Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Computer Engineering

Web Archiving At Gvsu, Annie Benefiel, Matt Schultz Oct 2017

Web Archiving At Gvsu, Annie Benefiel, Matt Schultz

Matt Schultz

In 2017, GVSU Libraries began a web archiving initiative to capture our public-facing administrative, academic, arts, university publications and other websites and documents. In this presentation, Annie Benefiel (Archivist for Collection Management) and Matt Schultz (Metadata & Digital Curation Librarian) described the policy development process, the use of Archive-It as the web archiving solution, and the internal workflows followed to accomplish this important activity of capturing GVSU's institutional record.


Access Update For Gvsu, Matt Schultz, Kyle Felker Oct 2017

Access Update For Gvsu, Matt Schultz, Kyle Felker

Matt Schultz

By Fall 2016, GVSU Libraries began making a major strategic and technology shift toward the use of open source technologies versus commercial vendor solutions for digital preservation and access. In this presentation to the Mid-Michigan Digital Practitioners (MMDP) community, Matt Schultz (Metadata & Digital Curation Librarian) and Kyle Felker (Digital Initiatives Librarian) provide updates on these new directions.


Network Connection Blocker, Method, And Computer Readable Memory For Monitoring Connections In A Computer Network And Blocking The Unwanted Connections, Douglas W. Jacobson, James A. Davis Jun 2017

Network Connection Blocker, Method, And Computer Readable Memory For Monitoring Connections In A Computer Network And Blocking The Unwanted Connections, Douglas W. Jacobson, James A. Davis

Douglas Jacobson

A network connection blocker for monitoring connections between host computers in a network and blocking the unwanted connections. The host computers transmit connection packets between each other in accordance with a network protocol suite when seeking to establish, providing network services with, and close the connections. The network protocol suite includes a connection oriented transport layer protocol. The network connection blocker comprises a network interface that receives the connection packets transmitted between the host computers. It also comprises a blocking module that processes the received connection packets to detect the unwanted connections. The blocking module then generates connection packets in …


Research Poster.Pdf, Desiree Dominguez Mar 2017

Research Poster.Pdf, Desiree Dominguez

Desiree Dominguez

Analyzing Wi-Fi probe request is essential for public safety and search and rescue missions. In this paper, we studied how Wi-Fi-probe requests are affected by different materials such as cloth, plastic, concrete, and metal when captured by Unmanned Aerial Serial (UAS) when having an attached a Wi-Fi Pineapple Tetra. Leaving the mobile devices active and setting them in a random position in an open zoned grid, the drone flying a mapping mission captured the Wi-Fi probe requests to determine the effect these materials have on the transmission of Wi-Fi probe requests. Through this method, the location of the Android Smartphones …


Lomcf: Forwarding And Caching In Named Data Networking-Based Manets, Rana Asif Rehman, Byung-Seo Kim Dec 2016

Lomcf: Forwarding And Caching In Named Data Networking-Based Manets, Rana Asif Rehman, Byung-Seo Kim

Rana Asif Rehman

Named data networking (NDN) resolves the traditional TCP/IP based Internet problems (i.e., location dependent, complex usage, scalability, poor resource utilization etc.) and is considered as an eligible candidate for futuristic Internet paradigm. In NDN-based mobile ad hoc networks (MANETs), the participating nodes are operated in highly dynamic and challenge able environment such as low battery power, channel fluctuations, intermittent connectivity and so on. Due to the broadcast nature of the wireless channel, the NDN-based MANETs highlight severe issues (e.g., packet collisions, flooding, data redundancy, packet retransmissions), which further degrade the network performance. In this paper, to cope with these problems, …