|
The New Jersey Institute of Technology's Electronic Theses & Dissertations Project
Manikopoulos, Constantine N. has served on the committee of
69 theses/dissertations that are available online.
* indicates that the advisor was committee chair or co-chair.
Author |
Degree |
Year |
|
Title |
ETD# |
Chen, Jerry |
MS |
© 2007 |
* |
Non-repudiation secure file transfer protocol (NRSFTP) |
njit-etd2007-035 |
Jaiantilal, Abhishek |
MS |
© 2006 |
|
Online clustering with single-pass topology based fuzzy clustering algorithm |
njit-etd2006-006 |
Jonas, Jeffrey Scott |
MS |
© 2006 |
* |
A wireless method for monitoring medication compliance |
njit-etd2006-099 |
Leon, Javier |
MS |
© 2006 |
* |
Classification, testing and optimization of intrusion detection systems |
njit-etd2006-059 |
Li, Hongwei |
PhD |
© 2006 |
|
Multilevel adaptive security system |
njit-etd2006-029 |
Ling, Li |
PhD |
© 2006 |
* |
Unified architecture of mobile ad hoc network security (MANS) system |
njit-etd2006-112 |
Song, Sui |
PhD |
© 2006 |
* |
Flow-oriented anomaly-based detection of denial of service attacks with flow-control-assisted mitigation |
njit-etd2006-036 |
Sutaria, Ronak |
MS |
© 2006 |
* |
Classifying malicious windows executables using anomaly based detection |
njit-etd2006-016 |
Chen, Chi-Tung |
PhD |
© 2005 |
|
QoS constrained cellular ad hoc augmented networks |
njit-etd2005-021 |
Chen, Wen |
MS |
© 2005 |
|
Study of steganalysis methods |
njit-etd2005-006 |
Ni, Zhicheng |
PhD |
© 2005 |
|
Image data hiding |
njit-etd2005-030 |
Tian, Guangsen |
MS |
© 2005 |
|
Difference-expansion based reversible data hiding and its steganalysis |
njit-etd2005-057 |
Yuksel, Ali |
MS |
© 2005 |
|
Enabling cost aware routing with auctions in wireless ad-hoc networks |
njit-etd2005-124 |
Dai, Shuangshuang |
PhD |
© 2004 |
|
Adaptive learning for event modeling and pattern classification |
njit-etd2004-023 |
Li, Jun |
PhD |
© 2004 |
* |
Network anomaly detection using management information base (MIB) network traffic variables |
njit-etd2004-124 |
Zakhalyavko, Dmytro |
MS |
© 2004 |
* |
Detection of denial of service attacks using database queries |
njit-etd2004-121 |
Zhang, Congzhe |
PhD |
© 2004 |
|
Ad hoc network security and modeling with stochastic petri nets |
njit-etd2004-107 |
Zhang, Zheng |
PhD |
© 2004 |
* |
Statistical anomaly denial of service and reconnaissance intrusion detection |
njit-etd2004-106 |
Akpan, Friday Bassey |
MS |
© 2003 |
* |
Evaluation of intrusion detection systems with automatic traffic generation programs |
njit-etd2003-002 |
Arora, Sachin |
MS |
© 2003 |
* |
Soft fault detection using MIBs in computer networks |
njit-etd2003-034 |
Choi, Woo-Jin |
PhD |
© 2003 |
|
Mobility modeling and management for next generation wireless networks |
njit-etd2003-107 |
Erukulla, Ratan Kumar |
MS |
© 2003 |
* |
Firewall interface for java FTP SMTP and HTTP servers |
njit-etd2003-004 |
Lake, Pablito C. |
MS |
© 2003 |
* |
Detecting malfunction in wireless sensor networks |
njit-etd2003-052 |
Lee, Yan Yi |
MS |
© 2003 |
* |
Internet traffic over wide area network - statistical modeling and analysis |
njit-etd2003-094 |
Rajagopalan, Ramani |
MS |
© 2003 |
* |
Intrusion detection system for ad hoc mobile networks using neighborhood watch theory |
njit-etd2003-057 |
Salley, Jr., Curtis |
MS |
© 2003 |
* |
Comparative studies of network traffic in actual and emulated wireless networks |
njit-etd2003-058 |
Salunkhe, Ranjit |
MS |
© 2003 |
* |
Reduction of false positives in fault detection system using a low pass data filter |
njit-etd2003-059 |
Shah, Nipa |
MS |
© 2003 |
* |
Tracking the path of a mobile radioactive source using a wireless sensor network |
njit-etd2003-061 |
Zhang, Xi Min |
PhD |
© 2003 |
|
Robust and efficient video/image transmission |
njit-etd2003-031 |
An, Beongku |
PhD |
© 2002 |
|
Multicast outing protocols and architectures in mobile ad-hoc wireless networks |
njit-etd2002-076 |
Bajaj, Ratna |
MS |
© 2002 |
* |
Introduction on intrusion detection systems : focus on hierarchical analysis |
njit-etd2002-091 |
Rabie, Mohammad A. |
MS |
© 2002 |
* |
Attack visualization for intrusion detection system |
njit-etd2002-092 |
Sahinoglu, Zafer |
PhD |
© 2002 |
|
Renegotiation based dynamic bandwidth allocation for selfsimilar VBR traffic |
njit-etd2002-025 |
He, Bin |
PhD |
© 2001 |
* |
ARQ protocol for joint source and channel coding and its applications |
njit-etd2001-101 |
Pandit, Rohan A. |
MS |
© 2001 |
* |
Decision making based on quantitative and qualitative evaluations |
njit-etd2001-023 |
Pursnani, Vandana |
MS |
© 2001 |
* |
Visualization techniques for routing protocols and router configurations |
njit-etd2001-012 |
Ucles, Jose Luis |
PhD |
© 2001 |
* |
Saturation routing for asynchronous transfer mode (ATM) networks |
njit-etd2001-106 |
Wei, Wei |
MS |
© 2001 |
* |
Data mining using neural networks for large credit card record sites |
njit-etd2001-027 |
Elmasry, George F. |
PhD |
© 1999 |
|
Detection and robustness of digital image watermarking signals : a communication theory approach |
njit-etd1999-029 |
Pallithotungal, Sajid |
MS |
© 1999 |
* |
Mutual interference investigation of CEBus and X-10 powerline signaling |
njit-etd1999-084 |
Aska, Gerald |
MS |
© 1998 |
* |
Telephone-accessed controller using CEBus for device control over power line |
njit-etd1998-011 |
Christou, Charalambos Stephanou |
PhD |
© 1998 |
* |
A low-cost high-speed twin-prefetching DSP-based shared-memory system for real-time image processing applications |
njit-etd1998-049 |
Shi, Yi |
PhD |
© 1998 |
|
Automatic analysis of electronic drawings using neural network |
njit-etd1998-102 |
Kamel, Nashwa F. |
MS |
© 1997 |
* |
Performance evaluation of CEBus power line communication in the presence of X-10 module signaling |
njit-etd1997-006 |
Kaplinsky, Michael B. |
PhD |
© 1997 |
|
Multi-wavelength pyrometric systems for emissivity-independent non-contact temperature sensing |
njit-etd1997-033 |
Lam, Tuan H. |
MS |
© 1997 |
|
Microstrip zero-sum antenna; CAD and experimental study |
njit-etd1997-031 |
Li, Mo-Huang |
MS |
© 1997 |
|
Analysis and comparison of resistive, ferroelectric and pyroelectric uncooled bolometers for electronic imaging systems |
njit-etd1997-026 |
Zhou, Yaling |
PhD |
© 1997 |
|
High speed protocols for dual bus and dual ring network architectures |
njit-etd1997-115 |
Melkonian, Artak Ohan |
MS |
© 1996 |
|
Small computer system interface (SCSI) universal services for the turbonet parallel computer |
njit-etd1996-069 |
Hross, Ralf |
MS |
© 1995 |
|
A defect detection algorithm for sequential and parallel computers |
njit-etd1995-086 |
Li, Xi |
PhD |
© 1995 |
* |
Investigation of hybrid message-passing and shared-memory architectures for parallel computer : a case study : turbonet |
njit-etd1995-056 |
Walker, Hopeton Saint John |
MS |
© 1995 |
* |
Design of a LAPD interface using the T7130 multichannel LAPD controller and the T715A synchronous protocol data formatter |
njit-etd1995-116 |
Chen, Liang-Chuang |
MS |
© 1994 |
* |
CEBus demonstration system |
njit-etd1994-014 |
Fernando, Wannakuwattawaduge Lalith |
MS |
© 1994 |
* |
Investigation of CEBus traffic across a router, with and without acknowledgment |
njit-etd1994-083 |
Nerurkar, Sujit S. |
MS |
© 1994 |
* |
Design and implementation of fuzzy logic controller for a process control application |
njit-etd1994-006 |
Shukla, Bhavesh Mahendra |
MS |
© 1994 |
* |
Performance of national research and education network while transmitting healthcare information data |
njit-etd1994-126 |
Chen, Yan |
MS |
© 1993 |
|
Timed petri net simulation of flexible manufacturing systems |
njit-etd1993-020 |
Kaplinsky, Michael B. |
MS |
© 1993 |
|
Application of imaging pyrometry for remote temperature measurements |
njit-etd1993-099 |
Kushwaha, Rakesh |
PhD |
© 1993 |
|
Methodology for modeling high performance distributed and parallel systems |
njit-etd1993-025 |
Martynov, Helen |
MS |
© 1993 |
|
Modeling of rapid thermal processing system by finite element method |
njit-etd1993-120 |
McCaffrey, Nathaniel Joseph |
MS |
© 1993 |
|
Design of a 320X122 MWIR-CCD PtSi-Si imaging radiometer with automatic optical integration time control |
njit-etd1993-121 |
Pan, Menghan |
MS |
© 1993 |
* |
Investigation of the PL CEBUS performance with and without acknowledgment |
njit-etd1993-127 |
Patel, Vipulkumar |
PhD |
© 1993 |
|
Characterization of advanced etching reactors using novel diagnostic tools |
njit-etd1993-043 |
Yang, Jaesoo |
PhD |
© 1993 |
* |
Investigation of the consumer electronics bus |
njit-etd1993-048 |
Chen, Chieyeon Jason |
MS |
© 1991 |
|
A machine vision system with remote host |
njit-etd1991-089 |
Wang, Hong |
MS |
© 1991 |
* |
Performance evaluation and comparison of ordinary, adaptive and exhaustive services in the token ring network |
njit-etd1991-018 |
Kurnool, Ramesh |
MS |
© 1990 |
|
Token bus LAN performance : modeling and simulation |
njit-etd1990-009 |
Patel, Darshakkumar J. |
MS |
© 1990 |
* |
Performance evaluation and comparison of ordinary, adaptive and exhaustive service in the token ring network |
njit-etd1990-010 |
Kancherla, Krishna |
MS |
© 1989 |
* |
Statistical multiplexing of video sources for packet switching networks |
njit-etd1989-018 |
If you have any questions please contact the ETD Team, libetd@njit.edu.
Created 4/12/01; updated 8/30/02, 06/30/05
|
NJIT's ETD project was given an ACRL/NJ Technology Innovation Honorable Mention Award in spring 2003
|
|