Open Access. Powered by Scholars. Published by Universities.®

Operations Research, Systems Engineering and Industrial Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Operations Research, Systems Engineering and Industrial Engineering

Using Multiple Robust Parameter Design Techniques To Improve Hyperspectral Anomaly Detection Algorithm Performance, Matthew T. Davis Mar 2009

Using Multiple Robust Parameter Design Techniques To Improve Hyperspectral Anomaly Detection Algorithm Performance, Matthew T. Davis

Theses and Dissertations

Detecting and identifying objects of interest is the goal of all remote sensing. New advances, specifically in hyperspectral imaging technology have provided the analyst with immense amounts of data requiring evaluation. Several filtering techniques or anomaly detection algorithms have been proposed. However, most new algorithms are insufficiently verified to be robust to the broad range of hyperspectral data being made available. One such algorithm, AutoGAD, is tested here via two separate robust parameter design techniques to determine optimal parameters for consistent performance on a range of data with large attribute variances. Additionally, the results of the two techniques are compared …


Internet Protocol Geolocation: Development Of A Delay-Based Hybrid Methodology For Locating The Geographic Location Of A Network Node, John M. Roehl Mar 2007

Internet Protocol Geolocation: Development Of A Delay-Based Hybrid Methodology For Locating The Geographic Location Of A Network Node, John M. Roehl

Theses and Dissertations

Internet Protocol Geolocation (IP Geolocation), the process of determining the approximate geographic location of an IP addressable node, has proven useful in a wide variety of commercial applications. Commercial applications of IP Geolocation include market research, redirection for performance enhancement, restricting content, and combating fraud. The potential for military applications include securing remote access via geographic authentication, intelligence collection, and cyber attack attribution. IP Geolocation methods can be divided into three basic categories based upon what information is used to determine the geographic location of the given IP address: 1) Information contained in databases, 2) information that is leaked during …


Cross-Service Investigation Of Geographical Information Systems, Matthew H. Beverly Mar 2004

Cross-Service Investigation Of Geographical Information Systems, Matthew H. Beverly

Theses and Dissertations

This research investigated the armed services current uses of GIS, and asked the question whether or not a joint GIS program could benefit the DOD. An information technology implementation model was presented as a framework to implement a joint GIS program. It was found that all four armed services use GIS for forward deployments. The Army has its Combat Terrain Information System (CTIS). The Navy's digital nautical charts are a GIS. The Marine Corps has created their Geographically Linked Information Display Environment (GLIDE) program, which is similar to a map repository. Finally, the Air Force has its GeoBase program for …