Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Graduate Theses and Dissertations

Discipline
Keyword
Publication Year

Articles 1 - 30 of 30

Full-Text Articles in Entire DC Network

Machine Tool Communication (Mtcomm) Method And Its Applications In A Cyber-Physical Manufacturing Cloud, S M Nahian Al Sunny Oct 2023

Machine Tool Communication (Mtcomm) Method And Its Applications In A Cyber-Physical Manufacturing Cloud, S M Nahian Al Sunny

Graduate Theses and Dissertations

The integration of cyber-physical systems and cloud manufacturing has the potential to revolutionize existing manufacturing systems by enabling better accessibility, agility, and efficiency. To achieve this, it is necessary to establish a communication method of manufacturing services over the Internet to access and manage physical machines from cloud applications. Most of the existing industrial automation protocols utilize Ethernet based Local Area Network (LAN) and are not designed specifically for Internet enabled data transmission. Recently MTConnect has been gaining popularity as a standard for monitoring status of machine tools through RESTful web services and an XML based messaging structure, but it …


Divide-And-Conquer Distributed Learning: Privacy-Preserving Offloading Of Neural Network Computations, Lewis C.L. Brown Dec 2022

Divide-And-Conquer Distributed Learning: Privacy-Preserving Offloading Of Neural Network Computations, Lewis C.L. Brown

Graduate Theses and Dissertations

Machine learning has become a highly utilized technology to perform decision making on high dimensional data. As dataset sizes have become increasingly large so too have the neural networks to learn the complex patterns hidden within. This expansion has continued to the degree that it may be infeasible to train a model from a singular device due to computational or memory limitations of underlying hardware. Purpose built computing clusters for training large models are commonplace while access to networks of heterogeneous devices is still typically more accessible. In addition, with the rise of 5G networks, computation at the edge becoming …


Computational Frameworks For Multi-Robot Cooperative 3d Printing And Planning, Laxmi Prasad Poudel Jul 2021

Computational Frameworks For Multi-Robot Cooperative 3d Printing And Planning, Laxmi Prasad Poudel

Graduate Theses and Dissertations

This dissertation proposes a novel cooperative 3D printing (C3DP) approach for multi-robot additive manufacturing (AM) and presents scheduling and planning strategies that enable multi-robot cooperation in the manufacturing environment. C3DP is the first step towards achieving the overarching goal of swarm manufacturing (SM). SM is a paradigm for distributed manufacturing that envisions networks of micro-factories, each of which employs thousands of mobile robots that can manufacture different products on demand. SM breaks down the complicated supply chain used to deliver a product from a large production facility from one part of the world to another. Instead, it establishes a network …


Design And Development Of Techniques To Ensure Integrity In Fog Computing Based Databases, Abdulwahab Fahad S. Alazeb Jul 2021

Design And Development Of Techniques To Ensure Integrity In Fog Computing Based Databases, Abdulwahab Fahad S. Alazeb

Graduate Theses and Dissertations

The advancement of information technology in coming years will bring significant changes to the way sensitive data is processed. But the volume of generated data is rapidly growing worldwide. Technologies such as cloud computing, fog computing, and the Internet of things (IoT) will offer business service providers and consumers opportunities to obtain effective and efficient services as well as enhance their experiences and services; increased availability and higher-quality services via real-time data processing augment the potential for technology to add value to everyday experiences. This improves human life quality and easiness. As promising as these technological innovations, they are prone …


Privacy-Preserving Cloud-Assisted Data Analytics, Wei Bao Jul 2021

Privacy-Preserving Cloud-Assisted Data Analytics, Wei Bao

Graduate Theses and Dissertations

Nowadays industries are collecting a massive and exponentially growing amount of data that can be utilized to extract useful insights for improving various aspects of our life. Data analytics (e.g., via the use of machine learning) has been extensively applied to make important decisions in various real world applications. However, it is challenging for resource-limited clients to analyze their data in an efficient way when its scale is large. Additionally, the data resources are increasingly distributed among different owners. Nonetheless, users' data may contain private information that needs to be protected.

Cloud computing has become more and more popular in …


Enabling The “Easy Button” For Broad, Parallel Optimization Of Functions Evaluated By Simulation, Andrew Gibson Jul 2021

Enabling The “Easy Button” For Broad, Parallel Optimization Of Functions Evaluated By Simulation, Andrew Gibson

Graduate Theses and Dissertations

Java Optimization by Simulation (JOBS) is presented: an open-source, object-oriented Java library designed to enable the study, research, and use of optimization for models evaluated by simulation. JOBS includes several novel design features that make it easy for a simulation modeler, without extensive expertise in optimization or parallel computation, to define an optimization model with deterministic and/or stochastic constraints, choose one or more metaheuristics to solve it and run, using massively parallel function evaluation to reduce wall-clock times.

JOBS is supported by a new language independent, application programming interface (API) for remote simulation model evaluation and a serverless computing environment …


Machine Learning & Big Data Analyses For Wildfire & Air Pollution Incorporating Gis & Google Earth Engine, Abdullah Al Saim Jul 2021

Machine Learning & Big Data Analyses For Wildfire & Air Pollution Incorporating Gis & Google Earth Engine, Abdullah Al Saim

Graduate Theses and Dissertations

The climatic condition, the vegetation type, and the landscape of the United States have made it susceptible to wildfires. This research is divided into two parts based on the analysis of two different aspects of wildfires of two distinct regions. The first part of the study investigates the wildfire susceptibility in Arkansas. Arkansas is a natural state, and it is heavily dependent on its forest and agricultural resources. During the last 30 years, more than 1,000 wildfires occurred in Arkansas and caused more than 10,000 acres of burned areas. Therefore, identifying wildfire-susceptible areas is crucial for ensuring sustainable forest and …


Securing Fog Federation From Behavior Of Rogue Nodes, Mohammed Saleh H. Alshehri May 2021

Securing Fog Federation From Behavior Of Rogue Nodes, Mohammed Saleh H. Alshehri

Graduate Theses and Dissertations

As the technological revolution advanced information security evolved with an increased need for confidential data protection on the internet. Individuals and organizations typically prefer outsourcing their confidential data to the cloud for processing and storage. As promising as the cloud computing paradigm is, it creates challenges; everything from data security to time latency issues with data computation and delivery to end-users. In response to these challenges CISCO introduced the fog computing paradigm in 2012. The intent was to overcome issues such as time latency and communication overhead and to bring computing and storage resources close to the ground and the …


Analog Spiking Neural Network Implementing Spike Timing-Dependent Plasticity On 65 Nm Cmos, Luke Vincent May 2021

Analog Spiking Neural Network Implementing Spike Timing-Dependent Plasticity On 65 Nm Cmos, Luke Vincent

Graduate Theses and Dissertations

Machine learning is a rapidly accelerating tool and technology used for countless applications in the modern world. There are many digital algorithms to deploy a machine learning program, but the most advanced and well-known algorithm is the artificial neural network (ANN). While ANNs demonstrate impressive reinforcement learning behaviors, they require large power consumption to operate. Therefore, an analog spiking neural network (SNN) implementing spike timing-dependent plasticity is proposed, developed, and tested to demonstrate equivalent learning abilities with fractional power consumption compared to its digital adversary.


Towards A Cyber-Physical Manufacturing Cloud Through Operable Digital Twins And Virtual Production Lines, Md Rakib Shahriar Jul 2020

Towards A Cyber-Physical Manufacturing Cloud Through Operable Digital Twins And Virtual Production Lines, Md Rakib Shahriar

Graduate Theses and Dissertations

In last decade, the paradigm of Cyber-Physical Systems (CPS) has integrated industrial manufacturing systems with Cloud Computing technologies for Cloud Manufacturing. Up to 2015, there were many CPS-based manufacturing systems that collected real-time machining data to perform remote monitoring, prognostics and health management, and predictive maintenance. However, these CPS-integrated and network ready machines were not directly connected to the elements of Cloud Manufacturing and required human-in-the-loop. Addressing this gap, we introduced a new paradigm of Cyber-Physical Manufacturing Cloud (CPMC) that bridges a gap between physical machines and virtual space in 2017. CPMC virtualizes machine tools in cloud through web services …


Secure And Efficient Models For Retrieving Data From Encrypted Databases In Cloud, Sultan Ahmed A Almakdi May 2020

Secure And Efficient Models For Retrieving Data From Encrypted Databases In Cloud, Sultan Ahmed A Almakdi

Graduate Theses and Dissertations

Recently, database users have begun to use cloud database services to outsource their databases. The reason for this is the high computation speed and the huge storage capacity that cloud owners provide at low prices. However, despite the attractiveness of the cloud computing environment to database users, privacy issues remain a cause for concern for database owners since data access is out of their control. Encryption is the only way of assuaging users’ fears surrounding data privacy, but executing Structured Query Language (SQL) queries over encrypted data is a challenging task, especially if the data are encrypted by a randomized …


Evolutionary Inference From Admixed Genomes: Implications Of Hybridization For Biodiversity Dynamics And Conservation, Tyler Chafin May 2020

Evolutionary Inference From Admixed Genomes: Implications Of Hybridization For Biodiversity Dynamics And Conservation, Tyler Chafin

Graduate Theses and Dissertations

Hybridization as a macroevolutionary mechanism has been historically underappreciated among vertebrate biologists. Yet, the advent and subsequent proliferation of next-generation sequencing methods has increasingly shown hybridization to be a pervasive agent influencing evolution in many branches of the Tree of Life (to include ancestral hominids). Despite this, the dynamics of hybridization with regards to speciation and extinction remain poorly understood. To this end, I here examine the role of hybridization in the context of historical divergence and contemporary decline of several threatened and endangered North American taxa, with the goal to illuminate implications of hybridization for promoting—or impeding—population persistence in …


Dynamics Of Land Use, Environment, And Social Organization In The Sasanian Landscape Of Eastern Iraq—Western Iran, Mitra Panahipour Aug 2019

Dynamics Of Land Use, Environment, And Social Organization In The Sasanian Landscape Of Eastern Iraq—Western Iran, Mitra Panahipour

Graduate Theses and Dissertations

Understanding human-environment interactions has been one of the main challenges in archaeological studies over recent years. Past research on the Near Eastern territorial empires in general, and the Sasanian Empire in particular, primarily emphasized the dominant role of human on landscape transformation. In addition, politically centralized schemes such as agricultural intensification and expansion of water supply systems have been at the center of most of the discussions and remained the main hypothesis of the Sasanian land use practices.

This dissertation investigates population’s diverse responses to environmental variability during the Sasanian period (224-651 CE) across a landscape in eastern Iraq—western Iran. …


Choosing Information Systems As A Major: Factors That Influence Selection, Carole L. Shook Aug 2019

Choosing Information Systems As A Major: Factors That Influence Selection, Carole L. Shook

Graduate Theses and Dissertations

The purpose of this study was to examine student perceptions of factors affecting the decision to select information systems as an undergraduate major. Additionally, information systems students were compared to other business students to see if significant differences existed between groups. The four factors studied included: (a) personal interest in the major, (b) student competence, (c) value and utility, and (d) external influences of other people and academic experiences.

A convenience sample was used at a public university in the Southeastern region of the United States. Two hundred junior/senior students were selected as participants. One hundred of the students were …


Assessment And Support For Basic Computer Skills At Community College Hispanic Serving Institutions In California, Jason Wayne Hough May 2019

Assessment And Support For Basic Computer Skills At Community College Hispanic Serving Institutions In California, Jason Wayne Hough

Graduate Theses and Dissertations

This cross-sectional survey study was conducted to determine if California community colleges designated as Hispanic Serving Institutions (HSIs) assess incoming students for basic computer skills, provide learning support for these skills, as well as assess the attitude of administrators towards basic computer skills of incoming students. Prior published research documented the false assumption in higher education incoming students are “digital natives”, capable of effectively using technology expected on college campuses; however, there was no research focused on community colleges designated as HSIs. The study adds to the body of literature about the assessment of and support for basic computer skills …


Russian University Efl Students’ Perceptions Of A Two-Week Online Academic Writing Course, Nataliia Borozdina May 2019

Russian University Efl Students’ Perceptions Of A Two-Week Online Academic Writing Course, Nataliia Borozdina

Graduate Theses and Dissertations

This case study analyzes Russian university EFL students’ perceptions of a two-week online academic writing course. The researcher investigated 13 students’ attitudes towards an online academic English writing class offered at Kursk State University, Kursk’s oldest higher education institution, founded in 1934. In 1994 it was transformed into Kursk State Pedagogical University, and in 2003 it became Kursk State University. Along with the two-week online course assignments, the students completed pre- and post-questionnaires, reflections about the course, and participated in individual and group interviews. The findings of the study indicate that all of the participants had positive perceptions about the …


Diversification Across A Dynamic Landscape: Phylogeography And Riverscape Genetics Of Speckled Dace (Rhinichthys Osculus) In Western North America, Steven Michael Mussmann Dec 2018

Diversification Across A Dynamic Landscape: Phylogeography And Riverscape Genetics Of Speckled Dace (Rhinichthys Osculus) In Western North America, Steven Michael Mussmann

Graduate Theses and Dissertations

Evolution occurs at various spatial and temporal scales. For example, speciation may occur in historic time, whereas localized adaptation is more contemporary. Each is required to identify and manage biodiversity. However, the relative abundance of Speckled Dace (Rhinichthys osculus), a small cyprinid fish in western North America (WNA) and the study species for this dissertation, establishes it an atypical conservation target, particularly when contrasted with the profusion of narrowly endemic forms it displays. Yet, the juxtaposition of ubiquity versus endemism provides an ideal model against which to test hypotheses regarding the geomorphic evolution of WNA. More specifically, it also allows …


Power Interface Design And System Stability Analysis For 400 V Dc-Powered Data Centers, Yuzhi Zhang Dec 2017

Power Interface Design And System Stability Analysis For 400 V Dc-Powered Data Centers, Yuzhi Zhang

Graduate Theses and Dissertations

The demands of high performance cloud computation and internet services have increased in recent decades. These demands have driven the expansion of existing data centers and the construction of new data centers. The high costs of data center downtime are pushing designers to provide high reliability power supplies. Thus, there are significant research questions and challenges to design efficient and environmentally friendly data centers with address increasing energy prices and distributed energy developments.

This dissertation work aims to study and investigate the suitable technologies of power interface and system level configuration for high efficiency and reliable data centers.

A 400 …


Enforcing Database Security On Cloud Using A Trusted Third Party Based Model, Victor Fuentes Tello Aug 2017

Enforcing Database Security On Cloud Using A Trusted Third Party Based Model, Victor Fuentes Tello

Graduate Theses and Dissertations

Cloud computing offers a considerable number of advantages to clients and organizations that use several capabilities to store sensitive data, interact with applications, or use technology infrastructure to perform daily activities. The development of new models in cloud computing brings with it a series of elements that must be considered by companies, particularly when the sensitive data needs to be protected. There are some concerns related to security that need to be taken into consideration when a service provider manage and store the data in a location outside the company. In this research, a model that uses a trusted third …


Big Data And Organizational Impacts: A Study Of Big Data Ventures, Taha Havakhor Dec 2016

Big Data And Organizational Impacts: A Study Of Big Data Ventures, Taha Havakhor

Graduate Theses and Dissertations

New information technology (IT) ventures are at the forefront of developing IT innovations. In spite of their importance in the advancement of IT and the unique risks of survival that distinguishes them from established firms, the organizational literature on IT has mostly overlooked new IT ventures. Specifically, Big Data industry is a context where new IT ventures actively change the landscape of IT innovations. However, less is known about the factors influencing the economic success of Big Data ventures (BDVs), as well as the established firms that invest in them. To shed light on these factors, three essays are designed …


Just In Time Assembly (Jita) - A Run Time Interpretation Approach For Achieving Productivity Of Creating Custom Accelerators In Fpgas, Sen Ma Dec 2016

Just In Time Assembly (Jita) - A Run Time Interpretation Approach For Achieving Productivity Of Creating Custom Accelerators In Fpgas, Sen Ma

Graduate Theses and Dissertations

The reconfigurable computing community has yet to be successful in allowing programmers to access FPGAs through traditional software development flows. Existing barriers that prevent programmers from using FPGAs include: 1) knowledge of hardware programming models, 2) the need to work within the vendor specific CAD tools and hardware synthesis. This thesis presents a series of published papers that explore different aspects of a new approach being developed to remove the barriers and enable programmers to compile accelerators on next generation reconfigurable manycore architectures. The approach is entitled Just In Time Assembly (JITA) of hardware accelerators. The approach has been defined …


Grouping Techniques To Manage Large-Scale Multi-Item Multi-Echelon Inventory Systems, Anvar Abaydulla Dec 2016

Grouping Techniques To Manage Large-Scale Multi-Item Multi-Echelon Inventory Systems, Anvar Abaydulla

Graduate Theses and Dissertations

Large retail companies operate large-scale systems which may consist of thousands of stores. These retail stores and their suppliers, such as warehouses and manufacturers, form a large-scale multi-item multi-echelon inventory supply network. Operations of this kind of inventory system require a large number of human resources, computing capacity, etc.

In this research, three kinds of grouping techniques are investigated to make the large-scale inventory system “easier” to manage. The first grouping technique is a network based ABC classification method. A new classification criterion is developed so that the inventory network characteristics are included in the classification process, and this criterion …


Two Essays On Analytical Capabilities: Antecedents And Consequences, Rishikesh Jena Dec 2016

Two Essays On Analytical Capabilities: Antecedents And Consequences, Rishikesh Jena

Graduate Theses and Dissertations

Although organizations are rapidly embracing business analytics (BA) to enhance organizational performance, only a small proportion have managed to build analytical capabilities. While BA continues to draw attention from academics and practitioners, theoretical understanding of antecedents and consequences of analytical capabilities remain limited and lack a systematic view. In order to address the research gap, the two essays investigate: (a) the impact of organization’s core information processing mechanisms and its impact on analytical capabilities, (b) the sequential approach to integration of IT-enabled business processes and its impact on analytical capabilities, and (c) network position and its impact on analytical capabilities. …


Data Partitioning Methods To Process Queries On Encrypted Databases On The Cloud, Osama M. Omran May 2016

Data Partitioning Methods To Process Queries On Encrypted Databases On The Cloud, Osama M. Omran

Graduate Theses and Dissertations

Many features and advantages have been brought to organizations and computer users by Cloud computing. It allows different service providers to distribute many applications and services in an economical way. Consequently, many users and companies have begun using cloud computing. However, the users and companies are concerned about their data when data are stored and managed in the Cloud or outsourcing servers. The private data of individual users and companies is stored and managed by the service providers on the Cloud, which offers services on the other side of the Internet in terms of its users, and consequently results in …


Exploring Privacy Leakage From The Resource Usage Patterns Of Mobile Apps, Amin Rois Sinung Nugroho May 2016

Exploring Privacy Leakage From The Resource Usage Patterns Of Mobile Apps, Amin Rois Sinung Nugroho

Graduate Theses and Dissertations

Due to the popularity of smart phones and mobile apps, a potential privacy risk with the usage of mobile apps is that, from the usage information of mobile apps (e.g., how many hours a user plays mobile games in each day), private information about a user’s living habits and personal activities can be inferred. To assess this risk, this thesis answers the following research question: can the type of a mobile app (e.g., email, web browsing, mobile game, music streaming, etc.) used by a user be inferred from the resource (e.g., CPU, memory, network, etc.) usage patterns of the mobile …


Data Integrity Verification In Cloud Computing, Katanosh Morovat May 2015

Data Integrity Verification In Cloud Computing, Katanosh Morovat

Graduate Theses and Dissertations

Cloud computing is an architecture model which provides computing and storage capacity as a service over the internet. Cloud computing should provide secure services for users and owners of data as well. Cloud computing services are a completely internet-based technology where data are stored and maintained in the data center of a cloud provider. Lack of appropriate control over the data might incur several security issues. As a result, some data stored in the cloud must be protected at all times. These types of data are called sensitive data. Sensitive data is defined as data that must be protected against …


Hybrid Nanostructured Textile Bioelectrode For Unobtrusive Health Monitoring, Pratyush Rai Aug 2013

Hybrid Nanostructured Textile Bioelectrode For Unobtrusive Health Monitoring, Pratyush Rai

Graduate Theses and Dissertations

Coronary heart disease, cardiovascular diseases and strokes are the leading causes of mortality in United States of America. Timely point-of-care health diagnostics and therapeutics for person suffering from these diseases can save thousands of lives. However, lack of accessible minimally intrusive health monitoring systems makes timely diagnosis difficult and sometimes impossible. To remedy this problem, a textile based nano-bio-sensor was developed and evaluated in this research. The sensor was made of novel array of vertically standing nanostructures that are conductive nano-fibers projecting from a conductive fabric. These sensor electrodes were tested for the quality of electrical contact that they made …


A Secure And Fair Resource Sharing Model For Community Clouds, Santhosh S. Anand May 2013

A Secure And Fair Resource Sharing Model For Community Clouds, Santhosh S. Anand

Graduate Theses and Dissertations

Cloud computing has gained a lot of importance and has been one of the most discussed segment of today's IT industry. As enterprises explore the idea of using clouds, concerns have emerged related to cloud security and standardization. This thesis explores whether the Community Cloud Deployment Model can provide solutions to some of the concerns associated with cloud computing. A secure framework based on trust negotiations for resource sharing within the community is developed as a means to provide standardization and security while building trust during resource sharing within the community. Additionally, a model for fair sharing of resources is …


Mitigating Insider Threat In Relational Database Systems, Qussai Yaseen May 2012

Mitigating Insider Threat In Relational Database Systems, Qussai Yaseen

Graduate Theses and Dissertations

The dissertation concentrates on addressing the factors and capabilities that enable insiders to violate systems security. It focuses on modeling the accumulative knowledge that insiders get throughout legal accesses, and it concentrates on analyzing the dependencies and constraints among data items and represents them using graph-based methods. The dissertation proposes new types of Knowledge Graphs (KGs) to represent insiders' knowledgebases. Furthermore, it introduces the Neural Dependency and Inference Graph (NDIG) and Constraints and Dependencies Graph (CDG) to demonstrate the dependencies and constraints among data items. The dissertation discusses in detail how insiders use knowledgebases and dependencies and constraints to get …


File System Simulation: Hierarchical Performance Measurement And Modeling, Hai Quang Nguyen Aug 2011

File System Simulation: Hierarchical Performance Measurement And Modeling, Hai Quang Nguyen

Graduate Theses and Dissertations

File systems are very important components in a computer system. File system simulation can help to predict the performance of new system designs. It offers the advantages of the flexibility of modeling and the cost and time savings of utilizing simulation instead of full implementation. Being able to predict end-to-end file system performance against a pre-defined workload can help system designers to make decisions that could affect their entire product line, involving several million dollars of investment. This dissertation presents detailed simulation-based performance models of the Linux ext3 file system and the PVFS parallel file system. The models are developed …