Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Engineering

Security Evaluation Of Microsoft’S Windows Under Cyber-Flood Attacks, Christina Y. Navarro Dec 2020

Security Evaluation Of Microsoft’S Windows Under Cyber-Flood Attacks, Christina Y. Navarro

Theses and Dissertations

Cyberattacks are quite common occurrences today as such can compromise entire networks producing collective vulnerabilities. As shown herein, manifold experimental findings exhibit ramifications for a cyberattack victim during multiple simulations. All experiments were conducted with Apple’s iMac, the victim system, and different editions of Microsoft Windows 10 and Windows 8.1.

Cyberattacks herein categorize as Distributed Denial of Service (DDoS) attacks including Smurf, Ping Flood, Transmission Control Protocol-Synchronize (TCP-SYN) Flood, and User Datagram Protocol (UDP) Flood attacks. Experimental results from each cyberattack are recordings of computer activities such as memory consumption, disk utilization, and overall processor utilization.

DDoS attack simulations include …


Ac Electrokinetic Effect Of V-Electrode Pattern On Microfluids, Mohammad Salman Parvez Dec 2020

Ac Electrokinetic Effect Of V-Electrode Pattern On Microfluids, Mohammad Salman Parvez

Theses and Dissertations

Electrokinetics has been used for guiding, pumping, and manipulating microfluidic particles for many years in the field of Biomedical, Microbiology, Chemistry, Medicine, and other fields of research, which makes it a ubiquitous tool for the multidisciplinary research on microfluidics. Between these two Alternating Current (AC) Electrokinetics have been proven to be more feasible for the researcher than the other one. In this research, we have investigated AC Electrokinetics and s effect on a new electrode configuration called V-electrode pattern. The V-electrode has been inspired and modified from the previous research work on the Orthogonal Electrode Pattern. In this research, this …


Cyber Security Evaluation Of Centos Red Hat Based Operating System Under Cyber Attack With Increasing Magnitude, William E. R. Rivas Dec 2020

Cyber Security Evaluation Of Centos Red Hat Based Operating System Under Cyber Attack With Increasing Magnitude, William E. R. Rivas

Theses and Dissertations

The increasing interest in ‘always-connected’ devices and the Internet of Things has led to electronic devices with Internet connectivity becoming a staple in modern household and workplace. Consequently, this increase has also led to an increase in vulnerable devices, ripe for hijacking by a malicious third party. Distributed Denial of Service (DDoS) attacks have consistently been an issue since the birth of the Internet. With the large number of devices available today, the strength and consistency of these attacks has only grown and will continue to grow. Since, depending on certain variables, these DDoS attacks can effectively render a target …


Fabrication And Flow Dynamics Analysis Of Micromixer For Lab-On-A-Chip Devices, Md Fazlay Rubby Dec 2020

Fabrication And Flow Dynamics Analysis Of Micromixer For Lab-On-A-Chip Devices, Md Fazlay Rubby

Theses and Dissertations

The miniaturized systems designed for lab-on-a-chip (LOC) technologies are generally implemented with a micro-scale mixer to provide intimate contact between the reagent molecules for interactions and chemical reactions. The exponential increase of research in microfabrication and microfluidic applications highlights the importance of understanding the theory and mechanism that governs mixing at the microscale level. In this study, the fabrication of an active and passive micromixer was discussed. The optimized state of art soft lithography and 3D printing was used as a microfabrication technique. The challenges at different fabrication steps were presented along with the modifications. Microelectrodes were integrated with the …


A Python-Based Brain-Computer Interface Package For Neural Data Analysis, Md Hasan Anowar Dec 2020

A Python-Based Brain-Computer Interface Package For Neural Data Analysis, Md Hasan Anowar

Theses and Dissertations

Anowar, Md Hasan, A Python-based Brain-Computer Interface Package for Neural Data Analysis. Master of Science (MS), December, 2020, 70 pp., 4 tables, 23 figures, 74 references.

Although a growing amount of research has been dedicated to neural engineering, only a handful of software packages are available for brain signal processing. Popular brain-computer interface packages depend on commercial software products such as MATLAB. Moreover, almost every brain-computer interface software is designed for a specific neuro-biological signal; there is no single Python-based package that supports motor imagery, sleep, and stimulated brain signal analysis. The necessity to introduce a brain-computer interface package that …


Preparation And Characterization Of Dc Magnetron Sputtered Thin Films, Al Amin Dec 2020

Preparation And Characterization Of Dc Magnetron Sputtered Thin Films, Al Amin

Theses and Dissertations

Plasma enhanced DC magnetron sputtering is a well-known technique for thin film deposition. Thin film has wide range of applications in many fields such as electronics, optics, communication, decoration, biosystem and medical. Among them, antibacterial and biocompatible thin film coating has attracted researcher’s attention to prevent the healthcare-associated infections (HAIs) during the surgical operations as well as the implantation of foreign devices inside human body. This research has been divided into two sections. In first section, titanium (Ti) was deposited on glass substrate at DC power of 200 W, argon-nitrogen plasma, and temperature of 25 ˚C. Later this Ti-coated glass …


Microsoft’S Surface Pro 4 Performance Under Denial Of Service Attack, Adrian Guerrero Dec 2020

Microsoft’S Surface Pro 4 Performance Under Denial Of Service Attack, Adrian Guerrero

Theses and Dissertations

Microsoft Surface Pro 4 (SP4) is a new device in the line of hybrid computers today. It aims to work as both as table and laptop computer. There are multiple versions of SP4 that include devices equipped with i3, i5 and i7 core processors.

This makes SP4 a great addition for hospital, clinics or schools for its portability and features. As these locations can be prone to cyber-attacks, we plan to test this computer’s reliability and performance under cybersecurity attacks. The device tested is built with Intel Core i7-6650U 2.21 GHz processor with automatic overclocking capabilities up to 3.4 GHz, …


Improving Hardware Implementation Of Cryptographic Aes Algorithm And The Block Cipher Modes Of Operation, Chu-Wen Cheng Aug 2020

Improving Hardware Implementation Of Cryptographic Aes Algorithm And The Block Cipher Modes Of Operation, Chu-Wen Cheng

Theses and Dissertations

With ever increasing Internet traffic, more business and financial transactions are being conducted online. This is even more so during these days of COVID-19 pandemic when traditional businesses such as traditional face to face educational systems have gone online requiring huge amount of data being exchanged over Internet. Increase in the volume of data sent over the Internet has also increased the security vulnerabilities such as challenging the confidentiality of data being sent over the Internet. Due to sheer volume, all data will need to be effectively encrypted. Due to increase in the volume of data, it is also important …


Signal Processing Combined With Machine Learning For Biomedical Applications, Md Shakhawat Hossain Aug 2020

Signal Processing Combined With Machine Learning For Biomedical Applications, Md Shakhawat Hossain

Theses and Dissertations

The Master’s thesis is comprised of four projects in the realm of machine learning and signal processing. The abstract of the thesis is divided into four parts and presented as follows,

Abstract 1: A Kullback-Leibler Divergence-Based Predictor for Inter-Subject Associative BCI.

Inherent inter-subject variability in sensorimotor brain dynamics hinders the transferability of brain-computer interface (BCI) model parameters across subjects. An individual training session is essential for effective BCI control to compensate for variability. We report a Kullback-Leibler Divergence (KLD)-based predictor for inter-subject associative BCI. An online dataset comprising left/right hand, both feet, and tongue motor imagery tasks was used to …


Carbonaceous Nanomaterial: Rapid Synthesis, Property Characterization And Theoretical Analysis, Varun Gupta May 2020

Carbonaceous Nanomaterial: Rapid Synthesis, Property Characterization And Theoretical Analysis, Varun Gupta

Theses and Dissertations

In this thesis, An environmentally friendly and rapid synthesis of highly porous carbon nanomaterial is presented. The direct pyrolysis of the cane sugar was achieved in a hand-fabricated Teflon microchamber. Homogeneous heating and quick pyrolysis were carried out in 3 minutes using a household microwave oven. The porosity and surface area enhancement is obtained by in-step decompositions of household baking soda (sodium bicarbonate), a common household chemical. Sodium bicarbonate was specifically used to impregnate porous carbon foam with sodium oxide nanocomplexes, which were later washed to improve surface area and reduce oxygen content, making it suitable for applications such as …


Cyber Security Evaluation Of Smart Electric Meters, Harsh Kumar May 2020

Cyber Security Evaluation Of Smart Electric Meters, Harsh Kumar

Theses and Dissertations

In this thesis, effect of intermediate network systems on power usage data collection from Smart Electric Meter in Smart Grid was evaluated. Security integrity of remote data collection from GE’s Power Quality Smart Electric Meter EPM 6100 and EPM 7000 under cyber-attacks were evaluated. Experimental security evaluations of Smart Electric Meters were conducted to understand their operation under cyber-attacks. Integrity of data communication between the GE’s smart meters and remote monitoring computer was evaluated under different types of cyber security attacks. Performance comparison was done for security integrity of EPM 6100 and EPM 7000 power quality meter under various cyber-attacks.