Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California Polytechnic State University, San Luis Obispo (11)
- Air Force Institute of Technology (5)
- University of North Florida (3)
- Louisiana State University (2)
- Michigan Technological University (2)
-
- New Jersey Institute of Technology (2)
- Singapore Management University (2)
- University of Arkansas, Fayetteville (2)
- University of Kentucky (2)
- Western University (2)
- East Tennessee State University (1)
- Morehead State University (1)
- South Dakota State University (1)
- University of Massachusetts Amherst (1)
- University of New Mexico (1)
- University of Southern Maine (1)
- University of Tennessee, Knoxville (1)
- World Maritime University (1)
- Keyword
-
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (3)
- OpenFlow (3)
- Thesis; University of North Florida; UNF; Dissertations (3)
- Android (2)
- App (2)
-
- Industrial control systems (2)
- MPI (2)
- SDN (2)
- #antcenter (1)
- AFN (1)
- Academic -- UNF -- Computing; Cloud Computing; Infrastructure-as-a-Service; Benchmarking; Performance evaluation (1)
- Academic -- UNF -- Computing; Cloud Platforms; HIbench tools; Big Data Applications; Performance Evaluations (1)
- Academic -- UNF -- Computing; Search ranking (1)
- Agent coordination (1)
- Aggregate functions (1)
- Algorithms (1)
- Application (1)
- Application-aware Network (1)
- Appsensor (1)
- Arduino (1)
- Artificial Intelligence (AI), Intelligent Ship, Communication Technology, e-Navigation, Future Maritime Management (1)
- Aurora (1)
- BBU (1)
- Band (1)
- Bathrooms (1)
- Benthic layers (1)
- Big Data (1)
- Branch network (1)
- C-Ran (1)
- Cactus (1)
- Publication
-
- Theses and Dissertations (5)
- Computer Engineering (3)
- Computer Science and Software Engineering (3)
- UNF Graduate Theses and Dissertations (3)
- Dissertations and Theses Collection (2)
-
- Dissertations, Master's Theses and Master's Reports (2)
- Electronic Thesis and Dissertation Repository (2)
- LSU Doctoral Dissertations (2)
- Master's Theses (2)
- Mechanical Engineering (2)
- Theses (2)
- Computer Science ETDs (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
- Doctoral Dissertations (1)
- Electrical Engineering (1)
- Electronic Theses and Dissertations (1)
- Graduate Theses and Dissertations (1)
- Maritime Safety & Environment Management Dissertations (Dalian) (1)
- Masters Theses (1)
- Morehead State Theses and Dissertations (1)
- Theses and Dissertations--Computer Science (1)
- Theses and Dissertations--Electrical and Computer Engineering (1)
- Thinking Matters Symposium Archive (1)
- Undergraduate Honors Theses (1)
Articles 1 - 30 of 41
Full-Text Articles in Computer Engineering
Intelligent Advancements In Location Management And C-Ran Power-Aware Resource Allocation, Emad Ali Aqeeli
Intelligent Advancements In Location Management And C-Ran Power-Aware Resource Allocation, Emad Ali Aqeeli
Electronic Thesis and Dissertation Repository
The evolving of cellular networks within the last decade continues to focus on delivering a robust and reliable means to cope with the increasing number of users and demanded capacity. Recent advancements of cellular networks such as Long-Term Evolution (LTE) and LTE-advanced offer a remarkable high bandwidth connectivity delivered to the users. Signalling overhead is one of the vital issues that impact the cellular behavior. Causing a significant load in the core network hence effecting the cellular network reliability. Moreover, the signaling overhead decreases the Quality of Experience (QoE) of users. The first topic of the thesis attempts to reduce …
Pubwc Bathroom Review App, Clay Jacobs
Pubwc Bathroom Review App, Clay Jacobs
Computer Science and Software Engineering
For my senior project, I developed an iOS application to allow users to find, rate, and review nearby public restrooms. The app takes advantage of crowdsourced data to collect bathroom and review information. I also created a REST API to interface with the backend database that could be used to port the application to other platforms.
Sd-Mcan: A Software-Defined Solution For Ip Mobility In Campus Area Networks, Adam Chase Calabrigo
Sd-Mcan: A Software-Defined Solution For Ip Mobility In Campus Area Networks, Adam Chase Calabrigo
Master's Theses
Campus Area Networks (CANs) are a subset of enterprise networks, comprised of a network core connecting multiple Local Area Networks (LANs) across a college campus. Traditionally, hosts connect to the CAN via a single point of attachment; however, the past decade has seen the employment of mobile computing rise dramatically. Mobile devices must obtain new Internet Protocol (IP) addresses at each LAN as they migrate, wasting address space and disrupting host services. To prevent these issues, modern CANs should support IP mobility: allowing devices to keep a single IP address as they migrate between LANs with low-latency handoffs. Traditional approaches …
Exploring Wireless Technology Applications In Clinical Staff Response Time Reduction In Healthcare Facilities, Chase R. Johnson
Exploring Wireless Technology Applications In Clinical Staff Response Time Reduction In Healthcare Facilities, Chase R. Johnson
Morehead State Theses and Dissertations
A thesis presented to the faculty of the College of Business and Technology at Morehead State University in partial fulfillment of the requirements for the Degree Master of Science by Chase R. Johnson on November 13, 2017.
A Study Of Very Short Intermittent Ddos Attacks On The Performance Of Web Services In Clouds, Huasong Shan
A Study Of Very Short Intermittent Ddos Attacks On The Performance Of Web Services In Clouds, Huasong Shan
LSU Doctoral Dissertations
Distributed Denial-of-Service (DDoS) attacks for web applications such as e-commerce are increasing in size, scale, and frequency. The emerging elastic cloud computing cannot defend against ever-evolving new types of DDoS attacks, since they exploit various newly discovered network or system vulnerabilities even in the cloud platform, bypassing not only the state-of-the-art defense mechanisms but also the elasticity mechanisms of cloud computing.
In this dissertation, we focus on a new type of low-volume DDoS attack, Very Short Intermittent DDoS Attacks, which can hurt the performance of web applications deployed in the cloud via transiently saturating the critical bottleneck resource of the …
A Study Of Application-Awareness In Software-Defined Data Center Networks, Chui-Hui Chiu
A Study Of Application-Awareness In Software-Defined Data Center Networks, Chui-Hui Chiu
LSU Doctoral Dissertations
A data center (DC) has been a fundamental infrastructure for academia and industry for many years. Applications in DC have diverse requirements on communication. There are huge demands on data center network (DCN) control frameworks (CFs) for coordinating communication traffic. Simultaneously satisfying all demands is difficult and inefficient using existing traditional network devices and protocols. Recently, the agile software-defined Networking (SDN) is introduced to DCN for speeding up the development of the DCNCF. Application-awareness preserves the application semantics including the collective goals of communications. Previous works have illustrated that application-aware DCNCFs can much more efficiently allocate network resources by explicitly …
Improving Hpc Communication Library Performance On Modern Architectures, Matthew G. F. Dosanjh
Improving Hpc Communication Library Performance On Modern Architectures, Matthew G. F. Dosanjh
Computer Science ETDs
As high-performance computing (HPC) systems advance towards exascale (10^18 operations per second), they must leverage increasing levels of parallelism to achieve their performance goals. In addition to increased parallelism, machines of that scale will have strict power limitations placed on them. One direction currently being explored to alleviate those issues are many-core processors such as Intel’s Xeon Phi line. Many-core processors sacrifice clock speed and core complexity, such as out of order pipelining, to increase the number of cores on a die. While this increases floating point throughput, it can reduce the performance of serialized, synchronized, and latency sensitive code …
A Location-Aware Middleware Framework For Collaborative Visual Information Discovery And Retrieval, Andrew J.M. Compton
A Location-Aware Middleware Framework For Collaborative Visual Information Discovery And Retrieval, Andrew J.M. Compton
Theses and Dissertations
This work addresses the problem of scalable location-aware distributed indexing to enable the leveraging of collaborative effort for the construction and maintenance of world-scale visual maps and models which could support numerous activities including navigation, visual localization, persistent surveillance, structure from motion, and hazard or disaster detection. Current distributed approaches to mapping and modeling fail to incorporate global geospatial addressing and are limited in their functionality to customize search. Our solution is a peer-to-peer middleware framework based on XOR distance routing which employs a Hilbert Space curve addressing scheme in a novel distributed geographic index. This allows for a universal …
The Future Is Coming : Research On Maritime Communication Technology For Realization Of Intelligent Ship And Its Impacts On Future Maritime Management, Jiacheng Ke
Maritime Safety & Environment Management Dissertations (Dalian)
No abstract provided.
Operating System Identification By Ipv6 Communication Using Machine Learning Ensembles, Adrian Ordorica
Operating System Identification By Ipv6 Communication Using Machine Learning Ensembles, Adrian Ordorica
Graduate Theses and Dissertations
Operating system (OS) identification tools, sometimes called fingerprinting tools, are essential for the reconnaissance phase of penetration testing. While OS identification is traditionally performed by passive or active tools that use fingerprint databases, very little work has focused on using machine learning techniques. Moreover, significantly more work has focused on IPv4 than IPv6. We introduce a collaborative neural network ensemble that uses a unique voting system and a random forest ensemble to deliver accurate predictions. This approach uses IPv6 features as well as packet metadata features for OS identification. Our experiment shows that our approach is valid and we achieve …
Scalable High-Speed Communications For Neuromorphic Systems, Aaron Reed Young
Scalable High-Speed Communications For Neuromorphic Systems, Aaron Reed Young
Masters Theses
Field-programmable gate arrays (FPGA), application-specific integrated circuits (ASIC), and other chip/multi-chip level implementations can be used to implement Dynamic Adaptive Neural Network Arrays (DANNA). In some applications, DANNA interfaces with a traditional computing system to provide neural network configuration information, provide network input, process network outputs, and monitor the state of the network. The present host-to-DANNA network communication setup uses a Cypress USB 3.0 peripheral controller (FX3) to enable host-to-array communication over USB 3.0. This communications setup has to run commands in batches and does not have enough bandwidth to meet the maximum throughput requirements of the DANNA device, resulting …
How Technology Is Reshaping Financial Services: Essays On Consumer Behavior In Card, Channel And Cryptocurrency Services, Dan Geng
Dissertations and Theses Collection
The financial services sector has seen dramatic technological innovations in the last several years associated with the “fintech revolution.” Major changes have taken place in channel management, credit card rewards marketing, cryptocurren-cy, and wealth management, and have influenced consumers’ banking behavior in different ways. As a consequence, there has been a growing demand for banks to rethink their business models and operations to adapt to changing consumer be-havior and counter the competitive pressure from other banks and non-bank play-ers. In this dissertation, I study consumer behavior related to different aspects of financial innovation by addressing research questions that are motivated …
Skin Tone Tracking Device (Chromaband), Ziyang Bian
Skin Tone Tracking Device (Chromaband), Ziyang Bian
Computer Engineering
It’s long been said that your skin is a window into your health and with many illnesses the first signs of trouble actually show up in your skin. So if we have this natural warning system, then why isn’t anyone able to effectively use it to predict changes in our health? The problem is that currently there is no reliable way to accurately measure the change in skin tone and how these changes may or may not change with variations in health. This project’s aim is to design and develop a device that will record the changes in a user’s …
Blend It Wine Blending Distribution System, Connor Clarry, Russell Temple, Matt Moren
Blend It Wine Blending Distribution System, Connor Clarry, Russell Temple, Matt Moren
Mechanical Engineering
No abstract provided.
Djukebox: A Mobile Application Senior Project, Alexander M. Mitchell
Djukebox: A Mobile Application Senior Project, Alexander M. Mitchell
Computer Science and Software Engineering
I’m going to discuss the process used to research, design, and develop a mobile application to handle song requests from patrons to disc jockeys. The research phase was completed in the first half of the project, during CSC-491, along with much of the design. The rest of the design and all of the development was completed during CSC-492. Once development began there were times when reverting back to the design phase was needed, which became apparent as more was learned about the mobile platform chosen for development, Android, and the backend server utilized, Google Firebase. Ultimately the project was purely …
Smartgarden, Samuel S. Lees, Matthew T. Lindly
Smartgarden, Samuel S. Lees, Matthew T. Lindly
Computer Engineering
The problem that the SmartGarden project seeks to solve is the challenge of watering succulents correctly and maintaining consistent plant health. Too much water can cause root rot and drowning while too little water can cause dehydration and starvation.
The SmartGarden solves this common problem by configuring a Raspberry Pi to measure soil moisture, store the data to an AWS server in the cloud, and water the succulent when necessary, informing the user by providing both a web-interface and a variety of notifications.
Micro-Spi Sediment Profile Imaging Micro-Inspector, Andrew P. Corvin, Caleb T. Davies, Matt R. Ferrari
Micro-Spi Sediment Profile Imaging Micro-Inspector, Andrew P. Corvin, Caleb T. Davies, Matt R. Ferrari
Mechanical Engineering
This project was proposed by Dr. Brian Paavo through a desire to more easily study the benthic sediment layers of the ocean. To do so, he asked us to build a simple and compact machine for use in sediment profile imagery (SPI). Although devices like this already exist, they are all large scale devices that require a ship with a crane to deploy, which is expensive and time consuming. Instead, he desired a “micro” SPI, which is capable of being deployed from a small vessel that can easily navigate shallow waters. Our interpretation of these requirements was as follows: a …
An Analysis Of Heroku And Aws For Growing Startups, Colton B. Stapper
An Analysis Of Heroku And Aws For Growing Startups, Colton B. Stapper
Computer Science and Software Engineering
This project presents information on the architecture of most modern cloud-hosting platforms, and gives a cost-benefit analysis of two common Platform-as-a-Service (PaaS) companies: Heroku and AWS.
Recommending Personalized Schedules In Urban Environments, Cen Chen
Recommending Personalized Schedules In Urban Environments, Cen Chen
Dissertations and Theses Collection
In this thesis, we are broadly interested in solving real world problems that involve decision support for coordinating agent movements in dynamic urban environments, where people are agents exhibiting different human behavior patterns and preferences. The rapid development of mobile technologies makes it easier to capture agent behavioral and preference information. Such rich agent specific information, coupled with the explosive growth of computational power, opens many opportunities that we could potentially leverage, to better guide/influence the agents in urban environments. The purpose of this thesis is to investigate how we can effectively and efficiently guide and coordinate the agents with …
Wireless Window Blinds, Cooper Laone, Niraj Morar, Zachary Malig, Jake Phillips
Wireless Window Blinds, Cooper Laone, Niraj Morar, Zachary Malig, Jake Phillips
Electrical Engineering
The Internet of Things asserts that there exists a global need for all objects to connect easily and accessibly. Today, smartphones, tablets, laptops and smart watches makeup just a few of the interconnected devices by the greater population. As a result a growing need for wireless connection between personal devices like phones, and computers to everyday appliances exists. This idea extends directly to households, businesses and buildings, where a growing need for smart home or smart-business appliances has taken root. Many companies like Nest, ADT and Apple make products for automated home security and in home media control. The Wireless …
Preemptive Efficient Queueing For Scheduling Deadline-Bound Data Center Flows, Vinaykrishna Gopalakrishna
Preemptive Efficient Queueing For Scheduling Deadline-Bound Data Center Flows, Vinaykrishna Gopalakrishna
Theses
This thesis introduces a new deadline aware flow scheduling scheme called Preemptive Efficient Queuing (PEQ). Unlike other schemes which use policies like EDF, SJF or fair share, this scheme aims to procrastinate flows as much as they can afford to, while keeping with their deadlines. Thereby, PEQ prioritizes more urgent flows that have shorter time to procrastinate, or cushion time. Results of PEQ are compared with state-of-the-art schemes for the transport of data-center flows, such as Preemptive Distributed Quick (PDQ) and Deadline-Driven Delivery (D3). The results show that PEQ outperforms D3 and PDQ. We identify results …
Software Updates To A Multiple Autonomous Quadcopter Search System (Maqss), Jared Speck, Toby Chan
Software Updates To A Multiple Autonomous Quadcopter Search System (Maqss), Jared Speck, Toby Chan
Computer Engineering
A series of performance-based and feature implementation software updates to an existing multiple vehicle autonomous target search system is outlined in this paper. The search system, MAQSS, is designed to address a computational power constraint found on modern autonomous aerial platforms by separating real-time and computationally expensive tasks through delegation to multiple multirotor vehicles. A Ground Control Station (GCS) is also described as part of the MAQSS system to perform the delegation and provide a low workload user interface. Ultimately, the changes to MAQSS noted in this paper helped to improve the performance of the autonomous search mission, the accuracy …
Rules Based Analysis Engine For Application Layer Ids, David Scrobonia
Rules Based Analysis Engine For Application Layer Ids, David Scrobonia
Master's Theses
Web application attack volume, complexity, and costs have risen as people, companies, and entire industries move online. Solutions implemented to defend web applications against malicious activity have traditionally been implemented at the network or host layer. While this is helpful for detecting some attacks, it does not provide the gran- ularity to see malicious behavior occurring at the application layer. The AppSensor project, an application level intrusion detection system (IDS), is an example of a tool that operates in this layer. AppSensor monitors users within the application by observing activity in suspicious areas not able to be seen by traditional …
Project Pradio, Trigg T. La Tour
Project Pradio, Trigg T. La Tour
Computer Science and Computer Engineering Undergraduate Honors Theses
This paper examines the design and manufacturing of a device that allows two or more users to share a wireless audio stream. Effectively, this allows a group of people to listen to the same audio in a synchronized manner. The product was unable to be completed in the allotted time. Regardless, significant progress was made and valuable insight into the circuit board design process was gained.
Automation In Entertainment: Concept, Design, And Application, Ryan Thally
Automation In Entertainment: Concept, Design, And Application, Ryan Thally
Undergraduate Honors Theses
The focus of this thesis is to explore the automation technology used in the modern entertainment industry. Upon completion of my thesis, I will deliver a working prototype of the chosen technology and present its capabilities in a choreographed show.
Machs: Mitigating The Achilles Heel Of The Cloud Through High Availability And Performance-Aware Solutions, Manar Jammal
Machs: Mitigating The Achilles Heel Of The Cloud Through High Availability And Performance-Aware Solutions, Manar Jammal
Electronic Thesis and Dissertation Repository
Cloud computing is continuously growing as a business model for hosting information and communication technology applications. However, many concerns arise regarding the quality of service (QoS) offered by the cloud. One major challenge is the high availability (HA) of cloud-based applications. The key to achieving availability requirements is to develop an approach that is immune to cloud failures while minimizing the service level agreement (SLA) violations. To this end, this thesis addresses the HA of cloud-based applications from different perspectives. First, the thesis proposes a component’s HA-ware scheduler (CHASE) to manage the deployments of carrier-grade cloud applications while maximizing their …
Making Random - Cryptography And The Generation Of Random Sequences, Samuel Barton
Making Random - Cryptography And The Generation Of Random Sequences, Samuel Barton
Thinking Matters Symposium Archive
The algorithm utilizes the behavior of modern operating systems to generate random bits by putting the process to sleep for 10 microseconds, and then comparing the actual number of microseconds slept to the expected amount. The reason why this works for generating \random" bits is that modern operating systems do not wake processes exactly when they request. This is due to process scheduling. The algorithm uses the randomness in actual sleep time to generate each bit.
The bits are not truly random, as if a person were able to force the algorithm to always execute, then we would not have …
Active Response Using Host-Based Intrusion Detection System And Software-Defined Networking, Jonathon S. Goodgion
Active Response Using Host-Based Intrusion Detection System And Software-Defined Networking, Jonathon S. Goodgion
Theses and Dissertations
This research proposes AHNSR: Active Host-based Network Security Response by utilizing Host-based Intrusion Detection Systems (HIDS) with Software-Defined Networking (SDN) to enhance system security by allowing dynamic active response and reconstruction from a global network topology perspective. Responses include traffic redirection, host quarantining, filtering, and more. A testable SDN-controlled network is constructed with multiple hosts, OpenFlow enabled switches, and a Floodlight controller, all linked to a custom, novel interface for the Open-Source SECurity (OSSEC) HIDS framework. OSSEC is implemented in a server-agent architecture, allowing scalability and OS independence. System effectiveness is evaluated against the following factors: alert density and a …
Framework For Industrial Control System Honeypot Network Traffic Generation, Htein A. Lin
Framework For Industrial Control System Honeypot Network Traffic Generation, Htein A. Lin
Theses and Dissertations
Defending critical infrastructure assets is an important but extremely difficult and expensive task. Historically, decoys have been used very effectively to distract attackers and in some cases convince an attacker to reveal their attack strategy. Several researchers have proposed the use of honeypots to protect programmable logic controllers, specifically those used to support critical infrastructure. However, most of these honeypot designs are static systems that wait for a would-be attacker. To be effective, honeypot decoys need to be as realistic as possible. This paper introduces a proof-of-concept honeypot network traffic generator that mimics genuine control systems. Experiments are conducted using …
A Framework For Categorization Of Industrial Control System Cyber Training Environments, Evan G. Plumley
A Framework For Categorization Of Industrial Control System Cyber Training Environments, Evan G. Plumley
Theses and Dissertations
First responders and professionals in hazardous occupations undergo training and evaluations for the purpose of mitigating risk and damage. For example, helicopter pilots train with multiple categorized simulations that increase in complexity before flying a real aircraft. However in the industrial control cyber incident response domain, where incident response professionals help detect, respond and recover from cyber incidents, no official categorization of training environments exist. To address this gap, this thesis provides a categorization of industrial control training environments based on realism. Four levels of environments are proposed and mapped to Blooms Taxonomy. This categorization will help organizations determine which …