Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Computer Engineering

Energy Harvesting And Storage: The Catalyst To The Power Constraint For Leveraging Internet Of Things (Iot) On Trains, Kelechi Nwogu May 2015

Energy Harvesting And Storage: The Catalyst To The Power Constraint For Leveraging Internet Of Things (Iot) On Trains, Kelechi Nwogu

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

The success of Wireless Sensor Networks is heavily constrained by its reliance on storage technology like batteries, which are a finite resource. Whilst the number of transistors in an IC doubles every 18 months, the energy density of batteries is relatively flat during the same time period. This is a key challenge in leveraging the Internet of Things on trains.

The gravity of this problem is increased by an order of magnitude when the network is to be scaled up to hundreds or thousands of nodes. Comprehensive research and development efforts have been devoted to building ultra-low power sensors. These …


A Study On Countermeasures Against Steganography: An Active Warden Approach, Qilin Qi Dec 2013

A Study On Countermeasures Against Steganography: An Active Warden Approach, Qilin Qi

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

Digital steganography is a method used for hiding information in digital images. It can be used for secure communication. There have been many robust digital steganography methods invented in recent decades. The steganographic message can be inserted in multimedia cover signal such as audio, image and video. However, this technique also may be used by malicious users to transmit dangerous information through the Internet beyond the control of security agencies. How to detect and/or block potentially dangerous information transmission on the Internet through billions of multimedia files while not affecting innocent multimedia communications becomes a challenging problem. Existing steganalysis methods …


Energy Efficiency Analysis And Optimization On Mobile Video Wireless Delivery, Jianxin Sun Jul 2012

Energy Efficiency Analysis And Optimization On Mobile Video Wireless Delivery, Jianxin Sun

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

Micro-electronic industry has been boosting the capability of wireless mobile devices on full-scale. However, battery, as the only power source of most mobile devices, is experiencing a relatively slow development. Therefore, how to optimally utilize the limited battery energy on mobile devices under a predefined performance requirement becomes a critical issue. On the other hand, it is still unclear that how the battery capacity consumption is allocated on different working pattern of a specific video codec under various tempo-spatial scales and parameters, which has posed a design challenge on power management on multimedia communication system. Furthermore, an optimization method is …


Exploration Of Spatial Diversity In Multi-Antenna Wireless Communication Systems, Shichuan Ma May 2011

Exploration Of Spatial Diversity In Multi-Antenna Wireless Communication Systems, Shichuan Ma

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

With increasing demand on wireless internet and personal multimedia, the data rate of wireless communications is expected to increase dramatically. Future wireless networks face challenges of supporting data rates higher than one gigabits per second. Among various technologies, multi-antennas, also known as multiple-input multiple-output (MIMO), are undoubtedly the most promising to enable higher data rates. By employing the extra degrees of freedom in the spatial domain, multi-antenna techniques enhance the wireless communication systems through array gain, spatial diversity, and spatial multiplexing. Although multi-antenna systems have been utilized for more than ten years, a thorough analysis of various aspects of multi-antenna …


Performance Of Self-Encoded Spread Spectrum Under Worst-Case Jamming, Casey L. Deyle Feb 2010

Performance Of Self-Encoded Spread Spectrum Under Worst-Case Jamming, Casey L. Deyle

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

Performance of Self-Encoded Spread Spectrum Under Worst-Case Jamming Casey Deyle, M.S University of Nebraska 2009 Advisor: Lim Nguyen Spread Spectrum Communications uses m-sequences (sometimes referred to as Pseudo Noise or PN sequences) modulated with a data signal to create a transmission signal that takes up more bandwidth than the original information signal. Self-Encoded Spread Spectrum (SESS) uses spreading codes generated by the transmitted signal, eliminating the need to synchronize m-sequences between the transmitter and receiver, thus making the channel more secure. This paper will discuss the performance of SESS system in Additive White Gaussian Noise (AWGN) and Rayleigh fading channels, …


Quality-Driven Cross Layer Design For Multimedia Security Over Resource Constrained Wireless Sensor Networks, Wei Wang Dec 2009

Quality-Driven Cross Layer Design For Multimedia Security Over Resource Constrained Wireless Sensor Networks, Wei Wang

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

The strong need for security guarantee, e.g., integrity and authenticity, as well as privacy and confidentiality in wireless multimedia services has driven the development of an emerging research area in low cost Wireless Multimedia Sensor Networks (WMSNs). Unfortunately, those conventional encryption and authentication techniques cannot be applied directly to WMSNs due to inborn challenges such as extremely limited energy, computing and bandwidth resources. This dissertation provides a quality-driven security design and resource allocation framework for WMSNs. The contribution of this dissertation bridges the inter-disciplinary research gap between high layer multimedia signal processing and low layer computer networking. It formulates the …