Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

2014

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 67

Full-Text Articles in Computer Engineering

A Study Of Mobile Learning For Higher Education Students In Guangzhou, Chun Hung, Hugo Wong Dec 2014

A Study Of Mobile Learning For Higher Education Students In Guangzhou, Chun Hung, Hugo Wong

Practical Social and Industrial Research Symposium

No abstract provided.


Is The Smartphone Smart In Kathmandu?, Seth Bird Dec 2014

Is The Smartphone Smart In Kathmandu?, Seth Bird

Independent Study Project (ISP) Collection

This is the extensive study of the smartphone in the developing country of Nepal, specifically the Kathmandu valley. Throughout my research I conducted various interviews with businesses, Tibetan refugees, and Nepali millennials (18yrs-33yrs) with the goal of identifying how the smartphone is used and understood. I chose the Kathmandu valley as my main area of research because the usage of smartphones in rural Nepal is extremely limited, and the valley represents the economic hub where progressive thinking flourishes. As a main objective I sought to understand how, if at all, the smartphone is used differently between Nepal and America. All ...


Wirelessly Controlled Smart Outlet, Andrew Godsil, Ariel Dubinsky Dec 2014

Wirelessly Controlled Smart Outlet, Andrew Godsil, Ariel Dubinsky

Electrical Engineering

Popularity of home automation devices has increased greatly in recent years due to higher affordability and simplicity through smartphone and tablet connectivity. For the purpose of this experiment, we have developed the Smart Outlet: a stand-alone communication unit, used to connect home outlets to the internet. The Smart Outlet controls lighting and simple appliances throughout the home, remotely, using wireless commands from the web. A Google Calendar interface directly controls the outlets’ function by scheduling them with dedicated calendar events. The calendar’s interface can even be accessed from multiple different platforms (i.e. phones, computers, tablets) for the convenience ...


Wingtip Dynamics Simulator, Eugene Fox, Nick Rodriguez, Steven Rieber Dec 2014

Wingtip Dynamics Simulator, Eugene Fox, Nick Rodriguez, Steven Rieber

Mechanical Engineering

Raytheon is a defense contracting company with an electronic warfare division that is developing a radio frequency signal triangulation system. Part of the focus in improving this technology is the need for accurate and real time locational knowledge of the signal receivers, which are located at the tips of aircraft wings. Due to turbulence during flight, the fluttering motion of the wings alter the distance and angle relationships of the two receivers and add noise to the received signal data, which negatively affect the triangulation estimates. To mitigate this error caused by the wing flutter, Raytheon is developing a software ...


Data Transport System, Rahav Dor Dec 2014

Data Transport System, Rahav Dor

All Computer Science and Engineering Research

To facilitate the WU Smart Home research [21] we built a system that collects data from sensors and uploads the data to the cloud. The system supports data collection from multiple locations (typically apartments) that are independent from each other, endowing the system with two benefit: distributed data collection and alleviating privacy concerns. Each location is managed by a local micro-server (μServer) that is responsible for receiving data packets from sensors and managing their transient storage. Periodically the μServer triggers a data transport process that moves the data to a cloud server where it is stored in a centralized database ...


Examining Ambiguities In The Automatic Packet Reporting System, Kenneth W. Finnegan Mr Dec 2014

Examining Ambiguities In The Automatic Packet Reporting System, Kenneth W. Finnegan Mr

Master's Theses and Project Reports

The Automatic Packet Reporting System (APRS) is an amateur radio packet network that has evolved over the last several decades in tandem with, and then arguably beyond, the lifetime of other VHF/UHF amateur packet networks, to the point where it is one of very few packet networks left on the amateur VHF/UHF bands. This is proving to be problematic due to the loss of institutional knowledge as older amateur radio operators who designed and built APRS and other AX.25-based packet networks abandon the hobby or pass away. The purpose of this document is to collect and curate ...


Simulation, And Overload And Stability Analysis Of Continuous Time Sigma Delta Modulator, Kyung Kang Dec 2014

Simulation, And Overload And Stability Analysis Of Continuous Time Sigma Delta Modulator, Kyung Kang

UNLV Theses, Dissertations, Professional Papers, and Capstones

The ever increasing demand for faster and more powerful digital applications requires high speed, high resolution ADCs. Currently, sigma delta modulators ADCs are extensively used in broadband telecommunication systems because they are an effective solution for high data-rate wireless communication systems that require low power consumption, high speed, high resolution, and large signal bandwidths.

Because mixed-signal integrated circuits such as Continuous Time sigma delta modulators contain both analog and digital circuits, mixed signal circuits are not as simple to model and simulate as all discrete or all analog systems. In this dissertation, the delta transform is used to simulate CT ...


On Modeling Eavesdropping Attacks In Wireless Networks, Xuran Li, Jianlong Xu, Hong-Ning Dai, Qinglin Zhao, Chak Fong Cheang, Qiu Wang Oct 2014

On Modeling Eavesdropping Attacks In Wireless Networks, Xuran Li, Jianlong Xu, Hong-Ning Dai, Qinglin Zhao, Chak Fong Cheang, Qiu Wang

Hong-Ning Dai

This paper concerns the eavesdropping attacks from the eavesdroppers’ perspective, which is new since most of current studies consider the problem from the good nodes’ perspective. In this paper, we originally propose an analytical framework to quantify the effective area and the probability of the eavesdropping attacks. This framework enables us to theoretically evaluate the impact of node density, antenna model, and wireless channel model on the eavesdropping attacks. We verify via extensive simulations that the proposed analytical framework is very accurate. Our results show that the probability of eavesdropping attacks significantly vary, depending on the wireless environments (such as ...


Strategies For Sensor Data Aggregation In Support Of Emergency Response, X. Wang, A. Walden, M. Weigle, S. Olariu Oct 2014

Strategies For Sensor Data Aggregation In Support Of Emergency Response, X. Wang, A. Walden, M. Weigle, S. Olariu

Computer Science Presentations

PDF of a powerpoint presentation from the Military Communications Conference (MILCOM), Baltimore, Maryland, October 7, 2014. Also available on Slideshare.


Introduction To Anti-Collision Algorithms And Estimation Methods In Rfid Systems, Masoud Shakiba Oct 2014

Introduction To Anti-Collision Algorithms And Estimation Methods In Rfid Systems, Masoud Shakiba

Masoud Shakiba

The main objective of Radio Frequency Identification (RFID) systems is to provide fast identification for tagged objects. The noteworthy advantage of RFID technology, is its capability to identify objects simultaneously. However, when radio frequency signals are emitted simultaneously, there is a probability of collision occurrence, and thereby resulting in a waste of resources. Collision is a time-consuming event that reduces the performance of RFID systems. Consequently, several anti-collision algorithms have been proposed in the literature, attempt to decrease the collision occurrence probability. In almost all the existing anti-collision algorithms, a prior knowledge of the number of tags has a significant ...


Distributed Event Detection In Sensor Networks Under Random Spatial Deployment, P. Zhang, G. Peters, I. Nevat, G. Xiao, Hwee-Pink Tan Oct 2014

Distributed Event Detection In Sensor Networks Under Random Spatial Deployment, P. Zhang, G. Peters, I. Nevat, G. Xiao, Hwee-Pink Tan

Research Collection School Of Information Systems

We present a novel event detection algorithm in sensor networks for the case where the sensors are randomly deployed in space. In particular we consider a random sensors deployment according to a Homogeneous Finite Binomial Point Process. We first derive the optimal event detection decision rule. We then develop a novel algorithm to evaluate the intractable marginal likelihood based on the Gram-Charlier series expansion. We evaluate our algorithms through extensive Monte Carlo simulations. Simulation results present the detection and false alarm rates for different system parameters such as number of sensors deployed, deployment region size etc.


L2er: Low-Latency And Energy-Based Routing Protocol For Cognitive Radio Ad Hoc Networks, Rana Asif Rehman, Byung-Seo Kim Sep 2014

L2er: Low-Latency And Energy-Based Routing Protocol For Cognitive Radio Ad Hoc Networks, Rana Asif Rehman, Byung-Seo Kim

Rana Asif Rehman

Cognitive radio ad hoc networks (CRAHNs) are active, self-organized, and dynamic networks, in which cognitive users can communicate with each other in an ad hoc fashion. Various delay and energy-based routing protocols have been proposed for CRAHNs. However, these protocols do not consider the delay and node energy in the routing process, which can significantly affect performance. Delay and node energy are important factors in ad hoc networks in which devices have limited power. In this paper, we propose a new routing protocol, named low-latency and energy-based routing (L2ER) protocol; it considers both delay and energy for the routing decisions ...


Asymptotic Analysis Of Random Wireless Networks: Broadcasting, Secrecy, And Hybrid Networks, Cagatay Capar Sep 2014

Asymptotic Analysis Of Random Wireless Networks: Broadcasting, Secrecy, And Hybrid Networks, Cagatay Capar

Doctoral Dissertations

This thesis work is concerned with communication in large random wireless ad hoc networks. We mathematically model the wireless network as a collection of randomly located nodes, and explore how its performance scales as the network size increases. In particular, we study three important properties: broadcasting ability, rate of information exchange, and secret communication capability. In addition, we study connectivity properties of large random graphs in a more general context, where the graph does not necessarily represent a wireless communication network.

Broadcasting, i.e., delivering a message from a single node to the entire network in a wireless ad hoc ...


Sptf: Smart Photo-Tagging Framework On Smart Phones, Hao Xu, Hong-Ning Dai, Walter Hon-Wai Lau Aug 2014

Sptf: Smart Photo-Tagging Framework On Smart Phones, Hao Xu, Hong-Ning Dai, Walter Hon-Wai Lau

Hong-Ning Dai

Smart phones, as one of the most important platforms for personal communications and mobile computing, have evolved with various embedded devices, such as cameras, Wi-Fi transceivers, Bluetooth transceivers and sensors. Specifically, the photos taken by a smart phone has the approximate or even equivalent image quality to that of a professional camera. As a result, smart phones have become the first choice for people to take photos to record their ordinary life. However, how to manage thousands of photos on a smart phone becomes a challenge. In this paper, we propose a new architecture in terms of Smart Photo-Tagging Framework ...


Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang Aug 2014

Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang

Wenbing Zhao

A proactive recovery scheme based on service migration for long-running Byzantine fault-tolerant systems is described. Proactive recovery is an essential method for ensuring the long-term reliability of fault-tolerant systems that are under continuous threats from malicious adversaries. The primary benefit of our proactive recovery scheme is a reduced vulnerability window under normal operation. This is achieved in two ways. First, the time-consuming reboot step is removed from the critical path of proactive recovery. Second, the response time and the service migration latency are continuously profiled and an optimal service migration interval is dynamically determined during runtime based on the observed ...


End-To-End Latency Of A Fault-Tolerant Corba Infrastructure, Wenbing Zhao, Louise E. Moser, P. Michale Melliar-Smith Aug 2014

End-To-End Latency Of A Fault-Tolerant Corba Infrastructure, Wenbing Zhao, Louise E. Moser, P. Michale Melliar-Smith

Wenbing Zhao

This paper presents an evaluation of the end-to-end latency of a fault-tolerant CORBA infrastructure that we have implemented. The fault-tolerant infrastructure replicates the server applications using active, passive and semi-active replication, and maintains strong replica consistency of the server replicas. By analyses and by measurements of the running fault-tolerant infrastructure, we characterize the end-to-end latency under fault-free conditions. The main determining factor of the run-time performance of the fault-tolerant infrastructure is the Totem group communication protocol, which contributes to the end-to-end latency primarily in two ways: the delay in sending messages and the processing cost of the rotating token. To ...


Foss Big Data Storage Solution, Nurdeen Salami Aug 2014

Foss Big Data Storage Solution, Nurdeen Salami

STAR (STEM Teacher and Researcher) Presentations

NASA projects require a reliable approach to store large volumes of data. Accordingly, it is crucial to adopt a lightweight, reliable, and scalable database. Current NASA databases bear costly license fees with undesirable speed and flexibility. The purpose of utilizing the AERO Institute as an IT test bed, or “Sandbox,” is to design, build, test, and implement software solutions prior to transfer to NASA projects. Cassandra coupled with the Astyanax API is a viable solution for storing big data. Store a minimum of 2GB of C-FOSS data in multiple file formats (.csv, .log, .xml, and .jpg). Use benchmark tests to ...


Barrier Coverage In Wireless Sensor Networks, Zhibo Wang Aug 2014

Barrier Coverage In Wireless Sensor Networks, Zhibo Wang

Doctoral Dissertations

Barrier coverage is a critical issue in wireless sensor networks (WSNs) for security applications, which aims to detect intruders attempting to penetrate protected areas. However, it is difficult to achieve desired barrier coverage after initial random deployment of sensors because their locations cannot be controlled or predicted. In this dissertation, we explore how to leverage the mobility capacity of mobile sensors to improve the quality of barrier coverage.

We first study the 1-barrier coverage formation problem in heterogeneous sensor networks and explore how to efficiently use different types of mobile sensors to form a barrier with pre-deployed different types of ...


Reputation Computation In Social Networks And Its Applications, Jooyoung Lee Aug 2014

Reputation Computation In Social Networks And Its Applications, Jooyoung Lee

Dissertations - ALL

This thesis focuses on a quantification of reputation and presents models which compute reputation within networked environments. Reputation manifests past behaviors of users and helps others to predict behaviors of users and therefore reduce risks in future interactions. There are two approaches in computing reputation on networks- namely, the macro-level approach and the micro-level approach. A macro-level assumes that there exists a computing entity outside of a given network who can observe the entire network including degree distributions and relationships among nodes. In a micro-level approach, the entity is one of the nodes in a network and therefore can only ...


Gate Monte Carlo Simulations In A Cloud Computing Environment, Blake Austin Rowedder Aug 2014

Gate Monte Carlo Simulations In A Cloud Computing Environment, Blake Austin Rowedder

UNLV Theses, Dissertations, Professional Papers, and Capstones

The GEANT4-based GATE is a unique and powerful Monte Carlo (MC) platform, which provides a single code library allowing the simulation of specific medical physics applications, e.g. PET, SPECT, CT, radiotherapy, and hadron therapy. However, this rigorous yet flexible platform is used only sparingly in the clinic due to its lengthy calculation time. By accessing the powerful computational resources of a cloud computing environment, GATE's runtime can be significantly reduced to clinically feasible levels without the sizable investment of a local high performance cluster. This study investigated a reliable and efficient execution of GATE MC simulations using a ...


Performance Analysis Of Mobile Ad-Hoc Routing Protocols By Varying Mobility, Speed And Network Load, Nilotpal Sarmah Jul 2014

Performance Analysis Of Mobile Ad-Hoc Routing Protocols By Varying Mobility, Speed And Network Load, Nilotpal Sarmah

Theses, Dissertations, & Student Research in Computer Electronics & Engineering

One of the most promising network that has emerged from the technology world is the mobile ad-hoc network or MANET. It is a type of multi-hop network. Wireless by nature, MANETs do not have a specific network infrastructure. It is a collection of wireless mobile devices that communicate with each other without the help of any third party backbone like a base-station or a router. It can be hard to imagine how every node in this type of network communicate with one another without having a router. In MANETs, nodes change locations with time, configure themselves and get the information ...


A Framework For Web Object Self-Preservation, Charles L. Cartledge Jul 2014

A Framework For Web Object Self-Preservation, Charles L. Cartledge

Computer Science Theses & Dissertations

We propose and develop a framework based on emergent behavior principles for the long-term preservation of digital data using the web infrastructure. We present the development of the framework called unsupervised small-world (USW) which is at the nexus of emergent behavior, graph theory, and digital preservation. The USW algorithm creates graph based structures on the Web used for preservation of web objects (WOs). Emergent behavior activities, based on Craig Reynolds’ “boids” concept, are used to preserve WOs without the need for a central archiving authority. Graph theory is extended by developing an algorithm that incrementally creates small-world graphs. Graph theory ...


Influences Of Influential Users: An Empirical Study Of Music Social Network, Jing Ren, Zhiyong Cheng, Jialie Shen, Feida Zhu Jul 2014

Influences Of Influential Users: An Empirical Study Of Music Social Network, Jing Ren, Zhiyong Cheng, Jialie Shen, Feida Zhu

Research Collection School Of Information Systems

Influential user can play a crucial role in online social networks. This paper documents an empirical study aiming at exploring the effects of influential users in the context of music social network. To achieve this goal, music diffusion graph is developed to model how information propagates over network. We also propose a heuristic method to measure users' influences. Using the real data from Last. fm, our empirical test demonstrates key effects of influential users and reveals limitations of existing influence identification/characterization schemes.


Scalable System Design For Covert Mimo Communications, Jason R. Pennington Jun 2014

Scalable System Design For Covert Mimo Communications, Jason R. Pennington

Theses and Dissertations

In modern communication systems, bandwidth is a limited commodity. Bandwidth efficient systems are needed to meet the demands of the ever-increasing amount of data that users share. Of particular interest is the U.S. Military, where high-resolution pictures and video are used and shared. In these environments, covert communications are necessary while still providing high data rates. The promise of multi-antenna systems providing higher data rates has been shown on a small scale, but limitations in hardware prevent large systems from being implemented.


U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo Jun 2014

U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo

Faculty Scholarship at Penn Law

As the Internet becomes more important to the everyday lives of people around the world, commentators have tried to identify the best policies increasing the deployment and adoption of high-speed broadband technologies. Some claim that the European model of service-based competition, induced by telephone-style regulation, has outperformed the facilities-based competition underlying the US approach to promoting broadband deployment. The mapping studies conducted by the US and the EU for 2011 and 2012 reveal that the US led the EU in many broadband metrics.

• High-Speed Access: A far greater percentage of US households had access to Next Generation Access (NGA) networks ...


Understanding The Influence Of Blog On The Development Of Social Capital, Reza Vaezi, Gholamreza Torkzadeh, Jerry Cha-Jan Chang Jun 2014

Understanding The Influence Of Blog On The Development Of Social Capital, Reza Vaezi, Gholamreza Torkzadeh, Jerry Cha-Jan Chang

Reza Vaezi

The rapid use and application of blogs in diverse areas such as education, marketing, journalism, and human resource management in recent years underlines the need for a better understanding of the impact of this new technology on social capital. Social capital reflects the norm of reciprocity and the level of trust among individuals who connect, interact, and benefit from one another. Blog is expected to influence the extent and the scope of this interaction by providing new means of networking among people. This paper examines the relationship between blog use and social capital and reports on the results of an ...


Gesture Recognition Using Microsoft’S Kinect V2, Andrew Weinfield Jun 2014

Gesture Recognition Using Microsoft’S Kinect V2, Andrew Weinfield

Computer Engineering

No abstract provided.


“State Machines”: A High-Throughput Distributed Game Framework, Brandon Howell Ivy Jun 2014

“State Machines”: A High-Throughput Distributed Game Framework, Brandon Howell Ivy

Computer Engineering

Online multiplayer games allow competition with other opponents using the internet. Their development is difficult as it involves many complex areas of computer science - optimization, security, big data, and thread safety. Many multiplayer game frameworks have been published, but very few are generic.

In this project, we focus on the framework design of a web service which allows users to easily create multiplayer games, and artificial intelligence bots to compete in them. It handles turn-based multiplayer communication, and allows the games and bots to ignore the concepts of multiplayer systems. Multiple game instances can run simultaneously, where each game’s ...


High-Speed Mobile Networks For Modern Farming And Agricultural Systems, Santos Najar Jun 2014

High-Speed Mobile Networks For Modern Farming And Agricultural Systems, Santos Najar

Master's Theses and Project Reports

ABSTRACT

High-Speed Mobile Networks for Modern Farming and Agricultural Systems

J.Santos Najar-Ramirez

High-speed mobile networks are necessary for agriculture to inventory individual plant health, maximize yield and minimize the resources applied. More specifically, real-time information on individual plant status is critical to decisions regarding the management of resources reserved and expended. This necessity can be met by the availability of environmental sensors (such as humidity, temperature, and pH) whose data is kept on storage servers connected to static and mobile local area networks. These static and mobile local area networks are connected to cellular, core and satellite networks. For ...


Sew-Ing A Simple Endorsement Web To Incentivize Trustworthy Participatory Sensing, T. Luo, S. Kanhere, Hwee-Pink Tan Jun 2014

Sew-Ing A Simple Endorsement Web To Incentivize Trustworthy Participatory Sensing, T. Luo, S. Kanhere, Hwee-Pink Tan

Research Collection School Of Information Systems

Two crucial issues to the success of participatory sensing are (a) how to incentivize the large crowd of mobile users to participate and (b) how to ensure the sensing data to be trustworthy. While they are traditionally being studied separately in the literature, this paper proposes a Simple Endorsement Web (SEW) to address both issues in a synergistic manner. The key idea is (a) introducing a social concept called nepotism into participatory sensing, by linking mobile users into a social “web of participants” with endorsement relations, and (b) overlaying this network with investment-like economic implications. The social and economic layers ...