Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

2003

Discipline
Institution
Keyword
Publication

Articles 1 - 30 of 46

Full-Text Articles in Computer Engineering

A Communications Modeling System For Swarm-Based Sensors, Brian A. Kadrovach Sep 2003

A Communications Modeling System For Swarm-Based Sensors, Brian A. Kadrovach

Theses and Dissertations

Today's information age has exploded the amount of data available to decision makers at all levels of the control hierarchy. The miniaturization and proliferation of sensor technology has enabled extensive detection and monitoring and advances in computational capabilities have provided for embedded data analysis and the generation of information from raw data. Additionally, with the miniaturization of mechanical systems it is possible to provide platforms for sensor suites that are capable of mobility and limited autonomy. Swarming or bio-emergent behavior problems, provides a robust scalable mechanism for organizing large numbers of mobile sensor platforms. However, the mobility dynamics of swarm …


Ip Traceback With Deterministic Packet Marking Dpm, Andrey Belenky Aug 2003

Ip Traceback With Deterministic Packet Marking Dpm, Andrey Belenky

Dissertations

In this dissertation, a novel approach to Internet Protocol (IP) Traceback - Deterministic Packet Marking (DPM) is presented. The proposed approach is scalable, simple to implement, and introduces no bandwidth and practically no processing overhead on the network equipment. It is capable of tracing thousands of simultaneous attackers during a Distributed Denial of Service (DDoS) attack. Given sufficient deployment on the Internet, DPM is capable of tracing back to the slaves for DDoS attacks which involve reflectors. Most of the processing is done at the victim. The traceback process can be performed post-mortem, which allows for tracing the attacks that …


Optimal And Intelligent Decision Making In Sustainable Development Of Electronic Products, Meimei Gao Aug 2003

Optimal And Intelligent Decision Making In Sustainable Development Of Electronic Products, Meimei Gao

Dissertations

Increasing global population and consumption are causing declining natural and social systems. Multi-lifecycle engineering and sustainable development address these issues by integrating strategies for economic successes, environmental quality, and social equity. Based on multi-lifecycle engineering and sustainable development concepts, this doctoral dissertation aims to provide decision making approaches to growing a strong industrial economy while maintaining a clean, healthy environment. The research develops a methodology to complete both the disassembly leveling and bin assignment decisions in demanufacturing through balancing the disassembly efforts, value returns, and environmental impacts. The proposed method is successfully implemented into a demanufacturing module of a Multi-LifeCycle …


Internet Traffic Over Wide Area Network - Statistical Modeling And Analysis, Yan Yi Lee Aug 2003

Internet Traffic Over Wide Area Network - Statistical Modeling And Analysis, Yan Yi Lee

Theses

This thesis provides results on trace data collecting and modeling of the Internet traffic over a Wide Area Network. The study is based on extensive data, gathered by tracing the actual packet exchange at the interfaces of devices on the WAN of BCCLS (Bergen County Cooperative Library System). A powerful network monitoring system WhatsUp Gold was employed to monitor the WAN, and logged the byte rates and packet rates sent and received at the interfaces. Different statistical distributions were employed to model the data traces. In comparison with some other statistical models - normal, lognormal, Weibull, and Pareto, which are …


Low Interference Routing For Wireless Ad-Hoc Networks, Mohit Gupta Aug 2003

Low Interference Routing For Wireless Ad-Hoc Networks, Mohit Gupta

Theses

In this thesis the primary focus is on the problem of interference between messages. The thesis discusses why the messages are blocked in a system? How adding a message impacts the cost of all other available links, which can be established in the system.

This thesis analyzes how the availability of channels, increase in number of nodes and increase in the transmission range help in increasing the number of messages that can be handled in the network. It is also analyzes how critical is the selection of the maximum transmission range MTR, transmission range TR and required transmission range RTR. …


Tree Based Reliable Topology For Distributing Link State Information, Ram Narayan Krishnan Aug 2003

Tree Based Reliable Topology For Distributing Link State Information, Ram Narayan Krishnan

Theses

Finding paths that satisfy the performance requirements of applications according to link state information in a network is known as the Quality-of- Service (QoS) routing problem and has been extensively studied. However, distributing link state information may introduce a significant protocol overhead on network resources. In this thesis, the issue on how to update link state information efficiently and effectively is investigated. A theoretical framework is presented, and a high performance link state policy that is capable of minimizing the false blocking probability of connections under a given update rate constraint is proposed. Through theoretical analysis, it is shown that …


Topics In Graph Algorithms: Structural Results And Algorithmic Techniques, With Applications, Faisal Nabih Abu Khzam Aug 2003

Topics In Graph Algorithms: Structural Results And Algorithmic Techniques, With Applications, Faisal Nabih Abu Khzam

Doctoral Dissertations

Coping with computational intractability has inspired the development of a variety of algorithmic techniques. The main challenge has usually been the design of polynomial time algorithms for NP-complete problems in a way that guarantees some, often worst-case, satisfactory performance when compared to exact (optimal) solutions. We mainly study some emergent techniques that help to bridge the gap between computational intractability and practicality. We present results that lead to better exact and approximation algorithms and better implementations. The problems considered in this dissertation share much in common structurally, and have applications in several scientific domains, including circuit design, network reliability, and …


Texture Classification Using Transform Analysis, Mary Habib Jun 2003

Texture Classification Using Transform Analysis, Mary Habib

Archived Theses and Dissertations

The work presented in this thesis deals with the application of spectral methods for texture classification. The aim of the present work is to introduce a hybrid methodology for texture classification based on a spatial domain global pre-classifier together with a spectral classifier that utilizes multiresolution transform analysis. The reason for developing a spatial pre-classifier is that many discriminating features of textures are present in the spatial domain of the texture. Of these, global features such as intensity histograms and entropies can still add significant information to the texture classification process. The pre-classifier uses texture intensity histograms to derive histogram …


On-Line Signature Verification Using Global Features, Akrum Mamdouh Shawky Jun 2003

On-Line Signature Verification Using Global Features, Akrum Mamdouh Shawky

Archived Theses and Dissertations

The work presented in this thesis deals with the development of an on-line Handwritten Signature Verification methodology based on certain Global features that represent the entire signature as a whole. The aim of the research is to come up with an efficient "acceptance/rejection" mechanism that can be used to verify the authenticity of a certain signature. Global features are less expensive to compute than local features, they provide fast verification, and should provide accurate verification results. After identifying the entire global set of attributes that are to be investigated, Cramer's v-statistics and information-theoretic entropy measures of association were used in …


Optimization Of Receptive Fields For Mlp Networks With Ensemble Encoding, Deena Osama Hassan Jun 2003

Optimization Of Receptive Fields For Mlp Networks With Ensemble Encoding, Deena Osama Hassan

Archived Theses and Dissertations

Ensemble encoding is a biologically-motivated, distributed data representation scheme for MLP networks. Multiple overlapping receptive fields are used to enhance locality of representation. The number, form, and placement of receptive fields have a great impact on performance. This thesis presents four heuristics, two based on descriptive statistics, and two based on clustering, for optimizing receptive field configuration, and compares their performance on four benchmark data sets. The two statistical approaches are based on the mean and median properties of the data set. The two clustering methods are the c-means and fuzzy c-means clustering. The four data sets used are well-known …


Synthesis And Optimization Of Digital Systems For Low Power At Logic Level Of Abstraction, Ihab Mostafa Amin Amer Jun 2003

Synthesis And Optimization Of Digital Systems For Low Power At Logic Level Of Abstraction, Ihab Mostafa Amin Amer

Archived Theses and Dissertations

In this thesis we tackle one of the most important fields of research, which is reducing power consumption in digital systems. The importance of this field comes from the fact that nowadays, several digital devices are intensively used in our daily life. Thus, minimizing their power consumption is a common demand from the technological as well as the economical point of view. Some basic definitions in the low power design field are introduced. Besides, a preview of different efforts that were exerted in the field of reducing power consumption of digital systems at various levels of abstraction is presented. A …


Power-Aware On Demand Routing Protocol For Mobile Wireless Ad-Hoc Networks, Mohammed Kamel Fattouh Mohammed Jun 2003

Power-Aware On Demand Routing Protocol For Mobile Wireless Ad-Hoc Networks, Mohammed Kamel Fattouh Mohammed

Archived Theses and Dissertations

No abstract provided.


Efficient Resource Allocation And Call Admission Control In High Capacity Wireless Networks, Jiongkuan Hou May 2003

Efficient Resource Allocation And Call Admission Control In High Capacity Wireless Networks, Jiongkuan Hou

Dissertations

Resource Allocation (RA) and Call Admission Control (CAC) in wireless networks are processes that control the allocation of the limited radio resources to mobile stations (MS) in order to maximize the utilization efficiency of radio resources and guarantee the Quality of Service (QoS) requirements of mobile users. In this dissertation, several distributed, adaptive and efficient RA/CAC schemes are proposed and analyzed, in order to improve the system utilization while maintaining the required QoS.

Since the most salient feature of the mobile wireless network is that users are moving, a Mobility Based Channel Reservation (MBCR) scheme is proposed which takes the …


Soft Fault Detection Using Mibs In Computer Networks, Sachin Arora May 2003

Soft Fault Detection Using Mibs In Computer Networks, Sachin Arora

Theses

To improve network reliability and management in today's high-speed communication system, a statistical anomaly network intrusion detection system (NIDS) has been investigated, for network soft faults using the Management Information Base (Mm) traffic parameters provided by Simple Network Management Protocol (SNMP), for both wired and wireless networks. The work done would be a contribution to a system to be designed MIB Anomaly Intrusion Detection, a hierarchical multi-tier and multiobservation-window Anomaly Intrusion Detection system. The data was derived from many experiments that had been carried out in the test bed that monitored 27 MIB traffic parameters simultaneously, focusing on the soft …


Fpga Implementation Of A Cholesky Algorithm For A Shared-Memory Multiprocessor Architecture, Satchidanand G. Haridas May 2003

Fpga Implementation Of A Cholesky Algorithm For A Shared-Memory Multiprocessor Architecture, Satchidanand G. Haridas

Theses

Solving a system of linear equations is a key problem in the field of engineering and science. Matrix factorization is a key component of many methods used to solve such equations. However, the factorization process is very time consuming, so these problems have traditionally been targeted for parallel machines rather than sequential ones. Nevertheless, commercially available supercomputers are expensive and only large institutions have the resources to purchase them or use them. Hence, efforts are on to develop more affordable alternatives. This thesis presents one such approach.

The work presented here is an implementation of a parallel version of the …


Design Of An Fpga-Based Parallel Simd Machine For Power Flow Analysis, Tirupathi Rao Kunta May 2003

Design Of An Fpga-Based Parallel Simd Machine For Power Flow Analysis, Tirupathi Rao Kunta

Theses

Power flow analysis consists of computationally intensive calculations on large matrices, consumes several hours of computational time, and has shown the need for the implementation of application-specific parallel machines. The potential of Single-Instruction stream Multiple-Data stream (SIMD) parallel architectures for efficient operations on large matrices has been demonstrated as seen in the case of many existing supercomputers. The unsuitability of existing parallel machines for low-cost power system applications, their long design cycles, and the difficulty in using them show the need for application-specific SIMI) machines. Advances in VLSI technology and Field-Programmable Gate-Arrays (FPGAs) enable the implementation of Custom Computing Machines …


Detecting Malfunction In Wireless Sensor Networks, Pablito C. Lake May 2003

Detecting Malfunction In Wireless Sensor Networks, Pablito C. Lake

Theses

The objective of this thesis is to detect malfunctioning sensors in wireless sensor networks. The ability to detect abnormality is critical to the security of any sensor network. However, the ability to detect a faulty wireless sensor is not trivial. Controlled repeatable experiments are difficult in wireless channels. A Redhat Linux. 7.0 Wireless Emulation Dynamic Switch software was used to solve this problem.

Six nodes were configured with a node acting as a base station. The nodes were all part of a cell. This means that every node could communicate with all other nodes. A client-server program simulated the background …


Comparative Studies Of Network Traffic In Actual And Emulated Wireless Networks, Curtis Salley Jr. May 2003

Comparative Studies Of Network Traffic In Actual And Emulated Wireless Networks, Curtis Salley Jr.

Theses

Wireless networks are becoming more popular in all types of environments from home office, to business infrastructure, to mobile computing. As more of these networks flourish, so does the attraction for hackers. The thesis examines the bandwidth of wireless networks and the effects of intrusions in three different scenarios. First, it looks at a wireless network that is connected to a wired infrastructure. Next, the thesis examines a wireless ad hoc network and how bandwidth plays a valuable part in the communication with neighboring nodes. And finally, the thesis attempts to simulate a wireless network by using a bandwidth configuration …


Tracking The Path Of A Mobile Radioactive Source Using A Wireless Sensor Network, Nipa Shah May 2003

Tracking The Path Of A Mobile Radioactive Source Using A Wireless Sensor Network, Nipa Shah

Theses

This report describes several experiments used to characterize and test a network of radiation sensors. The purpose of these tests is to assess the feasibility of using these sensors to detect and track radioactive sources in a large field, as in a battlefield or on a military campus. Simulated radiation measurements are used to compare the result of radiation detection accuracy in tracking the moving target and to find its path as early as possible. This is done via changing the number of sensing nodes deployed (deployment density), as well as the models of the detectors. This thesis describes algorithms …


Hop-Limited Routing For Multihop Cellular Networks, Cem Dincer May 2003

Hop-Limited Routing For Multihop Cellular Networks, Cem Dincer

Theses

In recent years, conventional cellular systems have experienced evolution in fields of data oriented services. During this period, the requirement for high data-rate stimulated new research proposals, which resulted in a new architecture: Multihop Cellular Networks (MCN), where multihop structure enables mobile stations to forward packets from other mobile stations to the base station on the uplink, and in turn, forward packets to other mobile stations from the base station on the downlink. In this thesis, a new routing algorithm is introduced for MCNs in order to limit the number of hops between the base station and the mobile stations …


Graphical User Interface For Improved Laser Eye Surgery, Venkata K. Kuruganti May 2003

Graphical User Interface For Improved Laser Eye Surgery, Venkata K. Kuruganti

Theses

This thesis develops a system for laser eye surgery that is a significant improvement over existing technology. The new system uses image matching and MEMS micromirrors to introduce feedback control, automation and record keeping to the laser surgery process, eliminating the unwanted effects of eye movement during surgery and introducing a wide range of other benefits. It is expected that this improvement can be implemented as an addition to existing systems as well as a foundation for new tools, perhaps even remote, internet enabled ones.

The basic components of the new system are described and demonstrated, including image matching between …


Intrusion Detection System For Ad Hoc Mobile Networks Using Neighborhood Watch Theory, Ramani Rajagopalan May 2003

Intrusion Detection System For Ad Hoc Mobile Networks Using Neighborhood Watch Theory, Ramani Rajagopalan

Theses

This study describes several experiments to simulate and study temperature sensor networks. The ultimate goal of this study is to accurately predict a temperature sensor failure in a sensor network, using Network Neighborhood Watch theory. Simulated temperature measurements are used to compare the results of accuracy, and quickness in detecting a failure in a malfunctioning sensor node. This is done by changing the intervals between temperature sampling, by considering different rates of temperature raise, as well as varying the number of nodes in the network neighborhood (deployment density). The thesis studies the threshold for temperature sensor failure by computing a …


Reduction Of False Positives In Fault Detection System Using A Low Pass Data Filter, Ranjit Salunkhe May 2003

Reduction Of False Positives In Fault Detection System Using A Low Pass Data Filter, Ranjit Salunkhe

Theses

Network traffic is bursty in nature and exhibits the property of self-similarity, the degree of which is measured by the Hurst parameter. Now, in any network there is always the possibility of the occurrence of fault traffic that can be caused due to faults or malfunction of a network component. Fault Detection Systems that check for traffic anomalies can trigger off an alert on the detection of any traffic behavior that deviates from normal. Such deviation is usually caused when a fault occurs. But in network traffic sudden bursts may occur due to the inherent behavior of a network application. …


Sub-Segment Based Transport Layer Protocol For Wireless Medium, Som Sengupta May 2003

Sub-Segment Based Transport Layer Protocol For Wireless Medium, Som Sengupta

Theses

This thesis discusses the techniques to improve the TCP over wireless. The loss-intensive wireless communication results in high retransmission rates to recover lost packets and bandwidth consumption. In addition, the retransmitted segments have significant chance of being dropped. To make the retransmission process more granular, large segments at the transport layer (540 bytes, by default) can be subdivided into smaller sub-segments. This document introduces a split TCP based solution and describes how to produce a series of smaller-sized segments that share the same transport layer header. A new header format is introduced to support the transmission of smaller segments …


Final Design Report Of Computer Controller Of Robotic Arm, Kurt Niederhauser May 2003

Final Design Report Of Computer Controller Of Robotic Arm, Kurt Niederhauser

Undergraduate Honors Capstone Projects

My Part of the project was to design the hardware. I assembled the TT8 microprocessor and designed the optocial isolation board for the input and output signals to the TT8 microprocessor. We had two boards. One board had the TT8 Processor and other chips used for regulating the affairs of the TT8 (This board I assembled), and then there was another board that had all the control signals for the TT8 (this board I had to design), which sent the signals letting the TT8 know when the robot arm had been extended or retracted as far is it could go. …


Internet Protocol (Ip) Over Link-16, Clinton W. Stinson Mar 2003

Internet Protocol (Ip) Over Link-16, Clinton W. Stinson

Theses and Dissertations

The purpose of Link- 16 is to exchange real-time tactical data among units of the United States and allied forces. Primary Link- 16 functions include exchange of friendly unit position and status data, fl%the dissemination of tactical surveillance track data, and the control/management of air, surface, and subsurface engagements. Because Link- 16 will play an integral role in fl% network-centric Joint Battlespace Infosphere (JBI), the performance of Internet Protocol version six (IPv6) and IP Security (IPSec) over Link-16 needs to be determined. Using OPNET modeling software to simulate a Link- 16 network, the investigation of this research revealed that the …


Wlan Csma/Ca Performance In A Bluetooth Interference Environment, Randall B. Noel Mar 2003

Wlan Csma/Ca Performance In A Bluetooth Interference Environment, Randall B. Noel

Theses and Dissertations

IEEE 802.11 WLANs and Bluetooth piconets both operate in the 2.4 GHz Industrial Scientific and Medical (ISM) radio band. When operating in close proximity, these two technologies interfere with each other. Current literature suggests that IEEE 802.11 (employing direct sequence spread spectrum technology) is more susceptible to this interference than Bluetooth, which uses frequency hopping spread spectrum technology, resulting in reduced throughput. Current research tends to focus on the issue of packet collisions, and not the fact that IEEE 802.11 may also delay its transmissions while the radio channel is occupied by a Bluetooth signal. This research characterizes previously neglected …


Investigation Of Doppler Effects On The Detection Of Polyphase Coded Radar Waveforms, Geoffrey G. Bowman Mar 2003

Investigation Of Doppler Effects On The Detection Of Polyphase Coded Radar Waveforms, Geoffrey G. Bowman

Theses and Dissertations

Special operations missions often depend on discrete insertion of highly trained soldiers into dangerous territory. To reduce the risk involved in this type of engagement, Low Probability of Detection radar waveforms have been designed specifically to defeat enemy passive radar detectors. These waveforms have been shown to perform well when the Doppler shift is minimal, but their performance degrades dramatically with increased frequency shifts due to Doppler effects. This research compares one known Low Probability of Detection waveform, based on Welti coding, with a radar waveform known to provide Doppler constancy, namely, one based on Frank coding. These waveforms are …


Performance Analysis Of Protocol Independent Multicasting-Dense Mode In Low Earth Orbit Satellite Networks, Mark D. Saeger Mar 2003

Performance Analysis Of Protocol Independent Multicasting-Dense Mode In Low Earth Orbit Satellite Networks, Mark D. Saeger

Theses and Dissertations

This research explored the implementation of Protocol Independent Multicasting - Dense Mode (PIM-DM) in a LEO satellite constellation. PIM-DM is a terrestrial protocol for distributing traffic efficiently between subscriber nodes by combining data streams into a tree-based structure, spreading from the root of the tree to the branches. Using this structure, a minimum number of connections are required to transfer data, decreasing the load on intermediate satellite routers. The PIM-DM protocol was developed for terrestrial systems and this research implemented an adaptation of this protocol in a satellite system. This research examined the PIM-DM performance characteristics which were compared to …


Characterizing Data Streams Over Ieee 802.11b Ad-Hoc Wireless Networks, John T. Wagnon Mar 2003

Characterizing Data Streams Over Ieee 802.11b Ad-Hoc Wireless Networks, John T. Wagnon

Theses and Dissertations

Soon, advancements in data encryption technology will make real-time decryption of the contents of network packets virtually impossible. This research anticipates this development and extracts useful information based on packet level characteristics. Distinguishing characteristics from e-mail, HTTP, print, and FTP applications are identified and analyzed. The analysis of collected data from an ad-hoc wireless network reveals that distinguishing characteristics of network traffic do indeed exist. These characteristics include packet size, packet frequency, inter-packet correlation, and channel utilization. Without knowing the contents of packets or the direction of the traffic flow, the applications accessing the wireless network can be determined.