Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Physical Sciences and Mathematics

Machine Learning-Based Gps Jamming And Spoofing Detection, Alberto Squatrito Apr 2024

Machine Learning-Based Gps Jamming And Spoofing Detection, Alberto Squatrito

Doctoral Dissertations and Master's Theses

The increasing reliance on Global Positioning System (GPS) technology across various sectors has exposed vulnerabilities to malicious attacks, particularly GPS jamming and spoofing. This thesis presents an analysis into detection and mitigation strategies for enhancing the resilience of GPS receivers against jamming and spoofing attacks. The research entails the development of a simulated GPS signal and a receiver model to accurately decode and extract information from simulated GPS signals. The study implements the generation of jammed and spoofed signals to emulate potential threats faced by GPS receivers in practical settings. The core innovation lies in the integration of machine learning …


Online Aircraft System Identification Using A Novel Parameter Informed Reinforcement Learning Method, Nathan Schaff Oct 2023

Online Aircraft System Identification Using A Novel Parameter Informed Reinforcement Learning Method, Nathan Schaff

Doctoral Dissertations and Master's Theses

This thesis presents the development and analysis of a novel method for training reinforcement learning neural networks for online aircraft system identification of multiple similar linear systems, such as all fixed wing aircraft. This approach, termed Parameter Informed Reinforcement Learning (PIRL), dictates that reinforcement learning neural networks should be trained using input and output trajectory/history data as is convention; however, the PIRL method also includes any known and relevant aircraft parameters, such as airspeed, altitude, center of gravity location and/or others. Through this, the PIRL Agent is better suited to identify novel/test-set aircraft.

First, the PIRL method is applied to …


Spoken Language Processing And Modeling For Aviation Communications, Aaron Van De Brook Oct 2023

Spoken Language Processing And Modeling For Aviation Communications, Aaron Van De Brook

Doctoral Dissertations and Master's Theses

With recent advances in machine learning and deep learning technologies and the creation of larger aviation-specific corpora, applying natural language processing technologies, especially those based on transformer neural networks, to aviation communications is becoming increasingly feasible. Previous work has focused on machine learning applications to natural language processing, such as N-grams and word lattices. This thesis experiments with a process for pretraining transformer-based language models on aviation English corpora and compare the effectiveness and performance of language models transfer learned from pretrained checkpoints and those trained from their base weight initializations (trained from scratch). The results suggest that transformer language …


A System For The Detection Of Adversarial Attacks In Computer Vision Via Performance Metrics, Sarah Reynolds Oct 2023

A System For The Detection Of Adversarial Attacks In Computer Vision Via Performance Metrics, Sarah Reynolds

Doctoral Dissertations and Master's Theses

Adversarial attacks, or attacks committed by an adversary to hijack a system, are prevalent in the deep learning tasks of computer vision and are one of the greatest threats to these models' safe and accurate use. These attacks force the trained model to misclassify an image, using pixel-level changes undetectable to the human eye. Various defenses against these attacks exist and are detailed in this work. The work of previous researchers has established that when adversarial attacks occur, different node patterns in a Deep Neural Network (DNN) are activated within the model. Additionally, it is known that CPU and GPU …


Defining Safe Training Datasets For Machine Learning Models Using Ontologies, Lynn C. Vonder Haar Apr 2023

Defining Safe Training Datasets For Machine Learning Models Using Ontologies, Lynn C. Vonder Haar

Doctoral Dissertations and Master's Theses

Machine Learning (ML) models have been gaining popularity in recent years in a wide variety of domains, including safety-critical domains. While ML models have shown high accuracy in their predictions, they are still considered black boxes, meaning that developers and users do not know how the models make their decisions. While this is simply a nuisance in some domains, in safetycritical domains, this makes ML models difficult to trust. To fully utilize ML models in safetycritical domains, there needs to be a method to improve trust in their safety and accuracy without human experts checking each decision. This research proposes …


Machine Learning To Predict Warhead Fragmentation In-Flight Behavior From Static Data, Katharine Larsen Oct 2022

Machine Learning To Predict Warhead Fragmentation In-Flight Behavior From Static Data, Katharine Larsen

Doctoral Dissertations and Master's Theses

Accurate characterization of fragment fly-out properties from high-speed warhead detonations is essential for estimation of collateral damage and lethality for a given weapon. Real warhead dynamic detonation tests are rare, costly, and often unrealizable with current technology, leaving fragmentation experiments limited to static arena tests and numerical simulations. Stereoscopic imaging techniques can now provide static arena tests with time-dependent tracks of individual fragments, each with characteristics such as fragment IDs and their respective position vector. Simulation methods can account for the dynamic case but can exclude relevant dynamics experienced in real-life warhead detonations. This research leverages machine learning methodologies to …


Supporting The Discovery, Reuse, And Validation Of Cybersecurity Requirements At The Early Stages Of The Software Development Lifecycle, Jessica Antonia Steinmann Oct 2022

Supporting The Discovery, Reuse, And Validation Of Cybersecurity Requirements At The Early Stages Of The Software Development Lifecycle, Jessica Antonia Steinmann

Doctoral Dissertations and Master's Theses

The focus of this research is to develop an approach that enhances the elicitation and specification of reusable cybersecurity requirements. Cybersecurity has become a global concern as cyber-attacks are projected to cost damages totaling more than $10.5 trillion dollars by 2025. Cybersecurity requirements are more challenging to elicit than other requirements because they are nonfunctional requirements that requires cybersecurity expertise and knowledge of the proposed system. The goal of this research is to generate cybersecurity requirements based on knowledge acquired from requirements elicitation and analysis activities, to provide cybersecurity specifications without requiring the specialized knowledge of a cybersecurity expert, and …


A Meshless Approach To Computational Pharmacokinetics, Anthony Matthew Khoury Apr 2022

A Meshless Approach To Computational Pharmacokinetics, Anthony Matthew Khoury

Doctoral Dissertations and Master's Theses

The meshless method is an incredibly powerful technique for solving a variety of problems with unparalleled accuracy and efficiency. The pharmacokinetic problem of transdermal drug delivery (TDDD) is one such topic and is of significant complexity. The locally collocated meshless method (LCMM) is developed in solution to this topic. First, the meshless method is formulated to model this transport phenomenon and is then validated against an analytical solution of a pharmacokinetic problem set, to demonstrate this accuracy and efficiency. The analytical solution provides a locus by which convergence behavior are evaluated, demonstrating the super convergence of the locally collocated meshless …


Robotic Olfactory-Based Navigation With Mobile Robots, Lingxiao Wang Dec 2021

Robotic Olfactory-Based Navigation With Mobile Robots, Lingxiao Wang

Doctoral Dissertations and Master's Theses

Robotic odor source localization (OSL) is a technology that enables mobile robots or autonomous vehicles to find an odor source in unknown environments. It has been viewed as challenging due to the turbulent nature of airflows and the resulting odor plume characteristics. The key to correctly finding an odor source is designing an effective olfactory-based navigation algorithm, which guides the robot to detect emitted odor plumes as cues in finding the source. This dissertation proposes three kinds of olfactory-based navigation methods to improve search efficiency while maintaining a low computational cost, incorporating different machine learning and artificial intelligence methods.

A. …


Acoustic/Gravity Wave Phenomena In Wide-Field Imaging: From Data Analysis To A Modeling Framework For Observability In The Mlt Region And Beyond, Jaime Aguilar Guerrero Nov 2021

Acoustic/Gravity Wave Phenomena In Wide-Field Imaging: From Data Analysis To A Modeling Framework For Observability In The Mlt Region And Beyond, Jaime Aguilar Guerrero

Doctoral Dissertations and Master's Theses

Acoustic waves, gravity waves, and larger-scale tidal and planetary waves are significant drivers of the atmosphere’s dynamics and of the local and global circulation that have direct and indirect impacts on our weather and climate. Their measurements and characterization are fundamental challenges in Aeronomy that require a wide range of instrumentation with distinct operational principles. Most measurements share the common features of integrating optical emissions or effects on radio waves through deep layers of the atmosphere. The geometry of these integrations create line-of-sight effects that must be understood, described, and accounted for to properly present the measured data in traditional …


A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami May 2021

A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami

Doctoral Dissertations and Master's Theses

Social engineering attacks (SE-attacks) in enterprises are hastily growing and are becoming increasingly sophisticated. Generally, SE-attacks involve the psychological manipulation of employees into revealing confidential and valuable company data to cybercriminals. The ramifications could bring devastating financial and irreparable reputation loss to the companies. Because SE-attacks involve a human element, preventing these attacks can be tricky and challenging and has become a topic of interest for many researchers and security experts. While methods exist for detecting SE-attacks, our literature review of existing methods identified many crucial factors such as the national cultural, organizational, and personality traits of employees that enable …


Dynamic Task Allocation In Partially Defined Environments Using A* With Bounded Costs, James Hendrickson May 2021

Dynamic Task Allocation In Partially Defined Environments Using A* With Bounded Costs, James Hendrickson

Doctoral Dissertations and Master's Theses

The sector of maritime robotics has seen a boom in operations in areas such as surveying and mapping, clean-up, inspections, search and rescue, law enforcement, and national defense. As this sector has continued to grow, there has been an increased need for single unmanned systems to be able to undertake more complex and greater numbers of tasks. As the maritime domain can be particularly difficult for autonomous vehicles to operate in due to the partially defined nature of the environment, it is crucial that a method exists which is capable of dynamically accomplishing tasks within this operational domain. By considering …


A Comprehensive Mapping And Real-World Evaluation Of Multi-Object Tracking On Automated Vehicles, Alexander Bassett Apr 2021

A Comprehensive Mapping And Real-World Evaluation Of Multi-Object Tracking On Automated Vehicles, Alexander Bassett

Doctoral Dissertations and Master's Theses

Multi-Object Tracking (MOT) is a field critical to Automated Vehicle (AV) perception systems. However, it is large, complex, spans research fields, and lacks resources for integration with real sensors and implementation on AVs. Factors such those make it difficult for new researchers and practitioners to enter the field.

This thesis presents two main contributions: 1) a comprehensive mapping for the field of Multi-Object Trackers (MOTs) with a specific focus towards Automated Vehicles (AVs) and 2) a real-world evaluation of an MOT developed and tuned using COTS (Commercial Off-The-Shelf) software toolsets. The first contribution aims to give a comprehensive overview of …


Blocks' Network: Redesign Architecture Based On Blockchain Technology, Moataz Hanif Aug 2019

Blocks' Network: Redesign Architecture Based On Blockchain Technology, Moataz Hanif

Doctoral Dissertations and Master's Theses

The Internet is a global network that uses communication protocols. It is considered the most important system reached by humanity, which no one can abandon. However, this technology has become a weapon that threatens the privacy of users, especially in the client-server model, where data is stored and managed privately. Additionally, users have no power over their data that store in a private server, which means users’ data may interrupt by government or might be sold via service provider for-profit purposes. Furthermore, blockchain is a technology that we can rely on to solve issues related to client-server model if appropriately …


Evaluating The Effect Of Smart Parking Technology On Campus Parking System Efficiency Using Discrete Event Simulation, Glenn Phillip Surpris Apr 2012

Evaluating The Effect Of Smart Parking Technology On Campus Parking System Efficiency Using Discrete Event Simulation, Glenn Phillip Surpris

Doctoral Dissertations and Master's Theses

This study was conducted to investigate the effect of smart parking systems (SPS) on parking search times (PST) in large parking lots. SPSs are systems that disseminate real-time parking spot availability to drivers searching for parking. The literature review revealed discrete event simulation (DES) to be a suitable tool for studying the dynamic behavior in parking lots. The parking lot selected for data collection was a university parking lot with 234 spaces. The data collected included arrival rates, departure rates, the geometric properties of the parking lot, preferred parking search strategies, and driving speeds. Arena 13.9, by Rockwell Automation, Inc, …


The Effects Of Eye Gaze Based Control On Operator Performance In Monitoring Multiple Displays, Allison Popola Jul 2011

The Effects Of Eye Gaze Based Control On Operator Performance In Monitoring Multiple Displays, Allison Popola

Doctoral Dissertations and Master's Theses

This study investigated the utility and efficacy of using eye tracking technology as a method for selecting control of a camera within a multiple display configuration. A task analysis with a Keystroke-Level-Model (KLM) was conducted to acquire an estimated time for switching between cameras. KLM estimates suggest that response times are faster using an eye tracker than manual control -indicating a time savings. To confirm these estimates, and test other hypotheses a 2 × 2 within-subjects factorial design was used to examine the effects of Control (Using an eye tracker, or manual) under different Task Loads (Low, High). Dependent variables …


Identifying An Optimal Dining Plan System For The Entertainment Industry, Joseph Crimi Apr 2011

Identifying An Optimal Dining Plan System For The Entertainment Industry, Joseph Crimi

Doctoral Dissertations and Master's Theses

The Disney Dining Plan (DDP) is a pre-paid meal plan guests can purchase when they make their reservation at Walt Disney World (WDW). Under the current system, the information provided to guests explaining the program is unclear which leads to confusion for guests. For example, guests are not sure what food they can purchase using the DDP or at which dining locations they can use the DDP. Given these problems, the present study evaluated a new information system for the DDP. The independent variables in this study were symbol type, the symbols used in the current DDP and new symbols …