Watch: A Distributed Clock Time Offset Estimation Tool On The Platform For Open Wireless Data-Driven Experimental Research,
2023
Washington University in St. Louis
Watch: A Distributed Clock Time Offset Estimation Tool On The Platform For Open Wireless Data-Driven Experimental Research, Cassie Jeng
McKelvey School of Engineering Theses & Dissertations
The synchronization of the clocks used at different devices across space is of critical importance in wireless communications networks. Each device’s local clock differs slightly, affecting the times at which packets are transmitted from different nodes in the network. This thesis provides experimentation and software development on POWDER, the Platform for Open, Wireless Data-driven Experimental Research, an open wireless testbed across the University of Utah campus. We build upon Shout, a suite of Python scripts that allow devices to iteratively transmit and receive with each other and save the collected data. We introduce WATCH, an experimental method to estimate clock …
Electrical Vehicle Charging Infrastructure Design And Operations,
2023
California State University, Long Beach
Electrical Vehicle Charging Infrastructure Design And Operations, Yu Yang, Hen-Geul Yeh
Mineta Transportation Institute Publications
California aims to achieve five million zero-emission vehicles (ZEVs) on the road by 2030 and 250,000 electrical vehicle (EV) charging stations by 2025. To reduce barriers in this process, the research team developed a simulation-based system for EV charging infrastructure design and operations. The increasing power demand due to the growing EV market requires advanced charging infrastructures and operating strategies. This study will deliver two modules in charging station design and operations, including a vehicle charging schedule and an infrastructure planning module for the solar-powered charging station. The objectives are to increase customers’ satisfaction, reduce the power grid burden, and …
Protecting The Infrastructure Of Michigan: Analyzing And Understanding Internet Infrastructure,
2023
University of Nebraska at Omaha
Protecting The Infrastructure Of Michigan: Analyzing And Understanding Internet Infrastructure, Samuel Blaser, Travis Munyer, Damian Ramirez, Lester Juarez, Jackson Servant
Theses/Capstones/Creative Projects
The Michigan Army National Guard DCOE is hoping to increase their understanding of the physical, electrical, protocol, and logical topography of internet service. In order to understand the infrastructure of the internet, information must be collected on its pieces. By studying, describing, and illustrating the infrastructure of the global internet we can develop hardening tactics, improve user training, and develop contingency plans in the case of an attack. The research is focused on where data lives, locating data centers in the region, identifying global infrastructure and who owns it, and potential for hardening. An interactive map has been created in …
Bridging The Gap Between Public Organizaions And Cybersecurity,
2023
California State University, San Bernardino
Bridging The Gap Between Public Organizaions And Cybersecurity, Christopher Boutros
Electronic Theses, Projects, and Dissertations
Cyberattacks are a major problem for public organizations across the nation, and unfortunately for them, the frequency of these attacks is constantly growing. This project used a case study approach to explore the types of cybersecurity public organization agencies face and how those crimes can be mitigated. The goal of this paper is to understand how public organization agencies have prepared for cyberattacks and discuss additional suggestions to improve their current systems with the current research available This research provides an analysis of current cyber security systems, new technologies that can be implemented, roadblocks public agencies face before and during …
Digital Simulations Of Memristors Towards Integration With Reconfigurable Computing,
2023
University of Arkansas, Fayetteville
Digital Simulations Of Memristors Towards Integration With Reconfigurable Computing, Ivris Raymond
Computer Science and Computer Engineering Undergraduate Honors Theses
The end of Moore’s Law has been predicted for decades. Demand for increased parallel computational performance has been increased by improvements in machine learning. This past decade has demonstrated the ever-increasing creativity and effort necessary to extract scaling improvements in CMOS fabrication processes. However, CMOS scaling is nearing its fundamental physical limits. A viable path for increasing performance is to break the von Neumann bottleneck. In-memory computing using emerging memory technologies (e.g. ReRam, STT, MRAM) offers a potential path beyond the end of Moore’s Law. However, there is currently very little support from industry tools for designers wishing to incorporate …
Pillow Based Sleep Tracking Device Using Raspberry Pi,
2023
California State University, San Bernardino
Pillow Based Sleep Tracking Device Using Raspberry Pi, Venkatachalam Seviappan
Electronic Theses, Projects, and Dissertations
Almost half of all people have sleep interruptions at some point in their lives, making sleep disorders a common issue that affects a sizeable section of the population. Both their physical and emotional well-being may suffer as a result of this.Insomnia, which is a prevalent sleep disorder, is identified by symptoms including insufficient sleep duration and quality, trouble initiating sleep, multiple nighttime awakenings, early morning awakenings, and non-restorative sleep. It is essential to employ sleep monitoring systems to detect sleeping disorders as soon as possible for prompt diagnosis and treatment. To avoid sleep related health issues, there are plenty of …
Encrypted Malicious Network Traffic Detection Using Machine Learning,
2023
Kennesaw State University
Encrypted Malicious Network Traffic Detection Using Machine Learning, Niklas Knipschild
Symposium of Student Scholars
The research project aims to find ways to detect malicious packets inside encrypted network traffic. In addition to this goal maintaining user privacy is a priority. As encryption has become less expensive to implement more and more network traffic is encrypted. Currently, 90% of all network traffic is encrypted, and this trend is expected to increase. The creators of malware areemploying various methods to ensure delivery of their malware, including encryption. One proposed method to combat this suggests implementing machine learning with various algorithms to analyze packet attributes to determine if they contain malware, without actually knowing what's inside …
The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace,
2023
Embry-Riddle Aeronautical University
The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman
Doctoral Dissertations and Master's Theses
This study provides a synopsis of the following topics: the prospective limiters levied on cyber-warfare by present–day international legislation; significant complexities and contentions brought up in the rendering & utilization of International Humanitarian Legislation against cyber-warfare; feasible repercussions of cyber-warfare on humanitarian causes. It is also to be contended and outlined in this research study that non–state actors can be held accountable for breaches of international humanitarian legislation committed using cyber–ordnance if sufficient resources and skill are made available. It details the factors that prosecutors and investigators must take into account when organizing investigations into major breaches of humanitarian legislation …
Accurate Indoor Navigation System Based On Imu/Lp-Mm Integrated Method Using Kalman Filter Algorithm,
2023
Hadramout university
Accurate Indoor Navigation System Based On Imu/Lp-Mm Integrated Method Using Kalman Filter Algorithm, Abdullah Mohammed Bahasan
Hadhramout University Journal of Natural & Applied Sciences
Abstract
The demand for navigation systems is rapidly increasing, especially in indoor environments which the signal of GPS is not available. Therefore the Inertial Measurement Unit (IMU) system is a suitable navigation system in such indoor environments. It usually consists of three accelerometers and three gyroscopes to determine position, velocity and attitude information, respectively, without need of any external source. But this type of navigation systems has errors growth with time due to accelerometers and gyroscopes drifts. This paper introduces indoor navigation system based on integrated IMU navigation system with proposed system called Landmarks Points-Map Matching (LP-MM) system using Kalman …
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation,
2023
Central University of South Bihar, Panchanpur, Gaya, Bihar
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Library Philosophy and Practice (e-journal)
Abstract
Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …
Phone Microwave,
2023
California Polytechnic State University, San Luis Obispo
Phone Microwave, Khanh Kim Hoang, Emily Zhou
Computer Engineering
This project involves the installation of remote-control capabilities in an antique 1980s microwave, effectively turning the microwave into a “smart” device. While preserving the original functionality of the microwave, a combination of software and hardware components allows for remote microwave operations. The microwave can be remotely operated by calling the built-in number, and more advanced settings and options can be utilized by texting. The microwave is also secured against unauthorized use with the addition of a PIN code that is required to operate the device.
A Secure And Distributed Architecture For Vehicular Cloud And Protocols For Privacy-Preserving Message Dissemination In Vehicular Ad Hoc Networks,
2023
University of Kentucky
A Secure And Distributed Architecture For Vehicular Cloud And Protocols For Privacy-Preserving Message Dissemination In Vehicular Ad Hoc Networks, Hassan Mistareehi
Theses and Dissertations--Computer Science
Given the enormous interest in self-driving cars, Vehicular Ad hoc NETworks (VANETs) are likely to be widely deployed in the near future. Cloud computing is also gaining widespread deployment. Marriage between cloud computing and VANETs would help solve many of the needs of drivers, law enforcement agencies, traffic management, etc. The contributions of this dissertation are summarized as follows: A Secure and Distributed Architecture for Vehicular Cloud: Ensuring security and privacy is an important issue in the vehicular cloud; if information exchanged between entities is modified by a malicious vehicle, serious consequences such as traffic congestion and accidents can …
Small Business Office Network,
2023
The University of Akron
Small Business Office Network, Michael Gerome
Williams Honors College, Honors Research Projects
This project will emulate a small office network environment. The project will demonstrate the process of building and configuring the network to meet the requirements laid out in the project plan. This network includes four subnets with Windows 10 end devices and a Kali Linux device, it also includes five Cisco layer 2 switches and three Cisco routers. There are also three subnets connecting the routers to each other to enable routing between the subnets. After the network environment is set up, various penetration tests are performed from the Kali Linux device to gather information. The Nmap reconnaissance tool is …
Developing A Web-Based System For Remote Collection And Analysis Of Vehicle Electrical Systems Over Canbus Using Carloop,
2023
Arcadia University
Developing A Web-Based System For Remote Collection And Analysis Of Vehicle Electrical Systems Over Canbus Using Carloop, Joshua N. Valle, Alex Columna-Fuentes
Capstone Showcase
Our program collects vehicle data using an OBD-II device called Carloop that is plugged into the vehicle's diagnostic port. The device executes our code which then communicates with the vehicle's onboard computer to collect data such as engine RPM, vehicle speed, fuel level, and other diagnostic information. This data is then sent over WiFi to Particle’s Cloud, which is a platform for managing IoT devices.
Integrations set up on Particle take care of sending data to our InfluxDB Database, which is hosted on our own cloud-based machine. InfluxDB is a high-performance time-series database that is optimized for storing and querying …
Small Voip-Supported Network,
2023
The University of Akron
Small Voip-Supported Network, Drina Hobson
Williams Honors College, Honors Research Projects
Create a small VoIP network using SIP using physical Cisco equipment. Implement advanced VoIP features such as multicast paging, voice message system & message waiting indicator, and music-on-hold.
Imitation Learning For Swarm Control Using Variational Inference,
2023
West Virginia University
Imitation Learning For Swarm Control Using Variational Inference, Hafeez Olafisayo Jimoh
Graduate Theses, Dissertations, and Problem Reports
Swarms are groups of robots that can coordinate, cooperate, and communicate to achieve tasks that may be impossible for a single robot. These systems exhibit complex dynamical behavior, similar to those observed in physics, neuroscience, finance, biology, social and communication networks, etc. For instance, in Biology, schools of fish, swarm of bacteria, colony of termites exhibit flocking behavior to achieve simple and complex tasks. Modeling the dynamics of flocking in animals is challenging as we usually do not have full knowledge of the dynamics of the system and how individual agent interact. The environment of swarms is also very noisy …
Enhancing Traffic Safety In Unpredicted Environments With Integration Of Adas Features With Sensor Fusion In Intelligent Electric Vehicle Platform With Implementation Of Environmental Mapping Technology,
2023
Georgia Southern University
Enhancing Traffic Safety In Unpredicted Environments With Integration Of Adas Features With Sensor Fusion In Intelligent Electric Vehicle Platform With Implementation Of Environmental Mapping Technology, David S. Obando Ortegon
Electronic Theses and Dissertations
A major objective on society is to reduce the number of accidents and fatalities on the road for drivers, and pedestrians. Therefore, the automotive engineering field is working on this problem through the development and integration of safety technologies such as advanced driving assistance systems. For this reason, this work was intended to develop and evaluate the performance of different ADAS features and IV technologies under unexpected scenarios. This by the development of safety algorithms applied to the intelligent electric vehicle designed and built in this work, through the use of ADAS sensors based on sensor fusion. Evaluation of AEB, …
A Camera-Only Based Approach To Traffic Parameter Estimation Using Mobile Observer Methods,
2023
Georgia Southern University
A Camera-Only Based Approach To Traffic Parameter Estimation Using Mobile Observer Methods, Temitope D. Jegede
Electronic Theses and Dissertations
As vehicles become more modern, a large majority of vehicles on the road will have the required sensors to smoothly interact with other vehicles and infrastructure on the road. There will be many benefits of this new connectivity between vehicles on the road but one of the most profound improvements will be in the area of road accident prevention. Vehicles will be able to share information vital to road safety to oncoming vehicles and vehicles that are occluded so they do not have a direct line of sight to see a pedestrian or another vehicle on the road.
Another advantage …
Wifi Sensing At The Edge Towards Scalable On-Device Wireless Sensing Systems,
2023
Virginia Commonwealth University
Wifi Sensing At The Edge Towards Scalable On-Device Wireless Sensing Systems, Steven M. Hernandez
Theses and Dissertations
WiFi sensing offers a powerful method for tracking physical activities using the radio-frequency signals already found throughout our homes and offices. This novel sensing modality offers continuous and non-intrusive activity tracking since sensing can be performed (i) without requiring wearable sensors, (ii) outside the line-of-sight, and even (iii) through the wall. Furthermore, WiFi has become a ubiquitous technology in our computers, our smartphones, and even in low-cost Internet of Things devices. In this work, we consider how the ubiquity of these low-cost WiFi devices offer an unparalleled opportunity for improving the scalability of wireless sensing systems. Thus far, WiFi sensing …
Towards Multipronged On-Chip Memory And Data Protection From Verification To Design And Test,
2022
Southern Methodist University
Towards Multipronged On-Chip Memory And Data Protection From Verification To Design And Test, Senwen Kan, Jennifer Dworak
Computer Science and Engineering Theses and Dissertations
Modern System on Chips (SoCs) generally include embedded memories, and these memories may be vulnerable to malicious attacks such as hardware trojan horses (HTHs), test access port exploitation, and malicious software. This dissertation contributes verification as well as design obfuscation solutions aimed at design level detection of memory HTH circuits as well as obfuscation to prevent HTH triggering for embedded memory during functional operation. For malicious attack vectors stemming from test/debug interfaces, this dissertation presents novel solutions that enhance design verification and securitization of an IJTAG based test access interface. Such solutions can enhance SoC protection by preventing memory test …
