Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

Utah State University

Theses/Dissertations

Model

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

A Model For Bioaugmented Anaerobic Granule, Amitesh Mahajan May 2018

A Model For Bioaugmented Anaerobic Granule, Amitesh Mahajan

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

In this study, we have created a simulation model which is concerned about digesting cellulose, as a major component of microalgae in a bioreactor. This model is designed to generate a computational model that simulates the process of granulation in anaerobic sludge and aims to investigate scenarios of possible granular bioaugmentation. Once a mature granule is formed, protein is used as an alternative substrate that will be supplied to a mature granule. Protein, being a main component of cyanobacteria, will promote growth and incorporation of a cell type that can degrade protein (selective pressure). The model developed in a cDynoMiCs …


A Novel Authentication And Validation Mechanism For Analyzing Syslogs Forensically, Steena D.S. Monteiro Dec 2008

A Novel Authentication And Validation Mechanism For Analyzing Syslogs Forensically, Steena D.S. Monteiro

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

This research proposes a novel technique for authenticating and validating syslogs for forensic analysis. This technique uses a modification of the Needham Schroeder protocol, which uses nonces (numbers used only once) and public keys. Syslogs, which were developed from an event-logging perspective and not from an evidence-sustaining one, are system treasure maps that chart out and pinpoint attacks and attack attempts. Over the past few years, research on securing syslogs has yielded enhanced syslog protocols that focus on tamper prevention and detection. However, many of these protocols, though efficient from a security perspective, are inadequate when forensics comes into play. …