Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 8 of 8
Full-Text Articles in Engineering
Beyond The Horizon: Exploring Anomaly Detection Potentials With Federated Learning And Hybrid Transformers In Spacecraft Telemetry, Juan Rodriguez
Beyond The Horizon: Exploring Anomaly Detection Potentials With Federated Learning And Hybrid Transformers In Spacecraft Telemetry, Juan Rodriguez
Computer Science and Engineering Theses and Dissertations
Telemetry sensors play a crucial role in spacecraft operations, providing essential data on efficiency, sustainability, and safety. However, identifying irregularities in telemetry data can be a time-consuming process that risks the success of missions. With the rise of CubeSats and smallsats, telemetry data has become more abundant, but concerns about privacy and scalability have resulted in untapped data potential. To address these issues, we propose a new approach to anomaly detection that utilizes machine learning models at data sources. These models solely transmit weights to a centralized server for aggregation, resulting in improved dataset performance with a single global model. …
Grammatical Triples Extraction For The Distant Reading Of Textual Corpora, Stephanie Buongiorno, Stephanie Buongiorno
Grammatical Triples Extraction For The Distant Reading Of Textual Corpora, Stephanie Buongiorno, Stephanie Buongiorno
Multidisciplinary Studies Theses and Dissertations
Grammatical triples extraction has become increasingly important for the analysis of large, textual corpora. By providing insight into the sentence-level linguistic features of a corpus, extracted triples have supported interpretations of some of the most relevant problems of our time. The growing importance of triples extraction for analyzing large corpora has put the quality of extracted triples under new scrutiny, however. Triples outputs are known to have large amounts of erroneous triples. The extraction of erroneous triples poses a risk for understanding a textual corpus because erroneous triples can be nonfactual and even analogous to misinformation. Disciplines such as the …
Enhanced Security Utilizing Side Channel Data Analysis, Michael Taylor
Enhanced Security Utilizing Side Channel Data Analysis, Michael Taylor
Computer Science and Engineering Theses and Dissertations
The physical state of a system is affected by the activities and processes in which it is tasked with carrying out. In the past there have been many instances where such physical changes have been exploited by bad actors in order to gain insight into the operational state and even the data being held on a system. This method of side channel exploitation is very often effective due to the relative difficulty of obfuscating activity on a physical level. However, in order to take advantage of side channel data streams one must have a detailed working knowledge of how a …
Exploring Neural Networks For Predicting Sentinel-C Backscatter Between Image Acquisitions, Zhongdi Wu
Exploring Neural Networks For Predicting Sentinel-C Backscatter Between Image Acquisitions, Zhongdi Wu
Computer Science and Engineering Theses and Dissertations
Measuring moisture dynamics in soil and overlying vegetation is key to understanding ecosystem and agricultural dynamics in many contexts. For many applications, moisture information is demanded at high temporal frequency over large areas. Sentinel-1 C-band radar backscatter satellite images provide a repeating sequence of fine-resolution (10-m) observations that can be used to infer soil and vegetation moisture, but the 12-day interval between satellite observations is infrequent relative to the sensed moisture dynamics. Machine learning approaches have been used to predict soil moisture at higher spatial resolutions than the original satellite images, but little effort has been made to increase the …
Machine Learning Applications In Power Systems, Xinan Wang
Machine Learning Applications In Power Systems, Xinan Wang
Electrical Engineering Theses and Dissertations
Machine learning (ML) applications have seen tremendous adoption in power system research and applications. For instance, supervised/unsupervised learning-based load forecasting and fault detection are classic ML topics that have been well studied. Recently, reinforcement learning-based voltage control, distribution analysis, etc., are also gaining popularity. Compared to conventional mathematical methods, ML methods have the following advantages: (i). better robustness against different system configurations due to its data-driven nature; (ii). better adaption to system uncertainties; (iii). less dependent on the modeling accuracy and validity of assumptions. However, due to the unique physics of the power grid, many problems cannot be directly solved …
Long Term Software Quality And Reliability Assurance In A Small Company, Eric Abuta
Long Term Software Quality And Reliability Assurance In A Small Company, Eric Abuta
Computer Science and Engineering Theses and Dissertations
Demonstrating software reliability across multiple software releases has become essential in making informed decisions of upgrading software releases without impacting significantly end users' characterized processes and software quality standards. Standard defect and workload data normally collected in a typical small software development organization can be used for this purpose. Objective of this study was to demonstrate how to measure software reliability in multiple releases and whether continuous defect fixes and code upgrades increased software reliability. This study looked at techniques such as trend test that evaluated software system's overall trend and stability, input domain reliability models (IDRM) that assessed system's …
A Grammar Based Approach To Distributed Systems Fault Diagnosis Using Log Files, Stephen Hanka
A Grammar Based Approach To Distributed Systems Fault Diagnosis Using Log Files, Stephen Hanka
Computer Science and Engineering Theses and Dissertations
Diagnosing and correcting failures in complex, distributed systems is difficult. In a network of perhaps dozens of nodes, each of which is executing dozens of interacting applications, sometimes from different suppliers or vendors, finding the source of a system failure is a confusing, tedious piece of detective work. The person assigned this task must trace the failing command, event, or operation through the network components and find a deviation from the correct, desired interaction sequence. After a deviation is identified, the failing applications must be found, and the fault or faults traced to the incorrect source code.
Often the primary …
Improving System-On-Chip Test Networks For: Bandwidth, Security, And Power, Saurabh Gupta
Improving System-On-Chip Test Networks For: Bandwidth, Security, And Power, Saurabh Gupta
Computer Science and Engineering Theses and Dissertations
Modern System-on-Chips (SoCs) provide benefits such as reduction in overall system cost, and size, increased performance, and lower power consumption. Increasing complexity of these Integrated Circuits (ICs) has resulted in a higher probability of manufacturing defects. Manufacturing defects can result in the faulty operation of a system. Thus, it is essential to test an IC after it is manufactured to detect any possible faults in it. These SoCs include on-chip embedded instruments that can be used for test, debug, diagnosis, validation, monitoring, characterization, configuration, or functional purposes. IEEE 1687 Std. (IJTAG) provides a standard interface for the reconfigurable access and …