Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

2008

Theses/Dissertations

Institution
Keyword
Publication

Articles 1 - 30 of 58

Full-Text Articles in Engineering

Quad General Tree Drawing Algorithm And General Trees Characterization: Towards An Environment For The Experimental Study On General Tree Drawing Algorithms, Chu Yao Dec 2008

Quad General Tree Drawing Algorithm And General Trees Characterization: Towards An Environment For The Experimental Study On General Tree Drawing Algorithms, Chu Yao

Theses and Dissertations

Information visualization produces (interactive) visual representations of abstract data to reinforce human cognition and perception; thus enabling the viewer to gain knowledge about the internal structure of the data and causal relationships in it. The visualization of information hierarchies is concerned with the presentation of abstract hierarchical information about relationships between various entities. It has many applications in diverse domains such as software engineering, information systems, biology, and chemistry. Information hierarchies are typically modeled by an abstract tree, where vertices are entities and edges represent relationships between entities. The aim of visualizing tree drawings is to automatically produce drawings of …


Sub-Circuit Selection And Replacement Algorithms Modeled As Term Rewriting Systems, Eric D. Simonaire Dec 2008

Sub-Circuit Selection And Replacement Algorithms Modeled As Term Rewriting Systems, Eric D. Simonaire

Theses and Dissertations

Intent protection is a model of software obfuscation which, among other criteria, prevents an adversary from understanding the program’s function for use with contextual information. Relating this framework for obfuscation to malware detection, if a malware detector can perfectly normalize a program P and any obfuscation (variant) of the program O(P), the program is not intent protected. The problem of intent protection on programs can also be modeled as intent protection on combinational logic circuits. If a malware detector can perfectly normalize a circuit C and any obfuscation (variant) O(C) of the circuit, the circuit is not intent protected. In …


Mapping Reality Into Virtual Worlds, Josh Mcfarlane Dec 2008

Mapping Reality Into Virtual Worlds, Josh Mcfarlane

Computer Science and Computer Engineering Undergraduate Honors Theses

As virtual worlds become more prevalent, they become increasingly useful as a means of information dissemination. This thesis examines the possible connections between real world objects and their virtual world counterparts. We look at how, by attaching sensors to an object, or by using a smart object with embedded sensors, the information can be relayed to a server. From this information, it will be possible to create a duplicate object in the virtual world and have it mirror the real world object in terms of state and movement. Almost all current solutions for remotely viewing a room or area are …


Steganography In Ipv6, Barret Miller Dec 2008

Steganography In Ipv6, Barret Miller

Computer Science and Computer Engineering Undergraduate Honors Theses

Steganography is the process of hiding a secret message within another message such that it is difficult to detect the presence of the secret message. In other words, the existence of the secret message is hidden. A covert channel refers to the actual medium that is used to communicate the information such as a message, image, or file. This honors thesis uses steganography within the source address fields of Internet Protocol Version 6 (IPv6) packets to create a covert channel through which clandestine messages are passed from one party to another. A fully functional computer program was designed and written …


A C To Register Transfer Level Algorithm Using Structured Circuit Templates: A Case Study With Simulated Annealing, Jonathan D. Phillips Dec 2008

A C To Register Transfer Level Algorithm Using Structured Circuit Templates: A Case Study With Simulated Annealing, Jonathan D. Phillips

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

A tool flow is presented for deriving simulated annealing accelerator circuits on a field programmable gate array (FPGA) from C source code by exploring architecture solutions that conform to a preset template through scheduling and mapping algorithms. A case study carried out on simulated annealing-based Autonomous Mission Planning and Scheduling (AMPS) software used for autonomous spacecraft systems is explained. The goal of the research is an automated method for the derivation of a hardware design that maximizes performance while minimizing the FPGA footprint. Results obtained are compared with a peer C to register transfer level (RTL) logic tool, a state-of-the-art …


Irrelevance, Polymorphism, And Erasure In Type Theory, Richard Nathan Mishra-Linger Nov 2008

Irrelevance, Polymorphism, And Erasure In Type Theory, Richard Nathan Mishra-Linger

Dissertations and Theses

Dependent type theory is a proven technology for verified functional programming in which programs and their correctness proofs may be developed using the same rules in a single formal system. In practice, large portions of programs developed in this way have no computational relevance to the ultimate result of the program and should therefore be removed prior to program execution. In previous work on identifying and removing irrelevant portions of programs, computational irrelevance is usually treated as an intrinsic property of program expressions. We find that such an approach forces programmers to maintain two copies of commonly used datatypes: a …


Analysis And Evaluation Of Existing C-Band Feed Horns For Applicability To The 21 Meter Morehead Space Tracking Antenna, Prabhakara Rao Eluru Oct 2008

Analysis And Evaluation Of Existing C-Band Feed Horns For Applicability To The 21 Meter Morehead Space Tracking Antenna, Prabhakara Rao Eluru

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Science & Technology at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Prabhakara Rao Eluru on October 8, 2008.


Window Queries Over Data Streams, Jin Li Oct 2008

Window Queries Over Data Streams, Jin Li

Dissertations and Theses

Evaluating queries over data streams has become an appealing way to support various stream-processing applications. Window queries are commonly used in many stream applications. In a window query, certain query operators, especially blocking operators and stateful operators, appear in their windowed versions. Previous research work in evaluating window queries typically requires ordered streams and this order requirement limits the implementations of window operators and also carries performance penalties. This thesis presents efficient and flexible algorithms for evaluating window queries. We first present a new data model for streams, progressing streams, that separates stream progress from physical-arrival order. Then, we …


Using Timed-Release Cryptography To Mitigate Preservation Risk Of Embargo Periods, Rabia Haq Oct 2008

Using Timed-Release Cryptography To Mitigate Preservation Risk Of Embargo Periods, Rabia Haq

Computer Science Theses & Dissertations

This research defines Time-Locked Embargo, a framework designed to mitigate the Preservation Risk Interval: the preservation risk associated with embargoed scholarly material. Due to temporary access restrictions, embargoed data cannot be distributed freely and thus preserved via data refreshing during the embargo time interval. A solution to mitigate the risk of data loss has been developed by suggesting a data dissemination framework that allows data refreshing of encrypted instances of embargoed content in an open, unrestricted scholarly community. This framework has been developed by exploiting implementations of existing technologies to"time-lock" data using Timed-Release Cryptology (TRC) so that it can be …


Engineering Management Framework In Support Of Modeling & Simulation Application For Domain Specific Procurement, Thomas Guy Litwin Oct 2008

Engineering Management Framework In Support Of Modeling & Simulation Application For Domain Specific Procurement, Thomas Guy Litwin

Engineering Management & Systems Engineering Theses & Dissertations

A strategic process is desirable for project-based organizations in order for them to be efficient and effective when developing Modeling & Simulation (M&S) systems. This thesis proposes an overarching process that combines traditional M&S and Engineering Management methodologies in a new framework to support M&S organizations during the procurement process.

This thesis proposes both a Strategic Project Management Process (SPMP) and a systems engineering process for M&S federation development projects. The systems engineering process utilizes the artifacts of Model Driven Architecture (MDA) to support building M&S federations driven by operational requirements. Detailed research of this systems engineering process revealed a …


Modeling Geographic Population Dispersion Utilizing Geospatial Information System Environment Agents In An Agent Based Model, Karl D. Liebert Oct 2008

Modeling Geographic Population Dispersion Utilizing Geospatial Information System Environment Agents In An Agent Based Model, Karl D. Liebert

Computational Modeling & Simulation Engineering Theses & Dissertations

New capabilities in agent based model (ABM) environments are opening the door to the creation of ABM that may incorporate high-quality, real world environment data in the form of Geospatial Information System (GIS) files . In the past, GJS environments were only possible through extensive software development efforts focused on specific model applications.

This thesis explores the value and issues of using GIS data to provide an ABM environment. It examines the ability of ABM development environments (DE) to support GIS environment data. The selected ABM DE is then used to model population behavior in an environment defined by authoritative …


Service Oriented Transitive Closure Solution, Jonathan Baran Aug 2008

Service Oriented Transitive Closure Solution, Jonathan Baran

Computer Science and Computer Engineering Undergraduate Honors Theses

The goal of this project is a service based solution that utilizes parallel and distributed processing algorithms to solve the transitive closure problem for a large dataset. A dataset may be view conceptually as a table in a database, with a physical structure representing a file containing a sequence of records and fields. Two records are said to be transitively related if and only if they are directly related due to sharing of one or more specific fields, or a sequence may be made from one record to the other under the condition that all intermediate entries are related the …


Predicting The Longevity Of Dvdr Media By Periodic Analysis Of Parity, Jitter, And Ecc Performance Parameters, Daniel Patrick Wells Jul 2008

Predicting The Longevity Of Dvdr Media By Periodic Analysis Of Parity, Jitter, And Ecc Performance Parameters, Daniel Patrick Wells

Theses and Dissertations

For the last ten years, DVD-R media have played an important role in the storage of large amounts of digital data throughout the world. During this time it was assumed that the DVD-R was as long-lasting and stable as its predecessor, the CD-R. Several reports have surfaced over the last few years questioning the DVD-R's ability to maintain many of its claims regarding archival quality life spans. These reports have shown a wide range of longevity between the different brands. While some DVD-Rs may last a while, others may result in an early and unexpected failure. Compounding this problem is …


Using Agile Software Development Practices In A Research Oriented Distributed Simulation, Douglas James Mielke Jul 2008

Using Agile Software Development Practices In A Research Oriented Distributed Simulation, Douglas James Mielke

Computational Modeling & Simulation Engineering Theses & Dissertations

Although sometimes controversial, agile methodologies have proven to be a viable choice for some software development projects. Projects suited to agile methodologies are those that involve new technology, have requirements that change rapidly, and are controlled by small, talented teams. Much literature about agile software development leans towards business products and non-government entities. Only a handful of literature resources mention agile software development being used in government contracts and even fewer resources mention research projects. NASA's Airspace and Traffic Operations Simulation (ATOS) is a research oriented simulation that doesn't follow the traditional business project mold. In an effort to gain …


Integrating Preservation Functions Into The Web Server, Joan A. Smith Jul 2008

Integrating Preservation Functions Into The Web Server, Joan A. Smith

Computer Science Theses & Dissertations

Digital preservation of theWorldWideWeb poses unique challenges, different fromthe preservation issues facing professional Digital Libraries. The complete list of a website’s resources cannot be cited with confidence, and the descriptive metadata available for the resources is so minimal that it is sometimes insufficient for a browser to recognize. In short, the Web suffers from a counting problem and a representation problem. Refreshing the bits, migrating from an obsolete file format to a newer format, and other classic digital preservation problems also affect the Web. As digital collections devise solutions to these problems, the Web will also benefit. But the core …


Biology-Inspired Approach For Communal Behavior In Massively Deployed Sensor Networks, Kennie H. Jones Jul 2008

Biology-Inspired Approach For Communal Behavior In Massively Deployed Sensor Networks, Kennie H. Jones

Computer Science Theses & Dissertations

Research in wireless sensor networks has accelerated rapidly in recent years. The promise of ubiquitous control of the physical environment opens the way for new applications that will redefine the way we live and work. Due to the small size and low cost of sensor devices, visionaries promise smart systems enabled by deployment of massive numbers of sensors working in concert. To date, most of the research effort has concentrated on forming ad hoc networks under centralized control, which is not scalable to massive deployments. This thesis proposes an alternative approach based on models inspired by biological systems and reports …


A Secure And Efficient Communications Architecture For Global Information Grid Users Via Cooperating Space Assets, Victor P. Hubenko Jun 2008

A Secure And Efficient Communications Architecture For Global Information Grid Users Via Cooperating Space Assets, Victor P. Hubenko

Theses and Dissertations

With the Information Age in full and rapid development, users expect to have global, seamless, ubiquitous, secure, and efficient communications capable of providing access to real-time applications and collaboration. The United States Department of Defense’s (DoD) Network-Centric Enterprise Services initiative, along with the notion of pushing the “power to the edge,” aims to provide end-users with maximum situational awareness, a comprehensive view of the battlespace, all within a secure networking environment. Building from previous AFIT research efforts, this research developed a novel security framework architecture to address the lack of efficient and scalable secure multicasting in the low earth orbit …


An Analysis Of Botnet Vulnerabilities, Sean W. Hudson Jun 2008

An Analysis Of Botnet Vulnerabilities, Sean W. Hudson

Theses and Dissertations

Botnets are a significant threat to computer networks and data stored on networked computers. The ability to inhibit communication between servers controlling the botnet and individual hosts would be an effective countermeasure. The objective of this research was to find vulnerabilities in Unreal IRCd that could be used to shut down the server. Analysis revealed that Unreal IRCd is a very mature and stable IRC server and no significant vulnerabilities were found. While this research does not eliminate the possibility that a critical vulnerability is present in the Unreal IRCd software, none were identified during this effort.


Location-Based Hashing For Querying And Searching, Felix Ching May 2008

Location-Based Hashing For Querying And Searching, Felix Ching

Computer Science and Computer Engineering Undergraduate Honors Theses

The rapidly growing information technology in modern days demands an efficient searching scheme to search for desired data. Locality Sensitive Hashing (LSH) is a method for searching similar data in a database. LSH achieves high accuracy and precision for locating desired data, but consumes a significant amount of memory and time. Based on LSH, this thesis presents two novel schemes for efficient and accurate data searching: Locality Sensitive Hashing-SmithWaterman (LSH-SmithWaterman) and Secure Min-wise Locality Sensitive Hashing (SMLSH). Both methods dramatically reduce the memory and time consumption and exhibit high accuracy in data searching. Simulation results demonstrate the efficiency of the …


Multiuav2 Agent Swarming For Distributed Atr Simulation, Kyle White May 2008

Multiuav2 Agent Swarming For Distributed Atr Simulation, Kyle White

Computer Science and Computer Engineering Undergraduate Honors Theses

Traditional automatic target recognition (ATR) is performed by unmanned aerial vehicles (UAVs) depending on a central control tower to provide the high level organization of the system. The UAVs fly through a region of interest to identify targets and relay all communication through a central control tower. The centralized approach to ATR has limited fault-tolerance, scalability with regards to the number of UAVs, and susceptibility to malicious attacks on the central tower [2]. A swarm-driven alternative [1] is extended with a communication control scheme to address fault-tolerance and scalability while utilizing the higher onboard processing power now available for UAVs …


Pitch Correction On The Human Voice, Suzanne Ownbey May 2008

Pitch Correction On The Human Voice, Suzanne Ownbey

Computer Science and Computer Engineering Undergraduate Honors Theses

No abstract provided.


Visualization Of An Approach To Data Clustering, Marisabel Guevara May 2008

Visualization Of An Approach To Data Clustering, Marisabel Guevara

Computer Science and Computer Engineering Undergraduate Honors Theses

Using visualization and clustering goals as guidelines, this thesis explores a graphic implementation of a data clustering technique that repositions vertices by applying physical laws of charges and springs to the components of the graph. The resulting visualizations are evidence of the success of the approach as well as of the data sets that lend themselves to a clustering routine. Due to the visual product of the implementation, the algorithm is most useful as an aid in understanding the grouping pattern of a data set. Either for a rapid analysis or to assist in presentation, the visual result of the …


Developing Subgrade Inputs For Mechanistic-Empirical Pavement Design, Meagan Berlau May 2008

Developing Subgrade Inputs For Mechanistic-Empirical Pavement Design, Meagan Berlau

Computer Science and Computer Engineering Undergraduate Honors Theses

No abstract provided.


Wireless Sensor Network Modeling Using Modified Recurrent Neural Network: Application To Fault Detection, Azzam Issam Moustapha Apr 2008

Wireless Sensor Network Modeling Using Modified Recurrent Neural Network: Application To Fault Detection, Azzam Issam Moustapha

Doctoral Dissertations

Wireless Sensor Networks (WSNs) consist of a large number of sensors, which in turn have their own dynamics. They interact with each other and the base station, which controls the network. In multi-hop wireless sensor networks, information hops from one node to another and finally to the network gateway or base station. Dynamic Recurrent Neural Networks (RNNs) consist of a set of dynamic nodes that provide internal feedback to their own inputs. They can be used to simulate and model dynamic systems such as a network of sensors.

In this dissertation, a dynamic model of wireless sensor networks and its …


Improving Query Efficiency Of Multiresolution Data Aggregation For Analytical Exploration Of Large Relational Dataset, Yu-Ting Huang Apr 2008

Improving Query Efficiency Of Multiresolution Data Aggregation For Analytical Exploration Of Large Relational Dataset, Yu-Ting Huang

Masters Theses

Tree structures are developed to organize the data more efficiently by using fewer resources for searching records. This thesis investigates the tree's actual structure on the hard disk to see the influence of different kinds of structures on the tree building time and query execution time. In order to improve efficiency, one multi-file structure and two reorganization structures, BFS and DFS, are examined to achieve this goal. The results indicate that two reorganization structures on KDB-tree structure can significantly improve the query execution time in large data sets and multi-file structure can slightly improve the TPIE lover level building time.


Parallel Mpi/Fortran Finite Element Symmetrical/Unsymmetrical Domain Decomposition, Siroj Tungkatara Apr 2008

Parallel Mpi/Fortran Finite Element Symmetrical/Unsymmetrical Domain Decomposition, Siroj Tungkatara

Civil & Environmental Engineering Theses & Dissertations

MPI/FORTRAN finite element analysis software based on Domain Decomposition (DD) formulas has been developed in this work. Efficient input data storage/data communication schemes, domain partitioning, fast symbolical and numerical sparse assembly, symmetrical/unsymmetrical sparse solver and robust symmetrical/unsymmetrical iterative solvers algorithms are all incorporated into the developed code. Parallel Precondition Conjugated Gradient (PCG) and Flexible Generalized Minimum Residual (FGMRES) are developed. Efficient computational techniques used in the developed code are explained. Numerical performance and the accuracy of the developed code are conducted on acoustic examples with medium to large grid sizes. The results obtained from ODU Wilbur cluster (under parallel processing …


Real-Time Ultrasound Simulation For Medical Training And Standardized Patient Assessment, Bo Sun Apr 2008

Real-Time Ultrasound Simulation For Medical Training And Standardized Patient Assessment, Bo Sun

Computational Modeling & Simulation Engineering Theses & Dissertations

With the increasing role played by ultrasound in clinical diagnostics, ultrasound training in medical education has become more and more important. The clinical routine for ultrasound training is on real patients; therefore monitored and guided examinations involving medical students are quite time-constrained. Furthermore, standardized patients (SPs), who are increasingly used in medical school for teaching and assessing medical students, need to be augmented. These SPs are typically healthy individuals who can not accurately portray the variety of abnormalities that are needed for training especially when medical examinations involve instrument interactions. To augment SPs in a realistically effective way and also …


Composable Distributed Access Control And Integrity Policies For Query-Based Wireless Sensor Networks, David W. Marsh Mar 2008

Composable Distributed Access Control And Integrity Policies For Query-Based Wireless Sensor Networks, David W. Marsh

Theses and Dissertations

An expected requirement of wireless sensor networks (WSN) is the support of a vast number of users while permitting limited access privileges. While WSN nodes have severe resource constraints, WSNs will need to restrict access to data, enforcing security policies to protect data within WSNs. To date, WSN security has largely been based on encryption and authentication schemes. WSN Authorization Specification Language (WASL) is specified and implemented using tools coded in JavaTM. WASL is a mechanism{independent policy language that can specify arbitrary, composable security policies. The construction, hybridization, and composition of well{known security models is demonstrated and shown to preserve …


Semantic Components: A Model For Enhancing Retrieval Of Domain- Specific Information, Susan Loucette Price Mar 2008

Semantic Components: A Model For Enhancing Retrieval Of Domain- Specific Information, Susan Loucette Price

Dissertations and Theses

Despite the success of general Internet search engines, information retrieval remains an incompletely solved problem. Our research focuses on supporting domain experts when they search domain-specific libraries to satisfy targeted information needs. The semantic components model introduces a schema specific to a particular document collection. A semantic component schema consists of a two-level hierarchy, document classes and semantic components. A document class represents a document grouping, such as topic type or document purpose. A semantic component is a characteristic type of information that occurs in a particular document class and represents an important aspect of the document’s main topic. …


Digital Signal Processing Leveraged For Intrusion Detection, Theodore J. Erickson Mar 2008

Digital Signal Processing Leveraged For Intrusion Detection, Theodore J. Erickson

Theses and Dissertations

This thesis describes the development and evaluation of a novel system called the Network Attack Characterization Tool (NACT). The NACT employs digital signal processing to detect network intrusions, by exploiting the Lomb-Scargle periodogram method to obtain a spectrum for sampled network traffic. The Lomb-Scargle method for generating a periodogram allows for the processing of unevenly sampled network data. This method for determining a periodogram has not yet been used for intrusion detection. The spectrum is examined to determine if features exist above a significance level chosen by the user. These features are considered an attack, triggering an alarm. Two traffic …