Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Aerial Video (1)
- Annealing (1)
- Botnet (1)
- Co-location (1)
- Computational geometry (1)
-
- Computer (1)
- Contour extraction (1)
- Covert (1)
- Data (1)
- Data mining (1)
- Digital library (1)
- Edge linking (1)
- Folding (1)
- Hausdorff distance (1)
- Image processing (1)
- Local/Global Motion (1)
- Mapping (1)
- Mining (1)
- Nano (1)
- Network (1)
- Object Tracking (1)
- Optical Flow (1)
- Pipelined (1)
- Polygonal chain simplification (1)
- RNA (1)
- Resource Binding (1)
- Scheduling (1)
- Security (1)
- Simulated Annealing (1)
- Small (1)
- Publication
- Publication Type
Articles 1 - 10 of 10
Full-Text Articles in Physical Sciences and Mathematics
Covert Botnet Design And Defense Analysis, Brandon Lyle Shirley
Covert Botnet Design And Defense Analysis, Brandon Lyle Shirley
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
Intrusion defense system (IDS) development has been largely reactionary in nature. This is especially troubling given that botnets are capable of compromising and controlling thousands of computers before security professionals develop a mitigation technique. As new exploits are created, new mitigation techniques are developed to detect infections and, where possible, remove them. This thesis breaks from this tradition of reacting to malware. Instead, it looks at possible malicious software models through analyzing existing defense systems for exploitable weaknesses.
First, this thesis presents a new specialized botnet that circumvents current network intrusion detection mechanisms. The proposed botnet coordinates external communication among …
Educational Data Mining Approaches For Digital Libraries, Mimi Recker, Sherry Hsi, Beijie Xu, Rob Rothfarb
Educational Data Mining Approaches For Digital Libraries, Mimi Recker, Sherry Hsi, Beijie Xu, Rob Rothfarb
Instructional Technology and Learning Sciences Faculty Publications
This collaborative research project between the Exploratorium and Utah State's Department of Instructional Technology and Learning Sciences investigates online evaluation approaches and the application of educational data mining to educational digital libraries and services. Much work over the past decades has focused on developing algorithms and methods for discovering patterns in large datasets, known as Knowledge Discovery from Data (KDD). Webmetrics, the application of KDD to web usage mining, is growing rapidly in areas such as e-commerce. Educational Data Mining (EDM) is just beginning to emerge as a tool to analyze the massive, longitudinal user data that are captured in …
A Methodology To Design Pipelined Simulated Annealing Kernel Accelerators On Space-Borne Field-Programmable Gate Arrays, Jeffrey Michael Carver
A Methodology To Design Pipelined Simulated Annealing Kernel Accelerators On Space-Borne Field-Programmable Gate Arrays, Jeffrey Michael Carver
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
Increased levels of science objectives expected from spacecraft systems necessitate the ability to carry out fast on-board autonomous mission planning and scheduling. Heterogeneous radiation-hardened Field Programmable Gate Arrays (FPGAs) with embedded multiplier and memory modules are well suited to support the acceleration of scheduling algorithms. A methodology to design circuits specifically to accelerate Simulated Annealing Kernels (SAKs) in event scheduling algorithms is shown. The main contribution of this thesis is the low complexity scoring calculation used for the heuristic mapping algorithm used to balance resource allocation across a coarse-grained pipelined data-path. The methodology was exercised over various kernels with different …
Object Trajectory Estimation Using Optical Flow, Shuo Liu
Object Trajectory Estimation Using Optical Flow, Shuo Liu
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
Object trajectory tracking is an important topic in many different areas. It is widely used in robot technology, traffic, movie industry, and others. Optical flow is a useful method in the object tracking branch and it can calculate the motion of each pixel between two frames, and thus it provides a possible way to get the trajectory of objects. There are numerous papers describing the implementation of optical flow. Some results are acceptable, but in many projects, there are limitations. In most previous applications, because the camera is usually static, it is easy to apply optical flow to identify the …
Optimal Candidate Generation In Spatial Co-Location Mining, Zhongshan Lin
Optimal Candidate Generation In Spatial Co-Location Mining, Zhongshan Lin
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
Existing spatial co-location algorithms based on levels suffer from generating extra, nonclique candidate instances. Thus, they require cliqueness checking at every level. In this thesis, a novel, spatial co-location mining algorithm that automatically generates co-located spatial features without generating any nonclique candidates at any level is proposed. Subsequently, this algorithm generates fewer candidates than other existing level-wise, co-location algorithms without losing any pertinent information. The benefits of this algorithm have been clearly observed at early stages in the mining process.
Predicting Rna Secondary Structures By Folding Simulation: Software And Experiments, Joel Omni Gillespie
Predicting Rna Secondary Structures By Folding Simulation: Software And Experiments, Joel Omni Gillespie
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
We present a new method for predicting the secondary structure of RNA sequences. Using our method, each RNA nucleotide of an RNA Sequence is represented as a point on a 3D triangular lattice. Using the Simulated Annealing technique, we manipulate the location of the points on the lattice. We explore various scoring functions for judging the relative quality of the structures created by these manipulations. After near optimal configurations on the lattice have been found, we describe how the lattice locations of the nucleotides can be used to predict a secondary structure for the sequence. This prediction can be further …
A Computational Geometry Approach To Digital Image Contour Extraction, Pedro J. Tejada
A Computational Geometry Approach To Digital Image Contour Extraction, Pedro J. Tejada
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
We present a method for extracting contours from digital images, using techniques from computational geometry. Our approach is different from traditional pixel-based methods in image processing. Instead of working directly with pixels, we extract a set of oriented feature points from the input digital images, then apply classical geometric techniques, such as clustering, linking, and simplification, to find contours among these points. Experiments on synthetic and natural images show that our method can effectively extract contours, even from images with considerable noise; moreover, the extracted contours have a very compact representation.
Covert Botnet Implementation And Defense Against Covert Botnets, Lokesh Babu Ramesh Babu
Covert Botnet Implementation And Defense Against Covert Botnets, Lokesh Babu Ramesh Babu
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
The advent of the Internet and its benevolent use has benefited mankind in private and business use alike. However, like any other technology, the Internet is often used for malevolent purposes. One such malevolent purpose is to attack computers using botnets. Botnets are stealthy, and the victims are typically unaware of the malicious activities and the resultant havoc they can cause. Computer security experts seek to combat the botnet menace. However, attackers come up with new botnet designs that exploit the weaknesses in existing defense mechanisms and, thus, continue to evade detection.
Therefore, it is necessary to analyze the weaknesses …
Folklore And The Internet: Vernacular Expression In A Digital World, Trevor J. Blank
Folklore And The Internet: Vernacular Expression In A Digital World, Trevor J. Blank
All USU Press Publications
Folklore and the Internet is a pioneering examination of the folkloric qualities of the World Wide Web, e-mail, and related digital media. It shows that folk culture, sustained by a new and evolving vernacular, has been a key, since the Internetýs beginnings, to language, practice, and interaction online. Users of many sorts continue to develop the Internet as a significant medium for generating, transmitting, documenting, and preserving folklore. In a set of new, insightful essays, contributors Trevor J. Blank, Simon J. Bronner, Robert Dobler, Russell Frank, Gregory Hansen, Robert Glenn Howard, Lynne S. McNeill, Elizabeth Tucker, and William Westerman showcase …
Resources - Thinking Small: Nano Small, David Stricker
Resources - Thinking Small: Nano Small, David Stricker
Publications
The article provides information on the "Nanooze" magazine publication. It notes the significance of nanotechnology to the development of latest innovations that come from materials at smallest dimensions or at the nanoscale levels. It presents resources published within the publication that explore the emerging issues in nanotechnology.