Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Computer Engineering

Security Protocol Suite For Preventing Cloud-Based Denial-Of-Service Attacks, Marwan M. Darwish Dec 2015

Security Protocol Suite For Preventing Cloud-Based Denial-Of-Service Attacks, Marwan M. Darwish

Electronic Thesis and Dissertation Repository

Cloud systems, also known as cloud services, are among the primary solutions of the information technology domain. Cloud services are accessed through an identity authentication process. These authentication processes have become increasingly vulnerable to adversaries who may perform denial-of-service (DoS) attacks to make cloud services inaccessible. Several strong authentication protocols have been employed to protect conventional network systems. Nevertheless, they can cause a DoS threat when implemented in the cloud-computing system. This is because the comprehensive verification process may exhaust the cloud resources and shut down cloud’s services. This thesis proposes a novel cloud-based secure authentication (CSA) protocol suite that …


Efficient Scheduling Algorithms For Wireless Resource Allocation And Virtualization In Wireless Networks, Mohamad Kalil Nov 2015

Efficient Scheduling Algorithms For Wireless Resource Allocation And Virtualization In Wireless Networks, Mohamad Kalil

Electronic Thesis and Dissertation Repository

The continuing growth in demand for better mobile broadband experiences has motivated rapid development of radio-access technologies to support high data rates and improve quality of service (QoS) and quality of experience (QoE) for mobile users. However, the modern radio-access technologies pose new challenges to mobile network operators (MNO) and wireless device designers such as reducing the total cost of ownership while supporting high data throughput per user, and extending battery life-per-charge of the mobile devices. In this thesis, a variety of optimization techniques aimed at providing innovative solutions for such challenges are explored.

The thesis is divided into two …


Elastic Highly Available Cloud Computing, Hassan Hawilo Aug 2015

Elastic Highly Available Cloud Computing, Hassan Hawilo

Electronic Thesis and Dissertation Repository

High availability and elasticity are two the cloud computing services technical features. Elasticity is a key feature of cloud computing where provisioning of resources is closely tied to the runtime demand. High availability assure that cloud applications are resilient to failures. Existing cloud solutions focus on providing both features at the level of the virtual resource through virtual machines by managing their restart, addition, and removal as needed. These existing solutions map applications to a specific design, which is not suitable for many applications especially virtualized telecommunication applications that are required to meet carrier grade standards. Carrier grade applications typically …


Counteracting Bloom Filter Encoding Techniques For Private Record Linkage, Vasundhara Sharma Jul 2015

Counteracting Bloom Filter Encoding Techniques For Private Record Linkage, Vasundhara Sharma

Electronic Thesis and Dissertation Repository

Record Linkage is a process of combining records representing same entity spread across multiple and different data sources, primarily for data analytics. Traditionally, this could be performed with comparing personal identifiers present in data (e.g., given name, surname, social security number etc.). However, sharing information across databases maintained by disparate organizations leads to exchange of personal information pertaining to an individual. In practice, various statutory regulations and policies prohibit the disclosure of such identifiers. Private record linkage (PRL) techniques have been implemented to execute record linkage without disclosing any information about other dissimilar records.

Various techniques have been proposed to …


A Maturity Model For Mobile Learning, Muasaad Alrasheedi Jun 2015

A Maturity Model For Mobile Learning, Muasaad Alrasheedi

Electronic Thesis and Dissertation Repository

Higher education is becoming increasingly interested in adopting innovative and modern technologies as a mode of imparting education. Mobile technologies are considered to be the next frontier of educational platforms as they have the capability to provide high-quality learning experiences and to satisfy the increasing demand for mobility and flexibility. In view of the ubiquitous nature of mobile technology and the immense opportunities it offers, there are favorable indications that the technology could be introduced as the next generation of learning platforms. The present research aims to develop a comprehensive framework based on the well-known Capability Maturity Model (CMM) and …


A Software Framework For Task Based Performance Evaluation, Justin J. Mackenzie May 2015

A Software Framework For Task Based Performance Evaluation, Justin J. Mackenzie

Electronic Thesis and Dissertation Repository

It is difficult to objectively measure performance of complex tasks such as a surgical operation and surgical simulators require the ability to evaluate performance whether to predict surgical outcome, determine competence, provide learning feedback, etc. With no standard software framework for collecting, analyzing and evaluating performance data for complex tasks in simulations, it is investigated whether a solution can be implemented that allows for custom data collection schemes, all while being general enough to be used across many simulation platforms and can be used in a simple simulator.It is also investigated whether the implemented framework can perform its functionality while …


Privacy In Cooperative Distributed Systems: Modeling And Protection Framework, Afshan Samani Apr 2015

Privacy In Cooperative Distributed Systems: Modeling And Protection Framework, Afshan Samani

Electronic Thesis and Dissertation Repository

A new form of computation is emerging rapidly with cloud computing, mobile computing, wearable computing and the Internet-of-Things. All can be characterized as a class of “Cooperative Distributed Systems” (CDS) in open environment. A major driver of the growth is the exponential adoption by people and organizations within all aspects of their day-to-day matters. In this context, users’ requirements for privacy protection are becoming essential and complex beyond the traditional approaches. This requires a formal treatment of “privacy” as a fundamental computation concept in CDS paradigm.

The objective is to develop a comprehensive formal model for “privacy” as base …


Advanced Compression And Latency Reduction Techniques Over Data Networks, Fuad Shamieh Apr 2015

Advanced Compression And Latency Reduction Techniques Over Data Networks, Fuad Shamieh

Electronic Thesis and Dissertation Repository

Applications and services operating over Internet protocol (IP) networks often suffer from high latency and packet loss rates. These problems are attributed to data congestion resulting from the lack of network resources available to support the demand. The usage of IP networks is not only increasing, but very dynamic as well. In order to alleviate the above-mentioned problems and to maintain a reasonable Quality of Service (QoS) for the end users, two novel adaptive compression techniques are proposed to reduce packets’ payload size. The proposed schemes exploit lossless compression algorithms to perform the compression process on the packets’ payloads and …