Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (8)
- Engineering (4)
- Physics (4)
- Artificial Intelligence and Robotics (3)
- Optics (3)
-
- Electrical and Computer Engineering (2)
- Computer Engineering (1)
- Condensed Matter Physics (1)
- Digital Communications and Networking (1)
- Electrical and Electronics (1)
- Electro-Mechanical Systems (1)
- Electronic Devices and Semiconductor Manufacturing (1)
- Engineering Physics (1)
- Materials Science and Engineering (1)
- Mechanical Engineering (1)
- Semiconductor and Optical Materials (1)
- Signal Processing (1)
- Systems Architecture (1)
- Keyword
-
- Scattering (2)
- Anomaly detection (1)
- Ant clustering (1)
- Ant colony optimization (1)
- Atmospheric turbulence (1)
-
- Classification systems (1)
- Clustering (1)
- Computing methodologies (1)
- Convex polytope (1)
- CyberCraft initiative (1)
- Data mining (1)
- Deformable mirrors (1)
- Distributed processing (1)
- Electromechanical optics (1)
- Ellipsoid (1)
- Filters (1)
- Group key management (1)
- Image fusion (1)
- Insider threats (1)
- Intrusion detection system (1)
- Invisibility cloaks (1)
- Laser communications (1)
- Locally weighted regression (1)
- MEMS (1)
- Machine learning (1)
- Military computing (1)
- Multicast (1)
- Nonlinear optics (1)
- Optical fields (1)
- PZT (1)
Articles 1 - 12 of 12
Full-Text Articles in Physical Sciences and Mathematics
Controlling The Transmitted Field Into A Cylindrical Cloak's Hidden Region, Jeffrey S. Mcguirk, Peter J. Collins
Controlling The Transmitted Field Into A Cylindrical Cloak's Hidden Region, Jeffrey S. Mcguirk, Peter J. Collins
Faculty Publications
Constitutive parameters for simplified cylindrical cloaks have been developed such that εzµθ and εzµr match those of the ideal cylindrical cloak. Although they are not perfect, simplified cylindrical cloaks have been shown to inherit many of the power-bending properties of the ideal cloak. However, energy is transmitted into simplified cloaks' hidden regions. Here, we develop a constraint equation that can be used to determine how closely field behavior within the simplified cylindrical cloak matches that of the ideal cloak. The deviation from this controlling equation can be reduced by controlling the cloak's parameter value, …
A Secure Group Communication Architecture For Autonomous Unmanned Aerial Vehicles, Adrian N. Phillips, Barry E. Mullins, Richard Raines, Rusty O. Baldwin
A Secure Group Communication Architecture For Autonomous Unmanned Aerial Vehicles, Adrian N. Phillips, Barry E. Mullins, Richard Raines, Rusty O. Baldwin
Faculty Publications
This paper investigates the application of a secure group communication architecture to a swarm of autonomous unmanned aerial vehicles (UAVs). A multicast secure group communication architecture for the low earth orbit (LEO) satellite environment is evaluated to determine if it can be effectively adapted to a swarm of UAVs and provide secure, scalable, and efficient communications. The performance of the proposed security architecture is evaluated with two other commonly used architectures using a discrete event computer simulation developed using MATLAB. Performance is evaluated in terms of the scalability and efficiency of the group key distribution and management scheme when the …
Stimulated Brillouin Scattering Continuous Wave Phase Conjugation In Step-Index Fiber Optics, Steven M. Massey, Justin B. Spring, Timothy H. Russell
Stimulated Brillouin Scattering Continuous Wave Phase Conjugation In Step-Index Fiber Optics, Steven M. Massey, Justin B. Spring, Timothy H. Russell
Faculty Publications
Continuous wave (CW) stimulated Brillouin scattering (SBS) phase conjugation in step-index optical fibers was studied experimentally and modeled as a function of fiber length. A phase conjugate fidelity over 80% was measured from SBS in a 40 m fiber using a pinhole technique. Fidelity decreases with fiber length, and a fiber with a numerical aperture (NA) of 0.06 was found to generate good phase conjugation fidelity over longer lengths than a fiber with 0.13 NA. Modeling and experiment support previous work showing the maximum interaction length which yields a high fidelity phase conjugate beam is inversely proportional to the fiber …
Scaling Ant Colony Optimization With Hierarchical Reinforcement Learning Partitioning, Erik J. Dries, Gilbert L. Peterson
Scaling Ant Colony Optimization With Hierarchical Reinforcement Learning Partitioning, Erik J. Dries, Gilbert L. Peterson
Faculty Publications
This paper merges hierarchical reinforcement learning (HRL) with ant colony optimization (ACO) to produce a HRL ACO algorithm capable of generating solutions for large domains. This paper describes two specific implementations of the new algorithm: the first a modification to Dietterich’s MAXQ-Q HRL algorithm, the second a hierarchical ant colony system algorithm. These implementations generate faster results, with little to no significant change in the quality of solutions for the tested problem domains. The application of ACO to the MAXQ-Q algorithm replaces the reinforcement learning, Q-learning, with the modified ant colony optimization method, Ant-Q. This algorithm, MAXQ-AntQ, converges to solutions …
Integrating Trust Into The Cybercraft Initiative Via The Trust Vectors Model, Michael Stevens, Paul D. Williams, Gilbert L. Peterson, Stuart H. Kurkowski
Integrating Trust Into The Cybercraft Initiative Via The Trust Vectors Model, Michael Stevens, Paul D. Williams, Gilbert L. Peterson, Stuart H. Kurkowski
Faculty Publications
This research supports the hypothesis that the Trust Vector model can be modified to fit the CyberCraft Initiative, and that there are limits to the utility of historical data. This research proposed some modifications and expansions to the Trust Model Vector, and identified areas for future research.
Optical Phase Unwrapping In The Presence Of Branch Points, Todd M. Venema [*], Jason D. Schmidt
Optical Phase Unwrapping In The Presence Of Branch Points, Todd M. Venema [*], Jason D. Schmidt
Faculty Publications
Strong turbulence causes phase discontinuities known as branch points in an optical field. These discontinuities complicate the phase unwrapping necessary to apply phase corrections onto a deformable mirror in an adaptive optics (AO) system. This paper proposes a non-optimal but effective and implementable phase unwrapping method for optical fields containing branch points. This method first applies a least-squares (LS) unwrapper to the field which isolates and unwraps the LS component of the field. Four modulo-2π-equivalent non-LS components are created by subtracting the LS component from the original field and then restricting the result to differing ranges. 2π phase jumps known …
The Importance Of Generalizability To Anomaly Detection, Gilbert L. Peterson, Brent T. Mcbride
The Importance Of Generalizability To Anomaly Detection, Gilbert L. Peterson, Brent T. Mcbride
Faculty Publications
In security-related areas there is concern over novel “zero-day” attacks that penetrate system defenses and wreak havoc. The best methods for countering these threats are recognizing “nonself” as in an Artificial Immune System or recognizing “self” through clustering. For either case, the concern remains that something that appears similar to self could be missed. Given this situation, one could incorrectly assume that a preference for a tighter fit to self over generalizability is important for false positive reduction in this type of learning problem. This article confirms that in anomaly detection as in other forms of classification a tight fit, …
Multi-Class Classification Fusion Using Boosting For Identifying Steganography Methods, Benjamin M. Rodriguez, Gilbert L. Peterson
Multi-Class Classification Fusion Using Boosting For Identifying Steganography Methods, Benjamin M. Rodriguez, Gilbert L. Peterson
Faculty Publications
No abstract provided.
Ant Clustering With Locally Weighting Ant Perception And Diversified Memory, Gilbert L. Peterson, Christopher B. Mayer, Thomas L. Kubler
Ant Clustering With Locally Weighting Ant Perception And Diversified Memory, Gilbert L. Peterson, Christopher B. Mayer, Thomas L. Kubler
Faculty Publications
Ant clustering algorithms are a robust and flexible tool for clustering data that have produced some promising results. This paper introduces two improvements that can be incorporated into any ant clustering algorithm: kernel function similarity weights and a similarity memory model replacement scheme. A kernel function weights objects within an ant’s neighborhood according to the object distance and provides an alternate interpretation of the similarity of objects in an ant’s neighborhood. Ants can hill-climb the kernel gradients as they look for a suitable place to drop a carried object. The similarity memory model equips ants with a small memory consisting …
Using Plsi-U To Detect Insider Threats By Datamining Email, James S. Okolica, Gilbert L. Peterson, Robert F. Mills
Using Plsi-U To Detect Insider Threats By Datamining Email, James S. Okolica, Gilbert L. Peterson, Robert F. Mills
Faculty Publications
Despite a technology bias that focuses on external electronic threats, insiders pose the greatest threat to an organisation. This paper discusses an approach to assist investigators in identifying potential insider threats. We discern employees' interests from e-mail using an extended version of PLSI. These interests are transformed into implicit and explicit social network graphs, which are used to locate potential insiders by identifying individuals who feel alienated from the organisation or have a hidden interest in a sensitive topic. By applying this technique to the Enron e-mail corpus, a small number of employees appear as potential insider threats.
Network Formation Using Ant Colony Optimization -- A Systematic Review, Steven C. Oimoen, Gilbert L. Peterson, Kenneth M. Hopkinson
Network Formation Using Ant Colony Optimization -- A Systematic Review, Steven C. Oimoen, Gilbert L. Peterson, Kenneth M. Hopkinson
Faculty Publications
A significant area of research in the field of hybrid communications is the Network Design Problem (NDP) [1]. The NDP is an NP complete problem [1] that focuses on identifying the optimal network topology for transmitting commodities between nodes, under constraints such as bandwidth, limited compatible directed channels, and link and commodity costs. The NDP focuses on designing a flexible network while trying to achieve optimal flow or routing. If a link (or arc) is used, then an associated fixed cost of the edge is incurred. In addition, there is a cost for using the arc depending on the flow. …
Performance Comparison Of Pb(Zr0.52Ti0.48)O3-Only And Pb(Zr0.52Ti0.48)O3-On-Silicon Resonators, Hengky Chandrahalim, Sunil A. Bhave, Ronald G. Polcawich, Jeff Pulskamp, Dan Judy, Roger Kaul, Madan Dubey
Performance Comparison Of Pb(Zr0.52Ti0.48)O3-Only And Pb(Zr0.52Ti0.48)O3-On-Silicon Resonators, Hengky Chandrahalim, Sunil A. Bhave, Ronald G. Polcawich, Jeff Pulskamp, Dan Judy, Roger Kaul, Madan Dubey
Faculty Publications
This paper provides a quantitative comparison and explores the design space of lead zirconium titanate (PZT)–only and PZT-on-silicon length-extensional mode resonators for incorporation into radio frequency microelectromechanical system filters and oscillators. We experimentally measured the correlation of motional impedance (RX) and quality factor (Q) with the resonators’ silicon layer thickness (tSi). For identical lateral dimensions and PZT-layer thicknesses (tPZT), the PZT-on-silicon resonator has higher resonant frequency (fC), higher Q (5100 versus 140), lower RX (51 Ω versus 205 Ω), and better linearity [third-order input intercept …