Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

2013

Discipline
Institution
Keyword
Publication
File Type

Articles 31 - 60 of 97

Full-Text Articles in Computer Engineering

The Multi-Tier Mission Architecture And A Different Approach To Entry, Descent And Landing, Jeremy Straub Jun 2013

The Multi-Tier Mission Architecture And A Different Approach To Entry, Descent And Landing, Jeremy Straub

Jeremy Straub

Planetary missions are generally very well planned out. Where the spacecraft will be deployed, what it will do there and in what order are generally determined before launch. While some allowance is made for greater depth exploration of scientifically interesting items identified during the investigation, a successful mission is (generally) one that doesn’t deviate significantly from its planning. When sending an initial mission to an unsurveyed planet or moon, however, this approach is not suitable. Current space technology provides the capability to send a combined survey and lander mission (instead of conducting an initial survey mission and following it up …


Enabling Interplanetary Small Spacecraft Science Missions With Model Based Data Analysis, Jeremy Straub Jun 2013

Enabling Interplanetary Small Spacecraft Science Missions With Model Based Data Analysis, Jeremy Straub

Jeremy Straub

Small spacecraft operating outside of Earth orbit are significantly constrained by the communica- tions link available to them. This is particularly true for stand-alone craft that must rely on their own antenna and transmission systems (for which gain and available power generation are limited by form factor); it is also applicable to ‘hitchhiker’-style missions which may be able to utilize (quite likely very limited amounts of) time on the primary spacecraft’s communications equip- ment for long-haul transmission.

This poster presents the adaptation of the Model-Based Transmission Reduction (MBTR) frame- work’s Model-Based Data Analysis (MBDA) component for use on an interplanetary …


Network Self-Organization In The Internet Of Things, Arjun Athreya, Patrick Tague May 2013

Network Self-Organization In The Internet Of Things, Arjun Athreya, Patrick Tague

Patrick Tague

The Internet of Things is a paradigm that allows the interaction of ubiquitous devices through a network to achieve common goals. This paradigm like any man-made infrastructure is subject to disasters, outages and other adversarial conditions. Under these situations provisioned communications fail, rendering this paradigm with little or no use. Hence, network self-organization among these devices is needed to allow for communication resilience. This paper presents a survey of related work in the area of self-organization and discusses future research opportunities and challenges for self-organization in the Internet of Things. We begin this paper with a system perspective of the …


Asia: Accelerated Secure In-Network Aggregation In Vehicular Sensing Networks, Xiao Wang, Patrick Tague May 2013

Asia: Accelerated Secure In-Network Aggregation In Vehicular Sensing Networks, Xiao Wang, Patrick Tague

Patrick Tague

Vehicular Ad-Hoc Networks (VANETs) can potentially become a sensing platform. In-network aggregation, a fundamental primitive for querying sensory data, has been shown to reduce overall communication overhead at large. To secure data aggregation in VANETs, existing schemes mainly rely on digital signatures. However, generating and verifying such signatures can cause high computational overhead. More importantly, time-consuming verifications lead to the vulnerability to signature flooding attacks in which a receiver cannot timely verify all messages before their respective deadlines. In this paper, we propose ASIA as an Accelerated Secure In-network Aggregation strategy that can accelerate message verifications and significantly reduce computational …


Unlocin: Unauthorized Location Inference On Smartphones Without Being Caught, Le Nguyen, Yuan Tian, Sungho Cho, Wookjong Kwak, Sanjay Parab, Yu Seung Kim, Patrick Tague, Joy Zhang May 2013

Unlocin: Unauthorized Location Inference On Smartphones Without Being Caught, Le Nguyen, Yuan Tian, Sungho Cho, Wookjong Kwak, Sanjay Parab, Yu Seung Kim, Patrick Tague, Joy Zhang

Patrick Tague

Location privacy has become one of the critical issues in the smartphone era. Since users carry their phones everywhere and all the time, leaking users’ location information can have dangerous implications. In this paper, we leverage the idea that Wi-Fi parameters not considered to be “sensitive” in the Android platform can be exploited to learn users’ location. Though the idea of using Wi-Fi information to breach location privacy is not new, we extend the basic idea and show that clever attackers can do so without being detected by current malware detection techniques. To achieve this goal, we develop the Unauthorized …


How To Jam Without Getting Caught: Analysis And Empirical Study Of Stealthy Periodic Jamming, Bruce Debruhl, Patrick Tague May 2013

How To Jam Without Getting Caught: Analysis And Empirical Study Of Stealthy Periodic Jamming, Bruce Debruhl, Patrick Tague

Patrick Tague

Despite the widespread commercial use of spread spectrum technology, advanced algorithms and modern hardware capabilities still allows efficient denial-of-service attacks against wireless communication systems using jamming. Much of the recent work on jamming mitigation has focused on how to adjust the transmitter-receiver system once a jamming attack has been detected. However, characterizing the detectability of certain classes of jamming attacks remains a largely unstudied problem. We aim to narrow this gap by analyzing the effect of a class of periodic jamming attacks on the attack detection metrics of packet delivery ratio (PDR) and received signal strength (RSS). We show that …


Stochastic Optimization Of Flow-Jamming Attacks In Multichannel Wireless Networks, Yu Seung Kim, Bruce Debruhl, Patrick Tague May 2013

Stochastic Optimization Of Flow-Jamming Attacks In Multichannel Wireless Networks, Yu Seung Kim, Bruce Debruhl, Patrick Tague

Patrick Tague

An attacker can launch an efficient jamming attack to deny service to flows in wireless networks by using cross-layer knowledge of the target network. For example, flow-jamming defined in existing work incorporates network layer information into the conventional jamming attack to maximize its attack efficiency. In this paper, we redefine a discrete optimization model of flow-jamming in multichannel wireless networks and provide metrics to evaluate the attack efficiency. We then propose the use of stochastic optimization techniques for flow-jamming attacks by using three stochastic search algorithms: iterative improvement, simulated annealing, and genetic algorithm. By integrating the algorithms into a simulation …


Adaptive Wireless Communications: Mimo Channels And Networks, Daniel Bliss, Siddhartan Govindasamy May 2013

Adaptive Wireless Communications: Mimo Channels And Networks, Daniel Bliss, Siddhartan Govindasamy

Siddhartan Govindasamy

Adopting a balanced mix of theory, algorithms and practical design issues, this comprehensive volume explores cutting-edge applications in adaptive wireless communications and the implications these techniques have for future wireless network performance. Presenting practical concerns in the context of different strands from information theory, parameter estimation theory, array processing and wireless communication, the authors present a complete picture of the field. Topics covered include advanced multiple-antenna adaptive processing, ad hoc networking, MIMO, MAC protocols, space-time coding, cellular networks and cognitive radio, with the significance and effects of both internal and external interference a recurrent theme throughout. A broad, self-contained technical …


Mobile Computing: Challenges And Opportunities For Autonomy And Feedback, Ole J. Mengshoel, Bob Iannucci, Abe Ishihara May 2013

Mobile Computing: Challenges And Opportunities For Autonomy And Feedback, Ole J. Mengshoel, Bob Iannucci, Abe Ishihara

Ole J Mengshoel

Mobile devices have evolved to become computing platforms more similar to desktops and workstations than the cell phones and handsets of yesteryear. Unfortunately, today’s mobile infrastructures are mirrors of the wired past. Devices, apps, and networks impact one another, but a systematic approach for allowing them to cooperate is currently missing. We propose an approach that seeks to open key interfaces and to apply feedback and autonomic computing to improve both user experience and mobile system dynamics.


Adaptive Control Of Apache Web Server, Erik Reed, Abe Ishihara, Ole J. Mengshoel May 2013

Adaptive Control Of Apache Web Server, Erik Reed, Abe Ishihara, Ole J. Mengshoel

Ole J Mengshoel

Traffic to a Web site can vary dramatically. At the same time it is highly desirable that a Web site is reactive. To provide crisp interaction on thin clients, 150 milliseconds has been suggested as an upper bound on response time. Unfortunately, the popular Apache Web server is limited in its capabilities to be reactive under varying traffic. To address this problem, we design in this paper an adaptive controller for the Apache Web server. A modified recursive least squares algorithm is used to identify system dynamics and a minimum degree pole placement controller is implemented to adjust the maximum …


Desktop Warfare: Robotic Collaboration For Persistent Surveillance, Situational Awareness And Combat Operations, Jeremy Straub May 2013

Desktop Warfare: Robotic Collaboration For Persistent Surveillance, Situational Awareness And Combat Operations, Jeremy Straub

Jeremy Straub

Robotic sensing and weapons platforms can be controlled from a desktop workstation on the other side of the planet from where combat is occurring. This minimizes the potential for injury to soldiers and increases operational productivity. Significant work has been undertaken and is ongoing related to the autonomous control of battlefield sensing and warfighting systems. While many aspects of these operations can be performed autonomously, in some cases it is necessary (due to technical limitations) or desirable (due to legal or political implications) to involve humans in the low-level decision making. This paper reviews a number of specific applications where …


Spatial Computing In An Orbital Environment: An Exploration Of The Unique Constraints Of This Special Case To Other Spatial Computing Environments, Jeremy Straub May 2013

Spatial Computing In An Orbital Environment: An Exploration Of The Unique Constraints Of This Special Case To Other Spatial Computing Environments, Jeremy Straub

Jeremy Straub

The creation of an orbital services model (where spacecraft expose their capabilities for use by other spacecraft as part of a service-for-hire or barter system) requires effective determination of how to best transmit information between the two collaborating spacecraft. Existing approaches developed for ad hoc networking (e.g., wireless networks with users entering and departing in a pseudo-random fashion) exist; however, these fail to generate optimal solutions as they ignore a critical piece of available information. This additional piece of information is the orbital characteristics of the spacecraft. A spacecraft’s orbit is nearly deterministic if the magnitude and direction of its …


Wireless Transmission Network : A Imagine, Radhey Shyam Meena Engineer, Neeraj Kumar Garg Asst.Prof Apr 2013

Wireless Transmission Network : A Imagine, Radhey Shyam Meena Engineer, Neeraj Kumar Garg Asst.Prof

Radhey Shyam Meena

World cannot be imagined without electrical power. Generally the power is transmitted through transmission networks. This paper describes an original idea to eradicate the hazardous usage of electrical wires which involve lot of confusion in particularly organizing them. Imagine a future in which wireless power transfer is feasible: cell phones, household robots, mp3 players, laptop computers and other portable electronic devices capable of charging themselves without ever being plugged in freeing us from that final ubiquitous power wire. This paper includes the techniques of transmitting power without using wires with an efficiency of about 95% with non-radioactivemethods. In this paper …


An Expert System For Spacecraft Design, Jeremy Straub, Christoffer Korvald, Tyler Hill, Joshua Berk Apr 2013

An Expert System For Spacecraft Design, Jeremy Straub, Christoffer Korvald, Tyler Hill, Joshua Berk

Jeremy Straub

Designing a spacecraft is a complicated process that can be problem-prone. This is particularly true in the case of a small spacecraft where volume and mass limitations are enforced by form factor requirements. The Open Prototype for Educational NanoSats implements several restrictions beyond those from the CubeSat form factor, including two different board size specifications which impact the configuration of the payload area support structure and the size of available batteries.

OpenEdge aims to avoid the discovery of form factor, OPEN-specific and other configuration issues during final assembly by checking prospective configurations against the applicable requirements and constraints set during …


The Development Of Payload Software For A Small Spacecraft, Kyle Goehner, Christoffer Korvald, Jeremy Straub, Ronald Marsh Apr 2013

The Development Of Payload Software For A Small Spacecraft, Kyle Goehner, Christoffer Korvald, Jeremy Straub, Ronald Marsh

Jeremy Straub

The OpenOrbiter project is a multi-department effort to design and build a small spacecraft which will demonstrate the feasibility of the Open Prototype for Educational NanoSats (OPEN) framework. This framework will reduce cost of small spacecraft creation by providing design plans for free. The focus of the payload software group is to design and implement an onboard task processing and image processing service. Currently the project is in the development phase and most large design decisions have been made. This poster presents the major design decisions that have been made for the payload software and how they will affect the …


A Scada System Using Mobile Agent For Next Generation Distribution System, Radhey Shyam Meena Er. Apr 2013

A Scada System Using Mobile Agent For Next Generation Distribution System, Radhey Shyam Meena Er.

Radhey Shyam Meena

Industrial revolution worldwide. It has resulted in social changes too and raised the standard of living we examine a future distribution system capable of solving problems caused by the connection of numerous distributed generators. A supervisory-control-and-data-acquisition (SCADA) system for this distribution system should be economical, flexible, and reliable, and should execute a real-time process


Sugarmap: Location-Less Coverage For Micro-Aerial Sensing Swarms, Aveek Purohit, Zheng Sun, Pei Zhang Apr 2013

Sugarmap: Location-Less Coverage For Micro-Aerial Sensing Swarms, Aveek Purohit, Zheng Sun, Pei Zhang

Zheng Sun

No abstract provided.


Engineering Innovative Mobile Data Services: Developing A Model For Value Network Analysis And Design, Mutaz M. Al-Debei, Enas M. Al-Lozi, Guy Fitzgerald Apr 2013

Engineering Innovative Mobile Data Services: Developing A Model For Value Network Analysis And Design, Mutaz M. Al-Debei, Enas M. Al-Lozi, Guy Fitzgerald

Dr. Mutaz M. Al-Debei

Purpose – This study aims to analytically develop a reference model for engineering (i.e. analysis, design, development, evaluation, delivery, maintenance, modification, and management) powerful value networks capable of creating innovative mobile data services. Design/methodology/approach – The paradigm followed is that of Design-Science Research (DSR) which incorporates two main iterative processes: build and evaluate. For building the model (i.e. the design science artifact in this research), we followed three iterations: (1) Literature Review Analysis; (2) Semi-Structured Interviews analyzed through content analysis; and (3) examination of real-life case studies. But for evaluating the model, we utilized the NTT DoCoMo’s i-mode case. Findings …


Selfish Manipulation Of Cooperative Cellular Communications Via Channel Fabrication, Shrikant Adhikarla, Min Suk Kang, Patrick Tague Mar 2013

Selfish Manipulation Of Cooperative Cellular Communications Via Channel Fabrication, Shrikant Adhikarla, Min Suk Kang, Patrick Tague

Patrick Tague

In today’s cellular networks, user equipment (UE) have suffered from low spectral efficiency at cell-edge region due to high interference from adjacent base stations (BSs), which share the same spectral radio resources. In the recently proposed cooperative cellular networks, geographically separated multiple BSs cooperate on transmission in order to improve the UE’s signal-to-interference-plus-noise-ratio (SINR) at cell-edge region. The service provider of the system dynamically assigns the cluster of BSs to achieve higher SINR for the UE while optimizing the use of system radio resources. Although it is the service provider that makes the clustering decision for the UE, the service …


Battery Energy Storage System In Solar Power Generation, Radhey Shyam Meena Er., Deepa Sharma Mar 2013

Battery Energy Storage System In Solar Power Generation, Radhey Shyam Meena Er., Deepa Sharma

Radhey Shyam Meena

Grid-connected solar PV dramatically changes the load profile of an electric utility customer. The expected widespread adoption of solar generation by customers on the distribution system poses significant challenges to system operators both in transient and steady state operation, from issues including voltage swings, sudden weather-induced changes in generation, and legacy protective devices designed with one-way power flow in mind


Haptography: Capturing And Recreating The Rich Feel Of Real Surfaces, Katherine J. Kuchenbecker, Joseph Romano, William Mcmahan Mar 2013

Haptography: Capturing And Recreating The Rich Feel Of Real Surfaces, Katherine J. Kuchenbecker, Joseph Romano, William Mcmahan

William McMahan

Haptic interfaces, which allow a user to touch virtual and remote environments through a hand-held tool, have opened up exciting new possibilities for applications such as computer-aided design and robot-assisted surgery. Unfortunately, the haptic renderings produced by these systems seldom feel like authentic re-creations of the richly varied surfaces one encounters in the real world. We have thus envisioned the new approach of haptography, or haptic photography, in which an individual quickly records a physical interaction with a real surface and then recreates that experience for a user at a different time and/or place. This paper presents an overview of …


A Value-Based Approach For Explaining The Adoption Intention Of Mobile Data Services, Mutaz M. Al-Debei Mar 2013

A Value-Based Approach For Explaining The Adoption Intention Of Mobile Data Services, Mutaz M. Al-Debei

Dr. Mutaz M. Al-Debei

This study aims at explaining the factors affecting the adoption intention of mobile data services from the perspective of consumers as users. In this study we focus on the value users can potentially gain from using these services. We hypothesize that if we can examine users' utilitarian, hedonic, uniqueness, epistemic and economic value, then we can explain and predict their intention to use mobile data services. Our results show that utilitarian value is according to previous studies an important adoption factor. Additionally, economic value is also important and significant. Nevertheless, it seems that in our context, hedonic, uniqueness, and epistemic …


Cfp: Handbook Of Research On Technological Applications And Innovation For Economic Development, Deogratias Harorimana Mr Mar 2013

Cfp: Handbook Of Research On Technological Applications And Innovation For Economic Development, Deogratias Harorimana Mr

Dr Deogratias Harorimana

The innovation in the 21st century goes significantly beyond the high-tech picture driven by small or large industry clusters in a specific region-typically Silicon Valley and M4Corridor. The future of innovation will lie within knowledge management and seamless technological applications. These will be supported by planned funding strategies, possibly with clients as drivers of the innovation. This view seems to be supported by the UK government “Technology and Innovation Futures” (2011); the USA government (2011), study into which leading scholars concede that the future innovation and technological applications for economic growth will include products and processes, improvements in areas such …


A Human Proximity Operations System Test Case Validation Approach, Justin Huber, Jeremy Straub Mar 2013

A Human Proximity Operations System Test Case Validation Approach, Justin Huber, Jeremy Straub

Jeremy Straub

A Human Proximity Operations System (HPOS) poses numerous risks in a real world environment. These risks range from mundane tasks such as avoiding walls and fixed obstacles to the critical need to keep people and processes safe in the context of the HPOS’s situation-specific decision making. Validating the performance of an HPOS, which must operate in a real-world environment, is an ill posed problem due to the complexity that is introduced by erratic (non-computer) actors. In order to prove the HPOS’s usefulness, test cases must be generated to simulate possible actions of these actors, so the HPOS can be shown …


Exposing Multiple User-Specific Data Denominated Products From A Single Small Satellite Data Stream, Atif F. Mohammad,, Emanuel Grant, Jeremy Straub, Ronald Marsh, Scott Kerlin Mar 2013

Exposing Multiple User-Specific Data Denominated Products From A Single Small Satellite Data Stream, Atif F. Mohammad,, Emanuel Grant, Jeremy Straub, Ronald Marsh, Scott Kerlin

Jeremy Straub

This paper presents a research work on small satellite data stream and related distribution to associated stakeholders, which is a field that needs to get explored in more detail. The algorithm that is presented to extract USDDP (User-Specific Data Denominated Products) is a self managing body, which will be within as Open Space Box environment or OSBE as a novel idea. It contains an individual stream transmitted by the small satellite, which later is to be converted into USDDP. The context defined here deals with area in detail. Contexts are vitally important because they control, influence and affect everything within …


Model-Based Software Engineering For An Imaging Cubesat And Its Extrapolation To Other Missions, Atif Mohammad, Jeremy Straub, Christoffer Korvald, Emanuel Grant Mar 2013

Model-Based Software Engineering For An Imaging Cubesat And Its Extrapolation To Other Missions, Atif Mohammad, Jeremy Straub, Christoffer Korvald, Emanuel Grant

Jeremy Straub

Small satellites with their limited computational capabilities require that software engineering techniques promote efficient use of spacecraft resources. A model-driven approach to software engineering is an excellent solution to this resource maximization challenge as it facilitates visualization of the key solution processes and data elements.

The software engineering process utilized for the OpenOrbiter spacecraft, which is a remote sensing technology demonstrator, is presented. Key challenges presented by the Open Orbiter project included concurrent operation and tasking of five computer-on-module (COM) units and a flight computer and the associated data marshaling between local and general storage. The payload processing system (consisting …


Image Sequence Geolocation With Human Travel Priors, Evangelos Kalogerakis, Olga Vesselova, James Hays, Alexei Efros, Aaron Hertzmann Feb 2013

Image Sequence Geolocation With Human Travel Priors, Evangelos Kalogerakis, Olga Vesselova, James Hays, Alexei Efros, Aaron Hertzmann

Evangelos Kalogerakis

This paper presents a method for estimating geographic location for sequences of time-stamped photographs. A prior distribution over travel describes the likelihood of traveling from one location to another during a given time interval. This distribution is based on a training database of 6 million photographs from Flickr.com. An image likelihood for each location is defined by matching a test photograph against the training database. Inferring location for images in a test sequence is then performed using the Forward- Backward algorithm, and the model can be adapted to individual users as well. Using temporal constraints allows our method to geolocate …


On Spectrum Probing In Cognitive Radio Networks: Does Randomization Matter, Chao Chen, Zesheng Chen, Todor Cooklev, Carlos Pomalaza-Ráez Feb 2013

On Spectrum Probing In Cognitive Radio Networks: Does Randomization Matter, Chao Chen, Zesheng Chen, Todor Cooklev, Carlos Pomalaza-Ráez

Todor Cooklev

In cognitive radio networks, dynamic spectrumaccess is achieved by allowing secondary users (SUs) to probethe spectrum and utilize available channels opportunistically.Spectrum probing mechanisms should be efficient and fast toavoid harmful interference with primary users (PUs). Periodicprobing has been commonly adopted as a default spectrumprobing mechanism. In this paper, we attempt to study differentspectrum probing mechanisms and evaluate a performance metriccalled the probing delay, i.e., how quickly a probing mechanismcan detect a channel change. We find that randomization in theprobing strategy does affect the probing delay. Specifically, in theindependent sensing scenario, periodic probing indeed achievesthe smallest probing delay. In the cooperative …


Describing Radio Hardware And Software Using Owl For Over-The-Air Software Download, Todor Cooklev, Stanchev, David Clendenen Feb 2013

Describing Radio Hardware And Software Using Owl For Over-The-Air Software Download, Todor Cooklev, Stanchev, David Clendenen

Todor Cooklev

Recently, several researchers have discovered the need for radios to use description techniques. Previous research describes information such as the current frequency band, waveform, and so on. However, this information is presented at a level that is not sufficient to determine software/hardware compatibility for over-the-air software download. For example, a device should not attempt to download a wideband waveform if its radio front-end is only narrowband, or if its baseband hardware cannot provide the required MIPS for the new waveform. Over-the-air software download is one of the most interesting features of software-defined radios. The compatibility between software and hardware prior …


Using Plankton Imaging Technology And Computer Science For Biological Oceanographic Advancement And Education, Adam T. Greer Feb 2013

Using Plankton Imaging Technology And Computer Science For Biological Oceanographic Advancement And Education, Adam T. Greer

Adam T. Greer

Oceanography is an inherently interdisciplinary subject that combines observations of physics, biology, chemistry, and their interactions. While most physical and chemical measurements can be made on small scales (cm to m) through the use of sensors (temperature, salinity, pH, etc.), traditional tools to understand the biology of the ocean have only allowed for coarse sampling resolution (i.e., plankton nets sample large portions of the water column). New imaging technology enables the biological component of the ocean to be sampled on the same scale as the physical and chemical, allowing scientists to finally address the interactions among different oceanographic processes. Image …