Search Results (1 - 6 of 6 Results)

Sort By  
Sort Dir
 
Results per page  

Seibert, Margaret Mary ArmbrustA biography of Victorine-Louise Meurent and her role in the art of Edouard Manet /
Doctor of Philosophy, The Ohio State University, 1986, Graduate School

Committee:

Not Provided (Other)

Subjects:

Education

Keywords:

Meurent;Manet

Guo, ZhihaoINTELLIGENT MULTIPLE-OBJECTIVE PROACTIVE ROUTING IN MANET WITH PREDICTIONS ON DELAY, ENERGY, AND LINK LIFETIME
Doctor of Philosophy, Case Western Reserve University, 2008, Computer Engineering
In this dissertation we develop an intelligent multiple objective routing mechanism that can be integrated with any MANET proactive protocol. Our system considers three routing objectives: minimizing average end-to-end delay, maximizing network energy lifetime, and maximizing packet delivery ratio. Our system measures and predicts on multiple dynamic network conditions including queuing delay, energy consumption, and link lifetime. Based on the predicted values, our system calculates multiple routing metrics including queuing delay, energy cost, and link stability cost, and updates the routing table with evaluation of these routing metrics. This dissertation is divided into three parts, part 1 and part 2 are dedicated to the exclusive handling of the metric of queuing delay and the metric of energy cost respectively, compositive handling of all three metrics are investigated in the part 3. These three parts are formatted as three independent papers. Multiple prediction methods are developed. Two optional types of feedforward neural network models, Multi-Layer Perceptron (MLP) and Radial Basis Function (RBF), are used for queuing delay prediction in part I.; Autoregressive Integrated Moving Average (ARMIMA) are used for energy consumption prediction in part II; and double exponential smoothing is used for predicting both queuing delay and energy consumption in part III. Residual link lifetime is estimated using a heuristic of the pattern of link lifetime variation derived from the normal-like distributions of the link lifetimes in typical MANET mobility scenarios. In all the three parts, our system is integrated into OLSR, which is a well-known proactive MANET routing protocol. The regular topology control message exchange in OLSR is extended to convey the values of routing metrics. Our system uses a novel routing table computation algorithm called TierUp that evaluates node-state routing metrics (e.g., queuing delay) with reduced computational complexity compared to Dijkstra’s algorithm. Through extensive ns2 simulation our extended version of OLSR is capable of substantially improve the adaptability to the network dynamics and therefore achieve significant performance improvements in terms of all the three routing objectives. More over, our extended version of OLSR enables the routing decision maker to effectively set different preferences to different routing objectives.

Committee:

Behnam Malakooti (Advisor)

Keywords:

OLSR_NN; OLSR_EA; OLSR_MO; multi-objective proactive MANET routing; TierUp; neural network; Multi-Layer Perceptron (MLP); Radial Basis Function (RBF); ARIMA; double exponential smoothing; normalized weighted utility function

CHENG, YISecurity Mechanisms for Mobile Ad Hoc and Wireless Sensor Networks
PhD, University of Cincinnati, 2008, Engineering : Computer Science and Engineering

Wireless Ad Hoc Networks have emerged as an advanced networking paradigm based on collaborative efforts among multiple self-organized wireless communication devices. Without the requirement of a fixed infrastructure support, wireless ad hoc networks can be quickly deployed anywhere at any time when needed. The decentralized nature, minimal configuration and quick deployment of wireless ad hoc networks make them suitable for various applications, from disaster rescue, target tracking to military conflicts. Wireless ad hoc networks can be further categorized into mobile ad hoc networks (MANETs), wireless sensor networks (WSNs), and wireless mesh networks (WMNs) depending on their applications.

Security is a big challenge in wireless ad hoc networks due to the lack of any infrastructure support, dynamic network topology, shared radio medium, and resource-constrained wireless users. Most existing security mechanisms applied for the Internet or traditional wireless networks are neither applicable nor suitable for wireless ad hoc network environments. In MANETs, routing security is an extremely important issue, as the majority of the standard routing protocols assume non-hostile environments. Once deployed in a hostile environment and working in an unattended mode, existing routing protocols are vulnerable to various attacks. To address these concerns, we propose an anonymous secure routing protocol for MANETs in this dissertation, which can be incorporated with existing routing protocols and achieve enhanced routing security with minimum additional overheads.

In WSNs, key distribution and management is the core issue of any security approaches. Due to extremely resource-constrained sensor nodes and lack of any infrastructure support, traditional public-key based key distribution and management mechanisms are commonly considered as too expensive to be employed in WSNs. In this dissertation, we propose two efficient pairwise key pre-distribution and management mechanisms for both distributed and hierarchical large-scale WSNs, which enable establishing secure links between any two sensor nodes located within their communication range. As we know, sensing and communication are two fundamental characteristics of WSNs, and they cannot be addressed separately. Existing work on sensing coverage mainly focus on how to use the minimum number of sensors to achieve a required coverage, while security constraints are not sufficiently addressed. We propose an effective key distribution approach for randomly deployed WSNs, based on random graph theory and a realistic random key pre-distribution mechanism, in order to achieve both robust sensing coverage and secure connectivity simultaneously in a hostile deployment environment.

Committee:

Dharma Agrawal (Committee Chair); Jerome Paul (Committee Member); Wen-Ben Jone (Committee Member); Chia-Yung Han (Committee Member); Ernest Hall (Committee Member)

Subjects:

Communication; Computer Science

Keywords:

Wireless Ad Hoc Network; Mobile Ad Hoc Network (MANET); Wireless Sensor Network (WSN); Routing; Security; Cryptography; Key Management; Distributed Wireless Network; Hierarchical Wireless Network; Sensing Coverage; Secured Connectivity

Gorman, Caitlin MarieYasumasa Morimura: Appropriator of Images, Cultures, and Identities
Master of Arts (MA), Bowling Green State University, 2013, Art/Art History
Japanese contemporary photographer Yasumasa Morimura (b. 1951) appropriates Western imagery from art history, film, and media, recreating the scenes by inserting his own male Asian body into them. The scholarship regarding Morimura often acknowledges one feature of the works, emphasizing the artist’s use of appropriation and the feminist quality of the work or its post-colonial nature. Such an approach does not address the multi-faceted quality of his works or offer a holistic look at the dialogues that the images create. This paper addresses those issues by combining the critical approaches to his work through the study of photographs from his Daughter of Art History series. Employing post-colonial, feminist, and queer theories, three case studies focusing on Morimura’s photographs and the commentary created by them are included. The first case study analyzes Morimura’s Portrait (Futago), in which the artist reimagines Edouard Manet’s famed Olympia, commenting upon many post-colonial and feminist issues. The second case study examines Morimura’s Doublenage (Marcel), a photograph recreating Man Ray’s photograph Marcel Duchamp as Rrose Selavy, focuses on issues such as gender theory and queer theory. The third case study investigates Morimura’s interest in the Mexican artist Frida Kahlo, exploring the realm of self-portraiture, gender theory, and the identity crisis that both faced. Through this approach to the artist’s work, it is seen that all of these theories are deeply connected to Morimura’s work due to his identity as an Asian male artist living in a post-colonial era.

Committee:

Andrew Hershberger, PhD (Committee Chair); Stephanie Langin-Hooper, PhD (Committee Member)

Subjects:

Art History; Asian Studies

Keywords:

Yasumasa Morimura; Appropriation; Contemporary art; Photography; Post-colonial; Feminist; Self-Portraiture; Identity; Gender performance; Edouard Manet; Marcel Duchamp; Frida Kahlo

Alash, Hayder Majid AbdulhameedImpact of Mobility Models on Routing Protocols for Various Traffic Classes in Mobile Ad Hoc Networks
MS, Kent State University, 2016, College of Arts and Sciences / Department of Computer Science
A Mobile ad hoc network (MANET) is a set of wireless mobile devices which are connected together without using any infrastructure. The mobility of devices in MANET continuously changes the network topology and that makes routing between devices more complicated. Examples of such networks include networks for trucks on interstate highways, remote environmental and animal-movement outposts, wireless military battlefield networks that connect troops, aircraft, satellites, and sensors on land and in water, and Interplanetary networks. Three factors significantly influence the end-to-end performance in terms of Quality of Service (QoS); (i) mobility pattern/model, (ii) underlying routing algorithm and (iii) traffic patterns. While several theoretical models exist to describe mobility, traffic pattern, and routing algorithms, developing a model to collectively incorporate mobility, routing, and traffic is intractable. In this thesis, we intend to develop simulation models that bring these three factors together and measure applications performance in terms of end-to-end throughput (bit rate), latency, and jitter. Three classes of MANET routing algorithms (Proactive, Reactive, and Hybrid), two mobility models (Random Waypoint and Group), and three classes of traffic patterns (constant bit rate, variable bit rate, and random) have been investigated. Our result shows the relationship between these parameters and determines which routing algorithm is suitable for specific mobility model and specific traffic pattern.

Committee:

Hassan Peyravi (Advisor); Feodor Dragan (Committee Member); Gokarna Sharma (Committee Member)

Subjects:

Computer Science

Keywords:

MANET, AODV, FSR, OLSR, DYMO, ZRP, Random Waypoint Mobility Models, Group Mobility Models, CBR, VBR, Random

Alqallaf, MahaSoftware Defined Secure Ad Hoc Wireless Networks
Doctor of Philosophy (PhD), Wright State University, 2016, Computer Science and Engineering PhD
Software defined networking (SDN), a new networking paradigm that separates the network data plane from the control plane, has been considered as a flexible, layered, modular, and efficient approach to managing and controlling networks ranging from wired, infrastructure-based wireless (e.g., cellular wireless networks, WiFi, wireless mesh net- works), to infrastructure-less wireless networks (e.g. mobile ad-hoc networks, vehicular ad-hoc networks) as well as to offering new types of services and to evolving the Internet architecture. Most work has focused on the SDN application in traditional and wired and/or infrastructure based networks. Wireless networks have become increasingly more heterogeneous. Secure and collab- orative operation of mobile wireless ad-hoc networks poses significant challenges due to the decentralized nature of mobile ad hoc wireless networks, mobility of nodes, and re- source constraints. Recent developments in software defined networking shed new light on how to control and manage an ad hoc wireless network. Given the wide deployment and availability of heterogeneous wireless technologies, the control and management of ad hoc wireless networks with the new software defined networking paradigm is offered more flexibility and opportunities to deal with trust and security issues and to enable new features and services. This dissertation focuses on the SDN MANET architecture design issues for provid- ing secure collaborative operation. Specifically, (I) We have proposed four design options for software defined secure collaborative ad hoc wireless network architecture. The de- sign options are organized into (a) centralized SDN controller architecture with controller replication and (b) distributed SDN controller architecture. While these proposed architec- ture options exhibit different characteristics, many common challenges are shared amongst these options. Challenges include fault-tolerance, scalability, efficiency, and security. The unstructured nature of ad hoc wireless networks exacerbates these challenges. We have studied the pros and cons of these different design options and their applicability in differ- ent practical scenarios via simulations. (II) Establishing the initial trust among participating devices in an SDN based wireless mobile ad hoc network will serve as a basis for enabling ensuing secure communication of the network. We proposed and studied trusted virtual certificate authorities (VCAs) based local infrastructure for supporting device mutual au- thentication to support secure communications/operations in SDN based MANETs, and therefore, relieving the MANETs of the need to rely on an external public key infrastruc- ture (PKI). We examined the ways in which this VCA based infrastructure can be integrated with the four SDN based MANET architecture design options. (III) Finally, we provided theoretically analysis of designing and incorporating an IDS/IPS system in an SDN based MANET.

Committee:

Bin Wang, Ph.D. (Advisor); Yong Pei, Ph.D. (Committee Member); Krishnaprasad Thirunarayan, Ph.D. (Committee Member); Zhiqiang Wu, Ph.D. (Committee Member)

Subjects:

Computer Engineering; Computer Science

Keywords:

MANET; Security Challenges; Trust Management Challenges; SDN; OpenFlow; SDN Security Issues and Mechanisms; Trust Management; Virtual Certificate Authority for SDNMANET; Intrusion Detection and Prevention for SDNMANET; SDNMANET Architecture