Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses and Dissertations

Discipline
Institution
Keyword
Publication Year

Articles 1 - 19 of 19

Full-Text Articles in Systems Architecture

A Conceptual Decentralized Identity Solution For State Government, Martin Duclos Dec 2023

A Conceptual Decentralized Identity Solution For State Government, Martin Duclos

Theses and Dissertations

In recent years, state governments, exemplified by Mississippi, have significantly expanded their online service offerings to reduce costs and improve efficiency. However, this shift has led to challenges in managing digital identities effectively, with multiple fragmented solutions in use. This paper proposes a Self-Sovereign Identity (SSI) framework based on distributed ledger technology. SSI grants individuals control over their digital identities, enhancing privacy and security without relying on a centralized authority. The contributions of this research include increased efficiency, improved privacy and security, enhanced user satisfaction, and reduced costs in state government digital identity management. The paper provides background on digital …


A Multimodal Immune System Inspired Defense Architecture For Detecting And Deterring Digital Pathogens In Container Hosted Web Services, Islam Khalil Jun 2023

A Multimodal Immune System Inspired Defense Architecture For Detecting And Deterring Digital Pathogens In Container Hosted Web Services, Islam Khalil

Theses and Dissertations

With the increased use of web technologies, microservices, and Application Programming Interface (API) for integration between systems, and with the development of containerization of services on operating system level as a method of isolating system execution and for easing the deployment and scaling of systems, there is a growing need as well as opportunities for providing platforms that improve the security of such services. In our work, we propose an architecture for a containerization platform that utilizes various concepts derived from the human immune system. The goal of the proposed containerization platform is to introduce the concept of slowing down …


An Enhanced Cloud-Native Deep Learning Pipeline For The Classification Of Network Traffic, Ahmed Sobhy Elkenawy Feb 2023

An Enhanced Cloud-Native Deep Learning Pipeline For The Classification Of Network Traffic, Ahmed Sobhy Elkenawy

Theses and Dissertations

In a rapidly changing world, the way of solving real-world problems has changed to leverage the power of the advancements in multiple fields. Cloud-native computing approaches can be utilized with deep learning techniques to provide solutions in several important areas. For instance, with the emergence of the pandemic, much dependence on modern technologies came out as a replacement for face-to-face interaction. Deep learning can reach a high level of accuracy, which makes it very effective in the support of modern services and technologies. However, there are some challenging issues because deep learning requires many large-scale experiments, which demand a lot …


Gpgpu Microbenchmarking For Irregular Application Optimization, Dalton R. Winans-Pruitt Aug 2022

Gpgpu Microbenchmarking For Irregular Application Optimization, Dalton R. Winans-Pruitt

Theses and Dissertations

Irregular applications, such as unstructured mesh operations, do not easily map onto the typical GPU programming paradigms endorsed by GPU manufacturers, which mostly focus on maximizing concurrency for latency hiding. In this work, we show how alternative techniques focused on latency amortization can be used to control overall latency while requiring less concurrency. We used a custom-built microbenchmarking framework to test several GPU kernels and show how the GPU behaves under relevant workloads. We demonstrate that coalescing is not required for efficacious performance; an uncoalesced access pattern can achieve high bandwidth - even over 80% of the theoretical global memory …


Direct Digital Synthesis: A Flexible Architecture For Advanced Signals Research For Future Satellite Navigation Payloads, Pranav R. Patel Sep 2020

Direct Digital Synthesis: A Flexible Architecture For Advanced Signals Research For Future Satellite Navigation Payloads, Pranav R. Patel

Theses and Dissertations

In legacy Global Positioning System (GPS) Satellite Navigation (SatNav) payloads, the architecture does not provide the flexibility to adapt to changing circumstances and environments. GPS SatNav payloads have largely remained unchanged since the system became fully operational in April 1995. Since then, the use of GPS has become ubiquitous in our day-to-day lives. GPS availability is now a basic assumption for distributed infrastructure; it has become inextricably tied to our national power grids, cellular networks, and global financial systems. Emerging advancements of easy to use radio technologies, such as software-defined radios (SDRs), have greatly lowered the difficulty of discovery and …


Outlier Classification Criterion For Multivariate Cyber Anomaly Detection, Alexander M. Trigo Mar 2018

Outlier Classification Criterion For Multivariate Cyber Anomaly Detection, Alexander M. Trigo

Theses and Dissertations

Every day, intrusion detection systems catalogue millions of unsupervised data entries. This represents a “big data” problem for research sponsors within the Department of Defense. In a first response to this issue, raw data capture was transformed into usable vectors and an array of multivariate techniques implemented to detect potential outliers. This research expands and refines these techniques by implementing a Chi-Square Q-Q plot-based classification criteria for outlier detection. This methodology has been implemented into an R-based programming solution that allows for a refined and semi-automated user experience for intelligence analysts. Moreover, two case analyses are performed that illustrate how …


Text Classification Of Installation Support Contract Topic Models For Category Management, William C. Sevier Mar 2018

Text Classification Of Installation Support Contract Topic Models For Category Management, William C. Sevier

Theses and Dissertations

Air Force Installation Contracting Agency manages nearly 18 percent of total Air Force spend, equating to approximately 57 billion dollars. To improve strategic sourcing, the organization is beginning to categorize installation-support spend and assign accountable portfolio managers to respective spend categories. A critical task in this new strategic environment includes the appropriate categorization of Air Force contracts into newly created, manageable spend categories. It has been recognized that current composite categories have the opportunity to be further distinguished into sub-categories leveraging text analytics on the contract descriptions. Furthermore, upon establishing newly constructed categories, future contracts must be classified into these …


Developing A Cyberterrorism Policy: Incorporating Individual Values, Osama Bassam J. Rabie Jan 2018

Developing A Cyberterrorism Policy: Incorporating Individual Values, Osama Bassam J. Rabie

Theses and Dissertations

Preventing cyberterrorism is becoming a necessity for individuals, organizations, and governments. However, current policies focus on technical and managerial aspects without asking for experts and non-experts values and preferences for preventing cyberterrorism. This study employs value focused thinking and public value forum to bare strategic measures and alternatives for complex policy decisions for preventing cyberterrorism. The strategic measures and alternatives are per socio-technical process.


A Sandbox In Which To Learn And Develop Soar Agents, Daniel Lugo Mar 2017

A Sandbox In Which To Learn And Develop Soar Agents, Daniel Lugo

Theses and Dissertations

It is common for military personnel to leverage simulations (and simulators) as cost-effective tools to train and become proficient at various tasks (e.g., flying an aircraft and/or performing a mission, among others). These training simulations often need to represent humans within the simulated world in a realistic manner. Realistic implies creating simulated humans that exhibit behaviors that mimic real-world decision making and actions. Typically, to create the decision-making logic, techniques developed from the domain of artificial intelligence are used. Although there are several approaches to developing intelligent agents; we focus on leveraging and open source project called Soar, to define …


Evaluating And Improving The Efficiency Of Software And Algorithms For Sequence Data Analysis, Hugh L. Eaves Jan 2016

Evaluating And Improving The Efficiency Of Software And Algorithms For Sequence Data Analysis, Hugh L. Eaves

Theses and Dissertations

With the ever-growing size of sequence data sets, data processing and analysis are an increasingly large portion of the time and money spent on nucleic acid sequencing projects. Correspondingly, the performance of the software and algorithms used to perform that analysis has a direct effect on the time and expense involved. Although the analytical methods are widely varied, certain types of software and algorithms are applicable to a number of areas. Targeting improvements to these common elements has the potential for wide reaching rewards. This dissertation research consisted of several projects to characterize and improve upon the efficiency of several …


An Analysis Of Conus Based Deployment Of Pseudolites For Positioning, Navigation And Timing (Pnt) Systems, Justin H. Deifel, Albert J. Pena Sep 2015

An Analysis Of Conus Based Deployment Of Pseudolites For Positioning, Navigation And Timing (Pnt) Systems, Justin H. Deifel, Albert J. Pena

Theses and Dissertations

The Global Positioning System (GPS) developed and operated by the United States Air Force (USAF) provides a way for users to determine position, navigation and timing (PNT). GPS provides an extraordinary capability that has become instrumental in all aspects of our day to day lives. As new technologies such as automated vehicles and unmanned aircraft continue to be developed, a reliable back up to GPS is required to ensure the PNT data generated in these systems is accurate. This research studies a potential architecture for deploying a nationwide network of ground based pseudolites that would act to supplement and backup …


An Architecture For Improving Timeliness And Relevance Of Cyber Incident Notifications, James L. Miller Mar 2011

An Architecture For Improving Timeliness And Relevance Of Cyber Incident Notifications, James L. Miller

Theses and Dissertations

This research proposes a communications architecture to deliver timely and relevant cyber incident notifications to dependent mission stakeholders. This architecture, modeled in Unified Modeling Language (UML), eschews the traditional method of pushing notifications via message as dictated in Air Force Instruction 33-138. It instead shifts to a pull or publish and subscribe method of making notifications. Shifting this paradigm improves the notification process by empowering mission owners to identify those resources on which they depend for mission accomplishment, provides a direct conduit between providing and dependent mission owners for notifications when an incident occurs, and provides a shared representation for …


Cooperative Unmanned Aerial Surveillance Control System Architecture, Theodore T. Diamond, Adam L. Rutherford, Jonathan B. Taylor Mar 2009

Cooperative Unmanned Aerial Surveillance Control System Architecture, Theodore T. Diamond, Adam L. Rutherford, Jonathan B. Taylor

Theses and Dissertations

Intelligence, surveillance and reconnaissance (ISR) is a high-demand Department of Defense mission performed by unmanned aircraft systems (UASs) at the tactical and theater levels. Coordinating UASs through cooperative control offers the advantages of persistence, distributed and adaptable sensor coverage, and reduced revisit time on points of interest. The purpose of this thesis is to apply systems engineering principles to the problem of developing a flexible, common control system for cooperative UAS surveillance at the tactical level. The AFIT team developed a concept of operations (CONOPS) encompassing various users and surveillance tasks. The team then used the scenarios in the CONOPS …


A Secure And Efficient Communications Architecture For Global Information Grid Users Via Cooperating Space Assets, Victor P. Hubenko Jun 2008

A Secure And Efficient Communications Architecture For Global Information Grid Users Via Cooperating Space Assets, Victor P. Hubenko

Theses and Dissertations

With the Information Age in full and rapid development, users expect to have global, seamless, ubiquitous, secure, and efficient communications capable of providing access to real-time applications and collaboration. The United States Department of Defense’s (DoD) Network-Centric Enterprise Services initiative, along with the notion of pushing the “power to the edge,” aims to provide end-users with maximum situational awareness, a comprehensive view of the battlespace, all within a secure networking environment. Building from previous AFIT research efforts, this research developed a novel security framework architecture to address the lack of efficient and scalable secure multicasting in the low earth orbit …


A Secure Group Communication Architecture For A Swarm Of Autonomous Unmanned Aerial Vehicles, Adrian N. Phillips Mar 2008

A Secure Group Communication Architecture For A Swarm Of Autonomous Unmanned Aerial Vehicles, Adrian N. Phillips

Theses and Dissertations

This thesis investigates the application of a secure group communication architecture to a swarm of autonomous unmanned aerial vehicles (UAVs). A multicast secure group communication architecture for the low earth orbit (LEO) satellite environment is evaluated to determine if it can be effectively adapted to a swarm of UAVs and provide secure, scalable, and efficient communications. The performance of the proposed security architecture is evaluated with two other commonly used architectures using a discrete event computer simulation developed using MatLab. Performance is evaluated in terms of the scalability and efficiency of the group key distribution and management scheme when the …


A Hybrid Multi-Robot Control Architecture, Daylond J. Hooper Dec 2007

A Hybrid Multi-Robot Control Architecture, Daylond J. Hooper

Theses and Dissertations

Multi-robot systems provide system redundancy and enhanced capability versus single robot systems. Implementations of these systems are varied, each with specific design approaches geared towards an application domain. Some traditional single robot control architectures have been expanded for multi-robot systems, but these expansions predominantly focus on the addition of communication capabilities. Both design approaches are application specific and limit the generalizability of the system. This work presents a redesign of a common single robot architecture in order to provide a more sophisticated multi-robot system. The single robot architecture chosen for application is the Three Layer Architecture (TLA). The primary strength …


Architecture, Design, And Implementation Of A Rapidly Prototyped Virtual Environment For A Military Spaceplane, Scott A. Rothermel Dec 1997

Architecture, Design, And Implementation Of A Rapidly Prototyped Virtual Environment For A Military Spaceplane, Scott A. Rothermel

Theses and Dissertations

The new Global Engagement vision places increased emphasis on the Air Force's ability to control and exploit space. A military spaceplane combining reliable access to space, high operational tempos, and multi-mission capabilities is in conceptual stages of development. Virtual environment technology provides an opportunity to investigate system requirements and unconventional interface paradigms for this unique vehicle. A virtual environment architecture and design based on support for a rapid prototyping development process, separation of concerns, and user interface development is presented. The rapid prototyping process allowed management of changing requirements via an evolutionary approach to implementation. Separation of the activities performed …


A Prototype Architecture For An Automated Scenario Generation System For Combat Simulations, Mark W. Pfefferman Dec 1993

A Prototype Architecture For An Automated Scenario Generation System For Combat Simulations, Mark W. Pfefferman

Theses and Dissertations

This research effort examines the problem of automating the scenario generation process and presents a prototype architecture for an automated scenario generation system. This architecture is designed using an object- oriented approach which leads to a modular and modifiable design. The architecture provides a mechanism for automatically generating scenario files from a textual US Army operation order. This translation process occurs in two phases. First, the text operation order is translated into an intermediate format called the mission file. In the second phase, the system reads the mission file, instantiates intelligent entities, and assigns missions to those entities. The intelligent …


Design Of A Shared Coherent Cache For A Multiple Channel Architecture, John A. Reisner Dec 1993

Design Of A Shared Coherent Cache For A Multiple Channel Architecture, John A. Reisner

Theses and Dissertations

The Multiple Channel Architecture MCA is a recently proposed computer architecture which uses fiber optic communications to overcome many of the problems associated with interconnection networks. There exists a detailed MCA simulator which faithfully simulates an MCA system, however, the original version of the simulator did not cache shared data. In order to improve the performance of the MCA, a cache coherency protocol was developed and implemented in the simulator. The protocol has two features which are significant: (1) a time-division multiplexed TDM communication bus is used for coherency traffic, and (2) the shared data is cached in an independent …