Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

2016

Institution
Keyword
Publication
Publication Type
File Type

Articles 91 - 120 of 120

Full-Text Articles in Computer Engineering

Improving The Sensitivity Of Unobtrusive Inactivity Detection In Sensor-Enabled Homes For The Elderly, Alvin C. Valera, Hwee-Pink Tan, Liming Bai Mar 2016

Improving The Sensitivity Of Unobtrusive Inactivity Detection In Sensor-Enabled Homes For The Elderly, Alvin C. Valera, Hwee-Pink Tan, Liming Bai

Research Collection School Of Computing and Information Systems

Unobtrusive in-home monitoring systems are gaining acceptability and are being deployed to enable relatives and caregivers to remotely monitor and provide timely care to their elderly loved ones or senior clients, respectively, who are living independently. Such systems can provide information about nonmovement or inactivity of the elderly resident. As prolonged inactivity could mean potential danger, several algorithms have been proposed to automatically detect unusually long durations of inactivity. Such schemes, however, suffer from low sensitivity due to their high detection latency. In this paper, we propose Dwell Time-enhanced Dynamic Threshold (DTDT), a scheme for computing adaptive alert thresholds that …


Development Of An Autonomous Robotic Mushroom Harvester, Nikita Alexeevich Kuchinskiy Feb 2016

Development Of An Autonomous Robotic Mushroom Harvester, Nikita Alexeevich Kuchinskiy

Electronic Thesis and Dissertation Repository

The process of development of a new robot is one of the modern technological arts. This process involves multiple complex steps and recursive approach. In this project, a solution for automatic harvesting of mushrooms is developed. In order to design an effective solution, it is necessary to explore and take into consideration the limitations of grasping very soft and fragile objects (particularly mushrooms). We will elaborate several strategies of picking and analyze each strategy to formulate the design requirements, develop a solution, and finally, evaluate the efficiency of the proposed solution in actual farm conditions for real mushrooms. The mushroom …


A Localization Method For Underwater Wireless Sensor Networks Based On Mobility Prediction And Particle Swarm Optimization Algorithms, Ying Zhang, Jixing Liang, Shengming Jiang, Wei Chen Feb 2016

A Localization Method For Underwater Wireless Sensor Networks Based On Mobility Prediction And Particle Swarm Optimization Algorithms, Ying Zhang, Jixing Liang, Shengming Jiang, Wei Chen

Computer Science Faculty Research

Due to their special environment, Underwater Wireless Sensor Networks (UWSNs) are usually deployed over a large sea area and the nodes are usually floating. This results in a lower beacon node distribution density, a longer time for localization, and more energy consumption. Currently most of the localization algorithms in this field do not pay enough consideration on the mobility of the nodes. In this paper, by analyzing the mobility patterns of water near the seashore, a localization method for UWSNs based on a Mobility Prediction and a Particle Swarm Optimization algorithm (MP-PSO) is proposed. In this method, the range-based PSO …


Ambient And Smartphone Sensor Assisted Adl Recognition In Multi-Inhabitant Smart Environments, Nirmalya Roy, Archan Misra, Diane Cook Feb 2016

Ambient And Smartphone Sensor Assisted Adl Recognition In Multi-Inhabitant Smart Environments, Nirmalya Roy, Archan Misra, Diane Cook

Research Collection School Of Computing and Information Systems

Activity recognition in smart environments is an evolving research problem due to the advancement and proliferation of sensing, monitoring and actuation technologies to make it possible for large scale and real deployment. While activities in smart home are interleaved, complex and volatile; the number of inhabitants in the environment is also dynamic. A key challenge in designing robust smart home activity recognition approaches is to exploit the users’ spatiotemporal behavior and location, focus on the availability of multitude of devices capable of providing different dimensions of information and fulfill the underpinning needs for scaling the system beyond a single user …


Key Management Scheme Based On Route Planning Of Mobile Sink In Wireless Sensor Networks, Ying Zhang, Jixing Liang, Bingxin Zheng, Shengming Jiang, Wei Chen Jan 2016

Key Management Scheme Based On Route Planning Of Mobile Sink In Wireless Sensor Networks, Ying Zhang, Jixing Liang, Bingxin Zheng, Shengming Jiang, Wei Chen

Computer Science Faculty Research

In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available …


Wireless Communication In Data Centers: A Survey, Abdelbaset S. Hamza, Jitender Deogun, Dennis R. Alexander Jan 2016

Wireless Communication In Data Centers: A Survey, Abdelbaset S. Hamza, Jitender Deogun, Dennis R. Alexander

School of Computing: Faculty Publications

Data centers (DCs) is becoming increasingly an integral part of the computing infrastructures of most enterprises. Therefore, the concept of DC networks (DCNs) is receiving an increased attention in the network research community. Most DCNs deployed today can be classified as wired DCNs as copper and optical fiber cables are used for intra- and inter-rack connections in the network. Despite recent advances, wired DCNs face two inevitable problems; cabling complexity and hotspots. To address these problems, recent research works suggest the incorporation of wireless communication technology into DCNs. Wireless links can be used to either augment conventional wired DCNs, or …


Enhanced Indoor Localization System Based On Inertial Navigation, Rasika Lakmal Hettiarachchige Don Jan 2016

Enhanced Indoor Localization System Based On Inertial Navigation, Rasika Lakmal Hettiarachchige Don

Electronic Thesis and Dissertation Repository

An algorithm for indoor localization of pedestrians using an improved Inertial Navigation system is presented for smartphone based applications. When using standard inertial navigation algorithm, errors in sensors due to random noise and bias result in a large drift from the actual location with time. Novel corrections are introduced for the basic system to increase the accuracy by counteracting the accumulation of this drift error, which are applied using a Kalman filter framework.

A generalized velocity model was applied to correct the walking velocity and the accuracy of the algorithm was investigated with three different velocity models which were derived …


Diseño E Implementación De Un Sistema De Realidad Virtual Para Una Planta Pasteurizadora De Leche, Jose Adolfo Robayo Murillo Jan 2016

Diseño E Implementación De Un Sistema De Realidad Virtual Para Una Planta Pasteurizadora De Leche, Jose Adolfo Robayo Murillo

Ingeniería en Automatización

Este trabajo describe el procedimiento y diseño para realizar una plataforma de realidad virtual basada en una planta pasteurizadora de leche, incluyendo la interfaz de usuario mediante periféricos digitales y etapas del proceso en la industria alimenticia de la leche. Para llevar a cabo este proyecto, se realiza un estudio de los tipos de pasteurización de leche que se aplican hoy en día. Este proceso varía según la cantidad de materia prima a pasteurizar, y a su vez depende de la distribución de la planta y selección de la instrumentación de la misma, de acuerdo a las normativas industriales existentes …


Per-Pixel Calibration For Rgb-Depth Natural 3d Reconstruction On Gpu, Sen Li Jan 2016

Per-Pixel Calibration For Rgb-Depth Natural 3d Reconstruction On Gpu, Sen Li

Theses and Dissertations--Electrical and Computer Engineering

Ever since the Kinect brought low-cost depth cameras into consumer market, great interest has been invigorated into Red-Green-Blue-Depth (RGBD) sensors. Without calibration, a RGBD camera’s horizontal and vertical field of view (FoV) could help generate 3D reconstruction in camera space naturally on graphics processing unit (GPU), which however is badly deformed by the lens distortions and imperfect depth resolution (depth distortion). The camera’s calibration based on a pinhole-camera model and a high-order distortion removal model requires a lot of calculations in the fragment shader. In order to get rid of both the lens distortion and the depth distortion …


Modularity Theory And Internet Regulation, Christopher S. Yoo Jan 2016

Modularity Theory And Internet Regulation, Christopher S. Yoo

All Faculty Scholarship

Modularity is often cited as one of the foundations for the Internet’s success. Unfortunately, academic discussions about modularity appearing in the literature on Internet policy are undertheorized. The persistence of nonmodular architectures for some technologies underscores the need for some theoretical basis for determining when modularity is the preferred approach. Even when modularity is desirable, theory must provide some basis for making key design decisions, such as the number of modules, the location of the interfaces between the modules, and the information included in those interfaces.

The literature on innovation indicates that modules should be determined by the nature of …


Understanding Home Networks With Lightweight Privacy-Preserving Passive Measurement, Xuzi Zhou Jan 2016

Understanding Home Networks With Lightweight Privacy-Preserving Passive Measurement, Xuzi Zhou

Theses and Dissertations--Computer Science

Homes are involved in a significant fraction of Internet traffic. However, meaningful and comprehensive information on the structure and use of home networks is still hard to obtain. The two main challenges in collecting such information are the lack of measurement infrastructure in the home network environment and individuals’ concerns about information privacy.

To tackle these challenges, the dissertation introduces Home Network Flow Logger (HNFL) to bring lightweight privacy-preserving passive measurement to home networks. The core of HNFL is a Linux kernel module that runs on resource-constrained commodity home routers to collect network traffic data from raw packets. Unlike prior …


Monitoring Voip Speech Quality For Chopped And Clipped Speech, Andrew Hines, Jan Skoglund, Anil C. Kokaram, Naomi Harte Jan 2016

Monitoring Voip Speech Quality For Chopped And Clipped Speech, Andrew Hines, Jan Skoglund, Anil C. Kokaram, Naomi Harte

Articles

No abstract provided.


Evaluation Of Classification And Ensemble Algorithms For Bank Customer Marketing Response Prediction, Olatunji Apampa Jan 2016

Evaluation Of Classification And Ensemble Algorithms For Bank Customer Marketing Response Prediction, Olatunji Apampa

Journal of International Technology and Information Management

This article attempts to improve the performance of classification algorithms used in the bank customer marketing response prediction of an unnamed Portuguese bank using the Random Forest ensemble. A thorough exploratory data analysis (EDA) was conducted on the data in order to ascertain the presence of anomalies such as outliers and extreme values. The EDA revealed that the bank data had 45, 211 instances and 17 features, with 11.7% positive responses. This was in addition to the detection of outliers and extreme values. Classification algorithms used for modelling the bank dataset include; Logistic Regression, Decision Tree, Naïve Bayes and the …


Healthcare System-Use Behavior: A Systematic Review Of Its Determinants, Jiming Wu Jan 2016

Healthcare System-Use Behavior: A Systematic Review Of Its Determinants, Jiming Wu

Journal of International Technology and Information Management

To understand patient and physician behavior, researchers have investigated the determinants of using healthcare information systems. Although this stream of research has produced important findings, it has yet to appreciably advance our understanding of system-use behavior in healthcare. To fill this gap, the current paper employs a systematic review to synthesize past research, reveal the key determinants of healthcare system usage, and illuminate a deeper understanding of the topic. This study thus helps healthcare researchers expand their baseline knowledge of these core determinants and conduct more fruitful future research on system-use behavior in healthcare.


Optical Fiber Sensors In Physical Intrusion Detection Systems: A Review, Gary Andrew Allwood, Graham Wild, Steven Hinkley Jan 2016

Optical Fiber Sensors In Physical Intrusion Detection Systems: A Review, Gary Andrew Allwood, Graham Wild, Steven Hinkley

Research outputs 2014 to 2021

Fiber optic sensors have become a mainstream sensing technology within a large array of applications due to their inherent benefits. They are now used significantly in structural health monitoring, and are an essential solution for monitoring harsh environments. Since their first development over 30 years ago, they have also found promise in security applications. This paper reviews all of the optical fiber-based techniques used in physical intrusion detection systems. It details the different approaches used for sensing, interrogation, and networking, by research groups, attempting to secure both commercial and residential premises from physical security breaches. The advantages and the disadvantages …


Fog Computing With Go: A Comparative Study, Ellis H. Butterfield Jan 2016

Fog Computing With Go: A Comparative Study, Ellis H. Butterfield

CMC Senior Theses

The Internet of Things is a recent computing paradigm, de- fined by networks of highly connected things – sensors, actuators and smart objects – communicating across networks of homes, buildings, vehicles, and even people. The Internet of Things brings with it a host of new problems, from managing security on constrained devices to processing never before seen amounts of data. While cloud computing might be able to keep up with current data processing and computational demands, it is unclear whether it can be extended to the requirements brought forth by Internet of Things.

Fog computing provides an architectural solution to …


Novel H.265 Video Traffic Prediction Models Using Artificial Neural Networks, Collin Daly Jan 2016

Novel H.265 Video Traffic Prediction Models Using Artificial Neural Networks, Collin Daly

Honors College Theses

In this work, we propose the use of non-linear, autoregressive neural network models for predicting video frame sizes. This model utilizes H.265 encoded video traces as inputs and the predicted future frame sizes as outputs. This model is developed to predict ultra-high definition video frame encoded with H.265 within IP networks. The video I, P, and B frames are predicted separately to improve model prediction accuracy. This approach is verified in MATLAB using various H.265 video traces. The results indicate that the proposed models were able to predict the video traffic fairly accurately.


The Perceived Business Benefit Of Cloud Computing: An Exploratory Study, Thomas Chen, Ta-Tao Chuang, Kazuo Nakatani Jan 2016

The Perceived Business Benefit Of Cloud Computing: An Exploratory Study, Thomas Chen, Ta-Tao Chuang, Kazuo Nakatani

Journal of International Technology and Information Management

The objective of the research is to study the benefits of cloud computing perceived by adopters and examine the impact of moderating factors on the relationship between the type of cloud computing and the perceived benefit. The moderating factors include firm size and value-chain activities. A measurement instrument of a 5-point Likert scale was administered on businesses of different sizes in Taiwan. The benefit of cloud computing measured in the study were: cost reduction, improved capability and enhanced scalability. The results show that the perceived benefit of cloud computing varies depending on the type of cloud computing, the value chain …


Table Of Contents Jan 2016

Table Of Contents

Journal of International Technology and Information Management

Table of Contents for Volume 25 Number 4


Trends In Commercial-Off-The-Shelf Vs. Proprietary Applications, Vijay K. Agrawal, Vipin K. Agrawal, A. Ross Taylor Jan 2016

Trends In Commercial-Off-The-Shelf Vs. Proprietary Applications, Vijay K. Agrawal, Vipin K. Agrawal, A. Ross Taylor

Journal of International Technology and Information Management

This study examines factors valued by IS managers in deciding if COTS software is a viable alternative to proprietary software. The results indicate managers who anticipate increased usage of COTS packages in 5 years used the same top three factors in the formation of their decisions to adopt COTS as their colleagues who anticipated either zero change in COTS usage or an increased usage of proprietary software used in deciding not to adopt COTS software. Managers anticipating increased COTS usage had a statistically significant higher value for each of those items compared to managers not anticipating growth in COTS software.


Conceptual Models On The Effectiveness Of E-Marketing Strategies In Engaging Consumers, Cheristena Bolos, Efosa C. Idemudia, Phoebe Mai, Mahesh Rasinghani, Shelley Smith Jan 2016

Conceptual Models On The Effectiveness Of E-Marketing Strategies In Engaging Consumers, Cheristena Bolos, Efosa C. Idemudia, Phoebe Mai, Mahesh Rasinghani, Shelley Smith

Journal of International Technology and Information Management

Effective marketing has always been an important factor in business success. Without the ability to identify customers and convince them to purchase the product or service being offered, businesses would not survive. Recent advancements in technology have given rise to new opportunities to engage customers through the use of electronic marketing (e-marketing). E- marketing draws from traditional marketing principles, while also expanding the types of strategies available to companies. Websites, social media, and online marketplaces are just some examples of how businesses are leveraging e-marketing approaches to connect with potential customers. In formulating sound e-marketing strategies, it is important for …


Online Trust Cues: Perceptions And Application, Antonina A. Bauman Jan 2016

Online Trust Cues: Perceptions And Application, Antonina A. Bauman

Journal of International Technology and Information Management

This qualitative study analyzes perceptions of online trust cues as identified by shoppers from three countries: Germany, Russia, and the USA. A novel approach of the repertory grid method is used to study online trust cues in business-to-consumers commercial online transactions. This study resulted in the list of web site elements and features that consumers recognize as trust cues and use to evaluate e-vendor’s trustworthiness. Findings show that out of fourteen categories of online trust cues, identified by online shoppers, three categories of online trust cues are found to be common across three cultures while eleven categories are culture specific. …


Leveraging Heritrix And The Wayback Machine On A Corporate Intranet: A Case Study On Improving Corporate Archives, Justin F. Brunelle, Krista Ferrante, Eliot Wilczek, Michele C. Weigle, Michael L. Nelson Jan 2016

Leveraging Heritrix And The Wayback Machine On A Corporate Intranet: A Case Study On Improving Corporate Archives, Justin F. Brunelle, Krista Ferrante, Eliot Wilczek, Michele C. Weigle, Michael L. Nelson

Computer Science Faculty Publications

In this work, we present a case study in which we investigate using open-source, web-scale web archiving tools (i.e., Heritrix and the Wayback Machine installed on the MITRE Intranet) to automatically archive a corporate Intranet. We use this case study to outline the challenges of Intranet web archiving, identify situations in which the open source tools are not well suited for the needs of the corporate archivists, and make recommendations for future corporate archivists wishing to use such tools. We performed a crawl of 143,268 URIs (125 GB and 25 hours) to demonstrate that the crawlers are easy to set …


Home Networking With Enterprise Equipment, Alex Lowers Jan 2016

Home Networking With Enterprise Equipment, Alex Lowers

Williams Honors College, Honors Research Projects

This project tested various wired and wireless topologies and benchmarked download speeds and quality for various types of media. For music, topology had a negligible impact. High quality video streams were impacted by latency introduced in the wireless topologies. Likewise, video game streaming, especially games of high graphical fidelity, were negatively impacted when streamed over a wireless network. For all types of media, a fully wired topology is recommended.


Determining Unique Agents By Evaluating Web Form Interaction, Ben Cooley Jan 2016

Determining Unique Agents By Evaluating Web Form Interaction, Ben Cooley

Electronic Theses and Dissertations

Because of the inherent risks in today’s online activities, it becomes imperative to identify a malicious user masquerading as someone else. Incorporating biometric analysis enhances the confidence of authenticating valid users over the Internet while providing additional layers of security with no hindrance to the end user. Through the analysis of traffic patterns and HTTP Header analysis, the detection and early refusal of robot agents plays a great role in reducing fraudulent login attempts.


Active Analytics: Adapting Web Pages Automatically Based On Analytics Data, William R. Carle Ii Jan 2016

Active Analytics: Adapting Web Pages Automatically Based On Analytics Data, William R. Carle Ii

UNF Graduate Theses and Dissertations

Web designers are expected to perform the difficult task of adapting a site’s design to fit changing usage trends. Web analytics tools give designers a window into website usage patterns, but they must be analyzed and applied to a website's user interface design manually. A framework for marrying live analytics data with user interface design could allow for interfaces that adapt dynamically to usage patterns, with little or no action from the designers. The goal of this research is to create a framework that utilizes web analytics data to automatically update and enhance web user interfaces. In this research, we …


Applying Dijkstra Algorithm For Solving Neutrosophic Shortest Path Problem, Florentin Smarandache, Luige Vladareanu, Said Broumi, Assia Bakali, Muhammad Akram Jan 2016

Applying Dijkstra Algorithm For Solving Neutrosophic Shortest Path Problem, Florentin Smarandache, Luige Vladareanu, Said Broumi, Assia Bakali, Muhammad Akram

Branch Mathematics and Statistics Faculty and Staff Publications

The selection of shortest path problem is one the classic problems in graph theory. In literature, many algorithms have been developed to provide a solution for shortest path problem in a network. One of common algorithms in solving shortest path problem is Dijkstra’s algorithm. In this paper, Dijkstra’s algorithm has been redesigned to handle the case in which most of parameters of a network are uncertain and given in terms of neutrosophic numbers. Finally, a numerical example is given to explain the proposed algorithm.


We Can Hear You With Wi-Fi!, Guanhua Wang, Yongpan Zou, Zimu Zhou, Kaishun Wu, Lionel M. Ni Jan 2016

We Can Hear You With Wi-Fi!, Guanhua Wang, Yongpan Zou, Zimu Zhou, Kaishun Wu, Lionel M. Ni

Research Collection School Of Computing and Information Systems

Recent literature advances Wi-Fi signals to “see” people’s motions and locations. This paper asks the following question: Can Wi-Fi “hear” our talks? We present WiHear, which enables Wi-Fi signals to “hear” our talks without deploying any devices. To achieve this, WiHear needs to detect and analyze fine-grained radio reflections from mouth movements. WiHear solves this micro-movement detection problem by introducing Mouth Motion Profile that leverages partial multipath effects and wavelet packet transformation. Since Wi-Fi signals do not require line-of-sight, WiHear can “hear” people talks within the radio range. Further, WiHear can simultaneously “hear” multiple people’s talks leveraging MIMO technology. We …


Development Of Compressive Sensing Techniques For Wideband Spectrum Scanning In Cognitive Radio Networks, Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi Dec 2015

Development Of Compressive Sensing Techniques For Wideband Spectrum Scanning In Cognitive Radio Networks, Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi

fatima salahdine

Next generation of communication systems will be smart and frequency agile. They will be able to scan the wideband radio spectrum to find the available frequency channel. This process is called compressive sensing. Existing compressive sensing techniques are not accurate and have high processing time, hardware limitations, and computational cost. Thus, this project aims to develop efficient compressive sensing algorithms that deal with uncertainty and enhance the radio spectrum scanning.
 
 


Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar Dec 2015

Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar

Maurice Dawson

Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …