Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Systems and Communications

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 489

Full-Text Articles in Computer Engineering

Addressing Multiple Bit/Symbol Errors In Dram Subsystem, Ravikiran Yeleswarapu, Arun K. Somani Aug 2019

Addressing Multiple Bit/Symbol Errors In Dram Subsystem, Ravikiran Yeleswarapu, Arun K. Somani

Arun Somani

As DRAM technology continues to evolve towards smaller feature sizes and increased densities, faults in DRAM subsystem are becoming more severe. Current servers mostly use CHIPKILL based schemes to tolerate up-to one/two symbol errors per DRAM beat. Multi-symbol errors arising due to faults in multiple data buses and chips may not be detected by these schemes. In this paper, we introduce Single Symbol Correction Multiple Symbol Detection (SSCMSD) - a novel error handling scheme to correct single-symbol errors and detect multi-symbol errors. Our scheme makes use of a hash in combination with Error Correcting Code (ECC) to avoid silent data ...


Subsurface Mimo: A Beamforming Design In Internet Of Underground Things For Digital Agriculture Applications, Abdul Salam Aug 2019

Subsurface Mimo: A Beamforming Design In Internet Of Underground Things For Digital Agriculture Applications, Abdul Salam

Faculty Publications

In underground (UG) multiple-input and multiple-output (MIMO), the transmit beamforming is used to focus energy in the desired direction. There are three different paths in the underground soil medium through which the waves propagates to reach at the receiver. When the UG receiver receives a desired data stream only from the desired path, then the UG MIMO channel becomes three path (lateral, direct, and reflected) interference channel. Accordingly, the capacity region of the UG MIMO three path interference channel and degrees of freedom (multiplexing gain of this MIMO channel requires careful modeling). Therefore, expressions are required for the degree of ...


Weight Controlled Electric Skateboard, Zachary Barram, Carson Bertozzi, Vishnu Dodballapur Jun 2019

Weight Controlled Electric Skateboard, Zachary Barram, Carson Bertozzi, Vishnu Dodballapur

Computer Engineering

Technology and the way that humans interact is becoming more vital and omnipresent with every passing day. However, human interface device designers suffer from the increasingly popular “designed for me or people like me” syndrome. This design philosophy inherently limits accessibility and usability of technology to those like the designer. This places severe limits of usability to those who are not fully able as well as leaves non-traditional human interface devices unexplored. This project set out to explore a previously uncharted human interface device, on an electric skateboard, and compare it send user experience with industry leading human interface devices.


Design Of Remote Datalogger Connection And Live Data Tweeting System, Zachary Wofford May 2019

Design Of Remote Datalogger Connection And Live Data Tweeting System, Zachary Wofford

Biological and Agricultural Engineering Undergraduate Honors Theses

Low-Impact Development (LID) is an attempt to sustainably respond to the potential hazards posed by urban expansion. Green roofs are an example of LID design meant to reduce the amount of runoff from storm events that are becoming more intense and less predictable while also providing insulation to buildings. LID has not yet been widely adopted as it is often a more expensive alternative to conventional infrastructure (Bowman et. al., 2009). However, its benefits are apparent. The University of Arkansas Honors College awarded a grant to research the large green roof atop Hillside Auditorium. One part of this grant is ...


Urban Underground Infrastructure Monitoring Iot: The Path Loss Analysis, Abdul Salam, Syed Shah Apr 2019

Urban Underground Infrastructure Monitoring Iot: The Path Loss Analysis, Abdul Salam, Syed Shah

Faculty Publications

The extra quantities of wastewater entering the pipes can cause backups that result in sanitary sewer overflows. Urban underground infrastructure monitoring is important for controlling the flow of extraneous water into the pipelines. By combining the wireless underground communications and sensor solutions, the urban underground IoT applications such as real time wastewater and storm water overflow monitoring can be developed. In this paper, the path loss analysis of wireless underground communications in urban underground IoT for wastewater monitoring has been presented. It has been shown that the communication range of up to 4 kilometers can be achieved from an underground ...


An Underground Radio Wave Propagation Prediction Model For Digital Agriculture, Abdul Salam Apr 2019

An Underground Radio Wave Propagation Prediction Model For Digital Agriculture, Abdul Salam

Faculty Publications

Underground sensing and propagation of Signals in the Soil (SitS) medium is an electromagnetic issue. The path loss prediction with higher accuracy is an open research subject in digital agriculture monitoring applications for sensing and communications. The statistical data are predominantly derived from site-specific empirical measurements, which is considered an impediment to universal application. Nevertheless, in the existing literature, statistical approaches have been applied to the SitS channel modeling, where impulse response analysis and the Friis open space transmission formula are employed as the channel modeling tool in different soil types under varying soil moisture conditions at diverse communication distances ...


Underground Environment Aware Mimo Design Using Transmit And Receive Beamforming In Internet Of Underground Things, Abdul Salam Apr 2019

Underground Environment Aware Mimo Design Using Transmit And Receive Beamforming In Internet Of Underground Things, Abdul Salam

Faculty Publications

In underground (UG) multiple-input and multiple-output (MIMO), the transmit beamforming is used to focus energy in the desired direction. There are three different paths in the underground soil medium through which the waves propagates to reach at the receiver. When the UG receiver receives a desired data stream only from the desired path, then the UG MIMO channel becomes three path (lateral, direct, and reflected) interference channel. Accordingly, the capacity region of the UG MIMO three path interference channel and degrees of freedom (multiplexing gain of this MIMO channel requires careful modeling). Therefore, expressions are required derived the degrees of ...


Feasibility And Security Analysis Of Wideband Ultrasonic Radio For Smart Home Applications, Qi Xia Apr 2019

Feasibility And Security Analysis Of Wideband Ultrasonic Radio For Smart Home Applications, Qi Xia

Computer Science and Engineering: Theses, Dissertations, and Student Research

Smart home Internet-of-Things (IoT) accompanied by smart home apps has witnessed tremendous growth in the past few years. Yet, the security and privacy of the smart home IoT devices and apps have raised serious concerns, as they are getting increasingly complicated each day, expected to store and exchange extremely sensitive personal data, always on and connected, and commonly exposed to any users in a sensitive environment. Nowadays wireless smart home IoT devices rely on electromagnetic wave-based radio-frequency (RF) technology to establish fast and reliable quality network connections. However, RF has its limitations that can negatively affect the smart home user ...


Machine Translation With Image Context From Mandarin Chinese To English, Brooke E. Johnson Mar 2019

Machine Translation With Image Context From Mandarin Chinese To English, Brooke E. Johnson

Theses and Dissertations

Despite ongoing improvements in machine translation, machine translators still lack the capability of incorporating context from which source text may have been derived. Machine translators use text from a source language to translate it into a target language without observing any visual context. This work aims to produce a neural machine translation model that is capable of accepting both text and image context as a multimodal translator from Mandarin Chinese to English. The model was trained on a small multimodal dataset of 700 images and sentences, and compared to a translator trained only on the text associated with those images ...


Autonomous Association Of Geo Rso Observations Using Deep Neural Networks, Ian W. Mcquaid Mar 2019

Autonomous Association Of Geo Rso Observations Using Deep Neural Networks, Ian W. Mcquaid

Theses and Dissertations

Ground-based non-resolved optical observations of resident space objects (RSOs) in geosynchronous orbit (GEO) represent the majority of the space surveillance network’s (SSN’s) deep-space tracking. Reliable and accurate tracking necessitates temporal separation of the observations. This requires that subsequent observations be associated with prior observations of a given RSO before they can be used to create or refine that RSO’s ephemeris. The use of astrometric data (e.g. topocentric angular position) alone for this association task is complicated by RSO maneuvers between observations, and by RSOs operating in close proximity. Accurately associating an observation with an RSO thus ...


Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick Jan 2019

Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick

Faculty Scholarship at Penn Law

Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.

This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews ...


Internet Of Things In Smart Agriculture: Enabling Technologies, Abdul Salam, Syed Shah Jan 2019

Internet Of Things In Smart Agriculture: Enabling Technologies, Abdul Salam, Syed Shah

Faculty Publications

In this paper, an IoT technology research and innovation roadmap for the field of precision agriculture (PA) is presented. Many recent practical trends and the challenges have been highlighted. Some important objectives for integrated technology research and education in precision agriculture are described. Effective IoT based communications and sensing approaches to mitigate challenges in the area of precision agriculture are presented.


Exploring Critical Success Factors For Data Integration And Decision-Making In Law Enforcement, Marquay Edmondson, Walter R. Mccollum, Mary-Margaret Chantre, Gregory Campbell Jan 2019

Exploring Critical Success Factors For Data Integration And Decision-Making In Law Enforcement, Marquay Edmondson, Walter R. Mccollum, Mary-Margaret Chantre, Gregory Campbell

International Journal of Applied Management and Technology

Agencies from various disciplines supporting law enforcement functions and processes have integrated, shared, and communicated data through ad hoc methods to address crime, terrorism, and many other threats in the United States. Data integration in law enforcement plays a critical role in the technical, business, and intelligence processes created by users to combine data from various sources and domains to transform them into valuable information. The purpose of this qualitative phenomenological study was to explore the current conditions of data integration frameworks through user and system interactions among law enforcement organizational processes. Further exploration of critical success factors used to ...


Autonomous Combat Robot, Andrew J. Szabo Ii, Chris Heldman, Tristin Weber, Tanya Tebcherani, Holden Leblanc, Fabian Ardeljan Jan 2019

Autonomous Combat Robot, Andrew J. Szabo Ii, Chris Heldman, Tristin Weber, Tanya Tebcherani, Holden Leblanc, Fabian Ardeljan

Williams Honors College, Honors Research Projects

This honors project will also serve as an engineering senior design project.

The objective is to design and build the software and electrical systems for a 60 lb weight class combat robot that will function autonomously and outperform manually driven robots during competition.

While running autonomously, the robot will use LiDAR sensors to detect and attack opponent robots. This robot will also be able to be remote controlled in manual mode. This will mitigate the risk in case the autonomy or sensors fail. LED lights on the robot will indicate whether it is in autonomous or manual mode. The system ...


Automated Network Security With Exceptions Using Sdn, Sergio A. Rivera Polanco Jan 2019

Automated Network Security With Exceptions Using Sdn, Sergio A. Rivera Polanco

Theses and Dissertations--Computer Science

Campus networks have recently experienced a proliferation of devices ranging from personal use devices (e.g. smartphones, laptops, tablets), to special-purpose network equipment (e.g. firewalls, network address translation boxes, network caches, load balancers, virtual private network servers, and authentication servers), as well as special-purpose systems (badge readers, IP phones, cameras, location trackers, etc.). To establish directives and regulations regarding the ways in which these heterogeneous systems are allowed to interact with each other and the network infrastructure, organizations typically appoint policy writing committees (PWCs) to create acceptable use policy (AUP) documents describing the rules and behavioral guidelines that all ...


Addressing Multiple Bit/Symbol Errors In Dram Subsystem, Ravikiran Yeleswarapu, Arun K. Somani Jan 2019

Addressing Multiple Bit/Symbol Errors In Dram Subsystem, Ravikiran Yeleswarapu, Arun K. Somani

Electrical and Computer Engineering Publications

As DRAM technology continues to evolve towards smaller feature sizes and increased densities, faults in DRAM subsystem are becoming more severe. Current servers mostly use CHIPKILL based schemes to tolerate up-to one/two symbol errors per DRAM beat. Multi-symbol errors arising due to faults in multiple data buses and chips may not be detected by these schemes. In this paper, we introduce Single Symbol Correction Multiple Symbol Detection (SSCMSD) - a novel error handling scheme to correct single-symbol errors and detect multi-symbol errors. Our scheme makes use of a hash in combination with Error Correcting Code (ECC) to avoid silent data ...


Sequence Design Via Semidefinite Programming Relaxation And Randomized Projection, Dian Mo Jan 2019

Sequence Design Via Semidefinite Programming Relaxation And Randomized Projection, Dian Mo

Doctoral Dissertations

Wideband is a booming technology in the field of wireless communications. The receivers in wideband communication systems are expected to cover a very wide spectrum and adaptively extract the parts of interest. The literature has focused on mixing the input spectrum to baseband using a pseudorandom sequence modulation and recovering the received signals from linearly independent measurements by parallel branches to mitigate the pressures from required extreme high sampling frequency. However, a pseudorandom sequence provides no rejection for the strong interferers received together with weak signals from distant sources. The interferers cause significant distortion due to the nonlinearity of the ...


Distance-Based Cluster Head Election For Mobile Sensing, Ruairí De Fréin, Liam O'Farrell Dec 2018

Distance-Based Cluster Head Election For Mobile Sensing, Ruairí De Fréin, Liam O'Farrell

Conference papers

Energy-efficient, fair, stochastic leader-selection algorithms are designed for mobile sensing scenarios which adapt the sensing strategy depending on the mobile sensing topology. Methods for electing a cluster head are crucially important when optimizing the trade-off between the number of peer-to- peer interactions between mobiles and client-server interactions with a cloud-hosted application server. The battery-life of mobile devices is a crucial constraint facing application developers who are looking to use the convergence of mobile computing and cloud computing to perform environmental sensing. We exploit the mobile network topology, specifically the location of mobiles with respect to the gateway device, to stochastically ...


Optical Wireless Data Center Networks, Abdelbaset S. Hamza Oct 2018

Optical Wireless Data Center Networks, Abdelbaset S. Hamza

Computer Science and Engineering: Theses, Dissertations, and Student Research

Bandwidth and computation-intensive Big Data applications in disciplines like social media, bio- and nano-informatics, Internet-of-Things (IoT), and real-time analytics, are pushing existing access and core (backbone) networks as well as Data Center Networks (DCNs) to their limits. Next generation DCNs must support continuously increasing network traffic while satisfying minimum performance requirements of latency, reliability, flexibility and scalability. Therefore, a larger number of cables (i.e., copper-cables and fiber optics) may be required in conventional wired DCNs. In addition to limiting the possible topologies, large number of cables may result into design and development problems related to wire ducting and maintenance ...


Wireless Sensor Networks For Smart Communications, Mu Zhou, Qilian Liang, Hongyi Wu, Weixiao Meng, Kunjie Xu Oct 2018

Wireless Sensor Networks For Smart Communications, Mu Zhou, Qilian Liang, Hongyi Wu, Weixiao Meng, Kunjie Xu

Electrical & Computer Engineering Faculty Publications

(First paragraph) In the first edition of the special issue titled “Wireless Sensor Networks for Smart Communications”, a total of 22 manuscripts were received and 6 of these were accepted. This issue demonstrated that network congestion, user mobility, and adjacent spectrum interference are the main reasons for the degradation ofcommunication quality inWireless Sensor Networks (WSNs).


Real-Time Intrusion Detection Using Multidimensional Sequence-To-Sequence Machine Learning And Adaptive Stream Processing, Gobinath Loganathan Aug 2018

Real-Time Intrusion Detection Using Multidimensional Sequence-To-Sequence Machine Learning And Adaptive Stream Processing, Gobinath Loganathan

Electronic Thesis and Dissertation Repository

A network intrusion is any unauthorized activity on a computer network. There are host-based and network-based Intrusion Detection Systems (IDS's), of which there are each signature-based and anomaly-based detection methods. An anomalous network behavior can be defined as an intentional violation of the expected sequence of packets. In a real-time network-based IDS, incoming packets are treated as a stream of data. A stream processor takes any stream of data or events and extracts interesting patterns on the fly. This representation allows applying statistical anomaly detection using sequence prediction algorithms as well as using a stream processor to perform signature-based ...


Cmos Radioactive Isotope Identification With Multichannel Analyzer And Embedded Neural Network, Samuel Murray Jul 2018

Cmos Radioactive Isotope Identification With Multichannel Analyzer And Embedded Neural Network, Samuel Murray

Theses, Dissertations, and Student Research from Electrical & Computer Engineering

A radiation detection and identification system is designed and implemented to perform gamma ray spectroscopy on radioactive sources and identify which isotopes are present in the sources. A multichannel analyzer is implemented on an ASIC to process the signal produced from gamma rays detected by a scintillator and photomultiplier tube and to quantize the gamma ray energies to build a histogram. A fast, low memory embedded neural network is implemented on a microcontroller ASIC to identify the isotopes present in the gamma ray histogram produced by the multichannel analyzer in real time.

Advisors: Sina Balkir and Michael Hoffman


A Study Of Scalability And Cost-Effectiveness Of Large-Scale Scientific Applications Over Heterogeneous Computing Environment, Arghya K. Das Jun 2018

A Study Of Scalability And Cost-Effectiveness Of Large-Scale Scientific Applications Over Heterogeneous Computing Environment, Arghya K. Das

LSU Doctoral Dissertations

Recent advances in large-scale experimental facilities ushered in an era of data-driven science. These large-scale data increase the opportunity to answer many fundamental questions in basic science. However, these data pose new challenges to the scientific community in terms of their optimal processing and transfer. Consequently, scientists are in dire need of robust high performance computing (HPC) solutions that can scale with terabytes of data.

In this thesis, I address the challenges in three major aspects of scientific big data processing as follows: 1) Developing scalable software and algorithms for data- and compute-intensive scientific applications. 2) Proposing new cluster architectures ...


Vehicle Pseudonym Association Attack Model, Pierson Yieh, Pierson Yieh Jun 2018

Vehicle Pseudonym Association Attack Model, Pierson Yieh, Pierson Yieh

Master's Theses and Project Reports

With recent advances in technology, Vehicular Ad-hoc Networks (VANETs) have grown in application. One of these areas of application is Vehicle Safety Communication (VSC) technology. VSC technology allows for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that enhance vehicle safety and driving experience. However, these newly developing technologies bring with them a concern for the vehicular privacy of drivers. Vehicles already employ the use of pseudonyms, unique identifiers used with signal messages for a limited period of time, to prevent long term tracking. But can attackers still attack vehicular privacy even when vehicles employ a pseudonym change strategy? The major contribution ...


The Design, Building, And Testing Of A Constant On Discreet Jammer For The Ieee 802.15.4/Zigbee Wireless Communication Protocol, Alexandre J. Marette Jun 2018

The Design, Building, And Testing Of A Constant On Discreet Jammer For The Ieee 802.15.4/Zigbee Wireless Communication Protocol, Alexandre J. Marette

Master's Theses and Project Reports

As wireless protocols become easier to implement, more products come with wireless connectivity. This latest push for wireless connectivity has left a gap in the development of the security and the reliability of some protocols. These wireless protocols can be used in the growing field of IoT where wireless sensors are used to share information throughout a network. IoT is being implemented in homes, agriculture, manufactory, and in the medical field. Disrupting a wireless device from proper communication could potentially result in production loss, security issues, and bodily harm. The 802.15.4/ZigBee protocol is used in low power ...


State Acquisition In Computer Networks, Ruairí De Fréin May 2018

State Acquisition In Computer Networks, Ruairí De Fréin

Conference papers

We establish that State Acquisition should be per- formed in networks at a rate which is consistent with the rate-of-change of the element or service being observed. We demonstrate that many existing monitoring and service-level prediction tools do not acquire network state in an appropriate manner. To address this challenge: (1) we define the rate-of- change of different applications; (2) we use methods for analysis of unevenly spaced time series, specifically, time series arising from video and voice applications, to estimate the rate-of-change of these services; and finally, (3) we demonstrate how to acquire network state accurately for a number ...


Spillover Modes In Multiplex Games: Double-Edged Effects On Cooperation, And Their Coevolution, Tommy Khoo, Feng Fu, Scott D. Pauls May 2018

Spillover Modes In Multiplex Games: Double-Edged Effects On Cooperation, And Their Coevolution, Tommy Khoo, Feng Fu, Scott D. Pauls

Open Dartmouth: Faculty Open Access Scholarship

In recent years, there has been growing interest in studying games on multiplex networks that account for interactions across linked social contexts. However, little is known about how potential cross-context interference, or spillover, of individual behavioural strategy impact overall cooperation. We consider three plausible spillover modes, quantifying and comparing their effects on the evolution of cooperation. In our model, social interactions take place on two network layers: repeated interactions with close neighbours in a lattice, and one-shot interactions with random individuals. Spillover can occur during the learning process with accidental cross-layer strategy transfer, or during social interactions with errors in ...


Generalized Robust Mtl Semantics For Problems In Cardiac Electrophysiology, Houssam Abbas, Rahul Mangharam Mar 2018

Generalized Robust Mtl Semantics For Problems In Cardiac Electrophysiology, Houssam Abbas, Rahul Mangharam

Real-Time and Embedded Systems Lab (mLAB)

Robustness-Guided Falsification (RGF) is an efficient

testing technique that tries to find a system execution that

violates some formal specification, by minimizing the robustness

of the specification over the set of initial conditions of the

system. Robustness uses an underlying distance function on

the space of system executions. As RGF is applied to new fields

like medicine, it is essential to determine whether our distances

still capture the domain expert’s intuition of which executions

are similar and which are not. Motivated by the problem of

testing the algorithms of cardiac defibrillators implanted in

millions of patients worldwide, this work ...


Collaborative Appearance-Based Place Recognition And Improving Place Recognition Using Detection Of Dynamic Objects, Juan Pablo Munoz Feb 2018

Collaborative Appearance-Based Place Recognition And Improving Place Recognition Using Detection Of Dynamic Objects, Juan Pablo Munoz

All Dissertations, Theses, and Capstone Projects

This dissertation makes contributions to the problem of Long-Term Appearance-Based Place Recognition. We present a framework for place recognition in a collaborative scheme and a method to reduce the impact of dynamic objects on place representations. We demonstrate our findings using a state-of-the-art place recognition approach.

We begin in Part I by describing the general problem of place recognition and its importance in applications where accurate localization is crucial. We discuss feature detection and description and also explain the functioning of several place recognition frameworks.

In Part II, we present a novel framework for collaboration between agents from a pure ...


Architectures For Real-Time Automatic Sign Language Recognition On Resource-Constrained Device, James M. Blair Jan 2018

Architectures For Real-Time Automatic Sign Language Recognition On Resource-Constrained Device, James M. Blair

UNF Graduate Theses and Dissertations

Powerful, handheld computing devices have proliferated among consumers in recent years. Combined with new cameras and sensors capable of detecting objects in three-dimensional space, new gesture-based paradigms of human computer interaction are becoming available. One possible application of these developments is an automated sign language recognition system. This thesis reviews the existing body of work regarding computer recognition of sign language gestures as well as the design of systems for speech recognition, a similar problem. Little work has been done to apply the well-known architectural patterns of speech recognition systems to the domain of sign language recognition. This work creates ...