Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

2015

Institution
Keyword
Publication
Publication Type
File Type

Articles 121 - 139 of 139

Full-Text Articles in Computer Engineering

From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


User Interface Design And Forensic Analysis For Diorama, Decision Support System For Mass Casualty Incidents, Jun Yi Jan 2015

User Interface Design And Forensic Analysis For Diorama, Decision Support System For Mass Casualty Incidents, Jun Yi

Masters Theses

In this thesis we introduces the user interface design and forensic analysis tool for DIORAMA system. With an Android device, DIORAMA provides emergency personnel the ability to collect information in real time, track the resources and manage them. It allows the responders and commanders to mange multiple incidents simultaneously. This thesis also describes the implementations of commander app and responder app, as well as two different communication strategies used in DIORAMA. Several trials and simulated mass casualty incidents were conducted to test the functionalities and performance of DIORAMA system. All responders that participated in all trials were very satisfied with ...


Touch-Screen Tablet Navigation And Older Adults: An Investigation Into The Perceptions And Opinions Of Baby Boomers On Long, Scrolling Home Pages And The "Hamburger Icon", Linda Litchfield Griffen Jan 2015

Touch-Screen Tablet Navigation And Older Adults: An Investigation Into The Perceptions And Opinions Of Baby Boomers On Long, Scrolling Home Pages And The "Hamburger Icon", Linda Litchfield Griffen

Graduate Theses and Dissertations

How information and navigation are presented on a website can greatly impact one's ability to successfully use the site. While this is an important consideration for all audiences, it is especially important for older adults. Decreases in visual acuity, working memory, and the ability to block out distractions can greatly impact the successful use of a website and, therefore, the overall user experience for older adults. Compounding these issues, it has been observed web designers often do not take into consideration the usability needs of older adults. This is unfortunate, since the world population is experiencing an unprecedented increase ...


Cyber Blackbox For Collecting Network Evidence, Jooyoung Lee, Sunoh Choi, Yangseo Choi, Jonghyun Kim, Ikkyun Kim, Youngseok Lee Jan 2015

Cyber Blackbox For Collecting Network Evidence, Jooyoung Lee, Sunoh Choi, Yangseo Choi, Jonghyun Kim, Ikkyun Kim, Youngseok Lee

Australian Digital Forensics Conference

In recent years, the hottest topics in the security field are related to the advanced and persistent attacks. As an approach to solve this problem, we propose a cyber blackbox which collects and preserves network traffic on a virtual volume based WORM device, called EvidenceLock to ensure data integrity for security and forensic analysis. As a strategy to retain traffic for long enough periods, we introduce a deduplication method. Also this paper includes a study on the network evidence which is collected and preserved for analyzing the cause of cyber incident. Then, a method is proposed to suggest a starting ...


Comparing The Efficiency Of Heterogeneous And Homogeneous Data Center Workloads, Brandon Kimmons Jan 2015

Comparing The Efficiency Of Heterogeneous And Homogeneous Data Center Workloads, Brandon Kimmons

Electronic Theses and Dissertations

Abstract

Information Technology, as an industry, is growing very quickly to keep pace with increased data storage and computing needs. Data growth, if not planned or managed correctly, can have larger efficiency implications on your data center as a whole. The long term reduction in efficiency will increase costs over time and increase operational overhead. Similarly, increases in processor efficiency have led to increased system density in data centers. This can increase cost and operational overhead in your data center infrastructure.

This paper proposes the idea that balanced data center workloads are more efficient in comparison to similar levels of ...


Design Of A Scalable Path Service For The Internet, Mehmet O. Ascigil Jan 2015

Design Of A Scalable Path Service For The Internet, Mehmet O. Ascigil

Theses and Dissertations--Computer Science

Despite the world-changing success of the Internet, shortcomings in its routing and forwarding system have become increasingly apparent. One symptom is an escalating tension between users and providers over the control of routing and forwarding of packets: providers understandably want to control use of their infrastructure, and users understandably want paths with sufficient quality-of-service (QoS) to improve the performance of their applications. As a result, users resort to various “hacks” such as sending traffic through intermediate end-systems, and the providers fight back with mechanisms to inspect and block such traffic.

To enable users and providers to jointly control routing and ...


A Network Path Advising Service, Xiongqi Wu Jan 2015

A Network Path Advising Service, Xiongqi Wu

Theses and Dissertations--Computer Science

A common feature of emerging future Internet architectures is the ability for applications to select the path, or paths, their packets take between a source and destination. Unlike the current Internet architecture where routing protocols find a single (best) path between a source and destination, future Internet routing protocols will present applications with a set of paths and allow them to select the most appropriate path. Although this enables applications to be actively involved in the selection of the paths their packets travel, the huge number of potential paths and the need to know the current network conditions of each ...


Wireless Networking For Vehicle To Infrastructure Communication And Automatic Incident Detection, Sarwar Aziz Sha-Mohammad Jan 2015

Wireless Networking For Vehicle To Infrastructure Communication And Automatic Incident Detection, Sarwar Aziz Sha-Mohammad

Computer Science Theses & Dissertations

Vehicular wireless communication has recently generated wide interest in the area of wireless network research. Automatic Incident Detection (AID), which is the recent focus of research direction in Intelligent Transportation System (ITS), aims to increase road safety. These advances in technology enable traffic systems to use data collected from vehicles on the road to detect incidents. We develop an automatic incident detection method that has a significant active road safety application for alerting drivers about incidents and congestion. Our method for detecting traffic incidents in a highway scenario is based on the use of distance and time for changing lanes ...


Measuring And Monitoring Speech Quality For Voice Over Ip With Polqa, Visqol And P.563, Andrew Hines, Eoin Gillen, Naomi Harte Jan 2015

Measuring And Monitoring Speech Quality For Voice Over Ip With Polqa, Visqol And P.563, Andrew Hines, Eoin Gillen, Naomi Harte

Conference papers

There are many types of degradation which can occur in Voice over IP (VoIP) calls. Of interest in this work are degradations which occur independently of the codec, hardware or network in use. Specifically, their effect on the subjective and objec- tive quality of the speech is examined. Since no dataset suit- able for this purpose exists, a new dataset (TCD-VoIP) has been created and has been made publicly available. The dataset con- tains speech clips suffering from a range of common call qual- ity degradations, as well as a set of subjective opinion scores on the clips from 24 ...


Intelligent Network Intrusion Detection Using An Evolutionary Computation Approach, Samaneh Rastegari Jan 2015

Intelligent Network Intrusion Detection Using An Evolutionary Computation Approach, Samaneh Rastegari

Theses: Doctorates and Masters

With the enormous growth of users' reliance on the Internet, the need for secure and reliable computer networks also increases. Availability of effective automatic tools for carrying out different types of network attacks raises the need for effective intrusion detection systems.

Generally, a comprehensive defence mechanism consists of three phases, namely, preparation, detection and reaction. In the preparation phase, network administrators aim to find and fix security vulnerabilities (e.g., insecure protocol and vulnerable computer systems or firewalls), that can be exploited to launch attacks. Although the preparation phase increases the level of security in a network, this will never ...


Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo Jan 2015

Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo

Faculty Scholarship at Penn Law

Many observers attribute the Internet’s success to two principles: Moore’s Law and Metcalfe’s Law. These precepts are often cited to support claims that larger networks are inevitably more valuable and that costs in a digital environment always decrease. This Article offers both a systematic description of both laws and then challenges the conventional wisdom by exploring their conceptual limitations. It also explores how alternative mechanisms, such as gateways and competition, can permit the realization benefits typically attributed to Moore’s Law and Metcalfe’s Law without requiring increases in network size.


Supporting Teacher Orchestration In Ubiquitous Learning Environments: A Study In Primary Education, Juan Muñoz Cristóbal, Ivan Jorrín Abellán, Juan Asensio Perez, Alejandra Martínez Monés, Luis Prieto, Yannis Dimitriadis Dec 2014

Supporting Teacher Orchestration In Ubiquitous Learning Environments: A Study In Primary Education, Juan Muñoz Cristóbal, Ivan Jorrín Abellán, Juan Asensio Perez, Alejandra Martínez Monés, Luis Prieto, Yannis Dimitriadis

Ivan M. Jorrín Abellán

During the last decades, educational contexts have transformed into complex technological and social ecologies, with mobile devices expanding the scope of education beyond the traditional classroom, creating so-called Ubiquitous Learning Environments (ULEs). However, these new technological opportunities entail an additional burden for teachers, who need to manage and coordinate the resources involved in such complex educational scenarios in a process known as “orchestration”. This paper presents the evaluation of the orchestration support provided by GLUEPS-AR, a system aimed to help teachers in the coordination of across-spaces learning situations carried out in ULEs. The evaluation, following an interpretive research perspective, relied ...


Coming Down To Earth: Helping Teachers Use 3d Virtual Worlds In Across-Spaces Learning Situations, Juan Muñoz Cristóbal, Luis Prieto, Juan Asensio Pérez, Alejandra Martínez Monés, Ivan Jorrín Abellán, Yannis Dimitriadis Dec 2014

Coming Down To Earth: Helping Teachers Use 3d Virtual Worlds In Across-Spaces Learning Situations, Juan Muñoz Cristóbal, Luis Prieto, Juan Asensio Pérez, Alejandra Martínez Monés, Ivan Jorrín Abellán, Yannis Dimitriadis

Ivan M. Jorrín Abellán

Different approaches have explored how to provide seamless learning across multiple ICT-enabled physical and virtual spaces, including three-dimensional virtual worlds (3DVW). However, these approaches present limitations that may reduce their acceptance in authentic educational practice: The difficulties of authoring and sharing teacher-created designs across different 3DVW platforms, or the lack of integration of 3DVWs with existing technologies in the classroom ecosystem (e.g., widespread web-based learning platforms such as Moodle, or mobile augmented reality applications). Focusing on a specific kind of 3DVW (virtual globes, such as Google Earth, used like 3DVWs), we propose a system that enables teachers to deploy ...


Wikis For Group Work: Encouraging Transparency, Benchmarking And Feedback, Amir Abdekhodaee, Dini Kourosh, Farnaz Modarres, Anne-Marie Chase, Bella Ross Dec 2014

Wikis For Group Work: Encouraging Transparency, Benchmarking And Feedback, Amir Abdekhodaee, Dini Kourosh, Farnaz Modarres, Anne-Marie Chase, Bella Ross

Dr Anne-Marie Chase

Education delivery models and approaches are undergoing radical change. The traditional knowledge exchange model whereby an educator imparts knowledge to students may not be best placed to develop essential skills for the 21st century (Griffin, McGaw, & Care, 2012) and is being challenged by models that encourage knowledge creation by students. Using a wiki to facilitate group work may provide students opportunities for collaborative learning (Blumenfeld, Marx, Soloway, & Krajcik, 1996), knowledge sharing and construction (Elgort, Smith, & Toland, 2008), and skill development. Wikis allow individual contributions to be traceable thereby increasing individual accountability in group work situations. Wikis can furthermore be monitored ...


Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson Dec 2014

Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson

Maurice Dawson

Cyber security has become a matter of national, international, economic, and societal importance that affects multiple nations (Walker, 2012). Since the 1990s users have exploited vulnerabilities to gain access to networks for malicious purposes. In recent years the number of attacks on U.S. networks has continued to grow at an exponential rate. This includes malicious embedded code, exploitation of backdoors, and more. These attacks can be initiated from anywhere in the world from behind a computer with a masked Internet Protocol (IP) address. This type of warfare, cyber warfare, changes the landscape of war itself (Beidleman, 2009). This type ...