Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Department of Computer Science and Engineering

2014

Articles 1 - 8 of 8

Full-Text Articles in Computer Engineering

Combating Integrity Attacks In Industrial Control Systems, Chad Arnold Jan 2014

Combating Integrity Attacks In Industrial Control Systems, Chad Arnold

Browse all Theses and Dissertations

Industrial Control Systems are vulnerable to integrity attacks because of connectivity to the external Internet and trusted internal networking components that can become compromised. Integrity attacks can be modeled, analyzed, and sometimes remedied by exploiting properties of physical devices and reasoning about the trust worthiness of ICS communication components.

Industrial control systems (ICS) monitor and control the processes of public utility that society depends on - the electric power grid, oil and gas pipelines, transportation, and water facilities. Attacks that impact the operations of these critical assets could have devastating consequences. The complexity and desire to interconnect ICS components have introduced ...


A Comparison Of Monocular Camera Calibration Techniques, Richard L. Van Hook Jan 2014

A Comparison Of Monocular Camera Calibration Techniques, Richard L. Van Hook

Browse all Theses and Dissertations

Extensive use of visible electro-optical (visEO) cameras for machine vision techniques shows that most camera systems produce distorted imagery. This thesis investigates and compares several of the most common techniques for correcting the distortions based on a pinhole camera model. The methods being examined include a common chessboard pattern based on (Sturm 1999), (Z. Zhang 1999), and (Z. Zhang 2000), as well as two "circleboard" patterns based on (Heikkila 2000). Additionally, camera models from the visual structure from motion (VSFM) software (Wu n.d.) are used. By comparing reprojection error from similar data sets, it can be shown that the ...


Dynamic Cache Partitioning For Multi-Core Systems, Yang Zhang Jan 2014

Dynamic Cache Partitioning For Multi-Core Systems, Yang Zhang

Browse all Theses and Dissertations

As the power consumption (power wall) is limiting the clock frequency increase, multi-core and many-core processors become the major-trend of the new generation of processors. One of the biggest challenges to achieve high performance in multi-core systems is the growing disparity between processor and memory speeds. The "memory wall"' problem, i.e., the growing disparity of speed between the processor and the memory, becomes even more serious in the multi-core systems. Caches have been highly successful in bridging the processor-memory performance gap by providing fast access to frequently used data. Caches also save power by limiting expensive off-chip memory accesses ...


The Properties Of Property Alignment On The Semantic Web, Michelle Andreen Cheatham Jan 2014

The Properties Of Property Alignment On The Semantic Web, Michelle Andreen Cheatham

Browse all Theses and Dissertations

Ontology alignment is an important step in enabling computers to query and reason across the many linked datasets on the semantic web. This is a difficult challenge because the ontologies underlying different linked datasets can vary in terms of subject area coverage, level of abstraction, ontology modeling philosophy, and even language. The alignment approach presented here centers on string similarity metrics. Nearly all ontology alignment systems use a string similarity metric in one form or another, but it seems that the choice of a particular metric is often arbitrary. We begin this dissertation with the most comprehensive survey to date ...


Adapting Linguistic Deception Cues For Malware Detection, Stacie Noel Severyn Jan 2014

Adapting Linguistic Deception Cues For Malware Detection, Stacie Noel Severyn

Browse all Theses and Dissertations

People verbally express themselves in a variety of ways, yet the same patterns consistently appear within the words of a person who is being deceptive. This research provides insight and demonstrates that similar patterns exist within malicious software that do not commonly exist within benign software, and can be used to help determine that the software is malicious or untrustworthy.

The patterns that have been shown to exist within deceptive language were investigated to determine whether similar patterns exist within malware. Tests were performed to determine whether malware is more likely to consistently contain a higher or lower frequency of ...


Fragment Association Matching Enhancement (Fame) On A Video Tracker, Andrew Johnson Jan 2014

Fragment Association Matching Enhancement (Fame) On A Video Tracker, Andrew Johnson

Browse all Theses and Dissertations

In the field of surveillance, algorithms are developed to extract meaningful information out of a video feed captured via a camera. One type of algorithm used in the field of surveillance is a tracking algorithm. A tracking algorithm allows a user to watch the movement of an object in the camera's field of view. The tracker used in this thesis research is a feature aided tracker (FAT). The FAT uses both features and kinematics to generate tracks. However, camera movement will affect the tracker's ability to accurately track an object which poses a problem to the tracker. Specifically ...


A Novel Synergistic Model Fusing Electroencephalography And Functional Magnetic Resonance Imaging For Modeling Brain Activities, Konstantinos Michalopoulos Jan 2014

A Novel Synergistic Model Fusing Electroencephalography And Functional Magnetic Resonance Imaging For Modeling Brain Activities, Konstantinos Michalopoulos

Browse all Theses and Dissertations

Study of the human brain is an important and very active area of research. Unraveling the way the human brain works would allow us to better understand, predict and prevent brain related diseases that affect a significant part of the population. Studying the brain response to certain input stimuli can help us determine the involved brain areas and understand the mechanisms that characterize behavioral and psychological traits.

In this research work two methods used for the monitoring of brain activities, Electroencephalography (EEG) and functional Magnetic Resonance (fMRI) have been studied for their fusion, in an attempt to bridge together the ...


Automated Complexity-Sensitive Image Fusion, Brian Patrick Jackson Jan 2014

Automated Complexity-Sensitive Image Fusion, Brian Patrick Jackson

Browse all Theses and Dissertations

To construct a complete representation of a scene with environmental obstacles such as fog, smoke, darkness, or textural homogeneity, multisensor video streams captured in diferent modalities are considered. A computational method for automatically fusing multimodal image streams into a highly informative and unified stream is proposed. The method consists of the following steps: 1. Image registration is performed to align video frames in the visible band over time, adapting to the nonplanarity of the scene by automatically subdividing the image domain into regions approximating planar patches

2. Wavelet coefficients are computed for each of the input frames in each modality ...