Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Algorithm (1)
- Approximate Computing (1)
- Bayesian Networks (1)
- CASA (1)
- Camouflage (1)
-
- Closed-loop (1)
- Cloud computing infrastructure (1)
- Cognitive Computing (1)
- Computer Networks (1)
- Cyber-physical Systems (1)
- Deep Learning (1)
- Distributed Web Cache (1)
- Distributed system (1)
- GPS-Met (1)
- Graph search (1)
- Hardware (1)
- Hierarchical relationship (1)
- Knowledge graph (1)
- Location Based Services (1)
- Location Privacy (1)
- Machine Learning (1)
- Magneto-electric devices (1)
- Markov Chain (1)
- Mutual Information (1)
- Nanoscale fabrics (1)
- Navigation Instruction Validation (1)
- Network Functions (1)
- People with disabilities (1)
- Perfect Location Privacy (1)
- Precipitation Nowcasting (1)
Articles 1 - 9 of 9
Full-Text Articles in Engineering
Analyzing Spark Performance On Spot Instances, Jiannan Tian
Analyzing Spark Performance On Spot Instances, Jiannan Tian
Masters Theses
Amazon Spot Instances provide inexpensive service for high-performance computing. With spot instances, it is possible to get at most 90% off as discount in costs by bidding spare Amazon Elastic Computer Cloud (Amazon EC2) instances. In exchange for low cost, spot instances bring the reduced reliability onto the computing environment, because this kind of instance could be revoked abruptly by the providers due to supply and demand, and higher-priority customers are first served.
To achieve high performance on instances with compromised reliability, Spark is applied to run jobs. In this thesis, a wide set of spark experiments are conducted to …
Navigation Instruction Validation Tool And Indoor Wayfinding Training System For People With Disabilities, Linlin Ding
Navigation Instruction Validation Tool And Indoor Wayfinding Training System For People With Disabilities, Linlin Ding
Masters Theses
According to World Health Survey, there are 785 million (15.6%) people in the world that live with a disability. It is a well-known fact that lack of access to public transportation is a barrier for people with disabilities in seeking work or accessing health care. In this research, we seek to increase access to public transportation by introducing a virtual pre-travel training system that enables people with disabilities to get familiar with a public transportation venue prior to arriving at the venue. Using this system, users establish a mental map of the target environment prior to their arrival to the …
Efficient Scaling Of A Web Proxy Cluster, Hao Zhang
Efficient Scaling Of A Web Proxy Cluster, Hao Zhang
Masters Theses
With the continuing growth in network traffic and increasing diversity in web content, web caching, together with various network functions (NFs), has been introduced to enhance security, optimize network performance, and save expenses. In a large enterprise network with more than tens of thousands of users, a single proxy server is not enough to handle a large number of requests and turns to group processing. When multiple web cache proxies are working as a cluster, they talk with each other and share cached objects by using internet cache protocol (ICP). This leads to poor scalability.
This thesis describes the development …
Query On Knowledge Graphs With Hierarchical Relationships, Kaihua Liu
Query On Knowledge Graphs With Hierarchical Relationships, Kaihua Liu
Masters Theses
The dramatic popularity of graph database has resulted in a growing interest in graph queries. Two major topics are included in graph queries. One is based on structural relationship to find meaningful results, such as subgraph pattern match and shortest-path query. The other one focuses on semantic-based query to find question answering from knowledge bases. However, most of these queries take knowledge graphs as flat forms and use only normal relationship to mine these graphs, which may lead to mistakes in the query results. In this thesis, we find hierarchical relationship in the knowledge on their semantic relations and make …
Magneto-Electric Approximate Computational Framework For Bayesian Inference, Sourabh Kulkarni
Magneto-Electric Approximate Computational Framework For Bayesian Inference, Sourabh Kulkarni
Masters Theses
Probabilistic graphical models like Bayesian Networks (BNs) are powerful artificial-intelligence formalisms, with similarities to cognition and higher order reasoning in the human brain. These models have been, to great success, applied to several challenging real-world applications. Use of these formalisms to a greater set of applications is impeded by the limitations of the currently used software-based implementations. New emerging-technology based circuit paradigms which leverage physical equivalence, i.e., operating directly on probabilities vs. introducing layers of abstraction, promise orders of magnitude increase in performance and efficiency of BN implementations, enabling networks with millions of random variables. While majority of applications with …
Oracle Guided Incremental Sat Solving To Reverse Engineer Camouflaged Circuits, Xiangyu Zhang
Oracle Guided Incremental Sat Solving To Reverse Engineer Camouflaged Circuits, Xiangyu Zhang
Masters Theses
This study comprises two tasks. The first is to implement gate-level circuit camouflage techniques. The second is to implement the Oracle-guided incremental de-camouflage algorithm and apply it to the camouflaged designs.
The circuit camouflage algorithms are implemented in Python, and the Oracle- guided incremental de-camouflage algorithm is implemented in C++. During this study, I evaluate the Oracle-guided de-camouflage tool (Solver, in short) performance by de-obfuscating the ISCAS-85 combinational benchmarks, which are camouflaged by the camouflage algorithms. The results show that Solver is able to efficiently de-obfuscate the ISCAS-85 benchmarks regardless of camouflaging style, and is able to do so 10.5x …
Virtualization Of Closed-Loop Sensor Networks, Priyanka Dattatri Kedalagudde
Virtualization Of Closed-Loop Sensor Networks, Priyanka Dattatri Kedalagudde
Masters Theses
The existing closed-loop sensor networks are based on architectures that are designed and implemented for one specific application and require dedicated sensing and computational resources. This prevents the sharing of these networks. In this work, we propose an architecture of virtualization to allow sharing of closed-loop sensor networks. We also propose a scheduling approach that will manage requests from competing applications and evaluate their impact on system utilization against utilization achieved by more traditional, dedicated sensor networks. These algorithms are evaluated through trace-driven simulations, where the trace data is taken from CASA’s closed-loop weather radar sensor network. Results from this …
Explorations Into Machine Learning Techniques For Precipitation Nowcasting, Aditya Nagarajan
Explorations Into Machine Learning Techniques For Precipitation Nowcasting, Aditya Nagarajan
Masters Theses
Recent advances in cloud-based big-data technologies now makes data driven solutions feasible for increasing numbers of scientific computing applications. One such data driven solution approach is machine learning where patterns in large data sets are brought to the surface by finding complex mathematical relationships within the data. Nowcasting or short-term prediction of rainfall in a given region is an important problem in meteorology. In this thesis we explore the nowcasting problem through a data driven approach by formulating it as a machine learning problem.
State-of-the-art nowcasting systems today are based on numerical models which describe the physical processes leading to …
Achieving Perfect Location Privacy In Wireless Devices Using Anonymization, Zarrin Montazeri
Achieving Perfect Location Privacy In Wireless Devices Using Anonymization, Zarrin Montazeri
Masters Theses
The popularity of mobile devices and location-based services (LBS) have created great concerns regarding the location privacy of the users of such devices and services. Anonymization is a common technique that is often being used to protect the location privacy of LBS users. This technique assigns a random pseudonym to each user and these pseudonyms can change over time. Here, we provide a general information theoretic definition for perfect location privacy and prove that perfect location privacy is achievable for mobile devices when using the anonymization technique appropriately. First, we assume that the user’s current location is independent from her …