Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- 5G networks (1)
- AFLR (1)
- Advancing front (1)
- Arduplane (1)
- Artificial neural networks (1)
-
- Association and scheduling (1)
- Attack (1)
- Autoregressive (1)
- Backdoor (1)
- Brain tumor classification (1)
- Cellular neural networks (1)
- Communications (1)
- Cyber-Physical Systems (CPS) (1)
- Data recorder (1)
- Deep learning (1)
- Deep neural network (1)
- Deep recurrent learning (1)
- Digital signal processing (1)
- Dronekit (1)
- Electroencephalography (1)
- Energy Delivery Systems (EDS) (1)
- Information Technology (IT) (1)
- Ionospher (1)
- Joint label fusion (1)
- Local reconnection (1)
- Longitudinal brain tumor tracking (1)
- MAVlink (1)
- Machine fault analysis (1)
- Mesh refinement (1)
- Millimeter Wave (mmWave) networks (1)
Articles 1 - 8 of 8
Full-Text Articles in Engineering
Cyber Defense Remediation In Energy Delivery Systems, Kamrul Hasan
Cyber Defense Remediation In Energy Delivery Systems, Kamrul Hasan
Computational Modeling & Simulation Engineering Theses & Dissertations
The integration of Information Technology (IT) and Operational Technology (OT) in Cyber-Physical Systems (CPS) has resulted in increased efficiency and facilitated real-time information acquisition, processing, and decision making. However, the increase in automation technology and the use of the internet for connecting, remote controlling, and supervising systems and facilities has also increased the likelihood of cybersecurity threats that can impact safety of humans and property. There is a need to assess cybersecurity risks in the power grid, nuclear plants, chemical factories, etc. to gain insight into the likelihood of safety hazards. Quantitative cybersecurity risk assessment will lead to informed cyber …
Onboard Autonomous Controllability Assessment For Fixed Wing Suavs, Brian Edward Duvall
Onboard Autonomous Controllability Assessment For Fixed Wing Suavs, Brian Edward Duvall
Mechanical & Aerospace Engineering Theses & Dissertations
Traditionally fixed-wing small Unmanned Arial Vehicles (sUAV) are flown while in direct line of sight with commands from a remote operator. However, this is changing with the increased popularity and ready availability of low-cost flight controllers. Flight controllers provide fixed-wing sUAVs with functions that either minimize or eliminate the need for a remote operator. Since the remote operator is no longer controlling the sUAV, it is impossible to determine if the fixed-wing sUAV has proper control authority. In this work, a controllability detection system was designed, built, and flight-tested using COTS hardware. The method features in-situ measurement and analysis of …
Parallelization Of The Advancing Front Local Reconnection Mesh Generation Software Using A Pseudo-Constrained Parallel Data Refinement Method, Kevin Mark Garner Jr.
Parallelization Of The Advancing Front Local Reconnection Mesh Generation Software Using A Pseudo-Constrained Parallel Data Refinement Method, Kevin Mark Garner Jr.
Computer Science Theses & Dissertations
Preliminary results of a long-term project entailing the parallelization of an industrial strength sequential mesh generator, called Advancing Front Local Reconnection (AFLR), are presented. AFLR has been under development for the last 25 years at the NSF/ERC center at Mississippi State University. The parallel procedure that is presented is called Pseudo-constrained (PsC) Parallel Data Refinement (PDR) and consists of the following steps: (i) use an octree data-decomposition scheme to divide the original geometry into subdomains (octree leaves), (ii) refine each subdomain with the proper adjustments of its neighbors using the given refinement code, and (iii) combine all subdomain data into …
Secure Mobile Computing By Using Convolutional And Capsule Deep Neural Networks, Rui Ning
Secure Mobile Computing By Using Convolutional And Capsule Deep Neural Networks, Rui Ning
Electrical & Computer Engineering Theses & Dissertations
Mobile devices are becoming smarter to satisfy modern user's increasing needs better, which is achieved by equipping divers of sensors and integrating the most cutting-edge Deep Learning (DL) techniques. As a sophisticated system, it is often vulnerable to multiple attacks (side-channel attacks, neural backdoor, etc.). This dissertation proposes solutions to maintain the cyber-hygiene of the DL-Based smartphone system by exploring possible vulnerabilities and developing countermeasures.
First, I actively explore possible vulnerabilities on the DL-Based smartphone system to develop proactive defense mechanisms. I discover a new side-channel attack on smartphones using the unrestricted magnetic sensor data. I demonstrate that attackers can …
Virtual Satcom, Long Range Broadband Digital Communications, Dennis George Watson
Virtual Satcom, Long Range Broadband Digital Communications, Dennis George Watson
Electrical & Computer Engineering Theses & Dissertations
The current naval strategy is based on a distributed force, networked together with high-speed communications that enable operations as an intelligent, fast maneuvering force. Satellites, the existing network connector, are weak and vulnerable to attack. HF is an alternative, but it does not have the information throughput to meet the distributed warfighting need. The US Navy does not have a solution to reduce dependency on space-based communication systems while providing the warfighter with the required information speed.
Virtual SATCOM is a solution that can match satellite communications (SATCOM) data speed without the vulnerable satellite. It is wireless communication on a …
Longitudinal Brain Tumor Tracking, Tumor Grading, And Patient Survival Prediction Using Mri, Linmin Pei
Longitudinal Brain Tumor Tracking, Tumor Grading, And Patient Survival Prediction Using Mri, Linmin Pei
Electrical & Computer Engineering Theses & Dissertations
This work aims to develop novel methods for brain tumor classification, longitudinal brain tumor tracking, and patient survival prediction. Consequently, this dissertation proposes three tasks. First, we develop a framework for brain tumor segmentation prediction in longitudinal multimodal magnetic resonance imaging (mMRI) scans, comprising two methods: feature fusion and joint label fusion (JLF). The first method fuses stochastic multi-resolution texture features with tumor cell density features, in order to obtain tumor segmentation predictions in follow-up scans from a baseline pre-operative timepoint. The second method utilizes JLF to combine segmentation labels obtained from (i) the stochastic texture feature-based and Random Forest …
Topology Control, Scheduling, And Spectrum Sensing In 5g Networks, Prosanta Paul
Topology Control, Scheduling, And Spectrum Sensing In 5g Networks, Prosanta Paul
Electrical & Computer Engineering Theses & Dissertations
The proliferation of intelligent wireless devices is remarkable. To address phenomenal traffic growth, a key objective of next-generation wireless networks such as 5G is to provide significantly larger bandwidth. To this end, the millimeter wave (mmWave) band (20 GHz -300 GHz) has been identified as a promising candidate for 5G and WiFi networks to support user data rates of multi-gigabits per second. However, path loss at mmWave is significantly higher than today's cellular bands. Fortunately, this higher path loss can be compensated through the antenna beamforming technique-a transmitter focuses a signal towards a specific direction to achieve high signal gain …
Deep Cellular Recurrent Neural Architecture For Efficient Multidimensional Time-Series Data Processing, Lasitha S. Vidyaratne
Deep Cellular Recurrent Neural Architecture For Efficient Multidimensional Time-Series Data Processing, Lasitha S. Vidyaratne
Electrical & Computer Engineering Theses & Dissertations
Efficient processing of time series data is a fundamental yet challenging problem in pattern recognition. Though recent developments in machine learning and deep learning have enabled remarkable improvements in processing large scale datasets in many application domains, most are designed and regulated to handle inputs that are static in time. Many real-world data, such as in biomedical, surveillance and security, financial, manufacturing and engineering applications, are rarely static in time, and demand models able to recognize patterns in both space and time. Current machine learning (ML) and deep learning (DL) models adapted for time series processing tend to grow in …