Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

2011

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 98

Full-Text Articles in Computer Engineering

Mind Economy: Dynamic Graph Analysis Of Communications, Alexy Khrabrov Dec 2011

Mind Economy: Dynamic Graph Analysis Of Communications, Alexy Khrabrov

Publicly Accessible Penn Dissertations

Social networks are growing in reach and impact but little is known about their structure, dynamics, or users’ behaviors. New techniques and approaches are needed to study and understand why these networks attract users’ persistent attention, and how the networks evolve. This thesis investigates questions that arise when modeling human behavior in social networks, and its main contributions are:

• an infrastructure and methodology for understanding communication on graphs;

• identification and exploration of sub-communities;

• metrics for identifying effective communicators in dynamic graphs;

• a new definition of dynamic, reciprocal social capital and its iterative computation

• a methodology to study influence in social ...


Computational Modeling For Transportation Network Security, Sherif A. Tolba Dec 2011

Computational Modeling For Transportation Network Security, Sherif A. Tolba

Master's Theses

No abstract provided.


Building Effective Ontology For Semantic Web: A Discussion Based On Practical Examples, Tianmu Zhang Dec 2011

Building Effective Ontology For Semantic Web: A Discussion Based On Practical Examples, Tianmu Zhang

School of Information Sciences -- Faculty Publications and Other Works

The study aims to investigate semantic web and create useful ontology as a teaching and educational tool for others interested in learning more about Semantic web. This paper discussed several emerging issues about the semantic web and ontology building. This paper combines ontology implementation examples with research topics to identify current issues and potential solution in both application and theoretical level. It concludes that although semantic web and ontology technology are not mature enough currently, there is a clear tendency for them to be integrated into various applications to exert synergies.


A Novel Telecommunications-Based Approach To Mathematical Modeling Of Hiv Infection, Aaron T. Sharp Dec 2011

A Novel Telecommunications-Based Approach To Mathematical Modeling Of Hiv Infection, Aaron T. Sharp

Theses, Dissertations, & Student Research in Computer Electronics & Engineering

It is well known that biological systems utilize communication in some form, one prolific example of this is the propagation of HIV (Human Immunodeficiency Virus) in the human body. By modeling HIV infection as a communication system, we hope to gain a unique insight into HIV and biological communication systems in general. Such a model would provide researchers a platform for experimenting and simulating various biological communication systems. We have previously developed a layered communication protocol for interpreting biological communication systems using telecommunications paradigms and will apply said model to HIV proliferation. We will also demonstrate the effectiveness of the ...


Location-Aware Traffic Management On Mobile Phones, Sarath Krishna Mandava Dec 2011

Location-Aware Traffic Management On Mobile Phones, Sarath Krishna Mandava

Theses and Dissertations

The growing number of mobile phone users is a primary cause of congestion in cellular networks. Therefore, cellular network providers have turned to expensive and differentiated data plans. Unfortunately, as the number of smartphone users keeps increasing, changing data plans only provides a temporary solution. A more permanent solution is offloading 3G traffic to networks in orthogonal frequency bands. One such plausible network is open Wi-Fi, which is free by definition. As Wi-Fi networks become ubiquitous, there are several areas where there is simultaneous Wi-Fi and 3G coverage. In this thesis, we study the feasibility of offloading 3G traffic to ...


Application Of The Empirical Mode Decomposition On The Characterization And Forecasting Of The Arrival Data Of An Enterprise Cluster, Linh Bao Ngo Dec 2011

Application Of The Empirical Mode Decomposition On The Characterization And Forecasting Of The Arrival Data Of An Enterprise Cluster, Linh Bao Ngo

Theses and Dissertations

Characterization and forecasting are two important processes in capacity planning. While they are closely related, their approaches have been different. In this research, a decomposition method called Empirical Mode Decomposition (EMD) has been applied as a preprocessing tool in order to bridge the input of both characterization and forecasting processes of the job arrivals of an enterprise cluster. Based on the facts that an enterprise cluster follows a standard preset working schedule and that EMD has the capability to extract hidden patterns within a data stream, we have developed a set of procedures that can preprocess the data for characterization ...


Wireless Solar-Powered Thermal Imaging Camera, Andy Bonk, Billy Mcvicker, Jacob Richardson Dec 2011

Wireless Solar-Powered Thermal Imaging Camera, Andy Bonk, Billy Mcvicker, Jacob Richardson

Mechanical Engineering

Creation of a mounted wireless self-powered thermal imaging camera system.


Cplop - Cal Poly's Library Of Pyroprints, Kevin Webb Dec 2011

Cplop - Cal Poly's Library Of Pyroprints, Kevin Webb

Computer Engineering

California Polytechnic Library of Pyroprints, CPLOP, is a web driven data-base application that stores data from the biology’s departments E. coli Pyrosequencing project. Some of this data was stored in Excel datasheets, while data from the pyrosequencing machines was stored as just a list of random .xml files. There was no useful way to organize and store the massive amounts of data from multiple file sources in one location, nor to perform the complicated searches and comparisons that the project requires. CPLOP’s primary goal is to store such data in three organized tables that relate to one another ...


Mapping Device With Wireless Communication, Xiangyu Liu Dec 2011

Mapping Device With Wireless Communication, Xiangyu Liu

Electrical Engineering Undergraduate Honors Theses

Wireless communication is one of the most powerful communication methods that people use nowadays. The key advantage of wireless communications is that it can cover large distances without having to run any cables from one end to the other. Based on this advantage, wireless communication has many important applications, such as remote controls, cell phones, and global positioning system (GPS). This senior design project is developed to use wireless communication technology to map the geographic characteristics of an unknown place. It contains two wireless communication modules with Atmega1281 microprocessor, two robots with the 8051 microcontroller, six pairs of infrared transmitters ...


Distributed Data Aggregation For Sparse Recovery In Wireless Sensor Networks, Shuangjiang Li Dec 2011

Distributed Data Aggregation For Sparse Recovery In Wireless Sensor Networks, Shuangjiang Li

Masters Theses

We consider the approximate sparse recovery problem in Wireless Sensor Networks (WSNs) using Compressed Sensing/Compressive Sampling (CS). The goal is to recover the $n \mbox{-}$dimensional data values by querying only $m \ll n$ sensors based on some linear projection of sensor readings. To solve this problem, a two-tiered sampling model is considered and a novel distributed compressive sparse sampling (DCSS) algorithm is proposed based on sparse binary CS measurement matrix. In the two-tiered sampling model, each sensor first samples the environment independently. Then the fusion center (FC), acting as a pseudo-sensor, samples the sensor network to select a ...


Revising An Extension Education Website For Limited Resource Audiences Using Social Marketing Theory, Sarah L. Francis, Peggy Martin, Kristin Taylor Dec 2011

Revising An Extension Education Website For Limited Resource Audiences Using Social Marketing Theory, Sarah L. Francis, Peggy Martin, Kristin Taylor

Food Science and Human Nutrition Publications

Spend Smart Eat Smart (SSES), a unique website combining nutrition and food buying education for limited resource audiences (LRAs), was revised using social marketing theory to make it more appealing and relevant to LRAs (25-40 years). Focus groups and surveys identified the needs and preferences of LRAs. Needs were cooking, basic health, and budget-friendly nutrition ideas. Preferences were limited text, more videos, graphics, and color. Usability testing of the revised site indicated users perceived the information valuable and the design appealing. By incorporating the needs and preferences of LRAs, SSES is now perceived as appealing as well as relevant.


Energy Efficient Reduced Complexity Multi-Service, Multi-Channel Scheduling Techniques, Dan J. Dechene Nov 2011

Energy Efficient Reduced Complexity Multi-Service, Multi-Channel Scheduling Techniques, Dan J. Dechene

Electronic Thesis and Dissertation Repository

The need for energy efficient communications is essential in current and next-generation wireless communications systems. A large component of energy expenditure in mobile devices is in the mobile radio interface. Proper scheduling and resource allocation techniques that exploit instantaneous and long-term average knowledge of the channel, queue state and quality of service parameters can be used to improve the energy efficiency of communication.

This thesis focuses on exploiting queue and channel state information as well as quality of service parameters in order to design energy efficient scheduling techniques. The proposed designs are for multi-stream, multi-channel systems and in general have ...


Anticipating Technological Change: Predictions, Trends And Gadgets, Carol A. Watson Nov 2011

Anticipating Technological Change: Predictions, Trends And Gadgets, Carol A. Watson

Carol A. Watson

With the current economic downtown, today's business environment is more competitive than ever. Businesses that distinguish themselves in any small way and provide cost-savings, can gain a significant advantage over their rivals. To emphasize the point, note that the ABA Techshow 2009 has a session titled: If You’re Not Serving Your Clients Online, Someone Else Will Be. It is, therefore, essential that attorneys harness technology and remain up-to-date on the latest computer developments . In this paper, I will begin by discussing technologies that are currently available on the web that will increase your abilities to collaborate, reduce your ...


Forecast For The Future: Emerging Legal Technologies, Carol A. Watson Nov 2011

Forecast For The Future: Emerging Legal Technologies, Carol A. Watson

Carol A. Watson

Begins by discussing technologies that are currently available on the web that can reduce office overhead. Also highlights current general technology trends and still-developing technologies. Concludes with a list of frivolous gadgets to provide food for thought about the coming prospects of technology.


Ipv6 Overview.Pdf, Douglas Huber Oct 2011

Ipv6 Overview.Pdf, Douglas Huber

Douglas Huber

Overview of the IPv6 Protocol


Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang Sep 2011

Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang

Ray Bareiss

As emergency first responders and commanders increasingly use mobile phones, tablets, and social media to communicate, coordinate, and manage information during disasters, we see a need and opportunity to provide a mobile device-appropriate semantic layer to a geographically-based common operating picture. The challenge is to provide a simple, usable structure for a rapidly growing body of information to simplify the development of situational awareness in an unfolding disaster. We use a hyperlinked structure based on the ASK model to organize information in a readily accessible form. In this paper we describe our initial design and experience with an Android-based prototype ...


Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang Sep 2011

Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang

Martin L Griss

As emergency first responders and commanders increasingly use mobile phones, tablets, and social media to communicate, coordinate, and manage information during disasters, we see a need and opportunity to provide a mobile device-appropriate semantic layer to a geographically-based common operating picture. The challenge is to provide a simple, usable structure for a rapidly growing body of information to simplify the development of situational awareness in an unfolding disaster. We use a hyperlinked structure based on the ASK model to organize information in a readily accessible form. In this paper we describe our initial design and experience with an Android-based prototype ...


Using Reputation Based Trust To Overcome Malfunctions And Malicious Failures In Electric Power Protection Systems, Jose E. Fadul Sep 2011

Using Reputation Based Trust To Overcome Malfunctions And Malicious Failures In Electric Power Protection Systems, Jose E. Fadul

Theses and Dissertations

This dissertation advocates the use of reputation-based trust in conjunction with a trust management framework based on network flow techniques to form a trust management toolkit (TMT) for the defense of future Smart Grid enabled electric power grid from both malicious and non-malicious malfunctions. Increases in energy demand have prompted the implementation of Smart Grid technologies within the power grid. Smart Grid technologies enable Internet based communication capabilities within the power grid, but also increase the grid's vulnerability to cyber attacks. The benefits of TMT augmented electric power protection systems include: improved response times, added resilience to malicious and ...


A Novel Malware Target Recognition Architecture For Enhanced Cyberspace Situation Awareness, Thomas E. Dube Sep 2011

A Novel Malware Target Recognition Architecture For Enhanced Cyberspace Situation Awareness, Thomas E. Dube

Theses and Dissertations

The rapid transition of critical business processes to computer networks potentially exposes organizations to digital theft or corruption by advanced competitors. One tool used for these tasks is malware, because it circumvents legitimate authentication mechanisms. Malware is an epidemic problem for organizations of all types. This research proposes and evaluates a novel Malware Target Recognition (MaTR) architecture for malware detection and identification of propagation methods and payloads to enhance situation awareness in tactical scenarios using non-instruction-based, static heuristic features. MaTR achieves a 99.92% detection accuracy on known malware with false positive and false negative rates of 8.73e-4 and ...


Twitter Malware Collection System: An Automated Url Extraction And Examination Platform, Benjamin B. Kuhar Sep 2011

Twitter Malware Collection System: An Automated Url Extraction And Examination Platform, Benjamin B. Kuhar

Theses and Dissertations

As the world becomes more interconnected through various technological services and methods, the threat of malware is increasingly looming overhead. One avenue in particular that is examined in this research is the social networking service Twitter. This research develops the Twitter Malware Collection System (TMCS). This system gathers Uniform Resource Locators (URLs) posted on Twitter and scans them to determine if any are hosting malware. This scanning process is performed by a cluster of Virtual Machines (VMs) running a specified software configuration and the execution prevention system known as ESCAPE, which detects malicious code. When a URL is detected by ...


Collaborative Solutions To Visual Sensor Networks, Mahmut Karakaya Aug 2011

Collaborative Solutions To Visual Sensor Networks, Mahmut Karakaya

Doctoral Dissertations

Visual sensor networks (VSNs) merge computer vision, image processing and wireless sensor network disciplines to solve problems in multi-camera applications in large surveillance areas. Although potentially powerful, VSNs also present unique challenges that could hinder their practical deployment because of the unique camera features including the extremely higher data rate, the directional sensing characteristics, and the existence of visual occlusions.

In this dissertation, we first present a collaborative approach for target localization in VSNs. Traditionally; the problem is solved by localizing targets at the intersections of the back-projected 2D cones of each target. However, the existence of visual occlusions among ...


Reliable Ethernet, Aleksandr Movsesyan Aug 2011

Reliable Ethernet, Aleksandr Movsesyan

Master's Theses and Project Reports

Networks within data centers, such as connections between servers and disk arrays, need lossless flow control allowing all packets to move quickly through the network to reach their destination. This paper proposes a new algorithm for congestion control to satisfy the needs of such networks and to answer the question: Is it possible to provide circuit-less reliability and flow control in an Ethernet network? TCP uses an end-to-end congestion control algorithm, which is based on end-to-end round trip time (RTT). Therefore its flow control and error detection/correction approach is dependent on end-to-end RTT. Other approaches utilize specialized data link ...


Digital Filter Design For Jamming Mitigation In 802.15.4 Communication, Bruce Debruhl, Patrick Tague Jul 2011

Digital Filter Design For Jamming Mitigation In 802.15.4 Communication, Bruce Debruhl, Patrick Tague

Patrick Tague

Jamming attackers can dramatically increase attack efficiency and stealth by randomly or periodically cycling the jamming transmission on and off, attacks respectively known as random and periodic jamming. In this paper, we analyze the impact of such attacks on the IEEE 802.15.4 communication protocol, commonly used in wireless sensor networking applications, and show that the cycling behavior introduces a narrow spectral component into the received signal. We propose the inclusion of a digital filter at the receiver side to effectively eliminate this spectral component, and we discuss the benefits involved in this filter design. We evaluate the impacts ...


Wireless Embedded Smart Cameras: Performance Analysis And Their Application To Fall Detection For Eldercare., Alvaro Pinto Jul 2011

Wireless Embedded Smart Cameras: Performance Analysis And Their Application To Fall Detection For Eldercare., Alvaro Pinto

Theses, Dissertations, and Student Research from Electrical & Computer Engineering

Wireless Embedded Smart Camera Networks has received a lot of attention from academia and industry because they are small in size and easy to deploy, and they offer a multitude of attractive applications. They can be used for embedded single unit applications, or can be networked for multi-camera applications.

We first analyze three different operation scenarios for a wireless vision sensor network wherein different levels of local processing is performed. A detailed quantitative comparison of three operation scenarios are presented in terms of energy consumption and latency. This quantitative analysis provides the motivation for performing high-level local processing and decision ...


Traffic Analysis Attacks On Skype Voip Calls, Ye Zhu, Huirong Fu Jul 2011

Traffic Analysis Attacks On Skype Voip Calls, Ye Zhu, Huirong Fu

Electrical Engineering & Computer Science Faculty Publications

Skype is one of the most popular voice-over-IP (VoIP) service providers. One of the main reasons for the popularity of Skype VoIP services is its unique set of features to protect privacy of VoIP calls such as strong encryption, proprietary protocols, unknown codecs, dynamic path selection, and the constant packet rate. In this paper, we propose a class of passive traffic analysis attacks to compromise privacy of Skype VoIP calls. The proposed attacks are based on application-level features extracted from VoIP call traces. The proposed attacks are evaluated by extensive experiments over different types of networks including commercialized anonymity networks ...


Using The Web Infrastructure For Real Time Recovery Of Missing Web Pages, Martin Klein Jul 2011

Using The Web Infrastructure For Real Time Recovery Of Missing Web Pages, Martin Klein

Computer Science Theses & Dissertations

Given the dynamic nature of the World Wide Web, missing web pages, or "404 Page not Found" responses, are part of our web browsing experience. It is our intuition that information on the web is rarely completely lost, it is just missing. In whole or in part, content often moves from one URI to another and hence it just needs to be (re-)discovered. We evaluate several methods for a \justin- time" approach to web page preservation. We investigate the suitability of lexical signatures and web page titles to rediscover missing content. It is understood that web pages change over ...


A Framework For Dynamic Traffic Monitoring Using Vehicular Ad-Hoc Networks, Mohammad Hadi Arbabi Jul 2011

A Framework For Dynamic Traffic Monitoring Using Vehicular Ad-Hoc Networks, Mohammad Hadi Arbabi

Computer Science Theses & Dissertations

Traffic management centers (TMCs) need high-quality data regarding the status of roadways for monitoring and delivering up-to-date traffic conditions to the traveling public. Currently this data is measured at static points on the roadway using technologies that have significant maintenance requirements. To obtain an accurate picture of traffic on any road section at any time requires a real-time probe of vehicles traveling in that section. We envision a near-term future where network communication devices are commonly included in new vehicles. These devices will allow vehicles to form vehicular networks allowing communication among themselves, other vehicles, and roadside units (RSUs) to ...


Is Data To Knowledge As The Wasp Is To The Fig Tree? Reconsidering Licklider’S Intergalactic Network In The Days Of Data Deluge., Christine L. Borgman Jun 2011

Is Data To Knowledge As The Wasp Is To The Fig Tree? Reconsidering Licklider’S Intergalactic Network In The Days Of Data Deluge., Christine L. Borgman

Christine L. Borgman

No abstract provided.


Host-Based Systemic Network Obfuscation System For Windows, Kevin E. Huber Jun 2011

Host-Based Systemic Network Obfuscation System For Windows, Kevin E. Huber

Theses and Dissertations

Network traffic identifies the operating system and services of the host that created the traffic. Current obfuscation programs focus solely on the Transport and Internet layer protocols of the TCP/IP model. Few obfuscation programs were developed to run on a Windows operating system to provide host-based obfuscation. Systemic Network Obfuscation System (SNOS) was developed to provide a thorough obfuscation process for network traffic on the Windows operating system. SNOS modifies the protocols found at all layers of the TCP/IP model to effectively obfuscate the Windows operating system and services running on the host.


Streaming Client And Server Model, Austin Alan Diec Jun 2011

Streaming Client And Server Model, Austin Alan Diec

Computer Engineering

A few years ago, several Cal Poly undergraduates started the Autonomous Robot Platform (ARP). Interest in a revision of the ARP requires a new layer of communication. This paper describes the design and partial implementation of the communication layer to be used with the revised ARP. The communication layer would allow the autonomous robot platform to connect with a client over the wireless local area network (WLAN) for instructions and commands. It is important to note that currently, the assumed revision of the ARP is nonexistent, so many of the design decisions are based solely on the assumptions of ARP ...