Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Computer networks--Security measures (2)
- Data protection (2)
- #antcenter (1)
- Airplanes--Refueling (1)
- Algorithms (1)
-
- Employee theft--Prevention (1)
- Feature extraction (1)
- Global Positioning System (1)
- Hackers (1)
- Human behavior (1)
- Image classification (1)
- Image processing--Mathematical models (1)
- Imaging systems (1)
- Kinematics (1)
- Linear programming (1)
- Multisensor data fusion (1)
- Neural networks (Computer science) (1)
- Risk assessment (1)
- Risk management (1)
- Rotors (Helicopters)--Vibration (1)
- Sensor networks--Access control (1)
- Steganalysis (1)
- Synthetic aperture radar (1)
- Target acquisition (1)
- Wireless LANs (1)
- Wireless communication systems (1)
- Publication
- Publication Type
Articles 1 - 8 of 8
Full-Text Articles in Engineering
Development And Testing Of A High-Speed Real-Time Kinematic Precise Dgps Positioning System Between Two Aircraft, Christopher J. Spinelli
Development And Testing Of A High-Speed Real-Time Kinematic Precise Dgps Positioning System Between Two Aircraft, Christopher J. Spinelli
Theses and Dissertations
This research involves the design, implementation, and testing of a high-speed, real-time kinematic, precise differential GPS positioning system for use in airborne applications such as automated aerial-refueling and close formation flying. Although many of the current ambiguity resolution techniques use the residuals from the least squares position estimation to determine the true ambiguity set, this thesis presents a novel approach to the ambiguity resolution problem, called the minimum indicator. Instead of assuming the ambiguity set with the lowest residuals is the true set, other special characteristics of the residuals are examined. This increases the confidence that the algorithm has selected …
Mitigating Insider Threat Using Human Behavior Influence Models, Anthony J. Puleo
Mitigating Insider Threat Using Human Behavior Influence Models, Anthony J. Puleo
Theses and Dissertations
Insider threat is rapidly becoming the largest information security problem that organizations face. With large numbers of personnel having access to internal systems, it is becoming increasingly difficult to protect organizations from malicious insiders. The typical methods of mitigating insider threat are simply not working, primarily because this threat is a people problem, and most mitigation strategies are geared towards profiling and anomaly detection, which are problematic at best. As a result, a new type of model is proposed in this thesis, one that incorporates risk management with human behavioral science. The new risk-based model focuses on observable influences that …
Multiple Masks-Based Pixel Comparison Steganalysis Method For Mobile Imaging, Sos S. Agaian, Gilbert L. Peterson, Benjamin M. Rodriguez
Multiple Masks-Based Pixel Comparison Steganalysis Method For Mobile Imaging, Sos S. Agaian, Gilbert L. Peterson, Benjamin M. Rodriguez
Faculty Publications
No abstract provided.
Formal Mitigation Strategies For The Insider Threat: A Security Model And Risk Analysis Framework, Jonathan W. Butts
Formal Mitigation Strategies For The Insider Threat: A Security Model And Risk Analysis Framework, Jonathan W. Butts
Theses and Dissertations
The advancement of technology and reliance on information systems have fostered an environment of sharing and trust. The rapid growth and dependence on these systems, however, creates an increased risk associated with the insider threat. The insider threat is one of the most challenging problems facing the security of information systems because the insider already has capabilities within the system. Despite research efforts to prevent and detect insiders, organizations remain susceptible to this threat because of inadequate security policies and a willingness of some individuals to betray their organization. To investigate these issues, a formal security model and risk analysis …
An Adaptable Energy-Efficient Medium Access Control Protocol For Wireless Sensor Networks, Justin T. Kautz
An Adaptable Energy-Efficient Medium Access Control Protocol For Wireless Sensor Networks, Justin T. Kautz
Theses and Dissertations
Wireless networks have become ubiquitous recently and therefore their usefulness has also become more extensive. Wireless sensor networks (WSN) detect environmental information with sensors in remote settings. One problem facing WSNs is the inability to resupply power to these energy-constrained devices due to their remoteness. Therefore to extend a WSN's effectiveness, the lifetime of the network must be increased by making them as energy efficient as possible. An energy efficient medium access control (MAC) can boost a WSN's lifetime. This research creates a MAC protocol called Adaptive sensor Medium Access Control (AMAC) which is based on Sensor Medium Access Control …
Multiframe Shift Estimation, Stephen A. Bruckart
Multiframe Shift Estimation, Stephen A. Bruckart
Theses and Dissertations
The purpose of this research was to develop a fundamental framework for a new approach to multiframe translational shift estimation in image processing. This thesis sought to create a new multiframe shift estimator, to theoretically prove and experimentally test key properties of it, and to quantify its performance according to several metrics. The new estimator was modeled successfully and was proven to be an unbiased estimator under certain common image noise conditions. Furthermore its performance was shown to be superior to the cross correlation shift estimator, a robust estimator widely used in similar image processing cases, according to several criteria. …
Verification Of A Decision Level Fusion Algorithm Using A Proven Atr System And Measured Sar Data, James Douglas Thompson
Verification Of A Decision Level Fusion Algorithm Using A Proven Atr System And Measured Sar Data, James Douglas Thompson
Theses and Dissertations
Decision level fusion (DLF) algorithms combine outputs of multiple single sensors to make one confident declaration of a target. This research compares performance results of a DLF algorithm using measured data and a proven ATR system with results from simulated data and a modeled ATR system. This comparison indicates that DLF offers significant performance improvements over single sensor looks. However, results based on simulated data and a modeled ATR are slightly optimistic and overestimate results from measured data and a proven ATR system by nearly 10% over all targets tested.
A Comparison Of Main Rotor Smoothing Adjustments Using Linear And Neural Network Algorithms, Nathan A. Miller
A Comparison Of Main Rotor Smoothing Adjustments Using Linear And Neural Network Algorithms, Nathan A. Miller
Theses and Dissertations
Helicopter main rotor smoothing is a maintenance procedure that is routinely performed to minimize airframe vibrations induced by non-uniform mass and/or aerodynamic distributions in the main rotor system. This important task is both time consuming and expensive, so improvements to the process have long been sought. Traditionally, vibrations have been minimized by calculating adjustments based on an assumed linear relationship between adjustments and vibration response. In recent years, artificial neural networks have been trained to recognize non-linear mappings between adjustments and vibration response. This research was conducted in order observe the character of the adjustment mapping of the Vibration Management …