Block The Root Takeover: Validating Devices Using Blockchain Protocol,
2021
Dakota State University
Block The Root Takeover: Validating Devices Using Blockchain Protocol, Sharmila Paul
Masters Theses & Doctoral Dissertations
This study addresses a vulnerability in the trust-based STP protocol that allows malicious users to target an Ethernet LAN with an STP Root-Takeover Attack. This subject is relevant because an STP Root-Takeover attack is a gateway to unauthorized control over the entire network stack of a personal or enterprise network. This study aims to address this problem with a potentially trustless research solution called the STP DApp. The STP DApp is the combination of a kernel /net modification called stpverify and a Hyperledger Fabric blockchain framework in a NodeJS runtime environment in userland. The STP DApp works as an Intrusion ...
Load Balancing And Resource Allocation In Smart Cities Using Reinforcement Learning,
2021
The University of Western Ontario
Load Balancing And Resource Allocation In Smart Cities Using Reinforcement Learning, Aseel Alorbani
Electronic Thesis and Dissertation Repository
Today, smart city technology is being adopted by many municipal governments to improve their services and to adapt to growing and changing urban population. Implementing a smart city application can be one of the most challenging projects due to the complexity, requirements and constraints. Sensing devices and computing components can be numerous and heterogeneous. Increasingly, researchers working in the smart city arena are looking to leverage edge and cloud computing to support smart city development. This approach also brings a number of challenges. Two of the main challenges are resource allocation and load balancing of tasks associated with processing data ...
Hybrid Cloud Workload Monitoring As A Service,
2021
San Jose State University
Hybrid Cloud Workload Monitoring As A Service, Shreya Kundu
Master's Projects
Cloud computing and cloud-based hosting has become embedded in our daily lives. It is imperative for cloud providers to make sure all services used by both enterprises and consumers have high availability and elasticity to prevent any downtime, which impacts negatively for any business. To ensure cloud infrastructures are working reliably, cloud monitoring becomes an essential need for both businesses, the provider and the consumer. This thesis project reports on the need of efficient scalable monitoring, enumerating the necessary types of metrics of interest to be collected. Current understanding of various architectures designed to collect, store and process monitoring data ...
Neural Architecture Search As Sparse Supernet,
2021
Singapore Management University
Neural Architecture Search As Sparse Supernet, Y. Wu, A. Liu, Zhiwu Huang, S. Zhang, Gool L. Van
Research Collection School Of Computing and Information Systems
This paper aims at enlarging the problem of Neural Architecture Search (NAS) from Single-Path and Multi-Path Search to automated Mixed-Path Search. In particular, we model the NAS problem as a sparse supernet using a new continuous architecture representation with a mixture of sparsity constraints. The sparse supernet enables us to automatically achieve sparsely-mixed paths upon a compact set of nodes. To optimize the proposed sparse supernet, we exploit a hierarchical accelerated proximal gradient algorithm within a bi-level optimization framework. Extensive experiments on Convolutional Neural Network and Recurrent Neural Network search demonstrate that the proposed method is capable of searching for ...
On Studying Distributed Machine Learning,
2021
Liberty University
On Studying Distributed Machine Learning, Simeon Eberz
Senior Honors Theses
The Internet of Things (IoT) is utilizing Deep Learning (DL) for applications such as voice or image recognition. Processing data for DL directly on IoT edge devices reduces latency and increases privacy. To overcome the resource constraints of IoT edge devices, the computation for DL inference is distributed between a cluster of several devices. This paper explores DL, IoT networks, and a novel framework for distributed processing of DL in IoT clusters. The aim is to facilitate and simplify deployment, testing, and study of a distributed DL system, even without physical devices. The contributions of this paper are a deployment ...
Secure Network Access Via Ldap,
2021
The University of Akron
Secure Network Access Via Ldap, Nicholas Valaitis
Williams Honors College, Honors Research Projects
Networks need the ability to be access by secure accounts and users. The goal of this project is to configure and expand on LDAP configurations with considerations for AAA via TACACS+ and Radius for network equipment. This will provide adequate security for any given network in terms of access and prevent lose of access to devices which happens all to often with locally configured accounts on devices.
Improving Energy Efficiency Through Compiler Optimizations,
2021
Bowdoin College
Improving Energy Efficiency Through Compiler Optimizations, Jack Beckitt-Marshall
Honors Projects
Abstract--- Energy efficiency is becoming increasingly important for computation, especially in the context of the current climate crisis. The aim of this experiment was to see if the compiler could reduce energy usage without rewriting programs themselves. The experimental setup consisted of compiling programs using the Clang compiler using a set of compiler flags, and then measuring energy usage and execution time on an AMD Ryzen processor. Three experiments were performed: a random exploration of compiler flags, utilization of SIMD, as well as benchmarking real world applications. It was found that the compiler was able to reduce execution time, especially ...
Occam Manual,
2021
Portland State University
Occam Manual, Martin Zwick
Systems Science Faculty Publications and Presentations
Occam is a Discrete Multivariate Modeling (DMM) tool based on the methodology of Reconstructability Analysis (RA). Its typical usage is for analysis of problems involving large numbers of discrete variables. Models are developed which consist of one or more components, which are then evaluated for their fit and statistical significance. Occam can search the lattice of all possible models, or can do detailed analysis on a specific model.
In Variable-Based Modeling (VBM), model components are collections of variables. In State-Based Modeling (SBM), components identify one or more specific states or substates.
Occam provides a web-based interface, which allows uploading a ...
Efficient Modeling Of Random Sampling-Based Lru Cache,
2021
Michigan Technological University
Efficient Modeling Of Random Sampling-Based Lru Cache, Junyao Yang
Dissertations, Master's Theses and Master's Reports
The Miss Ratio Curve (MRC) is an important metric and effective tool for caching system performance prediction and optimization. Since the Least Recently Used (LRU) replacement policy is the de facto policy for many existing caching systems, most previous studies on efficient MRC construction are predominantly focused on the LRU replacement policy. Recently, the random sampling-based replacement mechanism, as opposed to replacement relying on the rigid LRU data structure, gains more popularity due to its lightweight and flexibility. To approximate LRU, at replacement times, the system randomly selects K objects and replaces the least recently used object among the sample ...
Development Of A Reference Design For Intrusion Detection Using Neural Networks For A Smart Inverter,
2021
University of Arkansas, Fayetteville
Development Of A Reference Design For Intrusion Detection Using Neural Networks For A Smart Inverter, Ammar Mohammad Khan
Graduate Theses and Dissertations
The purpose of this thesis is to develop a reference design for a base level implementation of an intrusion detection module using artificial neural networks that is deployed onto an inverter and runs on live data for cybersecurity purposes, leveraging the latest deep learning algorithms and tools. Cybersecurity in the smart grid industry focuses on maintaining optimal standards of security in the system and a key component of this is being able to detect cyberattacks. Although researchers and engineers aim to design such devices with embedded security, attacks can and do still occur. The foundation for eventually mitigating these attacks ...
A Survey Of Enabling Technologies For Smart Communities,
2021
Old Dominion University
A Survey Of Enabling Technologies For Smart Communities, Amna Iqbal, Stephan Olariu
Computer Science Faculty Publications
In 2016, the Japanese Government publicized an initiative and a call to action for the implementation of a "Super Smart Society" announced as Society 5.0. The stated goal of Society 5.0 is to meet the various needs of the members of society through the provisioning of goods and services to those who require them, when they are required and in the amount required, thus enabling the citizens to live an active and comfortable life. In spite of its genuine appeal, details of a feasible path to Society 5.0 are conspicuously missing. The first main goal of this ...
Xtreme-Noc: Extreme Gradient Boosting Based Latency Model For Network-On-Chip Architectures,
2021
Minnesota State University, Mankato
Xtreme-Noc: Extreme Gradient Boosting Based Latency Model For Network-On-Chip Architectures, Ilma Sheriff
All Graduate Theses, Dissertations, and Other Capstone Projects
Multiprocessor System-on-Chip (MPSoC) integrating heterogeneous processing elements (CPU, GPU, Accelerators, memory, I/O modules ,etc.) are the de-facto design choice to meet the ever-increasing performance/Watt requirements from modern computing machines. Although at consumer level the number of processing elements (PE) are limited to 8-16, for high end servers, the number of PEs can scale up to hundreds. A Network-on-Chip (NoC) is a microscale network that facilitates the packetized communication among the PEs in such complex computational systems. Due to the heterogeneous integration of the cores, execution of diverse (serial and parallel) applications on the PEs, application mapping strategies, and ...
Evaluation Of Reliability Indicators Of Mobile Communication System Bases,
2020
Bulletin of TUIT: Management and Communication Technologies
Evaluation Of Reliability Indicators Of Mobile Communication System Bases, Dilmurod Davronbekov, Utkir Karimovich Matyokubov, Malika Ilkhamovna Abdullayeva
Bulletin of TUIT: Management and Communication Technologies
In this study, the reliability of mobile system base stations (BTS) is assessed by analyzing data obtained on faults in about 200 BTS over a six-month period. Five BTSs with the highest number of failures and duration of failure were selected in these BTSs. Based on the data obtained, reliability parameters were calculated and compared.
The study used Weibull’s dismissal process distribution method. The breakdown times of each BTS were sorted. In all five BTS, it was found that β(where the value of β is the approximate value obtained from the values of the smallest squares of the ...
A Framework For Identifying Host-Based Artifacts In Dark Web Investigations,
2020
Dakota State University
A Framework For Identifying Host-Based Artifacts In Dark Web Investigations, Arica Kulm
Masters Theses & Doctoral Dissertations
The dark web is the hidden part of the internet that is not indexed by search engines and is only accessible with a specific browser like The Onion Router (Tor). Tor was originally developed as a means of secure communications and is still used worldwide for individuals seeking privacy or those wanting to circumvent restrictive regimes. The dark web has become synonymous with nefarious and illicit content which manifests itself in underground marketplaces containing illegal goods such as drugs, stolen credit cards, stolen user credentials, child pornography, and more (Kohen, 2017). Dark web marketplaces contribute both to illegal drug usage ...
Modular Neural Networks For Low-Power Image Classification On Embedded Devices,
2020
Purdue University
Modular Neural Networks For Low-Power Image Classification On Embedded Devices, Abhinav Goel, Sara Aghajanzadeh, Caleb Tung, Shuo-Han Chen, George K. Thiruvathukal, Yung-Hisang Lu
Computer Science: Faculty Publications and Other Works
Embedded devices are generally small, battery-powered computers with limited hardware resources. It is difficult to run deep neural networks (DNNs) on these devices, because DNNs perform millions of operations and consume significant amounts of energy. Prior research has shown that a considerable number of a DNN’s memory accesses and computation are redundant when performing tasks like image classification. To reduce this redundancy and thereby reduce the energy consumption of DNNs, we introduce the Modular Neural Network Tree architecture. Instead of using one large DNN for the classifier, this architecture uses multiple smaller DNNs (called modules) to progressively classify images ...
Tpr: Text-Aware Preference Ranking For Recommender Systems,
2020
Singapore Management University
Tpr: Text-Aware Preference Ranking For Recommender Systems, Yu-Neng Chuang, Chih-Ming Chen, Chuan-Ju Wang, Ming-Feng Tsai, Yuan Fang, Ee-Peng Lim
Research Collection School Of Computing and Information Systems
Textual data is common and informative auxiliary information for recommender systems. Most prior art utilizes text for rating prediction, but rare work connects it to top-N recommendation. Moreover, although advanced recommendation models capable of incorporating auxiliary information have been developed, none of these are specifically designed to model textual information, yielding a limited usage scenario for typical user-to-item recommendation. In this work, we present a framework of text-aware preference ranking (TPR) for top-N recommendation, in which we comprehensively model the joint association of user-item interaction and relations between items and associated text. Using the TPR framework, we construct a joint ...
A Statistical Impulse Response Model Based On Empirical Characterization Of Wireless Underground Channel,
2020
Purdue University
A Statistical Impulse Response Model Based On Empirical Characterization Of Wireless Underground Channel, Abdul Salam, Mehmet C. Vuran, Suat Irmak
Faculty Publications
Wireless underground sensor networks (WUSNs) are becoming ubiquitous in many areas. The design of robust systems requires extensive understanding of the underground (UG) channel characteristics. In this paper, an UG channel impulse response is modeled and validated via extensive experiments in indoor and field testbed settings. The three distinct types of soils are selected with sand and clay contents ranging from $13\%$ to $86\%$ and $3\%$ to $32\%$, respectively. The impacts of changes in soil texture and soil moisture are investigated with more than $1,200$ measurements in a novel UG testbed that allows flexibility in soil moisture control. Moreover ...
Direct Digital Synthesis: A Flexible Architecture For Advanced Signals Research For Future Satellite Navigation Payloads,
2020
Air Force Institute of Technology
Direct Digital Synthesis: A Flexible Architecture For Advanced Signals Research For Future Satellite Navigation Payloads, Pranav R. Patel
Theses and Dissertations
In legacy Global Positioning System (GPS) Satellite Navigation (SatNav) payloads, the architecture does not provide the flexibility to adapt to changing circumstances and environments. GPS SatNav payloads have largely remained unchanged since the system became fully operational in April 1995. Since then, the use of GPS has become ubiquitous in our day-to-day lives. GPS availability is now a basic assumption for distributed infrastructure; it has become inextricably tied to our national power grids, cellular networks, and global financial systems. Emerging advancements of easy to use radio technologies, such as software-defined radios (SDRs), have greatly lowered the difficulty of discovery and ...
Using High-Performance Computing Profilers To Understand The Performance Of Graph Algorithms,
2020
University of New Orleans
Using High-Performance Computing Profilers To Understand The Performance Of Graph Algorithms, Costain Nachuma
University of New Orleans Theses and Dissertations
An algorithm designer working with parallel computing systems should know how the characteristics of their implemented algorithm affects various performance aspects of their parallel program. It would be beneficial to these designers if each algorithm came with a specific set of standards that identified which algorithms worked better for a specified system. Therefore, the goal of this paper is to take implementations of four graphing algorithms, extract their features such as memory consumption, scalability using profilers (Vtunes /Tau) to determine which algorithms work to their fullest potential in one of the three systems: GPU, shared memory system, or distributed memory ...
Investigating Single Precision Floating General Matrix Multiply In Heterogeneous Hardware,
2020
Washington University in St. Louis
Investigating Single Precision Floating General Matrix Multiply In Heterogeneous Hardware, Steven Harris
McKelvey School of Engineering Theses & Dissertations
The fundamental operation of matrix multiplication is ubiquitous across a myriad of disciplines. Yet, the identification of new optimizations for matrix multiplication remains relevant for emerging hardware architectures and heterogeneous systems. Frameworks such as OpenCL enable computation orchestration on existing systems, and its availability using the Intel High Level Synthesis compiler allows users to architect new designs for reconfigurable hardware using C/C++. Using the HARPv2 as a vehicle for exploration, we investigate the utility of several of the most notable matrix multiplication optimizations to better understand the performance portability of OpenCL and the implications for such optimizations on this ...