Now showing items 1-12 of 12

    • An Advanced context aware operator support system (CAOSS) for chemical plant operation 

      Alfred Retna Dhason, Sujin Babu (2018-05)
      Analyzing potential causes for recent industrial accidents and production losses highlights that the majority of these incidents are due to human factor failure: operator error, poor decision-making and violations ...
    • An Agile and Rapidly Reconfigurable Test Bed for Hardware-Based Security Features 

      Beard, Daniel Smith (2019-12)
      Current general-purpose computing hardware and the software that runs on it have evolved over more than a half century from large mainframe systems in corporate, military, and research use to interconnected commodity ...
    • A Comparison Study of Disease Spreading Models 

      Nogueira Oliveira, Douglas (2018-04)
      Epidemic diseases have become one of the major sources of concern in modern society. Diseases such as HIV and H1N1 have infected millions of people around the world. Many studies have attempted to describe the dynamics ...
    • Distributed Coordination for Autonomous Guided Vehicles in Multi-agent Systems with Shared Resources 

      Mahdavi, Atefeh (2018-05)
      The decentralized path planning technique proposed in this thesis solves major challenges in the domain of MAS. These challenges are trajectory planning and collision avoidance. Generally, in a shared infrastructure where ...
    • Effects of Virtualization in Database Benchmarking 

      Rathod, Jigarkumar Jayantibhai (2017-05)
      Many applications are being deployed on the cloud because virtualization provides inexpensive virtual machines which are easy to create and use. To perform benchmark in scale, one has to rely on virtualization. Virtualization ...
    • A Foundation for Cyber Experimentation 

      Stoner, Evan Lawrence (2015-05)
      Despite the variety of environments and tools available to computer scientists performing cyber experimentation, the community lacks a single cohesive platform that is capable of unifying these tools across environments ...
    • High Fidelity Adaptive Cyber Emulation 

      Mammadov, Samir (2017-05)
      While looking for a high-level adaptive traffic generation tool, we came to realize that no such tool exists that can be used for rapid development while being platform agnostic. Having reviewed a wide array of tools to ...
    • A Mixed-Reality Approach for Cyber-situation Awareness 

      Joshi, Tapas Dipakkumar (2017-12)
      As the proliferation and adoption of smart devices increase, there is an unprecedented amount of data being released into the network every second. Computer networks are the carriers for the movement of this ever generating ...
    • A Novel Approach to Containerize Existing Applications 

      Palan, Vineet Haresh (2018-06)
      Cloud computing has dominated the way different services are offered, utilized and managed over the internet. Typically, applications run inside the virtual machines in an isolated environment. However, there is always ...
    • On the Automation of Cyber Experimentation 

      Mehta, Dhanish (2018-06)
      There are a variety of tools available to users to perform cyber experimentation, and many of them automate some aspects of the experimentation lifecycle. However, they either support a minimal subset of the tools across ...
    • A Reinforcement Learning Approach to Autonomous Speed Control in Robotic Systems 

      Aghli, Nima (2017-05)
      Model-free reinforcement learning techniques have been successfully used in diverse robotic applications. In this thesis, we Implement the Q-learning algorithm as one of the most used model-free algorithms to find an ...
    • Standardizing the Requirements Specification of Multi-Agent Systems 

      Slhoub, Khaled Ali M (2018-07)
      Development of multi-agent systems is negatively impacted by the lack of process standardization across the major development phases, such as the requirements analysis phase. This issue creates a key ...