Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Other Computer Engineering

A Simple Moving Target Defense For Power Grid Security Using Network Address Translation, Jacob Ulrich Jan 2018

A Simple Moving Target Defense For Power Grid Security Using Network Address Translation, Jacob Ulrich

Creative Components

No abstract provided.


Iseman: A Management And Deployment Interface For Lab-Based Activities Within Iserink, Alex Luehm Jan 2018

Iseman: A Management And Deployment Interface For Lab-Based Activities Within Iserink, Alex Luehm

Creative Components

ISERink is an isolated virtual environment built within the vSphere virtualization platform in which users can safely perform various cyber security exercises without fear of damaging real-world machines. In the past it has been successfully used in cyber defense competitions to provide a network setting similar to that of the real Internet, while safely containing any rogue malicious traffic. Recently the ISERink environment has been deployed within the academic setting alongside ISELab to provide students with a safe and controlled environment in which to practice building, securing, and attacking networks in a structured lab setting in conjunction with guided lectures ...


Real Time Traffic Congestion Detection Using Images, Revanth Ayala Somayajula Jan 2018

Real Time Traffic Congestion Detection Using Images, Revanth Ayala Somayajula

Creative Components

There is an increasing demand to utilize modern technology in the eld of transportation to help decrease congestion on roads so that proper measures can be pursued to facilitate lower travel times and an effective utilization of the transportation network. This project aims to develop a solution for real time detection of traffic congestion on a road. The solution captures images from the live feed of traffic cameras situated at various locations and runs a deep learning algorithm to detect whether an image shows traffic congestion. Using a set of these images and a persistence check, the application identifies the ...


The Engineering Admissions Partnership Program: A Navigation Strategy For Community College Students Seeking A Pathway Into Engineering, Marcia R. Laugerman, Mack C. Shelley, Steven K. Mickelson, Diane T. Rover Jan 2013

The Engineering Admissions Partnership Program: A Navigation Strategy For Community College Students Seeking A Pathway Into Engineering, Marcia R. Laugerman, Mack C. Shelley, Steven K. Mickelson, Diane T. Rover

Political Science Publications

This paper presents the evaluation of a program designed to improve transfer outcomes for community college students pursuing an engineering degree. The program, the Engineering Admissions Partnership Program (E-APP), was designed to improve the navigational success of community college transfer students through connections to the university. These connections include coordinated academic advising, peer-mentoring, campus visits, and online social and professional networks. The objective of the study is to determine the efficacy of the E-APP and its interventions, which will be measured by increased participation rates and increased university retention rates for E-APP participants. Outcome data for the students are analyzed ...


Large-Scale Flexible Membrane For Automatic Strain Monitoring Of Transportation Infrastructure, Simon Laflamme, Venkata D. Kolipara, Hussam S. Saleem, Randall L. Geiger Jan 2012

Large-Scale Flexible Membrane For Automatic Strain Monitoring Of Transportation Infrastructure, Simon Laflamme, Venkata D. Kolipara, Hussam S. Saleem, Randall L. Geiger

Civil, Construction and Environmental Engineering Publications

Structural Health Monitoring (SHM) of transportation infrastructures is a complex task, typically conducted by visual inspection due to the technical and economical constrains of existing health monitoring technologies. It results that health monitoring is highly dependent on scheduling and on the judgment of the inspectors, which can be costly and ineffective. Thus, it is fundamental to automate the SHM process to allow timely inspection, maintenance, and management of transportation infrastructure. The authors propose a flexible membrane that can be deployed over large surfaces, at low cost, for automatic and continuous monitoring of strains. The membrane, termed sensing skin, is constituted ...


Steganography Using The Minimax Eigenvalue Decomposition, Chaka Allen Jan 1998

Steganography Using The Minimax Eigenvalue Decomposition, Chaka Allen

Retrospective Theses and Dissertations

Steganography, or information hiding, is the study of methods to hide data within a medium. Handwritten communications, digital images, digital video and digital music are examples of various media in which data can be hidden. A primary application of steganography is the "watermarking" of digital information. Just as paper money, governmental documents, and even official school transcripts contain watermarks to prevent unauthorized reproduction, vendors seek to watermark their digital information to prevent piracy. Methods of steganography can also be used to create covert channels. A covert channel is a public medium used to transmit private information. Data can be embedded ...