Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Computer Engineering

Enhanced Multimedia Exchanges Over The Internet, Fuad Shamieh Jun 2019

Enhanced Multimedia Exchanges Over The Internet, Fuad Shamieh

Electronic Thesis and Dissertation Repository

Although the Internet was not originally designed for exchanging multimedia streams, consumers heavily depend on it for audiovisual data delivery. The intermittent nature of multimedia traffic, the unguaranteed underlying communication infrastructure, and dynamic user behavior collectively result in the degradation of Quality-of-Service (QoS) and Quality-of-Experience (QoE) perceived by end-users. Consequently, the volume of signalling messages is inevitably increased to compensate for the degradation of the desired service qualities. Improved multimedia services could leverage adaptive streaming as well as blockchain-based solutions to enhance media-rich experiences over the Internet at the cost of increased signalling volume. Many recent studies in the literature ...


Real-Time Intrusion Detection Using Multidimensional Sequence-To-Sequence Machine Learning And Adaptive Stream Processing, Gobinath Loganathan Aug 2018

Real-Time Intrusion Detection Using Multidimensional Sequence-To-Sequence Machine Learning And Adaptive Stream Processing, Gobinath Loganathan

Electronic Thesis and Dissertation Repository

A network intrusion is any unauthorized activity on a computer network. There are host-based and network-based Intrusion Detection Systems (IDS's), of which there are each signature-based and anomaly-based detection methods. An anomalous network behavior can be defined as an intentional violation of the expected sequence of packets. In a real-time network-based IDS, incoming packets are treated as a stream of data. A stream processor takes any stream of data or events and extracts interesting patterns on the fly. This representation allows applying statistical anomaly detection using sequence prediction algorithms as well as using a stream processor to perform signature-based ...


Intelligent Advancements In Location Management And C-Ran Power-Aware Resource Allocation, Emad Ali Aqeeli Dec 2017

Intelligent Advancements In Location Management And C-Ran Power-Aware Resource Allocation, Emad Ali Aqeeli

Electronic Thesis and Dissertation Repository

The evolving of cellular networks within the last decade continues to focus on delivering a robust and reliable means to cope with the increasing number of users and demanded capacity. Recent advancements of cellular networks such as Long-Term Evolution (LTE) and LTE-advanced offer a remarkable high bandwidth connectivity delivered to the users. Signalling overhead is one of the vital issues that impact the cellular behavior. Causing a significant load in the core network hence effecting the cellular network reliability. Moreover, the signaling overhead decreases the Quality of Experience (QoE) of users. The first topic of the thesis attempts to reduce ...


Machs: Mitigating The Achilles Heel Of The Cloud Through High Availability And Performance-Aware Solutions, Manar Jammal Apr 2017

Machs: Mitigating The Achilles Heel Of The Cloud Through High Availability And Performance-Aware Solutions, Manar Jammal

Electronic Thesis and Dissertation Repository

Cloud computing is continuously growing as a business model for hosting information and communication technology applications. However, many concerns arise regarding the quality of service (QoS) offered by the cloud. One major challenge is the high availability (HA) of cloud-based applications. The key to achieving availability requirements is to develop an approach that is immune to cloud failures while minimizing the service level agreement (SLA) violations. To this end, this thesis addresses the HA of cloud-based applications from different perspectives. First, the thesis proposes a component’s HA-ware scheduler (CHASE) to manage the deployments of carrier-grade cloud applications while maximizing ...


Modelling And Analysis Of Smart Grids For Critical Data Communication, Abdulfattah Noorwali Dec 2016

Modelling And Analysis Of Smart Grids For Critical Data Communication, Abdulfattah Noorwali

Electronic Thesis and Dissertation Repository

Practical models for the subnetworks of smart grid are presented and analyzed. Critical packet-delay bounds for these subnetworks are determined, with the overall objective of identifying parameters that would help in the design of smart grid with least end-to-end delay.

A single-server non-preemptive queueing model with prioritized critical packets is presented for Home Area Network (HAN). Closed-form expressions for critical packet delay are derived and illustrated as a function of: i) critical packet arrival rate, ii) service rate, iii) utilization factor, and iv) rate of arrival of non-critical packets. Next, wireless HANs using FDMA and TDMA are presented. Upper and ...


Climbing Up Cloud Nine: Performance Enhancement Techniques For Cloud Computing Environments, Mohamed Abusharkh Jul 2016

Climbing Up Cloud Nine: Performance Enhancement Techniques For Cloud Computing Environments, Mohamed Abusharkh

Electronic Thesis and Dissertation Repository

With the transformation of cloud computing technologies from an attractive trend to a business reality, the need is more pressing than ever for efficient cloud service management tools and techniques. As cloud technologies continue to mature, the service model, resource allocation methodologies, energy efficiency models and general service management schemes are not yet saturated. The burden of making this all tick perfectly falls on cloud providers. Surely, economy of scale revenues and leveraging existing infrastructure and giant workforce are there as positives, but it is far from straightforward operation from that point. Performance and service delivery will still depend on ...


Spectrally Efficient Cooperative Relay Networks Using Signal Space Diversity, Muhammad Ajmal Khan Jun 2016

Spectrally Efficient Cooperative Relay Networks Using Signal Space Diversity, Muhammad Ajmal Khan

Electronic Thesis and Dissertation Repository

Cooperative relaying has received widespread attention in recent years from both academic and industrial communities. It offers significant benefits in enabling connectivity as well as in increasing coverage, power saving, spatial diversity and channel capacity. However, one of the main limitations of the conventional cooperative relaying system is the repetition of the received data by the relays, which reduces the spectral efficiency and the data rate. In this thesis, signal space diversity (SSD) based technique is proposed to incorporate into the conventional relaying system to enhance spectral efficiency, data rate and system performance.

Firstly, SSD is introduced into a two-way ...


Enhanced Indoor Localization System Based On Inertial Navigation, Rasika Lakmal Hettiarachchige Don Jan 2016

Enhanced Indoor Localization System Based On Inertial Navigation, Rasika Lakmal Hettiarachchige Don

Electronic Thesis and Dissertation Repository

An algorithm for indoor localization of pedestrians using an improved Inertial Navigation system is presented for smartphone based applications. When using standard inertial navigation algorithm, errors in sensors due to random noise and bias result in a large drift from the actual location with time. Novel corrections are introduced for the basic system to increase the accuracy by counteracting the accumulation of this drift error, which are applied using a Kalman filter framework.

A generalized velocity model was applied to correct the walking velocity and the accuracy of the algorithm was investigated with three different velocity models which were derived ...


Efficient Scheduling Algorithms For Wireless Resource Allocation And Virtualization In Wireless Networks, Mohamad Kalil Nov 2015

Efficient Scheduling Algorithms For Wireless Resource Allocation And Virtualization In Wireless Networks, Mohamad Kalil

Electronic Thesis and Dissertation Repository

The continuing growth in demand for better mobile broadband experiences has motivated rapid development of radio-access technologies to support high data rates and improve quality of service (QoS) and quality of experience (QoE) for mobile users. However, the modern radio-access technologies pose new challenges to mobile network operators (MNO) and wireless device designers such as reducing the total cost of ownership while supporting high data throughput per user, and extending battery life-per-charge of the mobile devices. In this thesis, a variety of optimization techniques aimed at providing innovative solutions for such challenges are explored.

The thesis is divided into two ...


Advanced Compression And Latency Reduction Techniques Over Data Networks, Fuad Shamieh Apr 2015

Advanced Compression And Latency Reduction Techniques Over Data Networks, Fuad Shamieh

Electronic Thesis and Dissertation Repository

Applications and services operating over Internet protocol (IP) networks often suffer from high latency and packet loss rates. These problems are attributed to data congestion resulting from the lack of network resources available to support the demand. The usage of IP networks is not only increasing, but very dynamic as well. In order to alleviate the above-mentioned problems and to maintain a reasonable Quality of Service (QoS) for the end users, two novel adaptive compression techniques are proposed to reduce packets’ payload size. The proposed schemes exploit lossless compression algorithms to perform the compression process on the packets’ payloads and ...


Efficient Arithmetic For The Implementation Of Elliptic Curve Cryptography, Ebrahim Abdulrahman Hasan Abdulrahman Nov 2013

Efficient Arithmetic For The Implementation Of Elliptic Curve Cryptography, Ebrahim Abdulrahman Hasan Abdulrahman

Electronic Thesis and Dissertation Repository

The technology of elliptic curve cryptography is now an important branch in public-key based crypto-system. Cryptographic mechanisms based on elliptic curves depend on the arithmetic of points on the curve. The most important arithmetic is multiplying a point on the curve by an integer. This operation is known as elliptic curve scalar (or point) multiplication operation. A cryptographic device is supposed to perform this operation efficiently and securely. The elliptic curve scalar multiplication operation is performed by combining the elliptic curve point routines that are defined in terms of the underlying finite field arithmetic operations. This thesis focuses on hardware ...


Application Of Computer Algebra In List Decoding, Muhammad Foizul Islam Chowdhury Nov 2013

Application Of Computer Algebra In List Decoding, Muhammad Foizul Islam Chowdhury

Electronic Thesis and Dissertation Repository

The amount of data that we use in everyday life (social media, stock analysis, satellite communication etc.) are increasing day by day. As a result, the amount of data needs to be traverse through electronic media as well as to store are rapidly growing and there exist several environmental effects that can damage these important data during travelling or while in storage devices. To recover correct information from noisy data, we do use error correcting codes. The most challenging work in this area is to have a decoding algorithm that can decode the code quite fast, in addition with the ...


Policy-Based Immunization Framework For Manet, Arash Tajalli-Yazdi Aug 2013

Policy-Based Immunization Framework For Manet, Arash Tajalli-Yazdi

Electronic Thesis and Dissertation Repository

Mobility is one of the most important driving forces of hyper-interconnected world that we are living in. Mobile computing devices are becoming smaller, more ubiquitous and simultaneously providing more computing power. Various mobile devices in diff rent sizes with high computing power cause the emergence of new type of networks' applications. Researchers in conferences, soldiers in battlefields, medics in rescue missions, and drivers in busy high- ways can perform more efficiently if they can be connected to each other and aware of the environment they are interacting with. In all mentioned scenarios, the major barrier to have an interconnected collaborative ...


Security Aspects Of Smart Grid Communication, Pubudu E. Weerathunga Aug 2012

Security Aspects Of Smart Grid Communication, Pubudu E. Weerathunga

Electronic Thesis and Dissertation Repository

As the grid becomes highly interconnected, power protection, control, and monitoring in transmission and distribution substations are increasingly relying on digital controls and digital communication. Rapid penetrations of communication into power grid, and growing concerns about cyber security have attracted significant attention towards smart grid cyber security. Cyber security in the smart grid must be carefully designed to meet power system operation’s functional and reliability requirements.

This thesis discusses issues related to the security of power system communication and their counter measures. It focuses on development of security mechanisms for secure substation communication, and analyzes the impact of security ...


Energy Efficient Reduced Complexity Multi-Service, Multi-Channel Scheduling Techniques, Dan J. Dechene Nov 2011

Energy Efficient Reduced Complexity Multi-Service, Multi-Channel Scheduling Techniques, Dan J. Dechene

Electronic Thesis and Dissertation Repository

The need for energy efficient communications is essential in current and next-generation wireless communications systems. A large component of energy expenditure in mobile devices is in the mobile radio interface. Proper scheduling and resource allocation techniques that exploit instantaneous and long-term average knowledge of the channel, queue state and quality of service parameters can be used to improve the energy efficiency of communication.

This thesis focuses on exploiting queue and channel state information as well as quality of service parameters in order to design energy efficient scheduling techniques. The proposed designs are for multi-stream, multi-channel systems and in general have ...


Optical-Wimax Hybrid Networks, Abdou R. A. Ahmed Apr 2011

Optical-Wimax Hybrid Networks, Abdou R. A. Ahmed

Electronic Thesis and Dissertation Repository

The emergence of bandwidth-intensive Internet services, such as
circuit-quality voice transfer and interactive video gaming, create
a high demand for a very qualified next-generation access network.
In addition to high bandwidth, these future access networks should
also provide improved network availability, flexibility, mobility,
reliability, failure protection, quality of service (QoS) support
and cost-effective access. The integration between optical networks
and Worldwide Interoperability for Microwave Access (WiMAX) is a
promising solution for future access networks. Accordingly, a few
different architectures and MAC protocol components have recently
been proposed for the integration between the Ethernet Passive
Optical Network (EPON) and WiMAX. However ...