135 research outputs found

    Rationale Document: Entity Information And Entity Interaction In A Distributed Interactive Simulation

    Get PDF
    Report on efforts to define and develop a standard communication protocol at the protocol data unit level

    Spatial mechanism design in virtual reality with networking

    Get PDF
    Development and increased use of virtual reality tools are allowing users to replace physical models with digital models. Changes that are expensive and take a long time to make are easily done on digital models. VRNETS software was developed as a tool for designing and evaluating spatial 4C mechanism with networking to allow users at different locations to share positions and mechanism data. Spatial mechanisms allow motion in three-dimensional space. Spatial 4C mechanisms consist of four rigid links connected by four cylindrical (CCCC) joints. Solutions are obtained by synthesis, after specifying the location and orientation of four positions in space. The solutions are represented as a type map or as a set of congruencies. A type map is a 2D color-coded map representing the solutions. All of the possible mechanisms that can be formed that pass through all four positions are obtained in the solution set but not all of the mechanisms necessarily move in a continuous motion between the positions.;Filters are applied to the type map to indicate the mechanisms that suffer from branch and circuit defects. From these representations, the user can choose and evaluate different mechanisms. Animating each mechanism will show if the mechanism goes through the positions in the orientation and order specified. This design process is shared between two or more users through a network process based on client/server networking. Networking is implemented using World2Wolrd software, which is written on top of User Datagram Protocol (UDP). The application itself is written in C++ using WorldToolKit software libraries. This application provides designers with a tool to design spatial 4C mechanism. The virtual environment enables designers to interact with the design using natural, intuitive, three-dimensional motions

    Communication Architecture For Distributed Interactive Simulation (CADIS): Military Standard (draft)

    Get PDF
    Report establishes the requirements for the communication architecture to be used in a distributed interactive simulation, including the standards and the recommended practices for implementing the communication architecture and the rationales behind them

    Development of a high resolution 3D Computed Tomography system: data acquisition, reconstruction and visualization

    Get PDF
    NDE (Nondestructive evaluation) presents a way to characterize various properties of materials, components, or structures without damaging the objects. X-Ray techniques including radiography and CT (Computed Tomography) are of great importance because of their capability in detecting interior defects as well as surface flaws. In recent years, more and more interest is focused on micron-level features. A consequence is the rapidly growing data volume of both original CT data and 3D images. This data handling capability at both data acquisition stage and in the processing part is largely limited by computer power available, including CPU processing and data transfer. In this thesis a design for a high resolution CT system based on amorphous silicon detector and a microfocus X-Ray tube is presented. The implementation of the solution involves diverse research areas including network programming, parallel program developing, file format design and converting, physical system calibration, algorithm development, and graphical interface development. The crucial part of the approach is a 64-node Linux cluster. Utilizing the computing power of the cluster, the image reconstruction process is expedited tremendously. Moreover, the capacity of system memory and disk space makes it suitable to serve as temporary CT data storage through the fast Ethernet network connections, which in turn makes it possible to handle large dataset (multi-gigabyte) from a normal data acquisition PC without lengthening processing time. Keywords: X-Ray Computed Tomography, high resolution, network programming, parallel programming, Linux cluste

    Dynamic Protocol Reverse Engineering a Grammatical Inference Approach

    Get PDF
    Round trip engineering of software from source code and reverse engineering of software from binary files have both been extensively studied and the state-of-practice have documented tools and techniques. Forward engineering of protocols has also been extensively studied and there are firmly established techniques for generating correct protocols. While observation of protocol behavior for performance testing has been studied and techniques established, reverse engineering of protocol control flow from observations of protocol behavior has not received the same level of attention. State-of-practice in reverse engineering the control flow of computer network protocols is comprised of mostly ad hoc approaches. We examine state-of-practice tools and techniques used in three open source projects: Pidgin, Samba, and rdesktop . We examine techniques proposed by computational learning researchers for grammatical inference. We propose to extend the state-of-art by inferring protocol control flow using grammatical inference inspired techniques to reverse engineer automata representations from captured data flows. We present evidence that grammatical inference is applicable to the problem domain under consideration

    Near Field Communication: From theory to practice

    Get PDF
    This book provides the technical essentials, state-of-the-art knowledge, business ecosystem and standards of Near Field Communication (NFC)by NFC Lab - Istanbul research centre which conducts intense research on NFC technology. In this book, the authors present the contemporary research on all aspects of NFC, addressing related security aspects as well as information on various business models. In addition, the book provides comprehensive information a designer needs to design an NFC project, an analyzer needs to analyze requirements of a new NFC based system, and a programmer needs to implement an application. Furthermore, the authors introduce the technical and administrative issues related to NFC technology, standards, and global stakeholders. It also offers comprehensive information as well as use case studies for each NFC operating mode to give the usage idea behind each operating mode thoroughly. Examples of NFC application development are provided using Java technology, and security considerations are discussed in detail. Key Features: Offers a complete understanding of the NFC technology, including standards, technical essentials, operating modes, application development with Java, security and privacy, business ecosystem analysis Provides analysis, design as well as development guidance for professionals from administrative and technical perspectives Discusses methods, techniques and modelling support including UML are demonstrated with real cases Contains case studies such as payment, ticketing, social networking and remote shopping This book will be an invaluable guide for business and ecosystem analysts, project managers, mobile commerce consultants, system and application developers, mobile developers and practitioners. It will also be of interest to researchers, software engineers, computer scientists, information technology specialists including students and graduates.Publisher's Versio

    Co-design of Security Aware Power System Distribution Architecture as Cyber Physical System

    Get PDF
    The modern smart grid would involve deep integration between measurement nodes, communication systems, artificial intelligence, power electronics and distributed resources. On one hand, this type of integration can dramatically improve the grid performance and efficiency, but on the other, it can also introduce new types of vulnerabilities to the grid. To obtain the best performance, while minimizing the risk of vulnerabilities, the physical power system must be designed as a security aware system. In this dissertation, an interoperability and communication framework for microgrid control and Cyber Physical system enhancements is designed and implemented taking into account cyber and physical security aspects. The proposed data-centric interoperability layer provides a common data bus and a resilient control network for seamless integration of distributed energy resources. In addition, a synchronized measurement network and advanced metering infrastructure were developed to provide real-time monitoring for active distribution networks. A hybrid hardware/software testbed environment was developed to represent the smart grid as a cyber-physical system through hardware and software in the loop simulation methods. In addition it provides a flexible interface for remote integration and experimentation of attack scenarios. The work in this dissertation utilizes communication technologies to enhance the performance of the DC microgrids and distribution networks by extending the application of the GPS synchronization to the DC Networks. GPS synchronization allows the operation of distributed DC-DC converters as an interleaved converters system. Along with the GPS synchronization, carrier extraction synchronization technique was developed to improve the system’s security and reliability in the case of GPS signal spoofing or jamming. To improve the integration of the microgrid with the utility system, new synchronization and islanding detection algorithms were developed. The developed algorithms overcome the problem of SCADA and PMU based islanding detection methods such as communication failure and frequency stability. In addition, a real-time energy management system with online optimization was developed to manage the energy resources within the microgrid. The security and privacy were also addressed in both the cyber and physical levels. For the physical design, two techniques were developed to address the physical privacy issues by changing the current and electromagnetic signature. For the cyber level, a security mechanism for IEC 61850 GOOSE messages was developed to address the security shortcomings in the standard
    corecore