{"title":"Design, development and testing an academic repository","authors":"Kevin M. Handeli, S. Robila","doi":"10.1109/LISAT.2018.8378017","DOIUrl":"https://doi.org/10.1109/LISAT.2018.8378017","url":null,"abstract":"Technological advances, established best web development practices, and modern design of the 21st century have provided students, professors, researchers, etc., quasi-effortless access to academic documents encompassed within cleaner user interface and a higher level of usability. Access to and rigorous management of research publication and products is also mandated by funding agencies. Given these characteristics, we have developed an academic repository to maintain the student projects in a typical academic department. A repository of this nature is comprised of two major components: the database and the user interface. The key focus is to provide secure access to research materials (e.g. Master's projects and the like), similar to that of a community or university library's online catalogs, while sustaining a keen eye for contemporary front-end design. In addition to providing access to documentation, this repository uses collected data to present various citation styles, assisting users with easy composition of reference pages. Through a familiar search engine paradigm, information on projects, as well as the projects themselves, are discovered and queried using keywords and will be as if performing a Google search. The repository, while focused on single academic unit, can be expended as a campus wide tool, and provides an in house, easily expandable solution to off-the shelf repository solutions.","PeriodicalId":161643,"journal":{"name":"2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114506671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DOA-based localization algorithms under NLOS conditions","authors":"Jun Li, I. Lu, Jonathan S. Lu","doi":"10.1109/LISAT.2018.8378027","DOIUrl":"https://doi.org/10.1109/LISAT.2018.8378027","url":null,"abstract":"Localization schemes based on direction of arrival (DOA) in none-line-of-sight (NLOS) environments are developed. The proposed kernel-based machine learning method is innovative and can provide accurate position estimation under none-line-of sight (NLOS) conditions. The proposed kernel-based method is compared with the Weighted K-nearest neighborhood (WKNN) fingerprinting method using simulated DOA data in practical rural environment. It shows that the kernel-based method gives more accurate localization results.","PeriodicalId":161643,"journal":{"name":"2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123488794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Precoding based analog channel state information feedback scheme","authors":"I. Lu, Juan Fang, H. Lou","doi":"10.1109/LISAT.2018.8378029","DOIUrl":"https://doi.org/10.1109/LISAT.2018.8378029","url":null,"abstract":"By exploiting the multiple-input-multiple-output (MIMO) channel estimation and precoding, a novel analog information transmission approach is employed for the user stations (STAs) to feedback channel state information (CSI) to the access point (AP) in downlink multi-user MIMO (DL MU-MIMO) systems. Feedback frame designs and simulation results based on IEEE 802.11ac system are presented. Comparing with the existing explicit compressed feedback approach, the proposed analog CSI feedback approach achieves the same bit error rate but requires a much smaller overhead for DL MU MIMO systems.","PeriodicalId":161643,"journal":{"name":"2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134334565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdulmajeed Alyazidi, Mohamed Ben Haj Frej, Navarun Gupta
{"title":"Multi-node partial-mesh network communication via AT commands","authors":"Abdulmajeed Alyazidi, Mohamed Ben Haj Frej, Navarun Gupta","doi":"10.1109/LISAT.2018.8378013","DOIUrl":"https://doi.org/10.1109/LISAT.2018.8378013","url":null,"abstract":"AT commands tool Kit (ATK), used in mobile phones in the global system for mobile communication (GSM) to provide value-added services for the user and the operator. Today, this standard is in practice on many AT command cards. In this paper, we have used the concept of the AT commands to control various devices and send text, messages without creating a session between the two devices. This is a novel method to determine new communication protocols for simple messaging service like sending alerts and target command messages. Target command messages could be like turning on the Air-conditioning or the water heater. It could be used in developing nations were the data networks have yet to be established and thus we are achieving the seven layers communication model functions with the basic proposed three layers. This paper also describes, in brief, the background of smart card, AT commands card and AT commands tool Kit communication. By monitoring various metrics in the WSN, we can also show that the AT command Protocol over a mesh network topology is better in terms of network life-time.","PeriodicalId":161643,"journal":{"name":"2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129083886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of ping of death DoS and DDoS attacks","authors":"Fekadu Yihunie, Eman Abdelfattah, A. Odeh","doi":"10.1109/LISAT.2018.8378010","DOIUrl":"https://doi.org/10.1109/LISAT.2018.8378010","url":null,"abstract":"Effects of ping of death attack from standalone and multiple attacking machines are compared with healthy network configuration by applying the attack to the Database and File Transfer Protocol (FTP) server. Riverbed Modeler Academic Edition 17.5 is used to design and analyze the performance of the network. A comparison of three scenarios is conducted. The first scenario is modeled with healthy and functional network topology. The second and third scenarios configured to attack the server from the standalone machine and multiple machines to simulate Denial of Service (DoS) attack and Distributed Denial of Service Attack (DDoS) respectively. The case studies are conducted based on the average response time, traffic received, traffic sent, upload and download response times. The DDoS attacks of the simulated network show dramatic declination of the performance and increase of the response time of the server.","PeriodicalId":161643,"journal":{"name":"2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133462010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non-electromagnetic monitoring remote mental events","authors":"M. Krinker, A. Trofimov","doi":"10.1109/LISAT.2018.8378021","DOIUrl":"https://doi.org/10.1109/LISAT.2018.8378021","url":null,"abstract":"The paper deals with the results of recording the localized spinning field, (a Field Gyroscope), and structural changes in water, initiated by the remote mental activity, supported by Kozyrev Mirrors, said activity linked to the remote detectors with the coupling agent (the coupling information-based linkage agent), containing the attributes accompanying the remote mental activity. The recorded phenomena are explained by the quantum property of the information and the Field Gyroscope, both following the laws of the quantum world, including the nonlocality and the quantum entanglement.","PeriodicalId":161643,"journal":{"name":"2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123405933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey of cryptographic algorithms for IoT devices","authors":"S. Surendran, Amira Nassef, B. Beheshti","doi":"10.1109/LISAT.2018.8378034","DOIUrl":"https://doi.org/10.1109/LISAT.2018.8378034","url":null,"abstract":"The future of Internet is “Internet of Things” where trillions of physical objects, most of them with low or extremely low resources, communicate with each other without human intervention. Light weight cryptography includes cryptographic algorithms specifically meant for extremely constrained resources. They can be applied not only for encryption but also for hashing and authentication under environments that are highly constrained. □ In this paper, we first discuss the need of light weight cryptography and their design differences with normal block ciphers. An overview of some of the light weight cryptographic algorithms is discussed after that. Also, we look into different types of attacks that has been studied on some of these ciphers. Finally, we compare the performance of some of these ciphers on Windows and Embedded platform.","PeriodicalId":161643,"journal":{"name":"2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131167579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study on penetration testing process and tools","authors":"Hessa Mohammed Zaher Al Shebli, B. Beheshti","doi":"10.1109/LISAT.2018.8378035","DOIUrl":"https://doi.org/10.1109/LISAT.2018.8378035","url":null,"abstract":"Information is more vulnerable than ever; and every technological advance raises new security threat that requires new security solutions. Penetration testing is conducted to evaluate the security of an IT infrastructure by safely exposing its vulnerabilities. It also helps in assessing the efficiency of the defense mechanisms tools and policy in place. The Penetration testing is conducted regularly to identify risks and manage them to achieve higher security standards. In this paper we discuss the importance of penetration testing, factors and components considered while conducting a penetration test, we present a survey of tools and procedures followed, role of penetration test while implementing in the IT governance in an organisation and finally the professional ethics to be possessed by the team involved in penetration test.","PeriodicalId":161643,"journal":{"name":"2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116323861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of routing protocols in an emergency communications center","authors":"John A. Bucherati, Eman Abdelfattah","doi":"10.1109/LISAT.2018.8378008","DOIUrl":"https://doi.org/10.1109/LISAT.2018.8378008","url":null,"abstract":"In every network, routing protocols are used for determining the best paths to route packets to and from various hosts. This paper presents a logical network created for a proposed joint Emergency Communications Center (ECC) between two municipalities. The consolidation and centralization of the public safety network's core services requires an evaluation of which routing protocol provides the best performance and throughput in a mission critical environment. Routing Information Protocol (RIP), Open Shortest Path First (OSPF), Interior Gateway Routing Protocol (IGRP), and Enhanced Interior Gateway Routing Protocol (EGIRP) are the routing protocols for which convergence, throughput, and queuing delay are measured. The network is simulated in Riverbed Modeler Academic Edition 17.5. An analysis of the results reveals which protocol should be implemented.","PeriodicalId":161643,"journal":{"name":"2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129392978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of American English corner vowels produced by Mandarin, Hindi, and American accented speakers and a baseline accent recognition system","authors":"A. Patel, B. Barkana","doi":"10.1109/LISAT.2018.8378031","DOIUrl":"https://doi.org/10.1109/LISAT.2018.8378031","url":null,"abstract":"Individuals' speaking styles such as their accent present challenges for designing speaker independent systems and affect the performance of the systems. Accent recognition systems can be used to improve voice activated systems and Automatic Speech Recognition (ASR) systems. In this paper, we focus on analyzing American English corner vowels produced by Mandarin, Hindi and American accented speakers by using Mel-frequency cepstral coefficients (MFCCs), Linear Predictive coding (LPC), and the first two F1-F2 formant frequencies. A baseline system is designed and tested. The vowel spaces of Mandarin and Hindi accented male speakers of American English are found to be smaller compared to the female L2 speakers' vowel spaces. A significant difference among the L1 and L2 speaker groups is observed for the back corner vowel /a/. In the baseline system, MFCCs feature set achieved higher classification accuracies than the LPCs set.","PeriodicalId":161643,"journal":{"name":"2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117350108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}