Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Engineering

Machine Learning For Computer Security, Philip K. Chan, Richard P. Lippmann Dec 2006

Machine Learning For Computer Security, Philip K. Chan, Richard P. Lippmann

Electrical Engineering and Computer Science Faculty Publications

The prevalent use of computers and internet has enhanced the quality of life for many people, but it has also attracted undesired attempts to undermine these systems. This special topic contains several research studies on how machine learning algorithms can help improve the security of computer systems.


Denoising Of Imagery For Inspection Tasks Using Higher-Order Statistics, Samuel Peter Kozaitis Oct 2006

Denoising Of Imagery For Inspection Tasks Using Higher-Order Statistics, Samuel Peter Kozaitis

Electrical Engineering and Computer Science Faculty Publications

We reduced noise in images using a higher-order, correlation-based method. In this approach, wavelet coefficients were classified as either mostly noise or mostly signal based on third-order statistics. Because the higher than second-order moments of the Gaussian probability function are zero, the third-order correlation coefficient may not have a statistical contribution from Gaussian noise. Using a detection algorithm derived from third-order statistics, we determined if a wavelet coefficient was noisy by looking at its third-order correlation coefficient. Using imagery of space shuttle tiles, our results showed that the minimum mean-squared error obtained using third-order statistics was often less than that …


Link Foundation Fellowship Report, Patrick Flannery Sep 2006

Link Foundation Fellowship Report, Patrick Flannery

Link Foundation Energy Fellowship Reports

The last 25 years have seen dramatic maturation of the wind energy industry. Increases in wind energy production have been tied to advancements in turbine technology, reliability, and grid compatibility; wind resource assessment, and reductions in costs. Wind energy is economically competitive with, and environmentally superior to conventional fossil and nuclear fuel-based electric power plants. Wind turbine grid connection requirements have become more demanding concomitant with increasing grid penetration. Wind generation system are now required to perform many of the duties of conventional electric power plants, such as stabilization of the grid during fault events. Unfortunately the most common and …


Image Fusion For Improved Perception, Michel Ouendeno, Samuel Peter Kozaitis May 2006

Image Fusion For Improved Perception, Michel Ouendeno, Samuel Peter Kozaitis

Electrical Engineering and Computer Science Faculty Publications

We developed a method to fuse imagery for from different sensor types. The core of our method uses different forward transforms of input images and a common transform to reconstruct the final result. When measuring the entropy and power of the fused result, we found that our method gave generally better results when compared to a more conventional approach. Our method could form the basis of a new image fusion approach because it offers results not possible with a conventional approach.


Characterization Of Transmission Lines At Ir, Tasneem A. Mandviwala, José Manuel López-Alonso, Brian A. Lail, Glenn D. Boreman May 2006

Characterization Of Transmission Lines At Ir, Tasneem A. Mandviwala, José Manuel López-Alonso, Brian A. Lail, Glenn D. Boreman

Electrical Engineering and Computer Science Faculty Publications

We demonstrate the first long wave infrared (LWIR) transmission line design and characterization. Two of the widely used transmission-lines: coplanar striplines (CPS) and microstrip (MS) lines are characterized at IR frequency (28.3THz), in terms of transmission line parameters: characteristic impedance (Z₀, attenuation constant (α) and effective index of refraction (nᵉᶠᶠ), through modeling, fabrication and measurement. These transmission-line parameters cannot be directly measured, what can be measured is the antenna response. So we compute, measure and compare the response of the dipole antenna connected to these transmission lines as a function of transmission-line length. The response depends on the transformation of …


Communications Protocol For Rf-Based Indoor Wireless Localization Systems, Tamas Kasza, Mohammad Mehdi Shahsavari, Veton Z. Këpuska May 2006

Communications Protocol For Rf-Based Indoor Wireless Localization Systems, Tamas Kasza, Mohammad Mehdi Shahsavari, Veton Z. Këpuska

Electrical Engineering and Computer Science Faculty Publications

A novel application-specific communications scheme for RF-based indoor wireless localization networks is proposed. In such a system wireless badges, attached to people or objects, report positions to wireless router units. Badges have very limited communication, energy, and processing capabilities. Routers are responsible for propagating collected badge information hop-by-hop toward one central unit of the system and are significantly less constrained by battery than the badges. Each unit can radiate a special sequence of bits at selected frequencies, so that any router in the wireless neighborhood can sense, store, aggregate and forward Received Signal Strength Indicator (RSSI) information. Once the central …


Intelligent Routing Protocol For Ad Hoc Wireless Network, Chaorong Peng, Chang Wen Chen May 2006

Intelligent Routing Protocol For Ad Hoc Wireless Network, Chaorong Peng, Chang Wen Chen

Electrical Engineering and Computer Science Faculty Publications

A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing …


Information-Aware Collaborative Routing In Wireless Sensor Network, Ji Sun Lee, Chang Wen Chen May 2006

Information-Aware Collaborative Routing In Wireless Sensor Network, Ji Sun Lee, Chang Wen Chen

Electrical Engineering and Computer Science Faculty Publications

In this paper, we propose a new approach to routing protocol called information-aware collaborative routing for wireless sensor networks. Clustering and local data aggregation schemes have been developed to reduce the energy for transmitting redundant data in the wireless sensor network. Most existing approaches have been developed for the cases when there is direct communication between cluster head and base station. Even though these schemes are able to reduce data redundancy to be transmitted from the cluster heads to the base station, they have not exploited the data redundancy between neighboring clusters. In this research, we study a more general …


An Adaptive Distributed Data Aggregation Based On Rcpc For Wireless Sensor Networks, Guogang Hua, Chang Wen Chen May 2006

An Adaptive Distributed Data Aggregation Based On Rcpc For Wireless Sensor Networks, Guogang Hua, Chang Wen Chen

Electrical Engineering and Computer Science Faculty Publications

One of the most important design issues in wireless sensor networks is energy efficiency. Data aggregation has significant impact on the energy efficiency of the wireless sensor networks. With massive deployment of sensor nodes and limited energy supply, data aggregation has been considered as an essential paradigm for data collection in sensor networks. Recently, distributed source coding has been demonstrated to possess several advantages in data aggregation for wireless sensor networks. Distributed source coding is able to encode sensor data with lower bit rate without direct communication among sensor nodes. To ensure reliable and high throughput transmission with the aggregated …


Robust Image Transmission Over Mimo Space-Time Coded Wireless Systems, Daewon Song, Chang Wen Chen May 2006

Robust Image Transmission Over Mimo Space-Time Coded Wireless Systems, Daewon Song, Chang Wen Chen

Electrical Engineering and Computer Science Faculty Publications

We present in this paper an integrated robust image transmission scheme using space-time block codes (STBC) over multi-input multi-output (MIMO) wireless systems. First, in order to achieve an excellent error resilient capability, multiple bitstreams are generated based on wavelet trees along the spatial orientations. The spatial-orientation trees in the wavelet domain are individually encoded using SPIHT. Error propagation is thus limited within each bitstreams. Then, Reed-Solomon (R-S) codes as forward error correction (FEC) are adopted to combat transmission errors over error-prone wireless channels and to detect residual errors so as to avoid error propagation in each bitstream. FEC can reduce …


Unconventional Optical Imaging Using A High Speed, Neural Network Based Smart Sensor, William W. Arrasmith May 2006

Unconventional Optical Imaging Using A High Speed, Neural Network Based Smart Sensor, William W. Arrasmith

Electrical Engineering and Computer Science Faculty Publications

The advancement of neural network methods and technologies is finding applications in many fields and disciplines of interest to the defense, intelligence, and homeland security communities. Rapidly reconfigurable sensors for real or near-real time signal or image processing can be used for multi-functional purposes such as image compression, target tracking, image fusion, edge detection, thresholding, pattern recognition, and atmospheric turbulence compensation to name a few. A neural network based smart sensor is described that can accomplish these tasks individually or in combination, in real-time or near real-time. As a computationally intensive example, the case of optical imaging through volume turbulence …


Dynamic Branch&Bound, An Optimization Counterpart For Dynamic Backtracking, Marius C. Silaghi Apr 2006

Dynamic Branch&Bound, An Optimization Counterpart For Dynamic Backtracking, Marius C. Silaghi

Electrical Engineering and Computer Science Faculty Publications

Here we show how the idea of dynamic backtracking can be applied to branch and bound optimization. This is done by exploiting the concept of valued nogood. However, simple replacement of nogoods with valued nogoods does not lead to a correct algorithm. We show that a way to achieve correctness is to use at each variable a separate nogood storage for each position that the variable holds in the order on assigned variables. This is a different version to the one in [dago97]. Constraint Satisfaction Problems (CSPs) are typically addressed with some kind of backtracking algorithm. A seminal work that …


Classification Of Infrasound Events Using Hermite Polynomial Preprocessing And Radial Basis Function Neural Networks, Christopher G. Lowrie Apr 2006

Classification Of Infrasound Events Using Hermite Polynomial Preprocessing And Radial Basis Function Neural Networks, Christopher G. Lowrie

Electrical Engineering and Computer Science Faculty Publications

A method of infrasonic signal classification using hermite polynomials for signal preprocessing is presented. Infrasound is a low frequency acoustic phenomenon typically in the frequency range 0.01 Hz to 10 Hz. Data collected from infrasound sensors are preprocessed using a hermite orthogonal basis inner product approach. The hermite preprocessed signals result in feature vectors that are used as input to a parallel bank of radial basis function neural networks (RBFNN) for classification. The spread and threshold values for each of the RBFNN are then optimized. Robustness of this classification method is tested by introducing unknown events outside the training set …


Cross-Sensor Fusion Of Imagery For Improved Information Extraction, Samuel Peter Kozaitis, Michel Ouendeno Apr 2006

Cross-Sensor Fusion Of Imagery For Improved Information Extraction, Samuel Peter Kozaitis, Michel Ouendeno

Electrical Engineering and Computer Science Faculty Publications

We combined cross-sensor data that leads to improved extraction of information from disparate sensors. We presented a new method for signal fusion that uses different transforms for the forward transforms of two images and a common transform for the inverse. When using a fusion rule that selects the maximum value between images, we were able to transfer more energy to the result using our method. Our method could form the basis of a new image fusion approach because it offers a way to transfer more energy to the result not possible with a conventional approach.


A Novel Fast Inter-Prediction Mode Decision For H.264/Avc, Yi Guo, Houqiang Li, Shibao Pei, Chang Wen Chen Feb 2006

A Novel Fast Inter-Prediction Mode Decision For H.264/Avc, Yi Guo, Houqiang Li, Shibao Pei, Chang Wen Chen

Electrical Engineering and Computer Science Faculty Publications

Video coding in wireless environment requires lower computational complexity and lower energy consumption than that used in storage oriented or network oriented application. Although H.264/AVC standard provides considerable higher compression efficiency as compared to the previous standards, its complexity is significantly increased at the same time. In a H.264/AVC encoder, the most time-consuming components are variable block sizes motion estimation and mode decision using rate-distortion optimization (RDO). In this paper, we propose a novel fast inter-prediction mode decision by exploiting high correlation between rate-distortion costs (RD cost) of macroblocks in the current inter frame and their co-located macroblocks in the …


N-Version Programming For The Detection Of Zero-Day Exploits, Lajos Nagy, Richard Ford, William Allen Feb 2006

N-Version Programming For The Detection Of Zero-Day Exploits, Lajos Nagy, Richard Ford, William Allen

Electrical Engineering and Computer Science Faculty Publications

Using N-Version programming techniques to increase software reliability is a well-explored field. In this paper, we extend the concept to the detection of new security vulnerabilities. Using our own N-Version arbiter, Judicare, we implement a simple auction web application, and demonstrate how our application is robust to the most common Web vulnerabilities as documented by OWASP. Finally, we discuss the implications of our results in the context of detection of Zero-Day attacks.