The Role Of Privacy Within The Realm Of Healthcare Wearables' Acceptance And Use,
2021
Dakota State University
The Role Of Privacy Within The Realm Of Healthcare Wearables' Acceptance And Use, Thomas Jernejcic
Masters Theses & Doctoral Dissertations
The flexibility and vitality of the Internet along with technological innovation have fueled an industry focused on the design of portable devices capable of supporting personal activities and wellbeing. These compute devices, known as wearables, are unique from other computers in that they are portable, specific in function, and worn or carried by the user. While there are definite benefits attributable to wearables, there are also notable risks, especially in the realm of security where personal information and/or activities are often accessible to third parties. In addition, protecting one’s private information is regularly an afterthought and thus lacking in maturity. …
Development Of A Real-Time Single-Lead Single-Beat Frequency-Independent Myocardial Infarction Detector,
2021
Florida International University
Development Of A Real-Time Single-Lead Single-Beat Frequency-Independent Myocardial Infarction Detector, Harold Martin
FIU Electronic Theses and Dissertations
The central aim of this research is the development and deployment of a novel multilayer machine learning design with unique application for the diagnosis of myocardial infarctions (MIs) from individual heartbeats of single-lead electrocardiograms (EKGs) irrespective of their sampling frequencies over a given range. To the best of our knowledge, this design is the first to attempt inter-patient myocardial infarction detection from individual heartbeats of single-lead (lead II) electrocardiograms that achieves high accuracy and near real-time diagnosis. The processing time of 300 milliseconds to a diagnosis is just at the time range in between extremely fast heartbeats of around 300 …
Building And Using Digital Libraries For Etds,
2021
Virginia Tech
Building And Using Digital Libraries For Etds, Edward A. Fox
The Journal of Electronic Theses and Dissertations
Despite the high value of electronic theses and dissertations (ETDs), the global collection has seen limited use. To extend such use, a new approach to building digital libraries (DLs) is needed. Fortunately, recent decades have seen that a vast amount of “gray literature” has become available through a diverse set of institutional repositories as well as regional and national libraries and archives. Most of the works in those collections include ETDs and are often freely available in keeping with the open-access movement, but such access is limited by the services of supporting information systems. As explained through a set of …
Traversing Nat: A Problem,
2021
Dakota State University
Traversing Nat: A Problem, Tyler Flaagan
Masters Theses & Doctoral Dissertations
This quasi-experimental before-and-after study measured and analyzed the impacts of adding security to a new bi-directional Network Address Translation (NAT). Literature revolves around various types of NAT, their advantages and disadvantages, their security models, and networking technologies’ adoption. The study of the newly created secure bi-directional model of NAT showed statistically significant changes in the variables than another model using port forwarding. Future research of how data will traverse networks is crucial in an ever-changing world of technology.
Towards Identity Relationship Management For Internet Of Things,
2021
Dakota State University
Towards Identity Relationship Management For Internet Of Things, Mohammad Muntasir Nur
Masters Theses & Doctoral Dissertations
Identity and Access Management (IAM) is in the core of any information systems. Traditional IAM systems manage users, applications, and devices within organizational boundaries, and utilize static intelligence for authentication and access control. Identity federation has helped a lot to deal with boundary limitation, but still limited to static intelligence – users, applications and devices must be under known boundaries. However, today’s IAM requirements are much more complex. Boundaries between enterprise and consumer space, on premises and cloud, personal devices and organization owned devices, and home, work and public places are fading away. These challenges get more complicated for Internet …
Block The Root Takeover: Validating Devices Using Blockchain Protocol,
2021
Dakota State University
Block The Root Takeover: Validating Devices Using Blockchain Protocol, Sharmila Paul
Masters Theses & Doctoral Dissertations
This study addresses a vulnerability in the trust-based STP protocol that allows malicious users to target an Ethernet LAN with an STP Root-Takeover Attack. This subject is relevant because an STP Root-Takeover attack is a gateway to unauthorized control over the entire network stack of a personal or enterprise network. This study aims to address this problem with a potentially trustless research solution called the STP DApp. The STP DApp is the combination of a kernel /net modification called stpverify and a Hyperledger Fabric blockchain framework in a NodeJS runtime environment in userland. The STP DApp works as an Intrusion …
Efficacy Of Incident Response Certification In The Workforce,
2021
Dakota State University
Efficacy Of Incident Response Certification In The Workforce, Samuel Jarocki
Masters Theses & Doctoral Dissertations
Numerous cybersecurity certifications are available both commercially and via institutes of higher learning. Hiring managers, recruiters, and personnel accountable for new hires need to make informed decisions when selecting personnel to fill positions. An incident responder or security analyst's role requires near real-time decision-making, pervasive knowledge of the environments they are protecting, and functional situational awareness. This concurrent mixed methods paper studies whether current commercial certifications offered in the cybersecurity realm, particularly incident response, provide useful indicators for a viable hiring candidate.
Managers and non-managers alike do prefer hiring candidates with an incident response certification. Both groups affirmatively believe commercial …
Load Balancing And Resource Allocation In Smart Cities Using Reinforcement Learning,
2021
The University of Western Ontario
Load Balancing And Resource Allocation In Smart Cities Using Reinforcement Learning, Aseel Alorbani
Electronic Thesis and Dissertation Repository
Today, smart city technology is being adopted by many municipal governments to improve their services and to adapt to growing and changing urban population. Implementing a smart city application can be one of the most challenging projects due to the complexity, requirements and constraints. Sensing devices and computing components can be numerous and heterogeneous. Increasingly, researchers working in the smart city arena are looking to leverage edge and cloud computing to support smart city development. This approach also brings a number of challenges. Two of the main challenges are resource allocation and load balancing of tasks associated with processing data …
Hybrid Cloud Workload Monitoring As A Service,
2021
San Jose State University
Hybrid Cloud Workload Monitoring As A Service, Shreya Kundu
Master's Projects
Cloud computing and cloud-based hosting has become embedded in our daily lives. It is imperative for cloud providers to make sure all services used by both enterprises and consumers have high availability and elasticity to prevent any downtime, which impacts negatively for any business. To ensure cloud infrastructures are working reliably, cloud monitoring becomes an essential need for both businesses, the provider and the consumer. This thesis project reports on the need of efficient scalable monitoring, enumerating the necessary types of metrics of interest to be collected. Current understanding of various architectures designed to collect, store and process monitoring data …
Neural Architecture Search As Sparse Supernet,
2021
Singapore Management University
Neural Architecture Search As Sparse Supernet, Y. Wu, A. Liu, Zhiwu Huang, S. Zhang, Gool L. Van
Research Collection School Of Computing and Information Systems
This paper aims at enlarging the problem of Neural Architecture Search (NAS) from Single-Path and Multi-Path Search to automated Mixed-Path Search. In particular, we model the NAS problem as a sparse supernet using a new continuous architecture representation with a mixture of sparsity constraints. The sparse supernet enables us to automatically achieve sparsely-mixed paths upon a compact set of nodes. To optimize the proposed sparse supernet, we exploit a hierarchical accelerated proximal gradient algorithm within a bi-level optimization framework. Extensive experiments on Convolutional Neural Network and Recurrent Neural Network search demonstrate that the proposed method is capable of searching for …
Improving Energy Efficiency Through Compiler Optimizations,
2021
Bowdoin College
Improving Energy Efficiency Through Compiler Optimizations, Jack Beckitt-Marshall
Honors Projects
Abstract--- Energy efficiency is becoming increasingly important for computation, especially in the context of the current climate crisis. The aim of this experiment was to see if the compiler could reduce energy usage without rewriting programs themselves. The experimental setup consisted of compiling programs using the Clang compiler using a set of compiler flags, and then measuring energy usage and execution time on an AMD Ryzen processor. Three experiments were performed: a random exploration of compiler flags, utilization of SIMD, as well as benchmarking real world applications. It was found that the compiler was able to reduce execution time, especially …
On Studying Distributed Machine Learning,
2021
Liberty University
On Studying Distributed Machine Learning, Simeon Eberz
Senior Honors Theses
The Internet of Things (IoT) is utilizing Deep Learning (DL) for applications such as voice or image recognition. Processing data for DL directly on IoT edge devices reduces latency and increases privacy. To overcome the resource constraints of IoT edge devices, the computation for DL inference is distributed between a cluster of several devices. This paper explores DL, IoT networks, and a novel framework for distributed processing of DL in IoT clusters. The aim is to facilitate and simplify deployment, testing, and study of a distributed DL system, even without physical devices. The contributions of this paper are a deployment …
Xtreme-Noc: Extreme Gradient Boosting Based Latency Model For Network-On-Chip Architectures,
2021
Minnesota State University, Mankato
Xtreme-Noc: Extreme Gradient Boosting Based Latency Model For Network-On-Chip Architectures, Ilma Sheriff
All Graduate Theses, Dissertations, and Other Capstone Projects
Multiprocessor System-on-Chip (MPSoC) integrating heterogeneous processing elements (CPU, GPU, Accelerators, memory, I/O modules ,etc.) are the de-facto design choice to meet the ever-increasing performance/Watt requirements from modern computing machines. Although at consumer level the number of processing elements (PE) are limited to 8-16, for high end servers, the number of PEs can scale up to hundreds. A Network-on-Chip (NoC) is a microscale network that facilitates the packetized communication among the PEs in such complex computational systems. Due to the heterogeneous integration of the cores, execution of diverse (serial and parallel) applications on the PEs, application mapping strategies, and many other …
A Survey Of Enabling Technologies For Smart Communities,
2021
Old Dominion University
A Survey Of Enabling Technologies For Smart Communities, Amna Iqbal, Stephan Olariu
Computer Science Faculty Publications
In 2016, the Japanese Government publicized an initiative and a call to action for the implementation of a "Super Smart Society" announced as Society 5.0. The stated goal of Society 5.0 is to meet the various needs of the members of society through the provisioning of goods and services to those who require them, when they are required and in the amount required, thus enabling the citizens to live an active and comfortable life. In spite of its genuine appeal, details of a feasible path to Society 5.0 are conspicuously missing. The first main goal of this survey is to …
Secure Network Access Via Ldap,
2021
The University of Akron
Secure Network Access Via Ldap, Nicholas Valaitis
Williams Honors College, Honors Research Projects
Networks need the ability to be access by secure accounts and users. The goal of this project is to configure and expand on LDAP configurations with considerations for AAA via TACACS+ and Radius for network equipment. This will provide adequate security for any given network in terms of access and prevent lose of access to devices which happens all to often with locally configured accounts on devices.
Development Of A Reference Design For Intrusion Detection Using Neural Networks For A Smart Inverter,
2021
University of Arkansas, Fayetteville
Development Of A Reference Design For Intrusion Detection Using Neural Networks For A Smart Inverter, Ammar Mohammad Khan
Graduate Theses and Dissertations
The purpose of this thesis is to develop a reference design for a base level implementation of an intrusion detection module using artificial neural networks that is deployed onto an inverter and runs on live data for cybersecurity purposes, leveraging the latest deep learning algorithms and tools. Cybersecurity in the smart grid industry focuses on maintaining optimal standards of security in the system and a key component of this is being able to detect cyberattacks. Although researchers and engineers aim to design such devices with embedded security, attacks can and do still occur. The foundation for eventually mitigating these attacks …
Occam Manual,
2021
Portland State University
Occam Manual, Martin Zwick
Systems Science Faculty Publications and Presentations
Occam is a Discrete Multivariate Modeling (DMM) tool based on the methodology of Reconstructability Analysis (RA). Its typical usage is for analysis of problems involving large numbers of discrete variables. Models are developed which consist of one or more components, which are then evaluated for their fit and statistical significance. Occam can search the lattice of all possible models, or can do detailed analysis on a specific model.
In Variable-Based Modeling (VBM), model components are collections of variables. In State-Based Modeling (SBM), components identify one or more specific states or substates.
Occam provides a web-based interface, which …
Efficient Modeling Of Random Sampling-Based Lru Cache,
2021
Michigan Technological University
Efficient Modeling Of Random Sampling-Based Lru Cache, Junyao Yang
Dissertations, Master's Theses and Master's Reports
The Miss Ratio Curve (MRC) is an important metric and effective tool for caching system performance prediction and optimization. Since the Least Recently Used (LRU) replacement policy is the de facto policy for many existing caching systems, most previous studies on efficient MRC construction are predominantly focused on the LRU replacement policy. Recently, the random sampling-based replacement mechanism, as opposed to replacement relying on the rigid LRU data structure, gains more popularity due to its lightweight and flexibility. To approximate LRU, at replacement times, the system randomly selects K objects and replaces the least recently used object among the sample. …
Image Spam Classification With Deep Neural Networks,
2020
San Jose State University
Image Spam Classification With Deep Neural Networks, Ajay Pal Singh, Katerina Potika
Faculty Publications, Computer Science
Image classification is a fundamental problem of computer vision and pattern recognition. We focus on images that contain spam. Spam is unwanted bulk content, and image spam is unwanted content embedded inside the images. Image spam potentially creates a threat to the credibility of any email-based communication system. While a lot of machine learning techniques are successful in detecting textual based spam, this is not the case for image spams, which can easily evade these textual-spam detection systems. In our work, we explore and evaluate four deep learning techniques that detect image spams. First, we train deep neural networks using …
Evaluation Of Reliability Indicators Of Mobile Communication System Bases,
2020
Bulletin of TUIT: Management and Communication Technologies
Evaluation Of Reliability Indicators Of Mobile Communication System Bases, Dilmurod Davronbekov, Utkir Karimovich Matyokubov, Malika Ilkhamovna Abdullayeva
Bulletin of TUIT: Management and Communication Technologies
In this study, the reliability of mobile system base stations (BTS) is assessed by analyzing data obtained on faults in about 200 BTS over a six-month period. Five BTSs with the highest number of failures and duration of failure were selected in these BTSs. Based on the data obtained, reliability parameters were calculated and compared.
The study used Weibull’s dismissal process distribution method. The breakdown times of each BTS were sorted. In all five BTS, it was found that β(where the value of β is the approximate value obtained from the values of the smallest squares of the Weibull graph), …