Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (31)
- TÜBİTAK (25)
- Universitas Indonesia (17)
- University of Nebraska - Lincoln (17)
- Air Force Institute of Technology (12)
-
- Selected Works (11)
- Marquette University (9)
- University of Nevada, Las Vegas (8)
- Cleveland State University (4)
- Old Dominion University (4)
- California Polytechnic State University, San Luis Obispo (2)
- San Jose State University (2)
- Technological University Dublin (2)
- University of Dayton (2)
- University of Massachusetts Amherst (2)
- University of Texas at El Paso (2)
- Institute of Business Administration (1)
- Portland State University (1)
- Syracuse University (1)
- University of New Haven (1)
- Utah State University (1)
- Western Michigan University (1)
- Western University (1)
- Keyword
-
- #antcenter (5)
- Electrical engineering (3)
- Information security (3)
- Wireless sensor networks (3)
- Algorithms (2)
-
- Algorithms--Data processing (2)
- Biometrics (2)
- Computer architecture (2)
- Computer networks--Management (2)
- Computer vision (2)
- Delay (2)
- EMC (2)
- Electromagnetic Compatibility (2)
- Identification (2)
- Intersymbol interference (2)
- Multicast (2)
- Multimedia (2)
- Optical noise (2)
- Optical receivers (2)
- Optimization (2)
- Power Point Presentation (2)
- Power Systen Protection (2)
- Routing protocols (2)
- Scalability (2)
- Steganography (2)
- 3D (1)
- ADSL router; manuals; quick start guide; network security; wireless (1)
- ANN (1)
- Accounting education (1)
- Accounting information systems (1)
- Publication
-
- Turkish Journal of Electrical Engineering and Computer Sciences (25)
- Journal of Digital Forensics, Security and Law (20)
- Makara Journal of Technology (17)
- Department of Electrical and Computer Engineering: Faculty Publications (12)
- Theses and Dissertations (12)
-
- Annual ADFSL Conference on Digital Forensics, Security and Law (11)
- Electrical and Computer Engineering Faculty Research and Publications (9)
- Dr. Adel A. Elbaset (6)
- Electrical and Computer Engineering Faculty Publications (6)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (5)
- Electrical & Computer Engineering Faculty Research (3)
- Electrical & Computer Engineering Theses & Dissertations (3)
- Computer and Electronics Engineering: Dissertations, Theses, and Student Research (2)
- Conference Papers (2)
- Master's Theses (2)
- Masters Theses 1911 - February 2014 (2)
- Open Access Theses & Dissertations (2)
- Ray Bareiss (2)
- Robert Henry Morelos-Zaragoza (2)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (1)
- CSE Conference and Workshop Papers (1)
- Department of Mechanical and Materials Engineering: Dissertations, Theses, and Student Research (1)
- Dissertations (1)
- Dissertations and Theses (1)
- Electrical & Computer Engineering and Computer Science Faculty Publications (1)
- Electrical Engineering and Computer Science - All Scholarship (1)
- Electrical and Computer Engineering Publications (1)
- Hong-Ning Dai (1)
- Information Technology Services: Publications (1)
- International Conference on Information and Communication Technologies (1)
- Publication Type
- File Type
Articles 31 - 60 of 157
Full-Text Articles in Computer Engineering
Design Of Acousto-Optic Chaos Based Secure Free-Space Optical Communication Links, Anjan K. Ghosh, Pramode K. Verma, Samuel Cheng, Robert C. Huck, Monish Ranjan Chatterjee, Mohammed A. Al-Saedi
Design Of Acousto-Optic Chaos Based Secure Free-Space Optical Communication Links, Anjan K. Ghosh, Pramode K. Verma, Samuel Cheng, Robert C. Huck, Monish Ranjan Chatterjee, Mohammed A. Al-Saedi
Electrical and Computer Engineering Faculty Publications
We discuss the design of an acousto-optic cell based free space optical communication link where the data beam is made secure through chaos encryption. Using external signal modulation of the diffracted light from a hybrid acousto-optic cell chaos (or directly via incorporation in the sound-cell driver's bias voltage) encryption of data is possible. We have shown numerically that decryption of the encoded data is possible by using an identical acousto-optic system in the receiver.
A Review On Load Flow Studies, Dr. Adel A. Elbaset
A Review On Load Flow Studies, Dr. Adel A. Elbaset
Dr. Adel A. Elbaset
No abstract provided.
Controlled Islanding Scheme For Power Systems, Dr. Adel A. Elbaset
Controlled Islanding Scheme For Power Systems, Dr. Adel A. Elbaset
Dr. Adel A. Elbaset
No abstract provided.
Seminar In Kumamoto University, 11-6-2009 (Protection), Dr. Adel A. Elbaset
Seminar In Kumamoto University, 11-6-2009 (Protection), Dr. Adel A. Elbaset
Dr. Adel A. Elbaset
This Seminar about a Novel protective scheme for Transmission line Presented by me in Kumamoto University, Graduate School of Science and Technology, Japan at 11-6-2009.
Demonstration Of Bias-Controlled Algorithmic Tuning Of Quantum Dots In A Well (Dwell) Midir Detectors, Woo-Yong Jang, Majeed M. Hayat, J. Scott Tyo, Ram S. Attaluri, Thomas E. Vandervelde, Yagya D. Sharma, Rajeev Shenoi, Andreas Stintz, Elizabeth R. Cantwell, Steven C. Bender, Sang Jun Lee, Sam Kyu Noh, Sanjay Krishna
Demonstration Of Bias-Controlled Algorithmic Tuning Of Quantum Dots In A Well (Dwell) Midir Detectors, Woo-Yong Jang, Majeed M. Hayat, J. Scott Tyo, Ram S. Attaluri, Thomas E. Vandervelde, Yagya D. Sharma, Rajeev Shenoi, Andreas Stintz, Elizabeth R. Cantwell, Steven C. Bender, Sang Jun Lee, Sam Kyu Noh, Sanjay Krishna
Electrical and Computer Engineering Faculty Research and Publications
The quantum-confined Stark effect in intersublevel transitions present in quantum-dots-in-a-well (DWELL) detectors gives rise to a midIR spectral response that is dependent upon the detector's operational bias. The spectral responses resulting from different biases exhibit spectral shifts, albeit with significant spectral overlap. A postprocessing algorithm was developed by Sakoglu that exploited this bias-dependent spectral diversity to predict the continuous and arbitrary tunability of the DWELL detector within certain limits. This paper focuses on the experimental demonstration of the DWELL-based spectral tuning algorithm. It is shown experimentally that it is possible to reconstruct the spectral content of a target electronically without …
A Graph-Based Approach To Symbolic Functional Decomposition Of Finite State Machines, Piotr Szotkowski, Mariusz Rawski, Henry Selvaraj
A Graph-Based Approach To Symbolic Functional Decomposition Of Finite State Machines, Piotr Szotkowski, Mariusz Rawski, Henry Selvaraj
Electrical & Computer Engineering Faculty Research
This paper discusses the symbolic functional decomposition method for implementing finite state machines in field-programmable gate array devices. This method is a viable alternative to the presently widespread two-step approaches to the problem, which consist of separate encoding and mapping stages; the proposed method does not have a separate decomposition step instead, the state's final encoding is introduced gradually on every decomposition iteration. Along with general description of the functional symbolic decomposition method's steps, the paper discusses various algorithms implementing the method and presents an example realisation of the most interesting algorithm. In the end, the paper compares the results …
Communications And Positioning In Wireless Networks, Yao Zhao
Communications And Positioning In Wireless Networks, Yao Zhao
Dissertations
My doctoral research for the past three years is presented in this report. My research mainly focuses on the communications and positioning for wireless networks and is composed of three parts. First, I explored a new Turbo frequency equalization technique for multiple-input multiple-output (MIMO) wireless communications systems to improve the performance of wireless communications. In the second part of my research, I studied the multiple antenna cooperative communications from the perspective of information theories. The third part of my work is dedicated to extensive research on positioning technology for wireless networks using knowledge of the estimation theory in signal processing.
Design And Implementation Of A Byzantine Fault Tolerance Framework For Web Services, Wenbing Zhao
Design And Implementation Of A Byzantine Fault Tolerance Framework For Web Services, Wenbing Zhao
Electrical and Computer Engineering Faculty Publications
Many Web services are expected to run with high degree of security and dependability. To achieve this goal, it is essential to use a Web services compatible framework that tolerates not only crash faults, but Byzantine faults as well, due to the untrusted communication environment in which the Web services operate. In this paper, we describe the design and implementation of such a framework, called BFT-WS. BFT-WS is designed to operate on top of the standard SOAP messaging framework for maximum interoperability. It is implemented as a pluggable module within the Axis2 architecture, as such, it requires minimum changes …
Affine Region Tracking And Augmentation Using Mser And Adaptive Sift Model Generation, Matthew James Marano
Affine Region Tracking And Augmentation Using Mser And Adaptive Sift Model Generation, Matthew James Marano
Master's Theses
Relatively complex Augmented Reality (AR) algorithms are becoming widely available due to advancements in affordable mobile computer hardware. To take advantage of this a new method is developed for tracking 2D regions without a prior knowledge of an environment and without developing a computationally expensive world model. In the method of this paper, affinely invariant planar regions in a scene are found using the Maximally Stable Extremal Region (MSER) detector. A region is selected by the user to define a search space, and then the Scale Invariant Feature Transform (SIFT) is used to detect affine invariant keypoints in the region. …
Cybercrime And The 2012 London Olympics, Denis Edgar-Nevill
Cybercrime And The 2012 London Olympics, Denis Edgar-Nevill
Annual ADFSL Conference on Digital Forensics, Security and Law
The London 2012 Olympics is just three years away and the clock is ticking to put in place plans get it right. The potential for cybercrime to cause harm during this event is very great; harm to national reputation, harm to the reputation to the Olympic movement, and harm to individuals competing, watching or officiating. This paper considers the need to address these risks by taking a look at what has happened in the past at sporting events and the rising wave of electronic security threats and fraud facilitated by computers at recent Olympics. The problems for law enforcement are …
Methodology For Investigating Individuals Online Social Networking Persona, Jonathan T. Rajewski
Methodology For Investigating Individuals Online Social Networking Persona, Jonathan T. Rajewski
Annual ADFSL Conference on Digital Forensics, Security and Law
When investigators from either the private or public sector review digital data surrounding a case for evidentiary value, they typically conduct a systematic categorization process to identify the relevant digital devices. Armed with the proper methodology to accomplish this task, investigators can quickly recognize the appropriate digital devices for forensic processing and review. This paper purposes a methodology for investigating an individual’s online social networking persona.
Keywords: Social Networking, Web 2.0, Internet Investigations, Online Social Networking Community
Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler
Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.
Keywords: Bluetooth hacking, mobile phone hacking, wireless hacking
Concerning File Slack, Stephen P. Larson
Concerning File Slack, Stephen P. Larson
Annual ADFSL Conference on Digital Forensics, Security and Law
In this paper we discuss the phenomena known as file slack. File slack is created each time a file is created on a hard disk, and can contain private or confidential data. Unfortunately, the methods used by Microsoft Windows operating systems to organize and save files require file slack, and users have no control over what data is saved in file slack. This document will help create awareness about the security issue of file slack and discuss research results concerning file slack.
Keywords : Computer Forensics, File Slack, Ram Slack, Disk Slack
The Computer Fraud And Abuse Act And The Law Of Unintended Consequences, Milton Luoma, Vicki Luoma
The Computer Fraud And Abuse Act And The Law Of Unintended Consequences, Milton Luoma, Vicki Luoma
Annual ADFSL Conference on Digital Forensics, Security and Law
One of the most unanticipated results of the Computer Fraud and Abuse Act arose from the law of unintended consequences. The CFAA was originally enacted in 1984 to protect federal government computers from intrusions and damage caused by hackers, identity thieves, and other cyber criminals. The law was later amended to extend the scope of its application to financial institutions’, business’s and consumers’ computers. To aid in the pursuit of cyber criminals, one of the subsequent revisions to the law included provision “G” that gave the right to private parties to seek compensation for damages in a civil action for …
Why Are We Not Getting Better At Data Disposal?, Andy Jones
Why Are We Not Getting Better At Data Disposal?, Andy Jones
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper describes two sets of research, the first of which has been carried out over a period of four years into the levels and types of information that can be found on computer hard disks that are offered for sale on the second hand market. The second research project examined a number of second-hand hand held devices including PDAs, mobile (cell) phones and RIM Blackberry devices. The primary purpose of this research was to gain an understanding of the reasons for the failure to effectively remove potentially sensitive information from the disks and handheld devices. Other objectives included determining …
Don’T Touch That! And Other E-Discovery Issues, Linda Volonino
Don’T Touch That! And Other E-Discovery Issues, Linda Volonino
Annual ADFSL Conference on Digital Forensics, Security and Law
The ability to preserve and access electronically stored information (ESI) took on greater urgency when amendments to the Federal Rules of Civil Procedure went into effect in December 2006. These amendments, referred to as the electronic discovery (e-discovery) amendments, focus on the discovery phase of civil litigation, audits, or investigations. Discovery is the investigative phase of a legal case when opponents learn what evidence is available and how accessible it is. When ESI is the subject of discovery, it is called e-discovery. Recognizing that most business and personal records and communications are electronic, Judge Shira A. Scheindlin stated, "We used …
Analysis Of The ‘Db’ Windows Registry Data Structure, Damir Kahvedžić, Tahar Kechadi
Analysis Of The ‘Db’ Windows Registry Data Structure, Damir Kahvedžić, Tahar Kechadi
Annual ADFSL Conference on Digital Forensics, Security and Law
The Windows Registry stores a wide variety of data representing a host of different user properties, settings and program information. The data structures used by the registry are designed to be adaptable to store these differences in a simple format. In this paper we will highlight the existence of a rare data structure that is used to store a large amount of data within the registry hives. We analyse the manner in which this data structure stores its data and the implications that it may have on evidence retrieval and digital investigation. In particular, we reveal that the three of …
Correlating Orphaned Windows Registry Data Structures, Damir Kahvedžić, Tahar Kechadi
Correlating Orphaned Windows Registry Data Structures, Damir Kahvedžić, Tahar Kechadi
Annual ADFSL Conference on Digital Forensics, Security and Law
Recently, it has been shown that deleted entries of the Microsoft Windows registry (keys) may still reside in the system files once the entries have been deleted from the active database. Investigating the complete keys in context may be extremely important from both a Forensic Investigation point of view and a legal point of view where a lack of context can bring doubt to an argument. In this paper we formalise the registry behaviour and show how a retrieved value may not maintain a relation to the part of the registry it belonged to and hence lose that context. We …
Graduate Accounting Students' Perception Of It Forensics: A Multi-Dimensional Analysis, Grover S. Kearns
Graduate Accounting Students' Perception Of It Forensics: A Multi-Dimensional Analysis, Grover S. Kearns
Annual ADFSL Conference on Digital Forensics, Security and Law
Forensics and information technology (IT) have become increasingly important to accountants and auditors. Undergraduate accounting students are introduced to general IT topics but discussion of forensic knowledge is limited. A few schools have introduced an undergraduate major in forensic accounting. Some graduate schools offer accounting students an emphasis in forensic or fraud accounting that includes instruction in forensics and information technology. When students do not view the IT topics as being equally important to their careers as traditional accounting topics, these attitudes may reduce the quality of the course. In an effort to assess student attitudes, a survey of 46 …
Visualization Of Honeypot Data Using Graphviz And Afterglow, Craig Valli
Visualization Of Honeypot Data Using Graphviz And Afterglow, Craig Valli
Annual ADFSL Conference on Digital Forensics, Security and Law
This research in progress paper explores the use of Graphviz and Afterglow for the analysis of data emanating from a honeypot system. Honeypot systems gather a wide range of data that is often difficult to readily search for patterns and trends using conventional log file analysis techniques. The data from the honeypots has been statically extracted and processed through Afterglow scripts to produce inputs suitable for use by the DOT graph based tools contained within Graphviz. This paper explores some of the benefits and drawbacks of currently using this type of approach.
Keywords: honeypot, network forensics, visualization, Graphviz, Afterglow
An Adaptive Adjacent Channel Interference Cancellation Technique, Robert H. Morelos-Zaragoza, Shobha Kuruba
An Adaptive Adjacent Channel Interference Cancellation Technique, Robert H. Morelos-Zaragoza, Shobha Kuruba
Robert Henry Morelos-Zaragoza
In this paper, an adaptive adjacent channel interference (ACI) technique is proposed. Results for BPSK modulation with rectangular and square-root raised-cosine pulse shaping, under AWGN conditions, are obtained showing the proposed method to be effective in improving performance under high levels of interference. Basically, the idea is to send pilot signals and then to use them in estimating the amount of ACI in the frequency domain. The estimated spectral error is used to modify tap weights of an adaptive frequency-domain filter. Our simulation results reported suggest that ACI can be effectively reduced with the proposed technique. At the system level, …
Robust Image And Video Coding With Adaptive Rate Control, Hongqiang Wang
Robust Image And Video Coding With Adaptive Rate Control, Hongqiang Wang
Computer and Electronics Engineering: Dissertations, Theses, and Student Research
This dissertation is focused on the problem of rate allocation in a resource constrained environment and robustness of video coding over noise channels. A new rate allocation scheme that combines the traditional PCRD-Opt algorithm with the rho domain analysis is proposed for wavelet based image coders. The proposed scheme provides competitive performance as compared with the optimal PCRD-Opt algorithm, while with great reduction on complexity and computational costs. Rate allocation is developed for the Region-Of-Interest (ROI) in the wavelet transform domain for image coding. A recursive region growing method that deter mines the ROI in the transform domain is proposed. …
Text Categorization Based On Apriori Algorithm's Frequent Itemsets, Prathima Madadi
Text Categorization Based On Apriori Algorithm's Frequent Itemsets, Prathima Madadi
UNLV Theses, Dissertations, Professional Papers, and Capstones
Automatic Text categorization is the task of assigning an electronic document to one or more categories, based on its contents. There are many known techniques to efficiently solve categorization problems. Typically these techniques fall into two distinct methodologies which are either logic based or probabilistic. In recent years, many researchers have tried approaches which area hybrid of these two methodologies.
In this thesis, we deal with document categorization using Apriori Algorithm. The Apriori algorithm was initially developed for data mining and basket analysis applications in the relational databases. Although the technique is logic based, it also relies on the statistical …
Human Identification Using Pyroelectric Infrared Sensors, Aron E. Suppes
Human Identification Using Pyroelectric Infrared Sensors, Aron E. Suppes
UNLV Theses, Dissertations, Professional Papers, and Capstones
The objective of this thesis is to discuss the viability of using pyroelectric infrared (PIR) sensors as a biometric system for human identification.
The human body emits infrared radiation, the distribution of which varies throughout the body, and depends upon the shape and composition of the particular body part. A PIR sensor utilizing a Fresnel lens will respond to this infrared radiation. When a human walks, the motion of the body's individual components form a characteristic gait that is likely to affect a PIR sensor field in a unique way.
A statistical model, such as a Hidden Markov Model, could …
Lipid Production From Microalgae As A Promising Candidate For Biodiesel Production, Arief Widjaja
Lipid Production From Microalgae As A Promising Candidate For Biodiesel Production, Arief Widjaja
Makara Journal of Technology
Recently, several strains of microalgae have been studied as they contain high lipid content capable to be converted to biodiesel. Fresh water microalgae Chlorella vulgaris studied in this research was one of the proof as it contained high triacyl glyceride which made it a potential candidate for biodiesel production. Factors responsible for good growing of microalgae such as CO2 and nitrogen concentration were investigated. It was found that total lipid content was increased after exposing to media with not enough nitrogen concentration. However, under this nitrogen depletion media, the growth rate was very slow leading to lower lipid productivity. The …
Improved Predictive Power Control Of Cdma System In Rayleigh Fading Channel, Adit Kurniawan, Iskandar Iskandar, Sayid Machdar
Improved Predictive Power Control Of Cdma System In Rayleigh Fading Channel, Adit Kurniawan, Iskandar Iskandar, Sayid Machdar
Makara Journal of Technology
In this paper an improved prediction-based power control is proposed for code division multiple access (CDMA) systems in Rayleigh fading channel environments. One of the most serious problems which degrades the performance of power control algorithm is the effect of feedback delay. To overcome the effect of feedback delay, power control needs to employ prediction algorithm which utilises the correlation property of the past channel samples measurements to predict the future sample values. In CDMA power control, however, the correlation property of channel measurements is destroyed because the transmit power is continuously updated for each power control interval. The prediction …
Thermal Stability Of Clay's Galleries In Polypropylene - Clay (Montmorillonite) Nanocomposites Using Polypropylene-Gmaleic Anhydride As Compatibilizer, Sotya Astutiningsih, Pandu Lanang Kinasih, Arief Cahyo Wibowo
Thermal Stability Of Clay's Galleries In Polypropylene - Clay (Montmorillonite) Nanocomposites Using Polypropylene-Gmaleic Anhydride As Compatibilizer, Sotya Astutiningsih, Pandu Lanang Kinasih, Arief Cahyo Wibowo
Makara Journal of Technology
Thermal Stability of Clay's Galleries in Polypropylene - Clay (montmorillonite) Nanocomposites using Polypropylene-g- Maleic Anhydride as Compatibilizer. Superior properties of food packaging can be achieved using nanocomposite technology. However, fabrication of this materials are complex and expensive. Long term objectives of this research is the synthesis of low cost polypropylene clay nanocomposites (PPCN) via a short-cut method known as ‘cascade engineering’. Cascade engineering principle in PPCN fabrication is performed by using compatibilizer (to enable the mixing of PP and clay) masterbatch, and PPCN in one pot process using melt mixer. This paper present the experimental results using small-angle x-ray diffraction …
Muara Bekasi – Muara Tawar Offshore Transmission Pipeline Routing And Economic Analysis., Asep Handaya Saputra, Ardiansyah Ardiansyah
Muara Bekasi – Muara Tawar Offshore Transmission Pipeline Routing And Economic Analysis., Asep Handaya Saputra, Ardiansyah Ardiansyah
Makara Journal of Technology
Muara Bekasi – Muara Tawar Offshore Transmission Pipeline Routing and Economic Analysis. Power plant Muara Tawar will substitute the need of oil fuel to gas as form of economizing and energy conservation. The nearest supply point to fulfill natural gas needed on Muara Bekasi. So that Power Plant Company needed to develop gas pipeline infrastructure to joining the point.The purpose of this study is to create a system of gas transmission pipeline from gas supply point at Muara Bekasi to Power Plant Muara Tawar trough to offshore area. Design of gas transmission pipeline is started with technical data collection and …
Implementation Of Web Cam As Motion Detector With Directshow Interfacing, Yonatan Santoso, Iwan Setiyawan, Victor N. Papilaya
Implementation Of Web Cam As Motion Detector With Directshow Interfacing, Yonatan Santoso, Iwan Setiyawan, Victor N. Papilaya
Makara Journal of Technology
Implementation of Web Cam as Motion Detector with DirectShow Interfacing. One of many ways to take control a web cam is by using DirectShow which is integrated in DirectX. DirectShow acts like an API therefore it is easier to use. Afterwards, web cam will be implemented to detect object’s motion as well as camera surveillance. The method is by comparing a reference image with other image which is taken lately. If there are differences between those image it means motion has been detected.
Induction And Conduction Electromagnetic Waves Caused By Lightning Strike On The Low Voltage Network, Reynaldo Zoro
Induction And Conduction Electromagnetic Waves Caused By Lightning Strike On The Low Voltage Network, Reynaldo Zoro
Makara Journal of Technology
Induction and Conduction Electromagnetic Waves Caused by Lightning Strike on the Low Voltage Network. Direct and indirect lightning strikes can disturb and induce low voltage overheadlines and it can produced overvoltage due to traveling waves along the lines. This overvoltage can damage the equipments connected to it. It was recorded that there were already a lot of damages of electronic equipments and arrestesr located inside the building of Lightning Measurement Station at Mnt. Tangkuban Perahu. Most of the overvoltage which was developed on the low voltage lines were coming from indirect lightning strike nearby due to the fact that most …