Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Center_CCR (8)
- Blockchain (3)
- Machine learning (3)
- Cybersecurity (2)
- Internet of Things (2)
-
- Vehicle ad-hoc network (2)
- #antcenter (1)
- 2-D imaging (1)
- 3-D scanning LIDAR (1)
- Algorithm (1)
- Algorithms (1)
- Automated aerial fefueling (1)
- Autonomous (1)
- Autonomous surface vehicles (1)
- Autonomous systems (1)
- Big data (1)
- C-17 (1)
- Camera calibration (1)
- Computer networks--Security measures (1)
- Computer vision (1)
- Cooperative localization (1)
- Crowdsourcing DroidNet Android Mobile App Application (1)
- Cyber Security (1)
- Cyberterrorism--Prevention (1)
- Decision confidence (1)
- Dedicated Short Range Communication (DSRC) (1)
- Deep convolutional learning networks (1)
- Deep learning (1)
- Distributed Ledger Technologies (1)
- Distributed ledger technologies (1)
Articles 31 - 37 of 37
Full-Text Articles in Engineering
A Stochastic Game Theoretical Model For Cyber Security, Michael T. Larkin
A Stochastic Game Theoretical Model For Cyber Security, Michael T. Larkin
Theses and Dissertations
The resiliency of systems integrated through cyber networks is of utmost importance due to the reliance on these systems for critical services such as industrial control systems, nuclear production, and military weapons systems. Current research in cyber resiliency remains largely limited to methodologies utilizing a singular technique that is predominantly theoretical with limited examples given. This research uses notional data in presenting a novel approach to cyber system analysis and network resource allocation by leveraging multiple techniques including game theory, stochastic processes, and mathematical programming. An operational network security problem consisting of 20 tactical normal form games provides an assessment …
Hyper-Parameter Optimization Of A Convolutional Neural Network, Steven H. Chon
Hyper-Parameter Optimization Of A Convolutional Neural Network, Steven H. Chon
Theses and Dissertations
In the world of machine learning, neural networks have become a powerful pattern recognition technique that gives a user the ability to interpret high-dimensional data whereas conventional methods, such as logistic regression, would fail. There exists many different types of neural networks, each containing its own set of hyper-parameters that are dependent on the type of analysis required, but the focus of this paper will be on the hyper-parameters of convolutional neural networks. Convolutional neural networks are commonly used for classifications of visual imagery. For example, if you were to build a network for the purpose of predicting a specific …
Human-Centered Enterprise Resource Maintenance Management, Sharon Sue Chinoy
Human-Centered Enterprise Resource Maintenance Management, Sharon Sue Chinoy
Theses and Dissertations
In complex domains, maintenance personnel may be required to use multiple software tools for receiving status information and controlling resources across the enterprise. These tools have evolved to be effective for collecting status, but often lack integrated contextual information for personnel to understand failure event impact to the enterprise and operational mission. Through a human-centered design approach, salient concepts and semantically relevant maintenance information can be captured within a domain. This research will show that an ontology can be a useful method to establish a common frame of reference to promote better situation awareness and more effective decision-making and collaboration …
Infrared And Electro-Optical Stereo Vision For Automated Aerial Refueling, William E. Dallmann
Infrared And Electro-Optical Stereo Vision For Automated Aerial Refueling, William E. Dallmann
Theses and Dissertations
Currently, Unmanned Aerial Vehicles are unsafe to refuel in-flight due to the communication latency between the UAVs ground operator and the UAV. Providing UAVs with an in-flight refueling capability would improve their functionality by extending their flight duration and increasing their flight payload. Our solution to this problem is Automated Aerial Refueling (AAR) using stereo vision from stereo electro-optical and infrared cameras on a refueling tanker. To simulate a refueling scenario, we use ground vehicles to simulate a pseudo tanker and pseudo receiver UAV. Imagery of the receiver is collected by the cameras on the tanker and processed by a …
Let’S Face It: The Effect Of Orthognathic Surgery On Facial Recognition Algorithm Analysis, Carolyn Bradford Dragon
Let’S Face It: The Effect Of Orthognathic Surgery On Facial Recognition Algorithm Analysis, Carolyn Bradford Dragon
Theses and Dissertations
Aim: To evaluate the ability of a publicly available facial recognition application program interface (API) to calculate similarity scores for pre- and post-surgical photographs of patients undergoing orthognathic surgeries. Our primary objective was to identify which surgical procedure(s) had the greatest effect(s) on similarity score.
Methods: Standard treatment progress photographs for 25 retrospectively identified, orthodontic-orthognathic patients were analyzed using the API to calculate similarity scores between the pre- and post-surgical photographs. Photographs from two pre-surgical timepoints were compared as controls. Both relaxed and smiling photographs were included in the study to assess for the added impact of facial pose on …
The Evaluation Of An Android Permission Management System Based On Crowdsourcing, Pulkit Rustgi
The Evaluation Of An Android Permission Management System Based On Crowdsourcing, Pulkit Rustgi
Theses and Dissertations
Mobile and web application security, particularly concerning the area of data privacy, has received much attention from the public in recent years. Most applications are installed without disclosing full information to users and clearly stating what they have access to. This often raises concerns when users become aware of unnecessary information being collected or stored. Unfortunately, most users have little to no technical knowledge in regard to what permissions should be granted and can only rely on their intuition and past experiences to make relatively uninformed decisions. DroidNet, a crowdsource based Android recommendation tool and framework, is a proposed avenue …
Energy Efficient Spintronic Device For Neuromorphic Computation, Md Ali Azam
Energy Efficient Spintronic Device For Neuromorphic Computation, Md Ali Azam
Theses and Dissertations
Future computing will require significant development in new computing device paradigms. This is motivated by CMOS devices reaching their technological limits, the need for non-Von Neumann architectures as well as the energy constraints of wearable technologies and embedded processors. The first device proposal, an energy-efficient voltage-controlled domain wall device for implementing an artificial neuron and synapse is analyzed using micromagnetic modeling. By controlling the domain wall motion utilizing spin transfer or spin orbit torques in association with voltage generated strain control of perpendicular magnetic anisotropy in the presence of Dzyaloshinskii-Moriya interaction (DMI), different positions of the domain wall are realized …