Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2001

Theses/Dissertations

Discipline
Institution
Keyword
Publication

Articles 1 - 19 of 19

Full-Text Articles in Computer Engineering

Attack Visualization For Intrusion Detection System, Mohammad A. Rabie Dec 2001

Attack Visualization For Intrusion Detection System, Mohammad A. Rabie

Theses

Attacks detection and visualization is the process of attempting to identify instances of network misuse by comparing current activity against the expected actions of an intruder. Most current approaches to attack detection involve the use of rule-based expert systems to identify indications of known attacks. However, these techniques are less successful in identifying attacks, which vary from expected patterns. Artificial neural networks provide the potential to identify and classify network activity based on limited, incomplete, and nonlinear data sources. Presenting an approach to the process of Attack visualization that utilizes the analytical strengths of neural networks, and providing the results ...


The Effect Of Target Position And Tactual Recognition Field Size On Touch Bias And Accuracy, Elizabeth L. Brix Jul 2001

The Effect Of Target Position And Tactual Recognition Field Size On Touch Bias And Accuracy, Elizabeth L. Brix

Theses - Daytona Beach

Past studies have shown that touchscreen display angles other than those that perpendicularly bisect the operator's line of sight cause the operator to touch slightly below the target. The amount of touch bias created from this misjudgment fluctuates according to the target's position on the screen. Additionally, the percentage of touches that activate a specific target varies according to the size of the tactual recognition field. Out of three square tactual recognition field sizes, this study sought to match these fields with the amount of touch bias occurring in each location (i.e., small amount of touch bias ...


A Cad-Mlca Interface For Next-Generation Dfe Tools, Jun He May 2001

A Cad-Mlca Interface For Next-Generation Dfe Tools, Jun He

Theses

Environmental concerns and rising product disposal costs have pressed manufactures to make more environmentally friendly products and customers to use and dispose of them in an environmental responsive way. Thus the practice of Design for Environment (DFE) is becoming essential in today's industrial environment. Life Cycle Assessment (LCA) provides different ways for the environmental assessment of products. One critical step in performing lifecycle assessment of any product design is to collect design-related data. The common way based on manual input for traditional DFE tools is not only cumbersome and time-consuming but also error-prone. This thesis presents the characteristics of ...


Silicon Based Ir Filters, Prakash Mokashi May 2001

Silicon Based Ir Filters, Prakash Mokashi

Theses

The design and fabrication of silicon based IR (Infrared) filters for high-speed optical communication systems are the topic of this thesis. Its novelty is in two aspects: 1) Use of silicon wafers as an optical guiding medium; 2) Use of wafer bonding technique to attach two optical elements together.

The structure consists of two optical waveguides, the bus waveguide and the drop channel waveguide. A ring on top of these waveguides couples them in such a way that only one narrow spectral line is removed from the bus waveguides which propagates in the dropchannel waveguide. The assembly is fabricated using ...


Presentations World Wide Systems, Sandra Marie Hengstebeck Jan 2001

Presentations World Wide Systems, Sandra Marie Hengstebeck

Theses Digitization Project

The purpose of Presentations World Wide System (PWWS) is to allow students to view a live presentation through an Internet browser and allow the instructor to have control over the presentation.


Introduction On Intrusion Detection Systems : Focus On Hierarchical Analysis, Ratna Bajaj Jan 2001

Introduction On Intrusion Detection Systems : Focus On Hierarchical Analysis, Ratna Bajaj

Theses

In today's fast paced computing world security is a main concern. Intrusion detection systems are an important component of defensive measures protecting computer systems and networks from abuse. This paper will examine various intrusion detection systems. The task of intrusion detection is to monitor usage of a system and detect and malicious activity, therefore, the architecture is a key component when studying intrusion detection systems. This thesis will also analyze various neural networks for statistical anomaly intrusion detection systems. The thesis will focus on the Hierarchical Intrusion Detection system (HIDE) architecture. The HIDE system detects network based attack as ...


Attitudes And Perceptions Regarding Internet-Based Electronic Data Interchange In A Public Organization In Saudi Arabia, Abdulrahman S. Al-Zumaia Jan 2001

Attitudes And Perceptions Regarding Internet-Based Electronic Data Interchange In A Public Organization In Saudi Arabia, Abdulrahman S. Al-Zumaia

Dissertations and Theses @ UNI

This study examined the attitudes and perceptions of staff members and administrators in the General Directorate for Private Institutes & Centers (GDPI&C), Training institutes, and Centers in Saudi Arabia toward Internet-based Electronic Data Interchange (I-EDI) in a public organization. A survey was conducted of a group of GDPI&C members and randomly selected Institutes and Centers. The 339 respondents participated anonymously by providing demographic information and completing the attitudes and perceptions section of I-EDI questionnaire. The survey response rate was 82.6%.

An attitude survey was distributed to staff members, administrators, and faculty members in the Saudi Arabian GDPI&C ...


Bluetooth Software On Linux, Wireless Hand-Held Devices, Teck Khoon Low Jan 2001

Bluetooth Software On Linux, Wireless Hand-Held Devices, Teck Khoon Low

Theses : Honours

In order to enable existing computers (non-Bluetooth ready) to connect to a Bluetooth piconet, a Bluetooth hardware device comprising of the Radio antenna, the baseband and control circuit is used. The digital portion of this device is also known as a Host Controller, HC. In the traditional communication lingo, the Bluetooth Hardware functions, as the Data Communication Equipment (DCE) while the Host is the Data terminal Equipment (DTE). This report discusses the theory and implementation of the communication protocol between the Host and the Host Controller, enabling communication between the computer and the Bluetooth hardware


Applying E-Commerce Techniques To Public School Software, Michael Lapke Jan 2001

Applying E-Commerce Techniques To Public School Software, Michael Lapke

UNF Graduate Theses and Dissertations

Applying e-commerce technology to public school software is a process that involves an extensive and thorough analysis. There are typically three groups of users who would use such a system: teachers, administrators and parents. Teachers need a system that nearly duplicates the software that they are currently using to enter, store, and calculate their grades, while school administrators and parents need to student and teacher's information. This is where the use of e-commerce technology comes in very nicely.

The analysis performed for this project involved extensive interviews with the expert user set and a walk-through of the current system ...


System Security In An Open Lab Environment, Erik Quist Jan 2001

System Security In An Open Lab Environment, Erik Quist

Masters Theses

This thesis presents a system security process for computer workstations in a university open lab environment, which was developed and implemented for the Lumpkin Hall Computer Labs at Eastern Illinois University (EIU). The system security includes the use of policies and NTFS permissions, registry hacks and script files. These techniques were applied to a mixture of Windows NT 4.0 service pack 6a and Windows 2000 Professional workstations in the Lumpkin Hall Computer Labs. They were then tested for appropriate security setup using a Network Security Checksheet and a survey. The Network Security Checksheet ensured that all of the workstations ...


Implementation Business-To-Business Electronic Commercial Website Using Coldfusion 4.5, Teerapong Euawatana Jan 2001

Implementation Business-To-Business Electronic Commercial Website Using Coldfusion 4.5, Teerapong Euawatana

Theses Digitization Project

This project was created using ColdFusion 4.5 to build and implement a commercial web site to present a real picture of electronic commerce. This project is intended to provide enough information for other students who are looking for a guideline for further study and to improve their skills in business from an information management aspect.


Towards Comparative Profiling Of Parallel Applications With Pperfdb, Christian Leland Hansen Jan 2001

Towards Comparative Profiling Of Parallel Applications With Pperfdb, Christian Leland Hansen

Dissertations and Theses

Due to the complex nature of parallel programming, it is difficult to diagnose and solve performance related problems. Knowledge of program behavior is obtained experimentally, with repeated runs of a slightly modified version of the application or the same code in different environments. In these circumstances, comparative performance analysis can provide meaningful insights into the subtle effects of system and code changes on parallel program behavior by highlighting the difference in performance results across executions.

I have designed and implemented modules which extend the PPerfDB performance tool to allow access to existing performance data generated by several commonly used tracing ...


Design And Implementation Of Car Rental System, Fadi Fayez Abdel-Jaber Jan 2001

Design And Implementation Of Car Rental System, Fadi Fayez Abdel-Jaber

Theses Digitization Project

When someone wants to rent a car, the customer will usually think twice about the company from which they want to rent. The decision will be based on factors such as good rates, quality and customer service. The service the company representative offers the client should be fast, clear and accurate. This goal cannot be achieved without an informative system that will enable the customer representative to answer the various questions the client might have.


A Study And Implementation Of An Electronic Commerce Website Using Active Server Pages, Soumaya Boutkhil Jan 2001

A Study And Implementation Of An Electronic Commerce Website Using Active Server Pages, Soumaya Boutkhil

Theses Digitization Project

The purpose of this project is to design an electronic commerce site for MarocMart company. MarocMart.com is an one-stop shopping company for a number of high quality products: carpets, jewelry, pottery, wood, leather, metals, and fashion items, etc... Each article is unique, hand-made by Moroccan craftsmen.


Virtual Design Office: A Collaborative Unified Modeling Language Tool, Hara Totapally Jan 2001

Virtual Design Office: A Collaborative Unified Modeling Language Tool, Hara Totapally

Theses Digitization Project

Real-time conferencing and collaborative computing is a great way to make developers more effective. This project is a collaborative framework development comprising configurable client and server components.


World Wide Graphics, Alysha Marie Timmons Jan 2001

World Wide Graphics, Alysha Marie Timmons

Theses Digitization Project

The scope of this project describes World Wide Graphics (WWG) a software package that provides instructors with the tools needed to present a web-based presentation to a group of students while having the ability of enhancing the prepared HTML slide with userdrawn graphics and highlighting.


Vlsi Implementation Of A Massively Parallel Wavelet Based Zerotree Coder For The Intelligent Pixel Array, Geoffrey N. Alagoda Jan 2001

Vlsi Implementation Of A Massively Parallel Wavelet Based Zerotree Coder For The Intelligent Pixel Array, Geoffrey N. Alagoda

Theses: Doctorates and Masters

In the span of a few years, mobile multimedia communication has rapidly become a significant area of research and development constantly challenging boundaries on a variety of technologic fronts. Mobile video communications in particular encompasses a number of technical hurdles that generally steer technological advancements towards devices that are low in complexity, low in power usage yet perform the given task efficiently. Devices of this nature have been made available through the use of massively parallel processing arrays such as the Intelligent Pixel Processing Array. The Intelligent Pixel Processing array is a novel concept that integrates a parallel image capture ...


Gene Expression Data Analysis Using Fuzzy Logic, Robert Reynolds Jan 2001

Gene Expression Data Analysis Using Fuzzy Logic, Robert Reynolds

Electronic Theses and Dissertations

DNA microarray technology allows for the parallel analysis of the expression of genes in an organism. The wealth of spatio-temporal data provided by the technology allows us to attempt to reverse engineer the genetic network. Fuzzy logic has been proposed as a method of analyzing the relationships between genes as well as their corresponding proteins. Combinations of genes are entered into a fuzzy model of gene interaction and evaluated on the basis of how well the combination fits the model. Those combinations of genes that fit the model are likely to be related. However, current analysis algorithms are slow and ...


Statistical Multiplexing And Connection Admission Control In Atm Networks, Guoqiang Mao Jan 2001

Statistical Multiplexing And Connection Admission Control In Atm Networks, Guoqiang Mao

Theses: Doctorates and Masters

Asynchronous Transfer Mode (ATM) technology is widely employed for the transport of network traffic, and has the potential to be the base technology for the next generation of global communications. Connection Admission Control (CAC) is the effective traffic control mechanism which is necessary in ATM networks in order to avoid possible congestion at each network node and to achieve the Quality-of-Service (QoS) requested by each connection. CAC determines whether or not the network should accept a new connection. A new connection will only be accepted if the network has sufficient resources to meet its QoS requirements without affecting the QoS ...