Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Physical Sciences and Mathematics

Wireless Sensor Networks For Smart Communications, Mu Zhou, Qilian Liang, Hongyi Wu, Weixiao Meng, Kunjie Xu Oct 2018

Wireless Sensor Networks For Smart Communications, Mu Zhou, Qilian Liang, Hongyi Wu, Weixiao Meng, Kunjie Xu

Electrical & Computer Engineering Faculty Publications

(First paragraph) In the first edition of the special issue titled “Wireless Sensor Networks for Smart Communications”, a total of 22 manuscripts were received and 6 of these were accepted. This issue demonstrated that network congestion, user mobility, and adjacent spectrum interference are the main reasons for the degradation ofcommunication quality inWireless Sensor Networks (WSNs).


Identification And Optimal Linear Tracking Control Of Odu Autonomous Surface Vehicle, Nadeem Khan Jul 2018

Identification And Optimal Linear Tracking Control Of Odu Autonomous Surface Vehicle, Nadeem Khan

Mechanical & Aerospace Engineering Theses & Dissertations

Autonomous surface vehicles (ASVs) are being used for diverse applications of civilian and military importance such as: military reconnaissance, sea patrol, bathymetry, environmental monitoring, and oceanographic research. Currently, these unmanned tasks can accurately be accomplished by ASVs due to recent advancements in computing, sensing, and actuating systems. For this reason, researchers around the world have been taking interest in ASVs for the last decade. Due to the ever-changing surface of water and stochastic disturbances such as wind and tidal currents that greatly affect the path-following ability of ASVs, identification of an accurate model of inherently nonlinear and stochastic ASV system …


Analysis Of Bulk Power System Resilience Using Vulnerability Graph, Md Ariful Haque Jul 2018

Analysis Of Bulk Power System Resilience Using Vulnerability Graph, Md Ariful Haque

Computational Modeling & Simulation Engineering Theses & Dissertations

Critical infrastructure such as a Bulk Power System (BPS) should have some quantifiable measure of resiliency and definite rule-sets to achieve a certain resilience value. Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA) networks are integral parts of BPS. BPS or ICS are themselves not vulnerable because of their proprietary technology, but when the control network and the corporate network need to have communications for performance measurements and reporting, the ICS or BPS become vulnerable to cyber-attacks. Thus, a systematic way of quantifying resiliency and identifying crucial nodes in the network is critical for addressing the cyber …


Design And Implementation Of An Artificial Neural Network Controller For Quadrotor Flight In Confined Environment, Ahmed Mekky Apr 2018

Design And Implementation Of An Artificial Neural Network Controller For Quadrotor Flight In Confined Environment, Ahmed Mekky

Mechanical & Aerospace Engineering Theses & Dissertations

Quadrotors offer practical solutions for many applications, such as emergency rescue, surveillance, military operations, videography and many more. For this reason, they have recently attracted the attention of research and industry. Even though they have been intensively studied, quadrotors still suffer from some challenges that limit their use, such as trajectory measurement, attitude estimation, obstacle avoidance, safety precautions, and land cybersecurity. One major problem is flying in a confined environment, such as closed buildings and tunnels, where the aerodynamics around the quadrotor are affected by close proximity objects, which result in tracking performance deterioration, and sometimes instability. To address this …


To Relive The Web: A Framework For The Transformation And Archival Replay Of Web Pages, John Andrew Berlin Apr 2018

To Relive The Web: A Framework For The Transformation And Archival Replay Of Web Pages, John Andrew Berlin

Computer Science Theses & Dissertations

When replaying an archived web page (known as a memento), the fundamental expectation is that the page should be viewable and function exactly as it did at archival time. However, this expectation requires web archives to modify the page and its embedded resources, so that they no longer reference (link to) the original server(s) they were archived from but back to the archive. Although these modifications necessarily change the state of the representation, it is understood that without them the replay of mementos from the archive would not be possible. Unfortunately, because the replay of mementos and the modifications made …


A Reliable Data Provenance And Privacy Preservation Architecture For Business-Driven Cyber-Physical Systems Using Blockchain, Xueping Liang, Sachin Shetty, Deepak K. Tosh, Juan Zhao, Danyi Li, Jihong Liu Jan 2018

A Reliable Data Provenance And Privacy Preservation Architecture For Business-Driven Cyber-Physical Systems Using Blockchain, Xueping Liang, Sachin Shetty, Deepak K. Tosh, Juan Zhao, Danyi Li, Jihong Liu

VMASC Publications

Cyber-physical systems (CPS) including power systems, transportation, industrial control systems, etc. support both advanced control and communications among system components. Frequent data operations could introduce random failures and malicious attacks or even bring down the whole system. The dependency on a central authority increases the risk of single point of failure. To establish an immutable data provenance scheme for CPS, the authors adopt blockchain and propose a decentralized architecture to assure data integrity. In business-driven CPS, end users are required to share their personal information with multiple third parties. To prevent data leakage and preserve user privacy, the authors isolate …


Hurricane Evacuation Modeling Using Behavior Models And Scenario-Driven Agent-Based Simulations, Yuan Zhu, Kun Xie, Kaan Ozbay, Hong Yang Jan 2018

Hurricane Evacuation Modeling Using Behavior Models And Scenario-Driven Agent-Based Simulations, Yuan Zhu, Kun Xie, Kaan Ozbay, Hong Yang

Computational Modeling & Simulation Engineering Faculty Publications

Transportation modeling and simulation play an important role in the planning and management of emergency evacuation. It is often indispensable for the preparedness and timely response to extreme events occurring in highly populated areas. Reliable and robust agent-based evacuation models are of great importance to support evacuation decision making. Nevertheless, these models rely on numerous hypothetical causal relationships between the evacuation behavior and a variety of factors including socio-economic characteristics and storm intensity. Understanding the impacts of these factors on evacuation behaviors (e.g., destination and route choices) is crucial in preparing optimal evacuation plans. This paper aims to contribute to …


Deep Recurrent Learning For Efficient Image Recognition Using Small Data, Mahbubul Alam Jan 2018

Deep Recurrent Learning For Efficient Image Recognition Using Small Data, Mahbubul Alam

Electrical & Computer Engineering Theses & Dissertations

Recognition is fundamental yet open and challenging problem in computer vision. Recognition involves the detection and interpretation of complex shapes of objects or persons from previous encounters or knowledge. Biological systems are considered as the most powerful, robust and generalized recognition models. The recent success of learning based mathematical models known as artificial neural networks, especially deep neural networks, have propelled researchers to utilize such architectures for developing bio-inspired computational recognition models. However, the computational complexity of these models increases proportionally to the challenges posed by the recognition problem, and more importantly, these models require a large amount of data …


Applying Machine Learning To Advance Cyber Security: Network Based Intrusion Detection Systems, Hassan Hadi Latheeth Al-Maksousy Jan 2018

Applying Machine Learning To Advance Cyber Security: Network Based Intrusion Detection Systems, Hassan Hadi Latheeth Al-Maksousy

Computer Science Theses & Dissertations

Many new devices, such as phones and tablets as well as traditional computer systems, rely on wireless connections to the Internet and are susceptible to attacks. Two important types of attacks are the use of malware and exploiting Internet protocol vulnerabilities in devices and network systems. These attacks form a threat on many levels and therefore any approach to dealing with these nefarious attacks will take several methods to counter. In this research, we utilize machine learning to detect and classify malware, visualize, detect and classify worms, as well as detect deauthentication attacks, a form of Denial of Service (DoS). …