Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

2015

Theses/Dissertations

Institution
Keyword
Publication
File Type

Articles 1 - 30 of 39

Full-Text Articles in Computer Engineering

Estimation On Gibbs Entropy For An Ensemble, Lekhya Sai Sake Dec 2015

Estimation On Gibbs Entropy For An Ensemble, Lekhya Sai Sake

Electronic Theses, Projects, and Dissertations

In this world of growing technology, any small improvement in the present scenario would create a revolution. One of the popular revolutions in the computer science field is parallel computing. A single parallel execution is not sufficient to see its non-deterministic features, as same execution with the same data at different time would end up with a different path. In order to see how non deterministic a parallel execution can extend up to, creates the need of the ensemble of executions. This project implements a program to estimate the Gibbs Entropy for an ensemble of parallel executions. The goal is ...


Efficient Scheduling Algorithms For Wireless Resource Allocation And Virtualization In Wireless Networks, Mohamad Kalil Nov 2015

Efficient Scheduling Algorithms For Wireless Resource Allocation And Virtualization In Wireless Networks, Mohamad Kalil

Electronic Thesis and Dissertation Repository

The continuing growth in demand for better mobile broadband experiences has motivated rapid development of radio-access technologies to support high data rates and improve quality of service (QoS) and quality of experience (QoE) for mobile users. However, the modern radio-access technologies pose new challenges to mobile network operators (MNO) and wireless device designers such as reducing the total cost of ownership while supporting high data throughput per user, and extending battery life-per-charge of the mobile devices. In this thesis, a variety of optimization techniques aimed at providing innovative solutions for such challenges are explored.

The thesis is divided into two ...


Effective Node Clustering And Data Dissemination In Large-Scale Wireless Sensor Networks, Mariam Saeed Ai Nuaimi Nov 2015

Effective Node Clustering And Data Dissemination In Large-Scale Wireless Sensor Networks, Mariam Saeed Ai Nuaimi

Theses

The denseness and random distribution of large-scale WSNs makes it quite difficult to replace or recharge nodes. Energy efficiency and management is a major design goal in these networks. In addition, reliability and scalability are two other major goals that have been identified by researchers as necessary in order to further expand the deployment of such networks for their use in various applications. This thesis aims to provide an energy efficient and effective node clustering and data dissemination algorithm in large-scale wireless sensor networks. In the area of clustering, the proposed research prolongs the lifetime of the network by saving ...


Employee Hr Connect Portal, Aparna Allusivala, Sindhura Reddy Mandadi, Sri Vidya Rani Mudunuri Oct 2015

Employee Hr Connect Portal, Aparna Allusivala, Sindhura Reddy Mandadi, Sri Vidya Rani Mudunuri

All Capstone Projects

Employee HR Connect Portal is essential in order to track employee time, project time. This portal can be hosted on any java based web server or application server and will be accessible via web-browsers. This portal is very user- friendly. Employee HR Connect Portal will be a useful tool to identify supply and demand of human resources. We have three main modules to maintain records of employee, department and project. Employee HR Connect Portal is very helpful for auditing. Through this portal we can judge the potentiality of the employee.


Real-Time Detection System For Suspicious Urls, Krishna Prasad Chouty, Anup Chandra Thogiti, Kranthi Sudha Vudatha Oct 2015

Real-Time Detection System For Suspicious Urls, Krishna Prasad Chouty, Anup Chandra Thogiti, Kranthi Sudha Vudatha

All Capstone Projects

Twitter is prone to malicious tweets containing URLs for spam, phishing, and malware distribution. Conventional Twitter spam detection schemes utilize account features such as the ratio of tweets containing URLs and the account creation date, or relation features in the Twitter graph. These detection schemes are ineffective against feature fabrications or consume much time and resources. Conventional suspicious URL detection schemes utilize several features including lexical features of URLs, URL redirection, HTML content, and dynamic behavior. However, evading techniques such as time-based evasion and crawler evasion exist. In this paper, we propose WARNINGBIRD, a suspicious Real-Time URL detection system for ...


Novel Techniques For Secure Use Of Public Cloud Computing Resources, Kyle E. Stewart Sep 2015

Novel Techniques For Secure Use Of Public Cloud Computing Resources, Kyle E. Stewart

Theses and Dissertations

The federal government has an expressed interest in moving data and services to third party service providers in order to take advantage of the flexibility, scalability, and potential cost savings. This approach is called cloud computing. The thesis for this research is that efficient techniques exist to support the secure use of public cloud computing resources by a large, federated enterprise. The primary contributions of this research are the novel cryptographic system MA-AHASBE (Multi-Authority Anonymous Hierarchical Attribute-Set Based Encryption), and the techniques used to incorporate MA-AHASBE in a real world application. Performance results indicate that while there is a cost ...


Data Security And Privacy In Smart Grid, Yue Tong Aug 2015

Data Security And Privacy In Smart Grid, Yue Tong

Doctoral Dissertations

This dissertation explores novel data security and privacy problems in the emerging smart grid.

The need for data security and privacy spans the whole life cycle of the data in the smart grid, across the phases of data acquisition, local processing and archiving, collaborative processing, and finally sharing and archiving. The first two phases happen in the private domains of an individual utility company, where data are collected from the power system and processed at the local facilities. When data are being acquired and processed in the private domain, data security is the most critical concern. The key question is ...


Automatic User Profile Construction For A Personalized News Recommender System Using Twitter, Shiva Theja Reddy Gopidi Jul 2015

Automatic User Profile Construction For A Personalized News Recommender System Using Twitter, Shiva Theja Reddy Gopidi

Theses and Dissertations

Modern society has now grown accustomed to reading online or digital news. However, the huge corpus of information available online poses a challenge to users when trying to find relevant articles. A hybrid system “Personalized News Recommender Using Twitter’ has been developed to recommend articles to a user based on the popularity of the articles and also the profile of the user. The hybrid system is a fusion of a collaborative recommender system developed using tweets from the “Twitter” public timeline and a content recommender system based the user’s past interests summarized in their conceptual user profile. In previous ...


Reducing Multiple Access Interference In Broadband Multi-User Wireless Networks, Ali Nayef Alqatawneh Jul 2015

Reducing Multiple Access Interference In Broadband Multi-User Wireless Networks, Ali Nayef Alqatawneh

Theses and Dissertations

This dissertation is devoted to developing multiple access interference (MAI) reduction techniques for multi-carrier multi-user wireless communication networks.

In multi-carrier code division multiple access (MC-CDMA) systems, a full multipath diversity can be achieved by transmitting one symbol over multiple orthogonal subcarriers by means of spreading codes. However, in frequency selective fading channels, orthogonality among users can be destroyed leading to MAI. MAI represents the main obstacle to support large number of users in multi-user wireless systems. Consequently, MAI reduction becomes a main challenge when designing multi-carrier multi-user wireless networks. In this dissertation, first, we study MC-CDMA systems with different existing ...


Detecting, Modeling, And Predicting User Temporal Intention, Hany M. Salaheldeen Jul 2015

Detecting, Modeling, And Predicting User Temporal Intention, Hany M. Salaheldeen

Computer Science Theses & Dissertations

The content of social media has grown exponentially in the recent years and its role has evolved from narrating life events to actually shaping them. Unfortunately, content posted and shared in social networks is vulnerable and prone to loss or change, rendering the context associated with it (a tweet, post, status, or others) meaningless. There is an inherent value in maintaining the consistency of such social records as in some cases they take over the task of being the first draft of history as collections of these social posts narrate the pulse of the street during historic events, protest, riots ...


M-1: The Mealy Open Source Custom Midi Controller, Garrett Leung, Darren O. Mistica Jun 2015

M-1: The Mealy Open Source Custom Midi Controller, Garrett Leung, Darren O. Mistica

Electrical Engineering

With the high price of large mixing consoles, aspiring artists are restricted to using a mouse to control digital facsimiles of knobs, faders, switches, and buttons. Though using the software controls is considered a simple task, dedicated hardware allows for tactile, visual, and utility. At a low cost, the heart of the MTech M-1 can be customized and placed into any shell with any combination of controls as possible with the underlying platform.

Modern MIDI controllers require significant physical space due to their preset button layout and space consuming setups. Despite their high price, modern MIDI controllers have only one ...


Forest Sign Maker, Victor Espinosa Iii, Kevin Ly, Lisa Yip Jun 2015

Forest Sign Maker, Victor Espinosa Iii, Kevin Ly, Lisa Yip

Mechanical Engineering

Executive Summary:

The Inyo National Forest is arguably one of the most beautiful locations in California, containing natural masterpieces such as Mount Whitney and the Ancient Bristlecone Pine Forest. Despite its magnificence, the Inyo National Forest can be a treacherous region. The Friends of the Inyo take pride in being able to facilitate the viewing experience for all outdoorsmen by maintaining the mountain trails, which includes providing adequate trail signage.

Unfortunately, there is a fundamental issue with the recent state of trail signage in the Inyo National Forest: the rate at which signs are being vandalized or naturally destroyed is ...


Panorama: Multi-Path Ssl Authentication Using Peer Network Perspectives, William P. Harris Jun 2015

Panorama: Multi-Path Ssl Authentication Using Peer Network Perspectives, William P. Harris

Computer Engineering

SSL currently uses certificates signed by Certificate Authorities (CAs) to authenticate connections. e.g. Google will pay a CA to sign a certificate for them, so that they can prove that they're not someone pretending to be Google. Unfortunately, this system has had multiple problems, and many believe that an alternative needs to be found.

One of the ideas for alternatives is using multiple "network perspectives" to authenticate a server. The idea behind this is that, though playing man-in-the-middle (MITM) with one connection is easy, it should be difficult for an adversary to do so with many connections, especially ...


Universal Uav Payload Interface, Nolan Reker, David Troy Jr, Drew Troxell Jun 2015

Universal Uav Payload Interface, Nolan Reker, David Troy Jr, Drew Troxell

Computer Engineering

Unmanned Aerial Vehicle (UAV) technology is becoming increasingly accessible for civilian use. Both open-source and commercial-purpose UAVs can be obtained affordably or even built. However, the platforms available are very segmented in their customization to a specific application (i.e. land surveying, payload delivery). This project aims to create a Universal Payload Interface (UPI) mounted to the underside of multi-rotors or other UAVs to enable the attachment of customizable sensor payloads. These payloads allow a single UAV to be rapidly reconfigured to perform a multitude of tasks.

The Universal Payload Interface facilitates communication between the payload, onboard flight controller, and ...


Wireless Sensor Mesh Network For Irrigation Systems, Rosana Cheruvelil, Oswaldo Garcia, Nabil Haque, Justin Ignacio, Stanley Thomas Jun 2015

Wireless Sensor Mesh Network For Irrigation Systems, Rosana Cheruvelil, Oswaldo Garcia, Nabil Haque, Justin Ignacio, Stanley Thomas

Electrical Engineering

Pepper Oak Farms, a company that grows their own olives for olive oil and has approximately 40,000 olive trees, is in need of an efficient way to monitor the soil and atmospheric conditions that are critical to the cultivation of their trees. The company at the moment only has two sensors and has to manually place the sensors at different locations to collect data on soil moisture and temperature. This is expensive, time consuming, and a lot of effort on the owner’s part to go out on the fields to collect this data. As a solution, the company ...


Enterprise Smart Outlet - Ios Application, Riley Mcgovern Jun 2015

Enterprise Smart Outlet - Ios Application, Riley Mcgovern

Computer Science and Software Engineering

The Enterprise Smart Outlet is a system made up of a smart outlet, a Node.js server, and a companion iOS application. It builds on the already existing market of smart power outlets and aims to bring that type of functionality fully scaled up to the enterprise level. The smart outlet connects to the Node.js server and sends its power readings. The iOS application connects to the Node.js server to receive all power readings from all the connected smart outlets and can also toggle the power on and off for each outlet.


Custom Keys: Numeric Keypad Server-Client Android App, Cameron Hom Jun 2015

Custom Keys: Numeric Keypad Server-Client Android App, Cameron Hom

Computer Science and Software Engineering

Custom Keys is an app that consists of a server and an app which communicate through the network. This project explored a way to improve numeric keystroke input for users who do not have numeric keypads on their laptops or computers. I discuss many features and designs I used in Custom Keys to create the app and server. I also discuss some of the drawbacks to the design. Custom Keys was successfully created but more testing and research is needed to determine if it improves individual numeric keystroke's per minute.


Classifying System Call Traces Using Anomalous Detection, William Doyle Jun 2015

Classifying System Call Traces Using Anomalous Detection, William Doyle

Honors Theses

We used data mining techniques to detect intrusions among system call traces and have outlined our results. Recent work at the intersection of security and machine learning has lead to better understanding of anomalous intrusion detection. There is a need to more thoroughly understand how anomaly detection can be used because of its potential applications and advantages over current standard methods. In this thesis, we report on a new approach of anomalous detection using system call traces. Our goal is to be able to create a system that can accurately detect hacking attacks by analyzing the sequences of system calls ...


Alternative Models Of Connectivity: Reclaiming Networked Spaces, Philip M. Bain Jun 2015

Alternative Models Of Connectivity: Reclaiming Networked Spaces, Philip M. Bain

Electronic Theses and Dissertations

Alternative networking is a growing field of study and practice due to advancements in computer networking hardware, and software protocols. Methods of integrating alternative networking configurations into infrastructure present enhanced forms of empowerment and embodiment for participants. Through an analysis of multiple hardware and software examples, this research suggests that practices of sharing and collaboration, which are embedded in the history of computer networking, have the potential to reinvigorate the notion of a virtual public sphere, and support the ideals of digital democracy.


Visualizing Population Density Based On Wifi Router Location And Network Usage, Tyler Deitz Jun 2015

Visualizing Population Density Based On Wifi Router Location And Network Usage, Tyler Deitz

Liberal Arts and Engineering Studies

This research paper introduces a prototype of a feature for Robert E. Kennedy’s maps web application. The feature visualizes population density based off wifi router location and network usage within the building. The significance of the feature is noted by documenting the library’s transition into a hub for student life and campus culture, which increases the space’s occupancy and visitor retention for a longer time. The feature is based off a Voronoi diagram map distribution which strongly affects its technical and visual implementation. The end product is user tested by Cal Poly students and received a 93 ...


Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad May 2015

Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad

Dissertations

Abstract

Sensor nodes collect data from the physical world then exchange it until it reaches the intended destination. This information can be sensitive, such as battlefield surveillance. Therefore, providing secure and continuous data transmissions among sensor nodes in wireless network environments is crucial. Wireless sensor networks (WSN) have limited resources, limited computation capabilities, and the exchange of data through the air and deployment in accessible areas makes the energy, security, and routing major concerns in WSN. In this research we are looking at security issues for the above reasons. WSN is susceptible to malicious activities such as hacking and physical ...


Tweetement: Pseudo-Relevance Feedback For Twitter Search, Kanatbay Bektemirov May 2015

Tweetement: Pseudo-Relevance Feedback For Twitter Search, Kanatbay Bektemirov

Computer Science and Computer Engineering Undergraduate Honors Theses

Microblogging platforms such as Twitter let users communicate with short messages. Due to the messages’ short content and the users’ tendency to type short queries while searching, it is particularly challenging to locate useful tweets that match user queries. The fundamental problems of word mismatch due to ambiguity are especially acute. To solve this problem, this thesis explores and compares multiple automatic query expansion methods that involve the most frequent hashtags and keywords. We built a Web service that provides real-time Twitter Search results incorporating automatic query expansion. Six pseudo-relevance feedback methods were studied and the numbers indicate that results ...


Challenges Of Implementing Automatic Dependent Surveillance Broadcast In The Nextgen Air Traffic Management System, Carl J. Giannatto Jr. May 2015

Challenges Of Implementing Automatic Dependent Surveillance Broadcast In The Nextgen Air Traffic Management System, Carl J. Giannatto Jr.

Electronic Theses and Dissertations

The Federal Aviation Administration is in the process of replacing the current Air Traffic Management (ATM) system with a new system known as NextGen. Automatic Dependent Surveillance-Broadcast (ADS-B) is the aircraft surveillance protocol currently being introduced as a part of the NextGen system deployment. The evolution of ADS-B spans more than two decades, with development focused primarily on increasing the capacity of the Air Traffic Control (ATC) system and reducing operational costs. Security of the ADS-B communications network has not been a high priority, and the inherent lack of security measures in the ADS-B protocol has come under increasing scrutiny ...


Advanced Compression And Latency Reduction Techniques Over Data Networks, Fuad Shamieh Apr 2015

Advanced Compression And Latency Reduction Techniques Over Data Networks, Fuad Shamieh

Electronic Thesis and Dissertation Repository

Applications and services operating over Internet protocol (IP) networks often suffer from high latency and packet loss rates. These problems are attributed to data congestion resulting from the lack of network resources available to support the demand. The usage of IP networks is not only increasing, but very dynamic as well. In order to alleviate the above-mentioned problems and to maintain a reasonable Quality of Service (QoS) for the end users, two novel adaptive compression techniques are proposed to reduce packets’ payload size. The proposed schemes exploit lossless compression algorithms to perform the compression process on the packets’ payloads and ...


A Risk Based Approach To Node Insertion Within Social Networks, Chancellor A. J. Johnstone Mar 2015

A Risk Based Approach To Node Insertion Within Social Networks, Chancellor A. J. Johnstone

Theses and Dissertations

Social Network Analysis (SNA) is a primary tool for counter-terrorism operations, ranging from resiliency and influence to interdiction on threats stemming from illicit overt and clandestine network operations. In an ideal world, SNA would provide a perfect course of action to eliminate dangerous situations that terrorist organizations bring. Unfortunately, the covert nature of terrorist networks makes the effects of these techniques unknown and possibly detrimental. To avoid potentially harmful changes to enemy networks, tactical involvement must evolve, beginning with the intelligent use of network in filtration through the application of the node insertion problem. The framework for the node insertion ...


Implementing Is-Is Routing And Dhcp Services In An Ipv4 Network, Laura Thompson Jan 2015

Implementing Is-Is Routing And Dhcp Services In An Ipv4 Network, Laura Thompson

Williams Honors College, Honors Research Projects

This research project explores the operation of the IS-IS routing protocol, as well as DHCP and DNS services provided by a Raspberry Pi computer. IS-IS is a routing protocol that is commonly ignored in most training and certification programs, because it is most frequently used by service providers. However, IS-IS solutions are also deployed in some large enterprise networks, making experience with the protocol a valuable skill.

In order to gain a deeper understanding of the routing domains, route propagation, and general operation of IS-IS, additional services were implemented in this project. A Raspberry Pi computer was used as an ...


Automated Beverage Dispenser, Sonya Istocka Jan 2015

Automated Beverage Dispenser, Sonya Istocka

Williams Honors College, Honors Research Projects

The intention of this project is to define a new way of distributing liquor. The project will consist of a device which will measure and track liquor being poured and associate it with a person, either a bartender or a bar patron. The challenges will be controlling the flow of liquor and recording it in an extremely accurate manner as well as processing data quickly so that a pour can be initiated very soon after a person is identified. The liquor dispenser will open up the possibility of a person being able to dispense their own liquor in a controlled ...


Evaluation Of Two-Dimensional Codes For Digital Information Security In Physical Documents, Shuai Chen Jan 2015

Evaluation Of Two-Dimensional Codes For Digital Information Security In Physical Documents, Shuai Chen

Masters Theses

Nowadays, paper documents are still frequently used and exchanged in our daily life. To safely manage confidential paper information such as medical and financial records has increasingly become a challenge. If a patient's medical diagnosis get stolen or dumped without shredding, his or her private information would be leaked. Some companies and organizations do not pay enough attention to the problem, letting their customers suffer the loss. In the thesis, I designed a hybrid system to solve this problem effectively and economically. This hybrid system integrates physical document properties with digital security technology, which brings in a revolutionary idea ...


Design And Implementation Of A High Performance Network Processor With Dynamic Workload Management, Padmaja Duggisetty Jan 2015

Design And Implementation Of A High Performance Network Processor With Dynamic Workload Management, Padmaja Duggisetty

Masters Theses

Internet plays a crucial part in today's world. Be it personal communication, business transactions or social networking, internet is used everywhere and hence the speed of the communication infrastructure plays an important role. As the number of users increase the network usage increases i.e., the network data rates ramped up from a few Mb/s to Gb/s in less than a decade. Hence the network infrastructure needed a major upgrade to be able to support such high data rates. Technological advancements have enabled the communication links like optical fibres to support these high bandwidths, but the processing ...


An Empirical Performance Analysis Of Iaas Clouds With Cloudstone Web 2.0 Benchmarking Tool, Neha Soni Jan 2015

An Empirical Performance Analysis Of Iaas Clouds With Cloudstone Web 2.0 Benchmarking Tool, Neha Soni

UNF Graduate Theses and Dissertations

Web 2.0 applications have become ubiquitous over the past few years because they provide useful features such as a rich, responsive graphical user interface that supports interactive and dynamic content. Social networking websites, blogs, auctions, online banking, online shopping and video sharing websites are noteworthy examples of Web 2.0 applications. The market for public cloud service providers is growing rapidly, and cloud providers offer an ever-growing list of services. As a result, developers and researchers find it challenging when deciding which public cloud service to use for deploying, experimenting or testing Web 2.0 applications. This study compares ...