Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

Conference

Institution
Keyword
Publication Year
Publication
File Type

Articles 61 - 90 of 163

Full-Text Articles in Computer Engineering

Keep It Simple, Keep It Safe - Research On The Impacts Of Increasing Complexity Of Modern Enterprise Applications, Shawn Ware, David Phillips Mar 2018

Keep It Simple, Keep It Safe - Research On The Impacts Of Increasing Complexity Of Modern Enterprise Applications, Shawn Ware, David Phillips

UNO Student Research and Creative Activity Fair

As the Cybersecurity program within UNO continues to adapt to the ever-changing world of information systems and information security, the Cybersecurity Capstone has recently become an active, community-involvement project, where real-world organizations can receive valuable, useful research and information from students on their way towards a degree. This presentation encompasses two such projects from the Cybersecurity Capstone, looking at how modern, more complex systems can often increase system vulnerability.


How Iridium Satellite Tracker Model 9602-Lp Asset Affects Span Of Control In High Altitidue Balloning, Steven Hamby Oct 2017

How Iridium Satellite Tracker Model 9602-Lp Asset Affects Span Of Control In High Altitidue Balloning, Steven Hamby

2017 Academic High Altitude Conference

The Irdium Satelitte Network has greatly increased safety in the ballooning field by enabling a greater span of control in flight awarness and termination. This enhanced awareness stems from accurate high interval GPS coordinates that can be integrated into ground station tracking software. The Iridium Network creates the ability to send activation commands remotely with high reliabilty using emails. Additionally this feature has the ability to use local rf transmiters and recievers to increase the flexibilty of cutdown designs. The Iridium Modems provides significant coverage regardless of altitude and loss of ground communication. It is marketed at econmical price point …


2017 Eclipse Rfd-900 Still Image System, Tristan Running Crane, Uciel Garcia Olmedo, David Schwehr Oct 2017

2017 Eclipse Rfd-900 Still Image System, Tristan Running Crane, Uciel Garcia Olmedo, David Schwehr

2017 Academic High Altitude Conference

As part of the NASA Space Grant 2017 Eclipse Ballooning Project, Montana Space Grant Consortium designed a camera system capable of transmitting still images from a balloon borne payload to a remote ground station via a RFD-900 radio. This payload consists of a Raspberry Pi, a Raspberry Pi camera, custom power supply and a RFD 900MHz radio. This system was designed to record pictures at high and low resolution at altitude. The low resolution images could be selected for downlinking back to the ground via the radio, while the high resolution pictures were saved to the Raspberry Pi memory card. …


Source Anonymization Of Digital Images: A Counter–Forensic Attack On Prnu Based Source Identification Techniques, Prithviraj Sengupta, Venkata Udaya Sameer, Ruchira Naskar, Ezhil Kalaimannan May 2017

Source Anonymization Of Digital Images: A Counter–Forensic Attack On Prnu Based Source Identification Techniques, Prithviraj Sengupta, Venkata Udaya Sameer, Ruchira Naskar, Ezhil Kalaimannan

Annual ADFSL Conference on Digital Forensics, Security and Law

A lot of photographers and human rights advocates need to hide their identity while sharing their images on the internet. Hence, source–anonymization of digital images has become a critical issue in the present digital age. The current literature contains a number of digital forensic techniques for “source–identification” of digital images, one of the most efficient of them being Photo–Response Non–Uniformity (PRNU) sensor noise pattern based source detection. PRNU noise pattern being unique to every digital camera, such techniques prove to be highly robust way of source–identification. In this paper, we propose a counter–forensic technique to mislead this PRNU sensor noise …


Harnessing Predictive Models For Assisting Network Forensic Investigations Of Dns Tunnels, Irvin Homem, Panagiotis Papapetrou May 2017

Harnessing Predictive Models For Assisting Network Forensic Investigations Of Dns Tunnels, Irvin Homem, Panagiotis Papapetrou

Annual ADFSL Conference on Digital Forensics, Security and Law

In recent times, DNS tunneling techniques have been used for malicious purposes, however network security mechanisms struggle to detect them. Network forensic analysis has been proven effective, but is slow and effort intensive as Network Forensics Analysis Tools struggle to deal with undocumented or new network tunneling techniques. In this paper, we present a machine learning approach, based on feature subsets of network traffic evidence, to aid forensic analysis through automating the inference of protocols carried within DNS tunneling techniques. We explore four network protocols, namely, HTTP, HTTPS, FTP, and POP3. Three features are extracted from the DNS tunneled traffic: …


An Accidental Discovery Of Iot Botnets And A Method For Investigating Them With A Custom Lua Dissector, Max Gannon, Gary Warner, Arsh Arora May 2017

An Accidental Discovery Of Iot Botnets And A Method For Investigating Them With A Custom Lua Dissector, Max Gannon, Gary Warner, Arsh Arora

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper presents a case study that occurred while observing peer-to-peer network communications on a botnet monitoring station and shares how tools were developed to discover what ultimately was identified as Mirai and many related IoT DDOS Botnets. The paper explains how researchers developed a customized protocol dissector in Wireshark using the Lua coding language, and how this enabled them to quickly identify new DDOS variants over a five month period of study.


Augmented Reality Technician Assistance Program, Jackson W. Volante, Kidron R. Filbrun, Jeffrey T. Deane, Andrew T. Carr, Nathan A. Harold, Daniel J. Eckley Apr 2017

Augmented Reality Technician Assistance Program, Jackson W. Volante, Kidron R. Filbrun, Jeffrey T. Deane, Andrew T. Carr, Nathan A. Harold, Daniel J. Eckley

The Research and Scholarship Symposium (2013-2019)

The Augmented Reality Technician Assistance Program is a proof-of-concept project for allowing a remote expert to communicate with and assist a field technician in completing procedures with which the technician may be unfamiliar. For example, an expert in Navy aircraft maintenance could advise an Air Force flight mechanic about performing repairs or maintenance on Navy aircraft. The end goal of our Cedarville computer science capstone project is to create an experimental prototype to deliver to the Air Force Research Laboratory. In our prototype the expert uses a Microsoft Surface Pro tablet to communicate via marked up still images with a …


Cpn-Dam Business Meeting, Amanda Harlan Nov 2016

Cpn-Dam Business Meeting, Amanda Harlan

Central Plains Network for Digital Asset Management

CPN-DAM Business Meeting

Wednesday, November 16, 2016

3:55pm - 4:55pm CST

Agenda

3:55-4:05pm Introduction

4:05-4:10pm Announce Executive Committee members for 2017-2018

4:10-4:25pm Reports from the Planning and Design Committees

4:25-4:40pm Report from Ad Hoc Executive Committee

  • Summary of what was accomplished in 2016

  • Action Items for 2017

    • Become a nonprofit corporation

    • Finalize membership and fees

    • Set up standing committees

    • 2017 conference and proceedings

    • Contacting vendor/sponsors/organizations for possible sponsorship

4:40-4:45pm Announcement on whether the CPN-DAM bylaws were approved or not approved

4:45-4:50pm Comments from audience

4:50-4:55pm Closing statements


Digitization In The Classroom : Teaching Undergraduates The Art Of Digitizing History, Sophie Rondeau Nov 2016

Digitization In The Classroom : Teaching Undergraduates The Art Of Digitizing History, Sophie Rondeau

Central Plains Network for Digital Asset Management

In the fall 2015 semester, a new course was offered at Virginia Wesleyan College (VWC) that involved a unique project collaboration between Professor Richard E. Bond and librarians, Patty Clark and Sophie Rondeau. The course, entitled Digital History 250, provided students with an introduction to how history is made and used in digital environments. Bond presented students with topics related to history and social media, spatial mapping, digital literacy, and the implications of crowd sourcing historical narratives, among others. The students were given a final project that involved creating digital exhibits using curated content from VWC yearbooks housed in the …


Developing An Outreach Plan For Unt Scholarly Works, Pamela Andrews, Daniel Alemneh Nov 2016

Developing An Outreach Plan For Unt Scholarly Works, Pamela Andrews, Daniel Alemneh

Central Plains Network for Digital Asset Management

The University of North Texas Scholarly Works collections functions as our institution’s open access repository. This summer, we conducted a preliminary analysis of the collection’s holdings to assess our progress in archiving UNT faculty research in support of our Open Access and Long-term Digital Stewardship policy as passed in 2012. As we do not subscribe to any current research information systems (CRIS), this analysis took the form of a census using current faculty senate data to understand who is and is not contributing to the repository. After looking at our contribution population, we also examined what resource types are contributed …


Beyond Electric Dreams: Instituting A Dam Program Where It Is Needed But Maybe Not Wanted, Gregory Johnson Nov 2016

Beyond Electric Dreams: Instituting A Dam Program Where It Is Needed But Maybe Not Wanted, Gregory Johnson

Central Plains Network for Digital Asset Management

Digital content is created every second of everyday and can be found everywhere. And the need to preserve this content, as well as the have it available to your students, patrons, or faculty and staff is at a premium while budgets for DAM dwindle. And while the need and want for DAM is often there, the drive and funds to make it a reality sometimes is not.

This presentation will cover one such DAM implementation project at a Fortune 500 company, beginning with the vetting and purchasing of a DAM system through implementation and show how the lessons from its …


Quick-Start Guide To Digital Preservation For Audio, Sandy Rodriguez Nov 2016

Quick-Start Guide To Digital Preservation For Audio, Sandy Rodriguez

Central Plains Network for Digital Asset Management

This presentation focuses on practical strategies and use of open-source tools in order to establish “good enough” preservation management practices for digital audio files. Using her experience at the Marr Sound Archives, University of Missouri—Kansas City, the presenter will discuss assessing current practices, identifying gaps, prioritizing, making recommendations, and selecting and implementing a suite of open-source tools to improve the preservation process. Tools demonstrated in the presentation are AVPreserve’s BWF MetaEdit, MDQC, and Fixity.


Digital Preservation Efforts At Usm, Elizabeth La Beaud Nov 2016

Digital Preservation Efforts At Usm, Elizabeth La Beaud

Central Plains Network for Digital Asset Management

The University of Southern Mississippi (USM) has steadily been working to improve its digital preservation infrastructure over the past four years. In 2013, with funding from a NEH Preservation Assistance Grant, consultants Tom Clareson and Liz Bishoff conducted a digital preservation readiness assessment and jump started USM’s education on the topic. Since then, USM has added geographically distributed backups, manual fixity checks, manual metadata logs, and manual file format migrations to its arsenal with varying degrees of success. The influx in needed manpower and technical infrastructure precipitated a financial commitment from the university and the purchase of a robust digital …


3d Model Creation And Management In An Academic Digital Repository, Marcia Mcintosh Nov 2016

3d Model Creation And Management In An Academic Digital Repository, Marcia Mcintosh

Central Plains Network for Digital Asset Management

3D printing and scanning is new digital horizon for digital asset managers. Many fields have a history of utilizing 3D scanning and printing such as medicine, dentistry, art, entertainment, architecture, and archaeology. Now, many cultural heritage institution are also beginning to explore the unique benefits 3D models and prints can provide to constituents interested in their collections. The University of North Texas Digital Libraries embarked on a case study to gain a better understanding of 3D scanning and to determine its capacity to host and provide access to 3D models. This presentation will explore the workflows, metadata, and preservation of …


Common Management Gaps In The Life Cycle Of Digitized Objects, Jocelyn Wehr Nov 2016

Common Management Gaps In The Life Cycle Of Digitized Objects, Jocelyn Wehr

Central Plains Network for Digital Asset Management

Presented from the perspective of someone responsible for creating the digital objects that will eventually be included in a digital preservation program, this poster session will identify common issues that make the management and preservation of digital objects more challenging. Digital preservation needs to be talked about within the digitization workflow, because it takes a lot of work to produce the best digital objects possible. We are often focused on the immediate use of the digital objects and less focused on their long-term use. Even with best practices in mind, there is often an immediate need (patron orders, for example) …


Numbers, Numbers, Numbers—Is It Working?! Meaningful Measurement Of Digital Collections, Allison Ringness Nov 2016

Numbers, Numbers, Numbers—Is It Working?! Meaningful Measurement Of Digital Collections, Allison Ringness

Central Plains Network for Digital Asset Management

After a digital project is completed and made available online, the work is not over: digital projects managers must quantify the value of these digital collections. There are a plethora of tools to measure usage, but inferring value from usage requires careful interpretation of the data. After interpretation, the results must be communicated effectively to administrators. This poster will identify sources of digital collection use data, identify pitfalls in these sources, explore ways to derive meaning from use data, and suggest strategies for communicating value measurements to library administrators.

This poster presentation is the first 15 minutes of video with …


Eyes On The Prize: Delivering Archival Content With Synchronized Transcripts In Hydra, Irene Taylor, Shannon Davis Nov 2016

Eyes On The Prize: Delivering Archival Content With Synchronized Transcripts In Hydra, Irene Taylor, Shannon Davis

Central Plains Network for Digital Asset Management

Regarded as the definitive work on the Civil Rights Movement, the documentary series, Eyes on the Prize, has been seen by millions since its PBS debut in 1987. However, what remains unseen is the nearly 85 hours of interview outtakes that provide further insight into the series’ original stories of struggle, resistance, and perseverance. Through the Eyes on the Prize Digitization and Reassembly project, funded by the National Historical Publications and Records Commission, Washington University Libraries has made the complete, never-before-seen interviews and TEI XML encoded, synchronized transcripts freely accessible through its newly developed Hydra digital repository.

This session …


The Yellow Brick Road To Digitization: Two Small Kansas Colleges And Their Journey, Gloria Creed-Dikeogu, Danielle Dion Nov 2016

The Yellow Brick Road To Digitization: Two Small Kansas Colleges And Their Journey, Gloria Creed-Dikeogu, Danielle Dion

Central Plains Network for Digital Asset Management

In 2015, The Council of Independent Colleges (CIC) offered small private academic member colleges an opportunity to compete by writing collection proposals, for a three year grant digitizing teaching and research collections, funded by the Andrew C. Mellon Foundation. Forty-two CIC member teams were selected to participate in the Consortium on Digital Resources for Teaching and Research. Teams consisted of a librarian, and a faculty member, who worked with CIC and Artstor staff, using Artstor Shared Shelf to digitize proposed collections. Teams made digital collections accessible and usable in the classroom, wrote yearly project reports for CIC and attended yearly …


The James Merrill Digital Archive: Channeling The Collaborative Spirit(S), Shannon Davis, Joel Minor Nov 2016

The James Merrill Digital Archive: Channeling The Collaborative Spirit(S), Shannon Davis, Joel Minor

Central Plains Network for Digital Asset Management

The James Merrill Papers, housed in Washington University Libraries Special Collections, contains manuscripts, drafts, and other materials from the renowned poet. In 2013, work began to digitize and deliver a selection of the Merrill Papers towards his epic poem, The Book of Ephraim. Because the Libraries’ already used Omeka digital exhibit software for a number of projects, the materials were delivered in an Omeka exhibit, The James Merrill Digital Archive. The process of transforming an archival collection into a digital exhibit required the expertise and input of many collaborators including library staff in Special Collections and Scholarly Publishing, and students …


Founding Sap Student User Group (Sug) At Southern Illinois University Carbondale - Siu Sug, Jihoon Park, Siuc Isat Oct 2016

Founding Sap Student User Group (Sug) At Southern Illinois University Carbondale - Siu Sug, Jihoon Park, Siuc Isat

ASA Multidisciplinary Research Symposium

Enterprise Computing has quickly become of paramount importance for businesses vying to survive in today’s unlimited competition market. SAP software has become a front runner and leader of business and technical innovation in the enterprise computing industry. Major fortune 500 companies are using SAP software as their main operating software. As the need for individuals knowledgeable on SAP has increased dramatically, learning SAP is becoming important for the market of employment


Towards A Development Of A Mobile Application Security Invasiveness Index, Sam Espana Oct 2016

Towards A Development Of A Mobile Application Security Invasiveness Index, Sam Espana

KSU Proceedings on Cybersecurity Education, Research and Practice

The economic impact of Mobile IP, the standard that allows IP sessions to be maintained even when switching between different cellular towers or networks, has been staggering in terms of both scale and acceleration (Doherty, 2016). As voice communications transition to all-digital, all-IP networks such as 4G, there will be an increase in risk due to vulnerabilities, malware, and hacks that exist for PC-based systems and applications (Harwood, 2011). According to Gostev (2006), in June, 2004, a well-known Spanish virus collector known as VirusBuster, emailed the first known mobile phone virus to Kaspersky Lab, Moscow. Targeting the Symbian OS, the …


Haptic Foot Feedback For Kicking Training In Virtual Reality, Hank Huang, Hong Tan Aug 2016

Haptic Foot Feedback For Kicking Training In Virtual Reality, Hank Huang, Hong Tan

The Summer Undergraduate Research Fellowship (SURF) Symposium

As means to further supplement athletic performances increases, virtual reality is becoming helpful to sports in terms of cognitive training such as reaction, mentality, and game strategies. With the aid of haptic feedback, interaction with virtual objects increases by another dimension, in addition to the presence of visual and auditory feedback. This research presents an integrated system of a virtual reality environment, motion tracking system, and a haptic unit designed for the dorsal foot. The prototype simulates a scenario of virtual kicking and returns haptic response upon collision between the user’s foot and virtual object. The overall system was evaluated …


Human Factors In The Development Of The Mobile Extreme Environment Research Station (Meers) Mission Control System (Mcs), Rebecca Demarco Apr 2016

Human Factors In The Development Of The Mobile Extreme Environment Research Station (Meers) Mission Control System (Mcs), Rebecca Demarco

Human Factors and Applied Psychology Student Conference

The developers for the MEERS MCS were required to develop a novel interface for their product. During the development of the MCS, analytical human factors methods and display principles were implemented to create the user interface. The methods and principles were also used so the MCS had a user centered design. The MCS went through several iterations of design. This presentation discusses the development process of the MEERS MCS from a human factors standpoint.


Investigating Security Attacks On Wireless Sensor Networks (Wsns) Via An Iot Environmental Monitoring System, Mauricio Tellez Nava, Samy El-Tawab, M. Hossain Heydari Apr 2016

Investigating Security Attacks On Wireless Sensor Networks (Wsns) Via An Iot Environmental Monitoring System, Mauricio Tellez Nava, Samy El-Tawab, M. Hossain Heydari

Showcase of Graduate Student Scholarship and Creative Activities

To demonstrate our work, we have implemented a secure temperature monitoring system that makes use of the IEEE 802.15.4 standard, AES-128 hardware encryption and TelosB sensor nodes. In our design, we consider one of the nodes to be a coordinator node, which plays the role of a central node that establishes network association requests, listens for incoming packets, decrypts the incoming packets and forwards any received packets to the monitoring device. Three other nodes act as end-devices, which play the role of collecting temperature measurements, encrypting the collected data and sending the encrypted packets to the coordinator node. A last …


Implementation Of E-Education In Africa Via Space Networks, Dimov Stojce Ilcev Nov 2015

Implementation Of E-Education In Africa Via Space Networks, Dimov Stojce Ilcev

UBT International Conference

In this paper is introduced an advanced E-education provision in remote dispersed communities, such as rural, remote, mobile, agriculture, mining, construction, surveying, military, tourism and so on, based on the specific needs and requirements, implies significant broadband connectivity requirements, timely and quality-assured content delivery of service, applications and interactivity. The E-education solutions of distance learning and training for remote and rural areas, which are out of range of terrestrial and short distance wireless telecommunications facilities, cannot provide the broadband access without space-enabled communication infrastructures, such as satellite constellations and Stratospheric Platform Systems (SPS) or High Altitude Platforms (HAP). The paper …


Case Studies For A Markov Chain Approach To Analyze Agent-Based Models, Florian Kitzler, Martin Bicher Nov 2015

Case Studies For A Markov Chain Approach To Analyze Agent-Based Models, Florian Kitzler, Martin Bicher

UBT International Conference

Agent-Based Models have become a widely used tool in social sciences, health care management and other disciplines to describe complex systems from a bottom-up perspective. Some reasons for that are the easy understanding of Agent-Based Models, the high flexibility and the possibility to describe heterogeneous structures. Nevertheless problems occur when it comes to analyzing Agent-Based Models. This paper shows how to describe Agent-Based Models in a macroscopic way as Markov Chains, using the random map representation. The focus is on the implementation of this method for chosen examples of a Random Walk and Opinion Dynamic Models. It is also shown …


E-Learning Systems In Higher Education Institutions: An Outlook Of Their Use In The Western Balkan Region, Blerta Abazi Chaushi, Agron Chaushi, Florije Ismaili Nov 2015

E-Learning Systems In Higher Education Institutions: An Outlook Of Their Use In The Western Balkan Region, Blerta Abazi Chaushi, Agron Chaushi, Florije Ismaili

UBT International Conference

This study provides a review of the literature on e-learning systems evolution and environments. The argument is that e-learning systems should be embedded in the core strategy of the institution. To support this premise, studies for e-learning are analyzed and six recommendations are drawn for universities to follow in order to have successful e-learning environments. The main contribution of this study, however, is the identification of the trends and statistics regarding the e-learning usage in the Balkan region. These stats are identified through a survey conducted in 40 universities in 10 countries from this region. The results show that more …


From Traditional Markets To E-Commerce And Finally To Social Media Commerce, Ardian Hyseni Nov 2015

From Traditional Markets To E-Commerce And Finally To Social Media Commerce, Ardian Hyseni

UBT International Conference

These days, getting new customers is much easier than in the past. People and customers are online sharing and exchanging ideas on products and it has become easier to find products over the internet and lately; with social media, where people can look for information from reviews and comments on sites. This way has changed shopping to a social experience and is the key element to the growth of social commerce. Businesses want to connect with people and customers which they do business, also they want customers opinions and reviews. By using social media, companies can now easily create an …


New Integral Transform In Caputo Type Fractional Difference Operator, Artion Kashuri, Akli Fundo, Rozana Liko Nov 2015

New Integral Transform In Caputo Type Fractional Difference Operator, Artion Kashuri, Akli Fundo, Rozana Liko

UBT International Conference

In this paper, we introduce Caputo type nabla (q,h)-fractional difference operators and investigate their basic properties and also to show the applicability of this interesting (q,h)- new integral transform method and its efficiency in solving linear fractional difference equations. Differential equations with fractional derivative provide a natural framework for the discussion of various kinds of real problems modeled by the aid of fractional derivative. Discrete analogues of some topics of continuous fractional calculus have been developed. Finally, we provide the general solutions in terms of discrete Mittag-Leffler functions.


The Mobile Telecom Operator T-Mobile Macedonia Ad Skopje Abuses Its Dominant Position Harmful For The Mobile Telecom Operators One And Vip In The Telecom Market, Boris Arsov Nov 2015

The Mobile Telecom Operator T-Mobile Macedonia Ad Skopje Abuses Its Dominant Position Harmful For The Mobile Telecom Operators One And Vip In The Telecom Market, Boris Arsov

UBT International Conference

T-Mobile’s abusing of its dominant position is referring to the postpaid tariff models Relax and Relax Surf regarding the residential customers and the postpaid tariff models Business and Business Surf regarding its business customers. The prominent price offer to consumers is a case of predatory prices squeeze identified as a way of preventing or restricting competition in theory and practice. T-Mobile provides services at unreasonably low prices, prices below the level of expenditures necessary for their provision, as it is specific case with the postpaid tariff models Relax and Relax Surf regarding the residential customers and the postpaid tariff plans …