Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Engineering

Demonstration Of Inexact Computing Implemented In The Jpeg Compression Algorithm Using Probabilistic Boolean Logic Applied To Cmos Components, Christopher I. Allen Dec 2015

Demonstration Of Inexact Computing Implemented In The Jpeg Compression Algorithm Using Probabilistic Boolean Logic Applied To Cmos Components, Christopher I. Allen

Theses and Dissertations

Probabilistic computing offers potential improvements in energy, performance, and area compared with traditional digital design. This dissertation quantifies energy and energy-delay tradeoffs in digital adders, multipliers, and the JPEG image compression algorithm. This research shows that energy demand can be cut in half with noisesusceptible16-bit Kogge-Stone adders that deviate from the correct value by an average of 3 in 14 nanometer CMOS FinFET technology, while the energy-delay product (EDP) is reduced by 38 . This is achieved by reducing the power supply voltage which drives the noisy transistors. If a 19 average error is allowed, the adders are 13 times …


Network Analysis With Stochastic Grammars, Alan C. Lin Sep 2015

Network Analysis With Stochastic Grammars, Alan C. Lin

Theses and Dissertations

Digital forensics requires significant manual effort to identify items of evidentiary interest from the ever-increasing volume of data in modern computing systems. One of the tasks digital forensic examiners conduct is mentally extracting and constructing insights from unstructured sequences of events. This research assists examiners with the association and individualization analysis processes that make up this task with the development of a Stochastic Context -Free Grammars (SCFG) knowledge representation for digital forensics analysis of computer network traffic. SCFG is leveraged to provide context to the low-level data collected as evidence and to build behavior profiles. Upon discovering patterns, the analyst …


An Analysis Of Conus Based Deployment Of Pseudolites For Positioning, Navigation And Timing (Pnt) Systems, Justin H. Deifel, Albert J. Pena Sep 2015

An Analysis Of Conus Based Deployment Of Pseudolites For Positioning, Navigation And Timing (Pnt) Systems, Justin H. Deifel, Albert J. Pena

Theses and Dissertations

The Global Positioning System (GPS) developed and operated by the United States Air Force (USAF) provides a way for users to determine position, navigation and timing (PNT). GPS provides an extraordinary capability that has become instrumental in all aspects of our day to day lives. As new technologies such as automated vehicles and unmanned aircraft continue to be developed, a reliable back up to GPS is required to ensure the PNT data generated in these systems is accurate. This research studies a potential architecture for deploying a nationwide network of ground based pseudolites that would act to supplement and backup …


A Feasibility Study On The Application Of The Scriptgene Framework As An Anomaly Detection System In Industrial Control Systems, Charito M. Corvin Sep 2015

A Feasibility Study On The Application Of The Scriptgene Framework As An Anomaly Detection System In Industrial Control Systems, Charito M. Corvin

Theses and Dissertations

Recent events such as Stuxnet and the Shamoon Aramco have brought to light how vulnerable industrial control systems (ICSs) are to cyber attacks. Modern society relies heavily on critical infrastructure, including the electric power grid, water treatment facilities, and nuclear energy plants. Malicious attempts to disrupt, destroy and disable such systems can have devastating effects on a populations way of life, possibly leading to loss of life. The need to implement security controls in the ICS environment is more vital than ever. ICSs were not originally designed with network security in mind. Today, intrusion detection systems are employed to detect …


Novel Techniques For Secure Use Of Public Cloud Computing Resources, Kyle E. Stewart Sep 2015

Novel Techniques For Secure Use Of Public Cloud Computing Resources, Kyle E. Stewart

Theses and Dissertations

The federal government has an expressed interest in moving data and services to third party service providers in order to take advantage of the flexibility, scalability, and potential cost savings. This approach is called cloud computing. The thesis for this research is that efficient techniques exist to support the secure use of public cloud computing resources by a large, federated enterprise. The primary contributions of this research are the novel cryptographic system MA-AHASBE (Multi-Authority Anonymous Hierarchical Attribute-Set Based Encryption), and the techniques used to incorporate MA-AHASBE in a real world application. Performance results indicate that while there is a cost …


Generation Of Strategies For Environmental Deception In Two-Player Normal-Form Games, Howard E. Poston Jun 2015

Generation Of Strategies For Environmental Deception In Two-Player Normal-Form Games, Howard E. Poston

Theses and Dissertations

Methods of performing and defending against deceptive actions are a popular field of study in game theory; however, the focus is mostly on action deception in turn-based games. This work focuses on developing strategies for performing environmental deception in two-player, strategic-form games. Environmental deception is defined as deception where one player has the ability to change the other's perception of the state of the game through modification of their perception of the game's payoff matrix, similar to the use of camouflage. The main contributions of this research are an expansion of the definition of the stability of a Nash equilibrium …


Counter Weapon Control, Brian J. Roadruck Mar 2015

Counter Weapon Control, Brian J. Roadruck

Theses and Dissertations

In this work, pursuit-evasion differential game theory is applied to the target defense scenario. The targets, attackers, and the defenders positional information is assumed to be known to the players. With positional information, a computational efficient method of strategy synthesis can be derived applying a differential game theory approach. We demonstrate that when non-optimal strategies are employed by one of the players, e.g. Line Of Sight guidance, the outcome will favor the players that employ the optimal strategy given by the solution of the pursuit-evasion differential game.


Git As An Encrypted Distributed Version Control System, Russell G. Shirey Mar 2015

Git As An Encrypted Distributed Version Control System, Russell G. Shirey

Theses and Dissertations

This thesis develops and presents a secure Git implementation, Git Virtual Vault (GV2), for users of Git to work on sensitive projects with repositories located in unsecure distributed environments, such as in cloud computing. This scenario is common within the Department of Defense, as much work is of a sensitive nature. In order to provide security to Git, additional functionality is added for confidentiality and integrity protection. This thesis examines existing Git encryption implementations and baselines their performance compared to unencrypted Git. Real-world Git repositories are examined to characterize typical Git usage and determine if the existing Git encryption implementations …


Automatic Configuration Of Programmable Logic Controller Emulators, Phillip C. Warner Mar 2015

Automatic Configuration Of Programmable Logic Controller Emulators, Phillip C. Warner

Theses and Dissertations

Programmable logic controllers (PLCs), which are used to control much of the world's critical infrastructures, are highly vulnerable and exposed to the Internet. Many efforts have been undertaken to develop decoys, or honeypots, of these devices in order to characterize, attribute, or prevent attacks against Industrial Control Systems (ICS) networks. Unfortunately, since ICS devices typically are proprietary and unique, one emulation solution for a particular vendor's model will not likely work on other devices. Many previous efforts have manually developed ICS honeypots, but it is a very time intensive process. Thus, a scalable solution is needed in order to automatically …


Characterization Of A Robotic Manipulator For Dynamic Wind Tunnel Applications, James C. Lancaster Mar 2015

Characterization Of A Robotic Manipulator For Dynamic Wind Tunnel Applications, James C. Lancaster

Theses and Dissertations

The newly acquired 6-DOF Motion Test Apparatus (MTA) was installed to perform dynamic wind tunnel testing in the AFIT Low Speed Wind Tunnel. Several complex motions revealed that the overall performance of the test rig needed improvement especially during small motions. The motions exposed that further enhancements would need to be performed individually for each joint. This research effort focused on the improvement of the MTA wrist roll motor and controller using a pitch oscillation. The controller software was improved using position feedback because the MTA wrist roll motor and controller exhibited reduced signal bias and amplitude attenuation. The enhanced …


Robust Models For Operator Workload Estimation, Andrew M. Smith Mar 2015

Robust Models For Operator Workload Estimation, Andrew M. Smith

Theses and Dissertations

When human-machine system operators are overwhelmed, judicious employment of automation can be beneficial. Ideally, a system which can accurately estimate current operator workload can make better choices when to employ automation. Supervised machine learning models can be trained to estimate workload in real time from operator physiological data. Unfortunately, estimating operator workload using trained models is limited: using a model trained in one context can yield poor estimation of workload in another. This research examines the utility of three algorithms (linear regression, regression trees, and Artificial Neural Networks) in terms of cross-application workload prediction. The study is conducted for a …


Fpga Accelerated Discrete-Surf For Real-Time Homography Estimation, Andrew C. Leighner Mar 2015

Fpga Accelerated Discrete-Surf For Real-Time Homography Estimation, Andrew C. Leighner

Theses and Dissertations

This paper describes our hardware accelerated, FPGA implementation of SURF, named Discrete SURF, to support real-time homography estimation for close range aerial navigation. The SURF algorithm provides feature matches between a model and a scene which can be used to find the transformation between the camera and the model. Previous implementations of SURF have partially employed FPGAs to accelerate the feature detection stage of upright only image comparisons. We extend the work of previous implementations by providing an FPGA implementation that allows rotation during image comparisons in order to facilitate aerial navigation. We also expand beyond feature detection as the …


Leveraging Human Insights By Combining Multi-Objective Optimization With Interactive Evolution, Joshua R. Christman Mar 2015

Leveraging Human Insights By Combining Multi-Objective Optimization With Interactive Evolution, Joshua R. Christman

Theses and Dissertations

Deceptive fitness landscapes are a growing concern for evolutionary computation. Recent work has shown that combining human insights with short-term evolution has a synergistic effect that accelerates the discovery of solutions. While humans provide rich insights, they fatigue easily. Previous work reduced the number of human evaluations by evolving a diverse set of candidates via intermittent searches for novelty. While successful at evolving solutions for a deceptive maze domain, this approach lacks the ability to measure what the human evaluator identifies as important. The key insight here is that multi-objective evolutionary algorithms foster diversity, serving as a surrogate for novelty, …


The Theory And Application Of Privacy-Preserving Computation, Michael R. Clark Mar 2015

The Theory And Application Of Privacy-Preserving Computation, Michael R. Clark

Theses and Dissertations

Privacy is a growing concern in the digital world as more information becomes digital every day. Often the implications of how this information could be exploited for nefarious purposes are not explored until after the fact. The public is becoming more concerned about this. This dissertation introduces a new paradigm for tackling the problem, namely, transferable multiparty computation (T-MPC). T-MPC builds upon existing multiparty computation work yet allows some additional flexibility in the set of participants. T-MPC is orders of magnitude more efficient for certain applications. This greatly increases the scalability of the sizes of networks supported for privacy-preserving computation.