Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

2015

Institution
Keyword
Publication
Publication Type
File Type

Articles 91 - 120 of 145

Full-Text Articles in Computer Engineering

Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad May 2015

Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad

Dissertations

Abstract

Sensor nodes collect data from the physical world then exchange it until it reaches the intended destination. This information can be sensitive, such as battlefield surveillance. Therefore, providing secure and continuous data transmissions among sensor nodes in wireless network environments is crucial. Wireless sensor networks (WSN) have limited resources, limited computation capabilities, and the exchange of data through the air and deployment in accessible areas makes the energy, security, and routing major concerns in WSN. In this research we are looking at security issues for the above reasons. WSN is susceptible to malicious activities such as hacking and physical …


Pitch Detection Of Speech Signal Using Wavelet Transform, Innovative Research Publications Irp India, Amin Shadravan Lalezari, Jalil Shirazi May 2015

Pitch Detection Of Speech Signal Using Wavelet Transform, Innovative Research Publications Irp India, Amin Shadravan Lalezari, Jalil Shirazi

Innovative Research Publications IRP India

Pitch frequency is the fundamental frequency of a speech signal. It is one of the most important parameters for speech signal processing. The simulated results on Keele pitch reference database show that the performance of the proposed wavelet transform based pitch detection algorithm is obviously better than the original AMDF and its improvements based algorithms


Challenges Of Implementing Automatic Dependent Surveillance Broadcast In The Nextgen Air Traffic Management System, Carl J. Giannatto Jr. May 2015

Challenges Of Implementing Automatic Dependent Surveillance Broadcast In The Nextgen Air Traffic Management System, Carl J. Giannatto Jr.

Electronic Theses and Dissertations

The Federal Aviation Administration is in the process of replacing the current Air Traffic Management (ATM) system with a new system known as NextGen. Automatic Dependent Surveillance-Broadcast (ADS-B) is the aircraft surveillance protocol currently being introduced as a part of the NextGen system deployment. The evolution of ADS-B spans more than two decades, with development focused primarily on increasing the capacity of the Air Traffic Control (ATC) system and reducing operational costs. Security of the ADS-B communications network has not been a high priority, and the inherent lack of security measures in the ADS-B protocol has come under increasing scrutiny …


Vcare: A Personal Emergency Response System To Promote Safe And Independent Living Among Elders Staying By Themselves In Community Or Residential Settings, Priyankar Bhattacharjee May 2015

Vcare: A Personal Emergency Response System To Promote Safe And Independent Living Among Elders Staying By Themselves In Community Or Residential Settings, Priyankar Bhattacharjee

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

‘Population aging’ is a growing concern for most of us living in the twenty first century, primarily because many of us in the next few years will have a senior person to care for - spending money towards their healthcare expenditures AND/OR having to balance a full-time job with the responsibility of care-giving, travelling from another city to be with this elderly citizen who might be our parent, grand-parent or even community elders. As informal care-givers, if somehow we were able to monitor the day-to-day activities of our elderly dependents, and be alerted when wrong happens to them that would …


Design, Programming, And User-Experience, Kaila G. Manca May 2015

Design, Programming, And User-Experience, Kaila G. Manca

Honors Scholar Theses

This thesis is a culmination of my individualized major in Human-Computer Interaction. As such, it showcases my knowledge of design, computer engineering, user-experience research, and puts into practice my background in psychology, com- munications, and neuroscience.

I provided full-service design and development for a web application to be used by the Digital Media and Design Department and their students.This process involved several iterations of user-experience research, testing, concepting, branding and strategy, ideation, and design. It lead to two products.

The first product is full-scale development and optimization of the web appli- cation.The web application adheres to best practices. It was …


Tweetement: Pseudo-Relevance Feedback For Twitter Search, Kanatbay Bektemirov May 2015

Tweetement: Pseudo-Relevance Feedback For Twitter Search, Kanatbay Bektemirov

Computer Science and Computer Engineering Undergraduate Honors Theses

Microblogging platforms such as Twitter let users communicate with short messages. Due to the messages’ short content and the users’ tendency to type short queries while searching, it is particularly challenging to locate useful tweets that match user queries. The fundamental problems of word mismatch due to ambiguity are especially acute. To solve this problem, this thesis explores and compares multiple automatic query expansion methods that involve the most frequent hashtags and keywords. We built a Web service that provides real-time Twitter Search results incorporating automatic query expansion. Six pseudo-relevance feedback methods were studied and the numbers indicate that results …


Ambient Rendezvous: Energy Efficient Neighbor Discovery Via Acoustic Sensing, Keyu Wang, Zheng Yang, Zimu Zhou, Yunhao Liu, Lionel M. Ni May 2015

Ambient Rendezvous: Energy Efficient Neighbor Discovery Via Acoustic Sensing, Keyu Wang, Zheng Yang, Zimu Zhou, Yunhao Liu, Lionel M. Ni

Research Collection School Of Computing and Information Systems

The continual proliferation of mobile devices has stimulated the development of opportunistic encounter-based networking and has spurred a myriad of proximity-based mobile applications. A primary cornerstone of such applications is to discover neighboring devices effectively and efficiently. Despite extensive protocol optimization, current neighbor discovery modalities mainly rely on radio interfaces, whose energy and wake up delay required to initiate, configure and operate these protocols hamper practical applicability. Unlike conventional schemes that actively emit radio tones, we exploit ubiquitous audio events to discover neighbors passively. The rationale is that spatially adjacent neighbors tend to share similar ambient acoustic environments. We propose …


Phaseu: Real-Time Los Identification With Wifi, Chenshu Wu, Zheng Yang, Zimu Zhou, Kun Qian, Yunhao Liu, Mingyan Liu May 2015

Phaseu: Real-Time Los Identification With Wifi, Chenshu Wu, Zheng Yang, Zimu Zhou, Kun Qian, Yunhao Liu, Mingyan Liu

Research Collection School Of Computing and Information Systems

WiFi technology has fostered numerous mobile computing applications, such as adaptive communication, finegrained localization, gesture recognition, etc., which often achieve better performance or rely on the availability of Line-Of-Sight (LOS) signal propagation. Thus the awareness of LOS and NonLine-Of-Sight (NLOS) plays as a key enabler for them. Realtime LOS identification on commodity WiFi devices, however, is challenging due to limited bandwidth of WiFi and resulting coarse multipath resolution. In this work, we explore and exploit the phase feature of PHY layer information, harnessing both space diversity with antenna elements and frequency diversity with OFDM subcarriers. On this basis, we propose …


Matchmaking Game Players On Public Transport, Nairan Zhang, Youngki Lee, Rajesh Krishna Balan May 2015

Matchmaking Game Players On Public Transport, Nairan Zhang, Youngki Lee, Rajesh Krishna Balan

Research Collection School Of Computing and Information Systems

This paper extends our recent work, called GameOn, which presented a system for allowing public transport commuters to engage in multiplayer games with fellow commuters traveling on the same bus or train. An important challenge for GameOn is to group players with reliable connections into the same game. In this case, the meaning of reliability has two dimensions. First, the network connectivity (TCP, UDP etc.) should be robust. Second, the players should be collocated with each other for a sufficiently long duration so that a game session will not be terminated by players leaving the public transport modality such as …


Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo Apr 2015

Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo

All Faculty Scholarship

The emergence of the cloud is heightening the demands on the network in terms of bandwidth, ubiquity, reliability, latency, and route control. Unfortunately, the current architecture was not designed to offer full support for all of these services or to permit money to flow through it. Instead of modifying or adding specific services, the architecture could redesigned to make Internet services contractible by making the relevant information associated with these services both observable and verifiable. Indeed, several on-going research programs are exploring such strategies, including the NSF’s NEBULA, eXpressive Internet Architecture (XIA), ChoiceNet, and the IEEE’s Intercloud projects.


Advanced Compression And Latency Reduction Techniques Over Data Networks, Fuad Shamieh Apr 2015

Advanced Compression And Latency Reduction Techniques Over Data Networks, Fuad Shamieh

Electronic Thesis and Dissertation Repository

Applications and services operating over Internet protocol (IP) networks often suffer from high latency and packet loss rates. These problems are attributed to data congestion resulting from the lack of network resources available to support the demand. The usage of IP networks is not only increasing, but very dynamic as well. In order to alleviate the above-mentioned problems and to maintain a reasonable Quality of Service (QoS) for the end users, two novel adaptive compression techniques are proposed to reduce packets’ payload size. The proposed schemes exploit lossless compression algorithms to perform the compression process on the packets’ payloads and …


Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally Apr 2015

Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally

Information Science Faculty Publications

Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines. As such, employing cloud-based laboratories can have clear advantages over using classical ones, which impose major hindrances against fulfilling pedagogical objectives and do not scale well when the number of students and distant university campuses grows up. We show how the cloud paradigm can be leveraged to teach a cybersecurity course. Specifically, we share our …


Diversified Users' Satisfaction With Advanced Mobile Phone Features, Chen Ling, Wonil Hwang, Gavriel Salvendy Apr 2015

Diversified Users' Satisfaction With Advanced Mobile Phone Features, Chen Ling, Wonil Hwang, Gavriel Salvendy

Dr. Chen Ling

Mobile phones are widely used all over the world, and with their increasing number of value-added features, they are becoming far more than a mere mobile voice communication device. Rather, they provide a powerful platform for accessing information universally. This paper reports a study which scrutinized users’ preference levels with five new mobile phone design features facilitating universal information access through mobile phones: camera, colour screen, voice-activated dialing, Internet browsing, and wireless connectivity (e.g. Bluetooth, infrared, etc.). The survey study involved college students and investigated the degree to which each of the above features impacts the users’ overall satisfaction and …


Effect Of Glance Duration On Perceived Complexity And Segmentation Of User Interfaces, Yifei Dong, Chen Ling, Lesheng Hua Apr 2015

Effect Of Glance Duration On Perceived Complexity And Segmentation Of User Interfaces, Yifei Dong, Chen Ling, Lesheng Hua

Dr. Chen Ling

Computer users who handle complex tasks like air traffic control (ATC) need to quickly detect updated information from multiple displays of graphical user interface. The objectives of this study are to investigate how much computer users can segment GUI display into distinctive objects within very short glances and whether human perceives complexity differently after different durations of exposure. Subjects in this empirical study were presented with 20 screenshots of web pages and software interfaces for different short durations (100ms, 500ms, 1000ms) and were asked to recall the visual objects and rate the complexity of the images. The results indicate that …


A Software Defined Radio Communications System For A Small Spacecraft, Michael Hlas, Jeremy Straub, Ronald Marsh Apr 2015

A Software Defined Radio Communications System For A Small Spacecraft, Michael Hlas, Jeremy Straub, Ronald Marsh

Jeremy Straub

Software defined radios (SDRs) are poised to significantly enhance the future of small spacecraft communications. They allow signal processing to be performed on a computer by software rather than requiring dedicated hardware. The OpenOrbiter SDR (discussed in [1] and refined in [2]) takes data from the flight computer and converts it into an analog signal that is transmitted via the spacecraft antenna. Because the signal processing is done in software, the radio can be easily reconfigured. This process is done in reverse for incoming transmissions, which are received by the SDR and decoded by software. Figures 1 and 2 provide …


Creating A Low-Cost Radio For An Open Cubesat, Michael Wegerson, Jeremy Straub, Ronald Marsh Apr 2015

Creating A Low-Cost Radio For An Open Cubesat, Michael Wegerson, Jeremy Straub, Ronald Marsh

Jeremy Straub

A reliable communication system is key to the success of a CubeSat mission, allowing for data to be trans-mitted to the ground station and commands to be up-loaded to the satellite. To satisfy this need, the OpenOrbiter satellite (a 1-U CubeSat [1], being devel-oped with a target parts budget of under $5,000 [2]) is leveraging previously space-tested [3], low-cost trans-ceiver design which is based on the SI 4463 IC unit. This board design will be included in the publically available Open Framework for Educational Nanosatel-lites (OPEN) allowing others to modify, enhance and/or make use of the design in the future.


Three-Dimensional Printing And Scanning Web-Based Job Management System, Stephanie Hollman, Dalyn Limesand, Jeremy Straub, Scott Kerlin Apr 2015

Three-Dimensional Printing And Scanning Web-Based Job Management System, Stephanie Hollman, Dalyn Limesand, Jeremy Straub, Scott Kerlin

Jeremy Straub

Three-dimensional (3D) printers have gained popularity for use for many different projects. The work presented herein aims to make this process simpler. This poster discusses a system that will allow individuals from all over campus to submit object files for printing, without having to schedule appointments and schedule 3D scanning appointments and retrieve scan results.


Cumulonimbus Computing Concerns: Information Security In Public, Private, And Hybrid Cloud Computing, Daniel Adams Apr 2015

Cumulonimbus Computing Concerns: Information Security In Public, Private, And Hybrid Cloud Computing, Daniel Adams

Senior Honors Theses

Companies of all sizes operating in all markets are moving toward cloud computing for greater flexibility, efficiency, and cost savings. The decision of how to adopt the cloud is a question of major security concern due to the fact that control is relinquished over certain portions of the IT ecosystem. This thesis presents the position that the main security decision in moving to cloud computing is choosing which type of cloud to employ for each portion of the network – the hybrid cloud approach. Vulnerabilities that exist on a public cloud will be explored, and recommendations on decision factors will …


Youth And The Posthuman: Personhood, Transcendence, And Siri, Erik Leafblad, Andrew Root Apr 2015

Youth And The Posthuman: Personhood, Transcendence, And Siri, Erik Leafblad, Andrew Root

Faculty Publications

When everything gets turned into a technology, and existence is about practical mastery, the mystery of being is buried and everything is made an object, blurring the lines between human personhood and other technological objects.


Exploring Discriminative Features For Anomaly Detection In Public Spaces, Shriguru Nayak, Archan Misra, Kasthuri Jeyarajah, Philips Kokoh Prasetyo, Ee-Peng Lim Apr 2015

Exploring Discriminative Features For Anomaly Detection In Public Spaces, Shriguru Nayak, Archan Misra, Kasthuri Jeyarajah, Philips Kokoh Prasetyo, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

Context data, collected either from mobile devices or from user-generated social media content, can help identify abnormal behavioural patterns in public spaces (e.g., shopping malls, college campuses or downtown city areas). Spatiotemporal analysis of such data streams provides a compelling new approach towards automatically creating real-time urban situational awareness, especially about events that are unanticipated or that evolve very rapidly. In this work, we use real-life datasets collected via SMU's LiveLabs testbed or via SMU's Palanteer software, to explore various discriminative features (both spatial and temporal - e.g., occupancy volumes, rate of change in topic{specific tweets or probabilistic distribution of …


Remote Mobile Screen (Rms): An Approach For Secure Byod Environments, Santiago Manuel Gimenez Ocano Apr 2015

Remote Mobile Screen (Rms): An Approach For Secure Byod Environments, Santiago Manuel Gimenez Ocano

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Bring Your Own Device (BYOD) is a policy where employees use their own personal mobile devices to perform work-related tasks. Enterprises reduce their costs since they do not have to purchase and provide support for the mobile devices. BYOD increases job satisfaction and productivity in the employees, as they can choose which device to use and do not need to carry two or more devices.

However, BYOD policies create an insecure environment, as the corporate network is extended and it becomes harder to protect it from attacks. In this scenario, the corporate information can be leaked, personal and corporate spaces …


Crowdsourced Earthquake Early Warning, Sarah Minson, Benjamin Brooks, Craig Glennie, Jessica Murray, John Langbein, Susan Owen, Thomas Heaton, Robert Iannucci, Darren Hauser Mar 2015

Crowdsourced Earthquake Early Warning, Sarah Minson, Benjamin Brooks, Craig Glennie, Jessica Murray, John Langbein, Susan Owen, Thomas Heaton, Robert Iannucci, Darren Hauser

Robert A Iannucci

Earthquake early warning (EEW) can reduce harm to people and infrastructure from earthquakes and tsunamis, but it has not been implemented in most high earthquake-risk regions because of prohibitive cost. Common consumer devices such as smartphones contain low-cost versions of the sensors used in EEW. Although less accurate than scientific-grade instruments, these sensors are globally ubiquitous. Through controlled tests of consumer devices, simulation of an Mw (moment magnitude) 7 earthquake on California’s Hayward fault, and real data from the Mw 9 Tohoku-oki earthquake, we demonstrate that EEW could be achieved via crowdsourcing.


Cybersecurity In The Information Age Mar 2015

Cybersecurity In The Information Age

DePaul Magazine

According to the Identify Theft Resource Center, more than 750 breaches occurred in 2014, exposing more than 83 million records. Breaches occur because people have discovered that there’s money to be made from stealing corporate and customer information. Faced with this reality, consumers and companies may wonder if it’s possible to protect their personal and financial data. DePaul's College of Computing and Digital Media is training the next generation of cybersecurity experts to thwart cybersecurity attacks. In addition, DePaul faculty and alumni in data security offer advice to consumers on securing their financial and personal information.


Analysis Of A ‘Turn-Key’ No Hardware Space Mission Using The Orbital Services Model, Jeremy Straub Mar 2015

Analysis Of A ‘Turn-Key’ No Hardware Space Mission Using The Orbital Services Model, Jeremy Straub

Jeremy Straub

Many applications that would benefit from access to space cannot afford the cost of spacecraft development, launch and operations. Other operations require only a fraction of a spacecraft or complete use of a spacecraft for a limited period of time. This paper considers the value of a ‘turn-key’ style space mission. It considers what types of missions could be reasonably conducted using this approach. The economics of being a service provider are considered. Then, a prospective mission concept for one OSM ‘turn-key’ mission is presented. The value proposition of this mission is assessed and the hardware and other capabilities required …


Small Satellite Communications Security And Student Learning In The Development Of Ground Station Software, Scott Kerlin, Jeremy Straub, Jacob Huhn, Alexander Lewis Mar 2015

Small Satellite Communications Security And Student Learning In The Development Of Ground Station Software, Scott Kerlin, Jeremy Straub, Jacob Huhn, Alexander Lewis

Jeremy Straub

Communications security is gaining importance as small spacecraft include actuator capabilities (i.e., propulsion), payloads which could be misappropriated (i.e., high resolution cameras), and research missions with high value/cost. However, security is limited by capability, interoperability and regulation. Additionally, as the small satellite community becomes more mainstream and diverse, the lack of cheap, limited-to-no configuration, pluggable security modules for small satellites also presents a limit for user adoption of security.

This paper discusses a prospective approach for incorporating robust security into a student-developed ground station created at the University of North Dakota as part of a Computer Science Department senior design …


Csr: Small: Collaborative Research: Sane: Semantic-Aware Namespace In Exascale File Systems, Yifeng Zhu Feb 2015

Csr: Small: Collaborative Research: Sane: Semantic-Aware Namespace In Exascale File Systems, Yifeng Zhu

University of Maine Office of Research Administration: Grant Reports

Explosive growth in volume and complexity of data exacerbates the key challenge facing the management of massive data in a way that fundamentally improves the ease and efficacy of their usage. Exascale storage systems in general rely on hierarchically structured namespace that leads to severe performance bottlenecks and makes it hard to support real-time queries on multi-dimensional attributes. Thus, existing storage systems, characterized by the hierarchical directory tree structure, are not scalable in light of the explosive growth in both the volume and the complexity of data. As a result, directory-tree based hierarchical namespace has become restrictive, difficult to use, …


Analyzing Wi­Fi P2p In The Context Of A Hangman Game, William L. Honig Jan 2015

Analyzing Wi­Fi P2p In The Context Of A Hangman Game, William L. Honig

William L Honig

Wi­Fi P2P , which complies with the Wi­Fi Alliance's Wi­Fi Direct™ certification

2 3

program, is a relatively new addition to wireless communications systems. It is now

supported in Android operating system (since version 4.0). In theory, Wi­Fi Direct offers

advantages for ad hoc communications between mobile apps. A key goal of this project

was to evaluate the ability of Wi­Fi P2P for interconnecting mobile apps by using a

common game suitable to mobile screens and devices.

The application allows the user to interconnect two devices using Wi­Fi P2P and

play the classic hangman game. The players search for devices …


Design Of A Scalable Path Service For The Internet, Mehmet O. Ascigil Jan 2015

Design Of A Scalable Path Service For The Internet, Mehmet O. Ascigil

Theses and Dissertations--Computer Science

Despite the world-changing success of the Internet, shortcomings in its routing and forwarding system have become increasingly apparent. One symptom is an escalating tension between users and providers over the control of routing and forwarding of packets: providers understandably want to control use of their infrastructure, and users understandably want paths with sufficient quality-of-service (QoS) to improve the performance of their applications. As a result, users resort to various “hacks” such as sending traffic through intermediate end-systems, and the providers fight back with mechanisms to inspect and block such traffic.

To enable users and providers to jointly control routing and …


A Network Path Advising Service, Xiongqi Wu Jan 2015

A Network Path Advising Service, Xiongqi Wu

Theses and Dissertations--Computer Science

A common feature of emerging future Internet architectures is the ability for applications to select the path, or paths, their packets take between a source and destination. Unlike the current Internet architecture where routing protocols find a single (best) path between a source and destination, future Internet routing protocols will present applications with a set of paths and allow them to select the most appropriate path. Although this enables applications to be actively involved in the selection of the paths their packets travel, the huge number of potential paths and the need to know the current network conditions of each …


Enhanced Routing Protocol For Multihop Cognitive Radio Wireless Networks, Rana Asif Rehman, Chan-Min Park, Byung-Seo Kim Jan 2015

Enhanced Routing Protocol For Multihop Cognitive Radio Wireless Networks, Rana Asif Rehman, Chan-Min Park, Byung-Seo Kim

Rana Asif Rehman

Since multihop cognitive radio wireless networks are resource-constraint networks, there is a need of routing scheme that takes into account the parameters like channel information, node’s remaining energies, end-to-end latency etc., while performing routing process. In this paper, we have proposed a reliable and efficient routing scheme for multihop cognitive radio wireless networks. The proposed protocol is on-demand and reactive protocol that considers both delay and energy along the route. By using simulations, it shows that proposed scheme performs better as compared to other ones.