Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Computer Engineering

Parking Recommender System Privacy Preservation Through Anonymization And Differential Privacy, Yasir Saleem Shaikh, Mubashir Husain Rehmani, Noel Crespi, Roberto Minerva Feb 2021

Parking Recommender System Privacy Preservation Through Anonymization And Differential Privacy, Yasir Saleem Shaikh, Mubashir Husain Rehmani, Noel Crespi, Roberto Minerva

Publications

Recent advancements in the Internet of Things (IoT) have enabled the development of smart parking systems that use services of third-party parking recommender system to provide recommendations of personalized parking spot to users based on their past experience. However, the indiscriminate sharing of users’ data with an untrusted (or semitrusted) parking recommender system may breach the privacy because users’ behavior and mobility patterns could be inferred by analyzing their past history. Therefore, in this article, we present two solutions that preserve privacy of users in parking recommender systems while analyzing the past parking history using k-anonymity (anonymization) and differential privacy …


Deal: Differentially Private Auction For Blockchain Based Microgrids Energy Trading, Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen Mar 2020

Deal: Differentially Private Auction For Blockchain Based Microgrids Energy Trading, Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen

Publications

Modern smart homes are being equipped with certain renewable energy resources that can produce their own electric energy. From time to time, these smart homes or microgrids are also capable of supplying energy to other houses, buildings, or energy grid in the time of available self-produced renewable energy. Therefore, researches have been carried out to develop optimal trading strategies, and many recent technologies are also being used in combination with microgrids. One such technology is blockchain, which works over decentralized distributed ledger. In this paper, we develop a blockchain based approach for microgrid energy auction. To make this auction more …


Differential Privacy Techniques For Cyber Physical Systems: A Survey, Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen Mar 2020

Differential Privacy Techniques For Cyber Physical Systems: A Survey, Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen

Publications

Modern cyber physical systems (CPSs) has widely being used in our daily lives because of development of information and communication technologies (ICT).With the provision of CPSs, the security and privacy threats associated to these systems are also increasing. Passive attacks are being used by intruders to get access to private information of CPSs. In order to make CPSs data more secure, certain privacy preservation strategies such as encryption, and k-anonymity have been presented in the past. However, with the advances in CPSs architecture, these techniques also need certain modifications. Meanwhile, differential privacy emerged as an efficient technique to protect CPSs …


Mac Protocols For Terahertz Communication: A Comprehensive Survey, Saim Ghafoor, Noureddine Boujnah, Mubashir Husain Rehmani, Alan Davy Jan 2020

Mac Protocols For Terahertz Communication: A Comprehensive Survey, Saim Ghafoor, Noureddine Boujnah, Mubashir Husain Rehmani, Alan Davy

Publications

Terahertz communication is emerging as a future technology to support Terabits per second link with highlighting features as high throughput and negligible latency. However, the unique features of the Terahertz band such as high path loss, scattering, and reflection pose new challenges and results in short communication distance. The antenna directionality, in turn, is required to enhance the communication distance and to overcome the high path loss. However, these features in combine negate the use of traditional medium access protocols (MAC). Therefore, novel MAC protocol designs are required to fully exploit their potential benefits including efficient channel access, control message …


Effective Capacity In Wireless Networks: A Comprehensive Survey, Muhammad Amjad, Mubashir Husain Rehmani, Leila Musavian Oct 2019

Effective Capacity In Wireless Networks: A Comprehensive Survey, Muhammad Amjad, Mubashir Husain Rehmani, Leila Musavian

Publications

Low latency applications, such as multimedia communications, autonomous vehicles, and Tactile Internet are the emerging applications for next-generation wireless networks, such as 5th generation (5G) mobile networks. Existing physical layer channel models, however, do not explicitly consider quality of service (QoS) aware related parameters under specific delay constraints. To investigate the performance of low-latency applications in future networks, a new mathematical framework is needed. Effective capacity (EC), which is a link-layer channel model with QoS-awareness, can be used to investigate the performance of wireless networks under certain statistical delay constraints. In this paper, we provide a comprehensive survey on existing …


Software Defined Networks Based Smart Grid Communication: A Comprehensive Survey, Mubashir Husain Rehmani, Alan Davy, Brendan Jennings, Chadi Assi Jan 2019

Software Defined Networks Based Smart Grid Communication: A Comprehensive Survey, Mubashir Husain Rehmani, Alan Davy, Brendan Jennings, Chadi Assi

Publications

The current power grid is no longer a feasible solution due to ever-increasing user demand of electricity, old infrastructure, and reliability issues and thus require transformation to a better grid a.k.a., smart grid (SG). The key features that distinguish SG from the conventional electrical power grid are its capability to perform two-way communication, demand side management, and real time pricing. Despite all these advantages that SG will bring, there are certain issues which are specific to SG communication system. For instance, network management of current SG systems is complex, time consuming, and done manually. Moreover, SG communication (SGC) system is …


Rotation Of Two-Petal Laser Beams In The Near Field Of A Spiral Microaxicon, S. S. Stafeev, Liam O'Faolain, M. V. Kotlyar Jun 2018

Rotation Of Two-Petal Laser Beams In The Near Field Of A Spiral Microaxicon, S. S. Stafeev, Liam O'Faolain, M. V. Kotlyar

Cappa Publications

Using a spiral microaxicon with the topological charge 2 and NA = 0.6 operating at a 532-nm wavelength and fabricated by electron-beam lithography, we experimentally demonstrate the rotation of a two-petal laser beam in the near field (several micrometers away from the axicon surface). The estimated rotation rate is 55 °/mm and linearly dependent on the on-axis distance, with the theoretical rotation rate being 53 °/mm. The experimentally measured rotation rate is found to be linear and coincident with the simulation results only on the on-axis segment from 1.5 to 3 mm. The experimentally measured rotation rate is 66 °/mm …


Semiconductor Materials And Devices For 2 Micron Generation, Dzianis Saladukha Jan 2017

Semiconductor Materials And Devices For 2 Micron Generation, Dzianis Saladukha

Theses

In the last century, semiconductor research has led to significant changes in the fields of communication, medicine, the environment, and many others. Semiconductor devices provide a relatively simple and effective way to convert electrical energy to light and vice versa. Devices based on semiconductor materials of various kinds provide interaction of an electromagnetic signal in the range of wavelengths with a medium. Examples of such devices are LED lamps, photovoltaic cells, thermometers, gas sensors, cameras, and many others. The study of various semiconductors broadens the range of application of photonics. This work is based on the study of materials which …


A Proposed Model For The Approach To Augmented Reality Deployment In Marketing Communications, Stephen O'Mahony Feb 2015

A Proposed Model For The Approach To Augmented Reality Deployment In Marketing Communications, Stephen O'Mahony

Dept. of Marketing & International Business Conference Material

In the contemporary landscape, human interaction is characterized by the pervasive mediation of intelligent agents. Owing to advances in computer science and engineering, phenomena once limited to fixed locations are metamorphosing from extraneous entities to implicit components of the everyday. Computing power has simultaneously enhanced and miniaturized to the extent that contemporary consumer devices demonstrate power equivalent to or greater than that of personal computers of recent memory. At the same time, network connectivity has proliferated to ubiquitous levels, reflected in the fact that the amount of inanimate objects connected to the Internet has recently surpassed the human population of …


Semi-Automatic Management Of Knowledge Bases Using Formal Ontologies, Andreas Textor Jan 2011

Semi-Automatic Management Of Knowledge Bases Using Formal Ontologies, Andreas Textor

Theses

This thesis presents an approach that deals with the ever-growing amount of data in knowledge bases, especially concerning knowledge interoperability and formal representation of domain knowledge. There arc multiple issues that must be addressed with current systems. A multitude of different formats, sources and tools exist in a domain, and it is desirable to develop their use further towards a standardised environment. Such an environment should support both the representation and processing of data from this domain, and the connection to other domains, where necessary. In order to manage large amounts of data, it should be possible to perform whatever …


Resource Sharing Via Planed Relay For Hwn, Chong Shen, Susan Rea, Dirk Pesch Apr 2008

Resource Sharing Via Planed Relay For Hwn, Chong Shen, Susan Rea, Dirk Pesch

NIMBUS Articles

We present an improved version of adaptive distributed cross-layer routing algorithm (ADCR) for hybrid wireless network with dedicated relay stations () in this paper. A mobile terminal (MT) may borrow radio resources that are available thousands mile away via secure multihop RNs, where RNs are placed at pre-engineered locations in the network. In rural places such as mountain areas, an MT may also communicate with the core network, when intermediate MTs act as relay node with mobility. To address cross-layer network layers routing issues, the cascaded ADCR establishes routing paths across MTs, RNs, and cellular base stations (BSs) and provides …


Optimization In Multi-Agent Systems : Structures And Procedures, Ingo Stengel Jan 2008

Optimization In Multi-Agent Systems : Structures And Procedures, Ingo Stengel

Theses

The main advantage for the use of agent technology is in the capacity of agents to represent the interests of individual entities and to act autonomously on their behalf. In multi-agent systems this involves communication, coordination and negotiation.

The focus of this dissertation is to find ways to optimize multi-agent systems at different levels by taking into consideration their structure and the procedures used. As optimization depends to a large extent on the problem to be solved, group forming scenarios, in which self-interested agents compete to form and join groups, have been selected here for consideration. Optimization issues are discussed …


Personal Information Management. A Framework For Development Of Personalisable Web Based Services, Christopher Fuchs Jan 2007

Personal Information Management. A Framework For Development Of Personalisable Web Based Services, Christopher Fuchs

Theses

The thesis research proposed herein will model, analyse and implement strategies for the development of personalised services. The goal of the research work is to design and implement a framework which supports developers by minimising the effort required in implementing personalised services. This includes the ability to react to localisation changes and to present proper information. An overall design goal is the independency of most components from each other which will be attained through the use of standard technologies and protocols and the consistent use of a component model. The result will include the proposed framework and the analyses of …


Design And Implementation Of An Intranet-Solution Especially With Workflow Aspects, Robert Loew Jan 2001

Design And Implementation Of An Intranet-Solution Especially With Workflow Aspects, Robert Loew

Theses

An Intranet support a new or simply an easier information system for all the workers within a company using internet technology. On the one hand, employees can use Web technology and very simple tools to provide and navigate information. On the other hand, the costly and time-consuming business of installing and maintaining software on local PCs can be avoided by using Browser-based Intranet applications. Ideally, it would be possible to access all forms of information processing using one and the same Web browser. This is the aim of the Intranet Project upon which this thesis is based.

Various technologies for …


Security In Distributed Systems - A Framework For Different Application Types, Ingo Stengel Jan 2000

Security In Distributed Systems - A Framework For Different Application Types, Ingo Stengel

Theses

Security is a factor which decides upon the applicability of distributed applications. Therefore this thesis deals with security in distributed systems. The complexity of the existing distributed technologies makes it necessary to reduce the number of distributed technologies considered in this thesis, i.e. concentrating on: Java, Mobile Agents and CORBA, where only Java-based mobile agents will be considered.

After a short review of basic security principles including firewalls, existing security problems in the above mentioned distributed technologies are analysed. Additional generic problems in distributed systems are outlined.

Solutions are referring to two different areas: those regarding security problems with firewalls …


Enterprise Business Objects : Design And Implementation Of A Business Object Framework, Kai-Uwe Schafer Jan 1999

Enterprise Business Objects : Design And Implementation Of A Business Object Framework, Kai-Uwe Schafer

Theses

Software components representing business entities like customer or purchase order introduce a new way of Online Transaction Processing to business applications. Collaborating business objects allow to complete whole business processes as a single distributed transaction, instead of dividing it into queued steps, which sometimes even require user intervention. This IS due to the fact that business objects contain both business data and logic and that they incorporate multiple databases from different vendors and different geographic locations in a single transaction.

Business objects cannot be used as stand-alone components, but require a framework of services that manage persistence, concurrent transactions, and …