Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (7)
- Artificial Intelligence and Robotics (4)
- Information Security (4)
- Computer Engineering (3)
- Software Engineering (3)
-
- Databases and Information Systems (2)
- Numerical Analysis and Scientific Computing (2)
- OS and Networks (2)
- Aerospace Engineering (1)
- Applied Mathematics (1)
- Aviation (1)
- Aviation and Space Education (1)
- Bioinformatics (1)
- Business (1)
- Civic and Community Engagement (1)
- Cognition and Perception (1)
- Computer and Systems Architecture (1)
- Control Theory (1)
- Criminology (1)
- Defense and Security Studies (1)
- Digital Communications and Networking (1)
- Electrical and Computer Engineering (1)
- Graphics and Human Computer Interfaces (1)
- Hardware Systems (1)
- Infrastructure (1)
- International Relations (1)
- Life Sciences (1)
- Institution
- Keyword
-
- #antcenter (4)
- Algorithms (1)
- Artificial intelligence (1)
- Artificial satellites in telecommunications (1)
- Automated Deep Learning (1)
-
- BATTLESIM (1)
- Big Data (1)
- Cache memory (1)
- Classification (1)
- Cloud-native Computing (1)
- Combat--Computer simulation (1)
- Computerized simulation (1)
- Containerization (1)
- Cyberterrorism (1)
- Decentralized (1)
- Deep Learning Pipelines (1)
- Digital identity management (1)
- Drone aircraft (1)
- Drone aircraft--Control systems (1)
- Electronic data processing--Distributed processing (1)
- Flight simulation (1)
- Flight testing (1)
- GPGPU (1)
- Genetic sequence data (1)
- Global Positioning System (GPS) (1)
- Information Systems Security (1)
- Intelligent agents (1)
- Intelligent control systems (1)
- Irregular applications (1)
- Java (1)
Articles 1 - 19 of 19
Full-Text Articles in Systems Architecture
A Conceptual Decentralized Identity Solution For State Government, Martin Duclos
A Conceptual Decentralized Identity Solution For State Government, Martin Duclos
Theses and Dissertations
In recent years, state governments, exemplified by Mississippi, have significantly expanded their online service offerings to reduce costs and improve efficiency. However, this shift has led to challenges in managing digital identities effectively, with multiple fragmented solutions in use. This paper proposes a Self-Sovereign Identity (SSI) framework based on distributed ledger technology. SSI grants individuals control over their digital identities, enhancing privacy and security without relying on a centralized authority. The contributions of this research include increased efficiency, improved privacy and security, enhanced user satisfaction, and reduced costs in state government digital identity management. The paper provides background on digital …
A Multimodal Immune System Inspired Defense Architecture For Detecting And Deterring Digital Pathogens In Container Hosted Web Services, Islam Khalil
Theses and Dissertations
With the increased use of web technologies, microservices, and Application Programming Interface (API) for integration between systems, and with the development of containerization of services on operating system level as a method of isolating system execution and for easing the deployment and scaling of systems, there is a growing need as well as opportunities for providing platforms that improve the security of such services. In our work, we propose an architecture for a containerization platform that utilizes various concepts derived from the human immune system. The goal of the proposed containerization platform is to introduce the concept of slowing down …
An Enhanced Cloud-Native Deep Learning Pipeline For The Classification Of Network Traffic, Ahmed Sobhy Elkenawy
An Enhanced Cloud-Native Deep Learning Pipeline For The Classification Of Network Traffic, Ahmed Sobhy Elkenawy
Theses and Dissertations
In a rapidly changing world, the way of solving real-world problems has changed to leverage the power of the advancements in multiple fields. Cloud-native computing approaches can be utilized with deep learning techniques to provide solutions in several important areas. For instance, with the emergence of the pandemic, much dependence on modern technologies came out as a replacement for face-to-face interaction. Deep learning can reach a high level of accuracy, which makes it very effective in the support of modern services and technologies. However, there are some challenging issues because deep learning requires many large-scale experiments, which demand a lot …
Gpgpu Microbenchmarking For Irregular Application Optimization, Dalton R. Winans-Pruitt
Gpgpu Microbenchmarking For Irregular Application Optimization, Dalton R. Winans-Pruitt
Theses and Dissertations
Irregular applications, such as unstructured mesh operations, do not easily map onto the typical GPU programming paradigms endorsed by GPU manufacturers, which mostly focus on maximizing concurrency for latency hiding. In this work, we show how alternative techniques focused on latency amortization can be used to control overall latency while requiring less concurrency. We used a custom-built microbenchmarking framework to test several GPU kernels and show how the GPU behaves under relevant workloads. We demonstrate that coalescing is not required for efficacious performance; an uncoalesced access pattern can achieve high bandwidth - even over 80% of the theoretical global memory …
Direct Digital Synthesis: A Flexible Architecture For Advanced Signals Research For Future Satellite Navigation Payloads, Pranav R. Patel
Direct Digital Synthesis: A Flexible Architecture For Advanced Signals Research For Future Satellite Navigation Payloads, Pranav R. Patel
Theses and Dissertations
In legacy Global Positioning System (GPS) Satellite Navigation (SatNav) payloads, the architecture does not provide the flexibility to adapt to changing circumstances and environments. GPS SatNav payloads have largely remained unchanged since the system became fully operational in April 1995. Since then, the use of GPS has become ubiquitous in our day-to-day lives. GPS availability is now a basic assumption for distributed infrastructure; it has become inextricably tied to our national power grids, cellular networks, and global financial systems. Emerging advancements of easy to use radio technologies, such as software-defined radios (SDRs), have greatly lowered the difficulty of discovery and …
Outlier Classification Criterion For Multivariate Cyber Anomaly Detection, Alexander M. Trigo
Outlier Classification Criterion For Multivariate Cyber Anomaly Detection, Alexander M. Trigo
Theses and Dissertations
Every day, intrusion detection systems catalogue millions of unsupervised data entries. This represents a “big data” problem for research sponsors within the Department of Defense. In a first response to this issue, raw data capture was transformed into usable vectors and an array of multivariate techniques implemented to detect potential outliers. This research expands and refines these techniques by implementing a Chi-Square Q-Q plot-based classification criteria for outlier detection. This methodology has been implemented into an R-based programming solution that allows for a refined and semi-automated user experience for intelligence analysts. Moreover, two case analyses are performed that illustrate how …
Text Classification Of Installation Support Contract Topic Models For Category Management, William C. Sevier
Text Classification Of Installation Support Contract Topic Models For Category Management, William C. Sevier
Theses and Dissertations
Air Force Installation Contracting Agency manages nearly 18 percent of total Air Force spend, equating to approximately 57 billion dollars. To improve strategic sourcing, the organization is beginning to categorize installation-support spend and assign accountable portfolio managers to respective spend categories. A critical task in this new strategic environment includes the appropriate categorization of Air Force contracts into newly created, manageable spend categories. It has been recognized that current composite categories have the opportunity to be further distinguished into sub-categories leveraging text analytics on the contract descriptions. Furthermore, upon establishing newly constructed categories, future contracts must be classified into these …
Developing A Cyberterrorism Policy: Incorporating Individual Values, Osama Bassam J. Rabie
Developing A Cyberterrorism Policy: Incorporating Individual Values, Osama Bassam J. Rabie
Theses and Dissertations
Preventing cyberterrorism is becoming a necessity for individuals, organizations, and governments. However, current policies focus on technical and managerial aspects without asking for experts and non-experts values and preferences for preventing cyberterrorism. This study employs value focused thinking and public value forum to bare strategic measures and alternatives for complex policy decisions for preventing cyberterrorism. The strategic measures and alternatives are per socio-technical process.
A Sandbox In Which To Learn And Develop Soar Agents, Daniel Lugo
A Sandbox In Which To Learn And Develop Soar Agents, Daniel Lugo
Theses and Dissertations
It is common for military personnel to leverage simulations (and simulators) as cost-effective tools to train and become proficient at various tasks (e.g., flying an aircraft and/or performing a mission, among others). These training simulations often need to represent humans within the simulated world in a realistic manner. Realistic implies creating simulated humans that exhibit behaviors that mimic real-world decision making and actions. Typically, to create the decision-making logic, techniques developed from the domain of artificial intelligence are used. Although there are several approaches to developing intelligent agents; we focus on leveraging and open source project called Soar, to define …
Evaluating And Improving The Efficiency Of Software And Algorithms For Sequence Data Analysis, Hugh L. Eaves
Evaluating And Improving The Efficiency Of Software And Algorithms For Sequence Data Analysis, Hugh L. Eaves
Theses and Dissertations
With the ever-growing size of sequence data sets, data processing and analysis are an increasingly large portion of the time and money spent on nucleic acid sequencing projects. Correspondingly, the performance of the software and algorithms used to perform that analysis has a direct effect on the time and expense involved. Although the analytical methods are widely varied, certain types of software and algorithms are applicable to a number of areas. Targeting improvements to these common elements has the potential for wide reaching rewards. This dissertation research consisted of several projects to characterize and improve upon the efficiency of several …
An Analysis Of Conus Based Deployment Of Pseudolites For Positioning, Navigation And Timing (Pnt) Systems, Justin H. Deifel, Albert J. Pena
An Analysis Of Conus Based Deployment Of Pseudolites For Positioning, Navigation And Timing (Pnt) Systems, Justin H. Deifel, Albert J. Pena
Theses and Dissertations
The Global Positioning System (GPS) developed and operated by the United States Air Force (USAF) provides a way for users to determine position, navigation and timing (PNT). GPS provides an extraordinary capability that has become instrumental in all aspects of our day to day lives. As new technologies such as automated vehicles and unmanned aircraft continue to be developed, a reliable back up to GPS is required to ensure the PNT data generated in these systems is accurate. This research studies a potential architecture for deploying a nationwide network of ground based pseudolites that would act to supplement and backup …
An Architecture For Improving Timeliness And Relevance Of Cyber Incident Notifications, James L. Miller
An Architecture For Improving Timeliness And Relevance Of Cyber Incident Notifications, James L. Miller
Theses and Dissertations
This research proposes a communications architecture to deliver timely and relevant cyber incident notifications to dependent mission stakeholders. This architecture, modeled in Unified Modeling Language (UML), eschews the traditional method of pushing notifications via message as dictated in Air Force Instruction 33-138. It instead shifts to a pull or publish and subscribe method of making notifications. Shifting this paradigm improves the notification process by empowering mission owners to identify those resources on which they depend for mission accomplishment, provides a direct conduit between providing and dependent mission owners for notifications when an incident occurs, and provides a shared representation for …
Cooperative Unmanned Aerial Surveillance Control System Architecture, Theodore T. Diamond, Adam L. Rutherford, Jonathan B. Taylor
Cooperative Unmanned Aerial Surveillance Control System Architecture, Theodore T. Diamond, Adam L. Rutherford, Jonathan B. Taylor
Theses and Dissertations
Intelligence, surveillance and reconnaissance (ISR) is a high-demand Department of Defense mission performed by unmanned aircraft systems (UASs) at the tactical and theater levels. Coordinating UASs through cooperative control offers the advantages of persistence, distributed and adaptable sensor coverage, and reduced revisit time on points of interest. The purpose of this thesis is to apply systems engineering principles to the problem of developing a flexible, common control system for cooperative UAS surveillance at the tactical level. The AFIT team developed a concept of operations (CONOPS) encompassing various users and surveillance tasks. The team then used the scenarios in the CONOPS …
A Secure And Efficient Communications Architecture For Global Information Grid Users Via Cooperating Space Assets, Victor P. Hubenko
A Secure And Efficient Communications Architecture For Global Information Grid Users Via Cooperating Space Assets, Victor P. Hubenko
Theses and Dissertations
With the Information Age in full and rapid development, users expect to have global, seamless, ubiquitous, secure, and efficient communications capable of providing access to real-time applications and collaboration. The United States Department of Defense’s (DoD) Network-Centric Enterprise Services initiative, along with the notion of pushing the “power to the edge,” aims to provide end-users with maximum situational awareness, a comprehensive view of the battlespace, all within a secure networking environment. Building from previous AFIT research efforts, this research developed a novel security framework architecture to address the lack of efficient and scalable secure multicasting in the low earth orbit …
A Secure Group Communication Architecture For A Swarm Of Autonomous Unmanned Aerial Vehicles, Adrian N. Phillips
A Secure Group Communication Architecture For A Swarm Of Autonomous Unmanned Aerial Vehicles, Adrian N. Phillips
Theses and Dissertations
This thesis investigates the application of a secure group communication architecture to a swarm of autonomous unmanned aerial vehicles (UAVs). A multicast secure group communication architecture for the low earth orbit (LEO) satellite environment is evaluated to determine if it can be effectively adapted to a swarm of UAVs and provide secure, scalable, and efficient communications. The performance of the proposed security architecture is evaluated with two other commonly used architectures using a discrete event computer simulation developed using MatLab. Performance is evaluated in terms of the scalability and efficiency of the group key distribution and management scheme when the …
A Hybrid Multi-Robot Control Architecture, Daylond J. Hooper
A Hybrid Multi-Robot Control Architecture, Daylond J. Hooper
Theses and Dissertations
Multi-robot systems provide system redundancy and enhanced capability versus single robot systems. Implementations of these systems are varied, each with specific design approaches geared towards an application domain. Some traditional single robot control architectures have been expanded for multi-robot systems, but these expansions predominantly focus on the addition of communication capabilities. Both design approaches are application specific and limit the generalizability of the system. This work presents a redesign of a common single robot architecture in order to provide a more sophisticated multi-robot system. The single robot architecture chosen for application is the Three Layer Architecture (TLA). The primary strength …
Architecture, Design, And Implementation Of A Rapidly Prototyped Virtual Environment For A Military Spaceplane, Scott A. Rothermel
Architecture, Design, And Implementation Of A Rapidly Prototyped Virtual Environment For A Military Spaceplane, Scott A. Rothermel
Theses and Dissertations
The new Global Engagement vision places increased emphasis on the Air Force's ability to control and exploit space. A military spaceplane combining reliable access to space, high operational tempos, and multi-mission capabilities is in conceptual stages of development. Virtual environment technology provides an opportunity to investigate system requirements and unconventional interface paradigms for this unique vehicle. A virtual environment architecture and design based on support for a rapid prototyping development process, separation of concerns, and user interface development is presented. The rapid prototyping process allowed management of changing requirements via an evolutionary approach to implementation. Separation of the activities performed …
A Prototype Architecture For An Automated Scenario Generation System For Combat Simulations, Mark W. Pfefferman
A Prototype Architecture For An Automated Scenario Generation System For Combat Simulations, Mark W. Pfefferman
Theses and Dissertations
This research effort examines the problem of automating the scenario generation process and presents a prototype architecture for an automated scenario generation system. This architecture is designed using an object- oriented approach which leads to a modular and modifiable design. The architecture provides a mechanism for automatically generating scenario files from a textual US Army operation order. This translation process occurs in two phases. First, the text operation order is translated into an intermediate format called the mission file. In the second phase, the system reads the mission file, instantiates intelligent entities, and assigns missions to those entities. The intelligent …
Design Of A Shared Coherent Cache For A Multiple Channel Architecture, John A. Reisner
Design Of A Shared Coherent Cache For A Multiple Channel Architecture, John A. Reisner
Theses and Dissertations
The Multiple Channel Architecture MCA is a recently proposed computer architecture which uses fiber optic communications to overcome many of the problems associated with interconnection networks. There exists a detailed MCA simulator which faithfully simulates an MCA system, however, the original version of the simulator did not cache shared data. In order to improve the performance of the MCA, a cache coherency protocol was developed and implemented in the simulator. The protocol has two features which are significant: (1) a time-division multiplexed TDM communication bus is used for coherency traffic, and (2) the shared data is cached in an independent …