Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 26 of 26

Full-Text Articles in Engineering

Windows Server 2012, Fisnik Gojani Dec 2017

Windows Server 2012, Fisnik Gojani

Theses and Dissertations

Windows Server 2012 R2 ka mbi 300 funksione të reja dhe është sistemi i parë i Microsoft Server që ka lidhje me cloud.

Windows Server 2012 paraqet një bollëk të veçorive të reja për të adresuar nevojat e evolucionit të një infrastrukture moderne IT dhe fuqisë punëtore. Bërthama e kësaj përvoje është nevoja për të shkallëzuar, virtualizuar dhe zhvendosur ngarkesat e punës, aplikacionet dhe shërbimet për cloud. Windows Server 2012 përfshin një përvojë te ndërtimit, administrimit dhe funksionimit të cloud private dhe publike, të gjitha të bazuara në Windows Server.

Windows Server 2012 siguron sigurinë e të dhënave të gjeneratës …


Managed Containers For Increased Cyber-Resilience, Xavier J. Merino Aguilera Dec 2017

Managed Containers For Increased Cyber-Resilience, Xavier J. Merino Aguilera

Theses and Dissertations

Traditional defense mechanisms are no longer adequate in protecting critical infrastructure and mission critical systems. These systems require to be always-on-always-connected. High availability and data integrity become crucial to deliver their mission. Unable to guarantee uncompromisable security and given that systems will inevitably be attacked, we must change our goals to guarantee mission survivability, the ability of the system to fight through the attack. Previous work has been done to increase availability and integrity using virtual machines. We move away from virtual machines towards Linux containers and implement resiliency strategies to guarantee stateful system recovery after an attack. The goal …


A Location-Aware Middleware Framework For Collaborative Visual Information Discovery And Retrieval, Andrew J.M. Compton Sep 2017

A Location-Aware Middleware Framework For Collaborative Visual Information Discovery And Retrieval, Andrew J.M. Compton

Theses and Dissertations

This work addresses the problem of scalable location-aware distributed indexing to enable the leveraging of collaborative effort for the construction and maintenance of world-scale visual maps and models which could support numerous activities including navigation, visual localization, persistent surveillance, structure from motion, and hazard or disaster detection. Current distributed approaches to mapping and modeling fail to incorporate global geospatial addressing and are limited in their functionality to customize search. Our solution is a peer-to-peer middleware framework based on XOR distance routing which employs a Hilbert Space curve addressing scheme in a novel distributed geographic index. This allows for a universal …


The Impact Of Different Propagation Environments On The Performance Of Wireless Sensor Networks, Abdallah Mubark Aldosary May 2017

The Impact Of Different Propagation Environments On The Performance Of Wireless Sensor Networks, Abdallah Mubark Aldosary

Theses and Dissertations

This dissertation presents a methodology for evaluating the performance of wireless sensor network (WSN) protocols in different propagation environments. To create this methodology, practical RF propagation models that include many of the substantial features of different propagation environments are utilized, and radio energy models for different propagation environments are developed. Accurate environment-specific radio frequency (RF) propagation models should be utilized in order to improve the overall process of decision-making during pre-deployment of WSNs, to facilitate the deployment of the WSN, and to enhance the battery efficiency of sensing nodes so that the network lifetime can be prolonged. The investigating of …


Optimization Framework For Deployment Of Wireless Sensor Networks, Tajudeen Olawale Olasupo May 2017

Optimization Framework For Deployment Of Wireless Sensor Networks, Tajudeen Olawale Olasupo

Theses and Dissertations

In order to tackle the problem of network connectivity and sensing coverage in random placement of sensor nodes over an area of interest, this research presents an optimization and visualization framework for characterization and prediction of optimal deployments of large-scale wireless sensor networks (WSNs). This study presents efficient image processing algorithms for classification of deployment terrain in order to optimize deployment and connectivity coverage with required minimum number of nodes and transmission power. It reports formation of efficient models for WSN signal propagation under different terrain conditions. The study describes the developmental approach of the WSN optimization framework and visualization …


Repeatability Of Reference Signal Received Power Measurements In Lte Networks, Hayder A Abdulrasool Khzaali May 2017

Repeatability Of Reference Signal Received Power Measurements In Lte Networks, Hayder A Abdulrasool Khzaali

Theses and Dissertations

No abstract provided.


Framework For Industrial Control System Honeypot Network Traffic Generation, Htein A. Lin Mar 2017

Framework For Industrial Control System Honeypot Network Traffic Generation, Htein A. Lin

Theses and Dissertations

Defending critical infrastructure assets is an important but extremely difficult and expensive task. Historically, decoys have been used very effectively to distract attackers and in some cases convince an attacker to reveal their attack strategy. Several researchers have proposed the use of honeypots to protect programmable logic controllers, specifically those used to support critical infrastructure. However, most of these honeypot designs are static systems that wait for a would-be attacker. To be effective, honeypot decoys need to be as realistic as possible. This paper introduces a proof-of-concept honeypot network traffic generator that mimics genuine control systems. Experiments are conducted using …


Development Of The Architecture Cost Effectiveness Framework And Application To Open Systems Architectures, Donald A. Barrett Mar 2017

Development Of The Architecture Cost Effectiveness Framework And Application To Open Systems Architectures, Donald A. Barrett

Theses and Dissertations

The Modular Open System Approach (MOSA) is an initiative to, among other things, reduce cost and schedule for acquisitions programs. While programs have experienced savings using MOSA, the majority of programs have not, in part due to a lack of a logical method for evaluating architecture alternatives. This research develops the Architecture Cost Effectiveness Framework (ACEF), which combines multi-attribute utility analysis with cost effectiveness analysis throughout the program lifecycle. Step 1 is the establishment of a business strategy that includes an Attribute Hierarchy of selected operational requirements. The business strategy also defines Lifecycle Utility Reference Profiles (LURPs) that document changing …


A Framework For Categorization Of Industrial Control System Cyber Training Environments, Evan G. Plumley Mar 2017

A Framework For Categorization Of Industrial Control System Cyber Training Environments, Evan G. Plumley

Theses and Dissertations

First responders and professionals in hazardous occupations undergo training and evaluations for the purpose of mitigating risk and damage. For example, helicopter pilots train with multiple categorized simulations that increase in complexity before flying a real aircraft. However in the industrial control cyber incident response domain, where incident response professionals help detect, respond and recover from cyber incidents, no official categorization of training environments exist. To address this gap, this thesis provides a categorization of industrial control training environments based on realism. Four levels of environments are proposed and mapped to Blooms Taxonomy. This categorization will help organizations determine which …


Autoprov: An Automated File Provenance Collection Tool, Ryan A. Good Mar 2017

Autoprov: An Automated File Provenance Collection Tool, Ryan A. Good

Theses and Dissertations

A file's provenance is a detailing of its origins and activities. There are tools available that are useful in maintaining the provenance of a file. Unfortunately for digital forensics, these tools require prior installation on the computer of interest while provenance generating events happen. The presented tool addresses this by reconstructing a file's provenance from several temporal artifacts. It identifies relevant temporal and user correlations between these artifacts, and presents them to the user. A variety of predefined use cases and real world data are tested against to demonstrate that this software allows examiners to draw useful conclusions about the …


Active Response Using Host-Based Intrusion Detection System And Software-Defined Networking, Jonathon S. Goodgion Mar 2017

Active Response Using Host-Based Intrusion Detection System And Software-Defined Networking, Jonathon S. Goodgion

Theses and Dissertations

This research proposes AHNSR: Active Host-based Network Security Response by utilizing Host-based Intrusion Detection Systems (HIDS) with Software-Defined Networking (SDN) to enhance system security by allowing dynamic active response and reconstruction from a global network topology perspective. Responses include traffic redirection, host quarantining, filtering, and more. A testable SDN-controlled network is constructed with multiple hosts, OpenFlow enabled switches, and a Floodlight controller, all linked to a custom, novel interface for the Open-Source SECurity (OSSEC) HIDS framework. OSSEC is implemented in a server-agent architecture, allowing scalability and OS independence. System effectiveness is evaluated against the following factors: alert density and a …


Small Fixed-Wing Aerial Positioning Using Inter-Vehicle Ranging Combined With Visual Odometry, Benjamin M. Fain Mar 2017

Small Fixed-Wing Aerial Positioning Using Inter-Vehicle Ranging Combined With Visual Odometry, Benjamin M. Fain

Theses and Dissertations

There has been increasing interest in developing the ability for small unmanned aerial systems (SUAS) to be able to operate in environments where GPS is not available. This research considers the case of a larger aircraft loitering above a smaller GPS-denied SUAS. This larger aircraft is assumed to have greater resources which can overcome the GPS jamming and provide range information to the SUAS flying a mission below. This research demonstrates that using a ranging update combined with an aircraft motion model and visual odometry can greatly improve the accuracy of a SUASs estimated position in a GPS-denied environment.


Applying Cyber Threat Intelligence To Industrial Control Systems, Matthew P. Sibiga Mar 2017

Applying Cyber Threat Intelligence To Industrial Control Systems, Matthew P. Sibiga

Theses and Dissertations

A cybersecurity initiative known as cyber threat intelligence (CTI) has recently been developed and deployed. The overall goal of this new technology is to help protect network infrastructures. Threat intelligence platforms (TIPs) have also been created to help facilitate CTI effectiveness within organizations. There are many benefits that both can achieve within the information technology (IT) sector. The industrial control system (ICS) sector can also benefit from these technologies as most ICS networks are connected to IT networks. CTI and TIPs become resourceful when using indicators of compromise (IOCs) from known ICS malware attacks and an open source intrusion detection …


A Framework For Understanding, Prioritizing, And Applying Systems Security Engineering Processes, Activities, And Tasks, Stephen Khou Mar 2017

A Framework For Understanding, Prioritizing, And Applying Systems Security Engineering Processes, Activities, And Tasks, Stephen Khou

Theses and Dissertations

Current systems security practices lack an effective approach to prioritize and tailor systems security efforts to develop and field secure systems in challenging operational environments, which results in business and mission stakeholders becoming more susceptible to an array of disruptive events. This work informs Systems Engineers on recent developments in the field of system security engineering and provides a framework for more fully understanding the application of Systems Security Engineering (SSE) processes, activities, and tasks as described in the recently released National Institute of Standards and Technology (NIST) Special Publication 800-160. This SSE framework uniquely offers a repeatable and tailorable …


Mobile Application For Shipping Goods For Individuals And Truckers In India, Sendurr Selvaraj Jan 2017

Mobile Application For Shipping Goods For Individuals And Truckers In India, Sendurr Selvaraj

Theses and Dissertations

India is a vast country with majority of its cities and towns connected through roads. Road transportation contributes to 86% share of the freight transport of the country with trucking companies dominating the entire space. With growing economy and demands raising, the quality of service of the trucking company remains poor. The major reasons are unorganized practice and lack of transparency. Moreover, limited access for customers to reach out to truckers to transport their goods.

This thesis aims to create a platform for customers and truckers to realize their needs with a help of a mobile application. Customers can search …


Omni-Directional Infrared 3d Reconstruction And Tracking Of Human Targets, Emrah Benli Jan 2017

Omni-Directional Infrared 3d Reconstruction And Tracking Of Human Targets, Emrah Benli

Theses and Dissertations

Omni-directional (O-D) infrared (IR) vision is an effective capability for mobile systems in robotics, due to its advantages: illumination invariance, wide field-of-view, ease of identifying heat-emitting objects, and long term tracking without interruption. Unfortunately, O-D IR sensors have low resolution, low frame rates, high cost, sensor noise, and an increase in tracking time. In order to overcome these disadvantages, we propose an autonomous system application in indoor scenarios including 1) Dynamic 3D Reconstruction (D3DR) of the target view in real time images, 2) Human Behavior-based Target Tracking from O-D thermal images, 3) Thermal Multisensor Fusion (TMF), and 4) Visual Perception …


Underwater Cave Mapping And Reconstruction Using Stereo Vision, Nicholas Weidner Jan 2017

Underwater Cave Mapping And Reconstruction Using Stereo Vision, Nicholas Weidner

Theses and Dissertations

This work presents a systematic approach for 3-D mapping and reconstruction of underwater caves. Exploration of underwater caves is very important for furthering our understanding of hydrogeology, managing efficiently water resources, and advancing our knowledge in marine archaeology. Underwater cave exploration by human divers however, is a tedious, labor intensive, extremely dangerous operation, and requires highly skilled people. As such, it is an excellent fit for robotic technology. The proposed solution employs a stereo camera and a video-light. The approach utilizes the intersection of the cone of video-light with the cave boundaries resulting in the construction of a wire frame …


A Machine Learning Approach For Enhancing Security And Quality Of Service Of Optical Burst Switching Networks, Adel Dabash A. Rajab Jan 2017

A Machine Learning Approach For Enhancing Security And Quality Of Service Of Optical Burst Switching Networks, Adel Dabash A. Rajab

Theses and Dissertations

The Optical Bust Switching (OBS) network has become one of the most promising switching technologies for building the next-generation of internet backbone infrastructure. However, OBS networks still face a number of security and Quality of Service (QoS) challenges, particularly from Burst Header Packet (BHP) flooding attacks. In OBS, a core switch handles requests, reserving one of the unoccupied channels for incoming data bursts (DB) through BHP. An attacker can exploit this fact and send malicious BHP without the corresponding DB. If unresolved, threats such as BHP flooding attacks can result in low bandwidth utilization, limited network performance, high burst loss …


Towards Design And Analysis For High-Performance And Reliable Ssds, Qianbin Xia Jan 2017

Towards Design And Analysis For High-Performance And Reliable Ssds, Qianbin Xia

Theses and Dissertations

NAND Flash-based Solid State Disks have many attractive technical merits, such as low power consumption, light weight, shock resistance, sustainability of hotter operation regimes, and extraordinarily high performance for random read access, which makes SSDs immensely popular and be widely employed in different types of environments including portable devices, personal computers, large data centers, and distributed data systems.

However, current SSDs still suffer from several critical inherent limitations, such as the inability of in-place-update, asymmetric read and write performance, slow garbage collection processes, limited endurance, and degraded write performance with the adoption of MLC and TLC techniques. To alleviate these …


Improving The Performance And Time-Predictability Of Gpus, Yijie Huangfu Jan 2017

Improving The Performance And Time-Predictability Of Gpus, Yijie Huangfu

Theses and Dissertations

Graphic Processing Units (GPUs) are originally mainly designed to accelerate graphic applications. Now the capability of GPUs to accelerate applications that can be parallelized into a massive number of threads makes GPUs the ideal accelerator for boosting the performance of such kind of general-purpose applications. Meanwhile it is also very promising to apply GPUs to embedded and real-time applications as well, where high throughput and intensive computation are also needed.

However, due to the different architecture and programming model of GPUs, how to fully utilize the advanced architectural features of GPUs to boost the performance and how to analyze the …


Respiratory Prediction And Image Quality Improvement Of 4d Cone Beam Ct And Mri For Lung Tumor Treatments, Seonyeong Park Jan 2017

Respiratory Prediction And Image Quality Improvement Of 4d Cone Beam Ct And Mri For Lung Tumor Treatments, Seonyeong Park

Theses and Dissertations

Identification of accurate tumor location and shape is highly important in lung cancer radiotherapy, to improve the treatment quality by reducing dose delivery errors. Because a lung tumor moves with the patient's respiration, breathing motion should be correctly analyzed and predicted during the treatment for prevention of tumor miss or undesirable treatment toxicity. Besides, in Image-Guided Radiation Therapy (IGRT), the tumor motion causes difficulties not only in delivering accurate dose, but also in assuring superior quality of imaging techniques such as four-dimensional (4D) Cone Beam Computed Tomography (CBCT) and 4D Magnetic Resonance Imaging (MRI). Specifically, 4D CBCT used in CBCT …


A Hierarchical Architectural Framework For Securing Unmanned Aerial Systems, Matthew Leccadito Jan 2017

A Hierarchical Architectural Framework For Securing Unmanned Aerial Systems, Matthew Leccadito

Theses and Dissertations

Unmanned Aerial Systems (UAS) are becoming more widely used in the new era of evolving technology; increasing performance while decreasing size, weight, and cost. A UAS equipped with a Flight Control System (FCS) that can be used to fly semi- or fully-autonomous is a prime example of a Cyber Physical and Safety Critical system. Current Cyber-Physical defenses against malicious attacks are structured around security standards for best practices involving the development of protocols and the digital software implementation. Thus far, few attempts have been made to embed security into the architecture of the system considering security as a holistic problem. …


Improving Facial Action Unit Recognition Using Convolutional Neural Networks, Shizhong Han Jan 2017

Improving Facial Action Unit Recognition Using Convolutional Neural Networks, Shizhong Han

Theses and Dissertations

Recognizing facial action units (AUs) from spontaneous facial expression is a challenging problem, because of subtle facial appearance changes, free head movements, occlusions, and limited AU-coded training data. Most recently, convolutional neural networks (CNNs) have shown promise on facial AU recognition. However, CNNs are often overfitted and do not generalize well to unseen subject due to limited AU-coded training images. In order to improve the performance of facial AU recognition, we developed two novel CNN frameworks, by substituting the traditional decision layer and convolutional layer with the incremental boosting layer and adaptive convolutional layer respectively, to recognize the AUs from …


Improving Peptide Identification By Considering Ordered Amino Acid Usage, Ahmed Al-Qurri Jan 2017

Improving Peptide Identification By Considering Ordered Amino Acid Usage, Ahmed Al-Qurri

Theses and Dissertations

Proteomics has made major progress in recent years after the sequencing of the genomes of a substantial number of organisms. A typical method for identifying peptides uses a database of peptides identified using tandem mass spectrometry (MS/MS). The profile of accurate mass and elution time (AMT) for peptides that need to be identified will be compared with this database. Restricting the search to those peptides detectable by MS will reduce processing time and more importantly increase accuracy. In addition, there are significant impacts for clinical studies. Proteotypic peptides are those peptides in a protein sequence that are most likely to …


Investigate Genomic 3d Structure Using Deep Neural Network, Yan Zhang Jan 2017

Investigate Genomic 3d Structure Using Deep Neural Network, Yan Zhang

Theses and Dissertations

The 3D structures of the chromosomes play fundamental roles in essential cellular functions, e.g., gene regulation, gene expression, evolution and Hi-C technique provides the interaction density between loci on chromosomes. In this dissertation, we developed multiple algorithms, focusing the deep learning approach, to study the Hi-C datasets and the genomic 3D structures.

Building 3D structure of the genome one of the most critical purpose of the Hi-C technique. Recently, several approaches have been developed to reconstruct the 3D model of the chromosomes from HiC data. However, all of the methods are based on a particular mathematical model and lack of …


Blind Change Point Detection And Regime Segmentation Using Gaussian Process Regression, Sourav Das Jan 2017

Blind Change Point Detection And Regime Segmentation Using Gaussian Process Regression, Sourav Das

Theses and Dissertations

Time-series analysis is used heavily in modeling and forecasting weather, economics, medical data as well as in various other fields. Change point detection (CPD) means finding abrupt changes in the time-series when the statistical property of a certain part of it starts to differ. CPD has attracted a lot of attention in the artificial intelligence, machine learning and data mining communities. In this thesis, a novel CPD algorithm is introduced for segmenting multivariate time-series data. The proposed algorithm is a general pipeline to process any high dimensional multivariate time-series data using nonlinear non-parametric dynamic system. It consists of manifold learning …