Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 38

Full-Text Articles in Computer Engineering

Energy Aware Forwarding In Content Centric Based Multihop Wireless Ad Hoc Networks, Rana Asif Rehman, Byung-Seo Kim Dec 2015

Energy Aware Forwarding In Content Centric Based Multihop Wireless Ad Hoc Networks, Rana Asif Rehman, Byung-Seo Kim

Rana Asif Rehman

Content centric networking (CCN) is a newly proposed futuristic Internet paradigm in which communication depends on the decoupling of content names from their locations. In CCN-based multihop wireless ad hoc networks, the participating nodes show dynamic topology, intermittent connectivity, channels fluctuation, and severe constraints such as limited battery power. In the case of traffic congestion, the affected nodes die early owing to the shortage of battery power. Consequently, all pending request entries are also destroyed, which further degrades the network performance as well as the node working lifetime. In this study, we have proposed a novel energy aware transmission scheme ...


Migration From Copper To Fiber Access Network Using Passive Optical Network For Green And Dry Field Areas Of Pakistan, Umar Farooq Sep 2015

Migration From Copper To Fiber Access Network Using Passive Optical Network For Green And Dry Field Areas Of Pakistan, Umar Farooq

Umar Farooq

Passive Optical Networks (PON) technology brings an evolution in the industry of Telecommunication for the provisioning of High Speed Internet (HSI) and Triple Play bundled Services that includes Voice, Data, and Video Streaming throughout the world. In Pakistan most of the service providers are offering broadband services on traditional copper OSP (Outside Plant) network since 2000. Demand for the high speed internet and broadband is increasing rapidly, it is desired with great need to migrate from traditional copper based OSP network to PON – FTTx (Fiber To The x) infrastructure. Considering the geographical requirements in Pakistan a scalable fiber network is ...


Efficient Logarithmic Function Approximation, Amjad F. Hajjar, Mohammad H. Awedh Jul 2015

Efficient Logarithmic Function Approximation, Amjad F. Hajjar, Mohammad H. Awedh

Innovative Research Publications IRP India

A criteria is developed for the approximations of a logarithmic function to piecewise straight lines at multiple segments such that the maximum absolute error is minimized.The optimum cutting points for segmentation are estimated numerically with an exhaustive search. Our hardware implementation is restricted to integer operations (addition and shifting).


Not Just A Tool. Taking Context Into Account In The Development Of A Mobile App For Rural Water Supply In Tanzania, Robert Hoppe, Anne Wesselink, Rob Lemmens Jun 2015

Not Just A Tool. Taking Context Into Account In The Development Of A Mobile App For Rural Water Supply In Tanzania, Robert Hoppe, Anne Wesselink, Rob Lemmens

Robert Hoppe

The 'eGovernance' hype around the potential of mobile phone and geoweb technologies for enhancing 'good governance' is soaring. In East Africa, the extensive use of mobile telephony adds to the imagined promises of ICT. We reflect on the assumptions made by the proponents of such tools, using our own action research project as an example. We took great care to consider context in the development of software for enhancing empowerment and accountability in rural water supply in Tanzania. However, we found that the rural water supply context in Tanzania is much more complex than the contexts for which successful mApps ...


Ndn-Crahns: Named Data Networking For Cognitive Radio Ad Hoc Networks, Rana Asif Rehman, Jong Kim, Byung-Seo Kim Jun 2015

Ndn-Crahns: Named Data Networking For Cognitive Radio Ad Hoc Networks, Rana Asif Rehman, Jong Kim, Byung-Seo Kim

Rana Asif Rehman

Named data networking (NDN) is a newly proposed paradigm for future Internet, in which communication among nodes is based on data names, decoupling from their locations. In dynamic and self-organized cognitive radio ad hoc networks (CRAHNs), it is difficult to maintain end-to-end connectivity between ad hoc nodes especially in the presence of licensed users and intermittent wireless channels. Moreover, IP-based CRAHNs have several issues like scalability, inefficient-mapping, poor resource utilization, and location dependence. By leveraging the advantages of NDN, in this paper, we propose a new cross layer fine-grained architecture called named data networking for cognitive radio ad hoc networks ...


Pitch Detection Of Speech Signal Using Wavelet Transform, Innovative Research Publications Irp India, Amin Shadravan Lalezari, Jalil Shirazi May 2015

Pitch Detection Of Speech Signal Using Wavelet Transform, Innovative Research Publications Irp India, Amin Shadravan Lalezari, Jalil Shirazi

Innovative Research Publications IRP India

Pitch frequency is the fundamental frequency of a speech signal. It is one of the most important parameters for speech signal processing. The simulated results on Keele pitch reference database show that the performance of the proposed wavelet transform based pitch detection algorithm is obviously better than the original AMDF and its improvements based algorithms


A Software Defined Radio Communications System For A Small Spacecraft, Michael Hlas, Jeremy Straub, Ronald Marsh Apr 2015

A Software Defined Radio Communications System For A Small Spacecraft, Michael Hlas, Jeremy Straub, Ronald Marsh

Jeremy Straub

Software defined radios (SDRs) are poised to significantly enhance the future of small spacecraft communications. They allow signal processing to be performed on a computer by software rather than requiring dedicated hardware. The OpenOrbiter SDR (discussed in [1] and refined in [2]) takes data from the flight computer and converts it into an analog signal that is transmitted via the spacecraft antenna. Because the signal processing is done in software, the radio can be easily reconfigured. This process is done in reverse for incoming transmissions, which are received by the SDR and decoded by software. Figures 1 and 2 provide ...


Creating A Low-Cost Radio For An Open Cubesat, Michael Wegerson, Jeremy Straub, Ronald Marsh Apr 2015

Creating A Low-Cost Radio For An Open Cubesat, Michael Wegerson, Jeremy Straub, Ronald Marsh

Jeremy Straub

A reliable communication system is key to the success of a CubeSat mission, allowing for data to be trans-mitted to the ground station and commands to be up-loaded to the satellite. To satisfy this need, the OpenOrbiter satellite (a 1-U CubeSat [1], being devel-oped with a target parts budget of under $5,000 [2]) is leveraging previously space-tested [3], low-cost trans-ceiver design which is based on the SI 4463 IC unit. This board design will be included in the publically available Open Framework for Educational Nanosatel-lites (OPEN) allowing others to modify, enhance and/or make use of the design in ...


Three-Dimensional Printing And Scanning Web-Based Job Management System, Stephanie Hollman, Dalyn Limesand, Jeremy Straub, Scott Kerlin Apr 2015

Three-Dimensional Printing And Scanning Web-Based Job Management System, Stephanie Hollman, Dalyn Limesand, Jeremy Straub, Scott Kerlin

Jeremy Straub

Three-dimensional (3D) printers have gained popularity for use for many different projects. The work presented herein aims to make this process simpler. This poster discusses a system that will allow individuals from all over campus to submit object files for printing, without having to schedule appointments and schedule 3D scanning appointments and retrieve scan results.


Analysis Of A ‘Turn-Key’ No Hardware Space Mission Using The Orbital Services Model, Jeremy Straub Mar 2015

Analysis Of A ‘Turn-Key’ No Hardware Space Mission Using The Orbital Services Model, Jeremy Straub

Jeremy Straub

Many applications that would benefit from access to space cannot afford the cost of spacecraft development, launch and operations. Other operations require only a fraction of a spacecraft or complete use of a spacecraft for a limited period of time. This paper considers the value of a ‘turn-key’ style space mission. It considers what types of missions could be reasonably conducted using this approach. The economics of being a service provider are considered. Then, a prospective mission concept for one OSM ‘turn-key’ mission is presented. The value proposition of this mission is assessed and the hardware and other capabilities required ...


Small Satellite Communications Security And Student Learning In The Development Of Ground Station Software, Scott Kerlin, Jeremy Straub, Jacob Huhn, Alexander Lewis Mar 2015

Small Satellite Communications Security And Student Learning In The Development Of Ground Station Software, Scott Kerlin, Jeremy Straub, Jacob Huhn, Alexander Lewis

Jeremy Straub

Communications security is gaining importance as small spacecraft include actuator capabilities (i.e., propulsion), payloads which could be misappropriated (i.e., high resolution cameras), and research missions with high value/cost. However, security is limited by capability, interoperability and regulation. Additionally, as the small satellite community becomes more mainstream and diverse, the lack of cheap, limited-to-no configuration, pluggable security modules for small satellites also presents a limit for user adoption of security.

This paper discusses a prospective approach for incorporating robust security into a student-developed ground station created at the University of North Dakota as part of a Computer Science ...


Enhanced Routing Protocol For Multihop Cognitive Radio Wireless Networks, Rana Asif Rehman, Chan-Min Park, Byung-Seo Kim Jan 2015

Enhanced Routing Protocol For Multihop Cognitive Radio Wireless Networks, Rana Asif Rehman, Chan-Min Park, Byung-Seo Kim

Rana Asif Rehman

Since multihop cognitive radio wireless networks are resource-constraint networks, there is a need of routing scheme that takes into account the parameters like channel information, node’s remaining energies, end-to-end latency etc., while performing routing process. In this paper, we have proposed a reliable and efficient routing scheme for multihop cognitive radio wireless networks. The proposed protocol is on-demand and reactive protocol that considers both delay and energy along the route. By using simulations, it shows that proposed scheme performs better as compared to other ones.


Intelligent Items Traceability System – Rfid Vs Qr, Masoud Shakiba, Mandeep Singh Jit Singh, Mardina Abdullah Jan 2015

Intelligent Items Traceability System – Rfid Vs Qr, Masoud Shakiba, Mandeep Singh Jit Singh, Mardina Abdullah

Masoud Shakiba

Nowadays traceability systems are an inseparable part of international business and are essential in manufacturing and supply chain management systems. The advantages of the traceability system are more obvious for products that are exported and those imported from overseas. Traceability is highly important in food management and for products with short expiry. In recent years there have been several investigations and publications on traceability systems criteria especially in the food industry in the US, Europe and Southeast Asia.


Introduction To Anti-Collision Algorithms And Estimation Methods In Rfid Systems, Masoud Shakiba Oct 2014

Introduction To Anti-Collision Algorithms And Estimation Methods In Rfid Systems, Masoud Shakiba

Masoud Shakiba

The main objective of Radio Frequency Identification (RFID) systems is to provide fast identification for tagged objects. The noteworthy advantage of RFID technology, is its capability to identify objects simultaneously. However, when radio frequency signals are emitted simultaneously, there is a probability of collision occurrence, and thereby resulting in a waste of resources. Collision is a time-consuming event that reduces the performance of RFID systems. Consequently, several anti-collision algorithms have been proposed in the literature, attempt to decrease the collision occurrence probability. In almost all the existing anti-collision algorithms, a prior knowledge of the number of tags has a significant ...


L2er: Low-Latency And Energy-Based Routing Protocol For Cognitive Radio Ad Hoc Networks, Rana Asif Rehman, Byung-Seo Kim Sep 2014

L2er: Low-Latency And Energy-Based Routing Protocol For Cognitive Radio Ad Hoc Networks, Rana Asif Rehman, Byung-Seo Kim

Rana Asif Rehman

Cognitive radio ad hoc networks (CRAHNs) are active, self-organized, and dynamic networks, in which cognitive users can communicate with each other in an ad hoc fashion. Various delay and energy-based routing protocols have been proposed for CRAHNs. However, these protocols do not consider the delay and node energy in the routing process, which can significantly affect performance. Delay and node energy are important factors in ad hoc networks in which devices have limited power. In this paper, we propose a new routing protocol, named low-latency and energy-based routing (L2ER) protocol; it considers both delay and energy for the routing decisions ...


Introduction To Rfid Technology And Collision Problem, Masoud Shakiba May 2014

Introduction To Rfid Technology And Collision Problem, Masoud Shakiba

Masoud Shakiba

Radio Frequency Identification (RFID) system is a new communication technology to identify the objects using electromagnetic waves. The main superiority of RFID systems in comparison with other identification systems, such as barcodes, is its ability in simultaneous identification process, but when more than one tag wants to communicate with the reader, collision problem occurs and wastes time and increases energy consumption. This reduces efficiency of the identification process in RFID systems. Collision problem happens when the reader has to identify more than one tag at the same time. Consequently, it is essential to develop an efficient anti-collision algorithm to save ...


Why Hybrid Mail Has Got The International Factor, Jacob Johnsen Jan 2014

Why Hybrid Mail Has Got The International Factor, Jacob Johnsen

Jacob Johnsen, MSc

Hybrid mail is instrumental to the development of international mail, as Jacob Johnsen explains in this article


Greek Patent Protection System And The Impacts Of Information Technology Industry, Emmanouil Alexander Zografakis Ez Feb 2013

Greek Patent Protection System And The Impacts Of Information Technology Industry, Emmanouil Alexander Zografakis Ez

Emmanouil Alexander Zografakis EZ

Our era can be characterized as the era of knowledge proliferation and bountifulness. That has marked our era as the era following the pace of the Information Society Development. Information Society has also brought about a remarkable IT development pace over countries. Thereby, it is greatly important all that raw knowledge to become mind figments, ideas and even inventions and innovations. It is also essential to highlight that such a beneficial process will ensure the continuity of the IT development. The only way to achieve that goal is to find a way to secure all that aforementioned knowledge which is ...


Efficient Delay And Energy Based Routing In Cognitive Radio Ad Hoc Networks, Rana Asif Rehman, Muhammad Sher, Muhammad Khalil Afzal Oct 2012

Efficient Delay And Energy Based Routing In Cognitive Radio Ad Hoc Networks, Rana Asif Rehman, Muhammad Sher, Muhammad Khalil Afzal

Rana Asif Rehman

Cognitive radio ad hoc networks (CRAHNs) are multi-hop, dynamic and self-configurable networks, which can communicate without any infrastructure support. Most of the research in CRAHNs has been already carried out on physical and media access control layers, but without effective routing protocols we cannot take full advantage of CRAHNs. In this paper, we discuss the problems in already proposed routing protocols for cognitive radio networks and proposed a novel protocol: Delay and Energy based Spectrum Aware Routing Protocol (DESAR), which consider both delay and energy for the computation of efficient path between source and destination. Simulation results show that DESAR ...


Large Scale Processing And Storage Solution: Dna Safeguard Project, Eric Copp Oct 2012

Large Scale Processing And Storage Solution: Dna Safeguard Project, Eric Copp

Eric Copp

The DNA Safeguard project involves processing DNA sequence data in order to find nullomer sequences (non-existent short DNA sequences). While the fundamental algorithm for finding nullomer sequences is simple, it is complicated by the amount of data that must be handled. Four methods for handling terabytes of of data are investigated, single instance of a MySQL database, PVFS (Parallel Virtual File System), Hadoop, and a custom MPI (Message Passing Interface) program.


Unlibguiding Libguides: Using Jquery And Css With Campus Guides To Make Libguides A True Web Cms, M Ryan Hess Jul 2012

Unlibguiding Libguides: Using Jquery And Css With Campus Guides To Make Libguides A True Web Cms, M Ryan Hess

M Ryan Hess

DePaul University's Library Web Services team investigated the potential of Springshare CampusGuides for serving as a web content management system. The team overrode system CSS, added JQuery libraries and features, integrated an external SQL database into the site and leveraged the workflows and functionalities of Campus Guides to make it a more powerful WCMS.


Comparing Qos Of Dsdv And Aodv Routing Protocols In Vehicular Network, Aref Hassanpour, Hooman Hoodeh, Amirhossein Zarrinnegar, Arsalan Emami, Rafidah Md Noor Jan 2012

Comparing Qos Of Dsdv And Aodv Routing Protocols In Vehicular Network, Aref Hassanpour, Hooman Hoodeh, Amirhossein Zarrinnegar, Arsalan Emami, Rafidah Md Noor

Hooman Hoodeh

With the advance of Vehicular ad-hoc network, routing protocol has become one of the most important issues in transmitting data among Vehicles. The two routing protocol are DSDV and AODV which DSDV is known as a novel approach in proactive system; however, AODV has good performance in reactive system. In this paper, we compare the efficiency between DSDV & AODV in terms of packet-loss, end-to-end delay and throughput based on given scenarios. The comparison has implemented in various speeds for acquiring result with higher performance. The speeds consist of 5, 20 and 40km/s. then we analyze the explicit results according ...


Public Consultations On Net Neutrality 2010: Usa, Eu And France, Sulan Wong, Julio Rojas Mora, Eitan Altman Sep 2010

Public Consultations On Net Neutrality 2010: Usa, Eu And France, Sulan Wong, Julio Rojas Mora, Eitan Altman

Julio Rojas-Mora

The evolution of the Internet has come to a point where almost at the same time, governments all around the world feel the need for legislation to regulate the use of the Internet. In preparing the legislation, consultations were called by various governments or by the corresponding regulation bodies. We describe in this paper the various consultations as well as the background related to the Net Neutrality question in each case. Rather than describing the answers to each consultation, which are available and which have already been analyzed, we focus on comparing the consultations and the statistical figures related to ...


A Nsdv Approach For Channel Allocation Under Hybrid Mode Of Mobile Computing, Vijay Singh Mar 2009

A Nsdv Approach For Channel Allocation Under Hybrid Mode Of Mobile Computing, Vijay Singh

vijay singh

No abstract provided.


Biologically Inspired Metaheuristic Algorithm For Solving Symmetric Tsp, Vijay Singh Mar 2009

Biologically Inspired Metaheuristic Algorithm For Solving Symmetric Tsp, Vijay Singh

vijay singh

No abstract provided.


A Proposed Dsm-Secure Fair Allocation Cooperative Transactional Model For Manet., Vijay Singh Mar 2009

A Proposed Dsm-Secure Fair Allocation Cooperative Transactional Model For Manet., Vijay Singh

vijay singh

No abstract provided.


An Approach Of Optimized Utilization Of Battery Backup In Manet, Vijay Singh Feb 2009

An Approach Of Optimized Utilization Of Battery Backup In Manet, Vijay Singh

vijay singh

No abstract provided.


Novel Materialized View Selection In A Multidimensional Database, Vijay Singh Feb 2009

Novel Materialized View Selection In A Multidimensional Database, Vijay Singh

vijay singh

No abstract provided.


Inventions On Using Ldap For Different Purposes-Part-1, Umakant Mishra Sep 2006

Inventions On Using Ldap For Different Purposes-Part-1, Umakant Mishra

Umakant Mishra

The objective of this article is to know how is LDAP used for applications in e-commerce and Policy Management. The analysis of patents shows which Inventive Principles have been used to solve those inventions. Unlike other parts of the study which have tried to improve certain aspect of LDAP technology and application, this article includes the inventions that use LDAP for various different purposes. This article is divided into 3 parts for convenience of size. The first part of the article includes 6 patents using LDAP for “e-commerce” and “Policy Management”. The second part includes 10 patents using LDAP for ...


Inventions On Ldap Data Management- A Triz Based Analysis, Umakant Mishra Aug 2006

Inventions On Ldap Data Management- A Triz Based Analysis, Umakant Mishra

Umakant Mishra

The data model of LDAP is same as X.500 data model. The LDAP protocol assumes there are one or more servers, which jointly provide access to a Directory Information Tree (DIT). The tree is made up of entries. Entries have relative distinguished name (RDN), which must be unique among all its siblings. The concatenation of the relative distinguished names from a particular entry to an immediate subordinate of the root of the tree forms the Distinguished Name (DN) for that entry. (IETF, RFC 2251).

LDAP provides add, delete and modify operations for data modification. Each of these LDAP update ...