Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Engineering

Efficient Low-Power Computing Cluster, Prentice Wongvibulsin Jun 2010

Efficient Low-Power Computing Cluster, Prentice Wongvibulsin

Computer Science and Software Engineering

The purpose of this project is to demonstrate the idea that clustering together less powerful but energy efficient machines that are commercially available can provide more efficient computing. With a third of energy consumption in the United States attributed to data centers, power efficiency has become an increasingly important topic in computing. Companies like Google have exceeded their grid’s capacities and built datacenters next to hydroelectric dams to reduce power loss from transmission and to increase their data center’s capacity. These experiments aspire to demonstrate a model for achieving a higher performance-per-watt in a larger scale using commercially available low-power …


Architecture, Inertial Navigation, And Payload Designs For Low-Cost Unmanned Aerial Vehicle-Based Personal Remote Sensing, Calvin Coopmans May 2010

Architecture, Inertial Navigation, And Payload Designs For Low-Cost Unmanned Aerial Vehicle-Based Personal Remote Sensing, Calvin Coopmans

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

This thesis presents work done towards a Personal Remote Sensing (PRS) system: small Unmanned Aerial Vehicles (UAVs) with electronic, control, and sensing subsystems. Based on papers presented to conferences (AutoTestCon2008 and MESA2009), as well as other work on PRS, multiple levels of engineering are detailed: complex multi-UAV data flow; attitude estimation filters; real-time microprocessor functionality; and small, mobile power systems. Wherever possible, Open-Source tools and designs have been used, modified, or studied, providing excellent cost to performance ratios in most cases. First, the overall PRS UAV architecture, AggieAir, is presented with a motivating examples (GhostEye and EagleEye camera payloads). Then, …


Development Of A Methodology For Customizing Insider Threat Auditing On A Linux Operating System, William T. Bai Mar 2010

Development Of A Methodology For Customizing Insider Threat Auditing On A Linux Operating System, William T. Bai

Theses and Dissertations

Insider threats can pose a great risk to organizations and by their very nature are difficult to protect against. Auditing and system logging are capabilities present in most operating systems and can be used for detecting insider activity. However, current auditing methods are typically applied in a haphazard way, if at all, and are not conducive to contributing to an effective insider threat security policy. This research develops a methodology for designing a customized auditing and logging template for a Linux operating system. An intent-based insider threat risk assessment methodology is presented to create use case scenarios tailored to address …