Open Access. Powered by Scholars. Published by Universities.®

OS and Networks Commons

Open Access. Powered by Scholars. Published by Universities.®

1,767 Full-Text Articles 1,593 Authors 360,596 Downloads 90 Institutions

All Articles in OS and Networks

Faceted Search

1,767 full-text articles. Page 1 of 61.

A Statistical Impulse Response Model Based On Empirical Characterization Of Wireless Underground Channel, Abdul Salam, Mehmet C. Vuran, Suat Irmak 2020 Purdue University

A Statistical Impulse Response Model Based On Empirical Characterization Of Wireless Underground Channel, Abdul Salam, Mehmet C. Vuran, Suat Irmak

Faculty Publications

Wireless underground sensor networks (WUSNs) are becoming ubiquitous in many areas. The design of robust systems requires extensive understanding of the underground (UG) channel characteristics. In this paper, an UG channel impulse response is modeled and validated via extensive experiments in indoor and field testbed settings. The three distinct types of soils are selected with sand and clay contents ranging from $13\%$ to $86\%$ and $3\%$ to $32\%$, respectively. The impacts of changes in soil texture and soil moisture are investigated with more than $1,200$ measurements in a novel UG testbed that allows flexibility in soil moisture control. Moreover ...


Network Traffic Based Botnet Detection Using Machine Learning, Anand Ravindra Vishwakarma 2020 San Jose State University

Network Traffic Based Botnet Detection Using Machine Learning, Anand Ravindra Vishwakarma

Master's Projects

The field of information and computer security is rapidly developing in today’s world as the number of security risks is continuously being explored every day. The moment a new software or a product is launched in the market, a new exploit or vulnerability is exposed and exploited by the attackers or malicious users for different motives. Many attacks are distributed in nature and carried out by botnets that cause widespread disruption of network activity by carrying out DDoS (Distributed Denial of Service) attacks, email spamming, click fraud, information and identity theft, virtual deceit and distributed resource usage for cryptocurrency ...


Dual-Dropout Graph Convolutional Network For Predicting Synthetic Lethality In Human Cancers, Ruichu CAI, Xuexin CHEN, Yuan FANG, Min WU, Yuexing HAO 2020 Singapore Management University

Dual-Dropout Graph Convolutional Network For Predicting Synthetic Lethality In Human Cancers, Ruichu Cai, Xuexin Chen, Yuan Fang, Min Wu, Yuexing Hao

Research Collection School Of Information Systems

Motivation: Synthetic lethality (SL) is a promising form of gene interaction for cancer therapy, as it isable to identify specific genes to target at cancer cells without disrupting normal cells. As high-throughputwet-lab settings are often costly and face various challenges, computational approaches have become apractical complement. In particular, predicting SLs can be formulated as a link prediction task on a graphof interacting genes. Although matrix factorization techniques have been widely adopted in link prediction,they focus on mapping genes to latent representations in isolation, without aggregating information fromneighboring genes. Graph convolutional networks (GCN) can capture such neighborhood dependency ina graph ...


Network Impact Modeling And Analysis: A Qos Perspective, Tarandeep K. Randhawa 2020 The University of Western Ontario

Network Impact Modeling And Analysis: A Qos Perspective, Tarandeep K. Randhawa

Electronic Thesis and Dissertation Repository

The International Data Corporation (IDC) estimated that total digital data created, replicated, and consumed was 4.4 Zettabytes (ZB) in the year 2013, 8 ZB in 2015, and predicted to reach 40 ZB by 2020. This massive amount of internet traffic put a great overhead on network capacity which may impact network Quality of Service (QoS) such as latency, jitter, throughput, packet loss, and load balancing. From the Internet Service Provider’s (ISP’s) perspective, understanding the possible impact of the future internet traffic on its network is critical for provisioning their network capacity in a cost-effective manner while meeting ...


Topic Modeling On Document Networks With Adjacent-Encoder, Hady W. LAUW 2020 Singapore Management University

Topic Modeling On Document Networks With Adjacent-Encoder, Hady W. Lauw

Research Collection School Of Information Systems

Oftentimes documents are linked to one another in a network structure,e.g., academic papers cite other papers, Web pages link to other pages. In this paper we propose a holistic topic model to learn meaningful and unified low-dimensional representations for networked documents that seek to preserve both textual content and network structure. On the basis of reconstructing not only the input document but also its adjacent neighbors, we develop two neural encoder architectures. Adjacent-Encoder, or AdjEnc, induces competition among documents for topic propagation, and reconstruction among neighbors for semantic capture. Adjacent-Encoder-X, or AdjEnc-X, extends this to also encode the ...


Privacy-Preserving Network Path Validation, Binanda SENGUPTA, Yingjiu LI, Kai BU, Robert H. DENG 2020 Singapore Management University

Privacy-Preserving Network Path Validation, Binanda Sengupta, Yingjiu Li, Kai Bu, Robert H. Deng

Research Collection School Of Information Systems

The end-users communicating over a network path currently have no control over the path. For a better quality of service, the source node often opts for a superior (or premium) network path to send packets to the destination node. However, the current Internet architecture provides no assurance that the packets indeed follow the designated path. Network path validation schemes address this issue and enable each node present on a network path to validate whether each packet has followed the specific path so far. In this work, we introduce two notions of privacy—path privacy and index privacy—in the context ...


Gaming Lan Setup With Local And Remote Access And Downloads, Ethelyn Tran 2020 The University of Akron

Gaming Lan Setup With Local And Remote Access And Downloads, Ethelyn Tran

Williams Honors College, Honors Research Projects

The Gaming LAN Setup project aims to design and implement a basic functioning, hardened network that could be utilized locally and remotely to allow users access to respective servers for the option to host a session or join. Users will have the ability to securely log into the internal network to download files via a web interface. The network allows the designated user to take a management position in order to perform basic penetration testing and discover vulnerabilities through various scans to maintain the network


Recent Advances In Deep Learning For Object Detection, Xiongwei WU, Doyen SAHOO, Steven C. H. HOI 2020 Singapore Management University

Recent Advances In Deep Learning For Object Detection, Xiongwei Wu, Doyen Sahoo, Steven C. H. Hoi

Research Collection School Of Information Systems

Object detection is a fundamental visual recognition problem in computer vision and has been widely studied in the past decades. Visual object detection aims to find objects of certain target classes with precise localization in a given image and assign each object instance a corresponding class label. Due to the tremendous successes of deep learning based image classification, object detection techniques using deep learning have been actively studied in recent years. In this paper, we give a comprehensive survey of recent advances in visual object detection with deep learning. By reviewing a large body of recent related work in literature ...


Software-Defined Infrastructure For Iot-Based Energy Systems, Stephen Lee 2019 University of Massachusetts Amherst

Software-Defined Infrastructure For Iot-Based Energy Systems, Stephen Lee

Doctoral Dissertations

Internet of Things (IoT) devices are becoming an essential part of our everyday lives. These physical devices are connected to the internet and can measure or control the environment around us. Further, IoT devices are increasingly being used to monitor buildings, farms, health, and transportation. As these connected devices become more pervasive, these devices will generate vast amounts of data that can be used to gain insights and build intelligence into the system. At the same time, large-scale deployment of these devices will raise new challenges in efficiently managing and controlling them.

In this thesis, I argue that the IoT ...


Energy-Aware Algorithms For Greening Internet-Scale Distributed Systems Using Renewables, Vani Gupta 2019 University of Massachusetts Amherst

Energy-Aware Algorithms For Greening Internet-Scale Distributed Systems Using Renewables, Vani Gupta

Doctoral Dissertations

Internet-scale Distributed Systems (IDSs) are large distributed systems that are comprised of hundreds of thousands of servers located in hundreds of data centers around the world. A canonical example of an IDS is a content delivery network (CDN) that delivers content to users from a large global deployment of servers around the world. IDSs consume large amounts of energy and their energy requirements are projected to increase significantly in the future. With carbon emissions from data centers increasing every year, use of renewables to power data centers is critical for the sustainability of data centers and for the environment.

In ...


Franklin Township Municipal Broadband And Wireless Network, William Galtieri 2019 La Salle University

Franklin Township Municipal Broadband And Wireless Network, William Galtieri

Mathematics and Computer Science Capstones

Franklin Township is a municipality in Somerset County, New Jersey covering an area of approximately 46.15 square miles and a population of 62,300 as of the 2010 Census. The town relies on a cellular provider to provide data connections for computers in municipal vehicles such as police cars, public works vehicles, fire inspection trucks, building inspectors and other departments. Additionally, the municipality pays for connections for security cameras at remote facilities and for smart garbage can monitoring throughout the town. These services are costly for the municipality and create a dependency on service providers for access to information ...


Generating Expensive Relationship Features From Cheap Objects, Xiaogang WANG, Qianru SUN, Marcelo ANG, Tat-Seng CHUA 2019 Singapore Management University

Generating Expensive Relationship Features From Cheap Objects, Xiaogang Wang, Qianru Sun, Marcelo Ang, Tat-Seng Chua

Research Collection School Of Information Systems

We investigate the problem of object relationship classification of visual scenes. For a relationship object1-predicate-object2 that captures the object interaction, its representation is composed by the combination of object1 and object2 features. As a result, relationship classification models usually bias to the frequent objects, leading to poor generalization to rare or unseen objects. Inspired by the data augmentation methods, we propose a novel Semantic Transform Generative Adversarial Network (ST-GAN) that synthesizes relationship features for rare objects, conditioned on the features from random instances of the objects. Specifically, ST-GAN essentially offers a semantic transform function from cheap object features to expensive ...


Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui 2019 University of Louisville

Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui

Electronic Theses and Dissertations

This dissertation describes progress in the state-of-the-art for developing and deploying formally verified cyber security devices in industrial control networks. It begins by detailing the unique struggles that are faced in industrial control networks and why concepts and technologies developed for securing traditional networks might not be appropriate. It uses these unique struggles and examples of contemporary cyber-attacks targeting control systems to argue that progress in securing control systems is best met with formal verification of systems, their specifications, and their security properties. This dissertation then presents a development process and identifies two technologies, TLA+ and seL4, that can be ...


Multimodal Transformer Networks For End-To-End Video-Grounded Dialogue Systems, Hung LE, Doyen SAHOO, Nancy F. CHEN, Steven C. H. HOI 2019 Singapore Management University

Multimodal Transformer Networks For End-To-End Video-Grounded Dialogue Systems, Hung Le, Doyen Sahoo, Nancy F. Chen, Steven C. H. Hoi

Research Collection School Of Information Systems

Developing Video-Grounded Dialogue Systems (VGDS), where a dialogue is conducted based on visual and audio aspects of a given video, is significantly more challenging than traditional image or text-grounded dialogue systems because (1) feature space of videos span across multiple picture frames, making it difficult to obtain semantic information; and (2) a dialogue agent must perceive and process information from different modalities (audio, video, caption, etc.) to obtain a comprehensive understanding. Most existing work is based on RNNs and sequence-to-sequence architectures, which are not very effective for capturing complex long-term dependencies (like in videos). To overcome this, we propose Multimodal ...


Iamhappy: Towards An Iot Knowledge-Based Cross-Domain Well-Being Recommendation System For Everyday Happiness, Amelia Gyrard, Amit Sheth 2019 Wright State University - Main Campus

Iamhappy: Towards An Iot Knowledge-Based Cross-Domain Well-Being Recommendation System For Everyday Happiness, Amelia Gyrard, Amit Sheth

Kno.e.sis Publications

Nowadays, healthy lifestyle, fitness, and diet habits have become central applications in our daily life. Positive psychology such as well-being and happiness is the ultimate dream of everyday people’s feelings (even without being aware of it). Wearable devices are being increasingly employed to support well-being and fitness. Those devices produce physiological signals that are analyzed by machines to understand emotions and physical state. The Internetof Things (IoT) technology connects (wearable) devices to the Internet to easily access and process data, even using Web technologies (aka Web of Things).

We design IAMHAPPY, an innovative IoT-based well-being recommendation system to encourage ...


Network-Clustered Multi-Modal Bug Localization, Thong HOANG, Richard J. OENTARYO, Tien-Duy B. LE, David LO 2019 Singapore Management University

Network-Clustered Multi-Modal Bug Localization, Thong Hoang, Richard J. Oentaryo, Tien-Duy B. Le, David Lo

Research Collection School Of Information Systems

Developers often spend much effort and resources to debug a program. To help the developers debug, numerous information retrieval (IR)-based and spectrum-based bug localization techniques have been devised. IR-based techniques process textual information in bug reports, while spectrum-based techniques process program spectra (i.e., a record of which program elements are executed for each test case). While both techniques ultimately generate a ranked list of program elements that likely contain a bug, they only consider one source of information—either bug reports or program spectra— which is not optimal. In light of this deficiency, this paper presents a new ...


Weaving The Dark Web: Legitimacy On Freenet, Tor, And I2p, John Schriner 2019 CUNY Queensborough Community College

Weaving The Dark Web: Legitimacy On Freenet, Tor, And I2p, John Schriner

Publications and Research

This is a book review of Robert W. Gehl's Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P (2018). The book explores these anonymity networks and the concept of legitimacy throughout. Using a multidisciplinary approach and interviews with network-builders and users, Gehl helps to demystify the dark web and critically examine these networks and technologies.


Keeping Anonymity At The Consumer Behavior On The Internet: Proof Of Sacrifice, Sachio Horie 2019 Graduate School of Informatics Nagoya University

Keeping Anonymity At The Consumer Behavior On The Internet: Proof Of Sacrifice, Sachio Horie

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

The evolution of the Internet and AI technology has made it possible for the government and the businesses to keep track of their personal lives. GAFA continues to collect information unintended by the individuals. It is a threat that our privacy is violated in this way. In order to solute such problems, it is important to consider a mechanism that enables us to be peaceful lives while protecting privacy in the Internet society.

This paper focuses on the consumption behavior on the Internet and addresses anonymity. We consider some network protocols that enable sustainable consensus by combining anonymity methods such ...


Network Alignment In Heterogeneous Social Networks, Priyanka Kasbekar 2019 San Jose State University

Network Alignment In Heterogeneous Social Networks, Priyanka Kasbekar

Master's Projects

Online Social Networks (OSN) have numerous applications and an ever growing user base. This has led to users being a part of multiple social networks at the same time. Identifying a similar user from one social network on another social network will give in- formation about a user’s behavior on different platforms. It further helps in community detection and link prediction tasks. The process of identifying or aligning users in multiple networks is called Network Alignment. More the information we have about the nodes / users better the results of Network Alignment. Unlike other related work in this field that ...


Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik 2019 Sam Houston State University

Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smartphones with Google's Android operating system are becoming more and more popular each year, and with this increased user base, comes increased opportunities to collect more of these users' private data. There have been several instances of malware being made available via the Google Play Store, which is one of the predominant means for users to download applications. One effective way of collecting users' private data is by using Android Spyware. In this paper, we conduct a forensic analysis of a malicious Android spyware application and present our findings. We also highlight what information the application accesses and what ...


Digital Commons powered by bepress