Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

2015

Institution
Keyword
Publication
Publication Type
File Type

Articles 61 - 90 of 145

Full-Text Articles in Computer Engineering

Study Of The Research Status On E-Navigation, Qiwei Chen Aug 2015

Study Of The Research Status On E-Navigation, Qiwei Chen

Maritime Safety & Environment Management Dissertations (Dalian)

No abstract provided.


Data Security And Privacy In Smart Grid, Yue Tong Aug 2015

Data Security And Privacy In Smart Grid, Yue Tong

Doctoral Dissertations

This dissertation explores novel data security and privacy problems in the emerging smart grid.

The need for data security and privacy spans the whole life cycle of the data in the smart grid, across the phases of data acquisition, local processing and archiving, collaborative processing, and finally sharing and archiving. The first two phases happen in the private domains of an individual utility company, where data are collected from the power system and processed at the local facilities. When data are being acquired and processed in the private domain, data security is the most critical concern. The key question is …


Massive Open Online Networks For Urban Sensing: Design, Deployment And Challenges, Hwee Xian Tan, Hwee-Pink Tan Aug 2015

Massive Open Online Networks For Urban Sensing: Design, Deployment And Challenges, Hwee Xian Tan, Hwee-Pink Tan

Research Collection School Of Computing and Information Systems

Recent escalating efforts to realize the vision of smart cities have become a global trend. Within such efforts, the setup of relevant infrastructure is necessary to enable scalable sensing and sense-making in urban environments. In this paper, we discuss the design and implementation of MOON - Massive Open Online Networks - to interconnect large-scale and diverse IoT devices to enable the acquisition of real-time sensing data. We describe the system architecture, and software protocols that form the components of MOON. In addition, we highlight the challenges in the deployment and management of such networks. These are derived through experiences gleaned …


Evaluation Of Two-Dimensional Codes For Digital Information Security In Physical Documents, Shuai Chen Jul 2015

Evaluation Of Two-Dimensional Codes For Digital Information Security In Physical Documents, Shuai Chen

Masters Theses

Nowadays, paper documents are still frequently used and exchanged in our daily life. To safely manage confidential paper information such as medical and financial records has increasingly become a challenge. If a patient's medical diagnosis get stolen or dumped without shredding, his or her private information would be leaked. Some companies and organizations do not pay enough attention to the problem, letting their customers suffer the loss. In the thesis, I designed a hybrid system to solve this problem effectively and economically. This hybrid system integrates physical document properties with digital security technology, which brings in a revolutionary idea for …


Apis And The Library: What, Why?, Graham S. Hukill Jul 2015

Apis And The Library: What, Why?, Graham S. Hukill

Scholars Cooperative Brown Bag Series

APIs (Application Programming Interface): What are they? Why are they? Introduction to APIs and their role in the Library


Efficient Logarithmic Function Approximation, Amjad F. Hajjar, Mohammad H. Awedh Jul 2015

Efficient Logarithmic Function Approximation, Amjad F. Hajjar, Mohammad H. Awedh

Innovative Research Publications IRP India

A criteria is developed for the approximations of a logarithmic function to piecewise straight lines at multiple segments such that the maximum absolute error is minimized.The optimum cutting points for segmentation are estimated numerically with an exhaustive search. Our hardware implementation is restricted to integer operations (addition and shifting).


Automatic User Profile Construction For A Personalized News Recommender System Using Twitter, Shiva Theja Reddy Gopidi Jul 2015

Automatic User Profile Construction For A Personalized News Recommender System Using Twitter, Shiva Theja Reddy Gopidi

Graduate Theses and Dissertations

Modern society has now grown accustomed to reading online or digital news. However, the huge corpus of information available online poses a challenge to users when trying to find relevant articles. A hybrid system “Personalized News Recommender Using Twitter’ has been developed to recommend articles to a user based on the popularity of the articles and also the profile of the user. The hybrid system is a fusion of a collaborative recommender system developed using tweets from the “Twitter” public timeline and a content recommender system based the user’s past interests summarized in their conceptual user profile. In previous work, …


Reducing Multiple Access Interference In Broadband Multi-User Wireless Networks, Ali Nayef Alqatawneh Jul 2015

Reducing Multiple Access Interference In Broadband Multi-User Wireless Networks, Ali Nayef Alqatawneh

Graduate Theses and Dissertations

This dissertation is devoted to developing multiple access interference (MAI) reduction techniques for multi-carrier multi-user wireless communication networks.

In multi-carrier code division multiple access (MC-CDMA) systems, a full multipath diversity can be achieved by transmitting one symbol over multiple orthogonal subcarriers by means of spreading codes. However, in frequency selective fading channels, orthogonality among users can be destroyed leading to MAI. MAI represents the main obstacle to support large number of users in multi-user wireless systems. Consequently, MAI reduction becomes a main challenge when designing multi-carrier multi-user wireless networks. In this dissertation, first, we study MC-CDMA systems with different existing …


Detecting, Modeling, And Predicting User Temporal Intention, Hany M. Salaheldeen Jul 2015

Detecting, Modeling, And Predicting User Temporal Intention, Hany M. Salaheldeen

Computer Science Theses & Dissertations

The content of social media has grown exponentially in the recent years and its role has evolved from narrating life events to actually shaping them. Unfortunately, content posted and shared in social networks is vulnerable and prone to loss or change, rendering the context associated with it (a tweet, post, status, or others) meaningless. There is an inherent value in maintaining the consistency of such social records as in some cases they take over the task of being the first draft of history as collections of these social posts narrate the pulse of the street during historic events, protest, riots, …


Collecting Multiple Data Points In A Thunderstorm Environment, Matthew Nelson Jun 2015

Collecting Multiple Data Points In A Thunderstorm Environment, Matthew Nelson

2017 Academic High Altitude Conference

Collecting multiple data points in adverse conditions such as a thunderstorm presents a number of challenges in collecting and relaying data. Wireless sensor mesh networks is a proven method for extracting and relaying data in radio environments that may either be roving, in adverse conditions or both. This paper explores using wireless sensor mesh networks to collect atmospheric data that is present in a thunderstorm system to enable researchers to learn more from these systems. A wireless sensor mesh network is ideal since it is well suited for both moving and sensor nodes that are in adverse RF conditions. A …


Not Just A Tool. Taking Context Into Account In The Development Of A Mobile App For Rural Water Supply In Tanzania, Robert Hoppe, Anne Wesselink, Rob Lemmens Jun 2015

Not Just A Tool. Taking Context Into Account In The Development Of A Mobile App For Rural Water Supply In Tanzania, Robert Hoppe, Anne Wesselink, Rob Lemmens

Robert Hoppe

The 'eGovernance' hype around the potential of mobile phone and geoweb technologies for enhancing 'good governance' is soaring. In East Africa, the extensive use of mobile telephony adds to the imagined promises of ICT. We reflect on the assumptions made by the proponents of such tools, using our own action research project as an example. We took great care to consider context in the development of software for enhancing empowerment and accountability in rural water supply in Tanzania. However, we found that the rural water supply context in Tanzania is much more complex than the contexts for which successful mApps …


Seizure Tracker, Zachary Reardon Jun 2015

Seizure Tracker, Zachary Reardon

Computer Engineering

The goal of this project is to make a Module that enables anyone watching a person with disabilities to record any seizure that this person has under their care. Then when the Doctor/parent receives their patient/kid they are able to download all the seizures that their patient/kid had while they were away. The Doctor/parent then has the exact time, the duration of the seizure, and the type of seizure for all the seizures that have occurred while they were away from their patient/kid. From this data it is possible that the Doctor may see some sort of patterns that enables …


Universal Uav Payload Interface, Nolan Reker, David Troy Jr, Drew Troxell Jun 2015

Universal Uav Payload Interface, Nolan Reker, David Troy Jr, Drew Troxell

Computer Engineering

Unmanned Aerial Vehicle (UAV) technology is becoming increasingly accessible for civilian use. Both open-source and commercial-purpose UAVs can be obtained affordably or even built. However, the platforms available are very segmented in their customization to a specific application (i.e. land surveying, payload delivery). This project aims to create a Universal Payload Interface (UPI) mounted to the underside of multi-rotors or other UAVs to enable the attachment of customizable sensor payloads. These payloads allow a single UAV to be rapidly reconfigured to perform a multitude of tasks.

The Universal Payload Interface facilitates communication between the payload, onboard flight controller, and operator …


Panorama: Multi-Path Ssl Authentication Using Peer Network Perspectives, William P. Harris Jun 2015

Panorama: Multi-Path Ssl Authentication Using Peer Network Perspectives, William P. Harris

Computer Engineering

SSL currently uses certificates signed by Certificate Authorities (CAs) to authenticate connections. e.g. Google will pay a CA to sign a certificate for them, so that they can prove that they're not someone pretending to be Google. Unfortunately, this system has had multiple problems, and many believe that an alternative needs to be found.

One of the ideas for alternatives is using multiple "network perspectives" to authenticate a server. The idea behind this is that, though playing man-in-the-middle (MITM) with one connection is easy, it should be difficult for an adversary to do so with many connections, especially if they …


Visualizing Population Density Based On Wifi Router Location And Network Usage, Tyler Deitz Jun 2015

Visualizing Population Density Based On Wifi Router Location And Network Usage, Tyler Deitz

Liberal Arts and Engineering Studies

This research paper introduces a prototype of a feature for Robert E. Kennedy’s maps web application. The feature visualizes population density based off wifi router location and network usage within the building. The significance of the feature is noted by documenting the library’s transition into a hub for student life and campus culture, which increases the space’s occupancy and visitor retention for a longer time. The feature is based off a Voronoi diagram map distribution which strongly affects its technical and visual implementation. The end product is user tested by Cal Poly students and received a 93.5% satisfaction rate.


Forest Sign Maker, Victor Espinosa Iii, Kevin Ly, Lisa Yip Jun 2015

Forest Sign Maker, Victor Espinosa Iii, Kevin Ly, Lisa Yip

Mechanical Engineering

Executive Summary:

The Inyo National Forest is arguably one of the most beautiful locations in California, containing natural masterpieces such as Mount Whitney and the Ancient Bristlecone Pine Forest. Despite its magnificence, the Inyo National Forest can be a treacherous region. The Friends of the Inyo take pride in being able to facilitate the viewing experience for all outdoorsmen by maintaining the mountain trails, which includes providing adequate trail signage.

Unfortunately, there is a fundamental issue with the recent state of trail signage in the Inyo National Forest: the rate at which signs are being vandalized or naturally destroyed is …


Custom Keys: Numeric Keypad Server-Client Android App, Cameron Hom Jun 2015

Custom Keys: Numeric Keypad Server-Client Android App, Cameron Hom

Computer Science and Software Engineering

Custom Keys is an app that consists of a server and an app which communicate through the network. This project explored a way to improve numeric keystroke input for users who do not have numeric keypads on their laptops or computers. I discuss many features and designs I used in Custom Keys to create the app and server. I also discuss some of the drawbacks to the design. Custom Keys was successfully created but more testing and research is needed to determine if it improves individual numeric keystroke's per minute.


Enterprise Smart Outlet - Ios Application, Riley Mcgovern Jun 2015

Enterprise Smart Outlet - Ios Application, Riley Mcgovern

Computer Science and Software Engineering

The Enterprise Smart Outlet is a system made up of a smart outlet, a Node.js server, and a companion iOS application. It builds on the already existing market of smart power outlets and aims to bring that type of functionality fully scaled up to the enterprise level. The smart outlet connects to the Node.js server and sends its power readings. The iOS application connects to the Node.js server to receive all power readings from all the connected smart outlets and can also toggle the power on and off for each outlet.


Classifying System Call Traces Using Anomalous Detection, William Doyle Jun 2015

Classifying System Call Traces Using Anomalous Detection, William Doyle

Honors Theses

We used data mining techniques to detect intrusions among system call traces and have outlined our results. Recent work at the intersection of security and machine learning has lead to better understanding of anomalous intrusion detection. There is a need to more thoroughly understand how anomaly detection can be used because of its potential applications and advantages over current standard methods. In this thesis, we report on a new approach of anomalous detection using system call traces. Our goal is to be able to create a system that can accurately detect hacking attacks by analyzing the sequences of system calls …


Ndn-Crahns: Named Data Networking For Cognitive Radio Ad Hoc Networks, Rana Asif Rehman, Jong Kim, Byung-Seo Kim Jun 2015

Ndn-Crahns: Named Data Networking For Cognitive Radio Ad Hoc Networks, Rana Asif Rehman, Jong Kim, Byung-Seo Kim

Rana Asif Rehman

Named data networking (NDN) is a newly proposed paradigm for future Internet, in which communication among nodes is based on data names, decoupling from their locations. In dynamic and self-organized cognitive radio ad hoc networks (CRAHNs), it is difficult to maintain end-to-end connectivity between ad hoc nodes especially in the presence of licensed users and intermittent wireless channels. Moreover, IP-based CRAHNs have several issues like scalability, inefficient-mapping, poor resource utilization, and location dependence. By leveraging the advantages of NDN, in this paper, we propose a new cross layer fine-grained architecture called named data networking for cognitive radio ad hoc networks …


The Palantíri Stones In J.R.R. Tolkien’S The Lord Of The Rings As Sauron’S Social Media: How To Avoid Getting Poked By The Dark Lord, Phillip Fitzsimmons Jun 2015

The Palantíri Stones In J.R.R. Tolkien’S The Lord Of The Rings As Sauron’S Social Media: How To Avoid Getting Poked By The Dark Lord, Phillip Fitzsimmons

Faculty Books & Book Chapters

No abstract provided.


Big Data: Big Value And Big Concerns, Singapore Management University Jun 2015

Big Data: Big Value And Big Concerns, Singapore Management University

Perspectives@SMU

Digital information can serve lots of purposes, but timeliness, relevance and privacy issues abound


Alternative Models Of Connectivity: Reclaiming Networked Spaces, Philip M. Bain Jun 2015

Alternative Models Of Connectivity: Reclaiming Networked Spaces, Philip M. Bain

Electronic Theses and Dissertations

Alternative networking is a growing field of study and practice due to advancements in computer networking hardware, and software protocols. Methods of integrating alternative networking configurations into infrastructure present enhanced forms of empowerment and embodiment for participants. Through an analysis of multiple hardware and software examples, this research suggests that practices of sharing and collaboration, which are embedded in the history of computer networking, have the potential to reinvigorate the notion of a virtual public sphere, and support the ideals of digital democracy.


Fundamentals Of Library Instruction, Darren Sweeper Jun 2015

Fundamentals Of Library Instruction, Darren Sweeper

Sprague Library Scholarship and Creative Works

No abstract provided.


M-1: The Mealy Open Source Custom Midi Controller, Garrett Leung, Darren O. Mistica Jun 2015

M-1: The Mealy Open Source Custom Midi Controller, Garrett Leung, Darren O. Mistica

Electrical Engineering

With the high price of large mixing consoles, aspiring artists are restricted to using a mouse to control digital facsimiles of knobs, faders, switches, and buttons. Though using the software controls is considered a simple task, dedicated hardware allows for tactile, visual, and utility. At a low cost, the heart of the MTech M-1 can be customized and placed into any shell with any combination of controls as possible with the underlying platform.

Modern MIDI controllers require significant physical space due to their preset button layout and space consuming setups. Despite their high price, modern MIDI controllers have only one …


Wireless Sensor Mesh Network For Irrigation Systems, Rosana Cheruvelil, Oswaldo Garcia, Nabil Haque, Justin Ignacio, Stanley Thomas Jun 2015

Wireless Sensor Mesh Network For Irrigation Systems, Rosana Cheruvelil, Oswaldo Garcia, Nabil Haque, Justin Ignacio, Stanley Thomas

Electrical Engineering

Pepper Oak Farms, a company that grows their own olives for olive oil and has approximately 40,000 olive trees, is in need of an efficient way to monitor the soil and atmospheric conditions that are critical to the cultivation of their trees. The company at the moment only has two sensors and has to manually place the sensors at different locations to collect data on soil moisture and temperature. This is expensive, time consuming, and a lot of effort on the owner’s part to go out on the fields to collect this data. As a solution, the company would like …


Parallel Computation In Communication And Signal Processing, Amean Al_Safi, Bradley Bazuin, Liqaa Alhafadhi May 2015

Parallel Computation In Communication And Signal Processing, Amean Al_Safi, Bradley Bazuin, Liqaa Alhafadhi

Amean S Al_Safi

The powerful computation of GPU has increased the computation speed up of many systems. This paper summarize some of the most important work in the field of communication and signal processing using GPU


Sistema De Comunicación Vía Inalámbrico Para Los Blancos Y El Sistema De Puntaje Sius Ascor De Fedetirocol, Yeny Olarte Mateus, John Henry Rodriguez Duran May 2015

Sistema De Comunicación Vía Inalámbrico Para Los Blancos Y El Sistema De Puntaje Sius Ascor De Fedetirocol, Yeny Olarte Mateus, John Henry Rodriguez Duran

Ingeniería en Automatización

En este proyecto se ejecutará el diseño e implementación de un sistema de comunicación inalámbrica para los blancos electrónicos de tiro SIUS ASCOR, con el fin de facilitar la comunicación entre sus dispositivos y su sistema de puntaje. En la Federación Colombiana de Tiro y Caza muchos de estos sistemas se encuentran averiados, impidiendo el desarrollo normal de las competencias de tiro deportivo a nivel nacional e internacional. La finalidad de este proyecto es garantizar el buen funcionamiento de dichos sistemas electrónicos llevándolos nuevamente a los campos de entrenamiento y competencia. Los blancos poseen dos tarjetas de adquisición de datos, …


Non-Invasive Detection Of Moving And Stationary Human With Wifi, Chenshu Wu, Zheng Yang, Zimu Zhou, Xuefeng Liu, Yunhao Liu, Jiannong Cao May 2015

Non-Invasive Detection Of Moving And Stationary Human With Wifi, Chenshu Wu, Zheng Yang, Zimu Zhou, Xuefeng Liu, Yunhao Liu, Jiannong Cao

Research Collection School Of Computing and Information Systems

Non-invasive human sensing based on radio signals has attracted a great deal of research interest and fostered a broad range of innovative applications of localization, gesture recognition, smart health-care, etc., for which a primary primitive is to detect human presence. Previous works have studied the detection of moving humans via signal variations caused by human movements. For stationary people, however, existing approaches often employ a prerequisite scenario-tailored calibration of channel profile in human-free environments. Based on in-depth understanding of human motion induced signal attenuation reflected by PHY layer channel state information (CSI), we propose DeMan, a unified scheme for non-invasive …


Session D-4: Coolhub.Imsa: Collaborative Innovation In Action, Carl Heine, James Gerry May 2015

Session D-4: Coolhub.Imsa: Collaborative Innovation In Action, Carl Heine, James Gerry

Carl Heine

Transform STEM teaching and learning with CoolHub.IMSA, a free virtual platform where youth and adults collaborate on projects they create. Explore the site through the eyes of project members and discover powerful ways to collaborate, innovate and network for learning.