Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Physical Sciences and Mathematics

Adaptive Automation Design And Implementation, Jason M. Bindewald Sep 2015

Adaptive Automation Design And Implementation, Jason M. Bindewald

Theses and Dissertations

Automations allow us to reduce the need for humans in certain environments, such as auto-pilot features on unmanned aerial vehicles. However, some situations still require human intervention. Adaptive automation is a research field that enables computer systems to adjust the amount of automation by taking over tasks from or giving tasks back to the user. This research develops processes and insights for adaptive automation designers to take theoretical adaptive automation ideas and develop them into real-world adaptive automation system. These allow developers to design better automation systems that recognize the limits of computers systems, enabling better designs for systems in …


A System-Level Throughput Model For Quantum Key Distribution, Robert C. Cernera Sep 2015

A System-Level Throughput Model For Quantum Key Distribution, Robert C. Cernera

Theses and Dissertations

Quantum Key Distribution (QKD) is an innovative technology which exploits the laws of quantum mechanics to generate and distribute shared secret keying material. QKD systems generate and distribute key by progressing through a number of distinct phases, typically in a serial manner. The purpose of this research is to identify these phases, their relationships to each other, as well as their relationship to time, memory space, computational requirements, and hardware resources. A mathematical model is developed which enables the study of critical system parameters, identifies and demonstrates potential bottlenecks that affect the overall key generation rate of serial implementations, and …


An Analysis Of Conus Based Deployment Of Pseudolites For Positioning, Navigation And Timing (Pnt) Systems, Justin H. Deifel, Albert J. Pena Sep 2015

An Analysis Of Conus Based Deployment Of Pseudolites For Positioning, Navigation And Timing (Pnt) Systems, Justin H. Deifel, Albert J. Pena

Theses and Dissertations

The Global Positioning System (GPS) developed and operated by the United States Air Force (USAF) provides a way for users to determine position, navigation and timing (PNT). GPS provides an extraordinary capability that has become instrumental in all aspects of our day to day lives. As new technologies such as automated vehicles and unmanned aircraft continue to be developed, a reliable back up to GPS is required to ensure the PNT data generated in these systems is accurate. This research studies a potential architecture for deploying a nationwide network of ground based pseudolites that would act to supplement and backup …


Constructing Cost-Effective And Targetable Ics Honeypots Suited For Production Networks, Michael M. Winn Mar 2015

Constructing Cost-Effective And Targetable Ics Honeypots Suited For Production Networks, Michael M. Winn

Theses and Dissertations

Honeypots are a technique that can mitigate the risk of cyber threats. Effective honeypots are authentic and targetable, and their design and implementation must accommodate risk tolerance and financial constraints. The proprietary, and often expensive, hardware and software used by Industrial Control System (ICS) devices creates the challenging problem of building a flexible, economical, and scalable honeypot. This research extends Honeyd into Honeyd+, making it possible to use the proxy feature to create multiple high interaction honeypots with a single Programmable Logic Controller (PLC). Honeyd+ is tested with a network of 75 decoy PLCs, and the interactions with the decoys …


Tactical Ai In Real Time Strategy Games, Donald A. Gruber Mar 2015

Tactical Ai In Real Time Strategy Games, Donald A. Gruber

Theses and Dissertations

The real time strategy (RTS) tactical decision making problem is a difficult problem. It is generally more complex due to its high degree of time sensitivity. This research effort presents a novel approach to this problem within an educational, teaching objective. Particular decision focus is target selection for a artificial intelligence (AI) RTS game model. The use of multi-objective evolutionary algorithms (MOEAs) in this tactical decision making problem allows an AI agent to make fast, effective solutions that do not require modification to the current environment. This approach allows for the creation of a generic solution building tool that is …


Unified Behavior Framework For Discrete Event Simulation Systems, Alexander J. Kamrud Mar 2015

Unified Behavior Framework For Discrete Event Simulation Systems, Alexander J. Kamrud

Theses and Dissertations

Intelligent agents provide simulations a means to add lifelike behavior in place of manned entities. Generally when developed, a single intelligent agent model is chosen, such as rule based, behavior trees, etc. This choice introduces restrictions into what behaviors agents can manifest, and can require significant testing in edge cases. This thesis presents the use of the UBF in the AFSIM environment. The UBF provides the flexibility to implement any and all intelligent agent models, allowing the developer to choose the model he/she feels best fits the experiment at hand. Furthermore, the UBF demonstrates several key software engineering principles through …


Evaluating Machine Learning Classifiers For Hybrid Network Intrusion Detection Systems, Michael D. Rich Mar 2015

Evaluating Machine Learning Classifiers For Hybrid Network Intrusion Detection Systems, Michael D. Rich

Theses and Dissertations

Existing classifier evaluation methods do not fully capture the intended use of classifiers in hybrid intrusion detection systems (IDS), systems that employ machine learning alongside a signature-based IDS. This research challenges traditional classifier evaluation methods in favor of a value-focused evaluation method that incorporates evaluator-specific weights for classifier and prediction threshold selection. By allowing the evaluator to weight known and unknown threat detection by alert classification, classifier selection is optimized to evaluator values for this application. The proposed evaluation methods are applied to a Cyber Defense Exercise (CDX) dataset. Network data is processed to produce connection-level features, then labeled using …


The Unified Behavior Framework For The Simulation Of Autonomous Agents, Daniel M. Roberson Mar 2015

The Unified Behavior Framework For The Simulation Of Autonomous Agents, Daniel M. Roberson

Theses and Dissertations

Since the 1980s, researchers have designed a variety of robot control architectures intending to imbue robots with some degree of autonomy. A recently developed architecture, the UBF, implements a variation of the three-layer architecture with a reactive controller to rapidly make behavior decisions. Additionally, the UBF utilizes software design patterns that promote the reuse of code and free designers to dynamically switch between behavior paradigms. This paper explores the application of the UBF to the simulation domain. By employing software engineering principles to implement the UBF architecture within an open-source simulation framework, we have extended the versatility of both. The …


Distributed Kernelized Locality-Sensitive Hashing For Faster Image Based Navigation, Scott A. Hutchison Mar 2015

Distributed Kernelized Locality-Sensitive Hashing For Faster Image Based Navigation, Scott A. Hutchison

Theses and Dissertations

Content based image retrieval (CBIR) remains one of the most heavily researched areas in computer vision. Different image retrieval techniques and algorithms have been implemented and used in localization research, object recognition applications, and commercially by companies such as Facebook, Google, and Yahoo!. Current methods for image retrieval become problematic when implemented on image datasets that can easily reach billions of images. In order to process extremely large datasets, the computation must be distributed across a cluster of machines using software such as Apache Hadoop. There are many different algorithms for conducting content based image retrieval, but this research focuses …