Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Department of Computer Science and Engineering

2014

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

Combating Integrity Attacks In Industrial Control Systems, Chad Arnold Jan 2014

Combating Integrity Attacks In Industrial Control Systems, Chad Arnold

Browse all Theses and Dissertations

Industrial Control Systems are vulnerable to integrity attacks because of connectivity to the external Internet and trusted internal networking components that can become compromised. Integrity attacks can be modeled, analyzed, and sometimes remedied by exploiting properties of physical devices and reasoning about the trust worthiness of ICS communication components.

Industrial control systems (ICS) monitor and control the processes of public utility that society depends on - the electric power grid, oil and gas pipelines, transportation, and water facilities. Attacks that impact the operations of these critical assets could have devastating consequences. The complexity and desire to interconnect ICS components have …


A Novel Synergistic Model Fusing Electroencephalography And Functional Magnetic Resonance Imaging For Modeling Brain Activities, Konstantinos Michalopoulos Jan 2014

A Novel Synergistic Model Fusing Electroencephalography And Functional Magnetic Resonance Imaging For Modeling Brain Activities, Konstantinos Michalopoulos

Browse all Theses and Dissertations

Study of the human brain is an important and very active area of research. Unraveling the way the human brain works would allow us to better understand, predict and prevent brain related diseases that affect a significant part of the population. Studying the brain response to certain input stimuli can help us determine the involved brain areas and understand the mechanisms that characterize behavioral and psychological traits.

In this research work two methods used for the monitoring of brain activities, Electroencephalography (EEG) and functional Magnetic Resonance (fMRI) have been studied for their fusion, in an attempt to bridge together the …


Automated Complexity-Sensitive Image Fusion, Brian Patrick Jackson Jan 2014

Automated Complexity-Sensitive Image Fusion, Brian Patrick Jackson

Browse all Theses and Dissertations

To construct a complete representation of a scene with environmental obstacles such as fog, smoke, darkness, or textural homogeneity, multisensor video streams captured in diferent modalities are considered. A computational method for automatically fusing multimodal image streams into a highly informative and unified stream is proposed. The method consists of the following steps: 1. Image registration is performed to align video frames in the visible band over time, adapting to the nonplanarity of the scene by automatically subdividing the image domain into regions approximating planar patches

2. Wavelet coefficients are computed for each of the input frames in each modality …


The Properties Of Property Alignment On The Semantic Web, Michelle Andreen Cheatham Jan 2014

The Properties Of Property Alignment On The Semantic Web, Michelle Andreen Cheatham

Browse all Theses and Dissertations

Ontology alignment is an important step in enabling computers to query and reason across the many linked datasets on the semantic web. This is a difficult challenge because the ontologies underlying different linked datasets can vary in terms of subject area coverage, level of abstraction, ontology modeling philosophy, and even language. The alignment approach presented here centers on string similarity metrics. Nearly all ontology alignment systems use a string similarity metric in one form or another, but it seems that the choice of a particular metric is often arbitrary. We begin this dissertation with the most comprehensive survey to date …