Time filter

Source Type

Utica, NY, United States

The State University of New York Polytechnic Institute, commonly referred to as SUNY Polytechnic Institute or SUNY Poly, is a public research university with campuses in the town of Marcy in the Utica-Rome metropolitan area and Albany, New York. Founded in 1966 using classrooms at a primary school, SUNY Poly is New York's public polytechnic college. The Marcy campus, formerly the SUNY Institute of Technology, is located just north of Utica, New York and was established in 1987. The Albany campus was formerly a component of the University at Albany, established in January 2003.SUNY Poly is accredited by the Middle States Association of Colleges and Schools. The university offers over 30 bachelor's and associates' degrees, 15 master's degrees, and three doctoral degrees within five different colleges. SUNY Poly students come from across the state of New York, throughout the United States, and more than twenty other nations. More than 25,000 alumni enjoy successful careers in a wide range of fields. Wikipedia.

Abdallah M.,State University of New York Institute of Technology
Proceedings of the IEEE Annual Northeast Bioengineering Conference, NEBEC | Year: 2013

Embedded systems are becoming extremely important technology in biomedical applications such as automatic clinical analysis and patient monitoring. The proposed device will benefit multilevel end users from collaborative medical diagnostic teams, to the patient private use at home. In this research, for heterogeneous multi-channel human body signals, different sampling rates are identified for each channel, and optimized for best data quality with minimal storage requirement. Performance evaluations show that the speed of the proposed Scheduler-on-Chip (SchoC) is 24% faster than a comparable software-based scheduler. The proposed SchoC reduces the amount of data being acquired by up to 59%, which in turn decreases memory requirements. © 2013 IEEE. Source

Thamilarasu G.,State University of New York Institute of Technology | Mishra S.,Rochester Institute of Technology | Sridhar R.,State University of New York at Buffalo
International Journal of Communication Networks and Information Security | Year: 2011

Defense against denial of service (DoS) attacks is a critical component of any security system as these attacks can affect the availability of a node or an entire network. In this work, we focus on jamming type DoS attacks at the physical and MAC layers in 802.11 based ad hoc networks. Collisions in wireless networks occur due to varying factors such as jamming attacks, hidden terminal interferences and network congestion. We present a probabilistic analysis to show that collision occurrence alone cannot be used to conclusively determine jamming attacks in wireless channel. To increase the reliability of attack detection, it is necessary to provide enhanced detection mechanisms that can determine the actual cause of channel collisions. To address this, we first investigate the problem of diagnosing the presence of jamming in ad hoc networks. We then evaluate the detection mechanism using cross-layer information obtained from physical and link layers to differentiate between jamming and congested network scenarios. By correlating the cross-layer data with collision detection metrics, we can distinguish attack scenarios from the impact of traffic load on network behavior. Through simulation results we demonstrate the effectiveness of our scheme in detecting jamming with improved precision. Source

Bull R.,State University of New York Institute of Technology
SIGITE 2013 - Proceedings of the 2013 ACM SIGITE Annual Conference on Information Technology Education | Year: 2013

Due to a recent surge of student interest in the field of Voice over IP (VoIP) communications, new and innovative methods were required to be employed in order to keep pace with the increasing enrollment in the Voice Communications course offered at the State University of New York Institute of Technology. The traditional Voice Communications laboratory setup was obsolete and created a bottleneck hindering the students' capability to learn due to increasing class sizes. Under the previous setting, students were required to work in large groups on two shared servers in order to gain hands-on experience. This inevitably caused students to receive unequal portions of hands-on time with the allocated resources. To remedy the aforementioned issues, a centralized virtualization approach was proposed and implemented. © 2013 ACM. Source

Thamilarasu G.,State University of New York Institute of Technology | Sridhar R.,State University of New York at Buffalo
Security and Communication Networks | Year: 2012

The objective of jamming attacks in a network is to deny service to the communicating nodes, thus reducing network throughput and availability. In this paper, we propose a game theoretic framework for detecting jamming attacks in wireless ad hoc networks. We formulate jamming as a two-player, non-cooperative game to analyze the interaction between the attacker and the monitoring nodes in the network. We propose hybrid detection strategies at the monitor node by using cross-layer features for attack detection. We solve the game by computing the mixed-strategy Nash equilibrium and derive the optimal attack and detection strategies. Numerical results show that game theoretic analysis can be used to determine the optimal steady-state monitoring strategies to provide higher detection accuracy, while balancing the monitoring energy costs. © 2012 John Wiley & Sons, Ltd. Source

Fariborz A.H.,State University of New York Institute of Technology
International Journal of Modern Physics A | Year: 2011

A procedure for implementation of the generating equations in the linear sigma model of low energy QCD is presented. For any explicit symmetry breaking term, this procedure computes the masses of scalar and pseudoscalar mesons as well as various three-point and four-point interaction vertices that are needed in calculation of different decay widths and scattering amplitudes. © 2011 World Scientific Publishing Company. Source

Discover hidden collaborations