Matching Items (180)
149382-Thumbnail Image.png
Description
Today, many wireless networks are single-channel systems. However, as the interest in wireless services increases, the contention by nodes to occupy the medium is more intense and interference worsens. One direction with the potential to increase system throughput is multi-channel systems. Multi-channel systems have been shown to reduce collisions and

Today, many wireless networks are single-channel systems. However, as the interest in wireless services increases, the contention by nodes to occupy the medium is more intense and interference worsens. One direction with the potential to increase system throughput is multi-channel systems. Multi-channel systems have been shown to reduce collisions and increase concurrency thus producing better bandwidth usage. However, the well-known hidden- and exposed-terminal problems inherited from single-channel systems remain, and a new channel selection problem is introduced. In this dissertation, Multi-channel medium access control (MAC) protocols are proposed for mobile ad hoc networks (MANETs) for nodes equipped with a single half-duplex transceiver, using more sophisticated physical layer technologies. These include code division multiple access (CDMA), orthogonal frequency division multiple access (OFDMA), and diversity. CDMA increases channel reuse, while OFDMA enables communication by multiple users in parallel. There is a challenge to using each technology in MANETs, where there is no fixed infrastructure or centralized control. CDMA suffers from the near-far problem, while OFDMA requires channel synchronization to decode the signal. As a result CDMA and OFDMA are not yet widely used. Cooperative (diversity) mechanisms provide vital information to facilitate communication set-up between source-destination node pairs and help overcome limitations of physical layer technologies in MANETs. In this dissertation, the Cooperative CDMA-based Multi-channel MAC (CCM-MAC) protocol uses CDMA to enable concurrent transmissions on each channel. The Power-controlled CDMA-based Multi-channel MAC (PCC-MAC) protocol uses transmission power control at each node and mitigates collisions of control packets on the control channel by using different sizes of the spreading factor to have different processing gains for the control signals. The Cooperative Dual-access Multi-channel MAC (CDM-MAC) protocol combines the use of OFDMA and CDMA and minimizes channel interference by a resolvable balanced incomplete block design (BIBD). In each protocol, cooperating nodes help reduce the incidence of the multi-channel hidden- and exposed-terminal and help address the near-far problem of CDMA by supplying information. Simulation results show that each of the proposed protocols achieve significantly better system performance when compared to IEEE 802.11, other multi-channel protocols, and another protocol CDMA-based.
ContributorsMoon, Yuhan (Author) / Syrotiuk, Violet R. (Thesis advisor) / Huang, Dijiang (Committee member) / Reisslein, Martin (Committee member) / Sen, Arunabha (Committee member) / Arizona State University (Publisher)
Created2010
149392-Thumbnail Image.png
Description
The deterioration of drinking-water quality within distribution systems is a serious cause for concern. Extensive water-quality deterioration often results in violations against regulatory standards and has been linked to water-borne disease outbreaks. The causes for the deterioration of drinking water quality inside distribution systems are not yet fully

The deterioration of drinking-water quality within distribution systems is a serious cause for concern. Extensive water-quality deterioration often results in violations against regulatory standards and has been linked to water-borne disease outbreaks. The causes for the deterioration of drinking water quality inside distribution systems are not yet fully understood. Mathematical models are often used to analyze how different biological, chemical, and physical phenomena interact and cause water quality deterioration inside distribution systems. In this dissertation research I developed a mathematical model, the Expanded Comprehensive Disinfection and Water Quality (CDWQ-E) model, to track water quality changes in chloraminated water. I then applied CDWQ-E to forecast water quality deterioration trends and the ability of Naegleria fowleri (N.fowleri), a protozoan pathogen, to thrive within drinking-water distribution systems. When used to assess the efficacy of substrate limitation versus disinfection in controlling bacterial growth, CDWQ-E demonstrated that bacterial growth is more effectively controlled by lowering substrate loading into distribution systems than by adding residual disinfectants. High substrate concentrations supported extensive bacterial growth even in the presence of high levels of chloramine. Model results also showed that chloramine decay and oxidation of organic matter increase the pool of available ammonia, and thus have potential to advance nitrification within distribution systems. Without exception, trends predicted by CDWQ-E matched trends observed from experimental studies. When CDWQ-E was used to evaluate the ability N. fowleri to survive in finished drinking water, the model predicted that N. fowleri can survive for extended periods of time in distribution systems. Model results also showed that N. fowleri growth depends on the availability of high bacterial densities in the 105 CFU/mL range. Since HPC levels this high are rarely reported in bulk water, it is clear that in distribution systems biofilms are the prime reservoirs N. fowleri because of their high bacterial densities. Controlled laboratory experiments also showed that drinking water can be a source of N. fowleri, and the main reservoir appeared to be biofilms dominated by bacteria. When introduced to pipe-loops N. fowleri successfully attached to biofilms and survived for 5 months.
ContributorsBiyela, Precious Thabisile (Author) / Rittmann, Bruce E. (Thesis advisor) / Abbaszadegan, Morteza (Committee member) / Butler, Caitlyn (Committee member) / Arizona State University (Publisher)
Created2010
131516-Thumbnail Image.png
Description
The impact of physical/chemical properties of gray water on microbial inactivation in gray water using chlorine was investigated through creating artificial gray water in lab, varying specific components, and then measuring microbial inactivation. Gray water was made through taking autoclaved nanopure water, and increasing the concentration of surfacants, the turbidity,

The impact of physical/chemical properties of gray water on microbial inactivation in gray water using chlorine was investigated through creating artificial gray water in lab, varying specific components, and then measuring microbial inactivation. Gray water was made through taking autoclaved nanopure water, and increasing the concentration of surfacants, the turbidity, the concentration of organic content, and spiking E. coli grown in tryptic soy broth (TSB); chlorine was introduced using Clorox Disinfecting Bleach2. Bacteria was detected using tryptic soy agar (TSA), and E. coli was specifically detected using the selective media, brilliance. The log inactivation of bacteria detected using TSA was shown to be inversely related to the turbidity of the solution. Complete inactivation of E. coli concentrations between 104-105 CFU/100 ml in gray water with turbidities between 10-100 NTU, 0.1-0.5 mg/L of humic acid, and 0.1 ml of Dawn Ultra, was shown to occur, as detected by brilliance, at chlorine concentrations of 1-2 mg/L within 30 seconds. These result in concentration time (CT) values between 0.5-1 mg/L·min. Under the same gray water conditions, and an E. coli concentration of 104 CFU/100 ml and a chlorine concentration of 0.01 mg/L, complete inactivation was shown to occur in all trials within two minutes. These result in CT values ranging from 0.005 to 0.02. The turbidity and humic acid concentration were shown to be inversely related to the log inactivation and directly related to the CT value. This study shows that chlorination is a valid method of treatment of gray water for certain irrigation reuses.
ContributorsGreenberg, Samuel Gabe (Author) / Abbaszadegan, Morteza (Thesis director) / Schoepf, Jared (Committee member) / Alum, Absar (Committee member) / Chemical Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131884-Thumbnail Image.png
Description
As automation research into penetration testing has developed, several methods have been proposed as suitable control mechanisms for use in pentesting frameworks. These include Markov Decision Processes (MDPs), partially observable Markov Decision Processes (POMDPs), and POMDPs utilizing reinforcement learning. Since much work has been done automating other aspects of the

As automation research into penetration testing has developed, several methods have been proposed as suitable control mechanisms for use in pentesting frameworks. These include Markov Decision Processes (MDPs), partially observable Markov Decision Processes (POMDPs), and POMDPs utilizing reinforcement learning. Since much work has been done automating other aspects of the pentesting process using exploit frameworks and scanning tools, this is the next focal point in this field. This paper shows a fully-integrated solution comprised of a POMDP-based planning algorithm, the Nessus scanning utility, and MITRE's CALDERA pentesting platform. These are linked in order to create an autonomous AI attack platform with scanning, planning, and attack capabilities.
ContributorsDejarnett, Eric Andrew (Author) / Huang, Dijiang (Thesis director) / Chowdhary, Ankur (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131892-Thumbnail Image.png
Description
Vulnerability testing/evaluation is a regular task for cyber-security groups. Conducting tasks like this can take up a great amount of time and may not be perfect. Automating these tasks helps speed up the rate at which experts can test systems. However, script based or static programs that run automatically often

Vulnerability testing/evaluation is a regular task for cyber-security groups. Conducting tasks like this can take up a great amount of time and may not be perfect. Automating these tasks helps speed up the rate at which experts can test systems. However, script based or static programs that run automatically often do not have the versatility required to properly replace human analysis. With the advances in Artificial Intelligence and Machine Learning, a utility can be developed that would allow for the creation of penetration testing plans rather than manually testing vulnerabilities. A variety of existing cyber-security programs and utilities provide an API layer that commonly interacts with the Python environment. With the commonality of AI/ML tools within the Python ecosystem, a plugin like interface can be developed to feed any AI/ML program real world data and receive a response/report in return. Using Python 2.7+, Python 3.6+, pymdptoolbox, and POMDPy, a program was developed that ingests real-world data from scanning tools and returned a suggested course of action to be used by analysts in order to perform a practical validation of the algorithms in a real world setting. This program was able to successfully navigate a test network and produce results that were expected to be found on the target machines without needing human analysis of the network. Using POMDP based systems for more cyber-security type tasks may be a valuable use case for future developments and help ease the burden faced in a rapid paced world.
ContributorsBelanger, Connor Lawrence (Author) / Huang, Dijiang (Thesis director) / Chowdhary, Ankur (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131521-Thumbnail Image.png
Description
Turbidity is a known problem for UV water treatment systems as suspended particles can shield contaminants from the UV radiation. UV systems that utilize a reflective radiation chamber may be able to decrease the impact of turbidity on the efficacy of the system. The purpose of this study was to

Turbidity is a known problem for UV water treatment systems as suspended particles can shield contaminants from the UV radiation. UV systems that utilize a reflective radiation chamber may be able to decrease the impact of turbidity on the efficacy of the system. The purpose of this study was to determine how kaolin clay and gram flour turbidity affects inactivation of Escherichia coli (E. coli) when using a UV system with a reflective chamber. Both sources of turbidity were shown to reduce the inactivation of E. coli with increasing concentrations. Overall, it was shown that increasing kaolin clay turbidity had a consistent effect on reducing UV inactivation across UV doses. Log inactivation was reduced by 1.48 log for the low UV dose and it was reduced by at least 1.31 log for the low UV dose. Gram flour had a similar effect to the clay at the lower UV dose, reducing log inactivation by 1.58 log. At the high UV dose, there was no change in UV inactivation with an increase in turbidity. In conclusion, turbidity has a significant impact on the efficacy of UV disinfection. Therefore, removing turbidity from water is an essential process to enhance UV efficiency for the disinfection of microbial pathogens.
ContributorsMalladi, Rohith (Author) / Abbaszadegan, Morteza (Thesis director) / Alum, Absar (Committee member) / Fox, Peter (Committee member) / School of Human Evolution & Social Change (Contributor) / School of Life Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
157174-Thumbnail Image.png
Description
Fraud is defined as the utilization of deception for illegal gain by hiding the true nature of the activity. While organizations lose around $3.7 trillion in revenue due to financial crimes and fraud worldwide, they can affect all levels of society significantly. In this dissertation, I focus on credit card

Fraud is defined as the utilization of deception for illegal gain by hiding the true nature of the activity. While organizations lose around $3.7 trillion in revenue due to financial crimes and fraud worldwide, they can affect all levels of society significantly. In this dissertation, I focus on credit card fraud in online transactions. Every online transaction comes with a fraud risk and it is the merchant's liability to detect and stop fraudulent transactions. Merchants utilize various mechanisms to prevent and manage fraud such as automated fraud detection systems and manual transaction reviews by expert fraud analysts. Many proposed solutions mostly focus on fraud detection accuracy and ignore financial considerations. Also, the highly effective manual review process is overlooked. First, I propose Profit Optimizing Neural Risk Manager (PONRM), a selective classifier that (a) constitutes optimal collaboration between machine learning models and human expertise under industrial constraints, (b) is cost and profit sensitive. I suggest directions on how to characterize fraudulent behavior and assess the risk of a transaction. I show that my framework outperforms cost-sensitive and cost-insensitive baselines on three real-world merchant datasets. While PONRM is able to work with many supervised learners and obtain convincing results, utilizing probability outputs directly from the trained model itself can pose problems, especially in deep learning as softmax output is not a true uncertainty measure. This phenomenon, and the wide and rapid adoption of deep learning by practitioners brought unintended consequences in many situations such as in the infamous case of Google Photos' racist image recognition algorithm; thus, necessitated the utilization of the quantified uncertainty for each prediction. There have been recent efforts towards quantifying uncertainty in conventional deep learning methods (e.g., dropout as Bayesian approximation); however, their optimal use in decision making is often overlooked and understudied. Thus, I present a mixed-integer programming framework for selective classification called MIPSC, that investigates and combines model uncertainty and predictive mean to identify optimal classification and rejection regions. I also extend this framework to cost-sensitive settings (MIPCSC) and focus on the critical real-world problem, online fraud management and show that my approach outperforms industry standard methods significantly for online fraud management in real-world settings.
ContributorsYildirim, Mehmet Yigit (Author) / Davulcu, Hasan (Thesis advisor) / Bakkaloglu, Bertan (Committee member) / Huang, Dijiang (Committee member) / Hsiao, Ihan (Committee member) / Arizona State University (Publisher)
Created2019
168504-Thumbnail Image.png
Description
Realizing the applications of Internet of Things (IoT) with the goal of achieving a more efficient and automated world requires billions of connected smart devices and the minimization of hardware cost in these devices. As a result, many IoT devices do not have sufficient resources to support various protocols required

Realizing the applications of Internet of Things (IoT) with the goal of achieving a more efficient and automated world requires billions of connected smart devices and the minimization of hardware cost in these devices. As a result, many IoT devices do not have sufficient resources to support various protocols required in many IoT applications. Because of this, new protocols have been introduced to support the integration of these devices. One of these protocols is the increasingly popular routing protocol for low-power and lossy networks (RPL). However, this protocol is well known to attract blackhole and sinkhole attacks and cause serious difficulties when using more computationally intensive techniques to protect against these attacks, such as intrusion detection systems and rank authentication schemes. In this paper, an effective approach is presented to protect RPL networks against blackhole attacks. The approach does not address sinkhole attacks because they cause low damage and are often used along blackhole attacks and can be detected when blackhole attaches are detected. This approach uses the feature of multiple parents per node and a parent evaluation system enabling nodes to select more reliable routes. Simulations have been conducted, compared to existing approaches this approach would provide better protection against blackhole attacks with much lower overheads for small RPL networks.
ContributorsSanders, Kent (Author) / Yau, Stephen S (Thesis advisor) / Huang, Dijiang (Committee member) / Sen, Arunabha (Committee member) / Arizona State University (Publisher)
Created2021
168684-Thumbnail Image.png
Description本文对中国制药企业并购溢价影响因素进行了研究,提出了对制药企业并购非常重要的两个新的影响因素:可生产药品批文和在研新药批文。本文以2011年1月—2019年12月间我国制药行业上市公司并购事件为样本,对在研新药和可生产药品批文的价值从四个维度度量:是否有在研新药和可生产药品批文;在研新药数量及可生产药品批文数量;根据创新药和仿制药两个类别进行细分;标的企业所拥有的在研新药和可生产药品批文的市场价值。论文发现药品批文对企业并购溢价的影响不是很显著。进一步的,本文探究了药品批文对主并企业的对被并购公司的估值的影响。实证结果表明,我国制药企业在并购估值时确实会考虑到在研新药和可生产药品批文的价值。本文还发现对于可生产药品来说,相对创新药,被并购公司持有的仿制药批文影响更显著。而对于在研新药来说,主并企业更看重在研的创新药,在研仿制药对并购估值的影响不大。最后,本文选取了两个代表性案例进一步分析和探讨药品批文对企业并购的影响。
ContributorsYe, Tao (Author) / Shen, Wei (Thesis advisor) / Chang, Chun (Thesis advisor) / Jiang, Zhan (Committee member) / Gu, Bin (Committee member) / Arizona State University (Publisher)
Created2022
168670-Thumbnail Image.png
Description汽车行业属于国家支柱型产业,创造了高额的产值,增加了就业岗位。随着汽车生产行业竞争日趋激烈的趋势影响,汽车经销商在未来会出现明显的分化,并且逐步向头部集中。基于这样的行业背景,本项研究开展汽车经销商整体经营和盈利能力等方面的详细深入分析,即系统整合汽车经销商业务运营层面和财务层面数据,结合统计研究方法,对经销商盈利能力进行系统且详实归因分析,从而试别驱动盈利能力的关键业务要素。其研究成果能够完善对行业发展规律和经营模式系统性理解,从而进一步指导该领域的相关业务实践,提高经销商整体经营业绩。本课题通过四个阶段来开展经销商整体经营与盈利归因的相关研究。首先,本课题梳理了中国汽车消费行业发展的历史,同时阐述样本期内(2018-2020年)国内宏观经济和汽车消费市场的特征进行,并介绍X品牌汽车经销商的地理分布、资质和业绩评级体系、自身经营特征以及汽车生产商对经销商扶持政策等方面。在第二阶段,本课题聚焦研究假设、模型与方法,通过对X品牌汽车经销商的业务结构和运营管理开展分析,并逐步识别影响经销商盈利的关键指标变量,并提出研究假设和相关模型(即时间序列模型和面板回归模型)。在第三阶段,本课题首先开展经销商相关信息整体性统计分析,获得关键业务指标在样本期内动态特征,并结合时间序列回归模型探讨各项业务指标对经销商整体盈利能力的影响程度。在第四阶段,本课题采用(个体)固定效应的面板回归模型来研究不同组别(控制)条件下经销商盈利能力的影响因素以及其盈利能力对这些因素的敏感程度,从而更深入和全面地揭示影响经销商盈利能力的潜在因素。 基于上述四阶段的研究结果,本研究进一步就提升经销商盈利能力展开讨论,并提出相应对策。本课题相关结论仅从X品牌汽车经销商经营和财务数据进行定性和定量分析获得,但衷心希望本研究的成果能够对汽车经销商改善经营业务方面能起到实践上的借鉴和指导意义。
ContributorsPan, Guangxiong (Author) / Shen, Wei (Thesis advisor) / Wu, Fei (Thesis advisor) / Zhu, Qigui (Committee member) / Arizona State University (Publisher)
Created2022