194 research outputs found

    Polyrigid and Polyaffine Transformations: A New Class of Diffeomorphisms for Locally Rigid or Affine Registration

    Get PDF
    MICCAI 2003 Best Student Award in Image Processing and Visualization.International audienceOBJECTIVE: The goal of this work is to improve the usability of a non-rigid registration software for medical images. METHOD: We have built a registration grid service in order to use the interactivity of a visualization workstation and the computing power of a cluster. On the user side, the system is composed of a graphical interface that interacts in a complex and fluid manner with the registration software running on a remote cluster. CONCLUSION: Although the transmission of images back and forth between the computer running the user interface and the cluster running the registration service adds to the total registration time, it provides a user-friendly way of using the registration software without heavy infrastructure investments in hospitals. The system exhibits good performances even if the user is connected to the grid service through a low throughput network such as a wireless network interface or ADSL

    Assessment and hardening of IOT development boards

    Get PDF
    © IFIP International Federation for Information Processing 2019. Internet of Things (IoT) products became recently an essential part of any home in conjunction with the great advancements in internet speeds and services. The invention of IoT based devices became an easy task that could be performed through the widely available IoT development boards. Raspberry Pi is considered one of the advanced development boards that have high hardware capabilities with a reasonable price. Unfortunately, the security aspect of such products is overlooked by the developers, revealing a huge amount of threats that result in invading the privacy and the security of the users. In this research, we directed our study to SSH due to its extensive adoption by the developers. It was found that due to the nature of the Raspberry Pi and development boards, the Raspberry Pi generates predictable and weak keys which make it easy to be utilized by MiTM attack. In this paper, Man in The Middle (MiTM) attack was conducted to examine the security of different variations provided by the SSH service, and various hardening approaches were proposed to resolve the issue of SSH weak implementation and weak keys

    Gollach : configuration of a cluster based linux virtual server

    Get PDF
    Includes bibliographical references.This thesis describes the Gollach cluster. The Gollach is an eight machine computing cluster that is aimed at being a general purpose computing resource for research purposes. This includes image processing and simulations. The main quest in this project is to create a cluster server that gives increased computational power and a unified system image (at several levels) without requiring the users to learn specialised tricks. At the same time the cluster must not be tasking to administer

    Creating a Portable Wireless Display

    Get PDF
    Real time computing has become a vital part in military applications. Moreover certain operations require that the soldiers carry computing devices to assist them. These devices, besides providing them with location-based information, should also be transmitting the requested data. In this thesis, we present a portable wireless display prototype, which renders the desktop of a remote computer. The prototype functions under the range of an 802.11b or Bluetooth wireless network. The Software interfacing is done with Virtual Network Computing (VNC). This thesis is a first step towards analyzing and creating head/wrist mounted displays capable of transmitting images from a remote computer. The thesis starts with an overview and proceeds with a discussion on the concepts involved behind the functioning of the prototype. It then provides a detailed description of the how the prototype was built, followed by a performance test and its analysis and concludes by summarizing the results achieved

    Creating a Portable Wireless Display

    Get PDF
    Real time computing has become a vital part in military applications. Moreover certain operations require that the soldiers carry computing devices to assist them. These devices, besides providing them with location-based information, should also be transmitting the requested data. In this thesis, we present a portable wireless display prototype, which renders the desktop of a remote computer. The prototype functions under the range of an 802.11b or Bluetooth wireless network. The Software interfacing is done with Virtual Network Computing (VNC). This thesis is a first step towards analyzing and creating head/wrist mounted displays capable of transmitting images from a remote computer. The thesis starts with an overview and proceeds with a discussion on the concepts involved behind the functioning of the prototype. It then provides a detailed description of the how the prototype was built, followed by a performance test and its analysis and concludes by summarizing the results achieved

    Information Security Synthesis in Online Universities

    Full text link
    Information assurance is at the core of every initiative that an organization executes. For online universities, a common and complex initiative is maintaining user lifecycle and providing seamless access using one identity in a large virtual infrastructure. To achieve information assurance the management of user privileges affected by events in the user's identity lifecycle needs to be the determining factor for access control. While the implementation of identity and access management systems makes this initiative feasible, it is the construction and maintenance of the infrastructure that makes it complex and challenging. The objective of this paper1 is to describe the complexities, propose a practical approach to building a foundation for consistent user experience and realizing security synthesis in online universities.Comment: 20 page

    Design and Implementation of Wireless Modules for Farm Monitoring

    Get PDF
    Since the last quarter of the 20th century, technological advancement in the industry has grown exponentially, likewise the agricultural sector. The extent is as far as the use of drones and automated robots on farms. Today wireless automation has become very popular in homes and industries alike since they are considered more efficient, safe and financially viable. Microcontroller applications in the area of wireless automation is very advanced considering the cheap cost compared to PLCs and the general cheap cost of electronic components has driven more funds into researching and further industrializing microcontroller technology. The aim of this Master's Thesis "Design and Implementation of Wireless Modules for Farm Monitoring" was to plan, design, construct and implement wireless modules to be used to automate, control and monitor a farm. The modules consists of two nodes, each equipped with RF modules to enable communication between the nodes wirelessly. One of the nodes is also connected to a computer (the raspberry pi), enabling access to the modules remotely via internet. This Master's Thesis describes the software and hardware tasks necessary for the total operation of the modules such as the control of IOs, communication between the wireless nodes and the control of the nodes via internet. Range measurement results and throughput measurements were also discussed.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    AUTOMATED NETWORK SECURITY WITH EXCEPTIONS USING SDN

    Get PDF
    Campus networks have recently experienced a proliferation of devices ranging from personal use devices (e.g. smartphones, laptops, tablets), to special-purpose network equipment (e.g. firewalls, network address translation boxes, network caches, load balancers, virtual private network servers, and authentication servers), as well as special-purpose systems (badge readers, IP phones, cameras, location trackers, etc.). To establish directives and regulations regarding the ways in which these heterogeneous systems are allowed to interact with each other and the network infrastructure, organizations typically appoint policy writing committees (PWCs) to create acceptable use policy (AUP) documents describing the rules and behavioral guidelines that all campus network interactions must abide by. While users are the audience for AUP documents produced by an organization\u27s PWC, network administrators are the responsible party enforcing the contents of such policies using low-level CLI instructions and configuration files that are typically difficult to understand and are almost impossible to show that they do, in fact, enforce the AUPs. In other words, mapping the contents of imprecise unstructured sentences into technical configurations is a challenging task that relies on the interpretation and expertise of the network operator carrying out the policy enforcement. Moreover, there are multiple places where policy enforcement can take place. For example, policies governing servers (e.g., web, mail, and file servers) are often encoded into the server\u27s configuration files. However, from a security perspective, conflating policy enforcement with server configuration is a dangerous practice because minor server misconfigurations could open up avenues for security exploits. On the other hand, policies that are enforced in the network tend to rarely change over time and are often based on one-size-fits-all policies that can severely limit the fast-paced dynamics of emerging research workflows found in campus networks. This dissertation addresses the above problems by leveraging recent advances in Software-Defined Networking (SDN) to support systems that enable novel in-network approaches developed to support an organization\u27s network security policies. Namely, we introduce PoLanCO, a human-readable yet technically-precise policy language that serves as a middle-ground between the imprecise statements found in AUPs and the technical low-level mechanisms used to implement them. Real-world examples show that PoLanCO is capable of implementing a wide range of policies found in campus networks. In addition, we also present the concept of Network Security Caps, an enforcement layer that separates server/device functionality from policy enforcement. A Network Security Cap intercepts packets coming from, and going to, servers and ensures policy compliance before allowing network devices to process packets using the traditional forwarding mechanisms. Lastly, we propose the on-demand security exceptions model to cope with the dynamics of emerging research workflows that are not suited for a one-size-fits-all security approach. In the proposed model, network users and providers establish trust relationships that can be used to temporarily bypass the policy compliance checks applied to general-purpose traffic -- typically by network appliances that perform Deep Packet Inspection, thereby creating network bottlenecks. We describe the components of a prototype exception system as well as experiments showing that through short-lived exceptions researchers can realize significant improvements for their special-purpose traffic

    An Open Management and Administration Platform for IEEE 802.11 Networks

    Get PDF
    The deployment of Wireless Local Area Network (WLAN) has greatly increased in past years. Due to the large deployment of the WLAN, the immediate need of management platforms has been recognized, which has a significant impact on the performance of a WLAN. Although there are various vendor-specific and proprietary solutions available in the market to cope with the management of wireless LAN, they have problems in interoperability and compatibility. To address this issues, IETF has come up with the interoperability standard of management of WLANs devices, Control And Provisioning of Wireless Access Points (CAPWAP) protocol, which is still in the draft phase. Commercial implementation of this draft protocol from WLAN equipment vendors is rather expensive. Open source community, therefore, tried to provide free management solutions. An open source project called openCAPWAP was initiated. However, it lacks a graphic user interface that makes it hard to implement for novice network administrators or regular customers. Therefore, the researcher designed and developed a web interface framework that encapsulates openCAPWAP at the bottom to provide user-friendly management experience. This application platform was designed to work with any remote web server in the public domain through which it can connect to access points or access controllers through a secure shell to configure them. This open platform is purely open source-based. It is operating system independent: it can be implemented on any open source environment such as regular Linux operating system or embedded operation system small form factor single board computers. The platform was designed and tested in a laboratory environment and a remote system. This development contributes to network administration in both network planning and operational management of the WLAN networks
    corecore