Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 23 of 23

Full-Text Articles in Computer Engineering

How To Build An Rss Feed Using Asp, Umakant Mishra Jun 2013

How To Build An Rss Feed Using Asp, Umakant Mishra

Umakant Mishra

RSS is a XML based format. The Current popular version of RSS is RSS version 2.0. The purpose of adding an RSS feed to your site is to show if anything new is added to the site. For example, if a new article or blog or news item is added to your site that should automatically appear in the RSS feed so that the visitors/ RSS readers will automatically get updated about this new addition. The RSS feed is also called RSS channel.

There are two main elements of the RSS XML file, one is the header or channel element …


Network Self-Organization In The Internet Of Things, Arjun Athreya, Patrick Tague May 2013

Network Self-Organization In The Internet Of Things, Arjun Athreya, Patrick Tague

Patrick Tague

The Internet of Things is a paradigm that allows the interaction of ubiquitous devices through a network to achieve common goals. This paradigm like any man-made infrastructure is subject to disasters, outages and other adversarial conditions. Under these situations provisioned communications fail, rendering this paradigm with little or no use. Hence, network self-organization among these devices is needed to allow for communication resilience. This paper presents a survey of related work in the area of self-organization and discusses future research opportunities and challenges for self-organization in the Internet of Things. We begin this paper with a system perspective of the …


Asia: Accelerated Secure In-Network Aggregation In Vehicular Sensing Networks, Xiao Wang, Patrick Tague May 2013

Asia: Accelerated Secure In-Network Aggregation In Vehicular Sensing Networks, Xiao Wang, Patrick Tague

Patrick Tague

Vehicular Ad-Hoc Networks (VANETs) can potentially become a sensing platform. In-network aggregation, a fundamental primitive for querying sensory data, has been shown to reduce overall communication overhead at large. To secure data aggregation in VANETs, existing schemes mainly rely on digital signatures. However, generating and verifying such signatures can cause high computational overhead. More importantly, time-consuming verifications lead to the vulnerability to signature flooding attacks in which a receiver cannot timely verify all messages before their respective deadlines. In this paper, we propose ASIA as an Accelerated Secure In-network Aggregation strategy that can accelerate message verifications and significantly reduce computational …


Unlocin: Unauthorized Location Inference On Smartphones Without Being Caught, Le Nguyen, Yuan Tian, Sungho Cho, Wookjong Kwak, Sanjay Parab, Yu Seung Kim, Patrick Tague, Joy Zhang May 2013

Unlocin: Unauthorized Location Inference On Smartphones Without Being Caught, Le Nguyen, Yuan Tian, Sungho Cho, Wookjong Kwak, Sanjay Parab, Yu Seung Kim, Patrick Tague, Joy Zhang

Patrick Tague

Location privacy has become one of the critical issues in the smartphone era. Since users carry their phones everywhere and all the time, leaking users’ location information can have dangerous implications. In this paper, we leverage the idea that Wi-Fi parameters not considered to be “sensitive” in the Android platform can be exploited to learn users’ location. Though the idea of using Wi-Fi information to breach location privacy is not new, we extend the basic idea and show that clever attackers can do so without being detected by current malware detection techniques. To achieve this goal, we develop the Unauthorized …


How To Jam Without Getting Caught: Analysis And Empirical Study Of Stealthy Periodic Jamming, Bruce Debruhl, Patrick Tague May 2013

How To Jam Without Getting Caught: Analysis And Empirical Study Of Stealthy Periodic Jamming, Bruce Debruhl, Patrick Tague

Patrick Tague

Despite the widespread commercial use of spread spectrum technology, advanced algorithms and modern hardware capabilities still allows efficient denial-of-service attacks against wireless communication systems using jamming. Much of the recent work on jamming mitigation has focused on how to adjust the transmitter-receiver system once a jamming attack has been detected. However, characterizing the detectability of certain classes of jamming attacks remains a largely unstudied problem. We aim to narrow this gap by analyzing the effect of a class of periodic jamming attacks on the attack detection metrics of packet delivery ratio (PDR) and received signal strength (RSS). We show that …


Stochastic Optimization Of Flow-Jamming Attacks In Multichannel Wireless Networks, Yu Seung Kim, Bruce Debruhl, Patrick Tague May 2013

Stochastic Optimization Of Flow-Jamming Attacks In Multichannel Wireless Networks, Yu Seung Kim, Bruce Debruhl, Patrick Tague

Patrick Tague

An attacker can launch an efficient jamming attack to deny service to flows in wireless networks by using cross-layer knowledge of the target network. For example, flow-jamming defined in existing work incorporates network layer information into the conventional jamming attack to maximize its attack efficiency. In this paper, we redefine a discrete optimization model of flow-jamming in multichannel wireless networks and provide metrics to evaluate the attack efficiency. We then propose the use of stochastic optimization techniques for flow-jamming attacks by using three stochastic search algorithms: iterative improvement, simulated annealing, and genetic algorithm. By integrating the algorithms into a simulation …


Adaptive Wireless Communications: Mimo Channels And Networks, Daniel Bliss, Siddhartan Govindasamy May 2013

Adaptive Wireless Communications: Mimo Channels And Networks, Daniel Bliss, Siddhartan Govindasamy

Siddhartan Govindasamy

Adopting a balanced mix of theory, algorithms and practical design issues, this comprehensive volume explores cutting-edge applications in adaptive wireless communications and the implications these techniques have for future wireless network performance. Presenting practical concerns in the context of different strands from information theory, parameter estimation theory, array processing and wireless communication, the authors present a complete picture of the field. Topics covered include advanced multiple-antenna adaptive processing, ad hoc networking, MIMO, MAC protocols, space-time coding, cellular networks and cognitive radio, with the significance and effects of both internal and external interference a recurrent theme throughout. A broad, self-contained technical …


Mobile Computing: Challenges And Opportunities For Autonomy And Feedback, Ole J. Mengshoel, Bob Iannucci, Abe Ishihara May 2013

Mobile Computing: Challenges And Opportunities For Autonomy And Feedback, Ole J. Mengshoel, Bob Iannucci, Abe Ishihara

Ole J Mengshoel

Mobile devices have evolved to become computing platforms more similar to desktops and workstations than the cell phones and handsets of yesteryear. Unfortunately, today’s mobile infrastructures are mirrors of the wired past. Devices, apps, and networks impact one another, but a systematic approach for allowing them to cooperate is currently missing. We propose an approach that seeks to open key interfaces and to apply feedback and autonomic computing to improve both user experience and mobile system dynamics.


Adaptive Control Of Apache Web Server, Erik Reed, Abe Ishihara, Ole J. Mengshoel May 2013

Adaptive Control Of Apache Web Server, Erik Reed, Abe Ishihara, Ole J. Mengshoel

Ole J Mengshoel

Traffic to a Web site can vary dramatically. At the same time it is highly desirable that a Web site is reactive. To provide crisp interaction on thin clients, 150 milliseconds has been suggested as an upper bound on response time. Unfortunately, the popular Apache Web server is limited in its capabilities to be reactive under varying traffic. To address this problem, we design in this paper an adaptive controller for the Apache Web server. A modified recursive least squares algorithm is used to identify system dynamics and a minimum degree pole placement controller is implemented to adjust the maximum …


Wireless Transmission Network : A Imagine, Radhey Shyam Meena Engineer, Neeraj Kumar Garg Asst.Prof Apr 2013

Wireless Transmission Network : A Imagine, Radhey Shyam Meena Engineer, Neeraj Kumar Garg Asst.Prof

Radhey Shyam Meena

World cannot be imagined without electrical power. Generally the power is transmitted through transmission networks. This paper describes an original idea to eradicate the hazardous usage of electrical wires which involve lot of confusion in particularly organizing them. Imagine a future in which wireless power transfer is feasible: cell phones, household robots, mp3 players, laptop computers and other portable electronic devices capable of charging themselves without ever being plugged in freeing us from that final ubiquitous power wire. This paper includes the techniques of transmitting power without using wires with an efficiency of about 95% with non-radioactivemethods. In this paper …


Selfish Manipulation Of Cooperative Cellular Communications Via Channel Fabrication, Shrikant Adhikarla, Min Suk Kang, Patrick Tague Mar 2013

Selfish Manipulation Of Cooperative Cellular Communications Via Channel Fabrication, Shrikant Adhikarla, Min Suk Kang, Patrick Tague

Patrick Tague

In today’s cellular networks, user equipment (UE) have suffered from low spectral efficiency at cell-edge region due to high interference from adjacent base stations (BSs), which share the same spectral radio resources. In the recently proposed cooperative cellular networks, geographically separated multiple BSs cooperate on transmission in order to improve the UE’s signal-to-interference-plus-noise-ratio (SINR) at cell-edge region. The service provider of the system dynamically assigns the cluster of BSs to achieve higher SINR for the UE while optimizing the use of system radio resources. Although it is the service provider that makes the clustering decision for the UE, the service …


Battery Energy Storage System In Solar Power Generation, Radhey Shyam Meena Er., Deepa Sharma Mar 2013

Battery Energy Storage System In Solar Power Generation, Radhey Shyam Meena Er., Deepa Sharma

Radhey Shyam Meena

Grid-connected solar PV dramatically changes the load profile of an electric utility customer. The expected widespread adoption of solar generation by customers on the distribution system poses significant challenges to system operators both in transient and steady state operation, from issues including voltage swings, sudden weather-induced changes in generation, and legacy protective devices designed with one-way power flow in mind


On Spectrum Probing In Cognitive Radio Networks: Does Randomization Matter, Chao Chen, Zesheng Chen, Todor Cooklev, Carlos Pomalaza-Ráez Feb 2013

On Spectrum Probing In Cognitive Radio Networks: Does Randomization Matter, Chao Chen, Zesheng Chen, Todor Cooklev, Carlos Pomalaza-Ráez

Todor Cooklev

In cognitive radio networks, dynamic spectrumaccess is achieved by allowing secondary users (SUs) to probethe spectrum and utilize available channels opportunistically.Spectrum probing mechanisms should be efficient and fast toavoid harmful interference with primary users (PUs). Periodicprobing has been commonly adopted as a default spectrumprobing mechanism. In this paper, we attempt to study differentspectrum probing mechanisms and evaluate a performance metriccalled the probing delay, i.e., how quickly a probing mechanismcan detect a channel change. We find that randomization in theprobing strategy does affect the probing delay. Specifically, in theindependent sensing scenario, periodic probing indeed achievesthe smallest probing delay. In the cooperative …


Greek Patent Protection System And The Impacts Of Information Technology Industry, Emmanouil Alexander Zografakis Ez Feb 2013

Greek Patent Protection System And The Impacts Of Information Technology Industry, Emmanouil Alexander Zografakis Ez

Emmanouil Alexander Zografakis EZ

Our era can be characterized as the era of knowledge proliferation and bountifulness. That has marked our era as the era following the pace of the Information Society Development. Information Society has also brought about a remarkable IT development pace over countries. Thereby, it is greatly important all that raw knowledge to become mind figments, ideas and even inventions and innovations. It is also essential to highlight that such a beneficial process will ensure the continuity of the IT development. The only way to achieve that goal is to find a way to secure all that aforementioned knowledge which is …


Self-Organization Of A Mesh Hierarchy For Smart Grid Monitoring In Outage Scenarios, Arjun Athreya, Patrick Tague Jan 2013

Self-Organization Of A Mesh Hierarchy For Smart Grid Monitoring In Outage Scenarios, Arjun Athreya, Patrick Tague

Patrick Tague

Current hierarchical communication infrastructure in the smart grid is not robust for data collection from smart meters during outages. In this work, we propose a self-organizing multi-channel wireless communication framework to aid in data collection for smart grid health monitoring. We propose a two-stage bootstrapping process in which nodes first self-organize into local mesh clusters by flattening the provisioned hierarchy and then interconnect to provide mesh connectivity from the outage region to functioning regions of the grid. We propose to construct this mesh-of-meshes hierarchy using a cross-layer strategy that jointly considers medium access limitations and the asymmetric traffic flow that …


Battery Energy Storage System In Solar Power Generation, Radhey Shyam Meena Er. Jan 2013

Battery Energy Storage System In Solar Power Generation, Radhey Shyam Meena Er.

Radhey Shyam Meena

As solar photovoltaic power generation becomes more commonplace, the inherent intermittency of the solar resource poses one of the great challenges to those who would design and implement the next generation smart grid. Specifically, grid-tied solar power generation is a distributed resource whose output can change extremely rapidly, resulting in many issues for the distribution system operator with a large quantity of installed photovoltaic devices. Battery energy storage systems are increasingly being used to help integrate solar power into the grid. These systems are capable of absorbing and delivering both real and reactive power with sub-second response times. With these …


Research In Progress-Defending Android Smartphones From Malware Attacks, Marwan Omar, Maurice E. Dawson Jr. Dec 2012

Research In Progress-Defending Android Smartphones From Malware Attacks, Marwan Omar, Maurice E. Dawson Jr.

Maurice Dawson

Smart phones are becoming enriched with confidential information due to their powerful computational capabilities and attractive communications features. The Android smart phone is one of the most widely used platforms by businesses and users alike. This is partially because Android smart phones use the free, open-source Linux as the underlying operating system, which allows development of applications by any software developer. This research study aims to explore security risks associated with the use of Android smart phones and the sensitive information they contain, the researcher devised a survey questionnaire to investigate and further understand security threats targeting Android smart phones. …


Connectivity Of Wireless Ad Hoc Networks: Impacts Of Antenna Models, Qiu Wang, Hong-Ning Dai, Qinglin Zhao Dec 2012

Connectivity Of Wireless Ad Hoc Networks: Impacts Of Antenna Models, Qiu Wang, Hong-Ning Dai, Qinglin Zhao

Hong-Ning Dai

This paper concerns the impact of various antenna models on the network connectivity of wireless ad hoc networks. Existing antenna models have their pros and cons in the accuracy reflecting realistic antennas and the computational complexity. We therefore propose a new directional antenna model called Approx-real to balance the accuracy against the complexity. We then run extensive simulations to compare the existing models and the Approx-real model in terms of the network connectivity. The study results show that the Approx-real model can better approximate the best accurate existing antenna models than other simplified antenna models, while introducing no high computational …


On Busy-Tone Based Mac Protocol For Wireless Networks With Directional Antennas, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu Dec 2012

On Busy-Tone Based Mac Protocol For Wireless Networks With Directional Antennas, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu

Hong-Ning Dai

The application of directional antennas in wireless ad hoc networks offers numerous benefits, such as the extended communication range, the increased spatial reuse, the improved capacity and the suppressed interference. However, directional antennas can cause new location-dependent carrier sensing problems, such as new hidden terminal and deafness problems, which can severely degrade the network performance. Recently, a few schemes have been proposed to address these problems. However, most of these existing methods can only partially solve the hidden terminal and deafness problems. Some of them even bring significant performance overhead. In this paper, we propose a novel MAC protocol, in …


Eavesdropping Security In Wireless Ad Hoc Networks With Directional Antennas, Qiu Wang, Hong-Ning Dai, Qinglin Zhao Dec 2012

Eavesdropping Security In Wireless Ad Hoc Networks With Directional Antennas, Qiu Wang, Hong-Ning Dai, Qinglin Zhao

Hong-Ning Dai

The eavesdropping security of wireless ad hoc networks has attracted considerable attention recently. However, most of current studies only consider OMN networks, where each node is mounted with a single omni-directional antenna, which radiates radio signals in all directions and consequently leads to the high eavesdropping possibility. Compared with an omnidirectional antenna, a directional antenna can concentrate the radio signals on some desired directions so that it can potentially reduce the eavesdropping possibility. This paper investigates the eavesdropping security of wireless ad hoc networks equipped with directional antennas. In particular, we study the eavesdropping possibility of OMN networks, SDA networks …


An Overview Of Using Directional Antennas In Wireless Networks, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu Dec 2012

An Overview Of Using Directional Antennas In Wireless Networks, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu

Hong-Ning Dai

Compared with omni-directional antennas, directional antennas have many merits, such as lower interference, better spatial reuse, longer transmission range and the improved network capacity. Directional antennas enable numerous emerging outdoor and indoor applications, which have been addressed in many recent studies. Despite the advances in wireless networks with directional antennas (DAWNs), there are many research challenges in all layers of DAWNs. This paper presents a detailed study on recent advances and open research issues on DAWNs. Firstly, we briefly introduce the classification of directional antennas, antenna radiation patterns, antenna modes as well as the challenges in the physical layer of …


Channel Allocation In Wireless Networks With Directional Antennas, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu Dec 2012

Channel Allocation In Wireless Networks With Directional Antennas, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu

Hong-Ning Dai

In this paper, we study the channel allocation in multi-channel wireless ad hoc networks with directional antennas. In particular, we investigate the problem: given a set of wireless nodes equipped with directional antennas, how many channels are needed to ensure collision-free communications? We derive the upper bounds on the number of channels, which heavily depend on the node density and the interference ratio (i.e., the ratio of the interference range to the transmission range). We construct several scenarios to examine the tightness of the derived bounds. We also take the side-lobes and back-lobes as well as the signal path loss …


On Eavesdropping Attacks In Wireless Sensor Networks With Directional Antennas, Hong-Ning Dai, Qiu Wang, Dong Li, Raymond Chi-Wing Wong Dec 2012

On Eavesdropping Attacks In Wireless Sensor Networks With Directional Antennas, Hong-Ning Dai, Qiu Wang, Dong Li, Raymond Chi-Wing Wong

Hong-Ning Dai

The eavesdropping attack is a serious security threat to a wireless sensor network (WSN) since the eavesdropping attack is a prerequisite for other attacks. Conventional WSNs consist of wireless nodes equipped with omnidirectional antennas, which broadcast radio signals in all directions and are consequently prone to the eavesdropping attacks. Different from omnidirectional antennas, directional antennas radiate radio signals on desired directions and potentially reduce the possibility of the eavesdropping attacks. In this paper, we propose a model to analyze the eavesdropping probability in both single-hop WSNs and multihop WSNs with omnidirectional antennas and directional antennas. We verify the correctness of …