320 likes | 401 Views
An Overview of Research Activities in Mathematics and Computer Science Related to the Proposed Center for Secure Technologies. February 10, 2012. Introduction. Math/CS joint department Currently 6 CS faculty, 10 Math faculty Currently search for 2 CS, 1 Math
E N D
An Overview of Research Activities in Mathematics and Computer Science Related to the Proposed Center for Secure Technologies February 10, 2012
Introduction • Math/CS joint department • Currently 6 CS faculty, 10 Math faculty • Currently search for 2 CS, 1 Math • ABET accredited CS program since 1992 • Curriculum: strong math • Calc 1, 2, 3, Diff, Linear Algebra, Discrete, Statistics • Scientific computing, modeling, abstract algebra based cryptography • Curriculum : hardware component • Digital systems, assembly language, architecture • Curriculum : Software development • Strong coding, algorithm development
Introductioncont. • Graduate program in Computational Sciences and Robotics • robotics, autonomous systems, Parallel, AI, image processing, pattern recognition • Agenda : 12:00 – 12:05 Introduction (Toni Logar) 12:05 – 12:12 Ed Corwin 12:12 – 12:20 Mengyu Qiao 12:20 – 12:28 John Weiss 12:28 – 12:36 Kyle Caudle 12:36 – 12:44 Jeff McGough 12:44 – 12:50 Last comments and questions - TL
An Overview of Research Activities Dr. Antonette (Toni) Logar, Professor Department of Mathematics and Computer Science SDSM&T Antonette.Logar@sdsmt.edu (605) 394-2475 / 2471 (secretary) (605) 394-1761/ 1771 (secretary)
An Overview of Research Activities Professor Edward Corwin, Math/CS Ph.D. in Mathematics, Lehigh University [Algebraic Number Theory] Ph.D. in Computer Science, Texas Tech University [Neural Networks]
Recent Research Focus Current Work with Center for Friction Stir Processing • Pattern recognition • Currently analyzing feedback signals from Friction Stir Welding to assess weld quality • Previous work included satellite image processing and cloud recognition • Similar problems will exist with the effort to mark objects for authentication
Techniques Used Current Work with Center for Friction Stir Processing • Neural Networks • Fourier Transform • Phase Space Analysis
Mathematical Interests Related to Project • Number Theoretic Applications in Cryptography • Number theoretic analysis of security of encryption algorithms • Theory and implementation of common encryption systems : RSA, AES, DES etc. • Factoring algorithms • Mathematical analysis of attacks • Algorithms based on the Discrete logarithm problem • Digital signature generation and verification
An Overview of Research Activities Assistant Professor Mengyu Qiao, Math/CS X6077 Ph.D. in Computer Science
Research Area #1Steganography & Steganalysis • Information hiding and detection in Temporal/ Spatial domain, and various transform domains, such as DCT, DWT, FFT • Online/offline signal analysis and feature mining for multimedia stream and file • Target multimedia formats • Image (Uncompressed: BMP, TIFF; Compressed: JPG, GIF, etc.) • Audio (Uncompressed: WAV; Compressed: MP3, WMA) • Video (Uncompressed: AVI; Compressed: MPG, H.264) Others TCP/IP packets Images Videos Audios
Research Area #2Digital Forensics • Multimedia manipulation detection • Copy-move forgery • Deletion and insertion • Substitution and splicing • Double compression • Given a multimedia file without any comparison reference, identify forgery and locate tampered areas • Identify acquisition sensor’s fingerprint and multimedia processing pattern • Application areas: Digital evidence, IP protection
Research Area #3More Security Related Projects • Web and email phishing detection • Mobile database security Collaborative research on security related projects with researchers at New Mexico Tech and Sam Houston State University • New Mexico Tech is a National Center of Excellence in Information Assurance Education and Research (CAE and CAE-R) designated by NSA and DHS
Research Area #4Other Research Interests • Bioinformatics • Mass Spectrometry of Proteomics • DNA Microarray • Wireless / Mobile networks • Mobility and Resource Management • Intelligent Network • Fault-tolerant computing • Machine learning and pattern recognition
Detection and Recognition of Security Codes Dr. John Weiss, Professor Department of Mathematics and Computer Science SDSM&T John.Weiss@sdsmt.edu
Security printing Print security codes on materials Codes are invisible under ambient light conditions, but visible under special illumination Image acquisition: near-IR diode lasers Goal: robust verification of security codes in real time
Sample security code image* * Kellar et al, Security Printing presentation, Jan 2012
Security code image characteristics • Noise • Low contrast • Scale • Orientation
Symbol Detection Approaches Template matching Based on correlation Slow Sensitive to changes in scale and orientation Hough Transform Voting algorithm that finds parametric curves and general shapes in an image Much faster than template matching Can be made independent of scale and orientation
General Hough transform IARC symbol detection accumulator array
Scale and orientation independence IARC symbol detection: match to template of 50% smaller size accumulator array
Algorithm timings Method Average time to process a single frame (seconds) Frames per second Standard template matching 6.13 0.16 Hierarchical correlation 0.444 2.25 Hierarchical correlation* 0.502 2.00 Generalized Hough 0.020 50 Circular Hough 0.014 71 * three template sizes
An Overview of Research Activities Assistant Professor Kyle Caudle, Math/CS X6034 Ph.D. in Computational Statistics (George Mason University)
Research Focus Area #1 Joint work with Researchers at the U.S. Naval Academy & George Mason University • Non-parametric statistics • Streaming data – Statistics are updated on a near real time basis • Detection of changes in data stream • Application areas • Network intrusion detection • Mining data streams (ATM Transactions, web searches, sensor data) • Anomaly detection within the data stream
Research Focus Area #2 Joint work with Michael Frey at Bucknell University • Time Series Forecasting (Flow Field Forecasting) • Initial application was fully automated software used to predict Network Performance Characteristics (delay, packet loss and bandwidth utilization) • Software is currently installed on the dedicated internet at the Dept. of Energy • Application areas • Robotics • Network health monitoring • Load balancing
Research Focus Area #3 Joint work with Kazem Sohraby at SDSMT & Black Hills Power Company • Reliability Analysis/Reliability Centered Maintenance (RCM) • Modeling weather based power outages in the Black Hills area • Cost benefit analysis of lightning mitigation effects • Previous work with Naval Sea System Command predicting Surface Ship Maintenance Requirements for future POM budget cycles
An Overview of Research Activities Dr. Jeff McGough, Assoc. Professor Department of Mathematics and Computer Science SDSM&T Jeff.McGough@sdsmt.edu
Vision • QR Codes and April Tags • Location and orientation • Localization and Navigation • Navigation for the blind • Map registration • SLAM – Simultaneous Localization and Mapping • Path Planning
Evolutionary Computation • Biologically inspired computation • Intrinsically parallel – computationally intensive • Evolution of Lyapunov functions for nonlinear controls • Evolution of basis functions for system identification • Evolution of recurrent neural nets for robot control
Reaction Diffusion Eqns • Partial Differential Equations • PDEs with Fractal Order Derivatives • Not Intrinsically Parallel • Models for complicated domains • Filters based on Fractional PDEs • Segmentation of non-smooth structures • Image Filters
Thank You • We will send this presentation to everyone • Questions?
So you can remember who we are…Toni Logar Ed Corwin John WeissJeff McGough Mengyu Qiao Kyle Caudle