Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Entire DC Network

Cloud-Based Machine Learning And Sentiment Analysis, Emmanuel C. Opara Jan 2022

Cloud-Based Machine Learning And Sentiment Analysis, Emmanuel C. Opara

Electronic Theses and Dissertations

The role of a Data Scientist is becoming increasingly ubiquitous as companies and institutions see the need to gain additional insights and information from data to make better decisions to improve the quality-of-service delivery to customers. This thesis document contains three aspects of data science projects aimed at improving tools and techniques used in analyzing and evaluating data. The first research study involved the use of a standard cybersecurity dataset and cloud-based auto-machine learning algorithms were applied to detect vulnerabilities in the network traffic data. The performance of the algorithms was measured and compared using standard evaluation metrics. The second …


Energy And Performance-Optimized Scheduling Of Tasks In Distributed Cloud And Edge Computing Systems, Haitao Yuan Aug 2020

Energy And Performance-Optimized Scheduling Of Tasks In Distributed Cloud And Edge Computing Systems, Haitao Yuan

Dissertations

Infrastructure resources in distributed cloud data centers (CDCs) are shared by heterogeneous applications in a high-performance and cost-effective way. Edge computing has emerged as a new paradigm to provide access to computing capacities in end devices. Yet it suffers from such problems as load imbalance, long scheduling time, and limited power of its edge nodes. Therefore, intelligent task scheduling in CDCs and edge nodes is critically important to construct energy-efficient cloud and edge computing systems. Current approaches cannot smartly minimize the total cost of CDCs, maximize their profit and improve quality of service (QoS) of tasks because of aperiodic arrival …


Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo Dec 2019

Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo

Electronic Thesis and Dissertation Repository

Network virtualization has become a key approach for Network Service Providers (NSPs) to mitigate the challenge of the continually increasing demands for network services. Tightly coupled with their software components, legacy network devices are difficult to upgrade or modify to meet the dynamically changing end-user needs. To virtualize their infrastructure and mitigate those challenges, NSPs have started to adopt Software Defined Networking (SDN) and Network Function Virtualization (NFV). To this end, this thesis addresses the challenges faced on the road of transforming the legacy networking infrastructure to a more dynamic and agile virtualized environment to meet the rapidly increasing demand …


Storage Systems For Mobile-Cloud Applications, Nafize R. Paiker Dec 2018

Storage Systems For Mobile-Cloud Applications, Nafize R. Paiker

Dissertations

Mobile devices have become the major computing platform in todays world. However, some apps on mobile devices still suffer from insufficient computing and energy resources. A key solution is to offload resource-demanding computing tasks from mobile devices to the cloud. This leads to a scenario where computing tasks in the same application run concurrently on both the mobile device and the cloud.

This dissertation aims to ensure that the tasks in a mobile app that employs offloading can access and share files concurrently on the mobile and the cloud in a manner that is efficient, consistent, and transparent to locations. …


From Geographically Dispersed Data Centers Towards Hierarchical Edge Computing, Abbas Kiani May 2018

From Geographically Dispersed Data Centers Towards Hierarchical Edge Computing, Abbas Kiani

Dissertations

Internet scale data centers are generally dispersed in different geographical regions. While the main goal of deploying the geographically dispersed data centers is to provide redundancy, scalability and high availability, the geographic dispersity provides another opportunity for efficient employment of global resources, e.g., utilizing price-diversity in electricity markets or utilizing locational diversity in renewable power generation. In other words, an efficient approach for geographical load balancing (GLB) across geo-dispersed data centers not only can maximize the utilization of green energy but also can minimize the cost of electricity. However, due to the different costs and disparate environmental impacts of the …


Security Evaluation Of Virtualized Computing Platforms, Ganesh Reddy Gunnam Dec 2017

Security Evaluation Of Virtualized Computing Platforms, Ganesh Reddy Gunnam

Theses and Dissertations

In this thesis, security experiments were conducted to evaluate embedded security protocol performance of two leading server operating systems, Apple’s MAC OS server LION Vs. Microsoft’s Windows server 2012 R2 OS under different types of security attack. Furthermore, experiments were conducted to understand and evaluate the effect of virtualization using Hyper-V with Windows 2012 R2 OS on MAC hardware platform. For these experiments, connection rate, connection latency, non-paged pool allocations and processor core utilization for different OS, virtual machines, and under different traffic types were measured.


Information-Theoretic Secure Outsourced Computation In Distributed Systems, Zhaohong Wang Jan 2016

Information-Theoretic Secure Outsourced Computation In Distributed Systems, Zhaohong Wang

Theses and Dissertations--Electrical and Computer Engineering

Secure multi-party computation (secure MPC) has been established as the de facto paradigm for protecting privacy in distributed computation. One of the earliest secure MPC primitives is the Shamir's secret sharing (SSS) scheme. SSS has many advantages over other popular secure MPC primitives like garbled circuits (GC) -- it provides information-theoretic security guarantee, requires no complex long-integer operations, and often leads to more efficient protocols. Nonetheless, SSS receives less attention in the signal processing community because SSS requires a larger number of honest participants, making it prone to collusion attacks. In this dissertation, I propose an agent-based computing framework using …


Design, Analysis, Implementation And Evaluation Of Real-Time Opportunistic Spectrum Access In Cloud-Based Cognitive Radio Networks, Nimish Sharma Jan 2016

Design, Analysis, Implementation And Evaluation Of Real-Time Opportunistic Spectrum Access In Cloud-Based Cognitive Radio Networks, Nimish Sharma

Electronic Theses and Dissertations

Opportunistic spectrum access in cognitive radio network is proposed for remediation of spectrum under-utilization caused by exclusive licensing for service providers that are intermittently utilizing spectrum at any given geolocation and time. The unlicensed secondary users (SUs) rely on opportunistic spectrum access to maximize spectrum utilization by sensing/identifying the idle bands without causing harmful interference to licensed primary users (PUs). In this thesis, Real-time Opportunistic Spectrum Access in Cloud-based Cognitive Radio Networks (ROAR) architecture is presented where cloud computing is used for processing and storage of idle channels. Software-defined radios (SDRs) are used as SUs and PUs that identify, report, …


Elastic Highly Available Cloud Computing, Hassan Hawilo Aug 2015

Elastic Highly Available Cloud Computing, Hassan Hawilo

Electronic Thesis and Dissertation Repository

High availability and elasticity are two the cloud computing services technical features. Elasticity is a key feature of cloud computing where provisioning of resources is closely tied to the runtime demand. High availability assure that cloud applications are resilient to failures. Existing cloud solutions focus on providing both features at the level of the virtual resource through virtual machines by managing their restart, addition, and removal as needed. These existing solutions map applications to a specific design, which is not suitable for many applications especially virtualized telecommunication applications that are required to meet carrier grade standards. Carrier grade applications typically …


Data Security And Privacy In Smart Grid, Yue Tong Aug 2015

Data Security And Privacy In Smart Grid, Yue Tong

Doctoral Dissertations

This dissertation explores novel data security and privacy problems in the emerging smart grid.

The need for data security and privacy spans the whole life cycle of the data in the smart grid, across the phases of data acquisition, local processing and archiving, collaborative processing, and finally sharing and archiving. The first two phases happen in the private domains of an individual utility company, where data are collected from the power system and processed at the local facilities. When data are being acquired and processed in the private domain, data security is the most critical concern. The key question is …


Online Virtual Network Provisioning In Distributed Cloud Computing Data Centers, Khaled Mefarh Alhazmi Aug 2014

Online Virtual Network Provisioning In Distributed Cloud Computing Data Centers, Khaled Mefarh Alhazmi

Electronic Thesis and Dissertation Repository

Efficient virtualization methodologies constitute the core of cloud computing data center implementation. Clients are attracted to the cloud model by the ability to scale available resources dynamically and the flexibility in payment options. However, performance hiccups can push them to return to the buy-and-maintain model. Virtualization plays a key role in the synchronous management of the thousands of servers along with clients' data residing on them. To achieve seamless virtualization, cloud providers require a system that performs the function of virtual network mapping. This includes receiving the cloud client requests and allocating computational and network resources in a way that …


An Energy-Efficient, Time-Constrained Scheduling Scheme In Local Mobile Cloud, Ting Shi May 2014

An Energy-Efficient, Time-Constrained Scheduling Scheme In Local Mobile Cloud, Ting Shi

UNLV Theses, Dissertations, Professional Papers, and Capstones

Mobile devices have limited resource, such as computation performance and battery life. Mobile cloud computing is gaining popularity as a solution to overcome these resource limitations by sending heavy computation to resourceful servers and receiving the results from these servers. Local mobile clouds comprised of nearby mobile devices are proposed as a better solution to support real-time applications. Since network bandwidth and computational resource is shared among all the mobile devices, a scheduling scheme is needed to ensure that multiple mobile devices can efficiently offload tasks to local mobile clouds, satisfying the tasks' time constraint while keeping low-energy consumption. Two …