Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Entire DC Network

Emergency Landing And Guidance System, Joseph Alarid Dec 2020

Emergency Landing And Guidance System, Joseph Alarid

Master's Theses

Every year there are thousands of aviation accidents along with hundreds of human deaths that happen around the world. While the data is sparse, it is well documented that many of these happen from emergency landings gone awry. While pilots can generally make great landings in clear daytime conditions, they are significantly handicapped when it comes to landing at night or amongst poor visibility conditions.

Due to the nature of this problem and some of the large scale advances in software technology we propose a solution that provides a significant improvement from the status quo. Using transfer learning on neural …


Traffic Privacy Study On Internet Of Things – Smart Home Applications, Ayan Patel Aug 2020

Traffic Privacy Study On Internet Of Things – Smart Home Applications, Ayan Patel

Master's Theses

Internet of Things (IoT) devices have been widely adopted in many different applications in recent years, such as smart home applications. An adversary can capture the network traffic of IoT devices and analyze it to reveal user activities even if the traffic is encrypted. Therefore, traffic privacy is a major concern, especially in smart home applications. Traffic shaping can be used to obfuscate the traffic so that no meaningful predictions can be drawn through traffic analysis. Current traffic shaping methods have many tunable variables that are difficult to optimize to balance bandwidth overheads and latencies. In this thesis, we study …


Identification Of Users Via Ssh Timing Attack, Thomas J. Flucke Jul 2020

Identification Of Users Via Ssh Timing Attack, Thomas J. Flucke

Master's Theses

Secure Shell, a tool to securely access and run programs on a remote machine, is an important tool for both system administrators and developers alike. The technology landscape is becoming increasingly distributed and reliant on tools such as Secure Shell to protect information as a user works on a system remotely. While Secure Shell accounts for the abuses the security of older tools such as telnet overlook, it still has fundamental vulnerabilities which leak information about both the user and their activities through timing attacks. The OpenSSH client, the implementation included in all Linux, Mac, and Windows computers, sends each …


Flexible Fault Tolerance For The Robot Operating System, Sukhman S. Marok Jun 2020

Flexible Fault Tolerance For The Robot Operating System, Sukhman S. Marok

Master's Theses

The introduction of autonomous vehicles has the potential to reduce the number of accidents and save countless lives. These benefits can only be realized if autonomous vehicles can prove to be safer than human drivers. There is a large amount of active research around developing robust algorithms for all parts of the autonomous vehicle stack including sensing, localization, mapping, perception, prediction, planning, and control. Additionally, some of these research projects have involved the use of the Robot Operating System (ROS). However, another key aspect of realizing an autonomous vehicle is a fault-tolerant design that can ensure the safe operation of …


Bootstrapping Massively Multiplayer Online Role Playing Games, Mitchell Miller Jun 2020

Bootstrapping Massively Multiplayer Online Role Playing Games, Mitchell Miller

Master's Theses

Massively Multiplayer Online Role Playing Games (MMORPGs) are a prominent genre in today's video game industry with the most popular MMORPGs generating billions of dollars in revenue and attracting millions of players. As they have grown, they have become a major target for both technological research and sociological research. In such research, it is nearly impossible to reach the same player scale from any self-made technology or sociological experiments. This greatly limits the amount of control and topics that can be explored. In an effort to make up a lacking or non-existent player-base for custom-made MMORPG research scenarios A.I. agents, …


Decentralized, Noncooperative Multirobot Path Planning With Sample-Basedplanners, William Le Mar 2020

Decentralized, Noncooperative Multirobot Path Planning With Sample-Basedplanners, William Le

Master's Theses

In this thesis, the viability of decentralized, noncooperative multi-robot path planning algorithms is tested. Three algorithms based on the Batch Informed Trees (BIT*) algorithm are presented. The first of these algorithms combines Optimal Reciprocal Collision Avoidance (ORCA) with BIT*. The second of these algorithms uses BIT* to create a path which the robots then follow using an artificial potential field (APF) method. The final algorithm is a version of BIT* that supports replanning. While none of these algorithms take advantage of sharing information between the robots, the algorithms are able to guide the robots to their desired goals, with the …


Dynamic Procedural Music Generation From Npc Attributes, Megan E. Washburn Mar 2020

Dynamic Procedural Music Generation From Npc Attributes, Megan E. Washburn

Master's Theses

Procedural content generation for video games (PCGG) has seen a steep increase in the past decade, aiming to foster emergent gameplay as well as to address the challenge of producing large amounts of engaging content quickly. Most work in PCGG has been focused on generating art and assets such as levels, textures, and models, or on narrative design to generate storylines and progression paths. Given the difficulty of generating harmonically pleasing and interesting music, procedural music generation for games (PMGG) has not seen as much attention during this time.

Music in video games is essential for establishing developers' intended mood …