Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California Polytechnic State University, San Luis Obispo (9)
- University of Massachusetts Amherst (4)
- University of Arkansas, Fayetteville (3)
- Governors State University (2)
- Old Dominion University (2)
-
- The University of Akron (2)
- University of Kentucky (2)
- Western University (2)
- Air Force Institute of Technology (1)
- California State University, San Bernardino (1)
- Edith Cowan University (1)
- Georgia Southern University (1)
- The University of Maine (1)
- The University of Southern Mississippi (1)
- Union College (1)
- United Arab Emirates University (1)
- Universidad de La Salle (1)
- University of Denver (1)
- University of North Florida (1)
- University of Tennessee, Knoxville (1)
- University of Texas at El Paso (1)
- World Maritime University (1)
- Keyword
-
- Routing (3)
- Applied sciences (2)
- Detection (2)
- Virtualization (2)
- ASIC (1)
-
- Academic -- UNF -- Computing; Cloudstone; Web 2.0; Faban; Olio; IaaS; Benchmarking (1)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (1)
- Android (1)
- Android Server Client Keystroke (1)
- Anomalous (1)
- Aplicaciones industriales (1)
- Automated (1)
- Automatic Incident (1)
- Automatic profile (1)
- Automation (1)
- Autonomous (1)
- Beverage dispenser (1)
- Bluetooth Low Energy (1)
- C-RAN (1)
- CA (1)
- CNC (1)
- Carnivalesque (1)
- Cetificate Authority (1)
- Cisco (1)
- Classification (1)
- Cloud computing (1)
- Clustered systems (1)
- Clustering protocols; wireless sensor networks; load balancing; routing protocols; energy efficiency protocols; ferry protocol. (1)
- Collaborative (1)
- College of Arts Humanities and Social Sciences (1)
- Publication
-
- Computer Engineering (3)
- Electronic Theses and Dissertations (3)
- Masters Theses (3)
- All Capstone Projects (2)
- Computer Science Theses & Dissertations (2)
-
- Computer Science and Software Engineering (2)
- Doctoral Dissertations (2)
- Electrical Engineering (2)
- Electronic Thesis and Dissertation Repository (2)
- Graduate Theses and Dissertations (2)
- Theses and Dissertations--Computer Science (2)
- Williams Honors College, Honors Research Projects (2)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
- Dissertations (1)
- Electronic Theses, Projects, and Dissertations (1)
- Honors Theses (1)
- Ingeniería en Automatización (1)
- Liberal Arts and Engineering Studies (1)
- Maritime Safety & Environment Management Dissertations (Dalian) (1)
- Mechanical Engineering (1)
- Open Access Theses & Dissertations (1)
- Theses (1)
- Theses and Dissertations (1)
- Theses: Doctorates and Masters (1)
- UNF Graduate Theses and Dissertations (1)
Articles 1 - 30 of 40
Full-Text Articles in Computer Engineering
Estimation On Gibbs Entropy For An Ensemble, Lekhya Sai Sake
Estimation On Gibbs Entropy For An Ensemble, Lekhya Sai Sake
Electronic Theses, Projects, and Dissertations
In this world of growing technology, any small improvement in the present scenario would create a revolution. One of the popular revolutions in the computer science field is parallel computing. A single parallel execution is not sufficient to see its non-deterministic features, as same execution with the same data at different time would end up with a different path. In order to see how non deterministic a parallel execution can extend up to, creates the need of the ensemble of executions. This project implements a program to estimate the Gibbs Entropy for an ensemble of parallel executions. The goal is …
Efficient Scheduling Algorithms For Wireless Resource Allocation And Virtualization In Wireless Networks, Mohamad Kalil
Efficient Scheduling Algorithms For Wireless Resource Allocation And Virtualization In Wireless Networks, Mohamad Kalil
Electronic Thesis and Dissertation Repository
The continuing growth in demand for better mobile broadband experiences has motivated rapid development of radio-access technologies to support high data rates and improve quality of service (QoS) and quality of experience (QoE) for mobile users. However, the modern radio-access technologies pose new challenges to mobile network operators (MNO) and wireless device designers such as reducing the total cost of ownership while supporting high data throughput per user, and extending battery life-per-charge of the mobile devices. In this thesis, a variety of optimization techniques aimed at providing innovative solutions for such challenges are explored.
The thesis is divided into two …
User Interface Design And Forensic Analysis For Diorama, Decision Support System For Mass Casualty Incidents, Jun Yi
Masters Theses
In this thesis we introduces the user interface design and forensic analysis tool for DIORAMA system. With an Android device, DIORAMA provides emergency personnel the ability to collect information in real time, track the resources and manage them. It allows the responders and commanders to mange multiple incidents simultaneously. This thesis also describes the implementations of commander app and responder app, as well as two different communication strategies used in DIORAMA. Several trials and simulated mass casualty incidents were conducted to test the functionalities and performance of DIORAMA system. All responders that participated in all trials were very satisfied with …
Design And Implementation Of A High Performance Network Processor With Dynamic Workload Management, Padmaja Duggisetty
Design And Implementation Of A High Performance Network Processor With Dynamic Workload Management, Padmaja Duggisetty
Masters Theses
Internet plays a crucial part in today's world. Be it personal communication, business transactions or social networking, internet is used everywhere and hence the speed of the communication infrastructure plays an important role. As the number of users increase the network usage increases i.e., the network data rates ramped up from a few Mb/s to Gb/s in less than a decade. Hence the network infrastructure needed a major upgrade to be able to support such high data rates. Technological advancements have enabled the communication links like optical fibres to support these high bandwidths, but the processing speed at the nodes …
Energy-Efficient Content Delivery Networks, Vimal Mathew
Energy-Efficient Content Delivery Networks, Vimal Mathew
Doctoral Dissertations
Internet-scale distributed systems such as content delivery networks (CDNs) operate hundreds of thousands of servers deployed in thousands of data center locations around the globe. Since the energy costs of operating such a large IT infrastructure are a significant fraction of the total operating costs, we argue for redesigning them to incorporate energy optimization as a first-order principle. We focus on CDNs and demonstrate techniques to save energy while meeting client-perceived service level agreements (SLAs) and minimizing impact on hardware reliability. Servers deployed at individual data centers can be switched off at low load to save energy. We show that …
Effective Node Clustering And Data Dissemination In Large-Scale Wireless Sensor Networks, Mariam Saeed Ai Nuaimi
Effective Node Clustering And Data Dissemination In Large-Scale Wireless Sensor Networks, Mariam Saeed Ai Nuaimi
Theses
The denseness and random distribution of large-scale WSNs makes it quite difficult to replace or recharge nodes. Energy efficiency and management is a major design goal in these networks. In addition, reliability and scalability are two other major goals that have been identified by researchers as necessary in order to further expand the deployment of such networks for their use in various applications. This thesis aims to provide an energy efficient and effective node clustering and data dissemination algorithm in large-scale wireless sensor networks. In the area of clustering, the proposed research prolongs the lifetime of the network by saving …
Employee Hr Connect Portal, Aparna Allusivala, Sindhura Reddy Mandadi, Sri Vidya Rani Mudunuri
Employee Hr Connect Portal, Aparna Allusivala, Sindhura Reddy Mandadi, Sri Vidya Rani Mudunuri
All Capstone Projects
Employee HR Connect Portal is essential in order to track employee time, project time. This portal can be hosted on any java based web server or application server and will be accessible via web-browsers. This portal is very user- friendly. Employee HR Connect Portal will be a useful tool to identify supply and demand of human resources. We have three main modules to maintain records of employee, department and project. Employee HR Connect Portal is very helpful for auditing. Through this portal we can judge the potentiality of the employee.
Real-Time Detection System For Suspicious Urls, Krishna Prasad Chouty, Anup Chandra Thogiti, Kranthi Sudha Vudatha
Real-Time Detection System For Suspicious Urls, Krishna Prasad Chouty, Anup Chandra Thogiti, Kranthi Sudha Vudatha
All Capstone Projects
Twitter is prone to malicious tweets containing URLs for spam, phishing, and malware distribution. Conventional Twitter spam detection schemes utilize account features such as the ratio of tweets containing URLs and the account creation date, or relation features in the Twitter graph. These detection schemes are ineffective against feature fabrications or consume much time and resources. Conventional suspicious URL detection schemes utilize several features including lexical features of URLs, URL redirection, HTML content, and dynamic behavior. However, evading techniques such as time-based evasion and crawler evasion exist. In this paper, we propose WARNINGBIRD, a suspicious Real-Time URL detection system for …
Novel Techniques For Secure Use Of Public Cloud Computing Resources, Kyle E. Stewart
Novel Techniques For Secure Use Of Public Cloud Computing Resources, Kyle E. Stewart
Theses and Dissertations
The federal government has an expressed interest in moving data and services to third party service providers in order to take advantage of the flexibility, scalability, and potential cost savings. This approach is called cloud computing. The thesis for this research is that efficient techniques exist to support the secure use of public cloud computing resources by a large, federated enterprise. The primary contributions of this research are the novel cryptographic system MA-AHASBE (Multi-Authority Anonymous Hierarchical Attribute-Set Based Encryption), and the techniques used to incorporate MA-AHASBE in a real world application. Performance results indicate that while there is a cost …
Study Of The Research Status On E-Navigation, Qiwei Chen
Study Of The Research Status On E-Navigation, Qiwei Chen
Maritime Safety & Environment Management Dissertations (Dalian)
No abstract provided.
Data Security And Privacy In Smart Grid, Yue Tong
Data Security And Privacy In Smart Grid, Yue Tong
Doctoral Dissertations
This dissertation explores novel data security and privacy problems in the emerging smart grid.
The need for data security and privacy spans the whole life cycle of the data in the smart grid, across the phases of data acquisition, local processing and archiving, collaborative processing, and finally sharing and archiving. The first two phases happen in the private domains of an individual utility company, where data are collected from the power system and processed at the local facilities. When data are being acquired and processed in the private domain, data security is the most critical concern. The key question is …
Evaluation Of Two-Dimensional Codes For Digital Information Security In Physical Documents, Shuai Chen
Evaluation Of Two-Dimensional Codes For Digital Information Security In Physical Documents, Shuai Chen
Masters Theses
Nowadays, paper documents are still frequently used and exchanged in our daily life. To safely manage confidential paper information such as medical and financial records has increasingly become a challenge. If a patient's medical diagnosis get stolen or dumped without shredding, his or her private information would be leaked. Some companies and organizations do not pay enough attention to the problem, letting their customers suffer the loss. In the thesis, I designed a hybrid system to solve this problem effectively and economically. This hybrid system integrates physical document properties with digital security technology, which brings in a revolutionary idea for …
Automatic User Profile Construction For A Personalized News Recommender System Using Twitter, Shiva Theja Reddy Gopidi
Automatic User Profile Construction For A Personalized News Recommender System Using Twitter, Shiva Theja Reddy Gopidi
Graduate Theses and Dissertations
Modern society has now grown accustomed to reading online or digital news. However, the huge corpus of information available online poses a challenge to users when trying to find relevant articles. A hybrid system “Personalized News Recommender Using Twitter’ has been developed to recommend articles to a user based on the popularity of the articles and also the profile of the user. The hybrid system is a fusion of a collaborative recommender system developed using tweets from the “Twitter” public timeline and a content recommender system based the user’s past interests summarized in their conceptual user profile. In previous work, …
Reducing Multiple Access Interference In Broadband Multi-User Wireless Networks, Ali Nayef Alqatawneh
Reducing Multiple Access Interference In Broadband Multi-User Wireless Networks, Ali Nayef Alqatawneh
Graduate Theses and Dissertations
This dissertation is devoted to developing multiple access interference (MAI) reduction techniques for multi-carrier multi-user wireless communication networks.
In multi-carrier code division multiple access (MC-CDMA) systems, a full multipath diversity can be achieved by transmitting one symbol over multiple orthogonal subcarriers by means of spreading codes. However, in frequency selective fading channels, orthogonality among users can be destroyed leading to MAI. MAI represents the main obstacle to support large number of users in multi-user wireless systems. Consequently, MAI reduction becomes a main challenge when designing multi-carrier multi-user wireless networks. In this dissertation, first, we study MC-CDMA systems with different existing …
Detecting, Modeling, And Predicting User Temporal Intention, Hany M. Salaheldeen
Detecting, Modeling, And Predicting User Temporal Intention, Hany M. Salaheldeen
Computer Science Theses & Dissertations
The content of social media has grown exponentially in the recent years and its role has evolved from narrating life events to actually shaping them. Unfortunately, content posted and shared in social networks is vulnerable and prone to loss or change, rendering the context associated with it (a tweet, post, status, or others) meaningless. There is an inherent value in maintaining the consistency of such social records as in some cases they take over the task of being the first draft of history as collections of these social posts narrate the pulse of the street during historic events, protest, riots, …
Seizure Tracker, Zachary Reardon
Seizure Tracker, Zachary Reardon
Computer Engineering
The goal of this project is to make a Module that enables anyone watching a person with disabilities to record any seizure that this person has under their care. Then when the Doctor/parent receives their patient/kid they are able to download all the seizures that their patient/kid had while they were away. The Doctor/parent then has the exact time, the duration of the seizure, and the type of seizure for all the seizures that have occurred while they were away from their patient/kid. From this data it is possible that the Doctor may see some sort of patterns that enables …
Universal Uav Payload Interface, Nolan Reker, David Troy Jr, Drew Troxell
Universal Uav Payload Interface, Nolan Reker, David Troy Jr, Drew Troxell
Computer Engineering
Unmanned Aerial Vehicle (UAV) technology is becoming increasingly accessible for civilian use. Both open-source and commercial-purpose UAVs can be obtained affordably or even built. However, the platforms available are very segmented in their customization to a specific application (i.e. land surveying, payload delivery). This project aims to create a Universal Payload Interface (UPI) mounted to the underside of multi-rotors or other UAVs to enable the attachment of customizable sensor payloads. These payloads allow a single UAV to be rapidly reconfigured to perform a multitude of tasks.
The Universal Payload Interface facilitates communication between the payload, onboard flight controller, and operator …
Panorama: Multi-Path Ssl Authentication Using Peer Network Perspectives, William P. Harris
Panorama: Multi-Path Ssl Authentication Using Peer Network Perspectives, William P. Harris
Computer Engineering
SSL currently uses certificates signed by Certificate Authorities (CAs) to authenticate connections. e.g. Google will pay a CA to sign a certificate for them, so that they can prove that they're not someone pretending to be Google. Unfortunately, this system has had multiple problems, and many believe that an alternative needs to be found.
One of the ideas for alternatives is using multiple "network perspectives" to authenticate a server. The idea behind this is that, though playing man-in-the-middle (MITM) with one connection is easy, it should be difficult for an adversary to do so with many connections, especially if they …
Visualizing Population Density Based On Wifi Router Location And Network Usage, Tyler Deitz
Visualizing Population Density Based On Wifi Router Location And Network Usage, Tyler Deitz
Liberal Arts and Engineering Studies
This research paper introduces a prototype of a feature for Robert E. Kennedy’s maps web application. The feature visualizes population density based off wifi router location and network usage within the building. The significance of the feature is noted by documenting the library’s transition into a hub for student life and campus culture, which increases the space’s occupancy and visitor retention for a longer time. The feature is based off a Voronoi diagram map distribution which strongly affects its technical and visual implementation. The end product is user tested by Cal Poly students and received a 93.5% satisfaction rate.
Forest Sign Maker, Victor Espinosa Iii, Kevin Ly, Lisa Yip
Forest Sign Maker, Victor Espinosa Iii, Kevin Ly, Lisa Yip
Mechanical Engineering
Executive Summary:
The Inyo National Forest is arguably one of the most beautiful locations in California, containing natural masterpieces such as Mount Whitney and the Ancient Bristlecone Pine Forest. Despite its magnificence, the Inyo National Forest can be a treacherous region. The Friends of the Inyo take pride in being able to facilitate the viewing experience for all outdoorsmen by maintaining the mountain trails, which includes providing adequate trail signage.
Unfortunately, there is a fundamental issue with the recent state of trail signage in the Inyo National Forest: the rate at which signs are being vandalized or naturally destroyed is …
Custom Keys: Numeric Keypad Server-Client Android App, Cameron Hom
Custom Keys: Numeric Keypad Server-Client Android App, Cameron Hom
Computer Science and Software Engineering
Custom Keys is an app that consists of a server and an app which communicate through the network. This project explored a way to improve numeric keystroke input for users who do not have numeric keypads on their laptops or computers. I discuss many features and designs I used in Custom Keys to create the app and server. I also discuss some of the drawbacks to the design. Custom Keys was successfully created but more testing and research is needed to determine if it improves individual numeric keystroke's per minute.
Enterprise Smart Outlet - Ios Application, Riley Mcgovern
Enterprise Smart Outlet - Ios Application, Riley Mcgovern
Computer Science and Software Engineering
The Enterprise Smart Outlet is a system made up of a smart outlet, a Node.js server, and a companion iOS application. It builds on the already existing market of smart power outlets and aims to bring that type of functionality fully scaled up to the enterprise level. The smart outlet connects to the Node.js server and sends its power readings. The iOS application connects to the Node.js server to receive all power readings from all the connected smart outlets and can also toggle the power on and off for each outlet.
Classifying System Call Traces Using Anomalous Detection, William Doyle
Classifying System Call Traces Using Anomalous Detection, William Doyle
Honors Theses
We used data mining techniques to detect intrusions among system call traces and have outlined our results. Recent work at the intersection of security and machine learning has lead to better understanding of anomalous intrusion detection. There is a need to more thoroughly understand how anomaly detection can be used because of its potential applications and advantages over current standard methods. In this thesis, we report on a new approach of anomalous detection using system call traces. Our goal is to be able to create a system that can accurately detect hacking attacks by analyzing the sequences of system calls …
Alternative Models Of Connectivity: Reclaiming Networked Spaces, Philip M. Bain
Alternative Models Of Connectivity: Reclaiming Networked Spaces, Philip M. Bain
Electronic Theses and Dissertations
Alternative networking is a growing field of study and practice due to advancements in computer networking hardware, and software protocols. Methods of integrating alternative networking configurations into infrastructure present enhanced forms of empowerment and embodiment for participants. Through an analysis of multiple hardware and software examples, this research suggests that practices of sharing and collaboration, which are embedded in the history of computer networking, have the potential to reinvigorate the notion of a virtual public sphere, and support the ideals of digital democracy.
M-1: The Mealy Open Source Custom Midi Controller, Garrett Leung, Darren O. Mistica
M-1: The Mealy Open Source Custom Midi Controller, Garrett Leung, Darren O. Mistica
Electrical Engineering
With the high price of large mixing consoles, aspiring artists are restricted to using a mouse to control digital facsimiles of knobs, faders, switches, and buttons. Though using the software controls is considered a simple task, dedicated hardware allows for tactile, visual, and utility. At a low cost, the heart of the MTech M-1 can be customized and placed into any shell with any combination of controls as possible with the underlying platform.
Modern MIDI controllers require significant physical space due to their preset button layout and space consuming setups. Despite their high price, modern MIDI controllers have only one …
Wireless Sensor Mesh Network For Irrigation Systems, Rosana Cheruvelil, Oswaldo Garcia, Nabil Haque, Justin Ignacio, Stanley Thomas
Wireless Sensor Mesh Network For Irrigation Systems, Rosana Cheruvelil, Oswaldo Garcia, Nabil Haque, Justin Ignacio, Stanley Thomas
Electrical Engineering
Pepper Oak Farms, a company that grows their own olives for olive oil and has approximately 40,000 olive trees, is in need of an efficient way to monitor the soil and atmospheric conditions that are critical to the cultivation of their trees. The company at the moment only has two sensors and has to manually place the sensors at different locations to collect data on soil moisture and temperature. This is expensive, time consuming, and a lot of effort on the owner’s part to go out on the fields to collect this data. As a solution, the company would like …
Sistema De Comunicación Vía Inalámbrico Para Los Blancos Y El Sistema De Puntaje Sius Ascor De Fedetirocol, Yeny Olarte Mateus, John Henry Rodriguez Duran
Sistema De Comunicación Vía Inalámbrico Para Los Blancos Y El Sistema De Puntaje Sius Ascor De Fedetirocol, Yeny Olarte Mateus, John Henry Rodriguez Duran
Ingeniería en Automatización
En este proyecto se ejecutará el diseño e implementación de un sistema de comunicación inalámbrica para los blancos electrónicos de tiro SIUS ASCOR, con el fin de facilitar la comunicación entre sus dispositivos y su sistema de puntaje. En la Federación Colombiana de Tiro y Caza muchos de estos sistemas se encuentran averiados, impidiendo el desarrollo normal de las competencias de tiro deportivo a nivel nacional e internacional. La finalidad de este proyecto es garantizar el buen funcionamiento de dichos sistemas electrónicos llevándolos nuevamente a los campos de entrenamiento y competencia. Los blancos poseen dos tarjetas de adquisición de datos, …
Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad
Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad
Dissertations
Abstract
Sensor nodes collect data from the physical world then exchange it until it reaches the intended destination. This information can be sensitive, such as battlefield surveillance. Therefore, providing secure and continuous data transmissions among sensor nodes in wireless network environments is crucial. Wireless sensor networks (WSN) have limited resources, limited computation capabilities, and the exchange of data through the air and deployment in accessible areas makes the energy, security, and routing major concerns in WSN. In this research we are looking at security issues for the above reasons. WSN is susceptible to malicious activities such as hacking and physical …
Challenges Of Implementing Automatic Dependent Surveillance Broadcast In The Nextgen Air Traffic Management System, Carl J. Giannatto Jr.
Challenges Of Implementing Automatic Dependent Surveillance Broadcast In The Nextgen Air Traffic Management System, Carl J. Giannatto Jr.
Electronic Theses and Dissertations
The Federal Aviation Administration is in the process of replacing the current Air Traffic Management (ATM) system with a new system known as NextGen. Automatic Dependent Surveillance-Broadcast (ADS-B) is the aircraft surveillance protocol currently being introduced as a part of the NextGen system deployment. The evolution of ADS-B spans more than two decades, with development focused primarily on increasing the capacity of the Air Traffic Control (ATC) system and reducing operational costs. Security of the ADS-B communications network has not been a high priority, and the inherent lack of security measures in the ADS-B protocol has come under increasing scrutiny …
Tweetement: Pseudo-Relevance Feedback For Twitter Search, Kanatbay Bektemirov
Tweetement: Pseudo-Relevance Feedback For Twitter Search, Kanatbay Bektemirov
Computer Science and Computer Engineering Undergraduate Honors Theses
Microblogging platforms such as Twitter let users communicate with short messages. Due to the messages’ short content and the users’ tendency to type short queries while searching, it is particularly challenging to locate useful tweets that match user queries. The fundamental problems of word mismatch due to ambiguity are especially acute. To solve this problem, this thesis explores and compares multiple automatic query expansion methods that involve the most frequent hashtags and keywords. We built a Web service that provides real-time Twitter Search results incorporating automatic query expansion. Six pseudo-relevance feedback methods were studied and the numbers indicate that results …