Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

2009

Institution
Keyword
Publication
Publication Type
File Type

Articles 31 - 60 of 157

Full-Text Articles in Computer Engineering

Design Of Acousto-Optic Chaos Based Secure Free-Space Optical Communication Links, Anjan K. Ghosh, Pramode K. Verma, Samuel Cheng, Robert C. Huck, Monish Ranjan Chatterjee, Mohammed A. Al-Saedi Aug 2009

Design Of Acousto-Optic Chaos Based Secure Free-Space Optical Communication Links, Anjan K. Ghosh, Pramode K. Verma, Samuel Cheng, Robert C. Huck, Monish Ranjan Chatterjee, Mohammed A. Al-Saedi

Electrical and Computer Engineering Faculty Publications

We discuss the design of an acousto-optic cell based free space optical communication link where the data beam is made secure through chaos encryption. Using external signal modulation of the diffracted light from a hybrid acousto-optic cell chaos (or directly via incorporation in the sound-cell driver's bias voltage) encryption of data is possible. We have shown numerically that decryption of the encoded data is possible by using an identical acousto-optic system in the receiver.


A Review On Load Flow Studies, Dr. Adel A. Elbaset Jul 2009

A Review On Load Flow Studies, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Controlled Islanding Scheme For Power Systems, Dr. Adel A. Elbaset Jul 2009

Controlled Islanding Scheme For Power Systems, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Seminar In Kumamoto University, 11-6-2009 (Protection), Dr. Adel A. Elbaset Jun 2009

Seminar In Kumamoto University, 11-6-2009 (Protection), Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

This Seminar about a Novel protective scheme for Transmission line Presented by me in Kumamoto University, Graduate School of Science and Technology, Japan at 11-6-2009.


Demonstration Of Bias-Controlled Algorithmic Tuning Of Quantum Dots In A Well (Dwell) Midir Detectors, Woo-Yong Jang, Majeed M. Hayat, J. Scott Tyo, Ram S. Attaluri, Thomas E. Vandervelde, Yagya D. Sharma, Rajeev Shenoi, Andreas Stintz, Elizabeth R. Cantwell, Steven C. Bender, Sang Jun Lee, Sam Kyu Noh, Sanjay Krishna Jun 2009

Demonstration Of Bias-Controlled Algorithmic Tuning Of Quantum Dots In A Well (Dwell) Midir Detectors, Woo-Yong Jang, Majeed M. Hayat, J. Scott Tyo, Ram S. Attaluri, Thomas E. Vandervelde, Yagya D. Sharma, Rajeev Shenoi, Andreas Stintz, Elizabeth R. Cantwell, Steven C. Bender, Sang Jun Lee, Sam Kyu Noh, Sanjay Krishna

Electrical and Computer Engineering Faculty Research and Publications

The quantum-confined Stark effect in intersublevel transitions present in quantum-dots-in-a-well (DWELL) detectors gives rise to a midIR spectral response that is dependent upon the detector's operational bias. The spectral responses resulting from different biases exhibit spectral shifts, albeit with significant spectral overlap. A postprocessing algorithm was developed by Sakoglu that exploited this bias-dependent spectral diversity to predict the continuous and arbitrary tunability of the DWELL detector within certain limits. This paper focuses on the experimental demonstration of the DWELL-based spectral tuning algorithm. It is shown experimentally that it is possible to reconstruct the spectral content of a target electronically without …


A Graph-Based Approach To Symbolic Functional Decomposition Of Finite State Machines, Piotr Szotkowski, Mariusz Rawski, Henry Selvaraj Jun 2009

A Graph-Based Approach To Symbolic Functional Decomposition Of Finite State Machines, Piotr Szotkowski, Mariusz Rawski, Henry Selvaraj

Electrical & Computer Engineering Faculty Research

This paper discusses the symbolic functional decomposition method for implementing finite state machines in field-programmable gate array devices. This method is a viable alternative to the presently widespread two-step approaches to the problem, which consist of separate encoding and mapping stages; the proposed method does not have a separate decomposition step instead, the state's final encoding is introduced gradually on every decomposition iteration. Along with general description of the functional symbolic decomposition method's steps, the paper discusses various algorithms implementing the method and presents an example realisation of the most interesting algorithm. In the end, the paper compares the results …


Communications And Positioning In Wireless Networks, Yao Zhao Jun 2009

Communications And Positioning In Wireless Networks, Yao Zhao

Dissertations

My doctoral research for the past three years is presented in this report. My research mainly focuses on the communications and positioning for wireless networks and is composed of three parts. First, I explored a new Turbo frequency equalization technique for multiple-input multiple-output (MIMO) wireless communications systems to improve the performance of wireless communications. In the second part of my research, I studied the multiple antenna cooperative communications from the perspective of information theories. The third part of my work is dedicated to extensive research on positioning technology for wireless networks using knowledge of the estimation theory in signal processing.


Design And Implementation Of A Byzantine Fault Tolerance Framework For Web Services, Wenbing Zhao Jun 2009

Design And Implementation Of A Byzantine Fault Tolerance Framework For Web Services, Wenbing Zhao

Electrical and Computer Engineering Faculty Publications

Many Web services are expected to run with high degree of security and dependability. To achieve this goal, it is essential to use a Web services compatible framework that tolerates not only crash faults, but Byzantine faults as well, due to the untrusted communication environment in which the Web services operate. In this paper, we describe the design and implementation of such a framework, called BFT-WS. BFT-WS is designed to operate on top of the standard SOAP messaging framework for maximum interoperability. It is implemented as a pluggable module within the Axis2 architecture, as such, it requires minimum changes …


Affine Region Tracking And Augmentation Using Mser And Adaptive Sift Model Generation, Matthew James Marano Jun 2009

Affine Region Tracking And Augmentation Using Mser And Adaptive Sift Model Generation, Matthew James Marano

Master's Theses

Relatively complex Augmented Reality (AR) algorithms are becoming widely available due to advancements in affordable mobile computer hardware. To take advantage of this a new method is developed for tracking 2D regions without a prior knowledge of an environment and without developing a computationally expensive world model. In the method of this paper, affinely invariant planar regions in a scene are found using the Maximally Stable Extremal Region (MSER) detector. A region is selected by the user to define a search space, and then the Scale Invariant Feature Transform (SIFT) is used to detect affine invariant keypoints in the region. …


Cybercrime And The 2012 London Olympics, Denis Edgar-Nevill May 2009

Cybercrime And The 2012 London Olympics, Denis Edgar-Nevill

Annual ADFSL Conference on Digital Forensics, Security and Law

The London 2012 Olympics is just three years away and the clock is ticking to put in place plans get it right. The potential for cybercrime to cause harm during this event is very great; harm to national reputation, harm to the reputation to the Olympic movement, and harm to individuals competing, watching or officiating. This paper considers the need to address these risks by taking a look at what has happened in the past at sporting events and the rising wave of electronic security threats and fraud facilitated by computers at recent Olympics. The problems for law enforcement are …


Methodology For Investigating Individuals Online Social Networking Persona, Jonathan T. Rajewski May 2009

Methodology For Investigating Individuals Online Social Networking Persona, Jonathan T. Rajewski

Annual ADFSL Conference on Digital Forensics, Security and Law

When investigators from either the private or public sector review digital data surrounding a case for evidentiary value, they typically conduct a systematic categorization process to identify the relevant digital devices. Armed with the proper methodology to accomplish this task, investigators can quickly recognize the appropriate digital devices for forensic processing and review. This paper purposes a methodology for investigating an individual’s online social networking persona.

Keywords: Social Networking, Web 2.0, Internet Investigations, Online Social Networking Community


Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler May 2009

Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.

Keywords: Bluetooth hacking, mobile phone hacking, wireless hacking


Concerning File Slack, Stephen P. Larson May 2009

Concerning File Slack, Stephen P. Larson

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we discuss the phenomena known as file slack. File slack is created each time a file is created on a hard disk, and can contain private or confidential data. Unfortunately, the methods used by Microsoft Windows operating systems to organize and save files require file slack, and users have no control over what data is saved in file slack. This document will help create awareness about the security issue of file slack and discuss research results concerning file slack.

Keywords : Computer Forensics, File Slack, Ram Slack, Disk Slack


The Computer Fraud And Abuse Act And The Law Of Unintended Consequences, Milton Luoma, Vicki Luoma May 2009

The Computer Fraud And Abuse Act And The Law Of Unintended Consequences, Milton Luoma, Vicki Luoma

Annual ADFSL Conference on Digital Forensics, Security and Law

One of the most unanticipated results of the Computer Fraud and Abuse Act arose from the law of unintended consequences. The CFAA was originally enacted in 1984 to protect federal government computers from intrusions and damage caused by hackers, identity thieves, and other cyber criminals. The law was later amended to extend the scope of its application to financial institutions’, business’s and consumers’ computers. To aid in the pursuit of cyber criminals, one of the subsequent revisions to the law included provision “G” that gave the right to private parties to seek compensation for damages in a civil action for …


Why Are We Not Getting Better At Data Disposal?, Andy Jones May 2009

Why Are We Not Getting Better At Data Disposal?, Andy Jones

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper describes two sets of research, the first of which has been carried out over a period of four years into the levels and types of information that can be found on computer hard disks that are offered for sale on the second hand market. The second research project examined a number of second-hand hand held devices including PDAs, mobile (cell) phones and RIM Blackberry devices. The primary purpose of this research was to gain an understanding of the reasons for the failure to effectively remove potentially sensitive information from the disks and handheld devices. Other objectives included determining …


Don’T Touch That! And Other E-Discovery Issues, Linda Volonino May 2009

Don’T Touch That! And Other E-Discovery Issues, Linda Volonino

Annual ADFSL Conference on Digital Forensics, Security and Law

The ability to preserve and access electronically stored information (ESI) took on greater urgency when amendments to the Federal Rules of Civil Procedure went into effect in December 2006. These amendments, referred to as the electronic discovery (e-discovery) amendments, focus on the discovery phase of civil litigation, audits, or investigations. Discovery is the investigative phase of a legal case when opponents learn what evidence is available and how accessible it is. When ESI is the subject of discovery, it is called e-discovery. Recognizing that most business and personal records and communications are electronic, Judge Shira A. Scheindlin stated, "We used …


Analysis Of The ‘Db’ Windows Registry Data Structure, Damir Kahvedžić, Tahar Kechadi May 2009

Analysis Of The ‘Db’ Windows Registry Data Structure, Damir Kahvedžić, Tahar Kechadi

Annual ADFSL Conference on Digital Forensics, Security and Law

The Windows Registry stores a wide variety of data representing a host of different user properties, settings and program information. The data structures used by the registry are designed to be adaptable to store these differences in a simple format. In this paper we will highlight the existence of a rare data structure that is used to store a large amount of data within the registry hives. We analyse the manner in which this data structure stores its data and the implications that it may have on evidence retrieval and digital investigation. In particular, we reveal that the three of …


Correlating Orphaned Windows Registry Data Structures, Damir Kahvedžić, Tahar Kechadi May 2009

Correlating Orphaned Windows Registry Data Structures, Damir Kahvedžić, Tahar Kechadi

Annual ADFSL Conference on Digital Forensics, Security and Law

Recently, it has been shown that deleted entries of the Microsoft Windows registry (keys) may still reside in the system files once the entries have been deleted from the active database. Investigating the complete keys in context may be extremely important from both a Forensic Investigation point of view and a legal point of view where a lack of context can bring doubt to an argument. In this paper we formalise the registry behaviour and show how a retrieved value may not maintain a relation to the part of the registry it belonged to and hence lose that context. We …


Graduate Accounting Students' Perception Of It Forensics: A Multi-Dimensional Analysis, Grover S. Kearns May 2009

Graduate Accounting Students' Perception Of It Forensics: A Multi-Dimensional Analysis, Grover S. Kearns

Annual ADFSL Conference on Digital Forensics, Security and Law

Forensics and information technology (IT) have become increasingly important to accountants and auditors. Undergraduate accounting students are introduced to general IT topics but discussion of forensic knowledge is limited. A few schools have introduced an undergraduate major in forensic accounting. Some graduate schools offer accounting students an emphasis in forensic or fraud accounting that includes instruction in forensics and information technology. When students do not view the IT topics as being equally important to their careers as traditional accounting topics, these attitudes may reduce the quality of the course. In an effort to assess student attitudes, a survey of 46 …


Visualization Of Honeypot Data Using Graphviz And Afterglow, Craig Valli May 2009

Visualization Of Honeypot Data Using Graphviz And Afterglow, Craig Valli

Annual ADFSL Conference on Digital Forensics, Security and Law

This research in progress paper explores the use of Graphviz and Afterglow for the analysis of data emanating from a honeypot system. Honeypot systems gather a wide range of data that is often difficult to readily search for patterns and trends using conventional log file analysis techniques. The data from the honeypots has been statically extracted and processed through Afterglow scripts to produce inputs suitable for use by the DOT graph based tools contained within Graphviz. This paper explores some of the benefits and drawbacks of currently using this type of approach.

Keywords: honeypot, network forensics, visualization, Graphviz, Afterglow


An Adaptive Adjacent Channel Interference Cancellation Technique, Robert H. Morelos-Zaragoza, Shobha Kuruba May 2009

An Adaptive Adjacent Channel Interference Cancellation Technique, Robert H. Morelos-Zaragoza, Shobha Kuruba

Robert Henry Morelos-Zaragoza

In this paper, an adaptive adjacent channel interference (ACI) technique is proposed. Results for BPSK modulation with rectangular and square-root raised-cosine pulse shaping, under AWGN conditions, are obtained showing the proposed method to be effective in improving performance under high levels of interference. Basically, the idea is to send pilot signals and then to use them in estimating the amount of ACI in the frequency domain. The estimated spectral error is used to modify tap weights of an adaptive frequency-domain filter. Our simulation results reported suggest that ACI can be effectively reduced with the proposed technique. At the system level, …


Robust Image And Video Coding With Adaptive Rate Control, Hongqiang Wang May 2009

Robust Image And Video Coding With Adaptive Rate Control, Hongqiang Wang

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

This dissertation is focused on the problem of rate allocation in a resource constrained environment and robustness of video coding over noise channels. A new rate allocation scheme that combines the traditional PCRD-Opt algorithm with the rho domain analysis is proposed for wavelet based image coders. The proposed scheme provides competitive performance as compared with the optimal PCRD-Opt algorithm, while with great reduction on complexity and computational costs. Rate allocation is developed for the Region-Of-Interest (ROI) in the wavelet transform domain for image coding. A recursive region growing method that deter mines the ROI in the transform domain is proposed. …


Text Categorization Based On Apriori Algorithm's Frequent Itemsets, Prathima Madadi May 2009

Text Categorization Based On Apriori Algorithm's Frequent Itemsets, Prathima Madadi

UNLV Theses, Dissertations, Professional Papers, and Capstones

Automatic Text categorization is the task of assigning an electronic document to one or more categories, based on its contents. There are many known techniques to efficiently solve categorization problems. Typically these techniques fall into two distinct methodologies which are either logic based or probabilistic. In recent years, many researchers have tried approaches which area hybrid of these two methodologies.

In this thesis, we deal with document categorization using Apriori Algorithm. The Apriori algorithm was initially developed for data mining and basket analysis applications in the relational databases. Although the technique is logic based, it also relies on the statistical …


Human Identification Using Pyroelectric Infrared Sensors, Aron E. Suppes May 2009

Human Identification Using Pyroelectric Infrared Sensors, Aron E. Suppes

UNLV Theses, Dissertations, Professional Papers, and Capstones

The objective of this thesis is to discuss the viability of using pyroelectric infrared (PIR) sensors as a biometric system for human identification.

The human body emits infrared radiation, the distribution of which varies throughout the body, and depends upon the shape and composition of the particular body part. A PIR sensor utilizing a Fresnel lens will respond to this infrared radiation. When a human walks, the motion of the body's individual components form a characteristic gait that is likely to affect a PIR sensor field in a unique way.

A statistical model, such as a Hidden Markov Model, could …


Lipid Production From Microalgae As A Promising Candidate For Biodiesel Production, Arief Widjaja Apr 2009

Lipid Production From Microalgae As A Promising Candidate For Biodiesel Production, Arief Widjaja

Makara Journal of Technology

Recently, several strains of microalgae have been studied as they contain high lipid content capable to be converted to biodiesel. Fresh water microalgae Chlorella vulgaris studied in this research was one of the proof as it contained high triacyl glyceride which made it a potential candidate for biodiesel production. Factors responsible for good growing of microalgae such as CO2 and nitrogen concentration were investigated. It was found that total lipid content was increased after exposing to media with not enough nitrogen concentration. However, under this nitrogen depletion media, the growth rate was very slow leading to lower lipid productivity. The …


Improved Predictive Power Control Of Cdma System In Rayleigh Fading Channel, Adit Kurniawan, Iskandar Iskandar, Sayid Machdar Apr 2009

Improved Predictive Power Control Of Cdma System In Rayleigh Fading Channel, Adit Kurniawan, Iskandar Iskandar, Sayid Machdar

Makara Journal of Technology

In this paper an improved prediction-based power control is proposed for code division multiple access (CDMA) systems in Rayleigh fading channel environments. One of the most serious problems which degrades the performance of power control algorithm is the effect of feedback delay. To overcome the effect of feedback delay, power control needs to employ prediction algorithm which utilises the correlation property of the past channel samples measurements to predict the future sample values. In CDMA power control, however, the correlation property of channel measurements is destroyed because the transmit power is continuously updated for each power control interval. The prediction …


Thermal Stability Of Clay's Galleries In Polypropylene - Clay (Montmorillonite) Nanocomposites Using Polypropylene-Gmaleic Anhydride As Compatibilizer, Sotya Astutiningsih, Pandu Lanang Kinasih, Arief Cahyo Wibowo Apr 2009

Thermal Stability Of Clay's Galleries In Polypropylene - Clay (Montmorillonite) Nanocomposites Using Polypropylene-Gmaleic Anhydride As Compatibilizer, Sotya Astutiningsih, Pandu Lanang Kinasih, Arief Cahyo Wibowo

Makara Journal of Technology

Thermal Stability of Clay's Galleries in Polypropylene - Clay (montmorillonite) Nanocomposites using Polypropylene-g- Maleic Anhydride as Compatibilizer. Superior properties of food packaging can be achieved using nanocomposite technology. However, fabrication of this materials are complex and expensive. Long term objectives of this research is the synthesis of low cost polypropylene clay nanocomposites (PPCN) via a short-cut method known as ‘cascade engineering’. Cascade engineering principle in PPCN fabrication is performed by using compatibilizer (to enable the mixing of PP and clay) masterbatch, and PPCN in one pot process using melt mixer. This paper present the experimental results using small-angle x-ray diffraction …


Muara Bekasi – Muara Tawar Offshore Transmission Pipeline Routing And Economic Analysis., Asep Handaya Saputra, Ardiansyah Ardiansyah Apr 2009

Muara Bekasi – Muara Tawar Offshore Transmission Pipeline Routing And Economic Analysis., Asep Handaya Saputra, Ardiansyah Ardiansyah

Makara Journal of Technology

Muara Bekasi – Muara Tawar Offshore Transmission Pipeline Routing and Economic Analysis. Power plant Muara Tawar will substitute the need of oil fuel to gas as form of economizing and energy conservation. The nearest supply point to fulfill natural gas needed on Muara Bekasi. So that Power Plant Company needed to develop gas pipeline infrastructure to joining the point.The purpose of this study is to create a system of gas transmission pipeline from gas supply point at Muara Bekasi to Power Plant Muara Tawar trough to offshore area. Design of gas transmission pipeline is started with technical data collection and …


Implementation Of Web Cam As Motion Detector With Directshow Interfacing, Yonatan Santoso, Iwan Setiyawan, Victor N. Papilaya Apr 2009

Implementation Of Web Cam As Motion Detector With Directshow Interfacing, Yonatan Santoso, Iwan Setiyawan, Victor N. Papilaya

Makara Journal of Technology

Implementation of Web Cam as Motion Detector with DirectShow Interfacing. One of many ways to take control a web cam is by using DirectShow which is integrated in DirectX. DirectShow acts like an API therefore it is easier to use. Afterwards, web cam will be implemented to detect object’s motion as well as camera surveillance. The method is by comparing a reference image with other image which is taken lately. If there are differences between those image it means motion has been detected.


Induction And Conduction Electromagnetic Waves Caused By Lightning Strike On The Low Voltage Network, Reynaldo Zoro Apr 2009

Induction And Conduction Electromagnetic Waves Caused By Lightning Strike On The Low Voltage Network, Reynaldo Zoro

Makara Journal of Technology

Induction and Conduction Electromagnetic Waves Caused by Lightning Strike on the Low Voltage Network. Direct and indirect lightning strikes can disturb and induce low voltage overheadlines and it can produced overvoltage due to traveling waves along the lines. This overvoltage can damage the equipments connected to it. It was recorded that there were already a lot of damages of electronic equipments and arrestesr located inside the building of Lightning Measurement Station at Mnt. Tangkuban Perahu. Most of the overvoltage which was developed on the low voltage lines were coming from indirect lightning strike nearby due to the fact that most …