3 resultados para Simulation and Modeling
em Illinois Digital Environment for Access to Learning and Scholarship Repository
Resumo:
This thesis introduces the L1 Adaptive Control Toolbox, a set of tools implemented in Matlab that aid in the design process of an L1 adaptive controller and enable the user to construct simulations of the closed-loop system to verify its performance. Following a brief review of the existing theory on L1 adaptive controllers, the interface of the toolbox is presented, including a description of the functions accessible to the user. Two novel algorithms for determining the required sampling period of a piecewise constant adaptive law are presented and their implementation in the toolbox is discussed. The detailed description of the structure of the toolbox is provided as well as a discussion of the implementation of the creation of simulations. Finally, the graphical user interface is presented and described in detail, including the graphical design tools provided for the development of the filter C(s). The thesis closes with suggestions for further improvement of the toolbox.
Resumo:
A recent focus on contemporary evolution and the connections between communities has sought to more closely integrate the fields of ecology and evolutionary biology. Studies of coevolutionary dynamics, life history evolution, and rapid local adaptation demonstrate that ecological circumstances can dictate evolutionary trajectories. Thus, variation in species identity, trait distributions, and genetic composition may be maintained among ecologically divergent habitats. New theories and hypotheses (e.g., metacommunity theory and the Monopolization hypothesis) have been developed to understand better the processes occurring in spatially structured environments and how the movement of individuals among habitats contributes to ecology and evolution at broader scales. As few empirical studies of these theories exist, this work seeks to further test these concepts. Spatial and temporal dispersal are the mechanisms that connect habitats to one another. Both processes allow organisms to leave conditions that are suboptimal or unfavorable, and enable colonization and invasion, species range expansion, and gene flow among populations. Freshwater zooplankton are aquatic crustaceans that typically develop resting stages as part of their life cycle. Their dormant propagules allow organisms to disperse both temporally and among habitats. Additionally, because a number of species are cyclically parthenogenetic, they make excellent model organisms for studying evolutionary questions in a controlled environment. Here, I use freshwater zooplankton communities as model systems to explore the mechanisms and consequences of dispersal and to test these nascent theories on the influence of spatial structure in natural systems. In Chapter one, I use field experiments and mathematical models to determine the range of adult zooplankton dispersal over land and what vectors are moving zooplankton. Chapter two focuses on prolonged dormancy of one aquatic zooplankter, Daphnia pulex. Using statistical models with field and mesocosm experiments, I show that variation in Daphnia dormant egg hatching is substantial among populations in nature, and some of that variation can be attributed to genetic differences among the populations. Chapters three and four explore the consequences of dispersal at multiple levels of biological organization. Chapter three seeks to understand the population level consequences of dispersal over evolutionary time on current patterns of population genetic differentiation. Nearby populations of D. pulex often exhibit high population genetic differentiation characteristic of very low dispersal. I explore two alternative hypotheses that seek to explain this pattern. Finally, chapter four is a case study of how dispersal has influenced patterns of variation at the community, trait and genetic levels of biodiversity in a lake metacommunity.
Resumo:
Many existing encrypted Internet protocols leak information through packet sizes and timing. Though seemingly innocuous, prior work has shown that such leakage can be used to recover part or all of the plaintext being encrypted. The prevalence of encrypted protocols as the underpinning of such critical services as e-commerce, remote login, and anonymity networks and the increasing feasibility of attacks on these services represent a considerable risk to communications security. Existing mechanisms for preventing traffic analysis focus on re-routing and padding. These prevention techniques have considerable resource and overhead requirements. Furthermore, padding is easily detectable and, in some cases, can introduce its own vulnerabilities. To address these shortcomings, we propose embedding real traffic in synthetically generated encrypted cover traffic. Novel to our approach is our use of realistic network protocol behavior models to generate cover traffic. The observable traffic we generate also has the benefit of being indistinguishable from other real encrypted traffic further thwarting an adversary's ability to target attacks. In this dissertation, we introduce the design of a proxy system called TrafficMimic that implements realistic cover traffic tunneling and can be used alone or integrated with the Tor anonymity system. We describe the cover traffic generation process including the subtleties of implementing a secure traffic generator. We show that TrafficMimic cover traffic can fool a complex protocol classification attack with 91% of the accuracy of real traffic. TrafficMimic cover traffic is also not detected by a binary classification attack specifically designed to detect TrafficMimic. We evaluate the performance of tunneling with independent cover traffic models and find that they are comparable, and, in some cases, more efficient than generic constant-rate defenses. We then use simulation and analytic modeling to understand the performance of cover traffic tunneling more deeply. We find that we can take measurements from real or simulated traffic with no tunneling and use them to estimate parameters for an accurate analytic model of the performance impact of cover traffic tunneling. Once validated, we use this model to better understand how delay, bandwidth, tunnel slowdown, and stability affect cover traffic tunneling. Finally, we take the insights from our simulation study and develop several biasing techniques that we can use to match the cover traffic to the real traffic while simultaneously bounding external information leakage. We study these bias methods using simulation and evaluate their security using a Bayesian inference attack. We find that we can safely improve performance with biasing while preventing both traffic analysis and defense detection attacks. We then apply these biasing methods to the real TrafficMimic implementation and evaluate it on the Internet. We find that biasing can provide 3-5x improvement in bandwidth for bulk transfers and 2.5-9.5x speedup for Web browsing over tunneling without biasing.