830 research outputs found

    Solving Real-Life Hydroinformatics Problems with Operations Research and Artificial Intelligence

    Get PDF
    Many real life problems in the hydraulic engineering literature can be modelled as constrained optimisation problems. Often, they are addressed in the literature through genetic algorithms, although other techniques have been proposed. In this thesis, we address two of these real life problems through a variety of techniques taken from the Artificial Intelligence and Operations Research areas, such as mixed-integer linear programming, logic programming, genetic algorithms and path relinking, together with hybridization amongst these technologies and with hydraulic simulators. For the first time, an Answer Set Programming formulation of hydroinformatics problems is proposed. The two real life problems addressed hereby are the optimisation of the response in case of contamination events, and the optimisation of the positioning of the isolation valves. The constraints of the former describe the feasible region of the Multiple Travelling Salesman Problem, while the objective function is computed by a hydraulic simulator. A simulation–optimisation approach based on Genetic Algorithms, mathematical programming, and Path Relinking, and a thorough experimental analysis are discussed hereby. The constraints of the latter problem describe a graph partitioning enriched with a maximum flow, and it is a new variant of the common graph partitioning. A new mathematical model plus a new formalization in logic programming are discussed in this work. In particular, the technologies adopted are mixed-integer linear programming and Answer Set Programming. Addressing these two real applications in hydraulic engineering as constrained optimisation problems has allowed for i) computing applicable solutions to the real case, ii) computing better solutions than the ones proposed in the hydraulic literature, iii) exploiting graph theory for modellization and solving purposes, iv) solving the problems by well suited technologies in Operations Research and Artificial Intelligence, and v) designing new integrated and hybrid architectures for a more effective solving

    Intelligent flight control systems

    Get PDF
    The capabilities of flight control systems can be enhanced by designing them to emulate functions of natural intelligence. Intelligent control functions fall in three categories. Declarative actions involve decision-making, providing models for system monitoring, goal planning, and system/scenario identification. Procedural actions concern skilled behavior and have parallels in guidance, navigation, and adaptation. Reflexive actions are spontaneous, inner-loop responses for control and estimation. Intelligent flight control systems learn knowledge of the aircraft and its mission and adapt to changes in the flight environment. Cognitive models form an efficient basis for integrating 'outer-loop/inner-loop' control functions and for developing robust parallel-processing algorithms

    Cyber-Human Systems, Space Technologies, and Threats

    Get PDF
    CYBER-HUMAN SYSTEMS, SPACE TECHNOLOGIES, AND THREATS is our eighth textbook in a series covering the world of UASs / CUAS/ UUVs / SPACE. Other textbooks in our series are Space Systems Emerging Technologies and Operations; Drone Delivery of CBNRECy – DEW Weapons: Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD); Disruptive Technologies with applications in Airline, Marine, Defense Industries; Unmanned Vehicle Systems & Operations On Air, Sea, Land; Counter Unmanned Aircraft Systems Technologies and Operations; Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets, 2nd edition; and Unmanned Aircraft Systems (UAS) in the Cyber Domain Protecting USA’s Advanced Air Assets, 1st edition. Our previous seven titles have received considerable global recognition in the field. (Nichols & Carter, 2022) (Nichols, et al., 2021) (Nichols R. K., et al., 2020) (Nichols R. , et al., 2020) (Nichols R. , et al., 2019) (Nichols R. K., 2018) (Nichols R. K., et al., 2022)https://newprairiepress.org/ebooks/1052/thumbnail.jp

    Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach

    Get PDF
    According to recent security analysis reports, malicious software (a.k.a. malware) is rising at an alarming rate in numbers, complexity, and harmful purposes to compromise the security of modern computer systems. Recently, malware detection based on low-level hardware features (e.g., Hardware Performance Counters (HPCs) information) has emerged as an effective alternative solution to address the complexity and performance overheads of traditional software-based detection methods. Hardware-assisted Malware Detection (HMD) techniques depend on standard Machine Learning (ML) classifiers to detect signatures of malicious applications by monitoring built-in HPC registers during execution at run-time. Prior HMD methods though effective have limited their study on detecting malicious applications that are spawned as a separate thread during application execution, hence detecting stealthy malware patterns at run-time remains a critical challenge. Stealthy malware refers to harmful cyber attacks in which malicious code is hidden within benign applications and remains undetected by traditional malware detection approaches. In this paper, we first present a comprehensive review of recent advances in hardware-assisted malware detection studies that have used standard ML techniques to detect the malware signatures. Next, to address the challenge of stealthy malware detection at the processor’s hardware level, we propose StealthMiner, a novel specialized time series machine learning-based approach to accurately detect stealthy malware trace at run-time using branch instructions, the most prominent HPC feature. StealthMiner is based on a lightweight time series Fully Convolutional Neural Network (FCN) model that automatically identifies potentially contaminated samples in HPC-based time series data and utilizes them to accurately recognize the trace of stealthy malware. Our analysis demonstrates that using state-of-the-art ML-based malware detection methods is not effective in detecting stealthy malware samples since the captured HPC data not only represents malware but also carries benign applications’ microarchitectural data. The experimental results demonstrate that with the aid of our novel intelligent approach, stealthy malware can be detected at run-time with 94% detection performance on average with only one HPC feature, outperforming the detection performance of state-of-the-art HMD and general time series classification methods by up to 42% and 36%, respectively

    Air Force Institute of Technology Research Report 2006

    Get PDF
    This report summarizes the research activities of the Air Force Institute of Technology’s Graduate School of Engineering and Management. It describes research interests and faculty expertise; lists student theses/dissertations; identifies research sponsors and contributions; and outlines the procedures for contacting the school. Included in the report are: faculty publications, conference presentations, consultations, and funded research projects. Research was conducted in the areas of Aeronautical and Astronautical Engineering, Electrical Engineering and Electro-Optics, Computer Engineering and Computer Science, Systems and Engineering Management, Operational Sciences, Mathematics, Statistics and Engineering Physics

    Aerospace medicine and biology: A continuing bibliography with indexes (supplement 362)

    Get PDF
    This bibliography lists 357 reports, articles and other documents introduced into the NASA Scientific and Technical Information System during May 1992. Subject coverage includes: aerospace medicine and physiology, life support systems and man/system technology, protective clothing, exobiology and extraterrestrial life, planetary biology, and flight crew behavior and performance

    Aerospace medicine and biology: A cumulative index to a continuing bibliography (supplement 371)

    Get PDF
    This publication is a cumulative index to the abstracts contained in Supplements 359 through 370 of Aerospace Medicine and Biology: A Continuing Bibliography. It includes seven indexes: subject, personal author, corporate source, foreign technology, contract number, report number, and accession number

    A Survey of COVID-19 in Public Transportation: Transmission Risk, Mitigation and Prevention

    Get PDF
    The COVID-19 pandemic is posing significant challenges to public transport operators by drastically reducing demand while also requiring them to implement measures that minimize risks to the health of the passengers. While the collective scientific understanding of the SARS-CoV-2 virus and COVID-19 pandemic are rapidly increasing, currently there is a lack of understanding of how the COVID-19 relates to public transport operations. This article presents a comprehensive survey of the current research on COVID-19 transmission mechanisms and how they relate to public transport. We critically assess literature through a lens of disaster management and survey the main transmission mechanisms, forecasting, risks, mitigation, and prevention mechanisms. Social distancing and control on passenger density are found to be the most effective mechanisms. Computing and digital technology can support risk control. Based on our survey, we draw guidelines for public transport operators and highlight open research challenges to establish a research roadmap for the path forward.Peer reviewe

    JSC research and technology

    Get PDF
    The primary roles and missions of JSC incorporate all aspects of human presence in space. Therefore, the Center is involved in the development of technology that will allow humans to stay longer in Earth orbit, allow safe flight in space, and provide capabilities to explore the Moon and Mars. The Center's technology emphasis areas include human spacecraft development, human support systems and infrastructure, and human spacecraft operations. Safety and reliability are critical requirements for the technologies that JSC pursues for long-duration use in space. One of the objectives of technology development at the Center is to give employees the opportunity to enhance their technological expertise and project management skills by defining, designing, and developing projects that are vital to the Center's strategy for the future. This report is intended to communicate within and outside the Agency our research and technology (R&T) accomplishments, as well as inform Headquarters program managers and their constituents of the significant accomplishments that have promise for future Agency programs. While not inclusive of all R&T efforts, the report presents a comprehensive summary of JSC projects in which substantial progress was made in the 1992 fiscal year. At the beginning of each project description, names of the Principal Investigator (PI) and the Technical Monitor (TM) are given, followed by their JSC mail codes or their company or university affiliations. The funding sources and technology focal points are identified in the index

    Aerospace medicine and biology: A continuing bibliography with indexes (supplement 331)

    Get PDF
    This bibliography lists 129 reports, articles and other documents introduced into the NASA Scientific and Technical Information System during December, 1989. Subject coverage includes: aerospace medicine and psychology, life support systems and controlled environments, safety equipment, exobiology and extraterrestrial life, and flight crew behavior and performance
    • …
    corecore