Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Computer Engineering

Stability In Government, Emerging Technology, And Decentralized Economies: An Analysis Of Alternative Uses Of Cryptocurrencies, Mickayla Stogsdill May 2019

Stability In Government, Emerging Technology, And Decentralized Economies: An Analysis Of Alternative Uses Of Cryptocurrencies, Mickayla Stogsdill

Chancellor’s Honors Program Projects

No abstract provided.


Increasing Engineering Retention With Mobile Technology: Using Ux/Ui For Us, James H. Cate Jr., Andrey Karnauch, Dakota Sanders, Matt Matto Dec 2018

Increasing Engineering Retention With Mobile Technology: Using Ux/Ui For Us, James H. Cate Jr., Andrey Karnauch, Dakota Sanders, Matt Matto

Chancellor’s Honors Program Projects

No abstract provided.


Scalable High-Speed Communications For Neuromorphic Systems, Aaron Reed Young Aug 2017

Scalable High-Speed Communications For Neuromorphic Systems, Aaron Reed Young

Masters Theses

Field-programmable gate arrays (FPGA), application-specific integrated circuits (ASIC), and other chip/multi-chip level implementations can be used to implement Dynamic Adaptive Neural Network Arrays (DANNA). In some applications, DANNA interfaces with a traditional computing system to provide neural network configuration information, provide network input, process network outputs, and monitor the state of the network. The present host-to-DANNA network communication setup uses a Cypress USB 3.0 peripheral controller (FX3) to enable host-to-array communication over USB 3.0. This communications setup has to run commands in batches and does not have enough bandwidth to meet the maximum throughput requirements of the ...


The Design And Validation Of A Wireless Bat-Mounted Sonar Recording System, Jeremy Joseph Langford Aug 2016

The Design And Validation Of A Wireless Bat-Mounted Sonar Recording System, Jeremy Joseph Langford

Masters Theses

Scientists studying the behavior of bats monitor their echolocation calls, as their calls are important for navigation and feeding, but scientist are typically restricted to ground-based recording. Recording bat calls used for echolocation from the back of the bat as opposed to the ground offers the opportunity to study bat echolocation from a vantage otherwise only offered to the bats themselves. However, designing a bat mounted in-flight audio recording system, (bat-tag), capable of recording the ultra-sound used in bat echolocation presents a unique set of challenges. Chiefly, the bat-tag must be sufficiently light weight as to not overburden the bat ...


Topology Design And Delay Control For Communication Networks In Smart Grid, Xiaodong Wang Aug 2016

Topology Design And Delay Control For Communication Networks In Smart Grid, Xiaodong Wang

Doctoral Dissertations

Stability is a critical concern in the design and maintenance of power systems. Different approaches have been proposed for the analysis of power grid stability in various scenarios depending on small or large perturbations and the speed of the phenomenon of interest. In this work, we consider the power grid as a group of flocking birds, as synchronization is the key issue in both contexts. The framework of partial difference equation (PdE) is used to analyze the system stability, when designing the communication network of the power grid network for conveying measurements between different power stations. Both the cases where ...


Data Security And Privacy In Smart Grid, Yue Tong Aug 2015

Data Security And Privacy In Smart Grid, Yue Tong

Doctoral Dissertations

This dissertation explores novel data security and privacy problems in the emerging smart grid.

The need for data security and privacy spans the whole life cycle of the data in the smart grid, across the phases of data acquisition, local processing and archiving, collaborative processing, and finally sharing and archiving. The first two phases happen in the private domains of an individual utility company, where data are collected from the power system and processed at the local facilities. When data are being acquired and processed in the private domain, data security is the most critical concern. The key question is ...


Barrier Coverage In Wireless Sensor Networks, Zhibo Wang Aug 2014

Barrier Coverage In Wireless Sensor Networks, Zhibo Wang

Doctoral Dissertations

Barrier coverage is a critical issue in wireless sensor networks (WSNs) for security applications, which aims to detect intruders attempting to penetrate protected areas. However, it is difficult to achieve desired barrier coverage after initial random deployment of sensors because their locations cannot be controlled or predicted. In this dissertation, we explore how to leverage the mobility capacity of mobile sensors to improve the quality of barrier coverage.

We first study the 1-barrier coverage formation problem in heterogeneous sensor networks and explore how to efficiently use different types of mobile sensors to form a barrier with pre-deployed different types of ...


Achieving Energy Efficiency On Networking Systems With Optimization Algorithms And Compressed Data Structures, Yanjun Yao May 2014

Achieving Energy Efficiency On Networking Systems With Optimization Algorithms And Compressed Data Structures, Yanjun Yao

Doctoral Dissertations

To cope with the increasing quantity, capacity and energy consumption of transmission and routing equipment in the Internet, energy efficiency of communication networks has attracted more and more attention from researchers around the world. In this dissertation, we proposed three methodologies to achieve energy efficiency on networking devices: the NP-complete problems and heuristics, the compressed data structures, and the combination of the first two methods.

We first consider the problem of achieving energy efficiency in Data Center Networks (DCN). We generalize the energy efficiency networking problem in data centers as optimal flow assignment problems, which is NP-complete, and then propose ...


Tor Bridge Distribution Powered By Threshold Rsa, Jordan Hunter Deyton May 2013

Tor Bridge Distribution Powered By Threshold Rsa, Jordan Hunter Deyton

Masters Theses

Since its inception, Tor has offered anonymity for internet users around the world. Tor now offers bridges to help users evade internet censorship, but the primary distribution schemes that provide bridges to users in need have come under attack. This thesis explores how threshold RSA can help strengthen Tor's infrastructure while also enabling more powerful bridge distribution schemes. We implement a basic threshold RSA signature system for the bridge authority and a reputation-based social network design for bridge distribution. Experimental results are obtained showing the possibility of quick responses to requests from honest users while maintaining both the secrecy ...


A Framework For Federated Two-Factor Authentication Enabling Cost-Effective Secure Access To Distributed Cyberinfrastructure, Matthew Allan Ezell May 2012

A Framework For Federated Two-Factor Authentication Enabling Cost-Effective Secure Access To Distributed Cyberinfrastructure, Matthew Allan Ezell

Masters Theses

As cyber attacks become increasingly sophisticated, the security measures used to mitigate the risks must also increase in sophistication. One time password (OTP) systems provide strong authentication because security credentials are not reusable, thus thwarting credential replay attacks. The credential changes regularly, making brute-force attacks significantly more difficult. In high performance computing, end users may require access to resources housed at several different service provider locations. The ability to share a strong token between multiple computing resources reduces cost and complexity.

The National Science Foundation (NSF) Extreme Science and Engineering Discovery Environment (XSEDE) provides access to digital resources, including supercomputers ...


Building Effective Ontology For Semantic Web: A Discussion Based On Practical Examples, Tianmu Zhang Dec 2011

Building Effective Ontology For Semantic Web: A Discussion Based On Practical Examples, Tianmu Zhang

School of Information Sciences -- Faculty Publications and Other Works

The study aims to investigate semantic web and create useful ontology as a teaching and educational tool for others interested in learning more about Semantic web. This paper discussed several emerging issues about the semantic web and ontology building. This paper combines ontology implementation examples with research topics to identify current issues and potential solution in both application and theoretical level. It concludes that although semantic web and ontology technology are not mature enough currently, there is a clear tendency for them to be integrated into various applications to exert synergies.


Distributed Data Aggregation For Sparse Recovery In Wireless Sensor Networks, Shuangjiang Li Dec 2011

Distributed Data Aggregation For Sparse Recovery In Wireless Sensor Networks, Shuangjiang Li

Masters Theses

We consider the approximate sparse recovery problem in Wireless Sensor Networks (WSNs) using Compressed Sensing/Compressive Sampling (CS). The goal is to recover the $n \mbox{-}$dimensional data values by querying only $m \ll n$ sensors based on some linear projection of sensor readings. To solve this problem, a two-tiered sampling model is considered and a novel distributed compressive sparse sampling (DCSS) algorithm is proposed based on sparse binary CS measurement matrix. In the two-tiered sampling model, each sensor first samples the environment independently. Then the fusion center (FC), acting as a pseudo-sensor, samples the sensor network to select a ...


Collaborative Solutions To Visual Sensor Networks, Mahmut Karakaya Aug 2011

Collaborative Solutions To Visual Sensor Networks, Mahmut Karakaya

Doctoral Dissertations

Visual sensor networks (VSNs) merge computer vision, image processing and wireless sensor network disciplines to solve problems in multi-camera applications in large surveillance areas. Although potentially powerful, VSNs also present unique challenges that could hinder their practical deployment because of the unique camera features including the extremely higher data rate, the directional sensing characteristics, and the existence of visual occlusions.

In this dissertation, we first present a collaborative approach for target localization in VSNs. Traditionally; the problem is solved by localizing targets at the intersections of the back-projected 2D cones of each target. However, the existence of visual occlusions among ...


Cyber Profiling For Insider Threat Detection, Akaninyene Walter Udoeyop Aug 2010

Cyber Profiling For Insider Threat Detection, Akaninyene Walter Udoeyop

Masters Theses

Cyber attacks against companies and organizations can result in high impact losses that include damaged credibility, exposed vulnerability, and financial losses. Until the 21st century, insiders were often overlooked as suspects for these attacks. The 2010 CERT Cyber Security Watch Survey attributes 26 percent of cyber crimes to insiders. Numerous real insider attack scenarios suggest that during, or directly before the attack, the insider begins to behave abnormally. We introduce a method to detect abnormal behavior by profiling users. We utilize the k-means and kernel density estimation algorithms to learn a user’s normal behavior and establish normal user profiles ...