Open Access. Powered by Scholars. Published by Universities.®
Digital Communications and Networking Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Electrical and Computer Engineering (37)
- Physical Sciences and Mathematics (29)
- Computer Sciences (26)
- Systems and Communications (26)
- Computer and Systems Architecture (25)
-
- Other Computer Engineering (19)
- Data Storage Systems (18)
- Hardware Systems (16)
- VLSI and Circuits, Embedded and Hardware Systems (14)
- Other Electrical and Computer Engineering (13)
- Robotics (12)
- Digital Circuits (10)
- Social and Behavioral Sciences (10)
- OS and Networks (8)
- Business (5)
- Information Security (5)
- Law (5)
- Library and Information Science (5)
- Signal Processing (5)
- Databases and Information Systems (3)
- Electrical and Electronics (3)
- Internet Law (3)
- Science and Technology Law (3)
- Aerospace Engineering (2)
- Artificial Intelligence and Robotics (2)
- Arts and Humanities (2)
- Automotive Engineering (2)
- Institution
-
- Selected Works (26)
- Air Force Institute of Technology (14)
- Institute of Business Administration (9)
- Old Dominion University (8)
- California Polytechnic State University, San Luis Obispo (7)
-
- University of Nebraska - Lincoln (5)
- University of Massachusetts Amherst (4)
- University of Nevada, Las Vegas (4)
- University of Arkansas, Fayetteville (3)
- University of Pennsylvania Carey Law School (3)
- University of Tennessee, Knoxville (3)
- Cleveland State University (2)
- Singapore Management University (2)
- Technological University Dublin (2)
- University of Georgia School of Law (2)
- University of New Mexico (2)
- Western University (2)
- Edith Cowan University (1)
- Florida International University (1)
- University of Connecticut (1)
- University of Kentucky (1)
- University of South Carolina (1)
- Keyword
-
- Context-Aware (6)
- Mobility (5)
- #antcenter (4)
- Social media (4)
- Applied sciences (3)
-
- Disaster Management (3)
- Security (3)
- Wireless Networks (3)
- Authentication (2)
- Complexity reduction (2)
- Crowd sourcing (2)
- DSmT (2)
- Data mining (2)
- Digg (2)
- Digital humanities (2)
- Distance (2)
- Emergency response (2)
- GSM (2)
- IP networks (2)
- Information Security (2)
- Information fusion (2)
- Internet (2)
- Jamming (2)
- MAC (2)
- MIMO (2)
- Measure of similarity (2)
- Mobile (2)
- Mobile applications (2)
- Mobile collaboration (2)
- Network analysis (2)
- Publication
-
- Theses and Dissertations (14)
- International Conference on Information and Communication Technologies (9)
- Martin L Griss (9)
- Computer Engineering (5)
- Electrical and Computer Engineering Faculty Publications (4)
-
- Masters Theses 1911 - February 2014 (4)
- All Faculty Scholarship (3)
- Computer Science Theses & Dissertations (3)
- Patrick Tague (3)
- Ray Bareiss (3)
- Arcot Desai NARASIMHALU (2)
- Branch Mathematics and Statistics Faculty and Staff Publications (2)
- Carol A. Watson (2)
- Computer and Electronics Engineering: Dissertations, Theses, and Student Research (2)
- Continuing Legal Education Presentations (2)
- Electronic Thesis and Dissertation Repository (2)
- Graduate Theses and Dissertations (2)
- Hong-Ning Dai (2)
- Master's Theses (2)
- Research Collection School Of Computing and Information Systems (2)
- Articles (1)
- CSE Conference and Workshop Papers (1)
- Cheryl B. Truesdell (1)
- Christine L. Borgman (1)
- Computational Modeling & Simulation Engineering Theses & Dissertations (1)
- Computer Science Faculty Publications (1)
- Conference papers (1)
- Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research (1)
- Department of English: Dissertations, Theses, and Student Research (1)
- Doctoral Dissertations (1)
- Publication Type
- File Type
Articles 1 - 30 of 103
Full-Text Articles in Digital Communications and Networking
Computational Modeling For Transportation Network Security, Sherif A. Tolba
Computational Modeling For Transportation Network Security, Sherif A. Tolba
Master's Theses
No abstract provided.
Cplop - Cal Poly's Library Of Pyroprints, Kevin Webb
Cplop - Cal Poly's Library Of Pyroprints, Kevin Webb
Computer Engineering
California Polytechnic Library of Pyroprints, CPLOP, is a web driven data-base application that stores data from the biology’s departments E. coli Pyrosequencing project. Some of this data was stored in Excel datasheets, while data from the pyrosequencing machines was stored as just a list of random .xml files. There was no useful way to organize and store the massive amounts of data from multiple file sources in one location, nor to perform the complicated searches and comparisons that the project requires. CPLOP’s primary goal is to store such data in three organized tables that relate to one another. It was …
Wireless Solar-Powered Thermal Imaging Camera, Andy Bonk, Billy Mcvicker, Jacob Richardson
Wireless Solar-Powered Thermal Imaging Camera, Andy Bonk, Billy Mcvicker, Jacob Richardson
Mechanical Engineering
Creation of a mounted wireless self-powered thermal imaging camera system.
Building Effective Ontology For Semantic Web: A Discussion Based On Practical Examples, Tianmu Zhang
Building Effective Ontology For Semantic Web: A Discussion Based On Practical Examples, Tianmu Zhang
School of Information Sciences -- Faculty Publications and Other Works
The study aims to investigate semantic web and create useful ontology as a teaching and educational tool for others interested in learning more about Semantic web. This paper discussed several emerging issues about the semantic web and ontology building. This paper combines ontology implementation examples with research topics to identify current issues and potential solution in both application and theoretical level. It concludes that although semantic web and ontology technology are not mature enough currently, there is a clear tendency for them to be integrated into various applications to exert synergies.
Location-Aware Traffic Management On Mobile Phones, Sarath Krishna Mandava
Location-Aware Traffic Management On Mobile Phones, Sarath Krishna Mandava
Graduate Theses and Dissertations
The growing number of mobile phone users is a primary cause of congestion in cellular networks. Therefore, cellular network providers have turned to expensive and differentiated data plans. Unfortunately, as the number of smartphone users keeps increasing, changing data plans only provides a temporary solution. A more permanent solution is offloading 3G traffic to networks in orthogonal frequency bands. One such plausible network is open Wi-Fi, which is free by definition. As Wi-Fi networks become ubiquitous, there are several areas where there is simultaneous Wi-Fi and 3G coverage. In this thesis, we study the feasibility of offloading 3G traffic to …
Application Of The Empirical Mode Decomposition On The Characterization And Forecasting Of The Arrival Data Of An Enterprise Cluster, Linh Bao Ngo
Graduate Theses and Dissertations
Characterization and forecasting are two important processes in capacity planning. While they are closely related, their approaches have been different. In this research, a decomposition method called Empirical Mode Decomposition (EMD) has been applied as a preprocessing tool in order to bridge the input of both characterization and forecasting processes of the job arrivals of an enterprise cluster. Based on the facts that an enterprise cluster follows a standard preset working schedule and that EMD has the capability to extract hidden patterns within a data stream, we have developed a set of procedures that can preprocess the data for characterization …
Mapping Device With Wireless Communication, Xiangyu Liu
Mapping Device With Wireless Communication, Xiangyu Liu
Electrical Engineering Undergraduate Honors Theses
Wireless communication is one of the most powerful communication methods that people use nowadays. The key advantage of wireless communications is that it can cover large distances without having to run any cables from one end to the other. Based on this advantage, wireless communication has many important applications, such as remote controls, cell phones, and global positioning system (GPS). This senior design project is developed to use wireless communication technology to map the geographic characteristics of an unknown place. It contains two wireless communication modules with Atmega1281 microprocessor, two robots with the 8051 microcontroller, six pairs of infrared transmitters …
Distributed Data Aggregation For Sparse Recovery In Wireless Sensor Networks, Shuangjiang Li
Distributed Data Aggregation For Sparse Recovery In Wireless Sensor Networks, Shuangjiang Li
Masters Theses
We consider the approximate sparse recovery problem in Wireless Sensor Networks (WSNs) using Compressed Sensing/Compressive Sampling (CS). The goal is to recover the $n \mbox{-}$dimensional data values by querying only $m \ll n$ sensors based on some linear projection of sensor readings. To solve this problem, a two-tiered sampling model is considered and a novel distributed compressive sparse sampling (DCSS) algorithm is proposed based on sparse binary CS measurement matrix. In the two-tiered sampling model, each sensor first samples the environment independently. Then the fusion center (FC), acting as a pseudo-sensor, samples the sensor network to select a subset of …
A Novel Telecommunications-Based Approach To Mathematical Modeling Of Hiv Infection, Aaron T. Sharp
A Novel Telecommunications-Based Approach To Mathematical Modeling Of Hiv Infection, Aaron T. Sharp
Computer and Electronics Engineering: Dissertations, Theses, and Student Research
It is well known that biological systems utilize communication in some form, one prolific example of this is the propagation of HIV (Human Immunodeficiency Virus) in the human body. By modeling HIV infection as a communication system, we hope to gain a unique insight into HIV and biological communication systems in general. Such a model would provide researchers a platform for experimenting and simulating various biological communication systems. We have previously developed a layered communication protocol for interpreting biological communication systems using telecommunications paradigms and will apply said model to HIV proliferation. We will also demonstrate the effectiveness of the …
Energy Efficient Reduced Complexity Multi-Service, Multi-Channel Scheduling Techniques, Dan J. Dechene
Energy Efficient Reduced Complexity Multi-Service, Multi-Channel Scheduling Techniques, Dan J. Dechene
Electronic Thesis and Dissertation Repository
The need for energy efficient communications is essential in current and next-generation wireless communications systems. A large component of energy expenditure in mobile devices is in the mobile radio interface. Proper scheduling and resource allocation techniques that exploit instantaneous and long-term average knowledge of the channel, queue state and quality of service parameters can be used to improve the energy efficiency of communication.
This thesis focuses on exploiting queue and channel state information as well as quality of service parameters in order to design energy efficient scheduling techniques. The proposed designs are for multi-stream, multi-channel systems and in general have …
Anticipating Technological Change: Predictions, Trends And Gadgets, Carol A. Watson
Anticipating Technological Change: Predictions, Trends And Gadgets, Carol A. Watson
Carol A. Watson
With the current economic downtown, today's business environment is more competitive than ever. Businesses that distinguish themselves in any small way and provide cost-savings, can gain a significant advantage over their rivals. To emphasize the point, note that the ABA Techshow 2009 has a session titled: If You’re Not Serving Your Clients Online, Someone Else Will Be. It is, therefore, essential that attorneys harness technology and remain up-to-date on the latest computer developments . In this paper, I will begin by discussing technologies that are currently available on the web that will increase your abilities to collaborate, reduce your office …
Forecast For The Future: Emerging Legal Technologies, Carol A. Watson
Forecast For The Future: Emerging Legal Technologies, Carol A. Watson
Carol A. Watson
Begins by discussing technologies that are currently available on the web that can reduce office overhead. Also highlights current general technology trends and still-developing technologies. Concludes with a list of frivolous gadgets to provide food for thought about the coming prospects of technology.
Ipv6 Overview.Pdf, Douglas Huber
Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang
Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang
Ray Bareiss
As emergency first responders and commanders increasingly use mobile phones, tablets, and social media to communicate, coordinate, and manage information during disasters, we see a need and opportunity to provide a mobile device-appropriate semantic layer to a geographically-based common operating picture. The challenge is to provide a simple, usable structure for a rapidly growing body of information to simplify the development of situational awareness in an unfolding disaster. We use a hyperlinked structure based on the ASK model to organize information in a readily accessible form. In this paper we describe our initial design and experience with an Android-based prototype, …
Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang
Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang
Martin L Griss
As emergency first responders and commanders increasingly use mobile phones, tablets, and social media to communicate, coordinate, and manage information during disasters, we see a need and opportunity to provide a mobile device-appropriate semantic layer to a geographically-based common operating picture. The challenge is to provide a simple, usable structure for a rapidly growing body of information to simplify the development of situational awareness in an unfolding disaster. We use a hyperlinked structure based on the ASK model to organize information in a readily accessible form. In this paper we describe our initial design and experience with an Android-based prototype, …
A Novel Malware Target Recognition Architecture For Enhanced Cyberspace Situation Awareness, Thomas E. Dube
A Novel Malware Target Recognition Architecture For Enhanced Cyberspace Situation Awareness, Thomas E. Dube
Theses and Dissertations
The rapid transition of critical business processes to computer networks potentially exposes organizations to digital theft or corruption by advanced competitors. One tool used for these tasks is malware, because it circumvents legitimate authentication mechanisms. Malware is an epidemic problem for organizations of all types. This research proposes and evaluates a novel Malware Target Recognition (MaTR) architecture for malware detection and identification of propagation methods and payloads to enhance situation awareness in tactical scenarios using non-instruction-based, static heuristic features. MaTR achieves a 99.92% detection accuracy on known malware with false positive and false negative rates of 8.73e-4 and 8.03e-4 respectively. …
Twitter Malware Collection System: An Automated Url Extraction And Examination Platform, Benjamin B. Kuhar
Twitter Malware Collection System: An Automated Url Extraction And Examination Platform, Benjamin B. Kuhar
Theses and Dissertations
As the world becomes more interconnected through various technological services and methods, the threat of malware is increasingly looming overhead. One avenue in particular that is examined in this research is the social networking service Twitter. This research develops the Twitter Malware Collection System (TMCS). This system gathers Uniform Resource Locators (URLs) posted on Twitter and scans them to determine if any are hosting malware. This scanning process is performed by a cluster of Virtual Machines (VMs) running a specified software configuration and the execution prevention system known as ESCAPE, which detects malicious code. When a URL is detected by …
Using Reputation Based Trust To Overcome Malfunctions And Malicious Failures In Electric Power Protection Systems, Jose E. Fadul
Using Reputation Based Trust To Overcome Malfunctions And Malicious Failures In Electric Power Protection Systems, Jose E. Fadul
Theses and Dissertations
This dissertation advocates the use of reputation-based trust in conjunction with a trust management framework based on network flow techniques to form a trust management toolkit (TMT) for the defense of future Smart Grid enabled electric power grid from both malicious and non-malicious malfunctions. Increases in energy demand have prompted the implementation of Smart Grid technologies within the power grid. Smart Grid technologies enable Internet based communication capabilities within the power grid, but also increase the grid's vulnerability to cyber attacks. The benefits of TMT augmented electric power protection systems include: improved response times, added resilience to malicious and non-malicious …
Collaborative Solutions To Visual Sensor Networks, Mahmut Karakaya
Collaborative Solutions To Visual Sensor Networks, Mahmut Karakaya
Doctoral Dissertations
Visual sensor networks (VSNs) merge computer vision, image processing and wireless sensor network disciplines to solve problems in multi-camera applications in large surveillance areas. Although potentially powerful, VSNs also present unique challenges that could hinder their practical deployment because of the unique camera features including the extremely higher data rate, the directional sensing characteristics, and the existence of visual occlusions.
In this dissertation, we first present a collaborative approach for target localization in VSNs. Traditionally; the problem is solved by localizing targets at the intersections of the back-projected 2D cones of each target. However, the existence of visual occlusions among …
Reliable Ethernet, Aleksandr Movsesyan
Reliable Ethernet, Aleksandr Movsesyan
Master's Theses
Networks within data centers, such as connections between servers and disk arrays, need lossless flow control allowing all packets to move quickly through the network to reach their destination. This paper proposes a new algorithm for congestion control to satisfy the needs of such networks and to answer the question: Is it possible to provide circuit-less reliability and flow control in an Ethernet network? TCP uses an end-to-end congestion control algorithm, which is based on end-to-end round trip time (RTT). Therefore its flow control and error detection/correction approach is dependent on end-to-end RTT. Other approaches utilize specialized data link layer …
Digital Filter Design For Jamming Mitigation In 802.15.4 Communication, Bruce Debruhl, Patrick Tague
Digital Filter Design For Jamming Mitigation In 802.15.4 Communication, Bruce Debruhl, Patrick Tague
Patrick Tague
Jamming attackers can dramatically increase attack efficiency and stealth by randomly or periodically cycling the jamming transmission on and off, attacks respectively known as random and periodic jamming. In this paper, we analyze the impact of such attacks on the IEEE 802.15.4 communication protocol, commonly used in wireless sensor networking applications, and show that the cycling behavior introduces a narrow spectral component into the received signal. We propose the inclusion of a digital filter at the receiver side to effectively eliminate this spectral component, and we discuss the benefits involved in this filter design. We evaluate the impacts of random …
Wireless Embedded Smart Cameras: Performance Analysis And Their Application To Fall Detection For Eldercare., Alvaro Pinto
Wireless Embedded Smart Cameras: Performance Analysis And Their Application To Fall Detection For Eldercare., Alvaro Pinto
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
Wireless Embedded Smart Camera Networks has received a lot of attention from academia and industry because they are small in size and easy to deploy, and they offer a multitude of attractive applications. They can be used for embedded single unit applications, or can be networked for multi-camera applications.
We first analyze three different operation scenarios for a wireless vision sensor network wherein different levels of local processing is performed. A detailed quantitative comparison of three operation scenarios are presented in terms of energy consumption and latency. This quantitative analysis provides the motivation for performing high-level local processing and decision …
Networks - Ii: Closed-Form Expressions For Correlation Function And Power Density Spectrum In Mimo Mobile-To-Mobile Channels Using Two-Erose-Ring Model, Muahammad Riaz, Noor M. Khan
Networks - Ii: Closed-Form Expressions For Correlation Function And Power Density Spectrum In Mimo Mobile-To-Mobile Channels Using Two-Erose-Ring Model, Muahammad Riaz, Noor M. Khan
International Conference on Information and Communication Technologies
This paper presents an extensive study of MIMO channels in mobile-to-mobile environment. Recently proposed two-erose-ring model is reviewed for more details, and closed-form mathematical expressions for space-time correlations and power spectral density for MIMO mobile-to-mobile communication channels are derived. Using the correlation function, we analyze and compare capacity and diversity gains for two-ring model and two-erose-ring model. Furthermore, we compared the results with the existing models.
Networks - Ii: A High Bandwidth Covert Channel In Network Protocol, Mehdi Hussain
Networks - Ii: A High Bandwidth Covert Channel In Network Protocol, Mehdi Hussain
International Conference on Information and Communication Technologies
Covert channel is secret communication path, which existence is not expected in original system of design. It allows different users access to the same information, at the same time, but from different points-of-view. It is being more and more studying due to the grooming of internet. Always high-bandwidth network covert channel pose the significant risk of detection over network. Although the existing technique utilized the reserved bits of header, timestamp, initial sequence number, packet length etc for network covert channel, to some extend these have good temper resistance. But when increase their covert data capacity they becomes to fail to …
Network Security: A Review Of Salient Security Aspects Of The Universal Mobile Telecommunication System (Umts), F. Imran, M. Hussain
Network Security: A Review Of Salient Security Aspects Of The Universal Mobile Telecommunication System (Umts), F. Imran, M. Hussain
International Conference on Information and Communication Technologies
Wireless communication is known as key to global development. Wireless and mobile communication is gaining more importance in our life. Protecting information is one the aspects which we need to focus on the wireless networks. Universal mobile telecommunication system (UMTS) is evolution of the third generation mobile communication system. It was built on the success of global system for mobile communication (GSM). Universal mobile telecommunication system's security is also built on global system for mobile communication (GSM). The paper reviews the literature of the security aspects of the Universal mobile telecommunication system. A critical evaluation of the proposed solutions is …
Networks - Ii: Modified On Demand Transmission Power Control For Wireless Sensor Networks, Mirza M Yasir Masood, Ghufran Ahmed, Noor M. Khan
Networks - Ii: Modified On Demand Transmission Power Control For Wireless Sensor Networks, Mirza M Yasir Masood, Ghufran Ahmed, Noor M. Khan
International Conference on Information and Communication Technologies
On Demand Transmission Power Control (ODTPC) is a well known transmission power control strategy that is used to reduce high power consumption in wireless sensor networks (WSNs). In this paper, we propose an extension to ODTPC and thus, a modified version of ODTPC is proposed named MODTPC. Simulation results show that performance of MODTPC is better than ODTPC in terms of efficiency and energy saving.
Image Processing – I: Spatial Domain Lossless Image Data Compression Method, Syed Ali Hassan, Mehdi Hussain
Image Processing – I: Spatial Domain Lossless Image Data Compression Method, Syed Ali Hassan, Mehdi Hussain
International Conference on Information and Communication Technologies
Images has very significant role in digital media. However, generally digital imaging generates large amounts of data it need to be compressed, without loss of relevant information or simply lossless compression. This paper presents a novel lossless image compression technique in spatial domain. The proposed algorithm divide the image into no. of blocks uses variable bits to store each block pixels. Calculation of variable bits is dependent on pixel values of each block. The advantage of proposed scheme, it is dependent upon pixels correlation with in a block. Experimental results show that our proposed algorithm gives better compression efficiency as …
Network Security: A Secure Architecture For Open Source Voip Solutions, Fahad Sattar, M. Hussain, Kashif Nisar
Network Security: A Secure Architecture For Open Source Voip Solutions, Fahad Sattar, M. Hussain, Kashif Nisar
International Conference on Information and Communication Technologies
Voice over IP “VoIP” is a form of voice speech that uses data networks, for transmission of voice traffic over IP-based networks to transmit voice signals. The signal is correctly encoded at one end of the communication channel, sent as packets through the data network, then decoded at the receiving end and transformed back into a voice signal. It has a potential and offering a choice to the traditional telephony systems due to its high resource utilization and cost efficiency. Meanwhile, Wireless Local Area Networks (WLANs) have become an ever present networking technology that has been deployed around the world. …
Networks - I: Interference Mitigation In 4g System Using Smart Antenna, Asad Ali Siddiqui, Muhammad Mazhar Manzoor, Aamir Ijaz, Adnan Umar Khan, Imran Ahmed Awan, Sangita Lal Chand
Networks - I: Interference Mitigation In 4g System Using Smart Antenna, Asad Ali Siddiqui, Muhammad Mazhar Manzoor, Aamir Ijaz, Adnan Umar Khan, Imran Ahmed Awan, Sangita Lal Chand
International Conference on Information and Communication Technologies
Emerging trends of mobile communication and ever growing demand of mobile users with high speed data requirements and migrating towards 4G, Co-Channel interference and multipath in urban/dense urban environment will limit the capacity of the network. Smart antenna is now recognized by its higher user capacity in 4G wireless networks by efficiently reducing multipath and co-channel interference. Smart Antenna use adaptive beam forming algorithms in a dynamic environment continuously adjusting the weight of antenna arrays for creating a beam to track desired users automatically, and minimize interference from other users by placing nulls in their directions. This research work provides …
Networks - I: An Optimal Mutual Authentication Scheme In Gsm Networks, Abdul Haleem, Muhammad Usman
Networks - I: An Optimal Mutual Authentication Scheme In Gsm Networks, Abdul Haleem, Muhammad Usman
International Conference on Information and Communication Technologies
GSM is one of the most dominating networks for wireless mobile communication. With the passage of time, financial institutions have started using this network for providing their services. Beginning from basic services like balance enquiry, the trend is increasing to provide financial transactions on mobile. This trend establishes the need of strengthening user authentication and requirement of network authentication as well. In this paper, we have proposed a mutual authentication approach using asymmetric cryptography. In the proposed technique, user and network are authenticated with minimal computation and signaling overhead.