Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Engineering

Enhancing Message Privacy In Wired Equivalent Privacy., Darshan Purandare Jan 2005

Enhancing Message Privacy In Wired Equivalent Privacy., Darshan Purandare

Electronic Theses and Dissertations

The 802.11 standard defines the Wired Equivalent Privacy (WEP) and encapsulation of data frames. It is intended to provide data privacy to the level of a wired network. WEP suffered threat of attacks from hackers owing to certain security shortcomings in the WEP protocol. Lately, many new protocols like WiFi Protected Access (WPA), WPA2, Robust Secure Network (RSN) and 802.11i have come into being, yet their implementation is fairly limited. Despite its shortcomings one cannot undermine the importance of WEP as it still remains the most widely used system and we chose to address certain security issues and propose some …


Compressed Pattern Matching For Text And Images, Tao Tao Jan 2005

Compressed Pattern Matching For Text And Images, Tao Tao

Electronic Theses and Dissertations

The amount of information that we are dealing with today is being generated at an ever-increasing rate. On one hand, data compression is needed to efficiently store, organize the data and transport the data over the limited-bandwidth network. On the other hand, efficient information retrieval is needed to speedily find the relevant information from this huge mass of data using available resources. The compressed pattern matching problem can be stated as: given the compressed format of a text or an image and a pattern string or a pattern image, report the occurrence(s) of the pattern in the text or image …


Transform Based And Search Aware Text Compression Schemes And Compressed Domain Text Retrieval, Nan Zhang Jan 2005

Transform Based And Search Aware Text Compression Schemes And Compressed Domain Text Retrieval, Nan Zhang

Electronic Theses and Dissertations

In recent times, we have witnessed an unprecedented growth of textual information via the Internet, digital libraries and archival text in many applications. While a good fraction of this information is of transient interest, useful information of archival value will continue to accumulate. We need ways to manage, organize and transport this data from one point to the other on data communications links with limited bandwidth. We must also have means to speedily find the information we need from this huge mass of data. Sometimes, a single site may also contain large collections of data such as a library database, …


Graph-Theoretic Approach To Modeling Propagation And Control Of Network Worms, Zoran Nikoloski Jan 2005

Graph-Theoretic Approach To Modeling Propagation And Control Of Network Worms, Zoran Nikoloski

Electronic Theses and Dissertations

In today's network-dependent society, cyber attacks with network worms have become the predominant threat to confidentiality, integrity, and availability of network computing resources. Despite ongoing research efforts, there is still no comprehensive network-security solution aimed at controling large-scale worm propagation. The aim of this work is fivefold: (1) Developing an accurate combinatorial model of worm propagation that can facilitate the analysis of worm control strategies, (2) Building an accurate epidemiological model for the propagation of a worm employing local strategies, (3) Devising distributed architecture and algorithms for detection of worm scanning activities, (4) Designing effective control strategies against the worm, …


Analyzing The Community Structure Of Web-Like Networks: Models And Algorithms, Aurel Cami Jan 2005

Analyzing The Community Structure Of Web-Like Networks: Models And Algorithms, Aurel Cami

Electronic Theses and Dissertations

This dissertation investigates the community structure of web-like networks (i.e., large, random, real-life networks such as the World Wide Web and the Internet). Recently, it has been shown that many such networks have a locally dense and globally sparse structure with certain small, dense subgraphs occurring much more frequently than they do in the classical Erdös-Rényi random graphs. This peculiarity--which is commonly referred to as community structure--has been observed in seemingly unrelated networks such as the Web, email networks, citation networks, biological networks, etc. The pervasiveness of this phenomenon has led many researchers to believe that such cohesive groups of …


Creating Models Of Internet Background Traffic Suitable For Use In Evaluating Network Intrusion Detection Systems, Song Luo Jan 2005

Creating Models Of Internet Background Traffic Suitable For Use In Evaluating Network Intrusion Detection Systems, Song Luo

Electronic Theses and Dissertations

This dissertation addresses Internet background traffic generation and network intrusion detection. It is organized in two parts. Part one introduces a method to model realistic Internet background traffic and demonstrates how the models are used both in a simulation environment and in a lab environment. Part two introduces two different NID (Network Intrusion Detection) techniques and evaluates them using the modeled background traffic. To demonstrate the approach we modeled five major application layer protocols: HTTP, FTP, SSH, SMTP and POP3. The model of each protocol includes an empirical probability distribution plus estimates of application-specific parameters. Due to the complexity of …


Qos In Cognitive Packet Networks: Adaptive Routing, Flow And Congestion Control, Pu Su Jan 2005

Qos In Cognitive Packet Networks: Adaptive Routing, Flow And Congestion Control, Pu Su

Electronic Theses and Dissertations

With the emergence of various applications that have different Quality of Service (QoS) requirements, the capability of a network to support QoS becomes more and more important and necessary. This dissertation explores QoS in Cognitive Packet Networks (CPN) by using adaptive routing, flow and congestion control. We present a detailed description and analysis of our proposed routing algorithms based on single and multiple QoS constraints. An online estimation of packet loss rate over a path is introduced. We implement and evaluate the adaptive routing scheme in an experimental CPN test-bed. Our experiments support our claims that the users can achieve …


Contributions To Automatic Particle Identification In Electron Micrographs: Algorithms, Implementation, And Applications, Vivek Singh Jan 2005

Contributions To Automatic Particle Identification In Electron Micrographs: Algorithms, Implementation, And Applications, Vivek Singh

Electronic Theses and Dissertations

Three dimensional reconstruction of large macromolecules like viruses at resolutions below 8 Ã… - 10 Ã… requires a large set of projection images and the particle identification step becomes a bottleneck. Several automatic and semi-automatic particle detection algorithms have been developed along the years. We present a general technique designed to automatically identify the projection images of particles. The method utilizes Markov random field modelling of the projected images and involves a preprocessing of electron micrographs followed by image segmentation and post processing for boxing of the particle projections. Due to the typically extensive computational requirements for extracting hundreds of …


Multizoom Activity Recognition Using Machine Learning, Raymond Smith Jan 2005

Multizoom Activity Recognition Using Machine Learning, Raymond Smith

Electronic Theses and Dissertations

In this thesis we present a system for detection of events in video. First a multiview approach to automatically detect and track heads and hands in a scene is described. Then, by making use of epipolar, spatial, trajectory, and appearance constraints, objects are labeled consistently across cameras (zooms). Finally, we demonstrate a new machine learning paradigm, TemporalBoost, that can recognize events in video. One aspect of any machine learning algorithm is in the feature set used. The approach taken here is to build a large set of activity features, though TemporalBoost itself is able to work with any feature set …


Formalization Of Input And Output In Modern Operating Systems: The Hadley Model, Matthew Gerber Jan 2005

Formalization Of Input And Output In Modern Operating Systems: The Hadley Model, Matthew Gerber

Electronic Theses and Dissertations

We present the Hadley model, a formal descriptive model of input and output for modern computer operating systems. Our model is intentionally inspired by the Open Systems Interconnection model of networking; I/O as a process is defined as a set of translations between a set of computer-sensible forms, or layers, of information. To illustrate an initial application domain, we discuss the utility of the Hadley model and a potential associated I/O system as a tool for digital forensic investigators. To illustrate practical uses of the Hadley model we present the Hadley Specification Language, an essentially functional language designed to allow …


Real-Time Realistic Rendering And High Dynamic Range Image Display And Compression, Ruifeng Xu Jan 2005

Real-Time Realistic Rendering And High Dynamic Range Image Display And Compression, Ruifeng Xu

Electronic Theses and Dissertations

This dissertation focuses on the many issues that arise from the visual rendering problem. Of primary consideration is light transport simulation, which is known to be computationally expensive. Monte Carlo methods represent a simple and general class of algorithms often used for light transport computation. Unfortunately, the images resulting from Monte Carlo approaches generally suffer from visually unacceptable noise artifacts. The result of any light transport simulation is, by its very nature, an image of high dynamic range (HDR). This leads to the issues of the display of such images on conventional low dynamic range devices and the development of …


Resource Allocation Schemes And Performance Evaluation Models For Wavelength Division Multiplexed Optical Networks, Mounire El Houmaidi Jan 2005

Resource Allocation Schemes And Performance Evaluation Models For Wavelength Division Multiplexed Optical Networks, Mounire El Houmaidi

Electronic Theses and Dissertations

Wavelength division multiplexed (WDM) optical networks are rapidly becoming the technology of choice in network infrastructure and next-generation Internet architectures. WDM networks have the potential to provide unprecedented bandwidth, reduce processing cost, achieve protocol transparency, and enable efficient failure handling. This dissertation addresses the important issues of improving the performance and enhancing the reliability of WDM networks as well as modeling and evaluating the performance of these networks. Optical wavelength conversion is one of the emerging WDM enabling technologies that can significantly improve bandwidth utilization in optical networks. A new approach for the sparse placement of full wavelength converters based …


Network Intrusion Detection: Monitoring, Simulation And Visualization, Mian Zhou Jan 2005

Network Intrusion Detection: Monitoring, Simulation And Visualization, Mian Zhou

Electronic Theses and Dissertations

This dissertation presents our work on network intrusion detection and intrusion sim- ulation. The work in intrusion detection consists of two different network anomaly-based approaches. The work in intrusion simulation introduces a model using explicit traffic gen- eration for the packet level traffic simulation. The process of anomaly detection is to first build profiles for the normal network activity and then mark any events or activities that deviate from the normal profiles as suspicious. Based on the different schemes of creating the normal activity profiles, we introduce two approaches for intrusion detection. The first one is a frequency-based approach which …


Planning And Scheduling For Large-Scaledistributed Systems, Han Yu Jan 2005

Planning And Scheduling For Large-Scaledistributed Systems, Han Yu

Electronic Theses and Dissertations

Many applications require computing resources well beyond those available on any single system. Simulations of atomic and subatomic systems with application to material science, computations related to study of natural sciences, and computer-aided design are examples of applications that can benefit from the resource-rich environment provided by a large collection of autonomous systems interconnected by high-speed networks. To transform such a collection of systems into a user's virtual machine, we have to develop new algorithms for coordination, planning, scheduling, resource discovery, and other functions that can be automated. Then we can develop societal services based upon these algorithms, which hide …


Scene Monitoring With A Forest Of Cooperative Sensors, Omar Javed Jan 2005

Scene Monitoring With A Forest Of Cooperative Sensors, Omar Javed

Electronic Theses and Dissertations

In this dissertation, we present vision based scene interpretation methods for monitoring of people and vehicles, in real-time, within a busy environment using a forest of co-operative electro-optical (EO) sensors. We have developed novel video understanding algorithms with learning capability, to detect and categorize people and vehicles, track them with in a camera and hand-off this information across multiple networked cameras for multi-camera tracking. The ability to learn prevents the need for extensive manual intervention, site models and camera calibration, and provides adaptability to changing environmental conditions. For object detection and categorization in the video stream, a two step detection …


An Interactive Distributed Simulation Framework With Application To Wireless Networks And Intrusion Detection, Oleg Kachirski Jan 2005

An Interactive Distributed Simulation Framework With Application To Wireless Networks And Intrusion Detection, Oleg Kachirski

Electronic Theses and Dissertations

In this dissertation, we describe the portable, open-source distributed simulation framework (WINDS) targeting simulations of wireless network infrastructures that we have developed. We present the simulation framework which uses modular architecture and apply the framework to studies of mobility pattern effects, routing and intrusion detection mechanisms in simulations of large-scale wireless ad hoc, infrastructure, and totally mobile networks. The distributed simulations within the framework execute seamlessly and transparently to the user on a symmetric multiprocessor cluster computer or a network of computers with no modifications to the code or user objects. A visual graphical interface precisely depicts simulation object states …