Inter Process Communication Between Two Servers Using Mpich, 2018 California State University, San Bernardino
Inter Process Communication Between Two Servers Using Mpich, Nagabhavana Narla
Electronic Theses, Projects, and Dissertations
The main aim of the project is to launch multiple processes and have those processes communicate with each other using peer to peer communication to eliminate the problems of multiple processes running on a single server, and multiple processes running on inhomogeneous servers as well as the problems of scalability. This entire process is done using MPICH which is a high performance and portable implementation of Message Passing Interface standard.
The project involves setting up the passwordless authentication between two local servers with the help of SSH connection. By establishing a peer to peer communication and by using a unique ...
Delegation Application, 2018 California Polytechnic State University, San Luis Obispo
Delegation Application, Erik Matthew Phillips
Delegation is a cross-platform application to provide smart task distribution to users. In a team environment, the assignment of tasks can be tedious and difficult for management or for users needing to discover a starting place for where to begin with accomplishing tasks. Within a specific team, members possess individual skills within different areas of the team’s responsibilities and specialties, and certain members will be better suited to tackle specific tasks. This project provides a solution, consisting of a smart cross-platform application that allows for teams and individuals to quickly coordinate and delegate tasks assigned to them.
An Analysis Of Lora Low Power Technology And Its Applications, 2018 Portland State University
An Analysis Of Lora Low Power Technology And Its Applications, Gomathy Venkata Krishnan
Undergraduate Research & Mentoring Program
The number of Internet of Things (IoT) devices has exponentially increased in the last decade. With the increase in these devices, there is a necessity to effectively connect and control these devices remotely. Cellular technologies cannot handle this demand since they are not cost effective and easy to deploy. This is where LoRa technology comes handy. LoRa is long-range, low-power, low cost technology that supports internet of things applications. LoRa has many advantages in terms of capacity, mobility, battery lifetime and cost. It uses the unlicensed 915MHz ISM band and can be easily deployed.
This research is focused on setting ...
Remote Monitoring Of Cherry Wetness Using A Leaf Wetness Sensor And A Wireless Sensor Network, 2018 University of New Orleans
Remote Monitoring Of Cherry Wetness Using A Leaf Wetness Sensor And A Wireless Sensor Network, Shyla Clark
University of New Orleans Theses and Dissertations
To get the best prices, sweet cherry growers must supply blemish-free fruit. Unfortunately, mature cherries have a fragile composition, rendering them susceptible to damage from heat, wind, birds, and rain. Rain is particularly devastating, because cherries split when they absorb too much water. Since rainstorms are common in the otherwise arid regions where most cherries are grown, growers must have a system for quickly deploying rain removal methods. The current industry solution relies on human observation and implementation, which is error-prone and costly. This project proposes an automated cherry wetness system using a Decagon Devices leaf wetness sensor (LWS) and ...
Experiences Building, Training, And Deploying A Chatbot In An Academic Library, 2018 Johnson & Wales University
Experiences Building, Training, And Deploying A Chatbot In An Academic Library, David Meincke
Library Staff Publications
No abstract provided.
Dynamic 3d Network Data Visualization, 2018 University of Arkansas, Fayetteville
Dynamic 3d Network Data Visualization, Brok Stafford
Computer Science and Computer Engineering Undergraduate Honors Theses
Monitoring network traffic has always been an arduous and tedious task because of the complexity and sheer volume of network data that is being consistently generated. In addition, network growth and new technologies are rapidly increasing these levels of complexity and volume. An effective technique in understanding and managing a large dataset, such as network traffic, is data visualization. There are several tools that attempt to turn network traffic into visual stimuli. Many of these do so in 2D space and those that are 3D lack the ability to display network patterns effectively. Existing 3D network visualization tools lack user ...
Building Data Visualization Applications To Facilitate Vehicular Networking Research, 2018 East Tennessee State University
Building Data Visualization Applications To Facilitate Vehicular Networking Research, Noah Carter
Undergraduate Honors Theses
A web app was developed which allows any internet-connected device to remotely monitor a roadway intersection’s state over HTTP. A mapping simulation was enhanced to allow researchers to retroactively track the location and the ad-hoc connectivity of vehicle clusters. A performance analysis was conducted on the utilized network partitioning algorithm. This work was completed under and for the utility of ETSU’s Vehicular Networking Lab. It can serve as a basis for further development in the field of wireless automobile connectivity.
Comparative Study Of Deep Learning Models For Network Intrusion Detection, 2018 Southern Methodist University
Comparative Study Of Deep Learning Models For Network Intrusion Detection, Brian Lee, Sandhya Amaresh, Clifford Green, Daniel Engels
SMU Data Science Review
In this paper, we present a comparative evaluation of deep learning approaches to network intrusion detection. A Network Intrusion Detection System (NIDS) is a critical component of every Internet connected system due to likely attacks from both external and internal sources. A NIDS is used to detect network born attacks such as Denial of Service (DoS) attacks, malware replication, and intruders that are operating within the system. Multiple deep learning approaches have been proposed for intrusion detection systems. We evaluate three models, a vanilla deep neural net (DNN), self-taught learning (STL) approach, and Recurrent Neural Network (RNN) based Long Short ...
Strategic Implications Of Blockchain, 2018 BYU Marriott School
Strategic Implications Of Blockchain, William R. Adams
Undergraduate Honors Theses
This thesis introduces blockchain, the underlying technology of cryptocurrencies such as Bitcoin, and discusses how best to conceptualize it relative to other technologies. Following an explanation of the fundamentals of blockchain, also known as the distributed ledger, I identify the characteristics of the technology. Building upon blockchain’s inherent strengths and limitations, I explore potential business applications of blockchain. Finally, I recommend that leaders continue to track the development and adoption of blockchain technology, even if they decide that implementing it does not align with their organization’s strategy at present.
The E-Agriculture Research Landscape In South Africa: A Systematic Literature Review, 2018 Cape Peninsula University of Technology, Cape Town
The E-Agriculture Research Landscape In South Africa: A Systematic Literature Review, Alain Nzuzi Kintoki
The African Journal of Information Systems
Despite the growing interest in e-agriculture research in South Africa, academic studies have not sufficiently and deeply investigated the current e-agriculture research trends in the South African context. It is unclear how primary e-agriculture research in South Africa will aid both current and future generations to create new and better ways to transform agricultural development using this modern technology. This study sought to determine the current status of e-agriculture research in the South African context. A systematic literature review was used to gather and analyze data. The results indicate that 17 papers (26.5%) were published during the first two ...
Application Of Huffman Data Compression Algorithm In Hashing Computation, 2018 Western Kentucky University
Application Of Huffman Data Compression Algorithm In Hashing Computation, Lakshmi Narasimha Devulapalli Venkata,
Masters Theses & Specialist Projects
Cryptography is the art of protecting information by encrypting the original message into an unreadable format. A cryptographic hash function is a hash function which takes an arbitrary length of the text message as input and converts that text into a fixed length of encrypted characters which is infeasible to invert. The values returned by the hash function are called as the message digest or simply hash values. Because of its versatility, hash functions are used in many applications such as message authentication, digital signatures, and password hashing [Thomsen and Knudsen, 2005].
The purpose of this study is to apply ...
To Relive The Web: A Framework For The Transformation And Archival Replay Of Web Pages, 2018 Old Dominion University
To Relive The Web: A Framework For The Transformation And Archival Replay Of Web Pages, John Andrew Berlin
Computer Science Theses & Dissertations
When replaying an archived web page (known as a memento), the fundamental expectation is that the page should be viewable and function exactly as it did at archival time. However, this expectation requires web archives to modify the page and its embedded resources, so that they no longer reference (link to) the original server(s) they were archived from but back to the archive. Although these modifications necessarily change the state of the representation, it is understood that without them the replay of mementos from the archive would not be possible. Unfortunately, because the replay of mementos and the modifications ...
Automated Man-In-The-Middle Attack Against Wi‑Fi Networks, 2018 Brno University of Technology, Brno, Czech Republic
Automated Man-In-The-Middle Attack Against Wi‑Fi Networks, Martin Vondráček, Jan Pluskal, Ondřej Ryšavý
Journal of Digital Forensics, Security and Law
Currently used wireless communication technologies suffer security weaknesses that can be exploited allowing to eavesdrop or to spoof network communication. In this paper, we present a practical tool that can automate the attack on wireless security. The developed package called wifimitm provides functionality for the automation of MitM attacks in the wireless environment. The package combines several existing tools and attack strategies to bypass the wireless security mechanisms, such as WEP, WPA, and WPS. The presented tool can be integrated into a solution for automated penetration testing. Also, a popularization of the fact that such attacks can be easily automated ...
Patient Centeredness In Electronic Communication: Evaluation Of Patient-To-Health Care Team Secure Messaging, 2018 University of Massachusetts Medical School
Patient Centeredness In Electronic Communication: Evaluation Of Patient-To-Health Care Team Secure Messaging, Timothy P. Hogan, Tana M. Luger, Julie E. Volkman, Mary Rocheleau, Nora Mueller, Anna M. Barker, Kim M. Nazi, Thomas K. Houston, Barbara G. Bokhour
Quantitative Health Sciences Publications and Presentations
BACKGROUND: As information and communication technology is becoming more widely implemented across health care organizations, patient-provider email or asynchronous electronic secure messaging has the potential to support patient-centered communication. Within the medical home model of the Veterans Health Administration (VA), secure messaging is envisioned as a means to enhance access and strengthen the relationships between veterans and their health care team members. However, despite previous studies that have examined the content of electronic messages exchanged between patients and health care providers, less research has focused on the socioemotional aspects of the communication enacted through those messages.
OBJECTIVE: Recognizing the potential ...
Policy-Preferred Paths In As-Level Internet Topology Graphs, 2018 University of Louisiana at Lafayette
Policy-Preferred Paths In As-Level Internet Topology Graphs, Mehmet Engin Tozal
Theory and Applications of Graphs
Using Autonomous System (AS) level Internet topology maps to determine accurate AS-level paths is essential for network diagnostics, performance optimization, security enforcement, business policy management and topology-aware application development. One significant drawback that we have observed in many studies is simplifying the AS-level topology map of the Internet to an undirected graph, and then using the hop distance as a means to find the shortest paths between the ASes. A less significant drawback is restricting the shortest paths to only valley-free paths. Both approaches usually inflate the number of paths between ASes; introduce erroneous paths that do not conform to ...
Keep It Simple, Keep It Safe - Research On The Impacts Of Increasing Complexity Of Modern Enterprise Applications, 2018 University of Nebraska at Omaha
Keep It Simple, Keep It Safe - Research On The Impacts Of Increasing Complexity Of Modern Enterprise Applications, Shawn Ware, David Phillips
Student Research and Creative Activity Fair
As the Cybersecurity program within UNO continues to adapt to the ever-changing world of information systems and information security, the Cybersecurity Capstone has recently become an active, community-involvement project, where real-world organizations can receive valuable, useful research and information from students on their way towards a degree. This presentation encompasses two such projects from the Cybersecurity Capstone, looking at how modern, more complex systems can often increase system vulnerability.
Securing Soft Ips Against Hardware Trojan Insertion, 2018 University of Arkansas, Fayetteville
Securing Soft Ips Against Hardware Trojan Insertion, Thao Phuong Le
Theses and Dissertations
Due to the increasing complexity of hardware designs, third-party hardware Intellectual Property (IP) blocks are often incorporated in order to alleviate the burden on hardware designers. However, the prevalence use of third-party IPs has raised security concerns such as Trojans inserted by attackers. Hardware Trojans in these soft IPs are extremely difficult to detect through functional testing and no single detection methodology has been able to completely address this issue. Based on a Register-Transfer Level (RTL) and gate-level soft IP analysis method named Structural Checking, this dissertation presents a hardware Trojan detection methodology and tool by detailing the implementation of ...
Consuming Digital Debris In The Plasticene, 2018 Virginia Commonwealth University
Consuming Digital Debris In The Plasticene, Stephen R. Parks
Theses and Dissertations
Claims of customization and control by socio-technical industries are altering the role of consumer and producer. These narratives are often misleading attempts to engage consumers with new forms of technology. By addressing capitalist intent, material, and the reproduction limits of 3-D printed objects’, I observe the aspirational promise of becoming a producer of my own belongings through new networks of production. I am interested in gaining a better understanding of the data consumed that perpetuates hyper-consumptive tendencies for new technological apparatuses. My role as a designer focuses on the resolution of not only the surface of the object through 3-D ...
Generating Adversarial Attacks For Sparse Neural Networks, 2018 Portland State University
Generating Adversarial Attacks For Sparse Neural Networks, Jack H. Chen, Walt Woods
Undergraduate Research & Mentoring Program
Neural networks provide state-of-the-art accuracy for image classification tasks. However traditional networks are highly susceptible to imperceivable perturbations to their inputs known as adversarial attacks that drastically change the resulting output. The magnitude of these perturbations can be measured as Mean Squared Error (MSE). We use genetic algorithms to produce black-box adversarial attacks and examine MSE on state-of-the-art networks. This method generates an attack that converts 90% confidence on a correct class to 50% confidence of a targeted, incorrect class after 2000 epochs. We will generate and examine attacks and their MSE against several sparse neural networks. We theorize that ...
User-Friendly Deniable Storage For Mobile Devices, 2018 Chinese Academy of Sciences
User-Friendly Deniable Storage For Mobile Devices, Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang, Wen-Tao Zhu, Yanju Liu, Zhan Wang
Research Collection School Of Information Systems
Mobile devices are prevalently used to process sensitive data, but traditional encryption may not work when an adversary is able to coerce the device owners to disclose the encryption keys. Plausibly Deniable Encryption (PDE) is thus designed to protect sensitive data against this powerful adversary. In this paper, we present MobiPluto, a user-friendly PDE scheme for denying the existence of sensitive data stored on mobile devices. A salient difference between MobiPluto and the existing PDE systems is that any block-based file systems can be deployed on top of it. To further improve usability and deniability of MobiPluto, we introduce a ...