Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (67)
- Computer Sciences (66)
- Engineering (36)
- Computer Engineering (20)
- Databases and Information Systems (16)
-
- Electrical and Computer Engineering (12)
- Business (11)
- Social and Behavioral Sciences (8)
- Computer and Systems Architecture (6)
- Information Security (6)
- Business Administration, Management, and Operations (5)
- Digital Communications and Networking (5)
- Data Storage Systems (4)
- Medicine and Health Sciences (4)
- Systems and Communications (4)
- Technology and Innovation (4)
- Theory and Algorithms (4)
- Civil and Environmental Engineering (3)
- Education (3)
- Electrical and Electronics (3)
- Management Information Systems (3)
- OS and Networks (3)
- Other Electrical and Computer Engineering (3)
- Systems Architecture (3)
- Artificial Intelligence and Robotics (2)
- Communication (2)
- Computational Engineering (2)
- Management Sciences and Quantitative Methods (2)
- Mechanical Engineering (2)
- Medical Specialties (2)
- Institution
-
- Walden University (10)
- New Jersey Institute of Technology (7)
- Rochester Institute of Technology (7)
- University of Wollongong (6)
- Clemson University (5)
-
- Old Dominion University (5)
- Western University (5)
- Brigham Young University (4)
- California State University, San Bernardino (4)
- Purdue University (4)
- University of Arkansas, Fayetteville (4)
- University of Nevada, Las Vegas (4)
- California Polytechnic State University, San Luis Obispo (3)
- Georgia State University (3)
- Nova Southeastern University (3)
- Portland State University (3)
- Sheridan College (3)
- University of Massachusetts Amherst (3)
- Air Force Institute of Technology (2)
- Georgia Southern University (2)
- Governors State University (2)
- Louisiana State University (2)
- Regis University (2)
- San Jose State University (2)
- St. Cloud State University (2)
- United Arab Emirates University (2)
- University of Alabama in Huntsville (2)
- University of Kentucky (2)
- University of New Mexico (2)
- University of South Florida (2)
- Publication Year
- Publication
-
- Theses and Dissertations (10)
- Walden Dissertations and Doctoral Studies (10)
- Dissertations (9)
- Theses (9)
- Electronic Thesis and Dissertation Repository (5)
-
- Open Access Dissertations (5)
- University of Wollongong Thesis Collection 1954-2016 (5)
- All Theses (4)
- Computer Science Theses & Dissertations (4)
- Dissertations and Theses (4)
- Doctoral Dissertations (4)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (4)
- CCE Theses and Dissertations (3)
- Electronic Theses and Dissertations (3)
- Graduate Theses and Dissertations (3)
- Student Capstones (3)
- Theses Digitization Project (3)
- Culminating Projects in Information Assurance (2)
- Electrical and Computer Engineering ETDs (2)
- LSU Doctoral Dissertations (2)
- Master's Projects (2)
- Regis University Student Publications (comprehensive collection) (2)
- Theses and Dissertations--Electrical and Computer Engineering (2)
- USF Tampa Graduate Theses and Dissertations (2)
- University of the Pacific Theses and Dissertations (2)
- Accounting Undergraduate Honors Theses (1)
- All Capstone Projects (1)
- All Dissertations (1)
- All ETDs from UAB (1)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (1)
Articles 1 - 30 of 136
Full-Text Articles in Entire DC Network
The Evolution Of The Chief Technology Officer And The Modernization Of Technology In Education, Brian Skibinski
The Evolution Of The Chief Technology Officer And The Modernization Of Technology In Education, Brian Skibinski
All Student Theses
The role of technology in education has changed dramatically over the past 20 years. From the advent of individual workstations to networked labs to one-to-one technologies, computers have transformed how teachers and students consume information. School districts today support hundreds if not thousands of devices and end users. Technology supports mission critical systems like financial, human resources, library, and student information systems and ensures they are integrating rostering information to numerous third-party programs like Clever, Classlink or textbook specific websites. They also support the district operations as well by assisting in or managing building automation controls which can include lighting, …
Large Scale Data Transfers In Cloud-Based Systems, Uday Kumar Bommala
Large Scale Data Transfers In Cloud-Based Systems, Uday Kumar Bommala
Theses
My dissertation focuses on developing a High-performance, Scalable, and Efficient Data Transfer Framework with Configurable and Extensible Features. The exponential growth of high-volume data poses collaboration challenges for big data providers, particularly in global-scale scientific research. The Earth’s scientific sector experiences an ongoing trend of increasing temporal and spatial data resolution, resulting in massive data archives at organizations like NASA, ESA, and JAXA. To facilitate efficient scientific study with partner agencies worldwide, data transfer solutions must handle this vast data volume across platforms at reasonable costs. The dissertation proposes a 3-phase approach (Analysis, Evaluation, and Implementation) to address the implementation …
Arcana Capstone Report, Jae Won Park, Suzi Ryu, Caitlin Rush
Arcana Capstone Report, Jae Won Park, Suzi Ryu, Caitlin Rush
Student Capstones
Our project, Arcana, is an augmented reality based mobile game. This application will promote outdoor activities for both children and adults and provide them with fun and engaging challenges. A user can grow their unique character and progress through puzzles and encounters. This solution will use many advanced areas of computer science, such as augmented reality and cognitive computing, and have many different components like cloud-computing and multiplayer functionality.
Comparative Analysis Of Cloud-Based Server And Conventional Server Of Simulators For Marine Engineering, Jose Maria Razon Nalus
Comparative Analysis Of Cloud-Based Server And Conventional Server Of Simulators For Marine Engineering, Jose Maria Razon Nalus
World Maritime University Dissertations
No abstract provided.
Frameworks For Secure Collaborative And Concurrent Editing, Shashank Arora
Frameworks For Secure Collaborative And Concurrent Editing, Shashank Arora
Legacy Theses & Dissertations (2009 - 2024)
Cloud-based online document editing services, such as Google Docs and Office 365, provide an inexpensive and efficient means of managing documents. However, storing data on the cloud also raises certain security and privacy concerns, especially when the data is of confidential and sensitive nature. Storing data on third-party servers can potentially be compromising as it gives an opportunity to the third-party cloud service providers to turn semi-honest and become curious about user data. User data stored on third-party servers is also prone to attacks like virtual machine-based side-channel along with natural language processing and machine learning-based content search and retrieval …
Scheduling Many-Task Computing Applications For A Hybrid Cloud, Shifat Perveen Mithila
Scheduling Many-Task Computing Applications For A Hybrid Cloud, Shifat Perveen Mithila
LSU Doctoral Dissertations
A centralized scheduler can become a bottleneck for placing the tasks of a many-task application on heterogeneous cloud resources. Previously, it was demonstrated that a decentralized vector scheduling approach based on performance measurements can be used successfully for this task placement scenario. In this dissertation, we extend this approach to task placement based on latency measurements. Each node collects performance metrics from its neighbors on an overlay graph, measures the communication latency, and then makes local decisions on where to move tasks. We present a decentralized and a centralized algorithm for configuring the overlay graph based on latency measurements and …
Improving Robustness Of Deep Learning Models And Privacy-Preserving Image Denoising, Hadi Zanddizari
Improving Robustness Of Deep Learning Models And Privacy-Preserving Image Denoising, Hadi Zanddizari
USF Tampa Graduate Theses and Dissertations
Applications of deep learning models and convolutional neural networks have been rapidly increased. Although state-of-the-art CNNs provide high accuracy in many applications, recent investigations show that such networks are highly vulnerable to adversarial attacks. The black-box adversarial attack is one type of attack that the attacker does not have any knowledge about the model or the training dataset, but it has some input data set and theirlabels.
In this chapter, we propose a novel approach to generate a black-box attack in a sparse domain, whereas the most critical information of an image can be observed. Our investigation shows that large …
Exploring Critical Success Factors For Implementing It Modernization Systems In Michigan State Agencies, Luc Armand Kamdem
Exploring Critical Success Factors For Implementing It Modernization Systems In Michigan State Agencies, Luc Armand Kamdem
Walden Dissertations and Doctoral Studies
Since 2001, most government organizations’ IT modernization programs had failed because of ineffective implementation strategies from IT leaders. The research problem was the absence of effective strategies to modernize IT legacy systems. The purpose of this qualitative single case study was to explore effective IT modernization strategies to revolutionize IT legacy systems. The researcher sought to answer how organizations create effective strategies to modernize IT legacy systems. The study used purposeful sampling, including 13 IT leaders, IT technicians, and customers based on their experience in implementing successful IT modernization programs’ strategies. Data were collected using semi-structured interviews and agency documentation. …
A Cloud Computing-Based Dashboard For The Visualization Of Motivational Interviewing Metrics, E Jinq Heng
A Cloud Computing-Based Dashboard For The Visualization Of Motivational Interviewing Metrics, E Jinq Heng
Browse all Theses and Dissertations
Motivational Interviewing (MI) is an evidence-based brief interventional technique that has been demonstrated to be effective in triggering behavior change in patients. To facilitate behavior change, healthcare practitioners adopt a nonconfrontational, empathetic dialogic style, a core component of MI. Despite its advantages, MI has been severely underutilized mainly due to the cognitive overload on the part of the MI dialogue evaluator, who has to assess MI dialogue in real-time and calculate MI characteristic metrics (number of open-ended questions, close-ended questions, reflection, and scale-based sentences) for immediate post-session evaluation both in MI training and clinical settings. To automate dialogue assessment and …
Cloud-Based Machine Learning And Sentiment Analysis, Emmanuel C. Opara
Cloud-Based Machine Learning And Sentiment Analysis, Emmanuel C. Opara
Electronic Theses and Dissertations
The role of a Data Scientist is becoming increasingly ubiquitous as companies and institutions see the need to gain additional insights and information from data to make better decisions to improve the quality-of-service delivery to customers. This thesis document contains three aspects of data science projects aimed at improving tools and techniques used in analyzing and evaluating data. The first research study involved the use of a standard cybersecurity dataset and cloud-based auto-machine learning algorithms were applied to detect vulnerabilities in the network traffic data. The performance of the algorithms was measured and compared using standard evaluation metrics. The second …
Sheridan Self, Timothy Jordan Catibog, Vivek Gupta, Syed Faaiz Rehan
Sheridan Self, Timothy Jordan Catibog, Vivek Gupta, Syed Faaiz Rehan
Student Capstones
The purpose of this mobile app is to provide the Sheridan students, the tools and the personal space to design and map their own development process. This process is essential as it is used to set goals and improve efficiency and productivity to make students more agile and resilient and enable them to reevaluate their goals based on the data collected. The ideal solution is to create that virtual space to allow them to self-asses with daily/weekly reflections, then set goals accordingly to find relevant opportunities and resources. By providing this platform, students would generate their own data to monitor …
Studysnap, Liam A. Stickney, Malik Sheharyaar Talhat, Benjamin D. Sykes
Studysnap, Liam A. Stickney, Malik Sheharyaar Talhat, Benjamin D. Sykes
Student Capstones
In today’s modern education world, there have been several emerging technologies that were created to expand the learning experience beyond the traditional pencil and paper. Such items include online planners and numerous online student resource websites, but some students may find that there are sometimes too many resources. With so many resources available to them, students may find it overwhelming and may not even know where to start when it comes time to study. StudySnap aims to solve the unorganized and cluttered nature of study time by combining a clean resource organization tool with a smart and automatic resource search …
Intelligent Resource Prediction For Hpc And Scientific Workflows, Benjamin Shealy
Intelligent Resource Prediction For Hpc And Scientific Workflows, Benjamin Shealy
All Dissertations
Scientific workflows and high-performance computing (HPC) platforms are critically important to modern scientific research. In order to perform scientific experiments at scale, domain scientists must have knowledge and expertise in software and hardware systems that are highly complex and rapidly evolving. While computational expertise will be essential for domain scientists going forward, any tools or practices that reduce this burden for domain scientists will greatly increase the rate of scientific discoveries. One challenge that exists for domain scientists today is knowing the resource usage patterns of an application for the purpose of resource provisioning. A tool that accurately estimates these …
How The Growth Of Technology Has Forced Accounting Firms To Put An Emphasis On Cybersecurity, Holden Halbach
How The Growth Of Technology Has Forced Accounting Firms To Put An Emphasis On Cybersecurity, Holden Halbach
Accounting Undergraduate Honors Theses
The advancement of technology has brought many changes to accounting firms. Computer applications such as Microsoft Excel have made calculators and physical spreadsheets obsolete. Then with the introduction of cloud computing employees can store, access, and exchange large amounts of data instantaneously from any location. These technological innovations have increased the accuracy and efficiency of firms substantially. However, this growth in technology has shown the importance of putting an emphasis on cybersecurity throughout the accounting industry. The emphasis placed on cybersecurity throughout accounting firms is more prevalent than any other industry. This is primarily because accounting firms not only deal …
Towards A Federated Identity And Access Management Across Universities, Jameel Alsulami
Towards A Federated Identity And Access Management Across Universities, Jameel Alsulami
Doctoral Dissertations and Master's Theses
Many research projects are too complex to yield the efforts of a single investigator and require a coordinated effort from interdisciplinary research teams across universities and industries. The research data, documents, experimental testbeds, high-end computing equipment, etc. is a critical component of any large-scale project and hence the cooperation and resource sharing across universities become very important for timely and budget-friendly execution of these projects. However, it is extremely challenging to frequently and effectively access data and other resources across universities without creating new identities for the users. In this thesis, we propose Federated Identity Management (FIM) approach for facilitating …
Relationships Among Dimensions Of Information System Success And Benefits Of Cloud, William Harold Stanley
Relationships Among Dimensions Of Information System Success And Benefits Of Cloud, William Harold Stanley
Walden Dissertations and Doctoral Studies
Despite the many benefits offered by cloud computing’s design architecture, there are many fundamental performance challenges for IT managers to manage cloud infrastructures to meet business expectations effectively. Grounded in the information systems success model, the purpose of this quantitative correlational study was to evaluate the relationships among the perception of information quality, perception of system quality, perception of service quality, perception of system use, perception of user satisfaction, and net benefits of cloud computing services. The participants (n = 137) were IT cloud services managers in the United States, who completed the DeLone and McLean ISS authors’ validated survey …
The Relationship Between Technology Adoption Determinants And The Intention To Use Software-Defined Networking, Wendell Russ
The Relationship Between Technology Adoption Determinants And The Intention To Use Software-Defined Networking, Wendell Russ
Walden Dissertations and Doctoral Studies
AbstractThe advent of distributed cloud computing and the exponential growth and demands of the internet of things and big data have strained traditional network technologies' capabilities and have given rise to software-defined networking's (SDN's) revolutionary approach. Some information technology (IT) cloud services leaders who do not intend to adopt SDN technology may be unable to meet increasing performance and flexibility demands and may risk financial loss compared to those who adopt SDN technology. Grounded in the unified theory of acceptance and use of technology (UTAUT), the purpose of this quantitative correlational study was to examine the relationship between IT cloud …
Legality And Considerations For Healthcare Chief Information Officers Migrating To The Public Cloud, Melissa Petak
Legality And Considerations For Healthcare Chief Information Officers Migrating To The Public Cloud, Melissa Petak
MUSC Theses and Dissertations
There are many advantages for healthcare organizations to use the public cloud for storage/computing. However, moving data outside of the organization’s physical boundaries implies lost or reduced control and greater reliance on Cloud Service Providers (CSP) in determining where the data is stored and how it is secured. When that data is sensitive healthcare data and at high-risk for cyber/national security violations as well as, belonging to U.S. citizens, the need for careful planning and legal compliance increases sharply. The following study evaluates the legality and considerations of public cloud use for healthcare Chief Information Officers (CIO) and the need …
A Tiered Recommender System For Cost-Effective Cloud Instance Selection, Xusheng Ai
A Tiered Recommender System For Cost-Effective Cloud Instance Selection, Xusheng Ai
University of the Pacific Theses and Dissertations
Cloud computing has greatly impacted the scientific community and the end users. By leveraging cloud computing, small research institutions and undergraduate colleges are able to alleviate costs and achieve research goals without purchasing and maintaining all the hardware and software. In addition, cloud computing allows researchers to access resources as their teams require and allows real-time collaboration with team members across the globe. Nowadays however, users are easily overwhelmed by the wide range of cloud servers and instances. Due to differences between the cloud server platforms and between instances within the platform, users find it difficult to identify the right …
Performance Optimization Of Big Data Computing Workflows For Batch And Stream Data Processing In Multi-Clouds, Huiyan Cao
Dissertations
Workflow techniques have been widely used as a major computing solution in many science domains. With the rapid deployment of cloud infrastructures around the globe and the economic benefits of cloud-based computing and storage services, an increasing number of scientific workflows have migrated or are in active transition to clouds. As the scale of scientific applications continues to grow, it is now common to deploy various data- and network-intensive computing workflows such as serial computing workflows, MapReduce/Spark-based workflows, and Storm-based stream data processing workflows in multi-cloud environments, where inter-cloud data transfer oftentimes plays a significant role in both workflow performance …
Secure Outsourced Computation On Encrypted Data, Asma Aloufi
Secure Outsourced Computation On Encrypted Data, Asma Aloufi
Theses
Homomorphic encryption (HE) is a promising cryptographic technique that supports computations on encrypted data without requiring decryption first. This ability allows sensitive data, such as genomic, financial, or location data, to be outsourced for evaluation in a resourceful third-party such as the cloud without compromising data privacy. Basic homomorphic primitives support addition and multiplication on ciphertexts. These primitives can be utilized to represent essential computations, such as logic gates, which subsequently can support more complex functions. We propose the construction of efficient cryptographic protocols as building blocks (e.g., equality, comparison, and counting) that are commonly used in data analytics and …
Cosacc: Cloud-Based Speed Advisory For Connected Vehicles In A Signalized Corridor, Hsien-Wen Deng
Cosacc: Cloud-Based Speed Advisory For Connected Vehicles In A Signalized Corridor, Hsien-Wen Deng
All Theses
The objective of this study is to assess the feasibility of cloud-based real-time connected vehicle (CV) applications. The author developed a cloud-based speed advisory application for CVs in a signalized corridor (COSACC) to achieve this objective. The contribution of this study is threefold. First, it introduced a serverless cloud computing architecture using Amazon Web Services (AWS) for real-time CV applications. Second, the author developed a real-time optimization-based speed advisory algorithm that is deployable in AWS. Third, this study utilized a cloud-in-the-loop simulation testbed using AWS and Simulation of Urban Mobility (SUMO), which is a microscopic traffic simulator. The author conducted …
Energy And Performance-Optimized Scheduling Of Tasks In Distributed Cloud And Edge Computing Systems, Haitao Yuan
Energy And Performance-Optimized Scheduling Of Tasks In Distributed Cloud And Edge Computing Systems, Haitao Yuan
Dissertations
Infrastructure resources in distributed cloud data centers (CDCs) are shared by heterogeneous applications in a high-performance and cost-effective way. Edge computing has emerged as a new paradigm to provide access to computing capacities in end devices. Yet it suffers from such problems as load imbalance, long scheduling time, and limited power of its edge nodes. Therefore, intelligent task scheduling in CDCs and edge nodes is critically important to construct energy-efficient cloud and edge computing systems. Current approaches cannot smartly minimize the total cost of CDCs, maximize their profit and improve quality of service (QoS) of tasks because of aperiodic arrival …
Towards Dynamic Vehicular Clouds, Aida Ghazizadeh
Towards Dynamic Vehicular Clouds, Aida Ghazizadeh
Computer Science Theses & Dissertations
Motivated by the success of the conventional cloud computing, Vehicular Clouds were introduced as a group of vehicles whose corporate computing, sensing, communication, and physical resources can be coordinated and dynamically allocated to authorized users. One of the attributes that set Vehicular Clouds apart from conventional clouds is resource volatility. As vehicles enter and leave the cloud, new computing resources become available while others depart, creating a volatile environment where the task of reasoning about fundamental performance metrics becomes very challenging. The goal of this thesis is to design an architecture and model for a dynamic Vehicular Cloud built on …
Load Balancing In Cloud Computing, Snehal Dhumal
Load Balancing In Cloud Computing, Snehal Dhumal
Master's Projects
Cloud computing is one of the top trending technologies which primarily focuses on the end user’s use cases. The service provider needs to provide services to many clients. These increasing number of requests from the clients are giving rise to the new inventions in the load scheduling algorithms. There are different scheduling algorithms which are already present in the cloud computing, and some of them includes the Shortest Job First (SJF), First Come First Serve (FCFS), Round Robin (RR) etc. Though there are different parameters to consider when load balancing in cloud computing, makespan (time difference between start time of …
Pricing The Cloud: An Auction Approach, Yang Lu
Pricing The Cloud: An Auction Approach, Yang Lu
Theses and Dissertations in Business Administration
Cloud computing has changed the processing and service modes of information communication technology and has affected the transformation, upgrading and innovation of the IT-related industry systems. The rapid development of cloud computing in business practice has spawned a whole new field of interdisciplinary, providing opportunities and challenges for business management research.
One of the critical factors impacting cloud computing is how to price cloud services. An appropriate pricing strategy has important practical means to stakeholders, especially to providers and customers. This study addressed and discussed research findings on cloud computing pricing strategies, such as fixed pricing, bidding pricing, and dynamic …
Workflow Critical Path: A Data-Oriented Path Metric For Holistic Hpc Workflows, Daniel D. Nguyen
Workflow Critical Path: A Data-Oriented Path Metric For Holistic Hpc Workflows, Daniel D. Nguyen
Dissertations and Theses
Optimizing scientific application performance in HPC environments is a complicated task which has motivated the development of many performance analysis tools over the past decades. These tools were designed to analyze the performance of a single parallel code using common approaches such as message passing (MPI), multithreading (OpenMP), acceleration (CUDA), or a hybrid approach. However, current trends in HPC such as the push to exascale, convergence with Big Data, and growing complexity of HPC applications and scientific workflows, have created gaps that these performance tools do not cover, particularly involving end-to-end data movement through an end-to-end HPC workflow comprising multiple …
Balancing Security, Performance And Deployability In Encrypted Search, David Joel Pouliot
Balancing Security, Performance And Deployability In Encrypted Search, David Joel Pouliot
Dissertations and Theses
Encryption is an important tool for protecting data, especially data stored in the cloud. However, standard encryption techniques prevent efficient search. Searchable encryption attempts to solve this issue, protecting the data while still providing search functionality. Retaining the ability to search comes at a cost of security, performance and/or utility.
An important practical aspect of utility is compatibility with legacy systems. Unfortunately, the efficient searchable encryption constructions that are compatible with these systems have been proven vulnerable to attack, even against weaker adversary models.
The goal of this work is to address this security problem inherent with efficient, legacy compatible …
Small-To-Medium-Size Enterprise Managers’ Experiences With Cloud Computing, Anthony Effiong
Small-To-Medium-Size Enterprise Managers’ Experiences With Cloud Computing, Anthony Effiong
Walden Dissertations and Doctoral Studies
Historically, managers of small- and medium-sized enterprises (SMEs) have had concerns regarding cloud computing and cybersecurity. Their resistance to using cloud computing has influenced their ability to do business effectively and to compete with businesses that use cloud computing. The purposes of this descriptive phenomenological study were to explore the lived experiences and perceptions of SME managers that might influence their decisions to adopt cloud computing. Watson’s concept of resistance to change and Davis, Bagozzi, and Warhaw’s technology acceptance model were the conceptual frameworks that guided this qualitative study. Data collection consisted of conducting 16 semi-structured interviews with open-ended questions …
Exploring Trust In Cloud Computing For A Governmental Organization In Ethiopia: A Case Study, Estifanos Abebe Seyoum
Exploring Trust In Cloud Computing For A Governmental Organization In Ethiopia: A Case Study, Estifanos Abebe Seyoum
Walden Dissertations and Doctoral Studies
Organizations face a rapidly changing environment that forces them to seek high computing power. The problem was how to overcome factors that cause managers at governmental organizations in Ethiopia to be reluctant to trust cloud computing, while some managers overcame this lack of trust. The purpose of this qualitative, single case study was to provide a deeper understanding of how a governmental organization in Ethiopia overcame the factors that adversely influenced managers of other organizations to the extent that they distrusted and decided against adopting cloud computing. The population for this study was comprised of 12 managers from a governmental …