Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2009

Selected Works

Discipline
Keyword
Publication
File Type

Articles 1 - 23 of 23

Full-Text Articles in Computer Engineering

Modeling And Computer Simulation Of Fault Calculations For Transmission Lines, Dr. Adel A. Elbaset Dec 2009

Modeling And Computer Simulation Of Fault Calculations For Transmission Lines, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

Calculation of transmission line faults has a fundamental importance in the fault detection, classification, and location determination of faults in transmission line. This paper presents a proposed computer program based on Matlab software to calculate all ten types of shunt faults that may occur in a transmission line. Various fault scenarios (fault types, fault locations and fault impedance) are considered in this paper. The inputs of the proposed program are line length, source voltage, positive, negative and zero sequence for source impedance, line charging, and transmission line impedance. The output of the algorithm is used to train an artificial intelligence …


User Security Behavior On Wireless Networks: An Empirical Study, Tim Chenoweth, Robert Minch, Sharon Tabor Sep 2009

User Security Behavior On Wireless Networks: An Empirical Study, Tim Chenoweth, Robert Minch, Sharon Tabor

Robert P. Minch

Wireless networks are rapidly becoming ubiquitous but are often insecure and leave users responsible for their own security. We empirically study whether users are successfully securing their client computers when using wireless networks. Automated techniques are used that scan users' machines after they associate with a university wireless network. This determines whether a firewall is being used and what TCP ports are open. Results show that over 9% of 3,331 unique computers scanned were not using a properly configured firewall. In addition, almost 9% had at least one TCP port open, with almost 6% having open ports with significant security …


An Exploratory Study Of Hypermedia Support For Problem Decomposition, Robert P. Minch, Gary I. Green Sep 2009

An Exploratory Study Of Hypermedia Support For Problem Decomposition, Robert P. Minch, Gary I. Green

Robert P. Minch

Empirical hypermedia research has concentrated on usability rather than utility, and the research on utility has focused on information access as opposed to problem solving and decision making in organizations. This study, based on problem reduction theory, uses a hypermedia prototype system to support decision processes for solving a financial analysis problem. An exploratory laboratory experiment was conducted to study the feasibility of the prototype for hypermedia support of decision making. The process tracing techniques used suggest that a cognitive map of a decision maker's thought process may be constructed. Results offer a great deal of promise in the use …


Mitigation Of Control Channel Jamming Under Node Capture Attacks, Patrick Tague, Mingyan Li, Radha Poovendran Aug 2009

Mitigation Of Control Channel Jamming Under Node Capture Attacks, Patrick Tague, Mingyan Li, Radha Poovendran

Patrick Tague

Availability of service in many wireless networks depends on the ability for network users to establish and maintain communication channels using control messages from base stations and other users. An adversary with knowledge of the underlying communication protocol can mount an efficient denial of service attack by jamming the communication channels used to exchange control messages. The use of spread spectrum techniques can deter an external adversary from such control channel jamming attacks. However, malicious colluding insiders or an adversary who captures or compromises system users are not deterred by spread spectrum, as they know the required spreading sequences. For …


A Review On Load Flow Studies, Dr. Adel A. Elbaset Jul 2009

A Review On Load Flow Studies, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Controlled Islanding Scheme For Power Systems, Dr. Adel A. Elbaset Jul 2009

Controlled Islanding Scheme For Power Systems, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Visual Process Language: An Environment That Enhances Inventiveness In The System Development Process -- A Theoretical Perspective, Wita Wojtkowski, Waclaw G. Wojtkowski Jul 2009

Visual Process Language: An Environment That Enhances Inventiveness In The System Development Process -- A Theoretical Perspective, Wita Wojtkowski, Waclaw G. Wojtkowski

Wita Wojtkowski

This paper provides a theoretical perspective on the effect of computer support on creativity. The assertion is made that artifacts of IS do not substantially differ from those of art and science, and that the creative processes leading to the artifacts are similar. It further proposes that the use of newly available computer technology, specifically, the Visual Process Language (VPL) will have much to offer in terms of augmenting creativity when constructing IS artfacts. We postulate that VPL assists the first insight, preparation and illumination steps of the creative process, and that both Association/Images and Progressive Abstraction techniques are embedded …


Seminar In Kumamoto University, 11-6-2009 (Protection), Dr. Adel A. Elbaset Jun 2009

Seminar In Kumamoto University, 11-6-2009 (Protection), Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

This Seminar about a Novel protective scheme for Transmission line Presented by me in Kumamoto University, Graduate School of Science and Technology, Japan at 11-6-2009.


Evaluating The Vulnerability Of Network Traffic Using Joint Security And Routing Analysis, Patrick Tague, David Slater, Jason Rogers, Radha Poovendran Mar 2009

Evaluating The Vulnerability Of Network Traffic Using Joint Security And Routing Analysis, Patrick Tague, David Slater, Jason Rogers, Radha Poovendran

Patrick Tague

Joint analysis of security and routing protocols in wireless networks reveals vulnerabilities of secure network traffic that remain undetected when security and routing protocols are analyzed independently. We formulate a class of continuous metrics to evaluate the vulnerability of network traffic as a function of security and routing protocols used in wireless networks. We develop two complementary vulnerability definitions using set theoretic and circuit theoretic interpretations of the security of network traffic, allowing a network analyst or an adversary to determine weaknesses in the secure network. We formalize node capture attacks using the vulnerability metric as a nonlinear integer programming …


Preliminary Results With A Targeted Online Java Course, Amber Settle, Will Marrero, Chad Settle Mar 2009

Preliminary Results With A Targeted Online Java Course, Amber Settle, Will Marrero, Chad Settle

Amber Settle

While the College of Computing and Digital Media has offered online courses for 7 years, courses targeted specifically at online students remain in the minority. In this report, we investigate both student learning and student satisfaction with a targeted online introductory Java course developed by the first co-author. Initial results show that this targeted course has equivalent outcomes with respect to student learning and strongly improved student satisfaction.


Computer Mathematics Using Pascal, 2nd Edition, Stephen J. Sugden, John Simmond Mar 2009

Computer Mathematics Using Pascal, 2nd Edition, Stephen J. Sugden, John Simmond

Stephen Sugden

This book introduces elementary programming in Pascal as a tool to solve introductory problems in numerical mathematics at post-compulsory level, i.e. secondary schools, colleges of TAFE, senior colleges, and first-year tertiary. In particular, it covers all the material in the Computer Mathematics (Unit V) course in Queensland high schools. A modern, structured approach to programming has been used throughout the book, and emphasis is placed on problem-solving strategies and algorithm development. Students should eventually appreciate that, in general, the sooner you start coding the solution to a problem, the longer it will take to solve successfully, and that the computer …


Electric Energy Sector In Egypt: A Review, Dr. Adel A. Elbaset Mar 2009

Electric Energy Sector In Egypt: A Review, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Vers Un Développement Orienté Services Des Applications Interactives Dans Le Domaine De La Logistique, Étude De Cas, Djilali Idoughi, Christophe Kolski Feb 2009

Vers Un Développement Orienté Services Des Applications Interactives Dans Le Domaine De La Logistique, Étude De Cas, Djilali Idoughi, Christophe Kolski

Professor Djilali IDOUGHI

Cet article contribue au domaine de l’interaction homme-machine (IHM), en proposant un cadre méthodologique global en vue de la spécification de systèmes interactifs dans le domaine de la logistique, pouvant aller jusqu’à la e-logistique. La logistique est vue au sens large en étudiant les besoins des différents acteurs d’une organisation complexe, vis-à-vis de l’exploitation de nouvelles technologies où l’accent est mis sur les services web et l’architecture orientée services. Le cadre proposé a été appliqué sur une étude de cas complexe représentative, relative à la fonction logistique d’un groupe agro-alimentaire.


Optimal Design Of Wind-Pv-Diesel-Battery System Using Genetic Algorithm, Dr. Adel A. Elbaset Jan 2009

Optimal Design Of Wind-Pv-Diesel-Battery System Using Genetic Algorithm, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

The optimization of diesel generators (DGs) and renewable energy sources have to be done within a cost benefit, high reliability and environmentally friendly framework. Most of optimization method just consider only from economical point of view. This paper presents complete optimization method involving of cost, reliability and pollutant emission into optimization process. The reliability level is analyzed using basic probabilistic concept in order to find loss of load probability (LOLP). This value is then used to determine the customer damage cost due to electricity interruption. Meanwhile, CO2 emission as an indicator of pollution is calculated to determine the annual emission …


Smart Manufacturing - Interoperability Lessons From Manufacturing's Turn, Steven Ray Dec 2008

Smart Manufacturing - Interoperability Lessons From Manufacturing's Turn, Steven Ray

Steven R Ray

No abstract provided.


Software Engineering Education At Carnegie Mellon University: One University; Programs Taught In Two Places, Ray Bareiss, Mel Rosso-Llopart Dec 2008

Software Engineering Education At Carnegie Mellon University: One University; Programs Taught In Two Places, Ray Bareiss, Mel Rosso-Llopart

Ray Bareiss

Teaching Software Engineering to professional master’s students is a challenging endeavor, and arguably for the past 20 years, Carnegie Mellon University has been quite successful. Although CMU teaches Software Engineering at sites world-wide and uses different pedagogies, the goal of the curriculum -- to produce world-class software engineers -- remains constant. This paper will discuss two of the most mature versions of Carnegie Mellon’s Software Engineering program -- the main campus program and its “daughter program” at the Silicon Valley Campus. We discuss the programs with respect to the dimensions of curriculum, how students work and learn, how faculty teach, …


Tradeoffs Between Jamming Resilience And Communication Efficiency In Key Establishment, Patrick Tague, David Slater, Radha Poovendran, Brian Matt Dec 2008

Tradeoffs Between Jamming Resilience And Communication Efficiency In Key Establishment, Patrick Tague, David Slater, Radha Poovendran, Brian Matt

Patrick Tague

We address the problem of allowing authorized users, who do not preshare a common key, to effectively exchange key establishment messages over an insecure channel in the presence of jamming and message insertion attacks. In this work, we jointly consider the security and efficiency of key exchange protocols, focusing on the interplay between message fragmentation, jamming resilience, and verification complexity for protocol optimization. Finally, we present three fragment verification schemes and demonstrate through analysis and simulation that in comparison with existing approaches, they can significantly decrease the amount of time required for key establishment without degrading the guaranteed level of …


Developing Software Engineering Leaders At Carnegie Mellon Silicon Valley, Ray Bareiss, Todd Sedano Dec 2008

Developing Software Engineering Leaders At Carnegie Mellon Silicon Valley, Ray Bareiss, Todd Sedano

Ray Bareiss

The Carnegie Mellon’s Silicon Valley Campus offers a master’s degree in Software Engineering, with technical and development management tracks, targeted at working software professionals in Silicon Valley. We believe the program to be unique in that it is entirely team-based and project-centered. Students learn by doing as they are coached just in time by faculty in the context of their work on authentic projects, and they are evaluated based on what they produce. In response to our interactions with an industry characterized by innovation and short project development timelines, the program evolved from one focused on “high ceremony” processes to …


Developing Software Engineering Leaders At Carnegie Mellon Silicon Valley, Ray Bareiss, Todd Sedano Dec 2008

Developing Software Engineering Leaders At Carnegie Mellon Silicon Valley, Ray Bareiss, Todd Sedano

Todd Sedano

The Carnegie Mellon’s Silicon Valley Campus offers a master’s degree in Software Engineering, with technical and development management tracks, targeted at working software professionals in Silicon Valley. We believe the program to be unique in that it is entirely team-based and project-centered. Students learn by doing as they are coached just in time by faculty in the context of their work on authentic projects, and they are evaluated based on what they produce. In response to our interactions with an industry characterized by innovation and short project development timelines, the program evolved from one focused on “high ceremony” processes to …


Building A Business On Open Source Software, Tony Wasserman Dec 2008

Building A Business On Open Source Software, Tony Wasserman

Tony Wasserman

For many years, free and open source software was exclusively associated with the research community, in contrast to the closed source products developed by commercial software vendors. Over the past decade, there has been a vast increase in the availability of open source software, growing from such projects as Linux and Apache. Open source software is being widely adopted in industry, which has led to numerous business opportunities for entrepreneurs and vendors. This activity is having a disruptive effect on the software industry that has affected even the largest software vendors. This paper describes the emergence of open source business, …


Persona Comme Outil De Design De Services Interactifs: Principes Et Exemple En E-Maintenance, Ahmed Seffah, Christophe Kolski, Djilali Idoughi Dec 2008

Persona Comme Outil De Design De Services Interactifs: Principes Et Exemple En E-Maintenance, Ahmed Seffah, Christophe Kolski, Djilali Idoughi

Professor Djilali IDOUGHI

Dans ce papier, nous discutons du rôle du persona comme outil de modélisation et d’analyse de l’expérience utilisateur. Ce concept est issu des travaux de recherche de marketing sur le comportement du consommateur. Sa finalité est une meilleure compréhension et une prise en compte de l’expérience de l’utilisateur final. L’Expérience Utilisateur ou client (UX) est un terme générique désignant une collection d’information couvrant le comportement de l’utilisateur, incluant les connaissances, l’expertise, et les attributs décrivant la personnalité de l’usager. Un cas d’exemple en logiciel comme service pour la e-maintenance illustre l’approche persona. Le Software as a Service (SaaS, logiciel comme …


Throughput And Delay In Wireless Sensor Networks Using Directional Antennas, Hong-Ning Dai Dec 2008

Throughput And Delay In Wireless Sensor Networks Using Directional Antennas, Hong-Ning Dai

Hong-Ning Dai

Most of studies only consider that wireless sensor networks are equipped with only omni-directional antennas, which can cause high collisions. It is shown that the per node throughput in such networks is decreased with the increased number of nodes. Thus, the transmission with multiple short-range hops is preferred to reduce the interference. However, other studies show that the transmission delay increases with the increased number of hops.

In this paper, we consider using directional antennas in wireless sensor networks. We have found that using directional antennas not only can increase the throughput capacity but also can decrease the delay by …


Analyzing The Impact Of A Virtual Machine On A Host Machine, Greg Dorn, Chris Marberry, Scott Conrad, Philip Craiger Dec 2008

Analyzing The Impact Of A Virtual Machine On A Host Machine, Greg Dorn, Chris Marberry, Scott Conrad, Philip Craiger

J. Philip Craiger, Ph.D.

As virtualization becomes more prevalent in the enterprise and in personal computing, there is a great need to understand the technology as well as its ramifications for recovering digital evidence. This paper focuses on trace evidence related to the installation and execution of virtual machines (VMs) on a host machine. It provides useful information regarding the types and locations of files installed by VM applications, the processes created by running VMs and the structure and identity of VMs, ancillary files and associated artifacts