Matching Items (145)
150953-Thumbnail Image.png
Description
Cognitive Radios (CR) are designed to dynamically reconfigure their transmission and/or reception parameters to utilize the bandwidth efficiently. With a rapidly fluctuating radio environment, spectrum management becomes crucial for cognitive radios. In a Cognitive Radio Ad Hoc Network (CRAHN) setting, the sensing and transmission times of the cognitive radio play

Cognitive Radios (CR) are designed to dynamically reconfigure their transmission and/or reception parameters to utilize the bandwidth efficiently. With a rapidly fluctuating radio environment, spectrum management becomes crucial for cognitive radios. In a Cognitive Radio Ad Hoc Network (CRAHN) setting, the sensing and transmission times of the cognitive radio play a more important role because of the decentralized nature of the network. They have a direct impact on the throughput. Due to the tradeoff between throughput and the sensing time, finding optimal values for sensing time and transmission time is difficult. In this thesis, a method is proposed to improve the throughput of a CRAHN by dynamically changing the sensing and transmission times. To simulate the CRAHN setting, ns-2, the network simulator with an extension for CRAHN is used. The CRAHN extension module implements the required Primary User (PU) and Secondary User (SU) and other CR functionalities to simulate a realistic CRAHN scenario. First, this work presents a detailed analysis of various CR parameters, their interactions, their individual contributions to the throughput to understand how they affect the transmissions in the network. Based on the results of this analysis, changes to the system model in the CRAHN extension are proposed. Instantaneous throughput of the network is introduced in the new model, which helps to determine how the parameters should adapt based on the current throughput. Along with instantaneous throughput, checks are done for interference with the PUs and their transmission power, before modifying these CR parameters. Simulation results demonstrate that the throughput of the CRAHN with the adaptive sensing and transmission times is significantly higher as compared to that of non-adaptive parameters.
ContributorsBapat, Namrata Arun (Author) / Syrotiuk, Violet R. (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Xue, Guoliang (Committee member) / Arizona State University (Publisher)
Created2012
150831-Thumbnail Image.png
Description
With a recent shift to a more environmentally conscious society, low-carbon and non-carbon producing energy production methods are being investigated and applied all over the world. Of these methods, fuel cells show great potential for clean energy production. A fuel cell is an electrochemical energy conversion device which directly converts

With a recent shift to a more environmentally conscious society, low-carbon and non-carbon producing energy production methods are being investigated and applied all over the world. Of these methods, fuel cells show great potential for clean energy production. A fuel cell is an electrochemical energy conversion device which directly converts chemical energy into electrical energy. Proton exchange membrane fuel cells (PEMFCs) are a highly researched energy source for automotive and stationary power applications. In order to produce the power required to meet Department of Energy requirements, platinum (Pt) must be used as a catalyst material in PEMFCs. Platinum, however, is very expensive and extensive research is being conducted to develop ways to reduce the amount of platinum used in PEMFCs. In the current study, three catalyst synthesis techniques were investigated and evaluated on their effectiveness to produce platinum-on copper (Pt@Cu) core-shell nanocatalyst on multi-walled carbon nanotube (MWCNT) support material. These three methods were direct deposition method, two-phase surfactant method, and single-phase surfactant method, in which direct deposition did not use a surfactant for particle size control and the surfactant methods did. The catalyst materials synthesized were evaluated by visual inspection and fuel cell performance. Samples which produced high fuel cell power output were evaluated using transmission electron microscopy (TEM) imaging. After evaluation, it was concluded that the direct deposition technique was effective in synthesizing Pt@Cu core-shell nanocatalyst on MWCNTs support when a rinsing process was used before adding platinum. The peak power density achieved by the rinsed core-shell catalyst was 618 mW.cm-2 , 13 percent greater than that of commercial platinum-carbon (Pt/C) catalyst. Transmission electron microscopy imaging revealed the core-shell catalyst contained Pt shells and platinum-copper alloy cores. Rinsing with deionized (DI) water was shown to be a crucial step in core-shell catalyst deposition as it reduced the number of platinum colloids on the carbon nanotube surface. After evaluation, it was concluded that the two-phase surfactant and single-phase surfactant synthesis methods were not effective at producing core-shell nanocatalyst with the parameters investigated.
ContributorsAdame, Anthony (Author) / Madakannan, Arunachalanadar (Thesis advisor) / Peng, Xihong (Committee member) / Tamizhmani, Govindasamy (Committee member) / Arizona State University (Publisher)
Created2012
150987-Thumbnail Image.png
Description
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned

In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned and operated by third-party service providers, there are risks of unauthorized use of the users' sensitive data by service providers. Although there are many techniques for protecting users' data from outside attackers, currently there is no effective way to protect users' sensitive data from service providers. In this dissertation, an approach is presented to protecting the confidentiality of users' data from service providers, and ensuring that service providers cannot collect users' confidential data while the data is processed or stored in cloud computing systems. The approach has four major features: (1) separation of software service providers and infrastructure service providers, (2) hiding the information of the owners of data, (3) data obfuscation, and (4) software module decomposition and distributed execution. Since the approach to protecting users' data confidentiality includes software module decomposition and distributed execution, it is very important to effectively allocate the resource of servers in SBS to each of the software module to manage the overall performance of workflows in SBS. An approach is presented to resource allocation for SBS to adaptively allocating the system resources of servers to their software modules in runtime in order to satisfy the performance requirements of multiple workflows in SBS. Experimental results show that the dynamic resource allocation approach can substantially increase the throughput of a SBS and the optimal resource allocation can be found in polynomial time
ContributorsAn, Ho Geun (Author) / Yau, Sik-Sang (Thesis advisor) / Huang, Dijiang (Committee member) / Ahn, Gail-Joon (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2012
151054-Thumbnail Image.png
Description
Gas diffusion layers (GDLs) are a critical and essential part of proton exchange membrane fuel cells (PEMFCs). They carry out various important functions such as transportation of reactants to and from the reaction sites. The material properties and structural characteristics of the substrate and the microporous layer strongly influence fuel

Gas diffusion layers (GDLs) are a critical and essential part of proton exchange membrane fuel cells (PEMFCs). They carry out various important functions such as transportation of reactants to and from the reaction sites. The material properties and structural characteristics of the substrate and the microporous layer strongly influence fuel cell performance. The microporous layer of the GDLs was fabricated with the carbon slurry dispersed in water containing ammonium lauryl sulfate (ALS) using the wire rod coating method. GDLs were fabricated with different materials to compose the microporous layer and evaluated the effects on PEMFC power output performance. The consistency of the carbon slurry was achieved by adding 25 wt. % of PTFE, a binding agent with a 75:25 ratio of carbon (Pureblack and vapor grown carbon fiber). The GDLs were investigated in PEMFC under various relative humidity (RH) conditions using H2/O2 and H2/Air. GDLs were also fabricated with the carbon slurry dispersed in water containing sodium dodecyl sulfate (SDS) and multiwalled carbon nanotubes (MWCNTs) with isopropyl alcohol (IPA) based for fuel cell performance comparison. MWCNTs and SDS exhibits the highest performance at 60% and 70% RH with a peak power density of 1100 mW.cm-2 and 850 mW.cm-2 using air and oxygen as an oxidant. This means that the gas diffusion characteristics of these two samples were optimum at 60 and 70 % RH with high limiting current density range. It was also found that the composition of the carbon slurry, specifically ALS concentration has the highest peak power density of 1300 and 500mW.cm-2 for both H2/O2 and H2/Air at 100% RH. However, SDS and MWCNTs demonstrates the lowest power density using air and oxygen as an oxidants at 100% RH.
ContributorsVillacorta, Rashida (Author) / Madakannan, Arunachalanadar (Thesis advisor) / Peng, Xihong (Committee member) / Tamizhmani, Govindasamy (Committee member) / Arizona State University (Publisher)
Created2012
150825-Thumbnail Image.png
Description
Low temperature fuel cells are very attractive energy conversion technology for automotive applications due to their qualities of being clean, quiet, efficient and good peak power densities. However, due to high cost and limited durability and reliability, commercialization of this technology has not been possible as yet. The high fuel

Low temperature fuel cells are very attractive energy conversion technology for automotive applications due to their qualities of being clean, quiet, efficient and good peak power densities. However, due to high cost and limited durability and reliability, commercialization of this technology has not been possible as yet. The high fuel cell cost is mostly due to the expensive noble catalyst Pt. Alkaline fuel cell (AFC) systems, have potential to make use of non-noble catalysts and thus, provides with a solution of overall lower cost. Therefore, this issue has been addressed in this thesis work. Hydrogen-oxygen fuel cells using an alkaline anion exchange membrane were prepared and evaluated. Various non-platinum catalyst materials were investigated by fabricating membrane-electrode assemblies (MEAs) using Tokuyama membrane (# A201) and compared with commercial noble metal catalysts. Co and Fe phthalocyanine catalyst materials were synthesized using multi-walled carbon nanotubes (MWCNTs) as support materials. X-ray photoelectron spectroscopic study was conducted in order to examine the surface composition. The electroreduction of oxygen has been investigated on Fe phthalocyanine/MWCNT, Co phthalocyanine/MWCNT and commercial Pt/C catalysts. The oxygen reduction reaction kinetics on these catalyst materials were evaluated using rotating disk electrodes in 0.1 M KOH solution and the current density values were consistently higher for Co phthalocyanine based electrodes compared to Fe phthalocyanine. The fuel cell performance of the MEAs with Co and Fe phthalocyanines and Tanaka Kikinzoku Kogyo Pt/C cathode catalysts were 100, 60 and 120 mW cm-2 using H22 and O2 gases. This thesis also includes work on synthesizing nitrogen doped MWCNTs using post-doping and In-Situ methods. Post-doped N-MWNCTs were prepared through heat treatment with NH4OH as nitrogen source. Characterization was done through fuel cell testing, which gave peak power density ~40mW.cm-2. For In-Situ N-MWCT, pyridine was used as nitrogen source. The sample characterization was done using Raman spectroscopy and RBS, which showed the presence ~3 at.% of nitrogen on the carbon surface.
ContributorsShah, QuratulAin Jawed (Author) / Madakannan, Arunachalanadar (Thesis advisor) / Tamizhmani, Govindasamy (Committee member) / Macia, Narciso (Committee member) / Arizona State University (Publisher)
Created2012
150827-Thumbnail Image.png
Description
In modern healthcare environments, there is a strong need to create an infrastructure that reduces time-consuming efforts and costly operations to obtain a patient's complete medical record and uniformly integrates this heterogeneous collection of medical data to deliver it to the healthcare professionals. As a result, healthcare providers are more

In modern healthcare environments, there is a strong need to create an infrastructure that reduces time-consuming efforts and costly operations to obtain a patient's complete medical record and uniformly integrates this heterogeneous collection of medical data to deliver it to the healthcare professionals. As a result, healthcare providers are more willing to shift their electronic medical record (EMR) systems to clouds that can remove the geographical distance barriers among providers and patient. Even though cloud-based EMRs have received considerable attention since it would help achieve lower operational cost and better interoperability with other healthcare providers, the adoption of security-aware cloud systems has become an extremely important prerequisite for bringing interoperability and efficient management to the healthcare industry. Since a shared electronic health record (EHR) essentially represents a virtualized aggregation of distributed clinical records from multiple healthcare providers, sharing of such integrated EHRs may comply with various authorization policies from these data providers. In this work, we focus on the authorized and selective sharing of EHRs among several parties with different duties and objectives that satisfies access control and compliance issues in healthcare cloud computing environments. We present a secure medical data sharing framework to support selective sharing of composite EHRs aggregated from various healthcare providers and compliance of HIPAA regulations. Our approach also ensures that privacy concerns need to be accommodated for processing access requests to patients' healthcare information. To realize our proposed approach, we design and implement a cloud-based EHRs sharing system. In addition, we describe case studies and evaluation results to demonstrate the effectiveness and efficiency of our approach.
ContributorsWu, Ruoyu (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2012
151152-Thumbnail Image.png
Description
Access control is one of the most fundamental security mechanisms used in the design and management of modern information systems. However, there still exists an open question on how formal access control models can be automatically analyzed and fully realized in secure system development. Furthermore, specifying and managing access control

Access control is one of the most fundamental security mechanisms used in the design and management of modern information systems. However, there still exists an open question on how formal access control models can be automatically analyzed and fully realized in secure system development. Furthermore, specifying and managing access control policies are often error-prone due to the lack of effective analysis mechanisms and tools. In this dissertation, I present an Assurance Management Framework (AMF) that is designed to cope with various assurance management requirements from both access control system development and policy-based computing. On one hand, the AMF framework facilitates comprehensive analysis and thorough realization of formal access control models in secure system development. I demonstrate how this method can be applied to build role-based access control systems by adopting the NIST/ANSI RBAC standard as an underlying security model. On the other hand, the AMF framework ensures the correctness of access control policies in policy-based computing through automated reasoning techniques and anomaly management mechanisms. A systematic method is presented to formulate XACML in Answer Set Programming (ASP) that allows users to leverage off-the-shelf ASP solvers for a variety of analysis services. In addition, I introduce a novel anomaly management mechanism, along with a grid-based visualization approach, which enables systematic and effective detection and resolution of policy anomalies. I further evaluate the AMF framework through modeling and analyzing multiparty access control in Online Social Networks (OSNs). A MultiParty Access Control (MPAC) model is formulated to capture the essence of multiparty authorization requirements in OSNs. In particular, I show how AMF can be applied to OSNs for identifying and resolving privacy conflicts, and representing and reasoning about MPAC model and policy. To demonstrate the feasibility of the proposed methodology, a suite of proof-of-concept prototype systems is implemented as well.
ContributorsHu, Hongxin (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Dasgupta, Partha (Committee member) / Ye, Nong (Committee member) / Arizona State University (Publisher)
Created2012
136523-Thumbnail Image.png
Description
Cyber threats are growing in number and sophistication making it important to continually study and improve all dimensions of digital forensics. Teamwork in forensic analysis has been overlooked in systems even though forensics relies on collaboration. Forensic analysis lacks a system that is flexible and available on different electronic devices

Cyber threats are growing in number and sophistication making it important to continually study and improve all dimensions of digital forensics. Teamwork in forensic analysis has been overlooked in systems even though forensics relies on collaboration. Forensic analysis lacks a system that is flexible and available on different electronic devices which are being used and incorporated into everyday life. For instance, cellphones or tablets that are easy to bring on-the-go to sites where the first steps of forensic analysis is done. Due to the present day conversion to online accessibility, most electronic devices connect to the internet. Squeegee is a proof of concept that forensic analysis can be done on the web. The forensic analysis expansion to the web opens many doors to collaboration and accessibility.
ContributorsJuntiff, Samantha Maria (Author) / Ahn, Gail-Joon (Thesis director) / Kashiwagi, Jacob (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2015-05
135758-Thumbnail Image.png
Description
Food safety is vital to the well-being of society; therefore, it is important to inspect food products to ensure minimal health risks are present. A crucial phase of food inspection is the identification of foreign particles found in the sample, such as insect body parts. The presence of certain species

Food safety is vital to the well-being of society; therefore, it is important to inspect food products to ensure minimal health risks are present. A crucial phase of food inspection is the identification of foreign particles found in the sample, such as insect body parts. The presence of certain species of insects, especially storage beetles, is a reliable indicator of possible contamination during storage and food processing. However, the current approach to identifying species is visual examination by human analysts; this method is rather subjective and time-consuming. Furthermore, confident identification requires extensive experience and training. To aid this inspection process, we have developed in collaboration with FDA analysts some image analysis-based machine intelligence to achieve species identification with up to 90% accuracy. The current project is a continuation of this development effort. Here we present an image analysis environment that allows practical deployment of the machine intelligence on computers with limited processing power and memory. Using this environment, users can prepare input sets by selecting images for analysis, and inspect these images through the integrated pan, zoom, and color analysis capabilities. After species analysis, the results panel allows the user to compare the analyzed images with referenced images of the proposed species. Further additions to this environment should include a log of previously analyzed images, and eventually extend to interaction with a central cloud repository of images through a web-based interface. Additional issues to address include standardization of image layout, extension of the feature-extraction algorithm, and utilizing image classification to build a central search engine for widespread usage.
ContributorsMartin, Daniel Luis (Author) / Ahn, Gail-Joon (Thesis director) / Doupé, Adam (Committee member) / Xu, Joshua (Committee member) / Computer Science and Engineering Program (Contributor) / Department of Finance (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
137152-Thumbnail Image.png
Description
Radio Frequency Identification (RFID) technology allows objects to be identified electronically by way of a small electronic tag. RFID is quickly becoming quite popular, and there are many security hurdles for this technology to overcome. The iCLASS line of RFID, produced by HID Global, is one such technology that is

Radio Frequency Identification (RFID) technology allows objects to be identified electronically by way of a small electronic tag. RFID is quickly becoming quite popular, and there are many security hurdles for this technology to overcome. The iCLASS line of RFID, produced by HID Global, is one such technology that is widely used for secure access control and applications where a contactless authentication element is desirable. Unfortunately, iCLASS has been shown to have security issues. Nevertheless customers continue to use it because of the great cost that would be required to completely replace it. This Honors Thesis will address attacks against iCLASS and means for countering them that do not require such an overhaul.
ContributorsMellott, Matthew John (Author) / Ahn, Gail-Joon (Thesis director) / Thorstenson, Tina (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2014-05