CSC668 Topics in Computing Project Information and Suggestions.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Intisar O. Hussien Faculty of Computer Studies Arab Open University
Assessment I. Outline Select a paper of interest Not a thought piece or a review Empirical research Get paper approved Produce 2,000 word report.
Bandwidth Estimation for IEEE Based Ad Hoc Networks.
Doc.: IEEE /0647r0 Submission May 2010 Bruce Kraemer, MarvellSlide 1 +1 (321) Marvell Lane, Santa Clara, CA, Name Company.
Doc.: IEEE /2294r1 Submission August 2007 Alex Ashley, NDS LtdSlide 1 Topics for VTS PAR(s) Date: Authors:
Doc.: IEEE /464r0 Submission November, 2001 John Barr, MotorolaSlide 1 Project: IEEE Working Group for Wireless Personal Area Networks.
Doc.: IEEE /265r0 Submission June 2001 Robert F. Heile, Consultant Steve Shellhammer, Symbol Technologies Slide 1 IEEE P Working Group for.
1 CARNet/SRCE TNC2002 Active Measurements on Wireless LAN I.Maric, M.Klobucar, I.Velimirovic CARNet/SRCE, Croatia.
Wireless LAN Security Understanding and Preventing Network Attacks.
Implementation of a Scientific Literacy Project in a Large First Year Biology Class -Fiona Rawle.
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
A Wireless Local Area Network (WLAN) is a network that interconnects devices using radio waves. Wireless networking technologies allow devices to communicate.
Click to continue Network Protocols. Click to continue Networking Protocols A protocol defines the rules of procedures, which computers must obey when.
Omniran ecsg 1 OmniRAN EC SG November 2013 EC Opening Report Chair: Max Riegel (NSN)
Online Rubric Assessment Tool for Marine Engineering Course
Welcome to the seminar course
Welcome to CS580S!!! KD Kang. What are sensor networks? Small, wireless, battery-powered sensors MICA2 mote Smart Dust.
MSIT | Master of Science in Information Technology U N I V E R S I T Y MSIT 413: Wireless Technologies General Information Michael L. Honig Department.
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Wenyuan Xu Department of Computer Science and Engineering University of South.
Technical Writing Structure, Logic (between sentences and paragraphs), and Strictness (no holes). Know who is your audiences Structure – Title and keyword:
Web Security and Regulations Unit 23. Assessment Objective One Research and describe current and past security risks.
Chemistry B.S. Degree Program Assessment Plan Dr. Glenn Cunningham Professor and Chair University of Central Florida April 21, 2004.
1 How to Search, Read, Write, and Present a Paper.
Advanced Computer Networks by Behzad Akbari Spring 2011 In the Name of the Most High.
C HU H AI C OLLEGE O F H IGHER E DUCATION D EPARTMENT O F C OMPUTER S CIENCE Preparation of Final Year Project Report Bachelor of Science in Computer Science.
IT 499 Bachelor Capstone Week 8. Adgenda Administrative Review UNIT Seven UNIT Eight Project UNIT Nine Preview Project Status Summary.
Proposal for Term Project Operating Systems, Fall 2015 J. H. Wang Sep. 18, 2015.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
KAIST CS710 컴퓨터구조 특강 무선 센서네트워크 응용 및 보안 Syllabus Network & Security Lab.
Term Project Description CAP6135 Spring Term Project Two students form a group to do term project together – A research oriented term project.
Doc.: IEEE /441r0 Submission September 2001 Steve Shellhammer, Symbol Technologies Slide 1 IEEE P Working Group for Wireless Personal Area.
1 DOCUMENT FOR: GSC-8/GTSC-1/GRSC-1 Ottawa, Canada 28 April – 1 May 2003 GSC
1 G53ACC: Advanced Computer Communications Prof. Chris Greenhalgh School of Computer Science and IT University of Nottingham.
Advanced Computer Networking Course Overview 1. This is a graduate-level course which covers advanced topics in computer networks including current hot.
Doc.: IEEE /033r2 Submission July 1999 Simon Baatz, University of BonnSlide 1 Integration of Bluetooth into LAN Environments Simon Baatz, Matthias.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
CS 218 Advanced Computer Networks Quarter: Fall 2003 Course ID : CS218 Class hour : MW 8: :00 pm Classroom : BH 5273.
CS 858 – Hot Topics in Computer and Communications Security Winter 2009 Introduction.
Efficient Mobility Management for Vertical Handoff between WWAN and WLAN IEEE Communications Magazine November 2003.
Wireless Networks Fall 2009 Saewoong Bahk. –Room: Office hours: Tue,Thu 4-5PM TA: 남창원
Term Project Description CAP6135 Spring Term Project Two students form a group to do term project together – A research oriented term project.
Doc.: IEEE /1077r1 Submission Sep 2013 Slide 1 EDCA Enhancements for HEW Date: Authors: NameAffiliationsAddress Phone Hui
Wireless communications and mobile computing conference, p.p , July 2011.
1 Computer Engineering Department Islamic University of Gaza ECOM 6303: Advanced Computer Networks (Graduate Course) Spr Prof. Mohammad A. Mikki.
Course web page: ECE 646 Cryptography and Computer Network Security ECE web page  Courses  Course web pages  ECE 646.
Project Topics ECE 591. Project 1: Localization through Wi-Fi and Wireless Camera WIFI localization: Wireless Camera: Goal: Understand RF based localization.
Efficient Group Key Management in Wireless LANs Celia Li and Uyen Trang Nguyen Computer Science and Engineering York University.
C HU H AI C OLLEGE O F H IGHER E DUCATION D EPARTMENT O F C OMPUTER S CIENCE Preparation of Final Year Project Report Bachelor of Science in Computer Science.
Ian F. C. Smith Writing a Research Abstract. Disclaimer This is mostly opinion. Suggestions are incomplete. There are other strategies. 2.
Term Project Description CAP6135 Spring Term Project Two students form a group to do term project together – A research oriented term project.
Advanced Topics in Computer Networks (Fall 2005) Instructor: Instructor:Dr. Damla Turgut Office: Office:450 ENGR 1 Bldg Office Phone: Office Phone:(407)
Sensor Networks (Spring 2004) Instructor: Instructor:Dr. Damla Turgut Office: Office:450 ENGR 1 Bldg Office Phone: Office Phone:(407)
Final Team Project ITIS 3110 Lab 6.
Advances in Cloud Computing CIS6930/CIS4930
Introduction to Internet Security : Mechanisms, Protocols, Services & Management John K. Zao, PhD SMIEEE Office: EC-527 Telephone: #31470
March 2007 Jimmy(JeongYeop) Yang (KORPA) Slide Doc: IEEE ban 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Action Research GGGE6383 Materials for Teaching & Learning Name: Izyani Binti Mistar Matric No: P73940 Title: The Use of WhatsApp in Language Learning.
Mobile Ad hoc Networks (Spring 2003)
ECE 6397, Fall, 2012 Selected Topic in Optimization
NTC 320 RANK Knowledge is divine-- ntc320rank.com.
NTC 320 RANK Perfect Education/ ntc320rank.com.
Technical Writing Structure, Logic (between sentences and paragraphs), and Strictness (no holes). Know who is your audiences Structure Title and keyword:
Proposal for Term Project Operating Systems, Fall 2018
Presentation and project
Presentation and project
Term Project Description
July 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Merger Proposal #2 Affirmation of Commitment.
STEM Fair Project Student Outline
Discussion on The EHT Timeline and PAR Definition
Presentation transcript:

CSC668 Topics in Computing Project Information and Suggestions

Project information and suggestion One to four people may collaborate on the projects if it is of sufficient scope, and the contributions of each person are clearly delineated. The project includes a presentation of approximately minutes (depending on the scope of work, and the number of people in the team) The term project will include few options 1.Hacking project. Hack into your project team members device. (peer-to-peer) attack. Both/All parties need to be aware of this occurrence. See instructor for instructions if you need any, or come up with your own process a research project related to a topic in the WLAN security area. Some suggested topics are listed in the next slide, but you are by no means limited to these topics. The project can be a literature survey, analysis, and/or simulation. Ideally, the project should include some original research. However deriving a known result from scratch, repeating a simulation experiment, or a literature survey of 2-3 papers is also one.

Some Suggested Project Areas: Susceptibility of WLAN Methods to resolve security issues in WLAN Future of WLAN security. Economic issues for WLAN security Design your own WLAN device ……..

Details and Deadlines A one paragraph project proposal is due by week 2 ( or hard copy is fine). The project proposal should include a fairly detailed description of what you plan to do. Do not propose an overly ambitious project that cannot be completed by the end of the term. The project is deadline is last seminar. However, if you manage to complete and present your work by week 3-6, there will be a credit of 15% added to the total project grade. If presented by week 7-8, 10% will be added, week 9 will add 5% to the total project score. Week 10 will only carry 20%.

Outline Sample Project Abstract Name: Joe Shmoe Proposed Project: To conduct a literature survey to determine the performance of TCP/IP and ATM over wireless networks. The study would also involve a comparison of the two sets of protocols based on how they perform in supporting the different sets of applications that are run on top of them (voice, video, data etc.). A study of how these various classes of applications are treated by these protocols simultaneously (QoS) will also be undertaken. Also, these schemes require the use of a MAC (Medium Access Layer), and the study would look at different MAC layer protocols (such as the IEEE standard) that could be implemented in conjunction with TCP/IP or ATM. The study will consider communications via satellite and ground-based relay systems. The literature survey will be based on information gathered upon reading technical papers from IEEE journal publications.