Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

Supporting Transportation System Management And Operations Using Internet Of Things Technology, Hong Yang, Yuzhong Shen, Mecit Cetin, Zhenyu Wang May 2021

Supporting Transportation System Management And Operations Using Internet Of Things Technology, Hong Yang, Yuzhong Shen, Mecit Cetin, Zhenyu Wang

Computational Modeling & Simulation Engineering Faculty Publications

Low power wide-area network (LPWAN) technology aims to provide long range and low power wireless communication. It can serve as an alternative technology for data transmissions in many application scenarios (e.g., parking monitoring and remote flood sensing). In order to explore its feasibility in transportation systems, this project conducted a review of relevant literature to understand the current status of LPWAN applications. An online survey that targeted professionals concerned with transportation was also developed to elicit input about their experiences in using LPWAN technology for their projects. The literature review and survey results showed that LPWAN’s application in the U.S. …


Electroosmotic Mixing Of Non-Newtonian Fluid In A Microchannel With Obstacles And Zeta Potential Heterogeneity, Lanju Mei, Defu Cui, Jiayue Shen, Diganta Dutta, Willie Brown, Lei Zhang, Ibibia K. Dabipi Jan 2021

Electroosmotic Mixing Of Non-Newtonian Fluid In A Microchannel With Obstacles And Zeta Potential Heterogeneity, Lanju Mei, Defu Cui, Jiayue Shen, Diganta Dutta, Willie Brown, Lei Zhang, Ibibia K. Dabipi

Computational Modeling & Simulation Engineering Faculty Publications

This paper investigates the electroosmotic micromixing of non-Newtonian fluid in a microchannel with wall-mounted obstacles and surface potential heterogeneity on the obstacle surface. In the numerical simulation, the full model consisting of the Navier–Stokes equations and the Poisson–Nernst–Plank equations are solved for the electroosmotic fluid field, ion transport, and electric field, and the power law model is used to characterize the rheological behavior of the aqueous solution. The mixing performance is investigated under different parameters, such as electric double layer thickness, flow behavior index, obstacle surface zeta potential, obstacle dimension. Due to the zeta potential heterogeneity at the obstacle surface, …


Modeling And Simulation Of Cascading Failures In Transportation Systems During Hurricane Evacuations, Yuan Zhu, Kaan Ozbay, Hong Yang, Fan Zuo, Di Sha Jan 2021

Modeling And Simulation Of Cascading Failures In Transportation Systems During Hurricane Evacuations, Yuan Zhu, Kaan Ozbay, Hong Yang, Fan Zuo, Di Sha

Computational Modeling & Simulation Engineering Faculty Publications

Effective and timely evacuation is critical in alleviating the impact of hurricanes. As such, evacuation models are often sought to support the preparedness of evacuations. One important task in the modeling process is to evaluate exogenous factors that cause transportation system capacity loss during evacuation. Typical factors include direct damage to the roadway network due to storm surge and cascading impacts because of other facilities failures. For example, power outage can lead to signal failure and subway suspension. This paper aims to develop a macroscopic simulation-based approach to study the capacity loss of the roadway network in evacuation due to …


Hidden Markov Model And Cyber Deception For The Prevention Of Adversarial Lateral Movement, Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamhoua Jan 2021

Hidden Markov Model And Cyber Deception For The Prevention Of Adversarial Lateral Movement, Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamhoua

Computational Modeling & Simulation Engineering Faculty Publications

Advanced persistent threats (APTs) have emerged as multi-stage attacks that have targeted nation-states and their associated entities, including private and corporate sectors. Cyber deception has emerged as a defense approach to secure our cyber infrastructure from APTs. Practical deployment of cyber deception relies on defenders' ability to place decoy nodes along the APT path optimally. This paper presents a cyber deception approach focused on predicting the most likely sequence of attack paths and deploying decoy nodes along the predicted path. Our proposed approach combines reactive (graph analysis) and proactive (cyber deception technology) defense to thwart the adversaries' lateral movement. The …