9 research outputs found
Recommended from our members
Moving Forward as a Family: Crafting a 2-Generation Strategy for Central Texas, PRP 192
United Way for Greater Austin commissioned this policy research project to guide their focus on helping low socioeconomic families achieve greater financial stability through the development of a Two-Generation (2-Gen) strategy for the Central Texas region. Two-Gen programs emphasize the importance of education as a means for better economic outcomes. High-quality early childhood education programs allow children to make critical neural connections during a period of substantial growth and development, ultimately better preparing them for pre-kindergarten programs and academic success in subsequent years. Adults working low-paying jobs encounter barriers to career advancement due to lacking credentials or relevant education. It is not uncommon for parents working long hours for low wages to have at least one child in need of high-quality early childhood education, yet they are unable to enroll their child in such programs due to issues such as cost, transportation, and time away from work. Two-Gen programs seek to resolve the issues complicating this problem of financial instability by providing high-quality educational and training programs for both parents and children, which are even more effective when intentionally coordinated so that the family develops as a single unit in a positive direction.
The research consisted of a literature review; a program scan at the local, state, and federal levels; and site visits within Austin, Dallas, and San Antonio, as well as Boston and Miami. Data collected specific to the Central Texas region include a labor market analysis, a needs assessment, and a mapping of current organizational assets. Obtaining and analyzing this data allowed the team to better understand 2-Gen program development, outcomes, impact measurements, and areas for improvement.
The research team developed practical applications for the information collected, ultimately contributing to the proposed anti-poverty strategy through the intentional coordination of 2-Gen services by leveraging existing organizational assets to best address the area’s most salient needs. In addition, the team proposed an evaluation strategy involving cost-benefit equations, program evaluation metrics, and a screening tool to predict the likelihood of a program achieving successful outcomes. The report concludes with policy recommendations at the local, state, and federal levels, as well as a summary of the populations affected by financial instability and future directions for this field.United Way for Greater AustinPublic Affair
Interval Kalman Filtering Techniques for Unmanned Surface Vehicle Navigation
In reference to IEEE copyrighted material which is used with permission in this thesis, the IEEE does not endorse any of Plymouth University's products or services. Internal or personal use of this material is permitted. If interested in reprinting/republishing IEEE copyrighted material for advertising or promotional purposes or for creating new collective works for resale or redistribution, please go to http://www.ieee.org/publications_standards/publications/rights/rights_link.html to learn how to obtain a License from RightsLink.This thesis is about a robust filtering method known as the interval Kalman filter (IKF), an extension of the Kalman filter (KF) to the domain of interval mathematics. The key limitation of the KF is that it requires precise knowledge of the system dynamics and associated stochastic processes. In many cases however, system models are at best, only approximately known. To overcome this limitation, the idea is to describe the uncertain model coefficients in terms of bounded intervals, and operate the filter within the framework of interval arithmetic. In trying to do so, practical difficulties arise, such as the large overestimation of the resulting set estimates owing to the over conservatism of interval arithmetic. This thesis proposes and demonstrates a novel and effective way to limit such overestimation for the IKF, making it feasible and practical to implement.
The theory developed is of general application, but is applied in this work to the heading estimation of the Springer unmanned surface vehicle, which up to now relied solely on the estimates from a traditional KF. However, the IKF itself simply provides the range of possible vehicle headings. In practice, the autonomous steering system requires a single, point-valued estimate of the heading. In order to address this requirement, an innovative approach based on the use of machine learning methods to select an adequate point-valued estimate has been developed. In doing so, the so called weighted IKF (wIKF) estimate provides a single heading estimate that is robust to bounded model uncertainty. In addition, in order to exploit low-cost sensor redundancy, a multi-sensor data fusion algorithm compatible with the wIKF estimates and which additionally provides sensor fault tolerance has been developed.
All these techniques have been implemented on the Springer platform and verified experimentally in a series of full-scale trials, presented in the last chapter of the thesis. The outcomes demonstrate that the methods are both feasible and practicable, and that they are far more effective in providing accurate estimates of the vehicle’s heading than the conventional KF when there is uncertainty in the system model and/or sensor failure occurs.EPSR
Emerging AI security threats for autonomous cars
Artificial Intelligence has made a significant contribution to
autonomous vehicles, from object detection to path planning. However, AI models require a large amount of sensitive training data and are usually computationally intensive to build. The commercial value of such models motivates attackers to mount various attacks. Adversaries can launch model extraction attacks for monetization purposes or steppingstone towards other attacks like model evasion. In specific cases, it even results in destroying brand reputation, differentiation, and value proposition. In addition, IP laws and AIrelated legalities are still evolving and are not uniform across countries. We discuss model extraction attacks in detail with two usecases and a generic killchain that can compromise autonomous cars. It is essential to investigate strategies to manage and mitigate the risk of model theft