Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

Doctoral Dissertations

Theses/Dissertations

Institution
Keyword
Publication Year

Articles 1 - 30 of 41

Full-Text Articles in Entire DC Network

Stability Of Quantum Computers, Samudra Dasgupta May 2024

Stability Of Quantum Computers, Samudra Dasgupta

Doctoral Dissertations

Quantum computing's potential is immense, promising super-polynomial reductions in execution time, energy use, and memory requirements compared to classical computers. This technology has the power to revolutionize scientific applications such as simulating many-body quantum systems for molecular structure understanding, factorization of large integers, enhance machine learning, and in the process, disrupt industries like telecommunications, material science, pharmaceuticals and artificial intelligence. However, quantum computing's potential is curtailed by noise, further complicated by non-stationary noise parameter distributions across time and qubits. This dissertation focuses on the persistent issue of noise in quantum computing, particularly non-stationarity of noise parameters in transmon processors. It …


Static And Dynamic State Estimation Applications In Power Systems Protection And Control Engineering, Ibukunoluwa Olayemi Korede Dec 2023

Static And Dynamic State Estimation Applications In Power Systems Protection And Control Engineering, Ibukunoluwa Olayemi Korede

Doctoral Dissertations

The developed methodologies are proposed to serve as support for control centers and fault analysis engineers. These approaches provide a dependable and effective means of pinpointing and resolving faults, which ultimately enhances power grid reliability. The algorithm uses the Least Absolute Value (LAV) method to estimate the augmented states of the PCB, enabling supervisory monitoring of the system. In addition, the application of statistical analysis based on projection statistics of the system Jacobian as a virtual sensor to detect faults on transmission lines. This approach is particularly valuable for detecting anomalies in transmission line data, such as bad data or …


Scalable Data Analytics For Relational Databases, Graphs And Videos, Fubao Wu Jun 2022

Scalable Data Analytics For Relational Databases, Graphs And Videos, Fubao Wu

Doctoral Dissertations

Data analytics is to analyze raw data and mine insights, trends, and patterns from them. Due to the dramatic increase in data volume and size in recent years with the development of big data and cloud storage, big data analytics algorithms and techniques have been faced with more challenges. Moreover, there are various types of data formats, such as relational databases, text data, audio data, and image/video data. It is challenging to generate a unified framework or algorithm for data analytics on various data formats. Different data formats still need refined and scalable algorithms. In this dissertation, we explore three …


Persistent Stealthy Attacks And Their Detection In Large Distributed Cyber-Physical Systems, Simon Bech Thougaard Jan 2022

Persistent Stealthy Attacks And Their Detection In Large Distributed Cyber-Physical Systems, Simon Bech Thougaard

Doctoral Dissertations

"Cyber-Physical Systems (CPS) are increasingly targeted by attackers using a wide and evolving array of methods. When these systems are distributed, every node represents a potential vulnerability, and secure system design must take this into account. Distributed CPSs also have the potential to better detect and handle attacks, by leveraging redundancies of physical measurements between adjacent nodes. The main purpose of this research is to determine the conditions that render a distributed CPS more resistant to attacks, and the conditions that render it more vulnerable. The work is centered around two separate applications: The Smart Grid and Autonomous Drone Swarms. …


Audio-Driven Character Animation, Yang Zhou Oct 2021

Audio-Driven Character Animation, Yang Zhou

Doctoral Dissertations

Generating believable character animations is a fundamentally important problem in the field of computer graphics and computer vision. It also has a diverse set of applications ranging from entertainment (e.g., films, games), medicine (e.g., facial therapy and prosthetics), mixed reality, and education (e.g., language/speech training and cyber-assistants). All these applications are all empowered by the ability to model and animate characters convincingly (human or non-human). Existing key-framing or performance capture approaches used for creating animations, especially facial animations, are either laborious or hard to edit. In particular, producing expressive animations from input speech automatically remains an open challenge. In this …


Scaling Down The Energy Cost Of Connecting Everyday Objects To The Internet, Mohammad Rostami Oct 2021

Scaling Down The Energy Cost Of Connecting Everyday Objects To The Internet, Mohammad Rostami

Doctoral Dissertations

The Internet of Things (IoT) promises new opportunities for better monitoring and control of thousands of objects and sensors in households and industrial applications. The viability of large-scale IoT is, however, still a challenge given that the most widely known options for connecting everyday objects, i.e. duty-cycled active radios such as WiFi, Bluetooth and Zigbee, are power-hungry and increase the cost of deployment and maintenance of the connected devices. The main argument of this thesis is that passive radios that use backscatter communication, which has been used primarily for RFIDs, can fill this gap as an ultra-low power replacement for …


Robustness Against Attacks And Uncertainties In Smart Cyber-Physical Systems, Prithwiraj Roy Jan 2021

Robustness Against Attacks And Uncertainties In Smart Cyber-Physical Systems, Prithwiraj Roy

Doctoral Dissertations

Cyber-Physical Systems (CPS) are sensing, processing, and communicating platforms, embedded with physical devices that provide real-time monitoring and control. Security challenges in CPS necessitate solutions that are robust against attacks and uncertainties and provide a seamless operation, especially when used in real-time applications to monitor and secure critical infrastructures. CPS mainly consists of a physical component for sensing or monitoring and a cyber component for processing and communicating. The quality of interactions between physical and cyber systems has direct impacts on the system’s performance and reliability.

CPS plays a major role in smart services and applications within a smart living …


Security Against Data Falsification Attacks In Smart City Applications, Venkata Praveen Kumar Madhavarapu Jan 2021

Security Against Data Falsification Attacks In Smart City Applications, Venkata Praveen Kumar Madhavarapu

Doctoral Dissertations

Smart city applications like smart grid, smart transportation, healthcare deal with very important data collected from IoT devices. False reporting of data consumption from device failures or by organized adversaries may have drastic consequences on the quality of operations. To deal with this, we propose a coarse grained and a fine grained anomaly based security event detection technique that uses indicators such as deviation and directional change in the time series of the proposed anomaly detection metrics to detect different attacks. We also built a trust scoring metric to filter out the malicious devices. Another challenging problem is injection of …


Data And Resource Management In Wireless Networks Via Data Compression, Gps-Free Dissemination, And Learning, Xiaofei Cao Jan 2021

Data And Resource Management In Wireless Networks Via Data Compression, Gps-Free Dissemination, And Learning, Xiaofei Cao

Doctoral Dissertations

“This research proposes several innovative approaches to collect data efficiently from large scale WSNs. First, a Z-compression algorithm has been proposed which exploits the temporal locality of the multi-dimensional sensing data and adapts the Z-order encoding algorithm to map multi-dimensional data to a one-dimensional data stream. The extended version of Z-compression adapts itself to working in low power WSNs running under low power listening (LPL) mode, and comprehensively analyzes its performance compressing both real-world and synthetic datasets. Second, it proposed an efficient geospatial based data collection scheme for IoTs that reduces redundant rebroadcast of up to 95% by only collecting …


An Empirical Assessment Of The Effectiveness Of Deception For Cyber Defense, Kimberly J. Ferguson-Walter Mar 2020

An Empirical Assessment Of The Effectiveness Of Deception For Cyber Defense, Kimberly J. Ferguson-Walter

Doctoral Dissertations

The threat of cyber attacks is a growing concern across the world, leading to an increasing need for sophisticated cyber defense techniques. The Tularosa Study, was designed and conducted to understand how defensive deception, both cyber and psychological, affects cyber attackers Ferguson-Walter et al. [2019c]. More specifically, for this empirical study, cyber deception refers to a decoy system and psychological deception refers to false information of the presence of defensive deception techniques on the network. Over 130 red teamers participated in a network penetration test over two days in which we controlled both the presence of and explicit mention of …


An Approach To System Of Systems Resiliency Using Architecture And Agent-Based Behavioral Modeling, Paulette Bootz Acheson Jan 2020

An Approach To System Of Systems Resiliency Using Architecture And Agent-Based Behavioral Modeling, Paulette Bootz Acheson

Doctoral Dissertations

”In today’s world it is no longer a question of whether a system will be compromised but when the system will be compromised. Consider the recent compromise of the Democratic National Committee (DNC) and Hillary Clinton emails as well as the multiple Yahoo breaches and the break into the Target customer database. The list of exploited vulnerabilities and successful cyber-attacks goes on and on. Because of the amount and frequency of the cyber-attacks, resiliency has taken on a whole new meaning. There is a new perspective within defense to consider resiliency in terms of Mission Success.

This research develops a …


Human Behavior Understanding For Worker-Centered Intelligent Manufacturing, Wenjin Tao Jan 2020

Human Behavior Understanding For Worker-Centered Intelligent Manufacturing, Wenjin Tao

Doctoral Dissertations

“In a worker-centered intelligent manufacturing system, sensing and understanding of the worker’s behavior are the primary tasks, which are essential for automatic performance evaluation & optimization, intelligent training & assistance, and human-robot collaboration. In this study, a worker-centered training & assistant system is proposed for intelligent manufacturing, which is featured with self-awareness and active-guidance. To understand the hand behavior, a method is proposed for complex hand gesture recognition using Convolutional Neural Networks (CNN) with multiview augmentation and inference fusion, from depth images captured by Microsoft Kinect. To sense and understand the worker in a more comprehensive way, a multi-modal approach …


Cyber Physical Security Of Avionic Systems, Anusha Thudimilla Jan 2020

Cyber Physical Security Of Avionic Systems, Anusha Thudimilla

Doctoral Dissertations

“Cyber-physical security is a significant concern for critical infrastructures. The exponential growth of cyber-physical systems (CPSs) and the strong inter-dependency between the cyber and physical components introduces integrity issues such as vulnerability to injecting malicious data and projecting fake sensor measurements. Traditional security models partition the CPS from a security perspective into just two domains: high and low. However, this absolute partition is not adequate to address the challenges in the current CPSs as they are composed of multiple overlapping partitions. Information flow properties are one of the significant classes of cyber-physical security methods that model how inputs of a …


Secure Blockchains For Cyber-Physical Systems, Matthew Edward Wagner Jan 2020

Secure Blockchains For Cyber-Physical Systems, Matthew Edward Wagner

Doctoral Dissertations

“Blockchains are a data structure used to perform state agreement in a distributed system across an entire network. One unique trait of blockchains is the lack of a centralized trusted third-party to control the system. This prevents a corrupted trusted third party from being able to control the entire blockchain. All nodes can reach agreement in an untrusted network where nodes do not need to trust one another to believe the accuracy of the information stored. Two main issues occur when trying to apply this technology to other applications: verifiability and scalability. In previous blockchain architectures, there is no way …


Predictive Analysis Of Real-Time Strategy Games Using Graph Mining, Isam Abdulmunem Alobaidi Jan 2019

Predictive Analysis Of Real-Time Strategy Games Using Graph Mining, Isam Abdulmunem Alobaidi

Doctoral Dissertations

"Machine learning and computational intelligence have facilitated the development of recommendation systems for a broad range of domains. Such recommendations are based on contextual information that is explicitly provided or pervasively collected. Recommendation systems often improve decision-making or increase the efficacy of a task. Real-Time Strategy (RTS) video games are not only a popular entertainment medium, they also are an abstraction of many real-world applications where the aim is to increase your resources and decrease those of your opponent. Using predictive analytics, which examines past examples of success and failure, we can learn how to predict positive outcomes for such …


Model-Based Predictive Analytics For Additive And Smart Manufacturing, Zhuo Yang Oct 2018

Model-Based Predictive Analytics For Additive And Smart Manufacturing, Zhuo Yang

Doctoral Dissertations

Qualification and certification for additive and smart manufacturing systems can be uncertain and very costly. Using available historical data can mitigate some costs of producing and testing sample parts. However, use of such data lacks the flexibility to represent specific new problems which decreases predictive accuracy and efficiency. To address these compelling needs, in this dissertation modeling techniques are introduced that can proactively estimate results expected from additive and smart manufacturing processes swiftly and with practical levels of accuracy and reliability. More specifically, this research addresses the current challenges and limitations posed by use of available data and the high …


Hybrid Black-Box Solar Analytics And Their Privacy Implications, Dong Chen Oct 2018

Hybrid Black-Box Solar Analytics And Their Privacy Implications, Dong Chen

Doctoral Dissertations

The aggregate solar capacity in the U.S. is rising rapidly due to continuing decreases in the cost of solar modules. For example, the installed cost per Watt (W) for residential photovoltaics (PVs) decreased by 6X from 2009 to 2018 (from $8/W to $1.2/W), resulting in the installed aggregate solar capacity increasing 128X from 2009 to 2018 (from 435 megawatts to 55.9 gigawatts). This increasing solar capacity is imposing operational challenges on utilities in balancing electricity's real-time supply and demand, as solar generation is more stochastic and less predictable than aggregate demand. To address this problem, both academia and utilities have …


Security Risk Assessment In Cloud Computing Domains, Amartya Sen Jan 2018

Security Risk Assessment In Cloud Computing Domains, Amartya Sen

Doctoral Dissertations

"Cyber security is one of the primary concerns persistent across any computing platform. While addressing the apprehensions about security risks, an infinite amount of resources cannot be invested in mitigation measures since organizations operate under budgetary constraints. Therefore the task of performing security risk assessment is imperative to designing optimal mitigation measures, as it provides insight about the strengths and weaknesses of different assets affiliated to a computing platform.

The objective of the research presented in this dissertation is to improve upon existing risk assessment frameworks and guidelines associated to different key assets of Cloud computing domains - infrastructure, applications, …


Adaft: A Resource-Efficient Framework For Adaptive Fault-Tolerance In Cyber-Physical Systems, Ye Xu Nov 2017

Adaft: A Resource-Efficient Framework For Adaptive Fault-Tolerance In Cyber-Physical Systems, Ye Xu

Doctoral Dissertations

Cyber-physical systems frequently have to use massive redundancy to meet application requirements for high reliability. While such redundancy is required, it can be activated adaptively, based on the current state of the controlled plant. Most of the time the physical plant is in a state that allows for a lower level of fault-tolerance. Avoiding the continuous deployment of massive fault-tolerance will greatly reduce the workload of CPSs. In this dissertation, we demonstrate a software simulation framework (AdaFT) that can automatically generate the sub-spaces within which our adaptive fault-tolerance can be applied. We also show the theoretical benefits of AdaFT, and …


A Study Of Mathematics Achievement, Placement, And Graduation Of Engineering Students, Sara Hahler Blazek Jan 2017

A Study Of Mathematics Achievement, Placement, And Graduation Of Engineering Students, Sara Hahler Blazek

Doctoral Dissertations

The purpose of this study was to determine how background knowledge impacts freshmen engineering students' success at Louisiana Tech University in terms of grades in two different freshman classes and graduation. To determine what factors impact students, three different studies were implemented. The first study used linear regression to analyze which demographic and academic variables significantly impacted freshman math and engineering courses. Using regression discontinuity, the second study determined if the university's placement requirement for Pre-Calculus was appropriate. The final study analyzed factors that impact graduation for engineering students as well as other disciplines to determine which significant variables were …


Learning From Pairwise Proximity Data, Hamid Dadkhahi Nov 2016

Learning From Pairwise Proximity Data, Hamid Dadkhahi

Doctoral Dissertations

In many areas of machine learning, the characterization of the input data is given by a form of proximity measure between data points. Examples of such representations are pairwise differences, pairwise distances, and pairwise comparisons. In this work, we investigate different learning problems on data represented in terms of such pairwise proximities. More specifically, we consider three problems: masking (feature selection) for dimensionality reduction, extension of the dimensionality reduction for time series, and online collaborative filtering. For each of these problems, we start with a form of pairwise proximity which is relevant in the problem at hand. We evaluate the …


Blended Learning In Chemistry Laboratory Courses: Enhancing Learning Outcomes And Aligning Student Needs With Available Resources, Shayna Brianne Burchett Jan 2016

Blended Learning In Chemistry Laboratory Courses: Enhancing Learning Outcomes And Aligning Student Needs With Available Resources, Shayna Brianne Burchett

Doctoral Dissertations

"Freshman science courses are intended to prepare students for the rigor and expectations of subsequent college science. While secondary education aims to prepare students for the college curriculum, many incoming freshman lack the sense of responsibility for their own learning that is essential for success in a college-level course. The freshman general-chemistry laboratory course at Missouri University of Science and Technology (Missouri S&T) was identified as a bottleneck course with a demand beyond accommodation capacity. To address the bottleneck and develop a sense of learner responsibility, a decision was made to investigate laboratory course delivery strategies. As a result of …


Models Of Leader Elections And Their Applications, Stephen Curtis Jackson Jan 2016

Models Of Leader Elections And Their Applications, Stephen Curtis Jackson

Doctoral Dissertations

"New research about cyber-physical systems is rapidly changing the way we think about critical infrastructures such as the power grid. Changing requirements for the generation, storage, and availability of power are all driving the development of the smart-grid. Many smart-grid projects disperse power generation across a wide area and control devices with a distributed system. However, in a distributed system, the state of processes is hard to determine due to isolation of memory. By using information flow security models, we reason about a process's beliefs of the system state in a distributed system. Information flow analysis aided in the creation …


Intrusion Detection System Of Industrial Control Networks Using Network Telemetry, Stanislav Ponomarev Jul 2015

Intrusion Detection System Of Industrial Control Networks Using Network Telemetry, Stanislav Ponomarev

Doctoral Dissertations

Industrial Control Systems (ICSs) are designed, implemented, and deployed in most major spheres of production, business, and entertainment. ICSs are commonly split into two subsystems - Programmable Logic Controllers (PLCs) and Supervisory Control And Data Acquisition (SCADA) systems - to achieve high safety, allow engineers to observe states of an ICS, and perform various configuration updates. Before wide adoption of the Internet, ICSs used "air-gap" security measures, where the ICS network was isolated from other networks, including the Internet, by a physical disconnect [1]. This level of security allowed ICS protocol designers to concentrate on the availability and safety of …


Quantification Of Information Flow In Cyber Physical Systems, Li Feng Jan 2015

Quantification Of Information Flow In Cyber Physical Systems, Li Feng

Doctoral Dissertations

"In Cyber Physical Systems (CPSs), traditional security mechanisms such as cryptography and access control are not enough to ensure the security of the system since complex interactions between the cyber portion and physical portion happen frequently. In particular, the physical infrastructure is inherently observable; aggregated physical observations can lead to unintended cyber information leakage. Information flow analysis, which aims to control the way information flows among different entities, is better suited for CPSs than the access control security mechanism. However, quantifying information leakage in CPSs can be challenging due to the flow of implicit information between the cyber portion, the …


Enabling Near-Term Prediction Of Status For Intelligent Transportation Systems: Management Techniques For Data On Mobile Objects, Lasanthi Nilmini Heendaliya Jan 2015

Enabling Near-Term Prediction Of Status For Intelligent Transportation Systems: Management Techniques For Data On Mobile Objects, Lasanthi Nilmini Heendaliya

Doctoral Dissertations

"Location Dependent Queries (LDQs) benefit from the rapid advances in communication and Global Positioning System (GPS) technologies to track moving objects' locations, and improve the quality-of-life by providing location relevant services and information to end users. The enormity of the underlying data maintained by LDQ applications - a large quantity of mobile objects and their frequent mobility - is, however, a major obstacle in providing effective and efficient services. Motivated by this obstacle, this thesis sets out in the quest to find improved methods to efficiently index, access, retrieve, and update volatile LDQ related mobile object data and information. …


Distributed State Verification In The Smart Grid Using Physical Attestation, Thomas Patrick Roth Jan 2015

Distributed State Verification In The Smart Grid Using Physical Attestation, Thomas Patrick Roth

Doctoral Dissertations

"A cyber process in a distributed system can fabricate its internal state in its communications with its peers. These state fabrications can cause other processes in the distributed system to make incorrect control decisions. Cyber-physical systems have a unique advantage in the detection of falsified states because processes typically have observable effects on a shared physical infrastructure. This physical infrastructure acts as a high-integrity message channel that broadcasts changes in individual process states. The objective of this research is to demonstrate that there are cases where physical feedback from the shared infrastructure can be used to detect state fabrications. To …


Computational Intelligence Based Complex Adaptive System-Of-Systems Architecture Evolution Strategy, Siddharth Agarwal Jan 2015

Computational Intelligence Based Complex Adaptive System-Of-Systems Architecture Evolution Strategy, Siddharth Agarwal

Doctoral Dissertations

The dynamic planning for a system-of-systems (SoS) is a challenging endeavor. Large scale organizations and operations constantly face challenges to incorporate new systems and upgrade existing systems over a period of time under threats, constrained budget and uncertainty. It is therefore necessary for the program managers to be able to look at the future scenarios and critically assess the impact of technology and stakeholder changes. Managers and engineers are always looking for options that signify affordable acquisition selections and lessen the cycle time for early acquisition and new technology addition. This research helps in analyzing sequential decisions in an evolving …


Information Fusion Architectures For Security And Resource Management In Cyber Physical Systems, Brijesh Kashyap Chejerla Jan 2015

Information Fusion Architectures For Security And Resource Management In Cyber Physical Systems, Brijesh Kashyap Chejerla

Doctoral Dissertations

"Data acquisition through sensors is very crucial in determining the operability of the observed physical entity. Cyber Physical Systems (CPSs) are an example of distributed systems where sensors embedded into the physical system are used in sensing and data acquisition. CPSs are a collaboration between the physical and the computational cyber components. The control decisions sent back to the actuators on the physical components from the computational cyber components closes the feedback loop of the CPS. Since, this feedback is solely based on the data collected through the embedded sensors, information acquisition from the data plays an extremely vital role …


Privacy-Preserving Power Usage Control In Smart Grids, Huchun Jan 2015

Privacy-Preserving Power Usage Control In Smart Grids, Huchun

Doctoral Dissertations

"The smart grid (SG) has been emerging as the next-generation intelligent power grid system because of its ability to efficiently monitor, predicate, and control energy generation, transmission, and consumption by analyzing users' real-time electricity information. Consider a situation in which the utility company would like to smartly protect against a power outage. To do so, the company can determine a threshold for a neighborhood. Whenever the total power usage from the neighborhood exceeds the threshold, some or all of the households need to reduce their energy consumption to avoid the possibility of a power outage. This problem is referred to …