Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture

Theses/Dissertations

2019

Institution
Keyword
Publication

Articles 1 - 30 of 33

Full-Text Articles in Engineering

Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo Dec 2019

Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo

Electronic Thesis and Dissertation Repository

Network virtualization has become a key approach for Network Service Providers (NSPs) to mitigate the challenge of the continually increasing demands for network services. Tightly coupled with their software components, legacy network devices are difficult to upgrade or modify to meet the dynamically changing end-user needs. To virtualize their infrastructure and mitigate those challenges, NSPs have started to adopt Software Defined Networking (SDN) and Network Function Virtualization (NFV). To this end, this thesis addresses the challenges faced on the road of transforming the legacy networking infrastructure to a more dynamic and agile virtualized environment to meet the rapidly increasing demand …


Secure Two-Party Protocol For Privacy-Preserving Classification Via Differential Privacy, Manish Kumar Dec 2019

Secure Two-Party Protocol For Privacy-Preserving Classification Via Differential Privacy, Manish Kumar

Boise State University Theses and Dissertations

Privacy-preserving distributed data mining is the study of mining on distributed data—owned by multiple data owners—in a non-secure environment, where the mining protocol does not reveal any sensitive information to the data owners, the individual privacy is preserved, and the output mining model is practically useful. In this thesis, we propose a secure two-party protocol for building a privacy-preserving decision tree classifier over distributed data using differential privacy. We utilize secure multiparty computation to ensure that the protocol is privacy-preserving. Our algorithm also utilizes parallel and sequential compositions, and applies distributed exponential mechanism to ensure that the output is differentially-private. …


Design And Development Of A Comprehensive And Interactive Diabetic Parameter Monitoring System - Betictrack, Nusrat Chowdhury Dec 2019

Design And Development Of A Comprehensive And Interactive Diabetic Parameter Monitoring System - Betictrack, Nusrat Chowdhury

Electronic Theses and Dissertations

A novel, interactive Android app has been developed that monitors the health of type 2 diabetic patients in real-time, providing patients and their physicians with real-time feedback on all relevant parameters of diabetes. The app includes modules for recording carbohydrate intake and blood glucose; for reminding patients about the need to take medications on schedule; and for tracking physical activity, using movement data via Bluetooth from a pair of wearable insole devices. Two machine learning models were developed to detect seven physical activities: sitting, standing, walking, running, stair ascent, stair descent and use of elliptical trainers. The SVM and decision …


Effective Fuzzing Framework For The Sleuthkit Tools, Shravya Paruchuri Nov 2019

Effective Fuzzing Framework For The Sleuthkit Tools, Shravya Paruchuri

LSU Master's Theses

The fields of digital forensics and incident response have seen significant growth over the last decade due to the increasing threats faced by organizations and the continued reliance on digital platforms and devices by criminals. In the past, digital investigations were performed manually by expert investigators, but this approach has become no longer viable given the amount of data that must be processed compared to the relatively small number of trained investigators. These resource constraints have led to the development and reliance on automated processing and analysis systems for digital evidence. In this paper, we present our effort to develop …


A Parallel Direct Method For Finite Element Electromagnetic Computations Based On Domain Decomposition, Javad Moshfegh Nov 2019

A Parallel Direct Method For Finite Element Electromagnetic Computations Based On Domain Decomposition, Javad Moshfegh

Doctoral Dissertations

High performance parallel computing and direct (factorization-based) solution methods have been the two main trends in electromagnetic computations in recent years. When time-harmonic (frequency-domain) Maxwell's equation are directly discretized with the Finite Element Method (FEM) or other Partial Differential Equation (PDE) methods, the resulting linear system of equations is sparse and indefinite, thus harder to efficiently factorize serially or in parallel than alternative methods e.g. integral equation solutions, that result in dense linear systems. State-of-the-art sparse matrix direct solvers such as MUMPS and PARDISO don't scale favorably, have low parallel efficiency and high memory footprint. This work introduces a new …


Document Layout Analysis And Recognition Systems, Sai Kosaraju Nov 2019

Document Layout Analysis And Recognition Systems, Sai Kosaraju

Master of Science in Computer Science Theses

Automatic extraction of relevant knowledge to domain-specific questions from Optical Character Recognition (OCR) documents is critical for developing intelligent systems, such as document search engines, sentiment analysis, and information retrieval, since hands-on knowledge extraction by a domain expert with a large volume of documents is intensive, unscalable, and time-consuming. There have been a number of studies that have automatically extracted relevant knowledge from OCR documents, such as ABBY and Sandford Natural Language Processing (NLP). Despite the progress, there are still limitations yet-to-be solved. For instance, NLP often fails to analyze a large document. In this thesis, we propose a knowledge …


On I/O Performance And Cost Efficiency Of Cloud Storage: A Client's Perspective, Binbing Hou Nov 2019

On I/O Performance And Cost Efficiency Of Cloud Storage: A Client's Perspective, Binbing Hou

LSU Doctoral Dissertations

Cloud storage has gained increasing popularity in the past few years. In cloud storage, data are stored in the service provider’s data centers; users access data via the network and pay the fees based on the service usage. For such a new storage model, our prior wisdom and optimization schemes on conventional storage may not remain valid nor applicable to the emerging cloud storage.

In this dissertation, we focus on understanding and optimizing the I/O performance and cost efficiency of cloud storage from a client’s perspective. We first conduct a comprehensive study to gain insight into the I/O performance behaviors …


Knn Optimization For Multi-Dimensional Data, Arialdis Japa Aug 2019

Knn Optimization For Multi-Dimensional Data, Arialdis Japa

Master of Science in Computer Science Theses

The K-Nearest Neighbors (KNN) algorithm is a simple but powerful technique used in the field of data analytics. It uses a distance metric to identify existing samples in a dataset which are similar to a new sample. The new sample can then be classified via a class majority voting of its most similar samples, i.e. nearest neighbors. The KNN algorithm can be applied in many fields, such as recommender systems where it can be used to group related products or predict user preferences. In most cases, the performance of the KNN algorithm tends to suffer as the size of the …


A Simulation Tool For Evaluating The Environmental Impacts Of Management Scenarios For Modern Broiler Production Systems, Martin Andrew Christie Aug 2019

A Simulation Tool For Evaluating The Environmental Impacts Of Management Scenarios For Modern Broiler Production Systems, Martin Andrew Christie

Graduate Theses and Dissertations

The purpose of this work is to provide a simulation tool that allows broiler production practitioners and researchers to simulate the effects of farm design and management practices on resource consumption and environmental impacts. This tool allows the user to design unique farms and simulates on farm processes required to raise broiler chicks to a marketable age. The use can input data such as farm location, broiler breed, flock size, ration type, barn dimensions, and climate control equipment specifications. The algorithms used to simulate broiler breed specific feed intake, broiler weight gain, and other on farm processes such as heating, …


Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui Aug 2019

Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui

Electronic Theses and Dissertations

This dissertation describes progress in the state-of-the-art for developing and deploying formally verified cyber security devices in industrial control networks. It begins by detailing the unique struggles that are faced in industrial control networks and why concepts and technologies developed for securing traditional networks might not be appropriate. It uses these unique struggles and examples of contemporary cyber-attacks targeting control systems to argue that progress in securing control systems is best met with formal verification of systems, their specifications, and their security properties. This dissertation then presents a development process and identifies two technologies, TLA+ and seL4, that can be …


Developing 5gl Concepts From User Interactions, David Stuckless Meyer Jul 2019

Developing 5gl Concepts From User Interactions, David Stuckless Meyer

Masters Theses

In the fulfilling of the contracts generated in Test Driven Development, a developer could be said to act as a constraint solver, similar to those used by a 5th Generation Language(5GL). This thesis presents the hypothesis that 5GL linguistic mechanics, such as facts, rules and goals, will be emergent in the communications of developer pairs performing Test Driven Development, validating that 5GL syntax is congruent with the ways that practitioners communicate. Along the way, nomenclatures and linguistic patterns may be observed that could inform the design of future 5GL languages.


Gold Tree Solar Farm - Machine Learning To Predict Solar Power Generation, Jonathon T. Scott Jun 2019

Gold Tree Solar Farm - Machine Learning To Predict Solar Power Generation, Jonathon T. Scott

Computer Science and Software Engineering

Solar energy causes a strain on the electrical grid because of the uncontrollable nature of the factors that affect power generation. Utilities are often required to balance solar generation facilities to meet consumer demand, which often includes the costly process of activating/deactivating a fossil fuel facility. Therefore, there is considerable interest in increasing the accuracy and the granularity of solar power generation predictions in order to reduce the cost of grid management. This project aims to evaluate how sky imaging technology may contribute to the accuracy of those predictions.


Planr.: Planar Learning Autonomous Navigation Robot, Gabrielle S. Santamorena, Daniel Kasman, Jesus Mercado, Ben Klave, Andrew Weisman, Anthony Fortner Jun 2019

Planr.: Planar Learning Autonomous Navigation Robot, Gabrielle S. Santamorena, Daniel Kasman, Jesus Mercado, Ben Klave, Andrew Weisman, Anthony Fortner

Computer Engineering

PLANR is a self-contained robot capable of mapping a space and generating 2D floor plans of a building while identifying objects of interest. It runs Robot Operating System (ROS) and houses four main hardware components. An Arduino Mega board handles the navigation, while an NVIDIA Jetson TX2, holds most of the processing power and runs ROS. An Orbbec Astra Pro stereoscopic camera is used for recognition of doors, windows and outlets and the RPLiDAR A3 laser scanner is able to give depth for wall detection and dimension measurements. The robot is intended to operate autonomously and without constant human monitoring …


Quorum Blockchain Stress Evaluation In Different Environments, Daniel P. Mera Jun 2019

Quorum Blockchain Stress Evaluation In Different Environments, Daniel P. Mera

Student Theses

In today’s world, the Blockchain technology is used for different purposes has brought an increment in the development of different Blockchain platforms, services, and utilities for storing data securely and efficiently. Quorum Blockchain, an Ethereum fork created by JPMorgan Chase, has placed itself in one of the widely used, efficient and trustful Blockchain platforms available today. Because of the importance which Quorum is contributing to the world, it is important to test and measure different aspects of the platform, not only to prove how efficient the software can be but as well as to have a clear view on what …


Identifying Fake News Using Emotion Analysis, Brady Gilleran May 2019

Identifying Fake News Using Emotion Analysis, Brady Gilleran

Computer Science and Computer Engineering Undergraduate Honors Theses

This paper presents research applying Emotional Analysis to “Fake News” and “Real News” articles to investigate whether or not there is a difference in the emotion used in these two types of news articles. The paper reports on a dataset for Fake and Real News that we created, and the natural language processing techniques employed to process the collected text. We use a lexicon that includes predefined words for eight emotions (anger, anticipation, disgust, fear, surprise, sadness, joy, trust) to measure the emotional impact in each of these eight dimensions. The results of the emotion analysis are used as features …


Towards A Prototype Platform For Ros Integrations On A Ground Robot, Taylor Joseph Linville Whitaker May 2019

Towards A Prototype Platform For Ros Integrations On A Ground Robot, Taylor Joseph Linville Whitaker

Graduate Theses and Dissertations

The intent of this work was to develop, evaluate, and demonstrate a prototype robot platform on which ROS integrations could be explored. With observations of features and requirements of existing industrial and service mobile ground robots, a platform was designed and outfitted with appropriate components to enable the most common operational-critical functionalities and account for unforeseen components and features. The resulting Arlo Demonstration Robot accommodates basic mapping, localization, and navigation in both two and three-dimensional space as well as additional safety and teleoperation features. The control system is centered around the Zybo Z7 FPGA SoC hosting a custom hardware design. …


The Self-Sufficient Ticketing Response System For The Rajant Support Network, Maria E. Lemaster Apr 2019

The Self-Sufficient Ticketing Response System For The Rajant Support Network, Maria E. Lemaster

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Science at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Maria E. Lemaster on April 26, 2019.


A Quantitative Analysis Of The Fusion Of 3-D Scanning Lidar Systems And 2-D Imaging Systems, Michael F. Milton Jr. Mar 2019

A Quantitative Analysis Of The Fusion Of 3-D Scanning Lidar Systems And 2-D Imaging Systems, Michael F. Milton Jr.

Theses and Dissertations

This research will demonstrate the feasibility of fusing the superior spatial resolution of a 2-D imaging system with the precise range to target information of a 3-D imaging system to create a LIDAR imaging system that can accurately find what and where a target is. The 3-D imaging system will use a scanning method as opposed to a flash method that has been used in similar research. The goal of this research is to improve performance of scanning LIDAR so it has better spatial resolution. The research in this thesis proves that incorporating 2-D imaging data into 3-D scanning LIDAR …


A Multi-Vehicle Cooperative Localization Approach For An Autonomy Framework, Edwin A. Mora Mar 2019

A Multi-Vehicle Cooperative Localization Approach For An Autonomy Framework, Edwin A. Mora

Theses and Dissertations

Offensive techniques produced by technological advancement present opportunities for adversaries to threaten the operational advantages of our joint and allied forces. Combating these new methodologies requires continuous and rapid development towards our own set of \game-changing" technologies. Through focused development of unmanned systems and autonomy, the Air Force can strive to maintain its technological superiority. Furthermore, creating a robust framework capable of testing and evaluating the principles that define autonomy allows for the exploration of future capabilities. This research presents development towards a hybrid reactive/deliberative architecture that will allow for the testing of the principles of task, cognitive, and peer …


A Framework For Cyber Vulnerability Assessments Of Infiniband Networks, Daryl W. Schmitt Mar 2019

A Framework For Cyber Vulnerability Assessments Of Infiniband Networks, Daryl W. Schmitt

Theses and Dissertations

InfiniBand is a popular Input/Output interconnect technology used in High Performance Computing clusters. It is employed in over a quarter of the world’s 500 fastest computer systems. Although it was created to provide extremely low network latency with a high Quality of Service, the cybersecurity aspects of InfiniBand have yet to be thoroughly investigated. The InfiniBand Architecture was designed as a data center technology, logically separated from the Internet, so defensive mechanisms such as packet encryption were not implemented. Cyber communities do not appear to have taken an interest in InfiniBand, but that is likely to change as attackers branch …


Unresolved Object Detection Using Synthetic Data Generation And Artificial Neural Networks, Yong U. Sinn Mar 2019

Unresolved Object Detection Using Synthetic Data Generation And Artificial Neural Networks, Yong U. Sinn

Theses and Dissertations

This research presents and solves constrained real-world problems of using synthetic data to train artificial neural networks (ANNs) to detect unresolved moving objects in wide field of view (WFOV) electro-optical/infrared (EO/IR) satellite motion imagery. Objectives include demonstrating the use of the Air Force Institute of Technology (AFIT) Sensor and Scene Emulation Tool (ASSET) as an effective tool for generating EO/IR motion imagery representative of real WFOV sensors and describing the ANN architectures, training, and testing results obtained. Deep learning using a 3-D convolutional neural network (3D ConvNet), long short term memory (LSTM) network, and U-Net are used to solve the …


A Stochastic Game Theoretical Model For Cyber Security, Michael T. Larkin Mar 2019

A Stochastic Game Theoretical Model For Cyber Security, Michael T. Larkin

Theses and Dissertations

The resiliency of systems integrated through cyber networks is of utmost importance due to the reliance on these systems for critical services such as industrial control systems, nuclear production, and military weapons systems. Current research in cyber resiliency remains largely limited to methodologies utilizing a singular technique that is predominantly theoretical with limited examples given. This research uses notional data in presenting a novel approach to cyber system analysis and network resource allocation by leveraging multiple techniques including game theory, stochastic processes, and mathematical programming. An operational network security problem consisting of 20 tactical normal form games provides an assessment …


Recipe For Disaster, Zac Travis Mar 2019

Recipe For Disaster, Zac Travis

MFA Thesis Exhibit Catalogs

Today’s rapid advances in algorithmic processes are creating and generating predictions through common applications, including speech recognition, natural language (text) generation, search engine prediction, social media personalization, and product recommendations. These algorithmic processes rapidly sort through streams of computational calculations and personal digital footprints to predict, make decisions, translate, and attempt to mimic human cognitive function as closely as possible. This is known as machine learning.

The project Recipe for Disaster was developed by exploring automation in technology, specifically through the use of machine learning and recurrent neural networks. These algorithmic models feed on large amounts of data as a …


My Baseball Collection App, Nicolas A. Parra Mar 2019

My Baseball Collection App, Nicolas A. Parra

Computer Science and Software Engineering

My Baseball Collection is an iOS application that aims to simplify the management and expansion of physical baseball trading card collections. The app allows users to digitize their baseball card collection by uploading images of cards they possess, creating a wishlist of cards they are seeking, and viewing the collections and wishlists of other users. This project seeks to provide quality of life improvements to those within the baseball card trading community and to further facilitate communication and trading in an online world.


Reviews To Rating Conversion And Analysis Using Machine Learning Techniques, Charitha Chanamolu Mar 2019

Reviews To Rating Conversion And Analysis Using Machine Learning Techniques, Charitha Chanamolu

Electronic Theses, Projects, and Dissertations

With the advent of technology in recent years, people depend more on online reviews to purchase a product. It is hard to determine whether the product is good or bad from hundreds of mixed reviews. Also, it is very time-consuming to read many reviews. So, opinion mining of reviews is necessary.

The main aim of this project is to convert the reviews of a product into a rating and to evaluate the ratings using machine learning algorithms such as Naïve Bayes and Support Vector Machine. In the process of converting the reviews to a rating, score words are created using …


Relevance Analysis For Document Retrieval, Eric Labouve Mar 2019

Relevance Analysis For Document Retrieval, Eric Labouve

Master's Theses

Document retrieval systems recover documents from a dataset and order them according to their perceived relevance to a user’s search query. This is a difficult task for machines to accomplish because there exists a semantic gap between the meaning of the terms in a user’s literal query and a user’s true intentions. Even with this ambiguity that arises with a lack of context, users still expect that the set of documents returned by a search engine is both highly relevant to their query and properly ordered. The focus of this thesis is on document retrieval systems that explore methods of …


Testing And Validation Framework For Closed-Loop Physiology Management Systems For Critical And Perioperative Care, Farooq M. Gessa Jan 2019

Testing And Validation Framework For Closed-Loop Physiology Management Systems For Critical And Perioperative Care, Farooq M. Gessa

Master’s Theses

The research aims at developing a framework for testing systems such as closed-loop physiology management systems to ensure that they are safe and effective for use with patients. Building medical devices that are both robust and safe is a challenge. There has been a tremendous increase in modernization and innovation of various medical systems but many of these systems either fail trials or are recalled due to safety issues.

Medical operation rooms require care teams responsible for monitoring the patients and other technical surgical devices. The care process requires a balancing administration that takes care of the drugs and fluids …


A Policy Mechanism For Federal Recommendation Of Security Standards For Mobile Devices That Conduct Transactions, Ariel Huckabay Jan 2019

A Policy Mechanism For Federal Recommendation Of Security Standards For Mobile Devices That Conduct Transactions, Ariel Huckabay

Electronic Theses and Dissertations

The proliferation of mobile devices in the BRIC countries has prompted them to develop policies to manage the security of these devices. In China, mobile devices are a primary tool for payments. As a result, China instituted in 2017 a cyber security policy that applies to mobile devices giving China broad authority to manage cyber threats. The United States has a similar need for a cyber policy. Mobile devices are likely to become a primary payment tool in the United States soon. DHS has also identified a need for more effective security policy in mobile devices for government operations. This …


On Learning And Visualizing Lexicographic Preference Trees, Ahmed S. Moussa Jan 2019

On Learning And Visualizing Lexicographic Preference Trees, Ahmed S. Moussa

UNF Graduate Theses and Dissertations

Preferences are very important in research fields such as decision making, recommendersystemsandmarketing. The focus of this thesis is on preferences over combinatorial domains, which are domains of objects configured with categorical attributes. For example, the domain of cars includes car objects that are constructed withvaluesforattributes, such as ‘make’, ‘year’, ‘model’, ‘color’, ‘body type’ and ‘transmission’.Different values can instantiate an attribute. For instance, values for attribute ‘make’canbeHonda, Toyota, Tesla or BMW, and attribute ‘transmission’ can haveautomaticormanual. To this end,thisthesis studiesproblemsonpreference visualization and learning for lexicographic preference trees, graphical preference models that often are compact over complex domains of objects built of …


A Topic Modeling Approach For Code Clone Detection, Mohammed Salman Khan Jan 2019

A Topic Modeling Approach For Code Clone Detection, Mohammed Salman Khan

UNF Graduate Theses and Dissertations

In this thesis work, the potential benefits of Latent Dirichlet Allocation (LDA) as a technique for code clone detection has been described. The objective is to propose a language-independent, effective, and scalable approach for identifying similar code fragments in relatively large software systems. The main assumption is that the latent topic structure of software artifacts gives an indication of the presence of code clones. It can be hypothesized that artifacts with similar topic distributions contain duplicated code fragments and to prove this hypothesis, an experimental investigation using multiple datasets from various application domains were conducted. In addition, CloneTM, an LDA-based …