Open Access. Powered by Scholars. Published by Universities.®
Electrical and Computer Engineering
Florida Institute of Technology
Electrical Engineering and Computer Science Faculty Publications
- Keyword
-
- Communication languages and protocols (1)
- Constraint-based reasoning (1)
- Cross talk (1)
- Denoising (1)
- Dithered quantization (1)
-
- Evolutionary computing (1)
- FPA design (1)
- Genetic algorithms (1)
- Geometrical reasoning (1)
- Image compression (1)
- Knowledge Representation (1)
- Mobile agent (1)
- Mobile agents (1)
- Mobile operating systems security (1)
- Modeling (1)
- Multimedia services (1)
- Optimized performance (1)
- Qualitative reasoning (1)
- Radio resource allocation (1)
- STADIUM (1)
- Spatial and temporal reasoning (1)
- System design (1)
- Time-varying self-organizing feature map (1)
- Wireless IP networks; real-time protocols; integrated multimedia services; resource allocation; quality-of-service (QoS) routing; multivariate random point processes; adaptive estimation; stochastic optimal control; martingale representations; controlled probability measures (1)
- Wireless Internet protocol (1)
- Wireless protocols (1)
Articles 1 - 10 of 10
Full-Text Articles in Engineering
Testing Exception And Error Cases Using Runtime Fault Injection, James A. Whittaker, Florence E. Mottay, Ibrahim K. El-Far
Testing Exception And Error Cases Using Runtime Fault Injection, James A. Whittaker, Florence E. Mottay, Ibrahim K. El-Far
Electrical Engineering and Computer Science Faculty Publications
Fault injection deals with the insertion or simulation of faults in order to test the robustness and fault tolerance of a software application. Such measures are generally performed on software that is mission critical, to the extent that failure could have significant negative ramifications. Actual injection of faults can be performed either at compile time, when additional code is inserted to force error conditions to evaluate to true, or at runtime during which faults are injected into the software's execution environment. This paper focuses on the latter type of fault injection and presents a new mechanism for inserting environmental faults. …
Survivable Mobile Operating System, James Whittaker, Mohommad Samarah
Survivable Mobile Operating System, James Whittaker, Mohommad Samarah
Electrical Engineering and Computer Science Faculty Publications
Although there is a large body of work on cryptographic techniques and algorithms that provide basic building blocks to solve specific security problems, relatively little work has been done in investigating security issues in mobile system contexts. Conventional security controls work well for static code, but break down with code mobility. In this paper, we investigate the need for end-to-end security in mobile and wireless operating systems. We study the implications of mobility - specifically, ways in which the operating system may facilitate communication security. We suggest a framework for designing security into mobile devices by building encryption into the …
Phad: Packet Header Anomaly Detection For Identifying Hostile Network Traffic, Philip K. Chan, Matthew V. Mahoney
Phad: Packet Header Anomaly Detection For Identifying Hostile Network Traffic, Philip K. Chan, Matthew V. Mahoney
Electrical Engineering and Computer Science Faculty Publications
We describe an experimental packet header anomaly detector (PHAD) that learns the normal range of values for 33 fields of the Ethernet, IP, TCP, UDP, and ICMP protocols. On the 1999 DARPA off-line intrusion detection evaluation data set (Lippmann et al. 2000), PHAD detects 72 of 201 instances (29 of 59 types) of attacks, including all but 3 types that exploit the protocols examined, at a rate of 10 false alarms per day after training on 7 days of attack-free internal network traffic. In contrast to most other network intrusion detectors and firewalls, only 8 attacks (6 types) are detected …
A Generalized Framework For Reasoning With Angular Directions, Mitra Debasis
A Generalized Framework For Reasoning With Angular Directions, Mitra Debasis
Electrical Engineering and Computer Science Faculty Publications
This extended abstract presents a new scheme for qualitative reasoning with directions between points in 2D-space, called Star-ontology(6). The current results of our study on the complexity issues for reasoning with incomplete/disjunctive information using this new ontology has been outlined here. We have also proposed a generalized framework Star-ontology(a) for an integer a, that could be specialized to many ontologies including some of the known ones like the 2D-Cradinal ontology for a=4, and the currently studied one for a=6. This generalization also points to an interesting direction for investigation in the field of spatio-temporal reasoning.
Modeling And Test Of Pixel Cross-Talk In Hgcdte Focal Plane Arrays, Thomas J. Sanders, E. Lee Caraway, Glenn T. Hess, Gwendolyn W. Newsome, Theodore Fischer
Modeling And Test Of Pixel Cross-Talk In Hgcdte Focal Plane Arrays, Thomas J. Sanders, E. Lee Caraway, Glenn T. Hess, Gwendolyn W. Newsome, Theodore Fischer
Electrical Engineering and Computer Science Faculty Publications
Mercury Cadmium Telluride focal plane arrays with well over 1000 pixels have been fabricated for a number of years. These FPA's have been built as large two-dimensional arrays of HgCdTe p-n junction diodes on a single CdTe or CdZnTe substrate. Sensitivity of each pixel to impinging radiation is one of the most important quality factors for these devices. However, material parameters, which give diode high sensitivity, are the same as those that cause cross talk between adjacent diodes in the array. This cross talk causes a blurred image and in general is a detrimental factor for the FPA system. The …
Detecting Novel Attacks By Identifying Anomalous Network Packet Headers, Philip K. Chan, Matthew V. Mahoney
Detecting Novel Attacks By Identifying Anomalous Network Packet Headers, Philip K. Chan, Matthew V. Mahoney
Electrical Engineering and Computer Science Faculty Publications
We describe a simple and efficient network intrusion detection algorithm that detects novel attacks by flagging anomalous field values in packet headers at the data link, network, and transport layers. In the 1999 DARPA off-line intrusion detection evaluation test set (Lippmann et. al. 2000), we detect 76% of probes and 48% of denial of service attacks (at 10 false alarms per day). When this system is merged with the 18 systems in the original evaluation, the average detection rate for attacks of all types increases from 61% to 65%. We investigate the effect on performance when attack free training data …
Completeness Of Propositional Logic As A Program, Ryan Stansifer
Completeness Of Propositional Logic As A Program, Ryan Stansifer
Electrical Engineering and Computer Science Faculty Publications
The proof of completeness for propositional logic is a constructive one, so a computer program is suggested by the proof. We prove the completeness theorem for Łukasiewicz’ axioms directly, and translate the proof into the functional languages SML and Haskell. In this paper we consider this proof as a program. The program produces enormous proof trees, but it is, we contend, as good a proof of completeness as the standard mathematical proofs.The real value of the exercise is the further evidence it provides that typed, functional languages can clearly express the complex abstractions of mathematics.
Optimization Of Real-Time Protocols For Wireless Packet-Switched Multimedia Networks Based On Partially Observed Multivariate Point Processes, William S. Hortos
Optimization Of Real-Time Protocols For Wireless Packet-Switched Multimedia Networks Based On Partially Observed Multivariate Point Processes, William S. Hortos
Electrical Engineering and Computer Science Faculty Publications
Next-generation wireless networks have been designed to transport integrated multimedia services based on a cellular extension of a packet-switched architecture using variants of the Internet protocol (IP). Each call, arriving to or active within the network, carries demand for one or more services in parallel, where each service type has a guaranteed quality of service (QoS). Admission of new calls to the wireless IP network (WIN) from the gateway of a wired network or from a mobile subscriber (MS) is allowed by call admission control (CAC) procedures. MS roaming among the nodes of the WIN is controlled by handoff procedures …
Adaptive Threshold Selection Technique For Denoising In Dithered Quantizers, Samuel Peter Kozaitis, Hemen Goswami
Adaptive Threshold Selection Technique For Denoising In Dithered Quantizers, Samuel Peter Kozaitis, Hemen Goswami
Electrical Engineering and Computer Science Faculty Publications
We described an adaptive denoising method to improve image quality in a wavelet-based image compression process that uses dithered quantization. In our method, the second-order moment of the quantization noise is made independent of the signal by random quantization. Then, the quantization noise is reduced by thresholding wavelet coefficients. We first obtained a fixed threshold using any known technique. Then, a neighborhood is searched for the optimal threshold to optimize some cost function.
Hybrid Evolutionary Computing Model For Mobile Agents Of Wireless Internet Multimedia, William S. Hortos
Hybrid Evolutionary Computing Model For Mobile Agents Of Wireless Internet Multimedia, William S. Hortos
Electrical Engineering and Computer Science Faculty Publications
The ecosystem is used as an evolutionary paradigm of natural laws for the distributed information retrieval via mobile agents to allow the computational load to be added to server nodes of wireless networks, while reducing the traffic on communication links. Based on the Food Web model, a set of computational rules of natural balance form the outer stage to control the evolution of mobile agents providing multimedia services with a wireless Internet protocol (WIP). The evolutionary model shows how mobile agents should behave with the WIP, in particular, how mobile agents can cooperate, compete and learn from each other, based …