Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

2016

Theses/Dissertations

Institution
Keyword
Publication

Articles 1 - 30 of 39

Full-Text Articles in Computer Engineering

Modelling And Analysis Of Smart Grids For Critical Data Communication, Abdulfattah Noorwali Dec 2016

Modelling And Analysis Of Smart Grids For Critical Data Communication, Abdulfattah Noorwali

Electronic Thesis and Dissertation Repository

Practical models for the subnetworks of smart grid are presented and analyzed. Critical packet-delay bounds for these subnetworks are determined, with the overall objective of identifying parameters that would help in the design of smart grid with least end-to-end delay.

A single-server non-preemptive queueing model with prioritized critical packets is presented for Home Area Network (HAN). Closed-form expressions for critical packet delay are derived and illustrated as a function of: i) critical packet arrival rate, ii) service rate, iii) utilization factor, and iv) rate of arrival of non-critical packets. Next, wireless HANs using FDMA and TDMA are presented. Upper and …


Teaching The Internet Of Things: Bridging A Path From Cpe329, Steven Han, Rafael Lopez Dec 2016

Teaching The Internet Of Things: Bridging A Path From Cpe329, Steven Han, Rafael Lopez

Computer Engineering

“The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices via the Internet is becoming pervasive, from the commercial kitchen to the residential basement room to the arm of the fitness buff.” - WSO2

In this report, we will investigate procedures and technologies used in IoT. A variety of cloud platforms will be described to demonstrate its strengths and usage on IoT applications. Furthermore, demonstrate the most popular hardware being used in several of these applications. This report is aimed to give a good understanding on what it takes to put together an IoT …


Rocket Stats, Kyle Cornelison Dec 2016

Rocket Stats, Kyle Cornelison

Computer Science and Software Engineering

An Android application to allow Rocket League players to view their stats and track progress.


Quantifying Parkinson's Disease Symptoms Using Mobile Devices, Charles R. Aylward Dec 2016

Quantifying Parkinson's Disease Symptoms Using Mobile Devices, Charles R. Aylward

Master's Theses

Current assessments for evaluating the progression of Parkinson’s Disease are largely qualitative and based on small sets of data obtained from occasional doctor-patient interactions. There is a clinical need to improve the techniques used for mitigating common Parkinson’s Disease symptoms. Available data sets for researching the disease are minimal, hindering advancement toward understanding the underlying causes and effectiveness of treatment and therapies. Mobile devices present an opportunity to continuously monitor Parkinson’s Disease patients and collect important information regarding the severity of symptoms. The evolution of digital technology has opened doors for clinical research to extend beyond the clinic by incorporating …


Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly Nov 2016

Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly

HON499 projects

The aim of this paper is to offer an introduction to the exploding field of cybersecurity by asking what are the most important concepts or topics that a new member of the field of cybersecurity should know. This paper explores this question from three perspectives: from the realm of business and how the cyber world is intertwined with modern commerce, including common weaknesses and recommendations, from the academic arena examining how cybersecurity is taught and how it should be taught in a classroom or laboratory environment, and lastly, from the author’s personal experience with the cyber world. Included information includes …


Infrastructure-Free Secure Pairing Of Mobile Devices, Chunqiu Liu Nov 2016

Infrastructure-Free Secure Pairing Of Mobile Devices, Chunqiu Liu

Masters Theses

Mobile devices have advanced tremendously during the last ten years and have changed our daily life in various ways. Secure pairing of mobile devices has become a significant issue considering the huge quantity of active mobile device connections and mobile traffic. However, current commonly used file sharing mobile applications rely on servers completely that are always targeted by attackers. In this thesis work, an innovative mechanism is proposed to generate symmetric keys on both mobile devices independently from a shared movement in arbitrary pattern, which means no server needs to be involved and no data exchange needed. A secret wireless-communication …


Protecting Controllers Against Denial-Of-Service Attacks In Software-Defined Networks, Jingrui Li Nov 2016

Protecting Controllers Against Denial-Of-Service Attacks In Software-Defined Networks, Jingrui Li

Masters Theses

Connection setup in software-defined networks (SDN) requires considerable amounts of processing, communication, and memory resources. Attackers can target SDN controllers defense mechanism based on a proof-of-work protocol. This thesis proposes a new protocol to protect controllers against such attacks, shows implementation of the system and analyze the its performance. The key characteristics of this protocol, namely its one-way operation, its requirement for freshness in proofs of work, its adjustable difficulty, its ability to work withmultiple network providers, and its use of existing TCP/IP header fields, ensure that this approach can be used in practice.


Topology Design And Delay Control For Communication Networks In Smart Grid, Xiaodong Wang Aug 2016

Topology Design And Delay Control For Communication Networks In Smart Grid, Xiaodong Wang

Doctoral Dissertations

Stability is a critical concern in the design and maintenance of power systems. Different approaches have been proposed for the analysis of power grid stability in various scenarios depending on small or large perturbations and the speed of the phenomenon of interest. In this work, we consider the power grid as a group of flocking birds, as synchronization is the key issue in both contexts. The framework of partial difference equation (PdE) is used to analyze the system stability, when designing the communication network of the power grid network for conveying measurements between different power stations. Both the cases where …


The Design And Validation Of A Wireless Bat-Mounted Sonar Recording System, Jeremy Joseph Langford Aug 2016

The Design And Validation Of A Wireless Bat-Mounted Sonar Recording System, Jeremy Joseph Langford

Masters Theses

Scientists studying the behavior of bats monitor their echolocation calls, as their calls are important for navigation and feeding, but scientist are typically restricted to ground-based recording. Recording bat calls used for echolocation from the back of the bat as opposed to the ground offers the opportunity to study bat echolocation from a vantage otherwise only offered to the bats themselves. However, designing a bat mounted in-flight audio recording system, (bat-tag), capable of recording the ultra-sound used in bat echolocation presents a unique set of challenges. Chiefly, the bat-tag must be sufficiently light weight as to not overburden the bat, …


Climbing Up Cloud Nine: Performance Enhancement Techniques For Cloud Computing Environments, Mohamed Abusharkh Jul 2016

Climbing Up Cloud Nine: Performance Enhancement Techniques For Cloud Computing Environments, Mohamed Abusharkh

Electronic Thesis and Dissertation Repository

With the transformation of cloud computing technologies from an attractive trend to a business reality, the need is more pressing than ever for efficient cloud service management tools and techniques. As cloud technologies continue to mature, the service model, resource allocation methodologies, energy efficiency models and general service management schemes are not yet saturated. The burden of making this all tick perfectly falls on cloud providers. Surely, economy of scale revenues and leveraging existing infrastructure and giant workforce are there as positives, but it is far from straightforward operation from that point. Performance and service delivery will still depend on …


Mims: Mobile Interruption Management System, Mohammad Kayes Kaykobad Jul 2016

Mims: Mobile Interruption Management System, Mohammad Kayes Kaykobad

Master's Theses (2009 -)

Mobile devices are increasing in an astronomical rate throughout the world. While it is bringing a lot of comfort to the users it is not coming without any hazards. Now a user is susceptible to mobile call interruptions wherever he is, whether he is in the middle of a very important discussion or in a very important task like performing a complicated emergency operation in a hospital. As a result researchers have been studying to find ways to minimize cost of mobile interruptions. In this thesis we have proposed a mobile interruption management system in which callers have been grouped …


Spectrally Efficient Cooperative Relay Networks Using Signal Space Diversity, Muhammad Ajmal Khan Jun 2016

Spectrally Efficient Cooperative Relay Networks Using Signal Space Diversity, Muhammad Ajmal Khan

Electronic Thesis and Dissertation Repository

Cooperative relaying has received widespread attention in recent years from both academic and industrial communities. It offers significant benefits in enabling connectivity as well as in increasing coverage, power saving, spatial diversity and channel capacity. However, one of the main limitations of the conventional cooperative relaying system is the repetition of the received data by the relays, which reduces the spectral efficiency and the data rate. In this thesis, signal space diversity (SSD) based technique is proposed to incorporate into the conventional relaying system to enhance spectral efficiency, data rate and system performance.

Firstly, SSD is introduced into a two-way …


Musictrakr, Benjamin Lin Jun 2016

Musictrakr, Benjamin Lin

Computer Engineering

MusicTrackr is an IoT device that musicians attach to their instruments. The device has a start and stop button that allows users to record their playing sessions. Each recorded session is sent wirelessly to a cloud database. An accompanying website displays all of the recorded sessions, organized by date. After picking a specific date, the user can view graphs showing total practice time and average session length as well play back any recordings during that date. In addition, the user may add comments to any specific date or recording. Lastly, the user may tag a specific date with a color …


Duck Watch: A Smart System For Public Lap Pools, Daniel Griffith, Jill Thetford Jun 2016

Duck Watch: A Smart System For Public Lap Pools, Daniel Griffith, Jill Thetford

Computer Engineering

This paper presents Duck Watch, a proof of concept for a smart swimming pool. With our system, a swimmer will be able to log on to our website prior to leaving his or her house to help them decide if the conditions are favorable to go to a public lap swimming pool. Our system will inform the user of a number of environmental factors such as water temperature, exterior temperature, and humidity, as well as whether or not there are any open lanes currently.


Oluso, Diego Fernandez, Tyler Heucke, Nishant Mattu, Michael Roesch Jun 2016

Oluso, Diego Fernandez, Tyler Heucke, Nishant Mattu, Michael Roesch

Computer Engineering

Oluso is a new startup offering affordable, inexpensive technology to empower the individual. Our product is designed to keep the user in contact with someone close to them in emergency situations. Over the course of the past several months we have performed interviews with both individuals who may be interested in this product as well as organizations who may be interested in purchasing this product for their members. Our product is nearing completion and all of the companies we have interviewed have displayed a significant amount of interest in our product. The combination of easy communication and peace of mind …


El Capitán: Cal Poly Rose Float Digital Drive System, Gregory Raffi Baghdikian Jun 2016

El Capitán: Cal Poly Rose Float Digital Drive System, Gregory Raffi Baghdikian

Computer Engineering

In today’s world of smartphones, self-driving cars, and internet-connected coffee makers, it seems as if computers are contained in everything around us. These “embedded systems” have become critical components of our lives, improving everything about the things they control, from cost, to speed, to simplicity. One area that embedded systems has hardly gained a foothold is in the world of floatbuilding. Most of the floats in the Tournament of Roses Parade, including the one built jointly by Cal Poly San Luis Obispo and Cal Poly Pomona, are technologically very simple, using mostly analog components and rudimentary discrete digital logic to …


Wireless Mesh Networks For Scada Systems, Zachary Weisman Jun 2016

Wireless Mesh Networks For Scada Systems, Zachary Weisman

Computer Engineering

No abstract provided.


Ipv6 And Ospf Networks Lab, Kevin Jeremy Watson Jun 2016

Ipv6 And Ospf Networks Lab, Kevin Jeremy Watson

Computer Engineering

No abstract provided.


Pinpoint: Location Beacon And Tracking, Ezequiel Lopez Iii Jun 2016

Pinpoint: Location Beacon And Tracking, Ezequiel Lopez Iii

Computer Engineering

The purpose of Pinpoint was to create a device that can collect and transmit location information for multiple users on a wireless network. The device would be used to keep track of and communicate with other users nearby. The final design includes a touchscreen display as a graphical user interface (GUI), an XBee RF module for wireless networking, a GPS receiver for location tracking, and a Programmable System on a Chip (PSoC) to control the modules.


Stand, Lisa Yip Jun 2016

Stand, Lisa Yip

Computer Engineering

With busy lives, people sometimes forget to take breaks for multiple hours at a time. The purpose of this project is to remind the user to move around every hour if they have not already. To do so, stand will be a light weight fitness tracker that will detect the number of steps made within an hour. If the step count, dependent on goals, is not met then a vibration motor will gently remind them to take a break and walk. The data throughout the day will be shown on an iOS application where the user will be able to …


A Multi-Carrier Collaborative Solution To Minimize Connectivity-Loss, Michael Wong Jun 2016

A Multi-Carrier Collaborative Solution To Minimize Connectivity-Loss, Michael Wong

Master's Theses

Nearly two-thirds of Americans own a smart phone, and 19% of Americans rely on their smartphone for either accessing valuable information or staying connected with their friends and family across the globe [15]. Staying always-on and always-connected to the Internet is one of the most important and useful features of a smartphone. This connection is used by almost every single application on the device including web browsers, email clients, messaging applications, etc. Unfortunately, the cellular networks on our smartphones are not perfect and do not always have cellular signal. Our devices often lose Internet connection when users are on the …


Wireless Authentication Of Smart Doors Using Rfid, Austin A. Hentrup, Deyi Lu, Peter R. Roldan May 2016

Wireless Authentication Of Smart Doors Using Rfid, Austin A. Hentrup, Deyi Lu, Peter R. Roldan

Honors Thesis

In an increasingly interconnected world, the traditional metal lock-and-key method of securing homes and businesses is becoming more outdated and inconvenient when compared to modern solutions. Modern systems are smarter, faster, lighter, more secure and more integrated than ever before. Though the costs of Radio Frequency Identification (RFID) are shrinking overall, professional solutions remain prohibitively expensive. The aim of this project is to develop an inexpensive, secure, and internet-enabled RFID door authentication system. This is to transparently investigate the design limitations for these systems and help determine the ultimate feasibility of RFID growing to define the modern door-authentication standard.


Improving The Security Of Wireless Sensor Networks, Mauricio Tellez Nava May 2016

Improving The Security Of Wireless Sensor Networks, Mauricio Tellez Nava

Masters Theses, 2010-2019

With the rapid technological advancements of sensors, Wireless Sensor Networks (WSNs) have become the main technology for the Internet of Things (IoT). We investigated the security of WSNs in an environmental monitoring system with the goal to improve the overall security. We implemented a Secure Temperature Monitoring System (STMS), which served as our investigational environment. Our results revealed a security flaw found in the bootstrap loader (BSL) password used to protect firmware in the MSP430 MCU chips. We demonstrated how the BSL password could be brute forced in a matter of days. Furthermore, we illustrate how an attacker can reverse …


Development Of A User Interface To Communicate With Virtual Delta Robot Using Modbus Tcp/Ip And C#, Armin Maraghehmoghaddam May 2016

Development Of A User Interface To Communicate With Virtual Delta Robot Using Modbus Tcp/Ip And C#, Armin Maraghehmoghaddam

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Business and Technology at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Armin Maraghehmoghaddam on May 1, 2016.


Bluetooth Low Energy Platform With Simblee, Calvin W. Freeman May 2016

Bluetooth Low Energy Platform With Simblee, Calvin W. Freeman

Computer Science and Computer Engineering Undergraduate Honors Theses

Bluetooth Low Energy provides a platform for many developers to implement low power communication for a wide range of applications. The Internet of Things (IoT) is an emerging concept that is gaining traction in the world of embedded systems. Bluetooth Low Energy is one of the latest enablers of this movement and the Simblee module improves BLE accessibility. This thesis provides an evaluation of the average power consumption the Simblee uses in different use cases. By leveraging one of the Simblee’s most notable features, the Ultra Low Power mode, very low power consumption can be achieved, potentially increasing battery life …


Enhancing Snort Ids Performance Using Data Mining, Mohammed Ali Almaleki May 2016

Enhancing Snort Ids Performance Using Data Mining, Mohammed Ali Almaleki

Theses

Intrusion detection systems (IDSs) such as Snort apply deep packet inspection to detect intrusions. Usually, these are rule-based systems, where each incoming packet is matched with a set of rules. Each rule consists of two parts: the rule header and the rule options. The rule header is compared with the packet header. The rule options usually contain a signature string that is matched with packet content using an efficient string matching algorithm. The traditional approach to IDS packet inspection checks a packet against the detection rules by scanning from the first rule in the set and continuing to scan all …


Dynamic Network Security Control Using Software Defined Networking, Michael C. Todd Mar 2016

Dynamic Network Security Control Using Software Defined Networking, Michael C. Todd

Theses and Dissertations

This thesis develops and implements a process to rapidly respond to host level security events using a host agent, Software Defined Networking and OpenFlow updates, role based flow classes, and Advanced Messaging Queuing Protocol to automatically update configuration of switching devices and block malicious traffic. Results show flow table updates are made for all tested levels in less than 5.27 milliseconds and event completion time increased with treatment level as expected. As the number of events increases from 1,000 to 50,000, the design scales logarithmically caused mainly by message delivery time. Event processing throughput is limited primarily by the message …


Accelerated Iterative Algorithms With Asynchronous Accumulative Updates On A Heterogeneous Cluster, Sandesh Gubbi Virupaksha Mar 2016

Accelerated Iterative Algorithms With Asynchronous Accumulative Updates On A Heterogeneous Cluster, Sandesh Gubbi Virupaksha

Masters Theses

In recent years with the exponential growth in web-based applications the amount of data generated has increased tremendously. Quick and accurate analysis of this 'big data' is indispensable to make better business decisions and reduce operational cost. The challenges faced by modern day data centers to process big data are multi fold: to keep up the pace of processing with increased data volume and increased data velocity, deal with system scalability and reduce energy costs. Today's data centers employ a variety of distributed computing frameworks running on a cluster of commodity hardware which include general purpose processors to process big …


Ultrasonic Data Transmission And Steganography, Hunter Young Mar 2016

Ultrasonic Data Transmission And Steganography, Hunter Young

KSU Journey Honors College Capstones and Theses

This project discusses the feasibility of using ultrasound to transmit data between computer systems, particularly computer systems that have been intentionally cut off from traditional networks for increased security. The goal of this project is to provide a synthesis of the current research that has been done into the use of ultrasonic data transmission, and to conduct a series of tests determining the validity of certain claims made in regards to ultrasonic data transmission within the information security community. All research, experiments, results, and inferences have been discussed in the context of how they relate to the realm of information …


Development Of An Autonomous Robotic Mushroom Harvester, Nikita Alexeevich Kuchinskiy Feb 2016

Development Of An Autonomous Robotic Mushroom Harvester, Nikita Alexeevich Kuchinskiy

Electronic Thesis and Dissertation Repository

The process of development of a new robot is one of the modern technological arts. This process involves multiple complex steps and recursive approach. In this project, a solution for automatic harvesting of mushrooms is developed. In order to design an effective solution, it is necessary to explore and take into consideration the limitations of grasping very soft and fragile objects (particularly mushrooms). We will elaborate several strategies of picking and analyze each strategy to formulate the design requirements, develop a solution, and finally, evaluate the efficiency of the proposed solution in actual farm conditions for real mushrooms. The mushroom …