Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Old Dominion University

Computer and Systems Architecture

Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 46

Full-Text Articles in Computer Engineering

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka Apr 2024

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka

Cybersecurity Undergraduate Research Showcase

The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …


Predictive Ai Applications For Sar Cases In The Us Coast Guard, Joshua Nelson Apr 2024

Predictive Ai Applications For Sar Cases In The Us Coast Guard, Joshua Nelson

Cybersecurity Undergraduate Research Showcase

This paper explores the potential integration of predictive analytics AI into the United States Coast Guard's (USCG) Search and Rescue Optimal Planning System (SAROPS) for deep sea and nearshore search and rescue (SAR) operations. It begins by elucidating the concept of predictive analytics AI and its relevance in military applications, particularly in enhancing SAR procedures. The current state of SAROPS and its challenges, including complexity and accuracy issues, are outlined. By integrating predictive analytics AI into SAROPS, the paper argues for streamlined operations, reduced training burdens, and improved accuracy in locating drowning personnel. Drawing on insights from military AI applications …


A New Cache Replacement Policy In Named Data Network Based On Fib Table Information, Mehran Hosseinzadeh, Neda Moghim, Samira Taheri, Nasrin Gholami Jan 2024

A New Cache Replacement Policy In Named Data Network Based On Fib Table Information, Mehran Hosseinzadeh, Neda Moghim, Samira Taheri, Nasrin Gholami

VMASC Publications

Named Data Network (NDN) is proposed for the Internet as an information-centric architecture. Content storing in the router’s cache plays a significant role in NDN. When a router’s cache becomes full, a cache replacement policy determines which content should be discarded for the new content storage. This paper proposes a new cache replacement policy called Discard of Fast Retrievable Content (DFRC). In DFRC, the retrieval time of the content is evaluated using the FIB table information, and the content with less retrieval time receives more discard priority. An impact weight is also used to involve both the grade of retrieval …


Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins Nov 2023

Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins

Cybersecurity Undergraduate Research Showcase

This paper will present the capabilities and security concerns of public AI, also called generative AI, and look at the societal and sociological effects of implementing regulations of this technology.


Ransomware: What Is Ransomware, And How To Prevent It, Brandon Chambers Apr 2023

Ransomware: What Is Ransomware, And How To Prevent It, Brandon Chambers

Cybersecurity Undergraduate Research Showcase

This research paper answers the question, “What is Ransomware, and How to prevent it?”. This paper will discuss what ransomware is, its history about ransomware, how ransomware attacks Windows systems, how to prevent ransomware, how to handle ransomware once it is already on the network, ideas for training professionals to avoid ransomware, and how anti-virus helps defend against ransomware. Many different articles, case studies, and professional blogs will be used to complete the research on this topic.


Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan Apr 2023

Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan

Cybersecurity Undergraduate Research Showcase

Cybercrime and attack methods have been steadily increasing since the 2019 pandemic. In the years following 2019, the number of victims and attacks per hour rapidly increased as businesses and organizations transitioned to digital environments for business continuity amidst lockdowns. In most scenarios cybercriminals continued to use conventional attack methods and known vulnerabilities that would cause minimal damage to an organization with a robust cyber security posture. However, zero-day exploits have skyrocketed across all industries with an increasingly growing technological landscape encompassing internet of things (IoT), cloud hosting, and more advanced mobile technologies. Reports by Mandiant Threat Intelligence (2022) concluded …


Quantum Computing And Its Applications In Healthcare, Vu Giang Jan 2023

Quantum Computing And Its Applications In Healthcare, Vu Giang

OUR Journal: ODU Undergraduate Research Journal

This paper serves as a review of the state of quantum computing and its application in healthcare. The various avenues for how quantum computing can be applied to healthcare is discussed here along with the conversation about the limitations of the technology. With more and more efforts put into the development of these computers, its future is promising with the endeavors of furthering healthcare and various other industries.


An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas Jan 2023

An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas

School of Cybersecurity Faculty Publications

Consumer Internet of Things (CIoT) manufacturers seek customer feedback to enhance their products and services, creating a smart ecosystem, like a smart home. Due to security and privacy concerns, blockchain-based federated learning (BCFL) ecosystems can let CIoT manufacturers update their machine learning (ML) models using end-user data. Federated learning (FL) uses privacy-preserving ML techniques to forecast customers' needs and consumption habits, and blockchain replaces the centralized aggregator to safeguard the ecosystem. However, blockchain technology (BCT) struggles with scalability and quick ledger expansion. In BCFL, local model generation and secure aggregation are other issues. This research introduces a novel architecture, emphasizing …


The Message Design Of Raiders Of The Lost Ark On The Atari 2600 & A Fan’S Map, Quick Start, And Strategy Guide, Miguel Ramlatchan, William I. Ramlatchan Jul 2022

The Message Design Of Raiders Of The Lost Ark On The Atari 2600 & A Fan’S Map, Quick Start, And Strategy Guide, Miguel Ramlatchan, William I. Ramlatchan

Distance Learning Faculty & Staff Books

The message design and human performance technology in video games, especially early video games have always been fascinating to me. From an instructional design perspective, the capabilities of the technology of the classic game consoles required a careful balance of achievable objectives, cognitive task analysis, guided problem solving, and message design. Raiders on the Atari is an excellent example of this balance. It is an epic adventure game, spanning 13+ distinct areas, with an inventory of items, where those hard to find items had to be used by the player to solve problems during their quest (and who would have …


Agile Research - Getting Beyond The Buzzword, Trupti Narayan Rane Jan 2022

Agile Research - Getting Beyond The Buzzword, Trupti Narayan Rane

Engineering Management & Systems Engineering Faculty Publications

"Oh yeah, we're an Agile shop, we gave up Waterfall years ago." - product owners, managers, or could be anyone else. You will seldom have a conversation with a product or software development team member without the agile buzzword thrown at you at the drop of a hat. It would not be an oversell to say that Agile software development has been adopted at a large scale across several big and small organizations. Clearly, Agile is an ideology that is working, which made me explore more on its applicability in research. As someone who has been in the Information Technology …


Simulation For Cybersecurity: State Of The Art And Future Directions, Hamdi Kavak, Jose J. Padilla, Daniele Vernon-Bido, Saikou Y. Diallo, Ross Gore, Sachin Shetty Jan 2021

Simulation For Cybersecurity: State Of The Art And Future Directions, Hamdi Kavak, Jose J. Padilla, Daniele Vernon-Bido, Saikou Y. Diallo, Ross Gore, Sachin Shetty

VMASC Publications

In this article, we provide an introduction to simulation for cybersecurity and focus on three themes: (1) an overview of the cybersecurity domain; (2) a summary of notable simulation research efforts for cybersecurity; and (3) a proposed way forward on how simulations could broaden cybersecurity efforts. The overview of cybersecurity provides readers with a foundational perspective of cybersecurity in the light of targets, threats, and preventive measures. The simulation research section details the current role that simulation plays in cybersecurity, which mainly falls on representative environment building; test, evaluate, and explore; training and exercises; risk analysis and assessment; and humans …


Modeling And Simulation Of Cascading Failures In Transportation Systems During Hurricane Evacuations, Yuan Zhu, Kaan Ozbay, Hong Yang, Fan Zuo, Di Sha Jan 2021

Modeling And Simulation Of Cascading Failures In Transportation Systems During Hurricane Evacuations, Yuan Zhu, Kaan Ozbay, Hong Yang, Fan Zuo, Di Sha

Computational Modeling & Simulation Engineering Faculty Publications

Effective and timely evacuation is critical in alleviating the impact of hurricanes. As such, evacuation models are often sought to support the preparedness of evacuations. One important task in the modeling process is to evaluate exogenous factors that cause transportation system capacity loss during evacuation. Typical factors include direct damage to the roadway network due to storm surge and cascading impacts because of other facilities failures. For example, power outage can lead to signal failure and subway suspension. This paper aims to develop a macroscopic simulation-based approach to study the capacity loss of the roadway network in evacuation due to …


Hidden Markov Model And Cyber Deception For The Prevention Of Adversarial Lateral Movement, Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamhoua Jan 2021

Hidden Markov Model And Cyber Deception For The Prevention Of Adversarial Lateral Movement, Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamhoua

Computational Modeling & Simulation Engineering Faculty Publications

Advanced persistent threats (APTs) have emerged as multi-stage attacks that have targeted nation-states and their associated entities, including private and corporate sectors. Cyber deception has emerged as a defense approach to secure our cyber infrastructure from APTs. Practical deployment of cyber deception relies on defenders' ability to place decoy nodes along the APT path optimally. This paper presents a cyber deception approach focused on predicting the most likely sequence of attack paths and deploying decoy nodes along the predicted path. Our proposed approach combines reactive (graph analysis) and proactive (cyber deception technology) defense to thwart the adversaries' lateral movement. The …


Measuring Decentrality In Blockchain Based Systems, Sarada Prasad Gochhayat, Sachin Shetty, Ravi Mukkamala, Peter Foytik, Georges A. Kamhoua, Laurent Njilla Jan 2020

Measuring Decentrality In Blockchain Based Systems, Sarada Prasad Gochhayat, Sachin Shetty, Ravi Mukkamala, Peter Foytik, Georges A. Kamhoua, Laurent Njilla

VMASC Publications

Blockchain promises to provide a distributed and decentralized means of trust among untrusted users. However, in recent years, a shift from decentrality to centrality has been observed in the most accepted Blockchain system, i.e., Bitcoin. This shift has motivated researchers to identify the cause of decentrality, quantify decentrality and analyze the impact of decentrality. In this work, we take a holistic approach to identify and quantify decentrality in Blockchain based systems. First, we identify the emergence of centrality in three layers of Blockchain based systems, namely governance layer, network layer and storage layer. Then, we quantify decentrality in these layers …


Implementing Asynchronous Linear Solvers Using Non-Uniform Distributions, Erik Jensen, Evan C. Coleman, Masha Sosonkina Jan 2020

Implementing Asynchronous Linear Solvers Using Non-Uniform Distributions, Erik Jensen, Evan C. Coleman, Masha Sosonkina

Computational Modeling & Simulation Engineering Faculty Publications

Asynchronous iterative methods present a mechanism to improve the performance of algorithms for highly parallel computational platforms by removing the overhead associated with synchronization among computing elements. This paper considers a class of asynchronous iterative linear system solvers that employ randomization to determine the component update orders, specifically focusing on the effects of drawing the order from non-uniform distributions. Results from shared-memory experiments with a two-dimensional finite-difference discrete Laplacian problem show that using distributions favoring the selection of components with a larger contribution to the residual may lead to faster convergence than selecting uniformly. Multiple implementations of the randomized asynchronous …


A Reliable Data Provenance And Privacy Preservation Architecture For Business-Driven Cyber-Physical Systems Using Blockchain, Xueping Liang, Sachin Shetty, Deepak K. Tosh, Juan Zhao, Danyi Li, Jihong Liu Jan 2018

A Reliable Data Provenance And Privacy Preservation Architecture For Business-Driven Cyber-Physical Systems Using Blockchain, Xueping Liang, Sachin Shetty, Deepak K. Tosh, Juan Zhao, Danyi Li, Jihong Liu

VMASC Publications

Cyber-physical systems (CPS) including power systems, transportation, industrial control systems, etc. support both advanced control and communications among system components. Frequent data operations could introduce random failures and malicious attacks or even bring down the whole system. The dependency on a central authority increases the risk of single point of failure. To establish an immutable data provenance scheme for CPS, the authors adopt blockchain and propose a decentralized architecture to assure data integrity. In business-driven CPS, end users are required to share their personal information with multiple third parties. To prevent data leakage and preserve user privacy, the authors isolate …


Stability And Sensitivity Measures For Solutions In Complex, Intelligent, Adaptive And Autonomous Systems, Andreas Tolk Jan 2016

Stability And Sensitivity Measures For Solutions In Complex, Intelligent, Adaptive And Autonomous Systems, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

Simulation has become a pivotal tool for the design, analysis, and control of complex, intelligent, adaptive and autonomous systems and its components. However, due to the nature of these systems, traditional evaluation practices are often not sufficient. As the components follow adaptive rules, the cumulative events often exploit bifurcation enabling events, leading to clusters of solutions that do not follow the usual rules for standard distributed events. When using simulation for design, analysis, and control of such systems, the evaluation needs to be richer, applying bifurcation and cluster analysis to understand the distribution, applying factor analysis to understand the important …


Engineering Analytics: Research Into The Governance Structure Needed To Integrate The Dominant Design Methodologies, Teddy Steven Cotter Jan 2015

Engineering Analytics: Research Into The Governance Structure Needed To Integrate The Dominant Design Methodologies, Teddy Steven Cotter

Engineering Management & Systems Engineering Faculty Publications

In the ASEM-IAC 2014, Cotter (2014) explored the current state of engineering design, identified the dominate approaches to engineering design, discussed potential contributions from the new field of data analytics to engineering design, and proposed an Engineering Analytics framework that integrates the dominate engineering design approaches and data analytics within a human-intelligence/machine-intelligence (HI-MI) design architecture. This paper reports research applying ontological engineering to integrate the dominate engineering design methodologies into a systemic engineering design decision governance architecture.


Improving C2 Effectiveness Based On Robust Connectivity, S. Deller, A. Tolk, G. Rabadi, S. Bowling Jan 2014

Improving C2 Effectiveness Based On Robust Connectivity, S. Deller, A. Tolk, G. Rabadi, S. Bowling

Computational Modeling & Simulation Engineering Faculty Publications

This chapter describes an approach to develop an improved metric for network effectiveness through the use of Cares' (2005) Information Age Combat Model (IACM) as a context for combat (or competition) between networked forces. The IACM highlights the inadequacy of commonly used quantifiable metrics with regards to comparing networks that differ only by the placement of a few links. An agent-based simulation is used to investigate the potential value of the Perron-Frobenius Eigenvalue (λPFE) as an indicator of network effectiveness. The results validate this assumption. Another measurement is proven to be equally important, namely the robustness of a …


The Value Of Modeling And Simulation Standards, Andrew J. Collins, David Meyr, Solomon Sherfey, Andreas Tolk, Mikel Petty Jan 2012

The Value Of Modeling And Simulation Standards, Andrew J. Collins, David Meyr, Solomon Sherfey, Andreas Tolk, Mikel Petty

VMASC Publications

In the current economic climate, there is a requirement to justify all government spending by demonstrating the added-value that the expenditure gives. Modeling and Simulation (M&S) community is not exempted from this rule. This paper focuses on attempts to value standards and demonstrates that even though a myriad of different standards exist in the United States today, no one has "cracked the nut" on determining their value. This does not mean that standards are without value. The paper highlights their importance to our society and human development as a whole. Thus if we cannot give a value to M&S standards, …


Executable Architecture Research At Old Dominion University, Andreas Tolk, Johnny J. Garcia, Edwin A. Shuman Jan 2011

Executable Architecture Research At Old Dominion University, Andreas Tolk, Johnny J. Garcia, Edwin A. Shuman

Computational Modeling & Simulation Engineering Faculty Publications

Executable Architectures allow the evaluation of system architectures not only regarding their static, but also their dynamic behavior. However, the systems engineering community do not agree on a common formal specification of executable architectures. To close this gap and identify necessary elements of an executable architecture, a modeling language, and a modeling formalism is topic of ongoing PhD research. In addition, systems are generally defined and applied in an operational context to provide capabilities and enable missions. To maximize the benefits of executable architectures, a second PhD effort introduces the idea of creating an executable context in addition to the …


Enhancing Simulation Composability And Interoperability Using Conceptual/Semantic/Ontological Models, Andreas Tolk, John A. Miller Jan 2011

Enhancing Simulation Composability And Interoperability Using Conceptual/Semantic/Ontological Models, Andreas Tolk, John A. Miller

Computational Modeling & Simulation Engineering Faculty Publications

(First paragraph) Two emerging trends in Modeling and Simulation (M&S) are beginning to dovetail in a potentially highly productive manner, namely conceptual modeling and semantic modeling. Conceptual modeling has existed for several decades, but its importance has risen to the forefront in the last decade (Taylor and Robinson, 2006; Robinson, 2007). Also, during the last decade, progress on the Semantic Web has begun to influence M&S, with the development of general modeling ontologies (Miller et al, 2004), as well as ontologies for modeling particular domains (Durak, 2006). An ontology, which is a formal specification of a conceptualization (Gruber et al, …


Do We Need M&S Science?, Jose J. Padilla, Saikou Y. Diallo, Andreas Tolk Jan 2011

Do We Need M&S Science?, Jose J. Padilla, Saikou Y. Diallo, Andreas Tolk

VMASC Publications

No abstract provided.


Software Reuse For Modeling And Simulation, Emily Andrew, Charles D. Turnitsa, Andreas Tolk Jan 2011

Software Reuse For Modeling And Simulation, Emily Andrew, Charles D. Turnitsa, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

In Modeling and Simulation, as a distinct area of software engineering, there is much interest in being able to reuse software components. However, the practice of simulation development and maintenance is different from software engineering because of several factors. In this paper, a brief overview of the foundations of interoperability, and how they apply to the reuse of model based software is explored, as well as examination of current practices to include M&S software repositories. Some recommendations, based on research at the Virginia Modeling Analysis and Simulation Center (VMASC) and practice at the Raytheon Company Network Centric Services, are made.


Nato Human View Architecture And Human Networks, Holly A. H. Handley, Nancy P. Houston Mar 2010

Nato Human View Architecture And Human Networks, Holly A. H. Handley, Nancy P. Houston

Engineering Management & Systems Engineering Faculty Publications

The NATO Human View is a system architectural viewpoint that focuses on the human as part of a system. Its purpose is to capture the human requirements and to inform on how the human impacts the system design. The viewpoint contains seven static models that include different aspects of the human element, such as roles, tasks, constraints, training and metrics. It also includes a Human Dynamics component to perform simulations of the human system under design. One of the static models, termed Human Networks, focuses on the human-to-human communication patterns that occur as a result of ad hoc or deliberate …


Using Simulation Systems For Decision Support, Andreas Tolk Jan 2010

Using Simulation Systems For Decision Support, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

This chapter describes the use of simulation systems for decision support in support of real operations, which is the most challenging application domain in the discipline of modeling and simulation. To this end, the systems must be integrated as services into the operational infrastructure. To support discovery, selection, and composition of services, they need to be annotated regarding technical, syntactic, semantic, pragmatic, dynamic, and conceptual categories. The systems themselves must be complete and validated. The data must be obtainable, preferably via common protocols shared with the operational infrastructure. Agents and automated forces must produce situation adequate behavior. If these requirements …


Transmitter Optimization In Multiuser Wireless Systems With Quality Of Service Constraints, Danda B. Rawat Jan 2010

Transmitter Optimization In Multiuser Wireless Systems With Quality Of Service Constraints, Danda B. Rawat

Electrical & Computer Engineering Theses & Dissertations

In this dissertation, transmitter adaptation for optimal resource allocation in wireless communication systems are investigated. First, a multiple access channel model is considered where many transmitters communicate with a single receiver. This scenario is a basic component of a. wireless network in which multiple users simultaneously access the resources of a wireless service provider. Adaptive algorithms for transmitter optimization to meet Quality-of-Service (QoS) requirements in a distributed manner are studied. Second, an interference channel model is considered where multiple interfering transmitter-receiver pairs co-exist such that a given transmitter communicates with its intended receiver in the presence of interference from other …


Conceptual Requirements For Command And Control Languages, Andreas Tolk, Curtis L. Blais, Saikou Y. Diallo, Charles Turnitsa Jan 2009

Conceptual Requirements For Command And Control Languages, Andreas Tolk, Curtis L. Blais, Saikou Y. Diallo, Charles Turnitsa

Computational Modeling & Simulation Engineering Faculty Publications

The current Coalition Battle Management Language initiative (C-BML) will define a language to unambiguously exchange command and control information between systems. This paper introduces a categorization that may be used to guide the process of developing C-BML effectively by enumerating the conceptual requirements the authors have identified in model-based data engineering and process engineering based studies in various domains.

First, it is important to distinguish if application of the language will support the planning, execution, or observation phase of command and control. While C-BML already distinguishes between tasking and reporting, planning is a category with different requirements.

Second, the language …


Harmonizing Bml Approaches: Grammars And Data Models For A Bml Standard, Dietmar Kunde, Thomas Orichel, Andreas Tolk, Ulrich Schade, Michael R. Hieb Jan 2009

Harmonizing Bml Approaches: Grammars And Data Models For A Bml Standard, Dietmar Kunde, Thomas Orichel, Andreas Tolk, Ulrich Schade, Michael R. Hieb

Computational Modeling & Simulation Engineering Faculty Publications

Battle Management Language (BML) is being developed as an open standard that unambiguously formalizes and specifies Command and Control information, including orders and reports built upon precise representations of tasks. BML is a language specification, based on doctrine and consistent with Coalition standards. The goal of BML is to enable and improve the interoperability in the C2 area, especially by enabling also the military communication with simulation systems and future robotic forces.

Although the need for BML is well documented, a SISO standard has still not been achieved. At present, there are two recommended approaches focusing on different aspects. In …


Utilizing Strategic Project Management Processes And The Nato Code Of Best Practice To Improve Management Of Experimentation Events, Andreas Tolk, Rafael E. Landaeta, Robert H. Kewley, Thomas T. Litwin Jan 2009

Utilizing Strategic Project Management Processes And The Nato Code Of Best Practice To Improve Management Of Experimentation Events, Andreas Tolk, Rafael E. Landaeta, Robert H. Kewley, Thomas T. Litwin

Computational Modeling & Simulation Engineering Faculty Publications

Systems engineering and project management are two core engineering management processes supported by core quantitative disciplines within engineering management problems. Traditional approaches to systems engineering focus on a single system being engineered and managed (i.e., project managed), while challenges addressing composition of systems of systems and the reuse of systems for new solutions require a strategic management approach that promote a process flow in which the outputs of one project (e.g., deliverables, knowledge, work documents) are captured for the benefit of other projects within and outside the project-based organization. Two other core processes of engineering management are therefore critical to …