Open Access. Powered by Scholars. Published by Universities.®

OS and Networks Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 1620

Full-Text Articles in OS and Networks

Question Answering For Suicide Risk Assessment Using Reddit, Amanuel Alambo, Usha Lokala, Ugur Kursuncu, Krishnaprasad Thirunarayan, Amelia Gyrard, Randon S. Welton, Jyotishman Pathak, Amit P. Sheth Feb 2019

Question Answering For Suicide Risk Assessment Using Reddit, Amanuel Alambo, Usha Lokala, Ugur Kursuncu, Krishnaprasad Thirunarayan, Amelia Gyrard, Randon S. Welton, Jyotishman Pathak, Amit P. Sheth

Kno.e.sis Publications

Mental Health America designed ten questionnaires that are used to determine the risk of mental disorders. They are also commonly used by Mental Health Professionals (MHPs) to assess suicidality. Specifically, the Columbia Suicide Severity Rating Scale (C-SSRS), a widely used suicide assessment questionnaire, helps MHPs determine the severity of suicide risk and offer an appropriate treatment. A major challenge in suicide treatment is the social stigma wherein the patient feels reluctance in discussing his/her conditions with an MHP, which leads to inaccurate assessment and treatment of patients. On the other hand, the same patient is comfortable freely discussing his ...


Empathi: An Ontology For Emergency Managing And Planning About Hazard Crisis, Manas Gaur, Kaeedeh Shekarpour, Amelia Gyrard, Amit P. Sheth Jan 2019

Empathi: An Ontology For Emergency Managing And Planning About Hazard Crisis, Manas Gaur, Kaeedeh Shekarpour, Amelia Gyrard, Amit P. Sheth

Kno.e.sis Publications

In the domain of emergency management during hazard crises, having sufficient situational awareness information is critical. It requires capturing and integrating information from sources such as satellite images, local sensors and social media content generated by local people.
A bold obstacle to capturing, representing and integrating such heterogeneous and diverse information is lack of a proper ontology which properly conceptualizes this domain, aggregates and unifies datasets. Thus, in this paper, we introduce empathi ontology which conceptualizes the core concepts describing the domain of emergency managing and planning of hazard crises.
Although empathi has a coarse-grained view, it considers the necessary ...


Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo Dec 2018

Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo

Faculty Scholarship at Penn Law

Paul Baran’s seminal 1964 article “On Distributed Communications Networks” that first proposed packet switching also advanced an underappreciated vision of network architecture: a lattice-like, distributed network, in which each node of the Internet would be homogeneous and equal in status to all other nodes. Scholars who have subsequently embraced the concept of a lattice-like network approach have largely overlooked the extent to which it is both inconsistent with network theory (associated with the work of Duncan Watts and Albert-László Barabási), which emphasizes the importance of short cuts and hubs in enabling networks to scale, and the actual way, the ...


Variable Input Observer For Nonstationary High-Rate Dynamic Systems, Jonathan Hong, Simon Laflamme, Liang Cao, Jacob Dodson, Bryan Joyce Dec 2018

Variable Input Observer For Nonstationary High-Rate Dynamic Systems, Jonathan Hong, Simon Laflamme, Liang Cao, Jacob Dodson, Bryan Joyce

Civil, Construction and Environmental Engineering Publications

Engineering systems experiencing events of amplitudes higher than 100 gn for a duration under 100 ms, here termed high-rate dynamics, can undergo rapid damaging effects. If the structural health of such systems could be accurately estimated in a timely manner, preventative measures could be employed to minimize adverse effects. For complex high-rate problems, adaptive observers have shown promise due to their capability to deal with nonstationary, noisy, and uncertain systems. However, adaptive observers have slow convergence rates, which impede their applicability to the high-rate problems. To improve on the convergence rate, we propose a variable input space concept for ...


Tcp Server And Client: Bookstore Enquiry, Fawaz Bukhowa Dec 2018

Tcp Server And Client: Bookstore Enquiry, Fawaz Bukhowa

Student Scholar Symposium Abstracts and Posters

An application called "Bookstore Enquiry", and it is implemented in Java using TCP client-server program. It contains two programs; one program is called "Server" and another one is called "Client". In this application, the 'server' maintains information about books and for each book it stores information like 'BookId', 'BookName', 'BookEdition', 'AvailableStock', 'UnitPrice', 'Discount'. This application works in such a way that, the server runs indefinitely and waits for client requests. The Client will accept the BookId & BookName from console and send it to server. If the server finds any books that matches with sent details, then it shows "BOOK FOUND ...


Automatic Performance Optimization On Heterogeneous Computer Systems Using Manycore Coprocessors, Chenggang Lai Dec 2018

Automatic Performance Optimization On Heterogeneous Computer Systems Using Manycore Coprocessors, Chenggang Lai

Theses and Dissertations

Emerging computer architectures and advanced computing technologies, such as Intel’s Many Integrated Core (MIC) Architecture and graphics processing units (GPU), provide a promising solution to employ parallelism for achieving high performance, scalability and low power consumption. As a result, accelerators have become a crucial part in developing supercomputers. Accelerators usually equip with different types of cores and memory. It will compel application developers to reach challenging performance goals. The added complexity has led to the development of task-based runtime systems, which allow complex computations to be expressed as task graphs, and rely on scheduling algorithms to perform load balancing ...


On Efficiency Of As Paths From Users To Content Servers: A Case Study Of Netflix, Jinu Susan Kabala, Lu Ruan Nov 2018

On Efficiency Of As Paths From Users To Content Servers: A Case Study Of Netflix, Jinu Susan Kabala, Lu Ruan

Computer Science Technical Reports

The majority of the Internet traffic today is content delivery traffic. The performance of content delivery depends on the efficiency of the routing paths from users to content servers and from content servers back to the users. While content providers can control the paths from their servers to the users, they have no control over the paths from users to their content servers and the efficiency of such paths is generally unknown. In this work, we conduct a case study of Netflix to understand the efficiency of the AS paths from various access ISPs to Netflix servers deployed at IXPs ...


Experiences & Challenges With Server-Side Wifi Indoor Localization Using Existing Infrastructure, Dheryta Jaisinghani, Rajesh Krishna Balan, Vinayak Naik, Archan Misra, Youngki Lee Nov 2018

Experiences & Challenges With Server-Side Wifi Indoor Localization Using Existing Infrastructure, Dheryta Jaisinghani, Rajesh Krishna Balan, Vinayak Naik, Archan Misra, Youngki Lee

Research Collection School Of Information Systems

Real-world deployments of WiFi-based indoor localization in large public venues are few and far between as most state-of-the-art solutions require either client or infrastructure-side changes. Hence, even though high location accuracy is possible with these solutions, they are not practical due to cost and/or client adoption reasons. Majority of the public venues use commercial controller-managed WLAN solutions, that neither allow client changes nor infrastructure changes. In fact, for such venues we have observed highly heterogeneous devices with very low adoption rates for client-side apps. In this paper, we present our experiences in deploying a scalable location system for such ...


Simknn: A Scalable Method For In-Memory Knn Search Over Moving Objects In Road Networks, Bin Cao, Chenyu Hou, Suifei Li, Jing Fan, Jianwei Yin, Baihua Zheng, Jie Bao Oct 2018

Simknn: A Scalable Method For In-Memory Knn Search Over Moving Objects In Road Networks, Bin Cao, Chenyu Hou, Suifei Li, Jing Fan, Jianwei Yin, Baihua Zheng, Jie Bao

Research Collection School Of Information Systems

Nowadays, many location-based applications require the ability of querying k-nearest neighbors over a very large scale of5 moving objects in road networks, e.g., taxi-calling and ride-sharing services. Traditional grid index with equal-sized cells can not adapt6 to the skewed distribution of moving objects in real scenarios. Thus, to obtain the fast querying response time, the grid needs to be split7 into more smaller cells which introduces the side-effect of higher memory cost, i.e., maintaining such a large volume of cells requires a8 much larger memory space at the server side. In this paper, we present SIMkNN, a scalable ...


Poster: Privacy-Preserving Boostingwith Random Linear Classifiers, Sagar Sharma, Keke Chen Oct 2018

Poster: Privacy-Preserving Boostingwith Random Linear Classifiers, Sagar Sharma, Keke Chen

Kno.e.sis Publications

We propose SecureBoost, a privacy-preserving predictive modeling framework, that allows service providers (SPs) to build powerful boosting models over encrypted or randomly masked user submit- ted data. SecureBoost uses random linear classifiers (RLCs) as the base classifiers. A Cryptographic Service Provider (CSP) manages keys and assists the SP’s processing to reduce the complexity of the protocol constructions. The SP learns only the base models (i.e., RLCs) and the CSP learns only the weights of the base models and a limited leakage function. This separated parameter holding avoids any party from abusing the final model or conducting model-based attacks ...


Using Electronic Health Records To Characterize Prescription Patterns: Focus On Antidepressants In Nonpsychiatric Outpatient Settings, Joseph J. Deferio, Tomer T. Levin, Judith Cukor, Samprit Banerjee, Rozan Abdulrahman, Amit P. Sheth, Neel Mehta, Jyotishman Pathak Oct 2018

Using Electronic Health Records To Characterize Prescription Patterns: Focus On Antidepressants In Nonpsychiatric Outpatient Settings, Joseph J. Deferio, Tomer T. Levin, Judith Cukor, Samprit Banerjee, Rozan Abdulrahman, Amit P. Sheth, Neel Mehta, Jyotishman Pathak

Kno.e.sis Publications

Objective

To characterize nonpsychiatric prescription patterns of antidepressants according to drug labels and evidence assessments (on-label, evidence-based, and off-label) using structured outpatient electronic health record (EHR) data. Methods

A retrospective analysis was conducted using deidentified EHR data from an outpatient practice at a New York City-based academic medical center. Structured “medication–diagnosis” pairs for antidepressants from 35 325 patients between January 2010 and December 2015 were compared to the latest drug product labels and evidence assessments. Results

Of 140 929 antidepressant prescriptions prescribed by primary care providers (PCPs) and nonpsychiatry specialists, 69% were characterized as “on-label/evidence-based uses.” Depression diagnoses ...


Building Iot Based Applications For Smart Cities: How Can Ontology Catalogs Help?, Amelia Gyrard, Antoine Zimmermann, Amit P. Sheth Oct 2018

Building Iot Based Applications For Smart Cities: How Can Ontology Catalogs Help?, Amelia Gyrard, Antoine Zimmermann, Amit P. Sheth

Kno.e.sis Publications

The Internet of Things (IoT) plays an ever-increasing role in enabling smart city applications. An ontology-based semantic approach can help improve interoperability between a variety of IoT-generated as well as complementary data needed to drive these applications. While multiple ontology catalogs exist, using them for IoT and smart city applications require significant amount of work. In this paper, we demonstrate how can ontology catalogs be more effectively used to design and develop smart city applications? We consider four ontology catalogs that are relevant for IoT and smart cities: 1) READY4SmartCities; 2) linked open vocabulary (LOV); 3) OpenSensingCity (OSC); and 4 ...


Blockchain Based Efficient And Robust Fair Payment For Outsourcing Services In Cloud Computing, Yinghui Zhang, Robert H. Deng, Ximeng Liu, Dong Zheng Sep 2018

Blockchain Based Efficient And Robust Fair Payment For Outsourcing Services In Cloud Computing, Yinghui Zhang, Robert H. Deng, Ximeng Liu, Dong Zheng

Research Collection School Of Information Systems

As an attractive business model of cloud computing, outsourcing services usually involve online payment and security issues. The mutual distrust between users and outsourcing service providers may severely impede the wide adoption of cloud computing. Nevertheless, most existing payment solutions only consider a specific type of outsourcing service and rely on a trusted third-party to realize fairness. In this paper, in order to realize secure and fair payment of outsourcing services in general without relying on any third-party, trusted or not, we introduce BCPay, a blockchain based fair payment framework for outsourcing services in cloud computing. We first present the ...


Predict The Failure Of Hydraulic Pumps By Different Machine Learning Algorithms, Yifei Zhou, Monika Ivantysynova, Nathan Keller Aug 2018

Predict The Failure Of Hydraulic Pumps By Different Machine Learning Algorithms, Yifei Zhou, Monika Ivantysynova, Nathan Keller

The Summer Undergraduate Research Fellowship (SURF) Symposium

Pump failure is a general concerned problem in the hydraulic field. Once happening, it will cause a huge property loss and even the life loss. The common methods to prevent the occurrence of pump failure is by preventative maintenance and breakdown maintenance, however, both of them have significant drawbacks. This research focuses on the axial piston pump and provides a new solution by the prognostic of pump failure using the classification of machine learning. Different kinds of sensors (temperature, acceleration and etc.) were installed into a good condition pump and three different kinds of damaged pumps to measure 10 of ...


Building Test Anonymity Networks In A Cybersecurity Lab Environment, John Schriner Aug 2018

Building Test Anonymity Networks In A Cybersecurity Lab Environment, John Schriner

Student Theses

This paper explores current methods for creating test anonymity networks in a laboratory environment for the purpose of improving these networks while protecting user privacy. We first consider how each of these networks is research-driven and interested in helping researchers to conduct their research ethically. We then look to the software currently available for researchers to set up in their labs. Lastly we explore ways in which digital forensics and cybersecurity students could get involved with these projects and look at several class exercises that help students to understand particular attacks on these networks and ways they can help to ...


Situation-Aware Authenticated Video Broadcasting Over Train-Trackside Wifi Networks, Yongdong Wu, Dengpan Ye, Zhuo Wei, Qian Wang, William Tan, Robert H. Deng Jul 2018

Situation-Aware Authenticated Video Broadcasting Over Train-Trackside Wifi Networks, Yongdong Wu, Dengpan Ye, Zhuo Wei, Qian Wang, William Tan, Robert H. Deng

Research Collection School Of Information Systems

Live video programmes can bring in better travel experience for subway passengers and earn abundant advertisement revenue for subway operators. However, because the train-trackside channels for video dissemination are easily accessible to anyone, the video traffic are vulnerable to attacks which may cause deadly tragedies. This paper presents a situation-aware authenticated video broadcasting scheme in the railway network which consists of train, on-board sensor, trackside GSM-R (Global System for Mobile Communications-Railway) device, WiFi AP (Access Point), and train control center. Specifically, the scheme has four modules: (1) a train uses its on-board sensors to obtain its speed, location, and RSSI ...


Creating Real-Time Dynamic Knowledge Graphs, Swati Padhee, Sarasi Lalithsena, Amit P. Sheth Jul 2018

Creating Real-Time Dynamic Knowledge Graphs, Swati Padhee, Sarasi Lalithsena, Amit P. Sheth

Kno.e.sis Publications

No abstract provided.


A Simplified Secure Programming Platform For Internet Of Things Devices, Halim Burak Yesilyurt Jun 2018

A Simplified Secure Programming Platform For Internet Of Things Devices, Halim Burak Yesilyurt

FIU Electronic Theses and Dissertations

The emerging Internet of Things (IoT) revolution has introduced many useful applications that are utilized in our daily lives. Users can program these devices in order to develop their own IoT applications; however, the platforms and languages that are used during development are abounding, complicated, and time-consuming. The software solution provided in this thesis, PROVIZ+, is a secure sensor application development software suite that helps users create sophisticated and secure IoT applications with little software and hardware experience. Moreover, a simple and efficient domain-specific programming language, namely Panther language, was designed for IoT application development to unify existing programming languages ...


Extension Of Cpe 454 Operating System, Joseph Nathaniel Arhar Jun 2018

Extension Of Cpe 454 Operating System, Joseph Nathaniel Arhar

Computer Science

This project extended on the operating system I wrote in CPE 454 by adding additional features on top of the existing implementation. In order to implement them, I researched operating system design patterns and hardware details. I used wiki.osdev.org for most research, just like I did in CPE 454. The source code for the project is at https://github.com/josepharhar/jos.


Deaddrop: Message Passing Without Metadata Leakage, Davis Mike Arndt Jun 2018

Deaddrop: Message Passing Without Metadata Leakage, Davis Mike Arndt

Computer Science

Even when network data is encrypted, observers can make inferences about content based on collected metadata. DeadDrop is an exploratory API designed to protect the metadata of a conversation from both outside observers and the facilitating server. To do so, DeadDrop servers are passed no recipient address, instead relying upon the recipient to check for messages of their own volition. In addition, the recipient downloads a copy of every encrypted message on the server to prevent even the server from knowing to whom each message is intended. To these purposes, DeadDrop is mostly successful. However, it does not obscure all ...


Survey Of Randomization Defenses On Cloud Computing, Jianming Fu, Yan Lin, Xiuwen Liu, Xu Zhang Jun 2018

Survey Of Randomization Defenses On Cloud Computing, Jianming Fu, Yan Lin, Xiuwen Liu, Xu Zhang

Research Collection School Of Information Systems

Cloud computing has changed the processing mode on resources of individuals and industries by providing computing and storage services to users. However, existing defenses on cloud, such as virtual machine monitoring and integrity detection, cannot counter against attacks result from the homogeneity and vulnerability of services effectively. In this paper, we have investigated the threats on cloud computing platform from the perspective of cloud service, service interface and network interface, such as code reuse attack, side channel attack and SQL injection. Code reuse attack chains code snippets (gadgets) located in binaries to bypass Data Execution Prevention (DEP). Side channel attack ...


Augmented Personalized Health: Using Semantically Integrated Multimodal Data For Patient Empowered Health Management Strategies, Amit P. Sheth, Hong Y. Yip, Utkarshani Jaimini, Dipesh Kadariya, Vaikunth Sridharan, R. Venkataramanan, Tanvi Banerjee, Krishnaprasad Thirunarayan, Maninder Kalra Jun 2018

Augmented Personalized Health: Using Semantically Integrated Multimodal Data For Patient Empowered Health Management Strategies, Amit P. Sheth, Hong Y. Yip, Utkarshani Jaimini, Dipesh Kadariya, Vaikunth Sridharan, R. Venkataramanan, Tanvi Banerjee, Krishnaprasad Thirunarayan, Maninder Kalra

Kno.e.sis Publications

Healthcare as we know it is in the process of going through a massive change from:

1. Episodic to continuous

2. Disease-focused to wellness and quality of life focused

3. Clinic-centric to anywhere a patient is

4. Clinician controlled to patient empowered

5. Being driven by limited data to 360-degree, multimodal personal-public-population physical-cyber-social big data-driven URL: https://mhealth.md2k.org/2018-tech-showcase-home


Contents, Adfsl May 2018

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, Adfsl May 2018

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Towards Mitigating Co-Incident Peak Power Consumption And Managing Energy Utilization In Heterogeneous Clusters, Renan Delvalle Rueda May 2018

Towards Mitigating Co-Incident Peak Power Consumption And Managing Energy Utilization In Heterogeneous Clusters, Renan Delvalle Rueda

Graduate Dissertations and Theses

As data centers continue to grow in scale, the resource management software needs to work closely with the hardware infrastructure to provide high utilization, performance, fault tolerance, and high availability. Apache Mesos has emerged as a leader in this space, providing an abstraction over the entire cluster, data center, or cloud to present a uniform view of all the resources. In addition, frameworks built on Mesos such as Apache Aurora, developed within Twitter and later contributed to the Apache Software Foundation, allow massive job submissions with heterogeneous resource requirements. The availability of such tools in the Open Source space, with ...


Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth May 2018

Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth

Annual ADFSL Conference on Digital Forensics, Security and Law

Data Protection and Computer Forensics/Anti-Forensics has now become a critical area of concern for organizations. A key element to this is how data is sanitized at end of life. In this paper we explore Hybrid Solid State Hybrid Drives (SSHD) and the impact that various Computer Forensics and Data Recovery techniques have when performing data erasure upon a SSHD.


Knowledge Expiration In Security Awareness Training, Tianjian Zhang May 2018

Knowledge Expiration In Security Awareness Training, Tianjian Zhang

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle May 2018

Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of LSB image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. The “CounterSteg” software allows detailed analysis and comparison of both the original cover image and any modified image, using sophisticated bit- and color-channel visual depiction graphics. In certain cases, the steganographic software used for message transmission can be identified by the forensic analysis of LSB and other changes in the payload image. The paper demonstrates usage and typical ...


Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba May 2018

Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba

Annual ADFSL Conference on Digital Forensics, Security and Law

Cloud computing has revolutionized the methods by which digital data is stored, processed, and transmitted. It is providing users with data storage and processing services, enabling access to resources through multiple devices. Although organizations continue to embrace the advantages of flexibility and scalability offered by cloud computing, insider threats are becoming a serious concern as cited by security researchers. Insiders can use authorized access to steal sensitive information, calling for the need for an investigation. This concept paper describes research in progress towards developing a Neo4j graph database tool to enhance client forensics. The tool, with a Python interface, allows ...


Forensic Analysis Of The Exfat Artifacts, Yves Vandermeer, An Lekhac, Tahar Kechadi, Joe Carthy May 2018

Forensic Analysis Of The Exfat Artifacts, Yves Vandermeer, An Lekhac, Tahar Kechadi, Joe Carthy

Annual ADFSL Conference on Digital Forensics, Security and Law

Although keeping some basic concepts inherited from FAT32, the exFAT file system introduces many differences, such as the new mapping scheme of directory entries. The combination of exFAT mapping scheme with the allocation of bitmap files and the use of FAT leads to new forensic possibilities. The recovery of deleted files, including fragmented ones and carving becomes more accurate compared with former forensic processes. Nowadays, the accurate and sound forensic analysis is more than ever needed, as there is a high risk of erroneous interpretation. Indeed, most of the related work in the literature on exFAT structure and forensics, is ...