Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Big data (1)
- Bioinformatics (1)
- Blockchain (1)
- Cloud security (1)
- DDoS attack (1)
-
- Decentralized (1)
- Device free (1)
- Distributed system security (1)
- Distributed systems (1)
- Fingerprinting (1)
- Formation (1)
- HPC (1)
- Indoor localization (1)
- Location tracking (1)
- Long-tail latency (1)
- Performance bottleneck (1)
- Random forest (1)
- Robotics (1)
- SSD (1)
- WIFI fingerprinting (1)
- WIFI localization (1)
- Web attack (1)
Articles 1 - 4 of 4
Full-Text Articles in Computer Engineering
Device Free Indoor Localization Of Human Target Using Wifi Fingerprinting, Prasanga Neupane
Device Free Indoor Localization Of Human Target Using Wifi Fingerprinting, Prasanga Neupane
LSU Master's Theses
Indoor localization of human objects has many important applications nowadays. Proposed here is a new device free approach where all the transceiver devices are fixed in an indoor environment so that the human target doesn't need to carry any transceiver device with them. This work proposes radio-frequency fingerprinting for the localization of human targets which makes this even more convenient as radio-frequency wireless signals can be easily acquired using an existing wireless network in an indoor environment. This work explores different avenues for optimal and effective placement of transmitter devices for better localization. In this work, an experimental environment is …
Distance-Based Formation Control Using Decentralized Sensing With Infrared Photodiodes, Steven Williams
Distance-Based Formation Control Using Decentralized Sensing With Infrared Photodiodes, Steven Williams
LSU Master's Theses
This study presents an onboard sensor system for determining the relative positions of mobile robots, which is used in decentralized distance-based formation controllers for multi-agent systems. This sensor system uses infrared photodiodes and LEDs; its effective use requires coordination between the emitting and detecting robots. A technique is introduced for calculating the relative positions based on photodiode readings, and an automated calibration system is designed for future maintenance. By measuring the relative positions of their neighbors, each robot is capable of running an onboard formation controller, which is independent of both a centralized controller and a global positioning-like system (e.g., …
A Study Of Scalability And Cost-Effectiveness Of Large-Scale Scientific Applications Over Heterogeneous Computing Environment, Arghya K. Das
A Study Of Scalability And Cost-Effectiveness Of Large-Scale Scientific Applications Over Heterogeneous Computing Environment, Arghya K. Das
LSU Doctoral Dissertations
Recent advances in large-scale experimental facilities ushered in an era of data-driven science. These large-scale data increase the opportunity to answer many fundamental questions in basic science. However, these data pose new challenges to the scientific community in terms of their optimal processing and transfer. Consequently, scientists are in dire need of robust high performance computing (HPC) solutions that can scale with terabytes of data.
In this thesis, I address the challenges in three major aspects of scientific big data processing as follows: 1) Developing scalable software and algorithms for data- and compute-intensive scientific applications. 2) Proposing new cluster architectures …
A Study Of Very Short Intermittent Ddos Attacks On The Performance Of Web Services In Clouds, Huasong Shan
A Study Of Very Short Intermittent Ddos Attacks On The Performance Of Web Services In Clouds, Huasong Shan
LSU Doctoral Dissertations
Distributed Denial-of-Service (DDoS) attacks for web applications such as e-commerce are increasing in size, scale, and frequency. The emerging elastic cloud computing cannot defend against ever-evolving new types of DDoS attacks, since they exploit various newly discovered network or system vulnerabilities even in the cloud platform, bypassing not only the state-of-the-art defense mechanisms but also the elasticity mechanisms of cloud computing.
In this dissertation, we focus on a new type of low-volume DDoS attack, Very Short Intermittent DDoS Attacks, which can hurt the performance of web applications deployed in the cloud via transiently saturating the critical bottleneck resource of the …