Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

2015

Institution
Keyword
Publication
Publication Type
File Type

Articles 31 - 60 of 140

Full-Text Articles in Computer Engineering

Randomizing Ensemble-Based Approaches For Outlier, Lediona Nishani, Marenglen Biba Nov 2015

Randomizing Ensemble-Based Approaches For Outlier, Lediona Nishani, Marenglen Biba

UBT International Conference

The data size is increasing dramatically every day, therefore, it has emerged the need of detecting abnormal behaviors, which can harm seriously our systems. Outlier detection refers to the process of identifying outlying activities, which diverge from the remaining group of data. This process, an integral part of data mining field, has experienced recently a substantial interest from the data mining community. An outlying activity or an outlier refers to a data point, which significantly deviates and appears to be inconsistent compared to other data members. Ensemble-based outlier detection is a line of research employed in order to reduce the ...


10 W Dc-Dc Converter Based Led Driver Circuit Design, Ö. Faruk Farsakoğlu, H. Yusuf Hasrici, Ibrahim Çelik Nov 2015

10 W Dc-Dc Converter Based Led Driver Circuit Design, Ö. Faruk Farsakoğlu, H. Yusuf Hasrici, Ibrahim Çelik

UBT International Conference

Considering the total amount of energy consumed in the world, energy used in lighting is of utmost importance. For this reason, systems used in lighting should be energy efficient, and mıre efficient lighting elements should be preferred. LED, as a solid-state lighting system, is more energy efficient than the lighting systems with conventional lighting elements. Some of the LEDs used in solid-state lighting systems are named as standard 5mm LEDs and power LEDs. Because power LEDs have more light efficiency than standard 5 mm LEDs, they are produced as an alternative to conventional light sources. Power LEDs draw much more ...


The Influence Of Cloud Computing And Mobile Technology In Our Activities, Ramadan Cikaqi, Ilir Morina Nov 2015

The Influence Of Cloud Computing And Mobile Technology In Our Activities, Ramadan Cikaqi, Ilir Morina

UBT International Conference

Through this paper we present the development of information technology especially in cloud computing and mobile technology as an integral part of everyday life, as well as the advantages that cloud computing and mobile technology offers to the business community and the private one. Furthermore, it presents the possibilities offered by this technology on the data preservation compared with the traditional ones. Due to the increased demand for big space, it was necessary to establish a centralized data storage which has brought with it more innovation and advantage, in comparison with other media for data storage in personal memories. This ...


Case Studies For A Markov Chain Approach To Analyze Agent-Based Models, Florian Kitzler, Martin Bicher Nov 2015

Case Studies For A Markov Chain Approach To Analyze Agent-Based Models, Florian Kitzler, Martin Bicher

UBT International Conference

Agent-Based Models have become a widely used tool in social sciences, health care management and other disciplines to describe complex systems from a bottom-up perspective. Some reasons for that are the easy understanding of Agent-Based Models, the high flexibility and the possibility to describe heterogeneous structures. Nevertheless problems occur when it comes to analyzing Agent-Based Models. This paper shows how to describe Agent-Based Models in a macroscopic way as Markov Chains, using the random map representation. The focus is on the implementation of this method for chosen examples of a Random Walk and Opinion Dynamic Models. It is also shown ...


Hybrid Modelling In System Simulation, Andreas Körner Nov 2015

Hybrid Modelling In System Simulation, Andreas Körner

UBT International Conference

In times of increasing power and capacity in computer simulation mathematical models are getting more and more important. For different technical applications and in natural science but also in economic systems and management processes appropriate mathematical model descriptions are necessary. Hybrid modelling is a special technique for more complex model descriptions in order to reduce the degree of complexity. In different fields of interest the behavior of a model is dependent on the active state. When the model description is changing from one state to another a so-called state event takes place. State event modelling is the overall term to ...


Definition, Validation And Comparison Of Two Population Models For Austria, Martin Bicher, Barbara Glock, Florian Miksch, Niki Popper, Günter Schneckenreither Nov 2015

Definition, Validation And Comparison Of Two Population Models For Austria, Martin Bicher, Barbara Glock, Florian Miksch, Niki Popper, Günter Schneckenreither

UBT International Conference

In this work we present two structurally different mathematical models for the prognostic simulation of Austria’s population: A time-continuous, macroscopic system dynamics approach and a time-discrete, microscopic agent-based approach. Both models were developed as case studies of a series of population concepts in order to support models for decision-support in Austria’s health care system. In the present work we want to focus on the definition, the parametrisation as well as especially the validation process of both population-models. The latter was of special interest as it included a cross-model validation with Statistics Austria’s own prognostic model SIKURS.


Microsimulation Models For Simulating Pathways Of Patients With Mental Diseases, Andreas Bauer, Felix Breitenecker, Christoph Urach Nov 2015

Microsimulation Models For Simulating Pathways Of Patients With Mental Diseases, Andreas Bauer, Felix Breitenecker, Christoph Urach

UBT International Conference

Predicting demand for care is necessary to provide sufficient capacities in hospitals and enable better planning to cope with challenges like changes in the structure of the population. Emphasis in this work is put on the analysis of the data and on the parametrization of a simulation model for the paths of patients with mental diseases through the health care system. Survival analysis and model selection methods are used for this purpose. Data on patients and their treatments is analyzed with methods of survival analysis. Different methods for modelling the survival and hazard function are presented and compared. Hereby, the ...


E-Learning Systems In Higher Education Institutions: An Outlook Of Their Use In The Western Balkan Region, Blerta Abazi Chaushi, Agron Chaushi, Florije Ismaili Nov 2015

E-Learning Systems In Higher Education Institutions: An Outlook Of Their Use In The Western Balkan Region, Blerta Abazi Chaushi, Agron Chaushi, Florije Ismaili

UBT International Conference

This study provides a review of the literature on e-learning systems evolution and environments. The argument is that e-learning systems should be embedded in the core strategy of the institution. To support this premise, studies for e-learning are analyzed and six recommendations are drawn for universities to follow in order to have successful e-learning environments. The main contribution of this study, however, is the identification of the trends and statistics regarding the e-learning usage in the Balkan region. These stats are identified through a survey conducted in 40 universities in 10 countries from this region. The results show that more ...


Bounty Techniques For Web Vulnerability Scanning, Tanzer Abazi, Mentor Hoxhaj, Edmond Hajrizi, Gazmend Krasniqi Nov 2015

Bounty Techniques For Web Vulnerability Scanning, Tanzer Abazi, Mentor Hoxhaj, Edmond Hajrizi, Gazmend Krasniqi

UBT International Conference

With the advancement of technology and the raising of massive amount of data, the used techniques for data security are continually a challenge. This paper contributes on identifying the gaps and evaluating security level on web portals hosted or managed by Republic of Kosovo institutions or businesses, whose data privacy and security could be a big business concern. The results have been obtained from real case scenario, where 25 security researchers have contributed in white hack activities. These activities, were part of a one day conference called. “The DAY when hacking is legal”, held in Pristine.


Security Concerns Of New Alternative Telecommunication Services, Arbnora Hyseni, Krenare Pireva, Miranda Kajtazi Nov 2015

Security Concerns Of New Alternative Telecommunication Services, Arbnora Hyseni, Krenare Pireva, Miranda Kajtazi

UBT International Conference

With the advancing new era of communication, the so-called era of ‘being always online’ many providers offer their services for free. In that sense a small company or a virtual company becomes a huge competitor for different traditional telecommunication providers. Using the same services such as: voice calls, video calls, chat and similar services, the internet technology has made huge changes how users make use of such services . Instead of using these services, users shall install applications that are specialized for offering these services via applications, such as: Viber, WhatsApp, Facebook, Google Talk etc.. During the installation and update of ...


Implementation Of The Aodv Routing In An Energy-Constrained Mesh Network, Altin Zejnullahu, Zhilbert Tafa Nov 2015

Implementation Of The Aodv Routing In An Energy-Constrained Mesh Network, Altin Zejnullahu, Zhilbert Tafa

UBT International Conference

Wireless sensor networks (WSNs) compose the fundamental platform for a number of Internet of Things (IoT) applications, especially those related to the environmental, health, and military surveillance. While being autonomous in power supply, the main challenge in node’s processing and communication architecture design remains the energy efficiency. However, this goal should not limit the main functionality of the system which is often related to the network coverage and connectivity. This paper shows the implementation of the Ad-hoc On-demand Distance Vector (AODV) routing algorithm in an XBee based platform. As shown, the network can achieve low power consumption per node ...


Internet Of Things: From Applications, Challenges And Standardization To Industry Implementations, Xhafer Krasniqi Nov 2015

Internet Of Things: From Applications, Challenges And Standardization To Industry Implementations, Xhafer Krasniqi

UBT International Conference

The Internet of Things that is defined as anything that can be accessible anytime and anywhere provides connectivity to different objects and sensors around us and which will enable the transfer of different data between these objects and devices. A thing in the Internet of Things can be any natural or man-made object that can be assigned an IP address with a capability to exchange date over a network. There is a huge number of applications of IoT to benefit users, such as health monitors, smart homes, connected cars etc. If everything around us is connected and information about these ...


Xml For Business To Business Data Exchange, Geraldine Gray, David Kerwick Nov 2015

Xml For Business To Business Data Exchange, Geraldine Gray, David Kerwick

The ITB Journal

This paper examines to use of XML for business to business data exchange. Starting with creating an XML document from an existing data source and transmitting that document, we explain some of the supporting standards for XML which facilitate automated processing and transformation of an XML document. Finally we look at the advantages of using XML, and why it is expected to revolutionise electronic data interchange.


Cache-Aware Compositional Analysis Of Real-Time Multicore Virtualization Platforms, Meng Xu, Linh T.X. Phan, Oleg Sokolsky, Sisu Xi, Chenyang Lu, Christopher Gill, Insup Lee Nov 2015

Cache-Aware Compositional Analysis Of Real-Time Multicore Virtualization Platforms, Meng Xu, Linh T.X. Phan, Oleg Sokolsky, Sisu Xi, Chenyang Lu, Christopher Gill, Insup Lee

Departmental Papers (CIS)

Multicore processors are becoming ubiquitous, and it is becoming increasingly common to run multiple real-time systems on a shared multicore platform. While this trend helps to reduce cost and to increase performance, it also makes it more challenging to achieve timing guarantees and functional isolation. One approach to achieving functional isolation is to use virtualization. However, virtualization also introduces many challenges to the multicore timing analysis; for instance, the overhead due to cache misses becomes harder to predict, since it depends not only on the direct interference between tasks but also on the indirect interference between virtual processors and the ...


Effective Node Clustering And Data Dissemination In Large-Scale Wireless Sensor Networks, Mariam Saeed Ai Nuaimi Nov 2015

Effective Node Clustering And Data Dissemination In Large-Scale Wireless Sensor Networks, Mariam Saeed Ai Nuaimi

Theses

The denseness and random distribution of large-scale WSNs makes it quite difficult to replace or recharge nodes. Energy efficiency and management is a major design goal in these networks. In addition, reliability and scalability are two other major goals that have been identified by researchers as necessary in order to further expand the deployment of such networks for their use in various applications. This thesis aims to provide an energy efficient and effective node clustering and data dissemination algorithm in large-scale wireless sensor networks. In the area of clustering, the proposed research prolongs the lifetime of the network by saving ...


Design Of A Low-Cost Wireless Nirs System With Embedded Linux And A Smartphone Interface, Diogo Da Silva Dias Oct 2015

Design Of A Low-Cost Wireless Nirs System With Embedded Linux And A Smartphone Interface, Diogo Da Silva Dias

Nasser Kashou

Wireless near-infrared spectroscopy (NIRS) systems can help to reduce movement artifacts, and distraction due cables. Utilizing Embedded Linux (EL) can reduce size, development time, cost of a project and allow portability. The goal of this project is to develop a low-cost wireless small-sized NIRS system using EL and a Smartphone as the interface. This was achieved using a BeagleBone Black (BBB) with a deployed custom EL that: (1) controls two sources, (2) receives data from photodetectors (PDs), (3) processes, stores and transmits data via Bluetooth to an Android Smartphone. This device was implemented in under US$150 and its dimension ...


Ipads As Tools For Communication With Parents, Beth Beschorner, Amy C. Hutchison Oct 2015

Ipads As Tools For Communication With Parents, Beth Beschorner, Amy C. Hutchison

Amy C. Hutchison

A quick Internet search regarding iPad use in classrooms will reveal that school districts across the country are purchasing iPads and similar tablets at a rapid rate. Accordingly, teachers are beginning to consider ways in which iPads can be used in their classrooms. During our recent work in an early childhood classroom (Beschorner and Hutchison, 2013) we learned that, although reading and responding to text has been shown as one important classroom use for tablet technology (Hutchison, Beschorner, Crawford-Schmidt, 2012), another important use may be as a tool for innovative parent communication. While following two preschool teachers who were using ...


Employee Hr Connect Portal, Aparna Allusivala, Sindhura Reddy Mandadi, Sri Vidya Rani Mudunuri Oct 2015

Employee Hr Connect Portal, Aparna Allusivala, Sindhura Reddy Mandadi, Sri Vidya Rani Mudunuri

All Capstone Projects

Employee HR Connect Portal is essential in order to track employee time, project time. This portal can be hosted on any java based web server or application server and will be accessible via web-browsers. This portal is very user- friendly. Employee HR Connect Portal will be a useful tool to identify supply and demand of human resources. We have three main modules to maintain records of employee, department and project. Employee HR Connect Portal is very helpful for auditing. Through this portal we can judge the potentiality of the employee.


Real-Time Detection System For Suspicious Urls, Krishna Prasad Chouty, Anup Chandra Thogiti, Kranthi Sudha Vudatha Oct 2015

Real-Time Detection System For Suspicious Urls, Krishna Prasad Chouty, Anup Chandra Thogiti, Kranthi Sudha Vudatha

All Capstone Projects

Twitter is prone to malicious tweets containing URLs for spam, phishing, and malware distribution. Conventional Twitter spam detection schemes utilize account features such as the ratio of tweets containing URLs and the account creation date, or relation features in the Twitter graph. These detection schemes are ineffective against feature fabrications or consume much time and resources. Conventional suspicious URL detection schemes utilize several features including lexical features of URLs, URL redirection, HTML content, and dynamic behavior. However, evading techniques such as time-based evasion and crawler evasion exist. In this paper, we propose WARNINGBIRD, a suspicious Real-Time URL detection system for ...


Big Data Proteogenomics And High Performance Computing: Challenges And Opportunities, Fahad Saeed Oct 2015

Big Data Proteogenomics And High Performance Computing: Challenges And Opportunities, Fahad Saeed

Parallel Computing and Data Science Lab Technical Reports

Proteogenomics is an emerging field of systems biology research at the intersection of proteomics and genomics. Two high-throughput technologies, Mass Spectrometry (MS) for proteomics and Next Generation Sequencing (NGS) machines for genomics are required to conduct proteogenomics studies. Independently both MS and NGS technologies are inflicted with data deluge which creates problems of storage, transfer, analysis and visualization. Integrating these big data sets (NGS+MS) for proteogenomics studies compounds all of the associated computational problems. Existing sequential algorithms for these proteogenomics datasets analysis are inadequate for big data and high performance computing (HPC) solutions are almost non-existent. The purpose of ...


Network Analysis Of The Sardex Community Currency, Georgios Iosifidis, Yanick Charette, Giuseppe Littera, Leandros Tassiulas, Nicholas Christakis Sep 2015

Network Analysis Of The Sardex Community Currency, Georgios Iosifidis, Yanick Charette, Giuseppe Littera, Leandros Tassiulas, Nicholas Christakis

Yale Day of Data

We present a transaction dataset and preliminary analysis results about Sardex, a complementary currency (CC) in Sardinia, Italy. Sardex is currently considered one of the most successful CCs in Europe, as it grows continuously in terms of transactions’ volume and membership, and has been already replicated in 8 other regions in Italy. We model Sardex as a transaction network and study its basic properties.


Novel Techniques For Secure Use Of Public Cloud Computing Resources, Kyle E. Stewart Sep 2015

Novel Techniques For Secure Use Of Public Cloud Computing Resources, Kyle E. Stewart

Theses and Dissertations

The federal government has an expressed interest in moving data and services to third party service providers in order to take advantage of the flexibility, scalability, and potential cost savings. This approach is called cloud computing. The thesis for this research is that efficient techniques exist to support the secure use of public cloud computing resources by a large, federated enterprise. The primary contributions of this research are the novel cryptographic system MA-AHASBE (Multi-Authority Anonymous Hierarchical Attribute-Set Based Encryption), and the techniques used to incorporate MA-AHASBE in a real world application. Performance results indicate that while there is a cost ...


Migration From Copper To Fiber Access Network Using Passive Optical Network For Green And Dry Field Areas Of Pakistan, Umar Farooq Sep 2015

Migration From Copper To Fiber Access Network Using Passive Optical Network For Green And Dry Field Areas Of Pakistan, Umar Farooq

Umar Farooq

Passive Optical Networks (PON) technology brings an evolution in the industry of Telecommunication for the provisioning of High Speed Internet (HSI) and Triple Play bundled Services that includes Voice, Data, and Video Streaming throughout the world. In Pakistan most of the service providers are offering broadband services on traditional copper OSP (Outside Plant) network since 2000. Demand for the high speed internet and broadband is increasing rapidly, it is desired with great need to migrate from traditional copper based OSP network to PON – FTTx (Fiber To The x) infrastructure. Considering the geographical requirements in Pakistan a scalable fiber network is ...


Sandra Helps You Learn: The More You Walk, The More Battery Your Phone Drains, Chulhong Min, Chungkuk Yoo, Inseok Hwang, Seungwoo Kang, Youngki Lee, Seungchul Lee, Pillsoon Park, Changhun Lee, Seungpyo Choi Choi Sep 2015

Sandra Helps You Learn: The More You Walk, The More Battery Your Phone Drains, Chulhong Min, Chungkuk Yoo, Inseok Hwang, Seungwoo Kang, Youngki Lee, Seungchul Lee, Pillsoon Park, Changhun Lee, Seungpyo Choi Choi

Research Collection School Of Information Systems

Emerging continuous sensing apps introduce new major factors governing phones’ overall battery consumption behaviors: (1) added nontrivial persistent battery drain, and more importantly (2) different battery drain rate depending on the user’s different mobility condition. In this paper, we address the new battery impacting factors significant enough to outdate users’ existing battery model in real life. We explore an initial approach to help users understand the cause and effect between their physical activity and phones’ battery life. To this end, we present Sandra, a novel mobility-aware smartphone battery information advisor, and study its potential to help users redevelop their ...


Massive Open Online Networks For Urban Sensing: Design, Deployment And Challenges, Hwee Xian Tan, Hwee-Pink Tan Aug 2015

Massive Open Online Networks For Urban Sensing: Design, Deployment And Challenges, Hwee Xian Tan, Hwee-Pink Tan

Research Collection School Of Information Systems

Recent escalating efforts to realize the vision of smart cities have become a global trend. Within such efforts, the setup of relevant infrastructure is necessary to enable scalable sensing and sense-making in urban environments. In this paper, we discuss the design and implementation of MOON - Massive Open Online Networks - to interconnect large-scale and diverse IoT devices to enable the acquisition of real-time sensing data. We describe the system architecture, and software protocols that form the components of MOON. In addition, we highlight the challenges in the deployment and management of such networks. These are derived through experiences gleaned from our ...


Data Security And Privacy In Smart Grid, Yue Tong Aug 2015

Data Security And Privacy In Smart Grid, Yue Tong

Doctoral Dissertations

This dissertation explores novel data security and privacy problems in the emerging smart grid.

The need for data security and privacy spans the whole life cycle of the data in the smart grid, across the phases of data acquisition, local processing and archiving, collaborative processing, and finally sharing and archiving. The first two phases happen in the private domains of an individual utility company, where data are collected from the power system and processed at the local facilities. When data are being acquired and processed in the private domain, data security is the most critical concern. The key question is ...


Apis And The Library: What, Why?, Graham S. Hukill Jul 2015

Apis And The Library: What, Why?, Graham S. Hukill

Scholars Cooperative Brown Bag Series

APIs (Application Programming Interface): What are they? Why are they? Introduction to APIs and their role in the Library


Efficient Logarithmic Function Approximation, Amjad F. Hajjar, Mohammad H. Awedh Jul 2015

Efficient Logarithmic Function Approximation, Amjad F. Hajjar, Mohammad H. Awedh

Innovative Research Publications IRP India

A criteria is developed for the approximations of a logarithmic function to piecewise straight lines at multiple segments such that the maximum absolute error is minimized.The optimum cutting points for segmentation are estimated numerically with an exhaustive search. Our hardware implementation is restricted to integer operations (addition and shifting).


Automatic User Profile Construction For A Personalized News Recommender System Using Twitter, Shiva Theja Reddy Gopidi Jul 2015

Automatic User Profile Construction For A Personalized News Recommender System Using Twitter, Shiva Theja Reddy Gopidi

Theses and Dissertations

Modern society has now grown accustomed to reading online or digital news. However, the huge corpus of information available online poses a challenge to users when trying to find relevant articles. A hybrid system “Personalized News Recommender Using Twitter’ has been developed to recommend articles to a user based on the popularity of the articles and also the profile of the user. The hybrid system is a fusion of a collaborative recommender system developed using tweets from the “Twitter” public timeline and a content recommender system based the user’s past interests summarized in their conceptual user profile. In previous ...


Reducing Multiple Access Interference In Broadband Multi-User Wireless Networks, Ali Nayef Alqatawneh Jul 2015

Reducing Multiple Access Interference In Broadband Multi-User Wireless Networks, Ali Nayef Alqatawneh

Theses and Dissertations

This dissertation is devoted to developing multiple access interference (MAI) reduction techniques for multi-carrier multi-user wireless communication networks.

In multi-carrier code division multiple access (MC-CDMA) systems, a full multipath diversity can be achieved by transmitting one symbol over multiple orthogonal subcarriers by means of spreading codes. However, in frequency selective fading channels, orthogonality among users can be destroyed leading to MAI. MAI represents the main obstacle to support large number of users in multi-user wireless systems. Consequently, MAI reduction becomes a main challenge when designing multi-carrier multi-user wireless networks. In this dissertation, first, we study MC-CDMA systems with different existing ...