Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Databases and Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Blockchain (2)
- Areas of Same Cardinal direction (1)
- Biometrics (1)
- Cardinal Directions (1)
- Cardinal direction as field (1)
-
- Chord (1)
- Consensus attacks (1)
- Cybersecurity (1)
- DHT (1)
- Direction relations (1)
- Distributed Filesystem (1)
- Diversification (1)
- Fairness (1)
- Fingerprints (1)
- GIS (1)
- Invasive Species (1)
- Machine Learning (1)
- Machine learning (1)
- Mapping (1)
- Multi-chain networks (1)
- Network auditing (1)
- Neural Networks (1)
- Permission (1)
- Principle of Least Privilege (1)
- Proof-of-work consensus algorithms (1)
- Query processing (1)
- Ranking (1)
- Remote Sensing (1)
- Risk (1)
- Role Explosion (1)
Articles 1 - 8 of 8
Full-Text Articles in Databases and Information Systems
Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum
Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum
Honors Theses
Satellite communication is essential for the exploration and study of space. Satellites allow communications with many devices and systems residing in space and on the surface of celestial bodies from ground stations on Earth. However, with the rise of Ground Station as a Service (GsaaS), the ability to efficiently send action commands to distant satellites must ensure non-repudiation such that an attacker is unable to send malicious commands to distant satellites. Distant satellites are also constrained devices and rely on limited power, meaning security on these devices is minimal. Therefore, this study attempted to propose a novel algorithm to allow …
Diversification And Fairness In Top-K Ranking Algorithms, Mahsa Asadi
Diversification And Fairness In Top-K Ranking Algorithms, Mahsa Asadi
Dissertations
Given a user query, the typical user interfaces, such as search engines and recommender systems, only allow a small number of results to be returned to the user. Hence, figuring out what would be the top-k results is an important task in information retrieval, as it helps to ensure that the most relevant results are presented to the user. There exists an extensive body of research that studies how to score the records and return top-k to the user. Moreover, there exists an extensive set of criteria that researchers identify to present the user with top-k results, and result diversification …
An Analysis And Examination Of Consensus Attacks In Blockchain Networks, Thomas R. Clark
An Analysis And Examination Of Consensus Attacks In Blockchain Networks, Thomas R. Clark
Senior Honors Projects, 2020-current
This paper examines consensus attacks as they relate to blockchain networks. Consensus attacks are a significant threat to the security and integrity of blockchain networks, and understanding these attacks is crucial for developers and stakeholders. The primary contribution of the paper is to present blockchain and consensus attacks in a clear and accessible manner, with the aim of making these complex concepts easily understandable for a general audience. Using literature review, the paper identifies various methods to prevent consensus attacks, including multi-chain networks, proof-of-work consensus algorithms, and network auditing and monitoring. An analysis revealed that these methods for preventing consensus …
Areas Of Same Cardinal Direction, Periyandy Thunendran
Areas Of Same Cardinal Direction, Periyandy Thunendran
Electronic Theses and Dissertations
Cardinal directions, such as North, East, South, and West, are the foundation for qualitative spatial reasoning, a common field of GIS, Artificial Intelligence, and cognitive science. Such cardinal directions capture the relative spatial direction relation between a reference object and a target object, therefore, they are important search criteria in spatial databases. The projection-based model for such direction relations has been well investigated for point-like objects, yielding a relation algebra with strong inference power. The Direction Relation Matrix defines the simple region-to-region direction relations by approximating the reference object to a minimum bounding rectangle. Models that capture the direction between …
Rbac Attack Exposure Auditor. Tracking User Risk Exposure Per Role-Based Access Control Permissions, Adelaide Damrau
Rbac Attack Exposure Auditor. Tracking User Risk Exposure Per Role-Based Access Control Permissions, Adelaide Damrau
Undergraduate Honors Theses
Access control models and implementation guidelines for determining, provisioning, and de-provisioning user permissions are challenging due to the differing approaches, unique for each organization, the lack of information provided by case studies concerning the organization’s security policies, and no standard means of implementation procedures or best practices. Although there are multiple access control models, one stands out, role-based access control (RBAC). RBAC simplifies maintenance by enabling administrators to group users with similar permissions. This approach to managing user permissions supports the principle of least privilege and separation of duties, which are needed to ensure an organization maintains acceptable user access …
Invasive Buckthorn Mapping: A Uav-Based Approach Utilizing Machine Learning, Gis, And Remote Sensing Techniques In The Upper Peninsula Of Michigan, Vikranth Madeppa
Invasive Buckthorn Mapping: A Uav-Based Approach Utilizing Machine Learning, Gis, And Remote Sensing Techniques In The Upper Peninsula Of Michigan, Vikranth Madeppa
Dissertations, Master's Theses and Master's Reports
An Invasive species is a species that is alien or non-native to the ecosystem which causes harm to economic, environmental, or human health (E.O. 13112 of Feb 3, 1999). Invasive species have posed a serious threat to ecosystems across the globe. These invasive species have impacts on the biodiversity and productivity of invaded forests. Remotely sensed data is a valuable resource for understanding and addressing issues related to invasive species. This study presents a novel approach for mapping the distribution of two invasive plant species, Common and Glossy Buckthorn, using unmanned aerial vehicles (UAVs), machine learning algorithms, geographic information systems …
High Performance Distributed File System Based On Blockchain, Ajinkya Rajguru
High Performance Distributed File System Based On Blockchain, Ajinkya Rajguru
Master's Projects
Distributed filesystem architectures use commodity hardware to store data on a large scale with maximum consistency and availability. Blockchain makes it possible to store information that can never be tampered with and incentivizes a traditional decentralized storage system. This project aimed to implement a decentralized filesystem that leverages the blockchain to keep a record of all the transactions on it. A conventional filesystem viz. GFS [1] or HDFS [2] uses designated servers owned by their organization to store the data and are governed by a master service. This project aimed at removing a single point of failure and makes use …
Sequence Checking And Deduplication For Existing Fingerprint Databases, Tahsin Islam Sakif
Sequence Checking And Deduplication For Existing Fingerprint Databases, Tahsin Islam Sakif
Graduate Theses, Dissertations, and Problem Reports
Biometric technology is a rapidly evolving field with applications that range from access to devices to border crossing and entry/exit processes. Large-scale applications to collect biometric data, such as border crossings result in multimodal biometric databases containing thousands of identities. However, due to human operator error, these databases often contain many instances of image labeling and classification; this is due to the lack of training and throughput pressure that comes with human error. Multiple entries from the same individual may be assigned to a different identity. Rolled fingerprints may be labeled as flat images, a face image entered into a …