Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Systems and Communications

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 42

Full-Text Articles in Other Computer Engineering

Vehicle Pseudonym Association Attack Model, Pierson Yieh, Pierson Yieh Jun 2018

Vehicle Pseudonym Association Attack Model, Pierson Yieh, Pierson Yieh

Master's Theses and Project Reports

With recent advances in technology, Vehicular Ad-hoc Networks (VANETs) have grown in application. One of these areas of application is Vehicle Safety Communication (VSC) technology. VSC technology allows for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that enhance vehicle safety and driving experience. However, these newly developing technologies bring with them a concern for the vehicular privacy of drivers. Vehicles already employ the use of pseudonyms, unique identifiers used with signal messages for a limited period of time, to prevent long term tracking. But can attackers still attack vehicular privacy even when vehicles employ a pseudonym change strategy? The major contribution ...


Anomaly Inference Based On Heterogeneous Data Sources In An Electrical Distribution System, Yachen Tang Jan 2018

Anomaly Inference Based On Heterogeneous Data Sources In An Electrical Distribution System, Yachen Tang

Dissertations, Master's Theses and Master's Reports

Harnessing the heterogeneous data sets would improve system observability. While the current metering infrastructure in distribution network has been utilized for the operational purpose to tackle abnormal events, such as weather-related disturbance, the new normal we face today can be at a greater magnitude. Strengthening the inter-dependencies as well as incorporating new crowd-sourced information can enhance operational aspects such as system reconfigurability under extreme conditions. Such resilience is crucial to the recovery of any catastrophic events. In this dissertation, it is focused on the anomaly of potential foul play within an electrical distribution system, both primary and secondary networks as ...


Design And Implementation Of An Improved Android Application For Bard Shuttle Services, Chance O'Neihl Wren Jan 2017

Design And Implementation Of An Improved Android Application For Bard Shuttle Services, Chance O'Neihl Wren

Senior Projects Spring 2017

With the growing population of Bard College, the need for the college’s shuttle system continues to grow. As a result, enabling the Bard community to quickly and easily access the shuttle schedules and times, has also become more important in the daily of life of Bard College's inhabitants. Although Bard College has a mobile application for Android and iPhone mobile devices alike, there was a growing demand for a new improved shuttle application for Android mobile devices. This project seeks to improve the functionality, user friendliness, and availability of shuttle schedules to the Bard Community, in the form ...


A System For Monitoring And Managing Indoor Air Quality And Environmental Conditions, Ali Ibrahim Aug 2016

A System For Monitoring And Managing Indoor Air Quality And Environmental Conditions, Ali Ibrahim

Boise State University Theses and Dissertations

The quality of indoor air depends on different types of pollutant sources existing in a semi-enclosed environment. The sources can be biological, chemical, or toxic pollutants. These sources can cause health issues and discomfort for occupants. One of the indicators of poor indoor air quality is Carbon Dioxide (CO2). CO2 can be used to indicate the indoor air exchange rate. The lack of air exchange means higher levels of CO2. High levels of indoor particulates can also be an indication of poor air quality. Due to the lack of fresh air, air circulation, and air filtration, the ...


Evaluating The Cyber Security In The Internet Of Things: Smart Home Vulnerabilities, Timothy Matthew Mcgee Jul 2016

Evaluating The Cyber Security In The Internet Of Things: Smart Home Vulnerabilities, Timothy Matthew Mcgee

West Point ETD

The need for advanced cyber security measures and strategies is attributed to modern sophistication of cyber-attacks and intense media attention when attacks and breaches occur. In May 2014, a congressional report suggested that Americans used approximately 500 million Internet-capable devices at home, including, but not limited to Smartphones, tablets, and other Internet-connected devices, which run various unimpeded applications. Owing to this high level of connectivity, our home environment is not immune to the cyber-attack paradigm; rather, the home has evolved to become one of the most influenced markets where the Internet of Things has had extensive surfaces, vectors for attacks ...


Data And Network Optimization Effect On Web Performance, Steven Rosenberg, Surbhi Dangi, Isuru Warnakulasooriya Dec 2015

Data And Network Optimization Effect On Web Performance, Steven Rosenberg, Surbhi Dangi, Isuru Warnakulasooriya

Surbhi Dangi

In this study, we measure the effects of two software approaches to improving data and network performance: 1. Content optimization and compression; and 2. Optimizing network protocols. We achieve content optimization and compression by means of BoostEdge by ActivNetworks and employ the SPDY network protocol by Google to lower the round trip time for HTTP transactions. Since the data and transport layers are separate, we conclude our investigation by studying the combined effect of these two techniques on web performance. Using document mean load time as the measure, we found that with and without packet loss, both BoostEdge and SPDY ...


Real-Time Digital Effects Processing Using Ios, Jonah W. Clinard Dec 2015

Real-Time Digital Effects Processing Using Ios, Jonah W. Clinard

Computer Engineering

In today’s society, we are seeing incredible improvements in terms of creating smaller technological devices that behave more and more like the personal computers of yesterday. Mobile “Smart” devices, in particular, are becoming incredibly powerful not just in terms of processing power, but in the fact that they are able to provide assistance to users in their everyday lives. Application developers are now able utilize the power and size of these devices, to create and realize ideas that would have been previously viewed as impossible. This project applies the fields of digital signal processing, music, and mobile application development ...


Disc Golf Locator, Christian Wallenfelsz, Shane Gamble, Noah Sanor, Brandon Linhart Apr 2015

Disc Golf Locator, Christian Wallenfelsz, Shane Gamble, Noah Sanor, Brandon Linhart

Electrical and Computer Engineering Faculty Research

Disc golf is a game similar to traditional golf where players throw small plastic discs into chain-link nets. Disc golf courses cover several acres containing lakes, small wooded areas, large bushes, and grassy fields. It is not uncommon to accidentally throw a golf disc into the woods or bushes, so it is the goal of this project to create a device to locate the disc and make suggestions for the player to improve performance. A small device will be attached the disc which will track its location and flight characteristics. The device will contain a GPS receiver, an inertial measurement ...


Hybrid Single And Dual Pattern Structured Light Illumination, Minghao Wang Jan 2015

Hybrid Single And Dual Pattern Structured Light Illumination, Minghao Wang

Theses and Dissertations--Electrical and Computer Engineering

Structured Light Illumination is a widely used 3D shape measurement technique in non-contact surface scanning. Multi-pattern based Structured Light Illumination methods reconstruct 3-D surface with high accuracy, but are sensitive to object motion during the pattern projection and the speed of scanning process is relatively long. To reduce this sensitivity, single pattern techniques are developed to achieve a high speed scanning process, such as Composite Pattern (CP) and Modified Composite Pattern (MCP) technique. However, most of single patter techniques have a significant banding artifact and sacrifice the accuracy. We focus on developing SLI techniques can achieve both high speed, high ...


Comparing The Efficiency Of Heterogeneous And Homogeneous Data Center Workloads, Brandon Kimmons Jan 2015

Comparing The Efficiency Of Heterogeneous And Homogeneous Data Center Workloads, Brandon Kimmons

Electronic Theses and Dissertations

Abstract

Information Technology, as an industry, is growing very quickly to keep pace with increased data storage and computing needs. Data growth, if not planned or managed correctly, can have larger efficiency implications on your data center as a whole. The long term reduction in efficiency will increase costs over time and increase operational overhead. Similarly, increases in processor efficiency have led to increased system density in data centers. This can increase cost and operational overhead in your data center infrastructure.

This paper proposes the idea that balanced data center workloads are more efficient in comparison to similar levels of ...


Adaptive Ofdm For Wireless Interconnect In Confined Enclosures, Vit Sipal, Javier Gelabert, Christopher J. Stevens, Ben Allen, David Edwards Jul 2013

Adaptive Ofdm For Wireless Interconnect In Confined Enclosures, Vit Sipal, Javier Gelabert, Christopher J. Stevens, Ben Allen, David Edwards

Articles

This letter considers and recommends OFDM with adaptive subcarrier modulation as a suitable candidate for wireless UWB communication in computer chassis. A rigorous measurement campaign studies the guaranteed spectral efficiency. It concludes that enhancement of the existing WiMedia OFDM systems with a bandwidth of 528 MHz in order to support adaptive OFDM would enable data-rates above 1 Gbps over short ranges, i.e. the spectral efficiency would be doubled. Moreover, the guaranteed spectral efficiency is shown to increase with bandwidth, i.e. the guaranteed data-rate increases better than linearly with bandwidth.


Buddy: A Breathalyzer For Iphone, Douglas Blaalid, Brandon Bevans Jun 2013

Buddy: A Breathalyzer For Iphone, Douglas Blaalid, Brandon Bevans

Electrical Engineering

Buddy is a Breathalyzer for the iPhone designed to be more a product than a project. Through proprietary hardware and a custom iOS application, Buddy provides users with a previously untapped link from the alcohol in their body to the display on their phones. Buddy uses an alcohol sensor connected to an Arduino Uno to accurately detect the BAC of the user’s breath. The BAC is then transmitted to an iPhone via the headphone jack where it is displayed and logged in a captivating app. The finished prototype successfully measured the approximate BAC of intoxicated users. The product website ...


Practical Irrigation Scheduling Program, Dominic Sween Jun 2013

Practical Irrigation Scheduling Program, Dominic Sween

BioResource and Agricultural Engineering

This senior project discusses the design, construction, and evaluation of an irrigation scheduling program that aids users in alfalfa irrigation management, with the potential for application with other crops. The program uses a very accurate irrigation prediction model that forecasts what the estimated irrigation need of each week will be, as well as the number of irrigations needed to satisfy the requirement. The model was found to predict the sum of the actual required weekly irrigation amount within less than 1% of the true value. The program was based off the single crop coefficient approach that was outlined previously by ...


A Human Proximity Operations System Test Case Validation Approach, Justin Huber, Jeremy Straub Mar 2013

A Human Proximity Operations System Test Case Validation Approach, Justin Huber, Jeremy Straub

Jeremy Straub

A Human Proximity Operations System (HPOS) poses numerous risks in a real world environment. These risks range from mundane tasks such as avoiding walls and fixed obstacles to the critical need to keep people and processes safe in the context of the HPOS’s situation-specific decision making. Validating the performance of an HPOS, which must operate in a real-world environment, is an ill posed problem due to the complexity that is introduced by erratic (non-computer) actors. In order to prove the HPOS’s usefulness, test cases must be generated to simulate possible actions of these actors, so the HPOS can ...


Greek Patent Protection System And The Impacts Of Information Technology Industry, Emmanouil Alexander Zografakis Ez Feb 2013

Greek Patent Protection System And The Impacts Of Information Technology Industry, Emmanouil Alexander Zografakis Ez

Emmanouil Alexander Zografakis EZ

Our era can be characterized as the era of knowledge proliferation and bountifulness. That has marked our era as the era following the pace of the Information Society Development. Information Society has also brought about a remarkable IT development pace over countries. Thereby, it is greatly important all that raw knowledge to become mind figments, ideas and even inventions and innovations. It is also essential to highlight that such a beneficial process will ensure the continuity of the IT development. The only way to achieve that goal is to find a way to secure all that aforementioned knowledge which is ...


Performance Evaluation And Comparison Of Distributed Messaging Using Message Oriented Middleware, Naveen Mupparaju Jan 2013

Performance Evaluation And Comparison Of Distributed Messaging Using Message Oriented Middleware, Naveen Mupparaju

UNF Graduate Theses and Dissertations

Message Oriented Middleware (MOM) is an enabling technology for modern event- driven applications that are typically based on publish/subscribe communication [Eugster03]. Enterprises typically contain hundreds of applications operating in environments with diverse databases and operating systems. Integration of these applications is required to coordinate the business process. Unfortunately, this is no easy task. Enterprise Integration, according to Brosey et al. (2001), "aims to connect and combines people, processes, systems, and technologies to ensure that the right people and the right processes have the right information and the right resources at the right time"[Brosey01]. Communication between different applications can ...


Contextualized Mobile Support For Learning By Doing In The Real World, Ray Bareiss, Natalie Linnell, Martin L. Griss Sep 2012

Contextualized Mobile Support For Learning By Doing In The Real World, Ray Bareiss, Natalie Linnell, Martin L. Griss

Martin L Griss

This research addresses the use of mobile devices with both embedded and external sensors to provide contextualized help, advice, and remediation to learners engaged in real-world learn-by-doing tasks. This work is situated within the context of learning a complex procedure, in particular emergency responders learning to conduct urban search and rescue operations. Research issues include the design and delivery of contextualized performance support and the inferring of learner actions and intentions from sensor data to ensure that the right support is delivered just in time, as it is relevant to what the learner is doing.


Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang Sep 2011

Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang

Ray Bareiss

As emergency first responders and commanders increasingly use mobile phones, tablets, and social media to communicate, coordinate, and manage information during disasters, we see a need and opportunity to provide a mobile device-appropriate semantic layer to a geographically-based common operating picture. The challenge is to provide a simple, usable structure for a rapidly growing body of information to simplify the development of situational awareness in an unfolding disaster. We use a hyperlinked structure based on the ASK model to organize information in a readily accessible form. In this paper we describe our initial design and experience with an Android-based prototype ...


Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang Sep 2011

Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang

Martin L Griss

As emergency first responders and commanders increasingly use mobile phones, tablets, and social media to communicate, coordinate, and manage information during disasters, we see a need and opportunity to provide a mobile device-appropriate semantic layer to a geographically-based common operating picture. The challenge is to provide a simple, usable structure for a rapidly growing body of information to simplify the development of situational awareness in an unfolding disaster. We use a hyperlinked structure based on the ASK model to organize information in a readily accessible form. In this paper we describe our initial design and experience with an Android-based prototype ...


An Exploration Of Knowledge And Skills Transfer From A Formal Software Engineering Curriculum To A Capstone Practicum Project, Ray Bareiss, Ed Katz Apr 2011

An Exploration Of Knowledge And Skills Transfer From A Formal Software Engineering Curriculum To A Capstone Practicum Project, Ray Bareiss, Ed Katz

Ray Bareiss

Students at Carnegie Mellon Silicon Valley complete a team-based practicum project for an industrial sponsor as the capstone of their master’s education in software engineering. Over time, the faculty member who typically serves as advisor for such projects has been disturbed by the failure of several student teams to transfer some relevant knowledge and skills from the formal curriculum to the relatively unstructured practicum project environment. We conducted a survey of all 2010 software engineering students to ascertain the most significant selfreported shortcomings. This paper presents the survey data and then discusses the results in terms of a theory ...


Imirok: Real-Time Imitative Robotic Arm Control For Home Robot Applications, Heng-Tze Cheng, Zheng Sun, Pei Zhang Mar 2011

Imirok: Real-Time Imitative Robotic Arm Control For Home Robot Applications, Heng-Tze Cheng, Zheng Sun, Pei Zhang

Zheng Sun

Training home robots to behave like human can help people with their daily chores and repetitive tasks. In this paper, we present Imirok, a system to remotely control robotic arms by user motion using low-cost, off-the-shelf mobile devices and webcam. The motion tracking algorithm detects user motion in real-time, without classifier training or predefined action set. Experimental results show that the system achieves 90% precision and recall rate on motion detection with blank background, and is robust under the change of cluttered background and user-to-camera distance.


Leveraging Mobile Context For Effective Collaboration And Task Management In Disaster Response, Faisal Luqman, Martin L. Griss Mar 2011

Leveraging Mobile Context For Effective Collaboration And Task Management In Disaster Response, Faisal Luqman, Martin L. Griss

Martin L Griss

Collaboration and task management is challenging in distributed, dynamically-formed teams, typical in large scale disaster response scenarios. Ineffective collaboration may result in poor performance and possible loss of life. In this paper, we present Overseer, an agent-based system that exploits context information from mobile devices to facilitate collaboration and task allocation. We describe our system architecture and show how mobile context can be used to create dynamic role-based assignments to support collaboration and effective task management.


Anubis: An Attestation Protocol For Distributed Context-Aware Applications, Senaka Buthpitiya, Feng-Tso Sun, Heng-Tze Chen, Patrick Tague, Martin L. Griss, Anind K. Dey Jan 2011

Anubis: An Attestation Protocol For Distributed Context-Aware Applications, Senaka Buthpitiya, Feng-Tso Sun, Heng-Tze Chen, Patrick Tague, Martin L. Griss, Anind K. Dey

Martin L Griss

Sharing sensitive context information among multiple distributed components in mobile environments introduces major security concerns. The distributed sensing, processing and actuating components of these applications can be compromised and modified or impersonated to extract private and confidential information or to inject false information. In this paper we present the Anubis protocol for remote code attestation and access control of distributed components using remote execution of trusted code. Our Anubis protocol leverages previous work in the fields of wireless sensor networks and secure web browsing. Anubis allows new components to be introduced to the environment without updating existing components. Our implementation ...


Mobile Context-Aware Personal Messaging Assistant, Senaka Buthpitiya, Deepthi Madamanchi, Sumalatha Kommaraju, Martin L. Griss Jan 2011

Mobile Context-Aware Personal Messaging Assistant, Senaka Buthpitiya, Deepthi Madamanchi, Sumalatha Kommaraju, Martin L. Griss

Martin L Griss

A previous study shows that busy professionals receive in excess of 50 emails per day of which approximately 23% require immediate attention, 13% require attention later and 64% are unimportant and typically ignored. The flood of emails impact mobile users even more heavily. Flooded inboxes cause busy professionals to spend considerable amounts of time searching for important messages, and there has been much research into automating the process using email content for classification; but we find email priority depends also on user context. In this paper we describe the Personal Messaging Assistant (PMA), an advanced rule-based email management system which ...


Sensorchestra: Collaborative Sensing For Symbolic Location Recognition, Heng-Tze Cheng, Feng-Tso Sun, Senaka Buthpitiya, Martin L. Griss Jan 2011

Sensorchestra: Collaborative Sensing For Symbolic Location Recognition, Heng-Tze Cheng, Feng-Tso Sun, Senaka Buthpitiya, Martin L. Griss

Martin L Griss

"Symbolic location of a user, like a store name in a mall, is essential for context-based mobile advertising. Existing fingerprint- based localization using only a single phone is susceptible to noise, and has a major limitation in that the phone has to be held in the hand at all times. In this paper, we present SensOrchestra, a col- laborative sensing framework for symbolic location recognition that groups nearby phones to recognize ambient sounds and images of a location collaboratively. We investigated audio and image features, and designed a classifier fusion model to integrate estimates from diff erent phones. We also ...


Activity-Aware Mental Stress Detection Using Physiological Sensors, Feng-Tso Sun, Cynthia Kuo, Heng-Tze Cheng, Senaka Buthpitiya, Patricia Collins, Martin Griss Jan 2011

Activity-Aware Mental Stress Detection Using Physiological Sensors, Feng-Tso Sun, Cynthia Kuo, Heng-Tze Cheng, Senaka Buthpitiya, Patricia Collins, Martin Griss

Martin L Griss

"Continuous stress monitoring may help users better understand their stress patterns and provide physicians with more reliable data for interventions. Previously, studies on mental stress detection were limited to a laboratory environment where participants generally rested in a sedentary position. However, it is impractical to exclude the effects of physical activity while developing a pervasive stress monitoring application for everyday use. The physiological responses caused by mental stress can be masked by variations due to physical activity. We present an activity-aware mental stress detection scheme. Electrocardiogram (ECG), galvanic skin response (GSR), and accelerometer data were gathered from 20 participants across ...


Omnisense: A Collaborative Sensing Framework For User Context Recognition Using Mobile Phones, Heng-Tze Cheng, Senaka Buthpitiya, Feng-Tso Sun, Martin L. Griss Jan 2011

Omnisense: A Collaborative Sensing Framework For User Context Recognition Using Mobile Phones, Heng-Tze Cheng, Senaka Buthpitiya, Feng-Tso Sun, Martin L. Griss

Martin L Griss

Context information, including a user’s locations and activities, is indispensable for context-aware applications such as targeted advertising and disaster response. Inferring user context from sensor data is intrinsically challenging due to the semantic gap between low-level signals and high-level human activities. When implemented on mobile phones, more challenges on resource limitations are present. While most existing work focuses on context recognition using a single mobile phone, collaboration among multiple phones has received little attention, and the recognition accuracy is susceptible to phone position and ambient changes. Simply putting a phone in one’s pocket can render the microphone muffled ...


Room-Level Wi-Fi Location Tracking, Joshua Correa, Ed Katz, Patricia Collins, Martin Griss Jan 2011

Room-Level Wi-Fi Location Tracking, Joshua Correa, Ed Katz, Patricia Collins, Martin Griss

Martin L Griss

Context-aware applications for indoor intelligent environments require an appropriately accurate and stable interior positioning system to adapt services to the location of a mobile user or mobile device in a building. Different technologies provide a varying mix of resolution, accuracy, stability and challenges. In this paper we report on our experience using an existing Wi-Fi infrastructure without specialized hardware added to support location tracking. There are several approaches to track the location of Wi-Fi enabled devices within a building such as signal propagation models and signature matching. We found signature matching most effective in our environment. Signature matching is accomplished ...


Model-Driven Safety Analysis Of Closed-Loop Medical Systems, Miroslav Pajic, Rahul Mangharam, Oleg Sokolsky, David Arney, Julian M. Goldman, Insup Lee Jan 2011

Model-Driven Safety Analysis Of Closed-Loop Medical Systems, Miroslav Pajic, Rahul Mangharam, Oleg Sokolsky, David Arney, Julian M. Goldman, Insup Lee

Departmental Papers (CIS)

In modern hospitals, patients are treated using a wide array of medical devices that are increasingly interacting with each other over the network, thus offering a perfect example of a cyber-physical system. We study the safety of a medical device system for the physiologic closed-loop control of drug infusion. The main contribution of the paper is the verification approach for the safety properties of closed-loop medical device systems. We demonstrate, using a case study, that the approach can be applied to a system of clinical importance. Our method combines simulation-based analysis of a detailed model of the system that contains ...


Contextualized Mobile Support For Learning By Doing In The Real World, Ray Bareiss, Natalie Linnell, Martin Griss Dec 2010

Contextualized Mobile Support For Learning By Doing In The Real World, Ray Bareiss, Natalie Linnell, Martin Griss

Ray Bareiss

This research addresses the use of mobile devices with both embedded and external sensors to provide contextualized help, advice, and remediation to learners engaged in real-world learn-by-doing tasks. This work is situated within the context of learning a complex procedure, in particular emergency responders learning to conduct urban search and rescue operations. Research issues include the design and delivery of contextualized performance support and the inferring of learner actions and intentions from sensor data to ensure that the right support is delivered just in time, as it is relevant to what the learner is doing.