Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Entire DC Network

After Conversation - A Forensic Icq Logfile Extraction Tool, Kim Morfitt, Craig Valli Jan 2005

After Conversation - A Forensic Icq Logfile Extraction Tool, Kim Morfitt, Craig Valli

Research outputs pre 2011

Instant messenger programs such as ICQ are often used by hackers and criminals for illicit purposes and consequently the logfiles from such programs are of forensic interest. This paper outlines research in progress that has resulted in the development of a tool for the extraction of ICQ logfile entries. Detailed reconstruction of data from logfiles was achieved with a number of different ICQ software, with other programs still to be tested. There are several limitations including timestamp information not adjusted for the time zone, data could be altered, and conversations must be manually reconstructed. Future research will aim to address …


Establishing Physical Survivability Of Large Networks Using Properties Of Two-Connected Graphs, Daryoush Habibi, Hoang N. Nguyen, Quoc Viet Phung, Kung-Meng Lo Jan 2005

Establishing Physical Survivability Of Large Networks Using Properties Of Two-Connected Graphs, Daryoush Habibi, Hoang N. Nguyen, Quoc Viet Phung, Kung-Meng Lo

Research outputs pre 2011

Establishing the physical survivability of large networks is not a trivial task. Some techniques for assessing physical survivability such as the cutset method can not deal with large size networks (S. Ramamurthy and B. Mukherjee), (W.N. Grover and J. Doucette, 2001). A fast technique for finding biconnected components of a graph and testing the network for node-/link-bridges, presented in (W.D. Grover, 2004), does not provide any further information, such as identifying the fundamental cycles within the network, which would significantly benefit the next phase of network design for protection using such techniques as shared backup path protection (SBPP), p-cycle, or …


Effects Of Massage On Delayed-Onset Muscle Soreness, Swelling, And Recovery Of Muscle Function, Zainal Zainuddin, Michael Newton, Paul Sacco, Kazunori Nosaka Jan 2005

Effects Of Massage On Delayed-Onset Muscle Soreness, Swelling, And Recovery Of Muscle Function, Zainal Zainuddin, Michael Newton, Paul Sacco, Kazunori Nosaka

Research outputs pre 2011

No abstract provided.


K Pair Of Disjoint Paths Algorithm For Protection In Wdm Optical Networks, Quoc Viet Phung, Daryoush Habibi, Hoang N. Nguyen, Kungmang Lo Jan 2005

K Pair Of Disjoint Paths Algorithm For Protection In Wdm Optical Networks, Quoc Viet Phung, Daryoush Habibi, Hoang N. Nguyen, Kungmang Lo

Research outputs pre 2011

Survivable routing in wavelength division multiplexing (WDM) optical networks has been proven to be NP-hard problem. There is a trade-off between the computational time and the optimality of solutions in existing approaches to the problem. Existing heuristic approaches purely based the graph algorithms are efficient in computational time but do not offer optimal solutions and may fail in some cases even when a solution exists. Meanwhile, the integer linear programming (ILP) models offer optimal solutions but are intractable even with moderate scale networks. In this paper, we introduce a new algorithm for finding K pairs of disjoint paths which are …


Dynamic Wavelength Routing In All Optical Mesh Network, Kungmang Lo, Daryoush Habibi, Quoc Viet Phung, Hoang Nghia Nguyen Jan 2005

Dynamic Wavelength Routing In All Optical Mesh Network, Kungmang Lo, Daryoush Habibi, Quoc Viet Phung, Hoang Nghia Nguyen

Research outputs pre 2011

Wavelength-division multiplexing (WDM) offers the capability to handle the increasing demand of network traffic in a manner that takes advantage of already deployed optical fibers. Lightpaths are optical connections carried end-to-end over a wavelength on each intermediate link. Wavelengths are the main resource in WDM networks. Due to the inherent channel constraints, a dynamic control mechanism is required to efficiently utilize the resource to maximize lightpath connections. In this paper, we investigate a class of adaptive routing called dynamic wavelength routing (DWR), in which wavelength converters (WCs) are not utilized in the network. The objective is to maximize the wavelength …


Taxonomy Of Wrt54g(S) Hardware And Custom Firmware, Marwan Al-Zarouni Jan 2005

Taxonomy Of Wrt54g(S) Hardware And Custom Firmware, Marwan Al-Zarouni

Research outputs pre 2011

This paper discusses the different versions of hardware and firmware currently available for the Linksys WRT54G and WRT54GS router models. It covers the advantages, disadvantages, and compatibility issues of each one of them. The paper goes further to compare firmware added features and associated filesystems and then discusses firmware installation precautions and ways to recover from a failed install.


A Shared Backup Path Protection Scheme For Optical Mesh Networks, Hoang N. Nguyen, Daryoush Habibi, Quoc Viet Phung, Kungmang Lo Jan 2005

A Shared Backup Path Protection Scheme For Optical Mesh Networks, Hoang N. Nguyen, Daryoush Habibi, Quoc Viet Phung, Kungmang Lo

Research outputs pre 2011

We propose a new heuristic ILP model for share backup path protection (SBPP) scheme of mesh networks, which used the sets of disjoint-joint primary-backup path candidates of using path-pair candidates. The solution of the model is near optimal and provides all the routing details of demands as well as the sharing information between backup paths, and also simplifies the wavelength assignment problem if the wavelength continuity is a consideration. The new entities are introduced into this model that allow to control the resource utilization as well as congestion level of the network for optimization purposes and the pre-processing of data …


Nitrate Reductase Activity In Macroalgae And Its Vertical Distribution In Macroalgal Epiphytes Of Seagrasses, Erica Young, Paul Lavery, Beverley Van Elven, Mat Dring, John A Berges Jan 2005

Nitrate Reductase Activity In Macroalgae And Its Vertical Distribution In Macroalgal Epiphytes Of Seagrasses, Erica Young, Paul Lavery, Beverley Van Elven, Mat Dring, John A Berges

Research outputs pre 2011

Macroalgal epiphytes within seagrass meadows make a significant contribution to total primary production by assimilating water column N and transferring organic N to sediments. Assimilation of NO3 – requires nitrate reductase (NR, EC 1.6.6.1); NR activity represents the capacity for NO3 – assimilation. An optimised in vitro assay for determining NR activity in algal extracts was applied to a wide range of macroalgae and detected NR activity in all 22 species tested with activity 2 to 290 nmolNO3 – min–1 g–1 frozen thallus. With liquid-N2 freezing immediately after sample collection, this method was practical for estimating NR activity in field …


Effects Of Partial Immobilization After Eccentric Exercise On Recovery From Muscle Damage, Zainal Zainuddin, Peter Hope, Michael Newton, Paul Sacco, Kazunori Nosaka Jan 2005

Effects Of Partial Immobilization After Eccentric Exercise On Recovery From Muscle Damage, Zainal Zainuddin, Peter Hope, Michael Newton, Paul Sacco, Kazunori Nosaka

Research outputs pre 2011

No abstract provided.


Dynamic P-Cycles Selection In Optical Wdm Mesh Networks, Kungmang Lo, Daryoush Habibi, Quoc Viet Phung, Hoang Nguyen, Byungkyu Kang Jan 2005

Dynamic P-Cycles Selection In Optical Wdm Mesh Networks, Kungmang Lo, Daryoush Habibi, Quoc Viet Phung, Hoang Nguyen, Byungkyu Kang

Research outputs pre 2011

P-cycles have been recognized as a useful protection scheme in WDM mesh networks. This is a type of shared link protection that not only retains the mesh-like capacity efficiency, but also achieves the ring-like protection switching speed. However, finding the optimal set of p-cycles for protecting traffic demands is not a simple task and is an NP-hard problem. A general approach is to determine a set of candidate p-cycles and then determine optimal or near-optimal solutions by using integer linear programming (ILP) models or heuristics. In a dense mesh network, however, the number of candidate cycles is huge, and increases …


Blackhat Fingerprinting Of The Wired And Wireless Honeynet, Suen Yek Jan 2005

Blackhat Fingerprinting Of The Wired And Wireless Honeynet, Suen Yek

Research outputs pre 2011

TCP/IP fingerprinting is a common technique used to detect unique network stack characteristics of an Operating System (OS) . Its usage for network compromise is renowned for performing host discovery and in aiding the blackhat to determine a tailored exploit of detected OSs. The honeyd honeynet is able to countermeasure blackhats utilising TCP/IP fingerprinting via host device emulation on a virtual network. Honeyd allows the creation of host personalities that respond to network stack fingerprinting as a real network would. The nature of this technique however, has shown to provide inconsistent and unreliable results when performed over wired and wireless …


Capacity Utilization Versus Congestion Levels In Wavelength Routing For Large Scale Wdm Networks, Quoc Viet Phung, Daryoush Habibi, Hoang N. Nguyen, Kungmang Lo Jan 2005

Capacity Utilization Versus Congestion Levels In Wavelength Routing For Large Scale Wdm Networks, Quoc Viet Phung, Daryoush Habibi, Hoang N. Nguyen, Kungmang Lo

Research outputs pre 2011

Wavelength routing (WR) has been a key issue in WDM optical networks which carry huge amount of traffic aggregated from Internet protocol (IP), asynchronous transfer mode (ATM) and SDH/SONET layers. The problem, however, has been proved NP-hard. The time complexity and the optimality of solutions are two conflicting metrics. In addition, for optimization purposes, capacity utilization and network congestion level can be compromised to reduce the blocking probability of future connections. In this paper, we propose a heuristic approach for WR in large scale networks based on a balanced model developed for the capacity utilization and the congestion level. This …


How To Build A Faraday On The Cheap For Wireless Security Testing, Suen Yek Jan 2005

How To Build A Faraday On The Cheap For Wireless Security Testing, Suen Yek

Research outputs pre 2011

The commonly known security weaknesses associated with the 802.11b wireless standard have introduced a variety of security measures to countermeasure attacks. Using a wireless honeypot, a fake wireless network may be configured through emulation of devices and the TCP/IP fingerprinting of OS network stacks. TCP/IP fingerprinting is one of the most popular methods employed to determine the type of OS running on a target and this information can then be used to determine the type of vulnerabilities to target on the host. Testing the effectiveness of this technique to ensure that a wireless honeypot using honeyd may deceive an attacker …