Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Computer Engineering

A Novel Path Loss Forecast Model To Support Digital Twins For High Frequency Communications Networks, James Marvin Taylor Jr Jul 2020

A Novel Path Loss Forecast Model To Support Digital Twins For High Frequency Communications Networks, James Marvin Taylor Jr

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

The need for long-distance High Frequency (HF) communications in the 3-30 MHz frequency range seemed to diminish at the end of the 20th century with the advent of space-based communications and the spread of fiber optic-connected digital networks. Renewed interest in HF has emerged as an enabler for operations in austere locations and for its ability to serve as a redundant link when space-based and terrestrial communication channels fail. Communications system designers can create a “digital twin” system to explore the operational advantages and constraints of the new capability. Existing wireless channel models can adequately simulate communication channel conditions with …


The Discrete Spring Transform: An Innovative Steganographic Attack, Aaron T. Sharp Jan 2017

The Discrete Spring Transform: An Innovative Steganographic Attack, Aaron T. Sharp

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Digital Steganography continues to evolve today, where steganographers are constantly discovering new methodologies to hide information effectively. Despite this, steganographic attacks, which seek to defeat these techniques, have continually lagged behind. The reason for this is simple: it is exceptionally difficult to defeat the unknown. Most attacks require prior knowledge or study of existing techniques in order to defeat them, and are often highly specific to certain cover media. These constraints are impractical and unrealistic to defeat steganography in modern communication networks. It follows, an effective steganographic attack must not require prior knowledge or study of techniques, and must be …


Wireless Embedded Smart Cameras: Performance Analysis And Their Application To Fall Detection For Eldercare., Alvaro Pinto Jul 2011

Wireless Embedded Smart Cameras: Performance Analysis And Their Application To Fall Detection For Eldercare., Alvaro Pinto

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Wireless Embedded Smart Camera Networks has received a lot of attention from academia and industry because they are small in size and easy to deploy, and they offer a multitude of attractive applications. They can be used for embedded single unit applications, or can be networked for multi-camera applications.

We first analyze three different operation scenarios for a wireless vision sensor network wherein different levels of local processing is performed. A detailed quantitative comparison of three operation scenarios are presented in terms of energy consumption and latency. This quantitative analysis provides the motivation for performing high-level local processing and decision …