Computer Engineering
Permanent URI for this collectionhttps://hdl.handle.net/20.500.12475/57
Browse
Item R: Color Package(Polytechnic University of Puerto Rico, 2009) Rivera Negrón, Eurípides; Duffany, JeffreyAbstract - R is a software language mostly used of statistical and mathematical purporses. R capabilities are extended by user’s submitted packages. The gColor Package provides R Language a method to solve Systems of Inequation (represented as a matrix) in files created by the Discrete Mathematics and Theoretical Computer Science (SIMACS). The advantange of the gColor Package is the import fo DIMACS files which supports compress (binary) and uncompress (ASCII) format, currently not available in R Language,and the conversion of the data imported from vertices and edges into a an adjacency matrix; allowing users to import graphs from other systems and use it as a matrix object. This document is divided in four sections. The Introduction provides and overviedw of the problem and the justification to the development of this project. The R Language brings an introduction to R. The system of Inequation explains briefly what is it and how can be representd in R. The gColor Package explains the structure of the package. How the package was build and integrated with R is explained in section Building the Package. Key Terms - ASCII, CRAN, DIMACS, Dynamic Link Library (DLL)Item An Overview to Digital Forensics Tools(Polytechnic University of Puerto Rico, 2010) Blakely Santiago, Waldemar; Duffany, JeffreyThis paper is in support of seven newly created tutorials, focused on different digital forensic analysis tools. The tutorials are intended as in-class laboratory exercise for the computer forensics classes at the Polytechnic University of Puerto Rico. These tutorials are specifically designed to provide basic understanding on the functionalities and capabilities of each particular digital forensic tool. The seven tutorials will serve as a starting point for new users to explore and acquire knowledge in the computer forensics field. Forensic analysis tools are currently been used by law enforcement, private forensic investigators and particular individuals to recover evidence, company files or personal files from specifics electronic medias. The correct use of digital forensics tools is a key factor in the recovery, authentication and analysis phase of electronic data. The newly created tutorials provide examples of the examination phases of electronic media and digital data. Key Terms - Data Recovery, Electronic Data, Forensics, Storage Device, Tutorial.Item Performance @ppraisal: Using Empirical Data to Evaluate Job Performance(Polytechnic University of Puerto Rico, 2010) Aponte-Lucena, José A.; Sobrino, EduardoThe Performance @ppraisal is a threetier web application implemented in the U. S. Probation Office for the District of Puerto Rico to evaluate the job performance of their staff using empirical data extracted from external data sources. It was implemented using the ModelView-Controller (MVC) design pattern in PHP. The main objective is to present a robust software design, and an implementation with source code easy to understand and maintain. This publication is presented as a Project in Internet Engineering of the Polytechnic University of Puerto Rico. Key Terms - Appraisal, Controller, Evaluation, Model, MVC, MySQL, Performance, PHP, View.Item Development of software support tools for social work professionals(Polytechnic University of Puerto Rico, 2010) Díaz, Elliot; Rodríguez Jiménez, OthonielThe objective of this project was to identify the general needs of social work professionals and use the software engineering process to develop these much needed software support tools. The primary needs identified were storage and fast retrieval of data, inventory management, schedule management, and security. The Waterfall Model of software development was used throughout the project. A detailed requirements and design analysis were performed. Microsoft’s VB.,ET programming environment and Oracle’s MySQL database were chosen for the project. Unified Modeling Language's (UML) use cases, class diagrams, and relational model diagrams were used to aid in the development process. The process was documented following IBM's Rational Unified Process (RUP) documentation style. The source code was fully documented tested. The tests performed included configuration, performance, load, functional and database integrity testing. All the tests were successful in the sense that either no defects were found or the defects found were successfully removed. Key Terms - Social work, software development, software engineering, Waterfall Model.Item Hacking Facebook Privacy and Security(Polytechnic University of Puerto Rico, 2011) Galban, Omar; Duffany, JeffreyAbstract ⎯ When people talk about hacking and social networks, they're not referring to the common definition of hacking, which is using malicious code or backdoors in computer networks to damage systems or steal proprietary information. Hacking into social networks requires very little technical skill. It's much more of a psychological game using information on personal profiles to win a complete stranger's trust. Facebook offer privacy settings for their users but they don’t the give the users a simple and easier way to edit them or use them. Key Terms ⎯ Facebook, Privacy, Security, Social NetworkItem Computer Forensic Laboratory for the Polytechnic University of Puerto Rico(Polytechnic University of Puerto Rico, 2011) González Acevedo, Carlos J.; Duffany, JeffreyAbstract ⎯ Computer Forensic is the discipline that combines elements of law and computer science to collect and analyze data from computer systems, networks, wireless communications, and storage devices in a way that is admissible as evidence in a court of law, was define computer forensic. The legal and technical aspects of computer forensics will help you capture vital information if your network is compromised, will help you ensure the overall integrity and survivability of your network infrastructure and you prosecute the case if the intruder is caught. Security professionals need to consider their policy decisions and technical actions in the context of existing laws. This paper presents the design and implementation of an experimental Computer Security and Forensic Analysis (CSFA) laboratory and the tools associated with it for the University. The laboratory is envisioned to be a training facility for future computer security professionals. Key Terms ⎯ Computer, Forensic, Software, Tools.Item Steganography and Steganalysis in Digital Images(Polytechnic University of Puerto Rico, 2011) Cruz Vélez, Marcus D.; Duffany, JeffreyAbstract ⎯ Steganography (from the Greek for "covered writing") is the secret transmission of a message. Its main distinction from encryption relies on the capacity of making a message altogether invisible. A steganographic message may also be encrypted, for extra security in the case of interception but it actually may not be needed. Steganography has an advantage, it becomes difficult to decipher more than encrypted messages even for a talented code-cracker, simply because it cannot decipher a message since it doesn’t know it is there. This is when steganalysis come into place by detecting a hidden message in an image and identifying the algorithms employed in order to view these “secrets”. We describe different steganography tools, how they work and examine which are more susceptible to be detected when analyzed. Key Terms ⎯ Least Significant Bit (LSB), Steganography, Steganalysis, Stegogramme.Item Introduction to Forensics and the use of the Helix free Forensic Tool(Polytechnic University of Puerto Rico, 2012) Maldonado Rodríguez, Michelle; Duffany, JeffreyAbstract - This paper was created to complement a helix tutorial that was created as an introduction into the world of forensics. For someone who would like to get started practicing computer forensics it might be a little overwhelming. There are many different tools, and techniques. Each tool will provide different capabilities and will affect the suspect system differently. Some tools can be very expensive, but there are many tools available which are free and fairly complete. The Helix tool is very robust and free of charge. The tutorial consists of a series of laboratories. Each of the laboratories will cover a different functionality provided by the Helix tool, guiding the reader in his discovery process. The goal is to provide a simple introduction into the world of forensics and to provide the reader with not just the theory but the hands on experience that every beginner is sure to need. Key Terms - Electronic Data, Forensics, Cyberforensics, live system.Item Tutorials of how to use Metasploit, Nessus and Nmap(Polytechnic University of Puerto Rico, 2012) Adames Méndez, Obed A.; Duffany, JeffreyAbstract - This paper is in support of three newly created tutorials, focused on different Security and Penetration testing tools. The tutorials have been selected to cover three different areas in the security and penetration field. These tutorials are will provide basic understanding on the functionalities and capabilities of each particular tool. Currently there are many different ways to protect our systems. However none of them are 100% secure. We may have severe vulnerabilities in our system and may not be aware of it. Testing our systems for vulnerabilities is something that we should not overlook. The purposed of these tutorials is to give an overview of the free security tools that are available and that we can use to verify the integrity and the security of a network. We will also demonstrate how vulnerabilities can be exploited using this tools. Key Terms - Computer Security, Network Scan, Penetration Testing, Vulnerability.Item My Real Estate Web-Application(Polytechnic University of Puerto Rico, 2012) Garrote Aparicio, Andrés; Duffany, JeffreyThis report is focused on explaining the aim of the My Real Estate web application. Details about the decisions made about the design and development of the tool with the capability to integrate the different tasks that are generally done when buying a property will be discussed. This paper is aimed to the end user who can be the system administrator or future users of the application. Real estate is at a key moment for buyers and properties analysis and comparisons are a key factor to distinguish between a good deal and a bad one. The objective of this report is to demonstrate how de developed application facilitates the monitoring of the real estate market and the decision-making when buying a property. Key Terms: AJAX, Real Estate, Web-Application, Web ScrapingItem An Overview to BackTrack Penetrations Tools(Polytechnic University of Puerto Rico, 2012) Grau Ortiz, Keiny J.; Duffany, JeffreyAbstract - This paper is in support of a newly created tutorial, focused on different penetration and vulnerabilities tools. These tutorials are specifically designed to provide basic understanding on the functionalities and capabilities of each particular tool. These tools are widely used by computer security personnel, and can be found as a freeware on internet. The use of these tools permits those who work with them to test the reliability of any network. This document contains a brief introduction to each tool, its capabilities and some examples of the results after being use. Key Terms- BackTrack 5, Linux, Penetration Tools, SecurityItem A Forensic Memory Image Acquisition Protocol Based on Windows Memory Analysis(Polytechnic University of Puerto Rico, 2012) de la Cruz Echeandía, José R.; Duffany, JeffreyComputer Forensics has become an extremely important evidence gathering and analysis field in the modern electronic driven world. Most of the evidence acquired, preserved, processed and analyzed originates from long term storage media. The importance of obtaining a forensic memory image has grown in importance in order to support the evidence analysis and obtain correct and irrefutable results. This project has developed a memory acquisition protocol that provides forensic examiners with the necessary tools to complete a comprehensive investigation. The protocol developed, which is targeted at the acquisition step of the evidence collection process, is based on memory analysis. Including memory as a data source empowers the analyst with context information that can be used to enhance the analysis of evidence extracted from long term storage media. Key Terms - Computer Forensics, Computer Forensics Protocols, Digital Forensics, Memory Analysis.Item Parallel Evaluation of Large Scale Hierarchical Clustering Results(Polytechnic University of Puerto Rico, 2012) Cruz Rodríguez, David; Vicente, Luis M.Abstract ⎯ Data clustering refers to the automatic grouping of object based on their similarity, i.e., similar objects should be in the same group and dissimilar objects should be in different groups. In particular, for hierarchical clustering algorithms there is also the notion of a hierarchy in which the objects and the cluster fit. Clustering is a fundamental task in data mining, machine learning, information retrieval, bioinformatics, and image analysis, among others. It is important to evaluate the result of clustering algorithms. However most evaluations approaches are geared towards nonhierarchical clustering approaches; this research explores how to use traditional validity measures to evaluate and assess hierarchical clustering results. Key Terms ⎯ Clustering, Data Clustering, Hierarchical Clustering, and Validity Measures.Item Optimizing the Method for Finding an Optimal Solution of a Constraint Satisfaction Problem(Polytechnic University of Puerto Rico, 2012) Pagán, Andrew; Duffany, JeffreyAbstract — Constraint satisfaction problems are the subject of intense research in both artificial intelligence and operations research. They are mathematical problems defined as a set of objects whose state must satisfy a number of constraints or limitations. Often, they exhibit high complexity, requiring a combination of heuristics and combinatorial search methods to be solved in a reasonable time. Most optimal solutions for a constraint satisfaction problem are found by a standard substitution and elimination technique, similar to the procedure used to solve systems of equations, with the decision function f(A)=max(A2). However, this method involves squaring the A matrix after each substitution, making it time consuming for larger matrices. This can be remedied using a different method that only requires A to be squared once, and subsequently updated thereafter. Key Terms - Algorithm, Complexity, Constraint, Matrix.Item Electric Charge Trajectory Simulation: A High Performance Computing Approach(Polytechnic University of Puerto Rico, 2012) Medina Delgado, José R.; Masalmah, Yahya M.Abstract ⎯ A computational model for representing an Electric Charge Trajectory within a magnetic field can be used to establish the basis for further development and research on the plasma physics domain. Regardless the mathematical models used for such simulations, constraints are always present. Particularly in terms of accuracy of the output, time for processing, and amount of information. This paper presents a comparison between three processing models on a Windows HPC environment using: MPI, Microsoft Task Parallel Library, and simple programming. By using concepts of object oriented programming with C#, high performance computing with parallel processing, and system integration with ParaView or MATLAB for scientific visualization, an entire solution is provided to help on understanding the basis for plasma physics by means of a high capacity computer simulation. Key Terms ⎯ Object Oriented Software Design, Parallel Processing, ParaView, Plasma Physics.Item Performance Evaluation System Web-Application(Polytechnic University of Puerto Rico, 2012) González Hernández, Joselyn; Duffany, JeffreyAbstract - This report is focused on explaining the aim of the web tool Performance Evaluation System in an enterprise environment. We will have details of why the decision was taken to design and develop a tool with the capability to integrate the different tasks that generally do the Human Resources department and supervisors. This paper is aimed to the end user who can be the system administrator, supervisor or the human resources representative. Performance evaluations currently occupy a very important role in the companies, it is common to use employee evaluations conducted in the past to provide opportunities for them to growth within the company, opportunities that are aligned with company and employee goals. The objective of this report is to demonstrate how technology facilitates the monitoring of one of the most important and critical processes of the company, the performance evaluations. Also other advantages like predefined reports, user management and standardization of formats will be discussed. Key Terms - ASP.Net, Objective, Performance Evaluation, Web-ApplicationItem Multithreading & Sequence Validation Algorithm: Solving Cryptarithmetic Problems(Polytechnic University of Puerto Rico, 2012) Díaz Muñiz, Orlando; Cruz, AlfredoAbstract - Cryptarithmetic problems are mathematical equations of unknown numbers that are represented by letters. The goal is to identify the number that represents each letter. There are algorithms that provide a simple way to solve such problems which has a big search space even for quite small problems. We propose a solution to this problem with sequence validation algorithm in parallel with optimization using multithreading technique. We have develop a program to implement this algorithm using C Sharp, as programing language, and showed that the algorithm reaches a solution, applying sequence validation and multithreading techniques, faster than using single thread. Key Terms - Cryptarithmetic, Sequence Validation, Verbal ArithmeticItem Audio Fingerprinting with Robustness to Pitch Scaling and Time Stretching(Polytechnic University of Puerto Rico, 2013) Díaz Millet, Yesenia; Duffany, JeffreyCurrent audio fingerprinting systems are becoming increasingly robust against noise and filter distortions, however songs that have been pitch scaled and time stretched are still likely to pass undetected. This research focuses on expanding an existing landmark-based fingerprinting method to identify songs that have been pitch scaled and time stretched to escape current systems while still sounding natural to the human ear. Two feature extraction methods have been explored with the purpose of resolving each task individually. The constant Q spectrogram was used for feature extraction, instead of a conventional spectrogram, to identify songs that have been pitch scaled. Mel-frequency Cepstral Coefficients were used as features for the other task. The goal is to verify whether or not low-level spectral based features alone are capable of handling such transformations in a song instead of needing to use mid-level or high-level musical features as is the case with other Song ID methods. Key Terms - Audio Fingerprinting, Feature Extraction, Music Information Retrieval, Music Similarity.Item A Scalable Architecture for Enterprise Level Call Center Design(Polytechnic University of Puerto Rico, 2013) Morales Irizarry, Jorge; Duffany, JeffreyThis article presents a project module of a larger Information Technology initiative as purposed by Company X. The module illustrates research efforts into potentially viable solution options through the use of network protocols. Also presented is the architecture and software design framework of the chosen method of implementation for this project. Prior to any in depth conversation, this article will include explanations of basic concepts not explicitly covered as a part of the project domain. This is because although not the projects focus, these concepts are deemed pertinent to understand in order to facilitate the reader's appreciation of the more detailed, non proprietary topics covered. Research findings, results and recommendations are also mentioned. Key Terms ⎯ †Automatic Call Dialers, Cisco GED-188 Network Protocol, Computer Telephony Integration (CTI), †Global Outbound Solution.Item Testing, Simulating, and Profiling Designated Problems for CASL(Polytechnic University of Puerto Rico, 2013) Camacho Bonaparte, Yael M.; Vicente, Luis M.Simulation is an essential step for future implementations of more efficient and safer reactor components. In nuclear Technology, this translates to cost, fuel, and waste reduction, and enhanced safety. The software Coolant Boiling in Rod Arrays – Two Fluid (COBRA-TF) is currently undergoing development and until now has not been profiled to measure its performance. This project presents profiling data and data analysis of the code’s performance. We profiled two different version of the software while simulating two different input files. The profile data extracted from the simulations provided developers a better understanding of the code’s behavior. The results of this project will help developers improve the code’s performance in future versions by identifying the most time consuming portions of the code. The project involved activities such as testing, simulation, running designated problems on different programs or environments, analyzing, and verifying the results, and providing feedback to the development team. Key Terms - Optimization, Profiling, Simulation, Virtual Nuclear Reactor