Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 91 - 120 of 131

Full-Text Articles in Engineering

Ip Traceback With Deterministic Packet Marking Dpm, Andrey Belenky Aug 2003

Ip Traceback With Deterministic Packet Marking Dpm, Andrey Belenky

Dissertations

In this dissertation, a novel approach to Internet Protocol (IP) Traceback - Deterministic Packet Marking (DPM) is presented. The proposed approach is scalable, simple to implement, and introduces no bandwidth and practically no processing overhead on the network equipment. It is capable of tracing thousands of simultaneous attackers during a Distributed Denial of Service (DDoS) attack. Given sufficient deployment on the Internet, DPM is capable of tracing back to the slaves for DDoS attacks which involve reflectors. Most of the processing is done at the victim. The traceback process can be performed post-mortem, which allows for tracing the attacks that …


Optimal And Intelligent Decision Making In Sustainable Development Of Electronic Products, Meimei Gao Aug 2003

Optimal And Intelligent Decision Making In Sustainable Development Of Electronic Products, Meimei Gao

Dissertations

Increasing global population and consumption are causing declining natural and social systems. Multi-lifecycle engineering and sustainable development address these issues by integrating strategies for economic successes, environmental quality, and social equity. Based on multi-lifecycle engineering and sustainable development concepts, this doctoral dissertation aims to provide decision making approaches to growing a strong industrial economy while maintaining a clean, healthy environment. The research develops a methodology to complete both the disassembly leveling and bin assignment decisions in demanufacturing through balancing the disassembly efforts, value returns, and environmental impacts. The proposed method is successfully implemented into a demanufacturing module of a Multi-LifeCycle …


Internet Traffic Over Wide Area Network - Statistical Modeling And Analysis, Yan Yi Lee Aug 2003

Internet Traffic Over Wide Area Network - Statistical Modeling And Analysis, Yan Yi Lee

Theses

This thesis provides results on trace data collecting and modeling of the Internet traffic over a Wide Area Network. The study is based on extensive data, gathered by tracing the actual packet exchange at the interfaces of devices on the WAN of BCCLS (Bergen County Cooperative Library System). A powerful network monitoring system WhatsUp Gold was employed to monitor the WAN, and logged the byte rates and packet rates sent and received at the interfaces. Different statistical distributions were employed to model the data traces. In comparison with some other statistical models - normal, lognormal, Weibull, and Pareto, which are …


Low Interference Routing For Wireless Ad-Hoc Networks, Mohit Gupta Aug 2003

Low Interference Routing For Wireless Ad-Hoc Networks, Mohit Gupta

Theses

In this thesis the primary focus is on the problem of interference between messages. The thesis discusses why the messages are blocked in a system? How adding a message impacts the cost of all other available links, which can be established in the system.

This thesis analyzes how the availability of channels, increase in number of nodes and increase in the transmission range help in increasing the number of messages that can be handled in the network. It is also analyzes how critical is the selection of the maximum transmission range MTR, transmission range TR and required transmission range RTR. …


Tree Based Reliable Topology For Distributing Link State Information, Ram Narayan Krishnan Aug 2003

Tree Based Reliable Topology For Distributing Link State Information, Ram Narayan Krishnan

Theses

Finding paths that satisfy the performance requirements of applications according to link state information in a network is known as the Quality-of- Service (QoS) routing problem and has been extensively studied. However, distributing link state information may introduce a significant protocol overhead on network resources. In this thesis, the issue on how to update link state information efficiently and effectively is investigated. A theoretical framework is presented, and a high performance link state policy that is capable of minimizing the false blocking probability of connections under a given update rate constraint is proposed. Through theoretical analysis, it is shown that …


Efficient Resource Allocation And Call Admission Control In High Capacity Wireless Networks, Jiongkuan Hou May 2003

Efficient Resource Allocation And Call Admission Control In High Capacity Wireless Networks, Jiongkuan Hou

Dissertations

Resource Allocation (RA) and Call Admission Control (CAC) in wireless networks are processes that control the allocation of the limited radio resources to mobile stations (MS) in order to maximize the utilization efficiency of radio resources and guarantee the Quality of Service (QoS) requirements of mobile users. In this dissertation, several distributed, adaptive and efficient RA/CAC schemes are proposed and analyzed, in order to improve the system utilization while maintaining the required QoS.

Since the most salient feature of the mobile wireless network is that users are moving, a Mobility Based Channel Reservation (MBCR) scheme is proposed which takes the …


Tracking The Path Of A Mobile Radioactive Source Using A Wireless Sensor Network, Nipa Shah May 2003

Tracking The Path Of A Mobile Radioactive Source Using A Wireless Sensor Network, Nipa Shah

Theses

This report describes several experiments used to characterize and test a network of radiation sensors. The purpose of these tests is to assess the feasibility of using these sensors to detect and track radioactive sources in a large field, as in a battlefield or on a military campus. Simulated radiation measurements are used to compare the result of radiation detection accuracy in tracking the moving target and to find its path as early as possible. This is done via changing the number of sensing nodes deployed (deployment density), as well as the models of the detectors. This thesis describes algorithms …


Design Of An Fpga-Based Parallel Simd Machine For Power Flow Analysis, Tirupathi Rao Kunta May 2003

Design Of An Fpga-Based Parallel Simd Machine For Power Flow Analysis, Tirupathi Rao Kunta

Theses

Power flow analysis consists of computationally intensive calculations on large matrices, consumes several hours of computational time, and has shown the need for the implementation of application-specific parallel machines. The potential of Single-Instruction stream Multiple-Data stream (SIMD) parallel architectures for efficient operations on large matrices has been demonstrated as seen in the case of many existing supercomputers. The unsuitability of existing parallel machines for low-cost power system applications, their long design cycles, and the difficulty in using them show the need for application-specific SIMI) machines. Advances in VLSI technology and Field-Programmable Gate-Arrays (FPGAs) enable the implementation of Custom Computing Machines …


Comparative Studies Of Network Traffic In Actual And Emulated Wireless Networks, Curtis Salley Jr. May 2003

Comparative Studies Of Network Traffic In Actual And Emulated Wireless Networks, Curtis Salley Jr.

Theses

Wireless networks are becoming more popular in all types of environments from home office, to business infrastructure, to mobile computing. As more of these networks flourish, so does the attraction for hackers. The thesis examines the bandwidth of wireless networks and the effects of intrusions in three different scenarios. First, it looks at a wireless network that is connected to a wired infrastructure. Next, the thesis examines a wireless ad hoc network and how bandwidth plays a valuable part in the communication with neighboring nodes. And finally, the thesis attempts to simulate a wireless network by using a bandwidth configuration …


Reduction Of False Positives In Fault Detection System Using A Low Pass Data Filter, Ranjit Salunkhe May 2003

Reduction Of False Positives In Fault Detection System Using A Low Pass Data Filter, Ranjit Salunkhe

Theses

Network traffic is bursty in nature and exhibits the property of self-similarity, the degree of which is measured by the Hurst parameter. Now, in any network there is always the possibility of the occurrence of fault traffic that can be caused due to faults or malfunction of a network component. Fault Detection Systems that check for traffic anomalies can trigger off an alert on the detection of any traffic behavior that deviates from normal. Such deviation is usually caused when a fault occurs. But in network traffic sudden bursts may occur due to the inherent behavior of a network application. …


Soft Fault Detection Using Mibs In Computer Networks, Sachin Arora May 2003

Soft Fault Detection Using Mibs In Computer Networks, Sachin Arora

Theses

To improve network reliability and management in today's high-speed communication system, a statistical anomaly network intrusion detection system (NIDS) has been investigated, for network soft faults using the Management Information Base (Mm) traffic parameters provided by Simple Network Management Protocol (SNMP), for both wired and wireless networks. The work done would be a contribution to a system to be designed MIB Anomaly Intrusion Detection, a hierarchical multi-tier and multiobservation-window Anomaly Intrusion Detection system. The data was derived from many experiments that had been carried out in the test bed that monitored 27 MIB traffic parameters simultaneously, focusing on the soft …


Graphical User Interface For Improved Laser Eye Surgery, Venkata K. Kuruganti May 2003

Graphical User Interface For Improved Laser Eye Surgery, Venkata K. Kuruganti

Theses

This thesis develops a system for laser eye surgery that is a significant improvement over existing technology. The new system uses image matching and MEMS micromirrors to introduce feedback control, automation and record keeping to the laser surgery process, eliminating the unwanted effects of eye movement during surgery and introducing a wide range of other benefits. It is expected that this improvement can be implemented as an addition to existing systems as well as a foundation for new tools, perhaps even remote, internet enabled ones.

The basic components of the new system are described and demonstrated, including image matching between …


Hop-Limited Routing For Multihop Cellular Networks, Cem Dincer May 2003

Hop-Limited Routing For Multihop Cellular Networks, Cem Dincer

Theses

In recent years, conventional cellular systems have experienced evolution in fields of data oriented services. During this period, the requirement for high data-rate stimulated new research proposals, which resulted in a new architecture: Multihop Cellular Networks (MCN), where multihop structure enables mobile stations to forward packets from other mobile stations to the base station on the uplink, and in turn, forward packets to other mobile stations from the base station on the downlink. In this thesis, a new routing algorithm is introduced for MCNs in order to limit the number of hops between the base station and the mobile stations …


Fpga Implementation Of A Cholesky Algorithm For A Shared-Memory Multiprocessor Architecture, Satchidanand G. Haridas May 2003

Fpga Implementation Of A Cholesky Algorithm For A Shared-Memory Multiprocessor Architecture, Satchidanand G. Haridas

Theses

Solving a system of linear equations is a key problem in the field of engineering and science. Matrix factorization is a key component of many methods used to solve such equations. However, the factorization process is very time consuming, so these problems have traditionally been targeted for parallel machines rather than sequential ones. Nevertheless, commercially available supercomputers are expensive and only large institutions have the resources to purchase them or use them. Hence, efforts are on to develop more affordable alternatives. This thesis presents one such approach.

The work presented here is an implementation of a parallel version of the …


Detecting Malfunction In Wireless Sensor Networks, Pablito C. Lake May 2003

Detecting Malfunction In Wireless Sensor Networks, Pablito C. Lake

Theses

The objective of this thesis is to detect malfunctioning sensors in wireless sensor networks. The ability to detect abnormality is critical to the security of any sensor network. However, the ability to detect a faulty wireless sensor is not trivial. Controlled repeatable experiments are difficult in wireless channels. A Redhat Linux. 7.0 Wireless Emulation Dynamic Switch software was used to solve this problem.

Six nodes were configured with a node acting as a base station. The nodes were all part of a cell. This means that every node could communicate with all other nodes. A client-server program simulated the background …


Intrusion Detection System For Ad Hoc Mobile Networks Using Neighborhood Watch Theory, Ramani Rajagopalan May 2003

Intrusion Detection System For Ad Hoc Mobile Networks Using Neighborhood Watch Theory, Ramani Rajagopalan

Theses

This study describes several experiments to simulate and study temperature sensor networks. The ultimate goal of this study is to accurately predict a temperature sensor failure in a sensor network, using Network Neighborhood Watch theory. Simulated temperature measurements are used to compare the results of accuracy, and quickness in detecting a failure in a malfunctioning sensor node. This is done by changing the intervals between temperature sampling, by considering different rates of temperature raise, as well as varying the number of nodes in the network neighborhood (deployment density). The thesis studies the threshold for temperature sensor failure by computing a …


Sub-Segment Based Transport Layer Protocol For Wireless Medium, Som Sengupta May 2003

Sub-Segment Based Transport Layer Protocol For Wireless Medium, Som Sengupta

Theses

This thesis discusses the techniques to improve the TCP over wireless. The loss-intensive wireless communication results in high retransmission rates to recover lost packets and bandwidth consumption. In addition, the retransmitted segments have significant chance of being dropped. To make the retransmission process more granular, large segments at the transport layer (540 bytes, by default) can be subdivided into smaller sub-segments. This document introduces a split TCP based solution and describes how to produce a series of smaller-sized segments that share the same transport layer header. A new header format is introduced to support the transmission of smaller segments …


Evaluation Of Intrusion Detection Systems With Automatic Traffic Generation Programs, Friday Bassey Akpan Jan 2003

Evaluation Of Intrusion Detection Systems With Automatic Traffic Generation Programs, Friday Bassey Akpan

Theses

In this master's thesis work, a program was developed using the Perl programming language to enable user defined attack programs to run automatically. A similar program was also developed for background traffic. With this program, the different features of the Nmap exploration and scanning tool were exploited to build scenarios of attacks.

Automated scenarios of attacks running in to the order of hundreds were developed. Also, different sets of automated stealthy attacks scenarios running in to the order of hundreds were developed using the timing modes, stealthy scans and scan delay features of Nmap.

These automated attacks scenarios were employed …


Protection And Restoration Algorithms For Wdm Optical Networks, Pitipatana Sakarindr Aug 2002

Protection And Restoration Algorithms For Wdm Optical Networks, Pitipatana Sakarindr

Theses

Currently, Wavelength Division Multiplexing (WDM) optical networks play a major role in supporting the outbreak in demand for high bandwidth networks driven by the Internet. It can be a catastrophe to millions of users if a single optical fiber is somehow cut off from the network, and there is no protection in the design of the logical topology for a restorative mechanism. Many protection and restoration algorithms are needed to prevent, reroute, and/or reconfigure the network from damages in such a situation. In the past few years, many works dealing with these issues have been reported. Those algorithms can be …


Introduction On Intrusion Detection Systems : Focus On Hierarchical Analysis, Ratna Bajaj Jan 2002

Introduction On Intrusion Detection Systems : Focus On Hierarchical Analysis, Ratna Bajaj

Theses

In today's fast paced computing world security is a main concern. Intrusion detection systems are an important component of defensive measures protecting computer systems and networks from abuse. This paper will examine various intrusion detection systems. The task of intrusion detection is to monitor usage of a system and detect and malicious activity, therefore, the architecture is a key component when studying intrusion detection systems. This thesis will also analyze various neural networks for statistical anomaly intrusion detection systems. The thesis will focus on the Hierarchical Intrusion Detection system (HIDE) architecture. The HIDE system detects network based attack as anomalies …


Attack Visualization For Intrusion Detection System, Mohammad A. Rabie Jan 2002

Attack Visualization For Intrusion Detection System, Mohammad A. Rabie

Theses

Attacks detection and visualization is the process of attempting to identify instances of network misuse by comparing current activity against the expected actions of an intruder. Most current approaches to attack detection involve the use of rule-based expert systems to identify indications of known attacks. However, these techniques are less successful in identifying attacks, which vary from expected patterns. Artificial neural networks provide the potential to identify and classify network activity based on limited, incomplete, and nonlinear data sources. Presenting an approach to the process of Attack visualization that utilizes the analytical strengths of neural networks, and providing the results …


Silicon Based Ir Filters, Prakash Mokashi May 2001

Silicon Based Ir Filters, Prakash Mokashi

Theses

The design and fabrication of silicon based IR (Infrared) filters for high-speed optical communication systems are the topic of this thesis. Its novelty is in two aspects: 1) Use of silicon wafers as an optical guiding medium; 2) Use of wafer bonding technique to attach two optical elements together.

The structure consists of two optical waveguides, the bus waveguide and the drop channel waveguide. A ring on top of these waveguides couples them in such a way that only one narrow spectral line is removed from the bus waveguides which propagates in the dropchannel waveguide. The assembly is fabricated using …


A Cad-Mlca Interface For Next-Generation Dfe Tools, Jun He May 2001

A Cad-Mlca Interface For Next-Generation Dfe Tools, Jun He

Theses

Environmental concerns and rising product disposal costs have pressed manufactures to make more environmentally friendly products and customers to use and dispose of them in an environmental responsive way. Thus the practice of Design for Environment (DFE) is becoming essential in today's industrial environment. Life Cycle Assessment (LCA) provides different ways for the environmental assessment of products. One critical step in performing lifecycle assessment of any product design is to collect design-related data. The common way based on manual input for traditional DFE tools is not only cumbersome and time-consuming but also error-prone.

This thesis presents the characteristics of a …


Emulation Of The Dataflow Computing Paradigm Using Field Programmable Gate Arrays (Fpgas), Segreen Ingersoll Jan 2001

Emulation Of The Dataflow Computing Paradigm Using Field Programmable Gate Arrays (Fpgas), Segreen Ingersoll

Theses

Building a perfect dataflow computer has been an endeavor of many computer engineers. Ideally, it is a perfect parallel machine with zero overheads, but implementing one has been anything but perfect. While the sequential nature of control flow machines makes them relatively easy to implement, dataflow machines have to address a number of issues that are easily solved in the realm of control flow paradigm. Past implementations of dataflow computers have addressed these issues, such as conditional and reentrant program structures, along with the flow of data, at the processor level, i.e. each processor in the design would handle these …


Design And Fabrication Of Optical Resonators, Pushkar Moholkar May 2000

Design And Fabrication Of Optical Resonators, Pushkar Moholkar

Theses

The design and fabrication of ring optical resonators for high-speed optical communication systems is the topic of this thesis. Its novelty is in two aspects: 1) Use of silicon wafers as an optical guiding medium; 2) Use of wafer bonding technique to attach two optical elements together.

The structure consists of two optical waveguides, the bus waveguide and the drop channel waveguide. A ring on top of these waveguides couples them in such a way that only one narrow spectral line is removed from the bus waveguides which propagates in the drop-channel waveguide. The assembly is fabricated using wafer-bonding technique …


Current-Voltage Characteristics Of Tasi2/Si And Mos Devices Using Labview, Prasant Tangirala May 2000

Current-Voltage Characteristics Of Tasi2/Si And Mos Devices Using Labview, Prasant Tangirala

Theses

Analyses of current-voltage (LV) characteristics of Schottky Barrier Diodes (Tantalum Suicide) and Metal Oxide Semiconductor (MOS) Devices, using LabVIEWTM, has been presented here. LabVIEWTMTM, a graphical program development application, has been used to program a computer-driven Keithley Source Measure Unit (SMU) for device characterization. The SMU, which can be used as a Source Voltage - Measure Current as well as Source Current - Measure Voltage instrument, is used in the Source Voltage -Measure Current mode in this study. A General Purpose Interface Bus (GPIB) IEEE 488.2 has been used to interface the SMU with LabVIEWTM …


A Method Of Tracking Eye Motion For Human-Computer Interface, Martin Maranski May 2000

A Method Of Tracking Eye Motion For Human-Computer Interface, Martin Maranski

Theses

It would be of value to create another device for interfacing with a computer besides the commonly used handheld devices; one option is to determine where the user is looking on the screen. The major obstacle to overcome in this task is to be able to reliably track the motion of the iris and pupil in the eye. A method to do this is revealed here, using a variation of the Rough transform to detect circular patterns in a close shot of the eye. The algorithm was developed in Matlab and analyzed over a series of 20 sets of 6 …


An Algorithm For Fast Route Lookup And Update, Pinar Altin Yilmaz May 2000

An Algorithm For Fast Route Lookup And Update, Pinar Altin Yilmaz

Theses

Increase in routing table sizes, number of updates, traffic, speed of links and migration to IPv6 have made IP address lookup, based on longest prefix matching, a major bottleneck for high performance routers. Several schemes are evaluated and compared based on complexity analysis and simulation results. A trie based scheme, called Linked List Cascade Addressable Trie (LLCAT) is presented. The strength of LLCAT comes from the fact that it is easy to be implemented in hardware, and also routing table update operations are performed incrementally requiring very few memory operations guaranteed for worst case to satisfy requirements of dynamic routing …


Development Of A Demanufacturing System Modeling And Simulation Tool, Jingjing Hu May 2000

Development Of A Demanufacturing System Modeling And Simulation Tool, Jingjing Hu

Theses

This thesis develops a demanufacturing system modeling and simulation tool as an interface between simulation methods and demanufacturers. This tool can mimic the behavior of demanufacturing facility and obtain penetrable understanding of the system. By this modeling tool, one can intuitively analyze the behavior of a system and improve the operational efficiency. Detailed designs on the simulation tool including user interface, logic, and user view are presented in this thesis. The initial prototype version of the system modeling and simulation tool has been completed with fourteen modules in the developed template. Each object in the template refers to a specific …


Mutual Interference Investigation Of Cebus And X-10 Powerline Signaling, Sajid Pallithotungal Aug 1999

Mutual Interference Investigation Of Cebus And X-10 Powerline Signaling, Sajid Pallithotungal

Theses

Powerline control signaling using CEBus has great potential towards inexpensive home automation. CEBus transmits at 10 kBps using spread spectrum in the 100-400 kHz band while X-l0 sends 60 Bps using bursts of 120 kHz carrier on the power line. However, these two signals may destructively interfere when present simultaneously. X-10 is narrow band and interferes with the CEBus spread spectrum signal. This thesis looks into the mutual interference patterns of Power Line CEBus communication in the presence of X-l0 module signaling and visa versa. The investigation encompasses a series of tests and measurements on a Power Line CEBus-X10 test …