Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

Theses/Dissertations

Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 547

Full-Text Articles in Computer Engineering

Bootstrapping Web Archive Collections From Micro-Collections In Social Media, Alexander C. Nwala Aug 2020

Bootstrapping Web Archive Collections From Micro-Collections In Social Media, Alexander C. Nwala

Computer Science Theses & Dissertations

In a Web plagued by disappearing resources, Web archive collections provide a valuable means of preserving Web resources important to the study of past events. These archived collections start with seed URIs (Uniform Resource Identifiers) hand-selected by curators. Curators produce high quality seeds by removing non-relevant URIs and adding URIs from credible and authoritative sources, but this ability comes at a cost: it is time consuming to collect these seeds. The result of this is a shortage of curators, a lack of Web archive collections for various important news events, and a need for an automatic system for generating seeds ...


Improving Computer Network Operations Through Automated Interpretation Of State, Abhishek Dwaraki, Abhishek Dwaraki Jul 2020

Improving Computer Network Operations Through Automated Interpretation Of State, Abhishek Dwaraki, Abhishek Dwaraki

Doctoral Dissertations

Networked systems today are hyper-scaled entities that provide core functionality for distributed services and applications spanning personal, business, and government use. It is critical to maintain correct operation of these networks to avoid adverse business outcomes. The advent of programmable networks has provided much needed fine-grained network control, enabling providers and operators alike to build some innovative networking architectures and solutions. At the same time, they have given rise to new challenges in network management. These architectures, coupled with a multitude of devices, protocols, virtual overlays on top of physical data-plane etc. make network management a highly challenging task. Existing ...


Lawn Buddy, Jayson Johnston, Andrew Brown, Jacob Maljian Jun 2020

Lawn Buddy, Jayson Johnston, Andrew Brown, Jacob Maljian

Electrical Engineering

Grass lawns are a common hallmark of the American home. In 2019, a survey from the National Association of Landscape Professionals found that 81% of all Americans owned a lawn [1]. Mowing is a time consuming and costly chore that is part of maintaining a grass lawn. The manual labor in mowing a lawn can exceed 40 hours per year [2]. People commonly incur weekly costs on mowing services to save time. Traditional gas powered mowers are physically demanding and use engines that need routine maintenance. They operate loudly enough that users should be wearing hearing protection and the noise ...


Fitness Plug, Evan Lee Ashley Jun 2020

Fitness Plug, Evan Lee Ashley

Computer Engineering

My parents only allowed me to play videogames or watch television for a certain number of minutes or hours per day. By limiting screen time, they encouraged me to be active and find other things to do outside of television or videogames. The Fitness Plug aims to do both by converting time exercised to entertainment time; you can only watch television or play videogames for as long as you have exercised.


Communications With Spectrum Sharing In 5g Networks Via Drone-Mounted Base Stations, Liang Zhang May 2020

Communications With Spectrum Sharing In 5g Networks Via Drone-Mounted Base Stations, Liang Zhang

Dissertations

The fifth generation wireless network is designed to accommodate enormous traffic demands for the next decade and to satisfy varying quality of service for different users. Drone-mounted base stations (DBSs) characterized by high mobility and low cost intrinsic attributes can be deployed to enhance the network capacity. In-band full-duplex (IBFD) is a promising technology for future wireless communications that can potentially enhance the spectrum efficiency and the throughput capacity. Therefore, the following issues have been identified and investigated in this dissertation in order to achieve high spectrum efficiency and high user quality of service.

First, the problem of deploying DBSs ...


Locating Relay Nodes To Maximize Wireless Sensor Network Lifetime: A Numerical Study, Maria Rene Arandia Jimenez May 2020

Locating Relay Nodes To Maximize Wireless Sensor Network Lifetime: A Numerical Study, Maria Rene Arandia Jimenez

Industrial Engineering Undergraduate Honors Theses

A wireless sensor network (WSN) is a group of sensors deployed over an area, which monitor changes in the environment, collects them as data and forwards it between sensors through wireless links. Data is routed, either in a single-hop or multi-hop manner, with the goal of getting this collected data to the sink nodes, which have higher computational capabilities and connects the network with a user interface. Studies have determined that multi-hop WSNs that integrate relay nodes, which function is to only receive and forward data, can maximize lifetime network. A linear programming model, created by Chang and Tassiulas in ...


Brief Survey And Testbed Development For Blockchain Based Internet Of Things, Aishwant Ghimire May 2020

Brief Survey And Testbed Development For Blockchain Based Internet Of Things, Aishwant Ghimire

Honors Theses

Blockchain and the Internet of Things are uprising in today’s technology world. Internet of Things or IoT are the devices with unique identifiers that share data or information over the internet whereas, Blockchain is a peer to peer network with a distributed ledger that contains a list of blocks that are linked together by cryptography. Fascinated and motivated by blockchain and Internet of Things (IoT), this thesis provides a review on blockchain based internet of things and also introduces a working testbed that integrates the two together. It also uses IoT device to invoke transactions into the blockchain. The ...


Reinforcement Learning In Self Organizing Cellular Networks, Roohollah Amiri May 2020

Reinforcement Learning In Self Organizing Cellular Networks, Roohollah Amiri

Boise State University Theses and Dissertations

Self-organization is a key feature as cellular networks densify and become more heterogeneous, through the additional small cells such as pico and femtocells. Self- organizing networks (SONs) can perform self-configuration, self-optimization, and self-healing. These operations can cover basic tasks such as the configuration of a newly installed base station, resource management, and fault management in the network. In other words, SONs attempt to minimize human intervention where they use measurements from the network to minimize the cost of installation, configuration, and maintenance of the network. In fact, SONs aim to bring two main factors in play: intelligence and autonomous adaptability ...


Nonlinear Least Squares 3-D Geolocation Solutions Using Time Differences Of Arrival, Michael V. Bredemann Apr 2020

Nonlinear Least Squares 3-D Geolocation Solutions Using Time Differences Of Arrival, Michael V. Bredemann

Mathematics & Statistics ETDs

This thesis uses a geometric approach to derive and solve nonlinear least squares minimization problems to geolocate a signal source in three dimensions using time differences of arrival at multiple sensor locations. There is no restriction on the maximum number of sensors used. Residual errors reach the numerical limits of machine precision. Symmetric sensor orientations are found that prevent closed form solutions of source locations lying within the null space. Maximum uncertainties in relative sensor positions and time difference of arrivals, required to locate a source within a maximum specified error, are found from these results. Examples illustrate potential requirements ...


Drones Detection Using Smart Sensors, Aishah Moafa Apr 2020

Drones Detection Using Smart Sensors, Aishah Moafa

Dissertations and Theses

Drones are modern and sophisticated technology that have been used in numerous fields. Nowadays, many countries use them in exploration, reconnaissance operations, and espionage in military operations. Drones also have many uses that are not limited to only daily life. For example, drones are used for home delivery, safety monitoring, and others. However, the use of drones is a double-edged sword. Drones can be used for positive purposes to improve the quality of human lives, but they can also be used for criminal purposes and other detrimental purposes. In fact, many countries have been attacked by terrorists using smart drones ...


Topology Control, Scheduling, And Spectrum Sensing In 5g Networks, Prosanta Paul Apr 2020

Topology Control, Scheduling, And Spectrum Sensing In 5g Networks, Prosanta Paul

Electrical & Computer Engineering Theses & Disssertations

The proliferation of intelligent wireless devices is remarkable. To address phenomenal traffic growth, a key objective of next-generation wireless networks such as 5G is to provide significantly larger bandwidth. To this end, the millimeter wave (mmWave) band (20 GHz -300 GHz) has been identified as a promising candidate for 5G and WiFi networks to support user data rates of multi-gigabits per second. However, path loss at mmWave is significantly higher than today's cellular bands. Fortunately, this higher path loss can be compensated through the antenna beamforming technique-a transmitter focuses a signal towards a specific direction to achieve high signal ...


Virtual Satcom, Long Range Broadband Digital Communications, Dennis George Watson Apr 2020

Virtual Satcom, Long Range Broadband Digital Communications, Dennis George Watson

Electrical & Computer Engineering Theses & Disssertations

The current naval strategy is based on a distributed force, networked together with high-speed communications that enable operations as an intelligent, fast maneuvering force. Satellites, the existing network connector, are weak and vulnerable to attack. HF is an alternative, but it does not have the information throughput to meet the distributed warfighting need. The US Navy does not have a solution to reduce dependency on space-based communication systems while providing the warfighter with the required information speed.

Virtual SATCOM is a solution that can match satellite communications (SATCOM) data speed without the vulnerable satellite. It is wireless communication on a ...


Towards Optimized Traffic Provisioning And Adaptive Cache Management For Content Delivery, Aditya Sundarrajan Mar 2020

Towards Optimized Traffic Provisioning And Adaptive Cache Management For Content Delivery, Aditya Sundarrajan

Doctoral Dissertations

Content delivery networks (CDNs) deploy hundreds of thousands of servers around the world to cache and serve trillions of user requests every day for a diverse set of content such as web pages, videos, software downloads and images. In this dissertation, we propose algorithms to provision traffic across cache servers and manage the content they host to achieve performance objectives such as maximizing the cache hit rate, minimizing the bandwidth cost of the network and minimizing the energy consumption of the servers.

Traffic provisioning is the process of determining the set of content domains hosted on the servers. We propose ...


Semantic Segmentation Of Aerial Imagery Using U-Nets, Terence J. Yi Mar 2020

Semantic Segmentation Of Aerial Imagery Using U-Nets, Terence J. Yi

Theses and Dissertations

In situations where global positioning systems are unavailable, alternative methods of localization must be implemented. A potential step to achieving this is semantic segmentation, or the ability for a model to output class labels by pixel. This research aims to utilize datasets of varying spatial resolutions and locations to train a fully convolutional neural network architecture called the U-Net to perform segmentations of aerial images. Variations of the U-Net architecture are implemented and compared to other existing models in order to determine the best in detecting buildings and roads. A final dataset will also be created combining two datasets to ...


Interoperable Ads-B Confidentiality, Brandon C. Burfeind Mar 2020

Interoperable Ads-B Confidentiality, Brandon C. Burfeind

Theses and Dissertations

The worldwide air traffic infrastructure is in the late stages of transition from legacy transponder systems to Automatic Dependent Surveillance - Broadcast (ADS-B) based systems. ADS-B relies on position information from GNSS and requires aircraft to transmit their identification, state, and position. ADS-B promises the availability of high-fidelity air traffic information; however, position and identification data are not secured via authentication or encryption. This lack of security for ADS-B allows non-participants to observe and collect data on both government and private flight activity. This is a proposal for a lightweight, interoperable ADS-B confidentiality protocol which uses existing format preserving encryption and ...


Tiny Disco: A Cost-Effective, High-Fidelity Wireless Audio System, Luke Martin Liberatore Feb 2020

Tiny Disco: A Cost-Effective, High-Fidelity Wireless Audio System, Luke Martin Liberatore

Computer Engineering

The Tiny Disco is a WiFi based concert system, featuring improvements on popular “Silent Disco” concerts. Rather than being tied to compression and bandwidth restrictions present in traditional silent disco systems, the Tiny Disco system can deliver 320kbps+ audio quality, and allows listeners to bring their own headphones, further lending to the high quality audio experience.

Tiny Disco uses a Raspberry Pi as the audio server, and Espressif ESP32 microcontrollers as audio receivers/clients. The Tiny Disco is primarily geared toward smaller concerts and niche events where audio quality is valued, though due to its WiFi-based architecture, it can be ...


Smart Collar, Gretchen T. Woodling, Sean Moran, Justen Bischoff, Jacob Sindelar Jan 2020

Smart Collar, Gretchen T. Woodling, Sean Moran, Justen Bischoff, Jacob Sindelar

Williams Honors College, Honors Research Projects

The Smart Collar is a universal pet tracker, designed to be small and exceedingly comfortable for any pet to wear. GPS technology is used to locate the device, allowing the user to track their pet, via a smart phone application. This application can be used to program the device, view maps of their pet’s location and history of travel. Operating primarily on Long Range Wide Area Network (LoRaWAN) for data transfer, the device consumes very little power, allowing for several days of run-time per charge of the battery. Boasting no monthly service fees, The Smart Collar provides pet owner ...


Terraria Server On A Raspberry Pi, Bradley Stoldt Jan 2020

Terraria Server On A Raspberry Pi, Bradley Stoldt

Williams Honors College, Honors Research Projects

My senior project is designed to display some of the material I have learned throughout the four years at The University of Akron, as well as explore into a newer piece of technology. I will be researching and documenting myself setting up a live network at my house that will have a raspberry pi running on it as a game server. The goal of this project is to get internal users to connect to the server, as well as users that are outside of my home network.


Zips Racing Electric Can Communications, Andrew Jordan, Adam Long, Susanah Kowalewski, Rami Nehme Jan 2020

Zips Racing Electric Can Communications, Andrew Jordan, Adam Long, Susanah Kowalewski, Rami Nehme

Williams Honors College, Honors Research Projects

The CAN protocol has been a standard of electronic communication networks of automotive vehicles since the early 2000s due to its robust reliability in harsh environments. For the 2020 competition year, the Zips Racing Electric design team will be building an entirely new, fully-electric vehicle with CAN communication implemented rather than communicating via pure analog signals. Hardware and software can be utilized to read analog electrical signals from a source, such as accelerator and brake sensors, and encode them into a digital message that meets the CAN 2.0B communication protocol standard. Likewise, software can be used to extract data ...


I/O Master, Aaron Dubler, Corey Dye, Cameron Sinko, Ian Glen, Nikolaus Untch Jan 2020

I/O Master, Aaron Dubler, Corey Dye, Cameron Sinko, Ian Glen, Nikolaus Untch

Williams Honors College, Honors Research Projects

The I/O Master is an engineering tool designed to let users quickly and efficiently use their computer to interface with embedded devices and sensors. Using a general purpose design, the goal is to make it possible to implement any digital protocol on the I/O Master. With the use of onboard level shifting, differential communication components, peripheral DMA through GPIO and a USB 2.0 High Speed computer interface, the I/O Master is able to implement such a general purpose design with initial implementation of five protocols to verify the design's capabilities. The implementation of a computer-based ...


Vehicle Operator Attention Monitor, Matthew Krispinsky, Matt Marsek, Matthew Mayfield, Brian Call Jan 2020

Vehicle Operator Attention Monitor, Matthew Krispinsky, Matt Marsek, Matthew Mayfield, Brian Call

Williams Honors College, Honors Research Projects

Motor vehicle operators’ attention levels can be monitored to improve driver safety. By recording and analyzing the drivers eye gaze, hand position, vehicle speed and engine rpm the driver’s attention can be determined. A Raspberry Pi will be the main processing unit. Data will be pulled and analyzed from the OBD-II port on vehicle speed and engine rpm. The system will be powered from a 12V, 4A pin on the OBD-II port connected to the car battery. A webcam will be used to track the pupil location and determine when the driver is looking at the road. A battery ...


Digital, Automated Reactive Target System, Nicholas Haas, Saipranay Vellala, Trandon Ware, Thomas Martin Jan 2020

Digital, Automated Reactive Target System, Nicholas Haas, Saipranay Vellala, Trandon Ware, Thomas Martin

Williams Honors College, Honors Research Projects

In this era, technology is woven into almost every facet of our leisure activities. Although technology has innovated hobbies ranging from chess to soccer, the art of shooting has been neglected. Unnecessary insufficiency such as bullet ricochets off of mechanical steel targets, ineffective progress tracking, and general inaccessibility to outdoor training facilities are all improvable areas of this sport. The Dynamic Automated Reactive Target (D.A.R.T) System aims to fill some of these gaps and help modernize recreational marksmanship. Modeling the system after a dueling tree will optimize the use of the system and allow for different training ...


Analysis Of Jitter Control Using Real Time Scheduling, Fnu Geetika-Singh Jan 2020

Analysis Of Jitter Control Using Real Time Scheduling, Fnu Geetika-Singh

Creative Components

Jitter is defined as variation in the delay of received packets. In other words, jitter can be termed as the varying part of delay. Jitter is the variation in the latency on a packet flow between two systems, when some packets take longer than expected from one system to the other. At the transmitting side, packets are sent in a continuous stream with the packets spaced equally apart in most cases. Due to network congestion, improper queuing, channel properties or configuration errors, this steady stream can become lumpy, or the delay between each packet can vary instead of remaining constant ...


Creature Care, Alexander Weber Jan 2020

Creature Care, Alexander Weber

Williams Honors College, Honors Research Projects

Caring for a pet is a formidable responsibility that requires intense care and monitoring in order to protect and prolong the life of the animal. Traditionally, caring for a reptile presents a unique challenge for pet owners, who not only need to care for the animal but for the environment as well. Individual species distinctly require precise monitoring and control of environmental parameters such as temperature, humidity, and air quality; and deviation from the nominal values often leads to serious health problems for the reptile. To simplify reptile ownership, a system was designed that measures the critical parameters of a ...


Augmented And Virtual Reality Telecommunication Tool, Nicholas Wilson Jan 2020

Augmented And Virtual Reality Telecommunication Tool, Nicholas Wilson

Creative Components

The objective of this creative component is to design and develop a mixed reality telecommunication application. Video conferencing platforms have seen an incredible increase in popularity over the past few years and have become an essential tool in most modern industries. The importance of these platforms as well as their limitations provide an opportunity for advancement through the integration of mixed reality. With this goal in mind, I was tasked with developing a Unity application that must; connect multiple players through a network connection, support both VR and AR players, and allow players to exist in the same relative 3D ...


Shape Detection Of Physical Objects With Intel 5300 And The 802.11n Csi Tool, Andrew Lopez Jan 2020

Shape Detection Of Physical Objects With Intel 5300 And The 802.11n Csi Tool, Andrew Lopez

Creative Components

This thesis presents a detailed look at channel state information (CSI), an efficient approach to the shape detection of physical objects, and observations on how environment noise affects CSI. CSI describes the communication link between a transmitter and receiver through the properties of multiple channels. Once analyzed, these channels or subcarriers describe how the signal travels from the transmitting device to the receiving device. While this information was intended to help increase signal quality and strength of a communication link, many other applications have been suggested.

The proposed application in this paper provides a way with minimal resources to capture ...


Optimizing Router Performance, Bradley Newton, Radon Rosborough, Miles President, Hakan Alpan Jan 2020

Optimizing Router Performance, Bradley Newton, Radon Rosborough, Miles President, Hakan Alpan

CMC Senior Theses

To support its development of networking hardware and software, Juniper Networks conducts research into enhancements to the protocols used on the Internet, in coordination with standards bodies such as the Internet Engineering Task Force. We helped Juniper Networks with two specific research objectives. The first was to design and implement an improved algorithm by which Internet hosts can establish the appropriate packet size to maximize bandwidth while avoiding packet fragmentation. We produced a working implementation of the improved algorithm in the Linux kernel. The second objective was to measure the effect of different Internet Protocol extension headers (specifically, Routing Header ...


Non-Trivial Off-Path Network Measurements Without Shared Side-Channel Resource Exhaustion, Geoffrey I. Alexander Dec 2019

Non-Trivial Off-Path Network Measurements Without Shared Side-Channel Resource Exhaustion, Geoffrey I. Alexander

Computer Science ETDs

Most traditional network measurement scans and attacks are carried out through the use of direct, on-path network packet transmission. This requires that a machine be on-path (i.e, involved in the packet transmission process) and as a result have direct access to the data packets being transmitted. This limits network scans and attacks to situations where access can be gained to an on-path machine. If, for example, a researcher wanted to measure the round trip time between two machines they did not have access to, traditional scans would be of little help as they require access to an on-path machine ...


Resource Allocation And Task Scheduling Optimization In Cloud-Based Content Delivery Networks With Edge Computing, Yang Peng Dec 2019

Resource Allocation And Task Scheduling Optimization In Cloud-Based Content Delivery Networks With Edge Computing, Yang Peng

Engineering Management, Information, and Systems Research Theses and Dissertations

The extensive growth in adoption of mobile devices pushes global Internet protocol (IP) traffic to grow and content delivery network (CDN) will carry 72 percent of total Internet traffic by 2022, up from 56 percent in 2017. In this praxis, Interconnected Cache Edge (ICE) based on different public cloud infrastructures with multiple edge computing sites is considered to help CDN service providers (SPs) to maximize their operational profit. The problem of resource allocation and performance optimization is studied in order to maximize the cache hit ratio with available CDN capacity.

The considered problem is formulated as a multi-stage stochastic linear ...


Extracting Social Network From Literary Prose, Tarana Tasmin Bipasha Dec 2019

Extracting Social Network From Literary Prose, Tarana Tasmin Bipasha

Theses and Dissertations

This thesis develops an approach to extract social networks from literary prose, namely, Jane Austen’s published novels from eighteenth- and nineteenth- century. Dialogue interaction plays a key role while we derive the networks, thus our technique relies upon our ability to determine when two characters are in conversation. Our process involves encoding plain literary text into the Text Encoding Initiative’s (TEI) XML format, character name identification, conversation and co-occurrence detection, and social network construction. Previous work in social network construction for literature have focused on drama, specifically manually TEI-encoded Shakespearean plays in which character interactions are much easier ...