Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

Collecting Multiple Data Points In A Thunderstorm Environment, Matthew Nelson Jun 2015

Collecting Multiple Data Points In A Thunderstorm Environment, Matthew Nelson

2017 Academic High Altitude Conference

Collecting multiple data points in adverse conditions such as a thunderstorm presents a number of challenges in collecting and relaying data. Wireless sensor mesh networks is a proven method for extracting and relaying data in radio environments that may either be roving, in adverse conditions or both. This paper explores using wireless sensor mesh networks to collect atmospheric data that is present in a thunderstorm system to enable researchers to learn more from these systems. A wireless sensor mesh network is ideal since it is well suited for both moving and sensor nodes that are in adverse RF conditions. A ...


Cybersecurity In The Information Age Mar 2015

Cybersecurity In The Information Age

DePaul Magazine

According to the Identify Theft Resource Center, more than 750 breaches occurred in 2014, exposing more than 83 million records. Breaches occur because people have discovered that there’s money to be made from stealing corporate and customer information. Faced with this reality, consumers and companies may wonder if it’s possible to protect their personal and financial data. DePaul's College of Computing and Digital Media is training the next generation of cybersecurity experts to thwart cybersecurity attacks. In addition, DePaul faculty and alumni in data security offer advice to consumers on securing their financial and personal information.