Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Swarms (3)
- Human robot interaction (2)
- Human swarm interaction (2)
- Robot swarms (2)
- Security (2)
-
- API (1)
- Abstraction (1)
- Administrator control (1)
- Algebraic loops (1)
- Analytics (1)
- Apache Spark (1)
- Authority (1)
- BERT embeddings (1)
- Behavior Trees (1)
- Binarization (1)
- CRL (1)
- CRLSet (1)
- CTE (1)
- Causality (1)
- Certificate (1)
- Certificates (1)
- Client authentication (1)
- Common-sense reasoning (1)
- Computational photography (1)
- Conditional GANs (1)
- Convergence (1)
- Cybersecurity (1)
- Cybersecurity Education (1)
- DANE (1)
- DNF (1)
Articles 1 - 14 of 14
Full-Text Articles in Physical Sciences and Mathematics
Light-Field Style Transfer, David Marvin Hart
Light-Field Style Transfer, David Marvin Hart
Theses and Dissertations
For many years, light fields have been a unique way of capturing a scene. By using a particular set of optics, a light field camera is able to, in a single moment, take images of the same scene from multiple perspectives. These perspectives can be used to calculate the scene geometry and allow for effects not possible with standard photographs, such as refocus and the creation of novel views.Neural style transfer is the process of training a neural network to render photographs in the style of a particular painting or piece of art. This is a simple process for a …
Semantically Aligned Sentence-Level Embeddings For Agent Autonomy And Natural Language Understanding, Nancy Ellen Fulda
Semantically Aligned Sentence-Level Embeddings For Agent Autonomy And Natural Language Understanding, Nancy Ellen Fulda
Theses and Dissertations
Many applications of neural linguistic models rely on their use as pre-trained features for downstream tasks such as dialog modeling, machine translation, and question answering. This work presents an alternate paradigm: Rather than treating linguistic embeddings as input features, we treat them as common sense knowledge repositories that can be queried using simple mathematical operations within the embedding space, without the need for additional training. Because current state-of-the-art embedding models were not optimized for this purpose, this work presents a novel embedding model designed and trained specifically for the purpose of "reasoning in the linguistic domain".Our model jointly represents single …
Cybersecurity Education In Utah High Schools: An Analysis And Strategy For Teacher Adoption, Cariana June Cornel
Cybersecurity Education In Utah High Schools: An Analysis And Strategy For Teacher Adoption, Cariana June Cornel
Theses and Dissertations
The IT Education Specialist for the USBE, Brandon Jacobson, stated:I feel there is a deficiency of and therefore a need to teach Cybersecurity.Cybersecurity is the “activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation” (NICE, 2018). Practicing cybersecurity can increase awareness of cybersecurity issues, such as theft of sensitive information. Current efforts, including but not limited to, cybersecurity camps, competitions, college courses, and conferences, have been created to better prepare cyber citizens nationwide for such cybersecurity occurrences. In …
A Shared-Memory Coupled Architecture To Leverage Big Data Frameworks In Prototyping And In-Situ Analytics For Data Intensive Scientific Workflows, Alexander Michael Lemon
A Shared-Memory Coupled Architecture To Leverage Big Data Frameworks In Prototyping And In-Situ Analytics For Data Intensive Scientific Workflows, Alexander Michael Lemon
Theses and Dissertations
There is a pressing need for creative new data analysis methods whichcan sift through scientific simulation data and produce meaningfulresults. The types of analyses and the amount of data handled by currentmethods are still quite restricted, and new methods could providescientists with a large productivity boost. New methods could be simpleto develop in big data processing systems such as Apache Spark, which isdesigned to process many input files in parallel while treating themlogically as one large dataset. This distributed model, combined withthe large number of analysis libraries created for the platform, makesSpark ideal for processing simulation output.Unfortunately, the filesystem becomes …
Measuring Influence On Linear Dynamical Networks, Jaekob Chenina
Measuring Influence On Linear Dynamical Networks, Jaekob Chenina
Theses and Dissertations
Influence has been studied across many different domains including sociology, statistics, marketing, network theory, psychology, social media, politics, and web search. In each of these domains, being able to measure and rank various degrees of influence has useful applications. For example, measuring influence in web search allows internet users to discover useful content more quickly. However, many of these algorithms measure influence across networks and graphs that are mathematically static. This project explores influence measurement within the context of linear time invariant (LTI) systems. While dynamical networks do have mathematical models for quantifying influence on a node-to-node basis, to the …
Deep Synthetic Noise Generation For Rgb-D Data Augmentation, Patrick Douglas Hammond
Deep Synthetic Noise Generation For Rgb-D Data Augmentation, Patrick Douglas Hammond
Theses and Dissertations
Considerable effort has been devoted to finding reliable methods of correcting noisy RGB-D images captured with unreliable depth-sensing technologies. Supervised neural networks have been shown to be capable of RGB-D image correction, but require copious amounts of carefully-corrected ground-truth data to train effectively. Data collection is laborious and time-intensive, especially for large datasets, and generation of ground-truth training data tends to be subject to human error. It might be possible to train an effective method on a relatively smaller dataset using synthetically damaged depth-data as input to the network, but this requires some understanding of the latent noise distribution of …
Multi-Human Management Of A Hub-Based Colony: Efficiency And Robustness In The Cooperative Best M-Of-N Task, John Rolfes Grosh
Multi-Human Management Of A Hub-Based Colony: Efficiency And Robustness In The Cooperative Best M-Of-N Task, John Rolfes Grosh
Theses and Dissertations
Swarm robotics is an emerging field that is expected to provide robust solutions to spatially distributed problems. Human operators will often be required to guide a swarm in the fulfillment of a mission. Occasionally, large tasks may require multiple spatial swarms to cooperate in their completion. We hypothesize that when latency, bandwidth, operator dropout, and communication noise are significant factors, human organizations that promote individual initiative perform more effectively and resiliently than hierarchies in the cooperative best-m-of-n task. Simulations automating the behavior of hub-based swarm robotic agents and groups of human operators are used to evaluate this hypothesis. To make …
Deep Learning For Document Image Analysis, Christopher Alan Tensmeyer
Deep Learning For Document Image Analysis, Christopher Alan Tensmeyer
Theses and Dissertations
Automatic machine understanding of documents from image inputs enables many applications in modern document workflows, digital archives of historical documents, and general machine intelligence, among others. Together, the techniques for understanding document images comprise the field of Document Image Analysis (DIA). Within DIA, the research community has identified several sub-problems, such as page segmentation and Optical Character Recognition (OCR). As the field has matured, there has been a trend of moving away from heuristic-based methods, designed for particular tasks and domains of documents, and moving towards machine learning methods that learn to solve tasks from examples of input/output pairs. Within …
After Https: Indicating Risk Instead Of Security, Matthew Wayne Holt
After Https: Indicating Risk Instead Of Security, Matthew Wayne Holt
Theses and Dissertations
Browser security indicators show warnings when sites load without HTTPS, but more malicious sites are using HTTPS to appear legitimate in browsers and deceive users. We explore a new approach to browser indicators that overcomes several limitations of existing indicators. First, we develop a high-level risk assessment framework to identify risky interactions and evaluate the utility of this approach through a survey. Next, we evaluate potential designs for a new risk indicator to communicate risk rather than security. Finally, we conduct a within-subjects user study to compare the risk indicator to existing security indicators by observing participant behavior and collecting …
Representation And Reconstruction Of Linear, Time-Invariant Networks, Nathan Scott Woodbury
Representation And Reconstruction Of Linear, Time-Invariant Networks, Nathan Scott Woodbury
Theses and Dissertations
Network reconstruction is the process of recovering a unique structured representation of some dynamic system using input-output data and some additional knowledge about the structure of the system. Many network reconstruction algorithms have been proposed in recent years, most dealing with the reconstruction of strictly proper networks (i.e., networks that require delays in all dynamics between measured variables). However, no reconstruction technique presently exists capable of recovering both the structure and dynamics of networks where links are proper (delays in dynamics are not required) and not necessarily strictly proper.The ultimate objective of this dissertation is to develop algorithms capable of …
Moderating Influence As A Design Principle For Human-Swarm Interaction, C Chace Ashcraft
Moderating Influence As A Design Principle For Human-Swarm Interaction, C Chace Ashcraft
Theses and Dissertations
Robot swarms have recently become of interest in both industry and academia for their potential to perform various difficult or dangerous tasks efficiently. As real robot swarms become more of a possibility, many desire swarms to be controlled or directed by a human, which raises questions regarding how that should be done. Part of the challenge of human-swarm interaction is the difficulty of understanding swarm state and how to drive the swarm to produce emergent behaviors. Human input could inhibit desirable swarm behaviors if their input is poor and has sufficient influence over swarm agents, affecting its overall performance. Thus, …
Computationally Modeling The Trophic Cascade In Yellowstone National Park, Emily Menden
Computationally Modeling The Trophic Cascade In Yellowstone National Park, Emily Menden
Undergraduate Honors Theses
Many of the world’s ecosystems are facing species elimination (2). Whether this elimination is intentional or accidental, the consequences need to be understood in order to make better resource management decisions. Computational models can be helpful in making these management decisions. Yellowstone National Park gives ecologists a unique opportunity to study species elimination and reintroduction.
In the 1920s, wolves were extirpated from the Greater Yellowstone Area. The absence of wolves allowed the elk population to increase unbounded by a natural predator. Over the years, Yellowstone management took various measures to control the elk population. In the 1970s, the National Park …
Emergence Of Collective Behaviors In Hub-Based Colonies Using Grammatical Evolution And Behavior Trees, Aadesh Neupane
Emergence Of Collective Behaviors In Hub-Based Colonies Using Grammatical Evolution And Behavior Trees, Aadesh Neupane
Theses and Dissertations
Animals such as bees, ants, birds, fish, and others are able to efficiently perform complex coordinated tasks like foraging, nest-selection, flocking and escaping predators without centralized control or coordination. These complex collective behaviors are the result of emergence. Conventionally, mimicking these collective behaviors with robots requires researchers to study actual behaviors, derive mathematical models, and implement these models as algorithms. Since the conventional approach is very time consuming and cumbersome, this thesis uses an emergence-based method for the efficient evolution of collective behaviors. Our method, Grammatical Evolution algorithm for Evolution of Swarm bEhaviors (GEESE), is based on Grammatical Evolution (GE) …
The Security Layer, Mark Thomas O'Neill
The Security Layer, Mark Thomas O'Neill
Theses and Dissertations
Transport Layer Security (TLS) is a vital component to the security ecosystem and the most popular security protocol used on the Internet today. Despite the strengths of the protocol, numerous vulnerabilities result from its improper use in practice. Some of these vulnerabilities arise from weaknesses in authentication, from the rigidity of the trusted authority system to the complexities of client certificates. Others result from the misuse of TLS by developers, who misuse complicated TLS libraries, improperly validate server certificates, employ outdated cipher suites, or deploy other features insecurely. To make matters worse, system administrators and users are powerless to fix …