Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Digital Communications and Networking

Blockchain Based Communication Architectures With Applications To Private Security Networks, Ashley N. Mayle Nov 2020

Blockchain Based Communication Architectures With Applications To Private Security Networks, Ashley N. Mayle

Computer Science ETDs

Existing communication protocols in security networks are highly centralized. While this naively makes the controls easier to physically secure, external actors require fewer resources to disrupt the system because there are fewer points in the system can be interrupted without the entire system failing. We present a solution to this problem using a proof-of-work-based blockchain implementation built on MultiChain. We construct a test-bed network containing visual imagers and microwave sensor information. These data types are ubiquitous in perimeter security systems and allow a realistic representation of a real-world network architecture. The cameras in this system use an object detection algorithm …


Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh May 2020

Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh

Electronic Thesis and Dissertation Repository

Rapid growth in numbers of connected devices, including sensors, mobile, wearable, and other Internet of Things (IoT) devices, is creating an explosion of data that are moving across the network. To carry out machine learning (ML), IoT data are typically transferred to the cloud or another centralized system for storage and processing; however, this causes latencies and increases network traffic. Edge computing has the potential to remedy those issues by moving computation closer to the network edge and data sources. On the other hand, edge computing is limited in terms of computational power and thus is not well suited for …


Desarrollo De Un Esquema De Gestión Hídrica En El Sistema Acuífero Sap 3.1 Apoyado De La Tipificación De Suelos Y El Modelo Conceptual De Thöt, Maria Camila Soriano Espinosa, Camilo José Rodríguez Carvajal Jan 2020

Desarrollo De Un Esquema De Gestión Hídrica En El Sistema Acuífero Sap 3.1 Apoyado De La Tipificación De Suelos Y El Modelo Conceptual De Thöt, Maria Camila Soriano Espinosa, Camilo José Rodríguez Carvajal

Ingeniería Ambiental y Sanitaria

El presente proyecto tiene como objetivo principal desarrollar un esquema de gestión hídrica (EGH) en el sistema acuífero SAP 3.1, provincia llanos orientales, con base en la tipificación de suelos y el modelo conceptual de Tӧth, partiendo de que las aguas subterráneas se consideran una fuente alternativa de abastecimiento por su mejor calidad y el bajo costo de manejo en comparación al agua superficial, y teniendo en cuenta que el Departamento del Meta conoce la riqueza hídrica que está en su jurisdicción, no cuenta con una regulación adecuada en pro de una gestión hídrica a nivel subterráneo. La metodología empleada …


Algorithms For Achieving Fault-Tolerance And Ensuring Security In Cloud Computing Systems, Md. Tariqul Islam Jan 2020

Algorithms For Achieving Fault-Tolerance And Ensuring Security In Cloud Computing Systems, Md. Tariqul Islam

Theses and Dissertations--Computer Science

Security and fault tolerance are the two major areas in cloud computing systems that need careful attention for its widespread deployment. Unlike supercomputers, cloud clusters are mostly built on low cost, unreliable, commodity hardware. Therefore, large-scale cloud systems often suffer from performance degradation, service outages, and sometimes node and application failures. On the other hand, the multi-tenant shared architecture, dynamism, heterogeneity, and openness of cloud computing make it susceptible to various security threats and vulnerabilities. In this dissertation, we analyze these problems and propose algorithms for achieving fault tolerance and ensuring security in cloud computing systems.

First, we perform a …


Vehicle Operator Attention Monitor, Matthew Krispinsky, Matt Marsek, Matthew Mayfield, Brian Call Jan 2020

Vehicle Operator Attention Monitor, Matthew Krispinsky, Matt Marsek, Matthew Mayfield, Brian Call

Williams Honors College, Honors Research Projects

Motor vehicle operators’ attention levels can be monitored to improve driver safety. By recording and analyzing the drivers eye gaze, hand position, vehicle speed and engine rpm the driver’s attention can be determined. A Raspberry Pi will be the main processing unit. Data will be pulled and analyzed from the OBD-II port on vehicle speed and engine rpm. The system will be powered from a 12V, 4A pin on the OBD-II port connected to the car battery. A webcam will be used to track the pupil location and determine when the driver is looking at the road. A battery powered …