Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Physical Sciences and Mathematics

Controlling The Transmitted Field Into A Cylindrical Cloak's Hidden Region, Jeffrey S. Mcguirk, Peter J. Collins Oct 2008

Controlling The Transmitted Field Into A Cylindrical Cloak's Hidden Region, Jeffrey S. Mcguirk, Peter J. Collins

Faculty Publications

Constitutive parameters for simplified cylindrical cloaks have been developed such that εzµθ and εzµr match those of the ideal cylindrical cloak. Although they are not perfect, simplified cylindrical cloaks have been shown to inherit many of the power-bending properties of the ideal cloak. However, energy is transmitted into simplified cloaks' hidden regions. Here, we develop a constraint equation that can be used to determine how closely field behavior within the simplified cylindrical cloak matches that of the ideal cloak. The deviation from this controlling equation can be reduced by controlling the cloak's parameter value, …


A Secure Group Communication Architecture For Autonomous Unmanned Aerial Vehicles, Adrian N. Phillips, Barry E. Mullins, Richard Raines, Rusty O. Baldwin Aug 2008

A Secure Group Communication Architecture For Autonomous Unmanned Aerial Vehicles, Adrian N. Phillips, Barry E. Mullins, Richard Raines, Rusty O. Baldwin

Faculty Publications

This paper investigates the application of a secure group communication architecture to a swarm of autonomous unmanned aerial vehicles (UAVs). A multicast secure group communication architecture for the low earth orbit (LEO) satellite environment is evaluated to determine if it can be effectively adapted to a swarm of UAVs and provide secure, scalable, and efficient communications. The performance of the proposed security architecture is evaluated with two other commonly used architectures using a discrete event computer simulation developed using MATLAB. Performance is evaluated in terms of the scalability and efficiency of the group key distribution and management scheme when the …


Stimulated Brillouin Scattering Continuous Wave Phase Conjugation In Step-Index Fiber Optics, Steven M. Massey, Justin B. Spring, Timothy H. Russell Jul 2008

Stimulated Brillouin Scattering Continuous Wave Phase Conjugation In Step-Index Fiber Optics, Steven M. Massey, Justin B. Spring, Timothy H. Russell

Faculty Publications

Continuous wave (CW) stimulated Brillouin scattering (SBS) phase conjugation in step-index optical fibers was studied experimentally and modeled as a function of fiber length. A phase conjugate fidelity over 80% was measured from SBS in a 40 m fiber using a pinhole technique. Fidelity decreases with fiber length, and a fiber with a numerical aperture (NA) of 0.06 was found to generate good phase conjugation fidelity over longer lengths than a fiber with 0.13 NA. Modeling and experiment support previous work showing the maximum interaction length which yields a high fidelity phase conjugate beam is inversely proportional to the fiber …


Scaling Ant Colony Optimization With Hierarchical Reinforcement Learning Partitioning, Erik J. Dries, Gilbert L. Peterson Jul 2008

Scaling Ant Colony Optimization With Hierarchical Reinforcement Learning Partitioning, Erik J. Dries, Gilbert L. Peterson

Faculty Publications

This paper merges hierarchical reinforcement learning (HRL) with ant colony optimization (ACO) to produce a HRL ACO algorithm capable of generating solutions for large domains. This paper describes two specific implementations of the new algorithm: the first a modification to Dietterich’s MAXQ-Q HRL algorithm, the second a hierarchical ant colony system algorithm. These implementations generate faster results, with little to no significant change in the quality of solutions for the tested problem domains. The application of ACO to the MAXQ-Q algorithm replaces the reinforcement learning, Q-learning, with the modified ant colony optimization method, Ant-Q. This algorithm, MAXQ-AntQ, converges to solutions …


Integrating Trust Into The Cybercraft Initiative Via The Trust Vectors Model, Michael Stevens, Paul D. Williams, Gilbert L. Peterson, Stuart H. Kurkowski May 2008

Integrating Trust Into The Cybercraft Initiative Via The Trust Vectors Model, Michael Stevens, Paul D. Williams, Gilbert L. Peterson, Stuart H. Kurkowski

Faculty Publications

This research supports the hypothesis that the Trust Vector model can be modified to fit the CyberCraft Initiative, and that there are limits to the utility of historical data. This research proposed some modifications and expansions to the Trust Model Vector, and identified areas for future research.


Optical Phase Unwrapping In The Presence Of Branch Points, Todd M. Venema [*], Jason D. Schmidt May 2008

Optical Phase Unwrapping In The Presence Of Branch Points, Todd M. Venema [*], Jason D. Schmidt

Faculty Publications

Strong turbulence causes phase discontinuities known as branch points in an optical field. These discontinuities complicate the phase unwrapping necessary to apply phase corrections onto a deformable mirror in an adaptive optics (AO) system. This paper proposes a non-optimal but effective and implementable phase unwrapping method for optical fields containing branch points. This method first applies a least-squares (LS) unwrapper to the field which isolates and unwraps the LS component of the field. Four modulo-2π-equivalent non-LS components are created by subtracting the LS component from the original field and then restricting the result to differing ranges. 2π phase jumps known …


The Importance Of Generalizability To Anomaly Detection, Gilbert L. Peterson, Brent T. Mcbride Mar 2008

The Importance Of Generalizability To Anomaly Detection, Gilbert L. Peterson, Brent T. Mcbride

Faculty Publications

In security-related areas there is concern over novel “zero-day” attacks that penetrate system defenses and wreak havoc. The best methods for countering these threats are recognizing “nonself” as in an Artificial Immune System or recognizing “self” through clustering. For either case, the concern remains that something that appears similar to self could be missed. Given this situation, one could incorrectly assume that a preference for a tighter fit to self over generalizability is important for false positive reduction in this type of learning problem. This article confirms that in anomaly detection as in other forms of classification a tight fit, …


Multi-Class Classification Fusion Using Boosting For Identifying Steganography Methods, Benjamin M. Rodriguez, Gilbert L. Peterson Mar 2008

Multi-Class Classification Fusion Using Boosting For Identifying Steganography Methods, Benjamin M. Rodriguez, Gilbert L. Peterson

Faculty Publications

No abstract provided.


Ant Clustering With Locally Weighting Ant Perception And Diversified Memory, Gilbert L. Peterson, Christopher B. Mayer, Thomas L. Kubler Mar 2008

Ant Clustering With Locally Weighting Ant Perception And Diversified Memory, Gilbert L. Peterson, Christopher B. Mayer, Thomas L. Kubler

Faculty Publications

Ant clustering algorithms are a robust and flexible tool for clustering data that have produced some promising results. This paper introduces two improvements that can be incorporated into any ant clustering algorithm: kernel function similarity weights and a similarity memory model replacement scheme. A kernel function weights objects within an ant’s neighborhood according to the object distance and provides an alternate interpretation of the similarity of objects in an ant’s neighborhood. Ants can hill-climb the kernel gradients as they look for a suitable place to drop a carried object. The similarity memory model equips ants with a small memory consisting …


Using Plsi-U To Detect Insider Threats By Datamining Email, James S. Okolica, Gilbert L. Peterson, Robert F. Mills Feb 2008

Using Plsi-U To Detect Insider Threats By Datamining Email, James S. Okolica, Gilbert L. Peterson, Robert F. Mills

Faculty Publications

Despite a technology bias that focuses on external electronic threats, insiders pose the greatest threat to an organisation. This paper discusses an approach to assist investigators in identifying potential insider threats. We discern employees' interests from e-mail using an extended version of PLSI. These interests are transformed into implicit and explicit social network graphs, which are used to locate potential insiders by identifying individuals who feel alienated from the organisation or have a hidden interest in a sensitive topic. By applying this technique to the Enron e-mail corpus, a small number of employees appear as potential insider threats.


Network Formation Using Ant Colony Optimization -- A Systematic Review, Steven C. Oimoen, Gilbert L. Peterson, Kenneth M. Hopkinson Jan 2008

Network Formation Using Ant Colony Optimization -- A Systematic Review, Steven C. Oimoen, Gilbert L. Peterson, Kenneth M. Hopkinson

Faculty Publications

A significant area of research in the field of hybrid communications is the Network Design Problem (NDP) [1]. The NDP is an NP complete problem [1] that focuses on identifying the optimal network topology for transmitting commodities between nodes, under constraints such as bandwidth, limited compatible directed channels, and link and commodity costs. The NDP focuses on designing a flexible network while trying to achieve optimal flow or routing. If a link (or arc) is used, then an associated fixed cost of the edge is incurred. In addition, there is a cost for using the arc depending on the flow. …


Performance Comparison Of Pb(Zr0.52Ti0.48)O3-Only And Pb(Zr0.52Ti0.48)O3-On-Silicon Resonators, Hengky Chandrahalim, Sunil A. Bhave, Ronald G. Polcawich, Jeff Pulskamp, Dan Judy, Roger Kaul, Madan Dubey Jan 2008

Performance Comparison Of Pb(Zr0.52Ti0.48)O3-Only And Pb(Zr0.52Ti0.48)O3-On-Silicon Resonators, Hengky Chandrahalim, Sunil A. Bhave, Ronald G. Polcawich, Jeff Pulskamp, Dan Judy, Roger Kaul, Madan Dubey

Faculty Publications

This paper provides a quantitative comparison and explores the design space of lead zirconium titanate (PZT)–only and PZT-on-silicon length-extensional mode resonators for incorporation into radio frequency microelectromechanical system filters and oscillators. We experimentally measured the correlation of motional impedance (RX) and quality factor (Q) with the resonators’ silicon layer thickness (tSi). For identical lateral dimensions and PZT-layer thicknesses (tPZT), the PZT-on-silicon resonator has higher resonant frequency (fC), higher Q (5100 versus 140), lower RX (51 Ω versus 205 Ω), and better linearity [third-order input intercept …