Current Search: Detection (x)
Pages
-
-
Title
-
SCALABLE AND EFFICIENT OUTLIER DETECTION IN LARGE DISTRIBUTED DATA SETS WITH MIXED-TYPE ATTRIBUTES.
-
Creator
-
Koufakou, Anna, Georgiopoulos, Michael, University of Central Florida
-
Abstract / Description
-
An important problem that appears often when analyzing data involves identifying irregular or abnormal data points called outliers. This problem broadly arises under two scenarios: when outliers are to be removed from the data before analysis, and when useful information or knowledge can be extracted by the outliers themselves. Outlier Detection in the context of the second scenario is a research field that has attracted significant attention in a broad range of useful applications. For...
Show moreAn important problem that appears often when analyzing data involves identifying irregular or abnormal data points called outliers. This problem broadly arises under two scenarios: when outliers are to be removed from the data before analysis, and when useful information or knowledge can be extracted by the outliers themselves. Outlier Detection in the context of the second scenario is a research field that has attracted significant attention in a broad range of useful applications. For example, in credit card transaction data, outliers might indicate potential fraud; in network traffic data, outliers might represent potential intrusion attempts. The basis of deciding if a data point is an outlier is often some measure or notion of dissimilarity between the data point under consideration and the rest. Traditional outlier detection methods assume numerical or ordinal data, and compute pair-wise distances between data points. However, the notion of distance or similarity for categorical data is more difficult to define. Moreover, the size of currently available data sets dictates the need for fast and scalable outlier detection methods, thus precluding distance computations. Additionally, these methods must be applicable to data which might be distributed among different locations. In this work, we propose novel strategies to efficiently deal with large distributed data containing mixed-type attributes. Specifically, we first propose a fast and scalable algorithm for categorical data (AVF), and its parallel version based on MapReduce (MR-AVF). We extend AVF and introduce a fast outlier detection algorithm for large distributed data with mixed-type attributes (ODMAD). Finally, we modify ODMAD in order to deal with very high-dimensional categorical data. Experiments with large real-world and synthetic data show that the proposed methods exhibit large performance gains and high scalability compared to the state-of-the-art, while achieving similar accuracy detection rates.
Show less
-
Date Issued
-
2009
-
Identifier
-
CFE0002734, ucf:48161
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0002734
-
-
Title
-
Detecting Threats from Constituent Parts: A Fuzzy Signal Detection Theory Analysis of Individual Differences.
-
Creator
-
Van De Car, Ida, Szalma, James, Hancock, Peter, Mouloua, Mustapha, Kennedy, Robert, University of Central Florida
-
Abstract / Description
-
Signal detection theory (SDT) provides a theoretical framework for describing performance on decision making tasks, and fuzzy signal detection theory (FSDT) extends this description to include tasks in which there are levels of uncertainty regarding the categorization of stimulus events. Specifically, FSDT can be used to quantify the degree to which an event is 'signal-like', i.e., the degree to which a stimulus event can be characterized by both signal and non-signal properties. For instance...
Show moreSignal detection theory (SDT) provides a theoretical framework for describing performance on decision making tasks, and fuzzy signal detection theory (FSDT) extends this description to include tasks in which there are levels of uncertainty regarding the categorization of stimulus events. Specifically, FSDT can be used to quantify the degree to which an event is 'signal-like', i.e., the degree to which a stimulus event can be characterized by both signal and non-signal properties. For instance, an improvised explosive device (IED) poses little threat when missing key elements of its assembly (a stimulus of low, but not zero, signal strength) whereas the threat is greater when all elements necessary to ignite the device are present (a stimulus of high signal strength). This research develops a link between key individual cognitive (i.e., spatial orientation and visualization) and personality (i.e., extroversion, conscientiousness, and neuroticism) differences among observers to performance on a fuzzy signal detection task, in which the items to be detected (IEDs) are presented in various states of assembly. That is, this research relates individual difference measures to task performance, uses FSDT in target detection, and provides application of the theory to vigilance tasks. In two experiments, participants viewed pictures of IEDs, not all of which are assembled or include key components, and categorize them using a fuzzy rating scale (no threat, low threat potential, moderate threat potential, or definite threat). In both experiments, there were significant interactions between the stimulus threat level category and the variability of images within each category. The results of the first experiment indicated that spatial and mechanical ability were stronger predictors of performance when the signal was ambiguous than when individuals viewed stimuli in which the signal was fully absent or fully present (and, thus, less ambiguous). The second study showed that the length of time a stimulus is viewed is greatest when the signal strength is low and there is ambiguity regarding the threat level of the stimulus. In addition, response times were substantially longer in study 2 than in study 1, although patterns of performance accuracy, as measured by the sensitivity index d', were similar across the two experiments. Together, the experiments indicate that individuals take longer to evaluate a potential threat as less critical, than to identify either an absence of threat or a high degree of threat and that spatial and mechanical ability assist decision making when the threat level is unclear. These results can be used to increase the efficiency of employees working in threat-detection positions, such as luggage screeners, provides an exemplar of use of FSDT, and contributes to the understanding of human decision making.
Show less
-
Date Issued
-
2015
-
Identifier
-
CFE0006016, ucf:51015
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0006016
-
-
Title
-
DESIGNING LIGHT FILTERS TO DETECT SKIN USING A LOW-POWERED SENSOR.
-
Creator
-
Tariq, Muhammad, Wisniewski, Pamela, Gong, Boqing, Leavens, Gary, University of Central Florida
-
Abstract / Description
-
Detection of nudity in photos and videos, especially prior to uploading to the internet, is vital to solving many problems related to adolescent sexting, the distribution of child pornography, and cyber-bullying. The problem with using nudity detection algorithms as a means to combat these problems is that: 1) it implies that a digitized nude photo of a minor already exists (i.e., child pornography), and 2) there are real ethical and legal concerns around the distribution and processing of...
Show moreDetection of nudity in photos and videos, especially prior to uploading to the internet, is vital to solving many problems related to adolescent sexting, the distribution of child pornography, and cyber-bullying. The problem with using nudity detection algorithms as a means to combat these problems is that: 1) it implies that a digitized nude photo of a minor already exists (i.e., child pornography), and 2) there are real ethical and legal concerns around the distribution and processing of child pornography. Once a camera captures an image, that image is no longer secure. Therefore, we need to develop new privacy-preserving solutions that prevent the digital capture of nude imagery of minors. My research takes a first step in trying to accomplish this long-term goal: In this thesis, I examine the feasibility of using a low-powered sensor to detect skin dominance (defined as an image comprised of 50% or more of human skin tone) in a visual scene. By designing four custom light filters to enhance the digital information extracted from 300 scenes captured with the sensor (without digitizing high-fidelity visual features), I was able to accurately detect a skin dominant scene with 83.7% accuracy, 83% precision, and 85% recall. The long-term goal to be achieved in the future is to design a low-powered vision sensor that can be mounted on a digital camera lens on a teen's mobile device to detect and/or prevent the capture of nude imagery. Thus, I discuss the limitations of this work toward this larger goal, as well as future research directions.
Show less
-
Date Issued
-
2017
-
Identifier
-
CFE0006806, ucf:51792
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0006806
-
-
Title
-
Detecting Semantic Method Clones in Java Code using Method IOE-Behavior.
-
Creator
-
Elva, Rochelle, Leavens, Gary, Johnson, Mark, Orooji, Ali, Hughes, Charles, University of Central Florida
-
Abstract / Description
-
The determination of semantic equivalence is an undecidable problem; however, this dissertation shows that a reasonable approximation can be obtained using a combination of static and dynamic analysis. This study investigates the detection of functional duplicates, referred to as semantic method clones (SMCs), in Java code. My algorithm extends the input-output notion of observable behavior, used in related work [1, 2], to include the effects of the method. The latter property refers to the...
Show moreThe determination of semantic equivalence is an undecidable problem; however, this dissertation shows that a reasonable approximation can be obtained using a combination of static and dynamic analysis. This study investigates the detection of functional duplicates, referred to as semantic method clones (SMCs), in Java code. My algorithm extends the input-output notion of observable behavior, used in related work [1, 2], to include the effects of the method. The latter property refers to the persistent changes to the heap, brought about by the execution of the method. To differentiate this from the typical input-output behavior used by other researchers, I have coined the term method IOE-Behavior; which means its input-output and effects behavior [3]. Two methods are defined as semantic method clones, if they have identical IOE-Behavior; that is, for the same inputs (actual parameters and initial heap state), they produce the same output (that is result- for non-void methods, and final heap state).The detection process consists of two static pre-filters used to identify candidate clone sets. This is followed by dynamic tests that actually run the candidate methods, to determine semantic equivalence. The first filter groups the methods by type. The second filter refines the output of the first, grouping methods by their effects. This algorithm is implemented in my tool JSCTracker, used to automate the SMC detection process. The algorithm and tool are validated using a case study comprising of 12 open source Java projects, from different application domains and ranging in size from 2 KLOC (thousand lines of code) to 300 KLOC. The objectives of the case study are posed as 4 research questions:1. Can method IOE-Behavior be used in SMC detection?2. What is the impact of the use of the pre-filters on the efficiency of the algorithm?3. How does the performance of method IOE-Behavior compare to using only input-output for identifying SMCs?4. How reliable are the results obtained when method IOE-Behavior is used in SMC detection? Responses to these questions are obtained by checking each software sample with JSCTracker and analyzing the results.The number of SMCs detected range from 0 45 with an average execution time of 8.5 seconds. The use of the two pre-filters reduces the number of methods that reach the dynamic test phase, by an average of 34%. The IOE-Behavior approach takes an average of 0.010 seconds per method while the input-output approach takes an average of 0.015 seconds. The former also identifies an average of 32% false positives, while the SMCs identified using input-output, have an average of 92% false positives. In terms of reliability, the IOE-Behavior method produces results with precision values of an average of 68% and recall value of 76% on average.These reliability values represent an improvement of over 37% (for precision) of the values in related work [4]. Thus, it is my conclusion that IOE-Behavior can be used to detect SMCs in Java code with reasonable reliability.
Show less
-
Date Issued
-
2013
-
Identifier
-
CFE0004835, ucf:49689
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0004835
-
-
Title
-
Speech Detection using Gammatone Features and One-Class Support Vector Machine.
-
Creator
-
Cooper, Douglas, Mikhael, Wasfy, Wahid, Parveen, Behal, Aman, Richie, Samuel, University of Central Florida
-
Abstract / Description
-
A network gateway is a mechanism which provides protocol translation and/or validation of network traffic using the metadata contained in network packets. For media applications such as Voice-over-IP, the portion of the packets containing speech data cannot be verified and can provide a means of maliciously transporting code or sensitive data undetected. One solution to this problem is through Voice Activity Detection (VAD). Many VAD's rely on time-domain features and simple thresholds for...
Show moreA network gateway is a mechanism which provides protocol translation and/or validation of network traffic using the metadata contained in network packets. For media applications such as Voice-over-IP, the portion of the packets containing speech data cannot be verified and can provide a means of maliciously transporting code or sensitive data undetected. One solution to this problem is through Voice Activity Detection (VAD). Many VAD's rely on time-domain features and simple thresholds for efficient speech detection however this doesn't say much about the signal being passed. More sophisticated methods employ machine learning algorithms, but train on specific noises intended for a target environment. Validating speech under a variety of unknown conditions must be possible; as well as differentiating between speech and non- speech data embedded within the packets. A real-time speech detection method is proposed that relies only on a clean speech model for detection. Through the use of Gammatone filter bank processing, the Cepstrum and several frequency domain features are used to train a One-Class Support Vector Machine which provides a clean-speech model irrespective of environmental noise. A Wiener filter is used to provide improved operation for harsh noise environments. Greater than 90% detection accuracy is achieved for clean speech with approximately 70% accuracy for SNR as low as 5dB.
Show less
-
Date Issued
-
2013
-
Identifier
-
CFE0005091, ucf:50731
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0005091
-
-
Title
-
DEVELOPMENT OF A COMPACT BROADBAND OPTICAL PARAMETRIC OSCILLATOR FOR ULTRA-SENSITIVE MOLECULAR DETECTION.
-
Creator
-
Crystal, Sean O, Vodopyanov, Konstantin L., University of Central Florida
-
Abstract / Description
-
Every gas molecule has a unique absorption spectrum that can be captured using optical spectroscopy to identify an unknown sample's composition. Frequency combs systems can provide an extremely broad mid-infrared spectrum that is very useful for molecular detection. A degenerate optical parametric oscillator (OPO) was built to generate the down-converted and shifted frequency comb spectrum. This system utilizes an ultra-short pulse 1.56�m pump laser and a never before used orientation...
Show moreEvery gas molecule has a unique absorption spectrum that can be captured using optical spectroscopy to identify an unknown sample's composition. Frequency combs systems can provide an extremely broad mid-infrared spectrum that is very useful for molecular detection. A degenerate optical parametric oscillator (OPO) was built to generate the down-converted and shifted frequency comb spectrum. This system utilizes an ultra-short pulse 1.56�m pump laser and a never before used orientation patterned gallium-phosphide crystal. Periodically polled lithium niobate (PPLN), Gallium Arsenide (GaAs) and Gallium Phosphide are all crystals used to accomplish this task. GaP, in comparison to PPLN, has (i) a larger nonlinear coefficient, (ii) much deeper infrared transparency, and (iii) smaller group dispersion � to allow for achieving broad spectral coverage. GaP also has a larger band gap than GaAs; therefore it can still be pumped with a standard telecom C-band laser. An octave-wide spanning frequency comb system was achieved and the characterization of the system is presented. This system is specifically designed to be compact and portable for initial experimental testing in the applications of medical breath analysis and combustion gas investigation.
Show less
-
Date Issued
-
2017
-
Identifier
-
CFH2000274, ucf:45837
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFH2000274
-
-
Title
-
APTAMERIC SENSORS: IN VITRO SELECTION OF DNA THAT BINDS BROMOCRESOL PURPLE.
-
Creator
-
Miller, Derek B, Kolpshchikov, Dmitry, University of Central Florida
-
Abstract / Description
-
Aptamers being used as sensors is an emerging field that has capabilities of being tomorrow's diagnostic tools. As aptameric sensors have become more popular, their visualization systems have been limited. The majority of today's aptameric sensors require expensive machinery such as a fluorometer in order to visualize results. We propose a system that will cut the need for instrumentation and be detected via the naked eye. With the selection of an aptamer to bind the pH indicating dye...
Show moreAptamers being used as sensors is an emerging field that has capabilities of being tomorrow's diagnostic tools. As aptameric sensors have become more popular, their visualization systems have been limited. The majority of today's aptameric sensors require expensive machinery such as a fluorometer in order to visualize results. We propose a system that will cut the need for instrumentation and be detected via the naked eye. With the selection of an aptamer to bind the pH indicating dye bromocresol purple (BCP) this may be achieved. When rendered active, the binding towards BCP will facilitate a color change from yellow to purple or vice versa. Previous studies have shown albumin contains the ability to facilitate this role and we now intend to use a DNA aptamer to achieve this as well. The BCP aptamer has the potential to serve as a signaling domain to any already selected aptamer thus making it a universal tool for both research and diagnostic measures. We have found that an alternative structure-switching systematic evolution of ligands by exponential enrichment (SELEX) method which left the dye unaltered was not sufficient for selecting an aptamer. We believe that a classical SELEX will enable us to select an aptamer that may be used to accomplish this role as a universal visual detector.
Show less
-
Date Issued
-
2016
-
Identifier
-
CFH2000112, ucf:45951
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFH2000112
-
-
Title
-
MULTI-VIEW APPROACHES TO TRACKING, 3D RECONSTRUCTION AND OBJECT CLASS DETECTION.
-
Creator
-
khan, saad, Shah, Mubarak, University of Central Florida
-
Abstract / Description
-
Multi-camera systems are becoming ubiquitous and have found application in a variety of domains including surveillance, immersive visualization, sports entertainment and movie special effects amongst others. From a computer vision perspective, the challenging task is how to most efficiently fuse information from multiple views in the absence of detailed calibration information and a minimum of human intervention. This thesis presents a new approach to fuse foreground likelihood information...
Show moreMulti-camera systems are becoming ubiquitous and have found application in a variety of domains including surveillance, immersive visualization, sports entertainment and movie special effects amongst others. From a computer vision perspective, the challenging task is how to most efficiently fuse information from multiple views in the absence of detailed calibration information and a minimum of human intervention. This thesis presents a new approach to fuse foreground likelihood information from multiple views onto a reference view without explicit processing in 3D space, thereby circumventing the need for complete calibration. Our approach uses a homographic occupancy constraint (HOC), which states that if a foreground pixel has a piercing point that is occupied by foreground object, then the pixel warps to foreground regions in every view under homographies induced by the reference plane, in effect using cameras as occupancy detectors. Using the HOC we are able to resolve occlusions and robustly determine ground plane localizations of the people in the scene. To find tracks we obtain ground localizations over a window of frames and stack them creating a space time volume. Regions belonging to the same person form contiguous spatio-temporal tracks that are clustered using a graph cuts segmentation approach. Second, we demonstrate that the HOC is equivalent to performing visual hull intersection in the image-plane, resulting in a cross-sectional slice of the object. The process is extended to multiple planes parallel to the reference plane in the framework of plane to plane homologies. Slices from multiple planes are accumulated and the 3D structure of the object is segmented out. Unlike other visual hull based approaches that use 3D constructs like visual cones, voxels or polygonal meshes requiring calibrated views, ours is purely-image based and uses only 2D constructs i.e. planar homographies between views. This feature also renders it conducive to graphics hardware acceleration. The current GPU implementation of our approach is capable of fusing 60 views (480x720 pixels) at the rate of 50 slices/second. We then present an extension of this approach to reconstructing non-rigid articulated objects from monocular video sequences. The basic premise is that due to motion of the object, scene occupancies are blurred out with non-occupancies in a manner analogous to motion blurred imagery. Using our HOC and a novel construct: the temporal occupancy point (TOP), we are able to fuse multiple views of non-rigid objects obtained from a monocular video sequence. The result is a set of blurred scene occupancy images in the corresponding views, where the values at each pixel correspond to the fraction of total time duration that the pixel observed an occupied scene location. We then use a motion de-blurring approach to de-blur the occupancy images and obtain the 3D structure of the non-rigid object. In the final part of this thesis, we present an object class detection method employing 3D models of rigid objects constructed using the above 3D reconstruction approach. Instead of using a complicated mechanism for relating multiple 2D training views, our approach establishes spatial connections between these views by mapping them directly to the surface of a 3D model. To generalize the model for object class detection, features from supplemental views (obtained from Google Image search) are also considered. Given a 2D test image, correspondences between the 3D feature model and the testing view are identified by matching the detected features. Based on the 3D locations of the corresponding features, several hypotheses of viewing planes can be made. The one with the highest confidence is then used to detect the object using feature location matching. Performance of the proposed method has been evaluated by using the PASCAL VOC challenge dataset and promising results are demonstrated.
Show less
-
Date Issued
-
2008
-
Identifier
-
CFE0002073, ucf:47593
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0002073
-
-
Title
-
NETWORK INTRUSION DETECTION: MONITORING, SIMULATION ANDVISUALIZATION.
-
Creator
-
Zhou, Mian, Lang, Sheau-Dong, University of Central Florida
-
Abstract / Description
-
This dissertation presents our work on network intrusion detection and intrusion sim- ulation. The work in intrusion detection consists of two different network anomaly-based approaches. The work in intrusion simulation introduces a model using explicit traffic gen- eration for the packet level traffic simulation. The process of anomaly detection is to first build profiles for the normal network activity and then mark any events or activities that deviate from the normal profiles as...
Show moreThis dissertation presents our work on network intrusion detection and intrusion sim- ulation. The work in intrusion detection consists of two different network anomaly-based approaches. The work in intrusion simulation introduces a model using explicit traffic gen- eration for the packet level traffic simulation. The process of anomaly detection is to first build profiles for the normal network activity and then mark any events or activities that deviate from the normal profiles as suspicious. Based on the different schemes of creating the normal activity profiles, we introduce two approaches for intrusion detection. The first one is a frequency-based approach which creates a normal frequency profile based on the periodical patterns existed in the time-series formed by the traffic. It aims at those attacks that are conducted by running pre-written scripts, which automate the process of attempting connections to various ports or sending packets with fabricated payloads, etc. The second approach builds the normal profile based on variations of connection-based behavior of each single computer. The deviations resulted from each individual computer are carried out by a weight assignment scheme and further used to build a weighted link graph representing the overall traffic abnormalities. The functionality of this system is of a distributed personal IDS system that also provides a centralized traffic analysis by graphical visualization. It provides a finer control over the internal network by focusing on connection-based behavior of each single computer. For network intrusion simulation, we explore an alternative method for network traffic simulation using explicit traffic generation. In particular, we build a model to replay the standard DARPA traffic data or the traffic data captured from a real environment. The replayed traffic data is mixed with the attacks, such as DOS and Probe attack, which can create apparent abnormal traffic flow patterns. With the explicit traffic generation, every packet that has ever been sent by the victim and attacker is formed in the simulation model and travels around strictly following the criteria of time and path that extracted from the real scenario. Thus, the model provides a promising aid in the study of intrusion detection techniques.
Show less
-
Date Issued
-
2005
-
Identifier
-
CFE0000679, ucf:46484
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0000679
-
-
Title
-
SYSTEM IDENTIFICATION AND FAULT DETECTION OF COMPLEX SYSTEMS.
-
Creator
-
Luo, Dapeng, Leonessa, Alexander, University of Central Florida
-
Abstract / Description
-
The proposed research is devoted to devising system identification and fault detection approaches and algorithms for a system characterized by nonlinear dynamics. Mathematical models of dynamical systems and fault models are built based on observed data from systems. In particular, we will focus on statistical subspace instrumental variable methods which allow the consideration of an appealing mathematical model in many control applications consisting of a nonlinear feedback system with...
Show moreThe proposed research is devoted to devising system identification and fault detection approaches and algorithms for a system characterized by nonlinear dynamics. Mathematical models of dynamical systems and fault models are built based on observed data from systems. In particular, we will focus on statistical subspace instrumental variable methods which allow the consideration of an appealing mathematical model in many control applications consisting of a nonlinear feedback system with nonlinearities at both inputs and outputs. Different solutions within the proposed framework are presented to solve the system identification and fault detection problems. Specifically, Augmented Subspace Instrumental Variable Identification (ASIVID) approaches are proposed to identify the closed-loop nonlinear Hammerstein systems. Then fast approaches are presented to determine the system order. Hard-over failures are detected by order determination approaches when failures manifest themselves as rank deficiencies of the dynamical systems. Geometric interpretations of subspace tracking theorems are presented in this dissertation in order to propose a fault tolerance strategy. Possible fields of application considered in this research include manufacturing systems, autonomous vehicle systems, space systems and burgeoning bio-mechanical systems.
Show less
-
Date Issued
-
2006
-
Identifier
-
CFE0000915, ucf:46756
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0000915
-
-
Title
-
CREATING MODELS OF INTERNET BACKGROUND TRAFFIC SUITABLE FOR USE IN EVALUATING NETWORK INTRUSION DETECTION SYSTEMS.
-
Creator
-
LUO, SONG, Marin, Gerald, University of Central Florida
-
Abstract / Description
-
This dissertation addresses Internet background traffic generation and network intrusion detection. It is organized in two parts. Part one introduces a method to model realistic Internet background traffic and demonstrates how the models are used both in a simulation environment and in a lab environment. Part two introduces two different NID (Network Intrusion Detection) techniques and evaluates them using the modeled background traffic. To demonstrate the approach we modeled five major...
Show moreThis dissertation addresses Internet background traffic generation and network intrusion detection. It is organized in two parts. Part one introduces a method to model realistic Internet background traffic and demonstrates how the models are used both in a simulation environment and in a lab environment. Part two introduces two different NID (Network Intrusion Detection) techniques and evaluates them using the modeled background traffic. To demonstrate the approach we modeled five major application layer protocols: HTTP, FTP, SSH, SMTP and POP3. The model of each protocol includes an empirical probability distribution plus estimates of application-specific parameters. Due to the complexity of the traffic, hybrid distributions (called mixture distributions) were sometimes required. The traffic models are demonstrated in two environments: NS-2 (a simulator) and HONEST (a lab environment). The simulation results are compared against the original captured data sets. Users of HONEST have the option of adding network attacks to the background. The dissertation also introduces two new template-based techniques for network intrusion detection. One is based on a template of autocorrelations of the investigated traffic, while the other uses a template of correlation integrals. Detection experiments have been performed on real traffic and attacks; the results show that the two techniques can achieve high detection probability and low false alarm in certain instances.
Show less
-
Date Issued
-
2005
-
Identifier
-
CFE0000852, ucf:46667
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0000852
-
-
Title
-
PERCEPTUAL GROUPING BY CLOSURE IN VISUAL WORKING MEMORY.
-
Creator
-
Neira, Sofia, Neider, Mark, University of Central Florida
-
Abstract / Description
-
Research on visual working memory (VWM) suggests a capacity limit of three to four objects (Luck & Vogel, 1997), but recent studies on the fidelity of VWM capacity for objects indicates that informational bandwidth, which can vary with factors like complexity and amenability to perceptual grouping, can interact with this capacity (Brady, Konkle & Alvarez, 2011). For example, individual features can be grouped into objects for an added benefit in VWM capacity (Xu, 2002). Along these lines, the...
Show moreResearch on visual working memory (VWM) suggests a capacity limit of three to four objects (Luck & Vogel, 1997), but recent studies on the fidelity of VWM capacity for objects indicates that informational bandwidth, which can vary with factors like complexity and amenability to perceptual grouping, can interact with this capacity (Brady, Konkle & Alvarez, 2011). For example, individual features can be grouped into objects for an added benefit in VWM capacity (Xu, 2002). Along these lines, the Gestalt principles of proximity and connectedness have been shown to benefit VWM, although they do not influence capacity equally (Xu 2006; Woodman, Vecera & Luck, 2003). Closure, which has not been investigated for its influence in VWM capacity, is similar to connectedness and proximity as it promotes the perception of a coherent object without physical connections. In the current experiment, we evaluated whether closure produces similar or greater VWM capacity advantages compared to proximity by having participants engage in a change detection task. Four L-shaped features were grouped in tilted clusters to either form an object (closure condition) or not (no-object condition), with a set size of two (8 L features), four (16 L features), or six clusters (24 L features). Following a brief mask (1000 ms), the orientation of one cluster was changed (tilted 25 or -25 degrees) on half the trials. Our results indicate that there was no difference in accuracy or reaction time for the perceptual grouping conditions of closure/no-object, although we did find a main effect for set size and change conditions. Overall, it seems that grouping by closure provides no further advantages to VWM capacity than proximity; however, more experiments need to be conducted to solidify the findings of the current experiment.
Show less
-
Date Issued
-
2016
-
Identifier
-
CFH2000038, ucf:45604
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFH2000038
-
-
Title
-
DIGITAL SIGNAL PROCESSING TECHNIQUES FOR COHERENT OPTICAL COMMUNICATION.
-
Creator
-
Goldfarb, Gilad, Li, Guifang, University of Central Florida
-
Abstract / Description
-
Coherent detection with subsequent digital signal processing (DSP) is developed, analyzed theoretically and numerically and experimentally demonstrated in various fiber‐optic transmission scenarios. The use of DSP in conjunction with coherent detection unleashes the benefits of coherent detection which rely on the preservation of full information of the incoming field. These benefits include high receiver sensitivity, the ability to achieve high spectral‐efficiency and the use of...
Show moreCoherent detection with subsequent digital signal processing (DSP) is developed, analyzed theoretically and numerically and experimentally demonstrated in various fiber‐optic transmission scenarios. The use of DSP in conjunction with coherent detection unleashes the benefits of coherent detection which rely on the preservation of full information of the incoming field. These benefits include high receiver sensitivity, the ability to achieve high spectral‐efficiency and the use of advanced modulation formats. With the immense advancements in DSP speeds, many of the problems hindering the use of coherent detection in optical transmission systems have been eliminated. Most notably, DSP alleviates the need for hardware phase‐locking and polarization tracking, which can now be achieved in the digital domain. The complexity previously associated with coherent detection is hence significantly diminished and coherent detection is once again considered a feasible detection alternative. In this thesis, several aspects of coherent detection (with or without subsequent DSP) are addressed. Coherent detection is presented as a means to extend the dispersion limit of a duobinary signal using an analog decision‐directed phase‐lock loop. Analytical bit‐error ratio estimation for quadrature phase‐shift keying signals is derived. To validate the promise for high spectral efficiency, the orthogonal‐wavelength‐division multiplexing scheme is suggested. In this scheme the WDM channels are spaced at the symbol rate, thus achieving the spectral efficiency limit. Theory, simulation and experimental results demonstrate the feasibility of this approach. Infinite impulse response filtering is shown to be an efficient alternative to finite impulse response filtering for chromatic dispersion compensation. Theory, design considerations, simulation and experimental results relating to this topic are presented. Interaction between fiber dispersion and nonlinearity remains the last major challenge deterministic effects pose for long‐haul optical data transmission. Experimental results which demonstrate the possibility to digitally mitigate both dispersion and nonlinearity are presented. Impairment compensation is achieved using backward propagation by implementing the split‐step method. Efficient realizations of the dispersion compensation operator used in this implementation are considered. Infinite‐impulse response and wavelet‐based filtering are both investigated as a means to reduce the required computational load associated with signal backward‐propagation. Possible future research directions conclude this dissertation.
Show less
-
Date Issued
-
2008
-
Identifier
-
CFE0002384, ucf:47763
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0002384
-
-
Title
-
AUDIO AND VIDEO TEMPO ANALYSIS FOR DANCE DETECTION.
-
Creator
-
Faircloth, Ryan, Shah, Mubarak, University of Central Florida
-
Abstract / Description
-
The amount of multimedia in existence has become so extensive that the organization of this data cannot be performed manually. Systems designed to maintain such quantity need superior methods of understanding the information contained in the data. Aspects of Computer Vision deal with such problems for the understanding of image and video content. Additionally large ontologies such as LSCOM are collections of feasible high-level concepts that are of interest to identify within multimedia...
Show moreThe amount of multimedia in existence has become so extensive that the organization of this data cannot be performed manually. Systems designed to maintain such quantity need superior methods of understanding the information contained in the data. Aspects of Computer Vision deal with such problems for the understanding of image and video content. Additionally large ontologies such as LSCOM are collections of feasible high-level concepts that are of interest to identify within multimedia content. While ontologies often include the activity of dance it has had virtually no coverage in Computer Vision literature in terms of actual detection. We will demonstrate the fact that training based approaches are challenged by dance because the activity is defined by an unlimited set of movements and therefore unreasonable amounts of training data would be required to recognize even a small portion of the immense possibilities for dance. In this thesis we present a non-training, tempo based approach to dance detection which yields very good results when compared to another method with state-of-the-art performance for other common activities; the testing dataset contains videos acquired mostly through YouTube. The algorithm is based on one dimensional analysis in which we perform visual beat detection through the computation of optical flow. Next we obtain a set of tempo hypotheses and the final stage of our method tracks visual beats through a video sequence in order to determine the most likely tempo for the object motion. In this thesis we will not only demonstrate the utility for visual beats in visual tempo detection but we will demonstrate their existence in most of the common activities considered by state-of-the-art methods.
Show less
-
Date Issued
-
2008
-
Identifier
-
CFE0002194, ucf:47900
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0002194
-
-
Title
-
LIDAR IN COASTAL STORM SURGE MODELING: MODELING LINEAR RAISED FEATURES.
-
Creator
-
Coggin, David, Hagen, Scott, University of Central Florida
-
Abstract / Description
-
A method for extracting linear raised features from laser scanned altimetry (LiDAR) datasets is presented. The objective is to automate the method so that elements in a coastal storm surge simulation finite element mesh might have their edges aligned along vertical terrain features. Terrain features of interest are those that are high and long enough to form a hydrodynamic impediment while being narrow enough that the features might be straddled and not modeled if element edges are not...
Show moreA method for extracting linear raised features from laser scanned altimetry (LiDAR) datasets is presented. The objective is to automate the method so that elements in a coastal storm surge simulation finite element mesh might have their edges aligned along vertical terrain features. Terrain features of interest are those that are high and long enough to form a hydrodynamic impediment while being narrow enough that the features might be straddled and not modeled if element edges are not purposely aligned. These features are commonly raised roadbeds but may occur due to other manmade alterations to the terrain or natural terrain. The implementation uses the TauDEM watershed delineation software included in the MapWindow open source Geographic Information System to initially extract watershed boundaries. The watershed boundaries are then examined computationally to determine which sections warrant inclusion in the storm surge mesh. Introductory work towards applying image analysis techniques as an alternate means of vertical feature extraction is presented as well. Vertical feature lines extracted from a LiDAR dataset for Manatee County, Florida are included in a limited storm surge finite element mesh for the county and Tampa Bay. Storm surge simulations using the ADCIRC-2DDI model with two meshes, one which includes linear raised features as element edges and one which does not, verify the usefulness of the method.
Show less
-
Date Issued
-
2008
-
Identifier
-
CFE0002350, ucf:47782
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0002350
-
-
Title
-
Fast Compressed Automatic Target Recognition for a Compressive Infrared Imager.
-
Creator
-
Millikan, Brian, Foroosh, Hassan, Rahnavard, Nazanin, Muise, Robert, Atia, George, Mahalanobis, Abhijit, Sun, Qiyu, University of Central Florida
-
Abstract / Description
-
Many military systems utilize infrared sensors which allow an operator to see targets at night. Several of these are either mid-wave or long-wave high resolution infrared sensors, which are expensive to manufacture. But compressive sensing, which has primarily been demonstrated in medical applications, can be used to minimize the number of measurements needed to represent a high-resolution image. Using these techniques, a relatively low cost mid-wave infrared sensor can be realized which has...
Show moreMany military systems utilize infrared sensors which allow an operator to see targets at night. Several of these are either mid-wave or long-wave high resolution infrared sensors, which are expensive to manufacture. But compressive sensing, which has primarily been demonstrated in medical applications, can be used to minimize the number of measurements needed to represent a high-resolution image. Using these techniques, a relatively low cost mid-wave infrared sensor can be realized which has a high effective resolution. In traditional military infrared sensing applications, like targeting systems, automatic targeting recognition algorithms are employed to locate and identify targets of interest to reduce the burden on the operator. The resolution of the sensor can increase the accuracy and operational range of a targeting system. When using a compressive sensing infrared sensor, traditional decompression techniques can be applied to form a spatial-domain infrared image, but most are iterative and not ideal for real-time environments. A more efficient method is to adapt the target recognition algorithms to operate directly on the compressed samples. In this work, we will present a target recognition algorithm which utilizes a compressed target detection method to identify potential target areas and then a specialized target recognition technique that operates directly on the same compressed samples. We will demonstrate our method on the U.S. Army Night Vision and Electronic Sensors Directorate ATR Algorithm Development Image Database which has been made available by the Sensing Information Analysis Center.
Show less
-
Date Issued
-
2018
-
Identifier
-
CFE0007408, ucf:52739
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0007408
-
-
Title
-
Human Action Detection, Tracking and Segmentation in Videos.
-
Creator
-
Tian, Yicong, Shah, Mubarak, Bagci, Ulas, Liu, Fei, Walker, John, University of Central Florida
-
Abstract / Description
-
This dissertation addresses the problem of human action detection, human tracking and segmentation in videos. They are fundamental tasks in computer vision and are extremely challenging to solve in realistic videos. We first propose a novel approach for action detection by exploring the generalization of deformable part models from 2D images to 3D spatiotemporal volumes. By focusing on the most distinctive parts of each action, our models adapt to intra-class variation and show robustness to...
Show moreThis dissertation addresses the problem of human action detection, human tracking and segmentation in videos. They are fundamental tasks in computer vision and are extremely challenging to solve in realistic videos. We first propose a novel approach for action detection by exploring the generalization of deformable part models from 2D images to 3D spatiotemporal volumes. By focusing on the most distinctive parts of each action, our models adapt to intra-class variation and show robustness to clutter. This approach deals with detecting action performed by a single person. When there are multiple humans in the scene, humans need to be segmented and tracked from frame to frame before action recognition can be performed. Next, we propose a novel approach for multiple object tracking (MOT) by formulating detection and data association in one framework. Our method allows us to overcome the confinements of data association based MOT approaches, where the performance is dependent on the object detection results provided at input level. We show that automatically detecting and tracking targets in a single framework can help resolve the ambiguities due to frequent occlusion and heavy articulation of targets. In this tracker, targets are represented by bounding boxes, which is a coarse representation. However, pixel-wise object segmentation provides fine level information, which is desirable for later tasks. Finally, we propose a tracker that simultaneously solves three main problems: detection, data association and segmentation. This is especially important because the output of each of those three problems are highly correlated and the solution of one can greatly help improve the others. The proposed approach achieves more accurate segmentation results and also helps better resolve typical difficulties in multiple target tracking, such as occlusion, ID-switch and track drifting.
Show less
-
Date Issued
-
2018
-
Identifier
-
CFE0007378, ucf:52069
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0007378
-
-
Title
-
Guided Autonomy for Quadcopter Photography.
-
Creator
-
Alabachi, Saif, Sukthankar, Gita, Behal, Aman, Lin, Mingjie, Boloni, Ladislau, Laviola II, Joseph, University of Central Florida
-
Abstract / Description
-
Photographing small objects with a quadcopter is non-trivial to perform with many common user interfaces, especially when it requires maneuvering an Unmanned Aerial Vehicle (C) to difficult angles in order to shoot high perspectives. The aim of this research is to employ machine learning to support better user interfaces for quadcopter photography. Human Robot Interaction (HRI) is supported by visual servoing, a specialized vision system for real-time object detection, and control policies...
Show morePhotographing small objects with a quadcopter is non-trivial to perform with many common user interfaces, especially when it requires maneuvering an Unmanned Aerial Vehicle (C) to difficult angles in order to shoot high perspectives. The aim of this research is to employ machine learning to support better user interfaces for quadcopter photography. Human Robot Interaction (HRI) is supported by visual servoing, a specialized vision system for real-time object detection, and control policies acquired through reinforcement learning (RL). Two investigations of guided autonomy were conducted. In the first, the user directed the quadcopter with a sketch based interface, and periods of user direction were interspersed with periods of autonomous flight. In the second, the user directs the quadcopter by taking a single photo with a handheld mobile device, and the quadcopter autonomously flies to the requested vantage point.This dissertation focuses on the following problems: 1) evaluating different user interface paradigms for dynamic photography in a GPS-denied environment; 2) learning better Convolutional Neural Network (CNN) object detection models to assure a higher precision in detecting human subjects than the currently available state-of-the-art fast models; 3) transferring learning from the Gazebo simulation into the real world; 4) learning robust control policies using deep reinforcement learning to maneuver the quadcopter to multiple shooting positions with minimal human interaction.
Show less
-
Date Issued
-
2019
-
Identifier
-
CFE0007774, ucf:52369
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0007774
-
-
Title
-
Action Recognition, Temporal Localization and Detection in Trimmed and Untrimmed Video.
-
Creator
-
Hou, Rui, Shah, Mubarak, Mahalanobis, Abhijit, Hua, Kien, Sukthankar, Rahul, University of Central Florida
-
Abstract / Description
-
Automatic understanding of videos is one of the most active areas of computer vision research. It has applications in video surveillance, human computer interaction, video sports analysis, virtual and augmented reality, video retrieval etc. In this dissertation, we address four important tasks in video understanding, namely action recognition, temporal action localization, spatial-temporal action detection and video object/action segmentation. This dissertation makes contributions to above...
Show moreAutomatic understanding of videos is one of the most active areas of computer vision research. It has applications in video surveillance, human computer interaction, video sports analysis, virtual and augmented reality, video retrieval etc. In this dissertation, we address four important tasks in video understanding, namely action recognition, temporal action localization, spatial-temporal action detection and video object/action segmentation. This dissertation makes contributions to above tasks by proposing. First, for video action recognition, we propose a category level feature learning method. Our proposed method automatically identifies such pairs of categories using a criterion of mutual pairwise proximity in the (kernelized) feature space, and a category-level similarity matrix where each entry corresponds to the one-vs-one SVM margin for pairs of categories. Second, for temporal action localization, we propose to exploit the temporal structure of actions by modeling an action as a sequence of sub-actions and present a computationally efficient approach. Third, we propose 3D Tube Convolutional Neural Network (TCNN) based pipeline for action detection. The proposed architecture is a unified deep network that is able to recognize and localize action based on 3D convolution features. It generalizes the popular faster R-CNN framework from images to videos. Last, an end-to-end encoder-decoder based 3D convolutional neural network pipeline is proposed, which is able to segment out the foreground objects from the background. Moreover, the action label can be obtained as well by passing the foreground object into an action classifier. Extensive experiments on several video datasets demonstrate the superior performance of the proposed approach for video understanding compared to the state-of-the-art.
Show less
-
Date Issued
-
2019
-
Identifier
-
CFE0007655, ucf:52502
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0007655
-
-
Title
-
detecting anomalies from big data system logs.
-
Creator
-
Lu, Siyang, Wang, Liqiang, Zhang, Shaojie, Zhang, Wei, Wu, Dazhong, University of Central Florida
-
Abstract / Description
-
Nowadays, big data systems (e.g., Hadoop and Spark) are being widely adopted by many domains for offering effective data solutions, such as manufacturing, healthcare, education, and media. A common problem about big data systems is called anomaly, e.g., a status deviated from normal execution, which decreases the performance of computation or kills running programs. It is becoming a necessity to detect anomalies and analyze their causes. An effective and economical approach is to analyze...
Show moreNowadays, big data systems (e.g., Hadoop and Spark) are being widely adopted by many domains for offering effective data solutions, such as manufacturing, healthcare, education, and media. A common problem about big data systems is called anomaly, e.g., a status deviated from normal execution, which decreases the performance of computation or kills running programs. It is becoming a necessity to detect anomalies and analyze their causes. An effective and economical approach is to analyze system logs. Big data systems produce numerous unstructured logs that contain buried valuable information. However manually detecting anomalies from system logs is a tedious and daunting task.This dissertation proposes four approaches that can accurately and automatically analyze anomalies from big data system logs without extra monitoring overhead. Moreover, to detect abnormal tasks in Spark logs and analyze root causes, we design a utility to conduct fault injection and collect logs from multiple compute nodes. (1) Our first method is a statistical-based approach that can locate those abnormal tasks and calculate the weights of factors for analyzing the root causes. In the experiment, four potential root causes are considered, i.e., CPU, memory, network, and disk I/O. The experimental results show that the proposed approach is accurate in detecting abnormal tasks as well as finding the root causes. (2) To give a more reasonable probability result and avoid ad-hoc factor weights calculating, we propose a neural network approach to analyze root causes of abnormal tasks. We leverage General Regression Neural Network (GRNN) to identify root causes for abnormal tasks. The likelihood of reported root causes is presented to users according to the weighted factors by GRNN. (3) To further improve anomaly detection by avoiding feature extraction, we propose a novel approach by leveraging Convolutional Neural Networks (CNN). Our proposed model can automatically learn event relationships in system logs and detect anomaly with high accuracy. Our deep neural network consists of logkey2vec embeddings, three 1D convolutional layers, a dropout layer, and max pooling. According to our experiment, our CNN-based approach has better accuracy compared to other approaches using Long Short-Term Memory (LSTM) and Multilayer Perceptron (MLP) on detecting anomaly in Hadoop DistributedFile System (HDFS) logs. (4) To analyze system logs more accurately, we extend our CNN-based approach with two attention schemes to detect anomalies in system logs. The proposed two attention schemes focus on different features from CNN's output. We evaluate our approaches with several benchmarks, and the attention-based CNN model shows the best performance among all state-of-the-art methods.
Show less
-
Date Issued
-
2019
-
Identifier
-
CFE0007673, ucf:52499
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0007673
Pages