Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Digital Communications and Networking

Wifi Sensing At The Edge Towards Scalable On-Device Wireless Sensing Systems, Steven M. Hernandez Jan 2023

Wifi Sensing At The Edge Towards Scalable On-Device Wireless Sensing Systems, Steven M. Hernandez

Theses and Dissertations

WiFi sensing offers a powerful method for tracking physical activities using the radio-frequency signals already found throughout our homes and offices. This novel sensing modality offers continuous and non-intrusive activity tracking since sensing can be performed (i) without requiring wearable sensors, (ii) outside the line-of-sight, and even (iii) through the wall. Furthermore, WiFi has become a ubiquitous technology in our computers, our smartphones, and even in low-cost Internet of Things devices. In this work, we consider how the ubiquity of these low-cost WiFi devices offer an unparalleled opportunity for improving the scalability of wireless sensing systems. Thus far, WiFi sensing …


A General Framework For Characterizing And Evaluating Attacker Models For Cps Security Assessment, Christopher S. Deloglos, Christopher Deloglos Jan 2021

A General Framework For Characterizing And Evaluating Attacker Models For Cps Security Assessment, Christopher S. Deloglos, Christopher Deloglos

Theses and Dissertations

Characterizing the attacker’s perspective is essential to assessing the security posture and resilience of cyber-physical systems. The attacker’s perspective is most often achieved by cyber-security experts (e.g., red teams) who critically challenge and analyze the system from an adversarial stance. Unfortunately, the knowledge and experience of cyber-security experts can be inconsistent leading to situations where there are gaps in the security assessment of a given system. Structured security review processes (such as TAM, Mission Aware, STPA-SEC, and STPA-SafeSec) attempt to standardize the review processes to impart consistency across an organization or application domain. However, with most security review processes, the …


Leveraging Peer-To-Peer Energy Sharing For Resource Optimization In Mobile Social Networks, Aashish Dhungana Jan 2020

Leveraging Peer-To-Peer Energy Sharing For Resource Optimization In Mobile Social Networks, Aashish Dhungana

Theses and Dissertations

Mobile Opportunistic Networks (MSNs) enable the interaction of mobile users in the vicinity through various short-range wireless communication technologies (e.g., Bluetooth, WiFi) and let them discover and exchange information directly or in ad hoc manner. Despite their promise to enable many exciting applications, limited battery capacity of mobile devices has become the biggest impediment to these appli- cations. The recent breakthroughs in the areas of wireless power transfer (WPT) and rechargeable lithium batteries promise the use of peer-to-peer (P2P) energy sharing (i.e., the transfer of energy from the battery of one member of the mobile network to the battery of …


Let’S Face It: The Effect Of Orthognathic Surgery On Facial Recognition Algorithm Analysis, Carolyn Bradford Dragon Jan 2019

Let’S Face It: The Effect Of Orthognathic Surgery On Facial Recognition Algorithm Analysis, Carolyn Bradford Dragon

Theses and Dissertations

Aim: To evaluate the ability of a publicly available facial recognition application program interface (API) to calculate similarity scores for pre- and post-surgical photographs of patients undergoing orthognathic surgeries. Our primary objective was to identify which surgical procedure(s) had the greatest effect(s) on similarity score.

Methods: Standard treatment progress photographs for 25 retrospectively identified, orthodontic-orthognathic patients were analyzed using the API to calculate similarity scores between the pre- and post-surgical photographs. Photographs from two pre-surgical timepoints were compared as controls. Both relaxed and smiling photographs were included in the study to assess for the added impact of facial pose on …


Efficient Information Dissemination In Vehicular Networks With Privacy Protection, Xiaolu Cheng Jan 2018

Efficient Information Dissemination In Vehicular Networks With Privacy Protection, Xiaolu Cheng

Theses and Dissertations

Vehicular ad hoc network (VANET) is a key component of intelligent transportation System (ITS). In VANETs, vehicles and roadside units exchange information for the purpose of navigation, safe driving, entertainment and so on. The high mobility of vehicles makes efficient and private communications in VANETs a big challenge.

Improving the performance of information dissemination while protecting data privacy is studied in this research. Meet-Table based information dissemination method is first proposed, so as to improve the information dissemination, and to efficiently distribute information via utilizing roadside units, Cloud Computing, and Fog Computing. A clustering algorithm is proposed as well, to …


Consuming Digital Debris In The Plasticene, Stephen R. Parks Jan 2018

Consuming Digital Debris In The Plasticene, Stephen R. Parks

Theses and Dissertations

Claims of customization and control by socio-technical industries are altering the role of consumer and producer. These narratives are often misleading attempts to engage consumers with new forms of technology. By addressing capitalist intent, material, and the reproduction limits of 3-D printed objects’, I observe the aspirational promise of becoming a producer of my own belongings through new networks of production. I am interested in gaining a better understanding of the data consumed that perpetuates hyper-consumptive tendencies for new technological apparatuses. My role as a designer focuses on the resolution of not only the surface of the object through 3-D …