Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

Internet

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 28 of 28

Full-Text Articles in Engineering

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami Nov 2021

The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami

Future Computing and Informatics Journal

It is possible to learn more quickly and effectively with e-learning software development because it provides learners with convenient and flexible learning environments. This allows them to progress further in their careers. Reports on web-based e-learning systems for in-service education have frequently neglected to include the viewpoint of the instructor. In order to conduct quantitative research, a sample of 50 academic staff members was selected. The purpose of this study was to investigate various factors that influence the intention to use web-based e-learning, with the theoretical foundation being provided by university lecturers. According to the findings of the study, the …


Energy Conservation With Open Source Ad Blockers, Joshua M. Pearce Mar 2020

Energy Conservation With Open Source Ad Blockers, Joshua M. Pearce

Michigan Tech Publications

Internet-related electricity consumption is rising rapidly as global Internet users spend more than 6.5 h per day online. Open source ad blockers have the potential to reduce the time and thus electricity spent using computers by eliminating ads during Internet browsing and video streaming. In this study, three open source ad blockers are tested against a no-ad blocker control. Page load time is recorded for browsing a representative selection of the globally most-accessed websites, and the time spent watching ads on videos is quantified for both trending and non-trending content. The results show that page load time dropped 11% with …


Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey Jan 2017

Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey

All Faculty Scholarship

This Chapter proposes an alternative approach to the IANA transition that migrates the existing core contractual requirements imposed by the US government to the existing IANA functions customers. It also advances modest internal accountability revisions that could be undertaken within ICANN’s existing structure. Specifically, it advocates that the Independent Review Tribunal charged with reviewing certain ICANN board of directors-related decisions be selected by a multi-stakeholder committee rather than being subject to approval by ICANN and expanding the grounds for review to cover all of the rubrics recommended by ICANN’s “Improving Institutional Confidence” process in 2008-2009, including fairness, fidelity to the …


Kicm: A Knowledge-Intensive Context Model, Fredrick Mtenzi, Denis Lupiana Jan 2016

Kicm: A Knowledge-Intensive Context Model, Fredrick Mtenzi, Denis Lupiana

Conference papers

A context model plays a significant role in developing context-aware architectures and consequently on realizing context-awareness, which is important in today's dynamic computing environments. These architectures monitor and analyse their environments to enable context-aware applications to effortlessly and appropriately respond to users' computing needs. These applications make the use of computing devices intuitive and less intrusive. A context model is an abstract and simplified representation of the real world, where the users and their computing devices interact. It is through a context model that knowledge about the real world can be represented in and reasoned by a context-aware architecture. This …


Discrete Event Simulation-Based Performance Evaluation Of Internet Routing Protocols, Fati̇h Çeli̇k, Ahmet Zengi̇n, Bülent Çobanoğlu Jan 2013

Discrete Event Simulation-Based Performance Evaluation Of Internet Routing Protocols, Fati̇h Çeli̇k, Ahmet Zengi̇n, Bülent Çobanoğlu

Turkish Journal of Electrical Engineering and Computer Sciences

This paper presents a discrete event system specification (DEVS)-based comparative performance analysis between the open shortest path first (OSPF) protocol and the routing information protocol (RIP), together with the border gateway protocol (BGP), using DEVS-Suite. In order to evaluate the OSPF and RIP's scalability performance, several network models are designed and configured with the OSPF and RIP, in combination with the BGP. Evaluations of the proposed routing protocols are performed based on the metrics, such as the execution time, convergence time, turnaround time, throughput, and efficiency across an increasing size and complexity through the simulated network models. The evaluation results …


Maine’S Three Ring Binder, Fletcher Kittredge Jan 2013

Maine’S Three Ring Binder, Fletcher Kittredge

Maine Policy Review

Although Maine is a rural state, it has had success in keeping pace with technological changes since the rise of the Internet 20 years ago. In this section, authors describe some of these successes and the challenges faced by both consumers and libraries in the new digital environment. Fletcher Kittredge presents the history and promise of Maine’s “Three Ring Binder,” a new and important fiber optic network that will bring high-speed broadband connectivity to rural parts of the state. The Three Ring Binder is expected both to improve economic opportunities for businesses and to increase high-speed Internet access for underserved …


Slides: Impacts Of Energy Deficits In Cooking, Illumination, Water, Sanitation, And Motive Power, Paul S. Chinowsky Sep 2012

Slides: Impacts Of Energy Deficits In Cooking, Illumination, Water, Sanitation, And Motive Power, Paul S. Chinowsky

2012 Energy Justice Conference and Technology Exposition (September 17-18)

Presenter: Dr. Paul Chinowsky, Director, Mortenson Center in Engineering for Developing Communities; Professor, University of Colorado

25 slides


Lyfi, Kianoosh Salami, Justin Cotton, Elush Shirazpour Jun 2012

Lyfi, Kianoosh Salami, Justin Cotton, Elush Shirazpour

Electrical Engineering

This paper will cover the steps necessary to design, build, and manage networkable smart light switches over WiFi via a mobile application. It contains a microcontroller running a real time operating system, a WiFi module, a Java server with SQLite databasing, and a mobile phone application.

LyFi is designed to turn on/off and dim household lights while only requiring the same installation procedure as a less capable dimmer switch. Once installed and connected to a network, LyFi will self-discover and configure. The server automatically propogates a database of nodes where any mobile device running an application can receive an updated …


Queue Length Based Pacing Of Internet Traffic, Cai Yan Sep 2011

Queue Length Based Pacing Of Internet Traffic, Cai Yan

Open Access Dissertations

As the Internet evolves, there is a continued demand for high Internet bandwidth. This demand is driven partly by the widely spreading real-time video applications, such as on-line gaming, teleconference, high-definition video streaming. All-optical switches and routers have long been studied as a promising solution to the rapidly growing demand. Nevertheless, buffer sizes in all-optical switches and routers are very limited due to the challenges in manufacturing larger optical buffers. On the other hand, Internet traffic is bursty. The existence of burstiness in network traffic has been shown at all time scales, from tens of milliseconds to thousands of seconds. …


San Luis Obispo Transit Tracker System Back-End Server, Daryl Alan A. Dimalanta Jun 2011

San Luis Obispo Transit Tracker System Back-End Server, Daryl Alan A. Dimalanta

Computer Engineering

This document gives the rationale, design process, technical implementation, testing procedures, and testing results of a back-end server used for the San Luis Obispo (SLO) Transit Tracker System. The SLO Transit Tracker System (SLOTTS) includes client software installed on mobile devices and a back-end server. The purpose of this system is to encourage SLO residents to utilize the transit system by having the client software present current bus location, navigation instructions, and bus schedule in a simple, fast, and easy to use mobile application.

Due to the limited central processing unit (CPU) and limited power supplied by the battery, route …


The New Centurions, Lynn K. Stichnote, Mariesa Crow Jul 2010

The New Centurions, Lynn K. Stichnote, Mariesa Crow

Electrical and Computer Engineering Faculty Research & Creative Works

The current group of young people entering the workforce belong to the so-called "millennial generation." Each generation has certain characteristics that have defined its interaction with the world; the millennials have been called the "Net generation." They are the first generation that has never known life without the Internet. As a result of their protected, structured, and positively reinforced upbringing, the millennials are an exceptionally accomplished, positive, upbeat, and optimistic generation. The millennials are the quintessential multitaskers, and they are used to having the world at their fingertips through online search engines. If organizations use the best of the millennials' …


Diversifying The Internet, Yong Liao May 2010

Diversifying The Internet, Yong Liao

Open Access Dissertations

Diversity is a widely existing and much desired property in many networking systems. This dissertation studies diversity problems in Internet, which is the largest computer networking system in the world. The motivations of diversifying the Internet are two-fold. First, diversifying the Internet improves the Internet routing robustness and reliability. Most problems we have encountered in our daily use of Internet, such as service interruptions and service quality degradation, are rooted in the inter-domain routing system of Internet. Inter-domain routing is policy-based routing, where policies are often based on commercial agreements between ASes. Although people know how to safely accommodate a …


Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang Apr 2009

Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang

Electrical and Computer Engineering Faculty Publications

A proactive recovery scheme based on service migration for long-running Byzantine fault-tolerant systems is described. Proactive recovery is an essential method for ensuring the long-term reliability of fault-tolerant systems that are under continuous threats from malicious adversaries. The primary benefit of our proactive recovery scheme is a reduced vulnerability window under normal operation. This is achieved in two ways. First, the time-consuming reboot step is removed from the critical path of proactive recovery. Second, the response time and the service migration latency are continuously profiled and an optimal service migration interval is dynamically determined during runtime based on the observed …


Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala Jan 2008

Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala

Journal of Digital Forensics, Security and Law

That “knowledge is power” is fast becoming a cliché within the intelligentsia. Such power however, depends largely on how knowledge itself is exchanged and used, which says a lot about the tools of its transmission, exchange, and storage. Information and communication technology (ICT) plays a significant role in this respect. As a networked tool, it enables efficient exchanges of video, audio and text data beyond geographical and time constraints. Since this data is exchanged over the worldwide web (www), it can be accessible by anyone in the world using the internet. The risk of unauthorised access, interception, modification, or even …


The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney Jan 2007

The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney

Journal of Digital Forensics, Security and Law

Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which …


An Ad Hoc Adaptive Hashing Technique For Non-Uniformly Distributed Ip Address Lookup In Computer Networks, Christopher Martinez, Wei-Ming Lin Jan 2007

An Ad Hoc Adaptive Hashing Technique For Non-Uniformly Distributed Ip Address Lookup In Computer Networks, Christopher Martinez, Wei-Ming Lin

Electrical & Computer Engineering and Computer Science Faculty Publications

Hashing algorithms have been widely adopted for fast address look-up, which involves a search through a database to find a record associated with a given key. Hashing algorithms transforms a key into a hash value hoping that the hashing renders the database a uniform distribution with respect to the hash value. The closer to uniform hash values, the less search time required for a query. When the database is key-wise uniformly distributed, any regular hashing algorithm (bit-extraction, bit-group XOR, etc.) leads to a statistically perfect uniform hash distribution. When the database has keys with a non-uniform distribution, performance of regular …


The Role Of Power And Negotiation In Online Deception, Chad Albrecht, Conan C. Albrecht, Jonathan Wareham, Paul Fox Jan 2006

The Role Of Power And Negotiation In Online Deception, Chad Albrecht, Conan C. Albrecht, Jonathan Wareham, Paul Fox

Journal of Digital Forensics, Security and Law

The purpose of this paper is to advance theoretical understanding of the important role of both power and negotiation during online deception. By so doing, the paper provides insight into the relationship between perpetrator and victim in Internet fraud. The growing prevalence of Internet Fraud continues to be a burden to both society and individuals. In an attempt to better understand Internet fraud and online deception, this article attempts to build an interactive model, based upon the dimensions of power and negotiation from the management and psychology literature. Using the model presented, the article examines the effects of the Internet …


Enhancing Qos Provisioning And Granularity In Next Generation Internet, Jie Yang May 2004

Enhancing Qos Provisioning And Granularity In Next Generation Internet, Jie Yang

Dissertations

Next Generation IP technology has the potential to prevail, both in the access and in the core networks, as we are moving towards a multi-service, multimedia and high-speed networking environment. Many new applications, including the multimedia applications, have been developed and deployed, and demand Quality of Service (QoS) support from the Internet, in addition to the current best effort service. Therefore, QoS provisioning techniques in the Internet to guarantee some specific QoS parameters are more a requirement than a desire. Due to the large amount of data flows and bandwidth demand, as well as the various QoS requirements, scalability and …


A Taxonomy Of Network Computing Systems, Muthucumaru Maheswaran, Shoukat Ali Jan 2004

A Taxonomy Of Network Computing Systems, Muthucumaru Maheswaran, Shoukat Ali

Electrical and Computer Engineering Faculty Research & Creative Works

Rapid advances in networking and microprocessor technologies have led to the emergence of Internet-wide distributed computing systems ranging from simple LAN-based clusters to planetary-scale networks. As these network computing systems evolve by combining the best features of existing systems, differences among NCs are blurring. To address this problem, researchers have proposed formal taxonomies of NC systems. We propose a new taxonomy that is both broad enough to encompass all NC systems and simple enough to be widely used.


Rate-Based End-To-End Congestion Control Of Multimedia Traffic In Packet Switched Networks, Mingsheng Peng, S. R. Subramanya, Jagannathan Sarangapani Jan 2003

Rate-Based End-To-End Congestion Control Of Multimedia Traffic In Packet Switched Networks, Mingsheng Peng, S. R. Subramanya, Jagannathan Sarangapani

Electrical and Computer Engineering Faculty Research & Creative Works

This paper proposes an explicit rate-based end-to-end congestion control mechanism to alleviate congestion of multimedia traffic in packet switched networks such as the Internet. The congestion is controlled by adjusting the transmission rates of the sources in response to the feedback information from destination such as the buffer occupancy, packet arrival rate and service rate at the outgoing link, so that a desired quality of service (QoS) can be met. The QoS is defined in terms of packet loss ratio, transmission delay, power, and network utilization. Comparison studies demonstrate the effectiveness of the proposed scheme over New-Reno TCP (a variant …


A Fast Full-Search Adaptive Vector Quantizer For Video Coding, Scott E. Budge, Christian B. Peel Nov 2001

A Fast Full-Search Adaptive Vector Quantizer For Video Coding, Scott E. Budge, Christian B. Peel

Electrical and Computer Engineering Faculty Publications

This paper presents a novel VQ structure which provides very good quality encoding for video sequences and exploits the computational savings gained from a fast-search algorithm. It uses an adaptive-search, variable-length encoding method which allows for very fast matching of a wide range of transmission rates. Both the encoding quality and the computational benefits from the fast-search algorithm are presented. Simulations show that full-search tree residual VQ (FTRVQ) can provide up to 3 dB improvement over a similar RVQ encoder on video sequences.


Proxy Servers For Scalable Interactive Video Support, Husni Fahmi, Mudassir Latif, Sahra Sedigh, Arif Ghafoor, Peiya Liu, Liang Hsu Sep 2001

Proxy Servers For Scalable Interactive Video Support, Husni Fahmi, Mudassir Latif, Sahra Sedigh, Arif Ghafoor, Peiya Liu, Liang Hsu

Electrical and Computer Engineering Faculty Research & Creative Works

Targeting scalability, load balance and resource efficiency in streaming multimedia applications, proxy servers facilitate faster real-time access to cached objects and reduce response time to document requests.


Cyberpsychology And Virtual Reality: Is An Update Necessary, Ibpp Editor Feb 2001

Cyberpsychology And Virtual Reality: Is An Update Necessary, Ibpp Editor

International Bulletin of Political Psychology

This article explores the notion that something called "human nature" may be changing in an era of significant information technology developments.


On Inferring Autonomous System Relationships In The Internet, Lx Gao Jan 2001

On Inferring Autonomous System Relationships In The Internet, Lx Gao

Lixin Gao

No abstract provided.


Sharing Health-Care Records Over The Internet, Jane Grimson, Gaye Stephens, Benjamin Jung, William Grimson, Damon Berry, Sebastien Pardon Jan 2001

Sharing Health-Care Records Over The Internet, Jane Grimson, Gaye Stephens, Benjamin Jung, William Grimson, Damon Berry, Sebastien Pardon

Articles

Presents a novel approach to sharing electronic health-care records that leverages the Internet and the World Wide Web, developed as part of two European Commission-funded projects, Synapses and SynEx. The approach provides an integrated view of patient data from heterogeneous, distributed information systems and presents it to users electronically. Synapses and SynEx illustrate a generic approach in applying Internet technologies for viewing shared records, integrated with existing health computing environments. Prototypes have been validated in a variety of clinical domains and health-care settings


Rate-Distortion Adaptive Vector Quantization For Wavelet Imagecoding, Qun Gu, Scott E. Budge Jun 2000

Rate-Distortion Adaptive Vector Quantization For Wavelet Imagecoding, Qun Gu, Scott E. Budge

Electrical and Computer Engineering Faculty Publications

We propose a wavelet image coding scheme using rate-distortion adaptive tree-structured residual vector quantization. Wavelet transform coefficient coding is based on the pyramid hierarchy (zero-tree), but rather than determining the zero-tree relation from the coarsest subband to the finest by hard thresholding, the prediction in our scheme is achieved by rate-distortion optimization with adaptive vector quantization on the wavelet coefficients from the finest subband to the coarsest. The proposed method involves only integer operations and can be implemented with very low computational complexity. The preliminary experiments have shown some encouraging results: a PSNR of 30.93 dB is obtained at 0.174 …


A Virtual Classroom Via Dataconferencing: A Multi-Institutional Experience, Shelli K. Starrett, Anil Pahwa, Kraig J. Olejniczak, S. D. Sudhoff, Mariesa Crow Nov 1998

A Virtual Classroom Via Dataconferencing: A Multi-Institutional Experience, Shelli K. Starrett, Anil Pahwa, Kraig J. Olejniczak, S. D. Sudhoff, Mariesa Crow

Electrical and Computer Engineering Faculty Research & Creative Works

This paper presents the experience of five faculty from four universities who are co-developing and team teaching courses using the world-wide web (WWW). In particular two novel power engineering courses, Flexible Control of Transmission Systems and Flexible Control of Distribuction Systems, introduce the student to the application of power electronic-based controllers, known specifically as flexible AC transmission systems (FACTS) controllers, to enhance the performance of the transmission and distribution systems in an electric power system. In order to leverage faculty expertise in the various topics included in each course, a unique partnership was formed among five faculty from the following …