Devops: Lecture 1 - "Overview", 2020 CUNY City College
Devops: Lecture 1 - "Overview", Jeremy Andrews, Nyc Tech-In-Residence Corps
Open Educational Resources
Overview lecture for the "DevOps" course delivered at the City College of New York in Spring 2020 by Jeremy Andrews as part of the Tech-in-Residence Corps program.
Graph Classification With Kernels, Embeddings And Convolutional Neural Networks, 2020 San Jose State University
Graph Classification With Kernels, Embeddings And Convolutional Neural Networks, Monica Golahalli Seenappa, Katerina Potika, Petros Potikas
Faculty Publications, Computer Science
In the graph classification problem, given is a family of graphs and a group of different categories, and we aim to classify all the graphs (of the family) into the given categories. Earlier approaches, such as graph kernels and graph embedding techniques have focused on extracting certain features by processing the entire graph. However, real world graphs are complex and noisy and these traditional approaches are computationally intensive. With the introduction of the deep learning framework, there have been numerous attempts to create more efficient classification approaches. We modify a kernel graph convolutional neural network approach, that extracts subgraphs (patches ...
Iot-Hass: A Framework For Protecting Smart Home Environment, 2020 Dakota State University
Iot-Hass: A Framework For Protecting Smart Home Environment, Tarig Mudawi
Masters Theses & Doctoral Dissertations
While many solutions have been proposed for smart home security, the problem that no single solution fully protects the smart home environment still exists. In this research we propose a security framework to protect the smart home environment. The proposed framework includes three engines that complement each other to protect the smart home IoT devices. The first engine is an IDS/IPS module that monitors all traffic in the home network and then detects, alerts users, and/or blocks packets using anomaly-based detection. The second engine works as a device management module that scans and verifies IoT devices in the ...
Automated Synthesis Of Local Time Requirement For Service Composition, 2020 Singapore Management University
Automated Synthesis Of Local Time Requirement For Service Composition, Étienne André, Tian Huat Tan, Manman Chen, Shuang Liu, Jun Sun, Yang Liu, Jin Song Dong
Research Collection School Of Computing and Information Systems
Service composition aims at achieving a business goal by composing existing service-based applications or components. The response time of a service is crucial, especially in time-critical business environments, which is often stated as a clause in service-level agreements between service providers and service users. To meet the guaranteed response time requirement of a composite service, it is important to select a feasible set of component services such that their response time will collectively satisfy the response time requirement of the composite service. In this work, we use the BPEL modeling language that aims at specifying Web services. We extend it ...
Wireless Underground Communications In Sewer And Stormwater Overflow Monitoring: Radio Waves Through Soil And Asphalt Medium, Usman Raza, Abdul Salam
Storm drains and sanitary sewers are prone to backups and overflows due to extra amount wastewater entering the pipes. To prevent that, it is imperative to efficiently monitor the urban underground infrastructure. The combination of sensors system and wireless underground communication system can be used to realize urban underground IoT applications, e.g., storm water and wastewater overflow monitoring systems. The aim of this article is to establish a feasibility of the use of wireless underground communications techniques, and wave propagation through the subsurface soil and asphalt layers, in an underground pavement system for storm water and sewer overflow monitoring ...
Who Owns Bitcoin? Private Law Facing The Blockchain, 2020 University of Minnesota Law School
Who Owns Bitcoin? Private Law Facing The Blockchain, Matthias Lehmann
Minnesota Journal of Law, Science & Technology
No abstract provided.
A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, 2020 The University of Western Ontario
A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, Amir Haghighatimaleki
Electronic Thesis and Dissertation Repository
Through social media platforms, massive amounts of data are being produced. Twitter, as one such platform, enables users to post “tweets” on an unprecedented scale. Once analyzed by machine learning (ML) techniques and in aggregate, Twitter data can be an invaluable resource for gaining insight. However, when applied to real-time data streams, due to covariate shifts in the data (i.e., changes in the distributions of the inputs of ML algorithms), existing ML approaches result in different types of biases and provide uncertain outputs. This thesis describes a visual analytics system (i.e., a tool that combines data visualization, human-data ...
Protecting The Protector: Mapping The Key Terrain That Supports The Continuous Monitoring Mission Of A Cloud Cybersecurity Service Provider, 2020 Nova Southeastern University
Protecting The Protector: Mapping The Key Terrain That Supports The Continuous Monitoring Mission Of A Cloud Cybersecurity Service Provider, Chris Bush
CCE Theses and Dissertations
Key terrain is a concept that is relevant to warfare, military strategy, and tactics. A good general maps out terrain to identify key areas to protect in support of a mission (i.e., a bridge allowing for mobility of supplies and reinforcements). Effective ways to map terrain in Cyberspace (KT-C) has been an area of interest for researchers in Cybersecurity ever since the Department of Defense designated Cyberspace as a warfighting domain. The mapping of KT-C for a mission is accomplished by putting forth efforts to understand and document a mission's dependence on Cyberspace and cyber assets. A cloud ...
The Social Media Machines: An Investigation Of The Effect Of Trust Moderated By Disinformation On Users’ Decision-Making Process, 2020 Nova Southeastern University
The Social Media Machines: An Investigation Of The Effect Of Trust Moderated By Disinformation On Users’ Decision-Making Process, Zulma Valedon Westney
CCE Theses and Dissertations
Social media networking sites (SMNS) have become a popular communications medium where users share information, knowledge, and persuasion. In less than two decades, social media's (SM) dominance as a communication medium can't be disputed, for good or evil. Combined with the newly found immediacy and pervasiveness, these SM applications' persuasive power are useful weapons for organizations, angry customers, employees, actors, and activists bent on attacking or hacking other individuals, institutions, or systems. Consequently, SM has become the preferred default mechanism of news sources; however, users are unsure if the information gathered is true or false. According to the ...
Building Something With The Raspberry Pi, 2020 Harrisburg University of Science and Technology
Building Something With The Raspberry Pi, Richard Kordel
Presidential Research Grants
In 2017 Ryan Korn and I submitted a grant proposal in the annual Harrisburg University President’s Grant process. Our proposal was to partner with a local high school to install a classroom of 20 Raspberry Pi’s, along with the requisite peripherals. In that classroom students would be challenged to design something that combined programming with physical computing. In our presentation to the school we suggested that this project would give students the opportunity to be “amazing.”
As part of the grant, the top three students would be given scholarships to HU and the top five finalists would all ...
Demand-Driven Execution Using Future Gated Single Assignment Form, 2020 Michigan Technological University
Demand-Driven Execution Using Future Gated Single Assignment Form, Omkar Javeri
Dissertations, Master's Theses and Master's Reports
This dissertation discusses a novel, previously unexplored execution model called Demand-Driven Execution (DDE), which executes programs starting from the outputs of the program, progressing towards the inputs of the program. This approach is significantly different from prior demand-driven reduction machines as it can execute a program written in an imperative language using the demand-driven paradigm while extracting both instruction and data level parallelism. The execution model relies on an executable Single Assignment Form which serves both as the internal representation of the compiler as well as the Instruction Set Architecture (ISA) of the machine. This work develops the instruction set ...
Carbon Footprint Of Machine Learning Algorithms, 2020 Bard College
Carbon Footprint Of Machine Learning Algorithms, Gigi Hsueh
Senior Projects Spring 2020
With the rapid development of machine learning, deep learning has demonstrated superior performance over other types of learning. Research made possible by big data and high-end GPU's enabled those research advances at the expense of computation and environmental costs. This will not only slow down the advancement of deep learning research because not all researchers have access to such expensive hardware, but it also accelerates climate change with increasing carbon emissions. It is essential for machine learning research to obtain high levels of accuracy and efficiency without contributing to global warming. This paper discusses some of current approaches in ...
Security In 5g-Enabled Internet Of Things Communication: Issues: Challenges, And Future Research Roadmap, 2020 Old Dominion University
Security In 5g-Enabled Internet Of Things Communication: Issues: Challenges, And Future Research Roadmap, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Prosanta Gope, Joel J.P.C. Rodrigues
5G mobile communication systems promote the mobile network to not only interconnect people, but also interconnect and control the machine and other devices. 5G-enabled Internet of Things (IoT) communication environment supports a wide-variety of applications, such as remote surgery, self-driving car, virtual reality, flying IoT drones, security and surveillance and many more. These applications help and assist the routine works of the community. In such communication environment, all the devices and users communicate through the Internet. Therefore, this communication agonizes from different types of security and privacy issues. It is also vulnerable to different types of possible attacks (for example ...
Gaming Lan Setup With Local And Remote Access And Downloads, 2020 The University of Akron
Gaming Lan Setup With Local And Remote Access And Downloads, Ethelyn Tran
Williams Honors College, Honors Research Projects
The Gaming LAN Setup project aims to design and implement a basic functioning, hardened network that could be utilized locally and remotely to allow users access to respective servers for the option to host a session or join. Users will have the ability to securely log into the internal network to download files via a web interface. The network allows the designated user to take a management position in order to perform basic penetration testing and discover vulnerabilities through various scans to maintain the network
Developing A Uas-Deployable Methane Sensor Using Low-Cost Modular Open-Source Components, 2020 The University of Akron
Developing A Uas-Deployable Methane Sensor Using Low-Cost Modular Open-Source Components, Gavin Demali
Williams Honors College, Honors Research Projects
This project aimed to develop a methane sensor for deployment on an unmanned aerial system (UAS), or drone, platform. This design is centered around low cost, commercially available modular hardware components and open source software libraries. Once successfully developed, this system was deployed at the Bath Nature Preserve in Bath Township, Summit County Ohio in order to detect any potential on site fugitive methane emissions in the vicinity of the oil and gas infrastructure present. The deliverables of this project (i.e. the data collected at BNP) will be given to the land managers there to better inform future management ...
Landing Throttleable Hybrid Rockets With Hierarchical Reinforcement Learning In A Simulated Environment, 2020 University of New Hampshire
Landing Throttleable Hybrid Rockets With Hierarchical Reinforcement Learning In A Simulated Environment, Francesco Alessandro Stefano Mikulis-Borsoi
Honors Theses and Capstones
In this paper, I develop a hierarchical Markov Decision Process (MDP) structure for completing the task of vertical rocket landing. I start by covering the background of this problem, and formally defining its constraints. In order to reduce mistakes while formulating different MDPs, I define and develop the criteria for a standardized MDP definition format. I then decompose the problem into several sub-problems of vertical landing, namely velocity control and vertical stability control. By exploiting MDP coupling and symmetrical properties, I am able to significantly reduce the size of the state space compared to a unified MDP formulation. This paper ...
Mobile Technology As A Leverage Point For The Spread Of Permaculture In The Food System, 2020 Regis University
Mobile Technology As A Leverage Point For The Spread Of Permaculture In The Food System, Daniel Finley
Regis University Student Publications
This thesis argues that the current food system is untenable in the long term due to its significant negative impacts on the global ecosystem and society.
Multimodal Data Integration For Real-Time Indoor Navigation Using A Smartphone, 2020 CUNY City College
Multimodal Data Integration For Real-Time Indoor Navigation Using A Smartphone, Yaohua Chang
Dissertations and Theses
We propose an integrated solution of indoor navigation using a smartphone, especially for assisting people with special needs, such as the blind and visually impaired (BVI) individuals. The system consists of three components: hybrid modeling, real-time navigation, and client-server architecture. In the hybrid modeling component, the hybrid model of a building is created region by region and is organized in a graph structure with nodes as destinations and landmarks, and edges as traversal paths between nodes. A Wi-Fi/cellular-data connectivity map, a beacon signal strength map, a 3D visual model (with destinations and landmarks annotated) are collected while a modeler ...
Array Aware Training/Pruning: Methods For Efficient Forward Propagation On Array-Based Neural Network Accelerators, Krishna Teja Chitty-Venkata, Arun K. Somani
Electrical and Computer Engineering Conference Papers, Posters and Presentations
Due to the increase in the use of large-sized Deep Neural Networks (DNNs) over the years, specialized hardware accelerators such as Tensor Processing Unit and Eyeriss have been developed to accelerate the forward pass of the network. The essential component of these devices is an array processor which is composed of multiple individual compute units for efficiently executing Multiplication and Accumulation (MAC) operation. As the size of this array limits the amount of DNN processing of a single layer, the computation is performed in several batches serially leading to extra compute cycles along both the axes. In practice, due to ...
Physical Wireless Resource Virtualization For Software-Defined Whole-Stack Slicing, 2020 Iowa State University
Physical Wireless Resource Virtualization For Software-Defined Whole-Stack Slicing, Matthias Sander-Frigau, Tianyi Zhang, Hongwei Zhang, Ahmed E. Kamal, Arun K. Somani
Electrical and Computer Engineering Publications
Radio access network (RAN) virtualization is gaining more and more ground and expected to re-architect the next-generation cellular networks. Existing RAN virtualization studies and solutions have mostly focused on sharing communication capacity and tend to require the use of the same PHY and MAC layers across network slices. This approach has not considered the scenarios where different slices require different PHY and MAC layers, for instance, for radically different services and for whole-stack research in wireless living labs where novel PHY and MAC layers need to be deployed concurrently with existing ones on the same physical infrastructure. To enable whole-stack ...