Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Physical Sciences and Mathematics

Improving Detection Of Dim Targets: Optimization Of A Moment-Based Detection Algorithm, Shannon R. Young Dec 2018

Improving Detection Of Dim Targets: Optimization Of A Moment-Based Detection Algorithm, Shannon R. Young

Theses and Dissertations

Wide area motion imagery (WAMI) sensor technology is advancing rapidly. Increases in frame rates and detector array sizes have led to a dramatic increase in the volume of data that can be acquired. Without a corresponding increase in analytical manpower, much of these data remain underutilized. This creates a need for fast, automated, and robust methods for detecting dim, moving signals of interest. Current approaches fall into two categories: detect-before-track (DBT) and track-before-detect (TBD) methods. The DBT methods use thresholding to reduce the quantity of data to be processed, making real time implementation practical but at the cost of the …


Big Data And Sensor Network For Construction Material Testing, Yao Shi Nov 2018

Big Data And Sensor Network For Construction Material Testing, Yao Shi

Theses and Dissertations

Engineers and contractors need to have a precise understanding of the development progress of concrete strength in the natural environment, which helps to save project time and cost. However, current practice of concrete construction depends on published data, charts and curves from laboratory tests. The data would not show frequently changing environmental conditions in the real world, which can affect concrete quality significantly. The objective of this research is to design a reliable and accurate method to validate test data of the strength developments of concrete specimens in early stages. The approach includes the following tasks: (1) arrange sensors to …


Design And Implementation Of A Domain Specific Language For Deep Learning, Xiao Bing Huang May 2018

Design And Implementation Of A Domain Specific Language For Deep Learning, Xiao Bing Huang

Theses and Dissertations

\textit {Deep Learning} (DL) has found great success in well-diversified areas such as machine vision, speech recognition, big data analysis, and multimedia understanding recently. However, the existing state-of-the-art DL frameworks, e.g. Caffe2, Theano, TensorFlow, MxNet, Torch7, and CNTK, are programming libraries with fixed user interfaces, internal representations, and execution environments. Modifying the code of DL layers or data structure is very challenging without in-depth understanding of the underlying implementation. The optimization of the code and execution in these tools is often limited and relies on the specific DL computation graph manipulation and scheduling that lack systematic and universal strategies. Furthermore, …


Analysis Of Dynamic Mode Decomposition, Archana Muniraju May 2018

Analysis Of Dynamic Mode Decomposition, Archana Muniraju

Theses and Dissertations

In this master thesis, a study was conducted on a method known as Dynamic mode decomposition(DMD), an equation-free technique which does not require to know the underlying governing equations of the complex data. As a result of massive datasets from various resources, like experiments, simulation, historical records, etc. has led to an increasing demand for an efficient method for data mining and analysis techniques. The main goals of data mining are the description and prediction. Description involves finding patterns in the data and prediction involves predicting the system dynamics. An important aspect when analyzing an algorithm is testing. In this …


Passive Radiolocation Of Ieee 802.11 Emitters Using Directional Antennae, Bradford E. Law Mar 2018

Passive Radiolocation Of Ieee 802.11 Emitters Using Directional Antennae, Bradford E. Law

Theses and Dissertations

Low-cost commodity hardware and cheaper, more capable consumer-grade drones make the threat of home-made, inexpensive drone-mounted wireless attack platforms (DWAPs) greater than ever. Fences and physical security do little to impede a drone from approaching private, commercial, or government wireless access points (WAPs) and conducting wireless attacks. At the same time, unmanned aerial vehicles (UAVs) present a valuable tool for network defenders conducting site surveys and emulating threats. These platforms present near-term dangers and opportunities for corporations and governments. Despite the vast leaps in technology these capabilities represent, UAVs are noisy and consequently difficult to conceal as they approach a …


Special Perturbations On The Jetson Tx1 And Tx2 Computers, Tyler M. Moore Mar 2018

Special Perturbations On The Jetson Tx1 And Tx2 Computers, Tyler M. Moore

Theses and Dissertations

Simplified General Perturbations Number 4 (SGP4) has been the traditional algorithm for performing Orbit Determination (OD) onboard orbiting spacecraft. However, the recent rise of high-performance computers with low Size, Weight, and Power (SWAP) factors has provided the opportunity to use Special Perturbations (SP), a more accurate algorithm to perform onboard OD. This research evaluates the most efficient way to implement SP on NVIDIA’s Jetson TX series of integrated Graphical Processing Units (GPUs). An initial serial version was implemented on the Jetson TX1 and TX2's Central Processing Units (CPUs). The runtimes of the initial version are the benchmark that the runtimes …


Mitigating The Effects Of Boom Occlusion On Automated Aerial Refueling Through Shadow Volumes, Zachary C. Paulson Mar 2018

Mitigating The Effects Of Boom Occlusion On Automated Aerial Refueling Through Shadow Volumes, Zachary C. Paulson

Theses and Dissertations

In flight refueling of Unmanned Aerial Vehicles (UAVs) is critical to the United States Air Force (USAF). However, the large communication latency between a ground-based operator and his/her remote UAV makes docking with a refueling tanker unsafe. This latency may be mitigated by leveraging a tanker-centric stereo vision system. The vision system observes and computes an approaching receiver's relative position and orientation offering a low-latency, high frequency docking solution. Unfortunately, the boom -- an articulated refueling arm responsible for physically pumping fuel into the receiver -- occludes large portions of the receiver especially as the receiver approaches and docks with …


Rss-Based Device-Free Passive Detection And Localization Using Home Automation Network Radio Frequencies, Tiffany M. Phan Mar 2018

Rss-Based Device-Free Passive Detection And Localization Using Home Automation Network Radio Frequencies, Tiffany M. Phan

Theses and Dissertations

This research provided a proof of concept for a device-free passive (DfP) system capable of detecting and localizing a target through exploitation of a home automation network’s radio frequency (RF) signals. The system was developed using Insteon devices with a 915 MHz center frequency. Without developer privileges, limitations of the Insteon technology like no intrinsic received signal strength (RSS) field and silent periods between messages were overcome by using software-defined radios to simulate Insteon devices capable of collecting and reporting RSS, and by creating a message generation script and implementing a calibrated filter threshold to reduce silent periods. Evaluation of …


Near Earth Space Object Detection Utilizing Parallax As Multi-Hypothesis Test Criterion, Joseph C. Tompkins Mar 2018

Near Earth Space Object Detection Utilizing Parallax As Multi-Hypothesis Test Criterion, Joseph C. Tompkins

Theses and Dissertations

The US Strategic Command (USSTRATCOM) operated Space Surveillance Network (SSN) is tasked with Space Situational Awareness (SSA) for the US military. This system is made up of Electro-Optic sensors such as the Space Surveillance Telescope (SST) and Ground-based Electro-Optical Deep Space Surveillance (GEODSS) as well as RADAR based sensors such as the Space Fence. While Lockheed Martin’s Space Fence is very adept at detecting & tracking objects in Low Earth Orbit (LEO) below 3000 Km in height [1], gaps remain in the tracking of Resident Space Objects (RSO’s) in Geosynchronous Orbits (GEO) due to limitations associated with the implementation of …


Analysis Of Temperature And Humidity Effects On Horizontal Photovoltaic Panels, Corey J. Booker Mar 2018

Analysis Of Temperature And Humidity Effects On Horizontal Photovoltaic Panels, Corey J. Booker

Theses and Dissertations

The United States Air Force seeks to address power grid vulnerability and bolster energy resilience through the use of renewable energy sources. Air Force Institute of Technology engineers designed and manufactured control systems to monitor power production from the most widely-used silicon-based solar cells at 38 testing locations around the globe spanning the majority of climate types. Researchers conducted multivariate regression analysis to establish a statistical relationship between photovoltaic power output, ambient temperature, and humidity pertaining to monocrystalline and polycrystalline photovoltaic panels. Formulated models first characterized power output globally, then by specific climate type with general inaccuracy. Location-specific models are …


Variable Speed Simulation For Accelerated Industrial Control System Cyber Training, Luke M. Bradford Mar 2018

Variable Speed Simulation For Accelerated Industrial Control System Cyber Training, Luke M. Bradford

Theses and Dissertations

It is important for industrial control system operators to receive quality training to defend against cyber attacks. Hands-on training exercises with real-world control systems allow operators to learn various defensive techniques and see the real-world impact of changes made to a control system. Cyber attacks and operator actions can have unforeseen effects that take a significant amount of time to manifest and potentially cause physical harm to the system, making high-fidelity training exercises time-consuming and costly. This thesis presents a method for accelerating training exercises by simulating and predicting the effects of a cyber event on a partially-simulated control system. …


Plasmonic Grating Geometrics And Wavelength-Dependent Focus Depth In Infrared Detectors, Patrick R. Kennedy Mar 2018

Plasmonic Grating Geometrics And Wavelength-Dependent Focus Depth In Infrared Detectors, Patrick R. Kennedy

Theses and Dissertations

The objective for this research is to determine a relationship between plasmonic grating geometries and the wavelength-dependent focus depth. This research is focused on enhancing the signal collected by infrared detectors by using a metal grating as a planar lens to focus light in the detecting region of the substrate. This can be used to maintain a thinner absorbing region and possibly to create multi-color imaging in a single pixel. Simulations demonstrate that the plasmonic lens is capable of creating a wavelength dependent focus spot.


Expected Coverage (Excov): A Proposal To Compare Fuzz Test Coverage Within An Infinite Input Space, Evan V. Swihart Mar 2018

Expected Coverage (Excov): A Proposal To Compare Fuzz Test Coverage Within An Infinite Input Space, Evan V. Swihart

Theses and Dissertations

A Fuzz test is an approach used to discover vulnerabilities by intentionally sending invalid inputs to a system for the purpose of triggering some type of fault or unintended effect that renders the system vulnerable to an exploit. Fuzz testing is an important cyber-testing technique used to find and fix vulnerabilities before they are exploited. The fuzzing of military data links presents a particular challenge because existing fuzzing tools cannot be easily applied to these systems. As a result, the tools and techniques used to fuzz these links vary widely in sophistication and effectiveness. Because of the infinite, or nearly …


Securing Data In Transit Using Two Channel Communication, Clark L. Wolfe Mar 2018

Securing Data In Transit Using Two Channel Communication, Clark L. Wolfe

Theses and Dissertations

Securing data in transit is critically important to the Department of Defense in todays contested environments. While encryption is often the preferred method to provide security, there exist applications for which encryption is too resource intensive, not cost-effective or simply not available. In this thesis, a two-channel communication system is proposed in which the message being sent can be intelligently and dynamically split over two or more channels to provide a measure of data security either when encryption is not available, or perhaps in addition to encryption. This data spiting technique employs multiple wireless channels operating at the physical layer, …


Securing Critical Infrastructure: A Ransomware Study, Blaine M. Jeffries Mar 2018

Securing Critical Infrastructure: A Ransomware Study, Blaine M. Jeffries

Theses and Dissertations

This thesis reviews traditional ransomware attack trends in order to present a taxonomy for ransomware targeting industrial control systems. After reviewing a critical infrastructure ransomware attack methodology, a corresponding response and recovery plan is described. The plan emphasizes security through redundancy, specifically the incorporation of standby programmable logic controllers. This thesis goes on to describe a set of experiments conducted to test the viability of defending against a specialized ransomware attack with a redundant controller network. Results support that specific redundancy schemes are effective in recovering from a successful attack. Further experimentation is conducted to test the feasibility of industrial …