Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 15421 - 15450 of 23582

Full-Text Articles in Engineering

Energy-Efficient Failure Recovery In Hadoop Cluster, Weiyue Xu Apr 2013

Energy-Efficient Failure Recovery In Hadoop Cluster, Weiyue Xu

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Based on U.S. Environmental Protection Agency’s estimation, only in U.S., billions of dollars are spent on the electricity cost of data centers each year, and the cost is continually increasing very quickly. Energy efficiency is now used as an important metric for evaluating a computing system. However, saving energy is a big challenge due to many constraints. For example, in one of the most popular distributed processing frameworks, Hadoop, three replicas of each data block are randomly distributed in order to improve performance and fault tolerance, but such a mechanism limits the largest number of machine that can be turned …


Circular Reranking For Visual Search, Ting Yao, Chong-Wah Ngo Apr 2013

Circular Reranking For Visual Search, Ting Yao, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

Search reranking is regarded as a common way to boost retrieval precision. The problem nevertheless is not trivial especially when there are multiple features or modalities to be considered for search, which often happens in image and video retrieval. This paper proposes a new reranking algorithm, named circular reranking, that reinforces the mutual exchange of information across multiple modalities for improving search performance, following the philosophy that strong performing modality could learn from weaker ones, while weak modality does benefit from interacting with stronger ones. Technically, circular reranking conducts multiple runs of random walks through exchanging the ranking scores among …


Arraytrack: A Fine-Grained Indoor Location System, Jie Xiong, Kyle Jamieson Apr 2013

Arraytrack: A Fine-Grained Indoor Location System, Jie Xiong, Kyle Jamieson

Research Collection School Of Computing and Information Systems

With myriad augmented reality, social networking, and retail shopping applications all on the horizon for the mobile handheld, a fast and accurate location technology will become key to a rich user experience. When roaming outdoors, users can usually count on a clear GPS signal for accurate location, but indoors, GPS often fades, and so up until recently, mobiles have had to rely mainly on rather coarse-grained signal strength readings. What has changed this status quo is the recent trend of dramatically increasing numbers of antennas at the indoor access point, mainly to bolster capacity and coverage with multiple-input, multiple-output (MIMO) …


Selfish Manipulation Of Cooperative Cellular Communications Via Channel Fabrication, Shrikant Adhikarla, Min Suk Kang, Patrick Tague Mar 2013

Selfish Manipulation Of Cooperative Cellular Communications Via Channel Fabrication, Shrikant Adhikarla, Min Suk Kang, Patrick Tague

Patrick Tague

In today’s cellular networks, user equipment (UE) have suffered from low spectral efficiency at cell-edge region due to high interference from adjacent base stations (BSs), which share the same spectral radio resources. In the recently proposed cooperative cellular networks, geographically separated multiple BSs cooperate on transmission in order to improve the UE’s signal-to-interference-plus-noise-ratio (SINR) at cell-edge region. The service provider of the system dynamically assigns the cluster of BSs to achieve higher SINR for the UE while optimizing the use of system radio resources. Although it is the service provider that makes the clustering decision for the UE, the service …


Maximize Your Decision-Making: A Review Of Emerging Technology Trends, Carol Watson Mar 2013

Maximize Your Decision-Making: A Review Of Emerging Technology Trends, Carol Watson

Continuing Legal Education Presentations

Provides overview of new technologies (both software and hardware) that could become the "next big thing."


Don't Panic: The Lawyer’S Guide To Making Your Own Mobile App, Jason Tubinis Mar 2013

Don't Panic: The Lawyer’S Guide To Making Your Own Mobile App, Jason Tubinis

Continuing Legal Education Presentations

Provides overview of steps used to create a personal mobile app.


Appapalooza: Valuable Legal And Productivity Apps For Your Smart Phone Or Tablet, Tj Striepe Mar 2013

Appapalooza: Valuable Legal And Productivity Apps For Your Smart Phone Or Tablet, Tj Striepe

Continuing Legal Education Presentations

Presents helpful tools and programs to make legal research and general office work more efficient and portable.


To Internet Or Not To Internet: Ethics Opinions On Internet Usage, Sharon Bradley Mar 2013

To Internet Or Not To Internet: Ethics Opinions On Internet Usage, Sharon Bradley

Continuing Legal Education Presentations

Considers the ethical implications of using email to communicate with clients, using cloud storage for legal files, and tracking people related to a case via the Internet . Highlights recent state bar ethics committee decisions.


Finding A Virtual Trail: Investigative Research On The Web, Suzanne R. Graham Mar 2013

Finding A Virtual Trail: Investigative Research On The Web, Suzanne R. Graham

Continuing Legal Education Presentations

Provides tips and resources for finding information about people and businesses on the Internet. Focuses on finding vital data, asset information, and criminal history.


Rolling In The Deep, Dark Web: Advanced Internet Searching, Anne Burnett Mar 2013

Rolling In The Deep, Dark Web: Advanced Internet Searching, Anne Burnett

Continuing Legal Education Presentations

Shares effective search strategies to improve search engine results and discusses efforts to capture and index more of the deep web for retrieval.


Stochastic Modeling And Time-To-Event Analysis Of Voip Traffic, Imad Al Ajarmeh Mar 2013

Stochastic Modeling And Time-To-Event Analysis Of Voip Traffic, Imad Al Ajarmeh

College of Computing and Digital Media Dissertations

Voice over IP (VoIP) systems are gaining increased popularity due to the cost effectiveness, ease of management, and enhanced features and capabilities. Both enterprises and carriers are deploying VoIP systems to replace their TDM-based legacy voice networks. However, the lack of engineering models for VoIP systems has been realized by many researchers, especially for large-scale networks. The purpose of traffic engineering is to minimize call blocking probability and maximize resource utilization. The current traffic engineering models are inherited from the legacy PSTN world, and these models fall short from capturing the characteristics of new traffic patterns. The objective of this …


Decentralized Resource Scheduling In Grid/Cloud Computing, Ra'afat O. Abu-Rukba Mar 2013

Decentralized Resource Scheduling In Grid/Cloud Computing, Ra'afat O. Abu-Rukba

Electronic Thesis and Dissertation Repository

In the Grid/Cloud environment, applications or services and resources belong to different organizations with different objectives. Entities in the Grid/Cloud are autonomous and self-interested; however, they are willing to share their resources and services to achieve their individual and collective goals. In such open environment, the scheduling decision is a challenge given the decentralized nature of the environment. Each entity has specific requirements and objectives that need to achieve. In this thesis, we review the Grid/Cloud computing technologies, environment characteristics and structure and indicate the challenges within the resource scheduling. We capture the Grid/Cloud scheduling model based on the complete …


Characterization Of Metal-Insulator-Transition (Mit) Phase Change Materials (Pcm) For Reconfigurable Components, Circuits, And Systems, Brent L. Danner Mar 2013

Characterization Of Metal-Insulator-Transition (Mit) Phase Change Materials (Pcm) For Reconfigurable Components, Circuits, And Systems, Brent L. Danner

Theses and Dissertations

Many microelectromechanical systems (MEMS) use metal contact micro-switches as part of their reconfigurable device design. These devices utilize a mechanical component that can wear down and fail over time. Metal insulator transition (MIT) materials, also known as phase change materials (PCMs), exhibit a reversible transition that can be used to replace the mechanical component in reconfigurable devices. In the presence of a thermal or electric field stimuli, the PCMs will transition back and forth between a crystalline and amorphous state. During this transformation, the resistivity, reflectivity, and Young's modulus of the material drastically change. This research effort focuses on characterizing …


Using Rf-Dna Fingerprints To Discriminate Zigbee Devices In An Operational Environment, Clay K. Dubendorfer Mar 2013

Using Rf-Dna Fingerprints To Discriminate Zigbee Devices In An Operational Environment, Clay K. Dubendorfer

Theses and Dissertations

This research was performed to expand AFIT's Radio Frequency Distinct Native Attribute (RF-DNA) fingerprinting process to support IEEE 802.15.4 ZigBee communication network applications. Current ZigBee bit-level security measures include use of network keys and MAC lists which can be subverted through interception and spoofing using open-source hacking tools. This work addresses device discrimination using Physical (PHY) waveform alternatives to augment existing bit-level security mechanisms. ZigBee network vulnerability to outsider threats was assessed using Receiver Operating Characteristic (ROC) curves to characterize both Authorized Device ID Verification performance (granting network access to authorized users presenting true bit-level credentials) and Rogue Device Rejection …


Learning Enterprise Malware Triage From Automatic Dynamic Analysis, Jonathan S. Bristow Mar 2013

Learning Enterprise Malware Triage From Automatic Dynamic Analysis, Jonathan S. Bristow

Theses and Dissertations

Adversaries employ malware against victims of cyber espionage with the intent of gaining unauthorized access to information. To that end, malware authors intentionally attempt to evade defensive countermeasures based on static methods. This thesis analyzes a dynamic analysis methodology for malware triage that applies at the enterprise scale. This study captures behavior reports from 64,987 samples of malware randomly selected from a large collection and 25,591 clean executable files from operating system install media. Function call information in sequences of behavior generate feature vectors from behavior reports from the les. The results of 64 experiment combinations indicate that using more …


A Multi Agent System For Flow-Based Intrusion Detection, David A . Ryan Mar 2013

A Multi Agent System For Flow-Based Intrusion Detection, David A . Ryan

Theses and Dissertations

The detection and elimination of threats to cyber security is essential for system functionality, protection of valuable information, and preventing costly destruction of assets. This thesis presents a Mobile Multi-Agent Flow-Based IDS called MFIREv3 that provides network anomaly detection of intrusions and automated defense. This version of the MFIRE system includes the development and testing of a Multi-Objective Evolutionary Algorithm (MOEA) for feature selection that provides agents with the optimal set of features for classifying the state of the network. Feature selection provides separable data points for the selected attacks: Worm, Distributed Denial of Service, Man-in-the-Middle, Scan, and Trojan. This …


Network Intrusion Dataset Assessment, David J. Weller-Fahy Mar 2013

Network Intrusion Dataset Assessment, David J. Weller-Fahy

Theses and Dissertations

Research into classification using Anomaly Detection (AD) within the field of Network Intrusion Detection (NID), or Network Intrusion Anomaly Detection (NIAD), is common, but operational use of the classifiers discovered by research is not. One reason for the lack of operational use is most published testing of AD methods uses artificial datasets: making it difficult to determine how well published results apply to other datasets and the networks they represent. This research develops a method to predict the accuracy of an AD-based classifier when applied to a new dataset, based on the difference between an already classified dataset and the …


Cloud Computing Trace Characterization And Synthetic Workload Generation, Salvatore Capra Mar 2013

Cloud Computing Trace Characterization And Synthetic Workload Generation, Salvatore Capra

Theses and Dissertations

This thesis researches cloud computing workload characteristics and synthetic workload generation. A heuristic presented in the work guides the process of workload trace characterization and synthetic workload generation. Analysis of a cloud trace provides insight into client request behaviors and statistical parameters. A versatile workload generation tool creates client connections, controls request rates, defines number of jobs, produces tasks within each job, and manages task durations. The test system consists of multiple clients creating workloads and a server receiving request, all contained within a virtual machine environment. Statistical analysis verifies the synthetic workload experimental results are consistent with real workload …


Machine Conscious Architecture For State Exploitation And Decision Making, Mark M. Derriso Mar 2013

Machine Conscious Architecture For State Exploitation And Decision Making, Mark M. Derriso

Theses and Dissertations

This research addressed a critical limitation in the area of computational intelligence by developing a general purpose architecture for information processing and decision making. Traditional computational intelligence methods are best suited for well-defined problems with extensive, long-term knowledge of the environmental and operational conditions the system will encounter during operation. These traditional approaches typically generate quick answers (i.e., reflexive responses) using pattern recognition methods. Most pattern recognition techniques are static processes which consist of a predefined series of computations. For these pattern recognition approaches to be effective, training data is required from all anticipated environments and operating conditions. The proposed …


Rootkit Detection Using A Cross-View Clean Boot Method, Bridget N. Flatley Mar 2013

Rootkit Detection Using A Cross-View Clean Boot Method, Bridget N. Flatley

Theses and Dissertations

In cyberspace, attackers commonly infect computer systems with malware to gain capabilities such as remote access, keylogging, and stealth. Many malware samples include rootkit functionality to hide attacker activities on the target system. After detection, users can remove the rootkit and associated malware from the system with commercial tools. This research describes, implements, and evaluates a clean boot method using two partitions to detect rootkits on a system. One partition is potentially infected with a rootkit while the other is clean. The method obtains directory listings of the potentially infected operating system from each partition and compares the lists to …


Examining Application Components To Reveal Android Malware, John B. Guptill Mar 2013

Examining Application Components To Reveal Android Malware, John B. Guptill

Theses and Dissertations

Smartphones are becoming ubiquitous in everyday life and malware is exploiting these devices. Therefore, a means to identify the threats of malicious applications is necessary. This paper presents a method to classify and analyze Android malware through application component analysis. The experiment parses select portions from Android packages to collect features using byte sequences and permissions of the application. Multiple machine learning algorithms classify the samples of malware based on these features. The experiment utilizes instance based learner, naive Bayes, decision trees, sequential minimal optimization, boosted naive Bayes, and boosted decision trees to identify the best components that reveal malware …


Computer Based Behavioral Biometric Authentication Via Multi-Modal Fusion, Kyle O. Bailey Mar 2013

Computer Based Behavioral Biometric Authentication Via Multi-Modal Fusion, Kyle O. Bailey

Theses and Dissertations

Biometric computer authentication has an advantage over password and access card authentication in that it is based on something you are, which is not easily copied or stolen. One way of performing biometric computer authentication is to use behavioral tendencies associated with how a user interacts with the computer. However, behavioral biometric authentication accuracy rates are much larger then more traditional authentication methods. This thesis presents a behavioral biometric system that fuses user data from keyboard, mouse, and Graphical User Interface (GUI) interactions. Combining the modalities results in a more accurate authentication decision based on a broader view of the …


Estimating And Measuring Application Latency Of Typical Distributed Interactive Simulation (Dis) - Based Simulation Architecture, Ryan L. Drinkwater Mar 2013

Estimating And Measuring Application Latency Of Typical Distributed Interactive Simulation (Dis) - Based Simulation Architecture, Ryan L. Drinkwater

Theses and Dissertations

One of the challenges in a distributed virtual environment stems from the requirement to simultaneously execute the simulations in realtime to support human interaction, in conjunction with maintaining a consistent view of the shared simulated environment. Maintaining a consistent set of simulation state data in the presence of network latency is difficult if individual data items are updated frequently. The principle application of DIS-based simulation environments has been in the domain of training where a consistent view or its correctness is often judged in subjective terms such as the simulation looking and feeling correct. New application areas for these systems …


Cognitive Augmentation For Network Defense, James E. Emge Mar 2013

Cognitive Augmentation For Network Defense, James E. Emge

Theses and Dissertations

Traditionally, when a task is considered for automation it is a binary decision, either the task was completely automated or it remains manual. LOA is a departure from the tradition use of automation in cyber defense. When a task is automated, it removes the human administrator from the performance of the task, compromising their SA of the state of the network. When the administrator loses SA of the network performance and its current state, failure recovery time becomes much longer. This is because the administrators must orient themselves to the current state of the network at the time of failure …


Mobile Network Defense Interface For Cyber Defense And Situational Awareness, James C. Hannan Mar 2013

Mobile Network Defense Interface For Cyber Defense And Situational Awareness, James C. Hannan

Theses and Dissertations

Today's computer networks are under constant attack. In order to deal with this constant threat, network administrators rely on intrusion detection and prevention services (IDS) (IPS). Most IDS and IPS implement static rule sets to automatically alert administrators and resolve intrusions. Network administrators face a difficult challenge, identifying attacks against a vast number of benign network transactions. Also after a threat is identified making even the smallest policy change to the security software potentially has far-reaching and unanticipated consequences. Finally, because the administrator is primarily responding to alerts they may lose situational awareness of the network. During this research a …


Emulation Of Industrial Control Field Device Protocols, Robert M. Jaromin Mar 2013

Emulation Of Industrial Control Field Device Protocols, Robert M. Jaromin

Theses and Dissertations

It has been shown that thousands of industrial control devices are exposed to the Internet, however, the extent and nature of attacks on such devices remains unknown. The first step to understanding security problems that face modern supervisory control and data acquisition (SCADA) and industrial controls networks is to understand the various attacks launched on Internet-connected field devices. This thesis describes the design and implementation of an industrial control emulator on a Gumstix single-board computer as a solution. This emulator acts as a decoy field device, or honeypot, intended to be probed and attacked via an Internet connection. Evaluation techniques …


Development Of A Response Planner Using The Uct Algorithm For Cyber Defense, Michael P. Knight Mar 2013

Development Of A Response Planner Using The Uct Algorithm For Cyber Defense, Michael P. Knight

Theses and Dissertations

A need for a quick response to cyber attacks is a prevalent problem for computer network operators today. There is a small window to respond to a cyber attack when it occurs to prevent significant damage to a computer network. Automated response planners offer one solution to resolve this issue. This work presents Network Defense Planner System (NDPS), a planner dependent on the effectiveness of the detection of the cyber attack. This research first explores making classification of network attacks faster for real-time detection, the basic function Intrusion Detection System (IDS) provides. After identifying the type of attack, learning the …


Rf Emitter Tracking And Intent Assessment, Benjamin J. Kuhar Mar 2013

Rf Emitter Tracking And Intent Assessment, Benjamin J. Kuhar

Theses and Dissertations

Current research in employing pattern recognition techniques in a wireless sensor network (WSN) to detect anomalous or suspicious behavior is limited. The purpose of this research was to determine the feasibility of an accurate tracking and intent assessment system of unknown or foreign radio frequency (RF) emitters in close proximity to and within military installations as a method for physical security. 22 position tracks were collected using a hand-held Global Positioning System (GPS) unit and a training data set from five different features was generated for each position track. Each collected position track was individually classified as suspicious or non-suspicious …


Evaluating The Effectiveness Of Ip Hopping Via An Address Routing Gateway, Ryan A . Morehart Mar 2013

Evaluating The Effectiveness Of Ip Hopping Via An Address Routing Gateway, Ryan A . Morehart

Theses and Dissertations

This thesis explores the viability of using Internet Protocol (IP) address hopping in front of a network as a defensive measure. This research presents a custom gateway-based IP hopping solution called Address Routing Gateway (ARG) that acts as a transparent IP address hopping gateway. This thesis tests the overall stability of ARG, the accuracy of its classifications, the maximum throughput it can support, and the maximum rate at which it can change IPs and still communicate reliably. This research is accomplished on a physical test network with nodes representing the types of hosts found on a typical, corporate-style network. Direct …


An Architecture For Coexistence With Multiple Users In Frequency Hopping Cognitive Radio Networks, Ryan K. Mclean Mar 2013

An Architecture For Coexistence With Multiple Users In Frequency Hopping Cognitive Radio Networks, Ryan K. Mclean

Theses and Dissertations

The radio frequency (RF) spectrum is a limited resource. Spectrum allotment disputes stem from this scarcity as many radio devices are con confined to a fixed frequency or frequency sequence. One alternative is to incorporate cognition within a configurable radio platform, therefore enabling the radio to adapt to dynamic RF spectrum environments. In this way, the radio is able to actively observe the RF spectrum, orient itself to the current RF environment, decide on a mode of operation, and act accordingly, thereby sharing the spectrum and operating in more flexible manner. This research presents a novel framework for incorporating several …