used all over the world, and with their increasing number of value-added features, they are becoming far more than a mere mobile voice communication device. Rather, they provide a powerful platform for accessing information universally. This paper reports a study which scrutinized users’ preference levels with five new mobile phone design features facilitating universal information access through mobile phones: camera, colour screen, voice-activated dialing, Internet browsing, and wireless connectivity (e.g. Bluetooth, infrared, etc.). The survey study involved college students and investigated the degree to which each of the above features impacts the users’ overall satisfaction ...


Effect Of Glance Duration On Perceived Complexity And Segmentation Of User Interfaces, Yifei Dong, Chen Ling, Lesheng Hua Apr 2015

Effect Of Glance Duration On Perceived Complexity And Segmentation Of User Interfaces, Yifei Dong, Chen Ling, Lesheng Hua

Dr. Chen Ling

Computer users who handle complex tasks like air traffic control (ATC) need to quickly detect updated information from multiple displays of graphical user interface. The objectives of this study are to investigate how much computer users can segment GUI display into distinctive objects within very short glances and whether human perceives complexity differently after different durations of exposure. Subjects in this empirical study were presented with 20 screenshots of web pages and software interfaces for different short durations (100ms, 500ms, 1000ms) and were asked to recall the visual objects and rate the complexity of the images. The results indicate that ...


Crowdsourced Earthquake Early Warning, Sarah Minson, Benjamin Brooks, Craig Glennie, Jessica Murray, John Langbein, Susan Owen, Thomas Heaton, Robert Iannucci, Darren Hauser Mar 2015

Crowdsourced Earthquake Early Warning, Sarah Minson, Benjamin Brooks, Craig Glennie, Jessica Murray, John Langbein, Susan Owen, Thomas Heaton, Robert Iannucci, Darren Hauser

Robert A Iannucci

Earthquake early warning (EEW) can reduce harm to people and infrastructure from earthquakes and tsunamis, but it has not been implemented in most high earthquake-risk regions because of prohibitive cost. Common consumer devices such as smartphones contain low-cost versions of the sensors used in EEW. Although less accurate than scientific-grade instruments, these sensors are globally ubiquitous. Through controlled tests of consumer devices, simulation of an Mw (moment magnitude) 7 earthquake on California’s Hayward fault, and real data from the Mw 9 Tohoku-oki earthquake, we demonstrate that EEW could be achieved via crowdsourcing.


Analyzing Wi­Fi P2p In The Context Of A Hangman Game, William L. Honig Jan 2015

Analyzing Wi­Fi P2p In The Context Of A Hangman Game, William L. Honig

William L Honig

Wi­Fi P2P , which complies with the Wi­Fi Alliance's Wi­Fi Direct™ certification

2 3

program, is a relatively new addition to wireless communications systems. It is now

supported in Android operating system (since version 4.0). In theory, Wi­Fi Direct offers

advantages for ad hoc communications between mobile apps. A key goal of this project

was to evaluate the ability of Wi­Fi P2P for interconnecting mobile apps by using a

common game suitable to mobile screens and devices.

The application allows the user to interconnect two devices using Wi­Fi P2P and

play the classic ...


Supporting Teacher Orchestration In Ubiquitous Learning Environments: A Study In Primary Education, Juan Muñoz Cristóbal, Ivan Jorrín Abellán, Juan Asensio Perez, Alejandra Martínez Monés, Luis Prieto, Yannis Dimitriadis Dec 2014

Supporting Teacher Orchestration In Ubiquitous Learning Environments: A Study In Primary Education, Juan Muñoz Cristóbal, Ivan Jorrín Abellán, Juan Asensio Perez, Alejandra Martínez Monés, Luis Prieto, Yannis Dimitriadis

Ivan M. Jorrín Abellán

During the last decades, educational contexts have transformed into complex technological and social ecologies, with mobile devices expanding the scope of education beyond the traditional classroom, creating so-called Ubiquitous Learning Environments (ULEs). However, these new technological opportunities entail an additional burden for teachers, who need to manage and coordinate the resources involved in such complex educational scenarios in a process known as “orchestration”. This paper presents the evaluation of the orchestration support provided by GLUEPS-AR, a system aimed to help teachers in the coordination of across-spaces learning situations carried out in ULEs. The evaluation, following an interpretive research perspective, relied ...


Coming Down To Earth: Helping Teachers Use 3d Virtual Worlds In Across-Spaces Learning Situations, Juan Muñoz Cristóbal, Luis Prieto, Juan Asensio Pérez, Alejandra Martínez Monés, Ivan Jorrín Abellán, Yannis Dimitriadis Dec 2014

Coming Down To Earth: Helping Teachers Use 3d Virtual Worlds In Across-Spaces Learning Situations, Juan Muñoz Cristóbal, Luis Prieto, Juan Asensio Pérez, Alejandra Martínez Monés, Ivan Jorrín Abellán, Yannis Dimitriadis

Ivan M. Jorrín Abellán

Different approaches have explored how to provide seamless learning across multiple ICT-enabled physical and virtual spaces, including three-dimensional virtual worlds (3DVW). However, these approaches present limitations that may reduce their acceptance in authentic educational practice: The difficulties of authoring and sharing teacher-created designs across different 3DVW platforms, or the lack of integration of 3DVWs with existing technologies in the classroom ecosystem (e.g., widespread web-based learning platforms such as Moodle, or mobile augmented reality applications). Focusing on a specific kind of 3DVW (virtual globes, such as Google Earth, used like 3DVWs), we propose a system that enables teachers to deploy ...


Wikis For Group Work: Encouraging Transparency, Benchmarking And Feedback, Amir Abdekhodaee, Dini Kourosh, Farnaz Modarres, Anne-Marie Chase, Bella Ross Dec 2014

Wikis For Group Work: Encouraging Transparency, Benchmarking And Feedback, Amir Abdekhodaee, Dini Kourosh, Farnaz Modarres, Anne-Marie Chase, Bella Ross

Dr Anne-Marie Chase

Education delivery models and approaches are undergoing radical change. The traditional knowledge exchange model whereby an educator imparts knowledge to students may not be best placed to develop essential skills for the 21st century (Griffin, McGaw, & Care, 2012) and is being challenged by models that encourage knowledge creation by students. Using a wiki to facilitate group work may provide students opportunities for collaborative learning (Blumenfeld, Marx, Soloway, & Krajcik, 1996), knowledge sharing and construction (Elgort, Smith, & Toland, 2008), and skill development. Wikis allow individual contributions to be traceable thereby increasing individual accountability in group work situations. Wikis can furthermore be monitored ...


Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson Dec 2014

Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson

Maurice Dawson

Cyber security has become a matter of national, international, economic, and societal importance that affects multiple nations (Walker, 2012). Since the 1990s users have exploited vulnerabilities to gain access to networks for malicious purposes. In recent years the number of attacks on U.S. networks has continued to grow at an exponential rate. This includes malicious embedded code, exploitation of backdoors, and more. These attacks can be initiated from anywhere in the world from behind a computer with a masked Internet Protocol (IP) address. This type of warfare, cyber warfare, changes the landscape of war itself (Beidleman, 2009). This type ...


On Modeling Eavesdropping Attacks In Wireless Networks, Xuran Li, Jianlong Xu, Hong-Ning Dai, Qinglin Zhao, Chak Fong Cheang, Qiu Wang Oct 2014

On Modeling Eavesdropping Attacks In Wireless Networks, Xuran Li, Jianlong Xu, Hong-Ning Dai, Qinglin Zhao, Chak Fong Cheang, Qiu Wang

Hong-Ning Dai

This paper concerns the eavesdropping attacks from the eavesdroppers’ perspective, which is new since most of current studies consider the problem from the good nodes’ perspective. In this paper, we originally propose an analytical framework to quantify the effective area and the probability of the eavesdropping attacks. This framework enables us to theoretically evaluate the impact of node density, antenna model, and wireless channel model on the eavesdropping attacks. We verify via extensive simulations that the proposed analytical framework is very accurate. Our results show that the probability of eavesdropping attacks significantly vary, depending on the wireless environments (such as ...


Sptf: Smart Photo-Tagging Framework On Smart Phones, Hao Xu, Hong-Ning Dai, Walter Hon-Wai Lau Aug 2014

Sptf: Smart Photo-Tagging Framework On Smart Phones, Hao Xu, Hong-Ning Dai, Walter Hon-Wai Lau

Hong-Ning Dai

Smart phones, as one of the most important platforms for personal communications and mobile computing, have evolved with various embedded devices, such as cameras, Wi-Fi transceivers, Bluetooth transceivers and sensors. Specifically, the photos taken by a smart phone has the approximate or even equivalent image quality to that of a professional camera. As a result, smart phones have become the first choice for people to take photos to record their ordinary life. However, how to manage thousands of photos on a smart phone becomes a challenge. In this paper, we propose a new architecture in terms of Smart Photo-Tagging Framework ...