Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Android (2)
- 3D Reconstruction (1)
- ADC (1)
- Accelerometer (1)
- Akron (1)
-
- Analog to digital converter (1)
- Arduino (1)
- Autonomous (1)
- BBU (1)
- Bard Shuttle (1)
- Behavior-based target tracking (1)
- C-Ran (1)
- Cable (1)
- Camera (1)
- Charge redistribution (1)
- Cloud (1)
- Cloud security (1)
- Computer resource allocation. (1)
- Concert (1)
- Cyber threat (1)
- Cyber threat intelligence (1)
- DDoS attack (1)
- Data (1)
- Digital (1)
- Distributed system security (1)
- Distributed systems (1)
- Edge computing (1)
- Engineering (1)
- Far infrared camera (1)
- File provenance (1)
Articles 1 - 14 of 14
Full-Text Articles in Computer Engineering
Intelligent Advancements In Location Management And C-Ran Power-Aware Resource Allocation, Emad Ali Aqeeli
Intelligent Advancements In Location Management And C-Ran Power-Aware Resource Allocation, Emad Ali Aqeeli
Electronic Thesis and Dissertation Repository
The evolving of cellular networks within the last decade continues to focus on delivering a robust and reliable means to cope with the increasing number of users and demanded capacity. Recent advancements of cellular networks such as Long-Term Evolution (LTE) and LTE-advanced offer a remarkable high bandwidth connectivity delivered to the users. Signalling overhead is one of the vital issues that impact the cellular behavior. Causing a significant load in the core network hence effecting the cellular network reliability. Moreover, the signaling overhead decreases the Quality of Experience (QoE) of users. The first topic of the thesis attempts to reduce …
Design And Simulation Of An 8-Bit Successive Approximation Register Charge-Redistribution Analog-To-Digital Converter, Sumit K. Verma
Design And Simulation Of An 8-Bit Successive Approximation Register Charge-Redistribution Analog-To-Digital Converter, Sumit K. Verma
Electrical Engineering Theses
The thesis initially investigates the history of the monolithic ADCs. The next chapter explores the different types of ADCs available in the market today. Next, the operation of a 4-bit SAR ADC has been studied. Based on this analysis, an 8-bit charge-redistribution SAR ADC has been designed and simulated with Multisim (National Instruments, Austin, TX). The design is divided into different blocks which are individually implemented and tested. Level-1 SPICE MOSFET models representative of 5μm devices were used wherever individual MOSFETs were used in the design. Finally, the power dissipation during the conversion period was also estimated. The supply voltage …
A Study Of Very Short Intermittent Ddos Attacks On The Performance Of Web Services In Clouds, Huasong Shan
A Study Of Very Short Intermittent Ddos Attacks On The Performance Of Web Services In Clouds, Huasong Shan
LSU Doctoral Dissertations
Distributed Denial-of-Service (DDoS) attacks for web applications such as e-commerce are increasing in size, scale, and frequency. The emerging elastic cloud computing cannot defend against ever-evolving new types of DDoS attacks, since they exploit various newly discovered network or system vulnerabilities even in the cloud platform, bypassing not only the state-of-the-art defense mechanisms but also the elasticity mechanisms of cloud computing.
In this dissertation, we focus on a new type of low-volume DDoS attack, Very Short Intermittent DDoS Attacks, which can hurt the performance of web applications deployed in the cloud via transiently saturating the critical bottleneck resource of the …
The Following Robot, Juan D. Cerda, Matthew S. Kwan, Vi M. Le
The Following Robot, Juan D. Cerda, Matthew S. Kwan, Vi M. Le
Computer Engineering
The objective of this project is to design, build, and test an autonomous robot with an associated Android application. The robot uses on board inertial measurement sensors (magnetometer, accelerometer, gyroscope) and coordinates itself through Bluetooth communication with the similar builtin measurement sensors on the Android phone to mimic and follow movement. The Following Robot incorporates the same basic movement functionality as a typical RC car. The robot follows the user’s phone through an application on one’s phone. This application accesses the phone’s accelerometer and gyroscope data and translates into appropriate conversions. Methods of tracking and calculating distance or angular displacement …
Remote Cable Gantry, Allen L. Bailey
Remote Cable Gantry, Allen L. Bailey
Electrical Engineering
The Remote Cable Gantry is a robotic system that was initially intended to aid in the art of aerial videography. It was designed to enable novice and expert users alike to capture both video footage and audio from perspectives unachievable by current methods. This system uses a series of cables to control the position of a camera gimbal in a defined 3D space and, as a self-contained unit, is portable and easy to use. The Remote Cable Gantry offers a quiet, intuitive, and safe alternative to existing technology, which has been limiting the market and potential of aerial photography and …
Automation In Entertainment: Concept, Design, And Application, Ryan Thally
Automation In Entertainment: Concept, Design, And Application, Ryan Thally
Undergraduate Honors Theses
The focus of this thesis is to explore the automation technology used in the modern entertainment industry. Upon completion of my thesis, I will deliver a working prototype of the chosen technology and present its capabilities in a choreographed show.
Framework For Industrial Control System Honeypot Network Traffic Generation, Htein A. Lin
Framework For Industrial Control System Honeypot Network Traffic Generation, Htein A. Lin
Theses and Dissertations
Defending critical infrastructure assets is an important but extremely difficult and expensive task. Historically, decoys have been used very effectively to distract attackers and in some cases convince an attacker to reveal their attack strategy. Several researchers have proposed the use of honeypots to protect programmable logic controllers, specifically those used to support critical infrastructure. However, most of these honeypot designs are static systems that wait for a would-be attacker. To be effective, honeypot decoys need to be as realistic as possible. This paper introduces a proof-of-concept honeypot network traffic generator that mimics genuine control systems. Experiments are conducted using …
Autoprov: An Automated File Provenance Collection Tool, Ryan A. Good
Autoprov: An Automated File Provenance Collection Tool, Ryan A. Good
Theses and Dissertations
A file's provenance is a detailing of its origins and activities. There are tools available that are useful in maintaining the provenance of a file. Unfortunately for digital forensics, these tools require prior installation on the computer of interest while provenance generating events happen. The presented tool addresses this by reconstructing a file's provenance from several temporal artifacts. It identifies relevant temporal and user correlations between these artifacts, and presents them to the user. A variety of predefined use cases and real world data are tested against to demonstrate that this software allows examiners to draw useful conclusions about the …
Applying Cyber Threat Intelligence To Industrial Control Systems, Matthew P. Sibiga
Applying Cyber Threat Intelligence To Industrial Control Systems, Matthew P. Sibiga
Theses and Dissertations
A cybersecurity initiative known as cyber threat intelligence (CTI) has recently been developed and deployed. The overall goal of this new technology is to help protect network infrastructures. Threat intelligence platforms (TIPs) have also been created to help facilitate CTI effectiveness within organizations. There are many benefits that both can achieve within the information technology (IT) sector. The industrial control system (ICS) sector can also benefit from these technologies as most ICS networks are connected to IT networks. CTI and TIPs become resourceful when using indicators of compromise (IOCs) from known ICS malware attacks and an open source intrusion detection …
Contributions To Edge Computing, Vernon K. Bumgardner
Contributions To Edge Computing, Vernon K. Bumgardner
Theses and Dissertations--Computer Science
Efforts related to Internet of Things (IoT), Cyber-Physical Systems (CPS), Machine to Machine (M2M) technologies, Industrial Internet, and Smart Cities aim to improve society through the coordination of distributed devices and analysis of resulting data. By the year 2020 there will be an estimated 50 billion network connected devices globally and 43 trillion gigabytes of electronic data. Current practices of moving data directly from end-devices to remote and potentially distant cloud computing services will not be sufficient to manage future device and data growth.
Edge Computing is the migration of computational functionality to sources of data generation. The importance of …
Omni-Directional Infrared 3d Reconstruction And Tracking Of Human Targets, Emrah Benli
Omni-Directional Infrared 3d Reconstruction And Tracking Of Human Targets, Emrah Benli
Theses and Dissertations
Omni-directional (O-D) infrared (IR) vision is an effective capability for mobile systems in robotics, due to its advantages: illumination invariance, wide field-of-view, ease of identifying heat-emitting objects, and long term tracking without interruption. Unfortunately, O-D IR sensors have low resolution, low frame rates, high cost, sensor noise, and an increase in tracking time. In order to overcome these disadvantages, we propose an autonomous system application in indoor scenarios including 1) Dynamic 3D Reconstruction (D3DR) of the target view in real time images, 2) Human Behavior-based Target Tracking from O-D thermal images, 3) Thermal Multisensor Fusion (TMF), and 4) Visual Perception …
Design And Implementation Of An Improved Android Application For Bard Shuttle Services, Chance O'Neihl Wren
Design And Implementation Of An Improved Android Application For Bard Shuttle Services, Chance O'Neihl Wren
Senior Projects Spring 2017
With the growing population of Bard College, the need for the college’s shuttle system continues to grow. As a result, enabling the Bard community to quickly and easily access the shuttle schedules and times, has also become more important in the daily of life of Bard College's inhabitants. Although Bard College has a mobile application for Android and iPhone mobile devices alike, there was a growing demand for a new improved shuttle application for Android mobile devices. This project seeks to improve the functionality, user friendliness, and availability of shuttle schedules to the Bard Community, in the form of a …
System For Workout Information Management, Mark Archual, Ethan E. Schweinsberg
System For Workout Information Management, Mark Archual, Ethan E. Schweinsberg
Williams Honors College, Honors Research Projects
Power racks are a weight machine used by swimmers to provide resistance while they swim away from a wall toward the center of the pool. The objective of this project is to build a modular data system that can be added to these machines to record and log quantitative information during their use. This information will be stored on a web server, and made available to the user for analysis and visualization through a web application. Workout data can also be downloaded and interpreted at a later time, independent of the web application. The data system should be water resistant, …
Packmule, Jared M. Alexander, Jared J. Ford, Timothy J. Griffiths, Andray Pennington
Packmule, Jared M. Alexander, Jared J. Ford, Timothy J. Griffiths, Andray Pennington
Williams Honors College, Honors Research Projects
People face demands of hauling equipment and belongings with them every day, whether it be for work or leisure. This design report discusses and details a product that would allow people to overcome the struggles of this. The Packmule is an autonomous following robot that has the capability of carrying a load up to 30 pounds. The design involves two independently controlled motors operating two drive wheels so that the Packmule will be flexible in the directions it can move. There are also two more steering wheels for support of the base and the load inside. The way in which …