Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Entire DC Network

Stochastic Tools For Network Security: Anonymity Protocol Analysis And Network Intrusion Detection, Lu Yu Dec 2012

Stochastic Tools For Network Security: Anonymity Protocol Analysis And Network Intrusion Detection, Lu Yu

All Dissertations

With the rapid development of Internet and the sharp increase of network crime, network security has become very important and received a lot of attention.
In this dissertation, we model security issues as stochastic systems. This allows us to find weaknesses in existing security systems and propose new solutions. Exploring the vulnerabilities of existing security tools can prevent cyber-attacks from taking advantages of the system weaknesses. We consider The Onion Router (Tor), which is one of the most popular anonymity systems in use today, and show how to detect a protocol tunnelled through Tor. A hidden Markov model (HMM) is …


Connecting Architecture, Fitness, Optimizations And Performance Using An Anisotropic Diffusion Filter, Sumedh Naik Dec 2012

Connecting Architecture, Fitness, Optimizations And Performance Using An Anisotropic Diffusion Filter, Sumedh Naik

All Theses

Over the past decade, computing architectures have continued to exploit multiple levels of parallelism in applications. This increased interest in parallel computing has not only fueled the growth of multi-core processors but has also lead to an emergence of several non-traditional computing architectures like General Purpose Graphical Processing Units (GP-GPUs), Cell Processors, and Field Programmable Gate Arrays (FPGAs). Of these non-traditional computing architectures, GP-GPUs have gained widespread popularity due to their massively parallel computational abilities and relative ease of programmability.
Several software development ecosystems have emerged to harness the power of these parallel architectures. Although several threading libraries like POSIX …


Design Of Meta-Materials Outside The Homogenization Limit Using Multiscale Analysis And Topology Optimization, Christopher Czech May 2012

Design Of Meta-Materials Outside The Homogenization Limit Using Multiscale Analysis And Topology Optimization, Christopher Czech

All Dissertations

The field of meta-materials engineering has largely expanded mechanical design possibilities over the last two decades; some notable design advances include the systematic engineering of negative Poisson's ratio materials and functionally graded materials, materials designed for optimal electronic and thermo-mechanical performances, and the design of materials under uncertainty. With these innovations, the systematic engineering of materials for design-specific uses is becoming more common in industrial and military uses. The motivation for this body of research is the design of the shear beam for a non-pneumatic wheel. Previously, a design optimization of a finite element model of the non-pneumatic wheel was …


A New Metaheuristic Algorithm Motivated By The Rooting Phenomena In Plants, Behzad Nemati May 2012

A New Metaheuristic Algorithm Motivated By The Rooting Phenomena In Plants, Behzad Nemati

All Theses

In this thesis, we present a new metaheuristic algorithm for analyzing challenging optimization problems. Initial testing reveals the potential for the algorithm, which is based on the rooting phenomena found in plants in nature, to quickly produce effective solutions to challenging combinatorial optimization problems in the class NP. We present computational results describing the proposed metaheuristic's efficacy for an important class of scheduling problems and discuss areas of future work and application.