Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Computer networks--Security measures (3)
- Air Force Research Laboratory (1)
- Air bases (1)
- Analysis of variance (1)
- Anomaly detection (Computer security) (1)
-
- Artificial satellites (1)
- Authentication (1)
- Computers--Access control (1)
- Conflict management (1)
- Digital computer simulation (1)
- Digital signatures (1)
- Disaster relief (United States) (1)
- Emergency management (1)
- Emergency management--United States (1)
- Geographical positions (1)
- Hurricane Katrina (2005) (1)
- Image processing--Digital techniques (1)
- Information technology--Social aspects (1)
- Logistics--Mathematical models (1)
- Mathematical optimization (1)
- Military planning (1)
- Natural disasters (1)
- Operating Characteristic Curve (1)
- Pattern recognition systems (1)
- Payloads (Aerospace engineering) (1)
- Prior Probability (1)
- Research and development contracts--United States (1)
- Resource allocation (1)
- Shipping--Security measures--Computer simulation (1)
- Software measurement (1)
Articles 1 - 12 of 12
Full-Text Articles in Engineering
Hyperspectral Imagery Target Detection Using Improved Anomaly Detection And Signature Matching Methods, Timothy E. Smetek
Hyperspectral Imagery Target Detection Using Improved Anomaly Detection And Signature Matching Methods, Timothy E. Smetek
Theses and Dissertations
This research extends the field of hyperspectral target detection by developing autonomous anomaly detection and signature matching methodologies that reduce false alarms relative to existing benchmark detectors, and are practical for use in an operational environment. The proposed anomaly detection methodology adapts multivariate outlier detection algorithms for use with hyperspectral datasets containing tens of thousands of non-homogeneous, high-dimensional spectral signatures. In so doing, the limitations of existing, non-robust, anomaly detectors are identified, an autonomous clustering methodology is developed to divide an image into homogeneous background materials, and competing multivariate outlier detection methods are evaluated for their ability to uncover hyperspectral …
Feasibility Study Of Variance Reduction In The Logistics Composite Model, George P. Cole Iii
Feasibility Study Of Variance Reduction In The Logistics Composite Model, George P. Cole Iii
Theses and Dissertations
The Logistics Composite Model (LCOM) is a stochastic, discrete-event simulation that relies on probabilities and random number generators to model scenarios in a maintenance unit and estimate optimal manpower levels through an iterative process. Models such as LCOM involving pseudo-random numbers inevitably have a variance associated with the output of the model for each run, and the output is actually a range of estimates. The reduction of the variance in the results of the model can be costly in the form of time for multiple replications. The alternative is a range of estimates that is too wide to realistically apply …
Internet Protocol Geolocation: Development Of A Delay-Based Hybrid Methodology For Locating The Geographic Location Of A Network Node, John M. Roehl
Internet Protocol Geolocation: Development Of A Delay-Based Hybrid Methodology For Locating The Geographic Location Of A Network Node, John M. Roehl
Theses and Dissertations
Internet Protocol Geolocation (IP Geolocation), the process of determining the approximate geographic location of an IP addressable node, has proven useful in a wide variety of commercial applications. Commercial applications of IP Geolocation include market research, redirection for performance enhancement, restricting content, and combating fraud. The potential for military applications include securing remote access via geographic authentication, intelligence collection, and cyber attack attribution. IP Geolocation methods can be divided into three basic categories based upon what information is used to determine the geographic location of the given IP address: 1) Information contained in databases, 2) information that is leaked during …
Developing A Framwork For Evaluating Organizational Information Assurance Metrics Programs, Adam R. Bryant
Developing A Framwork For Evaluating Organizational Information Assurance Metrics Programs, Adam R. Bryant
Theses and Dissertations
The push to secure organizational information has brought about the need to develop better metrics for understanding the state of the organization’s security capability. This thesis utilizes case studies of information security metrics programs within Department of Defense organizations, the United States Air Force (USAF), and the National Aeronautics and Space Administration’s (NASA’s) Jet Propulsion Lab to discover how these organizations make decisions about how the measurement program is designed, how information is collected and disseminated, and how the collected information supports decision making. This research finds that both the DOD and USAF have highly complex information security programs that …
Beyond Passswords: Usage And Policy Transformation, Alan S. Alsop
Beyond Passswords: Usage And Policy Transformation, Alan S. Alsop
Theses and Dissertations
The purpose of this research is to determine whether the transition to a two-factor authentication system is more secure than a system that relied only on what users “know” for authentication. While we found that factors that made passwords inherently vulnerable did not transfer to the PIN portion of a two-factor authentication system, we did find significant problems relating to usability, worker productivity, and the loss and theft of smart cards. The new authentication method has disrupted our ability to stay connected to ongoing mission issues, forced some installations to cut off remote access for their users and in one …
Analyzing The Interdiction Of Sea-Borne Threats Using Simulation Optimization, Kristen L. Cavallaro
Analyzing The Interdiction Of Sea-Borne Threats Using Simulation Optimization, Kristen L. Cavallaro
Theses and Dissertations
Worldwide, maritime trade accounts for approximately 80% of all trade by volume and is expected to double in the next twenty years. Prior to September 11, 2001, Ports, Waterways and Coastal Security (PWCS) was afforded only 1 percent of United States Coast Guard (USCG) resources. Today, it accounts for nearly 22 percent of dedicated USCG resources. Tactical assessment of resource requirements and operational limitations on the PWCS mission is necessary for more effective management of USCG assets to meet the broader range of competing missions. This research effort involves the development and validation of a discrete-event simulation model of the …
Optimizing The Prioritization Of Natural Disaster Recovery Projects, Jason M. Aftanas
Optimizing The Prioritization Of Natural Disaster Recovery Projects, Jason M. Aftanas
Theses and Dissertations
Prioritizing reconstruction projects to recover a base from a natural disaster is a complicated and arduous process that involves all levels of leadership. The project prioritization phase of base recovery has a direct affect on the allocation of funding, the utilization of human resources, the obligation of projects, and the overall speed and efficiency of the recovery process. The focus of this research is the development of an objective and repeatable process for optimizing the project prioritization phase of the recovery effort. This work will focus on promoting objectivity in the project prioritizing process, improving the communication of the overall …
Patterns Of War Termination: A Statistical Approach, Paul D. Robinson Ii
Patterns Of War Termination: A Statistical Approach, Paul D. Robinson Ii
Theses and Dissertations
This research uses an advanced statistical technique to expand upon the current understanding of war termination. Specifically, this thesis addressed questions concerning the most relevant factors toward predicting both the outcomes of interstate wars and the winners of intrastate and extra-systemic wars, within the limitations of the available data. Open-source war data from the Correlates of War Project was analyzed using both binary and multinomial logistic regression techniques. While the Correlates of War Project did not necessarily focus its data collection efforts on those variables historically associated with war termination, it did provide a sufficient number of variables with which …
Indentifying And Assessing Effective Mechanisms For Technology Transfer, Michael A. Romero
Indentifying And Assessing Effective Mechanisms For Technology Transfer, Michael A. Romero
Theses and Dissertations
The ability to shift knowledge and resources from federal laboratories to industrial and academic partners and vice versa is the primary reason that technology transfer (T2) exists today. Without the cooperation of federal, state, and private agencies working together to resolve today’s technology quandaries, a lot of the breakthroughs experienced today would not exist. This research was focused on uncovering which mechanisms are utilized by scientists and engineers. The research entails uncovering both official and unofficial mechanisms and ascertaining why some methods are preferred over others. It is also a secondary focus, to determine which barriers are impeding …
The Chaos Of Katrina: A Nonlinear Analysis Of Federal Logistics Support During Hurricane Katrina Relief Operations, Gerald W. Morris Jr.
The Chaos Of Katrina: A Nonlinear Analysis Of Federal Logistics Support During Hurricane Katrina Relief Operations, Gerald W. Morris Jr.
Theses and Dissertations
This thesis presents a case study of federal logistics support during Hurricane Katrina disaster relief operations. Data from federal contracts covering the first 10 weeks of Katrina are used to measure federal logistics activity. The study investigates whether chaos theory, part of complexity science, can extract information from Katrina contracting data to help managers make better logistics decisions during disaster relief operations. The study uses three analytical techniques: embedding, fitting the data to a logistic equation, and plotting the limit-cycle. Embedding and fitting a logistic equation to the data were used to test for deterministic chaos. The logistic equation and …
Prioritizing Satellite Payload Selection Via Optimization, Benjamin S. Kallemyn
Prioritizing Satellite Payload Selection Via Optimization, Benjamin S. Kallemyn
Theses and Dissertations
This thesis develops optimization models for prioritizing payloads for inclusion on satellite buses with volume, power, weight and budget constraints. The first model considers a single satellite launch for which the budget is uncertain and constellation requirements are not considered. Subsequently, we include constellation requirements and provide a more enhanced model. Both single-launch models provide a prioritized list of payloads to include on the launch before the budget is realized. The single-launch models are subsequently extended to a sequence of multiple launches in two cases, both of which incorporate an explicit dependence on the constellation composition at each launch epoch. …
Automatic Target Recognition User Interface Tool, David A. Kerns
Automatic Target Recognition User Interface Tool, David A. Kerns
Theses and Dissertations
A computer tool to aid in selecting the best Automatic Target Recognition (ATR) algorithm is developed. The program considers many quantifiers, accepts user-defined parameters, allows for changes in the operational environment and presents results in a meaningful way. It is written for Microsoft Excel. An ATR algorithm assigns a class label to a recognized target. General designations can include "Friend" and "Foe." The error of designating "Friend" as "Foe" as well as "Foe" as "Friend" comes with a high cost. Studying each algorithm's error can minimize this cost. Receiver Operating Characteristic (ROC) curves provide only information on the probabilities given …