Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Engineering

Quantifying Dds-Cerberus Network Control Overhead, Andrew T. Park, Nathaniel R. Peck, Richard Dill, Douglas D. Hodson, Michael R. Grimaila, Wayne C. Henry Sep 2022

Quantifying Dds-Cerberus Network Control Overhead, Andrew T. Park, Nathaniel R. Peck, Richard Dill, Douglas D. Hodson, Michael R. Grimaila, Wayne C. Henry

Faculty Publications

Securing distributed device communication is critical because the private industry and the military depend on these resources. One area that adversaries target is the middleware, which is the medium that connects different systems. This paper evaluates a novel security layer, DDS-Cerberus (DDS-C), that protects in-transit data and improves communication efficiency on data-first distribution systems. This research contributes a distributed robotics operating system testbed and designs a multifactorial performance-based experiment to evaluate DDS-C efficiency and security by assessing total packet traffic generated in a robotics network. The performance experiment follows a 2:1 publisher to subscriber node ratio, varying the number of …


Securing Information On A Web Application System To Facilitate Online Blood Donation Booking, Hrishitva Patel Aug 2022

Securing Information On A Web Application System To Facilitate Online Blood Donation Booking, Hrishitva Patel

Faculty Publications

Blood donation has saved many lives in the past. According to statistics presented by the American Red Cross, a patient is in need of a blood transfusion every two seconds. There are many benefits that arise from blood donation to both the donor and the blood recipients. With blood donation, cancer patients, people involved in accidents, or those battling diseases that require blood donation have access to enough blood to sustain their survival. There is a need to digitize the blood donation booking to facilitate blood donation across the United States, and ensure patients in need of blood, receive their …


A Monte Carlo Framework For Incremental Improvement Of Simulation Fidelity, Damian M. Lyons, James Finocchiaro, Misha Novitzky, Chris Korpela Jul 2022

A Monte Carlo Framework For Incremental Improvement Of Simulation Fidelity, Damian M. Lyons, James Finocchiaro, Misha Novitzky, Chris Korpela

Faculty Publications

Robot software developed in simulation often does not be- have as expected when deployed because the simulation does not sufficiently represent reality - this is sometimes called the `reality gap' problem. We propose a novel algorithm to address the reality gap by injecting real-world experience into the simulation. It is assumed that the robot program (control policy) is developed using simulation, but subsequently deployed on a real system, and that the program includes a performance objective monitor procedure with scalar output. The proposed approach collects simulation and real world observations and builds conditional probability functions. These are used to generate …


A Monte Carlo Framework For Incremental Improvement Of Simulation Fidelity, Damian Lyons, James Finocchiaro, Misha Novitsky, Chris Korpela Jul 2022

A Monte Carlo Framework For Incremental Improvement Of Simulation Fidelity, Damian Lyons, James Finocchiaro, Misha Novitsky, Chris Korpela

Faculty Publications

Robot software developed in simulation often does not be- have as expected when deployed because the simulation does not sufficiently represent reality - this is sometimes called the `reality gap' problem. We propose a novel algorithm to address the reality gap by injecting real-world experience into the simulation. It is assumed that the robot program (control policy) is developed using simulation, but subsequently deployed on a real system, and that the program includes a performance objective monitor procedure with scalar output. The proposed approach collects simulation and real world observations and builds conditional probability functions. These are used to generate …


An Ontology For Cardiothoracic Surgical Education And Clinical Data Analytics, Maryam Panahiazar, Yorick Chern, Ramon Riojas, Omar S.Latif, Usha Lokala, Dexter Hadley, Amit Sheth, Ramin E.Beygui Jul 2022

An Ontology For Cardiothoracic Surgical Education And Clinical Data Analytics, Maryam Panahiazar, Yorick Chern, Ramon Riojas, Omar S.Latif, Usha Lokala, Dexter Hadley, Amit Sheth, Ramin E.Beygui

Faculty Publications

The development of an ontology facilitates the organization of the variety of concepts used to describe different terms in different resources. The proposed ontology will facilitate the study of cardiothoracic surgical education and data analytics in electronic medical records (EMR) with the standard vocabulary.


Visual Homing For Robot Teams: Do You See What I See?, Damian Lyons, Noah Petzinger Apr 2022

Visual Homing For Robot Teams: Do You See What I See?, Damian Lyons, Noah Petzinger

Faculty Publications

Visual homing is a lightweight approach to visual navigation which does not require GPS. It is very attractive for robot platforms with a low computational capacity. However, a limitation is that the stored home location must be initially within the field of view of the robot. Motivated by the increasing ubiquity of camera information we propose to address this line-of-sight limitation by leveraging camera information from other robots and fixed cameras. To home to a location that is not initially within view, a robot must be able to identify a common visual landmark with another robot that can be used …


Visual Homing For Robot Teams: Do You See What I See?, Damian Lyons, Noah Petzinger Apr 2022

Visual Homing For Robot Teams: Do You See What I See?, Damian Lyons, Noah Petzinger

Faculty Publications

Visual homing is a lightweight approach to visual navigation which does not require GPS. It is very attractive for robot platforms with a low computational capacity. However, a limitation is that the stored home location must be initially within the field of view of the robot. Motivated by the increasing ubiquity of camera information we propose to address this line-of-sight limitation by leveraging camera information from other robots and fixed cameras. To home to a location that is not initially within view, a robot must be able to identify a common visual landmark with another robot that can be used …


Effect Of Connection State & Transport/Application Protocol On The Machine Learning Outlier Detection Of Network Intrusions, George Yuchi [*], Torrey J. Wagner, Paul Auclair, Brent T. Langhals Jan 2022

Effect Of Connection State & Transport/Application Protocol On The Machine Learning Outlier Detection Of Network Intrusions, George Yuchi [*], Torrey J. Wagner, Paul Auclair, Brent T. Langhals

Faculty Publications

The majority of cyber infiltration & exfiltration intrusions leave a network footprint, and due to the multi-faceted nature of detecting network intrusions, it is often difficult to detect. In this work a Zeek-processed PCAP dataset containing the metadata of 36,667 network packets was modeled with several machine learning algorithms to classify normal vs. anomalous network activity. Principal component analysis with a 10% contamination factor was used to identify anomalous behavior. Models were created using recursive feature elimination on logistic regression and XGBClassifier algorithms, and also using Bayesian and bandit optimization of neural network hyperparameters. These models were trained on a …