Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Computer Engineering

2005

Institution
Keyword
Publication

Articles 1 - 30 of 57

Full-Text Articles in Engineering

Hardware Design And Implementation Of Role-Based Cryptography, Scott Edward Fields Dec 2005

Hardware Design And Implementation Of Role-Based Cryptography, Scott Edward Fields

Masters Theses

Traditional public key cryptographic methods provide access control to sensitive data by allowing the message sender to grant a single recipient permission to read the encrypted message. The Need2Know® system (N2K) improves upon these methods by providing role-based access control. N2K defines data access permissions similar to those of a multi-user file system, but N2K strictly enforces access through cryptographic standards. Since custom hardware can efficiently implement many cryptographic algorithms and can provide additional security, N2K stands to benefit greatly from a hardware implementation. To this end, the main N2K algorithm, the Key Protection Module (KPM), is being specified in …


Radar - A Novel Admission Control And Handoff Management Scheme For Multimedia Leo Satellite Networks, Syed Rashidali Rizvi Dec 2005

Radar - A Novel Admission Control And Handoff Management Scheme For Multimedia Leo Satellite Networks, Syed Rashidali Rizvi

Computer Science Theses & Dissertations

Low Earth Orbit (LEO) satellite networks are deployed as an enhancement to terrestrial wireless networks in order to provide broadband services to users regardless of their location. In addition to global coverage, these satellite systems support communications with hand-held devices and offer low cost-per-minute access cost, making them promising platforms for Personal Communication Services (PCS). LEO satellites are expected to support multimedia traffic and to provide their users with some form of Quality of Service (QoS) guarantees. However, the limited bandwidth of the satellite channel, satellite rotation around the Earth and mobility of end-users makes QoS provisioning and mobility management …


Robust And Efficient Localization Techniques For Cellular And Wireless Sensor Networks, Haseebulla M. Khan Dec 2005

Robust And Efficient Localization Techniques For Cellular And Wireless Sensor Networks, Haseebulla M. Khan

Computer Science Theses & Dissertations

Localization in wireless networks refers to a collection of tasks that, collectively, determines the location of a mobile user, striving to hide the effects of mobility from the user and/or application. Localization has become an important issue and has drawn considerable attention, as many applications including E-911, cargo tracking, locating patients, location-sensitive billing, etc., require knowledge of the location of user/objects. It was realized, quite a while back, that extending emergency 911-like services (E-911) to continually growing mobile population is one of the extremely important localization applications. The bulk of the proposed solutions to emergency location management in wireless environments …


A Performance Evaluation Of A Homogeneous Wireless Network Using Opnet It Guru, Roy Lee Gentry Jr. Nov 2005

A Performance Evaluation Of A Homogeneous Wireless Network Using Opnet It Guru, Roy Lee Gentry Jr.

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Science and Technology at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Roy Lee Gentry Jr. on November 30, 2005.


Modeling Adaptive Middleware And Its Applications To Military Tactical Datalinks, Jason T. Lawson Sep 2005

Modeling Adaptive Middleware And Its Applications To Military Tactical Datalinks, Jason T. Lawson

Theses and Dissertations

Open systems solutions and techniques have become the de facto standard for achieving interoperability between disparate, large-scale, legacy software systems. A key technology among open systems solutions and techniques is middleware. Middleware, in general, is used to isolate applications from dependencies introduced by hardware, operating systems, and other low-level aspects of system architectures. While middleware approaches are or will be integrated into operational military systems, many open questions exist about the appropriate areas to applying middleware. Adaptive middleware is middleware that provides an application with a run-time adaptation strategy, based upon system-level interfaces and properties. Adaptive middleware is an example …


Evaluation Of Coding Scheme For Mimo Radar, Suresh Kumar Harikrishnan Aug 2005

Evaluation Of Coding Scheme For Mimo Radar, Suresh Kumar Harikrishnan

Theses

Multiple Input Multiple Output (MIMO) antenna systems have shown a great potential for wireless communication. These systems support high capacity, increased diversity and interference suppression. Recently it has been proposed MIMO constellations for Radar. MIMO Radar is not only a new research field, but also a very promising approach in terms of overcoming Radar Cross Section (RCS) fluctuations with diversity. This thesis explores the potential of coding schemes for MIMO Radar.

The ambiguity functions measures related to MIMO Radar are used to evaluate how much diversity gain can be coherently achieved with certain coding schemes. The results of this analysis …


An Analytical Model Of Mac Protocol Dependant Power Consumption In Multi-Hop Ad Hoc Wireless Sensor Networks, Komlan Egoh Aug 2005

An Analytical Model Of Mac Protocol Dependant Power Consumption In Multi-Hop Ad Hoc Wireless Sensor Networks, Komlan Egoh

Theses

Power efficiency is the most constraining requirement for viable operation of battery-powered networked sensors. Conventionally, dynamic power management (DPM) is used to put sensor nodes into different states such as active, idle, and sleep, each consuming a certain level of power. Within the active state, communication operational states, such as receive and transmit consume different levels of nodal power. This thesis shows how DPM states and protocol operational states can be combined into a single stochastic model to finely evaluate the power consumption performance of a medium access control (MAC) protocol. The model is formulated as a semi-Markov decision process …


Dream: A Theoretical Analysis, Xueying Qi Jul 2005

Dream: A Theoretical Analysis, Xueying Qi

Computer Science Theses & Dissertations

A Mobile Ad-hoc Network (MANET, for short) is a collection of mobile nodes deployed in support of a short-lived special-purpose operation. Examples include search-and-rescue missions, law-enforcement, multimedia classrooms, and among many others. Unlike cellular or satellite networks, MANET do not rely on any form of pre-existing infrastructure. The mobility of nodes combined with the lack of infrastructure makes routing in MANET notoriously difficult. It was recently suggested that routing in MANET can use to advantage geographic information that the nodes may acquire either by endowing them with a GPS chip or simply by using known localization algorithms. Distance Routing Effect …


A Conceptual Framework For Analysis Of System Safety Interoperability Of United States Navy's Combat Systems, Showkat Shanaz Alborzi Jul 2005

A Conceptual Framework For Analysis Of System Safety Interoperability Of United States Navy's Combat Systems, Showkat Shanaz Alborzi

Engineering Management & Systems Engineering Theses & Dissertations

Today's political and military reality requires the optimal use of our legacy systems. The objective is to maximize the effectiveness of our operations by efficient allocation, placement and the use of our forces and war-fighting systems. The synergism drawn from the capabilities of the legacy complex systems enables today's war-fighting needs to be met without substantial increase in cost or resources. This synergism can be realized by the effective integration and interoperation of legacy systems into a larger, more complex system of systems.

However, the independently developed legacy systems in this new tactical environment often have different data types, languages, …


Opal: In Vivo Based Preservation Framework For Locating Lost Web Pages, Terry L. Harrison Jul 2005

Opal: In Vivo Based Preservation Framework For Locating Lost Web Pages, Terry L. Harrison

Computer Science Theses & Dissertations

We present Opal, a framework for interactively locating missing web pages (http status code 404). Opal is an example of "in vivo" preservation: harnessing the collective behavior of web archives, commercial search engines, and research projects for the purpose of preservation. Opal servers learn from their experiences and are able to share their knowledge with other Opal servers using the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH). Using cached copies that can be found on the web, Opal creates lexical signatures which are then used to search for similar versions of the web page. Using the OAI-PMH to facilitate …


A Jbi Information Object Engineering Environment Utilizing Metadata Fragments For Refining Searches On Semantically-Related Object Types, Felicia N. Harlow Jun 2005

A Jbi Information Object Engineering Environment Utilizing Metadata Fragments For Refining Searches On Semantically-Related Object Types, Felicia N. Harlow

Theses and Dissertations

The Joint Battlespace Infosphere (JBI) architecture defines the Information Object (IO) as its basic unit of data. This research proposes an IO engineering methodology that will introduce componentized IO type development. This enhancement will improve the ability of JBI users to create and store IO type schemas, and query and subscribe to information objects, which may be semantically related by their inclusion of common metadata elements. Several parallel efforts are being explored to enable efficient storage and retrieval of IOs. Utilizing relational database access methods, applying a component-based IO type development concept, and exploiting XML inclusion mechanisms, this research improves …


Motion Detection Using Randomized Methods, Howaida Mohamed Naguib Jun 2005

Motion Detection Using Randomized Methods, Howaida Mohamed Naguib

Archived Theses and Dissertations

The detection and recogni6on of a moving object in a sequence of time varying images proves to be a very important task in machine intelligence in general and computer vision in particular. Recently, parametric domain techniques have been successfully used with a number of variants. In such melhods, the image is transfonned into some parameter space and the motion detection process is applied in that space. A recent parametric domain is the Randomized Hough Transform (RHT) that uses random sampling mechanism in the image space, score accumulation in the parameter space, and bridge between them using a converging mapping. The …


Security Information Management With Frame-Based Attack Presentation And First-Order Reasoning, Wei Yan May 2005

Security Information Management With Frame-Based Attack Presentation And First-Order Reasoning, Wei Yan

Dissertations

Internet has grown by several orders of magnitude in recent years, and this growth has escalated the importance of computer security. Intrusion Detection System (IDS) is used to protect computer networks. However, the overwhelming flow of log data generated by IDS hamper security administrators from uncovering new insights and hidden attack scenarios. Security Information Management (SIM) is a new growing area of interest for intrusion detection. The research work in this dissertation explores the semantics of attack behaviors and designs Frame-based Attack Representation and First-order logic Automatic Reasoning (FAR-FAR) using linguistics and First-order Logic (FOL) based approaches. Techniques based on …


Tcp Performance Enhancement In Wireless Networks Via Adaptive Congestion Control And Active Queue Management, Kai Xu May 2005

Tcp Performance Enhancement In Wireless Networks Via Adaptive Congestion Control And Active Queue Management, Kai Xu

Dissertations

The transmission control protocol (TCP) exhibits poor performance when used in error-prone wireless networks. Remedy to this problem has been an active research area. However, a widely accepted and adopted solution is yet to emerge. Difficulties of an acceptable solution lie in the areas of compatibility, scalability, computational complexity and the involvement of intermediate routers and switches.

This dissertation rexriews the current start-of-the-art solutions to TCP performance enhancement, and pursues an end-to-end solution framework to the problem. The most noticeable cause of the performance degradation of TCP in wireless networks is the higher packet loss rate as compared to that …


A Versatile Programming Model For Dynamic Task Scheduling On Cluster Computers, Dejiang Jin May 2005

A Versatile Programming Model For Dynamic Task Scheduling On Cluster Computers, Dejiang Jin

Dissertations

This dissertation studies the development of application programs for parallel and distributed computer systems, especially PC clusters. A methodology is proposed to increase the efficiency of code development, the productivity of programmers and enhance performance of executing the developed programs on PC clusters while facilitating improvement of scalability and code portability of these programs. A new programming model, named the Super-Programming Model (SPM), is created. Programs are developed assuming an instruction set architecture comprised of SuperInstructions (SIs). SPM models the target system as a large Virtual Machine (VM); VM contains functional units which are underlain with sub-computer systems and SIs …


Planar Visual Fusion Scintigraphy, Jacob Puthiamadathil May 2005

Planar Visual Fusion Scintigraphy, Jacob Puthiamadathil

Theses

Planar scintigraphy, while providing useful information about the distribution of the radiopharmaceutical being used, often does not provide adequate information about the surrounding anatomical structures. A proposed method to solve this problem is by registering and fusing a scintigraphic image with a digital visual image. Fusing planar scintigraphic images with visual photographic images to supply an anatomic correlate to regions of radiopharmaceutical accumulation has been explored in this study. The digital visual image will provide a context for the relevant structures in the scintigraphic image. The validity of using one set of affine transformation parameters for registering all patient data …


Enabling Cost Aware Routing With Auctions In Wireless Ad-Hoc Networks, Ali Yuksel May 2005

Enabling Cost Aware Routing With Auctions In Wireless Ad-Hoc Networks, Ali Yuksel

Theses

Battery power is a precious resource in wireless ad-hoc networks, and most routing protocols that have been proposed so far do not generate cost efficient routes. In this thesis, a novel auction-based cost-aware routing scheme, called CARA, is presented. CARA is designed as an extension of the MAC layer, and is shown to improve the cost efficiency of existing ad-hoc routing protocols through dynamic power control, while introducing only minimal additional overhead. The MAC layer at each node is given the capability to run local sealed-bid second-price auctions for the user data packets that need to be transmitted, and to …


Cluster-Based Wireless Mobile Ad-Hoc Network Security, Mandur Bajra Bajracharya May 2005

Cluster-Based Wireless Mobile Ad-Hoc Network Security, Mandur Bajra Bajracharya

Theses

A wireless ad-hoc network is a cooperative communication network deployed with a specific purpose. It is characterized by dynamically changing topology with no fixed infrastructure which exhibits a perfectly vulnerable state for a number of different kinds of attacks.

This thesis proposes a novel technique of achieving security in wireless mobile ad hoc networks by integrating a simple clustering and a voting mechanism together. The purpose of forming a cluster is to facilitate security in the network and the voting is performed to support the decision making process in the cluster. A procedure of forming small homogenous clusters throughout the …


Performance Analysis Of Three Database Server Distribution Algorithms, Christopher G. Brown May 2005

Performance Analysis Of Three Database Server Distribution Algorithms, Christopher G. Brown

Culminating Projects in Information Assurance

Although the concept of the distributed database has been around for over 20 years, it has not dominated the computer landscape especially in business-related applications. This paper will explore the effectiveness of distributed database under a variety of conditions by conducting experiments using a number of different combinations of variables listed below. Specifically, the following questions will be researched:

  1. How does the workload intensity influence the need and performance of distributed database applications?
  2. How does the number of nodes the database is stored upon affect the data access time?
  3. How does the method used to assign a given query to …


Using A Pda To Control Home Appliances, Atif Albraiki May 2005

Using A Pda To Control Home Appliances, Atif Albraiki

Honors Capstone Projects - All

The Personal Digital Assistant (PDA) is a handheld device that gives users different organizational capabilities. Over the years, the functionality of PDAs has expanded tremendously to include internet connectivity and different computer applications. The purpose of my honors thesis, combined with my engineering senior design project, was to include a new functionality to the PDA and use it to control different home appliances. The goal of the project was to develop a PDA program that will communicate with a PC program, and have the PC program communicate with a microcontroller to control home appliances. My part of the project was …


A Computational Study Of Thermo-Fluid Dynamics Of Pulse Detonation Engines, Alberto Davila Urresti Apr 2005

A Computational Study Of Thermo-Fluid Dynamics Of Pulse Detonation Engines, Alberto Davila Urresti

Master's Theses - Daytona Beach

The purpose of this thesis is to use a transient Computational Fluid Dynamics computer code written in FORTRAN 90 for full reaction kinetics, to perform an analysis of the physical processes and chemical phenomena occurring on a single cycle of an ideal Pulse Detonation Engine (PDE) using a stoichiometric mixture of H2 and O2. A small zone of high pressure and temperature is used to initiate the detonation wave in the PDE. A simple case with no chemical reactions and the same PDE geometry and “computational spark” is also tested. The speed of the wave relative to …


Clustering And Hybrid Routing In Mobile Ad Hoc Networks, Lan Wang Apr 2005

Clustering And Hybrid Routing In Mobile Ad Hoc Networks, Lan Wang

Computer Science Theses & Dissertations

This dissertation focuses on clustering and hybrid routing in Mobile Ad Hoc Networks (MANET). Specifically, we study two different network-layer virtual infrastructures proposed for MANET: the explicit cluster infrastructure and the implicit zone infrastructure. In the first part of the dissertation, we propose a novel clustering scheme based on a number of properties of diameter-2 graphs to provide a general-purpose virtual infrastructure for MANET. Compared to virtual infrastructures with central nodes, our virtual infrastructure is more symmetric and stable, but still light-weight. In our clustering scheme, cluster initialization naturally blends into cluster maintenance, showing the unity between these two operations. …


Lightweight Federation Of Non-Cooperating Digital Libraries, Rong Shi Apr 2005

Lightweight Federation Of Non-Cooperating Digital Libraries, Rong Shi

Computer Science Theses & Dissertations

This dissertation studies the challenges and issues faced in federating heterogeneous digital libraries (DLs). The objective of this research is to demonstrate the feasibility of interoperability among non-cooperating DLs by presenting a lightweight, data driven approach, or Data Centered Interoperability (DCI). We build a Lightweight Federated Digital Library (LFDL) system to provide federated search service for existing digital libraries with no prior coordination.

We describe the motivation, architecture, design and implementation of the LFDL. We develop, deploy, and evaluate key services of the federation. The major difference to existing DL interoperability approaches is one where we do not insist on …


A Systems Methodology For Measuring Operational Organization Effectiveness: A Study Of The Original Equipment Computer Manufacturing Industry, 1948 To 2001, Teddy Steven Cotter Apr 2005

A Systems Methodology For Measuring Operational Organization Effectiveness: A Study Of The Original Equipment Computer Manufacturing Industry, 1948 To 2001, Teddy Steven Cotter

Engineering Management & Systems Engineering Theses & Dissertations

Optimizing operational organizational effectiveness is the central, although often unstated, goal of engineering management and systems engineering research and applications. Two fundamental problems remain to be addressed in pursuit of this goal. First, despite over fifty years of research in various disciplines, there is still no universally accepted definition of organizational effectiveness. Second, no methodology exists to identify the domains, dimensions, and determinants of operational organizational effectiveness and dynamically model operational organizational effectiveness within a given population.

This research synthesizes a systems engineering methodology for identifying the domains, dimensions, and determinants of and dynamically modeling operational organizational effectiveness for an …


Weapon Release Scheduling From Multiple-Bay Aircraft Using Multi-Objective Evolutionary Algorithms, Francis R. Lyons Iv Mar 2005

Weapon Release Scheduling From Multiple-Bay Aircraft Using Multi-Objective Evolutionary Algorithms, Francis R. Lyons Iv

Theses and Dissertations

The United States Air Force has put an increased emphasis on the timely delivery of precision weapons. Part of this effort has been to us multiple bay aircraft such the B-1B Lancer and B-52 Stratofortress to provide Close Air Support and responsive strikes using 1760 weapons. In order to provide greater flexibility, the aircraft carry heterogeneous payloads which can require deconfliction in order to drop multiple different types of weapons. Current methods of deconfliction and weapon selection are highly crew dependent and work intensive. This research effort investigates the optimization of an algorithm for weapon release which allows the aircraft …


A Line-Of-Slight Sensor Network For Wide Area Video Surveillance: Simulation And Evaluation, Jamie R. Morrison Mar 2005

A Line-Of-Slight Sensor Network For Wide Area Video Surveillance: Simulation And Evaluation, Jamie R. Morrison

Theses and Dissertations

Substantial performance improvement of a wide area video surveillance network can be obtained with the addition of a Line-of-Sight sensor. The research described in this thesis shows that while the Line-of-Sight sensor cannot monitor areas with the ubiquity of video cameras alone, the combined network produces substantially fewer false alarms and superior location precision for numerous moving people than video. Recent progress in the fabrication of inexpensive, robust CMOS-based video cameras have triggered a new approach to wide area surveillance of busy areas such as modeling an airport corridor as a distributed sensor network problem. Wireless communication between these cameras …


Accelerating Missile Threat Engagement Simulations Using Personal Computer Graphics Cards, Sean E. Jeffers Mar 2005

Accelerating Missile Threat Engagement Simulations Using Personal Computer Graphics Cards, Sean E. Jeffers

Theses and Dissertations

The 453rd Electronic Warfare Squadron supports on-going military operations by providing battlefield commanders with aircraft ingress and egress routes that minimize the risk of shoulder or ground-fired missile attacks on our aircraft. To determine these routes, the 453rd simulates engagements between ground-to-air missiles and allied aircraft to determine the probability of a successful attack. The simulations are computationally expensive, often requiring two-hours for a single 10-second missile engagement. Hundreds of simulations are needed to perform a complete risk assessment which includes evaluating the effectiveness of countermeasures such as flares, chaff, jammers, and missile warning systems. Thus, the need for faster …


Enabling Intrusion Detection In Ipsec Protected Ipv6 Networks Through Secret-Key Sharing, Patrick J. Sweeney Mar 2005

Enabling Intrusion Detection In Ipsec Protected Ipv6 Networks Through Secret-Key Sharing, Patrick J. Sweeney

Theses and Dissertations

As the Internet Protocol version 6 (IPv6) implementation becomes more widespread, the IP Security (IPSec) features embedded into the next-generation protocol will become more accessible than ever. Though the network-layer encryption provided by IPSec is a boon to data security, its use renders standard network intrusion detection systems (NIDS) useless. The problem of performing intrusion detection on encrypted traffic has been addressed by differing means with each technique requiring one or more static secret keys to be shared with the NIDS beforehand. The problem with this approach is static keying is much less secure than dynamic key generation through the …


Simple Public Key Infrastructure Analysis Protocol Analysis And Design, Alexander G. Vidergar Mar 2005

Simple Public Key Infrastructure Analysis Protocol Analysis And Design, Alexander G. Vidergar

Theses and Dissertations

Secure electronic communication is based on secrecy, authentication and authorization. One means of assuring a communication has these properties is to use Public Key Cryptography (PKC). The framework consisting of standards, protocols and instructions that make PKC usable in communication applications is called a Public Key Infrastructure (PKI). This thesis aims at proving the applicability of the Simple Public Key Infrastructure (SPKI) as a means of PKC. The strand space approach of Guttman and Thayer is used to provide an appropriate model for analysis. A Diffie-Hellman strand space model is combined with mixed strand space proof methods for proving the …


Geolocation Of A Node On A Local Area Network, John R. Clarson Mar 2005

Geolocation Of A Node On A Local Area Network, John R. Clarson

Theses and Dissertations

Geolocation is the process of identifying a node using only its Internet Protocol (IP) address. Locating a node on a LAN poses particular challenges due to the small scale of the problem and the increased significance of queuing delay. This study builds upon existing research in the area of geolocation and develops a heuristic tailored to the difficulties inherent in LANs called the LAN Time to Location Heuristic (LTTLH). LTTLH uses several polling nodes to measure latencies to end nodes, known locations within the LAN. The Euclidean distance algorithm is used to compare the results with the latency of a …