Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Engineering

Testing Exception And Error Cases Using Runtime Fault Injection, James A. Whittaker, Florence E. Mottay, Ibrahim K. El-Far Dec 2001

Testing Exception And Error Cases Using Runtime Fault Injection, James A. Whittaker, Florence E. Mottay, Ibrahim K. El-Far

Electrical Engineering and Computer Science Faculty Publications

Fault injection deals with the insertion or simulation of faults in order to test the robustness and fault tolerance of a software application. Such measures are generally performed on software that is mission critical, to the extent that failure could have significant negative ramifications. Actual injection of faults can be performed either at compile time, when additional code is inserted to force error conditions to evaluate to true, or at runtime during which faults are injected into the software's execution environment. This paper focuses on the latter type of fault injection and presents a new mechanism for inserting environmental faults. …


Survivable Mobile Operating System, James Whittaker, Mohommad Samarah Dec 2001

Survivable Mobile Operating System, James Whittaker, Mohommad Samarah

Electrical Engineering and Computer Science Faculty Publications

Although there is a large body of work on cryptographic techniques and algorithms that provide basic building blocks to solve specific security problems, relatively little work has been done in investigating security issues in mobile system contexts. Conventional security controls work well for static code, but break down with code mobility. In this paper, we investigate the need for end-to-end security in mobile and wireless operating systems. We study the implications of mobility - specifically, ways in which the operating system may facilitate communication security. We suggest a framework for designing security into mobile devices by building encryption into the …


Phad: Packet Header Anomaly Detection For Identifying Hostile Network Traffic, Philip K. Chan, Matthew V. Mahoney Nov 2001

Phad: Packet Header Anomaly Detection For Identifying Hostile Network Traffic, Philip K. Chan, Matthew V. Mahoney

Electrical Engineering and Computer Science Faculty Publications

We describe an experimental packet header anomaly detector (PHAD) that learns the normal range of values for 33 fields of the Ethernet, IP, TCP, UDP, and ICMP protocols. On the 1999 DARPA off-line intrusion detection evaluation data set (Lippmann et al. 2000), PHAD detects 72 of 201 instances (29 of 59 types) of attacks, including all but 3 types that exploit the protocols examined, at a rate of 10 false alarms per day after training on 7 days of attack-free internal network traffic. In contrast to most other network intrusion detectors and firewalls, only 8 attacks (6 types) are detected …


A Generalized Framework For Reasoning With Angular Directions, Mitra Debasis Nov 2001

A Generalized Framework For Reasoning With Angular Directions, Mitra Debasis

Electrical Engineering and Computer Science Faculty Publications

This extended abstract presents a new scheme for qualitative reasoning with directions between points in 2D-space, called Star-ontology(6). The current results of our study on the complexity issues for reasoning with incomplete/disjunctive information using this new ontology has been outlined here. We have also proposed a generalized framework Star-ontology(a) for an integer a, that could be specialized to many ontologies including some of the known ones like the 2D-Cradinal ontology for a=4, and the currently studied one for a=6. This generalization also points to an interesting direction for investigation in the field of spatio-temporal reasoning.


Modeling And Test Of Pixel Cross-Talk In Hgcdte Focal Plane Arrays, Thomas J. Sanders, E. Lee Caraway, Glenn T. Hess, Gwendolyn W. Newsome, Theodore Fischer Oct 2001

Modeling And Test Of Pixel Cross-Talk In Hgcdte Focal Plane Arrays, Thomas J. Sanders, E. Lee Caraway, Glenn T. Hess, Gwendolyn W. Newsome, Theodore Fischer

Electrical Engineering and Computer Science Faculty Publications

Mercury Cadmium Telluride focal plane arrays with well over 1000 pixels have been fabricated for a number of years. These FPA's have been built as large two-dimensional arrays of HgCdTe p-n junction diodes on a single CdTe or CdZnTe substrate. Sensitivity of each pixel to impinging radiation is one of the most important quality factors for these devices. However, material parameters, which give diode high sensitivity, are the same as those that cause cross talk between adjacent diodes in the array. This cross talk causes a blurred image and in general is a detrimental factor for the FPA system. The …


Detecting Novel Attacks By Identifying Anomalous Network Packet Headers, Philip K. Chan, Matthew V. Mahoney Oct 2001

Detecting Novel Attacks By Identifying Anomalous Network Packet Headers, Philip K. Chan, Matthew V. Mahoney

Electrical Engineering and Computer Science Faculty Publications

We describe a simple and efficient network intrusion detection algorithm that detects novel attacks by flagging anomalous field values in packet headers at the data link, network, and transport layers. In the 1999 DARPA off-line intrusion detection evaluation test set (Lippmann et. al. 2000), we detect 76% of probes and 48% of denial of service attacks (at 10 false alarms per day). When this system is merged with the 18 systems in the original evaluation, the average detection rate for attacks of all types increases from 61% to 65%. We investigate the effect on performance when attack free training data …


Completeness Of Propositional Logic As A Program, Ryan Stansifer Oct 2001

Completeness Of Propositional Logic As A Program, Ryan Stansifer

Electrical Engineering and Computer Science Faculty Publications

The proof of completeness for propositional logic is a constructive one, so a computer program is suggested by the proof. We prove the completeness theorem for Łukasiewicz’ axioms directly, and translate the proof into the functional languages SML and Haskell. In this paper we consider this proof as a program. The program produces enormous proof trees, but it is, we contend, as good a proof of completeness as the standard mathematical proofs.The real value of the exercise is the further evidence it provides that typed, functional languages can clearly express the complex abstractions of mathematics.


A Nonlinear Motion Cueing Algorithm With A Human Perception Model, Robert J. Telban Sep 2001

A Nonlinear Motion Cueing Algorithm With A Human Perception Model, Robert J. Telban

Link Foundation Modeling, Simulation and Training Fellowship Reports

The objective of a motion system, when used in conjunction with a visual system, is to stimulate the pilot so that he can perceive the required motion cues necessary to fly the simulator within the same performance and control activity as the aircraft. An example of a motion system is the six-degree-of-freedom hexapod shown in Figure E.l. Platform motion allows the pilot to react more quickly to simulated aircraft motion as compared to visual stimuli alone, thus enabling him to co1Tect (and reduce the magnitude) of any deviation sooner than having to wait for the information visually. Without motion cues …


Optimization Of Real-Time Protocols For Wireless Packet-Switched Multimedia Networks Based On Partially Observed Multivariate Point Processes, William S. Hortos Aug 2001

Optimization Of Real-Time Protocols For Wireless Packet-Switched Multimedia Networks Based On Partially Observed Multivariate Point Processes, William S. Hortos

Electrical Engineering and Computer Science Faculty Publications

Next-generation wireless networks have been designed to transport integrated multimedia services based on a cellular extension of a packet-switched architecture using variants of the Internet protocol (IP). Each call, arriving to or active within the network, carries demand for one or more services in parallel, where each service type has a guaranteed quality of service (QoS). Admission of new calls to the wireless IP network (WIN) from the gateway of a wired network or from a mobile subscriber (MS) is allowed by call admission control (CAC) procedures. MS roaming among the nodes of the WIN is controlled by handoff procedures …


Use Of Short-Pulse Laser For Optical Tomography Of Tissues, Kunal Mitra, Tuan Vo-Dinh Jun 2001

Use Of Short-Pulse Laser For Optical Tomography Of Tissues, Kunal Mitra, Tuan Vo-Dinh

Biomedical Engineering and Sciences Faculty Publications

This paper analyzes the short pulse laser propagation through tissues for development of a time-resolved optical tomography system for detection of tumors and inhomogeneities in tissues. Traditional method for analyzing optical transport in tissues is the parabolic or diffusion approximation in which the energy flux is assumed proportional to the fluence (intensity averaged over all solid angles) gradients. The inherent drawback in this model is that it predicts infinite speed of propagation of the optical signal. In this paper accurate hyperbolic or wave nature of transient radiative transfer formulation is used to overcome such drawbacks. The transmitted and reflected intensity …


Waveguide Delivery Of X Rays For Minimally Invasive Tumor Therapy, Ronald W. Waynant, Ilko K. Ilev, Kunal Mitra May 2001

Waveguide Delivery Of X Rays For Minimally Invasive Tumor Therapy, Ronald W. Waynant, Ilko K. Ilev, Kunal Mitra

Biomedical Engineering and Sciences Faculty Publications

We are studying the potential use of x-rays, which are collected by non-imaging optics and delivered through stereotactically guided needles by hollow waveguides, for irradiation of tumors. X-rays have greater transparency in tissue than most longer optical wavelengths and may provide a more uniform dose to a tumor without harming normal tissue. Dosimetry is the key to minimal damage. We are investigating the use of fiber optics, tipped with calibrated scintillators and strategically located near the tumor, to measure the delivered dose. We are testing this procedure by using a 3 ns, variable accelerator voltage Fexitron 706 to produce approximately …


Adaptive Threshold Selection Technique For Denoising In Dithered Quantizers, Samuel Peter Kozaitis, Hemen Goswami Mar 2001

Adaptive Threshold Selection Technique For Denoising In Dithered Quantizers, Samuel Peter Kozaitis, Hemen Goswami

Electrical Engineering and Computer Science Faculty Publications

We described an adaptive denoising method to improve image quality in a wavelet-based image compression process that uses dithered quantization. In our method, the second-order moment of the quantization noise is made independent of the signal by random quantization. Then, the quantization noise is reduced by thresholding wavelet coefficients. We first obtained a fixed threshold using any known technique. Then, a neighborhood is searched for the optimal threshold to optimize some cost function.


Hybrid Evolutionary Computing Model For Mobile Agents Of Wireless Internet Multimedia, William S. Hortos Mar 2001

Hybrid Evolutionary Computing Model For Mobile Agents Of Wireless Internet Multimedia, William S. Hortos

Electrical Engineering and Computer Science Faculty Publications

The ecosystem is used as an evolutionary paradigm of natural laws for the distributed information retrieval via mobile agents to allow the computational load to be added to server nodes of wireless networks, while reducing the traffic on communication links. Based on the Food Web model, a set of computational rules of natural balance form the outer stage to control the evolution of mobile agents providing multimedia services with a wireless Internet protocol (WIP). The evolutionary model shows how mobile agents should behave with the WIP, in particular, how mobile agents can cooperate, compete and learn from each other, based …