A Statistical Impulse Response Model Based On Empirical Characterization Of Wireless Underground Channel, Abdul Salam, Mehmet C. Vuran, Suat Irmak
Wireless underground sensor networks (WUSNs) are becoming ubiquitous in many areas. The design of robust systems requires extensive understanding of the underground (UG) channel characteristics. In this paper, an UG channel impulse response is modeled and validated via extensive experiments in indoor and field testbed settings. The three distinct types of soils are selected with sand and clay contents ranging from $13\%$ to $86\%$ and $3\%$ to $32\%$, respectively. The impacts of changes in soil texture and soil moisture are investigated with more than $1,200$ measurements in a novel UG testbed that allows flexibility in soil moisture control. Moreover ...
Load Balancing In Cloud Computing, 2020 San Jose State University
Load Balancing In Cloud Computing, Snehal Dhumal
Cloud computing is one of the top trending technologies which primarily focuses on the end user’s use cases. The service provider needs to provide services to many clients. These increasing number of requests from the clients are giving rise to the new inventions in the load scheduling algorithms. There are different scheduling algorithms which are already present in the cloud computing, and some of them includes the Shortest Job First (SJF), First Come First Serve (FCFS), Round Robin (RR) etc. Though there are different parameters to consider when load balancing in cloud computing, makespan (time difference between start time ...
Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model, 2020 Liberty University
Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model, Heidi Waddell
Senior Honors Theses
With the extreme amount of data and software available on networks, the protection of online information is one of the most important tasks of this technological age. There is no such thing as safe computing, and it is inevitable that security breaches will occur. Thus, security professionals and practices focus on two areas: security, preventing a breach from occurring, and resiliency, minimizing the damages once a breach has occurred. One of the most important practices for adding resiliency to source code is through obfuscation, a method of re-writing the code to a form that is virtually unreadable. This makes the ...
A Distributed Model-View-Controller Design Pattern For A Graphical Remote Control Of A Multi-User Application, Dale E. Parson
Computer Science and Information Technology Faculty
The Model-View-Controller (MVC) is a design pattern for architecting the interactions among human users of graphical computing systems with the software Controller that manages user input, the Model that houses system state, and the View that projects the Model state into intelligible graphical form. The present work examines extending MVC into a Distributed Model-View-Controller pattern, starting with a stand-alone MVC system that is amenable to distribution over a local area network (LAN). Distribution takes the form of cloning a stand-alone MVC application into distinct client and server programs, and then altering each for its purpose while maintaining the initial graphical ...
Automated Synthesis Of Local Time Requirement For Service Composition, 2020 Singapore Management University
Automated Synthesis Of Local Time Requirement For Service Composition, Étienne André, Tian Huat Tan, Manman Chen, Shuang Liu, Jun Sun, Yang Liu, Jin Song Dong
Research Collection School Of Information Systems
Service composition aims at achieving a business goal by composing existing service-based applications or components. The response time of a service is crucial, especially in time-critical business environments, which is often stated as a clause in service-level agreements between service providers and service users. To meet the guaranteed response time requirement of a composite service, it is important to select a feasible set of component services such that their response time will collectively satisfy the response time requirement of the composite service. In this work, we use the BPEL modeling language that aims at specifying Web services. We extend it ...
Wireless Underground Communications In Sewer And Stormwater Overflow Monitoring: Radio Waves Through Soil And Asphalt Medium, Usman Raza, Abdul Salam
Storm drains and sanitary sewers are prone to backups and overflows due to extra amount wastewater entering the pipes. To prevent that, it is imperative to efficiently monitor the urban underground infrastructure. The combination of sensors system and wireless underground communication system can be used to realize urban underground IoT applications, e.g., storm water and wastewater overflow monitoring systems. The aim of this article is to establish a feasibility of the use of wireless underground communications techniques, and wave propagation through the subsurface soil and asphalt layers, in an underground pavement system for storm water and sewer overflow monitoring ...
Who Owns Bitcoin? Private Law Facing The Blockchain, 2020 University of Minnesota Law School
Who Owns Bitcoin? Private Law Facing The Blockchain, Matthias Lehmann
Minnesota Journal of Law, Science & Technology
No abstract provided.
A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, 2020 The University of Western Ontario
A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, Amir Haghighatimaleki
Electronic Thesis and Dissertation Repository
Through social media platforms, massive amounts of data are being produced. Twitter, as one such platform, enables users to post “tweets” on an unprecedented scale. Once analyzed by machine learning (ML) techniques and in aggregate, Twitter data can be an invaluable resource for gaining insight. However, when applied to real-time data streams, due to covariate shifts in the data (i.e., changes in the distributions of the inputs of ML algorithms), existing ML approaches result in different types of biases and provide uncertain outputs. This thesis describes a visual analytics system (i.e., a tool that combines data visualization, human-data ...
Developing A Uas-Deployable Methane Sensor Using Low-Cost Modular Open-Source Components, 2020 The University of Akron
Developing A Uas-Deployable Methane Sensor Using Low-Cost Modular Open-Source Components, Gavin Demali
Williams Honors College, Honors Research Projects
This project aimed to develop a methane sensor for deployment on an unmanned aerial system (UAS), or drone, platform. This design is centered around low cost, commercially available modular hardware components and open source software libraries. Once successfully developed, this system was deployed at the Bath Nature Preserve in Bath Township, Summit County Ohio in order to detect any potential on site fugitive methane emissions in the vicinity of the oil and gas infrastructure present. The deliverables of this project (i.e. the data collected at BNP) will be given to the land managers there to better inform future management ...
Gaming Lan Setup With Local And Remote Access And Downloads, 2020 The University of Akron
Gaming Lan Setup With Local And Remote Access And Downloads, Ethelyn Tran
Williams Honors College, Honors Research Projects
The Gaming LAN Setup project aims to design and implement a basic functioning, hardened network that could be utilized locally and remotely to allow users access to respective servers for the option to host a session or join. Users will have the ability to securely log into the internal network to download files via a web interface. The network allows the designated user to take a management position in order to perform basic penetration testing and discover vulnerabilities through various scans to maintain the network
Mobile Technology As A Leverage Point For The Spread Of Permaculture In The Food System, 2020 Regis University
Mobile Technology As A Leverage Point For The Spread Of Permaculture In The Food System, Daniel Finley
All Regis University Theses
This thesis argues that the current food system is untenable in the long term due to its significant negative impacts on the global ecosystem and society.
Landing Throttleable Hybrid Rockets With Hierarchical Reinforcement Learning In A Simulated Environment, 2020 University of New Hampshire
Landing Throttleable Hybrid Rockets With Hierarchical Reinforcement Learning In A Simulated Environment, Francesco Alessandro Stefano Mikulis-Borsoi
Honors Theses and Capstones
In this paper, I develop a hierarchical Markov Decision Process (MDP) structure for completing the task of vertical rocket landing. I start by covering the background of this problem, and formally defining its constraints. In order to reduce mistakes while formulating different MDPs, I define and develop the criteria for a standardized MDP definition format. I then decompose the problem into several sub-problems of vertical landing, namely velocity control and vertical stability control. By exploiting MDP coupling and symmetrical properties, I am able to significantly reduce the size of the state space compared to a unified MDP formulation. This paper ...
Contrasting Geometric Variations Of Mathematical Models Of Self-Assembling Systems, 2019 University of Arkansas, Fayetteville
Contrasting Geometric Variations Of Mathematical Models Of Self-Assembling Systems, Michael Sharp
Theses and Dissertations
Self-assembly is the process by which complex systems are formed and behave due to the interactions of relatively simple units. In this thesis, we explore multiple augmentations of well known models of self-assembly to gain a better understanding of the roles that geometry and space play in their dynamics. We begin in the abstract Tile Assembly Model (aTAM) with some examples and a brief survey of previous results to provide a foundation. We then introduce the Geometric Thermodynamic Binding Network model, a model that focuses on the thermodynamic stability of its systems while utilizing geometrically rigid components (dissimilar to other ...
On The Yellow Brick Road, A Path To Enterprise Architecture Maturity, 2019 University of the Witwatersrand
On The Yellow Brick Road, A Path To Enterprise Architecture Maturity, Avsharn Bachoo
The African Journal of Information Systems
This study concentrated on the relationship between the Enterprise Architecture (EA) maturity of an organization and the business value associated with it in the South African financial services environment. It was developed within the critical realism philosophy, which states that mechanisms generate events by accentuating the underlying EA mechanisms that lead to business value, as well as provide insights into the opportunities and challenges organizations experienced as they progressed to higher levels of maturity. Constructed using the resource-based view of the firm as the underlying theoretical framework, this research examined EA as an intangible resource and maturity as a source ...
Similarity-Based Chained Transfer Learning For Energy Forecasting With Big Data, 2019 Western University
Similarity-Based Chained Transfer Learning For Energy Forecasting With Big Data, Yifang Tian, Ljubisa Sehovac, Katarina Grolinger
Electrical and Computer Engineering Publications
Smart meter popularity has resulted in the ability to collect big energy data and has created opportunities for large-scale energy forecasting. Machine Learning (ML) techniques commonly used for forecasting, such as neural networks, involve computationally intensive training typically with data from a single building or a single aggregated load to predict future consumption for that same building or aggregated load. With hundreds of thousands of meters, it becomes impractical or even infeasible to individually train a model for each meter. Consequently, this paper proposes Similarity-Based Chained Transfer Learning (SBCTL), an approach for building neural network-based models for many meters by ...
Extract Transform And Loading Tool For Email, 2019 California State University – San Bernardino
Extract Transform And Loading Tool For Email, Amit Rajiv Lawanghare
Electronic Theses, Projects, and Dissertations
This project focuses on applying Extract, Transform and Load (ETL) operations on the relational data exchanged via emails. An Email is an important form of communication by both personal and corporate means as it enables reliable and quick exchange. Many useful files are shared as a form of attachments which contains transactional/ relational data. This tool allows a user to write the filter conditions and lookup conditions on attachments; define the attribute map for attachments to the database table. The Data Cleansing for each attribute can be performed writing rules and their matching state. A user can add custom functions ...
Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., 2019 University of Louisville
Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui
Electronic Theses and Dissertations
This dissertation describes progress in the state-of-the-art for developing and deploying formally verified cyber security devices in industrial control networks. It begins by detailing the unique struggles that are faced in industrial control networks and why concepts and technologies developed for securing traditional networks might not be appropriate. It uses these unique struggles and examples of contemporary cyber-attacks targeting control systems to argue that progress in securing control systems is best met with formal verification of systems, their specifications, and their security properties. This dissertation then presents a development process and identifies two technologies, TLA+ and seL4, that can be ...
Teaching Self-Balancing Trees Using A Beauty Contest, 2019 Sacred Heart University
Teaching Self-Balancing Trees Using A Beauty Contest, Samah Senbel
School of Computer Science & Engineering Faculty Publications
Trees data structures and their performance is one of the main topics to teach in a data structures course. Appreciating the importance of tree structure and tree height in software performance is an important concept to teach. In this paper, a simple and amusing activity is presented. It demonstrates to students the importance of a well-balanced tree by comparing the height of a binary search tree to a balanced (AVL) tree build upon some personal data to find the “prettiest” tree (minimum height). The activity highlights the fact that, irrelevant of your data sequence, a balanced tree guarantees a height ...
An Architecture For Blockchain-Based Collaborative Signature-Based Intrusion Detection System, 2019 Kennesaw State University
An Architecture For Blockchain-Based Collaborative Signature-Based Intrusion Detection System, Daniel Laufenberg
Master of Science in Information Technology Theses
Collaborative intrusion detection system (CIDS), where IDS hosts work with each other and share resources, have been proposed to cope with the increasingly sophisticated cyberattacks. Despite the promising benefits such as expanded signature databases and alert data from multiple sites, trust management and consensus building remain as challenges for a CIDS to work effectively. The blockchain technology with built-in immutability and consensus building capability provides a viable solution to the issues of CIDS. In this paper, we introduce an architecture for a blockchain-enabled signature-based collaborative IDS, discuss the implementation strategy of the proposed architecture and developed a prototype using Hyperledger ...
Uncomplicating The Business Of Repositories, 2019 University of Pennsylvania
Uncomplicating The Business Of Repositories, Kate Lynch, Emily Morton-Owens
Scholarship at Penn Libraries
In this presentation, we discuss how our library runs our repository in production to meet the needs of our “business” as efficiently as possible. We have an interest in limiting the number of digital platforms we manage, for the purposes of sustainability and efficiency, but we must also consider how well a general platform can meet specific user needs.
A governance group of administrators, in conference with stakeholders and developers, seeks to find the best way to accommodate each collection or functional need, with an eye to minimizing technical complexity, offering stakeholders self-serve options when possible, and maintaining a single ...