Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Physical Sciences and Mathematics

Tangible Interaction As An Aid For Object Navigation In 3d Modeling, Sanmathi Dangeti Dec 2016

Tangible Interaction As An Aid For Object Navigation In 3d Modeling, Sanmathi Dangeti

Open Access Theses

This study introduced an interaction technique that used tangible interaction for 3D modeling. A hybrid interaction technique using a Kinect camera and a smartphone with a gyroscope was developed for the navigating objects in a 3D modeling software. It was then tested on 20 participants categorized as amateurs who had basic 3D/ CAD modeling experience and 20 participants categorized as the experts who had extensive experience working with the modeling software. This research study presents the need for existence of such interaction technique, gaps from the related previous studies, statistical findings from the current study and possible reasons for the …


A Small-Scale Testbed For Large-Scale Reliable Computing, Jason R. St. John Dec 2016

A Small-Scale Testbed For Large-Scale Reliable Computing, Jason R. St. John

Open Access Theses

High performance computing (HPC) systems frequently suffer errors and failures from hardware components that negatively impact the performance of jobs run on these systems. We analyzed system logs from two HPC systems at Purdue University and created statistical models for memory and hard disk errors. We created a small-scale error injection testbed—using a customized QEMU build, libvirt, and Python—for HPC application programmers to test and debug their programs in a faulty environment so that programmers can write more robust and resilient programs before deploying them on an actual HPC system. The deliverables for this project are the fault injection program, …


Security Techniques For Sensor Systems And The Internet Of Things, Daniele Midi Dec 2016

Security Techniques For Sensor Systems And The Internet Of Things, Daniele Midi

Open Access Dissertations

Sensor systems are becoming pervasive in many domains, and are recently being generalized by the Internet of Things (IoT). This wide deployment, however, presents significant security issues.

We develop security techniques for sensor systems and IoT, addressing all security management phases. Prior to deployment, the nodes need to be hardened. We develop nesCheck, a novel approach that combines static analysis and dynamic checking to efficiently enforce memory safety on TinyOS applications. As security guarantees come at a cost, determining which resources to protect becomes important. Our solution, OptAll, leverages game-theoretic techniques to determine the optimal allocation of security resources in …


Knowledge Modeling Of Phishing Emails, Courtney Falk Aug 2016

Knowledge Modeling Of Phishing Emails, Courtney Falk

Open Access Dissertations

This dissertation investigates whether or not malicious phishing emails are detected better when a meaningful representation of the email bodies is available. The natural language processing theory of Ontological Semantics Technology is used for its ability to model the knowledge representation present in the email messages. Known good and phishing emails were analyzed and their meaning representations fed into machine learning binary classifiers. Unigram language models of the same emails were used as a baseline for comparing the performance of the meaningful data. The end results show how a binary classifier trained on meaningful data is better at detecting phishing …


Students' Reasoning With Haptic Technologies: A Qualitative Study In The Electromagnetism Domain, Sadhana Balachandran Aug 2016

Students' Reasoning With Haptic Technologies: A Qualitative Study In The Electromagnetism Domain, Sadhana Balachandran

Open Access Theses

With abundant applications in the medical training and entertainment industry, haptic technology is slowly making its way into the realm of science education, particularly in conveying abstract and non-visible concepts. Electric field is one such abstract concept. Past studies have shown that learning concepts such as electric fields in a traditional classroom can be quite challenging since students have a hard time visualizing the phenomena and applying its effects to reason. Furthermore, these concepts are the building blocks for more complex concepts such as matter and molecular interactions. Visuo-haptic devices provide a great platform to enable students to visualize and …


An Anomaly-Based Intrusion Detection System Based On Artificial Immune System (Ais) Techniques, Harish Valayapalayam Kumaravel Aug 2016

An Anomaly-Based Intrusion Detection System Based On Artificial Immune System (Ais) Techniques, Harish Valayapalayam Kumaravel

Open Access Theses

Two of the major approaches to intrusion detection are anomaly-based detection and signature-based detection. Anomaly-based approaches have the potential for detecting zero-day and other new forms of attacks. Despite this capability, anomaly-based approaches are comparatively less widely used when compared to signature-based detection approaches. Higher computational overhead, higher false positive rates, and lower detection rates are the major reasons for the same. This research has tried to mitigate this problem by using techniques from an area called the Artificial Immune Systems (AIS). AIS is a collusion of immunology, computer science and engineering and tries to apply a number of techniques …


Using Ubiquitous Data To Improve Smartwatches' Context Awareness, Yuankun Song Aug 2016

Using Ubiquitous Data To Improve Smartwatches' Context Awareness, Yuankun Song

Open Access Theses

Nowadays, more and more data is being generated by various software applications, services and smart devices every second. The data contains abundant information about people’s daily lives. This research explored the possibility of improving smartwatches’ context awareness by using common ubiquitous data. The researcher developed a prototype system consisting of an Android application and a web application, and conducted an experiment where 10 participants performed several tasks with the help of a smartwatch. The result showed a significant improvement of the smartwatch’s context awareness running the prototype application, which used ubiquitous data to automatically execute proper actions according to contexts. …


Packet Filter Performance Monitor (Anti-Ddos Algorithm For Hybrid Topologies), Ibrahim M. Waziri Aug 2016

Packet Filter Performance Monitor (Anti-Ddos Algorithm For Hybrid Topologies), Ibrahim M. Waziri

Open Access Dissertations

DDoS attacks are increasingly becoming a major problem. According to Arbor Networks, the largest DDoS attack reported by a respondent in 2015 was 500 Gbps. Hacker News stated that the largest DDoS attack as of March 2016 was over 600 Gbps, and the attack targeted the entire BBC website.

With this increasing frequency and threat, and the average DDoS attack duration at about 16 hours, we know for certain that DDoS attacks will not be going away anytime soon. Commercial companies are not effectively providing mitigation techniques against these attacks, considering that major corporations face the same challenges. Current security …


Detection Of Communication Over Dnssec Covert Channels, Nicole M. Hands Aug 2016

Detection Of Communication Over Dnssec Covert Channels, Nicole M. Hands

Open Access Theses

Unauthorized data removal and modification from information systems represents a major and formidable threat in modern computing. Security researchers are engaged in a constant and escalating battle with the writers of malware and other methods of network intrusion to detect and mitigate this threat. Advanced malware behaviors include encryption of communications between the server and infected client machines as well as various strategies for resilience and obfuscation of infrastructure. These techniques evolve to use any and all available mechanisms. As the Internet has grown, DNS has been expanded and has been given security updates. This study analyzed the potential uses …


Monitoring Dbms Activity To Detect Insider Threat Using Query Selectivity, Prajwal B. Hegde Aug 2016

Monitoring Dbms Activity To Detect Insider Threat Using Query Selectivity, Prajwal B. Hegde

Open Access Theses

The objective of the research presented in this thesis is to evaluate the importance of query selectivity for monitoring DBMS activity and detect insider threat. We propose query selectivity as an additional component to an existing anomaly detection system (ADS). We first look at the advantages of working with this particular ADS. This is followed by a discussion about some existing limitations in the anomaly detection system (ADS) and how it affects its overall performance. We look at what query selectivity is and how it can help improve upon the existing limitations of the ADS. The system is then implemented …


A Case Study Of Introductory Programming With Moocs, Miguel Angel Javier Ruiz Apr 2015

A Case Study Of Introductory Programming With Moocs, Miguel Angel Javier Ruiz

Open Access Theses

Computational thinking has become a crucial skill for the 21st Century learners in all disciplines. Research suggests that the best and fastest approach to understand the concepts of computational thinking is through developing programming skills. However, finding effective and affordable learning environments to introduce programming skills to a massive scale of students remains a challenge. Currently, the unprecedented utilization of MOOCs represent an opportunity to achieve this goal. But, existing introductory programming MOOCs have failed to provide instructionally-sound experience for learners. The purpose of this descriptive research is two-fold: (1) Identify the affordances of fifteen MOOC's platforms that are best …


Securing Communication Within The Harms Model For Use With Firefighting Robots, Maxwell D. Dewees Apr 2015

Securing Communication Within The Harms Model For Use With Firefighting Robots, Maxwell D. Dewees

Open Access Theses

Humans and robots must work together in increasingly complex networks to achieve a common goal. In this research, firefighting robots are a part of a larger, decentralized system of humans, agents, robots, machines, and sensors (HARMS). Although communication in a HARMS model has been utilized in previous research, this new study looks at the security considerations of the communications layer of the HARMS model. A network attack known as a man-in-the-middle attack is successfully demonstrated in this paper. Then, a secure communications protocol is proposed to help provide confidentiality and authentication of HARMS actors. This research is applied to any …


Digital Forensics And Community Supervision: Making A Case For Field Based Digital Forensics Training, Christopher Michael Flory Apr 2015

Digital Forensics And Community Supervision: Making A Case For Field Based Digital Forensics Training, Christopher Michael Flory

Open Access Theses

In this paper I will review the literature concerning investigator digital forensics models and how they apply to field investigators. A brief history of community supervision and how offenders are supervised will be established. I will also cover the difference between community supervision standards and police standards concerning searches, evidence, standards of proof, and the difference between parole boards and courts. Currently, the burden for digital forensics for community supervision officers is placed on local or state law enforcement offices, with personnel trained in forensics, but may not place a high priority on outside cases. Forensic field training for community …


User-Differentiated Hierarchical Key Management For The Bring-Your-Own-Device Environments, Di Xie Oct 2014

User-Differentiated Hierarchical Key Management For The Bring-Your-Own-Device Environments, Di Xie

Open Access Theses

To ensure confidentiality, the sensitive electronic data held within a corporation is always carefully encrypted and stored in a manner so that it is inaccessible to those parties who are not involved. During this process, the specific manners of how to keep, distribute, use, and update keys which are used to encrypt the sensitive data become an important thing to be considered. Through use of hierarchical key management, a technique that provides access controls in multi-user systems where a portion of sensitive resources shall only be made available to authorized users or security ordinances, required information is distributed on a …