Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Immersion (8)
- Covert channels (6)
- Interference (6)
- Lithography (6)
- Genetic algorithms (5)
-
- Security (5)
- Spectral imaging (5)
- Color appearance models (4)
- Image processing (4)
- Image quality (4)
- Interferometric lithography (4)
- Neural networks (4)
- Optical lithography (4)
- Particle swarm optimization (4)
- Tourism (4)
- Aniline (3)
- Colorimetry (3)
- Data hiding (3)
- Data quality (3)
- Design (3)
- Education (3)
- Hyperspectral (3)
- Immersion lithography (3)
- Linear pixel shuffling (3)
- MIMO (3)
- Photoresist (3)
- Spectral quality (3)
- Student learning (3)
- Target detection (3)
- Algorithms (2)
- Publication Year
- File Type
Articles 1 - 30 of 325
Full-Text Articles in Entire DC Network
Publication And Evaluation Challenges In Games & Interactive Media, Elizabeth L. Lawley
Publication And Evaluation Challenges In Games & Interactive Media, Elizabeth L. Lawley
Presentations and other scholarship
Faculty in the fields of games and interactive media face significant challenges in publishing and documenting their scholarly work for evaluation in the tenure and promotion process. These challenges include selecting appropriate publication venues and assigning authorship for works spanning multiple disciplines; archiving and accurately citing collaborative digital projects; and redefining “peer review,” impact, and dissemination in the context of creative digital works. In this paper I describe many of these challenges, and suggest several potential solutions.
Up To Code: Systematically Evaluating And Standardizing Legacy Repository Content, Frances Chang Andreu
Up To Code: Systematically Evaluating And Standardizing Legacy Repository Content, Frances Chang Andreu
Presentations and other scholarship
Rochester Institute of Technology implemented its first Open Access repository in 2002. An early effort to quickly populate and legitimize the repository, coupled with staff turnover, led to a collection of materials that was inconsistent, accompanied by insufficient metadata, and of dubious copyright status. While the system itself was re-evaluated and migrated to a new platform in 2012, much of the original content was batch imported without further inspection. In 2017, we underwent a systematic audit of all 2,500+ faculty works (student theses and dissertations were excluded from this project) to check for copyright compliance, as well as adherence to …
Control Limits Versus Acceptance Limits - Which Limits Are Appropriate For Your Task?, Donald Holmes, A. Erhan Mergen
Control Limits Versus Acceptance Limits - Which Limits Are Appropriate For Your Task?, Donald Holmes, A. Erhan Mergen
Presentations and other scholarship
The objective of this paper is to discuss and clarify the meaning and use the different statistical limits used in managing processes so the mistakes that are commonly seen in industrial practice can be avoided. The difference between "control" and "acceptance" will also be discuss. The idea of this paper was triggered by a recent paper written by Henderson [5] in Quality Progress journal.
Nat Denial Of Service: An Analysis Of Translation Table Behavior On Multiple Platforms, Nathan Winemiller, Bruce Hartpence, Daryl Johnson, Sumita Mishra
Nat Denial Of Service: An Analysis Of Translation Table Behavior On Multiple Platforms, Nathan Winemiller, Bruce Hartpence, Daryl Johnson, Sumita Mishra
Presentations and other scholarship
Network Address Translation or NAT, is a technology that is used to translate internal addresses to globally routable addresses on the internet. NAT continues to be used extensively in almost every network due to the current lack of IPv4 addresses. Despite being exceptionally commonplace, this networking technique is not without its weaknesses, and can be disabled with a fairly straightforward attack. By overpopulating the translation table, the primary mechanism used to translate the internal to external addresses, an attacker can effectively deny all internal users access to the external network. This paper takes an in-depth look at how five different …
A Behavior Based Covert Channel Within Anti-Virus Updates, D. Anthony, D. Johnson, P. Lutz, B. Yuan
A Behavior Based Covert Channel Within Anti-Virus Updates, D. Anthony, D. Johnson, P. Lutz, B. Yuan
Presentations and other scholarship
This paper presents a new behavior based covert channel utilizing the database update mechanism of anti-virus software. It is highly covert due to unattended, frequent, automatic signature database update operations performed by the software. The design of the covert channel is described; its properties are discussed and demonstrated by a reference implementation. This paper uses these points to strengthen the inclusion of behavior-based covert channels within standard covert channel taxonomy.
Webpage Source Based Covert Channel, Tarun Madiraju, Daryl Johnson, Bo Yuan, Peter Lutz
Webpage Source Based Covert Channel, Tarun Madiraju, Daryl Johnson, Bo Yuan, Peter Lutz
Presentations and other scholarship
Covert Channels can be used for enabling hidden communication mechanisms that can facilitate secret message transfer. This paper presents a new covert channel based on the HTML source of a webpage. The new covert channel while featuring high bandwidth also demonstrates high imperceptibility as it doesn’t involve any modifications to the source or the visibility of the webpage and is independent of timing of page requests. The availability of page source for a webpage on the Internet makes this covert channel easy to implement and effective.
Upnp Port Manipulation As A Covert Channel, Steven Monette, Daryl Johnson, Peter Lutz, Bo Yuan
Upnp Port Manipulation As A Covert Channel, Steven Monette, Daryl Johnson, Peter Lutz, Bo Yuan
Presentations and other scholarship
Port knocking traditionally has been a technique used from external connections to convey information to or request services from an internal private network [1]. UPnP as a standard allows for devices and services to open ports on network devices in order to enable functionality [2]. By combining these two techniques it is possible to port knock internally, opening ports for an intended viewer on an external network device. This paper proposes a covert channel using this technique to exfiltrate data or broadcast messages from a system behind a UPnP device to any Internet connected system.
A Physical Channel In A Digital World, Michael Deffenbaugh, Daryl Johnson, Bo Yuan, Peter Lutz
A Physical Channel In A Digital World, Michael Deffenbaugh, Daryl Johnson, Bo Yuan, Peter Lutz
Presentations and other scholarship
No abstract provided.
An Analysis Of Ethical Attitudes Of Family Business Owners In A Transitional Economy: The Case Of Kosovo, Robert Barbato, Robert Lussier, Matthew Sonfield
An Analysis Of Ethical Attitudes Of Family Business Owners In A Transitional Economy: The Case Of Kosovo, Robert Barbato, Robert Lussier, Matthew Sonfield
Presentations and other scholarship
A transitional economy provides an opportunity to examine the ethical attitudes of small businesses and family owned businesses. In this paper a survey of family businesses in Kosovo finds that family businesses do have different ethical attitudes than non-family businesses, although the differences are slight. Conflict among family members is associated with slightly improved ethical attitudes.
The Assembly And Provisioning Of A Red Team, Daryl Johnson
The Assembly And Provisioning Of A Red Team, Daryl Johnson
Presentations and other scholarship
As the value and merit of red team exercises in both academic and corporate settings continues to grow, the need to share experiences with staffing, organizing and supporting the red team becomes increasingly important. This paper documents the Northeast Collegiate Cyber Defense Competition’s (NECCDC) Red Team captain’s experiences and lessons learned over the past four years. The paper will begin by identifying the skills and attributes needed for a Red Team and a process for selecting and recruiting members. The methods employed to form a cohesive working group from the members in the time available prior to the event will …
Browser Web Storage Vulnerability Investigation: Html5 Localstorage Object, Daryl Johnson
Browser Web Storage Vulnerability Investigation: Html5 Localstorage Object, Daryl Johnson
Presentations and other scholarship
With the introduction of HTML5, the latest browser language, a new data storage technique, called localStorage, has been added to allow websites to store larger amounts of data for a long period of time on the user’s local system. This new technology does not (as of this writing) have a fully implemented independent interface to support end user control. Unlike cookies, there is not yet an interface for the user to block, alter or delete localStorage in web browsers. Nefarious users have files of data they utilize in their illegal activities that they need to preserve (stolen user information, credit …
Proceedings Of The 2011 Powertrain Systems And Design Student Conference, Andrew Baglio, Caroline Bills, Jefferey Bird, Charles O'Neill, Matthew Borton
Proceedings Of The 2011 Powertrain Systems And Design Student Conference, Andrew Baglio, Caroline Bills, Jefferey Bird, Charles O'Neill, Matthew Borton
Presentations and other scholarship
No abstract provided.
A Covert Channel In Rtp Protocol, Chrisopher Forbes, Bo Yuan, Daryl Johnson, Peter Lutz
A Covert Channel In Rtp Protocol, Chrisopher Forbes, Bo Yuan, Daryl Johnson, Peter Lutz
Presentations and other scholarship
A new covert channel over the RTP protocol is designed and implemented by modifying the timestamp value in the RTP header. Due to the high frequency of RTP packets, the covert channel has a high bit-rate, theoretically up to 350 bps. The broad use of RTP for multimedia applications such as VoIP, provides abundant opportunities to such a covert channel to exist. By using the RTP header, many of the challenges present for covert channels using the RTP payload are avoided. A reference implementation of this covert channel is presented. Bit-rates of up to 325 bps were observed. The channel …
Building An Acceptance Chart Around The Process Mean, Donals Holmes, A. Erhan Mergen
Building An Acceptance Chart Around The Process Mean, Donals Holmes, A. Erhan Mergen
Presentations and other scholarship
In this paper we will propose a new way of building an acceptance chart which could be utilized in Six Sigma environment. The proposed method is to build the acceptance chart around the desired value for the process mean rather than around the specification limits. An example is included to illustrate the proposed method.
A Re-Examination Of Network Address Translation Security, Daryl Johnson, Bruce Hartpence
A Re-Examination Of Network Address Translation Security, Daryl Johnson, Bruce Hartpence
Presentations and other scholarship
The use of Network Address Translation (NAT) has greatly expanded in recent years. While originally an address management technique it has often been used for security. However, there are many implementations of NAT that are inherently insecure. Recently investigation into some of these has shown increased potential for security holes in NAT deployments. An understanding of the risks associated with NAT and the basic networking topics supporting a research in this area are critical to an information assurance student. This paper describes the basic operation of NAT, outlines one such security problem and its’ mitigation, develops a testing methodology for …
Icmp Covert Channel Resiliency, Kristian Stokes, Bo Yuan, Daryl Johnson, Peter Lutz
Icmp Covert Channel Resiliency, Kristian Stokes, Bo Yuan, Daryl Johnson, Peter Lutz
Presentations and other scholarship
The ICMP protocol has been widely used and accepted as a covert channel. While the ICMP protocol is very simple to use, modern security approaches such as firewalls, deep-packet inspection and intrusion detection systems threaten the use of ICMP for a reliable means for a covert channel. This study explores the modern usefulness of ICMP with typical security measures in place. Existing ICMP covert channel solutions are examined for compliance with standard RFCs and resiliency with modern security approaches.
Small Business Institute National Proceedings, Robert Lussier, Matthew Sonfield, Robert Barbato
Small Business Institute National Proceedings, Robert Lussier, Matthew Sonfield, Robert Barbato
Presentations and other scholarship
No abstract provided.
Collaborative Innovation Program: A Creative Conspiracy For Cross-College Collaboration At The Rochester Institute Of Technology, Xanthe Matychak, Jonathan Schull
Collaborative Innovation Program: A Creative Conspiracy For Cross-College Collaboration At The Rochester Institute Of Technology, Xanthe Matychak, Jonathan Schull
Presentations and other scholarship
The 2007 inaugural address of RIT’s ninth president, William Destler, highlighted the breadth and diversity of curricular offerings at RIT from business, engineering, and computing to design, fine art, and craft. In his address, Dr. Destler included this challenge: “What if RIT students [in addition to their discipline-specific courses] had the experience of working on complex societal problems with students from different majors on teams in...a cross-disciplinary effort to find real solutions?” The authors of this paper took that challenge to heart. In the 2008- 2009 academic year, we wrote and taught a collaboration curriculum that was hosted by the …
Covert Channels In The Http Network Protocol: Channel Characterization And Detecting Man-In-The-Middle Attacks, Daryl Johnson, Bo Yuan, Peter Lutz, Erik Brown
Covert Channels In The Http Network Protocol: Channel Characterization And Detecting Man-In-The-Middle Attacks, Daryl Johnson, Bo Yuan, Peter Lutz, Erik Brown
Presentations and other scholarship
Network covert channels provide two entities the ability to communicate stealthily. Hypertext Transfer Protocol (HTTP), which accounts for approximately half of all traffic on the Internet (Burke, 2007), has become the fertile ground for various network covert channels. Proliferation of network covert channels throughout the World Wide Web and other areas of cyberspace has raised new security concerns and brought both challenges and enhancements to the area of Information Warfare. Covert channels impact our ability to observe and orient in this domain and need to be better understood. They are however, extremely difficult to study as a whole. Network covert …
Business Ethics: How To Develop Ethical Awareness And Introspection In Our Students, Kathleen Szczepanek
Business Ethics: How To Develop Ethical Awareness And Introspection In Our Students, Kathleen Szczepanek
Presentations and other scholarship
I developed a business ethics course addressing the need to provide a foundation in business ethics for Business Studies students at the National Technical Institute for the Deaf (NTID). The purpose of the course was to ensure that our students develop an awareness for appropriate practices and behaviors as they enter a place of work. The design of the course was based on current literature connected to the best business practices that are based on ethical values and behaviors.
Behavior-Based Covert Channel In Cyberspace, Daryl Johnson, Bo Yuan, Peter Lutz
Behavior-Based Covert Channel In Cyberspace, Daryl Johnson, Bo Yuan, Peter Lutz
Presentations and other scholarship
Many covert channels take advantages of weaknesses, flaws, or unused data fields in network protocols. In this paper, a behavior-based covert channel, that takes advantages of behavior of an application, is presented along with a formal definition in the framework of finite state machines. The behavior-based covert channel is application specific and lies at the application layer of the network OSI model, which makes the detection of this type of covert channel much more difficult. A detailed sample implementation demonstrates an example of this type of covert channel in the form of a simple online two-person game. The potential of …
Efficient Derivation Of Sparse Representations In Radial Basis Function Regression, Ernest Fokoué
Efficient Derivation Of Sparse Representations In Radial Basis Function Regression, Ernest Fokoué
Presentations and other scholarship
No abstract provided.
Electronics In Our Daily Life Today And Packaging Trends Influencing The Future, S. Manian Ramkumar
Electronics In Our Daily Life Today And Packaging Trends Influencing The Future, S. Manian Ramkumar
Presentations and other scholarship
No abstract provided.
The Road We’Ve Traveled: 12 Years Of Undergraduate Software Engineering At The Rochester Institute Of Technology, J. Fernando Naveda, Thomas Reichlmayr, Michael Lutz, James Vallino, Stephanie Ludi
The Road We’Ve Traveled: 12 Years Of Undergraduate Software Engineering At The Rochester Institute Of Technology, J. Fernando Naveda, Thomas Reichlmayr, Michael Lutz, James Vallino, Stephanie Ludi
Presentations and other scholarship
In 1996, the Rochester Institute of Technology launched the first undergraduate software engineering program in North America. This paper briefly reviews the development of the program, and describes the program’s evolution up to the present. We illuminate both the constant aspects of the program – what we believe we got right – as well as the changes made in light of pedagogical, technological and disciplinary advances. We conclude by considering the current and future challenges for undergraduate software engineering education both at RIT and elsewhere.
Creating The Future Of Publishing At Rit: Products (And Lessons) From A Cross-Disciplinary Undergraduate Research Center, Matt Bernius, Rachael Gootnick, Abdul Matsah, Michael Riordan
Creating The Future Of Publishing At Rit: Products (And Lessons) From A Cross-Disciplinary Undergraduate Research Center, Matt Bernius, Rachael Gootnick, Abdul Matsah, Michael Riordan
Presentations and other scholarship
No abstract provided.
Merger Of Massive Black Holes Using N-Body Simulations With Post-Newtonian Corrections, Miguel Preto, Ingo Berentzen, Peter Berczik, David Merritt, Rainer Spurzem
Merger Of Massive Black Holes Using N-Body Simulations With Post-Newtonian Corrections, Miguel Preto, Ingo Berentzen, Peter Berczik, David Merritt, Rainer Spurzem
Presentations and other scholarship
We present preliminary results from self-consistent, high resolution direct N-body simulations of massive black hole binaries in mergers of galactic nuclei. The dynamics of the black hole binary includes the full Post-Newtonian corrections (up to 2.5PN) to its equations of motion. We show that massive black holes starting at separations of 100 pc can evolve down to gravitational-wave-induced coalescence in less than a Hubble time. The binaries, in our models, often form with very high eccentricity and, as a result, reach separations of 50 Schwarzschild radius with eccentricities which are clearly distinct from zero — even though gravitational wave emission …
Section 404 Audit Costs For Small Companies: The Benefit Of Waiting, Mithu Dey, Mary Sullivan
Section 404 Audit Costs For Small Companies: The Benefit Of Waiting, Mithu Dey, Mary Sullivan
Presentations and other scholarship
Starting in December 2009, small companies classified as non-accelerated filers must obtain an internal control audit to comply with Section 404 of the Sarbanes-Oxley Act. This study estimates the cost of the internal control audit for new accelerated filers in 2006 and 2007 and assesses whether the new internal control auditing standard, Auditing Standard No. 5, has reduced Section 404-related audit costs. The study finds that the median cost of the internal control audit as a percentage of total audit fees is 42% for new accelerated filers in 2006 and 37% in 2007. This suggests that Section 404-related audit costs …
Teaching And Learning Innovation And Invention, Jonathan Schull, Xanthe Matychak, Jacob Noel-Storr
Teaching And Learning Innovation And Invention, Jonathan Schull, Xanthe Matychak, Jacob Noel-Storr
Presentations and other scholarship
Each quarter at Rochester Institute of Technology (RIT), our course on innovation and invention gathers undergraduate and graduate students from as many disciplines as possible and attempts to do something none of us (including the instructors) knows how to do. Our methodology, modeled after business startups more than traditional academic courses, produces interesting inventions and remarkable learning experiences. We will report on the first four offerings of this course at RIT, and speculate on why it works as well as it does. Class begins by presenting students with a stimulating but vague challenge that can engage all the participants (e.g., …
Comparison Of Post-Newtonian And Numerical Evolutions Of Black-Hole Binaries, Hiroyuki Nakano, Manuela Campanelli, Carlos Lousto, Yosef Zlochower
Comparison Of Post-Newtonian And Numerical Evolutions Of Black-Hole Binaries, Hiroyuki Nakano, Manuela Campanelli, Carlos Lousto, Yosef Zlochower
Presentations and other scholarship
In this paper, we compare the waveforms from the post-Newtonian (PN) approach with the numerical simulations of generic black-hole binaries which have mass ratio q 0.8, arbitrarily oriented spins with magnitudes S1/m2 1 0.6 and S2/m2 2 0.4, and orbit 9 times from an initial orbital separation of r 11M prior to merger. We observe a reasonably good agreement between the PN and numerical waveforms, with an overlap of over 98% for the first six cycles of the (ℓ = 2,m = ±2) mode and over 90% for the (ℓ = 2,m = 1) and (ℓ = 3,m = 3) …
Testing Gravitational-Wave Searches With Numerical Relativity Waveforms: Results From The First Numerical Injection Analysis (Ninja) Project, Hiroyuki Nakano, Manuela Campanelli, Carlos Lousto, Yosef Zlochower
Testing Gravitational-Wave Searches With Numerical Relativity Waveforms: Results From The First Numerical Injection Analysis (Ninja) Project, Hiroyuki Nakano, Manuela Campanelli, Carlos Lousto, Yosef Zlochower
Presentations and other scholarship
The Numerical INJection Analysis (NINJA) project is a collaborative effort between members of the numerical relativity and gravitational-wave data analysis communities. The purpose of NINJA is to study the sensitivity of existing gravitational-wave search algorithms using numerically generated waveforms and to foster closer collaboration between the numerical relativity and data analysis communities. We describe the results of the first NINJA analysis which focused on gravitational waveforms from binary black hole coalescence. Ten numerical relativity groups contributed numerical data which were used to generate a set of gravitational-wave signals. These signals were injected into a simulated data set, designed to mimic …