Open Access. Powered by Scholars. Published by Universities.®

Computational Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Computational Engineering

Software Protection And Secure Authentication For Autonomous Vehicular Cloud Computing, Muhammad Hataba Oct 2022

Software Protection And Secure Authentication For Autonomous Vehicular Cloud Computing, Muhammad Hataba

Dissertations

Artificial Intelligence (AI) is changing every technology we deal with. Autonomy has been a sought-after goal in vehicles, and now more than ever we are very close to that goal. Vehicles before were dumb mechanical devices, now they are becoming smart, computerized, and connected coined as Autonomous Vehicles (AVs). Moreover, researchers found a way to make more use of these enormous capabilities and introduced Autonomous Vehicles Cloud Computing (AVCC). In these platforms, vehicles can lend their unused resources and sensory data to join AVCC.

In this dissertation, we investigate security and privacy issues in AVCC. As background, we built our …


Dependencyvis: Helping Developers Visualize Software Dependency Information, Nathan Lui Jun 2021

Dependencyvis: Helping Developers Visualize Software Dependency Information, Nathan Lui

Master's Theses

The use of dependencies have been increasing in popularity over the past decade, especially as package managers such as JavaScript's npm has made getting these packages a simple command to run. However, while incidents such as the left-pad incident has increased awareness of how vulnerable relying on these packages are, there is still some work to be done when it comes to getting developers to take the extra research step to determine if a package is up to standards. Finding metrics of different packages and comparing them is always a difficult and time consuming task, especially since potential vulnerabilities are …


Fingerprint Database Privacy Guard: An Open-Source System That Secures Fingerprints With Locality Sensitive Hashing Algorithms, Enrique Sanchez Dec 2018

Fingerprint Database Privacy Guard: An Open-Source System That Secures Fingerprints With Locality Sensitive Hashing Algorithms, Enrique Sanchez

Computer Science and Computer Engineering Undergraduate Honors Theses

Fingerprint identification is one of the most accurate sources of identification, yet it is not widely used in public facilities for security concerns. Moreover, the cost of fingerprint system is inaccessible for small-budget business because of their high cost. Therefore, this study created an open-source solution to secure fingerprint samples in the database while using low-cost hardware components. Locality Sensitive Hashing Algorithms such as ORB and Image hash were compared in this study as a potential alternative to SURF. To test the design, fifteen samples were collected and stored in a database without verifying the quality of the samples. Then, …


Paris: A Parallel Rsa-Prime Inspection Tool, Joseph R. White Jun 2013

Paris: A Parallel Rsa-Prime Inspection Tool, Joseph R. White

Master's Theses

Modern-day computer security relies heavily on cryptography as a means to protect the data that we have become increasingly reliant on. As the Internet becomes more ubiquitous, methods of security must be better than ever. Validation tools can be leveraged to help increase our confidence and accountability for methods we employ to secure our systems.

Security validation, however, can be difficult and time-consuming. As our computational ability increases, calculations that were once considered “hard” due to length of computation, can now be done in minutes. We are constantly increasing the size of our keys and attempting to make computations harder …


Enhancing Reliability In Passive Anti-Islanding Protection Schemes For Distribution Systems With Distributed Generation, Mohsen Sheikholeslamzadeh Sep 2012

Enhancing Reliability In Passive Anti-Islanding Protection Schemes For Distribution Systems With Distributed Generation, Mohsen Sheikholeslamzadeh

Electronic Thesis and Dissertation Repository

This thesis introduces a new approach to enhance the reliability of conventional passive anti-islanding protection scheme in distribution systems embedding distributed generation. This approach uses an Islanding-Dedicated System (IDS) per phase which will be logically combined with the conventional scheme, either in blocking or permissive modes. Each phase IDS is designed based on data mining techniques. The use of Artificial Neural Networks (ANNs) enables to reach higher accuracy and speed among other data mining techniques. The proposed scheme is trained and tested on a practical radial distribution system with six-1.67 MW Doubly-Fed Induction Generators (DFIG-DGs) wind turbines. Various scenarios of …