Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- China Simulation Federation (3264)
- TÜBİTAK (2998)
- Wright State University (1749)
- University of Nebraska - Lincoln (1089)
- University of Texas at El Paso (841)
-
- Selected Works (836)
- Washington University in St. Louis (717)
- Technological University Dublin (654)
- Brigham Young University (642)
- California Polytechnic State University, San Luis Obispo (594)
- Embry-Riddle Aeronautical University (519)
- Singapore Management University (482)
- Universitas Indonesia (433)
- Old Dominion University (390)
- Marquette University (387)
- Air Force Institute of Technology (356)
- Santa Clara University (302)
- University of South Carolina (276)
- SelectedWorks (275)
- Portland State University (244)
- University of Central Florida (244)
- California State University, San Bernardino (242)
- Purdue University (212)
- Western University (191)
- Nova Southeastern University (170)
- New Jersey Institute of Technology (166)
- University of Arkansas, Fayetteville (164)
- University of Massachusetts Amherst (164)
- University of Nevada, Las Vegas (162)
- University of South Florida (156)
- Keyword
-
- Machine learning (341)
- Computer Science (312)
- Department of Computer Science and Engineering (255)
- Engineering (240)
- Deep learning (238)
-
- Simulation (229)
- Robotics (205)
- Machine Learning (192)
- Security (177)
- College of Engineering and Computer Science (157)
- Newsletters (157)
- Science news (157)
- Technical writing (157)
- Optimization (156)
- Classification (146)
- Artificial intelligence (125)
- Deep Learning (123)
- Computer Science and Engineering (121)
- Cybersecurity (108)
- Genetic algorithm (107)
- Internet (106)
- Computer vision (101)
- Computer Engineering (100)
- Data mining (96)
- Computer science (94)
- Privacy (93)
- Particle swarm optimization (87)
- Cloud computing (85)
- Clustering (85)
- Blockchain (84)
- Publication Year
- Publication
-
- Journal of System Simulation (3264)
- Turkish Journal of Electrical Engineering and Computer Sciences (2998)
- Computer Science & Engineering Syllabi (1312)
- Departmental Technical Reports (CS) (760)
- All Computer Science and Engineering Research (683)
-
- International Congress on Environmental Modelling and Software (630)
- Theses and Dissertations (536)
- Department of Electrical and Computer Engineering: Faculty Publications (483)
- Research Collection School Of Computing and Information Systems (450)
- Makara Journal of Technology (431)
- Electrical and Computer Engineering Faculty Research and Publications (367)
- Electronic Theses and Dissertations (351)
- Faculty Publications (315)
- Dissertations (308)
- Journal of Digital Forensics, Security and Law (299)
- Browse all Theses and Dissertations (278)
- Computer Engineering (272)
- Masters Theses (206)
- Computer Science and Engineering Senior Theses (201)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (190)
- Doctoral Dissertations (183)
- Master's Theses (177)
- Electrical and Computer Engineering Faculty Publications (171)
- Conference papers (163)
- BITs and PCs Newsletter (157)
- College of Engineering and Computing Course Catalogs (152)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (149)
- USF Tampa Graduate Theses and Dissertations (133)
- Articles (130)
- Publications (130)
- Publication Type
Articles 15421 - 15450 of 23582
Full-Text Articles in Engineering
Energy-Efficient Failure Recovery In Hadoop Cluster, Weiyue Xu
Energy-Efficient Failure Recovery In Hadoop Cluster, Weiyue Xu
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Based on U.S. Environmental Protection Agency’s estimation, only in U.S., billions of dollars are spent on the electricity cost of data centers each year, and the cost is continually increasing very quickly. Energy efficiency is now used as an important metric for evaluating a computing system. However, saving energy is a big challenge due to many constraints. For example, in one of the most popular distributed processing frameworks, Hadoop, three replicas of each data block are randomly distributed in order to improve performance and fault tolerance, but such a mechanism limits the largest number of machine that can be turned …
Circular Reranking For Visual Search, Ting Yao, Chong-Wah Ngo
Circular Reranking For Visual Search, Ting Yao, Chong-Wah Ngo
Research Collection School Of Computing and Information Systems
Search reranking is regarded as a common way to boost retrieval precision. The problem nevertheless is not trivial especially when there are multiple features or modalities to be considered for search, which often happens in image and video retrieval. This paper proposes a new reranking algorithm, named circular reranking, that reinforces the mutual exchange of information across multiple modalities for improving search performance, following the philosophy that strong performing modality could learn from weaker ones, while weak modality does benefit from interacting with stronger ones. Technically, circular reranking conducts multiple runs of random walks through exchanging the ranking scores among …
Arraytrack: A Fine-Grained Indoor Location System, Jie Xiong, Kyle Jamieson
Arraytrack: A Fine-Grained Indoor Location System, Jie Xiong, Kyle Jamieson
Research Collection School Of Computing and Information Systems
With myriad augmented reality, social networking, and retail shopping applications all on the horizon for the mobile handheld, a fast and accurate location technology will become key to a rich user experience. When roaming outdoors, users can usually count on a clear GPS signal for accurate location, but indoors, GPS often fades, and so up until recently, mobiles have had to rely mainly on rather coarse-grained signal strength readings. What has changed this status quo is the recent trend of dramatically increasing numbers of antennas at the indoor access point, mainly to bolster capacity and coverage with multiple-input, multiple-output (MIMO) …
Selfish Manipulation Of Cooperative Cellular Communications Via Channel Fabrication, Shrikant Adhikarla, Min Suk Kang, Patrick Tague
Selfish Manipulation Of Cooperative Cellular Communications Via Channel Fabrication, Shrikant Adhikarla, Min Suk Kang, Patrick Tague
Patrick Tague
In today’s cellular networks, user equipment (UE) have suffered from low spectral efficiency at cell-edge region due to high interference from adjacent base stations (BSs), which share the same spectral radio resources. In the recently proposed cooperative cellular networks, geographically separated multiple BSs cooperate on transmission in order to improve the UE’s signal-to-interference-plus-noise-ratio (SINR) at cell-edge region. The service provider of the system dynamically assigns the cluster of BSs to achieve higher SINR for the UE while optimizing the use of system radio resources. Although it is the service provider that makes the clustering decision for the UE, the service …
Maximize Your Decision-Making: A Review Of Emerging Technology Trends, Carol Watson
Maximize Your Decision-Making: A Review Of Emerging Technology Trends, Carol Watson
Continuing Legal Education Presentations
Provides overview of new technologies (both software and hardware) that could become the "next big thing."
Don't Panic: The Lawyer’S Guide To Making Your Own Mobile App, Jason Tubinis
Don't Panic: The Lawyer’S Guide To Making Your Own Mobile App, Jason Tubinis
Continuing Legal Education Presentations
Provides overview of steps used to create a personal mobile app.
Appapalooza: Valuable Legal And Productivity Apps For Your Smart Phone Or Tablet, Tj Striepe
Appapalooza: Valuable Legal And Productivity Apps For Your Smart Phone Or Tablet, Tj Striepe
Continuing Legal Education Presentations
Presents helpful tools and programs to make legal research and general office work more efficient and portable.
To Internet Or Not To Internet: Ethics Opinions On Internet Usage, Sharon Bradley
To Internet Or Not To Internet: Ethics Opinions On Internet Usage, Sharon Bradley
Continuing Legal Education Presentations
Considers the ethical implications of using email to communicate with clients, using cloud storage for legal files, and tracking people related to a case via the Internet . Highlights recent state bar ethics committee decisions.
Finding A Virtual Trail: Investigative Research On The Web, Suzanne R. Graham
Finding A Virtual Trail: Investigative Research On The Web, Suzanne R. Graham
Continuing Legal Education Presentations
Provides tips and resources for finding information about people and businesses on the Internet. Focuses on finding vital data, asset information, and criminal history.
Rolling In The Deep, Dark Web: Advanced Internet Searching, Anne Burnett
Rolling In The Deep, Dark Web: Advanced Internet Searching, Anne Burnett
Continuing Legal Education Presentations
Shares effective search strategies to improve search engine results and discusses efforts to capture and index more of the deep web for retrieval.
Stochastic Modeling And Time-To-Event Analysis Of Voip Traffic, Imad Al Ajarmeh
Stochastic Modeling And Time-To-Event Analysis Of Voip Traffic, Imad Al Ajarmeh
College of Computing and Digital Media Dissertations
Voice over IP (VoIP) systems are gaining increased popularity due to the cost effectiveness, ease of management, and enhanced features and capabilities. Both enterprises and carriers are deploying VoIP systems to replace their TDM-based legacy voice networks. However, the lack of engineering models for VoIP systems has been realized by many researchers, especially for large-scale networks. The purpose of traffic engineering is to minimize call blocking probability and maximize resource utilization. The current traffic engineering models are inherited from the legacy PSTN world, and these models fall short from capturing the characteristics of new traffic patterns. The objective of this …
Decentralized Resource Scheduling In Grid/Cloud Computing, Ra'afat O. Abu-Rukba
Decentralized Resource Scheduling In Grid/Cloud Computing, Ra'afat O. Abu-Rukba
Electronic Thesis and Dissertation Repository
In the Grid/Cloud environment, applications or services and resources belong to different organizations with different objectives. Entities in the Grid/Cloud are autonomous and self-interested; however, they are willing to share their resources and services to achieve their individual and collective goals. In such open environment, the scheduling decision is a challenge given the decentralized nature of the environment. Each entity has specific requirements and objectives that need to achieve. In this thesis, we review the Grid/Cloud computing technologies, environment characteristics and structure and indicate the challenges within the resource scheduling. We capture the Grid/Cloud scheduling model based on the complete …
Characterization Of Metal-Insulator-Transition (Mit) Phase Change Materials (Pcm) For Reconfigurable Components, Circuits, And Systems, Brent L. Danner
Characterization Of Metal-Insulator-Transition (Mit) Phase Change Materials (Pcm) For Reconfigurable Components, Circuits, And Systems, Brent L. Danner
Theses and Dissertations
Many microelectromechanical systems (MEMS) use metal contact micro-switches as part of their reconfigurable device design. These devices utilize a mechanical component that can wear down and fail over time. Metal insulator transition (MIT) materials, also known as phase change materials (PCMs), exhibit a reversible transition that can be used to replace the mechanical component in reconfigurable devices. In the presence of a thermal or electric field stimuli, the PCMs will transition back and forth between a crystalline and amorphous state. During this transformation, the resistivity, reflectivity, and Young's modulus of the material drastically change. This research effort focuses on characterizing …
Using Rf-Dna Fingerprints To Discriminate Zigbee Devices In An Operational Environment, Clay K. Dubendorfer
Using Rf-Dna Fingerprints To Discriminate Zigbee Devices In An Operational Environment, Clay K. Dubendorfer
Theses and Dissertations
This research was performed to expand AFIT's Radio Frequency Distinct Native Attribute (RF-DNA) fingerprinting process to support IEEE 802.15.4 ZigBee communication network applications. Current ZigBee bit-level security measures include use of network keys and MAC lists which can be subverted through interception and spoofing using open-source hacking tools. This work addresses device discrimination using Physical (PHY) waveform alternatives to augment existing bit-level security mechanisms. ZigBee network vulnerability to outsider threats was assessed using Receiver Operating Characteristic (ROC) curves to characterize both Authorized Device ID Verification performance (granting network access to authorized users presenting true bit-level credentials) and Rogue Device Rejection …
Learning Enterprise Malware Triage From Automatic Dynamic Analysis, Jonathan S. Bristow
Learning Enterprise Malware Triage From Automatic Dynamic Analysis, Jonathan S. Bristow
Theses and Dissertations
Adversaries employ malware against victims of cyber espionage with the intent of gaining unauthorized access to information. To that end, malware authors intentionally attempt to evade defensive countermeasures based on static methods. This thesis analyzes a dynamic analysis methodology for malware triage that applies at the enterprise scale. This study captures behavior reports from 64,987 samples of malware randomly selected from a large collection and 25,591 clean executable files from operating system install media. Function call information in sequences of behavior generate feature vectors from behavior reports from the les. The results of 64 experiment combinations indicate that using more …
A Multi Agent System For Flow-Based Intrusion Detection, David A . Ryan
A Multi Agent System For Flow-Based Intrusion Detection, David A . Ryan
Theses and Dissertations
The detection and elimination of threats to cyber security is essential for system functionality, protection of valuable information, and preventing costly destruction of assets. This thesis presents a Mobile Multi-Agent Flow-Based IDS called MFIREv3 that provides network anomaly detection of intrusions and automated defense. This version of the MFIRE system includes the development and testing of a Multi-Objective Evolutionary Algorithm (MOEA) for feature selection that provides agents with the optimal set of features for classifying the state of the network. Feature selection provides separable data points for the selected attacks: Worm, Distributed Denial of Service, Man-in-the-Middle, Scan, and Trojan. This …
Network Intrusion Dataset Assessment, David J. Weller-Fahy
Network Intrusion Dataset Assessment, David J. Weller-Fahy
Theses and Dissertations
Research into classification using Anomaly Detection (AD) within the field of Network Intrusion Detection (NID), or Network Intrusion Anomaly Detection (NIAD), is common, but operational use of the classifiers discovered by research is not. One reason for the lack of operational use is most published testing of AD methods uses artificial datasets: making it difficult to determine how well published results apply to other datasets and the networks they represent. This research develops a method to predict the accuracy of an AD-based classifier when applied to a new dataset, based on the difference between an already classified dataset and the …
Cloud Computing Trace Characterization And Synthetic Workload Generation, Salvatore Capra
Cloud Computing Trace Characterization And Synthetic Workload Generation, Salvatore Capra
Theses and Dissertations
This thesis researches cloud computing workload characteristics and synthetic workload generation. A heuristic presented in the work guides the process of workload trace characterization and synthetic workload generation. Analysis of a cloud trace provides insight into client request behaviors and statistical parameters. A versatile workload generation tool creates client connections, controls request rates, defines number of jobs, produces tasks within each job, and manages task durations. The test system consists of multiple clients creating workloads and a server receiving request, all contained within a virtual machine environment. Statistical analysis verifies the synthetic workload experimental results are consistent with real workload …
Machine Conscious Architecture For State Exploitation And Decision Making, Mark M. Derriso
Machine Conscious Architecture For State Exploitation And Decision Making, Mark M. Derriso
Theses and Dissertations
This research addressed a critical limitation in the area of computational intelligence by developing a general purpose architecture for information processing and decision making. Traditional computational intelligence methods are best suited for well-defined problems with extensive, long-term knowledge of the environmental and operational conditions the system will encounter during operation. These traditional approaches typically generate quick answers (i.e., reflexive responses) using pattern recognition methods. Most pattern recognition techniques are static processes which consist of a predefined series of computations. For these pattern recognition approaches to be effective, training data is required from all anticipated environments and operating conditions. The proposed …
Rootkit Detection Using A Cross-View Clean Boot Method, Bridget N. Flatley
Rootkit Detection Using A Cross-View Clean Boot Method, Bridget N. Flatley
Theses and Dissertations
In cyberspace, attackers commonly infect computer systems with malware to gain capabilities such as remote access, keylogging, and stealth. Many malware samples include rootkit functionality to hide attacker activities on the target system. After detection, users can remove the rootkit and associated malware from the system with commercial tools. This research describes, implements, and evaluates a clean boot method using two partitions to detect rootkits on a system. One partition is potentially infected with a rootkit while the other is clean. The method obtains directory listings of the potentially infected operating system from each partition and compares the lists to …
Examining Application Components To Reveal Android Malware, John B. Guptill
Examining Application Components To Reveal Android Malware, John B. Guptill
Theses and Dissertations
Smartphones are becoming ubiquitous in everyday life and malware is exploiting these devices. Therefore, a means to identify the threats of malicious applications is necessary. This paper presents a method to classify and analyze Android malware through application component analysis. The experiment parses select portions from Android packages to collect features using byte sequences and permissions of the application. Multiple machine learning algorithms classify the samples of malware based on these features. The experiment utilizes instance based learner, naive Bayes, decision trees, sequential minimal optimization, boosted naive Bayes, and boosted decision trees to identify the best components that reveal malware …
Computer Based Behavioral Biometric Authentication Via Multi-Modal Fusion, Kyle O. Bailey
Computer Based Behavioral Biometric Authentication Via Multi-Modal Fusion, Kyle O. Bailey
Theses and Dissertations
Biometric computer authentication has an advantage over password and access card authentication in that it is based on something you are, which is not easily copied or stolen. One way of performing biometric computer authentication is to use behavioral tendencies associated with how a user interacts with the computer. However, behavioral biometric authentication accuracy rates are much larger then more traditional authentication methods. This thesis presents a behavioral biometric system that fuses user data from keyboard, mouse, and Graphical User Interface (GUI) interactions. Combining the modalities results in a more accurate authentication decision based on a broader view of the …
Estimating And Measuring Application Latency Of Typical Distributed Interactive Simulation (Dis) - Based Simulation Architecture, Ryan L. Drinkwater
Estimating And Measuring Application Latency Of Typical Distributed Interactive Simulation (Dis) - Based Simulation Architecture, Ryan L. Drinkwater
Theses and Dissertations
One of the challenges in a distributed virtual environment stems from the requirement to simultaneously execute the simulations in realtime to support human interaction, in conjunction with maintaining a consistent view of the shared simulated environment. Maintaining a consistent set of simulation state data in the presence of network latency is difficult if individual data items are updated frequently. The principle application of DIS-based simulation environments has been in the domain of training where a consistent view or its correctness is often judged in subjective terms such as the simulation looking and feeling correct. New application areas for these systems …
Cognitive Augmentation For Network Defense, James E. Emge
Cognitive Augmentation For Network Defense, James E. Emge
Theses and Dissertations
Traditionally, when a task is considered for automation it is a binary decision, either the task was completely automated or it remains manual. LOA is a departure from the tradition use of automation in cyber defense. When a task is automated, it removes the human administrator from the performance of the task, compromising their SA of the state of the network. When the administrator loses SA of the network performance and its current state, failure recovery time becomes much longer. This is because the administrators must orient themselves to the current state of the network at the time of failure …
Mobile Network Defense Interface For Cyber Defense And Situational Awareness, James C. Hannan
Mobile Network Defense Interface For Cyber Defense And Situational Awareness, James C. Hannan
Theses and Dissertations
Today's computer networks are under constant attack. In order to deal with this constant threat, network administrators rely on intrusion detection and prevention services (IDS) (IPS). Most IDS and IPS implement static rule sets to automatically alert administrators and resolve intrusions. Network administrators face a difficult challenge, identifying attacks against a vast number of benign network transactions. Also after a threat is identified making even the smallest policy change to the security software potentially has far-reaching and unanticipated consequences. Finally, because the administrator is primarily responding to alerts they may lose situational awareness of the network. During this research a …
Emulation Of Industrial Control Field Device Protocols, Robert M. Jaromin
Emulation Of Industrial Control Field Device Protocols, Robert M. Jaromin
Theses and Dissertations
It has been shown that thousands of industrial control devices are exposed to the Internet, however, the extent and nature of attacks on such devices remains unknown. The first step to understanding security problems that face modern supervisory control and data acquisition (SCADA) and industrial controls networks is to understand the various attacks launched on Internet-connected field devices. This thesis describes the design and implementation of an industrial control emulator on a Gumstix single-board computer as a solution. This emulator acts as a decoy field device, or honeypot, intended to be probed and attacked via an Internet connection. Evaluation techniques …
Development Of A Response Planner Using The Uct Algorithm For Cyber Defense, Michael P. Knight
Development Of A Response Planner Using The Uct Algorithm For Cyber Defense, Michael P. Knight
Theses and Dissertations
A need for a quick response to cyber attacks is a prevalent problem for computer network operators today. There is a small window to respond to a cyber attack when it occurs to prevent significant damage to a computer network. Automated response planners offer one solution to resolve this issue. This work presents Network Defense Planner System (NDPS), a planner dependent on the effectiveness of the detection of the cyber attack. This research first explores making classification of network attacks faster for real-time detection, the basic function Intrusion Detection System (IDS) provides. After identifying the type of attack, learning the …
Rf Emitter Tracking And Intent Assessment, Benjamin J. Kuhar
Rf Emitter Tracking And Intent Assessment, Benjamin J. Kuhar
Theses and Dissertations
Current research in employing pattern recognition techniques in a wireless sensor network (WSN) to detect anomalous or suspicious behavior is limited. The purpose of this research was to determine the feasibility of an accurate tracking and intent assessment system of unknown or foreign radio frequency (RF) emitters in close proximity to and within military installations as a method for physical security. 22 position tracks were collected using a hand-held Global Positioning System (GPS) unit and a training data set from five different features was generated for each position track. Each collected position track was individually classified as suspicious or non-suspicious …
Evaluating The Effectiveness Of Ip Hopping Via An Address Routing Gateway, Ryan A . Morehart
Evaluating The Effectiveness Of Ip Hopping Via An Address Routing Gateway, Ryan A . Morehart
Theses and Dissertations
This thesis explores the viability of using Internet Protocol (IP) address hopping in front of a network as a defensive measure. This research presents a custom gateway-based IP hopping solution called Address Routing Gateway (ARG) that acts as a transparent IP address hopping gateway. This thesis tests the overall stability of ARG, the accuracy of its classifications, the maximum throughput it can support, and the maximum rate at which it can change IPs and still communicate reliably. This research is accomplished on a physical test network with nodes representing the types of hosts found on a typical, corporate-style network. Direct …
An Architecture For Coexistence With Multiple Users In Frequency Hopping Cognitive Radio Networks, Ryan K. Mclean
An Architecture For Coexistence With Multiple Users In Frequency Hopping Cognitive Radio Networks, Ryan K. Mclean
Theses and Dissertations
The radio frequency (RF) spectrum is a limited resource. Spectrum allotment disputes stem from this scarcity as many radio devices are con confined to a fixed frequency or frequency sequence. One alternative is to incorporate cognition within a configurable radio platform, therefore enabling the radio to adapt to dynamic RF spectrum environments. In this way, the radio is able to actively observe the RF spectrum, orient itself to the current RF environment, decide on a mode of operation, and act accordingly, thereby sharing the spectrum and operating in more flexible manner. This research presents a novel framework for incorporating several …