Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Engineering

Fog Computing Enabling Industrial Internet Of Things: State-Of-The-Art And Research Challenges, Rabeea Basir, Saad Qaisar, Mudassar Ali, Monther Aldwairi, Muhammad Ikram Ashraf, Aamir Mahmood, Mikael Gidlund Nov 2019

Fog Computing Enabling Industrial Internet Of Things: State-Of-The-Art And Research Challenges, Rabeea Basir, Saad Qaisar, Mudassar Ali, Monther Aldwairi, Muhammad Ikram Ashraf, Aamir Mahmood, Mikael Gidlund

All Works

© 2019 by the authors. Licensee MDPI, Basel, Switzerland. Industry is going through a transformation phase, enabling automation and data exchange in manufacturing technologies and processes, and this transformation is called Industry 4.0. Industrial Internet-of-Things (IIoT) applications require real-time processing, near-by storage, ultra-low latency, reliability and high data rate, all of which can be satisfied by fog computing architecture. With smart devices expected to grow exponentially, the need for an optimized fog computing architecture and protocols is crucial. Therein, efficient, intelligent and decentralized solutions are required to ensure real-time connectivity, reliability and green communication. In this paper, we provide a ...


Forensicloud: An Architecture For Digital Forensic Analysis In The Cloud, Cody Miller, Dae Glendowne, David Dampier, Kendall Blaylock Oct 2019

Forensicloud: An Architecture For Digital Forensic Analysis In The Cloud, Cody Miller, Dae Glendowne, David Dampier, Kendall Blaylock

David Dampier

The amount of data that must be processed in current digital forensic examinations continues to rise. Both the volume and diversity of data are obstacles to the timely completion of forensic investigations. Additionally, some law enforcement agencies do not have the resources to handle cases of even moderate size. To address these issues we have developed an architecture for a cloud-based distributed processing platform we have named Forensicloud. This architecture is designed to reduce the time taken to process digital evidence by leveraging the power of a high performance computing platform and by adapting existing tools to operate within this ...


Building A Simple Smart Factory, Iman Abdulwaheed May 2019

Building A Simple Smart Factory, Iman Abdulwaheed

Mechanical Engineering Theses

This thesis describes (a) the search and findings of smart factories and their enabling technologies (b) the methodology to build or retrofit a smart factory and (c) the building and operation of a simple smart factory using the methodology. A factory is an industrial site with large buildings and collection of machines, which are operated by persons to manufacture goods and services. These factories are made smart by incorporating sensing, processing, and autonomous responding capabilities.

Developments in four main areas (a) sensor capabilities (b) communication capabilities (c) storing and processing huge amount of data and (d) better utilization of technology ...


Epics: A Framework For Enforcing Security Policies In Composite Web Services, Rohit Ranchal, Bharat Bhargava, Pelin Angin, Lotfi Ben Othmane May 2019

Epics: A Framework For Enforcing Security Policies In Composite Web Services, Rohit Ranchal, Bharat Bhargava, Pelin Angin, Lotfi Ben Othmane

Electrical and Computer Engineering Publications

With advances in cloud computing and the emergence of service marketplaces, the popularity of composite services marks a paradigm shift from single-domain monolithic systems to cross-domain distributed services, which raises important privacy and security concerns. Access control becomes a challenge in such systems because authentication, authorization and data disclosure may take place across endpoints that are not known to clients. The clients lack options for specifying policies to control the sharing of their data and have to rely on service providers which provide limited selection of security and privacy preferences. This lack of awareness and loss of control over data ...


Msg-Fast: Metagenomic Shotgun Data Fast Annotation Using Microbial Gene Catalogs, Stuart M. Brown, Hao Chen, Yuhan Hao, Bobby P. Laungani, Thahmina A. Ali, Changsu Dong, Carlos Lijeron, Baekdoo Kim, Claudia Wultsch, Zhiheng Pei, Konstantinos Krampis Jan 2019

Msg-Fast: Metagenomic Shotgun Data Fast Annotation Using Microbial Gene Catalogs, Stuart M. Brown, Hao Chen, Yuhan Hao, Bobby P. Laungani, Thahmina A. Ali, Changsu Dong, Carlos Lijeron, Baekdoo Kim, Claudia Wultsch, Zhiheng Pei, Konstantinos Krampis

Publications and Research

Background: Current methods used for annotating metagenomics shotgun sequencing (MGS) data rely on a computationally intensive and low-stringency approach of mapping each read to a generic database of proteins or reference microbial genomes.

Results: We developed MGS-Fast, an analysis approach for shotgun whole-genome metagenomic data utilizing Bowtie2 DNA-DNA alignment of reads that is an alternative to using the integrated catalog of reference genes database of well-annotated genes compiled from human microbiome data. This method is rapid and provides high-stringency matches (>90% DNA sequence identity) of the metagenomics reads to genes with annotated functions. We demonstrate the use of this method ...


Utilizing Cloud Computing Log Events For Security Automation, Khalid Farrag Jan 2019

Utilizing Cloud Computing Log Events For Security Automation, Khalid Farrag

Creative Components

The rising use of cloud computing and deploying and managing applications and services on a large-scale demand researcher to utilize cloud-logs to achieve greater continuous of security and compliance. Cloud security auto-remediation not only essential for preventing a potential breach, but also essential to prevent system frailer or accidents, and for complying with compliance requirements or legal actions. However, now most of cloud hosting services provide cloud trails or logs to identify and track security incidents. But that isn’t enough without acting at the event time.

In this research, I present a novel approach for automatic security remediation that ...