Matching Items (193)
151006-Thumbnail Image.png
Description
The Open Services Gateway initiative (OSGi) framework is a standard of module system and service platform that implements a complete and dynamic component model. Currently most of OSGi implementations are implemented by Java, which has similarities of Android language. With the emergence of Android operating system, due to the similarities

The Open Services Gateway initiative (OSGi) framework is a standard of module system and service platform that implements a complete and dynamic component model. Currently most of OSGi implementations are implemented by Java, which has similarities of Android language. With the emergence of Android operating system, due to the similarities between Java and Android, the integration of module system and service platform from OSGi to Android system attracts more and more attention. How to make OSGi run in Android is a hot topic, further, how to find a mechanism to enable communication between OSGi and Android system is a more advanced area than simply making OSGi running in Android. This paper, which aimed to fulfill SOA (Service Oriented Architecture) and CBA (Component Based Architecture), proposed a solution on integrating Felix OSGi platform with Android system in order to build up Distributed OSGi framework between mobile phones upon XMPP protocol. And in this paper, it not only successfully makes OSGi run on Android, but also invents a mechanism that makes a seamless collaboration between these two platforms.
ContributorsDong, Xinyi (Author) / Huang, Dijiang (Thesis advisor) / Dasgupta, Partha (Committee member) / Chen, Yinong (Committee member) / Arizona State University (Publisher)
Created2012
150827-Thumbnail Image.png
Description
In modern healthcare environments, there is a strong need to create an infrastructure that reduces time-consuming efforts and costly operations to obtain a patient's complete medical record and uniformly integrates this heterogeneous collection of medical data to deliver it to the healthcare professionals. As a result, healthcare providers are more

In modern healthcare environments, there is a strong need to create an infrastructure that reduces time-consuming efforts and costly operations to obtain a patient's complete medical record and uniformly integrates this heterogeneous collection of medical data to deliver it to the healthcare professionals. As a result, healthcare providers are more willing to shift their electronic medical record (EMR) systems to clouds that can remove the geographical distance barriers among providers and patient. Even though cloud-based EMRs have received considerable attention since it would help achieve lower operational cost and better interoperability with other healthcare providers, the adoption of security-aware cloud systems has become an extremely important prerequisite for bringing interoperability and efficient management to the healthcare industry. Since a shared electronic health record (EHR) essentially represents a virtualized aggregation of distributed clinical records from multiple healthcare providers, sharing of such integrated EHRs may comply with various authorization policies from these data providers. In this work, we focus on the authorized and selective sharing of EHRs among several parties with different duties and objectives that satisfies access control and compliance issues in healthcare cloud computing environments. We present a secure medical data sharing framework to support selective sharing of composite EHRs aggregated from various healthcare providers and compliance of HIPAA regulations. Our approach also ensures that privacy concerns need to be accommodated for processing access requests to patients' healthcare information. To realize our proposed approach, we design and implement a cloud-based EHRs sharing system. In addition, we describe case studies and evaluation results to demonstrate the effectiveness and efficiency of our approach.
ContributorsWu, Ruoyu (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2012
149360-Thumbnail Image.png
Description
Cloud computing systems fundamentally provide access to large pools of data and computational resources through a variety of interfaces similar in spirit to existing grid and HPC resource management and programming systems. These types of systems offer a new programming target for scalable application developers and have gained popularity over

Cloud computing systems fundamentally provide access to large pools of data and computational resources through a variety of interfaces similar in spirit to existing grid and HPC resource management and programming systems. These types of systems offer a new programming target for scalable application developers and have gained popularity over the past few years. However, most cloud computing systems in operation today are proprietary and rely upon infrastructure that is invisible to the research community, or are not explicitly designed to be instrumented and modified by systems researchers. In this research, Xen Server Management API is employed to build a framework for cloud computing that implements what is commonly referred to as Infrastructure as a Service (IaaS); systems that give users the ability to run and control entire virtual machine instances deployed across a variety physical resources. The goal of this research is to develop a cloud based resource and service sharing platform for Computer network security education a.k.a Virtual Lab.
ContributorsKadne, Aniruddha (Author) / Huang, Dijiang (Thesis advisor) / Tsai, Wei-Tek (Committee member) / Ahn, Gail-Joon (Committee member) / Arizona State University (Publisher)
Created2010
149382-Thumbnail Image.png
Description
Today, many wireless networks are single-channel systems. However, as the interest in wireless services increases, the contention by nodes to occupy the medium is more intense and interference worsens. One direction with the potential to increase system throughput is multi-channel systems. Multi-channel systems have been shown to reduce collisions and

Today, many wireless networks are single-channel systems. However, as the interest in wireless services increases, the contention by nodes to occupy the medium is more intense and interference worsens. One direction with the potential to increase system throughput is multi-channel systems. Multi-channel systems have been shown to reduce collisions and increase concurrency thus producing better bandwidth usage. However, the well-known hidden- and exposed-terminal problems inherited from single-channel systems remain, and a new channel selection problem is introduced. In this dissertation, Multi-channel medium access control (MAC) protocols are proposed for mobile ad hoc networks (MANETs) for nodes equipped with a single half-duplex transceiver, using more sophisticated physical layer technologies. These include code division multiple access (CDMA), orthogonal frequency division multiple access (OFDMA), and diversity. CDMA increases channel reuse, while OFDMA enables communication by multiple users in parallel. There is a challenge to using each technology in MANETs, where there is no fixed infrastructure or centralized control. CDMA suffers from the near-far problem, while OFDMA requires channel synchronization to decode the signal. As a result CDMA and OFDMA are not yet widely used. Cooperative (diversity) mechanisms provide vital information to facilitate communication set-up between source-destination node pairs and help overcome limitations of physical layer technologies in MANETs. In this dissertation, the Cooperative CDMA-based Multi-channel MAC (CCM-MAC) protocol uses CDMA to enable concurrent transmissions on each channel. The Power-controlled CDMA-based Multi-channel MAC (PCC-MAC) protocol uses transmission power control at each node and mitigates collisions of control packets on the control channel by using different sizes of the spreading factor to have different processing gains for the control signals. The Cooperative Dual-access Multi-channel MAC (CDM-MAC) protocol combines the use of OFDMA and CDMA and minimizes channel interference by a resolvable balanced incomplete block design (BIBD). In each protocol, cooperating nodes help reduce the incidence of the multi-channel hidden- and exposed-terminal and help address the near-far problem of CDMA by supplying information. Simulation results show that each of the proposed protocols achieve significantly better system performance when compared to IEEE 802.11, other multi-channel protocols, and another protocol CDMA-based.
ContributorsMoon, Yuhan (Author) / Syrotiuk, Violet R. (Thesis advisor) / Huang, Dijiang (Committee member) / Reisslein, Martin (Committee member) / Sen, Arunabha (Committee member) / Arizona State University (Publisher)
Created2010
131002-Thumbnail Image.png
Description
This thesis presents a process by which a controller used for collective transport tasks is qualitatively studied and probed for presence of undesirable equilibrium states that could entrap the system and prevent it from converging to a target state. Fields of study relevant to this project include dynamic system modeling,

This thesis presents a process by which a controller used for collective transport tasks is qualitatively studied and probed for presence of undesirable equilibrium states that could entrap the system and prevent it from converging to a target state. Fields of study relevant to this project include dynamic system modeling, modern control theory, script-based system simulation, and autonomous systems design. Simulation and computational software MATLAB and Simulink® were used in this thesis.
To achieve this goal, a model of a swarm performing a collective transport task in a bounded domain featuring convex obstacles was simulated in MATLAB/ Simulink®. The closed-loop dynamic equations of this model were linearized about an equilibrium state with angular acceleration and linear acceleration set to zero. The simulation was run over 30 times to confirm system ability to successfully transport the payload to a goal point without colliding with obstacles and determine ideal operating conditions by testing various orientations of objects in the bounded domain. An additional purely MATLAB simulation was run to identify local minima of the Hessian of the navigation-like potential function. By calculating this Hessian periodically throughout the system’s progress and determining the signs of its eigenvalues, a system could check whether it is trapped in a local minimum, and potentially dislodge itself through implementation of a stochastic term in the robot controllers. The eigenvalues of the Hessian calculated in this research suggested the model local minima were degenerate, indicating an error in the mathematical model for this system, which likely incurred during linearization of this highly nonlinear system.
Created2020-12
131884-Thumbnail Image.png
Description
As automation research into penetration testing has developed, several methods have been proposed as suitable control mechanisms for use in pentesting frameworks. These include Markov Decision Processes (MDPs), partially observable Markov Decision Processes (POMDPs), and POMDPs utilizing reinforcement learning. Since much work has been done automating other aspects of the

As automation research into penetration testing has developed, several methods have been proposed as suitable control mechanisms for use in pentesting frameworks. These include Markov Decision Processes (MDPs), partially observable Markov Decision Processes (POMDPs), and POMDPs utilizing reinforcement learning. Since much work has been done automating other aspects of the pentesting process using exploit frameworks and scanning tools, this is the next focal point in this field. This paper shows a fully-integrated solution comprised of a POMDP-based planning algorithm, the Nessus scanning utility, and MITRE's CALDERA pentesting platform. These are linked in order to create an autonomous AI attack platform with scanning, planning, and attack capabilities.
ContributorsDejarnett, Eric Andrew (Author) / Huang, Dijiang (Thesis director) / Chowdhary, Ankur (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131892-Thumbnail Image.png
Description
Vulnerability testing/evaluation is a regular task for cyber-security groups. Conducting tasks like this can take up a great amount of time and may not be perfect. Automating these tasks helps speed up the rate at which experts can test systems. However, script based or static programs that run automatically often

Vulnerability testing/evaluation is a regular task for cyber-security groups. Conducting tasks like this can take up a great amount of time and may not be perfect. Automating these tasks helps speed up the rate at which experts can test systems. However, script based or static programs that run automatically often do not have the versatility required to properly replace human analysis. With the advances in Artificial Intelligence and Machine Learning, a utility can be developed that would allow for the creation of penetration testing plans rather than manually testing vulnerabilities. A variety of existing cyber-security programs and utilities provide an API layer that commonly interacts with the Python environment. With the commonality of AI/ML tools within the Python ecosystem, a plugin like interface can be developed to feed any AI/ML program real world data and receive a response/report in return. Using Python 2.7+, Python 3.6+, pymdptoolbox, and POMDPy, a program was developed that ingests real-world data from scanning tools and returned a suggested course of action to be used by analysts in order to perform a practical validation of the algorithms in a real world setting. This program was able to successfully navigate a test network and produce results that were expected to be found on the target machines without needing human analysis of the network. Using POMDP based systems for more cyber-security type tasks may be a valuable use case for future developments and help ease the burden faced in a rapid paced world.
ContributorsBelanger, Connor Lawrence (Author) / Huang, Dijiang (Thesis director) / Chowdhary, Ankur (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131595-Thumbnail Image.png
Description
Chemoreception is an important method for an octopus to sense and react to its surroundings. However, the density of chemoreceptors within different areas of the skin of the octopus arm is poorly documented. In order to assess the relative sensitivity of various regions and the degree to which chemoreception is

Chemoreception is an important method for an octopus to sense and react to its surroundings. However, the density of chemoreceptors within different areas of the skin of the octopus arm is poorly documented. In order to assess the relative sensitivity of various regions and the degree to which chemoreception is locally controlled, octopus arms were amputated and exposed to acetic acid, a noxious chemical stimulus that has previously been shown to elicit movement responses in amputated arms (Hague et al., 2013). To test this, 11 wild-caught Octopus bimaculoides (6 females, 5 males) were obtained. Acetic acid vapor was introduced in the distal oral, distal aboral, proximal oral, and proximal aboral regions of amputated arms. The frequency of the occurrence of movement was first analyzed. For those trials in which movement occurred, the latency (delay between the stimulus and the onset of movement) and the duration of movement were analyzed. The distal aboral and distal oral regions were both more likely to move than either the proximal oral or proximal aboral regions (p < 0.0001), and when they did move, were more likely to move for longer periods of time (p < 0.05). In addition, the proximal oral region was more likely to exhibit a delay in the onset of movement compared to the distal oral or distal aboral regions (p < 0.0001). These findings provide evidence that the distal arm is most sensitive to noxious chemical stimuli. However, there were no significant differences between the distal oral and distal aboral regions, or between the proximal oral and proximal aboral regions. This suggests that there may not be a significant difference in the density of chemoreceptors in the aboral versus oral regions of the arm, contrary to claims in the literature. The other independent variables analyzed, including sex, body mass, arm length, anterior versus posterior arm identity, and left versus right arm identity, did not have a significant effect on any of the three dependent variables analyzed. Further analysis of the relative density of chemoreceptors in different regions of the octopus arm is merited.
ContributorsCasleton, Rachel Marie (Author) / Fisher, Rebecca (Thesis director) / Marvi, Hamidreza (Committee member) / Gire, David (Committee member) / School of International Letters and Cultures (Contributor) / School of Molecular Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
132543-Thumbnail Image.png
Description
Octopus arms employ a complex three dimensional array of musculature, called a
muscular hydrostat, which allows for nearly infinite degrees of freedom of movement without
the structure of a skeletal system. This study employed Magnetic Resonance Imaging with a
Gadoteridol-based contrast agent to image the octopus arm and view the internal tissues. Muscle
layering

Octopus arms employ a complex three dimensional array of musculature, called a
muscular hydrostat, which allows for nearly infinite degrees of freedom of movement without
the structure of a skeletal system. This study employed Magnetic Resonance Imaging with a
Gadoteridol-based contrast agent to image the octopus arm and view the internal tissues. Muscle
layering was mapped and area was measured using AMIRA image processing and the trends in
these layers at the proximal, middle, and distal portions of the arms were analyzed. A total of 39
arms from 6 specimens were scanned to give 112 total imaged sections (38 proximal, 37 middle,
37 distal), from which to ascertain and study the possible differences in musculature. The
images revealed significant increases in the internal longitudinal muscle layer percentages
between the proximal and middle, proximal and distal, and middle and distal sections of the
arms. These structural differences are hypothesized to be used for rapid retraction of the distal
segment when encountering predators or noxious stimuli. In contrast, a significant decrease in
the transverse muscle layer was found when comparing the same sections. These structural
differences are hypothesized to be a result of bending behaviors during retraction. Additionally,
the internal longitudinal layer was separately studied orally, toward the sucker, and aborally,
away from the sucker. The significant differences in oral and aboral internal longitudinal
musculature in proximal, middle, and distal sections is hypothesized to support the pseudo-joint
functionality displayed in octopus fetching behaviors. The results indicate that individual
octopus arm morphology is more unique than previously thought and supports that internal
structural differences exist to support behavioral functionality.
ContributorsCummings, Sheldon Daniel (Author) / Fisher, Rebecca (Thesis director) / Marvi, Hamidreza (Committee member) / Cherry, Brian (Committee member) / Harrington Bioengineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2019-05
132902-Thumbnail Image.png
Description
Characterization of particulate process and product design is a difficult field because of the unique bulk properties and behaviors of particles that differ from gasses and liquids. The purpose of this research is to develop an equation to relate the angle of repose and flowability, the ability of the particle

Characterization of particulate process and product design is a difficult field because of the unique bulk properties and behaviors of particles that differ from gasses and liquids. The purpose of this research is to develop an equation to relate the angle of repose and flowability, the ability of the particle to flow as it pertains to particulate processes and product design. This research is important in multiple industries such as pharmaceuticals and food processes.
ContributorsNugent, Emily Rose (Author) / Emady, Heather (Thesis director) / Marvi, Hamidreza (Committee member) / Materials Science and Engineering Program (Contributor) / Dean, W.P. Carey School of Business (Contributor) / Chemical Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2019-05