Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 262

Full-Text Articles in Engineering

Development Of A Security-Focused Multi-Channel Communication Protocol And Associated Quality Of Secure Service (Qoss) Metrics, Paul M. Simon Sep 2022

Development Of A Security-Focused Multi-Channel Communication Protocol And Associated Quality Of Secure Service (Qoss) Metrics, Paul M. Simon

Theses and Dissertations

The threat of eavesdropping, and the challenge of recognizing and correcting for corrupted or suppressed information in communication systems is a consistent challenge. Effectively managing protection mechanisms requires an ability to accurately gauge the likelihood or severity of a threat, and adapt the security features available in a system to mitigate the threat. This research focuses on the design and development of a security-focused communication protocol at the session-layer based on a re-prioritized communication architecture model and associated metrics. From a probabilistic model that considers data leakage and data corruption as surrogates for breaches of confidentiality and integrity, a set …


Exploiting The Iot Through Network-Based Covert Channels, Kyle S. Harris Mar 2022

Exploiting The Iot Through Network-Based Covert Channels, Kyle S. Harris

Theses and Dissertations

Information leaks are a top concern to industry and government leaders. The IoT is a technology capable of sensing real-world events. A method for exfiltrating data from these devices is by covert channel. This research designs a novel IoT CTC without the need for inter-packet delays to encode data. Instead, it encodes data within preexisting network information, namely ports or addresses. Additionally, the CTC can be implemented in two different modes: Stealth and Bandwidth. Performance is measured using throughput and detectability. The Stealth methods mimic legitimate traffic captures while the Bandwidth methods forgo this approach for maximum throughput. Detection results …


Identifying Characteristics For Success Of Robotic Process Automations, Charles M. Unkrich Mar 2022

Identifying Characteristics For Success Of Robotic Process Automations, Charles M. Unkrich

Theses and Dissertations

In the pursuit of digital transformation, the Air Force creates digital airmen. Digital airmen are robotic process automations designed to eliminate the repetitive high-volume low-cognitive tasks that absorb so much of our Airmen's time. The automation product results in more time to focus on tasks that machines cannot sufficiently perform data analytics and improving the Air Force's informed decision-making. This research investigates the assessment of potential automation cases to ensure that we choose viable tasks for automation and applies multivariate analysis to determine which factors indicate successful projects. The data is insufficient to provide significant insights.


Applying Models Of Circadian Stimulus To Explore Ideal Lighting Configurations, Alexander J. Price Mar 2022

Applying Models Of Circadian Stimulus To Explore Ideal Lighting Configurations, Alexander J. Price

Theses and Dissertations

Increased levels of time are spent indoors, decreasing human interaction with nature and degrading photoentrainment, the synchronization of circadian rhythms with daylight variation. Military imagery analysts, among other professionals, are required to work in low light level environments to limit power consumption or increase contrast on display screens to improve detail detection. Insufficient exposure to light in these environments results in inadequate photoentrainment which is associated with degraded alertness and negative health effects. Recent research has shown that both the illuminance (i.e., perceived intensity) and wavelength of light affect photoentrainment. Simultaneously, modern lighting technologies have improved our ability to construct …


Analysis Of Generalized Artificial Intelligence Potential Through Reinforcement And Deep Reinforcement Learning Approaches, Jonathan Turner Mar 2022

Analysis Of Generalized Artificial Intelligence Potential Through Reinforcement And Deep Reinforcement Learning Approaches, Jonathan Turner

Theses and Dissertations

Artificial Intelligence is the next competitive domain; the first nation to develop human level artificial intelligence will have an impact similar to the development of the atomic bomb. To maintain the security of the United States and her people, the Department of Defense has funded research into the development of artificial intelligence and its applications. This research uses reinforcement learning and deep reinforcement learning methods as proxies for current and future artificial intelligence agents and to assess potential issues in development. Agent performance were compared across two games and one excursion: Cargo Loading, Tower of Hanoi, and Knapsack Problem, respectively. …


Malware Detection Using Electromagnetic Side-Channel Analysis, Matthew A. Bergstedt Mar 2022

Malware Detection Using Electromagnetic Side-Channel Analysis, Matthew A. Bergstedt

Theses and Dissertations

Many physical systems control or monitor important applications without the capacity to monitor for malware using on-device resources. Thus, it becomes valuable to explore malware detection methods for these systems utilizing external or off-device resources. This research investigates the viability of employing EM SCA to determine whether a performed operation is normal or malicious. A Raspberry Pi 3 was set up as a simulated motor controller with code paths for a normal or malicious operation. While the normal path only calculated the motor speed before updating the motor, the malicious path added a line of code to modify the calculated …


Approximate Dynamic Programming For An Unmanned Aerial Vehicle Routing Problem With Obstacles And Stochastic Target Arrivals, Kassie M. Gurnell Mar 2022

Approximate Dynamic Programming For An Unmanned Aerial Vehicle Routing Problem With Obstacles And Stochastic Target Arrivals, Kassie M. Gurnell

Theses and Dissertations

The United States Air Force is investing in artificial intelligence (AI) to speed analysis in efforts to modernize the use of autonomous unmanned combat aerial vehicles (AUCAVs) in strike coordination and reconnaissance (SCAR) missions. This research examines an AUCAVs ability to execute target strikes and provide reconnaissance in a SCAR mission. An orienteering problem is formulated as anMarkov decision process (MDP) model wherein a single AUCAV must optimize its target route to aid in eliminating time-sensitive targets and collect imagery of requested named areas of interest while evading surface-to-air missile (SAM) battery threats imposed as obstacles. The AUCAV adjusts its …


Team Air Combat Using Model-Based Reinforcement Learning, David A. Mottice Mar 2022

Team Air Combat Using Model-Based Reinforcement Learning, David A. Mottice

Theses and Dissertations

We formulate the first generalized air combat maneuvering problem (ACMP), called the MvN ACMP, wherein M friendly AUCAVs engage against N enemy AUCAVs, developing a Markov decision process (MDP) model to control the team of M Blue AUCAVs. The MDP model leverages a 5-degree-of-freedom aircraft state transition model and formulates a directed energy weapon capability. Instead, a model-based reinforcement learning approach is adopted wherein an approximate policy iteration algorithmic strategy is implemented to attain high-quality approximate policies relative to a high performing benchmark policy. The ADP algorithm utilizes a multi-layer neural network for the value function approximation regression mechanism. One-versus-one …


The Impact Of Visual Feedback And Control Configuration On Pilot-Aircraft Interface Using Head Tracking Technology, Christopher M. Arnold Mar 2022

The Impact Of Visual Feedback And Control Configuration On Pilot-Aircraft Interface Using Head Tracking Technology, Christopher M. Arnold

Theses and Dissertations

Traditional control mechanisms restrict human input on the displays in 5th generation aircraft. This research explored methods for enhancing pilot interaction with large, information dense cockpit displays; specifically, the effects of visual feedback and control button configuration when augmenting cursor control with head tracking technology. Previous studies demonstrated that head tracking can be combined with traditional cursor control to decrease selection times but can increase pilot mental and physical workload. A human subject experiment was performed to evaluate two control button configurations and three visual feedback conditions. A Fitts Law analysis was performed to create predictive models of selection time …


The Application Of Virtual Reality In Firefighting Training, Dylan A. Gagnon Mar 2022

The Application Of Virtual Reality In Firefighting Training, Dylan A. Gagnon

Theses and Dissertations

Immersive simulations such as virtual reality is becoming more prevalent for use in training environments for many professions. United States Air Force firefighters may benefit from incorporating VR technology into their training program to increase organizational commitment, job satisfaction, self-efficacy, and job performance. With implementing a new training platform, it is also important to understand the relationship between these variables and the perceived benefits and efficacy of the VR training, which has not yet been studied in previous research. This study addresses this issue by gathering data from fire departments currently fielding a VR fire training platform.


Bayesian Convolutional Neural Network With Prediction Smoothing And Adversarial Class Thresholds, Noah M. Miller Mar 2022

Bayesian Convolutional Neural Network With Prediction Smoothing And Adversarial Class Thresholds, Noah M. Miller

Theses and Dissertations

Using convolutional neural networks (CNNs) for image classification for each frame in a video is a very common technique. Unfortunately, CNNs are very brittle and have a tendency to be over confident in their predictions. This can lead to what we will refer to as “flickering,” which is when the predictions between frames jump back and forth between classes. In this paper, new methods are proposed to combat these shortcomings. This paper utilizes a Bayesian CNN which allows for a distribution of outputs on each data point instead of just a point estimate. These distributions are then smoothed over multiple …


A Thematic And Reference Analysis Of Touchless Technologies, Eric R. Curia Mar 2022

A Thematic And Reference Analysis Of Touchless Technologies, Eric R. Curia

Theses and Dissertations

The purpose of this research is to explore the utility and current state of touchless technologies. Five categories of technologies are identified as a result of collecting and reviewing literature: facial/biometric recognition, gesture recognition, touchless sensing, personal devices, and voice recognition. A thematic analysis was conducted to evaluate the advantages and disadvantages of the five categories. A reference analysis was also conducted to determine the similarities between articles in each category. Touchless sensing showed to have the most advantages and least similar references. Gesture recognition was the opposite. Comparing analyses shows more reliable technology types are more beneficial and diverse.


Application Of Machine Learning Models With Numerical Simulations Of An Experimental Microwave Induced Plasma Gasification Reactor, Owen D. Sedej Mar 2022

Application Of Machine Learning Models With Numerical Simulations Of An Experimental Microwave Induced Plasma Gasification Reactor, Owen D. Sedej

Theses and Dissertations

This thesis aims to contribute to the future development of this technology by providing an in-depth literature review of how this technology physically operates and can be numerically modeled. Additionally, this thesis reviews literature of machine learning models that have been applied to gasification to make accurate predictions regarding the system. Finally, this thesis provides a framework of how to numerically model an experimental plasma gasification reactor in order to inform a variety of machine learning models.


Double Cone Flow Field Reconstruction Between Mach 4 And 12 Using Machine Learning Techniques, Trevor A. Toros Mar 2022

Double Cone Flow Field Reconstruction Between Mach 4 And 12 Using Machine Learning Techniques, Trevor A. Toros

Theses and Dissertations

No abstract provided.


Securing Infiniband Networks With End-Point Encryption, Noah B. Diamond Mar 2022

Securing Infiniband Networks With End-Point Encryption, Noah B. Diamond

Theses and Dissertations

The NVIDIA-Mellanox Bluefield-2 is a 100 Gbps high-performance network interface which offers hardware offload and acceleration features that can operate directly on network traffic without routine involvement from the ARM CPU. This allows the ARM multi-core CPU to orchestrate the hardware to perform operations on both Ethernet and RDMA traffic at high rates rather than processing all the traffic directly. A testbed called TNAP was created for performance testing and a MiTM verification process called MiTMVMP is used to ensure proper network configuration. The hardware accelerators of the Bluefield-2 support a throughput of nearly 86 Gbps when using IPsec to …


Enterprise Resource Allocation For Intruder Detection And Interception, Adam B. Haywood Sep 2021

Enterprise Resource Allocation For Intruder Detection And Interception, Adam B. Haywood

Theses and Dissertations

This research considers the problem of an intruder attempting to traverse a defender's territory in which the defender locates and employs disparate sets of resources to lower the probability of a successful intrusion. The research is conducted in the form of three related research components. The first component examines the problem in which the defender subdivides their territory into spatial stages and knows the plan of intrusion. Alternative resource-probability modeling techniques as well as variable bounding techniques are examined to improve the convergence of global solvers for this nonlinear, nonconvex optimization problem. The second component studies a similar problem but …


Indoor Navigation Using Convolutional Neural Networks And Floor Plans, Ricky D. Anderson Mar 2021

Indoor Navigation Using Convolutional Neural Networks And Floor Plans, Ricky D. Anderson

Theses and Dissertations

The goal of this thesis is to evaluate a new indoor navigation technique by incorporating floor plans along with monocular camera images into a CNN as a potential means for identifying camera position. Building floor plans are widely available and provide potential information for localizing within the building. This work sets out to determine if a CNN can learn the architectural features of a floor plan and use that information to determine a location. In this work, a simulated indoor data set is created and used to train two CNNs. A classification CNN, which breaks up the floor plan into …


Infiniband Network Monitoring: Challenges And Possibilities, Kyle D. Hintze Mar 2021

Infiniband Network Monitoring: Challenges And Possibilities, Kyle D. Hintze

Theses and Dissertations

Within the realm of High Performance Computing, the InfiniBand Architecture is among the leading interconnects used today. Capable of providing high bandwidth and low latency, InfiniBand is finding applications outside the High Performance Computing domain. One of these is critical infrastructure, encompassing almost all essential sectors as the work force becomes more connected. InfiniBand is not immune to security risks, as prior research has shown that common traffic analyzing tools cannot effectively monitor InfiniBand traffic transmitted between hosts, due to the kernel bypass nature of the IBA in conjunction with Remote Direct Memory Access operations. If Remote Direct Memory Access …


A Framework For Autonomous Cooperative Optimal Assignment And Control Of Satellite Formations, Devin E. Saunders Mar 2021

A Framework For Autonomous Cooperative Optimal Assignment And Control Of Satellite Formations, Devin E. Saunders

Theses and Dissertations

A decentralized, cooperative multi-agent optimal control framework is presented to offer a solution to the assignment and control problems associated with performing multi-agent tasks in a proximity operations environment. However, the framework developed may be applied to a variety domains such as air, space, and sea. The solution presented takes advantage of a second price auction assignment algorithm to optimally task each satellite, while model predictive control is implemented to control the agents optimally while adhering to safety and mission constraints. The solution is compared to a pseudospectral collocation method, and a study on tuning parameters is included.


Display Design To Avoid And Mitigate Limit Cycle Oscillations (Lco) On The F-16c, David J. Feibus Mar 2021

Display Design To Avoid And Mitigate Limit Cycle Oscillations (Lco) On The F-16c, David J. Feibus

Theses and Dissertations

The U.S. Air Force F-16 Fighting Falcons flying characteristics and flight envelope are dynamic and defined by its external weapon stores configuration. The employment of its munitions at certain speeds can put the F-16 into a flutter-like state in which Limit Cycle Oscillations (LCO) are induced. In LCO, a pilots fine motor control might be hindered, and the aircraft may lose combat effectiveness until flight conditions are reduced. The current research attempted to provide pilots with a predictive feedback display to avoid an LCO-susceptible configuration by increasing their situation awareness about the consequences of employing certain munitions to their flight …


Automated Network Exploitation Utilizing Bayesian Decision Networks, Graeme M. Roberts Mar 2021

Automated Network Exploitation Utilizing Bayesian Decision Networks, Graeme M. Roberts

Theses and Dissertations

Computer Network Exploitation (CNE) is the process of using tactics and techniques to penetrate computer systems and networks in order to achieve desired effects. It is currently a manual process requiring significant experience and time that are in limited supply. This thesis presents the Automated Network Discovery and Exploitation System (ANDES) which demonstrates that it is feasible to automate the CNE process. The uniqueness of ANDES is the use of Bayesian decision networks to represent the CNE domain and subject matter expert knowledge. ANDES conducts multiple execution cycles, which build upon previous action results. Cycles begin by modeling the current …


Exploring Fog Of War Concepts In Wargame Scenarios, Dillon N. Tryhorn Mar 2021

Exploring Fog Of War Concepts In Wargame Scenarios, Dillon N. Tryhorn

Theses and Dissertations

This thesis explores fog of war concepts through three submitted journal articles. The Department of Defense and U.S. Air Force are attempting to analyze war scenarios to aid the decision-making process; fog modeling improves realism in these wargame scenarios. The first article "Navigating an Enemy Contested Area with a Parallel Search Algorithm" [1] investigates a parallel algorithm's speedup, compared to the sequential implementation, with varying map configurations in a tile-based wargame. The parallel speedup tends to exceed 50 but in certain situations. The sequential algorithm outperforms it depending on the configuration of enemy location and amount on the map. The …


Laser Illuminated Imaging: Beam And Scene Deconvolution Algorithm, Benjamin W. Davis Mar 2021

Laser Illuminated Imaging: Beam And Scene Deconvolution Algorithm, Benjamin W. Davis

Theses and Dissertations

Laser illuminated imaging systems deal with several physical challenges that must be overcome to achieve high-resolution images of the target. Noise sources like background noise, photon counting noise, and laser speckle noise will all greatly affect the imaging systems ability to produce a high-resolution image. An even bigger challenge to laser illuminated imaging systems is atmospheric turbulence and the effect that it will have on the imaging system. The illuminating beam will experience tilt, causing the beam to wander off the center of the target during propagation. The light returning to the detector will similarly be affected by turbulence, and …


Delayed Authentication System For Civilian Satellite, Sean M. Feschak Mar 2021

Delayed Authentication System For Civilian Satellite, Sean M. Feschak

Theses and Dissertations

This thesis presents the feasibility of a Delayed Authentication System (DAS) for civilian satellite navigation (satnav) receivers. In satnav systems, encrypted signal components are transmitted synchronously with civilian components. Hence, the civilian signals can be authenticated by detecting the presence of encrypted signal components within the received signal. To authenticate, a reference station transmits estimated encrypted signal spreading code symbols processed using a high gain antenna. In this thesis, it is shown that a 1-meter diameter dish antenna is adequate to provide a high probability of successful authentication, thereby reducing overall system complexity and cost.


Low-Cost Terrestrial Demonstration Of Autonomous Satellite Proximity Operations, Zackary R. Hewitt Mar 2021

Low-Cost Terrestrial Demonstration Of Autonomous Satellite Proximity Operations, Zackary R. Hewitt

Theses and Dissertations

The lack of satellite servicing capabilities significantly impacts the development and operation of current orbital assets. With autonomous solutions under consideration for servicing, the purpose of this research is to build and validate a low-cost hardware platform to expedite the development of autonomous satellite proximity operations. This research aims to bridge the gap between simulation and existing higher fidelity hardware testing with an affordable alternative. An omnidirectional variant of the commercially available TurtleBot3 mobile robot is presented as a 3-DOF testbed that demonstrates a satellite servicing inspection scenario. Reference trajectories for the scenario are generated via optimal control using the …


Enumerating And Locating Bluetooth Devices For Casualty Recovery In A First-Responder Environment, Justin M. Durham Mar 2021

Enumerating And Locating Bluetooth Devices For Casualty Recovery In A First-Responder Environment, Justin M. Durham

Theses and Dissertations

It is difficult for first-responders to quickly locate casualties in an emergency environment such as an explosion or natural disaster. In order to provide another tool to locate individuals, this research attempts to identify and estimate the location of devices that would likely be located on or with a person. A variety of devices, such as phones, smartwatches, and Bluetooth-enabled locks, are tested in multiple environments and at various heights to determine the impact that placement and interference played in locating the devices. The hypothesis is that most Bluetooth devices can be successfully enumerated quickly, but cannot be accurately located …


Stereo Camera Calibrations With Optical Flow, Joshua D. Larson Mar 2021

Stereo Camera Calibrations With Optical Flow, Joshua D. Larson

Theses and Dissertations

Remotely Piloted Aircraft (RPA) are currently unable to refuel mid-air due to the large communication delays between their operators and the aircraft. AAR seeks to address this problem by reducing the communication delay to a fast line-of-sight signal between the tanker and the RPA. Current proposals for AAR utilize stereo cameras to estimate where the receiving aircraft is relative to the tanker, but require accurate calibrations for accurate location estimates of the receiver. This paper improves the accuracy of this calibration by improving three components of it: increasing the quantity of intrinsic calibration data with CNN preprocessing, improving the quality …


Remote Monitoring Of Memory Data Structures For Malware Detection In A Talos Ii Architecture, Robert A. Willburn Mar 2021

Remote Monitoring Of Memory Data Structures For Malware Detection In A Talos Ii Architecture, Robert A. Willburn

Theses and Dissertations

New forms of malware, namely xC;leless malware and rootkits, pose a threat to traditional anti-malware. In particular, Rootkits have the capacity to obscure the present state of memory from the user space of a target machine. If thishappens, anti-malware running in the user space of an axB;ected machine cannot be trusted to operate properly. To combat this threat, this research proposes the remote monitoring of memory from a second, secure processor runningOpenBMC, serving as a baseboard management controller for a POWER9 processor, which is assumed vulnerable to exploitation. The baseboard management controller includes an application called pdbg, used for debugging …


Aircraft Inspection By Multirotor Uav Using Coverage Path Planning, Patrick H. Silberberg Mar 2021

Aircraft Inspection By Multirotor Uav Using Coverage Path Planning, Patrick H. Silberberg

Theses and Dissertations

All military and commercial aircraft must undergo frequent visual inspections in order to identify damage that could pose a danger to safety of flight. Currently, these inspections are primarily conducted by maintenance personnel. Inspectors must scrutinize the aircraft’s surface to find and document defects such as dents, hail damage, broken fasteners, etc.; this is a time consuming, tedious, and hazardous process. The goal of this work is to develop a visual inspection system which can be used by an Unmanned Aerial Vehicle (UAV), and to test the feasibility of this system on military aircraft. Using an autonomous system in place …


Long Distance Bluetooth Low Energy Exploitation On A Wireless Attack Platform, Stephanie L. Long Mar 2021

Long Distance Bluetooth Low Energy Exploitation On A Wireless Attack Platform, Stephanie L. Long

Theses and Dissertations

In the past decade, embedded technology, known as the Internet of Things, has expanded for many uses. The smart home infrastructure has drastically grown to include networked refrigerators, lighting systems, speakers, watches, and more. This increase in the use of wireless protocols provides a larger attack surface for cyber actors than ever before. Wireless loT traffic is susceptible for sniffing by an attacker. The attack platform skypie is upgraded to incorporate Bluetooth Low Energy (BLE) beacon collection for pattern-of-life data, as well as device characteristic enumeration and potential characteristic modification. This platform allows an attacker to mount the skypie to …