Open Access. Powered by Scholars. Published by Universities.®

Systems and Communications Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

2022

Institution
Keyword
Publication
Publication Type

Articles 1 - 18 of 18

Full-Text Articles in Systems and Communications

Device Free Indoor Localization Of Human Target Using Wifi Fingerprinting, Prasanga Neupane Oct 2022

Device Free Indoor Localization Of Human Target Using Wifi Fingerprinting, Prasanga Neupane

LSU Master's Theses

Indoor localization of human objects has many important applications nowadays. Proposed here is a new device free approach where all the transceiver devices are fixed in an indoor environment so that the human target doesn't need to carry any transceiver device with them. This work proposes radio-frequency fingerprinting for the localization of human targets which makes this even more convenient as radio-frequency wireless signals can be easily acquired using an existing wireless network in an indoor environment. This work explores different avenues for optimal and effective placement of transmitter devices for better localization. In this work, an experimental environment is …


Efficient Discovery And Utilization Of Radio Information In Ultra-Dense Heterogeneous 3d Wireless Networks, Mattaka Gamage Samantha Sriyananda Aug 2022

Efficient Discovery And Utilization Of Radio Information In Ultra-Dense Heterogeneous 3d Wireless Networks, Mattaka Gamage Samantha Sriyananda

Electronic Thesis and Dissertation Repository

Emergence of new applications, industrial automation and the explosive boost of smart concepts have led to an environment with rapidly increasing device densification and service diversification. This revolutionary upward trend has led the upcoming 6th-Generation (6G) and beyond communication systems to be globally available communication, computing and intelligent systems seamlessly connecting devices, services and infrastructure facilities. In this kind of environment, scarcity of radio resources would be upshot to an unimaginably high level compelling them to be very efficiently utilized. In this case, timely action is taken to deviate from approximate site-specific 2-Dimensional (2D) network concepts in radio resource utilization …


Introduction To Pub/Sub Systems Using Opcua, Mete Isiksalan Aug 2022

Introduction To Pub/Sub Systems Using Opcua, Mete Isiksalan

Undergraduate Student Research Internships Conference

The purpose of the project was to learn and implement the fundamental basics of OPCUA system architecture using pub/sub systems. The system allows the users to create multiple different publishers and subscribers while accessing data from a local server and a primary HTTP server. The system is designed to be a multi-client and multi-server system to simulate real-life scenarios while having two different sources of generated values to send via sockets in OPCUA protocols, multiple different APIs were used for the clients on how they retrieve data as well.


A Memory-Centric Customizable Domain-Specific Fpga Overlay For Accelerating Machine Learning Applications, Atiyehsadat Panahi Aug 2022

A Memory-Centric Customizable Domain-Specific Fpga Overlay For Accelerating Machine Learning Applications, Atiyehsadat Panahi

Graduate Theses and Dissertations

Low latency inferencing is of paramount importance to a wide range of real time and userfacing Machine Learning (ML) applications. Field Programmable Gate Arrays (FPGAs) offer unique advantages in delivering low latency as well as energy efficient accelertors for low latency inferencing. Unfortunately, creating machine learning accelerators in FPGAs is not easy, requiring the use of vendor specific CAD tools and low level digital and hardware microarchitecture design knowledge that the majority of ML researchers do not possess. The continued refinement of High Level Synthesis (HLS) tools can reduce but not eliminate the need for hardware-specific design knowledge. The designs …


Reduced Fuel Emissions Through Connected Vehicles And Truck Platooning, Paul D. Brummitt Aug 2022

Reduced Fuel Emissions Through Connected Vehicles And Truck Platooning, Paul D. Brummitt

Electronic Theses and Dissertations

Vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) communication enable the sharing, in real time, of vehicular locations and speeds with other vehicles, traffic signals, and traffic control centers. This shared information can help traffic to better traverse intersections, road segments, and congested neighborhoods, thereby reducing travel times, increasing driver safety, generating data for traffic planning, and reducing vehicular pollution. This study, which focuses on vehicular pollution, used an analysis of data from NREL, BTS, and the EPA to determine that the widespread use of V2V-based truck platooning—the convoying of trucks in close proximity to one another so as to reduce air drag …


Snap : A Software-Defined & Named-Data Oriented Publish-Subscribe Framework For Emerging Wireless Application Systems, Manveen Kaur Aug 2022

Snap : A Software-Defined & Named-Data Oriented Publish-Subscribe Framework For Emerging Wireless Application Systems, Manveen Kaur

All Dissertations

The evolution of Cyber-Physical Systems (CPSs) has given rise to an emergent class of CPSs defined by ad-hoc wireless connectivity, mobility, and resource constraints in computation, memory, communications, and battery power. These systems are expected to fulfill essential roles in critical infrastructure sectors. Vehicular Ad-Hoc Network (VANET) and a swarm of Unmanned Aerial Vehicles (UAV swarm) are examples of such systems. The significant utility of these systems, coupled with their economic viability, is a crucial indicator of their anticipated growth in the future. Typically, the tasks assigned to these systems have strict Quality-of-Service (QoS) requirements and require sensing, perception, and …


Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami Jul 2022

Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami

Future Computing and Informatics Journal

This is a systematic literature review to reflect the previous studies that dealt with credit card fraud detection and highlight the different machine learning techniques to deal with this problem. Credit cards are now widely utilized daily. The globe has just begun to shift toward financial inclusion, with marginalized people being introduced to the financial sector. As a result of the high volume of e-commerce, there has been a significant increase in credit card fraud. One of the most important parts of today's banking sector is fraud detection. Fraud is one of the most serious concerns in terms of monetary …


Mars Prototype Rover Environmental Measurement System, James A. Renick Jun 2022

Mars Prototype Rover Environmental Measurement System, James A. Renick

Computer Engineering

In my senior project, the problem I am trying to solve is how to efficiently design, create, and install an original library onto a Mars prototype rover operating system and to further use that library to integrate a new weather measurement sensor device into the rover system with the necessary software and hardware implementations. This is an important and highly valued problem as many aerospace and other engineering companies utilize rovers and other autonomous systems for important research, explorations, and reconnaissance missions and goals. In solving this problem, I utilized many resources that were available to me such as advisors, …


Graph-Based Heuristic Solution For Placing Distributed Video Processing Applications On Moving Vehicle Clusters, Kanika Sharma, Bernard Butler, Brendan Jennings May 2022

Graph-Based Heuristic Solution For Placing Distributed Video Processing Applications On Moving Vehicle Clusters, Kanika Sharma, Bernard Butler, Brendan Jennings

Articles

Vehicular fog computing (VFC) is envisioned as an extension of cloud and mobile edge computing to utilize the rich sensing and processing resources available in vehicles. We focus on slow-moving cars that spend a significant time in urban traffic congestion as a potential pool of onboard sensors, video cameras, and processing capacity. For leveraging the dynamic network and processing resources, we utilize a stochastic mobility model to select nodes with similar mobility patterns. We then design two distributed applications that are scaled in real-time and placed as multiple instances on selected vehicular fog nodes. We handle the unstable vehicular environment …


Ml-Based Online Traffic Classification For Sdns, Mohammed Nsaif, Gergely Kovasznai, Mohammed Abboosh, Ali Malik, Ruairí De Fréin May 2022

Ml-Based Online Traffic Classification For Sdns, Mohammed Nsaif, Gergely Kovasznai, Mohammed Abboosh, Ali Malik, Ruairí De Fréin

Articles

Traffic classification is a crucial aspect for Software-Defined Networking functionalities. This paper is a part of an on-going project aiming at optimizing power consumption in the environment of software-defined datacenter networks. We have developed a novel routing strategy that can blindly balance between the power consumption and the quality of service for the incoming traffic flows. In this paper, we demonstrate how to classify the network traffic flows so that the quality of service of each flow-class can be guaranteed efficiently. This is achieved by creating a dataset that encompasses different types of network traffic such as video, VoIP, game …


A Novel Data Lineage Model For Critical Infrastructure And A Solution To A Special Case Of The Temporal Graph Reachability Problem, Ian Moncur May 2022

A Novel Data Lineage Model For Critical Infrastructure And A Solution To A Special Case Of The Temporal Graph Reachability Problem, Ian Moncur

Graduate Theses and Dissertations

Rapid and accurate damage assessment is crucial to minimize downtime in critical infrastructure. Dependency on modern technology requires fast and consistent techniques to prevent damage from spreading while also minimizing the impact of damage on system users. One technique to assist in assessment is data lineage, which involves tracing a history of dependencies for data items. The goal of this thesis is to present one novel model and an algorithm that uses data lineage with the goal of being fast and accurate. In function this model operates as a directed graph, with the vertices being data items and edges representing …


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


Multimodal Adversarial Learning, Uche Osahor Jan 2022

Multimodal Adversarial Learning, Uche Osahor

Graduate Theses, Dissertations, and Problem Reports

Deep Convolutional Neural Networks (DCNN) have proven to be an exceptional tool for object recognition, generative modelling, and multi-modal learning in various computer vision applications. However, recent findings have shown that such state-of-the-art models can be easily deceived by inserting slight imperceptible perturbations to key pixels in the input. A good target detection systems can accurately identify targets by localizing their coordinates on the input image of interest. This is ideally achieved by labeling each pixel in an image as a background or a potential target pixel. However, prior research still confirms that such state of the art targets models …


Speaker Encoding For Zero-Shot Speech Synthesis, Tristin W. Cory Jan 2022

Speaker Encoding For Zero-Shot Speech Synthesis, Tristin W. Cory

MSU Graduate Theses

Spoken communication, for many, is an essential part of everyday life. Some individuals can lose or not be born with the ability to speak. To function on a day-to-day basis, these individuals find other ways of communication. Adaptive speech synthesis is one of those ways. It recreates a user’s previous voice or creates a voice that blends with their regional dialect. Current adaptive speech synthesis techniques that achieve human-like speech require thirty minutes, to a few hours of high-quality audio recordings of a target speaker. This amount of recorded audio is not commonly possessed by people in need of a …


Improving Network Policy Enforcement Using Natural Language Processing And Programmable Networks, Pinyi Shi Jan 2022

Improving Network Policy Enforcement Using Natural Language Processing And Programmable Networks, Pinyi Shi

Theses and Dissertations--Computer Science

Computer networks are becoming more complex and challenging to operate, manage, and protect. As a result, Network policies that define how network operators should manage the network are becoming more complex and nuanced. Unfortunately, network policies are often an undervalued part of network design, leaving network operators to guess at the intent of policies that are written and fill in the gaps where policies don’t exist. Organizations typically designate Policy Committees to write down the network policies in the policy documents using high-level natural languages. The policy documents describe both the acceptable and unacceptable uses of the network. Network operators …


Lapnitor: A Web Service That Protects Your Laptop From Theft., Michael Ameteku Jan 2022

Lapnitor: A Web Service That Protects Your Laptop From Theft., Michael Ameteku

Williams Honors College, Honors Research Projects

Laptop theft is an issue worldwide. According to an article from 2018, Security Boulevard stated that a laptop is stolen every 53 seconds. Using a laptop's camera, we can monitor the surroundings of the laptop and reduce a laptop's probability of being stolen. According to the University of Pittsburgh, a laptop has a 1-in- 10 chance of being stolen and nearly half of these thefts occur in offices or classrooms. These thefts mostly occur when a laptop owner leaves their device unattended for a certain period of time to maybe go visit the restroom or attend to a call when …


Removing Physical Presence Requirements For A Remote And Automated World - Api Controlled Patch Panel For Conformance Testing, Hunter George Wells Jan 2022

Removing Physical Presence Requirements For A Remote And Automated World - Api Controlled Patch Panel For Conformance Testing, Hunter George Wells

Honors Theses and Capstones

Quality assurance test engineers at the UNH-InterOperability Lab must run tests that require driving and monitoring a selection of DC signals. While the number of signals is numerous, there are limited ports on the test equipment, and only a few signals need patching for any given test. The selection of signals may vary between the 209 different tests and must be re-routed frequently. Currently, testers must leave their desk to manually modify the test setup in another room. This posed a considerable issue at the onset of the COVID-19 Pandemic when physical access was not possible. In order to enable …


Leveraging Machine Learning For Detecting Iot-Based Interference In Operational Wifi Networks, Josh Pulse Jan 2022

Leveraging Machine Learning For Detecting Iot-Based Interference In Operational Wifi Networks, Josh Pulse

Honors Program Theses

IoT (Internet of Things) devices have become increasingly popular in recent years while WiFi continues to serve as primary network provider indoors. With the advancements in technology, the networks of IoT devices continue to weave closely with indoor WiFi network deployments. Both kinds of these networks primarily operate in 2.4 GHz ISM Band (though latest WiFi standards can operate in 5 GHz and 60 GHz bands, too). With the multitude of tiny IoT sensors being deployed indoors alongside operational WiFi networks, severe interference scenarios cannot be ruled out. As a result of this interference, performance of WiFi networks is bound …