Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Computer Engineering

Intrusion Detection And Response Model For Mobile Ad Hoc Networks., Sathishkumar Alampalayam 1974- May 2007

Intrusion Detection And Response Model For Mobile Ad Hoc Networks., Sathishkumar Alampalayam 1974-

Electronic Theses and Dissertations

This dissertation presents a research whose objective is to design and develop an intrusion detection and response model for Mobile Ad hoc NETworks (MANET). Mobile ad hoc networks are infrastructure-free, pervasive and ubiquitous in nature, without any centralized authority. These unique MANET characteristics present several changes to secure them. The proposed security model is called the Intrusion Detection and Response for Mobile Ad hoc Networks (IDRMAN). The goal of the proposed model is to provide a security framework that will detect various attacks and take appropriate measures to control the attack automatically. This model is based on identifying critical system ...


Learning Human Behavior From Observation For Gaming Applications, Christopher Moriarty Jan 2007

Learning Human Behavior From Observation For Gaming Applications, Christopher Moriarty

Electronic Theses and Dissertations

The gaming industry has reached a point where improving graphics has only a small effect on how much a player will enjoy a game. One focus has turned to adding more humanlike characteristics into computer game agents. Machine learning techniques are being used scarcely in games, although they do offer powerful means for creating humanlike behaviors in agents. The first person shooter (FPS), Quake 2, is an open source game that offers a multi-agent environment to create game agents (bots) in. This work attempts to combine neural networks with a modeling paradigm known as context based reasoning (CxBR) to create ...


A Method Of Content-Based Image Retrieval For The Generation Of Image Mosaics, Michael Snead Jan 2007

A Method Of Content-Based Image Retrieval For The Generation Of Image Mosaics, Michael Snead

Electronic Theses and Dissertations

An image mosaic is an artistic work that uses a number of smaller images creatively combined together to form another larger image. Each building block image, or tessera, has its own distinctive and meaningful content, but when viewed from a distance the tesserae come together to form an aesthetically pleasing montage. This work presents the design and implementation of MosaiX, a computer software system that generates these image mosaics automatically. To control the image mosaic creation process, several parameters are used within the system. Each parameter affects the overall mosaic quality, as well as required processing time, in its own ...


An Economic Framework For Resource Management And Pricing In Wireless Networks With Competitive Service Providers, Shamik Sengupta Jan 2007

An Economic Framework For Resource Management And Pricing In Wireless Networks With Competitive Service Providers, Shamik Sengupta

Electronic Theses and Dissertations

A paradigm shift from static spectrum allocation to dynamic spectrum access (DSA) is becoming a reality due to the recent advances in cognitive radio, wide band spectrum sensing, and network aware real--time spectrum access. It is believed that DSA will allow wireless service providers (WSPs) the opportunity to dynamically access spectrum bands as and when they need it. Moreover, due to the presence of multiple WSPs in a region, it is anticipated that dynamic service pricing would be offered that will allow the end-users to move from long-term service contracts to more flexible short-term service models. In this research, we ...


A Neat Approach To Genetic Programming, Adelein Rodriguez Jan 2007

A Neat Approach To Genetic Programming, Adelein Rodriguez

Electronic Theses and Dissertations

The evolution of explicitly represented topologies such as graphs involves devising methods for mutating, comparing and combining structures in meaningful ways and identifying and maintaining the necessary topological diversity. Research has been conducted in the area of the evolution of trees in genetic programming and of neural networks and some of these problems have been addressed independently by the different research communities. In the domain of neural networks, NEAT (Neuroevolution of Augmenting Topologies) has shown to be a successful method for evolving increasingly complex networks. This system's success is based on three interrelated elements: speciation, marking of historical information ...


Congestion Avoidance And Fairness In Wireless Sensor Networks, Mohammad Ahmad Jan 2007

Congestion Avoidance And Fairness In Wireless Sensor Networks, Mohammad Ahmad

Electronic Theses and Dissertations

Sensor network congestion avoidance and control primarily aims to reduce packet drops while maintaining fair bandwidth allocation to existing network flows. The design of a congestion control algorithm suited for all types of applications in sensor networks is a challenging task due to the application-specific nature of these networks. With numerous sensors transmitting data simultaneously to one or more base stations (also called sinks), sensor nodes located near the base station will most likely experience congestion and packet loss. In this thesis, we propose a novel distributed congestion avoidance algorithm which calculates the ratio of the number of downstream and ...


A Hybrid Routing Protocol For Communications Among Nodes Withhigh Relative Speed In Wireless Mesh Networks, Nikolaos Peppas Jan 2007

A Hybrid Routing Protocol For Communications Among Nodes Withhigh Relative Speed In Wireless Mesh Networks, Nikolaos Peppas

Electronic Theses and Dissertations

Wireless mesh networks (WMN) is a new promising wireless technology which uses already available hardware and software components. This thesis proposes a routing algorithm for military applications. More specifically, a specialized scenario consisting of a network of flying Unmanned Aerial Vehicles (UAVs) executing reconnaissance missions is investigated. The proposed routing algorithm is hybrid in nature and uses both reactive and proactive routing characteristics to transmit information. Through simulations run on a specially built stand alone simulator, based on Java, packet overhead, delivery ratio and latency metrics were monitored with respect to varying number of nodes, node density and mobility. The ...


A Multi-Layer Fpga Framework Supporting Autonomous Runtime Partial Reconfiguration, Heng Tan Jan 2007

A Multi-Layer Fpga Framework Supporting Autonomous Runtime Partial Reconfiguration, Heng Tan

Electronic Theses and Dissertations

Partial reconfiguration is a unique capability provided by several Field Programmable Gate Array (FPGA) vendors recently, which involves altering part of the programmed design within an SRAM-based FPGA at run-time. In this dissertation, a Multilayer Runtime Reconfiguration Architecture (MRRA) is developed, evaluated, and refined for Autonomous Runtime Partial Reconfiguration of FPGA devices. Under the proposed MRRA paradigm, FPGA configurations can be manipulated at runtime using on-chip resources. Operations are partitioned into Logic, Translation, and Reconfiguration layers along with a standardized set of Application Programming Interfaces (APIs). At each level, resource details are encapsulated and managed for efficiency and portability during ...


On Advanced Template-Based Interpretation As Applied To Intention Recognition In A Strategic Environment, Cameron Akridge Jan 2007

On Advanced Template-Based Interpretation As Applied To Intention Recognition In A Strategic Environment, Cameron Akridge

Electronic Theses and Dissertations

An area of study that has received much attention over the past few decades is simulations involving threat assessment in military scenarios. Recently, much research has emerged concerning the recognition of troop movements and formations in non-combat simulations. Additionally, there have been efforts towards the detection and assessment of various types of malicious intentions. One such work by Akridge addressed the issue of Strategic Intention Recognition, but fell short in the detection of tactics that it could not detect without somehow manipulating the environment. Therefore, the aim of this thesis is to address the problem of recognizing an opponent's ...


Collaborative Context-Based Reasoning, Gilbert Barrett Jan 2007

Collaborative Context-Based Reasoning, Gilbert Barrett

Electronic Theses and Dissertations

This dissertation explores modeling collaborative behavior, based on Joint Intentions Theory (JIT), in Context-Based Reasoning (CxBR). Context-Based Reasoning is one of several contextual reasoning paradigms. And, Joint Intentions Theory is the definitive semantic framework for collaborative behaviors. In order to formalize collaborative behaviors in CxBR based on JIT, CxBR is first described in terms of the more popular Belief, Desire, and Intention (BDI) model. Once this description is established JIT is used as a basis for the formalism for collaborative behavior in CxBR. The hypothesis of this dissertation is that this formalism allows for effective collaborative behaviors in CxBR. Additionally ...


Design And Implementation Of A Hardware Level Content Networking Front End Device, Jeremy Layne Buboltz Jan 2007

Design And Implementation Of A Hardware Level Content Networking Front End Device, Jeremy Layne Buboltz

Electronic Theses and Dissertations

The bandwidth and speed of network connections are continually increasing. The speed increase in network technology is set to soon outpace the speed increase in CMOS technology. This asymmetrical growth is beginning to causing software applications that once worked with then current levels of network traffic to flounder under the new high data rates. Processes that were once executed in software now have to be executed, partially if not wholly in hardware. One such application that could benefit from hardware implementation is high layer routing. By allowing a network device to peer into higher layers of the OSI model, the ...


Recognizing Teamwork Activity In Observations Of Embodied Agents, Linus Jan Luotsinen Jan 2007

Recognizing Teamwork Activity In Observations Of Embodied Agents, Linus Jan Luotsinen

Electronic Theses and Dissertations

This thesis presents contributions to the theory and practice of team activity recognition. A particular focus of our work was to improve our ability to collect and label representative samples, thus making the team activity recognition more efficient. A second focus of our work is improving the robustness of the recognition process in the presence of noisy and distorted data. The main contributions of this thesis are as follows: We developed a software tool, the Teamwork Scenario Editor (TSE), for the acquisition, segmentation and labeling of teamwork data. Using the TSE we acquired a corpus of labeled team actions both ...


Eino: An Intelligent Tutor For The University Of Central Florida Infinity Web Applets, James Hollister Jan 2007

Eino: An Intelligent Tutor For The University Of Central Florida Infinity Web Applets, James Hollister

Electronic Theses and Dissertations

This study investigated the various methods involved in creating an intelligent tutor for the University of Central Florida Infinity Web Applets (UCF Infinity Web Applets). After conducting research into various methods, two major methods emerged and they are: solving the problem for the student and helping the student when they become stymied and unable to solve the problem. A storyboard was created to show the interactions of the student and system along with a list of features that were desired to be included in the tutoring system. From the storyboard and list of features, an architecture was created to handle ...


Coalition Formation And Teamwork In Embodied Agents, Majid Ali Khan Jan 2007

Coalition Formation And Teamwork In Embodied Agents, Majid Ali Khan

Electronic Theses and Dissertations

Embodied agents are agents acting in the physical world, such as persons, robots, unmanned air or ground vehicles and so on. These types of agents are subject to spatio-temporal constraints, which do not exist for agents acting in a virtual environment. The movement of embodied agents is limited by obstacles and maximum velocity, while their communication is limited by the transmission range of their wireless devices. This dissertation presents contributions to the techniques of coalition formation and teamwork coordination for embodied agents. We considered embodied agents in three different settings, each of them representative of a class of practical applications ...


Modeling, Design And Evaluation Of Networking Systems And Protocols Through Simulation, Daniel Jonathan Lacks Jan 2007

Modeling, Design And Evaluation Of Networking Systems And Protocols Through Simulation, Daniel Jonathan Lacks

Electronic Theses and Dissertations

Computer modeling and simulation is a practical way to design and test a system without actually having to build it. Simulation has many benefits which apply to many different domains: it reduces costs creating different prototypes for mechanical engineers, increases the safety of chemical engineers exposed to dangerous chemicals, speeds up the time to model physical reactions, and trains soldiers to prepare for battle. The motivation behind this work is to build a common software framework that can be used to create new networking simulators on top of an HLA-based federation for distributed simulation. The goals are to model and ...