This thesis describes the research and development of a hardware implementation of the Self Organizing Map (SOM) for a network intrusion detection system. As part of the thesis research, Kohonen’s SOM algorithm was examined ...
Software is prone to contain bugs and vulnerabilities. To protect it, researchers normally
go to a lower layer, such as protecting the applications from the kernel or protecting the
operating systems from the hypervisor, ...
If a quantum computer with a sufficient number of qubits was ever built, it would easily break all current American federal standards in the area of public-key cryptography, including algorithms protecting the majority of ...
Cognitive radio is an emerging technology for sensing and opportunistic spectrum access in wireless communication networks. It allows a secondary user to detect under-utilized spectrum of a primary user and to dynamically ...
Advancement in digital technology has generated a massive amount of data. Large amount of information streaming in from various sources such as phones, tablets, computers and internet has made an immense need to provide a ...
Developing agent behaviors is often a tedious, time-consuming task consisting of repeated code, test, and debug cycles. Despite the difficulties, complex agent behaviors have been developed, but they required significant ...
Multivariate cryptosystems belong to the five most promising families of post-quantum
cryptography (PQC) schemes. Among them, the Unbalanced Oil and Vinegar (UOV) and
the Rainbow signature schemes have been extensively ...
Recovering deleted information from storage drives is a long-standing problem. Prior research has approached information recovery by developing file-carving techniques. However, two issues present significant challenges ...
The development of reliable, portable gas sensors that can detect harmful gases
in real-time with high sensitivity and selectivity, is very important for clean environment
and national security. In the last few decades, ...
The objective of this work is to create a control mechanism for smooth operation of powered wheelchairs through speech recognition and humming detection. Users of wheelchairs are estimated to be about 200 million people ...
This dissertation presents a hybrid filtering method and a case-based reasoning
framework for enhancing the effectiveness of Web search. Web search may not reflect
user needs, intent, context, and preferences, because ...
Coal Combustion Products (CCPs) also known as coal ash/residues are generated when coal is burnt to generate electricity or steam. CCPs include fly ash, bottom ash, flue gas desulfurization (FGD) materials (FGD solids, FGD ...
Computers store persistent information in a non-volatile storage device such as a hard drive. Users directly create and delete files on the hard drive, and users install and uninstall applications which indirectly creates ...
This dissertation investigates the construction of nonseparable multidimensional
wavelets using multidimensional filterbanks. The main contribution of the dissertation is
the derivation of the relations zeros of higher ...
This thesis describes the development of two different methods to produce an optimal
platform for immobilizing biological matter (cells and proteins). Firstly, transparent
indium tin oxide (ITO) microelectrodes were ...
In 2005, a major security
flaw was discovered in Secure Hash Algorithm-1 (SHA-1), an
NSA-designed cryptographic hash function, standardized by National Institute of Science
and Technology (NIST) since 1995. Basic ...
The Integrated Circuit (IC) supply chain has been undergoing changes inorder to adapt and sustain to the growing costs and technology changes borne by the IC Design house . These changes also add vulnerabilities in the ...
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are cryptographic protocols designed to provide secure communication between a web server and a web browser. This thesis introduces a unique approach to ...
Nowadays, the fourth generation mobile communication is being popularized all over the world. As the core technologies, OFDM and MIMO are being widely researched and attracting more and more people to make them perfect. ...
Forward error correction enables reliable one-way communication over noisy channels by
transmitting redundant data along with the message in order to detect and resolve errors
at the receiver. Low-density parity-check ...