Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where J. Lane Thames is active.

Publication


Featured researches published by J. Lane Thames.


ASME 2012 International Design Engineering Technical Conferences & Computers and Information in Engineering Conference (IDETC 2012) | 2012

Towards a Cloud-Based Design and Manufacturing Paradigm: Looking Backward, Looking Forward

Dazhong Wu; J. Lane Thames; David W. Rosen; Dirk Schaefer

The rise of cloud computing is radically changing the way enterprises manage their information technology (IT) assets. Considering the benefits of cloud computing to the information technology sector, we present a review of current research initiatives and applications of the cloud computing paradigm related to product design and manufacturing. In particular, we focus on exploring the potential of utilizing cloud computing for selected aspects of collaborative design, distributed manufacturing, collective innovation, data mining, semantic web technology, and virtualization. In addition, we propose to expand the paradigm of cloud computing to the field of computer-aided design and manufacturing and propose a new concept of cloud-based design and manufacturing (CBDM). Specifically, we (1) propose a comprehensive definition of CBDM; (2) discuss its key characteristics; (3) relate current research in design and manufacture to CBDM; and (4) identify key research issues and future trends.© 2012 ASME


Journal of Computing and Information Science in Engineering | 2013

Enhancing the Product Realization Process With Cloud-Based Design and Manufacturing Systems

Dazhong Wu; J. Lane Thames; David W. Rosen; Dirk Schaefer

The rise of cloud computing is radically changing the way enterprises manage their information technology assets. Considering the benefits of cloud computing to the information technology sector, we present a review of current research initiatives and applications of the cloud computing paradigm related to product design and manufacturing. In particular, we focus on exploring the potential of utilizing cloud computing for selected aspects of collaborative design, distributed manufacturing, collective innovation, data mining, semantic web technology, and virtualization. In addition, we propose to expand the paradigm of cloud computing to the field of computer-aided design (CAD) and manufacturing and propose a new concept of cloud-based design and manufacturing (CBDM). Specifically, we (1) propose a comprehensive definition of CBDM; (2) discuss its key characteristics; (3) relate current research in design and manufacture to CBDM; and (4) identify key research issues and future trends.


acm southeast regional conference | 2006

Hybrid intelligent systems for network security

J. Lane Thames; Randal T. Abler; Ashraf Saad

Society has grown to rely on Internet services, and the number of Internet users increases every day. As more and more users become connected to the network, the window of opportunity for malicious users to do their damage becomes very great and lucrative. The computer industry is combating the rising threat of malicious activity with new hardware and software products such as Intrusion Detection Systems, Intrusion Prevention Systems, and Firewalls. However, malicious users are constantly looking for ways to by-pass the security features of these products, and many times they will succeed. This paper describes a novel concept implemented for the purpose of computer and network security with hopes of using it to combat malicious user activity. A hybrid-intelligent system based on Bayesian Learning Networks and Self-Organizing Maps was created and used for classifying network and host based data collected within a Local Area Network. The KDD-CUP-99 data set was used to test this classification system, and the experimental results show that there is an advantage to using a hybrid system such as this because there was a significant improvement in classification accuracy compared to a non-hybrid Bayesian Learning approach when network-only data is used for classification.


acm southeast regional conference | 2008

A distributed firewall and active response architecture providing preemptive protection

J. Lane Thames; Randal T. Abler; David Keeling

Firewalls provide very good network security features. However, classical perimeter firewall deployments suffer from limitations due to complex network topologies and the inability to completely trust insiders of the network. Distributed firewalls are designed for alleviating these limitations. Intrusion detection is a mature technology and is very powerful when coupled with active response, which is the act of responding to intrusions without the need of human advisory. This paper describes an architecture that implements a distributed firewall with distributed active response. A fundamental result of the architecture is that it can provide proactive and preemptive security for hosts that deploy the system. Using the open-source software framework, the software implementing this proposed system will be provided to the research community so that the architecture can be extended by other researchers and so that newcomers to network security can start investigating security concepts quickly.


Volume 8: 14th Design for Manufacturing and the Life Cycle Conference; 6th Symposium on International Design and Design Education; 21st International Conference on Design Theory and Methodology, Parts A and B | 2009

ENHANCING MECHANICAL ENGINEERING DISTANCE EDUCATION THROUGH IT- ENABLED REMOTE LABORATORIES

Andrew C. Hyder; J. Lane Thames; Dirk Schaefer

The use of remotely operated laboratory experiments is gaining credibility to substitute traditional experimentation practices for distance learning students. Universities have been exploring this option to cater to the growing number of nontraditional students who are only able to participate in education remotely. In this paper the authors discuss how recent advances in robotic and network control have laid the foundation for which remote labs can be built and used as a novel educational tool. Models of how to implement remote laboratory experiments demonstrate the important considerations and best practices which would be addressed when developing an experiment. The consideration of network navigation is essential to foster the smooth connection between remote users and local equipment without inhibiting existing system functionality. Firewall communication through static and dynamic IP addresses must be delegated carefully while network and security administrators open channels for communication. Command and control interfaces can substantially reduce this complex orchestrate by serving as a dedicated web server. With the proper pedagogical and technical developments, remote laboratories will become a viable means to provide realistic experiences to anyone throughout the world.


Archive | 2017

Industry 4.0: An Overview of Key Benefits, Technologies, and Challenges

J. Lane Thames; Dirk Schaefer

A new revolution known as Industry 4.0 is occurring where countless elements comprising industrial systems are being interfaced with internet communication technologies to form the smart factories and manufacturing organizations of the future. Industry 4.0 and its associated technologies are currently being driven by disruptive innovation that promises to bring countless new value creation opportunities across all major market sectors. However, existing Internet technologies are plagued by cybersecurity and data privacy issues that will present major challenges and roadblocks for adopters of Industry 4.0 technologies. Industry 4.0 will face traditional cybersecurity issues along with its very own unique security and privacy challenges. If these challenges are not appropriately addressed, the true potential of Industry 4.0 may never be achieved. This chapter provides a brief overview of several key Industry 4.0 technologies and paradigms in order to give the reader a better understanding of the cybersecurity aspects of the remaining chapters in the book.


acm southeast regional conference | 2009

Bit vector algorithms enabling high-speed and memory-efficient firewall blacklisting

J. Lane Thames; Randal T. Abler; David Keeling

In a world of increasing Internet connectivity coupled with increasing computer security risks, security conscious network applications implementing blacklisting technology are becoming very prevalent because it provides the ability to prevent information exchange from known malicious sources. Current technology implementing blacklisting does so at the application level. However, there are numerous benefits for implementing blacklisting filters in the firewall. These benefits include reduced application workload and reduced bandwidth consumption. But, because the de facto algorithm in firewalls is based on a linear search first match principle, large blacklists are not feasible to implement in firewalls due to the O(N) timing complexity of linear search methods. This paper addresses this issue by describing techniques that solve the O(N) time complexity issue without changing the internal input-output behavior of the firewall.


Volume 8: 14th Design for Manufacturing and the Life Cycle Conference; 6th Symposium on International Design and Design Education; 21st International Conference on Design Theory and Methodology, Parts A and B | 2009

An Information Technology Infrastructure for Internet-Enabled Remote and Portable Laboratories

J. Lane Thames; Andrew C. Hyder; Robert D. Wellman; Dirk Schaefer

With the proliferation of distributed and distance learning in higher education, there is a growing need for remote and portable laboratory design and deployment for the engineering, science, and technology education sectors. Amongst the current threads of research in this area, very little work has focused on solutions to the challenges, which are imposed by modern day information technology infrastructure, enterprise networks, and enterprise network security change management processes, that will be faced by large scale deployments of remote and portable labs. In this paper, the authors will discuss some of these challenges and will propose the use of the command and control communications architecture coupled with Web 2.0 as a solution to many of the deployment challenges.


Archive | 2017

Cybersecurity for Industry 4.0 and Advanced Manufacturing Environments with Ensemble Intelligence

J. Lane Thames; Dirk Schaefer

Traditional cybersecurity architectures incorporate security mechanisms that provide services such as confidentiality, authenticity, integrity, access control, and non-repudiation. These mechanisms are used extensively to prevent computer and network intrusions and attacks. For instance, access control services prevent unauthorized access to cyber resources such as computers, networks, and data. However, the modern Internet security landscape is characterized by attacks that are voluminous, constantly evolving, extremely fast, persistent, and highly sophisticated Schnackenberg et al. (2000), Anuar et al. (2010). These characteristics impose significant challenges on preventive security services. Consequently, methodologies that enable autonomic detection and response to cyberattacks should be employed synergistically with prevention techniques in order to achieve effective defense-in-depth strategies and robust cybersecurity systems. This is especially true for the critical systems belonging to Industry 4.0 systems. In this chapter, we describe how we have integrated cyberattack detection and response mechanisms into our Software-Defined Cloud Manufacturing architecture. The cyberattack detection algorithm described in this chapter is based on ensemble intelligence with neural networks whose outputs are fed into a neuro-evolved neural network oracle. The oracle produces an optimized classification output that is used to provide feedback to active attack response mechanisms within our software-defined cloud manufacturing system. The underlying goal of this chapter is to show how computational intelligence approaches can be used to defend critical Industry 4.0 systems as well as other Internet-driven systems.


acm southeast regional conference | 2011

Parametric optimization of artificial neural networks for signal approximation applications

J. Lane Thames; Randal T. Abler; Dirk Schaefer

Artificial neural networks are used to solve diverse sets of problems. However, the accuracy of the networks output for a given problem domain depends on appropriate selection of training data as well as various design parameters that define the structure of the network before it is trained. Genetic algorithms have been used successfully for many types of optimization problems. In this paper, we describe a methodology that uses genetic algorithms to find an optimal set of configuration parameters for artificial neural networks such that the networks approximation error for signal approximation problems is minimized.

Collaboration


Dive into the J. Lane Thames's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Randal T. Abler

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Andrew C. Hyder

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

David W. Rosen

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Dazhong Wu

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

David Keeling

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Robert D. Wellman

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Ashraf Saad

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge