Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Artificial Intelligence and Robotics (2)
- Computer Sciences (2)
- Physical Sciences and Mathematics (2)
- Social and Behavioral Sciences (2)
- Aerospace Engineering (1)
-
- Civil Engineering (1)
- Civil and Environmental Engineering (1)
- Computer Engineering (1)
- Electrical and Computer Engineering (1)
- Geography (1)
- Operational Research (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Public Affairs, Public Policy and Public Administration (1)
- Remote Sensing (1)
- Transportation (1)
Articles 1 - 4 of 4
Full-Text Articles in Engineering
Cyber Defense Remediation In Energy Delivery Systems, Kamrul Hasan
Cyber Defense Remediation In Energy Delivery Systems, Kamrul Hasan
Computational Modeling & Simulation Engineering Theses & Dissertations
The integration of Information Technology (IT) and Operational Technology (OT) in Cyber-Physical Systems (CPS) has resulted in increased efficiency and facilitated real-time information acquisition, processing, and decision making. However, the increase in automation technology and the use of the internet for connecting, remote controlling, and supervising systems and facilities has also increased the likelihood of cybersecurity threats that can impact safety of humans and property. There is a need to assess cybersecurity risks in the power grid, nuclear plants, chemical factories, etc. to gain insight into the likelihood of safety hazards. Quantitative cybersecurity risk assessment will lead to informed cyber …
Enhanced Traffic Incident Analysis With Advanced Machine Learning Algorithms, Zhenyu Wang
Enhanced Traffic Incident Analysis With Advanced Machine Learning Algorithms, Zhenyu Wang
Computational Modeling & Simulation Engineering Theses & Dissertations
Traffic incident analysis is a crucial task in traffic management centers (TMCs) that typically manage many highways with limited staff and resources. An effective automatic incident analysis approach that can report abnormal events timely and accurately will benefit TMCs in optimizing the use of limited incident response and management resources. During the past decades, significant efforts have been made by researchers towards the development of data-driven approaches for incident analysis. Nevertheless, many developed approaches have shown limited success in the field. This is largely attributed to the long detection time (i.e., waiting for overwhelmed upstream detection stations; meanwhile, downstream stations …
Deep Learning For Remote Sensing Image Processing, Yan Lu
Deep Learning For Remote Sensing Image Processing, Yan Lu
Computational Modeling & Simulation Engineering Theses & Dissertations
Remote sensing images have many applications such as ground object detection, environmental change monitoring, urban growth monitoring and natural disaster damage assessment. As of 2019, there were roughly 700 satellites listing “earth observation” as their primary application. Both spatial and temporal resolutions of satellite images have improved consistently in recent years and provided opportunities in resolving fine details on the Earth's surface. In the past decade, deep learning techniques have revolutionized many applications in the field of computer vision but have not fully been explored in remote sensing image processing. In this dissertation, several state-of-the-art deep learning models have been …
Validation Risk Across Hierarchical Models, John B. Young
Validation Risk Across Hierarchical Models, John B. Young
Computational Modeling & Simulation Engineering Theses & Dissertations
Modeling and simulation are applied in a great many methods across a variety of topics. Model developers and users alike have a professional duty to understand the complexities of the tools and methods they are used. Oftentimes, models that have been independently constructed and executed are used to inform one another for an analytic purpose and the compatibility of the models is not always addressed. In the literature, great attention has been paid to model validation. When using models constructively with one another, analysts must understand the bounds of model validity and ensure that the combination of models does not …