Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Massachusetts Amherst (6)
- California Polytechnic State University, San Luis Obispo (4)
- California State University, San Bernardino (2)
- Kennesaw State University (2)
- Michigan Technological University (2)
-
- The University of Akron (2)
- University of Arkansas, Fayetteville (2)
- University of New Mexico (2)
- Western Michigan University (2)
- Western University (2)
- Air Force Institute of Technology (1)
- American University in Cairo (1)
- Bard College (1)
- Bentley University (1)
- Chulalongkorn University (1)
- City University of New York (CUNY) (1)
- DePaul University (1)
- Harrisburg University of Science and Technology (1)
- Louisiana State University (1)
- Southern Methodist University (1)
- University of Kentucky (1)
- University of Mississippi (1)
- Virginia Commonwealth University (1)
- Washington University in St. Louis (1)
- West Virginia University (1)
- Keyword
-
- Security (3)
- Blockchain (2)
- Energy efficiency (2)
- IoT (2)
- Microarchitecture (2)
-
- 3D XPoint (1)
- 3D convolution (1)
- Access control (1)
- Ai (1)
- Android (1)
- Anomaly (1)
- Audio (1)
- Audit evidence (1)
- Audit risk (1)
- Auditing standards (1)
- Auditors (1)
- Authentication (1)
- Autoencoders (1)
- Avionics (1)
- Biometric (1)
- Blackchain (1)
- Business and Management (1)
- CPU instruction set simulators (1)
- CPU-FPGA platform (1)
- Cache optimization (1)
- Caching (1)
- Capacitive sensing (1)
- Classifier (1)
- Cloud-scale (1)
- Computer Architecture (1)
- Publication
-
- Doctoral Dissertations (4)
- Computer Engineering (3)
- Theses and Dissertations (3)
- Dissertations (2)
- Dissertations and Theses (2)
-
- Dissertations, Master's Theses and Master's Reports (2)
- Electronic Theses, Projects, and Dissertations (2)
- Electronic Thesis and Dissertation Repository (2)
- Graduate Theses and Dissertations (2)
- Masters Theses (2)
- Williams Honors College, Honors Research Projects (2)
- 2020 (1)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (1)
- College of Computing and Digital Media Dissertations (1)
- Computer Science ETDs (1)
- Graduate Theses, Dissertations, and Problem Reports (1)
- Honors Theses (1)
- LSU Doctoral Dissertations (1)
- Master of Science in Computer Science Theses (1)
- Master of Science in Information Technology Theses (1)
- Master's Theses (1)
- Mathematics & Statistics ETDs (1)
- McKelvey School of Engineering Theses & Dissertations (1)
- Operations Research and Engineering Management Theses and Dissertations (1)
- Senior Projects Spring 2020 (1)
- Theses and Dissertations--Computer Science (1)
Articles 1 - 30 of 41
Full-Text Articles in Engineering
Network Virtualization And Emulation Using Docker, Openvswitch And Mininet-Based Link Emulation, Narendra Prabhu
Network Virtualization And Emulation Using Docker, Openvswitch And Mininet-Based Link Emulation, Narendra Prabhu
Masters Theses
With the advent of virtualization and artificial intelligence, research on networked systems has progressed substantially. As the technology progresses, we expect a boom in not only the systems research but also in the network of systems domain. It is paramount that we understand and develop methodologies to connect and communicate among the plethora of devices and systems that exist today. One such area is mobile ad-hoc and space communication, which further complicates the task of networking due to myriad of environmental and physical conditions. Developing and testing such systems is an important step considering the large investment required to build …
Optimal Order Assignment With Minimum Wage Consideration (Ooamwc), Hakem Alazmi
Optimal Order Assignment With Minimum Wage Consideration (Ooamwc), Hakem Alazmi
Master of Science in Computer Science Theses
While the application of crowdsourcing has increased over the years, the technology experiences various issues during implementation. Examples of some of the issues that affect crowdsourcing include task assignment, profit maximizations, as well as time window issues. In some instances addressing some of the issues results in the other issues being overlooked. An example is when assigning tasks to workers, the profits of the workers might not be considered and this ends up affecting the profit maximization aspect. Various algorithms have been proposed to address the task assignment, profit maximizations, and time window issues. However, these algorithms address the issues …
Ppmexplorer: Using Information Retrieval, Computer Vision And Transfer Learning Methods To Index And Explore Images Of Pompeii, Cindy Roullet
Ppmexplorer: Using Information Retrieval, Computer Vision And Transfer Learning Methods To Index And Explore Images Of Pompeii, Cindy Roullet
Graduate Theses and Dissertations
In this dissertation, we present and analyze the technology used in the making of PPMExplorer: Search, Find, and Explore Pompeii. PPMExplorer is a software tool made with data extracted from the Pompei: Pitture e Mosaic (PPM) volumes. PPM is a valuable set of volumes containing 20,000 historical annotated images of the archaeological site of Pompeii, Italy accompanied by extensive captions. We transformed the volumes from paper, to digital, to searchable. PPMExplorer enables archaeologist researchers to conduct and check hypotheses on historical findings. We present a theory that such a concept is possible by leveraging computer generated correlations between artifacts using …
Docs_On_Blocks – A Defense In Depth Strategy For E-Healthcare, Saad Mohammed
Docs_On_Blocks – A Defense In Depth Strategy For E-Healthcare, Saad Mohammed
Electronic Theses, Projects, and Dissertations
With the increase in the data breaches and cyber hacks, organizations have come to realize that cyber security alone would not help as the attacks are becoming more sophisticated and complex than ever. E-Healthcare industry has shown a promising improvement in terms of security over the past, but the threat remains. Thus, the E-Healthcare industries are aiming towards a Defense in Depth Strategy approach.
The project here describes how a Defense in Depth Strategy for E-Healthcare system can provide an environment for better security of the data and peer-to-peer interaction with stakeholders. The legacy systems have at some point failed …
Blockchain Based Communication Architectures With Applications To Private Security Networks, Ashley N. Mayle
Blockchain Based Communication Architectures With Applications To Private Security Networks, Ashley N. Mayle
Computer Science ETDs
Existing communication protocols in security networks are highly centralized. While this naively makes the controls easier to physically secure, external actors require fewer resources to disrupt the system because there are fewer points in the system can be interrupted without the entire system failing. We present a solution to this problem using a proof-of-work-based blockchain implementation built on MultiChain. We construct a test-bed network containing visual imagers and microwave sensor information. These data types are ubiquitous in perimeter security systems and allow a realistic representation of a real-world network architecture. The cameras in this system use an object detection algorithm …
Dbknot: A Transparent And Seamless, Pluggable Tamper Evident Database, Islam Khalil
Dbknot: A Transparent And Seamless, Pluggable Tamper Evident Database, Islam Khalil
Theses and Dissertations
Database integrity is crucial to organizations that rely on databases of important data. They suffer from the vulnerability to internal fraud. Database tampering by internal malicious employees with high technical authorization to their infrastructure or even compromised by externals is one of the important attack vectors.
This thesis addresses such challenge in a class of problems where data is appended only and is immutable. Examples of operations where data does not change is a) financial institutions (banks, accounting systems, stock market, etc., b) registries and notary systems where important data is kept but is never subject to change, and c) …
Blockchain And Its Transformational Impact To Global Business, Mohammed Qaudeer
Blockchain And Its Transformational Impact To Global Business, Mohammed Qaudeer
Operations Research and Engineering Management Theses and Dissertations
The advent of internet to the public back in 1994 resulted in the 4th industrial revolution disrupting and transforming business and communication models. As much as the transformation changed our lives and experiences, it has resulted in centralized models like Amazon and Facebook. It also resulted in exponential growth of Fraud, Identity theft, and lack of trust. Blockchain is considered an emerging technology of this era, which will trigger the 5th industrial revolution enabling another massive storm of disruptive transformation completely changing the current business models based on trust, security, collaboration and crypto currency. As the evolution of blockchain technology …
Domestic Violence In Pakistan From 1990 – 2020: A Mixed Method Approach, Hamida Khatri
Domestic Violence In Pakistan From 1990 – 2020: A Mixed Method Approach, Hamida Khatri
Dissertations and Theses
This study assessed domestic violence from the perspective of the victims who experienced trauma due to sexual, emotional, and psychological abuse in Pakistan.
Software Quality Control Through Formal Method, Jialiang Chang
Software Quality Control Through Formal Method, Jialiang Chang
Dissertations
With the improvement of theories in the software industry, software quality is becoming the most significant part of the procedure of software development. Due to the implicit and explicit vulnerabilities inside the software, software quality control has caught more researchers and engineers’ attention and interest.
Current research on software quality control and verification are involving various manual and automated testing methods, which can be categorized into static analysis and dynamic analysis. However, both of them have their own disadvantages. With static analysis methods, inputs will not be taken into consideration because the software system isn’t executed so we do not …
Investigating Single Precision Floating General Matrix Multiply In Heterogeneous Hardware, Steven Harris
Investigating Single Precision Floating General Matrix Multiply In Heterogeneous Hardware, Steven Harris
McKelvey School of Engineering Theses & Dissertations
The fundamental operation of matrix multiplication is ubiquitous across a myriad of disciplines. Yet, the identification of new optimizations for matrix multiplication remains relevant for emerging hardware architectures and heterogeneous systems. Frameworks such as OpenCL enable computation orchestration on existing systems, and its availability using the Intel High Level Synthesis compiler allows users to architect new designs for reconfigurable hardware using C/C++. Using the HARPv2 as a vehicle for exploration, we investigate the utility of several of the most notable matrix multiplication optimizations to better understand the performance portability of OpenCL and the implications for such optimizations on this and …
Auditing Database Systems Through Forensic Analysis, James Wagner
Auditing Database Systems Through Forensic Analysis, James Wagner
College of Computing and Digital Media Dissertations
The majority of sensitive and personal data is stored in a number of different Database Management Systems (DBMS). For example, Oracle is frequently used to store corporate data, MySQL serves as the back-end storage for many webstores, and SQLite stores personal data such as SMS messages or browser bookmarks. Consequently, the pervasive use of DBMSes has led to an increase in the rate at which they are exploited in cybercrimes. After a cybercrime occurs, investigators need forensic tools and methods to recreate a timeline of events and determine the extent of the security breach. When a breach involves a compromised …
Design And Implementation Of Path Finding And Verification In The Internet, Hao Cai
Design And Implementation Of Path Finding And Verification In The Internet, Hao Cai
Doctoral Dissertations
In the Internet, network traffic between endpoints typically follows one path that is determined by the control plane. Endpoints have little control over the choice of which path their network traffic takes and little ability to verify if the traffic indeed follows a specific path. With the emergence of software-defined networking (SDN), more control over connections can be exercised, and thus the opportunity for novel solutions exists. However, there remain concerns about the attack surface exposed by fine-grained control, which may allow attackers to inject and redirect traffic. To address these opportunities and concerns, we consider two specific challenges: (1) …
Sundown: Model-Driven Per-Panel Solar Anomaly Detection For Residential Arrays, Menghong Feng
Sundown: Model-Driven Per-Panel Solar Anomaly Detection For Residential Arrays, Menghong Feng
Masters Theses
There has been significant growth in both utility-scale and residential-scale solar installa- tions in recent years, driven by rapid technology improvements and falling prices. Unlike utility-scale solar farms that are professionally managed and maintained, smaller residential- scale installations often lack sensing and instrumentation for performance monitoring and fault detection. As a result, faults may go undetected for long periods of time, resulting in generation and revenue losses for the homeowner. In this thesis, we present SunDown, a sensorless approach designed to detect per-panel faults in residential solar arrays. SunDown does not require any new sensors for its fault detection and …
Otter Debugger, Keefe Johnson
Otter Debugger, Keefe Johnson
Computer Engineering
This project is a debugger and programmer for the OTTER CPU, the implementation of the RISC-V ISA used by Cal Poly to teach computer architecture and assembly language in CPE 233/333 and usually implemented on the Basys3 FPGA development board. With this tool, students can quickly program their OTTER with a new/revised RISC-V program binary without resynthesizing the entire FPGA design. They can then use the debugger from a PC to pause/continue/single-step execution and set breakpoints, while inspecting and modifying register and memory contents. This enables real-time debugging of OTTER projects involving custom hardware such as a keyboard and VGA …
Otter Vector Extension, Alexis A. Peralta
Otter Vector Extension, Alexis A. Peralta
Computer Engineering
This paper offers an implementation of a subset of the "RISC-V 'V' Vector Extension", v0.7.x. The "RISC-V 'V' Vector Extension" is the proposed vector instruction set for RISC-V open-source architecture. Vectors are inherently data-parallel, allowing for significant performance increases. Vectors have applications in fields such as cryptography, graphics, and machine learning. A vector processing unit was added to Cal Poly's RISC-V multi-cycle architecture, known as the OTTER. Computationally intensive programs running on the OTTER Vector Extension ran over three times faster when compared to the baseline multi-cycle implementation. Memory intensive applications saw similar performance increases.
Bootstrapping Massively Multiplayer Online Role Playing Games, Mitchell Miller
Bootstrapping Massively Multiplayer Online Role Playing Games, Mitchell Miller
Master's Theses
Massively Multiplayer Online Role Playing Games (MMORPGs) are a prominent genre in today's video game industry with the most popular MMORPGs generating billions of dollars in revenue and attracting millions of players. As they have grown, they have become a major target for both technological research and sociological research. In such research, it is nearly impossible to reach the same player scale from any self-made technology or sociological experiments. This greatly limits the amount of control and topics that can be explored. In an effort to make up a lacking or non-existent player-base for custom-made MMORPG research scenarios A.I. agents, …
Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh
Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh
Electronic Thesis and Dissertation Repository
Rapid growth in numbers of connected devices, including sensors, mobile, wearable, and other Internet of Things (IoT) devices, is creating an explosion of data that are moving across the network. To carry out machine learning (ML), IoT data are typically transferred to the cloud or another centralized system for storage and processing; however, this causes latencies and increases network traffic. Edge computing has the potential to remedy those issues by moving computation closer to the network edge and data sources. On the other hand, edge computing is limited in terms of computational power and thus is not well suited for …
Stay-At-Home Motor Rehabilitation: Optimizing Spatiotemporal Learning On Low-Cost Capacitive Sensor Arrays, Reid Sutherland
Stay-At-Home Motor Rehabilitation: Optimizing Spatiotemporal Learning On Low-Cost Capacitive Sensor Arrays, Reid Sutherland
Graduate Theses and Dissertations
Repeated, consistent, and precise gesture performance is a key part of recovery for stroke and other motor-impaired patients. Close professional supervision to these exercises is also essential to ensure proper neuromotor repair, which consumes a large amount of medical resources. Gesture recognition systems are emerging as stay-at-home solutions to this problem, but the best solutions are expensive, and the inexpensive solutions are not universal enough to tackle patient-to-patient variability. While many methods have been studied and implemented, the gesture recognition system designer does not have a strategy to effectively predict the right method to fit the needs of a patient. …
Minet Magnetic Indoor Localization, Michael Drake
Minet Magnetic Indoor Localization, Michael Drake
Honors Theses
Indoor localization is a modern problem of computer science that has no unified solution, as there are significant trade-offs involved with every technique. Magnetic localization, though less popular than WiFi signal based localization, is a sub-field that is rooted in infrastructure-free design, which can allow universal setup. Magnetic localization is also often paired with probabilistic programming, which provides a powerful method of estimation, given a limited understanding of the environment. This thesis presents Minet, which is a particle filter based localization system using the Earth's geomagnetic field. It explores the novel idea of state space limitation as a method of …
Nonlinear Least Squares 3-D Geolocation Solutions Using Time Differences Of Arrival, Michael V. Bredemann
Nonlinear Least Squares 3-D Geolocation Solutions Using Time Differences Of Arrival, Michael V. Bredemann
Mathematics & Statistics ETDs
This thesis uses a geometric approach to derive and solve nonlinear least squares minimization problems to geolocate a signal source in three dimensions using time differences of arrival at multiple sensor locations. There is no restriction on the maximum number of sensors used. Residual errors reach the numerical limits of machine precision. Symmetric sensor orientations are found that prevent closed form solutions of source locations lying within the null space. Maximum uncertainties in relative sensor positions and time difference of arrivals, required to locate a source within a maximum specified error, are found from these results. Examples illustrate potential requirements …
A Framework To Detect Presentation Attacks, Laeticia Etienne
A Framework To Detect Presentation Attacks, Laeticia Etienne
Master of Science in Information Technology Theses
Biometric-based authentication systems are becoming the preferred choice to replace password-based authentication systems. Among several variations of biometrics (e.g., face, eye, fingerprint), iris-based authentication is commonly used in every day applications. In iris-based authentication systems, iris images from legitimate users are captured and certain features are extracted to be used for matching during the authentication process. Literature works suggest that iris-based authentication systems can be subject to presentation attacks where an attacker obtains printed copy of the victim’s eye image and displays it in front of an authentication system to gain unauthorized access. Such attacks can be performed by displaying …
Efficient Hardware/Software Partitioning Techniques For A Cloud-Scale Cpu-Fpga Platform, Samah Ziyad Rahamneh
Efficient Hardware/Software Partitioning Techniques For A Cloud-Scale Cpu-Fpga Platform, Samah Ziyad Rahamneh
Dissertations
The diversity of workload characteristics has stimulated the deployment of heterogeneous architectures to accommodate workloads’ requirements disparity in cloud data centers. In heterogeneous computing, co-processors are utilized to support Central Processing Units (CPUs) in fulfilling workload demands. Field Programmable Gate Arrays (FPGAs) have advantages over other accelerators because of their power, performance and re-configurability benefits. In order to achieve the most benefit of a heterogeneous platform, efficient partitioning of workload between the CPU and the FPGA is a crucial demand.
This dissertation first presents a design and implementation of cooperative CPU-FPGA execution techniques, which include code and data partitioning, of …
Towards Optimized Traffic Provisioning And Adaptive Cache Management For Content Delivery, Aditya Sundarrajan
Towards Optimized Traffic Provisioning And Adaptive Cache Management For Content Delivery, Aditya Sundarrajan
Doctoral Dissertations
Content delivery networks (CDNs) deploy hundreds of thousands of servers around the world to cache and serve trillions of user requests every day for a diverse set of content such as web pages, videos, software downloads and images. In this dissertation, we propose algorithms to provision traffic across cache servers and manage the content they host to achieve performance objectives such as maximizing the cache hit rate, minimizing the bandwidth cost of the network and minimizing the energy consumption of the servers. Traffic provisioning is the process of determining the set of content domains hosted on the servers. We propose …
Trustworthy Systems And Protocols For The Internet Of Things, Arman Pouraghily
Trustworthy Systems And Protocols For The Internet Of Things, Arman Pouraghily
Doctoral Dissertations
Processor-based embedded systems are integrated into many aspects of everyday life such as industrial control, automotive systems, healthcare, the Internet of Things, etc. As Moore’s law progresses, these embedded systems have moved from simple microcontrollers to full-scale embedded computing systems with multiple processor cores and operating systems support. At the same time, the security of these devices has also become a key concern. Our main focus in this work is the security and privacy of the embedded systems used in IoT systems. In the first part of this work, we take a look at the security of embedded systems from …
A Study Of Execution Performance For Rust-Based Object Vs Data Oriented Architectures, Joseph A. Vagedes
A Study Of Execution Performance For Rust-Based Object Vs Data Oriented Architectures, Joseph A. Vagedes
Theses and Dissertations
To investigate the Data-Oriented Design (DOD) paradigm, in particular, an architecture built off its principles: the Entity-Component-System (ECS). ECS is commonly used by video game engines due to its ability to store data in a way that is optimal for the cache to access. Additionally, the structure of this paradigm produces a code-base that is simple to parallelize as the workload can be distributed across a thread-pool based on the data used with little to no need for data safety measures such as mutexes and locks. A final benefit, although not easily measured, is that the DOD paradigm produces a …
Qoe-Aware Content Distribution Systems For Adaptive Bitrate Video Streaming, Divyashri Bhat
Qoe-Aware Content Distribution Systems For Adaptive Bitrate Video Streaming, Divyashri Bhat
Doctoral Dissertations
A prodigious increase in video streaming content along with a simultaneous rise in end system capabilities has led to the proliferation of adaptive bit rate video streaming users in the Internet. Today, video streaming services range from Video-on-Demand services like traditional IP TV to more recent technologies such as immersive 3D experiences for live sports events. In order to meet the demands of these services, the multimedia and networking research community continues to strive toward efficiently delivering high quality content across the Internet while also trying to minimize content storage and delivery costs. The introduction of flexible and adaptable technologies …
Understanding And Optimizing Flash-Based Key-Value Systems In Data Centers, Yichen Jia
Understanding And Optimizing Flash-Based Key-Value Systems In Data Centers, Yichen Jia
LSU Doctoral Dissertations
Flash-based key-value systems are widely deployed in today’s data centers for providing high-speed data processing services. These systems deploy flash-friendly data structures, such as slab and Log Structured Merge(LSM) tree, on flash-based Solid State Drives(SSDs) and provide efficient solutions in caching and storage scenarios. With the rapid evolution of data centers, there appear plenty of challenges and opportunities for future optimizations.
In this dissertation, we focus on understanding and optimizing flash-based key-value systems from the perspective of workloads, software, and hardware as data centers evolve. We first propose an on-line compression scheme, called SlimCache, considering the unique characteristics of key-value …
Web Application For Movie Performance Prediction, Devalkumar Patel
Web Application For Movie Performance Prediction, Devalkumar Patel
Electronic Theses, Projects, and Dissertations
This is an amazing and unique idea for the web application. The purpose of this application is to address those movie lover people who is always in a hurry to visit the theatre to watch upcoming movies irrespective of which star cast is in it. This system is a mixture of desktop applications, python libraries, and simple math arithmetic. The application can be used by anyone which is ultimately helping them to decide, either they should watch the movie or not. The user just submits the name of the movie. This application is developed in Visual Studio 2019 for functioning …
Tiny Disco: A Cost-Effective, High-Fidelity Wireless Audio System, Luke Martin Liberatore
Tiny Disco: A Cost-Effective, High-Fidelity Wireless Audio System, Luke Martin Liberatore
Computer Engineering
The Tiny Disco is a WiFi based concert system, featuring improvements on popular “Silent Disco” concerts. Rather than being tied to compression and bandwidth restrictions present in traditional silent disco systems, the Tiny Disco system can deliver 320kbps+ audio quality, and allows listeners to bring their own headphones, further lending to the high quality audio experience.
Tiny Disco uses a Raspberry Pi as the audio server, and Espressif ESP32 microcontrollers as audio receivers/clients. The Tiny Disco is primarily geared toward smaller concerts and niche events where audio quality is valued, though due to its WiFi-based architecture, it can be expanded …
A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, Amir Haghighatimaleki
A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, Amir Haghighatimaleki
Electronic Thesis and Dissertation Repository
Through social media platforms, massive amounts of data are being produced. Twitter, as one such platform, enables users to post “tweets” on an unprecedented scale. Once analyzed by machine learning (ML) techniques and in aggregate, Twitter data can be an invaluable resource for gaining insight. However, when applied to real-time data streams, due to covariate shifts in the data (i.e., changes in the distributions of the inputs of ML algorithms), existing ML approaches result in different types of biases and provide uncertain outputs. This thesis describes a visual analytics system (i.e., a tool that combines data visualization, human-data interaction, and …