Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 37 of 37

Full-Text Articles in Engineering

A Stochastic Game Theoretical Model For Cyber Security, Michael T. Larkin Mar 2019

A Stochastic Game Theoretical Model For Cyber Security, Michael T. Larkin

Theses and Dissertations

The resiliency of systems integrated through cyber networks is of utmost importance due to the reliance on these systems for critical services such as industrial control systems, nuclear production, and military weapons systems. Current research in cyber resiliency remains largely limited to methodologies utilizing a singular technique that is predominantly theoretical with limited examples given. This research uses notional data in presenting a novel approach to cyber system analysis and network resource allocation by leveraging multiple techniques including game theory, stochastic processes, and mathematical programming. An operational network security problem consisting of 20 tactical normal form games provides an assessment …


Hyper-Parameter Optimization Of A Convolutional Neural Network, Steven H. Chon Mar 2019

Hyper-Parameter Optimization Of A Convolutional Neural Network, Steven H. Chon

Theses and Dissertations

In the world of machine learning, neural networks have become a powerful pattern recognition technique that gives a user the ability to interpret high-dimensional data whereas conventional methods, such as logistic regression, would fail. There exists many different types of neural networks, each containing its own set of hyper-parameters that are dependent on the type of analysis required, but the focus of this paper will be on the hyper-parameters of convolutional neural networks. Convolutional neural networks are commonly used for classifications of visual imagery. For example, if you were to build a network for the purpose of predicting a specific …


Human-Centered Enterprise Resource Maintenance Management, Sharon Sue Chinoy Mar 2019

Human-Centered Enterprise Resource Maintenance Management, Sharon Sue Chinoy

Theses and Dissertations

In complex domains, maintenance personnel may be required to use multiple software tools for receiving status information and controlling resources across the enterprise. These tools have evolved to be effective for collecting status, but often lack integrated contextual information for personnel to understand failure event impact to the enterprise and operational mission. Through a human-centered design approach, salient concepts and semantically relevant maintenance information can be captured within a domain. This research will show that an ontology can be a useful method to establish a common frame of reference to promote better situation awareness and more effective decision-making and collaboration …


Infrared And Electro-Optical Stereo Vision For Automated Aerial Refueling, William E. Dallmann Mar 2019

Infrared And Electro-Optical Stereo Vision For Automated Aerial Refueling, William E. Dallmann

Theses and Dissertations

Currently, Unmanned Aerial Vehicles are unsafe to refuel in-flight due to the communication latency between the UAVs ground operator and the UAV. Providing UAVs with an in-flight refueling capability would improve their functionality by extending their flight duration and increasing their flight payload. Our solution to this problem is Automated Aerial Refueling (AAR) using stereo vision from stereo electro-optical and infrared cameras on a refueling tanker. To simulate a refueling scenario, we use ground vehicles to simulate a pseudo tanker and pseudo receiver UAV. Imagery of the receiver is collected by the cameras on the tanker and processed by a …


Let’S Face It: The Effect Of Orthognathic Surgery On Facial Recognition Algorithm Analysis, Carolyn Bradford Dragon Jan 2019

Let’S Face It: The Effect Of Orthognathic Surgery On Facial Recognition Algorithm Analysis, Carolyn Bradford Dragon

Theses and Dissertations

Aim: To evaluate the ability of a publicly available facial recognition application program interface (API) to calculate similarity scores for pre- and post-surgical photographs of patients undergoing orthognathic surgeries. Our primary objective was to identify which surgical procedure(s) had the greatest effect(s) on similarity score.

Methods: Standard treatment progress photographs for 25 retrospectively identified, orthodontic-orthognathic patients were analyzed using the API to calculate similarity scores between the pre- and post-surgical photographs. Photographs from two pre-surgical timepoints were compared as controls. Both relaxed and smiling photographs were included in the study to assess for the added impact of facial pose on …


The Evaluation Of An Android Permission Management System Based On Crowdsourcing, Pulkit Rustgi Jan 2019

The Evaluation Of An Android Permission Management System Based On Crowdsourcing, Pulkit Rustgi

Theses and Dissertations

Mobile and web application security, particularly concerning the area of data privacy, has received much attention from the public in recent years. Most applications are installed without disclosing full information to users and clearly stating what they have access to. This often raises concerns when users become aware of unnecessary information being collected or stored. Unfortunately, most users have little to no technical knowledge in regard to what permissions should be granted and can only rely on their intuition and past experiences to make relatively uninformed decisions. DroidNet, a crowdsource based Android recommendation tool and framework, is a proposed avenue …


Energy Efficient Spintronic Device For Neuromorphic Computation, Md Ali Azam Jan 2019

Energy Efficient Spintronic Device For Neuromorphic Computation, Md Ali Azam

Theses and Dissertations

Future computing will require significant development in new computing device paradigms. This is motivated by CMOS devices reaching their technological limits, the need for non-Von Neumann architectures as well as the energy constraints of wearable technologies and embedded processors. The first device proposal, an energy-efficient voltage-controlled domain wall device for implementing an artificial neuron and synapse is analyzed using micromagnetic modeling. By controlling the domain wall motion utilizing spin transfer or spin orbit torques in association with voltage generated strain control of perpendicular magnetic anisotropy in the presence of Dzyaloshinskii-Moriya interaction (DMI), different positions of the domain wall are realized …