Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

55,260 Full-Text Articles 72,079 Authors 23,183,657 Downloads 375 Institutions

All Articles in Computer Sciences

Faceted Search

55,260 full-text articles. Page 2003 of 2011.

Investigating Basic Quality Of Service Design Possibilities For Regis University Academic Research Network Edge Routers, Robert Zwick 2010 Regis University

Investigating Basic Quality Of Service Design Possibilities For Regis University Academic Research Network Edge Routers, Robert Zwick

Regis University Student Publications (comprehensive collection)

The Regis University Academic Research Network (ARNe) had network resources, such as VoIP, that required preservation their ability to receive near real-time forwarding treatment across the network. Quality of Service (QoS) design ideas were examined from four actual implementations described in research cases. Additionally, research involving surveys from Cisco certified professionals was examined, and Cisco technical literature was examined. Case study methodology, involving the study of multiple cases, was the primary tactic utilized in this research. Examination and triangulation of data from the research indicated that ARNe would benefit from moving forward with a basic QoS design and implementation, integrating …


Building Efficient Wireless Infrastructures For Pervasive Computing Environments, Bo Sheng 2010 College of William & Mary - Arts & Sciences

Building Efficient Wireless Infrastructures For Pervasive Computing Environments, Bo Sheng

Dissertations, Theses, and Masters Projects

Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but networked with each other through wireless channels so that people can easily control and access them. In the architecture of pervasive computing systems, these small and networked computing devices form a wireless infrastructure layer to support various functionalities in the upper application layer.;In practical applications, the wireless infrastructure often plays a …


An Interoperable And Secure Architecture For Internet-Scale Decentralized Personal Communication, David Alan Bryan 2010 College of William & Mary - Arts & Sciences

An Interoperable And Secure Architecture For Internet-Scale Decentralized Personal Communication, David Alan Bryan

Dissertations, Theses, and Masters Projects

Interpersonal network communications, including Voice over IP (VoIP) and Instant Messaging (IM), are increasingly popular communications tools. However, systems to date have generally adopted a client-server model, requiring complex centralized infrastructure, or have not adhered to any VoIP or IM standard. Many deployment scenarios either require no central equipment, or due to unique properties of the deployment, are limited or rendered unattractive by central servers. to address these scenarios, we present a solution based on the Session Initiation Protocol (SIP) standard, utilizing a decentralized Peer-to-Peer (P2P) mechanism to distribute data. Our new approach, P2PSIP, enables users to communicate with minimal …


Secure And Efficient Data Extraction For Ubiquitous Computing Applications, Chiu Chiang Tan 2010 College of William & Mary - Arts & Sciences

Secure And Efficient Data Extraction For Ubiquitous Computing Applications, Chiu Chiang Tan

Dissertations, Theses, and Masters Projects

Ubiquitous computing creates a world where computers have blended seamlessly into our physical environment. In this world, a "computer" is no longer a monitor-and-keyboard setup, but everyday objects such as our clothing and furniture. Unlike current computer systems, most ubiquitous computing systems are built using small, embedded devices with limited computational, storage and communication abilities. A common requirement for many ubiquitous computing applications is to utilize the data from these small devices to perform more complex tasks. For critical applications such as healthcare or medical related applications, there is a need to ensure that only authorized users have timely access …


Multimodal Non-Rigid Registration For Image-Guided Head And Neck Surgery, Michael Lawrence Weissberger 2010 College of William & Mary - Arts & Sciences

Multimodal Non-Rigid Registration For Image-Guided Head And Neck Surgery, Michael Lawrence Weissberger

Dissertations, Theses, and Masters Projects

No abstract provided.


An Agile Ba: A Case Study Of The Business Analyst In Agile, Nathan Wagner 2010 Regis University

An Agile Ba: A Case Study Of The Business Analyst In Agile, Nathan Wagner

Regis University Student Publications (comprehensive collection)

Companies adopting Agile software development methodologies are becoming a growing trend. The roles responsible for managing and participating in these types of projects must make a significant shift in focus when moving from the waterfall development process to a more adaptive way of working. Even with the growing adoption and increasing amount of study around Agile, the literature and texts prescribing the various Agile methodologies do not address the specific role of the Business Analayst. In this paper, the role of the Business Analyst in Agile is explored through a qualitative study within a large software development organization utilizing Agile …


Modeling Decision Making Related To Incident Delays During Hurricane Evacuations, Robert Michael Robinson 2010 Old Dominion University

Modeling Decision Making Related To Incident Delays During Hurricane Evacuations, Robert Michael Robinson

Computational Modeling & Simulation Engineering Theses & Dissertations

Successful evacuations from metropolitan areas require optimizing the transportation network, monitoring conditions, and adapting to changes. Evacuation plans seek to maximize the city's ability to evacuate traffic to flee the endangered region, but once an evacuation begins, real time events degrade even the best plans.

To better understand behavioral responses made during a hurricane evacuation, a survey of potential evacuees obtained data on demographics, driving characteristics, and the traffic information considered prior to and during an evacuation. Analysis showed significant levels of correlation between demographic factors (e.g., gender, age, social class, etc.) and self-assessed driver characteristics, but limited correlation with …


Theory Of Entropic Security Decay: The Gradual Degradation In Effectiveness Of Commissioned Security Systems, Michael P. Coole 2010 Edith Cowan University

Theory Of Entropic Security Decay: The Gradual Degradation In Effectiveness Of Commissioned Security Systems, Michael P. Coole

Theses: Doctorates and Masters

As a quantitative auditing tool for Physical Protection Systems (PPS) the Estimated Adversary Sequence Interruption (EASI) model has been available for many years. Nevertheless, once a systems macro-state measure has been commissioned (Pi) against its defined threat using EASI, there must be a means of articulating its continued efficacy (steady state) or its degradation over time. The purpose of this multi-phase study was to develop the concept and define the term entropic security decay. Phase one presented documentary benchmarks for security decay. This phase was broken into three stages; stage one presented General Systems Theory (GST) as a systems benchmark …


Application Of Information Theory And Statistical Learning To Anomaly Detection, Steven Gianvecchio 2010 College of William & Mary - Arts & Sciences

Application Of Information Theory And Statistical Learning To Anomaly Detection, Steven Gianvecchio

Dissertations, Theses, and Masters Projects

In today's highly networked world, computer intrusions and other attacks area constant threat. The detection of such attacks, especially attacks that are new or previously unknown, is important to secure networks and computers. A major focus of current research efforts in this area is on anomaly detection.;In this dissertation, we explore applications of information theory and statistical learning to anomaly detection. Specifically, we look at two difficult detection problems in network and system security, (1) detecting covert channels, and (2) determining if a user is a human or bot. We link both of these problems to entropy, a measure of …


Software Test Automation, Phillip Laplante, Fevzi Belli, Jerry Gao, Greg Kapfhammer, Keith Miller, W. Wong, Dianxiang Xu 2010 Pennsylvania State University

Software Test Automation, Phillip Laplante, Fevzi Belli, Jerry Gao, Greg Kapfhammer, Keith Miller, W. Wong, Dianxiang Xu

Education Sciences and Professional Programs Faculty Works

No abstract provided.


A New Multi-Tier Adaptive Military Manet Security Protocol Using Hybrid Cryptography And Signcryption, ATTİLA A. YAVUZ, FATİH ALAGÖZ, EMİN ANARIM 2010 TÜBİTAK

A New Multi-Tier Adaptive Military Manet Security Protocol Using Hybrid Cryptography And Signcryption, Atti̇la A. Yavuz, Fati̇h Alagöz, Emi̇n Anarim

Turkish Journal of Electrical Engineering and Computer Sciences

Mobile Ad-hoc NETworks (MANETs) are expected to play an important role in tactical military networks by providing infrastructureless communication. However, maintaining secure and instant information sharing is a difficult task especially for highly dynamic military MANETs. To address this requirement, we propose a new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption. In our protocol, we bring novelties to secure military MANET communication for three main points: Cryptographic methods used in MANETs, hybrid key management protocols and structural organization of the military MANETs. As a new approach, we use hybrid cryptography mechanisms and Elliptic Curve Pintsov-Vanstone Signature …


State Variable Distributed-Parameter Representation Of Transmission Line For Transient Simulations, MEHMET SALİH MAMİŞ, ASIM KAYGUSUZ, MUHAMMET KÖKSAL 2010 TÜBİTAK

State Variable Distributed-Parameter Representation Of Transmission Line For Transient Simulations, Mehmet Sali̇h Mami̇ş, Asim Kaygusuz, Muhammet Köksal

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a distributed-parameter state variable approach is used to calculate transients on transmission lines based on the concept of travelling waves. The method of characteristics for lossless line is used and the state equations are derived for the system. These equations are converted to a set of difference equations using the trapezoidal rule of integration and solved in time domain using LU decomposition. Single- and multi-phase transmission lines with various linear and non-linear terminations are considered in the illustrative examples. State-space modeling of transposed lines using modal decomposition is introduced and the effects caused by lumped parameter approximation …


Building Linear Parameter Varying Models Using Adaptation, For The Control Of A Class Of Nonlinear Systems, COŞKU KASNAKOĞLU 2010 TÜBİTAK

Building Linear Parameter Varying Models Using Adaptation, For The Control Of A Class Of Nonlinear Systems, Coşku Kasnakoğlu

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper a novel method is proposed for constructing linear parameter varying (LPV) system models through adaptation. For a class of nonlinear systems, an LPV model is built using its linear part, and its coefficients are considered as time-varying parameters. The variation in time is controlled by an adaptation scheme with the goal of keeping the trajectories of the LPV system close to those of the original nonlinear system. Using the LPV model as a surrogate, a dynamical controller is built by utilizing self-scheduling methods for LPV systems, and it is shown that this controller will indeed stabilize the …


Differential Power Analysis Resistant Hardware Implementation Of The Rsa Cryptosystem, KEKLİK ALPTEKİN BAYAM, BERNA ÖRS 2010 TÜBİTAK

Differential Power Analysis Resistant Hardware Implementation Of The Rsa Cryptosystem, Kekli̇k Alpteki̇n Bayam, Berna Örs

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, RSA cryptosystem was implemented on hardware, then modified to be resistant against Differential Power Analysis attacks by using the Randomized Table Window method. This is the first FPGA realization of an algorithmic countermeasure which makes RSA resistant to power analysis attacks. Modular exponentiation is realized with Montgomery Modular Multiplication. The Montgomery modular multiplier has been realized with Carry-Save Adders. Carry-Save representation has been used throughout the RSA encryption algorithm. The primarily implemented RSA architecture prevents the extraction of the secret key using Simple Power Analysis attacks. When comparing the protected implementation with the unprotected, it can be …


A Novel Square-Root Domain Realization Of First Order All-Pass Filter, SİNEM ÖLMEZ, UĞUR ÇAM 2010 TÜBİTAK

A Novel Square-Root Domain Realization Of First Order All-Pass Filter, Si̇nem Ölmez, Uğur Çam

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a new square-root domain, first order, all-pass filter based on the MOSFET square law is presented. The proposed filter is designed by using nonlinear mapping on the state variables of a state space description of the transfer function. To the best knowledge of the authors, the filter is the first square-root domain first order all-pass structure designed by using state space synthesis method in the literature. The center frequency of the all-pass filter is not only attainable at megahertz frequencies but also tunable by an external bias current. The proposed filter operated 2.5 V supply voltage is …


Experimental Studies Of A Scaled-Down Tsr-Based Svc And Tcr-Based Svc Prototype For Voltage Regulation And Compensation, AYETÜL GELEN, TANKUT YALÇINÖZ 2010 TÜBİTAK

Experimental Studies Of A Scaled-Down Tsr-Based Svc And Tcr-Based Svc Prototype For Voltage Regulation And Compensation, Ayetül Gelen, Tankut Yalçinöz

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, prototypes of two shunt flexible AC transmission system (FACTS) devices, a thyristor switched reactor (TSR)-based static VAr compensator (SVC) and a thyristor controlled reactor (TCR)-based static VAr compensator- have been developed. The design and testing of both a TSR-based SVC and a TCR-based SVC are accomplished in the Power Systems Research Laboratory of Nigde University. The TSR-based SVC and TCR-based SVC devices are studied in three-bus and single machine infinite bus systems for three-phase static load conditions. The effects of TSR-based SVC and TCR-based SVC devices on load voltages are also analyzed. Experimental results show that significant …


Robust Multimedia Watermarking: Hidden Markov Model Approach For Video Sequences, ERSİN ELBAŞI 2010 TÜBİTAK

Robust Multimedia Watermarking: Hidden Markov Model Approach For Video Sequences, Ersi̇n Elbaşi

Turkish Journal of Electrical Engineering and Computer Sciences

Because of the large amount of frames, similarity between frames and temporal attacks (frame dropping, frame averaging, frame swapping etc.), the process for video watermarking is more difficult than that for image watermarking. Current image watermarking methods are limited to solve all these difficulties. We propose a novel video watermarking system based on the Hidden Markov Model (HMM). This novel watermarking scheme splits the video sequences into a Group of Pictures (GOP) with HMM. Portions of the binary watermark are embedded into each GOP with a wavelet domain watermarking algorithm. The embedding process is the standard additive algorithm [1] in …


A New Chaotic Attractor From General Lorenz System Family And Its Electronic Experimental Implementation, İHSAN PEHLİVAN, YILMAZ UYAROĞLU 2010 TÜBİTAK

A New Chaotic Attractor From General Lorenz System Family And Its Electronic Experimental Implementation, İhsan Pehli̇van, Yilmaz Uyaroğlu

Turkish Journal of Electrical Engineering and Computer Sciences

This article introduces a novel three-dimensional continuous autonomous chaotic system with six terms and two quadratic nonlinearities. The new system contains two variational parameters and exhibits Lorenz-like attractors in numerical simulations and experimental measurements. The basic dynamical properties of the new system are analyzed by means of equilibrium points, eigenvalue structures, and Lyapunov exponents. The new system examined in Matlab-Simulink^{\textregistered} and Orcad-PSpice^{\textregistered}. An electronic circuit realization of the proposed system is presented using analog electronic elements such as capacitors, resistors, operational amplifiers and multipliers. The behaviour of the realized system is evaluated with computer simulations.


An Rfid Based Indoor Tracking Method For Navigating Visually Impaired People, RUŞEN ÖKTEM, ELİF AYDIN 2010 TÜBİTAK

An Rfid Based Indoor Tracking Method For Navigating Visually Impaired People, Ruşen Öktem, Eli̇f Aydin

Turkish Journal of Electrical Engineering and Computer Sciences

This paper tackles the RFID based tracking problem in an obscured indoor environment. The proposed solution is an integral part of a navigation aid for guiding visually impaired people in a store. It uses RF signal strengths and is based on the Bayes Decision Theory. An observation vector is formed by received radio signal strength indication values, transmitted from three transmitters at distinct frequencies in the UHF band. The indoor area is divided into square grids, where each grid is considered as a class. The problem of tracking is expressed as classifying the observed radio signal strengths to the most …


Stator Resistance Estimation Using Ann In Dtc Im Drives, MUSTAFA AKTAŞ, H. İBRAHİM OKUMUŞ 2010 TÜBİTAK

Stator Resistance Estimation Using Ann In Dtc Im Drives, Mustafa Aktaş, H. İbrahi̇m Okumuş

Turkish Journal of Electrical Engineering and Computer Sciences

Torque control of induction motors (IM) requires accurate estimation of the flux in the motor. But the flux estimate, when estimated from the stator circuit variables, is highly dependent on the stator resistance of the IM. As a result, the flux estimate is prone to errors due to variation in the stator resistance, especially at low stator frequencies. In this paper, an Artificial Neural Network (ANN) is used to adjust the stator resistance of an IM. A back propagation training algorithm was used in training the neural network for the simulation. The proposed ANN resistance estimator has shown good performance …


Digital Commons powered by bepress