Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (7)
- Computer Engineering (5)
- Databases and Information Systems (5)
- Computer and Systems Architecture (4)
- Information Security (4)
-
- Computer-Aided Engineering and Design (3)
- Digital Communications and Networking (3)
- Mechanical Engineering (3)
- Artificial Intelligence and Robotics (2)
- Graphics and Human Computer Interfaces (2)
- Theory and Algorithms (2)
- Categorical Data Analysis (1)
- Civil Engineering (1)
- Civil and Environmental Engineering (1)
- Data Science (1)
- Data Storage Systems (1)
- Development Studies (1)
- Digital Circuits (1)
- Electrical and Computer Engineering (1)
- Heat Transfer, Combustion (1)
- Numerical Analysis and Scientific Computing (1)
- OS and Networks (1)
- Programming Languages and Compilers (1)
- Robotics (1)
- Social and Behavioral Sciences (1)
- Software Engineering (1)
- Statistics and Probability (1)
- Keyword
-
- Computer vision (2)
- Machine learning (2)
- Additive manufacturing (1)
- Algorithmic fairness (1)
- Asset (1)
-
- Chosen plaintext attack (CPA) (1)
- Cloud-Assisted Systems (1)
- Computational frameworks (1)
- Computer Vision (1)
- Cooperative 3D Printing (1)
- Critical Infrastructure Systems (1)
- Cyber attacks (1)
- Cybersecurity (1)
- DNS Tunneling (1)
- DNS-based attacks (1)
- Damage Source Identification (1)
- Data collection (1)
- Data privacy (1)
- Decentralized planning (1)
- Deep learning (1)
- Demographic profiles (1)
- Digital Twins (1)
- Dynamic Range Quantization (DQR) (1)
- Equity (1)
- Expertise models (1)
- Experts (1)
- Fair exchange (1)
- Fair ranking (1)
- Geometric Programming (GP) (1)
- Gradient projection method (GPM) (1)
Articles 1 - 10 of 10
Full-Text Articles in Systems Architecture
Component Damage Source Identification For Critical Infrastructure Systems, Nathan Davis
Component Damage Source Identification For Critical Infrastructure Systems, Nathan Davis
Graduate Theses and Dissertations
Cyber-Physical Systems (CPS) are becoming increasingly prevalent for both Critical Infrastructure and the Industry 4.0 initiative. Bad values within components of the software portion of CPS, or the computer systems, have the potential to cause major damage if left unchecked, and so detection and locating of where these occur is vital. We further define features of these computer systems and create a use-based system topology. We then introduce a function to monitor system integrity and the presence of bad values as well as an algorithm to locate them. We then show an improved version, taking advantage of several system properties …
Deep Learning Strategies For Pool Boiling Heat Flux Prediction Using Image Sequences, Connor Heo
Deep Learning Strategies For Pool Boiling Heat Flux Prediction Using Image Sequences, Connor Heo
Graduate Theses and Dissertations
The understanding of bubble dynamics during boiling is critical to the design of advanced heater surfaces to improve the boiling heat transfer. The stochastic bubble nucleation, growth, and coalescence processes have made it challenging to obtain mechanistic models that can predict boiling heat flux based on the bubble dynamics. Traditional boiling image analysis relies on the extraction of the dominant physical quantities from the images and is thus limited to the existing knowledge of these quantities. Recently, machine-learning-aided analysis has shown success in boiling crisis detection, heat flux prediction, real-time image analysis, etc., whereas most of the existing studies are …
Development Of A Reference Design For Intrusion Detection Using Neural Networks For A Smart Inverter, Ammar Mohammad Khan
Development Of A Reference Design For Intrusion Detection Using Neural Networks For A Smart Inverter, Ammar Mohammad Khan
Graduate Theses and Dissertations
The purpose of this thesis is to develop a reference design for a base level implementation of an intrusion detection module using artificial neural networks that is deployed onto an inverter and runs on live data for cybersecurity purposes, leveraging the latest deep learning algorithms and tools. Cybersecurity in the smart grid industry focuses on maintaining optimal standards of security in the system and a key component of this is being able to detect cyberattacks. Although researchers and engineers aim to design such devices with embedded security, attacks can and do still occur. The foundation for eventually mitigating these attacks …
Material Detection With Thermal Imaging And Computer Vision: Potentials And Limitations, Jared Poe
Material Detection With Thermal Imaging And Computer Vision: Potentials And Limitations, Jared Poe
Graduate Theses and Dissertations
The goal of my masters thesis research is to develop an affordable and mobile infraredbased environmental sensoring system for the control of a servo motor based on material identification. While this sensing could be oriented towards different applications, my thesis is particularly interested in material detection due to the wide range of possible applications in mechanical engineering. Material detection using a thermal mobile camera could be used in manufacturing, recycling or autonomous robotics. For my research, the application that will be focused on is using this material detection to control a servo motor by identifying and sending control inputs based …
Signal Processing And Data Analysis For Real-Time Intermodal Freight Classification Through A Multimodal Sensor System., Enrique J. Sanchez Headley
Signal Processing And Data Analysis For Real-Time Intermodal Freight Classification Through A Multimodal Sensor System., Enrique J. Sanchez Headley
Graduate Theses and Dissertations
Identifying freight patterns in transit is a common need among commercial and municipal entities. For example, the allocation of resources among Departments of Transportation is often predicated on an understanding of freight patterns along major highways. There exist multiple sensor systems to detect and count vehicles at areas of interest. Many of these sensors are limited in their ability to detect more specific features of vehicles in traffic or are unable to perform well in adverse weather conditions. Despite this limitation, to date there is little comparative analysis among Laser Imaging and Detection and Ranging (LIDAR) sensors for freight detection …
Computational Frameworks For Multi-Robot Cooperative 3d Printing And Planning, Laxmi Prasad Poudel
Computational Frameworks For Multi-Robot Cooperative 3d Printing And Planning, Laxmi Prasad Poudel
Graduate Theses and Dissertations
This dissertation proposes a novel cooperative 3D printing (C3DP) approach for multi-robot additive manufacturing (AM) and presents scheduling and planning strategies that enable multi-robot cooperation in the manufacturing environment. C3DP is the first step towards achieving the overarching goal of swarm manufacturing (SM). SM is a paradigm for distributed manufacturing that envisions networks of micro-factories, each of which employs thousands of mobile robots that can manufacture different products on demand. SM breaks down the complicated supply chain used to deliver a product from a large production facility from one part of the world to another. Instead, it establishes a network …
Promoting Diversity In Academic Research Communities Through Multivariate Expert Recommendation, Omar Salman
Promoting Diversity In Academic Research Communities Through Multivariate Expert Recommendation, Omar Salman
Graduate Theses and Dissertations
Expert recommendation is the process of identifying individuals who have the appropriate knowledge and skills to achieve a specific task. It has been widely used in the educational environment mainly in the hiring process, paper-reviewer assignment, and assembling conference program committees. In this research, we highlight the problem of diversity and fair representation of underrepresented groups in expertise recommendation, factors that current expertise recommendation systems rarely consider. We introduce a novel way to model experts in academia by considering demographic attributes in addition to skills. We use the h-index score to quantify skills for a researcher and we identify five …
Privacy-Preserving Cloud-Assisted Data Analytics, Wei Bao
Privacy-Preserving Cloud-Assisted Data Analytics, Wei Bao
Graduate Theses and Dissertations
Nowadays industries are collecting a massive and exponentially growing amount of data that can be utilized to extract useful insights for improving various aspects of our life. Data analytics (e.g., via the use of machine learning) has been extensively applied to make important decisions in various real world applications. However, it is challenging for resource-limited clients to analyze their data in an efficient way when its scale is large. Additionally, the data resources are increasingly distributed among different owners. Nonetheless, users' data may contain private information that needs to be protected.
Cloud computing has become more and more popular in …
Network-Based Detection And Prevention System Against Dns-Based Attacks, Yasir Faraj Mohammed
Network-Based Detection And Prevention System Against Dns-Based Attacks, Yasir Faraj Mohammed
Graduate Theses and Dissertations
Individuals and organizations rely on the Internet as an essential environment for personal or business transactions. However, individuals and organizations have been primary targets for attacks that steal sensitive data. Adversaries can use different approaches to hide their activities inside the compromised network and communicate covertly between the malicious servers and the victims. The domain name system (DNS) protocol is one of these approaches that adversaries use to transfer stolen data outside the organization's network using various forms of DNS tunneling attacks. The main reason for targeting the DNS protocol is because DNS is available in almost every network, ignored, …
Characteristic Reassignment For Hardware Trojan Detection, Noah Waller
Characteristic Reassignment For Hardware Trojan Detection, Noah Waller
Graduate Theses and Dissertations
With the current business model and increasing complexity of hardware designs, third-party Intellectual Properties (IPs) are prevalently incorporated into first-party designs. However, the use of third-party IPs increases security concerns related to hardware Trojans inserted by attackers. A core threat posed by Hardware Trojans is the difficulty in detecting such malicious insertions/alternations in order to prevent the damage. This thesis work provides major improvements on a soft IP analysis methodology and tool known as the Structural Checking tool, which analyzes Register-Transfer Level (RTL) soft IPs for determining their functionalities and screening for hardware Trojans. This is done by breaking down …