Dissertations / Theses on the topic 'Cyber Algorithm'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 24 dissertations / theses for your research on the topic 'Cyber Algorithm.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Thames, John Lane. "Advancing cyber security with a semantic path merger packet classification algorithm." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45872.
Full textChatterjee, Aakriti. "Development of an RSA Algorithm using Reduced RISC V instruction Set." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1617104502129937.
Full textRoychowdhury, Sayak. "Data-Driven Policies for Manufacturing Systems and Cyber Vulnerability Maintenance." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu1493905616531091.
Full textGuymon, Daniel Wade. "Cyber-physical Algorithms for Enhancing Collaboration." Thesis, Virginia Tech, 2012. http://hdl.handle.net/10919/31919.
Full textMaster of Science
Gujrati, Sumeet. "Models and algorithms for cyber-physical systems." Diss., Kansas State University, 2013. http://hdl.handle.net/2097/16922.
Full textDepartment of Computing and Information Sciences
Gurdip Singh
In this dissertation, we propose a cyber-physical system model, and based on this model, present algorithms for a set of distributed computing problems. Our model specifies a cyber-physical system as a combination of cyber-infrastructure, physical-infrastructure, and user behavior specification. The cyber-infrastructure is superimposed on the physical-infrastructure and continuously monitors its (physical-infrastructure's) changing state. Users operate in the physical-infrastructure and interact with the cyber-infrastructure using hand-held devices and sensors; and their behavior is specified in terms of actions they can perform (e.g., move, observe). While in traditional distributed systems, users interact solely via the underlying cyber-infrastructure, users in a cyber-physical system may interact directly with one another, access sensor data directly, and perform actions asynchronously with respect to the underlying cyber-infrastructure. These additional types of interactions have an impact on how distributed algorithms for cyber-physical systems are designed. We augment distributed mutual exclusion and predicate detection algorithms so that they can accommodate user behavior, interactions among them and the physical-infrastructure. The new algorithms have two components - one describing the behavior of the users in the physical-infrastructure and the other describing the algorithms in the cyber-infrastructure. Each combination of users' behavior and an algorithm in the cyber-infrastructure yields a different cyber-physical system algorithm. We have performed extensive simulation study of our algorithms using OMNeT++ simulation engine and Uppaal model checker. We also propose Cyber-Physical System Modeling Language (CPSML) to specify cyber-physical systems, and a centralized global state recording algorithm.
Furrer, Frank J., and Georg Püschel. "From Algorithmic Computing to Autonomic Computing." Technische Universität Dresden, 2018. https://tud.qucosa.de/id/qucosa%3A30773.
Full textKem, Oudom. "Modélisation et exploitation des connaissances de l’environnement : une approche multi-agents pour la recherche d’itinéraires multi-objectifs dans des environnements ubiquitaires." Thesis, Lyon, 2018. http://www.theses.fr/2018LYSEM023.
Full textFrom intelligent artificial personal assistants to smart cities, we are experiencing the shifting towards Internet of Things (IoT), ubiquitous computing, and artificial intelligence. Cyber-physical entities are embedded in social environments of various scales from smart homes, to smart airports, to smart cities, and the list continues.This paradigm shift coupled with ceaseless expansion of the Web supplies us with tremendous amount of useful information and services, which creates opportunities for classical problems to be addressed in new, different, and potentially more efficient manners. Along with the new possibilities, we are, at the same time, presented with new constraints, problems, and challenges. Multi-goal pathfinding, a variant of the classical pathfinding, is a problem of finding a path between a start and a destination which also allows a set of goals to be satisfied along the path. The aim of this dissertation is to propose a solution to solve multi-goal pathfinding in ubiquitous environments such as smart transits. In our solution, to provide an abstraction of the environment, we proposed a knowledge model based on the semantic web technologies to describe a ubiquitous environment integrating its cybernetic, physical, and social dimensions. To perform the search, we developed a multi-agent algorithm based on a collaborative and incremental search algorithm that exploits the knowledge of the environment to find the optimal path. The proposed algorithm continuously adapts the path to take into account the dynamics of the environment
Staub, Nicolas. "Models, algorithms and architectures for cooperative manipulation with aerial and ground robots." Thesis, Toulouse 3, 2018. http://www.theses.fr/2018TOU30169/document.
Full textIn recent years, the subject of physical interaction for aerial robots has been a popular research area with many new mechanical designs and control approaches being proposed. The aerial robotics community is currently observing a paradigm shift from classic guidance, navigation, and control tasks towards more unusual tasks, for example requesting aerial robots to physically interact with the environment, thus extending the manipulation task from the ground into the air. This thesis contributes to the field of aerial manipulation by proposing a novel concept known has Multiple Aerial-Ground Manipulator System or MAGMaS, including what appears to be the first experimental demonstration of a MAGMaS and opening a new route of research. The motivation behind associating ground and aerial robots for cooperative manipulation is to leverage their respective particularities, ground robots bring strength while aerial robots widen the workspace of the system. The first contribution of this work introduces a meticulous system model for MAGMaS. The system model's properties and potential extensions are discussed in this work. The planning, estimation and control methods which are necessary to exploit MAGMaS in a cooperative manipulation tasks are derived. This works proposes an optimal control allocation scheme to exploit the MAGMaS redundancies and a general model-based force estimation method is presented. All of the proposed techniques reported in this thesis are integrated in a global architecture used for simulations and experimental validation. This architecture is extended by the addition of a tele-presence framework to allow remote operations of MAGMaS. The global architecture is validated by robust demonstrations of bar lifting, an application that gives an outlook of the prospective use of the proposed concept of MAGMaS. Another contribution in the development of MAGMaS consists of an exploratory study on the flexibility of manipulated loads. A vibration model is derived and exploited to showcase vibration properties in terms of control. The last contribution of this thesis consists of an exploratory study on the use of elastic joints in aerial robots, endowing these systems with mechanical compliance and energy storage capabilities. Theoretical groundings are associated with a nonlinear controller synthesis. The proposed approach is validated by experimental work which relies on the integration of a lightweight variable stiffness actuator on an aerial robot
Markwood, Ian. "Offensive and Defensive Security for Everyday Computer Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7336.
Full textRukavina, Ivan. "Cyber-physics intrinsic modelling for smart systems." Thesis, Compiègne, 2021. http://bibliotheque.utc.fr/EXPLOITATION/doc/IFD/2021COMP2581.
Full textIn this thesis, a multi-scale and multi-physics coupling computation procedure for a 2D and 3D setting is presented. When modeling the behavior of a structure by a multi-scale method, the macro-scale is used to describe the homogenized response of the structure, and the micro-scale to describe the details of the behavior on the smaller scale of the material where some inelastic mechanisms, like damage or plasticity, can be taken into account. The micro-scale mesh is defined for each macro-scale element in a way to fit entirely inside it. The two scales are coupled by imposing a constraint on the displacement field over their interface. The computation is performed using the operator split solution procedure on both scales, using the standard finite element method. In a 2D setting, an embedded discontinuity is implemented in the Q4 macroscale element to capture the softening behavior happening on the micro-scale. For the micro-scale element, a constant strain triangle (CST) is used. In a 3D setting, a macro-scale tetrahedral and hexahedral elements are developed, while on the micro-scale Timoshenko beam finite elements are used. This multi-scale methodology is extended with a multi-physics functionality, to simulate the behavior of a piezoelectric material. An additional degree of freedom (voltage) is added on the nodes of the 3D macro-scale tetrahedral and hexahedral elements. For the micro-scale element, a Timoshenko beam element with added polarization switching model is used. Also, a multi-scale Hellinger- Reissner formulation for electrostatics has been developed and implemented for a simple electrostatic patch test. For implementing the proposed procedure, Finite Element Analysis Program (FEAP) is used. To simulate the behavior on both macro and micro-scale, FEAP is modified and two different version of FEAP code are implemented – macroFEAP and microFEAP. For coupling, the two codes are exchanging information between them, and Component Template Library (CTL) is used. The capabilities of the proposed multi-scale approach in a 2D and 3D pure mechanics settings, but also multi-physics environment have been shown. The theoretical formulation and algorithmic implementation are described, and the advantages of the multi-scale approach for modeling heterogeneous materials are shown on several numerical examples
Parizad, Ali. "False Data and Threat Detection Methods for Power Systems Under Cyber Attacks Based On Big Data and Deep Learning Algorithms." OpenSIUC, 2021. https://opensiuc.lib.siu.edu/dissertations/1941.
Full textHaj, kacem Mohamed Amine. "Contribution au développement d'une méthodologie de diagnostic des systèmes Cyber-Physique." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAT119.
Full textIndustrial systems cover many forms. Today, they are most often organized in networks. The new information and communication technologies provide a set of additional means to realize applications of major interest to strengthen the safe operation of these systems and the safety of people.Among these industrial systems, we can cite cyber-physical systems (CPS) characterized by a large number of variables, nonlinearities and uncertainties. Their decomposition into subsystems, making them more manageable and hierarchically organized, is fundamental. Each of the subsystems consists of different interconnected replaceable components that perform different functions.With this in mind, we propose a diagnostic approach based on four types of knowledge: functional, structural, topological and behavioral.This approach, which includes detection and localization, exploits the representation of different knowledge to detect and isolate the source of failure. In order to eliminate any ambiguity of location, the addition of a timed automat allows, thanks to a temporal analysis, to efficiently identify the defective component(s). The proposed multimodel approach is organized around three algorithms.Modeling and failure analysis is illustrated on a cyber-physical system: the "RobAIR" telepresence robot. The different knowledge models were established with an analysis approach as well as the construction of the diagnostician based on previously defined signaturesThe implementation of Matlab's Simulink / Stateflow isolation and detection algorithms made it possible to build the diagnoser according to the proposed methodology and thus validate our approach by simulating the operation with random injection of various failures.The proposed analysis method was applied to the RobaIR robot's start-up tests with particular attention to the displacement part. The testing of all the robot's functionalities is done by programming the Arduino board. For this application, the detection and isolation algorithms have been supplemented by obstacle detection and failure mode identification
Al, Khatib Mohammad. "Analyse de stabilité, ordonnancement, et synthèse des systèmes cyber-physiques." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM041/document.
Full textThis is a study conducted on cyber-physical systems on three main aspects: stability verification, scheduling, and parameter synthesis. Embedded control systems (ECS) acting under timing contracts are the considered class of cyber-physical systems in the thesis. ECS refers to integrations of a computing device with the physical system. As for timing contracts they are time constraints on the instants where some events happen such as sampling, actuation, and computation. These contracts are used to model issues that arise in modern embedded control systems: uncertain sampling to actuation delays, uncertain sampling periods, and interaction of several physical systems with shared computational resources (CPUs). Now given an ECS and a timing contract we reformulate the system into an impulsive one and verifies stability of the system, under all possible bounded uncertainties given by the contract, using safe convex approximation techniques and new generalized results for the problem on a class of systems modeled in the framework of difference inclusions. Second given a set of controllers implemented on a common computational platform (CPUs), each of which is subject to a timing contract, and best and worst case execution times on each CPU, we synthesize a dynamic scheduling policy, which guarantees that each timing contract is satisfied and that each of the shared CPUs are allocated to at most one embedded controller at any time. The approach is based on a timed game formulation that allows us to write the scheduling problem as a timed safety game. Then using the tool UPPAAL-TIGA, a solution to the safety game provides a suitable scheduling policy. In addition, we provide a novel necessary and sufficient condition for schedulability of the control tasks based on a simplified timed game automaton. Last, we solve a parameter synthesis problem which consists of synthesizing an under-approximation of the set of timing contracts that guarantee at the same time the schedulability and stability of the embedded controllers. The synthesis is based on a re-parameterization of the timing contract to make them monotonic, and then on a repeatedly sampling of the parameter space until reaching a predefined precision of approximation
Wei, Longfei. "Game-Theoretic and Machine-Learning Techniques for Cyber-Physical Security and Resilience in Smart Grid." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3850.
Full textPetersen, Rebecca. "Data Mining for Network Intrusion Detection : A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28002.
Full textGracy, Sebin. "Input and State Observability of Linear Network Systems with Application to Security of Cyber Physical Systems." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAT075/document.
Full textThis thesis deals with the notion of Input and State Observability (ISO) in linear network systems. One seeks graphical characterizations using the notion of structural (resp. s-structural) ISO. We first focus on linear time-invariant network systems ,represented by fixed graphs, and provide characterizations for strong structural ISO. Thereafter, we turn our attention to linear time-varying network systems wherein we first narrow our attention to the particular case of fixed graphs (i.e., the structure of the graph remains fixed; the weights along the edges are allowed to vary, thereby giving rise to time-varying dynamics). We show that, under suitable assumptions on the structure of input, output and feedthrough matrices, ISO of a system is equivalent to observability of a suitably defined subsystem. Subsequently, we exploit this equivalence to obtain graphical characterizations of structural (resp. s-structural) ISO.Thereafter, for the LTV setting, we consider the more general case of time-varying graphs and furthermore make no assumptions on the structure of system matrices. We introduce two suitable descriptions of the whole collection of graphs, which are named as dynamic graph and dynamic bipartite graph. Two equivalent characterizations of structural ISO are then stated in terms of existence of a linking and a matching of suitable size in the dynamic graph and in the dynamic bipartite graph, respectively. For strongly structural ISO, we provide a sufficient condition and a necessary condition, both concerning the existence of a uniquely restricted matching of suitable size in the dynamic bipartite graph and in a subgraph of it. When there is no direct feedthrough of the input on the measurements, the two conditions can be merged to give rise to a necessary and sufficient condition.Finally, we present an unbiased recursive algorithm that simultaneously estimates states and inputs. We focus on delay-$ell$ left invertible systems with intrinsic delay $ellgeq 1$, where the input reconstruction is possible only by using outputs up to $ell$ time steps later in the future. By showing an equivalence with a descriptor system, we state conditions under which the time-varying filter converges to a stationary stable filter, involving the solution of a discrete-time algebraic Riccati equation
Ujjwal, Kumar. "Cyber haggler web based bargaining using genetic algorithm /." 2007. http://purl.galileo.usg.edu/uga%5Fetd/ujjwal%5Fkumar%5F200705%5Fms.
Full textYang, Shun-Chieh, and 楊順傑. "A Discrete Cyber Swarm Algorithm with Intensification and Diversification Strategies." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/27775423616829818686.
Full text國立暨南國際大學
資訊管理學系
101
Metaheuristic technique is one of the important methods for solving optimization problems. Many related researches were proposed. Among them, hybrid algorithms combining advantageous features of multiple algorithms appear to be more significant for solving complex problems. Cyber Swarm Algorithm (CSA) is a hybrid algorithm and has been shown to be more effective than several state-of-the-art algorithms for the continuous optimization problem, such as PSO, SS, and GRASP. This paper proposes a discrete version of CSA (to be referred to as DCSA) by considering the distance definition, multistart, intensification and diversity strategies. The experimental results show that DCSA has good performance in solving the well-known quadratic assignment problem. The experimental results also showed that DCSA outperforms several existing methods for important benchmark single row facility layout problem instances.
CHAO, CHING-HUI, and 趙景暉. "Cyber Swarm Algorithm Based Multiple Prediction Methods for Taiwan Electricity Demand." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/80321751010797910367.
Full text國立暨南國際大學
資訊管理學系
104
Stable electricity supply is the basis of economic development for many countries. In order to satisfy the electric power demand of Taiwan's future economic development and environmental protection, new power plants using green energy must be developed, especial the potential solar and wind energy sources in off-island areas. Accurate electricity demand forecasting plays an important role in the economic dispatch of electricity system. This study develops three demand forecasting models based on the Cyber Swarm Algorithm (CSA) which inherits the main features from the particle swarm optimization algorithm. Because of its prevailing capability such as large searching range, few parameters, and fast convergence speed, the particle swarm optimization algorithm usually can quickly find a near optimal solution in the solution space. Moreover, CSA employs the search strategies introduced in reference set and path relinking in order to escape from the barrier of local optima. This study applies parametric and non-parametric regression models to process electricity demand data. Parametric models use important indicators for predicting electricity demand, while non-parametric models use Gauss functions to approximate historical data and shift the learned functions to predict future electricity demand. Finally, we propose a reinforcement learning model to integrate parametric and non-parametric models and obtain a better prediction result.
(8782601), Puwadol Dusadeerungsikul. "Operations Analytics and Optimization for Unstructured Systems: Cyber Collaborative Algorithms and Protocols for Agricultural Systems." Thesis, 2020.
Find full textFood security is a major concern of human civilization. A way to ensure food security is to grow plants in a greenhouse under controlled conditions. Even under careful greenhouse production, stress in plants can emerge, and can cause damaging disease. To prevent yield loss farmers, apply resources, e.g., water, fertilizers, pesticides, higher/lower humidity, lighting, and temperature, uniformly in the infected areas. Research, however, shows that the practice leads to non-optimal profit and environmental protection.
Precision agriculture (PA) is an approach to address such challenges. It aims to apply the right amount or recourses at the right time and place. PA has been able to maximize crop yield while minimizing operation cost and environmental damage. The problem is how to obtain timely, precise information at each location to optimally treat the plants. There is scant research addressing strategies, algorithms, and protocols for analytics in PA. A monitoring and treating systems are the foci of this dissertation.
The designed systems comprise of agent- and system-level protocols and algorithms. There are four parts: (1) Collaborative Control Protocol for Cyber-Physical System (CCP-CPS); (2) Collaborative Control Protocol for Early Detection of Stress in Plants (CCP-ED); (3) Optimal Inspection Profit for Precision Agriculture; and (4) Multi-Agent System Optimization in Greenhouse for Treating Plants. CCP-CPS, a backbone of the system, establishes communication line among agents. CCP-ED optimizes the local workflow and interactions of agents. Next, the Adaptive Search algorithm, a key algorithm in CCP-ED, has analyzed to obtain the optimal procedure. Lastly, when stressed plants are detected, specific agents are dispatched to treat plants in a particular location with specific treatment.
Experimental results show that collaboration among agents statistically and significantly improves performance in terms of cost, efficiency, and robustness. CCP-CPS stabilizes system operations and significantly improves both robustness and responsiveness. CCP-ED enabling collaboration among local agents, significantly improves the number of infected plants found, and system efficiency. Also, the optimal Adaptive Search algorithm, which considers system errors and plant characteristics, significantly reduces the operation cost while improving performance. Finally, with collaboration among agents, the system can effectively perform a complex task that requires multiple agents, such as treating stressed plants with a significantly lower operation cost compared to the current practice.
Zheng, Renda, and 鄭仁達. "A study for the implementation of discrete cyber swarm algorithms." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/44755480295420644635.
Full text國立暨南國際大學
資訊管理學系
99
Cyber Swarm Algorithm (CSA) combining Particle Swarm Optimization (PSO) and Scatter Search/Path relinking (SS/PR) concepts has been empirically shown to effectively solve continuous optimization problems. However, the extension to discrete optimization problems is still uncharted. This motivates the thesis for proposing a Discrete Cyber Swarm Algorithm (DCSA). In addition to the applications of PSO and SS/PR, DCSA also marries with techniques such as aging, solution guide selection, and uncertainty principle in the machine learning domain. Further, DCSA applies the Apriori algorithm in data mining domain to find the association between attributes. Experimental results manifest that the proposed algorithm outperforms PSO, hybrid PSO, and novel global harmony search.
"From Algorithmic Computing to Autonomic Computing." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2018. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-232820.
Full textSaradha, R. "Malware Analysis using Profile Hidden Markov Models and Intrusion Detection in a Stream Learning Setting." Thesis, 2014. http://hdl.handle.net/2005/3129.
Full textKumar, Pawan. "Memory Efficient Regular Expression Pattern Matching Architecture For Network Intrusion Detection Systems." Thesis, 2012. http://etd.iisc.ernet.in/handle/2005/2321.
Full text