Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (73)
- Electrical and Computer Engineering (63)
- Physical Sciences and Mathematics (46)
- Computer Sciences (35)
- Digital Communications and Networking (33)
-
- Systems and Communications (18)
- Social and Behavioral Sciences (11)
- Earth Sciences (10)
- Environmental Sciences (10)
- Soil Science (10)
- Sustainability (9)
- Water Resource Management (9)
- Computer and Systems Architecture (7)
- Other Environmental Sciences (7)
- Databases and Information Systems (6)
- Operations Research, Systems Engineering and Industrial Engineering (6)
- Signal Processing (6)
- Artificial Intelligence and Robotics (5)
- Data Storage Systems (5)
- Electrical and Electronics (5)
- Information Security (5)
- Mechanical Engineering (5)
- Other Computer Engineering (5)
- Engineering Education (4)
- Library and Information Science (4)
- Theory and Algorithms (4)
- Civil and Environmental Engineering (3)
- Data Science (3)
- Hardware Systems (3)
- Institution
-
- Purdue University (13)
- Technological University Dublin (6)
- TÜBİTAK (6)
- Embry-Riddle Aeronautical University (5)
- Florida International University (5)
-
- University of Nebraska - Lincoln (5)
- University of South Carolina (5)
- Air Force Institute of Technology (4)
- California Polytechnic State University, San Luis Obispo (4)
- Selected Works (4)
- University of Kentucky (4)
- Zayed University (4)
- Missouri University of Science and Technology (3)
- Universitas Negeri Yogyakarta (3)
- University of Texas at El Paso (3)
- Western University (3)
- Wright State University (3)
- Brigham Young University (2)
- Edith Cowan University (2)
- Faculty of Engineering, Mansoura University (2)
- Georgia Southern University (2)
- Old Dominion University (2)
- Tashkent State Technical University (2)
- University for Business and Technology in Kosovo (2)
- University of Massachusetts Amherst (2)
- University of New Haven (2)
- University of New Mexico (2)
- American University in Cairo (1)
- Boise State University (1)
- California State University, San Bernardino (1)
- Publication Year
- Publication
-
- Theses and Dissertations (11)
- Faculty Publications (10)
- Publications (7)
- Turkish Journal of Electrical Engineering and Computer Sciences (6)
- FIU Electronic Theses and Dissertations (5)
-
- All Works (4)
- Electronic Theses and Dissertations (4)
- Articles (3)
- Browse all Theses and Dissertations (3)
- Electronic Thesis and Dissertation Repository (3)
- Elinvo (Electronics, Informatics, and Vocational Education) (3)
- Library Philosophy and Practice (e-journal) (3)
- Open Access Theses & Dissertations (3)
- Chemical Technology, Control and Management (2)
- Dissertations (2)
- Doctoral Dissertations (2)
- Electrical & Computer Engineering and Computer Science Faculty Publications (2)
- Electrical and Computer Engineering ETDs (2)
- Electrical and Computer Engineering Faculty Publications (2)
- Electrical and Computer Engineering Faculty Research & Creative Works (2)
- Information Science Faculty Publications (2)
- Mansoura Engineering Journal (2)
- Master's Theses (2)
- Research outputs 2022 to 2026 (2)
- The Summer Undergraduate Research Fellowship (SURF) Symposium (2)
- 11th IMHRC Proceedings (Milwaukee, Wisconsin. USA – 2010) (1)
- Al-Bahir Journal for Engineering and Pure Sciences (1)
- All ETDs from UAB (1)
- Associate Professor Katina Michael (1)
- Bagley College of Engineering Publications and Scholarship (1)
- Publication Type
Articles 1 - 30 of 129
Full-Text Articles in Engineering
Shape Memory Alloy Capsule Micropump For Drug Delivery Applications, Youssef Mohamed Kotb
Shape Memory Alloy Capsule Micropump For Drug Delivery Applications, Youssef Mohamed Kotb
Theses and Dissertations
Implantable drug delivery devices have many benefits over traditional drug administration techniques and have attracted a lot of attention in recent years. By delivering the medication directly to the tissue, they enable the use of larger localized concentrations, enhancing the efficacy of the treatment. Passive-release drug delivery systems, one of the various ways to provide medication, are great inventions. However, they cannot dispense the medication on demand since they are nonprogrammable. Therefore, active actuators are more advantageous in delivery applications. Smart material actuators, however, have greatly increased in popularity for manufacturing wearable and implantable micropumps due to their high energy …
Security Fusion Method Of Physical Fitness Training Data Based On The Internet Of Things, Bin Zhou
Security Fusion Method Of Physical Fitness Training Data Based On The Internet Of Things, Bin Zhou
Turkish Journal of Electrical Engineering and Computer Sciences
Physical fitness training, an important way to improve physical fitness, is the basic guarantee for forming combat effectiveness. At present, the evaluation types of physical fitness training are mostly conducted manually. It has problems such as low efficiency, high consumption of human and material resources, and subjective factors affecting the evaluation results. ”Internet+” has greatly expanded the traditional network from the perspective of technological convergence and network coverage objects. It has expedited and promoted the rapid development of Internet of Things (IoT) technology and its applications. The IoT with many sensor nodes shows the characteristics of acquisition information redundancy, node …
Improving Wifi Sensor Network Security Through Unassociated Device Communication Using Wireless Latency Shift Keying, Jacob Edward Johnson
Improving Wifi Sensor Network Security Through Unassociated Device Communication Using Wireless Latency Shift Keying, Jacob Edward Johnson
Theses and Dissertations
IEEE 802.11 (WiFi) only has two modes of trust--complete trust or complete untrust. The lack of nuance leaves no room for sensors that a user does not fully trust, but wants to connect to their network, such as a WiFi sensor. Solutions exist, but they require advanced knowledge of network administration. We solve this problem by introducing a new way of modulating data in the latency of the network, called Latency Shift Keying. We use specific characteristics of the WiFi protocol to carefully control the latency of just one device on the network. We build a transmitter, receiver, and modulation …
Smart Agriculture Based On Iot Using Drones: A Survey, Shymaa G. Eladl, Hanaa Y. Zaineldin, Amira Y. Haikal, Mahmoud M. Saafan
Smart Agriculture Based On Iot Using Drones: A Survey, Shymaa G. Eladl, Hanaa Y. Zaineldin, Amira Y. Haikal, Mahmoud M. Saafan
Mansoura Engineering Journal
Researchers have studied the potential of unmanned aerial vehicles (UAVs) for real-time visual data acquisition and processing using potent deep learning (DL) algorithms over the past few decades. In this regard, drone use in smart cities has become one of the most common uses for them in recent years. UAVs and the Internet of Things (IoTs) are two popular technologies being used in smart agriculture that are ushering in a new era of agriculture by replacing traditional farming methods. The combination of drones and IoT has the potential to drastically change our lives through real-time data collection and analysis that …
Securing Internet Of Things (Iot) Data Storage, Savannah Malo
Securing Internet Of Things (Iot) Data Storage, Savannah Malo
Honors Theses and Capstones
Internet of Things (IoT) devices are commonly known to be susceptible to security attacks, which can lead to the leakage, theft, or erasure of data. Despite similar attack methods used on conventional technologies, IoT devices differ in how they consist of a small amount of hardware, limited networking capability, and utilize NoSQL databases. IoT solutions prefer NoSQL databases since they are compatible for larger datasets, unstructured and time-series data. However, these implementations are less likely to employ critical security features, like authentication, authorization, and encryption. The purpose of this project is to understand why those security measures are not strictly …
Multi-Dimensional Qos And Collaborative Mac Layer Design For Dense, Diverse, And Dynamic Iot Network, Jiyang Bai
Multi-Dimensional Qos And Collaborative Mac Layer Design For Dense, Diverse, And Dynamic Iot Network, Jiyang Bai
Electronic Thesis and Dissertation Repository
With the ubiquitous proliferation of Internet of Thing (IoT) devices, Access Points (APs) of future Wireless Fidelity (Wi-Fi) networks are expected to support dense Stations (STAs) with diverse Quality-of-Service (QoS) requirements under dynamic channel conditions. On account of high access collision and optimization problem complexity, the performance degradation brings new challenges to the existing Media Access Control (MAC) layer design in Wi-Fi. This thesis proposes novel technologies to enable low-latency high-performance MAC layer designs, which support dense access of STAs with real-time solutions of resource allocation and link adaptation problems. Both grouping and collaborative architectures are utilized based on game …
Renovating The Ipmu Via Internet Of Things For Pollutant Emission Estimations In Poultry Facilities, Joshua Dotto
Renovating The Ipmu Via Internet Of Things For Pollutant Emission Estimations In Poultry Facilities, Joshua Dotto
Department of Biological Systems Engineering: Dissertations and Theses
The emissions of ammonia (NH3), particulate matter (PM2.5), and carbon dioxide (CO2) are major concerns in poultry facilities. They can pose environmental concerns and nuances. Robust and affordable measurement systems are needed to accurately measure in-barn concentrations and quantify the emissions.
The Intelligent Portable Monitoring Unit (iPMU or PMU3) developed in 2016 was reconstructed into PMU4 to include upgraded NH3 and PM2.5 sensors and wireless connectivity for a low-cost, robust, and accurate air quality monitoring device with contactless data transfer using the concept of Internet of Things (IoT). In addition, a user-friendly …
Digitizing Work Instructions Through Technology Using Internet Of Things (Iot), Priscila Balanzar Almazan
Digitizing Work Instructions Through Technology Using Internet Of Things (Iot), Priscila Balanzar Almazan
Open Access Theses & Dissertations
Smart manufacturing is fundamentally changing the industry so fast; for this reason, modern industrial processes must be intelligently and digitally automated. Digitalization of work instructions has taken an important role in improving the efficiency of industry and traditional manufacturing processes. TULIP is a frontline operations platform that allows users to digitize operations using friendly apps that operators can deploy in their daily shopfloor processes. This Industry 4.0 tool is important because it optimizes the development of processes by enabling IoT with the use of sensors, connectors, and machines to collect real-time production data. In this research, a manufacturing station equipped …
Enhanced Iot-Based Electrocardiogram Monitoring System With Deep Learning, Jian Ni
Enhanced Iot-Based Electrocardiogram Monitoring System With Deep Learning, Jian Ni
UNLV Theses, Dissertations, Professional Papers, and Capstones
Due to the rapid development of computing and sensing technologies, Internet of Things (IoT)-based cardiac monitoring plays a crucial role in providing patients with cost-efficient solutions for long-term, continuous, and pervasive electrocardiogram (ECG) monitoring outside a hospital setting. In a typical IoT-based ECG monitoring system, ECG signals are picked up by sensors located on the edge, and then uploaded to the remote cloud servers. ECG interpretation is performed for the collected ECGs in the cloud servers and the analysis results can be made instantly available to the patients as well as their healthcare providers.In this dissertation, we first examine the …
Proposed Mitigation Framework For The Internet Of Insecure Things, Mahmoud M. Elgindy, Sally M. Elghamrawy, Ali I. El-Desouky
Proposed Mitigation Framework For The Internet Of Insecure Things, Mahmoud M. Elgindy, Sally M. Elghamrawy, Ali I. El-Desouky
Mansoura Engineering Journal
Intrusion detection systems IDS are increasingly utilizing machine learning methods. IDSs are important tools for ensuring the security of network data and resources. The Internet of Things (IoT) is an expanding network of intelligent machines and sensors. However, they are vulnerable to attackers because of the ubiquitous and extensive IoT networks. Datasets from intrusion detection systems (IDS) have been analyzed deep learning methods such as Bidirectional long-short term memory (BiLSTM). This research presents an BiLSTM intrusion detection framework with Principal Component Analysis PCA (PCA-LSTM-IDS). The PCA-LSTM-IDS is comprised of two layers: extracting layer which using PCA, and the anomaly BiLSTM …
Systems Thinking As A Method For Leveraging Smart Classrooms, Jazmyne V. Del Hierro
Systems Thinking As A Method For Leveraging Smart Classrooms, Jazmyne V. Del Hierro
Open Access Theses & Dissertations
Digital technologies have revolutionized enterprises across our personal lives, and most major industries. The digital transformation can be considered a strategic response to digital trends (Vial, 2019), encompassing substantial changes in society and industry caused by technology development (Taj, et al., 2010). It is a complex journey that needs to be guided by clear strategy. Digital transformation is more about people, than it is about technology (Frankiewiczz, B., 2020). It requires organizational changes that are backed by leadership and driven by challenges to culture (Abbu, H., 2022). Digital transformation requires leaders to build trust (Mugge, Abbu, and Gudergan 2021; Gudergan …
Distributed Detection Over Blockchain-Aided Internet Of Things In The Presence Of Attacks, Yiming Jiang, Jiangfan Zhang
Distributed Detection Over Blockchain-Aided Internet Of Things In The Presence Of Attacks, Yiming Jiang, Jiangfan Zhang
Electrical and Computer Engineering Faculty Research & Creative Works
Distributed detection over a blockchain-aided Internet of Things (BIoT) network in the presence of attacks is considered, where the integrated blockchain is employed to secure data exchanges over the BIoT as well as data storage at the agents of the BIoT. We consider a general adversary model where attackers jointly exploit the vulnerability of IoT devices and that of the blockchain employed in the BIoT. The optimal attacking strategy which minimizes the Kullback-Leibler divergence is pursued. It can be shown that this optimization problem is nonconvex, and hence it is generally intractable to find the globally optimal solution to such …
Development Of A Data Science Curriculum For An Engineering Technology Program, Salih Sarp, Murat Kuzlu, Otilia Popescu, Vukica M. Jovanovic, Zafer Acar
Development Of A Data Science Curriculum For An Engineering Technology Program, Salih Sarp, Murat Kuzlu, Otilia Popescu, Vukica M. Jovanovic, Zafer Acar
Engineering Technology Faculty Publications
Data science has gained the attention of various industries, educators, parents, and students thinking about their future careers. Statistics departments have traditionally offered data science courses for a long time. The main objective of these courses is to examine the fundamental concepts and theories. However, teaching data science courses has also expanded to other disciplines due to the vast amount of data being collected by numerous modern applications. Also, someone needs to learn how to collect and process data, especially from industrial devices, because of the recent development of Internet of Things (IoT) technologies. Hence, integrating data science into the …
Opportunities Of Iot In Fog Computing For High Fault Tolerance And Sustainable Energy Optimization, A. Reyana, Sandeep Kautish, Khalid Abdulaziz Alnowibet, Hossam Zawbaa, Ali Wagdy Mohamed
Opportunities Of Iot In Fog Computing For High Fault Tolerance And Sustainable Energy Optimization, A. Reyana, Sandeep Kautish, Khalid Abdulaziz Alnowibet, Hossam Zawbaa, Ali Wagdy Mohamed
Articles
Today, the importance of enhanced quality of service and energy optimization has promoted research into sensor applications such as pervasive health monitoring, distributed computing, etc. In general, the resulting sensor data are stored on the cloud server for future processing. For this purpose, recently, the use of fog computing from a real-world perspective has emerged, utilizing end-user nodes and neighboring edge devices to perform computation and communication. This paper aims to develop a quality-of-service-based energy optimization (QoS-EO) scheme for the wireless sensor environments deployed in fog computing. The fog nodes deployed in specific geographical areas cover the sensor activity performed …
A Provable Secure And Efficient Authentication Framework For Smart Manufacturing Industry, Muhammad Hammad, Akhtar Badshah, Ghulam Abbas, Hisham Alasmary, Muhammad Waqas, Wasim A. Khan
A Provable Secure And Efficient Authentication Framework For Smart Manufacturing Industry, Muhammad Hammad, Akhtar Badshah, Ghulam Abbas, Hisham Alasmary, Muhammad Waqas, Wasim A. Khan
Research outputs 2022 to 2026
Smart manufacturing is transforming the manufacturing industry by enhancing productivity and quality, driving growth in the global economy. The Internet of Things (IoT) has played a crucial role in realizing Industry 4.0, where machines can communicate and interact in real-time. Despite these advancements, security remains a major challenge in developing and deploying smart manufacturing. As cyber-attacks become more prevalent, researchers are making security a top priority. Although IoT and Industrial IoT (IIoT) are used to establish smart industries, these systems remain vulnerable to various types of attacks. To address these security issues, numerous authentication methods have been proposed. However, many …
Human Blood Grup And Rhesus Detection Tool Prototype Design Based On Iot, Trisiani Dewi Hendrawati, Inzaghi Hasanudin
Human Blood Grup And Rhesus Detection Tool Prototype Design Based On Iot, Trisiani Dewi Hendrawati, Inzaghi Hasanudin
Elinvo (Electronics, Informatics, and Vocational Education)
Currently, medical practitioners carry out blood type and rhesus examinations by directly observing the agglutination reaction and depending on the examiner's eye. Meanwhile, the effects of eye fatigue and saturation will cause inaccurate data. Therefore, a detection device was made which aims to display information about reading human blood type and rhesus on a digital display which can also store the data into a database. The ABO and rhesus systems were used in this study. This research was made using a real-time method based on the internet of things (IoT). sending data in real-time using WiFi Module ESP-01 and other …
Recent Technical Breakthroughs Enable Smart Manufacturing: A Review, Manish Kumar, Shanu Pandey, Kanchan Upadhyay, Pritibala Taunk, Raunak Kumar Tamrakar
Recent Technical Breakthroughs Enable Smart Manufacturing: A Review, Manish Kumar, Shanu Pandey, Kanchan Upadhyay, Pritibala Taunk, Raunak Kumar Tamrakar
Al-Bahir Journal for Engineering and Pure Sciences
In human culture, machine learning has long been used to address complicated issues. Machine learning is successful because of the help provided by computational power and sensing technology. Data-driven strategies and the development of artificial intelligence will soon have a significant impact on the industry. Common examples include search engines, picture recognition, biometrics, speech and handwriting recognition, natural language processing, as well as medical diagnostics and credit scores. It is obvious that when artificial intelligence permeates our globe and, more precisely, our lives, numerous challenges will become public. According to predictions, Industry 4.0 or Smart Manufacturing will be the next …
Investigation Into The Economic Viability Of Industry 4.0 Practices In A Small Start-Up Setting: A Case Study, Joseph Lindley
Investigation Into The Economic Viability Of Industry 4.0 Practices In A Small Start-Up Setting: A Case Study, Joseph Lindley
Open Access Theses & Dissertations
Industry 4.0 has been a hot button topic since the first rumouringâ??s of a fourth industrial revolution taking place in the early 2010s. Since that time many companies have attempted to transform their process, procedures, and systems to become streamlined, efficient, and overall, more profitable. An example of this can be seen in companies such as Microsoft and IBM, Mitsubishi and Siemens who have gained a stronger foothold in their respective markets by their efficient implementation of Industry 4.0. Before we can address how small start-up companies can begin to compete with these behemoths, we must address the question; what …
Low Overhead And Application-Oriented Synchronization In Heterogeneous Internet Of Things Systems, Haide Wang
Low Overhead And Application-Oriented Synchronization In Heterogeneous Internet Of Things Systems, Haide Wang
Electronic Thesis and Dissertation Repository
Recent evolution in the Internet of Things (IoT) and Cyber–physical systems (CPS) is expected to change everyday life of its users by enabling low latency and reliable communication, coordinated task execution and real time data processing among pervasive intelligence through the communication network. Precise time synchronization, as a prerequisite for a chronological ordering of information or synchronous execution, has become a vital constituent for many time-sensitive applications.
On one hand, Internet of Things (IoT) systems rely heavily on the temporal coherence among its distributed constituents during data fusion and analysis, however the existing solutions for data synchronization, do not easily …
Optimized And Automated Machine Learning Techniques Towards Iot Data Analytics And Cybersecurity, Li Yang
Optimized And Automated Machine Learning Techniques Towards Iot Data Analytics And Cybersecurity, Li Yang
Electronic Thesis and Dissertation Repository
The Internet-of-Things (IoT) systems have emerged as a prevalent technology in our daily lives. With the wide spread of sensors and smart devices in recent years, the data generation volume and speed of IoT systems have increased dramatically. In most IoT systems, massive volumes of data must be processed, transformed, and analyzed on a frequent basis to enable various IoT services and functionalities. Machine Learning (ML) approaches have shown their capacity for IoT data analytics. However, applying ML models to IoT data analytics tasks still faces many difficulties and challenges. The first challenge is to process large amounts of dynamic …
Monitoring Of Renewable Energy Systems By Iot-Aided Scada System, Ohirul Qays, Musse M. Ahmed, M. A. Parvez Mahmud, Ahmed Abu-Siada, S. M. Muyeen, Liton Hossain, Farhana Yasmin, Momtazur Rahman
Monitoring Of Renewable Energy Systems By Iot-Aided Scada System, Ohirul Qays, Musse M. Ahmed, M. A. Parvez Mahmud, Ahmed Abu-Siada, S. M. Muyeen, Liton Hossain, Farhana Yasmin, Momtazur Rahman
Research outputs 2022 to 2026
With the rapid increase of renewable energy generation worldwide, real-time information has become essential to manage such assets, especially for systems installed offshore and in remote areas. To date, there is no cost-effective condition monitoring technique that can assess the state of renewable energy sources in real-time and provide suitable asset management decisions to optimize the utilization of such valuable assets and avoid any full or partial blackout due to unexpected faults. Based on the Internet of Things scheme, this paper represents a new application for the Supervisory Control and Data Acquisition (SCADA) system to monitor a hybrid system comprising …
Graph-Based Heuristic Solution For Placing Distributed Video Processing Applications On Moving Vehicle Clusters, Kanika Sharma, Bernard Butler, Brendan Jennings
Graph-Based Heuristic Solution For Placing Distributed Video Processing Applications On Moving Vehicle Clusters, Kanika Sharma, Bernard Butler, Brendan Jennings
Articles
Vehicular fog computing (VFC) is envisioned as an extension of cloud and mobile edge computing to utilize the rich sensing and processing resources available in vehicles. We focus on slow-moving cars that spend a significant time in urban traffic congestion as a potential pool of onboard sensors, video cameras, and processing capacity. For leveraging the dynamic network and processing resources, we utilize a stochastic mobility model to select nodes with similar mobility patterns. We then design two distributed applications that are scaled in real-time and placed as multiple instances on selected vehicular fog nodes. We handle the unstable vehicular environment …
The Applications Of The Internet Of Things In The Medical Field, Cody Repass
The Applications Of The Internet Of Things In The Medical Field, Cody Repass
Theses and Dissertations
The Internet of Things (IoT) paradigm promises to make “things” include a more generic set of entities such as smart devices, sensors, human beings, and any other IoT objects to be accessible at anytime and anywhere. IoT varies widely in its applications, and one of its most beneficial uses is in the medical field. However, the large attack surface and vulnerabilities of IoT systems needs to be secured and protected. Security is a requirement for IoT systems in the medical field where the Health Insurance Portability and Accountability Act (HIPAA) applies.
This work investigates various applications of IoT in healthcare …
Assessing Security Risks With The Internet Of Things, Faith Mosemann
Assessing Security Risks With The Internet Of Things, Faith Mosemann
Senior Honors Theses
For my honors thesis I have decided to study the security risks associated with the Internet of Things (IoT) and possible ways to secure them. I will focus on how corporate, and individuals use IoT devices and the security risks that come with their implementation. In my research, I found out that IoT gadgets tend to go unnoticed as a checkpoint for vulnerability. For example, often personal IoT devices tend to have the default username and password issued from the factory that a hacker could easily find through Google. IoT devices need security just as much as computers or servers …
Exploiting The Iot Through Network-Based Covert Channels, Kyle S. Harris
Exploiting The Iot Through Network-Based Covert Channels, Kyle S. Harris
Theses and Dissertations
Information leaks are a top concern to industry and government leaders. The IoT is a technology capable of sensing real-world events. A method for exfiltrating data from these devices is by covert channel. This research designs a novel IoT CTC without the need for inter-packet delays to encode data. Instead, it encodes data within preexisting network information, namely ports or addresses. Additionally, the CTC can be implemented in two different modes: Stealth and Bandwidth. Performance is measured using throughput and detectability. The Stealth methods mimic legitimate traffic captures while the Bandwidth methods forgo this approach for maximum throughput. Detection results …
An Intelligent Distributed Ledger Construction Algorithm For Iot, Charles Rawlins, Jagannathan Sarangapani
An Intelligent Distributed Ledger Construction Algorithm For Iot, Charles Rawlins, Jagannathan Sarangapani
Electrical and Computer Engineering Faculty Research & Creative Works
Blockchain is the next generation of secure data management that creates near-immutable decentralized storage. Secure cryptography created a niche for blockchain to provide alternatives to well-known security compromises. However, design bottlenecks with traditional blockchain data structures scale poorly with increased network usage and are extremely computation-intensive. This made the technology difficult to combine with limited devices, like those in Internet of Things networks. In protocols like IOTA, replacement of blockchain's linked-list queue processing with a lightweight dynamic ledger showed remarkable throughput performance increase. However, current stochastic algorithms for ledger construction suffer distinct trade-offs between efficiency and security. This work proposed …
Reflecting On Recurring Failures In Iot Development, Dharun Anandayuvaraj, James C. Davis
Reflecting On Recurring Failures In Iot Development, Dharun Anandayuvaraj, James C. Davis
Department of Electrical and Computer Engineering Faculty Publications
As IoT systems are given more responsibility and autonomy, they offer greater benefits, but also carry greater risks. We believe this trend invigorates an old challenge of software engineering: how to develop high-risk software-intensive systems safely and securely under market pressures? As a first step, we conducted a systematic analysis of recent IoT failures to identify engineering challenges. We collected and analyzed 22 news reports and studied the sources, impacts, and repair strategies of failures in IoT systems. We observed failure trends both within and across application domains. We also observed that failure themes have persisted over time. To alleviate …
An Analysis On Network Flow-Based Iot Botnet Detection Using Weka, Cian Porteous
An Analysis On Network Flow-Based Iot Botnet Detection Using Weka, Cian Porteous
Dissertations
Botnets pose a significant and growing risk to modern networks. Detection of botnets remains an important area of open research in order to prevent the proliferation of botnets and to mitigate the damage that can be caused by botnets that have already been established. Botnet detection can be broadly categorised into two main categories: signature-based detection and anomaly-based detection. This paper sets out to measure the accuracy, false-positive rate, and false-negative rate of four algorithms that are available in Weka for anomaly-based detection of a dataset of HTTP and IRC botnet data. The algorithms that were selected to detect botnets …
A Framework For Enterprise Systems Based On Process Improvement, Abdulrahman Alharthi
A Framework For Enterprise Systems Based On Process Improvement, Abdulrahman Alharthi
All ETDs from UAB
We introduce a framework for enterprise systems based on process-centered analysis. Because technology has drastically altered many aspects of our lives, such as work, leisure, travel, government, and company interactions worldwide, companies must strategically consider the Internet of Things in order to thrive in the new economy. Tanik and Jololian offered early work in this area, and included an analysis of the T-Strategy introduced by R.T. Yeh et al. in their book “Zero-time.” Our approach builds on this decade-old work, and involves the introduction of information flow analysis to process improvement [1]. We have identified two key points: centralization and …
Crowd Detection System Using Blimp Drones As An Effort To Mitigate The Spread Of Covid-19 Based On Internet Of Things, Mashoedah Mashoedah, Oktaf Agni Dhewa, Zulhakim Seftiyana Roviyan, Dheni Leo, Silvia Larasatul Masyitoh
Crowd Detection System Using Blimp Drones As An Effort To Mitigate The Spread Of Covid-19 Based On Internet Of Things, Mashoedah Mashoedah, Oktaf Agni Dhewa, Zulhakim Seftiyana Roviyan, Dheni Leo, Silvia Larasatul Masyitoh
Elinvo (Electronics, Informatics, and Vocational Education)
The application of health protocols is a regulation that is applied to prevent the spread of Covid-19. Public awareness of the implementation of health protocols is still lacking. This study aims to determine the performance of the detection system using the Blimp Drone as an effort to mitigate the spread of Covid-19 based on the Internet of Things. The method used in system development consists of literature review, needs analysis, design, manufacture, and testing. This system uses the Blimp Drone as a vehicle to carry out flight missions. Raspberry pi camera as a component for distance detection in …