Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Cleveland State University

Computer Engineering

Articles 1 - 9 of 9

Full-Text Articles in Engineering

Improving The Security Of Mobile Devices Through Multi-Dimensional And Analog Authentication, Jonathan Gurary Jan 2018

Improving The Security Of Mobile Devices Through Multi-Dimensional And Analog Authentication, Jonathan Gurary

ETD Archive

Mobile devices are ubiquitous in today's society, and the usage of these devices for secure tasks like corporate email, banking, and stock trading grows by the day. The first, and often only, defense against attackers who get physical access to the device is the lock screen: the authentication task required to gain access to the device. To date mobile devices have languished under insecure authentication scheme offerings like PINs, Pattern Unlock, and biometrics-- or slow offerings like alphanumeric passwords. This work addresses the design and creation of five proof-of-concept authentication schemes that seek to increase the security of mobile authentication …


Real-Time Assessment And Visual Feedback For Patient Rehabilitation Using Inertial Sensors, Deepa Adinarayanan Jan 2018

Real-Time Assessment And Visual Feedback For Patient Rehabilitation Using Inertial Sensors, Deepa Adinarayanan

ETD Archive

Rehabilitation exercises needs have been continuously increasing and have been projected to increase in future as well based on its demand for aging population, recovering from surgery, injury and illness and the living and working lifestyle of the people. This research aims to tackle one of the most critical issues faced by the exercise administers-Adherence or Non-Adherence to Home Exercise problems especially has been a significant issue resulting in extensive research on the psychological analysis of people involved. In this research, a solution is provided to increase the adherence of such programs through an automated real-time assessment with constant visual …


Continuous Human Activity Tracking Over A Large Area With Multiple Kinect Sensors, Akshat C. Hans Jan 2018

Continuous Human Activity Tracking Over A Large Area With Multiple Kinect Sensors, Akshat C. Hans

ETD Archive

In recent years, researchers had been inquisitive about the use of technology to enhance the healthcare and wellness of patients with dementia. Dementia symptoms are associated with the decline in thinking skills and memory severe enough to reduce a person’s ability to pay attention and perform daily activities. Progression of dementia can be assessed by monitoring the daily activities of the patients. This thesis encompasses continuous localization and behavioral analysis of patient’s motion pattern over a wide area indoor living space using multiple calibrated Kinect sensors connected over the network. The skeleton data from all the sensor is transferred to …


From Blockchain To Internet-Based Voting, Elham Akbari Jan 2018

From Blockchain To Internet-Based Voting, Elham Akbari

ETD Archive

Blockchain has been one of the hottest topics among the state-of-the-art technologies. As the enabling technology for Bitcoin, the pioneering cryptocurrency, blockchain is an append-only distributed ledger that is virtually impossible to attack. Hence, blockchain holds great promises as the fundamental technology to enable Internet-based electronic voting. However, Internet-based voting has additional requirements than what monetary transactions such as Bitcoin have to offer. In this thesis, we discuss the key differences of a blockchain-based voting system with digital currencies. In this context we also highlight the requirements, review existing proposed solutions, and outline possible improvements. Specifically, we propose several schemes …


Intelligent Voice Activated Home Automation (Iva), Mrunal Dipakkumar Bhatt Jan 2016

Intelligent Voice Activated Home Automation (Iva), Mrunal Dipakkumar Bhatt

ETD Archive

This thesis presents the design of an original Intelligent Home Automation Architecture. My work was divided in two phases. The first portion was dedicated to acquiring a thorough understanding of the most successful and diffused Home-Automation commercial architectures. During this phase, I intended to gain a deep appreciation for the variety of organizations, capabilities, limitations, and potential areas of growth of the existing Home-Automation leading systems. In order to acquire this knowledge, I had to use a reverse engineering approach. The reason for using this methodology arises from the fact that all the products considered in this study are commercially …


Assembly Level Clock Glitch Insertion Into An Xmega Mcu, Nigamantha Gopala Chakravarthi Jan 2016

Assembly Level Clock Glitch Insertion Into An Xmega Mcu, Nigamantha Gopala Chakravarthi

ETD Archive

This thesis proposes clock-glitch fault injection technique to inject glitches into the clock signal running in a microcontroller unit and studying its effects on different assembly level instructions. It focusses mainly on the effect of clock glitches over the execution, sub-execution and pre-execution cycles of the test instructions and also finds the delay between the actual position of glitch insertion and the trigger being set for the glitch insertion. The instructions used in this work are provided by Atmel which classifies them according to their type of operation. These instructions are here further grouped depending on the number of clock …


Analysis Of Smartphone Traffic, Nicholas Luke Ruffing Jan 2015

Analysis Of Smartphone Traffic, Nicholas Luke Ruffing

ETD Archive

Smartphone reconnaissance, the first step to launch security attacks on a target smartphone, enables an adversary to tailor attacks by exploiting the known vulnerabilities of the target system. We investigate smartphone OS identification with encrypted traffic in this paper. Four identification algorithms based on the spectralanalysis of the encrypted traffic are proposed. The identification algorithms are designed for high identification accuracy by removing noise frequency components and for high efficiency in terms of computation complexity. We evaluate the identification algorithms with smartphone traffic collected over three months. The experimental results show that the algorithms can identify the smartphone OS accurately. …


Biogeography-Based Optimization For Combinatorial Problems And Complex Systems, Dawei Du Jan 2014

Biogeography-Based Optimization For Combinatorial Problems And Complex Systems, Dawei Du

ETD Archive

Biogeography-based optimization (BBO) is a heuristic evolutionary algorithm that has shown good performance on many problems. In this dissertation, three problem1s 1 are researched for BBO: convergence speed and optimal solution convergence of BBO,1 1BBO application to combinatorial problems, and BBO application to complex systems. The first problem is to analyze BBO from two perspectives: how the components of BBO affect its convergence speed and the reason that BBO converges to the optimal solution. For the first perspective, which is convergence speed, we analyze the two essential components of BBO -- population construction and information sharing. For the second perspective, …


Byzantine Fault Tolerance For Distributed Systems, Honglei Zhang Jan 2014

Byzantine Fault Tolerance For Distributed Systems, Honglei Zhang

ETD Archive

The growing reliance on online services imposes a high dependability requirement on the computer systems that provide these services. Byzantine fault tolerance (BFT) is a promising technology to solidify such systems for the much needed high dependability. BFT employs redundant copies of the servers and ensures that a replicated system continues providing correct services despite the attacks on a small portion of the system. In this dissertation research, I developed novel algorithms and mechanisms to control various types of application nondeterminism and to ensure the long-term reliability of BFT systems via a migration-based proactive recovery scheme. I also investigated a …