Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1321 - 1350 of 2125

Full-Text Articles in Computer Engineering

Classification Of Encrypted Web Traffic Using Machine Learning Algorithms, William C. Barto Jun 2013

Classification Of Encrypted Web Traffic Using Machine Learning Algorithms, William C. Barto

Theses and Dissertations

The increasing usage of web services and encrypted network communication makes the network analysis of encrypted web traffic of utmost importance. This research evaluates the feasibility of using ML algorithms to classify web services within encrypted TLS flows. The ML algorithms are compared primarily based on classification accuracy. The runtimes of the classifiers are also considered, as classifiers must be able determine labels quickly in order to be used in near realtime network protection devices. Five ML algorithms are initially considered when analyzing only the first 12 packets: Naive Bayes, NBTree, LibSVM, J4.8, and AdaBoost+J4.8. AdaBoost+J4.8 and J4.8 produce the …


Applied Hypergame Theory For Network Defense, Alan S. Gibson Jun 2013

Applied Hypergame Theory For Network Defense, Alan S. Gibson

Theses and Dissertations

Cyber operations are the most important aspect of military conflicts in the 21st century, but unfortunately they are also among the least understood. The continual battle for network dominance between attackers and defenders is considered to be a complex game. Hypergame theory is an extension of game theory that addresses the kind of games where misperception exists, as is often the case in military engagements. Hypergame theory, like game theory, uses a game model to determine strategy selection, but goes beyond game theory by examining subgames that exist within the full game. The inclusion of misperception and misinformation in the …


Bluelock: A Secure Bluetooth Operated Padlock, Trever Mckee Jun 2013

Bluelock: A Secure Bluetooth Operated Padlock, Trever Mckee

Computer Engineering

For this project a secure, battery operated, Bluetooth operated padlock was created. The project included both the hardware to integrate with a padlock and an Android application used to interface with the hardware. In order to make the padlock secure both AES encryption and challenge response authentication were used for secure message passing between the device and the Android phone. The project also included power consumption and sustainability tuning including exploring Arduino sleep states and integrating the project with a solar charging unit.


Motion Sensing Fifa Controller, Anthony Agius, Jake Troychak Jun 2013

Motion Sensing Fifa Controller, Anthony Agius, Jake Troychak

Computer Engineering

Our Project is designed to control the XBOX 360 video game FIFA Soccer by different kicking motions made by the user. This system consists of two pieces: the microcontroller attached to the XBOX 360 controller and the foot piece that is attached to the users foot in order to read all of the movements needed to control the game. Our project brings the soccer game to life by forcing the users to actually perform the different kicking motions that they want their game avatar to copy on the game. This project was designed for those who want to be more …


Pier Portal Project Ii, Andy Lam, Brian Markwart Jun 2013

Pier Portal Project Ii, Andy Lam, Brian Markwart

Computer Engineering

The goal of this project is to design and build a remotely controllable camera system that will be deployed at the Cal Poly Pier located in Avila Beach. The system is composed of a camera and all of its lighting and movement controlling hardware enclosed into a waterproof acrylic tube, allowing it to be lowered underwater. The camera will stream its video feed onto a website where any user will be able to watch a live video stream from the pod. In addition, users with the correct privileges will be able to remotely control of the camera system via the …


Aurora: Experience Music Like Never Before, Jason Dreisbach Jun 2013

Aurora: Experience Music Like Never Before, Jason Dreisbach

Computer Engineering

Choreographing musical light shows has previously required expensive professional equipment and experienced personnel. A Mac application, Aurora, was developed to control Phillips Hue Light LED light bulbs to emulate the effects of more complex professional lighting systems. Aurora makes it possible to choreograph dazzling lighting effects to musical tracks.


Smartpark, David Cosgrove Jun 2013

Smartpark, David Cosgrove

Computer Engineering

No abstract provided.


Motohud: Intelligent And Safe Navigational Data Presentation For Motorcyclists, Drew Bentz, William Budney Jun 2013

Motohud: Intelligent And Safe Navigational Data Presentation For Motorcyclists, Drew Bentz, William Budney

Computer Engineering

The system uses a GPS (Global Positioning System) sensor, Bluetooth modem, and OLED (organic light-emitting diode) screen to display navigational information to a motorcycle rider. Currently supported navigational information are speed and heading, with a framework in place for future turn-by-turn navigation. The system is powered by a lithium-ion battery pack and controlled by an Arduino Micro. For turn-by-turn navigation, an Android powered smartphone running our Android App is required. Our system aims to reduce safety hazards from having to tilt or move one’s head when trying to view speed on a motorcycle speedometer, which is usually mounted down by …


Design Of An Energy Efficient Virtual End Node Client Using Openadr2.0a And Smap, Kevin Navero Jun 2013

Design Of An Energy Efficient Virtual End Node Client Using Openadr2.0a And Smap, Kevin Navero

BioResource and Agricultural Engineering

Demand Response (DR) describes the set of actions taken to impose a reduction in electrical loads to stabilize the power grid and decrease costs. It is used when power grid emergencies or extremely high demand and congestion, threaten the electricity supply-demand balance. Automated Demand Response (ADR) describes a web-based control system that triggers DR events automatically by signaling other pre-programmed control systems. This project intends to use the OpenADR2.0 specifications provided by the OpenADR Alliance to construct an open source Virtual End Node (VEN) client to retrieve DR signals. The Simple Measurement and Actuation Profile (sMAP) software is also used …


Tmc Simulator, Stuart Heater Jun 2013

Tmc Simulator, Stuart Heater

Computer Science and Software Engineering

The goal of this project was to design and implement a graphical user interface which simulates TriTech's VisiCad Inform computer- aided dispatch well enough for trainees to learn how to efficiently and accurately use the software in a risk-free environment. The simulator should also allow the training proctor to actively create new incidents during training in order to ensure that the trainees are able to respond properly. The structure of this project allowed me to work with both more- and less-experienced programmers, particularly those who are far more experienced with networking and hardware than myself. It was my first time …


Cuda Enhanced Filtering In A Pipelined Video Processing Framework, Austin Aaron Dworaczyk Wiltshire Jun 2013

Cuda Enhanced Filtering In A Pipelined Video Processing Framework, Austin Aaron Dworaczyk Wiltshire

Master's Theses

The processing of digital video has long been a significant computational task for modern x86 processors. With every video frame composed of one to three planes, each consisting of a two-dimensional array of pixel data, and a video clip comprising of thousands of such frames, the sheer volume of data is significant. With the introduction of new high definition video formats such as 4K or stereoscopic 3D, the volume of uncompressed frame data is growing ever larger.

Modern CPUs offer performance enhancements for processing digital video through SIMD instructions such as SSE2 or AVX. However, even with these instruction sets, …


Path Loss In An Urban Peer-To-Peer Channel For Six Public-Safety Frequency Bands, David W. Matolak, Qian Zhang, Qiong Wu Jun 2013

Path Loss In An Urban Peer-To-Peer Channel For Six Public-Safety Frequency Bands, David W. Matolak, Qian Zhang, Qiong Wu

Faculty Publications

We provide path loss data and models for a peer-to-peer wireless channel for an urban environment in six public safety bands, for simultaneous transmission to five spatially separated receiving sites. Results are from measurements in Denver, Colorado. The six frequencies at which we measured are (in MHz) 430, 750, 905, 1834, 2400, and 4860. Both line-of-sight and non-line-of-sight conditions were covered, and we quantify path loss exponents and linear-fit standard deviations as functions of frequency and location. Line-of-sight results agree with prior work, but non-line-of-sight exponents, from 3.6-7.3, are generally larger than in most other references.


Network Self-Organization In The Internet Of Things, Arjun Athreya, Patrick Tague May 2013

Network Self-Organization In The Internet Of Things, Arjun Athreya, Patrick Tague

Patrick Tague

The Internet of Things is a paradigm that allows the interaction of ubiquitous devices through a network to achieve common goals. This paradigm like any man-made infrastructure is subject to disasters, outages and other adversarial conditions. Under these situations provisioned communications fail, rendering this paradigm with little or no use. Hence, network self-organization among these devices is needed to allow for communication resilience. This paper presents a survey of related work in the area of self-organization and discusses future research opportunities and challenges for self-organization in the Internet of Things. We begin this paper with a system perspective of the …


Asia: Accelerated Secure In-Network Aggregation In Vehicular Sensing Networks, Xiao Wang, Patrick Tague May 2013

Asia: Accelerated Secure In-Network Aggregation In Vehicular Sensing Networks, Xiao Wang, Patrick Tague

Patrick Tague

Vehicular Ad-Hoc Networks (VANETs) can potentially become a sensing platform. In-network aggregation, a fundamental primitive for querying sensory data, has been shown to reduce overall communication overhead at large. To secure data aggregation in VANETs, existing schemes mainly rely on digital signatures. However, generating and verifying such signatures can cause high computational overhead. More importantly, time-consuming verifications lead to the vulnerability to signature flooding attacks in which a receiver cannot timely verify all messages before their respective deadlines. In this paper, we propose ASIA as an Accelerated Secure In-network Aggregation strategy that can accelerate message verifications and significantly reduce computational …


Unlocin: Unauthorized Location Inference On Smartphones Without Being Caught, Le Nguyen, Yuan Tian, Sungho Cho, Wookjong Kwak, Sanjay Parab, Yu Seung Kim, Patrick Tague, Joy Zhang May 2013

Unlocin: Unauthorized Location Inference On Smartphones Without Being Caught, Le Nguyen, Yuan Tian, Sungho Cho, Wookjong Kwak, Sanjay Parab, Yu Seung Kim, Patrick Tague, Joy Zhang

Patrick Tague

Location privacy has become one of the critical issues in the smartphone era. Since users carry their phones everywhere and all the time, leaking users’ location information can have dangerous implications. In this paper, we leverage the idea that Wi-Fi parameters not considered to be “sensitive” in the Android platform can be exploited to learn users’ location. Though the idea of using Wi-Fi information to breach location privacy is not new, we extend the basic idea and show that clever attackers can do so without being detected by current malware detection techniques. To achieve this goal, we develop the Unauthorized …


How To Jam Without Getting Caught: Analysis And Empirical Study Of Stealthy Periodic Jamming, Bruce Debruhl, Patrick Tague May 2013

How To Jam Without Getting Caught: Analysis And Empirical Study Of Stealthy Periodic Jamming, Bruce Debruhl, Patrick Tague

Patrick Tague

Despite the widespread commercial use of spread spectrum technology, advanced algorithms and modern hardware capabilities still allows efficient denial-of-service attacks against wireless communication systems using jamming. Much of the recent work on jamming mitigation has focused on how to adjust the transmitter-receiver system once a jamming attack has been detected. However, characterizing the detectability of certain classes of jamming attacks remains a largely unstudied problem. We aim to narrow this gap by analyzing the effect of a class of periodic jamming attacks on the attack detection metrics of packet delivery ratio (PDR) and received signal strength (RSS). We show that …


Stochastic Optimization Of Flow-Jamming Attacks In Multichannel Wireless Networks, Yu Seung Kim, Bruce Debruhl, Patrick Tague May 2013

Stochastic Optimization Of Flow-Jamming Attacks In Multichannel Wireless Networks, Yu Seung Kim, Bruce Debruhl, Patrick Tague

Patrick Tague

An attacker can launch an efficient jamming attack to deny service to flows in wireless networks by using cross-layer knowledge of the target network. For example, flow-jamming defined in existing work incorporates network layer information into the conventional jamming attack to maximize its attack efficiency. In this paper, we redefine a discrete optimization model of flow-jamming in multichannel wireless networks and provide metrics to evaluate the attack efficiency. We then propose the use of stochastic optimization techniques for flow-jamming attacks by using three stochastic search algorithms: iterative improvement, simulated annealing, and genetic algorithm. By integrating the algorithms into a simulation …


Adaptive Wireless Communications: Mimo Channels And Networks, Daniel Bliss, Siddhartan Govindasamy May 2013

Adaptive Wireless Communications: Mimo Channels And Networks, Daniel Bliss, Siddhartan Govindasamy

Siddhartan Govindasamy

Adopting a balanced mix of theory, algorithms and practical design issues, this comprehensive volume explores cutting-edge applications in adaptive wireless communications and the implications these techniques have for future wireless network performance. Presenting practical concerns in the context of different strands from information theory, parameter estimation theory, array processing and wireless communication, the authors present a complete picture of the field. Topics covered include advanced multiple-antenna adaptive processing, ad hoc networking, MIMO, MAC protocols, space-time coding, cellular networks and cognitive radio, with the significance and effects of both internal and external interference a recurrent theme throughout. A broad, self-contained technical …


Mobile Computing: Challenges And Opportunities For Autonomy And Feedback, Ole J. Mengshoel, Bob Iannucci, Abe Ishihara May 2013

Mobile Computing: Challenges And Opportunities For Autonomy And Feedback, Ole J. Mengshoel, Bob Iannucci, Abe Ishihara

Ole J Mengshoel

Mobile devices have evolved to become computing platforms more similar to desktops and workstations than the cell phones and handsets of yesteryear. Unfortunately, today’s mobile infrastructures are mirrors of the wired past. Devices, apps, and networks impact one another, but a systematic approach for allowing them to cooperate is currently missing. We propose an approach that seeks to open key interfaces and to apply feedback and autonomic computing to improve both user experience and mobile system dynamics.


Adaptive Control Of Apache Web Server, Erik Reed, Abe Ishihara, Ole J. Mengshoel May 2013

Adaptive Control Of Apache Web Server, Erik Reed, Abe Ishihara, Ole J. Mengshoel

Ole J Mengshoel

Traffic to a Web site can vary dramatically. At the same time it is highly desirable that a Web site is reactive. To provide crisp interaction on thin clients, 150 milliseconds has been suggested as an upper bound on response time. Unfortunately, the popular Apache Web server is limited in its capabilities to be reactive under varying traffic. To address this problem, we design in this paper an adaptive controller for the Apache Web server. A modified recursive least squares algorithm is used to identify system dynamics and a minimum degree pole placement controller is implemented to adjust the maximum …


What’S The Big Deal With Big Data?, Singapore Management University May 2013

What’S The Big Deal With Big Data?, Singapore Management University

Perspectives@SMU

Big Data does not necessarily cost big bucks, and smaller companies can benefit from it too. There are companies - branded consumer companies - which have developed technologies to scan the broad variety of data sources. What they’re doing is testing the success and popularity of their own products by seeing how often they crop up.


Tor Bridge Distribution Powered By Threshold Rsa, Jordan Hunter Deyton May 2013

Tor Bridge Distribution Powered By Threshold Rsa, Jordan Hunter Deyton

Masters Theses

Since its inception, Tor has offered anonymity for internet users around the world. Tor now offers bridges to help users evade internet censorship, but the primary distribution schemes that provide bridges to users in need have come under attack. This thesis explores how threshold RSA can help strengthen Tor's infrastructure while also enabling more powerful bridge distribution schemes. We implement a basic threshold RSA signature system for the bridge authority and a reputation-based social network design for bridge distribution. Experimental results are obtained showing the possibility of quick responses to requests from honest users while maintaining both the secrecy and …


An Online Algorithm For The 2-Server Problem On The Line With Improved Competitiveness, Lucas Adam Bang May 2013

An Online Algorithm For The 2-Server Problem On The Line With Improved Competitiveness, Lucas Adam Bang

UNLV Theses, Dissertations, Professional Papers, and Capstones

In this thesis we present a randomized online algorithm for the 2-server problem on the line, named R-LINE (for Randomized Line). This algorithm achieves the lowest competitive ratio of any known randomized algorithm for the 2-server problem on the line.

The competitiveness of R-LINE is less than 1.901. This result provides a significant improvement over the previous known competitiveness of 155/78 (approximately 1.987), by Bartal, Chrobak, and Larmore, which was the first randomized algorithm for the 2-server problem one the line with competitiveness less than 2. Taking inspiration from this algorithm,we improve this result by utilizing ideas from T-theory, game …


Wireless Transmission Network : A Imagine, Radhey Shyam Meena Engineer, Neeraj Kumar Garg Asst.Prof Apr 2013

Wireless Transmission Network : A Imagine, Radhey Shyam Meena Engineer, Neeraj Kumar Garg Asst.Prof

Radhey Shyam Meena

World cannot be imagined without electrical power. Generally the power is transmitted through transmission networks. This paper describes an original idea to eradicate the hazardous usage of electrical wires which involve lot of confusion in particularly organizing them. Imagine a future in which wireless power transfer is feasible: cell phones, household robots, mp3 players, laptop computers and other portable electronic devices capable of charging themselves without ever being plugged in freeing us from that final ubiquitous power wire. This paper includes the techniques of transmitting power without using wires with an efficiency of about 95% with non-radioactivemethods. In this paper …


Design And Implementation Of A Hybrid Technology Networking System, Sushanta Mohan Rakshit Apr 2013

Design And Implementation Of A Hybrid Technology Networking System, Sushanta Mohan Rakshit

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

The safety of rail transport has always been the top priority for the Federal
Railroad Administration (FRA). Legacy technology, like wayside monitoring, is still
in place and is largely relied upon for detection of faults. Modern technology like
Radio Frequency Identification (RFID) has been introduced recently. However, this
is largely used to detect a particular railcar rather than to monitor it for problems.
Wireless Sensor Network (WSN) technology is being evaluated by the railroads for real-time or near real-time monitoring of the status of railcars for timely response to problems and also for trend analysis.

ZigBee has been the networking …


Strong Location Privacy: A Case Study On Shortest Path Queries [Invited Paper], Kyriakos Mouratidis Apr 2013

Strong Location Privacy: A Case Study On Shortest Path Queries [Invited Paper], Kyriakos Mouratidis

Research Collection School Of Computing and Information Systems

The last few years have witnessed an increasing availability of location-based services (LBSs). Although particularly useful, such services raise serious privacy concerns. For example, exposing to a (potentially untrusted) LBS the client's position may reveal personal information, such as social habits, health condition, shopping preferences, lifestyle choices, etc. There is a large body of work on protecting the location privacy of the clients. In this paper, we focus on shortest path queries, describe a framework based on private information retrieval (PIR), and conclude with open questions about the practicality of PIR and other location privacy approaches.


Lightweight Middleware For Software Defined Radio (Sdr) Inter-Components Communication, Pasd Putthapipat Apr 2013

Lightweight Middleware For Software Defined Radio (Sdr) Inter-Components Communication, Pasd Putthapipat

FIU Electronic Theses and Dissertations

The ability to use Software Defined Radio (SDR) in the civilian mobile applications will make it possible for the next generation of mobile devices to handle multi-standard personal wireless devices and ubiquitous wireless devices. The original military standard created many beneficial characteristics for SDR, but resulted in a number of disadvantages as well. Many challenges in commercializing SDR are still the subject of interest in the software radio research community. Four main issues that have been already addressed are performance, size, weight, and power.

This investigation presents an in-depth study of SDR inter-components communications in terms of total link delay …


Data Mining The Harness Track And Predicting Outcomes, Robert P. Schumaker Apr 2013

Data Mining The Harness Track And Predicting Outcomes, Robert P. Schumaker

Journal of International Technology and Information Management

This paper presented the S&C Racing system that uses Support Vector Regression (SVR) to predict harness race finishes and analyzed it on fifteen months of data from Northfield Park. We found that our system outperforms the most common betting strategies of wagering on the favorites and the mathematical arbitrage Dr. Z system in five of the seven wager types tested. This work would suggest that an informational inequality exists within the harness racing market that is not apparent to domain experts.


Energy-Efficient Soft Real-Time Scheduling For Parameter Estimation In Wsns, Senlin Zhang, Zixiang Wang, Meikang Qiu, Meiqin Liu Apr 2013

Energy-Efficient Soft Real-Time Scheduling For Parameter Estimation In Wsns, Senlin Zhang, Zixiang Wang, Meikang Qiu, Meiqin Liu

Electrical and Computer Engineering Faculty Publications

In wireless sensor networks (WSNs), homogeneous or heterogenous sensor nodes are deployed at a certain area to monitor our curious target. The sensor nodes report their observations to the base station (BS), and the BS should implement the parameter estimation with sensors’ data. Best linear unbiased estimation (BLUE) is a common estimator in the parameter estimation. Due to the end-to-end packet delay, it takes some time for the BS to receive sufficient data for the estimation. In some soft real-time applications, we expect that the estimation can be completed before the deadline with a probability. The existing approaches usually guarantee …


An Probability-Based Energy Model On Cache Coherence Protocol With Mobile Sensor Network, Jihe Wang, Bing Guo, Meikang Qiu Apr 2013

An Probability-Based Energy Model On Cache Coherence Protocol With Mobile Sensor Network, Jihe Wang, Bing Guo, Meikang Qiu

Electrical and Computer Engineering Faculty Publications

Mobile sensor networks (MSNs) are widely used in various domains to monitor, record, compute, and interact the information within an environment. To prolong the life time of each node in MSNs, energy model and conservation should be considered carefully when designing the data communication mechanism in the network. The limited battery volume and high workload on channels worsen the life times of the busy nodes. In this paper, we propose a new energy evaluating methodology of packet transmissions in MSNs, which is based on redividing network layers and describing the synchronous data flow with matrix form. We first introduce the …