Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses

New Jersey Institute of Technology

Discipline
Keyword
Publication Year

Articles 31 - 60 of 76

Full-Text Articles in Computer Engineering

Planar Visual Fusion Scintigraphy, Jacob Puthiamadathil May 2005

Planar Visual Fusion Scintigraphy, Jacob Puthiamadathil

Theses

Planar scintigraphy, while providing useful information about the distribution of the radiopharmaceutical being used, often does not provide adequate information about the surrounding anatomical structures. A proposed method to solve this problem is by registering and fusing a scintigraphic image with a digital visual image. Fusing planar scintigraphic images with visual photographic images to supply an anatomic correlate to regions of radiopharmaceutical accumulation has been explored in this study. The digital visual image will provide a context for the relevant structures in the scintigraphic image. The validity of using one set of affine transformation parameters for registering all patient data …


Enabling Cost Aware Routing With Auctions In Wireless Ad-Hoc Networks, Ali Yuksel May 2005

Enabling Cost Aware Routing With Auctions In Wireless Ad-Hoc Networks, Ali Yuksel

Theses

Battery power is a precious resource in wireless ad-hoc networks, and most routing protocols that have been proposed so far do not generate cost efficient routes. In this thesis, a novel auction-based cost-aware routing scheme, called CARA, is presented. CARA is designed as an extension of the MAC layer, and is shown to improve the cost efficiency of existing ad-hoc routing protocols through dynamic power control, while introducing only minimal additional overhead. The MAC layer at each node is given the capability to run local sealed-bid second-price auctions for the user data packets that need to be transmitted, and to …


Cluster-Based Wireless Mobile Ad-Hoc Network Security, Mandur Bajra Bajracharya May 2005

Cluster-Based Wireless Mobile Ad-Hoc Network Security, Mandur Bajra Bajracharya

Theses

A wireless ad-hoc network is a cooperative communication network deployed with a specific purpose. It is characterized by dynamically changing topology with no fixed infrastructure which exhibits a perfectly vulnerable state for a number of different kinds of attacks.

This thesis proposes a novel technique of achieving security in wireless mobile ad hoc networks by integrating a simple clustering and a voting mechanism together. The purpose of forming a cluster is to facilitate security in the network and the voting is performed to support the decision making process in the cluster. A procedure of forming small homogenous clusters throughout the …


An Autonomous Router-Based Solution To Detect And Defend Low Rate Ddos Attacks, Karunakar Anantharam Jan 2005

An Autonomous Router-Based Solution To Detect And Defend Low Rate Ddos Attacks, Karunakar Anantharam

Theses

Internet security was not a concern when the Internet was invented, but we cannot deny this fact anymore. Since all forms of businesses and communications are aligned to the Internet in one form or the other, the security of these assets (both infrastructure and content) is of prime importance. Some of the well known consequences of an attack include gaining access to a network, intellectual property thefts, and denial of service.

This thesis focuses on countering flood-type attacks that result in denial of service to end users. A new classification of this denial of service attacks, known as the low …


Scalable Wide Area Ad-Hoc Networking, Nithin Bose Jan 2005

Scalable Wide Area Ad-Hoc Networking, Nithin Bose

Theses

The scalability problem of routing algorithms in Mobile Ad-hoc networks (MANET) has conventionally been addressed by introducing hierarchical architectures, clusters, and neighborhood zones. In all of these approaches, some nodes are assigned different routing related roles than others. Examples include cluster heads, virtual backbones and border nodes. The selection of these nodes on a fixed or dynamic basis adds complexity to the routing algorithm, in addition to placing significant demands on mobility and power consumption of these nodes. Furthermore, the scalability achieved with hierarchical architectures or partitions is limited.

This thesis demonstrates that location awareness can greatly aid in MANET …


A Co-Processor Design To Support Mpi Primitives In Configurable Multiprocessor Designs, Rohan Bafna Jan 2005

A Co-Processor Design To Support Mpi Primitives In Configurable Multiprocessor Designs, Rohan Bafna

Theses

The Message-Passing Interface (MIPI) is a widely used standard for inter-processor communication in parallel computers. This standard is normally implemented in software, thus resulting in large communication latencies. A hardware implementation can reduce communication latencies significantly, thereby increasing the bandwidth. However, this approach cannot be applied in practice to the very large set of functions in MPI.

Reconfigurable computing has reached levels where entire parallel systems can be built inside one or more FPGAs (Field-Programmable Gate Arrays). In this scheme, specialized components must be built for inter-processor communication and the resulting code is difficult to port to other reconfigurable platforms. …


Ultra Wideband Communication Link, Preeti Singh Aug 2004

Ultra Wideband Communication Link, Preeti Singh

Theses

Ultra-wideband communication (UWB) has been a topic of extensive research in recent years especially for its short-range communication and indoor applications. The preliminary objective of the project was to develop a description and understanding of the basic components of the communication link at microwave frequencies in order to achieve the primary objective of establishing a communication setup at a bandwidth of 2.5 GHz for testing Ultra Wideband (UWB) antennas. This was achieved with the aid of commercially available optical system which was modified for the purpose. Beginning with the generation of baseband narrow pulses with energy spanning over a broad …


Adaptive Turn-Prohibition Routing Algorithm For The Networks Of Workstations, Amey Bhaskar Shevtekar Jan 2004

Adaptive Turn-Prohibition Routing Algorithm For The Networks Of Workstations, Amey Bhaskar Shevtekar

Theses

Deadlock occurrence is a critical problem for any computer network. Various solutions have been proposed over last two decades to solve problem of deadlocks in networks using different routing schemes, like up/down routing algorithm used in Myrinet switches. However, most of existing approaches for deadlock-free routing either try to eliminate any possibility of deadlock occurrence, which can result in putting extra restrictions on the routing in the networks or put no restrictions on routing, which leads to other approach namely deadlock recovery. In this thesis emphasis is on developing hybrid approach for routing in wormhole networks, wherein some prohibition is …


Internet Traffic Over Wide Area Network - Statistical Modeling And Analysis, Yan Yi Lee Aug 2003

Internet Traffic Over Wide Area Network - Statistical Modeling And Analysis, Yan Yi Lee

Theses

This thesis provides results on trace data collecting and modeling of the Internet traffic over a Wide Area Network. The study is based on extensive data, gathered by tracing the actual packet exchange at the interfaces of devices on the WAN of BCCLS (Bergen County Cooperative Library System). A powerful network monitoring system WhatsUp Gold was employed to monitor the WAN, and logged the byte rates and packet rates sent and received at the interfaces. Different statistical distributions were employed to model the data traces. In comparison with some other statistical models - normal, lognormal, Weibull, and Pareto, which are …


Low Interference Routing For Wireless Ad-Hoc Networks, Mohit Gupta Aug 2003

Low Interference Routing For Wireless Ad-Hoc Networks, Mohit Gupta

Theses

In this thesis the primary focus is on the problem of interference between messages. The thesis discusses why the messages are blocked in a system? How adding a message impacts the cost of all other available links, which can be established in the system.

This thesis analyzes how the availability of channels, increase in number of nodes and increase in the transmission range help in increasing the number of messages that can be handled in the network. It is also analyzes how critical is the selection of the maximum transmission range MTR, transmission range TR and required transmission range RTR. …


Tree Based Reliable Topology For Distributing Link State Information, Ram Narayan Krishnan Aug 2003

Tree Based Reliable Topology For Distributing Link State Information, Ram Narayan Krishnan

Theses

Finding paths that satisfy the performance requirements of applications according to link state information in a network is known as the Quality-of- Service (QoS) routing problem and has been extensively studied. However, distributing link state information may introduce a significant protocol overhead on network resources. In this thesis, the issue on how to update link state information efficiently and effectively is investigated. A theoretical framework is presented, and a high performance link state policy that is capable of minimizing the false blocking probability of connections under a given update rate constraint is proposed. Through theoretical analysis, it is shown that …


Soft Fault Detection Using Mibs In Computer Networks, Sachin Arora May 2003

Soft Fault Detection Using Mibs In Computer Networks, Sachin Arora

Theses

To improve network reliability and management in today's high-speed communication system, a statistical anomaly network intrusion detection system (NIDS) has been investigated, for network soft faults using the Management Information Base (Mm) traffic parameters provided by Simple Network Management Protocol (SNMP), for both wired and wireless networks. The work done would be a contribution to a system to be designed MIB Anomaly Intrusion Detection, a hierarchical multi-tier and multiobservation-window Anomaly Intrusion Detection system. The data was derived from many experiments that had been carried out in the test bed that monitored 27 MIB traffic parameters simultaneously, focusing on the soft …


Fpga Implementation Of A Cholesky Algorithm For A Shared-Memory Multiprocessor Architecture, Satchidanand G. Haridas May 2003

Fpga Implementation Of A Cholesky Algorithm For A Shared-Memory Multiprocessor Architecture, Satchidanand G. Haridas

Theses

Solving a system of linear equations is a key problem in the field of engineering and science. Matrix factorization is a key component of many methods used to solve such equations. However, the factorization process is very time consuming, so these problems have traditionally been targeted for parallel machines rather than sequential ones. Nevertheless, commercially available supercomputers are expensive and only large institutions have the resources to purchase them or use them. Hence, efforts are on to develop more affordable alternatives. This thesis presents one such approach.

The work presented here is an implementation of a parallel version of the …


Design Of An Fpga-Based Parallel Simd Machine For Power Flow Analysis, Tirupathi Rao Kunta May 2003

Design Of An Fpga-Based Parallel Simd Machine For Power Flow Analysis, Tirupathi Rao Kunta

Theses

Power flow analysis consists of computationally intensive calculations on large matrices, consumes several hours of computational time, and has shown the need for the implementation of application-specific parallel machines. The potential of Single-Instruction stream Multiple-Data stream (SIMD) parallel architectures for efficient operations on large matrices has been demonstrated as seen in the case of many existing supercomputers. The unsuitability of existing parallel machines for low-cost power system applications, their long design cycles, and the difficulty in using them show the need for application-specific SIMI) machines. Advances in VLSI technology and Field-Programmable Gate-Arrays (FPGAs) enable the implementation of Custom Computing Machines …


Detecting Malfunction In Wireless Sensor Networks, Pablito C. Lake May 2003

Detecting Malfunction In Wireless Sensor Networks, Pablito C. Lake

Theses

The objective of this thesis is to detect malfunctioning sensors in wireless sensor networks. The ability to detect abnormality is critical to the security of any sensor network. However, the ability to detect a faulty wireless sensor is not trivial. Controlled repeatable experiments are difficult in wireless channels. A Redhat Linux. 7.0 Wireless Emulation Dynamic Switch software was used to solve this problem.

Six nodes were configured with a node acting as a base station. The nodes were all part of a cell. This means that every node could communicate with all other nodes. A client-server program simulated the background …


Comparative Studies Of Network Traffic In Actual And Emulated Wireless Networks, Curtis Salley Jr. May 2003

Comparative Studies Of Network Traffic In Actual And Emulated Wireless Networks, Curtis Salley Jr.

Theses

Wireless networks are becoming more popular in all types of environments from home office, to business infrastructure, to mobile computing. As more of these networks flourish, so does the attraction for hackers. The thesis examines the bandwidth of wireless networks and the effects of intrusions in three different scenarios. First, it looks at a wireless network that is connected to a wired infrastructure. Next, the thesis examines a wireless ad hoc network and how bandwidth plays a valuable part in the communication with neighboring nodes. And finally, the thesis attempts to simulate a wireless network by using a bandwidth configuration …


Tracking The Path Of A Mobile Radioactive Source Using A Wireless Sensor Network, Nipa Shah May 2003

Tracking The Path Of A Mobile Radioactive Source Using A Wireless Sensor Network, Nipa Shah

Theses

This report describes several experiments used to characterize and test a network of radiation sensors. The purpose of these tests is to assess the feasibility of using these sensors to detect and track radioactive sources in a large field, as in a battlefield or on a military campus. Simulated radiation measurements are used to compare the result of radiation detection accuracy in tracking the moving target and to find its path as early as possible. This is done via changing the number of sensing nodes deployed (deployment density), as well as the models of the detectors. This thesis describes algorithms …


Hop-Limited Routing For Multihop Cellular Networks, Cem Dincer May 2003

Hop-Limited Routing For Multihop Cellular Networks, Cem Dincer

Theses

In recent years, conventional cellular systems have experienced evolution in fields of data oriented services. During this period, the requirement for high data-rate stimulated new research proposals, which resulted in a new architecture: Multihop Cellular Networks (MCN), where multihop structure enables mobile stations to forward packets from other mobile stations to the base station on the uplink, and in turn, forward packets to other mobile stations from the base station on the downlink. In this thesis, a new routing algorithm is introduced for MCNs in order to limit the number of hops between the base station and the mobile stations …


Graphical User Interface For Improved Laser Eye Surgery, Venkata K. Kuruganti May 2003

Graphical User Interface For Improved Laser Eye Surgery, Venkata K. Kuruganti

Theses

This thesis develops a system for laser eye surgery that is a significant improvement over existing technology. The new system uses image matching and MEMS micromirrors to introduce feedback control, automation and record keeping to the laser surgery process, eliminating the unwanted effects of eye movement during surgery and introducing a wide range of other benefits. It is expected that this improvement can be implemented as an addition to existing systems as well as a foundation for new tools, perhaps even remote, internet enabled ones.

The basic components of the new system are described and demonstrated, including image matching between …


Intrusion Detection System For Ad Hoc Mobile Networks Using Neighborhood Watch Theory, Ramani Rajagopalan May 2003

Intrusion Detection System For Ad Hoc Mobile Networks Using Neighborhood Watch Theory, Ramani Rajagopalan

Theses

This study describes several experiments to simulate and study temperature sensor networks. The ultimate goal of this study is to accurately predict a temperature sensor failure in a sensor network, using Network Neighborhood Watch theory. Simulated temperature measurements are used to compare the results of accuracy, and quickness in detecting a failure in a malfunctioning sensor node. This is done by changing the intervals between temperature sampling, by considering different rates of temperature raise, as well as varying the number of nodes in the network neighborhood (deployment density). The thesis studies the threshold for temperature sensor failure by computing a …


Reduction Of False Positives In Fault Detection System Using A Low Pass Data Filter, Ranjit Salunkhe May 2003

Reduction Of False Positives In Fault Detection System Using A Low Pass Data Filter, Ranjit Salunkhe

Theses

Network traffic is bursty in nature and exhibits the property of self-similarity, the degree of which is measured by the Hurst parameter. Now, in any network there is always the possibility of the occurrence of fault traffic that can be caused due to faults or malfunction of a network component. Fault Detection Systems that check for traffic anomalies can trigger off an alert on the detection of any traffic behavior that deviates from normal. Such deviation is usually caused when a fault occurs. But in network traffic sudden bursts may occur due to the inherent behavior of a network application. …


Sub-Segment Based Transport Layer Protocol For Wireless Medium, Som Sengupta May 2003

Sub-Segment Based Transport Layer Protocol For Wireless Medium, Som Sengupta

Theses

This thesis discusses the techniques to improve the TCP over wireless. The loss-intensive wireless communication results in high retransmission rates to recover lost packets and bandwidth consumption. In addition, the retransmitted segments have significant chance of being dropped. To make the retransmission process more granular, large segments at the transport layer (540 bytes, by default) can be subdivided into smaller sub-segments. This document introduces a split TCP based solution and describes how to produce a series of smaller-sized segments that share the same transport layer header. A new header format is introduced to support the transmission of smaller segments …


Evaluation Of Intrusion Detection Systems With Automatic Traffic Generation Programs, Friday Bassey Akpan Jan 2003

Evaluation Of Intrusion Detection Systems With Automatic Traffic Generation Programs, Friday Bassey Akpan

Theses

In this master's thesis work, a program was developed using the Perl programming language to enable user defined attack programs to run automatically. A similar program was also developed for background traffic. With this program, the different features of the Nmap exploration and scanning tool were exploited to build scenarios of attacks.

Automated scenarios of attacks running in to the order of hundreds were developed. Also, different sets of automated stealthy attacks scenarios running in to the order of hundreds were developed using the timing modes, stealthy scans and scan delay features of Nmap.

These automated attacks scenarios were employed …


Protection And Restoration Algorithms For Wdm Optical Networks, Pitipatana Sakarindr Aug 2002

Protection And Restoration Algorithms For Wdm Optical Networks, Pitipatana Sakarindr

Theses

Currently, Wavelength Division Multiplexing (WDM) optical networks play a major role in supporting the outbreak in demand for high bandwidth networks driven by the Internet. It can be a catastrophe to millions of users if a single optical fiber is somehow cut off from the network, and there is no protection in the design of the logical topology for a restorative mechanism. Many protection and restoration algorithms are needed to prevent, reroute, and/or reconfigure the network from damages in such a situation. In the past few years, many works dealing with these issues have been reported. Those algorithms can be …


Attack Visualization For Intrusion Detection System, Mohammad A. Rabie Jan 2002

Attack Visualization For Intrusion Detection System, Mohammad A. Rabie

Theses

Attacks detection and visualization is the process of attempting to identify instances of network misuse by comparing current activity against the expected actions of an intruder. Most current approaches to attack detection involve the use of rule-based expert systems to identify indications of known attacks. However, these techniques are less successful in identifying attacks, which vary from expected patterns. Artificial neural networks provide the potential to identify and classify network activity based on limited, incomplete, and nonlinear data sources. Presenting an approach to the process of Attack visualization that utilizes the analytical strengths of neural networks, and providing the results …


Introduction On Intrusion Detection Systems : Focus On Hierarchical Analysis, Ratna Bajaj Jan 2002

Introduction On Intrusion Detection Systems : Focus On Hierarchical Analysis, Ratna Bajaj

Theses

In today's fast paced computing world security is a main concern. Intrusion detection systems are an important component of defensive measures protecting computer systems and networks from abuse. This paper will examine various intrusion detection systems. The task of intrusion detection is to monitor usage of a system and detect and malicious activity, therefore, the architecture is a key component when studying intrusion detection systems. This thesis will also analyze various neural networks for statistical anomaly intrusion detection systems. The thesis will focus on the Hierarchical Intrusion Detection system (HIDE) architecture. The HIDE system detects network based attack as anomalies …


A Cad-Mlca Interface For Next-Generation Dfe Tools, Jun He May 2001

A Cad-Mlca Interface For Next-Generation Dfe Tools, Jun He

Theses

Environmental concerns and rising product disposal costs have pressed manufactures to make more environmentally friendly products and customers to use and dispose of them in an environmental responsive way. Thus the practice of Design for Environment (DFE) is becoming essential in today's industrial environment. Life Cycle Assessment (LCA) provides different ways for the environmental assessment of products. One critical step in performing lifecycle assessment of any product design is to collect design-related data. The common way based on manual input for traditional DFE tools is not only cumbersome and time-consuming but also error-prone.

This thesis presents the characteristics of a …


Silicon Based Ir Filters, Prakash Mokashi May 2001

Silicon Based Ir Filters, Prakash Mokashi

Theses

The design and fabrication of silicon based IR (Infrared) filters for high-speed optical communication systems are the topic of this thesis. Its novelty is in two aspects: 1) Use of silicon wafers as an optical guiding medium; 2) Use of wafer bonding technique to attach two optical elements together.

The structure consists of two optical waveguides, the bus waveguide and the drop channel waveguide. A ring on top of these waveguides couples them in such a way that only one narrow spectral line is removed from the bus waveguides which propagates in the dropchannel waveguide. The assembly is fabricated using …


Emulation Of The Dataflow Computing Paradigm Using Field Programmable Gate Arrays (Fpgas), Segreen Ingersoll Jan 2001

Emulation Of The Dataflow Computing Paradigm Using Field Programmable Gate Arrays (Fpgas), Segreen Ingersoll

Theses

Building a perfect dataflow computer has been an endeavor of many computer engineers. Ideally, it is a perfect parallel machine with zero overheads, but implementing one has been anything but perfect. While the sequential nature of control flow machines makes them relatively easy to implement, dataflow machines have to address a number of issues that are easily solved in the realm of control flow paradigm. Past implementations of dataflow computers have addressed these issues, such as conditional and reentrant program structures, along with the flow of data, at the processor level, i.e. each processor in the design would handle these …


Design And Fabrication Of Optical Resonators, Pushkar Moholkar May 2000

Design And Fabrication Of Optical Resonators, Pushkar Moholkar

Theses

The design and fabrication of ring optical resonators for high-speed optical communication systems is the topic of this thesis. Its novelty is in two aspects: 1) Use of silicon wafers as an optical guiding medium; 2) Use of wafer bonding technique to attach two optical elements together.

The structure consists of two optical waveguides, the bus waveguide and the drop channel waveguide. A ring on top of these waveguides couples them in such a way that only one narrow spectral line is removed from the bus waveguides which propagates in the drop-channel waveguide. The assembly is fabricated using wafer-bonding technique …