1 / 32

February 10, 2012

An Overview of Research Activities in Mathematics and Computer Science Related to the Proposed Center for Secure Technologies. February 10, 2012. Introduction. Math/CS joint department Currently 6 CS faculty, 10 Math faculty Currently search for 2 CS, 1 Math

moshe
Download Presentation

February 10, 2012

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. An Overview of Research Activities in Mathematics and Computer Science Related to the Proposed Center for Secure Technologies February 10, 2012

  2. Introduction • Math/CS joint department • Currently 6 CS faculty, 10 Math faculty • Currently search for 2 CS, 1 Math • ABET accredited CS program since 1992 • Curriculum: strong math • Calc 1, 2, 3, Diff, Linear Algebra, Discrete, Statistics • Scientific computing, modeling, abstract algebra based cryptography • Curriculum : hardware component • Digital systems, assembly language, architecture • Curriculum : Software development • Strong coding, algorithm development

  3. Introductioncont. • Graduate program in Computational Sciences and Robotics • robotics, autonomous systems, Parallel, AI, image processing, pattern recognition • Agenda : 12:00 – 12:05 Introduction (Toni Logar) 12:05 – 12:12  Ed Corwin 12:12 – 12:20  Mengyu Qiao 12:20 – 12:28  John Weiss 12:28 – 12:36  Kyle Caudle 12:36 – 12:44  Jeff McGough 12:44 – 12:50  Last comments and questions - TL

  4. An Overview of Research Activities Dr. Antonette (Toni) Logar, Professor Department of Mathematics and Computer Science SDSM&T Antonette.Logar@sdsmt.edu (605) 394-2475 / 2471 (secretary) (605) 394-1761/ 1771 (secretary)

  5. An Overview of Research Activities Professor Edward Corwin, Math/CS Ph.D. in Mathematics, Lehigh University [Algebraic Number Theory] Ph.D. in Computer Science, Texas Tech University [Neural Networks]

  6. Recent Research Focus Current Work with Center for Friction Stir Processing • Pattern recognition • Currently analyzing feedback signals from Friction Stir Welding to assess weld quality • Previous work included satellite image processing and cloud recognition • Similar problems will exist with the effort to mark objects for authentication

  7. Techniques Used Current Work with Center for Friction Stir Processing • Neural Networks • Fourier Transform • Phase Space Analysis

  8. Mathematical Interests Related to Project • Number Theoretic Applications in Cryptography • Number theoretic analysis of security of encryption algorithms • Theory and implementation of common encryption systems : RSA, AES, DES etc. • Factoring algorithms • Mathematical analysis of attacks • Algorithms based on the Discrete logarithm problem • Digital signature generation and verification

  9. An Overview of Research Activities Assistant Professor Mengyu Qiao, Math/CS X6077 Ph.D. in Computer Science

  10. Research Area #1Steganography & Steganalysis • Information hiding and detection in Temporal/ Spatial domain, and various transform domains, such as DCT, DWT, FFT • Online/offline signal analysis and feature mining for multimedia stream and file • Target multimedia formats • Image (Uncompressed: BMP, TIFF; Compressed: JPG, GIF, etc.) • Audio (Uncompressed: WAV; Compressed: MP3, WMA) • Video (Uncompressed: AVI; Compressed: MPG, H.264) Others TCP/IP packets Images Videos Audios

  11. Research Area #2Digital Forensics • Multimedia manipulation detection • Copy-move forgery • Deletion and insertion • Substitution and splicing • Double compression • Given a multimedia file without any comparison reference, identify forgery and locate tampered areas • Identify acquisition sensor’s fingerprint and multimedia processing pattern • Application areas: Digital evidence, IP protection

  12. Research Area #3More Security Related Projects • Web and email phishing detection • Mobile database security Collaborative research on security related projects with researchers at New Mexico Tech and Sam Houston State University • New Mexico Tech is a National Center of Excellence in Information Assurance Education and Research (CAE and CAE-R) designated by NSA and DHS

  13. Research Area #4Other Research Interests • Bioinformatics • Mass Spectrometry of Proteomics • DNA Microarray • Wireless / Mobile networks • Mobility and Resource Management • Intelligent Network • Fault-tolerant computing • Machine learning and pattern recognition

  14. Detection and Recognition of Security Codes Dr. John Weiss, Professor Department of Mathematics and Computer Science SDSM&T John.Weiss@sdsmt.edu

  15. Security printing Print security codes on materials Codes are invisible under ambient light conditions, but visible under special illumination Image acquisition: near-IR diode lasers Goal: robust verification of security codes in real time

  16. Sample security code image* * Kellar et al, Security Printing presentation, Jan 2012

  17. Security code image characteristics • Noise • Low contrast • Scale • Orientation

  18. Symbol Detection Approaches Template matching Based on correlation Slow Sensitive to changes in scale and orientation Hough Transform Voting algorithm that finds parametric curves and general shapes in an image Much faster than template matching Can be made independent of scale and orientation

  19. General Hough transform IARC symbol detection accumulator array

  20. Scale and orientation independence IARC symbol detection: match to template of 50% smaller size accumulator array

  21. Insensitivity to noise

  22. Algorithm timings Method Average time to process a single frame (seconds) Frames per second Standard template matching 6.13 0.16 Hierarchical correlation 0.444 2.25 Hierarchical correlation* 0.502 2.00 Generalized Hough 0.020 50 Circular Hough 0.014 71 * three template sizes

  23. An Overview of Research Activities Assistant Professor Kyle Caudle, Math/CS X6034 Ph.D. in Computational Statistics (George Mason University)

  24. Research Focus Area #1 Joint work with Researchers at the U.S. Naval Academy & George Mason University • Non-parametric statistics • Streaming data – Statistics are updated on a near real time basis • Detection of changes in data stream • Application areas • Network intrusion detection • Mining data streams (ATM Transactions, web searches, sensor data) • Anomaly detection within the data stream

  25. Research Focus Area #2 Joint work with Michael Frey at Bucknell University • Time Series Forecasting (Flow Field Forecasting) • Initial application was fully automated software used to predict Network Performance Characteristics (delay, packet loss and bandwidth utilization) • Software is currently installed on the dedicated internet at the Dept. of Energy • Application areas • Robotics • Network health monitoring • Load balancing

  26. Research Focus Area #3 Joint work with Kazem Sohraby at SDSMT & Black Hills Power Company • Reliability Analysis/Reliability Centered Maintenance (RCM) • Modeling weather based power outages in the Black Hills area • Cost benefit analysis of lightning mitigation effects • Previous work with Naval Sea System Command predicting Surface Ship Maintenance Requirements for future POM budget cycles

  27. An Overview of Research Activities Dr. Jeff McGough, Assoc. Professor Department of Mathematics and Computer Science SDSM&T Jeff.McGough@sdsmt.edu

  28. Vision • QR Codes and April Tags • Location and orientation • Localization and Navigation • Navigation for the blind • Map registration • SLAM – Simultaneous Localization and Mapping • Path Planning

  29. Evolutionary Computation • Biologically inspired computation • Intrinsically parallel – computationally intensive • Evolution of Lyapunov functions for nonlinear controls • Evolution of basis functions for system identification • Evolution of recurrent neural nets for robot control

  30. Reaction Diffusion Eqns • Partial Differential Equations • PDEs with Fractal Order Derivatives • Not Intrinsically Parallel • Models for complicated domains • Filters based on Fractional PDEs • Segmentation of non-smooth structures • Image Filters

  31. Thank You • We will send this presentation to everyone • Questions?

  32. So you can remember who we are…Toni Logar Ed Corwin John WeissJeff McGough Mengyu Qiao Kyle Caudle

More Related