Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 44 of 44

Full-Text Articles in Physical Sciences and Mathematics

Predictive Analysis For Cloud Infrastructure Metrics, Paridhi Agrawal May 2019

Predictive Analysis For Cloud Infrastructure Metrics, Paridhi Agrawal

Master's Projects

In a cloud computing environment, enterprises have the flexibility to request resources according to their application demands. This elastic feature of cloud computing makes it an attractive option for enterprises to host their applications on the cloud. Cloud providers usually exploit this elasticity by auto-scaling the application resources for quality assurance. However, there is a setup-time delay that may take minutes between the demand for a new resource and it being prepared for utilization. This causes the static resource provisioning techniques, which request allocation of a new resource only when the application breaches a specific threshold, to be slow and …


Community Detection Via Neighborhood Overlap And Spanning Tree Computations, Ketki Kulkarni, Aris Pagourtzis, Katerina Potika, Petros Potikas, Dora Souliou Apr 2019

Community Detection Via Neighborhood Overlap And Spanning Tree Computations, Ketki Kulkarni, Aris Pagourtzis, Katerina Potika, Petros Potikas, Dora Souliou

Faculty Publications, Computer Science

Most social networks of today are populated with several millions of active users, while the most popular of them accommodate way more than one billion. Analyzing such huge complex networks has become particularly demanding in computational terms. A task of paramount importance for understanding the structure of social networks as well as of many other real-world systems is to identify communities, that is, sets of nodes that are more densely connected to each other than to other nodes of the network. In this paper we propose two algorithms for community detection in networks, by employing the neighborhood overlap metric …


Management And Security Of Iot Systems Using Microservices, Tharun Theja Kammara Dec 2018

Management And Security Of Iot Systems Using Microservices, Tharun Theja Kammara

Master's Projects

Devices that assist the user with some task or help them to make an informed decision are called smart devices. A network of such devices connected to internet are collectively called as Internet of Things (IoT). The applications of IoT are expanding exponentially and are becoming a part of our day to day lives. The rise of IoT led to new security and management issues. In this project, we propose a solution for some major problems faced by the IoT devices, including the problem of complexity due to heterogeneous platforms and the lack of IoT device monitoring for security and …


Dynamic Hierarchical Cache Management For Cloud Ran And Multi- Access Edge Computing In 5g Networks, Deepika Pathinga Rajendiran Oct 2018

Dynamic Hierarchical Cache Management For Cloud Ran And Multi- Access Edge Computing In 5g Networks, Deepika Pathinga Rajendiran

Master's Projects

Cloud Radio Access Networks (CRAN) and Multi-Access Edge Computing (MEC) are two of the many emerging technologies that are proposed for 5G mobile networks. CRAN provides scalability, flexibility, and better resource utilization to support the dramatic increase of Internet of Things (IoT) and mobile devices. MEC aims to provide low latency, high bandwidth and real- time access to radio networks. Cloud architecture is built on top of traditional Radio Access Networks (RAN) to bring the idea of CRAN and in MEC, cloud computing services are brought near users to improve the user’s experiences. A cache is added in both CRAN …


Community Detection In Social Networks, Ketki Kulkarni May 2017

Community Detection In Social Networks, Ketki Kulkarni

Master's Projects

The rise of the Internet has brought people closer. The number of interactions between people across the globe has gone substantially up due to social awareness, the advancements of the technology, and digital interaction. Social networking sites have built societies, communities virtually. Often these societies are displayed as a network of nodes depicting people and edges depicting relationships, links. This is a good and e cient way to store, model and represent systems which have a complex and rich information. Towards that goal we need to nd e ective, quick methods to analyze social networks. One of the possible solution …


Influence Detection And Spread Estimation In Social Networks, Madhura Kaple May 2017

Influence Detection And Spread Estimation In Social Networks, Madhura Kaple

Master's Projects

A social network is an online platform, where people communicate and share information with each other. Popular social network features, which make them di erent from traditional communication platforms, are: following a user, re-tweeting a post, liking and commenting on a post etc. Many companies use various social networking platforms extensively as a medium for marketing their products. A xed amount of budget is alloted by the companies to maximize the positive in uence of their product. Every social network consists of a set of users (people) with connections between them. Each user has the potential to extend its in …


Design Concept For A Failover Mechanism In Distributed Sdn Controllers, Nathan Kong May 2017

Design Concept For A Failover Mechanism In Distributed Sdn Controllers, Nathan Kong

Master's Projects

Software defined networking allows the separation of the control plane and data plane in networking. It provides scalability, programmability, and centralized control. It will use these traits to reach ubiquitous connectivity. Like all concepts software defined networking does not offer these advantages without a cost. By utilizing a centralized controller, a single point of failure is created. To address this issue, this paper proposes a distributed controller failover. This failover will provide a mechanism for recovery when controllers are not located in the same location. This failover mechanism is based on number of hops from orphan nodes to the controller …


Generic Online Learning For Partial Visible & Dynamic Environment With Delayed Feedback, Behrooz Shahriari May 2017

Generic Online Learning For Partial Visible & Dynamic Environment With Delayed Feedback, Behrooz Shahriari

Master's Projects

Reinforcement learning (RL) has been applied to robotics and many other domains which a system must learn in real-time and interact with a dynamic environment. In most studies the state- action space that is the key part of RL is predefined. Integration of RL with deep learning method has however taken a tremendous leap forward to solve novel challenging problems such as mastering a board game of Go. The surrounding environment to the agent may not be fully visible, the environment can change over time, and the feedbacks that agent receives for its actions can have a fluctuating delay. In …


Maximizing The Speed Of Influence In Social Networks, Yubo Wang May 2015

Maximizing The Speed Of Influence In Social Networks, Yubo Wang

Master's Projects

Influence maximization in social networks is the problem of selecting a limited

size of influential users as seed nodes so that the influence from these seed nodes can propagate to the largest number of other nodes in the network. Previous studies in influence maximization focused on three areas, i.e., designing propagation models, improving algorithms of seed-node selection and exploiting the structure of social networks. However, most of these studies ignored the time constraint in influence propagation. In this paper, I studied how to maximize influence propagation in a given time, i.e., maximizing the speed of influence propagation in social networks. …


Improving Performance Of Bittorrent Network Through Incentive Mechanism, Mingzhe Li Jul 2011

Improving Performance Of Bittorrent Network Through Incentive Mechanism, Mingzhe Li

Master's Projects

Content Distribution via Internet has become increasingly popular right now. Compared with centralized file distribution system using FTP and HTTP protocols, P2P (Peer to Peer) is more cost-effective. Furthermore, it could help save on bandwidth costs and to handle pick demands. Among many P2P protocols, BitTorrent is one of the most popular protocols right now. The BitTorrent network uses tit-for-tat as a method of seeking Pareto efficiency. However, seeders who contribute more to BitTorrent network than leechers are not incentivized to stay online and upload to others. This paper discusses an incentive mechanism which rewards seeder, who stays in a …


Social Network Leverage Search, Payal Gupta Jul 2011

Social Network Leverage Search, Payal Gupta

Master's Projects

Social networks are at an all time high, nowadays. They make the world a smaller place to live in. People can stay in touch with friends and can make new friends on these social networks which traditionally were not possible without internet service. The possibilities provided by social networks enable vast and immediate contact. People tend to spend lot of time on the social networks like Facebook, LinkedIn and Twitter peeping into their friend‟s accounts and trying to stay connected with the world.
However, recently people have started closing their accounts on these famous social networks after having been irritated …


Improving The Performance Of A Proxy Server Using Web Log Mining, Akshay Shenoy Apr 2011

Improving The Performance Of A Proxy Server Using Web Log Mining, Akshay Shenoy

Master's Projects

Web caching techniques have been widely used with the objective of caching as many web pages and web objects in the proxy server cache as possible to improve network performance. Web pre-fetching schemes have also been widely discussed where web pages and web objects are pre-fetched into the proxy server cache. This paper presents an approach that integrates web caching and web pre-fetching approach to improve the performance of proxy server’s cache.


Evaluation Of Classical Inter-Process Communication Problems In Parallel Programming Languages, Arunesh Joshi Apr 2011

Evaluation Of Classical Inter-Process Communication Problems In Parallel Programming Languages, Arunesh Joshi

Master's Projects

It is generally believed for the past several years that parallel programming is the future of computing technology due to its incredible speed and vastly superior performance as compared to classic linear programming. However, how sure are we that this is the case? Despite its aforesaid average superiority, usually parallel-program implementations run in single-processor machines, making the parallelism almost virtual. In this case, does parallel programming still remain superior?
The purpose of this document is to research and analyze the performance, in both storage and speed, of three parallel-programming language libraries: OpenMP, OpenMPI and PThreads, along with a few other …


Online Application Monitoring Tool, Sathya Anandan Dec 2010

Online Application Monitoring Tool, Sathya Anandan

Master's Projects

In some classes, students take online tests and some types of network activity (for example trying to find the answers in www.google.com) will be considered as cheating during the exam. It would be useful if instructor could monitor online activities of each student to detect cheating. The goal of this project is to develop such a tool using client/server architecture. Tool should display the student's hostname and the website visited during unauthorized web activity. Professor should able to see the applications opened by all students and he will have an option to view the log files of all the students …