Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Engineering

Hashes Are Not Suitable To Verify Fixity Of The Public Archived Web, Mohamed Aturban, Martin Klein, Herbert Van De Sompel, Sawood Alam, Michael L. Nelson, Michele C. Weigle Jan 2023

Hashes Are Not Suitable To Verify Fixity Of The Public Archived Web, Mohamed Aturban, Martin Klein, Herbert Van De Sompel, Sawood Alam, Michael L. Nelson, Michele C. Weigle

Computer Science Faculty Publications

Web archives, such as the Internet Archive, preserve the web and allow access to prior states of web pages. We implicitly trust their versions of archived pages, but as their role moves from preserving curios of the past to facilitating present day adjudication, we are concerned with verifying the fixity of archived web pages, or mementos, to ensure they have always remained unaltered. A widely used technique in digital preservation to verify the fixity of an archived resource is to periodically compute a cryptographic hash value on a resource and then compare it with a previous hash value. If the …


Structural Checking Tool Restructure And Matching Improvements, Derek Taylor May 2022

Structural Checking Tool Restructure And Matching Improvements, Derek Taylor

Graduate Theses and Dissertations

With the rising complexity and size of hardware designs, saving development time and cost by employing third-party intellectual property (IP) into various first-party designs has become a necessity. However, using third-party IPs introduces the risk of adding malicious behavior to the design, including hardware Trojans. Different from software Trojan detection, the detection of hardware Trojans in an efficient and cost-effective manner is an ongoing area of study and has significant complexities depending on the development stage where Trojan detection is leveraged. Therefore, this thesis research proposes improvements to various components of the soft IP analysis methodology utilized by the Structural …


Evaluating Similarity Of Cross-Architecture Basic Blocks, Elijah L. Meyer Jan 2022

Evaluating Similarity Of Cross-Architecture Basic Blocks, Elijah L. Meyer

Browse all Theses and Dissertations

Vulnerabilities in source code can be compiled for multiple processor architectures and make their way into several different devices. Security researchers frequently have no way to obtain this source code to analyze for vulnerabilities. Therefore, the ability to effectively analyze binary code is essential. Similarity detection is one facet of binary code analysis. Because source code can be compiled for different architectures, the need can arise for detecting code similarity across architectures. This need is especially apparent when analyzing firmware from embedded computing environments such as Internet of Things devices, where the processor architecture is dependent on the product and …


Bibliometric Analysis Of The Literature In The Field Of Information Technology Relatedness, Ilham M, Anis Eliyana, Praptini Yulianti Dec 2020

Bibliometric Analysis Of The Literature In The Field Of Information Technology Relatedness, Ilham M, Anis Eliyana, Praptini Yulianti

Library Philosophy and Practice (e-journal)

This bibliometric describe Information Technology Relateness is defined as the use of information technology infrastructure and information technology management processes betweeWas this submission previously published in a journal? Bepress will automatically create an OpenURL for published articles. Learn more about OpenURLsn business units together. There is not much research on Information Technology Relateness by providing a big picture that is visualized from year to year. This study aims to map research in the field of Information Technology Relateness with data from all international research publications. This study performs a bibliometric method and analyzes research data using the Services Analyze …


Wine Sampler, Lance L. Litten Jun 2020

Wine Sampler, Lance L. Litten

Computer Engineering

Quality testing is an important part of the wine industry. Without proper quality control, thousands of dollars could be wasted on bottling and recalling hundreds of gallons of wine. Due to this, labs are set up that collect wine samples from the tanks in a wine production plant and test them. A big part of this testing is determining exactly what tanks need to be tested and what tanks are at risk. My project aims to help automate this task by collecting data from the tanks wirelessly and keeping track of simple indicators such as pH and temperature. Automating this …


Measuring Decentrality In Blockchain Based Systems, Sarada Prasad Gochhayat, Sachin Shetty, Ravi Mukkamala, Peter Foytik, Georges A. Kamhoua, Laurent Njilla Jan 2020

Measuring Decentrality In Blockchain Based Systems, Sarada Prasad Gochhayat, Sachin Shetty, Ravi Mukkamala, Peter Foytik, Georges A. Kamhoua, Laurent Njilla

VMASC Publications

Blockchain promises to provide a distributed and decentralized means of trust among untrusted users. However, in recent years, a shift from decentrality to centrality has been observed in the most accepted Blockchain system, i.e., Bitcoin. This shift has motivated researchers to identify the cause of decentrality, quantify decentrality and analyze the impact of decentrality. In this work, we take a holistic approach to identify and quantify decentrality in Blockchain based systems. First, we identify the emergence of centrality in three layers of Blockchain based systems, namely governance layer, network layer and storage layer. Then, we quantify decentrality in these layers …


Extracting Information From Subroutines Using Static Analysis Semantics, Luke A. Burnett Jan 2020

Extracting Information From Subroutines Using Static Analysis Semantics, Luke A. Burnett

Browse all Theses and Dissertations

Understanding how a system component can interact with other services can take an immeasurable amount of time. Reverse engineering embedded and large systems can rely on understanding how components interact with one another. This process is time consuming and can sometimes be generalized through certain behavior.We will be explaining two such complicated systems and highlighting similarities between them. We will show that through static analysis you can capture compiler behavior and apply it to the understanding of a function, reducing the total time required to understand a component of whichever system you are learning.


Analytical Approaches To Improve Accuracy In Solving The Protein Topology Problem, Kamal Al Nasr, Feras Yousef, Ruba Jebril, Christopher Jones Jan 2018

Analytical Approaches To Improve Accuracy In Solving The Protein Topology Problem, Kamal Al Nasr, Feras Yousef, Ruba Jebril, Christopher Jones

Computer Science Faculty Research

To take advantage of recent advances in genomics and proteomics it is critical that the three-dimensional physical structure of biological macromolecules be determined. Cryo-Electron Microscopy (cryo-EM) is a promising and improving method for obtaining this data, however resolution is often not sufficient to directly determine the atomic scale structure. Despite this, information for secondary structure locations is detectable. De novo modeling is a computational approach to modeling these macromolecular structures based on cryo-EM derived data. During de novo modeling a mapping between detected secondary structures and the underlying amino acid sequence must be identified. DP-TOSS (Dynamic Programming for determining the …


Detecting Php-Based Cross-Site Scripting Vulnerabilities Using Static Program Analysis, Steven M. Kelbley Jan 2016

Detecting Php-Based Cross-Site Scripting Vulnerabilities Using Static Program Analysis, Steven M. Kelbley

Browse all Theses and Dissertations

With the widespread adoption of dynamic web applications in recent years, a number of threats to the security of these applications have emerged as significant challenges for application developers. The security of developed applications has become a higher priority for both developers and their employers as cyber attacks become increasingly more prevalent and damaging. Some of the most used web application frameworks are written in PHP and have become major targets due to the large number of servers running these applications worldwide. A number of tools exist to evaluate PHP code for issues, however most of these applications are not …


Representation And Analysis Of Multi-Modal, Nonuniform Time Series Data: An Application To Survival Prognosis Of Oncology Patients In An Outpatient Setting, Jennifer Winikus Jan 2016

Representation And Analysis Of Multi-Modal, Nonuniform Time Series Data: An Application To Survival Prognosis Of Oncology Patients In An Outpatient Setting, Jennifer Winikus

Dissertations, Master's Theses and Master's Reports

The representation of nonuniform, multi-modal, time-limited time series data is complex and explored through the use of discrete representation, dimensionality reduction with segmentation based techniques, and with behavioral representation approaches. These explorations are done with a focus on an outpatient oncology setting with the classification and regression analysis being used for length of survival prognosis. Each decision of representation and analysis is not independent, with implications of each decision in method for how the data is represented and then which analysis technique is used. One unique aspect of the work is the use of outpatient clinical data for patients, which …


A User-Oriented Network Forensic Analyser: The Design Of A High-Level Protocol Analyser, D Joy, F Li, N L. Clarke, S M. Furnell Jan 2014

A User-Oriented Network Forensic Analyser: The Design Of A High-Level Protocol Analyser, D Joy, F Li, N L. Clarke, S M. Furnell

Australian Digital Forensics Conference

Network forensics is becoming an increasingly important tool in the investigation of cyber and computer-assisted crimes. Unfortunately, whilst much effort has been undertaken in developing computer forensic file system analysers (e.g. Encase and FTK), such focus has not been given to Network Forensic Analysis Tools (NFATs). The single biggest barrier to effective NFATs is the handling of large volumes of low-level traffic and being able to exact and interpret forensic artefacts and their context – for example, being able extract and render application-level objects (such as emails, web pages and documents) from the low-level TCP/IP traffic but also understand how …


Robotic Swarming Without Inter-Agent Communication, Daniel Jonathan Standish Jan 2013

Robotic Swarming Without Inter-Agent Communication, Daniel Jonathan Standish

USF Tampa Graduate Theses and Dissertations

Many physical and algorithmic swarms utilize inter-agent communication to achieve advanced swarming behaviors. These swarms are inspired by biological swarms that can be seen throughout nature and include bee swarms, ant colonies, fish schools, and bird flocks. These biological swarms do not utilize inter-agent communication like their physical and algorithmic counterparts. Instead, organisms in nature rely on a local awareness of other swarm members that facilitates proper swarm motion and behavior. This research aims to pursue an effective swarm algorithm using only line-of-sight proximity information and no inter-agent communication. It is expected that the swarm performance will be lower than …


Mechanical And Thermal Properties Of Polypropylene Reinforced By Calcined And Uncalcined Zeolite, Nurdin Bukit Nov 2012

Mechanical And Thermal Properties Of Polypropylene Reinforced By Calcined And Uncalcined Zeolite, Nurdin Bukit

Makara Journal of Technology

This study was carried out to compare mechanical and thermal properties of polypropylene (PP) reinforced with uncalcined and calcined zeolites. The PP samples were reinforced with zeolites at various quantities of 2, 4, and 6 (wt %). The comparison of the two types of zeolite was based on mechanical properties, including tensile strength, elongation at break, and Young’s modulus, and thermal characteristics analyzed using DSC, and DTA/TGA technique. The results obtained clearly revealed that both zeolites were able to significantly increase tensile strength and Young’s modulus of the samples, with calcined zeolite was found to work better. Addition of calcined …


Analysis Of Information Remaining On Hand Held Devices For Sale On The Second Hand Market, Andrew Jones, Craig Valli, Iain Sutherland Jan 2008

Analysis Of Information Remaining On Hand Held Devices For Sale On The Second Hand Market, Andrew Jones, Craig Valli, Iain Sutherland

Research outputs pre 2011

The ownership and use of mobile phones, Personal Digital Assistants and other hand held devices is now ubiquitous both for home and business use. The majority of these devices have a high initial cost, a relatively short period before they become obsolescent and a relatively low second hand value. As a result of this, when the devices are replaced, there are indications that they tend to be discarded. As technology has continued to develop, it has led to an increasing diversity in the number and type of devices that are available, and the processing power and the storage capacity of …


Analysis Of Information Remaining On Hand Held Devices Offered For Sale On The Second Hand, Andy Jones, Craig Valli, Iain Sutherland Jan 2008

Analysis Of Information Remaining On Hand Held Devices Offered For Sale On The Second Hand, Andy Jones, Craig Valli, Iain Sutherland

Journal of Digital Forensics, Security and Law

The ownership and use of mobile phones, Personal Digital Assistants and other hand held devices is now ubiquitous both for home and business use. The majority of these devices have a high initial cost, a relatively short period before they become obsolescent and a relatively low second hand value. As a result of this, when the devices are replaced, there are indications that they tend to be discarded. As technology has continued to develop, it has led to an increasing diversity in the number and type of devices that are available, and the processing power and the storage capacity of …


Development Of A System Of Systems Engineering Method, Ji Hyon Mun, Morgan Henrie, Yaneth Correa, Charles Keating, Andres Sousa-Poza Jan 2005

Development Of A System Of Systems Engineering Method, Ji Hyon Mun, Morgan Henrie, Yaneth Correa, Charles Keating, Andres Sousa-Poza

Engineering Management & Systems Engineering Faculty Publications

Systems engineers have been facing challenges with the design and analysis of multiple complex systems. System of Systems Engineering has emerged to assist in this challenge with the systemic analysis, design, and transformation of complex metasystems. This paper outlines a proposed method to overcome these challenges, which is grounded in System of Systems Engineering principles and methodology. An overview of System of Systems Engineering will be provided for understanding of its significance and the attempt to complement Systems Engineering efforts in dealing with the aforementioned challenges. Finally, discussion on the proposed method, with respect to complex system analysis, is provided.