Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Electrical and Computer Engineering

Event And Time-Triggered Control Module Layers For Individual Robot Control Architectures Of Unmanned Agricultural Ground Vehicles, Tyler Troyer Oct 2017

Event And Time-Triggered Control Module Layers For Individual Robot Control Architectures Of Unmanned Agricultural Ground Vehicles, Tyler Troyer

Department of Biological Systems Engineering: Dissertations and Theses

Automation in the agriculture sector has increased to an extent where the accompanying methods for unmanned field management are becoming more economically viable. This manifests in the industry’s recent presentation of conceptual cab-less machines that perform all field operations under the high-level task control of a single remote operator. A dramatic change in the overall workflow for field tasks that historically assumed the presence of a human in the immediate vicinity of the work is predicted. This shift in the entire approach to farm machinery work provides producers increased control and productivity over high-level tasks and less distraction from operating …


One-To-Cloud One-Time Pad Data Encryption: Introducing Virtual Prototyping With Pspice, Paul Tobin, Lee Tobin, Roberto Gandia Blanquer Dr, Michael Mckeever, Jonathan Blackledge Jun 2017

One-To-Cloud One-Time Pad Data Encryption: Introducing Virtual Prototyping With Pspice, Paul Tobin, Lee Tobin, Roberto Gandia Blanquer Dr, Michael Mckeever, Jonathan Blackledge

Conference papers

In this paper, we examine the design and application of a one-time pad encryption system for protecting data stored in the Cloud. Personalising security using a one-time pad generator at the client-end protects data from break-ins, side-channel attacks and backdoors in public encryption algorithms. The one-time pad binary sequences were obtained from modified analogue chaos oscillators initiated by noise and encoded client data locally. Specific ``one-to-Cloud'' storage applications returned control back to the end user but without the key distribution problem normally associated with one-time pad encryption. Development of the prototype was aided by ``Virtual Prototyping'' in the latest version …


Co-Design Of Security Aware Power System Distribution Architecture As Cyber Physical System, Tarek Youssef Apr 2017

Co-Design Of Security Aware Power System Distribution Architecture As Cyber Physical System, Tarek Youssef

FIU Electronic Theses and Dissertations

The modern smart grid would involve deep integration between measurement nodes, communication systems, artificial intelligence, power electronics and distributed resources. On one hand, this type of integration can dramatically improve the grid performance and efficiency, but on the other, it can also introduce new types of vulnerabilities to the grid. To obtain the best performance, while minimizing the risk of vulnerabilities, the physical power system must be designed as a security aware system.

In this dissertation, an interoperability and communication framework for microgrid control and Cyber Physical system enhancements is designed and implemented taking into account cyber and physical security …


On The Development Of A One-Time Pad Generator For Personalising Cloud Security, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge Feb 2017

On The Development Of A One-Time Pad Generator For Personalising Cloud Security, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge

Conference papers

Cloud computing security issues are being reported in newspapers, television, and on the Internet, on a daily basis. Furthermore, in 2013, Edward Snowden alleged backdoors were placed in a number of encryption systems by the National Security Agency causing confidence in public encryption to drop even further. Our solution allows the end-user to add a layer of unbreakable security by encrypting the data locally with a random number generator prior to uploading data to the Cloud. The prototype one-time pad generator is impervious to cryptanalysis because it generates unbreakable random binary sequences from chaos sources initiated from a natural noise. …


Smart Underground Antenna Arrays: A Soil Moisture Adaptive Beamforming Approach, Abdul Salam, Mehmet C. Vuran Jan 2017

Smart Underground Antenna Arrays: A Soil Moisture Adaptive Beamforming Approach, Abdul Salam, Mehmet C. Vuran

CSE Technical Reports

In this paper, a novel framework for underground beamforming using adaptive antenna arrays is presented. Based on the analysis of propagation in wireless underground channel, a theoretical model is developed which uses soil moisture information and feedback mechanism to improve performance wireless underground communications. Array element in soil has been analyzed empirically and impacts of soil type and soil moisture on return loss and resonant frequency are investigated. Beam patterns are investigated to communicate with both underground and above ground devices. Depending on the incident angle, refraction from soil-air interface has the adverse effects in the UG communications. It is …


Secrecy Rates And Optimal Power Allocation For Full-Duplex Decode-And-Forward Relay Wire-Tap Channels, Lubna Elsaid, Leonardo Jimenez-Rodriguez, Nghi H. Tran, Sachin Shetty, Shivakumar Sastry Jan 2017

Secrecy Rates And Optimal Power Allocation For Full-Duplex Decode-And-Forward Relay Wire-Tap Channels, Lubna Elsaid, Leonardo Jimenez-Rodriguez, Nghi H. Tran, Sachin Shetty, Shivakumar Sastry

Computational Modeling & Simulation Engineering Faculty Publications

This paper investigates the secrecy rates and optimal power allocation schemes for a decode-and-forward wiretap relay channel where the transmission from a source to a destination is aided by a relay operating in a full-duplex (FD) mode under practical residual self-interference. By first considering static channels, we address the non-convex optimal power allocation problems between the source and relay nodes under individual and joint power constraints to establish closed-form solutions. An asymptotic analysis is then given to provide important insights on the derived power allocation solutions. Specifically, by using the method of dominant balance, it is demonstrated that full power …


Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey Jan 2017

Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey

All Faculty Scholarship

This Chapter proposes an alternative approach to the IANA transition that migrates the existing core contractual requirements imposed by the US government to the existing IANA functions customers. It also advances modest internal accountability revisions that could be undertaken within ICANN’s existing structure. Specifically, it advocates that the Independent Review Tribunal charged with reviewing certain ICANN board of directors-related decisions be selected by a multi-stakeholder committee rather than being subject to approval by ICANN and expanding the grounds for review to cover all of the rubrics recommended by ICANN’s “Improving Institutional Confidence” process in 2008-2009, including fairness, fidelity to the …


The Discrete Spring Transform: An Innovative Steganographic Attack, Aaron T. Sharp Jan 2017

The Discrete Spring Transform: An Innovative Steganographic Attack, Aaron T. Sharp

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Digital Steganography continues to evolve today, where steganographers are constantly discovering new methodologies to hide information effectively. Despite this, steganographic attacks, which seek to defeat these techniques, have continually lagged behind. The reason for this is simple: it is exceptionally difficult to defeat the unknown. Most attacks require prior knowledge or study of existing techniques in order to defeat them, and are often highly specific to certain cover media. These constraints are impractical and unrealistic to defeat steganography in modern communication networks. It follows, an effective steganographic attack must not require prior knowledge or study of techniques, and must be …


Industrial Wireless Sensor Networks 2016, Qindong Sun, Schancang Li, Shanshan Zhao, Hongjian Sun, Li Xu, Arumugam Nallamathan Jan 2017

Industrial Wireless Sensor Networks 2016, Qindong Sun, Schancang Li, Shanshan Zhao, Hongjian Sun, Li Xu, Arumugam Nallamathan

Information Technology & Decision Sciences Faculty Publications

The industrial wireless sensor network (IWSN) is the next frontier in the Industrial Internet of Things (IIoT), which is able to help industrial organizations to gain competitive advantages in industrial manufacturing markets by increasing productivity, reducing the costs, developing new products and services, and deploying new business models.


Qos Recommendation In Cloud Services, Xianrong Zheng, Li Da Xu, Sheng Chai Jan 2017

Qos Recommendation In Cloud Services, Xianrong Zheng, Li Da Xu, Sheng Chai

Information Technology & Decision Sciences Faculty Publications

As cloud computing becomes increasingly popular, cloud providers compete to offer the same or similar services over the Internet. Quality of service (QoS), which describes how well a service is performed, is an important differentiator among functionally equivalent services. It can help a firm to satisfy and win its customers. As a result, how to assist cloud providers to promote their services and cloud consumers to identify services that meet their QoS requirements becomes an important problem. In this paper, we argue for QoS-based cloud service recommendation, and propose a collaborative filtering approach using the Spearman coefficient to recommend cloud …