Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Entire DC Network

Storage Systems For Mobile-Cloud Applications, Nafize R. Paiker Dec 2018

Storage Systems For Mobile-Cloud Applications, Nafize R. Paiker

Dissertations

Mobile devices have become the major computing platform in todays world. However, some apps on mobile devices still suffer from insufficient computing and energy resources. A key solution is to offload resource-demanding computing tasks from mobile devices to the cloud. This leads to a scenario where computing tasks in the same application run concurrently on both the mobile device and the cloud.

This dissertation aims to ensure that the tasks in a mobile app that employs offloading can access and share files concurrently on the mobile and the cloud in a manner that is efficient, consistent, and transparent to locations. …


Protecting Privacy Of Data In The Internet Of Things With Policy Enforcement Fog Module, Abduljaleel Al-Hasnawi Dec 2018

Protecting Privacy Of Data In The Internet Of Things With Policy Enforcement Fog Module, Abduljaleel Al-Hasnawi

Dissertations

The growth of IoT applications has resulted in generating massive volumes of data about people and their surroundings. Significant portions of these data are sensitive since they reflect peoples' behaviors, interests, lifestyles, etc. Protecting sensitive IoT data from privacy violations is a challenge since these data need to be handled by public networks, servers and clouds, most of which are untrusted parties for data owners. In this study, a solution called Policy Enforcement Fog Module (PEFM) is proposed for protecting sensitive IoT data. The primary task of the PEFM solution is mandatory enforcement of privacy polices for sensitive IoT data-whenever …


Exploring The Role Of Semi-Supervised Deep Reinforcement Learning And Ensemble Methods In Support Of The Internet Of Things, Mehdi Mohammadi Jun 2018

Exploring The Role Of Semi-Supervised Deep Reinforcement Learning And Ensemble Methods In Support Of The Internet Of Things, Mehdi Mohammadi

Dissertations

Smart services are an important element of the Internet of Things (IoT) ecosystem where insights are drawn from raw data through the use of machine learning techniques. However, the pathway to develop IoT smart services is complicated as IoT data presents several challenges for machine learning, including handling big data, shortage of labeled data, and the need to benefit from the spatio-temporal relations hidden in the training data.

In this dissertation, after reviewing the state-of-the-art deep learning (DL) and deep reinforcement learning (DRL) techniques and their use in support of IoT applications, this study proposes to extend DRL to semi-supervised …


Secure Entity Authentication, Zuochao Dou May 2018

Secure Entity Authentication, Zuochao Dou

Dissertations

According to Wikipedia, authentication is the act of confirming the truth of an attribute of a single piece of a datum claimed true by an entity. Specifically, entity authentication is the process by which an agent in a distributed system gains confidence in the identity of a communicating partner (Bellare et al.). Legacy password authentication is still the most popular one, however, it suffers from many limitations, such as hacking through social engineering techniques, dictionary attack or database leak. To address the security concerns in legacy password-based authentication, many new authentication factors are introduced, such as PINs (Personal Identification Numbers) …


From Geographically Dispersed Data Centers Towards Hierarchical Edge Computing, Abbas Kiani May 2018

From Geographically Dispersed Data Centers Towards Hierarchical Edge Computing, Abbas Kiani

Dissertations

Internet scale data centers are generally dispersed in different geographical regions. While the main goal of deploying the geographically dispersed data centers is to provide redundancy, scalability and high availability, the geographic dispersity provides another opportunity for efficient employment of global resources, e.g., utilizing price-diversity in electricity markets or utilizing locational diversity in renewable power generation. In other words, an efficient approach for geographical load balancing (GLB) across geo-dispersed data centers not only can maximize the utilization of green energy but also can minimize the cost of electricity. However, due to the different costs and disparate environmental impacts of the …


On Distributed Mobile Edge Computing, Xiang Sun May 2018

On Distributed Mobile Edge Computing, Xiang Sun

Dissertations

Mobile Cloud Computing (MCC) has been proposed to offload the workloads of mobile applications from mobile devices to the cloud in order to not only reduce energy consumption of mobile devices but also accelerate the execution of mobile applications. Owing to the long End-to-End (E2E) delay between mobile devices and the cloud, offloading the workloads of many interactive mobile applications to the cloud may not be suitable. That is, these mobile applications require a huge amount of computing resources to process their workloads as well as a low E2E delay between mobile devices and computing resources, which cannot be satisfied …


High Performance Cloud Computing On Multicore Computers, Jianchen Shan May 2018

High Performance Cloud Computing On Multicore Computers, Jianchen Shan

Dissertations

The cloud has become a major computing platform, with virtualization being a key to allow applications to run and share the resources in the cloud. A wide spectrum of applications need to process large amounts of data at high speeds in the cloud, e.g., analyzing customer data to find out purchase behavior, processing location data to determine geographical trends, or mining social media data to assess brand sentiment. To achieve high performance, these applications create and use multiple threads running on multicore processors. However, existing virtualization technology cannot support the efficient execution of such applications on virtual machines, making them …


Best Practices In 21st Century Learning Environments: A Study Of Two P21 Exemplar Schools, Susan Brown Apr 2018

Best Practices In 21st Century Learning Environments: A Study Of Two P21 Exemplar Schools, Susan Brown

Dissertations

Purpose: The purpose of this phenomenological study is to identify and describe best practices related to 21st century skill development in two elementary schools outside of California that have been recognized as exemplary by the Partnership for 21st Century Learning (P21).

Methodology: This qualitative phenomenological study sought to investigate and understand the experiences of those associated with the phenomenon of exemplar schools, namely teachers, staff and parents in these elite elementary schools, as the elementary level sets the foundation for 21st century learning. Two schools were selected for the study based on the criteria that they had …


Identifying The Determents Of Government E-Service Quality In The Uae, Mohamed Abdulrahman A. Alahmed Apr 2018

Identifying The Determents Of Government E-Service Quality In The Uae, Mohamed Abdulrahman A. Alahmed

Dissertations

Globally, government entities are facilitating ever more over-the-internet transactional services. In the Middle Eastern context, the United Arab Emirates (UAE) is at the forefront. Although the Telecommunications Regulatory Authority of the UAE has adopted appropriate e-service quality (ESQ) assessment tools in-house, these tools are designed only for back-end developers, not for gauging end-user satisfaction levels. In light of this, we developed a conceptual framework for the holistic measuring of such citizen opinions. The study incorporated a survey instrument on a sample population (n = 2,197) for investigating the ESQ of the UAE Ministry of Interior transactional e-services. Key findings indicate …


Using Agent-Based Implementation Of Active Data Bundles For Protecting Privacy In Healthcare Information Systems, Raed M. Salih Apr 2018

Using Agent-Based Implementation Of Active Data Bundles For Protecting Privacy In Healthcare Information Systems, Raed M. Salih

Dissertations

Sharing healthcare information—including electronic health/medical records (EHRs/EMRs)—among healthcare information systems is necessary for improving the quality of healthcare. However, facilitating data exchange increases privacy threats—due to easier copying and dissemination of healthcare information.

We propose a solution that provides privacy protection for patients’ EHRs/EMRs disseminated among different authorized healthcare information systems. Our solution builds upon the existing construct named an Active Data Bundle (ADB). In the proposed solution, ADBs keep EHRs/EMRs as sensitive data; include metadata describing sensitive data and prescribing their use; and encompass a policy enforcement engine (called a virtual machine or VM), which …


A Holistic Computational Approach To Boosting The Performance Of Protein Search Engines, Majdi Ahmad Mosa Maabreh Apr 2018

A Holistic Computational Approach To Boosting The Performance Of Protein Search Engines, Majdi Ahmad Mosa Maabreh

Dissertations

Despite availability of several proteins search engines, due to the increasing amounts of MS/MS data and database sizes, more efficient data analysis and reduction methods are important. Improving accuracy and performance of protein identification is a main goal in the community of proteomic research. In this research, a holistic solution for improvement in search performance is developed.

Most current search engines apply the SEQUEST style of searching protein databases to define MS/MS spectra. SEQUEST involves three main phases: (i) Indexing the protein databases, (ii) Matching and Ranking the MS/MS spectra and (iii) Filtering the matches and reporting the final proteins. …


Protocol For Energy Efficient Cluster Head Election For Collaborative Cluster Head Elections., David Otu Jan 2018

Protocol For Energy Efficient Cluster Head Election For Collaborative Cluster Head Elections., David Otu

Dissertations

In wireless sensor networks (WSNs) , energy is a major constrain.Energy efficient network protocols is required to maintain reliable sensing of the sensing field . WSNs that use LEACH protocol, have node in a cluster periodically take trials to become cluster - head,such that the nodes in the cluster becomes cluster - head evenly. Nodes with greater transmission distance to the base station in the cluster dies out faster because it performs more work in transmitting data when it is cluster-head. The distance-based algorithm presented in this project, ensures that work is allocated to the nodes in the cluster more …


Elasticity Measurement In Caas Environments - Extending The Existing Bungee Elasticity Benchmark To Aws's Elastic Container Service, Nora Limbourg Jan 2018

Elasticity Measurement In Caas Environments - Extending The Existing Bungee Elasticity Benchmark To Aws's Elastic Container Service, Nora Limbourg

Dissertations

Rapid elasticity and automatic scaling are core concepts of most current cloud computing systems. Elasticity describes how well and how fast cloud systems adapt to increases and decreases in workload. In parallel, software architectures are moving towards employing containerised microservices running on systems managed by container orchestration platforms. Cloud users who employ such container-based systems may want to compare the elasticity of different systems or system settings to ensure rapid elasticity and maintain service level objectives while avoiding over-provisioning. Previous research has established a variety of metrics to measure elasticity. Some existing benchmark tools are designed to measure elasticity in …


Automation Of Authorisation Vulnerability Detection In Authenticated Web Applications, Niall Caffrey Jan 2018

Automation Of Authorisation Vulnerability Detection In Authenticated Web Applications, Niall Caffrey

Dissertations

In the beginning the World Wide Web, also known as the Internet, consisted mainly of websites. These were essentially information depositories containing static pages, with the flow of information mostly one directional, from the server to the user’s browser. Most of these websites didn’t authenticate users, instead, each user was treated the same, and presented with the same information. A malicious party that gained access to the web server hosting these websites would usually not gain access to confidential information as most of the information on the web server would already be accessible to the public. Instead, the malicious party …


An Analysis Of Software Testing Practices On Migrations From On Premise To Cloud Hosted Environments, Ronan Mullen Jan 2018

An Analysis Of Software Testing Practices On Migrations From On Premise To Cloud Hosted Environments, Ronan Mullen

Dissertations

This research project examines the differences between software testing practices that are carried out on software that is installed locally (i.e. on premise) versus software that has migrated to a cloud hosted environment. In conjunction with this, focus was placed on determining what methodologies and frameworks are in existence for assisting with software migrations to the cloud. The reason for carrying out this research project was that the transition to cloud computing is becoming more and more mainstream, as a result organisations are required to focus their efforts on how best to move their software to the cloud while ensuring …


A Comparison Of Real Time Stream Processing Frameworks, Jonathan Curtis Jan 2018

A Comparison Of Real Time Stream Processing Frameworks, Jonathan Curtis

Dissertations

The need to process the ever-expanding volumes of information being generated daily in the modern world is driving radical changes in traditional data analysis techniques. As a result of this, a number of open source tools for handling real-time data streams has become available in recent years. Four, in particular, have gained significant traction: Apache Flink, Apache Samza, Apache Spark and Apache Storm. Despite the rising popularity of these frameworks, however, there are few studies that analyse their performance in terms of important metrics, such as throughput and latency. This study aims to correct this, by running several benchmarks against …