Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

2005

Physical Sciences and Mathematics

Institution
Keyword
Publication

Articles 31 - 60 of 80

Full-Text Articles in Engineering

Daytime Detection Of Space Objects, Alistair D. Funge Mar 2005

Daytime Detection Of Space Objects, Alistair D. Funge

Theses and Dissertations

Space Situational Awareness (SSA) requires repeated object updates for orbit accuracy. Detection of unknown objects is critical. A daytime model was developed that evaluated sun flares and assessed thermal emissions from space objects. Iridium satellites generate predictable sun glints. These were used as a model baseline for daytime detections. Flares and space object thermal emissions were examined for daytime detection. A variety of geometric, material and atmospheric characteristics affected this daytime detection capability. In a photon noise limited mode, simulated Iridium flares were detected. The peak Signal-to- Noise Ratios (SNR) were 6.05e18, 9.63e5, and 1.65e7 for the nighttime, daytime and …


Accelerating Missile Threat Engagement Simulations Using Personal Computer Graphics Cards, Sean E. Jeffers Mar 2005

Accelerating Missile Threat Engagement Simulations Using Personal Computer Graphics Cards, Sean E. Jeffers

Theses and Dissertations

The 453rd Electronic Warfare Squadron supports on-going military operations by providing battlefield commanders with aircraft ingress and egress routes that minimize the risk of shoulder or ground-fired missile attacks on our aircraft. To determine these routes, the 453rd simulates engagements between ground-to-air missiles and allied aircraft to determine the probability of a successful attack. The simulations are computationally expensive, often requiring two-hours for a single 10-second missile engagement. Hundreds of simulations are needed to perform a complete risk assessment which includes evaluating the effectiveness of countermeasures such as flares, chaff, jammers, and missile warning systems. Thus, the need for faster …


Noise Estimation In The Presence Of Bpsk Digital Burst Transmissions, Susan E. Bettison Mar 2005

Noise Estimation In The Presence Of Bpsk Digital Burst Transmissions, Susan E. Bettison

Theses and Dissertations

This research explores noise estimation techniques in an attempt to improve upon a previously developed digital burst transmission Binary Phase Shift Keyed (BPSK) demodulator. The demodulator success is dependent on the accuracy of the estimate of Power Spectral Density (PSD) of the unknown noise. Given a discrete time signal transformed into the frequency domain, the research seeks to determine if it is possible to effectively estimate the PSD of the unknown noise. The demodulator was developed using a new signal model for digital burst transmissions based on linear spectral subspace theory. Using this model and the redundancy properties of BPSK …


Lethality Of Bacillus Anthracis Spores Due To Short Duration Heating Measured Using Infrared Spectroscopy, Kristina M. Goetz Mar 2005

Lethality Of Bacillus Anthracis Spores Due To Short Duration Heating Measured Using Infrared Spectroscopy, Kristina M. Goetz

Theses and Dissertations

There are a number of analytical and semi-empirical models that describe the behavior of particulate matter in the atmosphere. Many of these require modification for all types of weather, dry versus wet deposition, and overall effects can be quite non-linear. Rainfall (rate, drop size, etc.), snowfall (rate, flake size, etc.), humidity, pressure, temperature, and combination of these greatly affect particle settling and washout rates. To that end, a method for tracking released constituents using the Regional Atmospheric Modeling System (RAMS) microphysics package is developed by modifying one of the hydrometeor categories (hail) in the microphysics package. The RAMS microphysics package …


Optimal Sampling Of A Chemical Hazard Area, Jennifer R. Plourde Mar 2005

Optimal Sampling Of A Chemical Hazard Area, Jennifer R. Plourde

Theses and Dissertations

This thesis proposes a methodology for optimally sampling a chemical hazard area subsequent to a chemical weapons attack. The objective is to identify the maximum number of areas that no longer require protective gear for safe operations. We model the area as an undirected graph and employ network analysis techniques to provide a methodological framework for identifying an optimal sampling sequence within a fixed time limit. We propose four models that characterize the secondary vapor concentrations: i) static and deterministic, ii) static and stochastic, iii) dynamic and deterministic, and iv) dynamic and stochastic. Comparisons of the static cases and their …


The Use Of X-Ray Pulsars For Aiding Gps Satellite Orbit Determination, Dennis W. Woodfork Ii Mar 2005

The Use Of X-Ray Pulsars For Aiding Gps Satellite Orbit Determination, Dennis W. Woodfork Ii

Theses and Dissertations

This research proposes the use of an existing "signal of opportunity" - namely x-ray pulsars - to improve the accuracy and robustness of the GPS satellite and clock estimation algorithm. Improvement in satellite and clock accuracy results in a direct benefit to the user. A simulation has been developed to determine the effects of using x-ray pulsar measurements on the GPS Operational Control Segment. The epoch-specific position, velocity, and clock errors of all GPS satellites in the constellation were estimated using both pseudoranges and time-difference-of-arrival (TDOA) measurements from pulsars. The primary measure of accuracy is a constellation Signal-In-Space Range Error …


Computer-Simulation-Assisted Lean Manufacturing Training, Luoding Wang Jan 2005

Computer-Simulation-Assisted Lean Manufacturing Training, Luoding Wang

Theses and Dissertations

This thesis assesses the potential of using computer simulation to aid existing lean manufacturing training methods such as lecture and live simulation. An investigation of this possibility was carried out in conjunction with UMEP's Lean 101 class. In the study, two experimental computer simulation models demonstrating the push and pull production scenarios were constructed using ProModel software. Simulation models were equipped with a Visual Basic interface to aid trainees to manipulate the model via ActiveX. Constructed computer simulation was compared with live simulation to answer these research questions: 1. Was computer simulation able to teach additional lean concepts not covered …


Enhancing Message Privacy In Wired Equivalent Privacy., Darshan Purandare Jan 2005

Enhancing Message Privacy In Wired Equivalent Privacy., Darshan Purandare

Electronic Theses and Dissertations

The 802.11 standard defines the Wired Equivalent Privacy (WEP) and encapsulation of data frames. It is intended to provide data privacy to the level of a wired network. WEP suffered threat of attacks from hackers owing to certain security shortcomings in the WEP protocol. Lately, many new protocols like WiFi Protected Access (WPA), WPA2, Robust Secure Network (RSN) and 802.11i have come into being, yet their implementation is fairly limited. Despite its shortcomings one cannot undermine the importance of WEP as it still remains the most widely used system and we chose to address certain security issues and propose some …


Compressed Pattern Matching For Text And Images, Tao Tao Jan 2005

Compressed Pattern Matching For Text And Images, Tao Tao

Electronic Theses and Dissertations

The amount of information that we are dealing with today is being generated at an ever-increasing rate. On one hand, data compression is needed to efficiently store, organize the data and transport the data over the limited-bandwidth network. On the other hand, efficient information retrieval is needed to speedily find the relevant information from this huge mass of data using available resources. The compressed pattern matching problem can be stated as: given the compressed format of a text or an image and a pattern string or a pattern image, report the occurrence(s) of the pattern in the text or image …


Transform Based And Search Aware Text Compression Schemes And Compressed Domain Text Retrieval, Nan Zhang Jan 2005

Transform Based And Search Aware Text Compression Schemes And Compressed Domain Text Retrieval, Nan Zhang

Electronic Theses and Dissertations

In recent times, we have witnessed an unprecedented growth of textual information via the Internet, digital libraries and archival text in many applications. While a good fraction of this information is of transient interest, useful information of archival value will continue to accumulate. We need ways to manage, organize and transport this data from one point to the other on data communications links with limited bandwidth. We must also have means to speedily find the information we need from this huge mass of data. Sometimes, a single site may also contain large collections of data such as a library database, …


Graph-Theoretic Approach To Modeling Propagation And Control Of Network Worms, Zoran Nikoloski Jan 2005

Graph-Theoretic Approach To Modeling Propagation And Control Of Network Worms, Zoran Nikoloski

Electronic Theses and Dissertations

In today's network-dependent society, cyber attacks with network worms have become the predominant threat to confidentiality, integrity, and availability of network computing resources. Despite ongoing research efforts, there is still no comprehensive network-security solution aimed at controling large-scale worm propagation. The aim of this work is fivefold: (1) Developing an accurate combinatorial model of worm propagation that can facilitate the analysis of worm control strategies, (2) Building an accurate epidemiological model for the propagation of a worm employing local strategies, (3) Devising distributed architecture and algorithms for detection of worm scanning activities, (4) Designing effective control strategies against the worm, …


Analyzing The Community Structure Of Web-Like Networks: Models And Algorithms, Aurel Cami Jan 2005

Analyzing The Community Structure Of Web-Like Networks: Models And Algorithms, Aurel Cami

Electronic Theses and Dissertations

This dissertation investigates the community structure of web-like networks (i.e., large, random, real-life networks such as the World Wide Web and the Internet). Recently, it has been shown that many such networks have a locally dense and globally sparse structure with certain small, dense subgraphs occurring much more frequently than they do in the classical Erdös-Rényi random graphs. This peculiarity--which is commonly referred to as community structure--has been observed in seemingly unrelated networks such as the Web, email networks, citation networks, biological networks, etc. The pervasiveness of this phenomenon has led many researchers to believe that such cohesive groups of …


Optical Wave Propagation In Discrete Waveguide Arrays, Jared Hudock Jan 2005

Optical Wave Propagation In Discrete Waveguide Arrays, Jared Hudock

Electronic Theses and Dissertations

The propagation dynamics of light in optical waveguide arrays is characteristic of that encountered in discrete systems. As a result, it is possible to engineer the diffraction properties of such structures, which leads to the ability to control the flow of light in ways that are impossible in continuous media. In this work, a detailed theoretical investigation of both linear and nonlinear optical wave propagation in one- and two-dimensional waveguide lattices is presented. The ability to completely overcome the effects of discrete diffraction through the mutual trapping of two orthogonally polarized coherent beams interacting in Kerr nonlinear arrays of birefringent …


Liquid Crystal Optics For Communications, Signal Processing And 3-D Microscopic Imaging, Sajjad Khan Jan 2005

Liquid Crystal Optics For Communications, Signal Processing And 3-D Microscopic Imaging, Sajjad Khan

Electronic Theses and Dissertations

This dissertation proposes, studies and experimentally demonstrates novel liquid crystal (LC) optics to solve challenging problems in RF and photonic signal processing, freespace and fiber optic communications and microscopic imaging. These include free-space optical scanners for military and optical wireless applications, variable fiber-optic attenuators for optical communications, photonic control techniques for phased array antennas and radar, and 3-D microscopic imaging. At the heart of the applications demonstrated in this thesis are LC devices that are non-pixelated and can be controlled either electrically or optically. Instead of the typical pixel-by-pixel control as is custom in LC devices, the phase profile across …


Creating Models Of Internet Background Traffic Suitable For Use In Evaluating Network Intrusion Detection Systems, Song Luo Jan 2005

Creating Models Of Internet Background Traffic Suitable For Use In Evaluating Network Intrusion Detection Systems, Song Luo

Electronic Theses and Dissertations

This dissertation addresses Internet background traffic generation and network intrusion detection. It is organized in two parts. Part one introduces a method to model realistic Internet background traffic and demonstrates how the models are used both in a simulation environment and in a lab environment. Part two introduces two different NID (Network Intrusion Detection) techniques and evaluates them using the modeled background traffic. To demonstrate the approach we modeled five major application layer protocols: HTTP, FTP, SSH, SMTP and POP3. The model of each protocol includes an empirical probability distribution plus estimates of application-specific parameters. Due to the complexity of …


Qos In Cognitive Packet Networks: Adaptive Routing, Flow And Congestion Control, Pu Su Jan 2005

Qos In Cognitive Packet Networks: Adaptive Routing, Flow And Congestion Control, Pu Su

Electronic Theses and Dissertations

With the emergence of various applications that have different Quality of Service (QoS) requirements, the capability of a network to support QoS becomes more and more important and necessary. This dissertation explores QoS in Cognitive Packet Networks (CPN) by using adaptive routing, flow and congestion control. We present a detailed description and analysis of our proposed routing algorithms based on single and multiple QoS constraints. An online estimation of packet loss rate over a path is introduced. We implement and evaluate the adaptive routing scheme in an experimental CPN test-bed. Our experiments support our claims that the users can achieve …


Contributions To Automatic Particle Identification In Electron Micrographs: Algorithms, Implementation, And Applications, Vivek Singh Jan 2005

Contributions To Automatic Particle Identification In Electron Micrographs: Algorithms, Implementation, And Applications, Vivek Singh

Electronic Theses and Dissertations

Three dimensional reconstruction of large macromolecules like viruses at resolutions below 8 Ã… - 10 Ã… requires a large set of projection images and the particle identification step becomes a bottleneck. Several automatic and semi-automatic particle detection algorithms have been developed along the years. We present a general technique designed to automatically identify the projection images of particles. The method utilizes Markov random field modelling of the projected images and involves a preprocessing of electron micrographs followed by image segmentation and post processing for boxing of the particle projections. Due to the typically extensive computational requirements for extracting hundreds of …


Refractive Indices Of Liquid Crystals And Their Applications In Display And Photonic Devices, Jun Li Jan 2005

Refractive Indices Of Liquid Crystals And Their Applications In Display And Photonic Devices, Jun Li

Electronic Theses and Dissertations

Liquid crystals (LCs) are important materials for flat panel display and photonic devices. Most LC devices use electrical field-, magnetic field-, or temperature-induced refractive index change to modulate the incident light. Molecular constituents, wavelength, and temperature are the three primary factors determining the liquid crystal refractive indices: ne and no for the extraordinary and ordinary rays, respectively. In this dissertation, we derive several physical models for describing the wavelength and temperature effects on liquid crystal refractive indices, average refractive index, and birefringence. Based on these models, we develop some high temperature gradient refractive index LC mixtures for photonic applications, such …


Multizoom Activity Recognition Using Machine Learning, Raymond Smith Jan 2005

Multizoom Activity Recognition Using Machine Learning, Raymond Smith

Electronic Theses and Dissertations

In this thesis we present a system for detection of events in video. First a multiview approach to automatically detect and track heads and hands in a scene is described. Then, by making use of epipolar, spatial, trajectory, and appearance constraints, objects are labeled consistently across cameras (zooms). Finally, we demonstrate a new machine learning paradigm, TemporalBoost, that can recognize events in video. One aspect of any machine learning algorithm is in the feature set used. The approach taken here is to build a large set of activity features, though TemporalBoost itself is able to work with any feature set …


Jess – A Java Security Scanner For Eclipse, Russell Spitler Jan 2005

Jess – A Java Security Scanner For Eclipse, Russell Spitler

Honors Theses

Secure software is the responsibility of every developer. In order to help a developer with this responsibility there are many automated source code security auditors. These tools perform a variety of functions, from finding calls to insecure functions to poorly generated random numbers. These programs have existed for years and perform the security audit with varying degrees of success.

Largely missing in the world of programming is such a security auditor for the Java programming language. Currently, Fortify Software produces the only Java source code security auditor; this is a commercially available package.

This void is what inspired JeSS, Java …


Formalization Of Input And Output In Modern Operating Systems: The Hadley Model, Matthew Gerber Jan 2005

Formalization Of Input And Output In Modern Operating Systems: The Hadley Model, Matthew Gerber

Electronic Theses and Dissertations

We present the Hadley model, a formal descriptive model of input and output for modern computer operating systems. Our model is intentionally inspired by the Open Systems Interconnection model of networking; I/O as a process is defined as a set of translations between a set of computer-sensible forms, or layers, of information. To illustrate an initial application domain, we discuss the utility of the Hadley model and a potential associated I/O system as a tool for digital forensic investigators. To illustrate practical uses of the Hadley model we present the Hadley Specification Language, an essentially functional language designed to allow …


Real-Time Realistic Rendering And High Dynamic Range Image Display And Compression, Ruifeng Xu Jan 2005

Real-Time Realistic Rendering And High Dynamic Range Image Display And Compression, Ruifeng Xu

Electronic Theses and Dissertations

This dissertation focuses on the many issues that arise from the visual rendering problem. Of primary consideration is light transport simulation, which is known to be computationally expensive. Monte Carlo methods represent a simple and general class of algorithms often used for light transport computation. Unfortunately, the images resulting from Monte Carlo approaches generally suffer from visually unacceptable noise artifacts. The result of any light transport simulation is, by its very nature, an image of high dynamic range (HDR). This leads to the issues of the display of such images on conventional low dynamic range devices and the development of …


Design And Assessment Of Compact Optical Systems Towards Special Effects Imaging, Vesselin Chaoulov Jan 2005

Design And Assessment Of Compact Optical Systems Towards Special Effects Imaging, Vesselin Chaoulov

Electronic Theses and Dissertations

A main challenge in the field of special effects is to create special effects in real time in a way that the user can preview the effect before taking the actual picture or movie sequence. There are many techniques currently used to create computer-simulated special effects, however current techniques in computer graphics do not provide the option for the creation of real-time texture synthesis. Thus, while computer graphics is a powerful tool in the field of special effects, it is neither portable nor does it provide work in real-time capabilities. Real-time special effects may, however, be created optically. Such approach …


Resource Allocation Schemes And Performance Evaluation Models For Wavelength Division Multiplexed Optical Networks, Mounire El Houmaidi Jan 2005

Resource Allocation Schemes And Performance Evaluation Models For Wavelength Division Multiplexed Optical Networks, Mounire El Houmaidi

Electronic Theses and Dissertations

Wavelength division multiplexed (WDM) optical networks are rapidly becoming the technology of choice in network infrastructure and next-generation Internet architectures. WDM networks have the potential to provide unprecedented bandwidth, reduce processing cost, achieve protocol transparency, and enable efficient failure handling. This dissertation addresses the important issues of improving the performance and enhancing the reliability of WDM networks as well as modeling and evaluating the performance of these networks. Optical wavelength conversion is one of the emerging WDM enabling technologies that can significantly improve bandwidth utilization in optical networks. A new approach for the sparse placement of full wavelength converters based …


Interferometry-Based Free Space Communication And Information Processing, Muzamil Arshad Arain Jan 2005

Interferometry-Based Free Space Communication And Information Processing, Muzamil Arshad Arain

Electronic Theses and Dissertations

This dissertation studies, analyzes, and experimentally demonstrates the innovative use of interference phenomenon in the field of opto-electronic information processing and optical communications. A number of optical systems using interferometric techniques both in the optical and the electronic domains has been demonstrated in the filed of signal transmission and processing, optical metrology, defense, and physical sensors. Specifically it has been shown that the interference of waves in the form of holography can be exploited to realize a novel optical scanner called Code Multiplexed Optical Scanner (C-MOS). The C-MOS features large aperture, wide scan angles, 3-D beam control, no moving parts, …


Spectral Signature Modification By Application Of Infrared Frequency-Selective Surfaces, Brian Monacelli Jan 2005

Spectral Signature Modification By Application Of Infrared Frequency-Selective Surfaces, Brian Monacelli

Electronic Theses and Dissertations

It is desirable to modify the spectral signature of a surface, particularly in the infrared (IR) region of the electromagnetic spectrum. To alter the surface signature in the IR, two methods are investigated: thin film application and antenna array application. The former approach is a common and straightforward incorporation of optically-thin film coatings on the surface designated for signature modification. The latter technique requires the complex design of a periodic array of passive microantenna elements to cover the surface in order to modify its signature. This technology is known as frequency selective surface (FSS) technology and is established in the …


Network Intrusion Detection: Monitoring, Simulation And Visualization, Mian Zhou Jan 2005

Network Intrusion Detection: Monitoring, Simulation And Visualization, Mian Zhou

Electronic Theses and Dissertations

This dissertation presents our work on network intrusion detection and intrusion sim- ulation. The work in intrusion detection consists of two different network anomaly-based approaches. The work in intrusion simulation introduces a model using explicit traffic gen- eration for the packet level traffic simulation. The process of anomaly detection is to first build profiles for the normal network activity and then mark any events or activities that deviate from the normal profiles as suspicious. Based on the different schemes of creating the normal activity profiles, we introduce two approaches for intrusion detection. The first one is a frequency-based approach which …


Planning And Scheduling For Large-Scaledistributed Systems, Han Yu Jan 2005

Planning And Scheduling For Large-Scaledistributed Systems, Han Yu

Electronic Theses and Dissertations

Many applications require computing resources well beyond those available on any single system. Simulations of atomic and subatomic systems with application to material science, computations related to study of natural sciences, and computer-aided design are examples of applications that can benefit from the resource-rich environment provided by a large collection of autonomous systems interconnected by high-speed networks. To transform such a collection of systems into a user's virtual machine, we have to develop new algorithms for coordination, planning, scheduling, resource discovery, and other functions that can be automated. Then we can develop societal services based upon these algorithms, which hide …


Synthesis And Characterization Of Hydrogen-Rich Polyimide Materials For Radiation Shielding, Sha Yang Jan 2005

Synthesis And Characterization Of Hydrogen-Rich Polyimide Materials For Radiation Shielding, Sha Yang

Dissertations, Theses, and Masters Projects

No abstract provided.


Coherence Properties Of Optical Near-Fields, Adela Apostol Jan 2005

Coherence Properties Of Optical Near-Fields, Adela Apostol

Electronic Theses and Dissertations

Next generation photonics-based technologies will ultimately rely on novel materials and devices. For this purpose, phenomena at subwavelength scales are being studied to advance both fundamental knowledge and experimental capabilities. In this dissertation, concepts specific to near-field optics and experimental capabilities specific to near-field microscopy are used to investigate various aspects of the statistical properties of random electromagnetic fields in the vicinity of optically inhomogeneous media which emit or scatter radiation. The properties of such fields are being characterized within the frame of the coherence theory. While successful in describing the far-field properties of optical fields, the fundamental results of …