Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Entire DC Network

Storage Systems For Mobile-Cloud Applications, Nafize R. Paiker Dec 2018

Storage Systems For Mobile-Cloud Applications, Nafize R. Paiker

Dissertations

Mobile devices have become the major computing platform in todays world. However, some apps on mobile devices still suffer from insufficient computing and energy resources. A key solution is to offload resource-demanding computing tasks from mobile devices to the cloud. This leads to a scenario where computing tasks in the same application run concurrently on both the mobile device and the cloud.

This dissertation aims to ensure that the tasks in a mobile app that employs offloading can access and share files concurrently on the mobile and the cloud in a manner that is efficient, consistent, and transparent to locations. …


Protecting Privacy Of Data In The Internet Of Things With Policy Enforcement Fog Module, Abduljaleel Al-Hasnawi Dec 2018

Protecting Privacy Of Data In The Internet Of Things With Policy Enforcement Fog Module, Abduljaleel Al-Hasnawi

Dissertations

The growth of IoT applications has resulted in generating massive volumes of data about people and their surroundings. Significant portions of these data are sensitive since they reflect peoples' behaviors, interests, lifestyles, etc. Protecting sensitive IoT data from privacy violations is a challenge since these data need to be handled by public networks, servers and clouds, most of which are untrusted parties for data owners. In this study, a solution called Policy Enforcement Fog Module (PEFM) is proposed for protecting sensitive IoT data. The primary task of the PEFM solution is mandatory enforcement of privacy polices for sensitive IoT data-whenever …


Exploring The Role Of Semi-Supervised Deep Reinforcement Learning And Ensemble Methods In Support Of The Internet Of Things, Mehdi Mohammadi Jun 2018

Exploring The Role Of Semi-Supervised Deep Reinforcement Learning And Ensemble Methods In Support Of The Internet Of Things, Mehdi Mohammadi

Dissertations

Smart services are an important element of the Internet of Things (IoT) ecosystem where insights are drawn from raw data through the use of machine learning techniques. However, the pathway to develop IoT smart services is complicated as IoT data presents several challenges for machine learning, including handling big data, shortage of labeled data, and the need to benefit from the spatio-temporal relations hidden in the training data.

In this dissertation, after reviewing the state-of-the-art deep learning (DL) and deep reinforcement learning (DRL) techniques and their use in support of IoT applications, this study proposes to extend DRL to semi-supervised …


High Performance Cloud Computing On Multicore Computers, Jianchen Shan May 2018

High Performance Cloud Computing On Multicore Computers, Jianchen Shan

Dissertations

The cloud has become a major computing platform, with virtualization being a key to allow applications to run and share the resources in the cloud. A wide spectrum of applications need to process large amounts of data at high speeds in the cloud, e.g., analyzing customer data to find out purchase behavior, processing location data to determine geographical trends, or mining social media data to assess brand sentiment. To achieve high performance, these applications create and use multiple threads running on multicore processors. However, existing virtualization technology cannot support the efficient execution of such applications on virtual machines, making them …


Using Agent-Based Implementation Of Active Data Bundles For Protecting Privacy In Healthcare Information Systems, Raed M. Salih Apr 2018

Using Agent-Based Implementation Of Active Data Bundles For Protecting Privacy In Healthcare Information Systems, Raed M. Salih

Dissertations

Sharing healthcare information—including electronic health/medical records (EHRs/EMRs)—among healthcare information systems is necessary for improving the quality of healthcare. However, facilitating data exchange increases privacy threats—due to easier copying and dissemination of healthcare information.

We propose a solution that provides privacy protection for patients’ EHRs/EMRs disseminated among different authorized healthcare information systems. Our solution builds upon the existing construct named an Active Data Bundle (ADB). In the proposed solution, ADBs keep EHRs/EMRs as sensitive data; include metadata describing sensitive data and prescribing their use; and encompass a policy enforcement engine (called a virtual machine or VM), which …


A Holistic Computational Approach To Boosting The Performance Of Protein Search Engines, Majdi Ahmad Mosa Maabreh Apr 2018

A Holistic Computational Approach To Boosting The Performance Of Protein Search Engines, Majdi Ahmad Mosa Maabreh

Dissertations

Despite availability of several proteins search engines, due to the increasing amounts of MS/MS data and database sizes, more efficient data analysis and reduction methods are important. Improving accuracy and performance of protein identification is a main goal in the community of proteomic research. In this research, a holistic solution for improvement in search performance is developed.

Most current search engines apply the SEQUEST style of searching protein databases to define MS/MS spectra. SEQUEST involves three main phases: (i) Indexing the protein databases, (ii) Matching and Ranking the MS/MS spectra and (iii) Filtering the matches and reporting the final proteins. …


Automation Of Authorisation Vulnerability Detection In Authenticated Web Applications, Niall Caffrey Jan 2018

Automation Of Authorisation Vulnerability Detection In Authenticated Web Applications, Niall Caffrey

Dissertations

In the beginning the World Wide Web, also known as the Internet, consisted mainly of websites. These were essentially information depositories containing static pages, with the flow of information mostly one directional, from the server to the user’s browser. Most of these websites didn’t authenticate users, instead, each user was treated the same, and presented with the same information. A malicious party that gained access to the web server hosting these websites would usually not gain access to confidential information as most of the information on the web server would already be accessible to the public. Instead, the malicious party …


An Analysis Of Software Testing Practices On Migrations From On Premise To Cloud Hosted Environments, Ronan Mullen Jan 2018

An Analysis Of Software Testing Practices On Migrations From On Premise To Cloud Hosted Environments, Ronan Mullen

Dissertations

This research project examines the differences between software testing practices that are carried out on software that is installed locally (i.e. on premise) versus software that has migrated to a cloud hosted environment. In conjunction with this, focus was placed on determining what methodologies and frameworks are in existence for assisting with software migrations to the cloud. The reason for carrying out this research project was that the transition to cloud computing is becoming more and more mainstream, as a result organisations are required to focus their efforts on how best to move their software to the cloud while ensuring …