Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

Series

2012

Institution
Keyword
Publication

Articles 1 - 27 of 27

Full-Text Articles in Computer Engineering

An Ultra-Low Power Communication Protocol For A Self-Powered Wireless Sensor Based Animal Monitoring System, Tao Ma Dec 2012

An Ultra-Low Power Communication Protocol For A Self-Powered Wireless Sensor Based Animal Monitoring System, Tao Ma

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

To prevent and control the outbreak of contagious animal disease, many countries have developed animal identification and tracking systems. However, the current animal identification and tracking system, which is based on passive RFID technology, has many limitations such as the short communication range and incapability of automatically monitoring the animal. To overcome these limitations, our Advanced Telecommunications Engineering Laboratory (TEL) in Department of Computer and Electronics Engineering (CEEN), University of Nebraska-Lincoln took the mission of developing a more advanced monitoring system for animal identification and tracking. This dissertation work as a part of this mission was focusing on developing an …


Collaborative Research: North East Cyberinfrastructure Consortium, Michael Eckardt Nov 2012

Collaborative Research: North East Cyberinfrastructure Consortium, Michael Eckardt

University of Maine Office of Research Administration: Grant Reports

EPS-0918284, University of Vermont & State Agricultural College, J. L. Van Houten, linked to EPS-0918033 (University of New Hampshire), EPS-0918078 (University of Delaware), EPS-0918018 (University of Maine), EPS-0918061 (University of Rhode Island)
Collaborative Research: North East Cyberinfrastructure Consortium

This award is funded under the American Recovery and Reinvestment Act of 2009 (Public Law 111-5).

The North East Cyberinfrastructure Consortium (NECC) unites Maine (ME), New Hampshire (NH), Vermont (VT), Rhode Island (RI), and Delaware (DE) to support cyber-enabled research that requires analyses of large datasets. The project is organized around sharing resources, expertise and facilities in order to make cyber-enabled collaborative …


Wireless Networks-On-Chips: Architecture, Wireless Channel, And Devices, David W. Matolak, Avinash Kodi, Savas Kaya, Dominic Ditomaso, Soumyasanta Laha, William Rayess Oct 2012

Wireless Networks-On-Chips: Architecture, Wireless Channel, And Devices, David W. Matolak, Avinash Kodi, Savas Kaya, Dominic Ditomaso, Soumyasanta Laha, William Rayess

Faculty Publications

Wireless networks-on-chips (WINoCs) hold substantial promise for enhancing multicore integrated circuit performance, by augmenting conventional wired interconnects. As the number of cores per IC grows, intercore communication requirements will also grow, and WINoCs can be used to both save power and reduce latency. In this article, we briefly describe some of the key challenges with WINoC implementation, and also describe our example design, iWISE, which is a scalable wireless interconnect design. We show that the integration of wireless interconnects with wired interconnects in NoCs can reduce overall network power by 34 percent while achieving a speedup of 2.54 on real …


A Probabilistic Graphical Model For Topic And Preference Discovery On Social Media, Lu Liu, Feida Zhu, Lei Zhang, Shiqiang Yang Oct 2012

A Probabilistic Graphical Model For Topic And Preference Discovery On Social Media, Lu Liu, Feida Zhu, Lei Zhang, Shiqiang Yang

Research Collection School Of Computing and Information Systems

Many web applications today thrive on offering services for large-scale multimedia data, e.g., Flickr for photos and YouTube for videos. However, these data, while rich in content, are usually sparse in textual descriptive information. For example, a video clip is often associated with only a few tags. Moreover, the textual descriptions are often overly specific to the video content. Such characteristics make it very challenging to discover topics at a satisfactory granularity on this kind of data. In this paper, we propose a generative probabilistic model named Preference-Topic Model (PTM) to introduce the dimension of user preferences to enhance the …


On Heterogeneous User Demands In Peer-To-Peer Video Streaming Systems, Zhipeng Ouyang Jul 2012

On Heterogeneous User Demands In Peer-To-Peer Video Streaming Systems, Zhipeng Ouyang

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

A Peer-to-Peer (P2P) video streaming system usually consists of a large number of peers, which have heterogeneous physical properties. Orthogonal to the physical heterogeneity, there is another type of heterogeneity called demand heterogeneity. Namely, peers have their own demands on the quality and type of the streaming service. The problem of demand heterogeneity has received little attention and as a result current P2P video streaming systems cannot achieve satisfactory performance due to demand heterogeneity. In this dissertation, we study how to design efficient P2P video streaming systems with heterogeneous user demands.

First, we study the problem of heterogeneous user demands …


When Antitrust Met Facebook, Christopher S. Yoo Jul 2012

When Antitrust Met Facebook, Christopher S. Yoo

All Faculty Scholarship

Social networks are among the hottest phenomena on the Internet. Facebook eclipsed Google as the most visited website in both 2010 and 2011. Moreover, according to Nielsen estimates, as of the end of 2011 the average American spent nearly seven hours per month on Facebook, which is more time than they spent on Google, Yahoo!, YouTube, Microsoft, and Wikipedia combined. LinkedIn’s May 19, 2011 initial public offering (“IPO”) surpassed expectations, placing the value of the company at nearly $9 billion, and approximately a year later, its stock price had risen another 20 percent. Facebook followed suit a year later with …


Extended Pcr Rules For Dynamic Frames, Florentin Smarandache, Jean Dezert Jul 2012

Extended Pcr Rules For Dynamic Frames, Florentin Smarandache, Jean Dezert

Branch Mathematics and Statistics Faculty and Staff Publications

In most of classical fusion problems modeled from belief functions, the frame of discernment is considered as static. This means that the set of elements in the frame and the underlying integrity constraints of the frame are fixed forever and they do not change with time. In some applications, like in target tracking for example, the use of such invariant frame is not very appropriate because it can truly change with time. So it is necessary to adapt the Proportional Conflict Redistribution fusion rules (PCR5 and PCR6) for working with dynamical frames. In this paper, we propose an extension of …


A Wireless And Digital Electrode Bus Topology For Biopotential Measurement, Mark Nolan, Edward Burke, Eugene Coyle Jun 2012

A Wireless And Digital Electrode Bus Topology For Biopotential Measurement, Mark Nolan, Edward Burke, Eugene Coyle

Conference Papers

The conventional biopotential measurement configuration utilises long lead wires which connect measuring electrodes to signal conditioning circuitry. The majority of bioelectric signals that are measured from the human body have a tiny signal amplitude (5µV-5mV range) and thus any interference that is induced on the lead wires can have a detrimental effect on the original signal. In this paper, we present an alternative configuration, in which digitisation occurs on the electrode, potentially providing enhanced signal measurement as well as significant benefits in terms of the simplification of the physical interconnections between electrodes. Multiple electrodes are combined to form a digital …


New Technologies And Constitutional Law, Thomas Fetzer, Christopher S. Yoo Jun 2012

New Technologies And Constitutional Law, Thomas Fetzer, Christopher S. Yoo

All Faculty Scholarship

No abstract provided.


Energy-Efficient Continuous Activity Recognition On Mobile Phones: An Activity-Adaptive Approach, Zhixian Yan, Vigneshwaran Subbaraju, Dipanjan Chakraborty, Archan Misra, Karl Aberer Jun 2012

Energy-Efficient Continuous Activity Recognition On Mobile Phones: An Activity-Adaptive Approach, Zhixian Yan, Vigneshwaran Subbaraju, Dipanjan Chakraborty, Archan Misra, Karl Aberer

Research Collection School Of Computing and Information Systems

Power consumption on mobile phones is a painful obstacle towards adoption of continuous sensing driven applications, e.g., continuously inferring individual’s locomotive activities (such as ‘sit’, ‘stand’ or ‘walk’) using the embedded accelerometer sensor. To reduce the energy overhead of such continuous activity sensing, we first investigate how the choice of accelerometer sampling frequency & classification features affects, separately for each activity, the “energy overhead” vs. “classification accuracy” tradeoff. We find that such tradeoff is activity specific. Based on this finding, we introduce an activity-sensitive strategy (dubbed “A3R” – Adaptive Accelerometer-based Activity Recognition) for continuous activity recognition, where the choice of …


Beyond Coase: Emerging Technologies And Property Theory, Christopher S. Yoo Jun 2012

Beyond Coase: Emerging Technologies And Property Theory, Christopher S. Yoo

All Faculty Scholarship

In addition to prompting the development of the Coase Theorem, Ronald Coase’s landmark 1959 article on the Federal Communications Commission touched off a revolution in spectrum policy. Although one of Coase’s proposed reforms (that spectrum should be allocated through markets) has now become the conventional wisdom, his other principal recommendation (that governments stop dedicating portions of the spectrum to particular uses) has yet to be fully embraced. Drawing on spectrum as well as Internet traffic and electric power as examples, this Article argues that emerging technologies often reflect qualities that make defining property rights particularly difficult. These include the cumulative …


Network Neutrality And The Need For A Technological Turn In Internet Scholarship, Christopher S. Yoo May 2012

Network Neutrality And The Need For A Technological Turn In Internet Scholarship, Christopher S. Yoo

All Faculty Scholarship

To most social scientists, the technical details of how the Internet actually works remain arcane and inaccessible. At the same time, convergence is forcing scholars to grapple with how to apply regulatory regimes developed for traditional media to a world in which all services are provided via an Internet-based platform. This chapter explores the problems caused by the lack of familiarity with the underlying technology, using as its focus the network neutrality debate that has dominated Internet policy for the past several years. The analysis underscores a surprising lack of sophistication in the current debate. Unfamiliarity with the Internet’s architecture …


Spatial Queries In Wireless Broadcast Environments [Keynote Speech], Kyriakos Mouratidis May 2012

Spatial Queries In Wireless Broadcast Environments [Keynote Speech], Kyriakos Mouratidis

Research Collection School Of Computing and Information Systems

Wireless data broadcasting is a promising technique for information dissemination that exploits the computational capabilities of mobile devices, in order to enhance the scalability of the system. Under this environment, the data are continuously broadcast by the server, interleaved with some indexing information for query processing. Clients may tune in the broadcast channel and process their queries locally without contacting the server. In this paper we focus on spatial queries in particular. First, we review existing methods on this topic. Next, taking shortest path computation as an example, we showcase technical challenges arising in this processing model and describe techniques …


Virtualization In High-Performance Computing: An Analysis Of Physical And Virtual Node Performance, Glendon M. Jungels Apr 2012

Virtualization In High-Performance Computing: An Analysis Of Physical And Virtual Node Performance, Glendon M. Jungels

Purdue Polytechnic Masters Theses

The process of virtualizing computing resources allows an organization to make more efficient use of it's resources. In addtion, this process enables flexibility that deployment on raw hardware does not. Virtualization, however, comes with a performance penalty. This study examines the performance of utilizing virtualization technology for use in high performance computing to determine the suitibility of using this technology. It makes use of a small (4 node) virtual cluster as well as a 4 node physical cluster. The impacts on input/output operation are examined as well as performance of each cluster using two widely utilized tools, NAS Parallel Benchmarks …


Power Spectral Densities Of Baseband Signals In Epc Class-1 Gen-2 Uhf Rfid Systems, Robert H. Morelos-Zaragoza Mar 2012

Power Spectral Densities Of Baseband Signals In Epc Class-1 Gen-2 Uhf Rfid Systems, Robert H. Morelos-Zaragoza

Faculty Publications

The power spectral densities (PSD) of baseband signals in EPC Class-1 Gen-2 UHF RFID systems are shown. PSD are obtained using Matlab as the Fourier transform (via the FFT algorithm) of the autocorrelation function of random pulse sequences. The PSD of PIE, FM0 and Miller subcarrier for M=2, 4 and 8 are shown for both unipolar (for 100% ASK or OOK modulation) and polar (PSK modulation) waveforms.


Cache Invalidation Strategies For Internet-Based Vehicular Ad Hoc Networks, Sunho Lim, Chansu Yu, Chita R. Das Feb 2012

Cache Invalidation Strategies For Internet-Based Vehicular Ad Hoc Networks, Sunho Lim, Chansu Yu, Chita R. Das

Electrical and Computer Engineering Faculty Publications

Internet-based vehicular ad hoc network (Ivanet) is an emerging technique that combines a wired Internet and a vehicular ad hoc network (Vanet) for developing an ubiquitous communication infrastructure and improving universal information and service accessibility. A key design optimization technique in Ivanets is to cache the frequently accessed data items in a local storage of vehicles. Since vehicles are not critically limited by the storage/memory space and power consumption, selecting proper data items for caching is not very critical. Rather, an important design issue is how to keep the cached copies valid when the original data items are updated. This …


On Limitations Of Designing Usable Leakage-Resilient Password Systems: Attacks, Principles And Usability, Qiang Yan, Jin Han, Yingjiu Li, Huijie, Robert Deng Feb 2012

On Limitations Of Designing Usable Leakage-Resilient Password Systems: Attacks, Principles And Usability, Qiang Yan, Jin Han, Yingjiu Li, Huijie, Robert Deng

Research Collection School Of Computing and Information Systems

The design of leakage-resilient password systems (LRPSes) in the absence of trusted devices remains a challenging problem today despite two decades of intensive research in the security community. In this paper, we investigate the inherent tradeoff between security and usability in designing LRPS. First, we demonstrate that most of the existing LRPS systems are subject to two types of generic attacks - brute force and statistical attacks, whose power has been underestimated in the literature. Second, in order to defend against these two generic attacks, we introduce five design principles that are necessary to achieve leakage resilience in the absence …


Towards Fine-Grained Radio-Based Indoor Location, Jie Xiong, Kyle Jamieson Feb 2012

Towards Fine-Grained Radio-Based Indoor Location, Jie Xiong, Kyle Jamieson

Research Collection School Of Computing and Information Systems

Location systems are key to a rich experience for mobile users. When they roam outdoors, mobiles can usually count on a clear GPS signal for an accurate location, but indoors, GPS usually fades, and so up until recently, mobiles have had to rely mainly on rather coarse-grained signal strength readings for location. What has changed this status quo is the recent trend of dramatically increasing numbers of antennas at the indoor AP, mainly to bolster capacity and coverage with multiple-input, multiple-output (MIMO) techniques. In the near future, the number of antennas at the access point will increase several-fold, to meet …


A Study Of The Impact Of Computational Delays In Missile Interception Systems, Ye Xu Jan 2012

A Study Of The Impact Of Computational Delays In Missile Interception Systems, Ye Xu

Masters Theses 1911 - February 2014

Most publications discussing missile interception systems assume a zero computer response time. This thesis studies the impact of computer response time on single-missile single-target and multiple- missile multiple-target systems. Simulation results for the final miss distance as the computer response time increases are presented. A simple online cooperative adjustment model for multiple-missile multiple-target system is created for the purpose of studying the computer delay effect.


Techniques For Detection Of Malicious Packet Drops In Networks, Vikram R. Desai Jan 2012

Techniques For Detection Of Malicious Packet Drops In Networks, Vikram R. Desai

Masters Theses 1911 - February 2014

The introduction of programmability and dynamic protocol deployment in routers, there would be an increase in the potential vulnerabilities and attacks . The next- generation Internet promises to provide a fundamental shift in the underlying architecture to support dynamic deployment of network protocols. In this thesis, we consider the problem of detecting malicious packet drops in routers. Specifically, we focus on an attack scenario, where a router selectively drops packets destined for another node. Detecting such an attack is challenging since it requires differentiating malicious packet drops from congestion-based packet losses. We propose a controller- based malicious packet detection technique …


Shifts In The Architecture Of The Nationwide Health Information Network, L. Lenert, D. Sundwall, Michael E. Lenert Jan 2012

Shifts In The Architecture Of The Nationwide Health Information Network, L. Lenert, D. Sundwall, Michael E. Lenert

Media Studies

In the midst of a US $30 billion USD investment in the Nationwide Health Information Network (NwHIN) and electronic health records systems, a significant change in the architecture of the NwHIN is taking place. Prior to 2010, the focus of information exchange in the NwHIN was the Regional Health Information Organization (RHIO). Since 2010, the Office of the National Coordinator (ONC) has been sponsoring policies that promote an internetlike architecture that encourages point to-point information exchange and private health information exchange networks. The net effect of these activities is to undercut the limited business model for RHIOs, decreasing the likelihood …


Jumpstarting A Global Mobile Computing Lab At Pace University, Christelle Scharff Jan 2012

Jumpstarting A Global Mobile Computing Lab At Pace University, Christelle Scharff

Cornerstone 2 Reports : Community Outreach and Empowerment Through Service Learning and Volunteerism

Mobile applications are the future of computing. This project focuses on jumpstarting a mobile lab at Pace University. It reaches out to the university community and beyond by integrating different events including a competition on mobile application development and hosting external speakers. A high school event and a panel discussion with experts in the field are planned.


An Analysis Of Step, Jt, And Pdf Format Translation Between Constraint-Based Cad Systems With A Benchmark Model, Dillon Mckenzie-Veal Jan 2012

An Analysis Of Step, Jt, And Pdf Format Translation Between Constraint-Based Cad Systems With A Benchmark Model, Dillon Mckenzie-Veal

Department of Computer Graphics Technology Degree Theses

This research was conducted to provide greater depth into the ability of STEP AP 203 Edition 2, JT, and 3D PDF to translate and preserve information while using a benchmark model. The benchmark model was designed based on four industry models and created natively in the five industry leading 3D CAD programs. The native CAD program models were translated using STEP, JT, and 3D PDF. Several criteria were analyzed along the paths of translation from one disparate CAD program to another. Along with the analysis of the three interoperable file formats a survey was conducted to determine how well the …


The Practicality Of Cloud Computing, Xiaohua (Cindy) Li Jan 2012

The Practicality Of Cloud Computing, Xiaohua (Cindy) Li

Librarian Publications

Since its inception, cloud computing has become the current paradigm. Organizations of different size and type have embraced the concept because of its both technological and economic advantages. Sacred Heart University Library has recently published its newly designed website on the cloud. For a small academic library, what does it mean to put their online data on the cloud? This paper will analyze and discuss the advantages of cloud computing, and some potential obstacles created by it through the author’s observations. This paper hopes the uniqueness of the case will contribute to the improvement of cloud computing experience of other …


Many-To-One Communication Protocol For Wireless Sensor Networks, Chansu Yu, Robert Fiske, Seungmin Park, Won-Tae Kim Jan 2012

Many-To-One Communication Protocol For Wireless Sensor Networks, Chansu Yu, Robert Fiske, Seungmin Park, Won-Tae Kim

Electrical and Computer Engineering Faculty Publications

This paper proposes a novel communication protocol, called Many-to-One Sensors-to-Sink (MOSS), tailored to wireless sensor networks (WSNs). It exploits the unique sensors-to-sink traffic pattern to realize low-overhead medium access and low- latency sensors-to-sink routing paths. In conventional schedule-based MAC protocols such as S-MAC, sensor nodes in the proximity of the event generate reports simultaneously, causing unreliable and unpredictable performance during a brief but critical period of time when an event of interest occurs. MOSS is based on time division multiple access (TDMA) that avoids energy waste due to collisions, idle listening and overhearing and avoids unreliable behavior mentioned above. A …


Erasure Techniques In Mrd Codes, Florentin Smarandache, W.B. Vasantha Kandasamy, R. Sujatha, R.S. Raja Durai Jan 2012

Erasure Techniques In Mrd Codes, Florentin Smarandache, W.B. Vasantha Kandasamy, R. Sujatha, R.S. Raja Durai

Branch Mathematics and Statistics Faculty and Staff Publications

In this book the authors study the erasure techniques in concatenated Maximum Rank Distance (MRD) codes. The authors for the first time in this book introduce the new notion of concatenation of MRD codes with binary codes, where we take the outer code as the RD code and the binary code as the inner code. The concatenated code consists of the codewords of the outer code expressed in terms of the alphabets of the inner code. These new class of codes are defined as CRM codes. This concatenation techniques helps one to construct any CRM code of desired minimum distance …


Neutrosophic Masses & Indeterminate Models Applications To Information Fusion, Florentin Smarandache Jan 2012

Neutrosophic Masses & Indeterminate Models Applications To Information Fusion, Florentin Smarandache

Branch Mathematics and Statistics Faculty and Staff Publications

In this paper we introduce the indeterminate models in information fusion, which are due either to the existence of some indeterminate elements in the fusion space or to some indeterminate masses. The best approach for dealing with such models is the neutrosophic logic.