Open Access. Powered by Scholars. Published by Universities.®
Operations Research, Systems Engineering and Industrial Engineering Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Operations Research, Systems Engineering and Industrial Engineering
Using Multiple Robust Parameter Design Techniques To Improve Hyperspectral Anomaly Detection Algorithm Performance, Matthew T. Davis
Using Multiple Robust Parameter Design Techniques To Improve Hyperspectral Anomaly Detection Algorithm Performance, Matthew T. Davis
Theses and Dissertations
Detecting and identifying objects of interest is the goal of all remote sensing. New advances, specifically in hyperspectral imaging technology have provided the analyst with immense amounts of data requiring evaluation. Several filtering techniques or anomaly detection algorithms have been proposed. However, most new algorithms are insufficiently verified to be robust to the broad range of hyperspectral data being made available. One such algorithm, AutoGAD, is tested here via two separate robust parameter design techniques to determine optimal parameters for consistent performance on a range of data with large attribute variances. Additionally, the results of the two techniques are compared …
Internet Protocol Geolocation: Development Of A Delay-Based Hybrid Methodology For Locating The Geographic Location Of A Network Node, John M. Roehl
Internet Protocol Geolocation: Development Of A Delay-Based Hybrid Methodology For Locating The Geographic Location Of A Network Node, John M. Roehl
Theses and Dissertations
Internet Protocol Geolocation (IP Geolocation), the process of determining the approximate geographic location of an IP addressable node, has proven useful in a wide variety of commercial applications. Commercial applications of IP Geolocation include market research, redirection for performance enhancement, restricting content, and combating fraud. The potential for military applications include securing remote access via geographic authentication, intelligence collection, and cyber attack attribution. IP Geolocation methods can be divided into three basic categories based upon what information is used to determine the geographic location of the given IP address: 1) Information contained in databases, 2) information that is leaked during …
Cross-Service Investigation Of Geographical Information Systems, Matthew H. Beverly
Cross-Service Investigation Of Geographical Information Systems, Matthew H. Beverly
Theses and Dissertations
This research investigated the armed services current uses of GIS, and asked the question whether or not a joint GIS program could benefit the DOD. An information technology implementation model was presented as a framework to implement a joint GIS program. It was found that all four armed services use GIS for forward deployments. The Army has its Combat Terrain Information System (CTIS). The Navy's digital nautical charts are a GIS. The Marine Corps has created their Geographically Linked Information Display Environment (GLIDE) program, which is similar to a map repository. Finally, the Air Force has its GeoBase program for …