Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

2014

PDF

Institution
Keyword
Publication
Publication Type

Articles 31 - 60 of 65

Full-Text Articles in Computer Engineering

Multi-Channel Wireless Networks With Infrastructure Support: Capacity And Delay, Hong-Ning Dai, Raymond Chi-Wing Wong, Qinglin Zhao May 2014

Multi-Channel Wireless Networks With Infrastructure Support: Capacity And Delay, Hong-Ning Dai, Raymond Chi-Wing Wong, Qinglin Zhao

Hong-Ning Dai

No abstract provided.


A Gradient-Based Optimum Block Adaptation Ica Technique For Interference Suppression In Highly Dynamic Communication Channels, Wasfy B. Mikhael, Tianyu Yang May 2014

A Gradient-Based Optimum Block Adaptation Ica Technique For Interference Suppression In Highly Dynamic Communication Channels, Wasfy B. Mikhael, Tianyu Yang

Thomas Yang

The fast fixed-point independent component analysis (ICA) algorithm has been widely used in various applications because of its fast convergence and superior performance. However, in a highly dynamic environment, real-time adaptation is necessary to track the variations of the mixing matrix. In this scenario, the gradient-based online learning algorithm performs better, but its convergence is slow, and depends on a proper choice of convergence factor. This paper develops a gradient-based optimum block adaptive ICA algorithm (OBA/ICA) that combines the advantages of the two algorithms. Simulation results for telecommunication applications indicate that the resulting performance is superior under time-varying conditions, which …


Achieving Energy Efficiency On Networking Systems With Optimization Algorithms And Compressed Data Structures, Yanjun Yao May 2014

Achieving Energy Efficiency On Networking Systems With Optimization Algorithms And Compressed Data Structures, Yanjun Yao

Doctoral Dissertations

To cope with the increasing quantity, capacity and energy consumption of transmission and routing equipment in the Internet, energy efficiency of communication networks has attracted more and more attention from researchers around the world. In this dissertation, we proposed three methodologies to achieve energy efficiency on networking devices: the NP-complete problems and heuristics, the compressed data structures, and the combination of the first two methods.

We first consider the problem of achieving energy efficiency in Data Center Networks (DCN). We generalize the energy efficiency networking problem in data centers as optimal flow assignment problems, which is NP-complete, and then propose …


Wireless Network Intrusion Detection System, Calvin Jia Liang May 2014

Wireless Network Intrusion Detection System, Calvin Jia Liang

Computer Engineering

The Wireless Network Intrusion Detection System is a network-based intrusion detection system (IDS) that listens on a wireless network. The IDS device is a self-contained single-board-computer capable of monitoring the user’s wireless network, detecting suspicious network traffic, and reporting to the user via email. The device has two network interfaces: the wireless interface is used to monitor network traffic, and the wired interface is used to configure the system and to send out detection alerts. The system requires minimal setup, configuration, and maintenance. It is a relatively inexpensive device that tries to improve user’s situational-awareness of one’s wireless network.


Data Transfer Using Light, Ryan Thomas Suarez May 2014

Data Transfer Using Light, Ryan Thomas Suarez

Computer Engineering

A proof of concerpt for data transmission using light as a medium. Data is transferred by strobing and LED faster than the human eye can detect in an attempt to come up with a more secure alternate to in-building wifi.


Introduction To Rfid Technology And Collision Problem, Masoud Shakiba May 2014

Introduction To Rfid Technology And Collision Problem, Masoud Shakiba

Masoud Shakiba

Radio Frequency Identification (RFID) system is a new communication technology to identify the objects using electromagnetic waves. The main superiority of RFID systems in comparison with other identification systems, such as barcodes, is its ability in simultaneous identification process, but when more than one tag wants to communicate with the reader, collision problem occurs and wastes time and increases energy consumption. This reduces efficiency of the identification process in RFID systems. Collision problem happens when the reader has to identify more than one tag at the same time. Consequently, it is essential to develop an efficient anti-collision algorithm to save …


Wsnfs: A Distributed Data Sharing System For In-Network Processing, Joshua C. Kiepert May 2014

Wsnfs: A Distributed Data Sharing System For In-Network Processing, Joshua C. Kiepert

Boise State University Theses and Dissertations

Wireless sensor networks (WSNs) have emerged as versatile platforms for a wide range of scientific data acquisition applications. Wireless sensor network systems are used in many applications including: surveillance, environmental monitoring, target tracking, wildlife tracking, personal health monitoring, machinery monitoring, and many others. Current research efforts in WSN system designs are moving toward approaches that enable direct in-network processing of acquired sensor data to avoid the high energy costs associated with the bulk transmission of data to outside systems for processing. Implementation of collaborative in-network processing algorithms is a non-trivial issue for WSN system development. Design complexity for in-network processing …


An Innovative Approach Towards Applying Chaum Mixing To Sms, Matthew Patrick Rothmeyer May 2014

An Innovative Approach Towards Applying Chaum Mixing To Sms, Matthew Patrick Rothmeyer

Graduate Theses and Dissertations

Currently there are few user-friendly applications for anonymous communication across multiple platforms, leaving data that is often both personal and private vulnerable to malicious activity. Mobile devices such as smartphones are prime candidates for such an application as they are pervasive and have standardized communication protocols. Through the application of mixing techniques, these devices can provide anonymity for groups of individuals numbering 30 to 40 members. In this work, a Chaum mix inspired, smartphone based network that uses the Short Message Service (SMS) is described first in theory and then in implementation. This system leverages both techniques used by current …


Security Analysis Of Phasor Measurement Units In Smart Grid Communication Infrastructures May 2014

Security Analysis Of Phasor Measurement Units In Smart Grid Communication Infrastructures

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

Phasor Measurement Units (PMUs), or synchrophasors, are rapidly being deployed in the smart grid with the goal of measuring phasor quantities concurrently from wide area distribution substations. By utilizing GPS receivers, PMUs can take a wide area snapshot of power systems. Thus, the possibility of blackouts in the smart grid, the next generation power grid, will be reduced. As the main enabler of Wide Area Measurement Systems (WAMS), PMUs transmit measured values to Phasor Data Concentrators (PDCs) by the synchrophasor standard IEEE C37.118. IEC 61850 and IEC 62351 are the communication protocols for the substation automation system and the security …


First Step Mental Health App, Joshua Martin, James Faraday, Mackenzie Lopez Apr 2014

First Step Mental Health App, Joshua Martin, James Faraday, Mackenzie Lopez

Undergraduate Research Symposium

The goal of this project is to create a tool that provides students at Minnesota State University, Mankato with mental health information through a freely available smartphone application (App). Our approach uses a software engineering design process that focuses on who our customers are, what resources are available, and how we can best connect the two to improve student lives. We identified the stakeholders involved and worked with campus mental health professionals to help shape our App. While there is a broad range of mental health topics, we have focused on materials related to depression. The first process gives the …


Qos-Aware Data Transmission And Wireless Energy Transfer: Performance Modeling And Optimization, D. Niyato, P. Wang, W. L. Yeow, Hwee-Pink Tan Apr 2014

Qos-Aware Data Transmission And Wireless Energy Transfer: Performance Modeling And Optimization, D. Niyato, P. Wang, W. L. Yeow, Hwee-Pink Tan

Research Collection School Of Computing and Information Systems

With wireless energy transfer, a mobile node can operate perpetually without having a wired connection to charge its battery. In this paper, we present a quality of service (QoS) aware data transmission and wireless energy transfer for the mobile node. The node can request for wireless energy transfer or transmit a packet when the node is in a coverage area of an access point. The node supports service differentiation for different type of traffic (i.e., low and high priority data). To meet the QoS requirement of each traffic type, we present the performance modeling and optimization framework. The objective is …


A Lightweight And Robust Interference Mitigation Scheme For Wireless Body Sensor Networks In Realistic Environments, S. Liang, Y. Ge, S. Jiang, Hwee-Pink Tan Apr 2014

A Lightweight And Robust Interference Mitigation Scheme For Wireless Body Sensor Networks In Realistic Environments, S. Liang, Y. Ge, S. Jiang, Hwee-Pink Tan

Research Collection School Of Computing and Information Systems

In dense deployments of Wireless Body Sensor Networks (WBSNs), inter-user interference significantly degrades network performance when multiple WBSN users stay in a small area such as hospitals. Due to the high dynamics of the environments, it is usually hard to schedule the transmissions of multiple WBSNs without a central controller. In this paper, we propose a robust and lightweight interference mitigation scheme for realistic WBSN systems through adaptive channel hopping. A WBSN testbed is set up to investigate the impact of inter-user interference on various performance metrics when different severity levels of interference are present. Based on the measurement results, …


Web Archive Services Framework For Tighter Integration Between The Past And Present Web, Ahmed Alsum Apr 2014

Web Archive Services Framework For Tighter Integration Between The Past And Present Web, Ahmed Alsum

Computer Science Theses & Dissertations

Web archives have contained the cultural history of the web for many years, but they still have a limited capability for access. Most of the web archiving research has focused on crawling and preservation activities, with little focus on the delivery methods. The current access methods are tightly coupled with web archive infrastructure, hard to replicate or integrate with other web archives, and do not cover all the users' needs. In this dissertation, we focus on the access methods for archived web data to enable users, third-party developers, researchers, and others to gain knowledge from the web archives. We build …


Transparent Spectrum Co-Access In Cognitive Radio Networks, Jonathan Daniel Backens Apr 2014

Transparent Spectrum Co-Access In Cognitive Radio Networks, Jonathan Daniel Backens

Electrical & Computer Engineering Theses & Dissertations

The licensed wireless spectrum is currently under-utilized by as much as 85%. Cognitive radio networks have been proposed to employ dynamic spectrum access to share this under-utilized spectrum between licensed primary user transmissions and unlicensed secondary user transmissions. Current secondary user opportunistic spectrum access methods, however, remain limited in their ability to provide enough incentive to convince primary users to share the licensed spectrum, and they rely on primary user absence to guarantee secondary user performance. These challenges are addressed by developing a Dynamic Spectrum Co-Access Architecture (DSCA) that allows secondary user transmissions to co-access transparently and concurrently with primary …


Conception, Design And Construction Of A Remote Wifi Vehicle Using Arduino, Clayton Broman Mar 2014

Conception, Design And Construction Of A Remote Wifi Vehicle Using Arduino, Clayton Broman

Physics

The scope of this senior project was to make a wireless vehicle controlled via Internet Protocol. This vehicle operates remotely and without direct line of sight. Commands are sent from a program running on a laptop and transmitted using a wireless router. Visual data is retrieved from a network camera, mounted on the vehicle, in real-time, to see where you are going.


Why Hybrid Mail Has Got The International Factor, Jacob Johnsen Jan 2014

Why Hybrid Mail Has Got The International Factor, Jacob Johnsen

Jacob Johnsen, MSc

Hybrid mail is instrumental to the development of international mail, as Jacob Johnsen explains in this article


Mobile Device Vulnerabilities & Securities, Luke Rondeau Jan 2014

Mobile Device Vulnerabilities & Securities, Luke Rondeau

Senior Honors Theses and Projects

An investigation on current mobile vulnerabilities and research into security. Also, a proof of concept to show the ease of injecting an Android phone with a virus.


A Hypernet Architecture, Shufeng Huang Jan 2014

A Hypernet Architecture, Shufeng Huang

Theses and Dissertations--Computer Science

Network virtualization is becoming a fundamental building block of future Internet architectures. By adding networking resources into the “cloud”, it is possible for users to rent virtual routers from the underlying network infrastructure, connect them with virtual channels to form a virtual network, and tailor the virtual network (e.g., load application-specific networking protocols, libraries and software stacks on to the virtual routers) to carry out a specific task. In addition, network virtualization technology allows such special-purpose virtual networks to co-exist on the same set of network infrastructure without interfering with each other.

Although the underlying network resources needed to support …


A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr Jan 2014

A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr

Electronic Theses and Dissertations

The rapid expansion in networking has provided tremendous opportunities to access an unparalleled amount of information. Everyone connects to a network to gain access and to share this information. However when someone connects to a public network, his private network and information becomes vulnerable to hackers and all kinds of security threats. Today, all networks needs to be secured, and one of the best security policies is firewall implementation.

Firewalls can be hardware or cloud based. Hardware based firewalls offer the advantage of faster response time, whereas cloud based firewalls are more flexible. In reality the best form of firewall …


Neuromodulation Based Control Of Autonomous Robots On A Cloud Computing Platform, Cameron Muhammad Jan 2014

Neuromodulation Based Control Of Autonomous Robots On A Cloud Computing Platform, Cameron Muhammad

Electronic Theses and Dissertations

In recent years, the advancement of neurobiologically plausible models and computer networking has resulted in new ways of implementing control systems on robotic platforms. The work presents a control approach based on vertebrate neuromodulation and its implementation on autonomous robots in the open-source, open-access environment of robot operating system (ROS). A spiking neural network (SNN) is used to model the neuromodulatory function for generating context based behavioral responses of the robots to sensory input signals. The neural network incorporates three types of neurons- cholinergic and noradrenergic (ACh/NE) neurons for attention focusing and action selection, dopaminergic (DA) neurons for rewards- and …


Service And Communication Management In Cooperative Vehicular Networks, Olivia Brickley Jan 2014

Service And Communication Management In Cooperative Vehicular Networks, Olivia Brickley

Theses

The concept of Intelligent Transportation Systems (ITS) presents new R&D challenges for the transportation and ICT sectors and is currently receiving considerable interest from the research community. The primary objective of ITS is the creation of advanced road traffic systems for improved traffic safety, efficiency, and travelling comfort. Basic vehicle and roadside infrastructure collaboration allows for an increase in efficiency and safety and acts as the foundation for an extensive service set to achieve these ITS goals. Applications such as journey planning, automatic tolling and emergency warnings, among others, are envisaged in a system which can potentially reform modern transportation. …


Possible Paradigm Shifts In Broadband Policy, Christopher S. Yoo Jan 2014

Possible Paradigm Shifts In Broadband Policy, Christopher S. Yoo

All Faculty Scholarship

Debates over Internet policy tend to be framed by the way the Internet existed in the mid-1990s, when the Internet first became a mass-market phenomenon. At the risk of oversimplifying, the Internet was initially used by academics and tech-savvy early adopters to send email and browse the web over a personal computer connected to a telephone line via networks interconnected through in a limited way. Since then, the Internet has become much larger and more diverse in terms of users, applications, technologies, and business relationships. More recently, Internet growth has begun to slow both in terms of the number of …


A Brief Overview Of The Nebula Future Internet Architecture, Tom Anderson, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazieres, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert Van Renesse, Michael Walfish, Hakim Weatherspoon, Christopher S. Yoo Jan 2014

A Brief Overview Of The Nebula Future Internet Architecture, Tom Anderson, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazieres, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert Van Renesse, Michael Walfish, Hakim Weatherspoon, Christopher S. Yoo

All Faculty Scholarship

NEBULA is a proposal for a Future Internet Architecture. It is based on the assumptions that: (1) cloud computing will comprise an increasing fraction of the application workload offered to an Internet, and (2) that access to cloud computing resources will demand new architectural features from a network. Features that we have identified include dependability, security, flexibility and extensibility, the entirety of which constitute resilience.

NEBULA provides resilient networking services using ultrareliable routers, an extensible control plane and use of multiple paths upon which arbitrary policies may be enforced. We report on a prototype system, Zodiac, that incorporates these latter …


Performance Evaluation Of A Technology Independent Security Gateway For Next Generation Networks, Fudong Li, Nathan Clarke, Steven Furnell, Is-Mkwawa Mkwawa Jan 2014

Performance Evaluation Of A Technology Independent Security Gateway For Next Generation Networks, Fudong Li, Nathan Clarke, Steven Furnell, Is-Mkwawa Mkwawa

Research outputs 2014 to 2021

With the all IP based Next Generation Networks being deployed around the world, the use of real-time multimedia service applications is being extended from normal daily communications to emergency situations. However, currently different emergency providers utilise differing networks and different technologies. As such, conversations could be terminated at the setup phase or data could be transmitted in plaintext should incompatibility issues exit between terminals. To this end, a novel security gateway that can provide the necessary security support for incompatible terminals was proposed, developed and implemented to ensure the successful establishment of secure real-time multimedia conversations. A series of experiments …


Efficient Cooperative Mimo Paradigms For Cognitive Radio Networks, Wei Chen, Liang Hong, Xiaoqian Chen Jan 2014

Efficient Cooperative Mimo Paradigms For Cognitive Radio Networks, Wei Chen, Liang Hong, Xiaoqian Chen

Computer Science Faculty Research

This paper investigates the benefits that cooperative communication brings to cognitive radio networks. We focus on cooperative Multiple Input Multiple Output (MIMO) technology, where multiple distributed single-antenna secondary users cooperate on data transmission and reception. Three cooperative MIMO paradigms are proposed to maximize the diversity gain and significantly improve the performance of overlay, underlay and interweave systems. In the paradigm for overlay systems the secondary users can assist (relay) the primary transmissions even when they are far away from the primary users. In the paradigm for underlay systems the secondary users can share the primary users’ frequency resources without any …


New Operations On Intuitionistic Fuzzy Soft Sets Based On First Zadeh's Logical Operators, Florentin Smarandache, Said Broumi, Pinaki Majumdar Jan 2014

New Operations On Intuitionistic Fuzzy Soft Sets Based On First Zadeh's Logical Operators, Florentin Smarandache, Said Broumi, Pinaki Majumdar

Branch Mathematics and Statistics Faculty and Staff Publications

In this paper , we have defined First Zadeh’s implication , First Zadeh’s intuitionistic fuzzy conjunction and intuitionistic fuzzy disjunction of two intuitionistic fuzzy soft sets and some their basic properties are studied with proofs and examples.


Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo Jan 2014

Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo

All Faculty Scholarship

Legal issues increasingly arise in increasingly complex technological contexts. Prominent recent examples include the Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act (PIPA), network neutrality, the increasing availability of location information, and the NSA’s surveillance program. Other emerging issues include data privacy, online video distribution, patent policy, and spectrum policy. In short, the rapid rate of technological change has increasingly shown that law and engineering can no longer remain compartmentalized into separate spheres. The logical response would be to embed the interaction between law and policy deeper into the fabric of both fields. An essential step would …


Cross-Domain Password-Based Authenticated Key Exchange Revisited, Liqun Chen, Hoon Wei Lim, Guomin Yang Jan 2014

Cross-Domain Password-Based Authenticated Key Exchange Revisited, Liqun Chen, Hoon Wei Lim, Guomin Yang

Research Collection School Of Computing and Information Systems

We revisit the problem of secure cross-domain communication between two users belonging to different security domains within an open and distributed environment. Existing approaches presuppose that either the users are in possession of public key certificates issued by a trusted certificate authority (CA), or the associated domain authentication servers share a long-term secret key. In this article, we propose a generic framework for designing four-party password-based authenticated key exchange (4PAKE) protocols. Our framework takes a different approach from previous work. The users are not required to have public key certificates, but they simply reuse their login passwords, which they share …


Technological Determinism And Its Discontents, Christopher S. Yoo Jan 2014

Technological Determinism And Its Discontents, Christopher S. Yoo

All Faculty Scholarship

This book review takes a critical review of the claim advanced by Susan Crawford in Captive Audience that the merger between Comcast and NBC Universal would harm consumers and that policymakers should instead promote common carriage regulation and subsidize municipal symmetrical gigabit fiber-to-the-home (FTTH). First it evaluates the extent to which next-generation digital subscriber lines (DSL) and wireless broadband technologies can serve as effective substitutes for cable modem service, identifying FCC data showing that the market has become increasingly competitive and likely to continue to do so. Furthermore, the market is not structured in a way that would permit the …


Evaluating Electronic Market Designs: The Effects Of Competitive Arousal And Social Facilitation On Electronic Group Buying, Yuecheng Yu, Karl R. Lang, Alex Pelaez Jan 2014

Evaluating Electronic Market Designs: The Effects Of Competitive Arousal And Social Facilitation On Electronic Group Buying, Yuecheng Yu, Karl R. Lang, Alex Pelaez

Research Collection School Of Computing and Information Systems

This article presents an evaluation approach foralternative electronic market designs and examines theimpact of competitive arousal under time pressure onmarket performance in a group-buying setting. Drawingon theory from economics, decision theory, andinformation systems, we present a competitive arousalmodel for a social buying setting that posits thatintroducing competitive arousal among buyers reducesbuyer profits and that social facilitation can mitigate thesecosts through better task completion and time tocompletion rates. Using an economic experiment, wefound that rivalry has a negative effect on buyer profitsbut also that competitive arousal increases the efficiencyof social facilitation in terms of group formation. Wediscuss the implications of these …