Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2011

Systems and Communications

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 39

Full-Text Articles in Computer Engineering

Computational Modeling For Transportation Network Security, Sherif A. Tolba Dec 2011

Computational Modeling For Transportation Network Security, Sherif A. Tolba

Master's Theses

No abstract provided.


Mapping Device With Wireless Communication, Xiangyu Liu Dec 2011

Mapping Device With Wireless Communication, Xiangyu Liu

Electrical Engineering Undergraduate Honors Theses

Wireless communication is one of the most powerful communication methods that people use nowadays. The key advantage of wireless communications is that it can cover large distances without having to run any cables from one end to the other. Based on this advantage, wireless communication has many important applications, such as remote controls, cell phones, and global positioning system (GPS). This senior design project is developed to use wireless communication technology to map the geographic characteristics of an unknown place. It contains two wireless communication modules with Atmega1281 microprocessor, two robots with the 8051 microcontroller, six pairs of infrared transmitters …


Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang Sep 2011

Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang

Ray Bareiss

As emergency first responders and commanders increasingly use mobile phones, tablets, and social media to communicate, coordinate, and manage information during disasters, we see a need and opportunity to provide a mobile device-appropriate semantic layer to a geographically-based common operating picture. The challenge is to provide a simple, usable structure for a rapidly growing body of information to simplify the development of situational awareness in an unfolding disaster. We use a hyperlinked structure based on the ASK model to organize information in a readily accessible form. In this paper we describe our initial design and experience with an Android-based prototype, …


Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang Sep 2011

Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang

Martin L Griss

As emergency first responders and commanders increasingly use mobile phones, tablets, and social media to communicate, coordinate, and manage information during disasters, we see a need and opportunity to provide a mobile device-appropriate semantic layer to a geographically-based common operating picture. The challenge is to provide a simple, usable structure for a rapidly growing body of information to simplify the development of situational awareness in an unfolding disaster. We use a hyperlinked structure based on the ASK model to organize information in a readily accessible form. In this paper we describe our initial design and experience with an Android-based prototype, …


Chaotic Bandgaps In Hybrid Acousto-Optic Feedback And Their Implications, Monish Ranjan Chatterjee, Mohammed A. Al-Saedi Aug 2011

Chaotic Bandgaps In Hybrid Acousto-Optic Feedback And Their Implications, Monish Ranjan Chatterjee, Mohammed A. Al-Saedi

Electrical and Computer Engineering Faculty Publications

The nonlinear dynamics of a hybrid acousto-optic device was examined from the perspective of the Lyapunov exponent (LE) and bifurcation maps. The plots for LE versus system parameters and bifurcation maps have recently been examined against known simulation results including chaotic encryption experiments [1]. It is verified that the "loop gain" (feedback gain (β) times incident light amplitude (Iin) needs to be greater than one as a necessary , but not sufficient condition for the onset of chaos.

It is found that for certain combinations of β, Iin, net bias voltage (αtοt), and the initial value of the first-order scattered …


Networks - Ii: A High Bandwidth Covert Channel In Network Protocol, Mehdi Hussain Jul 2011

Networks - Ii: A High Bandwidth Covert Channel In Network Protocol, Mehdi Hussain

International Conference on Information and Communication Technologies

Covert channel is secret communication path, which existence is not expected in original system of design. It allows different users access to the same information, at the same time, but from different points-of-view. It is being more and more studying due to the grooming of internet. Always high-bandwidth network covert channel pose the significant risk of detection over network. Although the existing technique utilized the reserved bits of header, timestamp, initial sequence number, packet length etc for network covert channel, to some extend these have good temper resistance. But when increase their covert data capacity they becomes to fail to …


Calibration Of Complex System Dynamics Models: A Practioner's Report, Rod Walker, Wayne W. Wakeland Jul 2011

Calibration Of Complex System Dynamics Models: A Practioner's Report, Rod Walker, Wayne W. Wakeland

Wayne W. Wakeland

This paper is not a typical academic paper that is solidly grounded in the literature. Instead, this paper reports practitioner’s experiences in rebuilding and calibrating a very large system dynamics model. A prior version of this model had been in use for over 10 years in an ongoing executive training simulation. That model had never worked correctly in several key areas, requiring the outputs to be manually adjusted by very experienced facilitators during the course of the simulation. The present project rebuilt the system dynamics model, redesigned the parts that weren’t working, and calibrated the resulting model to match the …


Calibration Of Complex System Dynamics Models: A Practioner's Report, Rod Walker, Wayne Wakeland Jul 2011

Calibration Of Complex System Dynamics Models: A Practioner's Report, Rod Walker, Wayne Wakeland

Systems Science Faculty Publications and Presentations

This paper is not a typical academic paper that is solidly grounded in the literature. Instead, this paper reports practitioner’s experiences in rebuilding and calibrating a very large system dynamics model. A prior version of this model had been in use for over 10 years in an ongoing executive training simulation. That model had never worked correctly in several key areas, requiring the outputs to be manually adjusted by very experienced facilitators during the course of the simulation. The present project rebuilt the system dynamics model, redesigned the parts that weren’t working, and calibrated the resulting model to match the …


San Luis Obispo Transit Tracker System Back-End Server, Daryl Alan A. Dimalanta Jun 2011

San Luis Obispo Transit Tracker System Back-End Server, Daryl Alan A. Dimalanta

Computer Engineering

This document gives the rationale, design process, technical implementation, testing procedures, and testing results of a back-end server used for the San Luis Obispo (SLO) Transit Tracker System. The SLO Transit Tracker System (SLOTTS) includes client software installed on mobile devices and a back-end server. The purpose of this system is to encourage SLO residents to utilize the transit system by having the client software present current bus location, navigation instructions, and bus schedule in a simple, fast, and easy to use mobile application.

Due to the limited central processing unit (CPU) and limited power supplied by the battery, route …


Discrete Alarm Clock, Travis Moore, Collin Barth Jun 2011

Discrete Alarm Clock, Travis Moore, Collin Barth

Electrical Engineering

The standard alarm clock, as used daily by millions worldwide, has clear room for modification and improvement. This paper documents an implementation that rectifies many of these flaws. Improvements include adjustable snooze length, an IR remote for ease of use, and an RF headset for discrete alarm use or potential incorporation into a device much like a hearing aid. The processes involved in creating a digital alarm clock, as well as the obstacles met in the implementation of the enhanced design, are detailed within.


Examination Of Chaotic Signal Encryption And Recovery For Secure Communication Using Hybrid Acousto-Optic Feedback, Monish Ranjan Chatterjee, Mohammed A. Al-Saedi May 2011

Examination Of Chaotic Signal Encryption And Recovery For Secure Communication Using Hybrid Acousto-Optic Feedback, Monish Ranjan Chatterjee, Mohammed A. Al-Saedi

Electrical and Computer Engineering Faculty Publications

Generation of chaos from acousto-optic (A-O)Bragg cell modulators with an electronic feedback has been studied for over 3 decades. Since an acousto-optic Bragg cell with zeroth- and first-order feedback exhibits chaotic behavior past the threshold for bistability, such a system was recently examined for possible chaotic encryption of simple messages (such as a low-amplitude sinusoidal signal) applied via the bias input of the sound cell driver. Subsequent recovery of the message signal was carried out via a heterodyne-type strategy employing a locally generated chaotic carrier, with threshold parameters matched to the transmitting Bragg cell.

In this paper, we present numerical …


Exploration Of Spatial Diversity In Multi-Antenna Wireless Communication Systems, Shichuan Ma May 2011

Exploration Of Spatial Diversity In Multi-Antenna Wireless Communication Systems, Shichuan Ma

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

With increasing demand on wireless internet and personal multimedia, the data rate of wireless communications is expected to increase dramatically. Future wireless networks face challenges of supporting data rates higher than one gigabits per second. Among various technologies, multi-antennas, also known as multiple-input multiple-output (MIMO), are undoubtedly the most promising to enable higher data rates. By employing the extra degrees of freedom in the spatial domain, multi-antenna techniques enhance the wireless communication systems through array gain, spatial diversity, and spatial multiplexing. Although multi-antenna systems have been utilized for more than ten years, a thorough analysis of various aspects of multi-antenna …


An Exploration Of Knowledge And Skills Transfer From A Formal Software Engineering Curriculum To A Capstone Practicum Project, Ray Bareiss, Ed Katz Apr 2011

An Exploration Of Knowledge And Skills Transfer From A Formal Software Engineering Curriculum To A Capstone Practicum Project, Ray Bareiss, Ed Katz

Ray Bareiss

Students at Carnegie Mellon Silicon Valley complete a team-based practicum project for an industrial sponsor as the capstone of their master’s education in software engineering. Over time, the faculty member who typically serves as advisor for such projects has been disturbed by the failure of several student teams to transfer some relevant knowledge and skills from the formal curriculum to the relatively unstructured practicum project environment. We conducted a survey of all 2010 software engineering students to ascertain the most significant selfreported shortcomings. This paper presents the survey data and then discusses the results in terms of a theory of …


Scalar Em Beam Propagation In Inhomogeneous Media, John M. Jarem, Partha P. Banerjee Apr 2011

Scalar Em Beam Propagation In Inhomogeneous Media, John M. Jarem, Partha P. Banerjee

Electrical and Computer Engineering Faculty Publications

In the previous chapter, we reviewed some of the mathematical preliminaries that will be useful later on in the text. In this chapter, we discuss some of the basic concepts of scalar wave propagation, and discuss an important numerical method, called the beam propagation method (BPM), to study propagation in linear media and in media with induced nonlinearities. Furthermore, we also discuss propagation through induced gratings, both transmission and reflection type, in order to assess energy coupling between participating waves. Finally, we introduce readers to an important characterization method, called the z-scan method, which is often used to determine the …


Binary And Core-Shell Nanoparticle Dispersed Liquid Crystal Cells For Metamaterial Applications, George Nehmetallah, Rola Aylo, Partha P. Banerjee Apr 2011

Binary And Core-Shell Nanoparticle Dispersed Liquid Crystal Cells For Metamaterial Applications, George Nehmetallah, Rola Aylo, Partha P. Banerjee

Electrical and Computer Engineering Faculty Publications

We theoretically explored the feasibility of a tunable metamaterial using binary as well as core-shell nanoparticle dispersed liquid crystal cells in the infrared and optical regimes. Owing to the spatial variation of the permittivity of the liquid crystal host upon the application of a bias voltage, the host was decomposed into a layered medium and the effective refractive index recalculated for each layer due to the distribution of polaritonic and plasmonic nanoparticles.

The scattering, extinction, and absorption of such a nanoparticle dispersed liquid crystal cell were also found. Depending on the applied voltage bias across the liquid crystal host, the …


Worse-Than-Rayleigh Fading: Experimental Results And Theoretical Models, David W. Matolak, Jeff Frolik Apr 2011

Worse-Than-Rayleigh Fading: Experimental Results And Theoretical Models, David W. Matolak, Jeff Frolik

Faculty Publications

This article is motivated by the recent recognition that channel fading for new wireless applications is not always well described by traditional models used for mobile communication systems. In particular, fading data collected for vehicleto- vehicle and wireless sensor network applications has motivated new models for conditions in which channel fading statistics can be worse than Rayleigh. We review the use of statistical channel models, describe our example applications, and provide both measured and modeling results for these severe fading conditions.


Imirok: Real-Time Imitative Robotic Arm Control For Home Robot Applications, Heng-Tze Cheng, Zheng Sun, Pei Zhang Mar 2011

Imirok: Real-Time Imitative Robotic Arm Control For Home Robot Applications, Heng-Tze Cheng, Zheng Sun, Pei Zhang

Zheng Sun

Training home robots to behave like human can help people with their daily chores and repetitive tasks. In this paper, we present Imirok, a system to remotely control robotic arms by user motion using low-cost, off-the-shelf mobile devices and webcam. The motion tracking algorithm detects user motion in real-time, without classifier training or predefined action set. Experimental results show that the system achieves 90% precision and recall rate on motion detection with blank background, and is robust under the change of cluttered background and user-to-camera distance.


Leveraging Mobile Context For Effective Collaboration And Task Management In Disaster Response, Faisal Luqman, Martin L. Griss Mar 2011

Leveraging Mobile Context For Effective Collaboration And Task Management In Disaster Response, Faisal Luqman, Martin L. Griss

Martin L Griss

Collaboration and task management is challenging in distributed, dynamically-formed teams, typical in large scale disaster response scenarios. Ineffective collaboration may result in poor performance and possible loss of life. In this paper, we present Overseer, an agent-based system that exploits context information from mobile devices to facilitate collaboration and task allocation. We describe our system architecture and show how mobile context can be used to create dynamic role-based assignments to support collaboration and effective task management.


Routing Uavs To Co-Optimize Mission Effectiveness And Network Performance With Dynamic Programming, Spenser D. Lee Mar 2011

Routing Uavs To Co-Optimize Mission Effectiveness And Network Performance With Dynamic Programming, Spenser D. Lee

Theses and Dissertations

In support of the Air Force Research Laboratory's (AFRL) vision of the layered sensing operations center, command and control intelligence surveillance and reconnaissance (C2ISR) more focus must be placed on architectures that support information systems, rather than just the information systems themselves. By extending the role of UAVs beyond simply intelligence, surveillance, and reconnaissance (ISR) operations and into a dual-role with networking operations we can better utilize our information assets. To achieve the goal of dual-role UAVs, a concrete approach to planning must be taken. This research defines a mathematical model and a non-trivial deterministic algorithmic approach to determining UAV …


Malicious And Malfunctioning Node Detection Via Observed Physical Layer Data, Tyler J. Hardy Mar 2011

Malicious And Malfunctioning Node Detection Via Observed Physical Layer Data, Tyler J. Hardy

Theses and Dissertations

There are many mechanisms that can cause inadequate or unreliable information in sensor networks. A user of the network might be interested in detecting and classifying specific sensors nodes causing these problems. Several network layer based trust methods have been developed in previous research to assess these issues; in contrast this work develops a trust protocol based on observations of physical layer data collected by the sensors. Observations of physical layer data are used for decisions and calculations, and are based on just the measurements collected by the sensors. Although this information is packaged and distributed on the network layer, …


Evaluating Information Assurance Control Effectiveness On An Air Force Supervisory Control And Data Acquisition (Scada) System, Jason R. Nielsen Mar 2011

Evaluating Information Assurance Control Effectiveness On An Air Force Supervisory Control And Data Acquisition (Scada) System, Jason R. Nielsen

Theses and Dissertations

Supervisory Control and Data Acquisition (SCADA) systems are increasingly being connected to corporate networks which has dramatically expanded their attack surface to remote cyber attack. Adversaries are targeting these systems with increasing frequency and sophistication. This thesis seeks to answer the research question addressing which Information Assurance (IA) controls are most significant for network defenders and SCADA system managers/operators to focus on in order to increase the security of critical infrastructure systems against a Stuxnet-like cyber attack. This research applies the National Institute of Science and Technology (NIST) IA controls to an attack tree modeled on a remote Stuxnet-like cyber …


Anisotropic Electrical Properties Of Nanostructured Metallic Thin Films, Mo Ahoujja, Piyush Shah, Andrew Saragan, Said Elhamri, Elena A. Guliants Mar 2011

Anisotropic Electrical Properties Of Nanostructured Metallic Thin Films, Mo Ahoujja, Piyush Shah, Andrew Saragan, Said Elhamri, Elena A. Guliants

Electrical and Computer Engineering Faculty Publications

High surface area, porous, metallic (Ti, Cr) nanorod thin ¯lms with columnar microstructure can be deposited using conventional physical vapor deposition technique of E-beam evaporation. The technique relies on the physical vapor deposition onto a static substrate oriented in a position where °ux from the source material (Ti, Cr) arrives at oblique angle. The adatoms provides geometrical shadowing which results in growth of nanorod columns in the direction of vapor source. Deposition conditions such as angle of the incoming vapor °ux, substrate temperature, surface di®usion etc. have strong in°uence on the shape and arrangement of the columnar thin ¯lms. In …


Single-Beam Holographic Tomography Creates Images In Three Dimensions, George Nehmetallah, Partha P. Banerjee, Nickolai Kukhtarev Mar 2011

Single-Beam Holographic Tomography Creates Images In Three Dimensions, George Nehmetallah, Partha P. Banerjee, Nickolai Kukhtarev

Electrical and Computer Engineering Faculty Publications

In digital holography (DH), the interference between light scattered from an object and a reference wave is recorded using a CCD camera. DH has various advantages over analog holography: no film processing is needed, reconstruction is performed using numerical methods, and no further experimental setup is necessary. However, one of the disadvantages of DH is that current CCDs have a resolution of approximately 1,000 lines/mm, which is less than that of photographic film.


On Reducing Communication Energy Using Cross-Sensor Coding Technique, Kien Nguyen, Thinh Nguyen, Sen-Ching Cheung Feb 2011

On Reducing Communication Energy Using Cross-Sensor Coding Technique, Kien Nguyen, Thinh Nguyen, Sen-Ching Cheung

Electrical and Computer Engineering Faculty Publications

This paper addresses the uneven communication energy problem in data gathering sensor networks where the nodes closer to the sink tend to consume more energy than those of the farther nodes. Consequently, the lifetime of a network is significantly shortened. We propose a cross-sensor coding technique using On-Off keying which exploits (a) the tradeoff between delay and energy consumption and (b) the network topology in order to alleviate the problem of unequal energy consumption. We formulate our coding problem as an integer linear programming problem and show how to construct a number of codes based on different criteria. We show …


Intelligibility Of Electrolarynx Speech Using A Novel Hands-Free Actuator, Brian Madden, Mark Nolan, Ted Burke, James Condron, Eugene Coyle Jan 2011

Intelligibility Of Electrolarynx Speech Using A Novel Hands-Free Actuator, Brian Madden, Mark Nolan, Ted Burke, James Condron, Eugene Coyle

Conference Papers

During voiced speech, the larynx provides quasi-periodic acoustic excitation of the vocal tract. In most electrolarynxes, mechanical vibrations are produced by a linear electromechanical actuator, the armature of which percusses against a metal or plastic plate at a frequency within the range of glottal excitation. In this paper, the intelligibility of speech produced using a novel hands-free actuator is compared to speech produced using a conventional electrolarynx. Two able-bodied speakers (one male, one female) performed a closed response test containing 28 monosyllabic words, once using a conventional electrolarynx and a second time using the novel design. The resulting audio recordings …


Anubis: An Attestation Protocol For Distributed Context-Aware Applications, Senaka Buthpitiya, Feng-Tso Sun, Heng-Tze Chen, Patrick Tague, Martin L. Griss, Anind K. Dey Jan 2011

Anubis: An Attestation Protocol For Distributed Context-Aware Applications, Senaka Buthpitiya, Feng-Tso Sun, Heng-Tze Chen, Patrick Tague, Martin L. Griss, Anind K. Dey

Martin L Griss

Sharing sensitive context information among multiple distributed components in mobile environments introduces major security concerns. The distributed sensing, processing and actuating components of these applications can be compromised and modified or impersonated to extract private and confidential information or to inject false information. In this paper we present the Anubis protocol for remote code attestation and access control of distributed components using remote execution of trusted code. Our Anubis protocol leverages previous work in the fields of wireless sensor networks and secure web browsing. Anubis allows new components to be introduced to the environment without updating existing components. Our implementation …


Mobile Context-Aware Personal Messaging Assistant, Senaka Buthpitiya, Deepthi Madamanchi, Sumalatha Kommaraju, Martin L. Griss Jan 2011

Mobile Context-Aware Personal Messaging Assistant, Senaka Buthpitiya, Deepthi Madamanchi, Sumalatha Kommaraju, Martin L. Griss

Martin L Griss

A previous study shows that busy professionals receive in excess of 50 emails per day of which approximately 23% require immediate attention, 13% require attention later and 64% are unimportant and typically ignored. The flood of emails impact mobile users even more heavily. Flooded inboxes cause busy professionals to spend considerable amounts of time searching for important messages, and there has been much research into automating the process using email content for classification; but we find email priority depends also on user context. In this paper we describe the Personal Messaging Assistant (PMA), an advanced rule-based email management system which …


Sensorchestra: Collaborative Sensing For Symbolic Location Recognition, Heng-Tze Cheng, Feng-Tso Sun, Senaka Buthpitiya, Martin L. Griss Jan 2011

Sensorchestra: Collaborative Sensing For Symbolic Location Recognition, Heng-Tze Cheng, Feng-Tso Sun, Senaka Buthpitiya, Martin L. Griss

Martin L Griss

"Symbolic location of a user, like a store name in a mall, is essential for context-based mobile advertising. Existing fingerprint- based localization using only a single phone is susceptible to noise, and has a major limitation in that the phone has to be held in the hand at all times. In this paper, we present SensOrchestra, a col- laborative sensing framework for symbolic location recognition that groups nearby phones to recognize ambient sounds and images of a location collaboratively. We investigated audio and image features, and designed a classifier fusion model to integrate estimates from diff erent phones. We also …


Activity-Aware Mental Stress Detection Using Physiological Sensors, Feng-Tso Sun, Cynthia Kuo, Heng-Tze Cheng, Senaka Buthpitiya, Patricia Collins, Martin Griss Jan 2011

Activity-Aware Mental Stress Detection Using Physiological Sensors, Feng-Tso Sun, Cynthia Kuo, Heng-Tze Cheng, Senaka Buthpitiya, Patricia Collins, Martin Griss

Martin L Griss

"Continuous stress monitoring may help users better understand their stress patterns and provide physicians with more reliable data for interventions. Previously, studies on mental stress detection were limited to a laboratory environment where participants generally rested in a sedentary position. However, it is impractical to exclude the effects of physical activity while developing a pervasive stress monitoring application for everyday use. The physiological responses caused by mental stress can be masked by variations due to physical activity. We present an activity-aware mental stress detection scheme. Electrocardiogram (ECG), galvanic skin response (GSR), and accelerometer data were gathered from 20 participants across …


Omnisense: A Collaborative Sensing Framework For User Context Recognition Using Mobile Phones, Heng-Tze Cheng, Senaka Buthpitiya, Feng-Tso Sun, Martin L. Griss Jan 2011

Omnisense: A Collaborative Sensing Framework For User Context Recognition Using Mobile Phones, Heng-Tze Cheng, Senaka Buthpitiya, Feng-Tso Sun, Martin L. Griss

Martin L Griss

Context information, including a user’s locations and activities, is indispensable for context-aware applications such as targeted advertising and disaster response. Inferring user context from sensor data is intrinsically challenging due to the semantic gap between low-level signals and high-level human activities. When implemented on mobile phones, more challenges on resource limitations are present. While most existing work focuses on context recognition using a single mobile phone, collaboration among multiple phones has received little attention, and the recognition accuracy is susceptible to phone position and ambient changes. Simply putting a phone in one’s pocket can render the microphone muffled and the …