Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- ETD (3)
- Anomaly Detection (1)
- Biometrics (1)
- CUDA (1)
- Cloud Firewalls (1)
-
- Cloud Networks (1)
- Cloud Robotics (1)
- Cloud Security (1)
- Clustered systems (1)
- Compute load (1)
- Computer cooling (1)
- Condition Monitoring (CM) (1)
- Data center (1)
- Deep Learning (DL) (1)
- Distributed Acoustic Sensing (DAS) (1)
- Finite element analysis (FEA) (1)
- Hardware Firewalls (1)
- High Tonnage Loop (HTL) (1)
- Hypervisor (1)
- Job placement (1)
- Keystroke dynamics (1)
- Machine learning (1)
- Network Security (1)
- Neuromodulation (1)
- Packet Classification (1)
- Packet Filtering (1)
- Parallel processing (1)
- Power efficiency (1)
- Railroad (1)
- Railroad Safety (1)
Articles 1 - 5 of 5
Full-Text Articles in Computer Engineering
Railroad Condition Monitoring Using Distributed Acoustic Sensing And Deep Learning Techniques, Md Arifur Rahman
Railroad Condition Monitoring Using Distributed Acoustic Sensing And Deep Learning Techniques, Md Arifur Rahman
Electronic Theses and Dissertations
Proper condition monitoring has been a major issue among railroad administrations since it might cause catastrophic dilemmas that lead to fatalities or damage to the infrastructure. Although various aspects of train safety have been conducted by scholars, in-motion monitoring detection of defect occurrence, cause, and severity is still a big concern. Hence extensive studies are still required to enhance the accuracy of inspection methods for railroad condition monitoring (CM). Distributed acoustic sensing (DAS) has been recognized as a promising method because of its sensing capabilities over long distances and for massive structures. As DAS produces large datasets, algorithms for precise …
Determining Unique Agents By Evaluating Web Form Interaction, Ben Cooley
Determining Unique Agents By Evaluating Web Form Interaction, Ben Cooley
Electronic Theses and Dissertations
Because of the inherent risks in today’s online activities, it becomes imperative to identify a malicious user masquerading as someone else. Incorporating biometric analysis enhances the confidence of authenticating valid users over the Internet while providing additional layers of security with no hindrance to the end user. Through the analysis of traffic patterns and HTTP Header analysis, the detection and early refusal of robot agents plays a great role in reducing fraudulent login attempts.
Comparing The Efficiency Of Heterogeneous And Homogeneous Data Center Workloads, Brandon Kimmons
Comparing The Efficiency Of Heterogeneous And Homogeneous Data Center Workloads, Brandon Kimmons
Electronic Theses and Dissertations
Abstract
Information Technology, as an industry, is growing very quickly to keep pace with increased data storage and computing needs. Data growth, if not planned or managed correctly, can have larger efficiency implications on your data center as a whole. The long term reduction in efficiency will increase costs over time and increase operational overhead. Similarly, increases in processor efficiency have led to increased system density in data centers. This can increase cost and operational overhead in your data center infrastructure.
This paper proposes the idea that balanced data center workloads are more efficient in comparison to similar levels of …
Neuromodulation Based Control Of Autonomous Robots On A Cloud Computing Platform, Cameron Muhammad
Neuromodulation Based Control Of Autonomous Robots On A Cloud Computing Platform, Cameron Muhammad
Electronic Theses and Dissertations
In recent years, the advancement of neurobiologically plausible models and computer networking has resulted in new ways of implementing control systems on robotic platforms. The work presents a control approach based on vertebrate neuromodulation and its implementation on autonomous robots in the open-source, open-access environment of robot operating system (ROS). A spiking neural network (SNN) is used to model the neuromodulatory function for generating context based behavioral responses of the robots to sensory input signals. The neural network incorporates three types of neurons- cholinergic and noradrenergic (ACh/NE) neurons for attention focusing and action selection, dopaminergic (DA) neurons for rewards- and …
A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr
A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr
Electronic Theses and Dissertations
The rapid expansion in networking has provided tremendous opportunities to access an unparalleled amount of information. Everyone connects to a network to gain access and to share this information. However when someone connects to a public network, his private network and information becomes vulnerable to hackers and all kinds of security threats. Today, all networks needs to be secured, and one of the best security policies is firewall implementation.
Firewalls can be hardware or cloud based. Hardware based firewalls offer the advantage of faster response time, whereas cloud based firewalls are more flexible. In reality the best form of firewall …