Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Computer Engineering

Intelligent Advancements In Location Management And C-Ran Power-Aware Resource Allocation, Emad Ali Aqeeli Dec 2017

Intelligent Advancements In Location Management And C-Ran Power-Aware Resource Allocation, Emad Ali Aqeeli

Electronic Thesis and Dissertation Repository

The evolving of cellular networks within the last decade continues to focus on delivering a robust and reliable means to cope with the increasing number of users and demanded capacity. Recent advancements of cellular networks such as Long-Term Evolution (LTE) and LTE-advanced offer a remarkable high bandwidth connectivity delivered to the users. Signalling overhead is one of the vital issues that impact the cellular behavior. Causing a significant load in the core network hence effecting the cellular network reliability. Moreover, the signaling overhead decreases the Quality of Experience (QoE) of users. The first topic of the thesis attempts to reduce …


Design And Simulation Of An 8-Bit Successive Approximation Register Charge-Redistribution Analog-To-Digital Converter, Sumit K. Verma Nov 2017

Design And Simulation Of An 8-Bit Successive Approximation Register Charge-Redistribution Analog-To-Digital Converter, Sumit K. Verma

Electrical Engineering Theses

The thesis initially investigates the history of the monolithic ADCs. The next chapter explores the different types of ADCs available in the market today. Next, the operation of a 4-bit SAR ADC has been studied. Based on this analysis, an 8-bit charge-redistribution SAR ADC has been designed and simulated with Multisim (National Instruments, Austin, TX). The design is divided into different blocks which are individually implemented and tested. Level-1 SPICE MOSFET models representative of 5μm devices were used wherever individual MOSFETs were used in the design. Finally, the power dissipation during the conversion period was also estimated. The supply voltage …


A Study Of Very Short Intermittent Ddos Attacks On The Performance Of Web Services In Clouds, Huasong Shan Nov 2017

A Study Of Very Short Intermittent Ddos Attacks On The Performance Of Web Services In Clouds, Huasong Shan

LSU Doctoral Dissertations

Distributed Denial-of-Service (DDoS) attacks for web applications such as e-commerce are increasing in size, scale, and frequency. The emerging elastic cloud computing cannot defend against ever-evolving new types of DDoS attacks, since they exploit various newly discovered network or system vulnerabilities even in the cloud platform, bypassing not only the state-of-the-art defense mechanisms but also the elasticity mechanisms of cloud computing.

In this dissertation, we focus on a new type of low-volume DDoS attack, Very Short Intermittent DDoS Attacks, which can hurt the performance of web applications deployed in the cloud via transiently saturating the critical bottleneck resource of the …


The Following Robot, Juan D. Cerda, Matthew S. Kwan, Vi M. Le Jun 2017

The Following Robot, Juan D. Cerda, Matthew S. Kwan, Vi M. Le

Computer Engineering

The objective of this project is to design, build, and test an autonomous robot with an associated Android application. The robot uses on board inertial measurement sensors (magnetometer, accelerometer, gyroscope) and coordinates itself through Bluetooth communication with the similar built­in measurement sensors on the Android phone to mimic and follow movement. The Following Robot incorporates the same basic movement functionality as a typical RC car. The robot follows the user’s phone through an application on one’s phone. This application accesses the phone’s accelerometer and gyroscope data and translates into appropriate conversions. Methods of tracking and calculating distance or angular displacement …


Remote Cable Gantry, Allen L. Bailey Jun 2017

Remote Cable Gantry, Allen L. Bailey

Electrical Engineering

The Remote Cable Gantry is a robotic system that was initially intended to aid in the art of aerial videography. It was designed to enable novice and expert users alike to capture both video footage and audio from perspectives unachievable by current methods. This system uses a series of cables to control the position of a camera gimbal in a defined 3D space and, as a self-contained unit, is portable and easy to use. The Remote Cable Gantry offers a quiet, intuitive, and safe alternative to existing technology, which has been limiting the market and potential of aerial photography and …


Automation In Entertainment: Concept, Design, And Application, Ryan Thally May 2017

Automation In Entertainment: Concept, Design, And Application, Ryan Thally

Undergraduate Honors Theses

The focus of this thesis is to explore the automation technology used in the modern entertainment industry. Upon completion of my thesis, I will deliver a working prototype of the chosen technology and present its capabilities in a choreographed show.


Framework For Industrial Control System Honeypot Network Traffic Generation, Htein A. Lin Mar 2017

Framework For Industrial Control System Honeypot Network Traffic Generation, Htein A. Lin

Theses and Dissertations

Defending critical infrastructure assets is an important but extremely difficult and expensive task. Historically, decoys have been used very effectively to distract attackers and in some cases convince an attacker to reveal their attack strategy. Several researchers have proposed the use of honeypots to protect programmable logic controllers, specifically those used to support critical infrastructure. However, most of these honeypot designs are static systems that wait for a would-be attacker. To be effective, honeypot decoys need to be as realistic as possible. This paper introduces a proof-of-concept honeypot network traffic generator that mimics genuine control systems. Experiments are conducted using …


Autoprov: An Automated File Provenance Collection Tool, Ryan A. Good Mar 2017

Autoprov: An Automated File Provenance Collection Tool, Ryan A. Good

Theses and Dissertations

A file's provenance is a detailing of its origins and activities. There are tools available that are useful in maintaining the provenance of a file. Unfortunately for digital forensics, these tools require prior installation on the computer of interest while provenance generating events happen. The presented tool addresses this by reconstructing a file's provenance from several temporal artifacts. It identifies relevant temporal and user correlations between these artifacts, and presents them to the user. A variety of predefined use cases and real world data are tested against to demonstrate that this software allows examiners to draw useful conclusions about the …


Applying Cyber Threat Intelligence To Industrial Control Systems, Matthew P. Sibiga Mar 2017

Applying Cyber Threat Intelligence To Industrial Control Systems, Matthew P. Sibiga

Theses and Dissertations

A cybersecurity initiative known as cyber threat intelligence (CTI) has recently been developed and deployed. The overall goal of this new technology is to help protect network infrastructures. Threat intelligence platforms (TIPs) have also been created to help facilitate CTI effectiveness within organizations. There are many benefits that both can achieve within the information technology (IT) sector. The industrial control system (ICS) sector can also benefit from these technologies as most ICS networks are connected to IT networks. CTI and TIPs become resourceful when using indicators of compromise (IOCs) from known ICS malware attacks and an open source intrusion detection …


Contributions To Edge Computing, Vernon K. Bumgardner Jan 2017

Contributions To Edge Computing, Vernon K. Bumgardner

Theses and Dissertations--Computer Science

Efforts related to Internet of Things (IoT), Cyber-Physical Systems (CPS), Machine to Machine (M2M) technologies, Industrial Internet, and Smart Cities aim to improve society through the coordination of distributed devices and analysis of resulting data. By the year 2020 there will be an estimated 50 billion network connected devices globally and 43 trillion gigabytes of electronic data. Current practices of moving data directly from end-devices to remote and potentially distant cloud computing services will not be sufficient to manage future device and data growth.

Edge Computing is the migration of computational functionality to sources of data generation. The importance of …


Omni-Directional Infrared 3d Reconstruction And Tracking Of Human Targets, Emrah Benli Jan 2017

Omni-Directional Infrared 3d Reconstruction And Tracking Of Human Targets, Emrah Benli

Theses and Dissertations

Omni-directional (O-D) infrared (IR) vision is an effective capability for mobile systems in robotics, due to its advantages: illumination invariance, wide field-of-view, ease of identifying heat-emitting objects, and long term tracking without interruption. Unfortunately, O-D IR sensors have low resolution, low frame rates, high cost, sensor noise, and an increase in tracking time. In order to overcome these disadvantages, we propose an autonomous system application in indoor scenarios including 1) Dynamic 3D Reconstruction (D3DR) of the target view in real time images, 2) Human Behavior-based Target Tracking from O-D thermal images, 3) Thermal Multisensor Fusion (TMF), and 4) Visual Perception …


Design And Implementation Of An Improved Android Application For Bard Shuttle Services, Chance O'Neihl Wren Jan 2017

Design And Implementation Of An Improved Android Application For Bard Shuttle Services, Chance O'Neihl Wren

Senior Projects Spring 2017

With the growing population of Bard College, the need for the college’s shuttle system continues to grow. As a result, enabling the Bard community to quickly and easily access the shuttle schedules and times, has also become more important in the daily of life of Bard College's inhabitants. Although Bard College has a mobile application for Android and iPhone mobile devices alike, there was a growing demand for a new improved shuttle application for Android mobile devices. This project seeks to improve the functionality, user friendliness, and availability of shuttle schedules to the Bard Community, in the form of a …


System For Workout Information Management, Mark Archual, Ethan E. Schweinsberg Jan 2017

System For Workout Information Management, Mark Archual, Ethan E. Schweinsberg

Williams Honors College, Honors Research Projects

Power racks are a weight machine used by swimmers to provide resistance while they swim away from a wall toward the center of the pool. The objective of this project is to build a modular data system that can be added to these machines to record and log quantitative information during their use. This information will be stored on a web server, and made available to the user for analysis and visualization through a web application. Workout data can also be downloaded and interpreted at a later time, independent of the web application. The data system should be water resistant, …


Packmule, Jared M. Alexander, Jared J. Ford, Timothy J. Griffiths, Andray Pennington Jan 2017

Packmule, Jared M. Alexander, Jared J. Ford, Timothy J. Griffiths, Andray Pennington

Williams Honors College, Honors Research Projects

People face demands of hauling equipment and belongings with them every day, whether it be for work or leisure. This design report discusses and details a product that would allow people to overcome the struggles of this. The Packmule is an autonomous following robot that has the capability of carrying a load up to 30 pounds. The design involves two independently controlled motors operating two drive wheels so that the Packmule will be flexible in the directions it can move. There are also two more steering wheels for support of the base and the load inside. The way in which …