Understanding The Methods Behind Cyber Terrorism, 2015 SelectedWorks
Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson
Cyber security has become a matter of national, international, economic, and societal importance that affects multiple nations (Walker, 2012). Since the 1990s users have exploited vulnerabilities to gain access to networks for malicious purposes. In recent years the number of attacks on U.S. networks has continued to grow at an exponential rate. This includes malicious embedded code, exploitation of backdoors, and more. These attacks can be initiated from anywhere in the world from behind a computer with a masked Internet Protocol (IP) address. This type of warfare, cyber warfare, changes the landscape of war itself (Beidleman, 2009). This type ...
Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim
As organizations must continually drive down costs of software-driven projects, they need to evaluate the Systems Development Life Cycle (SDLC) and other software-based design methodologies. These methodologies include looking at software-based alternatives that could save a significant amount of money by reducing the amount of proprietary software. This chapter explores the use and integration of Open Source Software (OSS) in software-driven projects to include in enterprise organizations. Additionally, the legalities of the GNU General Public License (GPL), Lesser General Public License (LGPL), Berkeley Software Distribution (BSD), and Creative Commons are explored with the integration of these OSS solutions into organizations ...
Resource Management In Enterprise Cluster And Storage Systems, 2015 Northeastern University
Resource Management In Enterprise Cluster And Storage Systems, Jianzhe Tai
Computer Engineering Dissertations
In this thesis, we present our works on resource management in large scale systems, especially for enterprise cluster and storage systems. Large-scale cluster systems become quite popular among a community of users by offering a variety of resources. Such systems require complex resource management schemes for multi-objective optimizations and should be specific to different system requirements. In addition, burstiness has often been found in enterprise workloads, being a key factor in performance degradation. Therefore, it is an extremely challenging problem of managing heterogeneous resources (e.g., computing, networking and storage) for such a large scale system under bursty conditions while ...
High-Performance Power-Efficient Solutions For Embedded Vision Computing, 2015 Northeastern University
High-Performance Power-Efficient Solutions For Embedded Vision Computing, Hamed Tabkhivayghan
Computer Engineering Dissertations
Embedded vision is a top tier, rapidly growing market with a host of challenges and conflicting requirements. Complex algorithms can pose immense computation ( > 50GOPs) and communication ( > 8GB/s) demands, especially considering adaptive vision algorithms (which employ machine learning techniques and concurrently update a scene model). Yet at the same time, their embedded deployment demands low power operation consuming only a few Watts. Multiprocessor System-on-Chips (MPSoCs) have emerged as one main architecture approach to improve power efficiency while increasing computational performance. Still, current vision MPSoCs either shy away from supporting adaptive vision algorithms or operate at very limited resolutions due to ...
The Visit-Data Warehouse: Enabling Novel Secondary Use Of Health Information Exchange Data, William Fleischman, Tina Lowry, Jason Shapiro
eGEMs (Generating Evidence & Methods to improve patient outcomes)
Introduction/Objectives: Health Information Exchange (HIE) efforts face challenges with data quality and performance, and this becomes especially problematic when data is leveraged for uses beyond primary clinical use. We describe a secondary data infrastructure focusing on patient-encounter, nonclinical data that was built on top of a functioning HIE platform to support novel secondary data uses and prevent potentially negative impacts these uses might have otherwise had on HIE system performance.
Background: HIE efforts have generally formed for the primary clinical use of individual clinical providers searching for data on individual patients under their care, but many secondary uses have ...
Requirement-Guided Model Refinement, 2014 University of Pennsylvania
Requirement-Guided Model Refinement, Zhihao Jiang, Pieter Mosterman, Rahul Mangharam
Real-Time and Embedded Systems Lab (mLAB)
Medical device is a typical Cyber-Physical System and ensuring the safety and efficacy of the device requires closed-loop verification. Currently closed-loop verifications of medical devices are performed in the form of clinical trials in which the devices are tested on the patients.
A Comparative Study Of Generalized Arc-Consistency Algorithms, 2014 University of Nebraska - Lincoln
A Comparative Study Of Generalized Arc-Consistency Algorithms, Olufikayo S. Adetunji
Computer Science and Engineering: Theses, Dissertations, and Student Research
In this thesis, we study several algorithms for enforcing Generalized Arc-Consistency (GAC), which is the most popular consistency property for solving Constraint Satisfaction Problems (CSPs) with backtrack search. The popularity of such algorithms stems from their relative low cost and effectiveness in improving the performance of search. Virtually all commercial and public- domain constraint solvers include some implementation of a generic GAC algorithm. In recent years, several algorithms for enforcing GAC have been proposed in the literature that relies on increasingly complex data structures and mechanisms to improve performance. In this thesis, we study, assess, and compare a basic ...
Data Transport System, 2014 Washington University in St. Louis
Data Transport System, Rahav Dor
All Computer Science and Engineering Research
To facilitate the WU Smart Home research  we built a system that collects data from sensors and uploads the data to the cloud. The system supports data collection from multiple locations (typically apartments) that are independent from each other, endowing the system with two benefit: distributed data collection and alleviating privacy concerns. Each location is managed by a local micro-server (μServer) that is responsible for receiving data packets from sensors and managing their transient storage. Periodically the μServer triggers a data transport process that moves the data to a cloud server where it is stored in a centralized database ...
Badge Web Application, 2014 California Polytechnic State University
Badge Web Application, Ryan Green
This project includes the imagining, design, build, and test of a web application that creates and tracks a user’s progress on completing tasks that an administrator has created for the user. The goal of this project is to have a functioning webpage that is robust and scalable to support many users and many tasks. The application will be developed for use on all modern web browsers, and will have a persistent server to access from any platform. This project was designed to be an exercise in building a modern web application, and as such is written using many different ...
Fresh Bytes - Connected Hydroponics For Small-Scale Growing, 2014 California Polytechnic State University
Fresh Bytes - Connected Hydroponics For Small-Scale Growing, Jack Bowen
Liberal Arts and Engineering Studies
Many users are now transitioning to small-scale hydroponics and aquaponics at home. There can be a barrier to entry with these systems as there is a delicate balance of chemicals, pH, etc. that must be maintained. There are sensors for these various components but they are either aimed at commercial production or are un-automated. Fresh Bytes is a microcomputer with sensors to detect all of these unseen components in a hydroponic system. A prototype of this microcomputer is produced along with CAD plans for more professional versions of it. The sensors are verified and future development is contemplated.
Quickbooks Self-Employed Ios Application, 2014 California Polytechnic State University
Quickbooks Self-Employed Ios Application, Braden Young
No abstract provided.
Rapdb: The Rapid Social Application Deployment Service, 2014 California Polytechnic State University
Rapdb: The Rapid Social Application Deployment Service, Lance Tyler, Matthew Morris
No abstract provided.
Wirelessly Controlled Smart Outlet, 2014 California Polytechnic State University
Wirelessly Controlled Smart Outlet, Andrew Godsil, Ariel Dubinsky
Popularity of home automation devices has increased greatly in recent years due to higher affordability and simplicity through smartphone and tablet connectivity. For the purpose of this experiment, we have developed the Smart Outlet: a stand-alone communication unit, used to connect home outlets to the internet. The Smart Outlet controls lighting and simple appliances throughout the home, remotely, using wireless commands from the web. A Google Calendar interface directly controls the outlets’ function by scheduling them with dedicated calendar events. The calendar’s interface can even be accessed from multiple different platforms (i.e. phones, computers, tablets) for the convenience ...
Exploring User-Provided Connectivity, 2014 Washington University in St. Louis
Exploring User-Provided Connectivity, Mohammad H. Afrasiabi, Roch Guerin
All Computer Science and Engineering Research
Network services often exhibit positive and negative externalities that affect users' adoption decisions. One such service is "user-provided connectivity" or UPC. The service offers an alternative to traditional infrastructure-based communication services by allowing users to share their "home base" connectivity with other users, thereby increasing their access to connectivity. More users mean more connectivity alternatives, i.e., a positive externality, but also greater odds of having to share one's own connectivity, i.e., a negative externality. The tug of war between positive and negative externalities together with the fact that they often depend not just on how many but ...
A Collaborative Access Control Model For Shared Items In Online Social Networks, 2014 Western University
A Collaborative Access Control Model For Shared Items In Online Social Networks, Hanaa Al Shareef
University of Western Ontario - Electronic Thesis and Dissertation Repository
Introduction To Web Technology With Dreamweaver, 2014 SelectedWorks
Introduction To Web Technology With Dreamweaver, Abegunde Oluwatosin Daniel
Abegunde oluwatosin daniel
HTML is a MARKUP language Using HTML tags and elements, we can: Control the appearance of the page and the content Publish online documents and retrieve online information using the links inserted in the HTML document Create on-line forms. These forms can be used to collect information about the user, conduct transactions, and so on
Introduction To Anti-Collision Algorithms And Estimation Methods In Rfid Systems, 2014 SelectedWorks
Introduction To Anti-Collision Algorithms And Estimation Methods In Rfid Systems, Masoud Shakiba
The main objective of Radio Frequency Identification (RFID) systems is to provide fast identification for tagged objects. The noteworthy advantage of RFID technology, is its capability to identify objects simultaneously. However, when radio frequency signals are emitted simultaneously, there is a probability of collision occurrence, and thereby resulting in a waste of resources. Collision is a time-consuming event that reduces the performance of RFID systems. Consequently, several anti-collision algorithms have been proposed in the literature, attempt to decrease the collision occurrence probability. In almost all the existing anti-collision algorithms, a prior knowledge of the number of tags has a significant ...
Instructions-Based Detection Of Sophisticated Obfuscation And Packing, 2014 Syracuse University
Instructions-Based Detection Of Sophisticated Obfuscation And Packing, Moustafa Saleh, Edward Paul Ratazzi, Shouhuai Xu
Electrical Engineering and Computer Science
Every day thousands of malware are released online. The vast majority of these malware employ some kind of obfuscation ranging from simple XOR encryption, to more sophisticated anti-analysis, packing and encryption techniques. Dynamic analysis methods can unpack the file and reveal its hidden code. However, these methods are very time consuming when compared to static analysis. Moreover, considering the large amount of new malware being produced daily, it is not practical to solely depend on dynamic analysis methods. Therefore, finding an effective way to filter the samples and delegate only obfuscated and suspicious ones to more rigorous tests would significantly ...
L2er: Low-Latency And Energy-Based Routing Protocol For Cognitive Radio Ad Hoc Networks, Rana Asif Rehman
Rana Asif Rehman
Cognitive radio ad hoc networks (CRAHNs) are active, self-organized, and dynamic networks, in which cognitive users can communicate with each other in an ad hoc fashion. Various delay and energy-based routing protocols have been proposed for CRAHNs. However, these protocols do not consider the delay and node energy in the routing process, which can significantly affect performance. Delay and node energy are important factors in ad hoc networks in which devices have limited power. In this paper, we propose a new routing protocol, named low-latency and energy-based routing (L2ER) protocol; it considers both delay and energy for the routing decisions ...
An Autonomous Robotic Indoor Environment Surveillance System, 2014 Cleveland State University
An Autonomous Robotic Indoor Environment Surveillance System, Andrew Gunnerson, Bogdan Olar, Haodong Wang
Undergraduate Research Posters 2014
We developed an autonomous mobile robot platform capable of following a path and gather environmental data, including temperature, humidity, light intensity, etc. The robot is capable of detecting the path using its camera and correct most navigational errors, while the sensors support a limited set of instructions regarding which sensor data to collect and how often. Our experiment consisted of having the robot follow a looped path we set up in BU004 Lab. The robot was able to complete the loop and gather sensor data for light intensity, humidity and temperature at a frequency of once per second, and also ...