Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- #antcenter (28)
- Computer networks--Security measures (21)
- Computer security (13)
- Computer vision (10)
- Machine learning (10)
-
- Algorithms (9)
- Center_CCR (8)
- Cybersecurity (8)
- Aerial refueling (7)
- Software engineering (6)
- Virtual reality (6)
- Artificial intelligence (5)
- Image processing (5)
- Neural networks (Computer science) (5)
- Data protection (4)
- Drone aircraft--Control systems (4)
- Industrial control systems (4)
- Information warfare (4)
- Intelligent agents (Computer software) (4)
- Signal processing--Digital techniques (4)
- Synthetic aperture radar (4)
- Target acquisition (4)
- #afcec (3)
- Computer graphics (3)
- Computer networks (3)
- Computer simulation (3)
- Computerized simulation (3)
- Cryptography (3)
- Deep learning (3)
- Drone aircraft (3)
Articles 1 - 30 of 277
Full-Text Articles in Engineering
Hierarchical Federated Learning On Healthcare Data: An Application To Parkinson's Disease, Brandon J. Harvill
Hierarchical Federated Learning On Healthcare Data: An Application To Parkinson's Disease, Brandon J. Harvill
Theses and Dissertations
Federated learning (FL) is a budding machine learning (ML) technique that seeks to keep sensitive data private, while overcoming the difficulties of Big Data. Specifically, FL trains machine learning models over a distributed network of devices, while keeping the data local to each device. We apply FL to a Parkinson’s Disease (PD) telemonitoring dataset where physiological data is gathered from various modalities to determine the PD severity level in patients. We seek to optimally combine the information across multiple modalities to assess the accuracy of our FL approach, and compare to traditional ”centralized” statistical and deep learning models.
Simulation And Analysis Of Dynamic Threat Avoidance Routing In An Anti-Access Area Denial (A2ad) Environment, Dante C. Reid
Simulation And Analysis Of Dynamic Threat Avoidance Routing In An Anti-Access Area Denial (A2ad) Environment, Dante C. Reid
Theses and Dissertations
This research modeled and analyzed the effectiveness of different routing algorithms for penetration assets in an A2AD environment. AFSIM was used with different configurations of SAMs locations and numbers to compare the performance of AFSIM’s internal zone and shrink algorithm routers with a Dijkstra algorithm router. Route performance was analyzed through computational and operational metrics, including computational complexity, run-time, mission survivability, and simulation duration. This research also analyzed the impact of the penetration asset’s ingress altitude on those factors. Additionally, an excursion was conducted to analyze the Dijkstra algorithm router’s grid density holding altitude constant to understand its impact on …
The Electromagnetic Bayonet: Development Of A Scientific Computing Method For Aperture Antenna Optimization, Michael P. Ingold
The Electromagnetic Bayonet: Development Of A Scientific Computing Method For Aperture Antenna Optimization, Michael P. Ingold
Theses and Dissertations
The quiet zone of a radar range is the region over which a transmitted EM field approximates a uniform plane wave to within some finite error tolerance. Any target to be measured must physically fit within this quiet zone to prevent excess measurement error. Compact radar ranges offer significant operational advantages for performing RCS measurements but their quiet zone sizes are constrained by space limitations. In this work, a scientific computing approach is used to investigate whether equivalent-current transmitters can be designed that generate larger quiet zones than a conventional version at short range. A time-domain near-field solver, JefimenkoModels, was …
Fast And Accurate 3d Object Reconstruction For Cargo Load Planning, Adam R. Nasi
Fast And Accurate 3d Object Reconstruction For Cargo Load Planning, Adam R. Nasi
Theses and Dissertations
Cargo load planning involves efficiently packing objects into aircraft subject to constraints such as space and weight distribution. Currently, this is performed manually by loadmasters. The United States Air Force is investigating ways to automate this process in order to improve airlift operational readiness while saving money. The first step in such a process would be generating 3D reconstructions of cargo objects to be used by a load planning algorithm. To that end, this thesis presents a novel method for fast, scaled, and accurate 3D reconstruction of cargo objects. This method can scan a 2.5m×3m×2m object in less than 10 …
Using Embedded Systems And Augmented Reality For Automated Aerial Refueling, Nathaniel A. Wilson
Using Embedded Systems And Augmented Reality For Automated Aerial Refueling, Nathaniel A. Wilson
Theses and Dissertations
The goal of automated aerial refueling (AAR) is to extend the range of unmanned aircraft. Control latency prevents a human from remotely controlling the receiving aircraft as it approaches a tanker. To conform with the size, weight, and power constraints of a small unmanned aircraft, an AAR system must execute in real-time on an embedded platform. This thesis explores the timing and computational performance of a NVIDIA Jetson AGX Orin to a state-of-the-art general-purpose computer using existing AAR algorithms. It also constructs an augmented reality framework as an intermediate step for testing vision-based AAR algorithms between virtual testing and expensive …
Bayesian Recurrent Neural Networks For Real Time Object Detection, Stephen Z. Kimatian
Bayesian Recurrent Neural Networks For Real Time Object Detection, Stephen Z. Kimatian
Theses and Dissertations
Neural networks have become increasingly popular in real time object detection algorithms. A major concern with these algorithms is their ability to quantify their own uncertainty, leading to many high profile failures. This research proposes three novel real time detection algorithms. The first of leveraging Bayesian convolutional neural layers producing a predictive distribution, the second leveraging predictions from previous frames, and the third model combining these two techniques together. These augmentations seek to mitigate the calibration problem of modern detection algorithms. These three models are compared to the state of the art YOLO architecture; with the strongest contending model achieving …
Air Force Cadet To Career Field Matching Problem, Ian P. Macdonald
Air Force Cadet To Career Field Matching Problem, Ian P. Macdonald
Theses and Dissertations
This research examines the Cadet to Air Force Specialty Code (AFSC) Matching Problem (CAMP). Currently, the matching problem occurs annually at the Air Force Personnel Center (AFPC) using an integer program and value focused thinking approach. This paper presents a novel method to match cadets with AFSCs using a generalized structure of the Hospitals Residents problem with special emphasis on lower quotas. This paper also examines the United States Army Matching problem and compares it to the techniques and constraints applied to solve the CAMP. The research culminates in the presentation of three algorithms created to solve the CAMP and …
Analysis And Optimization Of Contract Data Schema, Franklin Sun
Analysis And Optimization Of Contract Data Schema, Franklin Sun
Theses and Dissertations
agement, development, and growth of U.S Air Force assets demand extensive organizational communication and structuring. These interactions yield substantial amounts of contracting and administrative information. Over 4 million such contracts as a means towards obtaining valuable insights on Department of Defense resource usage. This set of contracting data is largely not optimized for backend service in an analytics environment. To this end, the following research evaluates the efficiency and performance of various data structuring methods. Evaluated designs include a baseline unstructured schema, a Data Mart schema, and a snowflake schema. Overall design success metrics include ease of use by end …
Predicting Success Of Pilot Training Candidates Using Interpretable Machine Learning, Alexandra S. King
Predicting Success Of Pilot Training Candidates Using Interpretable Machine Learning, Alexandra S. King
Theses and Dissertations
The United States Air Force (USAF) has struggled with a sustained pilot shortage over the past several years; senior military and government leaders have been working towards a solution to the problem, with no noticeable improvements. Both attrition of more experienced pilots as well as wash out rates within pilot training contribute to this issue. This research focuses on pilot training attrition. Improving the process for selecting pilot candidates can reduce the number of candidates who fail. This research uses historical specialized undergraduate pilot training (SUPT) data and leverages select machine learning techniques to determine which factors are associated with …
Automated Registration Of Titanium Metal Imaging Of Aircraft Components Using Deep Learning Techniques, Nathan A. Johnston
Automated Registration Of Titanium Metal Imaging Of Aircraft Components Using Deep Learning Techniques, Nathan A. Johnston
Theses and Dissertations
Studies have shown a connection between early catastrophic engine failures with microtexture regions (MTRs) of a specific size and orientation on the titanium metal engine components. The MTRs can be identified through the use of Electron Backscatter Diffraction (EBSD) however doing so is costly and requires destruction of the metal component being tested. A new methodology of characterizing MTRs is needed to properly evaluate the reliability of engine components on live aircraft. The Air Force Research Lab Materials Directorate (AFRL/RX) proposed a solution of supplementing EBSD with two non-destructive modalities, Eddy Current Testing (ECT) and Scanning Acoustic Microscopy (SAM). Doing …
Analyzing Microarchitectural Residue In Various Privilege Strata To Identify Computing Tasks, Tor J. Langehaug
Analyzing Microarchitectural Residue In Various Privilege Strata To Identify Computing Tasks, Tor J. Langehaug
Theses and Dissertations
Modern multi-tasking computer systems run numerous applications simultaneously. These applications must share hardware resources including the Central Processing Unit (CPU) and memory while maximizing each application’s performance. Tasks executing in this shared environment leave residue which should not reveal information. This dissertation applies machine learning and statistical analysis to evaluate task residue as footprints which can be correlated to identify tasks. The concept of privilege strata, drawn from an analogy with physical geology, organizes the investigation into the User, Operating System, and Hardware privilege strata. In the User Stratum, an adversary perspective is taken to build an interrogator program that …
Development Of A Security-Focused Multi-Channel Communication Protocol And Associated Quality Of Secure Service (Qoss) Metrics, Paul M. Simon
Development Of A Security-Focused Multi-Channel Communication Protocol And Associated Quality Of Secure Service (Qoss) Metrics, Paul M. Simon
Theses and Dissertations
The threat of eavesdropping, and the challenge of recognizing and correcting for corrupted or suppressed information in communication systems is a consistent challenge. Effectively managing protection mechanisms requires an ability to accurately gauge the likelihood or severity of a threat, and adapt the security features available in a system to mitigate the threat. This research focuses on the design and development of a security-focused communication protocol at the session-layer based on a re-prioritized communication architecture model and associated metrics. From a probabilistic model that considers data leakage and data corruption as surrogates for breaches of confidentiality and integrity, a set …
The Impact Of Visual Feedback And Control Configuration On Pilot-Aircraft Interface Using Head Tracking Technology, Christopher M. Arnold
The Impact Of Visual Feedback And Control Configuration On Pilot-Aircraft Interface Using Head Tracking Technology, Christopher M. Arnold
Theses and Dissertations
Traditional control mechanisms restrict human input on the displays in 5th generation aircraft. This research explored methods for enhancing pilot interaction with large, information dense cockpit displays; specifically, the effects of visual feedback and control button configuration when augmenting cursor control with head tracking technology. Previous studies demonstrated that head tracking can be combined with traditional cursor control to decrease selection times but can increase pilot mental and physical workload. A human subject experiment was performed to evaluate two control button configurations and three visual feedback conditions. A Fitts Law analysis was performed to create predictive models of selection time …
Exploiting The Iot Through Network-Based Covert Channels, Kyle S. Harris
Exploiting The Iot Through Network-Based Covert Channels, Kyle S. Harris
Theses and Dissertations
Information leaks are a top concern to industry and government leaders. The IoT is a technology capable of sensing real-world events. A method for exfiltrating data from these devices is by covert channel. This research designs a novel IoT CTC without the need for inter-packet delays to encode data. Instead, it encodes data within preexisting network information, namely ports or addresses. Additionally, the CTC can be implemented in two different modes: Stealth and Bandwidth. Performance is measured using throughput and detectability. The Stealth methods mimic legitimate traffic captures while the Bandwidth methods forgo this approach for maximum throughput. Detection results …
Application Of Machine Learning Models With Numerical Simulations Of An Experimental Microwave Induced Plasma Gasification Reactor, Owen D. Sedej
Application Of Machine Learning Models With Numerical Simulations Of An Experimental Microwave Induced Plasma Gasification Reactor, Owen D. Sedej
Theses and Dissertations
This thesis aims to contribute to the future development of this technology by providing an in-depth literature review of how this technology physically operates and can be numerically modeled. Additionally, this thesis reviews literature of machine learning models that have been applied to gasification to make accurate predictions regarding the system. Finally, this thesis provides a framework of how to numerically model an experimental plasma gasification reactor in order to inform a variety of machine learning models.
Applying Models Of Circadian Stimulus To Explore Ideal Lighting Configurations, Alexander J. Price
Applying Models Of Circadian Stimulus To Explore Ideal Lighting Configurations, Alexander J. Price
Theses and Dissertations
Increased levels of time are spent indoors, decreasing human interaction with nature and degrading photoentrainment, the synchronization of circadian rhythms with daylight variation. Military imagery analysts, among other professionals, are required to work in low light level environments to limit power consumption or increase contrast on display screens to improve detail detection. Insufficient exposure to light in these environments results in inadequate photoentrainment which is associated with degraded alertness and negative health effects. Recent research has shown that both the illuminance (i.e., perceived intensity) and wavelength of light affect photoentrainment. Simultaneously, modern lighting technologies have improved our ability to construct …
Real Time Evaluation Of Boom And Drogue Occlusion With Aar, Xiaoyang Wu
Real Time Evaluation Of Boom And Drogue Occlusion With Aar, Xiaoyang Wu
Theses and Dissertations
In recent years, Unmanned Aerial Vehicles (UAV) have seen a rise in popularity. Various navigational algorithms have been developed as a solution to estimate a UAV’s pose relative to the refueler aircraft. The result can be used to safely automate aerial refueling (AAR) to improve UAVs’ time-on-station and ensure the success of military operations. This research aims to reach real-time performance using a GPU accelerated approach. It also conducts various experiments to quantify the effects of refueling boom/drogue occlusion and image exposure on the pose estimation pipeline in a lab setting.
Coupled Orbit-Attitude Dynamics And Control Of A Cubesat Equipped With A Robotic Manipulator, Charles M. Carr
Coupled Orbit-Attitude Dynamics And Control Of A Cubesat Equipped With A Robotic Manipulator, Charles M. Carr
Theses and Dissertations
This research investigates the utility and expected performance of a robotic servicing CubeSat. The coupled orbit-attitude dynamics of a 6U CubeSat equipped with a four-link serial manipulator are derived. A proportional-integral-derivative controller is implemented to guide the robot through a series of orbital scenarios, including rendezvous and docking following ejection from a chief spacecraft, repositioning the end effector to a desired location, and tracing a desired path with the end effector. Various techniques involving path planning and inverse differential kinematics are leveraged. Simulation results are presented and performance metrics such as settling time, state errors, control use, and system robustness …
Monocular Pose Estimation For Automated Aerial Refueling Via Perspective-N-Point, James C. Lynch
Monocular Pose Estimation For Automated Aerial Refueling Via Perspective-N-Point, James C. Lynch
Theses and Dissertations
Any Automated Aerial Refueling (AAR) solution requires the quick and precise estimation of the relative position and rotation of the two aircraft involved. This is currently accomplished using stereo vision techniques augmented by Iterative Closest Point (ICP), but requires post-processing to account for environmental factors such as boom occlusion. This paper proposes a monocular solution, combining a custom-trained single-shot object detection Convolutional Neural Network (CNN) and Perspective-n-Point (PnP) estimation to calculate a pose estimate with a single image. This solution is capable of pose estimation at contact point (22m) within 7cm of error and a rate of 10Hz, regardless of …
Securing Infiniband Networks With End-Point Encryption, Noah B. Diamond
Securing Infiniband Networks With End-Point Encryption, Noah B. Diamond
Theses and Dissertations
The NVIDIA-Mellanox Bluefield-2 is a 100 Gbps high-performance network interface which offers hardware offload and acceleration features that can operate directly on network traffic without routine involvement from the ARM CPU. This allows the ARM multi-core CPU to orchestrate the hardware to perform operations on both Ethernet and RDMA traffic at high rates rather than processing all the traffic directly. A testbed called TNAP was created for performance testing and a MiTM verification process called MiTMVMP is used to ensure proper network configuration. The hardware accelerators of the Bluefield-2 support a throughput of nearly 86 Gbps when using IPsec to …
Malware Detection Using Electromagnetic Side-Channel Analysis, Matthew A. Bergstedt
Malware Detection Using Electromagnetic Side-Channel Analysis, Matthew A. Bergstedt
Theses and Dissertations
Many physical systems control or monitor important applications without the capacity to monitor for malware using on-device resources. Thus, it becomes valuable to explore malware detection methods for these systems utilizing external or off-device resources. This research investigates the viability of employing EM SCA to determine whether a performed operation is normal or malicious. A Raspberry Pi 3 was set up as a simulated motor controller with code paths for a normal or malicious operation. While the normal path only calculated the motor speed before updating the motor, the malicious path added a line of code to modify the calculated …
Approximate Dynamic Programming For An Unmanned Aerial Vehicle Routing Problem With Obstacles And Stochastic Target Arrivals, Kassie M. Gurnell
Approximate Dynamic Programming For An Unmanned Aerial Vehicle Routing Problem With Obstacles And Stochastic Target Arrivals, Kassie M. Gurnell
Theses and Dissertations
The United States Air Force is investing in artificial intelligence (AI) to speed analysis in efforts to modernize the use of autonomous unmanned combat aerial vehicles (AUCAVs) in strike coordination and reconnaissance (SCAR) missions. This research examines an AUCAVs ability to execute target strikes and provide reconnaissance in a SCAR mission. An orienteering problem is formulated as anMarkov decision process (MDP) model wherein a single AUCAV must optimize its target route to aid in eliminating time-sensitive targets and collect imagery of requested named areas of interest while evading surface-to-air missile (SAM) battery threats imposed as obstacles. The AUCAV adjusts its …
Bayesian Convolutional Neural Network With Prediction Smoothing And Adversarial Class Thresholds, Noah M. Miller
Bayesian Convolutional Neural Network With Prediction Smoothing And Adversarial Class Thresholds, Noah M. Miller
Theses and Dissertations
Using convolutional neural networks (CNNs) for image classification for each frame in a video is a very common technique. Unfortunately, CNNs are very brittle and have a tendency to be over confident in their predictions. This can lead to what we will refer to as “flickering,” which is when the predictions between frames jump back and forth between classes. In this paper, new methods are proposed to combat these shortcomings. This paper utilizes a Bayesian CNN which allows for a distribution of outputs on each data point instead of just a point estimate. These distributions are then smoothed over multiple …
Team Air Combat Using Model-Based Reinforcement Learning, David A. Mottice
Team Air Combat Using Model-Based Reinforcement Learning, David A. Mottice
Theses and Dissertations
We formulate the first generalized air combat maneuvering problem (ACMP), called the MvN ACMP, wherein M friendly AUCAVs engage against N enemy AUCAVs, developing a Markov decision process (MDP) model to control the team of M Blue AUCAVs. The MDP model leverages a 5-degree-of-freedom aircraft state transition model and formulates a directed energy weapon capability. Instead, a model-based reinforcement learning approach is adopted wherein an approximate policy iteration algorithmic strategy is implemented to attain high-quality approximate policies relative to a high performing benchmark policy. The ADP algorithm utilizes a multi-layer neural network for the value function approximation regression mechanism. One-versus-one …
Identifying Characteristics For Success Of Robotic Process Automations, Charles M. Unkrich
Identifying Characteristics For Success Of Robotic Process Automations, Charles M. Unkrich
Theses and Dissertations
In the pursuit of digital transformation, the Air Force creates digital airmen. Digital airmen are robotic process automations designed to eliminate the repetitive high-volume low-cognitive tasks that absorb so much of our Airmen's time. The automation product results in more time to focus on tasks that machines cannot sufficiently perform data analytics and improving the Air Force's informed decision-making. This research investigates the assessment of potential automation cases to ensure that we choose viable tasks for automation and applies multivariate analysis to determine which factors indicate successful projects. The data is insufficient to provide significant insights.
A Thematic And Reference Analysis Of Touchless Technologies, Eric R. Curia
A Thematic And Reference Analysis Of Touchless Technologies, Eric R. Curia
Theses and Dissertations
The purpose of this research is to explore the utility and current state of touchless technologies. Five categories of technologies are identified as a result of collecting and reviewing literature: facial/biometric recognition, gesture recognition, touchless sensing, personal devices, and voice recognition. A thematic analysis was conducted to evaluate the advantages and disadvantages of the five categories. A reference analysis was also conducted to determine the similarities between articles in each category. Touchless sensing showed to have the most advantages and least similar references. Gesture recognition was the opposite. Comparing analyses shows more reliable technology types are more beneficial and diverse.
Double Cone Flow Field Reconstruction Between Mach 4 And 12 Using Machine Learning Techniques, Trevor A. Toros
Double Cone Flow Field Reconstruction Between Mach 4 And 12 Using Machine Learning Techniques, Trevor A. Toros
Theses and Dissertations
No abstract provided.
Analysis Of Generalized Artificial Intelligence Potential Through Reinforcement And Deep Reinforcement Learning Approaches, Jonathan Turner
Analysis Of Generalized Artificial Intelligence Potential Through Reinforcement And Deep Reinforcement Learning Approaches, Jonathan Turner
Theses and Dissertations
Artificial Intelligence is the next competitive domain; the first nation to develop human level artificial intelligence will have an impact similar to the development of the atomic bomb. To maintain the security of the United States and her people, the Department of Defense has funded research into the development of artificial intelligence and its applications. This research uses reinforcement learning and deep reinforcement learning methods as proxies for current and future artificial intelligence agents and to assess potential issues in development. Agent performance were compared across two games and one excursion: Cargo Loading, Tower of Hanoi, and Knapsack Problem, respectively. …
The Application Of Virtual Reality In Firefighting Training, Dylan A. Gagnon
The Application Of Virtual Reality In Firefighting Training, Dylan A. Gagnon
Theses and Dissertations
Immersive simulations such as virtual reality is becoming more prevalent for use in training environments for many professions. United States Air Force firefighters may benefit from incorporating VR technology into their training program to increase organizational commitment, job satisfaction, self-efficacy, and job performance. With implementing a new training platform, it is also important to understand the relationship between these variables and the perceived benefits and efficacy of the VR training, which has not yet been studied in previous research. This study addresses this issue by gathering data from fire departments currently fielding a VR fire training platform.
Enterprise Resource Allocation For Intruder Detection And Interception, Adam B. Haywood
Enterprise Resource Allocation For Intruder Detection And Interception, Adam B. Haywood
Theses and Dissertations
This research considers the problem of an intruder attempting to traverse a defender's territory in which the defender locates and employs disparate sets of resources to lower the probability of a successful intrusion. The research is conducted in the form of three related research components. The first component examines the problem in which the defender subdivides their territory into spatial stages and knows the plan of intrusion. Alternative resource-probability modeling techniques as well as variable bounding techniques are examined to improve the convergence of global solvers for this nonlinear, nonconvex optimization problem. The second component studies a similar problem but …