Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Computer Engineering

Preprocessing Techniques To Support Event Detection Data Fusion On Social Media Data, Brandon T. Davis Jun 2016

Preprocessing Techniques To Support Event Detection Data Fusion On Social Media Data, Brandon T. Davis

Theses and Dissertations

This thesis focuses on collection and preprocessing of streaming social media feeds for metadata as well as the visual and textual information. Today, news media has been the main source of immediate news events, large and small. However, the information conveyed on these news sources is delayed due to the lack of proximity and general knowledge of the event. Such news have started relying on social media sources for initial knowledge of these events. Previous works focused on captured textual data from social media as a data source to detect events. This preprocessing framework postures to facilitate the data fusion …


A Service Oriented Architecture Approach For Global Positioning System Quality Of Service Monitoring, Stuart A. Everson Mar 2016

A Service Oriented Architecture Approach For Global Positioning System Quality Of Service Monitoring, Stuart A. Everson

Theses and Dissertations

This research focuses on the development of a Service Oriented Architecture (SOA) for monitoring the Global Positioning System (GPS) Standard Positioning Service (SPS) in near real time utilizing a Mobile Crowd Sensing (MCS) technique. A unique approach to developing the MCS SOA was developed that utilized both the Depart- ment of Defense Architecture Framework (DoDAF) and the SOA Modeling Language (SoaML) guidance. The combination of these two frameworks resulted in generation of all the architecture products required to evaluate the SOA through the use of Model Based System Engineering (MBSE) techniques. Ultimately this research provides a feasibility analysis for utilization …


Exposing Inter-Virtual Machine Networking Traffic To External Applications, Charles E. Byrd Mar 2016

Exposing Inter-Virtual Machine Networking Traffic To External Applications, Charles E. Byrd

Theses and Dissertations

Virtualization is a powerful and fast growing technology that is widely accepted throughout the computing industry. The Department of Defense has moved its focus to virtualization and looks to take advantage of virtualized hardware, software, and networks. Virtual environments provide many benefits but create both administrative and security challenges. The challenge of monitoring virtual networks is having visibility of inter-virtual machine (VM) traffic that is passed within a single virtual host. This thesis attempts to gain visibility and evaluate performance of inter-VM traffic in a virtual environment. Separate virtual networks are produced using VMWare ESXi and Citrix XenServer platforms. The …


Towards Automated Aerial Refueling: Real Time Position Estimation With Stereo Vision, Bradley D. Denby Mar 2016

Towards Automated Aerial Refueling: Real Time Position Estimation With Stereo Vision, Bradley D. Denby

Theses and Dissertations

Aerial refueling is essential to the United States Air Force (USAF) core mission of rapid global mobility. However, in-flight refueling is not available to remotely piloted aircraft (RPA) or unmanned aerial systems (UAS). As reliance on drones for intelligence, surveillance, and reconnaissance (ISR) and other USAF core missions grows, the ability to automate aerial refueling for such systems becomes increasingly critical. New refueling platforms include sensors that could be used to estimate the relative position of an approaching aircraft. Relative position estimation is a key component to solving the automated aerial refueling (AAR) problem. Analysis of data from a one-seventh …


Airborne Directional Networking: Topology Control Protocol Design, Barry C. Geise Mar 2016

Airborne Directional Networking: Topology Control Protocol Design, Barry C. Geise

Theses and Dissertations

This research identifies and evaluates the impact of several architectural design choices in relation to airborne networking in contested environments related to autonomous topology control. Using simulation, we evaluate topology reconfiguration effectiveness using classical performance metrics for different point-to-point communication architectures. Our attention is focused on the design choices which have the greatest impact on reliability, scalability, and performance. In this work, we discuss the impact of several practical considerations of airborne networking in contested environments related to autonomous topology control modeling. Using simulation, we derive multiple classical performance metrics to evaluate topology reconfiguration effectiveness for different point-to-point communication architecture …


A Practical Wireless Exploitation Framework For Z-Wave Networks, Joseph L. Hall Mar 2016

A Practical Wireless Exploitation Framework For Z-Wave Networks, Joseph L. Hall

Theses and Dissertations

Wireless Sensor Networks (WSN) are a growing subset of the emerging Internet of Things (IoT). WSNs reduce the cost of deployment over wired alternatives; consequently, use is increasing in home automation, critical infrastructure, smart metering, and security solutions. Few published works evaluate the security of proprietary WSN protocols due to the lack of low-cost and effective research tools. One such protocol is ITU-T G.9959-based Z-Wave, which maintains wide acceptance within the IoT market. This research utilizes an open source toolset, presented herein, called EZ-Wave to identify methods for exploiting Z-Wave devices and networks using Software-Defined Radios (SDR). Herein, techniques enabling …


Dynamic Network Security Control Using Software Defined Networking, Michael C. Todd Mar 2016

Dynamic Network Security Control Using Software Defined Networking, Michael C. Todd

Theses and Dissertations

This thesis develops and implements a process to rapidly respond to host level security events using a host agent, Software Defined Networking and OpenFlow updates, role based flow classes, and Advanced Messaging Queuing Protocol to automatically update configuration of switching devices and block malicious traffic. Results show flow table updates are made for all tested levels in less than 5.27 milliseconds and event completion time increased with treatment level as expected. As the number of events increases from 1,000 to 50,000, the design scales logarithmically caused mainly by message delivery time. Event processing throughput is limited primarily by the message …


System And Method For Identifying Electrical Properties Of Integrate Circuits, Mary Y. Lanzerotti Jan 2016

System And Method For Identifying Electrical Properties Of Integrate Circuits, Mary Y. Lanzerotti

AFIT Patents

A new method for displaying electrical properties for integrated circuit (IC) layout designs provides for improved human visualization of those properties and comparison of as designed layout design parameters to as specified layout design parameters and to as manufactured layout parameters. The method starts with a circuitry as designed layout in a first digital format, extracts values for electrical properties from that circuitry as designed layout then annotates those values back into the first digital format. The annotated circuitry as designed layout is then converted from the first digital format to a second digital format that can be converted to …