Towards Optimized Traffic Provisioning And Adaptive Cache Management For Content Delivery, 2020 University of Massachusetts Amherst
Towards Optimized Traffic Provisioning And Adaptive Cache Management For Content Delivery, Aditya Sundarrajan
Content delivery networks (CDNs) deploy hundreds of thousands of servers around the world to cache and serve trillions of user requests every day for a diverse set of content such as web pages, videos, software downloads and images. In this dissertation, we propose algorithms to provision traffic across cache servers and manage the content they host to achieve performance objectives such as maximizing the cache hit rate, minimizing the bandwidth cost of the network and minimizing the energy consumption of the servers.
Traffic provisioning is the process of determining the set of content domains hosted on the servers. We propose ...
A Comparative Evaluation Of The Detection And Tracking Capability Between Novel Event-Based And Conventional Frame-Based Sensors, 2020 Air Force Institute of Technology
A Comparative Evaluation Of The Detection And Tracking Capability Between Novel Event-Based And Conventional Frame-Based Sensors, James P. Boettiger
Theses and Dissertations
Traditional frame-based technology continues to suffer from motion blur, low dynamic range, speed limitations and high data storage requirements. Event-based sensors offer a potential solution to these challenges. This research centers around a comparative assessment of frame and event-based object detection and tracking. A basic frame-based algorithm is used to compare against two different event-based algorithms. First event-based pseudo-frames were parsed through standard frame-based algorithms and secondly, target tracks were constructed directly from filtered events. The findings show there is significant value in pursuing the technology further.
Developing A Serious Game To Explore Joint All Domain Command And Control, 2020 Air Force Institute of Technology
Developing A Serious Game To Explore Joint All Domain Command And Control, Nathaniel W. Flack
Theses and Dissertations
Changes in the geopolitical landscape and increasing technological complexity have prompted the U.S. Military to coin Multi-Domain Operations (MDO) and Joint All-Domain Command and Control as terms to describe an over-arching strategy that frames the complexity of warfare across both traditional and emerging warfighting domains. Teaching new and advanced concepts associated with these terms requires both innovation as well as distinct education and training tools in order to realize the cultural change advocated by senior military leaders. BSN, a Collectible Card Game, was developed to teach concepts integral to MDO and initiate discussion on military strategy.
Multi-Channel Security Through Data Fragmentation, 2020 Air Force Institute of Technology
Multi-Channel Security Through Data Fragmentation, Micah J. Hayden
Theses and Dissertations
This thesis presents a novel security system developed for a multi-channel communication architecture, which achieves security by distributing the message and its associated message authentication code across the available channels at the bit level, to support systems that require protection from confidentiality and integrity attacks without relying solely on traditional encryption. One contribution of the work is to establish some helpful terminology, present a basic theory for multi-channel communications, describe the services provided by an optimal system, and then implement a proof of concept system to demonstrate the concept's validity. This proof of concept, focused on the splitting and ...
Sliver: Simulation-Based Logic Bomb Identification/Verification For Unmanned Aerial Vehicles, 2020 Air Force Institute of Technology
Sliver: Simulation-Based Logic Bomb Identification/Verification For Unmanned Aerial Vehicles, Jake M. Magness
Theses and Dissertations
This research introduces SLIVer, a Simulation-based Logic Bomb Identification/Verification methodology, for finding logic bombs hidden within Unmanned Aerial Vehicle (UAV) autopilot code without having access to the device source code. Effectiveness is demonstrated by executing a series of test missions within a high-fidelity software-in-the-loop (SITL) simulator. In the event that a logic bomb is not detected, this methodology defines safe operating areas for UAVs to ensure to a high degree of confidence the UAV operates normally on the defined flight plan. SLIVer uses preplanned flight paths as the baseline input space, greatly reducing the input space that must be ...
Implications And Limitations Of Securing An In Niband Network, 2020 Air Force Institute of Technology
Implications And Limitations Of Securing An In Niband Network, Lucas E. Mireles
Theses and Dissertations
The InfiniBand Architecture is one of the leading network interconnects used in high performance computing, delivering very high bandwidth and low latency. As the popularity of InfiniBand increases, the possibility for new InfiniBand applications arise outside the domain of high performance computing, thereby creating the opportunity for new security risks. In this work, new security questions are considered and addressed. The study demonstrates that many common traffic analyzing tools cannot monitor or capture InfiniBand traffic transmitted between two hosts. Due to the kernel bypass nature of InfiniBand, many host-based network security systems cannot be executed on InfiniBand applications. Those that ...
A Study Of Execution Performance For Rust-Based Object Vs Data Oriented Architectures, 2020 Air Force Institute of Technology
A Study Of Execution Performance For Rust-Based Object Vs Data Oriented Architectures, Joseph A. Vagedes
Theses and Dissertations
To investigate the Data-Oriented Design (DOD) paradigm, in particular, an architecture built off its principles: the Entity-Component-System (ECS). ECS is commonly used by video game engines due to its ability to store data in a way that is optimal for the cache to access. Additionally, the structure of this paradigm produces a code-base that is simple to parallelize as the workload can be distributed across a thread-pool based on the data used with little to no need for data safety measures such as mutexes and locks. A final benefit, although not easily measured, is that the DOD paradigm produces a ...
Qoe-Aware Content Distribution Systems For Adaptive Bitrate Video Streaming, 2020 University of Massachusetts - Amherst
Qoe-Aware Content Distribution Systems For Adaptive Bitrate Video Streaming, Divyashri Bhat
A prodigious increase in video streaming content along with a simultaneous rise in end system capabilities has led to the proliferation of adaptive bit rate video streaming users in the Internet. Today, video streaming services range from Video-on-Demand services like traditional IP TV to more recent technologies such as immersive 3D experiences for live sports events. In order to meet the demands of these services, the multimedia and networking research community continues to strive toward efficiently delivering high quality content across the Internet while also trying to minimize content storage and delivery costs.
The introduction of flexible and adaptable technologies ...
How Data Became Part Of New Orleans’ Dna During The Katrina Recovery, 2020 The Data Center of Southeast Louisiana
How Data Became Part Of New Orleans’ Dna During The Katrina Recovery, Lamar Gardere, Allison Plyer, Denice Ross
New England Journal of Public Policy
Data intermediaries have a symbiotic relationship with government as the source of most of their information. The open-data movement in government and development of software-as-a-service technologies shaped the data landscape after Katrina. Through relationships and talent transfers with The Data Center, the City of New Orleans went from having its chief technology officer in federal prison and its data systems in shambles to being a nationally recognized leader in open and accountable government. To be effective during disasters, an intermediary should be (1) in place and widely respected before the event, (2) ready to respond immediately after the event and ...
Bim For Bridges And Structures Pooled Fund Initiative, Julie Rivera, Connor Christian
Purdue Road School
The BIM for Bridges and Structures initiative, also known as TPF-5(372), is a transportation pooled fund project that is a collaborative effort of 20 states, FHWA, and the AASHTO Committee on Bridges and Structures. The pooled fund objective is to develop an open, national standard for exchanging information necessary for the design, fabrication, and construction of bridges and structures in the United States. The presentation will provide an overview of the project and explain ways in which stakeholders can get involved.
Simultaneous Localization And Mapping Analysis, 2020 Southwestern Oklahoma State University
Simultaneous Localization And Mapping Analysis, Jacob Miller, Kurtis Clark, Jeremy Evert
• Simulate virtual robot for test and analysis
• Analyze SLAM solutions using ROS
• Assemble a functional Turtlebot
• Emphasize projects related to current research trajectories for NASA, and general robotics applications
Robot Simulation Analysis, 2020 Southwestern Oklahoma State University
Robot Simulation Analysis, Kurtis Clark, Jacob Miller, Jeremy Evert
• Build a tutorial targeted to Middle School and High School Students to get ROS running on a Virtual Machine
• Make ROS and it's simulations approachable to middle school and high school students.
Using Supercomputers To Control Multiple Robots, 2020 Southwestern Oklahoma State University
Using Supercomputers To Control Multiple Robots, Andrew Roberts, Jeremy Evert
Supercomputers have been a key enabler to many technological advancements. The pipeline to develop capable supercomputer users is years long. Getting started with a supercomputer can be difficult. As a part of the XSEDE EMPOWER Learner program, this research focuses super-computer user development. SWOSU students do not have working code for many of the training modules available for learning supercomputing. This research details the development of these codes based on materials provided by the Nation-al Science Foundation, Shodor Foundation, and National Center for Supercomputing Applications. The result of this research is a better understand-ing of supercomputing training and more tools ...
Super Education For Supercomputers, 2020 Southwestern Oklahoma State University
Super Education For Supercomputers, Ezgi Gursel, Jeremy Evert
Supercomputing (1 OOX more powerful than a desktop) allows organizations to solve complex problems that are not easily studied in any other way (ex. Blue Waters to simulate the known universe since the beginning of time for the design of the James Webb telescope). Producing qualified individuals to take advantage of the growing number of supercomputing jobs is a constant struggle. This poster provides an overview of education in supercomputing, explains how training occurs, and describes some of the key players working to educate a taskforce to deal with these highly complex machines.
Innovation In Pedagogy And Technology Symposium, 2019: Selected Conference Proceedings, 2020 University of Nebraska - Lincoln
Innovation In Pedagogy And Technology Symposium, 2019: Selected Conference Proceedings, University Of Nebraska Online, University Of Nebraska Information Technology Services
Advancing Technology in Education at the University of Nebraska, May 7, 2019
Welcome Address • Susan Fritz, Ph.D., Executive Vice President and Provost, University of Nebraska 6
Opening Remarks • Mary Niemiec, Associate Vice President for Digital Education, Director of University of Nebraska Online 6
Keynote Presentation: Shaping the Next Generation of Higher Education • Bryan Alexander, Ph.D. 6
Featured Extended Presentation: Redesigning Courses & Determining Effectiveness Through Research • Tanya Joosten, University of Wisconsin-Milwaukee (UWM), Erin Blankenship, Ph.D. (UNL), Ella Burnham (UNL), Nate Eidem, Ph.D. (UNK), Marnie Imhoff (UNMC), Linsey Donner (UNMC), Ellie Miller (UNMC) 7
5 Ways to Utilize ...
W-Gun: Whale Optimization For Energy And Delay-Centric Green Underwater Networks, 2020 Deenbandhu Chhotu Ram University of Science and Technology
W-Gun: Whale Optimization For Energy And Delay-Centric Green Underwater Networks, Rajkumar Singh Rathore, Houbing Song, Suman Sangwan, Sukriti Mazumdar, Omprakash Kaiwartya, Kabita Adhikari, Rupak Kharel
Underwater sensor networks (UWSNs) have witnessed significant R&D attention in both academia and industry due to their growing application domains, such as border security, freight via sea or river, natural petroleum production and the fishing industry. Considering the deep underwater-oriented access constraints, energy-centric communication for the lifetime maximization of tiny sensor nodes in UWSNs is one of the key research themes in this domain. Existing literature on green UWSNs are majorly adapted from the existing techniques in traditional wireless sensor network relying on geolocation and the quality of service-centric underwater relay node selection, without paying much attention to the ...
Room Management Web Application And Movement And Temperature Sensors, 2020 California Polytechnic State University, San Luis Obispo
Room Management Web Application And Movement And Temperature Sensors, Visalbotr Chan, Huy Anh Duong
There are three main parts of this system: micro-controller, database, and website. Micro-controller detects motion of people walking in and out and It also measures room temperature and humidity in a confined space then updates collected data to the database. Our system’s database contains 6 main columns: room number, room capacity, number of students, temperature in Celsius, humidity in percent and date created. Finally, this database is queried by the website to display the information on the webpage. Users could also navigate on our site to check the most and least occupy rooms, and they can also search for ...
Theoretical And Computational Analyses On Transition And Turbulence In Purely Oscillating Pipe Flow, 2020 Embry-Riddle Aeronautical University
Theoretical And Computational Analyses On Transition And Turbulence In Purely Oscillating Pipe Flow, Ali Ahmed Abdulrasool
Dissertations and Theses
The hydrodynamic instability of purely oscillating pipe flows is investigated in terms of the quasi-steady formulation assuming the temporal changes of the laminar base flow relative to disturbances are slow. A simple model equation is introduced to compare the exact solution of the current approach with those of the major theories dedicated for unsteady flows. The results of the analysis show that the quasi-steady assumption and the multiple scales method are more efficient and accurate than the formal Floquet theory in predicting the transient instabilities within a period in addition to the long-term growth or decay of disturbances. The most ...
A New Ectotherm 3d Tracking And Behavior Analytics System Using A Depth-Based Approach With Color Validation, With Preliminary Data On Kihansi Spray Toad (Nectophrynoides Asperginis) Activity, 2020 Fordham University
A New Ectotherm 3d Tracking And Behavior Analytics System Using A Depth-Based Approach With Color Validation, With Preliminary Data On Kihansi Spray Toad (Nectophrynoides Asperginis) Activity, Philip Bal, Damian Lyons, Avishai Shuter
The Kihansi spray toad (Nectophrynoides asperginis), classified as Extinct in the Wild by the IUCN, is being bred at the Wildlife Conservation Society’s (WCS) Bronx Zoo as part of an effort to successfully reintroduce the species into the wild. Thousands of toads live at the Bronx Zoo presenting an opportunity to learn more about their behaviors for the first time, at scale. It is impractical to perform manual observations for long periods of time. This paper reports on the development of a RGB-D tracking and analytics approach that allows researchers to accurately and efficiently gather information about the toads ...
Artificial Intelligence Ethics: Governance Through Social Media, 2020 U.S. Army CCDC-AC
Artificial Intelligence Ethics: Governance Through Social Media, Ross Arnold, Jorge Buenfil, Benjamin Abruzzo, Christopher Korpela
West Point Research Papers
A proposal is presented to facilitate machine self-learning of ethical behavior via human-curated training using online human behavioral data such as that found on social media and related sites. The proposed training data set is a mixture of human behavioral data found on social media and related sites that exhibit a wide variety of both ethical and unethical behavior which can help an artificially intelligent machine make ethical decisions during the process of solving real-world problems. The rapid proliferation of artificial intelligence (AI) applications worldwide highlights the need for normativity to protect individual rights, such as privacy, and the promotion ...