Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 24 of 24

Full-Text Articles in Engineering

Network Anomaly Detection Using Management Information Base (Mib) Network Traffic Variables, Jun Li Aug 2004

Network Anomaly Detection Using Management Information Base (Mib) Network Traffic Variables, Jun Li

Dissertations

In this dissertation, a hierarchical, multi-tier, multiple-observation-window, network anomaly detection system (NADS) is introduced, namely, the MIB Anomaly Detection (MAD) system, which is capable of detecting and diagnosing network anomalies (including network faults and Denial of Service computer network attacks) proactively and adaptively. The MAD system utilizes statistical models and neural network classifier to detect network anomalies through monitoring the subtle changes of network traffic patterns. The process of measuring network traffic pattern is achieved by monitoring the Management Information Base (Mifi) II variables, supplied by the Simple Network Management Protocol (SNMP) LI. The MAD system then converted each monitored …


Carrier Transport In Ge Nanowires And One Dimensional Si/Ge Heterojunctions, Eun Kyu Lee Aug 2004

Carrier Transport In Ge Nanowires And One Dimensional Si/Ge Heterojunctions, Eun Kyu Lee

Theses

Ge Nanowires (Ge NWs) on single crystal, (100) and (111) oriented n-type Si substrates were grown via the vapor-liquid-solid (VLS) mechanism and studied with respect to their electrical properties.

Using different contact geometries, direct current (DC) and alternating current (AC) electrical and photoelectrical measurements were carried out at room temperature to investigate electrical properties of Ge NWs and Ge NWs/Si substrate one-dimensional (1 D) heterojunctions (HJs). A rectifying junction behavior is observed at NWs/substrate interface, but many orders of magnitude greater AC conductance than DC in Ge NW volume is measured at high frequencies. The obtained experimental data are consistent …


Spectrum Control And Iterative Coding For High Capacity Multiband Ofdm, Divaydeep Sikri Aug 2004

Spectrum Control And Iterative Coding For High Capacity Multiband Ofdm, Divaydeep Sikri

Theses

The emergence of Multiband Orthogonal Frequency Division Modulation (MB-OFDM) as an ultra-wideband (UWB) technology injected new optimism in the market through realistic commercial implementation, while keeping promise of high data rates intact. However, it has also brought with it host of issues, some of which are addressed in this thesis.

The thesis primarily focuses on the two issues of spectrum control and user capacity for the system currently proposed by the Multiband OFDM Alliance (MBOA). By showing that line spectra are still an issue for new modulation scheme (MB-OFDM), it proposes a mechanism of scrambling the data with an increased …


Detection Of Denial Of Service Attacks Using Database Queries, Dmytro Zakhalyavko Aug 2004

Detection Of Denial Of Service Attacks Using Database Queries, Dmytro Zakhalyavko

Theses

In the current intrusion detection world, most intrusion detection systems output data into flat files. This project was conducted in order to improve intrusion detection data and alerts by writing them into a database system and analyzing them with SQL. A database plug-in was developed that helps to transition the data from an intrusion detection system to a database. Storing, analyzing, categorizing, and accessing data are major advantages and reasons for using databases in intrusion detection. Security analysts have to constantly perform the difficult task of sorting through a haystack of attack alerts, many of which turn out to be …


Performance Evaluation Of Communication Systems With Transmit Diversity, Chunjun Gao May 2004

Performance Evaluation Of Communication Systems With Transmit Diversity, Chunjun Gao

Dissertations

Transmit diversity is a key technique to combat fading with multiple transmit antennae for next-generation wireless communication systems. Space-time block code (STBC) is a main component of this technique. This dissertation consists of four parts: the first three discuss performance evaluation of STBCs in various circumstances, the fourth outlines a novel differential scheme with full transmit diversity.

In the first part, closed-form expressions for the bit error rate (BER) are derived for STBC based on Alamouti's scheme and utilizing M-ary phase shift keying (MPSK) modulation. The analysis is carried out for a slow, flat Rayleigh fading channel with coherent detection …


Multi-Rate Access Schemes And Successive Interference Cancellation For Wireless Multimedia Mc-Cdma Communications, Mizhou Tan May 2004

Multi-Rate Access Schemes And Successive Interference Cancellation For Wireless Multimedia Mc-Cdma Communications, Mizhou Tan

Dissertations

To catch up with the fast changes of the information challenges, providing multimedia services has become a very important requirement for future wireless communications. A proper system, capable of supporting multi-rate transmissions as well as handling high quality of service (QoS) requirements in hostile wireless communication environments, should be sought. Multi-carrier CDMA (MC-CDMA), a combination of multi-carrier modulation (MCM) and direct-sequence CDMA (DS-CDMA), appears to be one of the most elegant solutions. In this dissertation, four multi-rate access schemes, termed uncoded fixed spreading length (UFSL), coded fixed spreading length (CFSL), multi-code fixed spreading length (MFSL) and variable spreading length (VSL), …


Providing Guaranteed Qos In The Hose-Modeled Vpn, Dong Wei May 2004

Providing Guaranteed Qos In The Hose-Modeled Vpn, Dong Wei

Dissertations

With the development of the Internet, Internet service providers (ISPs) are required to offer revenue-generating and value-added services instead of only providing bandwidth and access services. Virtual Private Network (VPN) is one of the most important value-added services for ISPs.

The "classical" VPN service is provided by implementing layer 2 technologies, either Frame Relay (FR) or Asynchronous Transfer Mode (ATM). With FR or ATM, virtual circuits are created before data delivery. Since the bandwidth and buffers are reserved, the QoS requirements can be naturally guaranteed. In the past few years, layer 3 VPN technologies are widely deployed due to the …


Phase Noise Effects On Ofdm : Analysis And Mitigation, Songping Wu May 2004

Phase Noise Effects On Ofdm : Analysis And Mitigation, Songping Wu

Dissertations

Orthogonal frequency division multiplexing (OFDM) is a promising technique which has high spectrum efficiency and the robustness against channel frequency selectivity. One drawback of OFDM is its sensitivity to phase noise. It has been shown that even small phase noise leads to significant performance loss of OFDM. Therefore, phase noise effects on OFDM systems need to be analyzed and methods be provided to its mitigation.

Motivated by what have been proposed in the literature, the exact signal to interference plus noise ratio (SINR) is derived in this dissertation for arbitrary phase noise levels. In a multiple access environment with multiple …


Enhancing Qos Provisioning And Granularity In Next Generation Internet, Jie Yang May 2004

Enhancing Qos Provisioning And Granularity In Next Generation Internet, Jie Yang

Dissertations

Next Generation IP technology has the potential to prevail, both in the access and in the core networks, as we are moving towards a multi-service, multimedia and high-speed networking environment. Many new applications, including the multimedia applications, have been developed and deployed, and demand Quality of Service (QoS) support from the Internet, in addition to the current best effort service. Therefore, QoS provisioning techniques in the Internet to guarantee some specific QoS parameters are more a requirement than a desire. Due to the large amount of data flows and bandwidth demand, as well as the various QoS requirements, scalability and …


Statistical Anomaly Denial Of Service And Reconnaissance Intrusion Detection, Zheng Zhang May 2004

Statistical Anomaly Denial Of Service And Reconnaissance Intrusion Detection, Zheng Zhang

Dissertations

This dissertation presents the architecture, methods and results of the Hierarchical Intrusion Detection Engine (HIDE) and the Reconnaissance Intrusion Detection System (RIDS); the former is denial-of-service (DoS) attack detector while the latter is a scan and probe (P&S) reconnaissance detector; both are statistical anomaly systems.

The HIDE is a packet-oriented, observation-window using, hierarchical, multi-tier, anomaly based network intrusion detection system, which monitors several network traffic parameters simultaneously, constructs a 64-bin probability density function (PDF) for each, statistically compares it to a reference PDF of normal behavior using a similarity metric, then combines the results into an anomaly status vector that …


Ad Hoc Network Security And Modeling With Stochastic Petri Nets, Congzhe Zhang May 2004

Ad Hoc Network Security And Modeling With Stochastic Petri Nets, Congzhe Zhang

Dissertations

Advances in wireless technology and portable computing along with demands for high user mobility have provided a major promotion toward the development of ad hoc networks. These networks feature dynamic topology, self-organization, limited bandwidth and battery power of a node. Unlike the existing commercial wireless systems and fixed infrastructure networks, they do not rely on specialized routers for path discovery and traffic routing. Security is an important issue in such networks. Typically, mobile nodes are significantly more susceptible to physical attacks than their wired counterparts.

This research intends to investigate the ad hoc network routing security by proposing a performance …


Qos Provisioning In Multimedia Streaming, Hong Zhao May 2004

Qos Provisioning In Multimedia Streaming, Hong Zhao

Dissertations

Multimedia consists of voice, video, and data. Sample applications include video conferencing, video on demand, distance learning, distributed games, and movies on demand. Providing Quality of Service (QoS) for multimedia streaming has been a difficult and challenging problem. When multimedia traffic is transported over a network, video traffic, though usually compressed/encoded for bandwidth reduction, still consumes most of the bandwidth. In addition, compressed video streams typically exhibit highly variable bit rates as well as long range dependence properties, thus exacerbating the challenge in meeting the stringent QoS requirements of multimedia streaming with high network utilization. Dynamic bandwidth allocation in which …


Ultra-Wideband Technology For Short-Range Wireless Communication, Li Zhao May 2004

Ultra-Wideband Technology For Short-Range Wireless Communication, Li Zhao

Dissertations

The ultra-wideband (UWB) radio core idea is to open large amounts of spectrum to a variety of users with little mutual interference between them. While ultra-wideband is being championed by several commercial companies, this technology has not followed the conventional path where commercial interest is preceded by years of academic research. This work attempts to fill in some of the gap by studying fundamental properties of communications with impulse-based radio UWB signals. We study jam resistance and capacity of UWB. Jam resistance is analyzed for binary pulse position modulation (PPM) with the interference being modeled as correlated Gaussian. Closed-form expressions …


Transmission And Detection For Space-Time Block Coding And V-Blast Systems, Lei He May 2004

Transmission And Detection For Space-Time Block Coding And V-Blast Systems, Lei He

Dissertations

This dissertation focuses on topics of data transmission and detection of space -time block codes (STBC). The STBCs can be divided into two main categories, namely, the orthogonal space-time block codes (OSTBC) and the quasi-orthogonal space-time codes (Q-OSTBC). The space-time block coded systems from transceiver design perspective for both narrow-band and frequency selective wireless environment are studied. The dissertation also processes and studies a fast iterative detection scheme for a high-rate space-time transmission system, the V-BLAST system.

In Chapter 2, a new OSTBC scheme with full-rate and full-diversity, which can be used on QPSK transceiver systems with four transmit antennas …


Hybrid Routing And Bridging Strategies For Large Scale Mobile Ad Hoc Networks, Sheng Xu May 2004

Hybrid Routing And Bridging Strategies For Large Scale Mobile Ad Hoc Networks, Sheng Xu

Dissertations

Multi-hop packet radio networks (or mobile ad-hoc networks) are an ideal technology to establish "instant" communication infrastructure for military and civilian applications in which both hosts and routers are mobile. In this dissertation, a position-based/link-state hybrid, proactive routing protocol (Position-guided Sliding-window Routing - PSR) that provides for a flat, mobile ad-hoc routing architecture is described, analyzed and evaluated. PSR is based on the superposition of link-state and position-based routing, and it employs a simplified way of localizing routing overhead, without having to resort to complex, multiple-tier routing organization schemes. A set of geographic routing zones is defined for each node, …


A Statistical Ultra Wideband Indoor Channel Model And The Effects Of Antenna Directivity On Multipath Delay Spread And Path Loss In Ultra Wideband Indoor Channels, Jason Anthony Dabin May 2004

A Statistical Ultra Wideband Indoor Channel Model And The Effects Of Antenna Directivity On Multipath Delay Spread And Path Loss In Ultra Wideband Indoor Channels, Jason Anthony Dabin

Theses

Ultra-wideband (UWB) indoor frequency domain channel measurements have been performed in the 2 GHz to 6 GHz frequency band using three different transmitter/receiver (Tx/Rx) antenna combination pairs. The effects of antenna directivity on path loss and multipath propagation in the channel were analyzed extensively for various omni-directional and directional antenna combinations. A statistical model of the path loss in the channel is presented, where the parameters in the model (i.e., path loss exponent and shadow fading statistics) are dependent on the particular Tx/Rx antenna combination. Time domain statistics of the channel (i.e., mean delay spread and RMS delay spread) are …


Study Of Design Tradeoffs Of Dram And Sram Memories, Using Hspice Computer Simulation, Bageshri Kale May 2004

Study Of Design Tradeoffs Of Dram And Sram Memories, Using Hspice Computer Simulation, Bageshri Kale

Theses

Semiconductor random access memories are complex systems that can be described by performance parameters such as memory cycle time, access delays, storage capacity, bit packing density, chip area and retention time. In this thesis, tradeoffs between cycle time, chip area, and storage size as reflected by bit line capacitance (Cbl) were studied as a function of particular design variables: memory cell capacitance (Cc); CMOS flip-flop sense amplifier (SA) transistor sizes; and size of precharge (PC), and word line (WL) switches. Performance was optimized using circuit simulation software, HSPICE, to observe DRAM and SRAM waveforms. With TSMC 0.18 micron technology, minimum …


Si-Sio2 Interface Behavior In N-Mosfets With Screening Potential During High-Field Injection, Purushothaman Srinivasan May 2004

Si-Sio2 Interface Behavior In N-Mosfets With Screening Potential During High-Field Injection, Purushothaman Srinivasan

Theses

This work investigates the screening of hot carrier stress degradation in n-channel MOSFETs when the devices were exposed to plasma processing. Devices with various antenna ratios were subjected to current stress (both gate injection and substrate injection) while the source and drain terminals were reverse biased by a screening potential followed by hot carrier stress. It was observed that screening of the drain edge was effective for both gate injection and substrate injection at different screening potentials. The hot carrier lifetime is directly related to interface state density (Dit), measured by charge pumping method. The results suggest that hot electron …


Adaptive Learning For Event Modeling And Pattern Classification, Shuangshuang Dai Jan 2004

Adaptive Learning For Event Modeling And Pattern Classification, Shuangshuang Dai

Dissertations

It is crucial to detect, characterize and model events of interest in a new propulsion system. As technology advances, the amount of data being generated increases significantly with respect to time. This increase substantially strains our ability to interpret the data at an equivalent rate. It demands efficient methodologies and algorithms in the development of automated event modeling and pattern recognition to detect and characterize events of interest and correlate them to the system performance. The fact that the information required to properly evaluate system performance and health is seldom known in advance further exacerbates this issue.

Event modeling and …


Oblivious Data Hiding : A Practical Approach, Husrev T. Sencar Jan 2004

Oblivious Data Hiding : A Practical Approach, Husrev T. Sencar

Dissertations

This dissertation presents an in-depth study of oblivious data hiding with the emphasis on quantization based schemes. Three main issues are specifically addressed:

1. Theoretical and practical aspects of embedder-detector design.

2. Performance evaluation, and analysis of performance vs. complexity tradeoffs.

3. Some application specific implementations.

A communications framework based on channel adaptive encoding and channel independent decoding is proposed and interpreted in terms of oblivious data hiding problem. The duality between the suggested encoding-decoding scheme and practical embedding-detection schemes are examined. With this perspective, a formal treatment of the "processing" employed in quantization based hiding methods is presented. In …


Multi-Spectral Light Interaction Modeling And Imaging Of Skin Lesions, Sachin Vidyanand Patwardhan Jan 2004

Multi-Spectral Light Interaction Modeling And Imaging Of Skin Lesions, Sachin Vidyanand Patwardhan

Dissertations

Nevoscope as a diagnostic tool for melanoma was evaluated using a white light source with promising results. Information about the lesion depth and its structure will further improve the sensitivity and specificity of melanoma diagnosis. Wavelength-dependent variable penetration power of monochromatic light in the trans-illumination imaging using the Nevoscope can be used to obtain this information. Optimal selection of wavelengths for multi-spectral imaging requires light-tissue interaction modeling. For this, three-dimensional wavelength dependent voxel-based models of skin lesions with different depths are proposed. A Monte Carlo simulation algorithm (MCSVL) is developed in MATLAB and the tissue models are simulated using the …


Ip-Based Virtual Private Networks And Proportional Quality Of Service Differentiation, Jingdi Zeng Jan 2004

Ip-Based Virtual Private Networks And Proportional Quality Of Service Differentiation, Jingdi Zeng

Dissertations

IP-based virtual private networks (VPNs) have the potential of delivering cost-effective, secure, and private network-like services. Having surveyed current enabling techniques, an overall picture of IP VPN implementations is presented.

In order to provision the equivalent quality of service (QoS) of legacy connection-oriented layer 2 VPNs (e.g., Frame Relay and ATM), IP VPNs have to overcome the intrinsically best effort characteristics of the Internet. Subsequently, a hierarchical QoS guarantee framework for IP VPNs is proposed, stitching together development progresses from recent research and engineering work.

To differentiate IP VPN QoS, the proportional QoS differentiation model, whose QoS specification granularity compromises …


Configurable Computer Systems Can Support Dataflow Computing, Anish Arvind Sathe Jan 2004

Configurable Computer Systems Can Support Dataflow Computing, Anish Arvind Sathe

Theses

This work presents a practical implementation of a uni-processor system design. This design, named D2-CPU, satisfies the pure data-driven paradigm, which is a radical alternative to the conventional von Neumann paradigm and exploits the instruction-level parallelism to its full extent. The D2-CPU uses the natural flow of the program, dataflow, by minimizing redundant instructions like fetch, store, and write back. This leads to a design with the better performance, lower power consumption and efficient use of the on-chip resources. This extraordinary performance is the result of a simple, pipelined and superscalar architecture with a very …


Pulsed Laser Ablation Deposition And Optical Characterization Of Hexagonal-Wurtzite Silicon, Berzelius Ybanez Cada Jan 2004

Pulsed Laser Ablation Deposition And Optical Characterization Of Hexagonal-Wurtzite Silicon, Berzelius Ybanez Cada

Theses

Hexagonal-wurtzite silicon phase silicon is an unusual polymorph of silicon with potentially useful electro-optical properties. Previous studies using a simple deposition system demonstrated that laser ablation of the standard cubic-diamond silicon produces droplets containing hexagonal-wurtzite crystallites. In order to study the process parameters and to deposit larger hexagonal crystals, a new pulsed laser ablation system with variable parameters was assembled and tested. Deposition expenments were performed in high vacuum with different laser pulse power. Raman spectroscopy showed that the new system successfully produces hexagonal-wurtzite silicon. The droplet size distributions, measured with an optical microscope, were found to depend on the …