Cheryl N. Macwan, Jonathan S. Lu, I. Lu, Ruichen Wang, Ya Hui Wu, J. Blaha
{"title":"Extension of the ITU-R P.1411-8 urban path loss models to high antennas","authors":"Cheryl N. Macwan, Jonathan S. Lu, I. Lu, Ruichen Wang, Ya Hui Wu, J. Blaha","doi":"10.1109/LISAT.2017.8001982","DOIUrl":"https://doi.org/10.1109/LISAT.2017.8001982","url":null,"abstract":"This paper presents an extension of the ITU-R P.1411-8 urban low antenna path loss models to higher antennas. The Line-of-Sight (LOS) and non-Line-of-Sight (NLOS) urban canyon models presented in the paper are typically used for street level peer-to peer or cellular communications, but can be more generally used to account for radio waves propagating through urban street canyons. It is shown through comparisons with measurements of varying transmit antenna height and large variations of height difference between transmit and receive antennas, that the presented urban street canyon models are applicable to taller microcellular antennas. The measurements that are used in the comparisons and analysis were obtained in an urban high-rise environment in San Francisco at 850 and 1920 MHz frequencies.","PeriodicalId":370931,"journal":{"name":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115308038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Piccoli, G. Samuels, A. Mirakaj, A. Hinkson, M. Pichardo, S. Khot, J. Coppola, D. Putrino
{"title":"Immersive Virtual Reality for individuals with spinal cord injuries","authors":"A. Piccoli, G. Samuels, A. Mirakaj, A. Hinkson, M. Pichardo, S. Khot, J. Coppola, D. Putrino","doi":"10.1109/LISAT.2017.8001959","DOIUrl":"https://doi.org/10.1109/LISAT.2017.8001959","url":null,"abstract":"Immersive Virtual Reality (VR) is an emerging technology with the potential to have a major impact in healthcare. Immersive VR is the best way for patients who are incapable of doing a certain task for their rehabilitation, to engage in a fun and enjoyable environment to improve their quality of life. Clinicians have found spinal cord injury patient interaction with VR environments challenging due to the nature of spinal cord injuries and the degree in which individuals with them can move. Due to some survivor's limited range of motion, it has been proven difficult to easily start VR therapy without the use of hands hitting a button on the side of the Samsung Gear VR headsets. Developers working on this study created an application that may provide a solution to the current problem, so that patient and clinician interaction with the VR environment is seamless and accessible. Patient and clinician interaction is imperative when dealing with VR applications, because knowing a patient's condition and reaction to specific environments is important. It also helps developers with knowing what to add to the application. Looking at certain research characteristics such as lag motion sickness, mirror neurons, neuroplasticity and gaming software developments provides coders and clinicians with the groundwork for proper development. This study utilized the Presence Questionnaire and the Immersive Tendencies Questionnaire surveys for feedback in order to assess how the survivors with spinal cord injury and clinicians received the immersive virtual reality solution.","PeriodicalId":370931,"journal":{"name":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122347180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity in the age of autonomous vehicles, intelligent traffic controls and pervasive transportation networks","authors":"C. Axelrod","doi":"10.1109/LISAT.2017.8001966","DOIUrl":"https://doi.org/10.1109/LISAT.2017.8001966","url":null,"abstract":"Technologies for autonomous vehicles, “smart” roadways and ride-hailing services are advancing at a dizzying pace. They are also beginning to interconnect and interoperate to form complex systems-of-systems. The cyberattack surfaces of these systems-of-systems are expanding exponentially. Currently, many related systems are standalone, but when they are integrated, vulnerabilities of, and threats to, the resulting systems-of-systems could grow so much that they might well detract from the potential of these systems to improve safety and gain fuel use due to reduced travel times. Despite warnings, few are focusing on improving cybersecurity of the entire system-of-systems as the self-driving, ground-vehicle juggernaut ploughs ahead. Far too little attention is being paid to vulnerabilities throughout the systems-of-systems that will undoubtedly arise when the myriad of systems is interconnected and interoperate. In this paper, we discuss the cybersecurity consequences of the current uncoordinated evolution of these systems-of-systems and describe how such risks might be mitigated by, among other approaches, proactively introducing cybersecurity requirements early in the design, development and deployment process.","PeriodicalId":370931,"journal":{"name":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128899344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Linux kernel OS local root exploit","authors":"A. P. Saleel, Mohamed Nazeer, B. Beheshti","doi":"10.1109/LISAT.2017.8001953","DOIUrl":"https://doi.org/10.1109/LISAT.2017.8001953","url":null,"abstract":"Dirty Copy on Write (COW) vulnerability, discovered by Phil Oester on October 2016, it is a serious vulnerability which could escalate unprivileged user to gain full control on devices (Computers, Mobile Smart Phones, Gaming devices that run Linux based operating systems). This means that any user who exploits this bug, would escalate his/her privileges; and can do anything either locally or remotely (with some modifications) to hijack the device, destroy data, create a backdoor, or to record all key strokes, use computer as an attack (object) to attack other computer in the internet (in the wild), etc., COW is a local root exploit in Linux causing vulnerability issues. This paper will discuss the copy on write issue in Linux, it will also explain the nature of the problem and how it is caused, and the different mechanism to mitigate it.","PeriodicalId":370931,"journal":{"name":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"51 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120905926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finding hash collisions using MPI on HPC clusters","authors":"Melisa Cantu, Joon Kim, Xiaowen Zhang","doi":"10.1109/LISAT.2017.8001961","DOIUrl":"https://doi.org/10.1109/LISAT.2017.8001961","url":null,"abstract":"In cryptography, a hash function is a very important cryptographic primitive with a wide range of applications. There are three required properties for a good hash function, i.e., collision, pre-image, and second pre-image resistance. In this paper, we try to contest these properties on a popular and widely used hash function called MD5 - and its two simplified versions that we made. The birthday attack technique was used to test MD5's general collision resistance, while the brute force method was used in the search for pre-image and second pre-image collisions. We calculated the Hamming distance to monitor the progress in our search for a collision; the smaller the Hamming distance the better. Our input domain for the MD5 hash function consisted of hexadecimal bit-strings and strategically generated ASCII character strings. Since finding hash collisions demands much more computing power and storage, we wrote C parallel programs in conjunction with the Message Passing Interface (MPI) library that runs over multiple processors / cores in the heavily used CUNY HPC cluster called Penzias. Multiple search / sort / merge algorithms were tested, not only to reduce time and space complexities, but also to improve performance. Hash distributions, numerous arbitrary meaningless and a few meaningful collisions were found.","PeriodicalId":370931,"journal":{"name":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"367 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127584195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eiman Ahmed, Brandon DeLuca, Emily Hirowski, Connor Magee, Ivan Tang, J. Coppola
{"title":"Biometrics: Password replacement for elderly?","authors":"Eiman Ahmed, Brandon DeLuca, Emily Hirowski, Connor Magee, Ivan Tang, J. Coppola","doi":"10.1109/LISAT.2017.8001958","DOIUrl":"https://doi.org/10.1109/LISAT.2017.8001958","url":null,"abstract":"As technology continues to grow and advance at a rapid rate, most producers and companies are neglecting a rather large demographic: the elderly. The elderly, who are accustomed to more traditional means of communication utilizing pencil and paper, are having difficulty keeping in stride at the same rate as technology is pacing itself in the modern era. Cybersecurity, one of the most vital aspects of technology, is an area in cyberspace where senior citizens are struggling to adjust. Although they understand the necessity of having passwords to keep their private information secure, they often grow frustrated with remembering their passwords, which may vary from website to website and are often strenuous to remember due to regulatory password procedures. The objective of this project is to investigate how this issue can be tackled in a simple manner using biometrics. Biometrics is the most secure form of authentication to date, regardless of one's age. In this study, older adults from geriatric centers are assessed with questions in regards to how they currently manage the various passwords they create for their accounts, how they feel about their current management methods, and methods they feel their experience can be enhanced more than it already is. In addition, different biometric technologies, e.g., retinal, fingerprint, facial recognition, etc., is compared to one another and a proposed solution of the framework that would be free of cost to older adults.","PeriodicalId":370931,"journal":{"name":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132194642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of autoencoder and Principal Component Analysis followed by neural network for e-learning using handwritten recognition","authors":"Jasem Almotiri, K. Elleithy, Abdelrahman Elleithy","doi":"10.1109/LISAT.2017.8001963","DOIUrl":"https://doi.org/10.1109/LISAT.2017.8001963","url":null,"abstract":"This paper presents two different implementations for recognition of handwritten numerals using a high performance autoencoder and Principal Component Analysis (PCA) by making use of neural networks. Different from other approaches, the non-linear mapping capability of neural networks is used extensively here. The implementation involves the deployment of a neural network, and the use of an auto encoder and PCA while carrying out the compression and classification of data. The performance of the system was analyzed, and an accuracy of 97.2% for Principal Component Analysis, and 98.1% accuracy for the autoencoder, was recorded in detection of numerals written by school children.","PeriodicalId":370931,"journal":{"name":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133959437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Babu, Razan Abdulhammed, K. Elleithy, S. Suparshya Babu
{"title":"Blind Digital Signature schemes with four particle entanglement states","authors":"S. Babu, Razan Abdulhammed, K. Elleithy, S. Suparshya Babu","doi":"10.1109/LISAT.2017.8001970","DOIUrl":"https://doi.org/10.1109/LISAT.2017.8001970","url":null,"abstract":"Quantum Digital Signature (QDS) schemes provides authenticity of information that is guaranteed by quantum mechanics. This paper compares the blind signature schemes with two and three-bit quantum state bits and provides a implementation for the four quantum states. We proposed a technique where four partial entangled states are used to implement the blind signature scheme. The proposed technique improves the reliability factor of the scheme in terms of its encryption and decryption using quantum cryptosystem for interchanging the data in a protected mode. In the communication system, the encryption of messages was done with the help of the sender's private key. The third party verifies its authenticity along with blindness of the signature. Furthermore, future research trends were presented with a security analysis.","PeriodicalId":370931,"journal":{"name":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129696198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Essa, Xuan Zhang, Peiqiao Wu, Abdelshakour A. Abuzneid
{"title":"ZigBee network using low power techniques and modified LEACH protocol","authors":"A. Essa, Xuan Zhang, Peiqiao Wu, Abdelshakour A. Abuzneid","doi":"10.1109/LISAT.2017.8001955","DOIUrl":"https://doi.org/10.1109/LISAT.2017.8001955","url":null,"abstract":"Wireless Sensors Networks (WSN) have become vital in many areas and critical applications. Some applications require a reliable network and less maintenance, especially the power consumption. ZigBee standard shows the ability to be used for many applications that require low data transmission and low power consumption. The standard helps the overall network to reduce worries about the sensors power dissipation. In this work, we:(1) designed three levels of power measurement for monitoring the power status of the network, (2) achieved the transmission settings for the modified LEACH protocol of routing, (3) considered the emergency safe mode for a long-lasting network, and (4) introduced power management for WAN. Those proposed designs and strategies help ZigBee network to last longer and reduce the power consumption compared with the regular networks and the common LEACH network.","PeriodicalId":370931,"journal":{"name":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133820379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rolled versus plain fingerprints: Matching with cryptographic one-way hashes","authors":"Qinghai Gao, Cheng Zhang","doi":"10.1109/LISAT.2017.8001962","DOIUrl":"https://doi.org/10.1109/LISAT.2017.8001962","url":null,"abstract":"In password based authentication system, passwords are only stored and matched using cryptographic one-way hashes. Various biometrics have been utilized as an alternative authentication mechanism due to their permanent physical connections to a person. However, people have yet to see their usages in the formats of cryptographic one-way hashes for the reason that biometric templates cannot be reproduced with perfect accuracy and a tiny change in a template would significantly change its cryptographic hash value. In this paper we propose a novel approach of storing and matching fingerprint data with cryptographic one-way hashes. To our knowledge, it is the first proposal of matching biometric data using cryptographic one-way hashes. Experimental results with the NIST fingerprint database sd14v2 show the feasibility of our proposal.","PeriodicalId":370931,"journal":{"name":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129942041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}