Skip to Main Content

Basic Search

Skip to Search Results
 
 
 

Left Column

Filters

Right Column

Search Results

Search Results

(Total results 19)

Mini-Tools

 
 

Search Report

  • 1. Workman, Robert Two novelists and their views of war /

    Master of Arts, The Ohio State University, 1961, Graduate School

    Committee: Not Provided (Other) Subjects:
  • 2. Perry, Nicholas Neural Network-Based Crossfire Attack Detection in SDN-Enabled Cellular Networks

    Master of Science, Miami University, 2023, Computer Science and Software Engineering

    In today's networked world, cybersecurity threats pose a significant challenge to the integrity and reliability of communication networks. One such threat is the crossfire attack, where adversaries exploit network vulnerabilities by injecting malicious packets into traffic flows. To address this, we present a novel crossfire detection scheme that solely inspects packet headers, reducing the computational overhead associated with packet inspection. Our proposed detection scheme includes both analysis of variance (ANOVA) and neural networks to identify anomalous packet behaviors indicative of crossfire attacks. To evaluate the effectiveness of our approach, we conducted experiments on a real ATT backbone topology, simulating a crossfire attack in the Mininet simulation environment. The results demonstrate that our detection scheme achieves an accuracy of 95.3\% in detecting adversarial packets, effectively mitigating the crossfire threat. Furthermore, we introduce a traffic optimization model to adapt routing decisions in response to crossfire or link flooding attacks. Leveraging the detection scheme's real-time analysis, our optimization model dynamically alters routing paths to minimize the impact of attacks on network performance. Overall, our research presents an innovative and comprehensive framework that combines efficient crossfire detection using packet headers, high-accuracy detection using ANOVA and neural networks, and an adaptive traffic optimization model.

    Committee: Suman Bhunia (Advisor); Daniela Inclezan (Committee Member); Vaskar Raychoudhary (Committee Member) Subjects: Computer Science
  • 3. Weadock, Virginia John Dos Passos' Artistic Use of the Sacco-Vanzetti Case in "U.S.A"

    Master of Arts (MA), Bowling Green State University, 1961, English

    Committee: Lowell P. Leland (Advisor) Subjects: American Literature
  • 4. Nordin, David The Dissolution of the Dos Passos Hero and the Structure of "One Man's Initiation" and "Three Soldiers"

    Master of Arts (MA), Bowling Green State University, 1960, English

    Committee: Robert Bashore (Advisor) Subjects: American Literature
  • 5. Nordin, David The Dissolution of the Dos Passos Hero and the Structure of "One Man's Initiation" and "Three Soldiers"

    Master of Arts (MA), Bowling Green State University, 1960, English

    Committee: Robert Bashore (Advisor) Subjects: American Literature
  • 6. Caldwell, Sean On Traffic Analysis of 4G/LTE Traffic

    Master of Science in Electrical Engineering, Cleveland State University, 2021, Washkewicz College of Engineering

    In this thesis, we draw attention to the problem of cross-service attacks, that is, attacks that exploit information collected about users from one service to launch an attack on the same users on another service. With the increased deployment and use of what fundamentally are integrated-services networks, such as 4G/LTE networks and now 5G, we expect that cross-service attacks will become easier to stage and therefore more prevalent. As running example to illustrate the effectiveness and the potential impact of cross-service attacks we will use the problem of account association in 4G/LTE networks. Account association attacks aim at determining whether a target mobile phone number is associated with a particular online account. In the case of 4G/LTE, the adversary launches the account association attacks by sending SMS messages to the target phone number and analyzing patterns in traffic related to the online account. We evaluate the proposed attacks in both a local 4G/LTE testbed and a major commercial 4G/LTE network. Our extensive experiments show that the proposed attacks can successfully identify account association with close-to-zero false negative and false positive rates. Our experiments also illustrate that the proposed attacks can be launched in a way that the victim receives no indication of being under attack.

    Committee: Ye Zhu (Committee Chair); Yongjain Fu (Committee Member); Sui-Tung Yau (Committee Member) Subjects: Computer Engineering; Computer Science; Electrical Engineering; Information Technology; Technology
  • 7. Xie, Qing Single Cell Hi-C Matrix Imputation

    Doctor of Philosophy, The Ohio State University, 2021, Biostatistics

    Single-cell Hi-C techniques make it possible to study cell-to-cell variability in genomic features. However, single-cell Hi-C (scHi-C) data are suffering from sparsity, which brings difficulties to downstream analysis such as clustering and structural analysis. The observed zeros in scHi-C data are a mixture of two types of events: structural zeros (SZ) due to underlying properties and dropouts (DO) due to low sequencing depth. Although a great deal of progress has been made in imputing dropout events for single-cell RNA-sequencing (RNA-seq) data, little has been done in identifying structural zeros and imputing dropouts for scHi-C data. To fill this gap, we propose two models that not only enhance the scHi-C data but also identify structural zeros from the observed zeros. The first model, HiCImpute, enhances scHi-C data through a Bayesian hierarchy model. It tells apart SZ from DO by defining an indicator variable. Different from the literature that treats every single cell separately, it takes spatial dependencies of scHi-C 2D data structure into account while also borrowing information from similar single cells and bulk data. The second model, scHiCSRS, enhances scHi-C data through a self-representation smoothing model. It also takes spatial dependencies of scHi-C 2D data structure and similar single cells into consideration. To identify SZ and DO with less sensitivity to sequencing depth, a Gaussian-mixture model is further developed that can estimate the probability of a pair being an SZ. Through an extensive set of simulations and real data analysis, we demonstrate the ability of HiCImpute and scHiSRS for identifying structural zeros with high sensitivity and for accurate imputation of dropout values in sampling zeros. Downstream analyses using data improved from HiCImpute and scHiCSRS yielded much more accurate clustering of cell types compared to using observed data or data improved by several comparison methods. Most significantly, HiCImpute-improved dat (open full item for complete abstract)

    Committee: Shili Lin (Advisor); Guy Brock (Committee Member); Asuman Seda Turkmen (Committee Member) Subjects: Biostatistics
  • 8. Holowacz, Eugene Understanding Differentiation of Self Through an Analysis of Individuality and Togetherness.

    Doctor of Philosophy, The Ohio State University, 2016, Human Ecology: Human Development and Family Science

    Bowen (1966) created Family Systems Theory as a way to expand the comprehension of human behavior by using individual and familial factors. One concept nested within this theory is Differentiation of Self (DoS). DoS is a universal and multifaceted concept that pertains to one's ability to use thoughts as opposed to emotions (intrapersonal DoS), and the interplay between individuality and togetherness (interpersonal DoS; Kerr & Bowen, 1988). Current instruments that measure DoS, such as the Differentiation of Self Inventory (Skowron & Friedlander, 1998) place individuality and togetherness on the same continuum, which has limited the understanding of DoS. Bowen (1966) hypothesized that one's level of differentiation is directly correlated with one's anxiety (Skowron & Friedlander, 1988), and could contribute to the presentation of symptoms, such as an alcohol use disorder (Bowen, 1974). However, the current understanding of Bowen's (1966) concept of DoS is limited, in that individuality and togetherness are treated as if they are on the same continuum, where individuality is a more desirable than togetherness. The belief that DoS is on one continuum removed the ability to study the positive aspects of togetherness. To further the research of DoS, an instrument, called the Differentiation of Self Quadrant Inventory (DSQI) was created that separated healthy and unhealthy individuality and togetherness, creating four subscales. The DSQI was piloted and tested for reliability, convergent validity, predictive validity, and discriminant validity. From these analyses, an instrument was created that was significantly related with another measure of DoS, and successfully predicted alcohol use and consequences associated with alcohol use. These findings not only supported Bowen's (1974) theory that low DoS is significantly related to alcohol use, but expanded the understanding of DoS by including healthy togetherness.

    Committee: Suzanne Bartle-Haring (Advisor); Keeley Pratt (Committee Member); Xin Feng (Committee Member) Subjects: Families and Family Life; Therapy
  • 9. Xia, Yu Selective Dropping of Rate Limiting Against Denial of Service Attacks

    Master of Computer Science (M.C.S.), University of Dayton, 2016, Computer Science

    In a Denial of Service (DoS) attack, attackers attempt to prevent legitimate users from accessing services on the Internet. As the Internet was designed to keep its core simple (i.e., routers simply perform routing and forwarding, rather than deep packet inspection), DoS attacks are still an open issue. In this thesis, we propose a router-based system and shed light on the design of intelligent rate-limiting mechanisms for protecting the Internet against DoS attacks. Unlike blind dropping (tail dropping or random dropping) used in traditional Active Queue Management (AQM) mechanisms that have been employed by routers on the Internet, our rate-limiting system maintains a grey list and a black list and performs selective packet dropping. The grey list contains information regarding flows that exceed the low-rate threshold but have not hit the high-rate threshold, while the black list monitors the high-rate flows. Each list is implemented using a table/map with fixed size and hence can be easily employed in routers. We show via simulations that our algorithm significantly outperforms blind dropping mechanisms.

    Committee: Zhongmei Yao Ph.D (Advisor); James P. Buckley Ph.D (Committee Member); Saverio Perugini Ph.D (Committee Member) Subjects: Computer Science
  • 10. Sibley, Matthew La trilogia del "Plan de Abajo" de Jorge Ibarguengoitia: Un cuestionamiento de la realidad y la ficcion a partir del espacio quimerico, las tecnicas narrativas y la heteroglosia

    Master of Arts (MA), Bowling Green State University, 2015, Spanish

    En el presente trabajo emprendo un analisis de uno de los rasgos mas esenciales de la novelistica del autor mexicano Jorge Ibarguengoitia (1928-1983): un aparato critico subyacente en su obra que plantea un debate sobre los modos de la representacion a la vez que cuestiona los discursos que adoptan los mismos. Ibarguengoitia presenta dicho aparato critico por medio de la relacion polifacetica y equivoca entre la realidad extraliteraria y la ficcion que forja en su obra. A partir de las obras Estas ruinas que ves (1975), Las muertas (1977) y Dos crimenes (1979)—la llamada trilogia del “Plan de Abajo”—subrayo una cohesion aproximativa y estilistica que cultiva Ibarguengoitia, producto de una base de recursos que emplea para lograr la presentacion heterogenea de la relacion entre la no ficcion y la ficcion. Esta base consta de los siguientes aspectos: primero, la concepcion de lo que yo denomino el espacio quimerico, el cual consiste en la invencion y el retrato detenido de la region ficticia del Estado de Plan de Abajo; segundo, los recursos narrativos que maneja el autor, los cuales comprenden elementos autorreferenciales y autorreflexivos, para alterar la percepcion de los discursos emitidos en su novelistica y desplegar este cuestionamiento discursivo a niveles metaliterarios, intertextuales e intratextuales; tercero, la enunciacion multiple o la heteroglosia, la cual permite una polifonia de voces que plasma una omnisciencia artificiosa y plantea una disparidad discursiva que impulsa que el lector cuestione todo discurso. Con la finalidad de senalar la mirada critica de Ibarguengoitia, analizo el espacio socialmente construido en su novelistica como puesta en escena de la que se vale el autor para comentar el poder del que disponen los discursos para tergiversar, fabricar y mitificar la verdad, lo cual influye en la percepcion y la presentacion de su realidad social. En sintesis, expongo que la trilogia del Plan de Abajo cimienta una fusion entre la documentac (open full item for complete abstract)

    Committee: Amy Robinson Dr, (Advisor); Valeria Grinberg Pla Dr. (Committee Member); Francisco Cabanillas Dr. (Committee Member) Subjects: Hispanic American Studies; Hispanic Americans; Language; Latin American Literature; Literature; Modern Language; Modern Literature
  • 11. Ignatenko, Vasily MOLECULAR LIBRARY SYNTHESIS USING NATURAL PRODUCTS: EXPANDING THE FRAMEWORK OF STEROIDS AND PENTACYCLIC TRITERPENOIDS

    Doctor of Philosophy, Case Western Reserve University, 2013, Chemistry

    Triterpenoids are a broad and structurally diverse class of natural products primarily derived from the plant kingdom. The triterpenoid family consists of nearly thirty thousand members with over two hundred unique carbocyclic skeletons. Consequently, triterpenoids are known to have a wide array of biological activities, including antifungal, anti-inflammatory, anti-cancer, as well as anti-viral and anti-bacterial properties. Considerable efforts in drug discovery have focused on the isolation and structural elucidation of novel triterpenoid molecules from the plant sources. Moreover, semisynthetic triterpenoids, created by further manipulation of the exterior functional groups, have been shown to enhance the potency of their natural precursors. In this regard, the increase in structural complexity of triterpenoid-like molecular libraries through alteration of the carbocyclic core skeleton of the parent natural product can be viewed as a promising tool to study the chemical biology and medicinal chemistry of this natural product family. This work represents a general synthetic strategy for remodeling of a triterpenoid skeleton based on the reactivity patterns of lanosterol, and application of the devised strategy to pentacyclic triterpenoid bryonolic acid. Lanosterol was chosen because of the unsaturated B/C ring fusion, which can undergo iterative allylic oxidation/oxidative cleavage to produce transannular polyketones. These polyketones, in turn, can form distinct molecular skeletons via regio- and stereoselective aldol addition and Norrish-Yang photocyclization. The main advantage of this approach is that instead of relying on reaction development and catalysis to impart stereochemical and regiochemical selectivity, the inherent complexity of the natural product-derived substrates drives stereoselective and regioselective reactions. The central finding described herein is that the subtle changes in the parent triterpenoid, which is subjected to the devised divers (open full item for complete abstract)

    Committee: Gregory Tochtrop (Advisor); Anthony Pearson (Committee Chair); John Protasiewicz (Committee Member); Blanton Tolbert (Committee Member); John Letterio (Committee Member) Subjects: Chemistry; Organic Chemistry; Pharmaceuticals
  • 12. Cavallaro, Dana Reconstructing the Past: Paleoethnobotanical Evidence for Ancient Maya Plant Use Practices at the Dos Pilas Site, Guatemala

    MS, University of Cincinnati, 2013, Arts and Sciences: Biological Sciences

    The focus of this study was to analyze the paleoethnobotanical remains retrieved from the Late Classic (ranging from approximately A.D. 600-800) Maya polity of Dos Pilas, located in the department of Peten, Guatemala. Paleoethnobotanical macroremains and flotation samples collected during field seasons between 1989 and 1992 were separated using standard paleoethnobotanical field and laboratory methodologies, allowing for analysis and identification of many of the remains. Plant remains recovered from this site include such domesticated cultigens as maize and squash; and an assortment of wood charcoal, including palm, pine, and various dicot woods. Initially unidentified charcoal samples were further analyzed using an FEI XL30 Environmental Scanning Electron Microscope (ESEM) with associated EDX system in order to obtain cellular structure orientations necessary for identifying such unknowns. Wood/non-wood ratios, kernel/cupule ratios, Shannon's Diversity index, absolute counts, absolute weights, and ubiquity were all analytical methods utilized in order to assess the implications of depositional patterns of the remains. These analyses were structured in order to reveal prevailing subsistence strategies, an evaluation of the possible environmental surroundings, and socioeconomic implications across the hierarchical system at Dos Pilas. These implications were based upon differential deposition patterns in regard to the social class of associated structures or households. These results were further compared using analogous measures to the nearby site of Aguateca in order to provide a reference of Dos Pilas' comparability to other Maya sites. This study has concluded that, while Dos Pilas shares many of the characteristics of other Lowland Maya sites, its unique location and history resulted in a distinctive form of subsistence and existence.

    Committee: David Lentz Ph.D. (Committee Chair); Susan Dunford Ph.D. (Committee Member); Vernon Scarborough Ph.D. (Committee Member) Subjects: Biology
  • 13. NEIMAN, ADAM HASH STAMP MARKING SCHEME FOR PACKET TRACEBACK

    MS, University of Cincinnati, 2005, Engineering : Computer Science

    The Internet Protocol (IP) is the basic language that all computers use to communicate across networks and the Internet. A flaw in the design of this protocol allows at tackers to forge the sending address of IP packets, known as packet spoofing. This packet spoofing is a serious security issue on networks and the Internet because it prevents authorities from locating the true source of any spoofing attack. In this paper we analyze technologies available for coping with packet spoofing. After this discussion we present a simple method for traceback, followed by an analysis of the method's requirements.

    Committee: John Franco (Advisor) Subjects: Computer Science
  • 14. Campos, Luísa Internationalization of Firms: An Analysis of Brazilian Shoe Firms in Vale do Rio dos Sinos, RS, Brazil

    Master of Arts (MA), Ohio University, 2011, Latin American Studies (International Studies)

    This study analyzes the internationalization process of six Brazilian shoe firms located in Vale do Rio dos Sinos, a southern region of Brazil. This study aims to identify what motivates these firms to enter foreign markets, what modes of entry and strategies they use to reach these markets, and if they follow any internationalization of firms model. In order to understand these firms internationalization behavior, this study uses a qualitative analysis. The results show that motivations among companies varied as well as their modes of entry used and their strategies to target the international market. Only one firm fit one of the internationalization of firms model. This study found that the internationalization process happened in different ways for each of the firms and therefore, it can concludes that there is no formula to internationalize.

    Committee: Catherine Axinn PhD (Committee Chair); Julia Paxton PhD (Committee Member); Yong Wang PhD (Committee Member) Subjects: Business Administration; Latin American Studies; Marketing
  • 15. Kayser, Pedro The Brazilian Shoe Industry and the Chinese Competition in International Markets

    Master of Arts (MA), Ohio University, 2008, Latin American Studies (International Studies)

    This study is a quantitative and qualitative analysis of the performance of the Brazilian shoe industry in international markets. The central questions are about how Brazilian shoe exporters perceive the Chinese competition in their main target markets and about their perceptions of advantages (or disadvantages) in international markets with regards to several marketing activities. Data was collected from primary data sources, personal and electronic interviews with producers, and from a questionnaire that was sent to firms in Brazil's main shoe productive areas. Background information includes the importance of the shoe industry for Brazilian and Chinese international trades, the strong presence of Chinese products in the international shoe market (including in Brazil), and the increasing presence of Brazilian shoes in developed countries' markets. Collected data indicate that Brazilian shoe exporters are facing stronger Chinese competition in Latin American and North American markets than in European markets. It also indicates that Brazilian shoe exporters' main advantages come from quality and product distribution, and the largest disadvantage comes from price.

    Committee: Ariaster B. Chimeli (Advisor); Catherine Axinn (Committee Member); Roy Boyd (Committee Member); Shamila Jayasuriya (Committee Member) Subjects: Economics; International Relations; Marketing
  • 16. Abdullah, Nuruddin The design of a PC software package to determine speed, skidding time, skidding distance and drag factor of vehicles implemented in turbo C for MS-DOS V 5.0

    Master of Public Administration (MPA), Ohio University, 1994, Industrial and Manufacturing Systems Engineering (Engineering)

    A systematic human factors analysis of the driver task in a potential skid hazard environment is necessary to examine broadly-based causes of skidding accidents. Understanding the interaction of road, vehicle and driver can help to minimize skidding accidents especially on the highways. Terms like driver perception time, driver stopping sight distance, decision sight distance, etc. have appeared in various research studies, all geared towards improving the driver's control of an impending accident. Tables and charts have been constructed on speeds and stopping distances on various pavement types, each governed by a set of different assumptions. Even though it would be unrealistic to try to standardize these charts because of the different assumptions governing them, widening the scope of the assumptions would bring these charts and tables closer and lessen the confusion in their use. Part of the thesis is devoted to understanding vehicle dynamics and a quick review of some of the natural laws of motion which are pertinent in developing the software. Also a literature review is done on some of the existing vehicle accident reconstruction programs with a view to see how they differ from the package developed in this thesis. The main objective of the thesis is to develop a PC software package that would determine speed, time and distance profiles of skidding and set up tables and charts of their relationships. With the broader scope of assumptions used in designing the package, it is hoped that it would meet the needs of a variety of users including the police department, transportation departments, schools and even insurance companies. The limitations imposed on this package is that it does not handle collision cases and all stopping or braking is conducted on horizontal planes and does not involve cornering situations. Also a maximum of three different pavement types is considered in the model. The package, which is written in Turbo C offers a comprehensive user-frie (open full item for complete abstract)

    Committee: Helmut Zwahlen (Advisor) Subjects: Engineering, Industrial
  • 17. Devasundaram, Shanmuga Sundaram PERFORMANCE EVALUATION OF A TTL-BASED DYNAMIC MARKING SCHEME IN IP TRACEBACK

    Master of Science, University of Akron, 2006, Computer Science

    Providing networks with countermeasures against Denial of Service (DoS) attacks has become a pressing security issue in the Internet today. Network services get disrupted or become totally unavailable as malicious attackers flood a victim network with large amount of useless traffic. For accountability purpose and to thwart those attacks, it is essential to identify the source of these attacks, which is usually concealed using faked or spoofed IP addresses, and is known as the IP Traceback problem. Packet marking is a traceback approach that calls for routers to mark packets along the attack path with self-identifying information. In Probabilistic Packet Marking (PPM) routers probabilistically decide whether or not to mark packets. A victim node relies on the amount of marked packet samples received to reconstruct the attack path. However, a fixed marking probability set for all routers in PPM has proved to be ineffective as marked packets from distant routers are more likely to be remarked by downstream routers. This entails a loss of information and leads to increase in the volume of packets needed to reconstruct the attack path. Enabling each router to adjust its marking probability so as to obtain equal samples of marked packets, in particular from the furthest routers would help in minimizing the time taken to reconstruct the attack path. Dynamic schemes have been proposed for adjusting the marking probability, which can be derived by accurately estimating a router's position in the attack path. However, most schemes are highly dependent on the underlying protocols and require routers to have knowledge of distance information to the potential victim node. This adversely increases the router overhead and is time consuming for real-time packet marking scenarios. In this work we propose an algorithm that dynamically set the value of the marking probability based on the 8-bit Time-To-Live (TTL) field in the IP header, which is a value that can be directly accessed (open full item for complete abstract)

    Committee: Xuan-Hien Dang (Advisor) Subjects: Computer Science
  • 18. Bamert, Sophia Manhattan Transference: Reader Itineraries in Modernist New York

    BA, Oberlin College, 2013, English

    John Dos Passos' Manhattan Transfer (1925) follows dozens of characters through modern New York City. The novel is organized as a fragmented montage and, in this paper, I argue that transit functions as both a central theme and the structuring principle of the text. I compare Manhattan Transfer to works by Walt Whitman and William Dean Howells and draw upon spatial form theory to examine how experiences of urban transportation influence literary forms. Ultimately, I suggest that Manhattan Transfer's modernist form offers readers itinerant ways of perceiving the complicated networks of which cities are made.

    Committee: T. S. McMillin (Advisor) Subjects: Literature
  • 19. Murad, David American Images of Spain, 1905-1936: Stein, Dos Passos, Hemingway

    PHD, Kent State University, 2013, College of Arts and Sciences / Department of English

    During significant periods of their lives, Gertrude Stein, John Dos Passos, and Ernest Hemingway were invested emotionally and creatively in Spain. In numerous letters, stories, and essays, each writer treated Spain as a creative point of departure, and Spain—or the image of Spain—essentially emerged as a physical as well as symbolic space of discovery, rediscovery, and regeneration. Ultimately, their writing not only speaks to the cross-current of American-Spanish relations over the past several centuries but literally becomes embedded in a larger, more extensive twentieth-century transnational narrative. Stein's admiration of and friendship with Pablo Picasso, which began in 1905, transformed her writing. Through Picasso, Stein theorized a special understanding or “likeness” between Americans and Spaniards, which, when fully pronounced by the 1930s, explained how the two distinct countries were mutually, even exclusively, responsible for the “twentieth century” and “modern” art. As one of the era's most visible transnationalists, Dos Passos discovered in Spain almost a second home—a productive space and spark for his professional endeavors and a pleasant retreat from the commercialization and industrialization of post-War Europe and America. Although his life's work dealt with many of the places he had known and traveled, Spain was an early inspiration and source for material. Hemingway's approach to Spain was fundamentally as a student, even if his public stature, then and since, appears to show a mastery of Spanish language and culture. Like Dos Passos and Stein, Hemingway used Spain as both a sounding board for his own imaginative work and as an instructive example for an American or Western audience who were curious to discover what made Spain so unique or “different.” While such diverse authors professed privileged, insider access along the way, their widely read “images of Spain” publicized and endorsed the value of Spanish culture, w (open full item for complete abstract)

    Committee: Robert Trogdon (Committee Chair); Kevin Floyd (Committee Member); Babacar M'Baye (Committee Member); Ann Heiss (Committee Member) Subjects: American Literature; American Studies