Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- ETD (2)
- Secrecy (2)
- Wifi (2)
- Wireless sensor networks (2)
- #KRKTR (1)
-
- API (1)
- APRS (1)
- ASL (1)
- Accessibility (1)
- Action learning (1)
- Action research (1)
- Agency (1)
- Allies (1)
- Amateur Radio (1)
- Amazon (1)
- Amazon.com (Firm) (1)
- American Sign Language (1)
- Android (1)
- Android vulnerability (1)
- Anonymity (1)
- Antennas (1)
- Anthropology (1)
- Apache (1)
- Application software (1)
- Appreciative inquiry (1)
- Arduino (1)
- Art (1)
- Asylum (1)
- Asymptotic analysis (1)
- Automation (1)
- Publication
-
- Computer Engineering (4)
- Doctoral Dissertations (4)
- Computer Science Theses & Dissertations (2)
- Electronic Theses and Dissertations (2)
- Master's Theses (2)
-
- UNLV Theses, Dissertations, Professional Papers, and Capstones (2)
- Boise State University Theses and Dissertations (1)
- Dissertations - ALL (1)
- Electrical & Computer Engineering Theses & Dissertations (1)
- Electrical Engineering (1)
- Graduate Theses and Dissertations (1)
- Mechanical Engineering (1)
- Physics (1)
- Senior Honors Theses and Projects (1)
- Theses (1)
- Theses and Dissertations (1)
- Theses and Dissertations--Computer Science (1)
Articles 1 - 27 of 27
Full-Text Articles in Computer Engineering
Wingtip Dynamics Simulator, Eugene Fox, Nick Rodriguez, Steven Rieber
Wingtip Dynamics Simulator, Eugene Fox, Nick Rodriguez, Steven Rieber
Mechanical Engineering
Raytheon is a defense contracting company with an electronic warfare division that is developing a radio frequency signal triangulation system. Part of the focus in improving this technology is the need for accurate and real time locational knowledge of the signal receivers, which are located at the tips of aircraft wings. Due to turbulence during flight, the fluttering motion of the wings alter the distance and angle relationships of the two receivers and add noise to the received signal data, which negatively affect the triangulation estimates. To mitigate this error caused by the wing flutter, Raytheon is developing a software …
Simulation, And Overload And Stability Analysis Of Continuous Time Sigma Delta Modulator, Kyung Kang
Simulation, And Overload And Stability Analysis Of Continuous Time Sigma Delta Modulator, Kyung Kang
UNLV Theses, Dissertations, Professional Papers, and Capstones
The ever increasing demand for faster and more powerful digital applications requires high speed, high resolution ADCs. Currently, sigma delta modulators ADCs are extensively used in broadband telecommunication systems because they are an effective solution for high data-rate wireless communication systems that require low power consumption, high speed, high resolution, and large signal bandwidths.
Because mixed-signal integrated circuits such as Continuous Time sigma delta modulators contain both analog and digital circuits, mixed signal circuits are not as simple to model and simulate as all discrete or all analog systems. In this dissertation, the delta transform is used to simulate CT …
Wirelessly Controlled Smart Outlet, Andrew Godsil, Ariel Dubinsky
Wirelessly Controlled Smart Outlet, Andrew Godsil, Ariel Dubinsky
Electrical Engineering
Popularity of home automation devices has increased greatly in recent years due to higher affordability and simplicity through smartphone and tablet connectivity. For the purpose of this experiment, we have developed the Smart Outlet: a stand-alone communication unit, used to connect home outlets to the internet. The Smart Outlet controls lighting and simple appliances throughout the home, remotely, using wireless commands from the web. A Google Calendar interface directly controls the outlets’ function by scheduling them with dedicated calendar events. The calendar’s interface can even be accessed from multiple different platforms (i.e. phones, computers, tablets) for the convenience of all …
Examining Ambiguities In The Automatic Packet Reporting System, Kenneth W. Finnegan
Examining Ambiguities In The Automatic Packet Reporting System, Kenneth W. Finnegan
Master's Theses
The Automatic Packet Reporting System (APRS) is an amateur radio packet network that has evolved over the last several decades in tandem with, and then arguably beyond, the lifetime of other VHF/UHF amateur packet networks, to the point where it is one of very few packet networks left on the amateur VHF/UHF bands. This is proving to be problematic due to the loss of institutional knowledge as older amateur radio operators who designed and built APRS and other AX.25-based packet networks abandon the hobby or pass away. The purpose of this document is to collect and curate a sufficient body …
Asymptotic Analysis Of Random Wireless Networks: Broadcasting, Secrecy, And Hybrid Networks, Cagatay Capar
Asymptotic Analysis Of Random Wireless Networks: Broadcasting, Secrecy, And Hybrid Networks, Cagatay Capar
Doctoral Dissertations
This thesis work is concerned with communication in large random wireless ad hoc networks. We mathematically model the wireless network as a collection of randomly located nodes, and explore how its performance scales as the network size increases. In particular, we study three important properties: broadcasting ability, rate of information exchange, and secret communication capability. In addition, we study connectivity properties of large random graphs in a more general context, where the graph does not necessarily represent a wireless communication network. Broadcasting, i.e., delivering a message from a single node to the entire network in a wireless ad hoc network …
Interpreting, Stephanie Jo Kent
Interpreting, Stephanie Jo Kent
Doctoral Dissertations
What do community interpreting for the Deaf in western societies, conference interpreting for the European Parliament, and language brokering in international management have in common? Academic research and professional training have historically emphasized the linguistic and cognitive challenges of interpreting, neglecting or ignoring the social aspects that structure communication. All forms of interpreting are inherently social; they involve relationships among at least three people and two languages. The contexts explored here, American Sign Language/English interpreting and spoken language interpreting within the European Parliament, show that simultaneous interpreting involves attitudes, norms and values about intercultural communication that overemphasize information and discount …
Barrier Coverage In Wireless Sensor Networks, Zhibo Wang
Barrier Coverage In Wireless Sensor Networks, Zhibo Wang
Doctoral Dissertations
Barrier coverage is a critical issue in wireless sensor networks (WSNs) for security applications, which aims to detect intruders attempting to penetrate protected areas. However, it is difficult to achieve desired barrier coverage after initial random deployment of sensors because their locations cannot be controlled or predicted. In this dissertation, we explore how to leverage the mobility capacity of mobile sensors to improve the quality of barrier coverage.
We first study the 1-barrier coverage formation problem in heterogeneous sensor networks and explore how to efficiently use different types of mobile sensors to form a barrier with pre-deployed different types of …
Reputation Computation In Social Networks And Its Applications, Jooyoung Lee
Reputation Computation In Social Networks And Its Applications, Jooyoung Lee
Dissertations - ALL
This thesis focuses on a quantification of reputation and presents models which compute reputation within networked environments. Reputation manifests past behaviors of users and helps others to predict behaviors of users and therefore reduce risks in future interactions. There are two approaches in computing reputation on networks- namely, the macro-level approach and the micro-level approach. A macro-level assumes that there exists a computing entity outside of a given network who can observe the entire network including degree distributions and relationships among nodes. In a micro-level approach, the entity is one of the nodes in a network and therefore can only …
Gate Monte Carlo Simulations In A Cloud Computing Environment, Blake Austin Rowedder
Gate Monte Carlo Simulations In A Cloud Computing Environment, Blake Austin Rowedder
UNLV Theses, Dissertations, Professional Papers, and Capstones
The GEANT4-based GATE is a unique and powerful Monte Carlo (MC) platform, which provides a single code library allowing the simulation of specific medical physics applications, e.g. PET, SPECT, CT, radiotherapy, and hadron therapy. However, this rigorous yet flexible platform is used only sparingly in the clinic due to its lengthy calculation time. By accessing the powerful computational resources of a cloud computing environment, GATE's runtime can be significantly reduced to clinically feasible levels without the sizable investment of a local high performance cluster. This study investigated a reliable and efficient execution of GATE MC simulations using a commercial cloud …
A Framework For Web Object Self-Preservation, Charles L. Cartledge
A Framework For Web Object Self-Preservation, Charles L. Cartledge
Computer Science Theses & Dissertations
We propose and develop a framework based on emergent behavior principles for the long-term preservation of digital data using the web infrastructure. We present the development of the framework called unsupervised small-world (USW) which is at the nexus of emergent behavior, graph theory, and digital preservation. The USW algorithm creates graph based structures on the Web used for preservation of web objects (WOs). Emergent behavior activities, based on Craig Reynolds’ “boids” concept, are used to preserve WOs without the need for a central archiving authority. Graph theory is extended by developing an algorithm that incrementally creates small-world graphs. Graph theory …
Scalable System Design For Covert Mimo Communications, Jason R. Pennington
Scalable System Design For Covert Mimo Communications, Jason R. Pennington
Theses and Dissertations
In modern communication systems, bandwidth is a limited commodity. Bandwidth efficient systems are needed to meet the demands of the ever-increasing amount of data that users share. Of particular interest is the U.S. Military, where high-resolution pictures and video are used and shared. In these environments, covert communications are necessary while still providing high data rates. The promise of multi-antenna systems providing higher data rates has been shown on a small scale, but limitations in hardware prevent large systems from being implemented.
Gesture Recognition Using Microsoft’S Kinect V2, Andrew Weinfield
Gesture Recognition Using Microsoft’S Kinect V2, Andrew Weinfield
Computer Engineering
No abstract provided.
“State Machines”: A High-Throughput Distributed Game Framework, Brandon Howell Ivy
“State Machines”: A High-Throughput Distributed Game Framework, Brandon Howell Ivy
Computer Engineering
Online multiplayer games allow competition with other opponents using the internet. Their development is difficult as it involves many complex areas of computer science - optimization, security, big data, and thread safety. Many multiplayer game frameworks have been published, but very few are generic.
In this project, we focus on the framework design of a web service which allows users to easily create multiplayer games, and artificial intelligence bots to compete in them. It handles turn-based multiplayer communication, and allows the games and bots to ignore the concepts of multiplayer systems. Multiple game instances can run simultaneously, where each game’s …
High-Speed Mobile Networks For Modern Farming And Agricultural Systems, Santos Najar
High-Speed Mobile Networks For Modern Farming And Agricultural Systems, Santos Najar
Master's Theses
ABSTRACT
High-Speed Mobile Networks for Modern Farming and Agricultural Systems
J.Santos Najar-Ramirez
High-speed mobile networks are necessary for agriculture to inventory individual plant health, maximize yield and minimize the resources applied. More specifically, real-time information on individual plant status is critical to decisions regarding the management of resources reserved and expended. This necessity can be met by the availability of environmental sensors (such as humidity, temperature, and pH) whose data is kept on storage servers connected to static and mobile local area networks. These static and mobile local area networks are connected to cellular, core and satellite networks. For …
Achieving Energy Efficiency On Networking Systems With Optimization Algorithms And Compressed Data Structures, Yanjun Yao
Doctoral Dissertations
To cope with the increasing quantity, capacity and energy consumption of transmission and routing equipment in the Internet, energy efficiency of communication networks has attracted more and more attention from researchers around the world. In this dissertation, we proposed three methodologies to achieve energy efficiency on networking devices: the NP-complete problems and heuristics, the compressed data structures, and the combination of the first two methods.
We first consider the problem of achieving energy efficiency in Data Center Networks (DCN). We generalize the energy efficiency networking problem in data centers as optimal flow assignment problems, which is NP-complete, and then propose …
Wireless Network Intrusion Detection System, Calvin Jia Liang
Wireless Network Intrusion Detection System, Calvin Jia Liang
Computer Engineering
The Wireless Network Intrusion Detection System is a network-based intrusion detection system (IDS) that listens on a wireless network. The IDS device is a self-contained single-board-computer capable of monitoring the user’s wireless network, detecting suspicious network traffic, and reporting to the user via email. The device has two network interfaces: the wireless interface is used to monitor network traffic, and the wired interface is used to configure the system and to send out detection alerts. The system requires minimal setup, configuration, and maintenance. It is a relatively inexpensive device that tries to improve user’s situational-awareness of one’s wireless network.
Data Transfer Using Light, Ryan Thomas Suarez
Data Transfer Using Light, Ryan Thomas Suarez
Computer Engineering
A proof of concerpt for data transmission using light as a medium. Data is transferred by strobing and LED faster than the human eye can detect in an attempt to come up with a more secure alternate to in-building wifi.
Wsnfs: A Distributed Data Sharing System For In-Network Processing, Joshua C. Kiepert
Wsnfs: A Distributed Data Sharing System For In-Network Processing, Joshua C. Kiepert
Boise State University Theses and Dissertations
Wireless sensor networks (WSNs) have emerged as versatile platforms for a wide range of scientific data acquisition applications. Wireless sensor network systems are used in many applications including: surveillance, environmental monitoring, target tracking, wildlife tracking, personal health monitoring, machinery monitoring, and many others. Current research efforts in WSN system designs are moving toward approaches that enable direct in-network processing of acquired sensor data to avoid the high energy costs associated with the bulk transmission of data to outside systems for processing. Implementation of collaborative in-network processing algorithms is a non-trivial issue for WSN system development. Design complexity for in-network processing …
An Innovative Approach Towards Applying Chaum Mixing To Sms, Matthew Patrick Rothmeyer
An Innovative Approach Towards Applying Chaum Mixing To Sms, Matthew Patrick Rothmeyer
Graduate Theses and Dissertations
Currently there are few user-friendly applications for anonymous communication across multiple platforms, leaving data that is often both personal and private vulnerable to malicious activity. Mobile devices such as smartphones are prime candidates for such an application as they are pervasive and have standardized communication protocols. Through the application of mixing techniques, these devices can provide anonymity for groups of individuals numbering 30 to 40 members. In this work, a Chaum mix inspired, smartphone based network that uses the Short Message Service (SMS) is described first in theory and then in implementation. This system leverages both techniques used by current …
Web Archive Services Framework For Tighter Integration Between The Past And Present Web, Ahmed Alsum
Web Archive Services Framework For Tighter Integration Between The Past And Present Web, Ahmed Alsum
Computer Science Theses & Dissertations
Web archives have contained the cultural history of the web for many years, but they still have a limited capability for access. Most of the web archiving research has focused on crawling and preservation activities, with little focus on the delivery methods. The current access methods are tightly coupled with web archive infrastructure, hard to replicate or integrate with other web archives, and do not cover all the users' needs. In this dissertation, we focus on the access methods for archived web data to enable users, third-party developers, researchers, and others to gain knowledge from the web archives. We build …
Transparent Spectrum Co-Access In Cognitive Radio Networks, Jonathan Daniel Backens
Transparent Spectrum Co-Access In Cognitive Radio Networks, Jonathan Daniel Backens
Electrical & Computer Engineering Theses & Dissertations
The licensed wireless spectrum is currently under-utilized by as much as 85%. Cognitive radio networks have been proposed to employ dynamic spectrum access to share this under-utilized spectrum between licensed primary user transmissions and unlicensed secondary user transmissions. Current secondary user opportunistic spectrum access methods, however, remain limited in their ability to provide enough incentive to convince primary users to share the licensed spectrum, and they rely on primary user absence to guarantee secondary user performance. These challenges are addressed by developing a Dynamic Spectrum Co-Access Architecture (DSCA) that allows secondary user transmissions to co-access transparently and concurrently with primary …
Conception, Design And Construction Of A Remote Wifi Vehicle Using Arduino, Clayton Broman
Conception, Design And Construction Of A Remote Wifi Vehicle Using Arduino, Clayton Broman
Physics
The scope of this senior project was to make a wireless vehicle controlled via Internet Protocol. This vehicle operates remotely and without direct line of sight. Commands are sent from a program running on a laptop and transmitted using a wireless router. Visual data is retrieved from a network camera, mounted on the vehicle, in real-time, to see where you are going.
Mobile Device Vulnerabilities & Securities, Luke Rondeau
Mobile Device Vulnerabilities & Securities, Luke Rondeau
Senior Honors Theses and Projects
An investigation on current mobile vulnerabilities and research into security. Also, a proof of concept to show the ease of injecting an Android phone with a virus.
A Hypernet Architecture, Shufeng Huang
A Hypernet Architecture, Shufeng Huang
Theses and Dissertations--Computer Science
Network virtualization is becoming a fundamental building block of future Internet architectures. By adding networking resources into the “cloud”, it is possible for users to rent virtual routers from the underlying network infrastructure, connect them with virtual channels to form a virtual network, and tailor the virtual network (e.g., load application-specific networking protocols, libraries and software stacks on to the virtual routers) to carry out a specific task. In addition, network virtualization technology allows such special-purpose virtual networks to co-exist on the same set of network infrastructure without interfering with each other.
Although the underlying network resources needed to support …
A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr
A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr
Electronic Theses and Dissertations
The rapid expansion in networking has provided tremendous opportunities to access an unparalleled amount of information. Everyone connects to a network to gain access and to share this information. However when someone connects to a public network, his private network and information becomes vulnerable to hackers and all kinds of security threats. Today, all networks needs to be secured, and one of the best security policies is firewall implementation.
Firewalls can be hardware or cloud based. Hardware based firewalls offer the advantage of faster response time, whereas cloud based firewalls are more flexible. In reality the best form of firewall …
Neuromodulation Based Control Of Autonomous Robots On A Cloud Computing Platform, Cameron Muhammad
Neuromodulation Based Control Of Autonomous Robots On A Cloud Computing Platform, Cameron Muhammad
Electronic Theses and Dissertations
In recent years, the advancement of neurobiologically plausible models and computer networking has resulted in new ways of implementing control systems on robotic platforms. The work presents a control approach based on vertebrate neuromodulation and its implementation on autonomous robots in the open-source, open-access environment of robot operating system (ROS). A spiking neural network (SNN) is used to model the neuromodulatory function for generating context based behavioral responses of the robots to sensory input signals. The neural network incorporates three types of neurons- cholinergic and noradrenergic (ACh/NE) neurons for attention focusing and action selection, dopaminergic (DA) neurons for rewards- and …
Service And Communication Management In Cooperative Vehicular Networks, Olivia Brickley
Service And Communication Management In Cooperative Vehicular Networks, Olivia Brickley
Theses
The concept of Intelligent Transportation Systems (ITS) presents new R&D challenges for the transportation and ICT sectors and is currently receiving considerable interest from the research community. The primary objective of ITS is the creation of advanced road traffic systems for improved traffic safety, efficiency, and travelling comfort. Basic vehicle and roadside infrastructure collaboration allows for an increase in efficiency and safety and acts as the foundation for an extensive service set to achieve these ITS goals. Applications such as journey planning, automatic tolling and emergency warnings, among others, are envisaged in a system which can potentially reform modern transportation. …