Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- #antcenter (18)
- Wireless communication systems (9)
- Drone aircraft (3)
- Global Positioning System (3)
- Satellite communications (3)
-
- Adaptive filters (2)
- Cognitive radio networks (2)
- Computer security (2)
- Cybersecurity (2)
- Drone aircraft--Control systems (2)
- Image processing--Digital techniques (2)
- Internet telephony (2)
- Laser communication systems (2)
- Mathematical optimization (2)
- Mobile communication systems (2)
- Pattern recognition systems (2)
- Satellite networks (2)
- Sensor networks (2)
- Signal processing (2)
- Wireless sensor networks (2)
- Ad hoc networks (1)
- Ad hoc networks (Computer networks) (1)
- Ad hoc networks (Computer networks)--Simulation methods (1)
- Adaptive optics (1)
- Aerial observation (Military science) (1)
- Air defenses--United States (1)
- Air warfare (1)
- Amplitude scintillation (1)
- Ant algorithms (1)
- Antennas (1)
Articles 1 - 30 of 78
Full-Text Articles in Engineering
Development Of A Security-Focused Multi-Channel Communication Protocol And Associated Quality Of Secure Service (Qoss) Metrics, Paul M. Simon
Development Of A Security-Focused Multi-Channel Communication Protocol And Associated Quality Of Secure Service (Qoss) Metrics, Paul M. Simon
Theses and Dissertations
The threat of eavesdropping, and the challenge of recognizing and correcting for corrupted or suppressed information in communication systems is a consistent challenge. Effectively managing protection mechanisms requires an ability to accurately gauge the likelihood or severity of a threat, and adapt the security features available in a system to mitigate the threat. This research focuses on the design and development of a security-focused communication protocol at the session-layer based on a re-prioritized communication architecture model and associated metrics. From a probabilistic model that considers data leakage and data corruption as surrogates for breaches of confidentiality and integrity, a set …
Convolutional Neural Network Architecture Study For Aerial Visual Localization, Jedediah M. Berhold
Convolutional Neural Network Architecture Study For Aerial Visual Localization, Jedediah M. Berhold
Theses and Dissertations
In unmanned aerial navigation the ability to determine the aircraft's location is essential for safe flight. The Global Positioning System (GPS) is the default modern application used for geospatial location determination. GPS is extremely robust, very accurate, and has essentially solved aerial localization. Unfortunately, the signals from all Global Navigation Satellite Systems (GNSS) to include GPS can be jammed or spoofed. To this response it is essential to develop alternative systems that could be used to supplement navigation systems, in the event of a lost GNSS signal. Public and governmental satellites have provided large amounts of high-resolution satellite imagery. These …
Machine Translation With Image Context From Mandarin Chinese To English, Brooke E. Johnson
Machine Translation With Image Context From Mandarin Chinese To English, Brooke E. Johnson
Theses and Dissertations
Despite ongoing improvements in machine translation, machine translators still lack the capability of incorporating context from which source text may have been derived. Machine translators use text from a source language to translate it into a target language without observing any visual context. This work aims to produce a neural machine translation model that is capable of accepting both text and image context as a multimodal translator from Mandarin Chinese to English. The model was trained on a small multimodal dataset of 700 images and sentences, and compared to a translator trained only on the text associated with those images. …
Serious Game Design Using Mda And Bloom’S Taxonomy, Senobio V. Chavez
Serious Game Design Using Mda And Bloom’S Taxonomy, Senobio V. Chavez
Theses and Dissertations
The field of Serious Games (SG) studies the use of games as a learning tool and it has been in existence for over forty years. During this period the primary focus of the field has been designing systems to evaluate the educational efficacy of existing games. This translates to a lack of systems designed to aid in the creation of serious games, but this does not have to remain an issue. The rise in popularity of games means that there is no shortage of ideas on how to methodically create them for commercial production which can just as easily be …
Preserving Privacy In Automotive Tire Pressure Monitoring Systems, Kenneth L. Hacker
Preserving Privacy In Automotive Tire Pressure Monitoring Systems, Kenneth L. Hacker
Theses and Dissertations
The automotive industry is moving towards a more connected ecosystem, with connectivity achieved through multiple wireless systems. However, in the pursuit of these technological advances and to quickly satisfy requirements imposed on manufacturers, the security of these systems is often an afterthought. It has been shown that systems in a standard new automobile that one would not expect to be vulnerable can be exploited for a variety of harmful effects. This thesis considers a seemingly benign, but government mandated, safety feature of modern vehicles; the Tire Pressure Monitoring System (TPMS). Typical implementations have no security-oriented features, leaking data that can …
Autonomous Association Of Geo Rso Observations Using Deep Neural Networks, Ian W. Mcquaid
Autonomous Association Of Geo Rso Observations Using Deep Neural Networks, Ian W. Mcquaid
Theses and Dissertations
Ground-based non-resolved optical observations of resident space objects (RSOs) in geosynchronous orbit (GEO) represent the majority of the space surveillance network’s (SSN’s) deep-space tracking. Reliable and accurate tracking necessitates temporal separation of the observations. This requires that subsequent observations be associated with prior observations of a given RSO before they can be used to create or refine that RSO’s ephemeris. The use of astrometric data (e.g. topocentric angular position) alone for this association task is complicated by RSO maneuvers between observations, and by RSOs operating in close proximity. Accurately associating an observation with an RSO thus motivates the use of …
Orthogonal Frequency Division Multiplexed Waveform Effects On Passive Bistatic Radar, Forrest D. Taylor
Orthogonal Frequency Division Multiplexed Waveform Effects On Passive Bistatic Radar, Forrest D. Taylor
Theses and Dissertations
Communication waveforms act as signals of opportunity for passive radars. However, these signals of opportunity suffer from range-Doppler processing losses due to their high range sidelobes and pulse-diverse waveform aspects. Signals such as the long term evolution (LTE) encode information within the phase and amplitude of the waveform. This research explores aspects of the LTE, such as the encoding scheme and bandwidth modes on passive bistatic Doppler radar. Signal space-time adaptive processing (STAP) performance is evaluated and parameters are compared with the signal to interference-plus-noise ratio (SINR) metric.
Magnetic Field Aided Indoor Navigation, William F. Storms
Magnetic Field Aided Indoor Navigation, William F. Storms
Theses and Dissertations
This research effort examines inertial navigation system aiding using magnetic field intensity data and a Kalman filter in an indoor environment. Many current aiding methods do not work well in an indoor environment, like aiding using the Global Positioning System. The method presented in this research uses magnetic field intensity data from a three-axis magnetometer in order to estimate position using a maximum – likelihood approach. The position measurements are then combined with a motion model using a Kalman filter. The magnetic field navigation algorithm is tested using a combination of simulated and real measurements. These tests are conducted using …
Passive Radiolocation Of Ieee 802.11 Emitters Using Directional Antennae, Bradford E. Law
Passive Radiolocation Of Ieee 802.11 Emitters Using Directional Antennae, Bradford E. Law
Theses and Dissertations
Low-cost commodity hardware and cheaper, more capable consumer-grade drones make the threat of home-made, inexpensive drone-mounted wireless attack platforms (DWAPs) greater than ever. Fences and physical security do little to impede a drone from approaching private, commercial, or government wireless access points (WAPs) and conducting wireless attacks. At the same time, unmanned aerial vehicles (UAVs) present a valuable tool for network defenders conducting site surveys and emulating threats. These platforms present near-term dangers and opportunities for corporations and governments. Despite the vast leaps in technology these capabilities represent, UAVs are noisy and consequently difficult to conceal as they approach a …
Dual Source Excitation Rectangular Waveguide Design And Evaluation For The Measurement Of Electromagnetic Material Properties, Daniel K. Koch
Dual Source Excitation Rectangular Waveguide Design And Evaluation For The Measurement Of Electromagnetic Material Properties, Daniel K. Koch
Theses and Dissertations
Broadband material parameter measurements are essential in understanding how materials interact with electromagnetic waves. Traditional rectangular waveguide material measurement systems are bandwidth limited. This results in multiple rectangular waveguides of different sizes used to conduct broadband material parameter extraction. Efforts to produce a broadband rectangular waveguide have focused on the inclusion of different guiding structures in the waveguide body. These designs have the drawback of requiring precise machining and time-consuming sample preparation. This research proposes a new broadband rectangular waveguide design which uses a dual source excitation design. This is enabled by the fact that rectangular waveguides are linear time …
An Exploration Of Error-Correcting Codes For Use In Noise-Prone Satellite Environments, Min W. Kang
An Exploration Of Error-Correcting Codes For Use In Noise-Prone Satellite Environments, Min W. Kang
Theses and Dissertations
Satellites are crucial for the modern world to function properly as they provide Global Navigation Satellite System (GNSS) and global communication. However, the data that is stored on these satellites can be corrupted by the radiation found in space, and its bits can be improperly flipped. In the past, Forward Error Correction (FEC) algorithms were selected based on their strength and implemented to correct these bit flips back to their original values. This thesis seeks to determine if the strength of the FEC algorithms Reed Solomon (RS) code and Reed Solomon Product Code (RSPC) directly translates to their effectiveness. These …
Securing Data In Transit Using Two Channel Communication, Clark L. Wolfe
Securing Data In Transit Using Two Channel Communication, Clark L. Wolfe
Theses and Dissertations
Securing data in transit is critically important to the Department of Defense in todays contested environments. While encryption is often the preferred method to provide security, there exist applications for which encryption is too resource intensive, not cost-effective or simply not available. In this thesis, a two-channel communication system is proposed in which the message being sent can be intelligently and dynamically split over two or more channels to provide a measure of data security either when encryption is not available, or perhaps in addition to encryption. This data spiting technique employs multiple wireless channels operating at the physical layer, …
Conceptual Systems Security Analysis Aerial Refueling Case Study, Martin Trae Span Iii
Conceptual Systems Security Analysis Aerial Refueling Case Study, Martin Trae Span Iii
Theses and Dissertations
In today’s highly interconnected and technology reliant environment, systems security is rapidly growing in importance to complex systems such as automobiles, airplanes, and defense-oriented weapon systems. While systems security analysis approaches are critical to improving the security of these advanced cyber-physical systems-of-systems, such approaches are often poorly understood and applied in ad hoc fashion. To address these gaps, first a study of key architectural analysis concepts and definitions is provided with an assessment of their applicability towards complex cyber-physical systems. From this initial work, a definition of cybersecurity architectural analysis for cyber-physical systems is proposed. Next, the System Theory Theoretic …
Expected Coverage (Excov): A Proposal To Compare Fuzz Test Coverage Within An Infinite Input Space, Evan V. Swihart
Expected Coverage (Excov): A Proposal To Compare Fuzz Test Coverage Within An Infinite Input Space, Evan V. Swihart
Theses and Dissertations
A Fuzz test is an approach used to discover vulnerabilities by intentionally sending invalid inputs to a system for the purpose of triggering some type of fault or unintended effect that renders the system vulnerable to an exploit. Fuzz testing is an important cyber-testing technique used to find and fix vulnerabilities before they are exploited. The fuzzing of military data links presents a particular challenge because existing fuzzing tools cannot be easily applied to these systems. As a result, the tools and techniques used to fuzz these links vary widely in sophistication and effectiveness. Because of the infinite, or nearly …
Effects Of Position Uncertainty On Passive Multistatic Sar Resolution Measures, Duy K. Nguyen
Effects Of Position Uncertainty On Passive Multistatic Sar Resolution Measures, Duy K. Nguyen
Theses and Dissertations
Given numerous exciting potentials including substantial cost savings, passive multistatic synthetic aperture radar (PMSAR) has been gaining more attention in the radar community. However, PMSAR research efforts such as emitters of opportunity selection thus far have not considered radar position uncertainty. Seeking to fill this knowledge gap, we run Monte Carlo trials to simulate transmitter position uncertainty and examine the effects on the multistatic resolution of radar sets of different geometries, center frequencies and bandwidths. By monitoring the 3dB contour of the multistatic point spread function, we find that the multistatic resolution worsens on average and the data spread grows …
Framework For Industrial Control System Honeypot Network Traffic Generation, Htein A. Lin
Framework For Industrial Control System Honeypot Network Traffic Generation, Htein A. Lin
Theses and Dissertations
Defending critical infrastructure assets is an important but extremely difficult and expensive task. Historically, decoys have been used very effectively to distract attackers and in some cases convince an attacker to reveal their attack strategy. Several researchers have proposed the use of honeypots to protect programmable logic controllers, specifically those used to support critical infrastructure. However, most of these honeypot designs are static systems that wait for a would-be attacker. To be effective, honeypot decoys need to be as realistic as possible. This paper introduces a proof-of-concept honeypot network traffic generator that mimics genuine control systems. Experiments are conducted using …
Autoprov: An Automated File Provenance Collection Tool, Ryan A. Good
Autoprov: An Automated File Provenance Collection Tool, Ryan A. Good
Theses and Dissertations
A file's provenance is a detailing of its origins and activities. There are tools available that are useful in maintaining the provenance of a file. Unfortunately for digital forensics, these tools require prior installation on the computer of interest while provenance generating events happen. The presented tool addresses this by reconstructing a file's provenance from several temporal artifacts. It identifies relevant temporal and user correlations between these artifacts, and presents them to the user. A variety of predefined use cases and real world data are tested against to demonstrate that this software allows examiners to draw useful conclusions about the …
Sound Based Positioning, David L. Weathers
Sound Based Positioning, David L. Weathers
Theses and Dissertations
With a growing interest in non-GPS positioning, navigation, and timing (PNT), sound based positioning provides a precise way to locate both sound sources and microphones through audible signals of opportunity (SoOPs). Exploiting SoOPs allows for passive location estimation. But, attributing each signal to a specific source location when signals are simultaneously emitting proves problematic. Using an array of microphones, unique SoOPs are identified and located through steered response beamforming. Sound source signals are then isolated through time-frequency masking to provide clear reference stations by which to estimate the location of a separate microphone through time difference of arrival measurements. Results …
Applying Cyber Threat Intelligence To Industrial Control Systems, Matthew P. Sibiga
Applying Cyber Threat Intelligence To Industrial Control Systems, Matthew P. Sibiga
Theses and Dissertations
A cybersecurity initiative known as cyber threat intelligence (CTI) has recently been developed and deployed. The overall goal of this new technology is to help protect network infrastructures. Threat intelligence platforms (TIPs) have also been created to help facilitate CTI effectiveness within organizations. There are many benefits that both can achieve within the information technology (IT) sector. The industrial control system (ICS) sector can also benefit from these technologies as most ICS networks are connected to IT networks. CTI and TIPs become resourceful when using indicators of compromise (IOCs) from known ICS malware attacks and an open source intrusion detection …
Satellite Communications In The V And W Band: Natural And Artificial Scintillation Effects, David A. Smith
Satellite Communications In The V And W Band: Natural And Artificial Scintillation Effects, David A. Smith
Theses and Dissertations
In a natural atmospheric environment the troposphere will be the primary source of loss with the ionosphere loss being negligible. If the ionosphere was disturbed from a high altitude nuclear explosion (HANE) more than three times the amount of electrons would be present in the ionosphere and could represent a source of significant loss. In order to determine the amount of electrons distributed from a HANE, GSCENARIO, developed by Defense Threat Reduction Agency was used. The two sources of loss that were examined was signal absorption and amplitude scintillation. Signal loss was determined using GSCENARIO and amplitude scintillation loss was …
Scalable System Design For Covert Mimo Communications, Jason R. Pennington
Scalable System Design For Covert Mimo Communications, Jason R. Pennington
Theses and Dissertations
In modern communication systems, bandwidth is a limited commodity. Bandwidth efficient systems are needed to meet the demands of the ever-increasing amount of data that users share. Of particular interest is the U.S. Military, where high-resolution pictures and video are used and shared. In these environments, covert communications are necessary while still providing high data rates. The promise of multi-antenna systems providing higher data rates has been shown on a small scale, but limitations in hardware prevent large systems from being implemented.
Metrics For Emitter Selection For Multistatic Synthetic Aperture Radar, Sean R. Stevens
Metrics For Emitter Selection For Multistatic Synthetic Aperture Radar, Sean R. Stevens
Theses and Dissertations
A bistatic implementation of synthetic aperture radar (SAR) to form images of the ground from an aircraft makes use of separate emitters and receivers. When not using cooperative emitters, ground based communications systems can provide illumination. One way to improve performance of these waveforms, which are not designed for SAR, is a multistatic implementation, formed from multiple bistatic systems. This leads to the problem of selecting a subset from a potentially large set of emitters to use for image formation. A framework for this selection between sets of emitters is proposed using multiple objective optimization. This approach requires use of …
The Design And Analysis Of Electrically Large Custom-Shaped Reflector Antennas, Joshua M. Wilson
The Design And Analysis Of Electrically Large Custom-Shaped Reflector Antennas, Joshua M. Wilson
Theses and Dissertations
Designing and analyzing electrically large reflectors poses numerically complex problems because the reflector must be sampled finely to obtain an accurate solution, causing an unwieldy number of samples. In addition to these complexities, a custom-shaped reflector poses a new analysis problem. Previously developed methods and theorems including Geometric Optics, Ray-Tracing, Surface Equivalence Theorems, Image Theory, and Physical Optics can be applied to these custom-shaped reflectors however. These methods all share in common their capability to provide accurate results in the analysis of electrically large structures. In this thesis, two custom-shaped reflector concepts are explored which include a rectangular shaped, spherically …
Automatic Modulation Classification Of Common Communication And Pulse Compression Radar Waveforms Using Cyclic Features, John A . Hadjis
Automatic Modulation Classification Of Common Communication And Pulse Compression Radar Waveforms Using Cyclic Features, John A . Hadjis
Theses and Dissertations
This research develops a feature-based MAP classification system and applies it to classify several common pulse compression radar and communication modulations. All signal parameters are treated as unknown to the classifier system except SNR and the signal carrier frequency. The features are derived from estimated duty cycle, cyclic spectral correlation, and cyclic cumulants. The modulations considered in this research are BPSK, QPSK, 16-QAM, 64-QAM, 8-PSK, and 16-PSK communication modulations, as well as Barker coded, Barker coded, Barker coded, Frank coded, Px49 coded, and LFM pulse compression modulations. Simulations show that average correct signal modulation type classification %C 90% is achieved …
Distributed Localization Of Active Transmitters In A Wireless Sensor Network, Oba L. Vincent
Distributed Localization Of Active Transmitters In A Wireless Sensor Network, Oba L. Vincent
Theses and Dissertations
In today's military environment, emphasis has been placed on bandwidth efficiency and total use of the available spectrum. Current communication standards divide the spectrum into several different frequency bands, all of which are assigned to one or multiple primary users. Cognitive Radio utilizes potential white spaces that exist between currently defined channels or in time. One under-explored dimension of white space exploration is spatial. If a frequency band is being used in one region, it may be underutilized, or not occupied in another. Using an active localization method can allow for the discovery of spatial white; trying to spatially map …
A Performance Analysis Of The Optimized Link State Routing Protocol Using Voice Traffic Over Mobile Ad Hoc Networks, André Wolf
Theses and Dissertations
Mobile ad hoc networks (MANETs) have grown in popularity over the past decade and are increasingly considered for time-sensitive multimedia applications. The impact of various routing protocols on voice traffic using different IEEE 802.11 extensions has been investigated via analytical models, simulations and experimental test beds. Many studies determined that optimized link state routing (OLSR) is a suitable routing protocol to support voice over internet protocol (VoIP) conversations. This research expands upon this understanding by determining the point at which voice traffic is no longer feasible in an ad hoc environment and determines which audio codec is best suited for …
Routing Uavs To Co-Optimize Mission Effectiveness And Network Performance With Dynamic Programming, Spenser D. Lee
Routing Uavs To Co-Optimize Mission Effectiveness And Network Performance With Dynamic Programming, Spenser D. Lee
Theses and Dissertations
In support of the Air Force Research Laboratory's (AFRL) vision of the layered sensing operations center, command and control intelligence surveillance and reconnaissance (C2ISR) more focus must be placed on architectures that support information systems, rather than just the information systems themselves. By extending the role of UAVs beyond simply intelligence, surveillance, and reconnaissance (ISR) operations and into a dual-role with networking operations we can better utilize our information assets. To achieve the goal of dual-role UAVs, a concrete approach to planning must be taken. This research defines a mathematical model and a non-trivial deterministic algorithmic approach to determining UAV …
Malicious And Malfunctioning Node Detection Via Observed Physical Layer Data, Tyler J. Hardy
Malicious And Malfunctioning Node Detection Via Observed Physical Layer Data, Tyler J. Hardy
Theses and Dissertations
There are many mechanisms that can cause inadequate or unreliable information in sensor networks. A user of the network might be interested in detecting and classifying specific sensors nodes causing these problems. Several network layer based trust methods have been developed in previous research to assess these issues; in contrast this work develops a trust protocol based on observations of physical layer data collected by the sensors. Observations of physical layer data are used for decisions and calculations, and are based on just the measurements collected by the sensors. Although this information is packaged and distributed on the network layer, …
Evaluating Information Assurance Control Effectiveness On An Air Force Supervisory Control And Data Acquisition (Scada) System, Jason R. Nielsen
Evaluating Information Assurance Control Effectiveness On An Air Force Supervisory Control And Data Acquisition (Scada) System, Jason R. Nielsen
Theses and Dissertations
Supervisory Control and Data Acquisition (SCADA) systems are increasingly being connected to corporate networks which has dramatically expanded their attack surface to remote cyber attack. Adversaries are targeting these systems with increasing frequency and sophistication. This thesis seeks to answer the research question addressing which Information Assurance (IA) controls are most significant for network defenders and SCADA system managers/operators to focus on in order to increase the security of critical infrastructure systems against a Stuxnet-like cyber attack. This research applies the National Institute of Science and Technology (NIST) IA controls to an attack tree modeled on a remote Stuxnet-like cyber …
A Linear Combination Of Heuristics Approach To Spatial Sampling Hyperspectral Data For Target Tracking, Barry R. Secrest
A Linear Combination Of Heuristics Approach To Spatial Sampling Hyperspectral Data For Target Tracking, Barry R. Secrest
Theses and Dissertations
Persistent surveillance of the battlespace results in better battlespace awareness which aids in obtaining air superiority, winning battles, and saving friendly lives. Although hyperspectral imagery (HSI) data has proven useful for discriminating targets, it presents many challenges as a useful tool in persistent surveillance. A new sensor under development has the potential of overcoming these challenges and transforming our persistent surveillance capability by providing HSI data for a limited number of pixels and grayscale video for the remainder. The challenge of exploiting this new sensor is determining where the HSI data in the sensor's field of view will be the …