Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 33

Full-Text Articles in Engineering

Radar - A Novel Admission Control And Handoff Management Scheme For Multimedia Leo Satellite Networks, Syed Rashidali Rizvi Dec 2005

Radar - A Novel Admission Control And Handoff Management Scheme For Multimedia Leo Satellite Networks, Syed Rashidali Rizvi

Computer Science Theses & Dissertations

Low Earth Orbit (LEO) satellite networks are deployed as an enhancement to terrestrial wireless networks in order to provide broadband services to users regardless of their location. In addition to global coverage, these satellite systems support communications with hand-held devices and offer low cost-per-minute access cost, making them promising platforms for Personal Communication Services (PCS). LEO satellites are expected to support multimedia traffic and to provide their users with some form of Quality of Service (QoS) guarantees. However, the limited bandwidth of the satellite channel, satellite rotation around the Earth and mobility of end-users makes QoS provisioning and mobility management …


Robust And Efficient Localization Techniques For Cellular And Wireless Sensor Networks, Haseebulla M. Khan Dec 2005

Robust And Efficient Localization Techniques For Cellular And Wireless Sensor Networks, Haseebulla M. Khan

Computer Science Theses & Dissertations

Localization in wireless networks refers to a collection of tasks that, collectively, determines the location of a mobile user, striving to hide the effects of mobility from the user and/or application. Localization has become an important issue and has drawn considerable attention, as many applications including E-911, cargo tracking, locating patients, location-sensitive billing, etc., require knowledge of the location of user/objects. It was realized, quite a while back, that extending emergency 911-like services (E-911) to continually growing mobile population is one of the extremely important localization applications. The bulk of the proposed solutions to emergency location management in wireless environments …


Operator State Estimation For Adaptive Aiding In Uninhabited Combat Air Vehicles, Christopher A. Russell Sep 2005

Operator State Estimation For Adaptive Aiding In Uninhabited Combat Air Vehicles, Christopher A. Russell

Theses and Dissertations

This research demonstrated the first closed-loop implementation of adaptive automation using operator functional state in an operationally relevant environment. In the Uninhabited Combat Air Vehicle (UCAV) environment, operators can become cognitively overloaded and their performance may decrease during mission critical events. This research demonstrates an unprecedented closed-loop system, one that adaptively aids UCAV operators based on their cognitive functional state A series of experiments were conducted to 1) determine the best classifiers for estimating operator functional state, 2) determine if physiological measures can be used to develop multiple cognitive models based on information processing demands and task type, 3) determine …


Establishing Public Confidence In The Viability Of Fingerprint Biometric Technology, Nathan Alan Green Jul 2005

Establishing Public Confidence In The Viability Of Fingerprint Biometric Technology, Nathan Alan Green

Theses and Dissertations

The most common personal authentication techniques used for identity management employ a secret PIN or password that must be remembered. The challenge, for a given user, is that a multitude of such codes must be recalled over the course of the day for transactions involving distinct computer applications. Password mania prevails. Fingerprint biometric technology is an ideal alternate solution to this password recall problem. In spite of their availability for nearly thirty years, fingerprint biometric systems still remain uncommon in public sectors of industry such as education, government, and technology. Technology has improved sufficiently that false acceptance and rejection rates …


Opal: In Vivo Based Preservation Framework For Locating Lost Web Pages, Terry L. Harrison Jul 2005

Opal: In Vivo Based Preservation Framework For Locating Lost Web Pages, Terry L. Harrison

Computer Science Theses & Dissertations

We present Opal, a framework for interactively locating missing web pages (http status code 404). Opal is an example of "in vivo" preservation: harnessing the collective behavior of web archives, commercial search engines, and research projects for the purpose of preservation. Opal servers learn from their experiences and are able to share their knowledge with other Opal servers using the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH). Using cached copies that can be found on the web, Opal creates lexical signatures which are then used to search for similar versions of the web page. Using the OAI-PMH to facilitate …


Dream: A Theoretical Analysis, Xueying Qi Jul 2005

Dream: A Theoretical Analysis, Xueying Qi

Computer Science Theses & Dissertations

A Mobile Ad-hoc Network (MANET, for short) is a collection of mobile nodes deployed in support of a short-lived special-purpose operation. Examples include search-and-rescue missions, law-enforcement, multimedia classrooms, and among many others. Unlike cellular or satellite networks, MANET do not rely on any form of pre-existing infrastructure. The mobility of nodes combined with the lack of infrastructure makes routing in MANET notoriously difficult. It was recently suggested that routing in MANET can use to advantage geographic information that the nodes may acquire either by endowing them with a GPS chip or simply by using known localization algorithms. Distance Routing Effect …


Lightweight Federation Of Non-Cooperating Digital Libraries, Rong Shi Apr 2005

Lightweight Federation Of Non-Cooperating Digital Libraries, Rong Shi

Computer Science Theses & Dissertations

This dissertation studies the challenges and issues faced in federating heterogeneous digital libraries (DLs). The objective of this research is to demonstrate the feasibility of interoperability among non-cooperating DLs by presenting a lightweight, data driven approach, or Data Centered Interoperability (DCI). We build a Lightweight Federated Digital Library (LFDL) system to provide federated search service for existing digital libraries with no prior coordination.

We describe the motivation, architecture, design and implementation of the LFDL. We develop, deploy, and evaluate key services of the federation. The major difference to existing DL interoperability approaches is one where we do not insist on …


Clustering And Hybrid Routing In Mobile Ad Hoc Networks, Lan Wang Apr 2005

Clustering And Hybrid Routing In Mobile Ad Hoc Networks, Lan Wang

Computer Science Theses & Dissertations

This dissertation focuses on clustering and hybrid routing in Mobile Ad Hoc Networks (MANET). Specifically, we study two different network-layer virtual infrastructures proposed for MANET: the explicit cluster infrastructure and the implicit zone infrastructure. In the first part of the dissertation, we propose a novel clustering scheme based on a number of properties of diameter-2 graphs to provide a general-purpose virtual infrastructure for MANET. Compared to virtual infrastructures with central nodes, our virtual infrastructure is more symmetric and stable, but still light-weight. In our clustering scheme, cluster initialization naturally blends into cluster maintenance, showing the unity between these two operations. …


Passwords: A Survey On Usage And Policy, Kurt W. Martinson Mar 2005

Passwords: A Survey On Usage And Policy, Kurt W. Martinson

Theses and Dissertations

Computer password use is on the rise. Passwords have become one of the primary authentication methods used today. It is because of their high use that organizations have started to place parameters on passwords. Are password restrictions a nuisance? What are some of the consequences that result as organizations place the burden of their computer security on passwords? This thesis analyzes the results of a survey instrument that was used to determine if individuals are using similar techniques or patterns when choosing or remembering their passwords. It also looks at how individuals feel about using passwords. In addition, the authors …


Determination Of Structure From Motion Using Aerial Imagery, Paul R. Graham Mar 2005

Determination Of Structure From Motion Using Aerial Imagery, Paul R. Graham

Theses and Dissertations

The structure from motion process creates three-dimensional models from a sequence of images. Until recently, most research in this field has been restricted to land-based imagery. This research examines the current methods of land-based structure from motion and evaluates their performance for aerial imagery. Current structure from motion algorithms search the initial image for features to track though the subsequent images. These features are used to create point correspondences between the two images. The correspondences are used to estimate the motion of the camera and then the three-dimensional structure of the scene. This research tests current algorithms using synthetic data …


Accelerating Missile Threat Engagement Simulations Using Personal Computer Graphics Cards, Sean E. Jeffers Mar 2005

Accelerating Missile Threat Engagement Simulations Using Personal Computer Graphics Cards, Sean E. Jeffers

Theses and Dissertations

The 453rd Electronic Warfare Squadron supports on-going military operations by providing battlefield commanders with aircraft ingress and egress routes that minimize the risk of shoulder or ground-fired missile attacks on our aircraft. To determine these routes, the 453rd simulates engagements between ground-to-air missiles and allied aircraft to determine the probability of a successful attack. The simulations are computationally expensive, often requiring two-hours for a single 10-second missile engagement. Hundreds of simulations are needed to perform a complete risk assessment which includes evaluating the effectiveness of countermeasures such as flares, chaff, jammers, and missile warning systems. Thus, the need for faster …


Computer-Simulation-Assisted Lean Manufacturing Training, Luoding Wang Jan 2005

Computer-Simulation-Assisted Lean Manufacturing Training, Luoding Wang

Theses and Dissertations

This thesis assesses the potential of using computer simulation to aid existing lean manufacturing training methods such as lecture and live simulation. An investigation of this possibility was carried out in conjunction with UMEP's Lean 101 class. In the study, two experimental computer simulation models demonstrating the push and pull production scenarios were constructed using ProModel software. Simulation models were equipped with a Visual Basic interface to aid trainees to manipulate the model via ActiveX. Constructed computer simulation was compared with live simulation to answer these research questions: 1. Was computer simulation able to teach additional lean concepts not covered …


Enhancing Message Privacy In Wired Equivalent Privacy., Darshan Purandare Jan 2005

Enhancing Message Privacy In Wired Equivalent Privacy., Darshan Purandare

Electronic Theses and Dissertations

The 802.11 standard defines the Wired Equivalent Privacy (WEP) and encapsulation of data frames. It is intended to provide data privacy to the level of a wired network. WEP suffered threat of attacks from hackers owing to certain security shortcomings in the WEP protocol. Lately, many new protocols like WiFi Protected Access (WPA), WPA2, Robust Secure Network (RSN) and 802.11i have come into being, yet their implementation is fairly limited. Despite its shortcomings one cannot undermine the importance of WEP as it still remains the most widely used system and we chose to address certain security issues and propose some …


Compressed Pattern Matching For Text And Images, Tao Tao Jan 2005

Compressed Pattern Matching For Text And Images, Tao Tao

Electronic Theses and Dissertations

The amount of information that we are dealing with today is being generated at an ever-increasing rate. On one hand, data compression is needed to efficiently store, organize the data and transport the data over the limited-bandwidth network. On the other hand, efficient information retrieval is needed to speedily find the relevant information from this huge mass of data using available resources. The compressed pattern matching problem can be stated as: given the compressed format of a text or an image and a pattern string or a pattern image, report the occurrence(s) of the pattern in the text or image …


Transform Based And Search Aware Text Compression Schemes And Compressed Domain Text Retrieval, Nan Zhang Jan 2005

Transform Based And Search Aware Text Compression Schemes And Compressed Domain Text Retrieval, Nan Zhang

Electronic Theses and Dissertations

In recent times, we have witnessed an unprecedented growth of textual information via the Internet, digital libraries and archival text in many applications. While a good fraction of this information is of transient interest, useful information of archival value will continue to accumulate. We need ways to manage, organize and transport this data from one point to the other on data communications links with limited bandwidth. We must also have means to speedily find the information we need from this huge mass of data. Sometimes, a single site may also contain large collections of data such as a library database, …


Graph-Theoretic Approach To Modeling Propagation And Control Of Network Worms, Zoran Nikoloski Jan 2005

Graph-Theoretic Approach To Modeling Propagation And Control Of Network Worms, Zoran Nikoloski

Electronic Theses and Dissertations

In today's network-dependent society, cyber attacks with network worms have become the predominant threat to confidentiality, integrity, and availability of network computing resources. Despite ongoing research efforts, there is still no comprehensive network-security solution aimed at controling large-scale worm propagation. The aim of this work is fivefold: (1) Developing an accurate combinatorial model of worm propagation that can facilitate the analysis of worm control strategies, (2) Building an accurate epidemiological model for the propagation of a worm employing local strategies, (3) Devising distributed architecture and algorithms for detection of worm scanning activities, (4) Designing effective control strategies against the worm, …


Analyzing The Community Structure Of Web-Like Networks: Models And Algorithms, Aurel Cami Jan 2005

Analyzing The Community Structure Of Web-Like Networks: Models And Algorithms, Aurel Cami

Electronic Theses and Dissertations

This dissertation investigates the community structure of web-like networks (i.e., large, random, real-life networks such as the World Wide Web and the Internet). Recently, it has been shown that many such networks have a locally dense and globally sparse structure with certain small, dense subgraphs occurring much more frequently than they do in the classical Erdös-Rényi random graphs. This peculiarity--which is commonly referred to as community structure--has been observed in seemingly unrelated networks such as the Web, email networks, citation networks, biological networks, etc. The pervasiveness of this phenomenon has led many researchers to believe that such cohesive groups of …


Creating Models Of Internet Background Traffic Suitable For Use In Evaluating Network Intrusion Detection Systems, Song Luo Jan 2005

Creating Models Of Internet Background Traffic Suitable For Use In Evaluating Network Intrusion Detection Systems, Song Luo

Electronic Theses and Dissertations

This dissertation addresses Internet background traffic generation and network intrusion detection. It is organized in two parts. Part one introduces a method to model realistic Internet background traffic and demonstrates how the models are used both in a simulation environment and in a lab environment. Part two introduces two different NID (Network Intrusion Detection) techniques and evaluates them using the modeled background traffic. To demonstrate the approach we modeled five major application layer protocols: HTTP, FTP, SSH, SMTP and POP3. The model of each protocol includes an empirical probability distribution plus estimates of application-specific parameters. Due to the complexity of …


Qos In Cognitive Packet Networks: Adaptive Routing, Flow And Congestion Control, Pu Su Jan 2005

Qos In Cognitive Packet Networks: Adaptive Routing, Flow And Congestion Control, Pu Su

Electronic Theses and Dissertations

With the emergence of various applications that have different Quality of Service (QoS) requirements, the capability of a network to support QoS becomes more and more important and necessary. This dissertation explores QoS in Cognitive Packet Networks (CPN) by using adaptive routing, flow and congestion control. We present a detailed description and analysis of our proposed routing algorithms based on single and multiple QoS constraints. An online estimation of packet loss rate over a path is introduced. We implement and evaluate the adaptive routing scheme in an experimental CPN test-bed. Our experiments support our claims that the users can achieve …


Contributions To Automatic Particle Identification In Electron Micrographs: Algorithms, Implementation, And Applications, Vivek Singh Jan 2005

Contributions To Automatic Particle Identification In Electron Micrographs: Algorithms, Implementation, And Applications, Vivek Singh

Electronic Theses and Dissertations

Three dimensional reconstruction of large macromolecules like viruses at resolutions below 8 Ã… - 10 Ã… requires a large set of projection images and the particle identification step becomes a bottleneck. Several automatic and semi-automatic particle detection algorithms have been developed along the years. We present a general technique designed to automatically identify the projection images of particles. The method utilizes Markov random field modelling of the projected images and involves a preprocessing of electron micrographs followed by image segmentation and post processing for boxing of the particle projections. Due to the typically extensive computational requirements for extracting hundreds of …


Multizoom Activity Recognition Using Machine Learning, Raymond Smith Jan 2005

Multizoom Activity Recognition Using Machine Learning, Raymond Smith

Electronic Theses and Dissertations

In this thesis we present a system for detection of events in video. First a multiview approach to automatically detect and track heads and hands in a scene is described. Then, by making use of epipolar, spatial, trajectory, and appearance constraints, objects are labeled consistently across cameras (zooms). Finally, we demonstrate a new machine learning paradigm, TemporalBoost, that can recognize events in video. One aspect of any machine learning algorithm is in the feature set used. The approach taken here is to build a large set of activity features, though TemporalBoost itself is able to work with any feature set …


Formalization Of Input And Output In Modern Operating Systems: The Hadley Model, Matthew Gerber Jan 2005

Formalization Of Input And Output In Modern Operating Systems: The Hadley Model, Matthew Gerber

Electronic Theses and Dissertations

We present the Hadley model, a formal descriptive model of input and output for modern computer operating systems. Our model is intentionally inspired by the Open Systems Interconnection model of networking; I/O as a process is defined as a set of translations between a set of computer-sensible forms, or layers, of information. To illustrate an initial application domain, we discuss the utility of the Hadley model and a potential associated I/O system as a tool for digital forensic investigators. To illustrate practical uses of the Hadley model we present the Hadley Specification Language, an essentially functional language designed to allow …


Real-Time Realistic Rendering And High Dynamic Range Image Display And Compression, Ruifeng Xu Jan 2005

Real-Time Realistic Rendering And High Dynamic Range Image Display And Compression, Ruifeng Xu

Electronic Theses and Dissertations

This dissertation focuses on the many issues that arise from the visual rendering problem. Of primary consideration is light transport simulation, which is known to be computationally expensive. Monte Carlo methods represent a simple and general class of algorithms often used for light transport computation. Unfortunately, the images resulting from Monte Carlo approaches generally suffer from visually unacceptable noise artifacts. The result of any light transport simulation is, by its very nature, an image of high dynamic range (HDR). This leads to the issues of the display of such images on conventional low dynamic range devices and the development of …


Resource Allocation Schemes And Performance Evaluation Models For Wavelength Division Multiplexed Optical Networks, Mounire El Houmaidi Jan 2005

Resource Allocation Schemes And Performance Evaluation Models For Wavelength Division Multiplexed Optical Networks, Mounire El Houmaidi

Electronic Theses and Dissertations

Wavelength division multiplexed (WDM) optical networks are rapidly becoming the technology of choice in network infrastructure and next-generation Internet architectures. WDM networks have the potential to provide unprecedented bandwidth, reduce processing cost, achieve protocol transparency, and enable efficient failure handling. This dissertation addresses the important issues of improving the performance and enhancing the reliability of WDM networks as well as modeling and evaluating the performance of these networks. Optical wavelength conversion is one of the emerging WDM enabling technologies that can significantly improve bandwidth utilization in optical networks. A new approach for the sparse placement of full wavelength converters based …


Network Intrusion Detection: Monitoring, Simulation And Visualization, Mian Zhou Jan 2005

Network Intrusion Detection: Monitoring, Simulation And Visualization, Mian Zhou

Electronic Theses and Dissertations

This dissertation presents our work on network intrusion detection and intrusion sim- ulation. The work in intrusion detection consists of two different network anomaly-based approaches. The work in intrusion simulation introduces a model using explicit traffic gen- eration for the packet level traffic simulation. The process of anomaly detection is to first build profiles for the normal network activity and then mark any events or activities that deviate from the normal profiles as suspicious. Based on the different schemes of creating the normal activity profiles, we introduce two approaches for intrusion detection. The first one is a frequency-based approach which …


Planning And Scheduling For Large-Scaledistributed Systems, Han Yu Jan 2005

Planning And Scheduling For Large-Scaledistributed Systems, Han Yu

Electronic Theses and Dissertations

Many applications require computing resources well beyond those available on any single system. Simulations of atomic and subatomic systems with application to material science, computations related to study of natural sciences, and computer-aided design are examples of applications that can benefit from the resource-rich environment provided by a large collection of autonomous systems interconnected by high-speed networks. To transform such a collection of systems into a user's virtual machine, we have to develop new algorithms for coordination, planning, scheduling, resource discovery, and other functions that can be automated. Then we can develop societal services based upon these algorithms, which hide …


Sonar Sensor Interpretation For Ectogeneous Robots, Wen Gao Jan 2005

Sonar Sensor Interpretation For Ectogeneous Robots, Wen Gao

Dissertations, Theses, and Masters Projects

We have developed four generations of sonar scanning systems to automatically interpret surrounding environment. The first two are stationary 3D air-coupled ultrasound scanning systems and the last two are packaged as sensor heads for mobile robots. Template matching analysis is applied to distinguish simple indoor objects. It is conducted by comparing the tested echo with the reference echoes. Important features are then extracted and drawn in the phase plane. The computer then analyzes them and gives the best choices of the tested echoes automatically. For cylindrical objects outside, an algorithm has been presented to distinguish trees from smooth circular poles …


Scene Monitoring With A Forest Of Cooperative Sensors, Omar Javed Jan 2005

Scene Monitoring With A Forest Of Cooperative Sensors, Omar Javed

Electronic Theses and Dissertations

In this dissertation, we present vision based scene interpretation methods for monitoring of people and vehicles, in real-time, within a busy environment using a forest of co-operative electro-optical (EO) sensors. We have developed novel video understanding algorithms with learning capability, to detect and categorize people and vehicles, track them with in a camera and hand-off this information across multiple networked cameras for multi-camera tracking. The ability to learn prevents the need for extensive manual intervention, site models and camera calibration, and provides adaptability to changing environmental conditions. For object detection and categorization in the video stream, a two step detection …


An Interactive Distributed Simulation Framework With Application To Wireless Networks And Intrusion Detection, Oleg Kachirski Jan 2005

An Interactive Distributed Simulation Framework With Application To Wireless Networks And Intrusion Detection, Oleg Kachirski

Electronic Theses and Dissertations

In this dissertation, we describe the portable, open-source distributed simulation framework (WINDS) targeting simulations of wireless network infrastructures that we have developed. We present the simulation framework which uses modular architecture and apply the framework to studies of mobility pattern effects, routing and intrusion detection mechanisms in simulations of large-scale wireless ad hoc, infrastructure, and totally mobile networks. The distributed simulations within the framework execute seamlessly and transparently to the user on a symmetric multiprocessor cluster computer or a network of computers with no modifications to the code or user objects. A visual graphical interface precisely depicts simulation object states …


Numerical Modelling Of Sediments In Cork Harbour, Jérémy Pingon Jan 2005

Numerical Modelling Of Sediments In Cork Harbour, Jérémy Pingon

Theses

In recent years there have been considerable developments in the new and emerging field of hydroinformatics. This relatively new discipline is concerned with the application of computer and networking technology for the planning, management and protection of water bodies.

Environmental issues in estuaries require accurate and detailed knowledge of cohesive sediment transport processes to assess different issues including water quality, pollutant dispersion, and dredging and maintenance of navigation channels.

This thesis presents a review of the main sediment properties and processes required for modelling the behaviour and transport of sediments. It also introduces a new approach to sediment properties using …