201 research outputs found

    EMMA: The expert system for munition maintenance

    Get PDF
    Expert Missile Maintenance Aid (EMMA) is a first attempt to enhance maintenance of the tactical munition at the field and depot level by using artificial intelligence (AI) techniques. The ultimate goal of EMMA is to help a novice maintenance technician isolate and diagnose electronic, electromechanical, and mechanical equipment faults to the board/chassis level more quickly and consistently than the best human expert using the best currently available automatic test equipment (ATE). To this end, EMMA augments existing ATE with an expert system that captures the knowledge of design and maintenance experts. The EMMA program is described, including the evaluation of field-level expert system prototypes, the description of several study tasks performed during EMMA, and future plans for a follow-on program. This paper will briefly address several study tasks performed during EMMA. The paper concludes with a discussion of future plans for a follow-on program and other areas of concern

    Unsupervised Time Series Extraction from Controller Area Network Payloads

    Full text link
    This paper introduces a method for unsupervised tokenization of Controller Area Network (CAN) data payloads using bit level transition analysis and a greedy grouping strategy. The primary goal of this proposal is to extract individual time series which have been concatenated together before transmission onto a vehicle's CAN bus. This process is necessary because the documentation for how to properly extract data from a network may not always be available; passenger vehicle CAN configurations are protected as trade secrets. At least one major manufacturer has also been found to deliberately misconfigure their documented extraction methods. Thus, this proposal serves as a critical enabler for robust third-party security auditing and intrusion detection systems which do not rely on manufacturers sharing confidential information.Comment: 2018 IEEE 88th Vehicular Technology Conference (VTC2018-Fall

    Maximizing The Value Of Your Small Business

    Get PDF
    This paper offers business owners a step-by-step valuation process for establishing the fair market value of their firms and stresses the importance of preparing for the due diligence process

    Security Analysis of the Masimo MightySat: Data Leakage to a Nosy Neighbor

    Get PDF
    Embedded technology known as the Internet of Things (IoT) has been integrated into everyday life, from the home, to the farm, industry, enterprise, the battlefield, and even for medical devices. With the increased use of networked devices comes an increased attack surface for malicious actors to gather and inject data, putting the privacy of users at risk. This research considers the Masimo MightySat fingertip pulse oximeter and the companion Masimo Professional Health app from a security standpoint, analyzing the Bluetooth Low Energy (BLE) communication from the device to the application and the data leakage between the two. It is found that with some analysis of a personally owned Masimo MightySat Rx through the use of an Ubertooth BLE traffic sniffer, static analysis of the HCI\_snoop.log and application data, and dynamic analysis of the app, data could be reasonably captured for another MightySat and interpret it to learn user health data

    The Role Of Due Diligence In The Business Valuation Process

    Get PDF
    The due diligence process enables investors to do a better job of determining the appropriate price to pay for a privately held firm.  This article delineates some factors that a prospective buyer should investigate thoroughly to determine the value of a small, privately held business under consideration for purchase

    Pedagogical Strategies For Incorporating Behavioral Finance Concepts In Investment Courses

    Get PDF
    The traditional approach to teaching a course in investments is predicated upon the efficient market hypothesis, modern portfolio theory, and the assumption that decision-makers are rational, wealth optimizing entities.  Recent developments in the arena of behavioral finance (BF) have raised questions about this approach. Although the idea of efficient markets is widely accepted in academic circles, financial markets often fail to behave as predicted by the theory. For the teacher of undergraduate investments, these divergent views create significant pedagogical challenges and opportunities. BF has particular implications for investing in financial markets, where the faith in rational behavior is perhaps the greatest.  This paper identifies alternative strategies for dealing with these issues in the classroom

    A research methodology for characterising dairy product consumption systems

    Get PDF
    This document on characterisation methodology specifically refers to the dairy consumption systems. The methodology developed and presented herein aims at guiding the activities of scientists who wish to investigate the dairy consumption systems at or around a specific site. Some characterisation of dairy product consumption has been conducted at most ILCA zonal sites. Pursued by different scientists at different times and places, a variety of methodological approaches have been employed in conducting these studies. This document is based upon ILCA's experiences at its zonal sites and incorporates the methodological lessons learned in the course of the studies. The steps that have been followed in constructing the conceptual framework instruments and in specifying the analytical methods are outlined. Data collected and analysed following this format will allow drawing conclusions about a particular location and its consumption system. It will also facilitate planning future research and development activities

    Structured P2P Technologies for Distributed Command and Control

    Get PDF
    The utility of Peer-to-Peer (P2P) systems extends far beyond traditional file sharing. This paper provides an overview of how P2P systems are capable of providing robust command and control for Distributed Multi-Agent Systems (DMASs). Specifically, this article presents the evolution of P2P architectures to date by discussing supporting technologies and applicability of each generation of P2P systems. It provides a detailed survey of fundamental design approaches found in modern large-scale P2P systems highlighting design considerations for building and deploying scalable P2P applications. The survey includes unstructured P2P systems, content retrieval systems, communications structured P2P systems, flat structured P2P systems and finally Hierarchical Peer-to-Peer (HP2P) overlays. It concludes with a presentation of design tradeoffs and opportunities for future research into P2P overlay systems

    RC-Chord: Resource Clustering in a Large-Scale Hierarchical Peer-to-Peer System

    Get PDF
    Conducting data fusion and Command and Control (C2) in large-scale systems requires more than the presently available Peer-to-Peer (P2P) technologies provide. Resource Clustered Chord (RC-Chord) is an extension to the Chord protocol that incorporates elements of a hierarchical peer-to-peer architecture to facilitate coalition formation algorithms in large-scale systems. Each cluster in this hierarchy represents a particular resource available for allocation, and RC-Chord provides the capabilities to locate agents of a particular resource. This approach improves upon other strategies by including support for abundant resources, or those resources that most or all agents in the system possess. This scenario exists in large-scale coalition formation problems, and applies directly to the United States Air Force\u27s CyberCraft project. Simulations demonstrate that RC-Chord scales to systems of one million or more agents, and can be adapted to serve as a deployment environment for CyberCraft

    Large-scale Cooperative Task Distribution on Peer-to-Peer Networks

    Get PDF
    Large-scale systems are part of a growing trend in distributed computing, and coordinating control of them is an increasing challenge. This paper presents a cooperative agent system that scales to one million or more nodes in which agents form coalitions to complete global task objectives. This approach uses the large-scale Command and Control (C2) capabilities of the Resource Clustered Chord (RC-Chord) Hierarchical Peer-to-Peer (HP2P) design. Tasks are submitted that require access to processing, data, or hardware resources, and a distributed agent search is performed to recruit agents to satisfy the distributed task. This approach differs from others by incorporating design elements to accommodate large-scale systems into the resource location algorithm. Peersim simulations demonstrate that the distributed coalition formation algorithm is as effective as an omnipotent central algorithm in a one million agent system
    corecore