Authentication protocols play important roles in network security. A variety of authentication protocols ranging from complex public-key cryptosystems to simple password-based authentication schemes have been proposed. However, currently there is no fully secure authentication scheme that can resist all known attacks. When a user authentication is performed over an insecure...
In this thesis, novel solutions are proposed for key management issues in mobile ad hoc networks. Presented Hierarchical Binary Tree (HBT) based model is distributed, self-organizing, scalable and does not employ online key distribution authority or group manager. Two different group authentication and group key establishment protocols are proposed for...
The Advanced Encryption Standard (AES) is the new standard for cryptography and has gained wide support as a means to secure digital data. Hence, it is beneficial to develop an implementation of AES that has a high throughput. SIMD technology is very effective in increasing the performance of some cryptographic...
Hardware cryptography offers a reliable way to provide security for data that is sent over networks. Security processors have taken the stage in the movement for secure computing. Some of the more prominent security processors belong to the S1 family created by Motorola. The primary goal of this thesis is...
The spread of the internet and communications techniques increases the necessity
for security in applications that involves sharing or exchange of secret or private infor-
mation. Public-key cryptography is widely used in establishing secure communication
channels between the users on the Internet, for E-commerce transactions, and in net-
work security...
WebGen is a software tool for generating Web scripts automatically for a Web-based database application. In this project, access control, AJAX support, and editable-and-insertable table mechanisms were added to WebGen. With our access control mechanism, an access-control level can be specified for each table. In access control level 1, for...
Current database systems apply access control mostly on tables and columns.
However, many applications require access control on individual rows in database
tables. Therefore, we have implemented a row-based access control mechanism. In
our model for access control, object groups, in addition to user groups, are used to
reduce the...
The stupendous growth in wireless and mobile devices in the recent years has prompted researchers to look at innovative approaches that enable effective use of the available resources. In this thesis, we propose a medium access control (MAC) protocol, referred to as EM-MAC, that enables wireless devices with multi-channel access...
Distributed Version Control Systems (DVCS) have seen an increase in popularity relative to traditional Centralized Version Control Systems (CVCS). Yet we know little on whether VCS tools meet the needs of software developers when managing software change or whether developers are benefitting from the extra power of DVCS. Without such...
Prioritization techniques are used to schedule test cases to execute in a specific order to maximize some objective function. There are a variety of possible objective functions, such as a function that measures how quickly faults can be detected within the testing process, or a function that measures how fast...
Test case prioritization techniques schedule test cases for regression testing in an order that increases their ability to meet some performance goal. One performance goal, rate of fault detection, measures how quickly faults are detected within the testing process. The APFD metric had been proposed for measuring the rate of...
The development of new electronic devices and design procedures
applicable to ternary switching circuits suggests that it might be desirable
to use ternary arithmetic in direct digital control systems.
The advantages of decimal, binary, and ternary arithmetic in digital
computers are discussed and a set of rules for signed -digit...
A simple package of routines that can be easily implemented
in small minicomputers used in process control, was developed to
simulate dynamic systems and computer control of simple dynamic
systems found in the process industries.
Two different systems, a gas absorber and a fifth-order
transfer function were chosen as processes...
The application of the personal computer in the area of real-time process control
is investigated. Background information is provided regarding factory automation and
process control. The current use of the PC in the factory for data acquisition is
presented along with an explanation of the advantages and disadvantages associated
with...
A high speed adaptive signal processing concept and several high
speed adaptive logic circuit elements are presented.
The adaptive signal processing system operates in a "goal" oriented
mode; the system tries to optimize its characteristics to
achieve a given goal in spite of unforeseen variations in the inputs,
the system,...
The timber shortage in the Pacific Northwest is forcing sawmill owners to
improve the competitiveness of their harvesting and processing
operations. A computer simulation and financial statement analysis were
used to compare the processing efficiency and profitability of three
bucking strategies: log cost minimization (traditional 40-foot preferred-length
logs); hauling length...
Trials to achieve optimal bucking were made with updated OSU-BUCK software in an eastern and a western Oregon location during the summers of 1993 and 1994. The commercial version of the software allows tagging of each log with bar-code identification numbers and therefore provides tracking from stump to customer. Data...
In northeast China, logging has three stages; timber
harvest, transportation and the operations inside a timber
yard. The timber yard is an intermediate transhipment point between truck transport and rail transport to manufacturing centers. The transhipment capacity of the timber yard is often the limiting acitivity in the logging chain....
Increasing automation and highly flexible manufacturing processes cause increasing complexity for manufacturing system. FMS (Flexible Manufacturing System) is an approach to solve this problem. Since the elements of the FMS and manufacturing process performance are closely interrelated, the application of simple modeling and emulation techniques in the planning stages for...
The principal objective of this study was to investigate process simulation and
optimization of an existing offshore natural gas process which needed profitability
improvements. Optimization was done using two alternative approaches: a global
approach (response surface methodology) or a local approach (successive quadratic
programming). The global approach was characterized by...
Multi-level decision feedback equalization (MDFE) is an effective sampled signal processing technique to remove inter-symbol interference (ISI) from disk read-back signals. Parallelism which doubles the symbol rate can be realized by utilizing the characteristic of channel response and decision feedback equalization algorithm.
A mixed-signal IC implementation has been chosen for...
The repetitious nature of air conditioning calculation leads to
arithmetic errors and a high cost of designing air conditioning systems.
Short cut calculations are employed to limit the calculation
and the chance of making errors.
Computers with their high speed of calculation and the ability
to make limited "logic's decisions...
Air traffic flow management over the U.S. airpsace is a difficult problem. Current management approaches lead to hundreds of thousands of hours of delay, costing billions of dollars annually. Weather and airport conditions may instigate this delay, but routing decisions balancing delay with congestion contribute significantly to the propagation of...
This paper discusses the design, construction, and use of a prototype expert system shell, EXE. EXE is non-conventional in that it does not provide a traditional forward or backward chaining inference mechanism. Instead, it allows the domain expert to control the logic flow of the system in a dynamic fashion....
Tolerance analysis is a major link between design and
manufacturing. An assembly or a part should be designed
based on its functions, manufacturing processes, desired
product quality, and manufacturing cost. Assembly tolerance
analysis performed at the design stage can reduce potential
manufacturing and assembly problems. Several commonly used
assembly tolerance...
The main focus of this work is on the problem of existence of nonlinear optimal controllers
realizable by artificial neural networks. Theoretical justification, currently
available for control applications of neural networks, is rather limited. For example,
it is unclear which neural architectures are capable of performing which control
tasks. This...
At the College of Engineering, Oregon State University, we have successfully developed and demonstrated a distance learning application utilizing emerging communications technologies in a new way to allow control engineering teaching laboratories to be accessed remotely. Second Best to Being There (SBBT) provides the remote user with all the capabilities...
The primary goal of any model is to emulate, as closely as possible, the desired behavioral phenomena of the real system but still maintain some tangible qualities between the parameters of the model and the system response. In keeping with this directive, models by their very nature migrate towards increasing...
The objective of this research was to provide a definitive description of the processes within the physician-patient encounter in an office setting. This description would take the form of a formal process model of the encounter in a provider's office setting, as this represents the most common situation during patient...
Extensive studies have been undertaken on the transient stability of large interconnected
power systems with flexible ac transmission systems (FACTS) devices installed.
Varieties of control methodologies have been proposed to stabilize the postfault system
which would otherwise eventually lose stability without a proper control. Generally speaking,
regular transient stability is...
This thesis explores the implementation of learning based control with predictive cruise control and the potential this technology has for increasing fuel efficiency while keeping on a well maintained schedule for commercial trucks. Traditional cruise control is wasteful when maintaining a constant velocity over rolling hills. Predictive cruise control is...
Control oriented local area networks (COLANs) are being installed in factories at an increasing rate. Traditionally, process control has operated with a master scheduler (computer) monitoring a number of points in a control grid. As the complexity of today's process control needs grow, the need to process information locally increases....
A modem Flexible Manufacturing Cell (FMC) usually consists of several Distributed Control Systems (DCS). Modeling and evaluating a manufacturing integrated system and then translating the models to operational programs are important steps in implementing a FMC. Monitoring and enhancing a FMC's manufacturing process quality is another critical issue. An embedded...
The distortions of input voltage and current waveforms generated by switch mode power supply (SMPS) operation are a major cause of concern in the power quality performance of commercial office buildings. These distortions are usually evaluated by performing a site survey of the building. In this thesis, a power quality...
Recent work has shown humanoid robots with spinal columns, instead of rigid torsos, benefit from both better balance and an increased ability to absorb external impact. Similarly, snake robots have shown promise as a viable option for exploration in confined spaces with limited human access, such as during power plant...
Uninhabited aerial vehicles, also called UAVs are currently controller by a combination of a human pilot at a remote location, and autopilot systems similar to those found on commercial aircraft. As UAVs transition from remote piloting to fully autonomous operation, control laws must be developed for the tasks to be...
It has been observed that edging flitches into lumber
unnecessarily reduces the yield of cut stock. This research
investigated the yield of cut stock from unedged red alder
(Alnus rubra) flitches, and compared it to yields attained
from boards subjected to a variety of edging strategies:
conventional, light-edging, actual, severe...
Direct red Solid Oxide Fuel Cell (SOFC) Turbine hybrid plants have the potential to dramatically increase power plant efficiency, decrease emissions, and provide fast response to transient loads. The US Department of Energy's (DOE) Hybrid Performance Project is an experimental hybrid SOFC plant, built at the National
Energy Technology Laboratory...
Citizen Science is a paradigm in which volunteers from the general public participate in scientific studies, often by performing data collection. This paradigm is especially useful if the scope of the study is too broad to be performed by a limited number of trained scientists. Although citizen scientists can contribute...
The systems currently available for forest road design are not capable of making computer-aided design judgments such as: 1) automated generation of alternative grade lines, 2) optimizing vertical alignment, 3) minimizing total cost of construction, maintenance, and transportation costs, and 4) aiming for least environmental impacts. In recent years, advances...
Climate exerts considerable control on wildfire regimes, and climate and wildfire are both major drivers of forest growth and succession in interior Northwest forests. Estimating potential response of these landscapes to anticipated changes in climate helps researchers and land managers understand and mitigate impacts of climate change on important ecological...
Infrastructure systems are a critical component supporting today's modern society. From
power grids to traffic networks, we rely on these systems to perform as intended, despite
the various sources of uncertainty present in their operation. Designing for system
robustness can help mitigate the impact of failures caused by unexpected events....
While there are many ways to evaluate a user interface design, the user's mental workload and situation awareness (SA) are particularly important considerations in the supervisory control of safety-critical systems. Typically, operators of these systems must monitor high-volume, time-sensitive status information. Interface design for this domain can be challenging and...
A key application of microchannel process technology (MPT) is its implementation in heat exchanger devices, since a larger surface contact area can be realized than in conventional approaches, thus achieving high heat transfer efficiency. To justify high volume production of configurations validated as prototypes, and to select from among the...