Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

2014

PDF

Series

Articles 1 - 20 of 20

Full-Text Articles in Computer Engineering

Is The Smartphone Smart In Kathmandu?, Seth Bird Dec 2014

Is The Smartphone Smart In Kathmandu?, Seth Bird

Independent Study Project (ISP) Collection

This is the extensive study of the smartphone in the developing country of Nepal, specifically the Kathmandu valley. Throughout my research I conducted various interviews with businesses, Tibetan refugees, and Nepali millennials (18yrs-33yrs) with the goal of identifying how the smartphone is used and understood. I chose the Kathmandu valley as my main area of research because the usage of smartphones in rural Nepal is extremely limited, and the valley represents the economic hub where progressive thinking flourishes. As a main objective I sought to understand how, if at all, the smartphone is used differently between Nepal and America. All …


Data Transport System, Rahav Dor Dec 2014

Data Transport System, Rahav Dor

All Computer Science and Engineering Research

To facilitate the WU Smart Home research [21] we built a system that collects data from sensors and uploads the data to the cloud. The system supports data collection from multiple locations (typically apartments) that are independent from each other, endowing the system with two benefit: distributed data collection and alleviating privacy concerns. Each location is managed by a local micro-server (μServer) that is responsible for receiving data packets from sensors and managing their transient storage. Periodically the μServer triggers a data transport process that moves the data to a cloud server where it is stored in a centralized database. …


Distributed Event Detection In Sensor Networks Under Random Spatial Deployment, P. Zhang, G. Peters, I. Nevat, G. Xiao, Hwee-Pink Tan Oct 2014

Distributed Event Detection In Sensor Networks Under Random Spatial Deployment, P. Zhang, G. Peters, I. Nevat, G. Xiao, Hwee-Pink Tan

Research Collection School Of Computing and Information Systems

We present a novel event detection algorithm in sensor networks for the case where the sensors are randomly deployed in space. In particular we consider a random sensors deployment according to a Homogeneous Finite Binomial Point Process. We first derive the optimal event detection decision rule. We then develop a novel algorithm to evaluate the intractable marginal likelihood based on the Gram-Charlier series expansion. We evaluate our algorithms through extensive Monte Carlo simulations. Simulation results present the detection and false alarm rates for different system parameters such as number of sensors deployed, deployment region size etc.


Foss Big Data Storage Solution, Nurdeen Salami Aug 2014

Foss Big Data Storage Solution, Nurdeen Salami

STAR Program Research Presentations

NASA projects require a reliable approach to store large volumes of data. Accordingly, it is crucial to adopt a lightweight, reliable, and scalable database. Current NASA databases bear costly license fees with undesirable speed and flexibility. The purpose of utilizing the AERO Institute as an IT test bed, or “Sandbox,” is to design, build, test, and implement software solutions prior to transfer to NASA projects. Cassandra coupled with the Astyanax API is a viable solution for storing big data. Store a minimum of 2GB of C-FOSS data in multiple file formats (.csv, .log, .xml, and .jpg). Use benchmark tests to …


Performance Analysis Of Mobile Ad-Hoc Routing Protocols By Varying Mobility, Speed And Network Load, Nilotpal Sarmah Jul 2014

Performance Analysis Of Mobile Ad-Hoc Routing Protocols By Varying Mobility, Speed And Network Load, Nilotpal Sarmah

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

One of the most promising network that has emerged from the technology world is the mobile ad-hoc network or MANET. It is a type of multi-hop network. Wireless by nature, MANETs do not have a specific network infrastructure. It is a collection of wireless mobile devices that communicate with each other without the help of any third party backbone like a base-station or a router. It can be hard to imagine how every node in this type of network communicate with one another without having a router. In MANETs, nodes change locations with time, configure themselves and get the information …


Influences Of Influential Users: An Empirical Study Of Music Social Network, Jing Ren, Zhiyong Cheng, Jialie Shen, Feida Zhu Jul 2014

Influences Of Influential Users: An Empirical Study Of Music Social Network, Jing Ren, Zhiyong Cheng, Jialie Shen, Feida Zhu

Research Collection School Of Computing and Information Systems

Influential user can play a crucial role in online social networks. This paper documents an empirical study aiming at exploring the effects of influential users in the context of music social network. To achieve this goal, music diffusion graph is developed to model how information propagates over network. We also propose a heuristic method to measure users' influences. Using the real data from Last. fm, our empirical test demonstrates key effects of influential users and reveals limitations of existing influence identification/characterization schemes.


U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo Jun 2014

U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo

All Faculty Scholarship

As the Internet becomes more important to the everyday lives of people around the world, commentators have tried to identify the best policies increasing the deployment and adoption of high-speed broadband technologies. Some claim that the European model of service-based competition, induced by telephone-style regulation, has outperformed the facilities-based competition underlying the US approach to promoting broadband deployment. The mapping studies conducted by the US and the EU for 2011 and 2012 reveal that the US led the EU in many broadband metrics.

• High-Speed Access: A far greater percentage of US households had access to Next Generation Access (NGA) …


Sew-Ing A Simple Endorsement Web To Incentivize Trustworthy Participatory Sensing, T. Luo, S. Kanhere, Hwee-Pink Tan Jun 2014

Sew-Ing A Simple Endorsement Web To Incentivize Trustworthy Participatory Sensing, T. Luo, S. Kanhere, Hwee-Pink Tan

Research Collection School Of Computing and Information Systems

Two crucial issues to the success of participatory sensing are (a) how to incentivize the large crowd of mobile users to participate and (b) how to ensure the sensing data to be trustworthy. While they are traditionally being studied separately in the literature, this paper proposes a Simple Endorsement Web (SEW) to address both issues in a synergistic manner. The key idea is (a) introducing a social concept called nepotism into participatory sensing, by linking mobile users into a social “web of participants” with endorsement relations, and (b) overlaying this network with investment-like economic implications. The social and economic layers …


Security Analysis Of Phasor Measurement Units In Smart Grid Communication Infrastructures May 2014

Security Analysis Of Phasor Measurement Units In Smart Grid Communication Infrastructures

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

Phasor Measurement Units (PMUs), or synchrophasors, are rapidly being deployed in the smart grid with the goal of measuring phasor quantities concurrently from wide area distribution substations. By utilizing GPS receivers, PMUs can take a wide area snapshot of power systems. Thus, the possibility of blackouts in the smart grid, the next generation power grid, will be reduced. As the main enabler of Wide Area Measurement Systems (WAMS), PMUs transmit measured values to Phasor Data Concentrators (PDCs) by the synchrophasor standard IEEE C37.118. IEC 61850 and IEC 62351 are the communication protocols for the substation automation system and the security …


Qos-Aware Data Transmission And Wireless Energy Transfer: Performance Modeling And Optimization, D. Niyato, P. Wang, W. L. Yeow, Hwee-Pink Tan Apr 2014

Qos-Aware Data Transmission And Wireless Energy Transfer: Performance Modeling And Optimization, D. Niyato, P. Wang, W. L. Yeow, Hwee-Pink Tan

Research Collection School Of Computing and Information Systems

With wireless energy transfer, a mobile node can operate perpetually without having a wired connection to charge its battery. In this paper, we present a quality of service (QoS) aware data transmission and wireless energy transfer for the mobile node. The node can request for wireless energy transfer or transmit a packet when the node is in a coverage area of an access point. The node supports service differentiation for different type of traffic (i.e., low and high priority data). To meet the QoS requirement of each traffic type, we present the performance modeling and optimization framework. The objective is …


A Lightweight And Robust Interference Mitigation Scheme For Wireless Body Sensor Networks In Realistic Environments, S. Liang, Y. Ge, S. Jiang, Hwee-Pink Tan Apr 2014

A Lightweight And Robust Interference Mitigation Scheme For Wireless Body Sensor Networks In Realistic Environments, S. Liang, Y. Ge, S. Jiang, Hwee-Pink Tan

Research Collection School Of Computing and Information Systems

In dense deployments of Wireless Body Sensor Networks (WBSNs), inter-user interference significantly degrades network performance when multiple WBSN users stay in a small area such as hospitals. Due to the high dynamics of the environments, it is usually hard to schedule the transmissions of multiple WBSNs without a central controller. In this paper, we propose a robust and lightweight interference mitigation scheme for realistic WBSN systems through adaptive channel hopping. A WBSN testbed is set up to investigate the impact of inter-user interference on various performance metrics when different severity levels of interference are present. Based on the measurement results, …


Possible Paradigm Shifts In Broadband Policy, Christopher S. Yoo Jan 2014

Possible Paradigm Shifts In Broadband Policy, Christopher S. Yoo

All Faculty Scholarship

Debates over Internet policy tend to be framed by the way the Internet existed in the mid-1990s, when the Internet first became a mass-market phenomenon. At the risk of oversimplifying, the Internet was initially used by academics and tech-savvy early adopters to send email and browse the web over a personal computer connected to a telephone line via networks interconnected through in a limited way. Since then, the Internet has become much larger and more diverse in terms of users, applications, technologies, and business relationships. More recently, Internet growth has begun to slow both in terms of the number of …


A Brief Overview Of The Nebula Future Internet Architecture, Tom Anderson, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazieres, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert Van Renesse, Michael Walfish, Hakim Weatherspoon, Christopher S. Yoo Jan 2014

A Brief Overview Of The Nebula Future Internet Architecture, Tom Anderson, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazieres, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert Van Renesse, Michael Walfish, Hakim Weatherspoon, Christopher S. Yoo

All Faculty Scholarship

NEBULA is a proposal for a Future Internet Architecture. It is based on the assumptions that: (1) cloud computing will comprise an increasing fraction of the application workload offered to an Internet, and (2) that access to cloud computing resources will demand new architectural features from a network. Features that we have identified include dependability, security, flexibility and extensibility, the entirety of which constitute resilience.

NEBULA provides resilient networking services using ultrareliable routers, an extensible control plane and use of multiple paths upon which arbitrary policies may be enforced. We report on a prototype system, Zodiac, that incorporates these latter …


Performance Evaluation Of A Technology Independent Security Gateway For Next Generation Networks, Fudong Li, Nathan Clarke, Steven Furnell, Is-Mkwawa Mkwawa Jan 2014

Performance Evaluation Of A Technology Independent Security Gateway For Next Generation Networks, Fudong Li, Nathan Clarke, Steven Furnell, Is-Mkwawa Mkwawa

Research outputs 2014 to 2021

With the all IP based Next Generation Networks being deployed around the world, the use of real-time multimedia service applications is being extended from normal daily communications to emergency situations. However, currently different emergency providers utilise differing networks and different technologies. As such, conversations could be terminated at the setup phase or data could be transmitted in plaintext should incompatibility issues exit between terminals. To this end, a novel security gateway that can provide the necessary security support for incompatible terminals was proposed, developed and implemented to ensure the successful establishment of secure real-time multimedia conversations. A series of experiments …


Efficient Cooperative Mimo Paradigms For Cognitive Radio Networks, Wei Chen, Liang Hong, Xiaoqian Chen Jan 2014

Efficient Cooperative Mimo Paradigms For Cognitive Radio Networks, Wei Chen, Liang Hong, Xiaoqian Chen

Computer Science Faculty Research

This paper investigates the benefits that cooperative communication brings to cognitive radio networks. We focus on cooperative Multiple Input Multiple Output (MIMO) technology, where multiple distributed single-antenna secondary users cooperate on data transmission and reception. Three cooperative MIMO paradigms are proposed to maximize the diversity gain and significantly improve the performance of overlay, underlay and interweave systems. In the paradigm for overlay systems the secondary users can assist (relay) the primary transmissions even when they are far away from the primary users. In the paradigm for underlay systems the secondary users can share the primary users’ frequency resources without any …


New Operations On Intuitionistic Fuzzy Soft Sets Based On First Zadeh's Logical Operators, Florentin Smarandache, Said Broumi, Pinaki Majumdar Jan 2014

New Operations On Intuitionistic Fuzzy Soft Sets Based On First Zadeh's Logical Operators, Florentin Smarandache, Said Broumi, Pinaki Majumdar

Branch Mathematics and Statistics Faculty and Staff Publications

In this paper , we have defined First Zadeh’s implication , First Zadeh’s intuitionistic fuzzy conjunction and intuitionistic fuzzy disjunction of two intuitionistic fuzzy soft sets and some their basic properties are studied with proofs and examples.


Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo Jan 2014

Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo

All Faculty Scholarship

Legal issues increasingly arise in increasingly complex technological contexts. Prominent recent examples include the Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act (PIPA), network neutrality, the increasing availability of location information, and the NSA’s surveillance program. Other emerging issues include data privacy, online video distribution, patent policy, and spectrum policy. In short, the rapid rate of technological change has increasingly shown that law and engineering can no longer remain compartmentalized into separate spheres. The logical response would be to embed the interaction between law and policy deeper into the fabric of both fields. An essential step would …


Cross-Domain Password-Based Authenticated Key Exchange Revisited, Liqun Chen, Hoon Wei Lim, Guomin Yang Jan 2014

Cross-Domain Password-Based Authenticated Key Exchange Revisited, Liqun Chen, Hoon Wei Lim, Guomin Yang

Research Collection School Of Computing and Information Systems

We revisit the problem of secure cross-domain communication between two users belonging to different security domains within an open and distributed environment. Existing approaches presuppose that either the users are in possession of public key certificates issued by a trusted certificate authority (CA), or the associated domain authentication servers share a long-term secret key. In this article, we propose a generic framework for designing four-party password-based authenticated key exchange (4PAKE) protocols. Our framework takes a different approach from previous work. The users are not required to have public key certificates, but they simply reuse their login passwords, which they share …


Technological Determinism And Its Discontents, Christopher S. Yoo Jan 2014

Technological Determinism And Its Discontents, Christopher S. Yoo

All Faculty Scholarship

This book review takes a critical review of the claim advanced by Susan Crawford in Captive Audience that the merger between Comcast and NBC Universal would harm consumers and that policymakers should instead promote common carriage regulation and subsidize municipal symmetrical gigabit fiber-to-the-home (FTTH). First it evaluates the extent to which next-generation digital subscriber lines (DSL) and wireless broadband technologies can serve as effective substitutes for cable modem service, identifying FCC data showing that the market has become increasingly competitive and likely to continue to do so. Furthermore, the market is not structured in a way that would permit the …


Evaluating Electronic Market Designs: The Effects Of Competitive Arousal And Social Facilitation On Electronic Group Buying, Yuecheng Yu, Karl R. Lang, Alex Pelaez Jan 2014

Evaluating Electronic Market Designs: The Effects Of Competitive Arousal And Social Facilitation On Electronic Group Buying, Yuecheng Yu, Karl R. Lang, Alex Pelaez

Research Collection School Of Computing and Information Systems

This article presents an evaluation approach foralternative electronic market designs and examines theimpact of competitive arousal under time pressure onmarket performance in a group-buying setting. Drawingon theory from economics, decision theory, andinformation systems, we present a competitive arousalmodel for a social buying setting that posits thatintroducing competitive arousal among buyers reducesbuyer profits and that social facilitation can mitigate thesecosts through better task completion and time tocompletion rates. Using an economic experiment, wefound that rivalry has a negative effect on buyer profitsbut also that competitive arousal increases the efficiencyof social facilitation in terms of group formation. Wediscuss the implications of these …