Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

2009

Institution
Keyword
Publication
Publication Type
File Type

Articles 31 - 60 of 83

Full-Text Articles in Computer Engineering

Using Timed-Release Cryptography To Mitigate The Preservation Risk Of Embargo Periods, Rabia Haq, Michael L. Nelson Jun 2009

Using Timed-Release Cryptography To Mitigate The Preservation Risk Of Embargo Periods, Rabia Haq, Michael L. Nelson

Computer Science Presentations

PDF of a powerpoint presentation from the 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin, Texas, June 15-19, 2009. Also available on Slideshare.


Internet-Scale Reactive Routing And Mobility, Daniel B. Nelson Jun 2009

Internet-Scale Reactive Routing And Mobility, Daniel B. Nelson

Master's Theses

Since its commercialization, the Internet has grown exponentially. A large variety of devices can communicate creating advanced services for a diverse ecosystem of applications. However, as the number of Internet hosts has grown, the size of routing tables required to correctly route data between them has also increased exponentially. This growth rate necessitates increasingly frequent upgrades to routing device hardware, providing them with additional memory for fast-access storage of route information. These upgrades are both physically and fiscally untenable, and a new Internet routing solution is necessary for future growth.

This research focuses around an incrementally deployable, reactive routing system …


General Direction Routing Protocol, Sean Michael Lydon Jun 2009

General Direction Routing Protocol, Sean Michael Lydon

Master's Theses

The General Direction Routing Protocol (GDRP) is a Wireless Sensor Network (WSN)

multi-path routing protocol which abstracts localization information (commonly GPS

coordinates) into relative direction information in order to perform routing decisions. By

generating relative direction information GDRP is able to operate with fewer precision

requirements than other protocols. This abstraction also allows the integration of other emerging

hardware-based localization techniques, for example, Beamforming Sensor Arrays.

GDRP does not specifically address the next hop a packet should take, but instead specifies a

direction it should travel. This direction abstraction allows for multiple paths to be taken through

the network thus …


Store And Forward Routing For Sparse Pico-Satellite Sensor Networks With Data-Mules, Trevor Joseph Koritza Jun 2009

Store And Forward Routing For Sparse Pico-Satellite Sensor Networks With Data-Mules, Trevor Joseph Koritza

Master's Theses

Satellites are playing an increasingly important role in collecting scientific information, providing communication services, and revolutionizing navigation. Until recently satellites were large and very expensive, creating a high barrier to entry that only large corporations and government agencies could overcome. In the past few years the CubeSat project at California Polytechnic University in San Luis Obispo (Cal Poly) has worked to refine the design and launching of small, lightweight, and less expensive satellites called pico-satellites, opening space up to a wider audience. Now that Cal Poly has the launch logistics and hardware under control, a new problem has arisen. These …


An Adaptive Adjacent Channel Interference Cancellation Technique, Robert H. Morelos-Zaragoza, Shobha Kuruba May 2009

An Adaptive Adjacent Channel Interference Cancellation Technique, Robert H. Morelos-Zaragoza, Shobha Kuruba

Robert Henry Morelos-Zaragoza

In this paper, an adaptive adjacent channel interference (ACI) technique is proposed. Results for BPSK modulation with rectangular and square-root raised-cosine pulse shaping, under AWGN conditions, are obtained showing the proposed method to be effective in improving performance under high levels of interference. Basically, the idea is to send pilot signals and then to use them in estimating the amount of ACI in the frequency domain. The estimated spectral error is used to modify tap weights of an adaptive frequency-domain filter. Our simulation results reported suggest that ACI can be effectively reduced with the proposed technique. At the system level, …


Adding Escience Assets To The Data Web, Herbert H. Van De Sompel, Carl Lagoze, Michael L. Nelson, Simeon Warner, Robert Sanderson, Pete Johnston Apr 2009

Adding Escience Assets To The Data Web, Herbert H. Van De Sompel, Carl Lagoze, Michael L. Nelson, Simeon Warner, Robert Sanderson, Pete Johnston

Computer Science Faculty Publications

Aggregations of Web resources are increasingly important in scholarship as it adopts new methods that are data-centric, collaborative, and networked-based. The same notion of aggregations of resources is common to the mashed-up, socially networked information environment of Web 2.0. We present a mechanism to identify and describe aggregations of Web resources that has resulted from the Open Archives Initiative - Object Reuse and Exchange (OAI-ORE) project. The OAI-ORE specifications are based on the principles of the Architecture of the World Wide Web, the Semantic Web, and the Linked Data effort. Therefore, their incorporation into the cyberinfrastructure that supports eScholarship will …


From General Technology Familiarity To Anti-Spyware Program Adoption: Comparison Between The U.S. And South Korea, Dong-Heon Kwak Apr 2009

From General Technology Familiarity To Anti-Spyware Program Adoption: Comparison Between The U.S. And South Korea, Dong-Heon Kwak

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Business at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Dong-Heon Kwak on April 7, 2009.


Selecting The Best Network For The Labview Remote Control System To Achieve Better Performance, Sivakrishna Nannapaneni Apr 2009

Selecting The Best Network For The Labview Remote Control System To Achieve Better Performance, Sivakrishna Nannapaneni

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Science and Technology at Morehead State University in partial fulfillment of the requirements for Degree of Masters of Science by Sivakrishna Nannapaneni on April 6, 2009.


Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang Apr 2009

Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang

Electrical and Computer Engineering Faculty Publications

A proactive recovery scheme based on service migration for long-running Byzantine fault-tolerant systems is described. Proactive recovery is an essential method for ensuring the long-term reliability of fault-tolerant systems that are under continuous threats from malicious adversaries. The primary benefit of our proactive recovery scheme is a reduced vulnerability window under normal operation. This is achieved in two ways. First, the time-consuming reboot step is removed from the critical path of proactive recovery. Second, the response time and the service migration latency are continuously profiled and an optimal service migration interval is dynamically determined during runtime based on the observed …


Evaluating The Vulnerability Of Network Traffic Using Joint Security And Routing Analysis, Patrick Tague, David Slater, Jason Rogers, Radha Poovendran Mar 2009

Evaluating The Vulnerability Of Network Traffic Using Joint Security And Routing Analysis, Patrick Tague, David Slater, Jason Rogers, Radha Poovendran

Patrick Tague

Joint analysis of security and routing protocols in wireless networks reveals vulnerabilities of secure network traffic that remain undetected when security and routing protocols are analyzed independently. We formulate a class of continuous metrics to evaluate the vulnerability of network traffic as a function of security and routing protocols used in wireless networks. We develop two complementary vulnerability definitions using set theoretic and circuit theoretic interpretations of the security of network traffic, allowing a network analyst or an adversary to determine weaknesses in the secure network. We formalize node capture attacks using the vulnerability metric as a nonlinear integer programming …


Just The Facts, Ma’Am: Make The Web Your Investigative Partner, Anne Burnett Mar 2009

Just The Facts, Ma’Am: Make The Web Your Investigative Partner, Anne Burnett

Presentations

The web is a handy investigative tool, allowing a researcher to obtain information about persons, property and things. One can find email addresses, home addresses, telephone numbers, criminal records, military service information, property records, vital statistics information, photographs and more. This information may help locate a missing heir, reveal useful information about a potential expert witness, confirm the legitimacy of a business, determine who owns a piece of property or expose the litigious nature of a potential client. The focus in these program materials is on free resources, but I also cover a few fee-based services that can be accessed …


Anticipating Technological Change: Predictions, Trends And Gadgets, Carol A. Watson Mar 2009

Anticipating Technological Change: Predictions, Trends And Gadgets, Carol A. Watson

Presentations

With the current economic downtown, today's business environment is more competitive than ever. Businesses that distinguish themselves in any small way and provide cost-savings, can gain a significant advantage over their rivals. To emphasize the point, note that the ABA Techshow 2009 has a session titled: If You’re Not Serving Your Clients Online, Someone Else Will Be. It is, therefore, essential that attorneys harness technology and remain up-to-date on the latest computer developments . In this paper, I will begin by discussing technologies that are currently available on the web that will increase your abilities to collaborate, reduce your office …


A Taxonomy For And Analysis Of Anonymous Communications Networks, Douglas J. Kelly Mar 2009

A Taxonomy For And Analysis Of Anonymous Communications Networks, Douglas J. Kelly

Theses and Dissertations

Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks intended to gather intelligence and disrupt communications rapidly replacing the threat of conventional and nuclear attacks, a new age of warfare is at hand. In 2003, the United States acknowledged that the speed and anonymity of cyber attacks makes distinguishing among the actions of terrorists, criminals, and nation states difficult. Even President Obama’s Cybersecurity Chief-elect recognizes the challenge of increasingly sophisticated cyber attacks. Now through April 2009, the White House is reviewing federal cyber initiatives to protect US citizen privacy rights. Indeed, the rising quantity and ubiquity …


Decisive Routing And Admission Control According To Quality Of Service Constraints, Cindy C. Reese Mar 2009

Decisive Routing And Admission Control According To Quality Of Service Constraints, Cindy C. Reese

Theses and Dissertations

This research effort examines, models, and proposes options to enhance command and control for decision makers when applied to the communications network. My goal is to research the viability of combining three students’ past research efforts and expanding and enhancing those efforts. The area of this research is predicting a snapshot of the communications network, context-aware routing between network nodes, and Quality of Service-based routing optimization in order to create an intelligent routing protocol platform. It will consolidate efforts from an Intelligent Agent Based Framework to Maximize Information Utility by Captain John Pecarina, Dialable Cryptography for Wireless Networks by Major …


Using A Multiobjective Approach To Balance Mission And Network Goals Within A Delay Tolerant Network Topology, Anthony L. Larweck Mar 2009

Using A Multiobjective Approach To Balance Mission And Network Goals Within A Delay Tolerant Network Topology, Anthony L. Larweck

Theses and Dissertations

This thesis investigates how to incorporate aspects of an Air Tasking Order (ATO), a Communications Tasking Order (CTO), and a Network Tasking Order (NTO) within a cognitive network framework. This was done in an effort to aid the commander and or network operator by providing automation for battlespace management to improve response time and potential inconsistent problem resolution. In particular, autonomous weapon systems such as unmanned aerial vehicles (UAVs) were the focus of this research This work implemented a simple cognitive process by incorporating aspects of behavior based robotic control principles to solve the multi-objective optimization problem of balancing both …


The Benefits Of A Network Tasking Order In Combat Search And Rescue Missions, Murat Gocmen Mar 2009

The Benefits Of A Network Tasking Order In Combat Search And Rescue Missions, Murat Gocmen

Theses and Dissertations

Networked communications play a crucial role in United States Armed Forces operations. As the military moves towards more network centric (Net-Centric) operations, it becomes increasingly important to use the network as effectively as possible with respect to the overall mission. This thesis advocates the use of a Network Tasking Order (NTO), which allows operators to reason about the network based on asset movement, capabilities, and communication requirements. These requirements are likely to be derived from the Air Tasking Order (ATO), which gives insight into the plan for physical assets in a military mission. In this research we illustrate the benefit …


Using Covert Means To Establish Cybercraft Command And Control, Bradley D. Sevy Mar 2009

Using Covert Means To Establish Cybercraft Command And Control, Bradley D. Sevy

Theses and Dissertations

With the increase in speed and availability of computers, our nation's computer and information systems are being attacked with increased sophistication. The Air Force Research Laboratory (AFRL) Information Directorate (RI) is researching a next generation network defense architecture, called Cybercraft, that provides automated and trusted cyber defense capabilities for AF network assets. This research we consider the issues to protect or obfuscate command and control aspects of Cybercraft. In particular, we present a methodology to hide aspects of Cybercraft platform initialization in context to formation of hierarchical, peer-to-peer groups that collectively form the Cybercraft network. Because malicious code networks (known …


Evaluation Of An Opnet Model For Unmanned Aerial Vehicle Networks, Clifton M. Durham Mar 2009

Evaluation Of An Opnet Model For Unmanned Aerial Vehicle Networks, Clifton M. Durham

Theses and Dissertations

The concept of Unmanned Aerial Vehicles (UAVs) was first used as early as the American Civil War, when the North and the South unsuccessfully attempted to launch balloons with explosive devices. Since the American Civil War, the UAV concept has been used in all subsequent military operations. Over the last few years, there has been an explosion in the use of UAVs in military operations, as well as civilian and commercial applications. UAV Mobile Ad Hoc Networks (MANETs) are fast becoming essential to conducting Network-Centric Warfare (NCW). As of October 2006, coalition UAVs, exclusive of hand-launched systems, had flown almost …


Low Probability Of Intercept Waveforms Via Intersymbol Dither Performance Under Multipath Conditions, Jonathan K. Keen Mar 2009

Low Probability Of Intercept Waveforms Via Intersymbol Dither Performance Under Multipath Conditions, Jonathan K. Keen

Theses and Dissertations

This thesis examines the effects of multipath interference on Low Probability of Intercept (LPI) waveforms generated using intersymbol dither. LPI waveforms are designed to be difficult for non-cooperative receivers to detect and manipulate, and have many uses in secure communications applications. In prior research, such a waveform was designed using a dither algorithm to vary the time between the transmission of data symbols in a communication system. This work showed that such a method can be used to frustrate attempts to use non-cooperative receiver algorithms to recover the data. This thesis expands on prior work by examining the effects of …


The Modular Clock Algorithm For Blind Rendezvous, Nicholas C. Theis Mar 2009

The Modular Clock Algorithm For Blind Rendezvous, Nicholas C. Theis

Theses and Dissertations

This thesis examines the problem in initializing communications whereby cognitive radios need to find common spectrum with other cognitive radios, a process known as frequency rendezvous. It examines the rendezvous problem as it exists in a dynamic spectrum access cognitive network. Specifically, it addresses the problem of rendezvous in an infrastructureless environment. A new algorithm, the modular clock algorithm, is developed and analyzed as a solution for the simple rendezvous environment model, coupled with a modified version for environment models with less information. The thesis includes a taxonomy of commonly used environment models, and analysis of previous efforts to solve …


A Nsdv Approach For Channel Allocation Under Hybrid Mode Of Mobile Computing, Vijay Singh Mar 2009

A Nsdv Approach For Channel Allocation Under Hybrid Mode Of Mobile Computing, Vijay Singh

vijay singh

No abstract provided.


Biologically Inspired Metaheuristic Algorithm For Solving Symmetric Tsp, Vijay Singh Mar 2009

Biologically Inspired Metaheuristic Algorithm For Solving Symmetric Tsp, Vijay Singh

vijay singh

No abstract provided.


A Proposed Dsm-Secure Fair Allocation Cooperative Transactional Model For Manet., Vijay Singh Mar 2009

A Proposed Dsm-Secure Fair Allocation Cooperative Transactional Model For Manet., Vijay Singh

vijay singh

No abstract provided.


Numerical Analysis For Relevant Features In Intrusion Detection (Narfid), Jose Andres Gonzalez Mar 2009

Numerical Analysis For Relevant Features In Intrusion Detection (Narfid), Jose Andres Gonzalez

Theses and Dissertations

Identification of cyber attacks and network services is a robust field of study in the machine learning community. Less effort has been focused on understanding the domain space of real network data in identifying important features for cyber attack and network service classification. Motivations for such work allow for anomaly detection systems with less requirements on data “sniffed” off the network, extraction of features from the traffic, reduced learning time of algorithms, and ideally increased classification performance of anomalous behavior. This thesis evaluates the usefulness of a good feature subset for the general classification task of identifying cyber attacks and …


Voice Traffic Over Mobile Ad Hoc Networks: A Performance Analysis Of The Optimized Link State Routing Protocol, Lady Noreen P. Santos Mar 2009

Voice Traffic Over Mobile Ad Hoc Networks: A Performance Analysis Of The Optimized Link State Routing Protocol, Lady Noreen P. Santos

Theses and Dissertations

This thesis investigates the performance of the Optimized Link State Routing (OLSR) protocol on Voice over Internet Protocol (VoIP) applications in Mobile Ad hoc Networks (MANETs). Using VoIP over MANETs takes advantage of the mobility and versatility of a MANET environment and the flexibility and interoperability a digital voice format affords. Research shows that VoIP-like traffic can be routed through an ad hoc network using the Ad hoc On-demand Distance Vector routing protocol. This research determines the suitability of OLSR as a routing protocol for MANETs running VoIP applications. Representative VoIP traffic is submitted to a MANET and end-to-end delay …


Dynamic Interactions For Network Visualization And Simulation, Cigdem Yetisti Mar 2009

Dynamic Interactions For Network Visualization And Simulation, Cigdem Yetisti

Theses and Dissertations

Most network visualization suites do not interact with a simulator, as it executes. Nor do they provide an effective user interface that includes multiple visualization functions. The subject of this research is to improve the network visualization presented in the previous research [5] adding these capabilities to the framework. The previous network visualization did not have the capability of altering specific visualization characteristics, especially when detailed observations needed to be made for a small part of a large network. Searching for a network event in this topology might cause large delays leading to lower quality user interface. In addition to …


Stochastic Estimation And Control Of Queues Within A Computer Network, Mingook Kim Mar 2009

Stochastic Estimation And Control Of Queues Within A Computer Network, Mingook Kim

Theses and Dissertations

Captain Nathan C. Stuckey implemented the idea of the stochastic estimation and control for network in OPNET simulator. He used extended Kalman filter to estimate packet size and packet arrival rate of network queue to regulate queue size. To validate stochastic theory, network estimator and controller is designed by OPNET model. These models validated the transient queue behavior in OPNET and work of Kalman filter by predicting the queue size and arrival rate. However, it was not enough to verify a theory by experiment. So, it needed to validate the stochastic control theory with other tools to get high validity. …


Optimized Robust Adaptive Networks In Supervisory Control And Data Acquisition Systems, Luis A. Oquendo Class Mar 2009

Optimized Robust Adaptive Networks In Supervisory Control And Data Acquisition Systems, Luis A. Oquendo Class

Theses and Dissertations

This thesis investigates the application of a Exponential Weighted Moving Average (EWMA) to be used as a memory buffer in conjunction with Special Protection Schemes (SPS) using the Electric Power and Communication Synchronizing Simulator (EPOCHS). It is proposed that using an SPS incorporating EWMA can compensate for the network layer lack of guarantee of packet delivery and provide for the stability and integrity of the power grid under a catastrophic event. The performance of the proposed SPS is evaluated using a discrete event computer simulation developed using the NS2 network simulator and the Power System Simulator for Engineering (PSS/E) power …


The Evaluation Of Rekeying Protocols Within The Hubenko Architecture As Applied To Wireless Sensor Networks, Cory J. Antosh Mar 2009

The Evaluation Of Rekeying Protocols Within The Hubenko Architecture As Applied To Wireless Sensor Networks, Cory J. Antosh

Theses and Dissertations

This thesis investigates the impact of using three different rekeying protocols–pair-wise, hierarchical, and Secure Lock within a wireless sensor network (WSN) under the Hubenko architecture. Using a Matlab computer simulation, the impact of the three rekeying protocols on the number of bits transmitted across the network and the amount of battery power consumed in WSN nodes during rekey operations is investigated. Baseline pair-wise rekeying performance can be improved by using either Secure Lock or hierarchical rekeying. The best choice depends on the size of the WSN and the size of the key used. Hierarchical rekeying is the best choice for …


Chip To Chip Optical Interconnection Using Mems Mirrors, Tod V. Laurvick Feb 2009

Chip To Chip Optical Interconnection Using Mems Mirrors, Tod V. Laurvick

Theses and Dissertations

This experiment explores the use of MEMS mirrors to direct subsurface optical signals to another device and reception of those signals for use in chip to chip communications. Devices were built in PolyMUMPs to control horizontal and vertical beam direction and tilting in the outgoing signal and MEMS beam splitters for the incoming signal. Several elements of the outgoing beam path were successful and those which needed improvement indicate a high probability of success with limited trials needed and currently successful design elements could still be improved within the scope of PolyMUMPs. The incoming beam path elements were not successful …