Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (5)
- Engineering (5)
- Physical Sciences and Mathematics (5)
- Aerospace Engineering (2)
- Systems Engineering and Multidisciplinary Design Optimization (2)
-
- Applied Behavior Analysis (1)
- Artificial Intelligence and Robotics (1)
- Business (1)
- Education (1)
- Educational Administration and Supervision (1)
- Electrical and Computer Engineering (1)
- Higher Education Administration (1)
- Information Security (1)
- Medicine and Health Sciences (1)
- Mining Engineering (1)
- Occupational Health and Industrial Hygiene (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Psychology (1)
- Public Health (1)
- Signal Processing (1)
- Social and Behavioral Sciences (1)
- Strategic Management Policy (1)
- Keyword
-
- Fuzzy state aggregation (2)
- Information security (2)
- Policy hill-climbing (2)
- Reinforcement learning (2)
- AY0405 (1)
-
- Breakdowns (1)
- CRADA (1)
- Clustering algorithms (1)
- Counter espionage (1)
- ENR (1)
- FY05 (1)
- Feature extraction (1)
- Graduate education (1)
- Higher education (1)
- Image classification (1)
- Insider threats (1)
- Military education (1)
- Mining (1)
- Noise control (1)
- Research funding (1)
- Retrial queue (1)
- Space command and control (1)
- Space systems (1)
- Sponsorship (1)
- Steganalysis (1)
- Steganography (1)
- Stochastic decomposition (1)
- Stochastic environment (1)
- Vector quantization (1)
- Publication
Articles 1 - 11 of 11
Full-Text Articles in Entire DC Network
An M/M/1 Retrial Queue With Unreliable Server, Nathan P. Sherman, Jeffrey P. Kharoufeh
An M/M/1 Retrial Queue With Unreliable Server, Nathan P. Sherman, Jeffrey P. Kharoufeh
Faculty Publications
We analyze an unreliable M/M/1 retrial queue with infinite-capacity orbit and normal queue. Retrial customers do not rejoin the normal queue but repeatedly attempt to access the server at i.i.d. intervals until it is found functioning and idle. We provide stability conditions as well as several stochastic decomposability results.
Steganalysis Embedding Percentage Determination With Learning Vector Quantization, Benjamin M. Rodriguez, Gilbert L. Peterson, Kenneth W. Bauer, Sos S. Agaian
Steganalysis Embedding Percentage Determination With Learning Vector Quantization, Benjamin M. Rodriguez, Gilbert L. Peterson, Kenneth W. Bauer, Sos S. Agaian
Faculty Publications
Steganography (stego) is used primarily when the very existence of a communication signal is to be kept covert. Detecting the presence of stego is a very difficult problem which is made even more difficult when the embedding technique is not known. This article presents an investigation of the process and necessary considerations inherent in the development of a new method applied for the detection of hidden data within digital images. We demonstrate the effectiveness of learning vector quantization (LVQ) as a clustering technique which assists in discerning clean or non-stego images from anomalous or stego images. This comparison is conducted …
Fuzzy State Aggregation And Policy Hill Climbing For Stochastic Environments, Dean C. Wardell, Gilbert L. Peterson
Fuzzy State Aggregation And Policy Hill Climbing For Stochastic Environments, Dean C. Wardell, Gilbert L. Peterson
Faculty Publications
Reinforcement learning is one of the more attractive machine learning technologies, due to its unsupervised learning structure and ability to continually learn even as the operating environment changes. Additionally, by applying reinforcement learning to multiple cooperative software agents (a multi-agent system) not only allows each individual agent to learn from its own experience, but also opens up the opportunity for the individual agents to learn from the other agents in the system, thus accelerating the rate of learning. This research presents the novel use of fuzzy state aggregation, as the means of function approximation, combined with the fastest policy hill …
Afit 2007, Air Force Institute Of Technology, Mark Matthews
Afit 2007, Air Force Institute Of Technology, Mark Matthews
AFIT Documents
No abstract provided.
A Multidiscipline Approach To Mitigating The Insider Threat, Jonathan W. Butts, Robert F. Mills, Gilbert L. Peterson
A Multidiscipline Approach To Mitigating The Insider Threat, Jonathan W. Butts, Robert F. Mills, Gilbert L. Peterson
Faculty Publications
Preventing and detecting the malicious insider is an inherently difficult problem that expands across many areas of expertise such as social, behavioral and technical disciplines. Unfortunately, current methodologies to combat the insider threat have had limited success primarily because techniques have focused on these areas in isolation. The technology community is searching for technical solutions such as anomaly detection systems, data mining and honeypots. The law enforcement and counterintelligence communities, however, have tended to focus on human behavioral characteristics to identify suspicious activities. These independent methods have limited effectiveness because of the unique dynamics associated with the insider threat. The …
Multiple Masks-Based Pixel Comparison Steganalysis Method For Mobile Imaging, Sos S. Agaian, Gilbert L. Peterson, Benjamin M. Rodriguez
Multiple Masks-Based Pixel Comparison Steganalysis Method For Mobile Imaging, Sos S. Agaian, Gilbert L. Peterson, Benjamin M. Rodriguez
Faculty Publications
No abstract provided.
Fuzzy State Aggregation And Off-Policy Reinforcement Learning For Stochastic Environments, Dean C. Wardell, Gilbert L. Peterson
Fuzzy State Aggregation And Off-Policy Reinforcement Learning For Stochastic Environments, Dean C. Wardell, Gilbert L. Peterson
Faculty Publications
Reinforcement learning is one of the more attractive machine learning technologies, due to its unsupervised learning structure and ability to continually learn even as the environment it is operating in changes. This ability to learn in an unsupervised manner in a changing environment is applicable in complex domains through the use of function approximation of the domain’s policy. The function approximation presented here is that of fuzzy state aggregation. This article presents the use of fuzzy state aggregation with the current policy hill climbing methods of Win or Lose Fast (WoLF) and policy-dynamics based WoLF (PD-WoLF), exceeding the learning rate …
Air Force Institute Of Technology Research Report 2005, Office Of Research And Sponsored Programs, Graduate School Of Engineering And Management, Afit
Air Force Institute Of Technology Research Report 2005, Office Of Research And Sponsored Programs, Graduate School Of Engineering And Management, Afit
AFIT Documents
This report summarizes the research activities of the Air Force Institute of Technology’s Graduate School of Engineering and Management. It describes research interests and faculty expertise; lists student theses/dissertations; identifies research sponsors and contributions; and outlines the procedures for contacting the school. Included in the report are: faculty publications, conference presentations, consultations, and funded research projects. Research was conducted in the areas of Aeronautical and Astronautical Engineering, Electrical Engineering and Electro-Optics, Computer Engineering and Computer Science, Systems and Engineering Management, Operational Sciences, and Engineering Physics.
Contingency Planning And An Air Force Space Command Information System, Kaylin Freedman, Michael R. Grimaila
Contingency Planning And An Air Force Space Command Information System, Kaylin Freedman, Michael R. Grimaila
Faculty Publications
No abstract provided.
Managing The Integration Of Space And Information Operations, Daniel F. Gottrich, Michael R. Grimaila
Managing The Integration Of Space And Information Operations, Daniel F. Gottrich, Michael R. Grimaila
Faculty Publications
No abstract provided.
Active Noise Control Of Stageloader Noise In Longwall Mining, Jeremy M. Slagley, Steven Guffey
Active Noise Control Of Stageloader Noise In Longwall Mining, Jeremy M. Slagley, Steven Guffey
Faculty Publications
With the large-scale mechanization inherent to the mining industry, noise-induced hearing loss remains a major concern. As part of on-going efforts to develop engineering controls to reduce noise levels in longwall mining, active noise control experiments were conducted above ground on a modified non-working stageloader. Recorded underground stageloader noise was broadcast into the above ground stageloader. The result was an average 7 dBA reduction when the active noise control was applied. These results suggest the possibility that active noise reduction can be a useful means to reduce stageloader noise if the control system can be made sufficiently rugged. The study …