Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Engineering

Finite-Difference Time Domain Method For Nonorthogonal Unit-Cell Two-Dimensional Photonic Crystals, Wan Kuang, Woo J. Kim, John D. O'Brien Sep 2007

Finite-Difference Time Domain Method For Nonorthogonal Unit-Cell Two-Dimensional Photonic Crystals, Wan Kuang, Woo J. Kim, John D. O'Brien

Electrical and Computer Engineering Faculty Publications and Presentations

A finite-difference time-domain (FDTD) method based on a regular Cartesian Yee’s lattice is developed for calculating the dispersion band diagram of a 2-D photonic crystal. Unlike methods that require auxiliary difference equations or nonorthogonal grid schemes, our method uses the standard centraldifference equations and can be easily implemented in a parallel computing environment. The application of the periodic boundary condition on an angled boundary involves a split-field formulation of Maxwell’s equations. We show that the method can be applied for photonic crystals of both orthogonal and nonorthogonal unit cells. Complete and accurate bandgap information is obtained by using this FDTD …


User Security Behavior On Wireless Networks: An Empirical Study, Tim Chenoweth, Robert Minch, Sharon Tabor Jan 2007

User Security Behavior On Wireless Networks: An Empirical Study, Tim Chenoweth, Robert Minch, Sharon Tabor

IT and Supply Chain Management Faculty Publications and Presentations

Wireless networks are rapidly becoming ubiquitous but are often insecure and leave users responsible for their own security. We empirically study whether users are successfully securing their client computers when using wireless networks. Automated techniques are used that scan users' machines after they associate with a university wireless network. This determines whether a firewall is being used and what TCP ports are open. Results show that over 9% of 3,331 unique computers scanned were not using a properly configured firewall. In addition, almost 9% had at least one TCP port open, with almost 6% having open ports with significant security …


Evolvable Reconfigurable Hardware Framework For Edge Detection, Nader I. Rafla Jan 2007

Evolvable Reconfigurable Hardware Framework For Edge Detection, Nader I. Rafla

Electrical and Computer Engineering Faculty Publications and Presentations

Systems on Reconfigurable Chips contain rich resources of logic, memory, and processor cores on the same fabric. This platform is suitable for implementation of Evolvable Reconfigurable Hardware Architectures (ERHA). It is based on the idea of combining reconfigurable Field Programmable Gate Arrays (FPGA) along with genetic algorithms (GA) to perform the reconfiguration operation. This architecture is a suitable candidate for implementation of early-processing stage operators of image processing such as filtering and edge detection. However, there are still fundamental issues need to be solved regarding the on-chip reprogramming of the logic. This paper presents a framework for implementing an evolvable …