Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Open Access Theses & Dissertations

Discipline
Keyword
Publication Year

Articles 1 - 30 of 82

Full-Text Articles in Entire DC Network

De-Colonizing Media Literacy: An Indigenous Positive Deviance Case Study Of A Guam-Texas Community Empowering Civic Education For Inafaâ??Maolek Self-Determination, Roque Aguon Dec 2023

De-Colonizing Media Literacy: An Indigenous Positive Deviance Case Study Of A Guam-Texas Community Empowering Civic Education For Inafaâ??Maolek Self-Determination, Roque Aguon

Open Access Theses & Dissertations

ABSTRACT

DE-COLONIZING MEDIA LITERACY: AN INDIGENOUS POSITIVE DEVIANCE CASE STUDY OF A GUAM-TEXAS COMMUNITY EMPOWERING CIVIC EDUCATION FOR INAFA’MAOLEK SELF-DETERMINATION

This case study delves into the realm of civic and media education within varied municipalities in Guam and Texas, which, to date, have been underexplored by contemporary Indigenous social science researchers within the dominant white culture. The investigation focuses on elucidating how influencers from diverse cultural groups employ education and propaganda in the municipal public policy-making process, contributing to holistic community development, democratic citizenship education, and social transformation. The primary aim of this study is to underscore the imperative need …


Development Of Metaheuristic Algorithms For The Efficient Allocation Of Power Flow Control Devices, Eduardo Jose Castillo Fatule Dec 2023

Development Of Metaheuristic Algorithms For The Efficient Allocation Of Power Flow Control Devices, Eduardo Jose Castillo Fatule

Open Access Theses & Dissertations

No abstract provided.


Continuous Risk Assessment For Large-Scale Cyber Systems, Adeel A. Malik Aug 2023

Continuous Risk Assessment For Large-Scale Cyber Systems, Adeel A. Malik

Open Access Theses & Dissertations

Cyberspace, with its multiple forms of device integration, is rapidly evolving and introducing loopholes within the cyber infrastructure, which creates opportunities for attackers. Despite the presence of network security devices such as firewalls, anti-virus, intrusion detection, and prevention systems, network intrusions still occur due to vulnerabilities within organizational assets or socially engineered cyber attacks. The lack of information about threats, vulnerabilities, and threat actors often leaves cyber defenders on a wild goose chase, making it critical to evaluate network security to mitigate adversarial threats periodically.

Various risk assessment frameworks, third-party tools, and online databases containing comprehensive threat information have been …


Interdisciplinary Approach To Understanding Stakeholder Reasoning And Decision-Making For Water, Katalina Salas Aug 2023

Interdisciplinary Approach To Understanding Stakeholder Reasoning And Decision-Making For Water, Katalina Salas

Open Access Theses & Dissertations

On a global scale, humanity is compelled to address complex or â??wickedâ?? resource-related issues in the face of accelerating environmental change. In our work, we use the term wicked problem to refer to an issue that has multiple potential solutions and involves various stakeholders. The paths to reach resource sustainability under environmental uncertainty are difficult to identify, plausible outcomes remain uncertain, and tradeoffs required by any path chosen are challenging to understand. Environmental sustainability issues may involve perspectives from multiple stakeholders (i.e., scientists, policymakers, community members, and industry), often leading to conflicting interests and cultural misalignments that trigger the need …


Detecting Complex Cyber Attacks Using Decoys With Online Reinforcement Learning, Marcus Gutierrez May 2023

Detecting Complex Cyber Attacks Using Decoys With Online Reinforcement Learning, Marcus Gutierrez

Open Access Theses & Dissertations

Most vulnerabilities discovered in cybersecurity can be associated with their own singular piece of software. I investigate complex vulnerabilities, which may require multiple software to be present. These complex vulnerabilities represent 16.6% of all documented vulnerabilities and are more dangerous on average than their simple vulnerability counterparts. In addition to this, because they often require multiple pieces of software to be present, they are harder to identify overall as specific combinations are needed for the vulnerability to appear.

I consider the motivating scenario where an attacker is repeatedly deploying exploits that use complex vulnerabilities into an Airport Wi-Fi. The network …


From Teacher To Campus Leader: An Autoethnographic Study Of An Assistant Principal At A New Mexico Elementary Campus Post Covid-19, Mona E. Plaza May 2023

From Teacher To Campus Leader: An Autoethnographic Study Of An Assistant Principal At A New Mexico Elementary Campus Post Covid-19, Mona E. Plaza

Open Access Theses & Dissertations

In March 2020, the COVID-19 pandemic began its effect on public school education. With online classes, students without remote access, and teachers with little to no experience in technology-based instruction, students, parents, and teachers were navigating the unknown. We have returned to campus, and routines are back in place, but education will never be the same. This autoethnography explores the first year of a teacher transitioning to an assistant principal on a small New Mexico elementary school campus as the education system recovers from the fallout of the pandemic. The purpose of this study is to use research as a …


Modeling And Predicting Emerging Threats Using Disparate Data, Ismael Villanueva Miranda May 2023

Modeling And Predicting Emerging Threats Using Disparate Data, Ismael Villanueva Miranda

Open Access Theses & Dissertations

Early detection is crucial to mitigate the impact of emerging threats. This work proposes four innovative frameworks that build machine learning and deterministic epidemiological models using multiple domain-specific datasets to detect the onset of emerging threats in two domains: infectious diseases and cybersecurity. Our models are designed to detect infectious disease outbreaks, model their spread, detect malware activity, and analyze the relationship between software/hardware weaknesses and attack techniques.

First, we present a novel framework to detect multiple infectious disease outbreaks by integrating standardized disease-specific domain knowledge and public search trend data. Our framework showed high performance in identifying infectious disease …


Cyber-Physical Production Systems And Their Practical Integration And Application With Simio Software, Jose Carlos Garcia Marquez Basaldua May 2023

Cyber-Physical Production Systems And Their Practical Integration And Application With Simio Software, Jose Carlos Garcia Marquez Basaldua

Open Access Theses & Dissertations

Industry 4.0 comprises a diverse array of technologies and components that are revolutionizing the manufacturing industry, from Digital Twins, Cyber-Physical Systems and Augmented Reality. The elements that englobe Industry 4.0 vary from framework to framework. Nevertheless, there are similarities in the available literature on what constitutes Industry 4.0. Some of the most critical components specified by the available literature include Digital Twins and Cyber-Physical Systems. A Factory Digital Twin is a virtual representation of a production system that can mimic the behavior of the physical asset. Moreover, a digital twin must have synchronization with its physical twin (i.e., production floor), …


Enhancing Basic Geology Skills With Artificial Intelligence: An Exploration Of Automated Reasoning In Field Geology, Perry Ivan Quinto Houser May 2023

Enhancing Basic Geology Skills With Artificial Intelligence: An Exploration Of Automated Reasoning In Field Geology, Perry Ivan Quinto Houser

Open Access Theses & Dissertations

This thesis explores the use of Artificial Intelligence, specifically semantics, ontologies, and reasoner techniques, to improve field geology mapping. The thesis focuses on two use cases: 1) identifying a geologic formation based on observed characteristics; and 2) predicting the geologic formation that might be expected next based upon known stratigraphic sequence. The results show that the ontology was able to correctly identify the geologic formation for the majority of rock descriptions, with higher search results for descriptions that provided more detail. Similarly, the units expected next were correctly given and if incorrect, would provide a flag to the field geologist …


Interoperability In An Electrified Pavement System: A Model-Based Systems Engineering Perspective, Beatriz Irene Soto Dec 2022

Interoperability In An Electrified Pavement System: A Model-Based Systems Engineering Perspective, Beatriz Irene Soto

Open Access Theses & Dissertations

In a 2021 statement provided by The White House, (The White House, 2021), the Biden administration announce the goal for electric vehicles to account for 50% of new vehicle sales in the United States by 2035. In addition, the legislation allocates a budget of $7.5 billion to build out a national network of EV chargers along highway corridors to facilitate long-distance travel and within communities to provide convenient charging where people live, work, and shop. This investment will support the President's goal of building a nationwide network of 500,000 EV chargers to accelerate the adoption of EVs, reduce emissions, improve …


Online/Incremental Learning To Mitigate Concept Drift In Network Traffic Classification, Alberto R. De La Rosa Dec 2022

Online/Incremental Learning To Mitigate Concept Drift In Network Traffic Classification, Alberto R. De La Rosa

Open Access Theses & Dissertations

Communication networks play a large role in our everyday lives. COVID19 pandemic in 2020 highlighted their importance as most jobs had to be moved to remote work environments. It is possible that the spread of the virus, the death toll, and the economic consequences would have been much worse without communication networks. To remove sole dependence on one equipment vendor, networks are heterogeneous by design. Due to this, as well as their increasing size, network management has become overwhelming for network managers. For this reason, automating network management will have a significant positive impact. Machine learning and software defined networking …


Investigation Into The Economic Viability Of Industry 4.0 Practices In A Small Start-Up Setting: A Case Study, Joseph Lindley Dec 2022

Investigation Into The Economic Viability Of Industry 4.0 Practices In A Small Start-Up Setting: A Case Study, Joseph Lindley

Open Access Theses & Dissertations

Industry 4.0 has been a hot button topic since the first rumouringâ??s of a fourth industrial revolution taking place in the early 2010s. Since that time many companies have attempted to transform their process, procedures, and systems to become streamlined, efficient, and overall, more profitable. An example of this can be seen in companies such as Microsoft and IBM, Mitsubishi and Siemens who have gained a stronger foothold in their respective markets by their efficient implementation of Industry 4.0. Before we can address how small start-up companies can begin to compete with these behemoths, we must address the question; what …


Analyzing And Quantifying The Impact Of Software Diversification On Return-Oriented Programming (Rop) Based Exploits, David Reyes Dec 2022

Analyzing And Quantifying The Impact Of Software Diversification On Return-Oriented Programming (Rop) Based Exploits, David Reyes

Open Access Theses & Dissertations

With the implementation of modern software mitigation techniques such: as Address Space Layout Randomization (ASLR), stack canaries, and the No-Execute bit (N.X.), attackers can no longer achieve arbitrary code execution simply by injecting shellcode into a vulnerable buffer and redirecting execution to this vulnerable buffer. Instead, attackers have pivoted to Return Oriented Programming (ROP) to achieve the same arbitrary code execution. Using this attack method, attackers string together ROP gadgets, assembly code snippets found in the target binary, to form what are known as ROP Chains. Using these ROP Chains, attackers can achieve the same malicious behavior as previous code …


Radio Frequency Fingerprinting And Its Application To Scada Environments, Evan White Dec 2022

Radio Frequency Fingerprinting And Its Application To Scada Environments, Evan White

Open Access Theses & Dissertations

With the introduction of IoT into ICS and smartgrid environments there has been a mod-ernization of communication protocols through the internet. This has led to the use of features such as TCP/IP but with it comes modernized attack vectors against these sys- tems. These attacks can be Man In the Middle (MITM), rogue device communication and device cloning. To prevent these attacks, this thesis deploys Radio Frequency Fingerprint- ing (RFF) techniques to verify the uniqueness and legitimacy of known devices. It is crucial to employ security measures within ICS that do not add to the network complexity as this effects …


Decision Making Under Uncertainty With A Special Emphasis On Geosciences And Education, Laxman Bokati Dec 2022

Decision Making Under Uncertainty With A Special Emphasis On Geosciences And Education, Laxman Bokati

Open Access Theses & Dissertations

In many practical situations, we need to make a decision. In engineering, we need to decideon the best design of a system, and, for existing systems - on the best control strategy. In financial applications, we need to decide what is the best way to invest money. In geosciences, we need to decide whether we should explore a possible mineral deposit - or whether we should perform more experiments and measurements (and what exactly). In some cases, we can compute the exact consequences of each decision - e.g., if we are controlling a satellite. However, in many other cases, we …


Security Analysis And Implementation Of Dnp3 Multilayer Protocol For Secure And Safe Communication In Scada Systems, Isaac Monroy Dec 2022

Security Analysis And Implementation Of Dnp3 Multilayer Protocol For Secure And Safe Communication In Scada Systems, Isaac Monroy

Open Access Theses & Dissertations

When SCADA systems were first introduced into society, a lot of manpower was required for monitoring and controlling devices within critical infrastructures. With the increasing demand for services and growing systems, a need arose to automate the monitoring and controlling tasks. This led to introduction of networks into SCADA systems to enhance monitoring and control capabilities, that can scale with system size and requirements. But this introduction of network layer along with its advantages, also introduced a new threat surface which exposed multiple vulnerabilities within the system that can exploited to launch attacks, that led to the integration of security …


Oil Particle Analysis Using Machine Learning And Holography Imaging, Daniel Cruz Dec 2022

Oil Particle Analysis Using Machine Learning And Holography Imaging, Daniel Cruz

Open Access Theses & Dissertations

Holographic cameras show potential as a sensor to monitor oil spills. Holographic cameras record the light interference from particles in a volume of space, producing an image called a hologram. Processing these holograms is known as hologram reconstruction. It produces a representation of particles located in three-dimensional space. These cameras can record precise shapes and sizes of particles in a volume of water. However, it is very time-consuming and resource-intensive to process the images. Most algorithms that perform particle analysis require the hologram reconstruction step. The well-documented hybrid method is one such algorithm. Machine learning is one possible technique that …


High-Temperature Valve Design For A Solid Oxide Fuel Cell/Gas Turbine Hybrid System Utilizing Smart Materials, Alba Jazmin Leyva Dec 2022

High-Temperature Valve Design For A Solid Oxide Fuel Cell/Gas Turbine Hybrid System Utilizing Smart Materials, Alba Jazmin Leyva

Open Access Theses & Dissertations

The topic of this project includes extensive research on the Solid Oxide Fuel Cell Gas Turbine (SOFC/GT) hybrid system located at the National Energy Technology Laboratory. The goal is to reduce pollution and generate energy by using natural gas and a combination of fuel cells, heat exchangers, bypass valves, turbines, and combustors as components working together to produce clean energy. The SOFC/GT system works by having the fuel cell pressurized by the gas turbine. The turbine then produces exhaust gas for the fuel cell, because the turbine recovers the majority of the heat and the pressurization contributes to the enhancement …


Continuous Field Sensor Authentication And Process Integrity Assurance Mechanisms In Critical National Infrastructures, Abel Osvaldo Gomez Rivera Aug 2022

Continuous Field Sensor Authentication And Process Integrity Assurance Mechanisms In Critical National Infrastructures, Abel Osvaldo Gomez Rivera

Open Access Theses & Dissertations

The growing modernization of traditional Industrial Cyber-Physical Systems (ICPSs) has increased the probability and effectiveness of cyber attacks by integrating modern communication technologies that expose security vulnerabilities like lack of access control policies to adversaries. The exponential growth of cyber attacks has caught the attention of stakeholders that have proposed cybersecurity initiatives to protect ICPSs. ICPSs are part of the Critical National Infrastructures (CNIs) supporting the society's sustainability and national security. The cybersecurity initiatives aiming to address cyber attacks proposed by stakeholders must continuously authenticate constrained devices. Operational thresholds and process integrity assurance must also be maintained. A centralized ICPS …


Game-Theoretic Deception Modeling For Distracting Network Adversarie, Mohammad Sujan Miah May 2022

Game-Theoretic Deception Modeling For Distracting Network Adversarie, Mohammad Sujan Miah

Open Access Theses & Dissertations

In this day and age, adversaries in the cybersecurity space have become alarmingly capable of identifying network vulnerabilities and work out various targets to attack where deception is becoming an increasingly crucial technique for the defenders to delay these attacks. For securing computer networks, the defenders use various deceptive decoy objects to detect, confuse, and distract attackers. By trapping the attackers, these decoys gather information, waste their time and resources, and potentially prevent future attacks. However, we have to consider that an attacker with the help of smart techniques may detect the decoys and avoid them. One of the well-known …


Addressing Security And Privacy Issues By Analyzing Vulnerabilities In Iot Applications, Francsico Javier Candelario Burgoa Dec 2021

Addressing Security And Privacy Issues By Analyzing Vulnerabilities In Iot Applications, Francsico Javier Candelario Burgoa

Open Access Theses & Dissertations

The Internet of Things (IoT) environment has been expanding rapidly for the past few years into several areas of our lives, from factories, to stores and even into our own homes. All these new devices in our homes make our day-to-day lives easier and more comfortable with less effort on our part, converting our simple houses into smart homes. This increase in inter-connectivity brings multiple benefits including the improvement in energy efficiency in our homes, however it also brings with it some potential dangers since more points of connection mean more potential vulnerabilities in our grid. These vulnerabilities bring security …


Development Of Metaheuristic Algorithms For The Efficient Allocation Of Power Flow Control Devices, Eduardo Jose Castillo Fatule Dec 2021

Development Of Metaheuristic Algorithms For The Efficient Allocation Of Power Flow Control Devices, Eduardo Jose Castillo Fatule

Open Access Theses & Dissertations

Modern energy grids have become extremely complex systems, requiring more variable and active flow control. As a remedy to this, Distributed Flexible AC Transmission Systems (D-FACTS) are cost-efficient devices used to mitigate power flow congestion and integrate renewable energies. The objective of this research is then to propose an efficient multiple objective evolutionary algorithm to solve a stochastic model for D-FACTS allocation, which aims to optimize various objectives related to cost, grid health, and environmental impacts. The model was implemented on a modified RTS-96 test system, and the results show that optimally allocating D-FACTS modules using the proposed model can …


Seismic Tomographic Modeling Of The Coast Mountains Batholith, British Columbia, Canada, Sarah M. Quinonez May 2021

Seismic Tomographic Modeling Of The Coast Mountains Batholith, British Columbia, Canada, Sarah M. Quinonez

Open Access Theses & Dissertations

The Coast Mountains Batholith on the west coast of British Columbia, Canada, comprises a series of granitic to tonalitic plutons. The felsic continental crust is generated from mafic oceanic crust subduction by partial melting and fractionation, leaving ultra-mafic roots. In July of 2009, a sizeable controlled-source experiment was conducted along a 400km east-west transect from Bella Bella into central British Columbia. Student volunteers from multiple universities deployed 1,800 one-component and 200 three-component geophones connected to Texan data recorders with 200-m spacing intervals and shot spacing at 30-km. The 18-point sources ranged from 160 to 1,000 kg of high yield explosives. …


The Return Of State Vs State Competition, Albert James Contreras May 2021

The Return Of State Vs State Competition, Albert James Contreras

Open Access Theses & Dissertations

This thesis outlines a theoretically informed case study analysis of the United States' recent actions (US) regarding the United Kingdom's (UK) relationship with the Chinese telecommunications company, Huawei. There have been multiple US concerns regarding Huawei's activities in the UK and their potential implications for US national security. These concerns arise because it is a state-owned enterprise with close ties to the Chinese Communist Party (CCP). Because of its ties with the CCP, the US expressed fears that China will use Huawei's telecommunications technology to infiltrate and spy on countries that use their products. This is especially concerning as the …


Digital Twin Technology Applications For Transportation Infrastructure - A Survey-Based Study, Hector Cruz May 2021

Digital Twin Technology Applications For Transportation Infrastructure - A Survey-Based Study, Hector Cruz

Open Access Theses & Dissertations

In the past couple of decades, various industries have taken advantage of emerging advanced technologies, such as digital twin (DT), to find more effective solutions in their respective areas. In the transportation infrastructure sector, the concept and implementation of DT technologies are slowly gaining traction but lagging behind other major industries. To better understand the limitations, opportunities and challenges for the adoption of DT in this sector, a survey questionnaire was distributed to collect information from industry professionals involved in transportation infrastructure projects. The purpose of this study is to understand how DT technology is being perceived by the industry. …


Tram System Automation For Environmental Spectroscopy And Vegetation Monitoring, Enrique Anguiano Chavez Jan 2020

Tram System Automation For Environmental Spectroscopy And Vegetation Monitoring, Enrique Anguiano Chavez

Open Access Theses & Dissertations

Spectroscopy is the science of studying the interactions of matter and electromagnetic radiation (EMR). In particular, field spectroscopy takes place in a natural environment with a natural source of EMR. The paper presents progress towards the development and automation of a tram cart system. The new system in development collects high resolution, hyperspectral images and data from a spectrometer. Alternatives for a sensor cover mechanism to provide cover for the sensors mounted while the system is not operating are discussed, analyzing and comparing the benefits and disadvantages. An implementation for a charging station in an environment isolated from the electric …


Abstraction Techniques In Security Games With Underlying Network Structure, Anjon Basak Jan 2020

Abstraction Techniques In Security Games With Underlying Network Structure, Anjon Basak

Open Access Theses & Dissertations

In a multi-agent system, multiple intelligent agents interact with each other in an environment to achieve their objectives. They can do this because they know which actions are available to them and which actions they prefer to take in a particular situation. The job of game theory is to analyze the interactions of the intelligent agents by different solution techniques and provide analysis such as predicting outcomes or recommending courses of action to specific players. To do so game theory works with a model of real-world scenarios which helps us to make a better decision in our already complex daily …


A High-Temperature Valve Design For A Solid Oxide Fuel Cell/Gas Turbine Hybrid System, Cynthia Morales Jan 2020

A High-Temperature Valve Design For A Solid Oxide Fuel Cell/Gas Turbine Hybrid System, Cynthia Morales

Open Access Theses & Dissertations

Systems containing high heat generation require thermal management, especially in a solid oxide fuel cell gas turbine (SOFC/GT) hybrid system. The startup of each system in a standalone configuration may be a trivial approach, but when coupled together, different dynamics are experienced. The SOFC/GT provide high theoretical efficiency due to the ability to recover the extra heat produced by the fuel cell (FC) to drive the gas turbine (GT). After recovering the energy recuperated in the GT, the exhaust gas heats the cathode inlet flow to the FC which is an advantage during nominal operation of the cycle but not …


A Bottom-Up Modeling Methodology Using Knowledge Graphs For Composite Metric Development Applied To Traffic Crashes In The State Of Texas, Daniel Michael Mejia Jan 2019

A Bottom-Up Modeling Methodology Using Knowledge Graphs For Composite Metric Development Applied To Traffic Crashes In The State Of Texas, Daniel Michael Mejia

Open Access Theses & Dissertations

Data is a key factor for understanding real-world phenomena. Data can be discovered and integrated from multiple sources and has the potential to be interpreted in a multitude of ways. Traffic crashes, for example, are common events that occur in cities and provide a significant amount of data that has potential to be analyzed and disseminated in a way that can improve mobility of people, and ultimately improve the quality of life. Improving the quality of life of city residents through the use of data and technology is at the core of Smart Cities solutions. Measuring the improvement that Smart …


Energy Management And Control Of Smart Power Distribution Systems, Eric Galvan Jan 2019

Energy Management And Control Of Smart Power Distribution Systems, Eric Galvan

Open Access Theses & Dissertations

With the development of distributed energy resources (DERs) and advancements in technology, microgrids (MGs) appear primed to become an even more integral part of the future distribution grid. In this transition to the smart power grid of the future, MGs must be properly managed and controlled to allow efficient integration of DERs. Over the past years, there has been rapid adoption of roof-top solar photovoltaic (PV) and battery electric vehicles (BEVs). Although roof-top solar PV and BEVs can provide environmental benefits (e.g., reduction of emissions), they also create various challenges for power system operators. For example, roof-top solar PV generation …