In the past two decades, the interest in network analysis has expanded rapidly. Most network analysis methods start from observed network topology. However, network structure is not directly observed in many fields, ...
In this work non-destructive x-ray characterization techniques have been used to study undoped and intentionally doped bulk and epitaxial layers, and device structures of wide bandgap semiconductor materials, GaN and SiC. ...
Unsupervised learning is an important topic in machine learning. In particular, clustering
is an unsupervised learning problem that arises in a variety of applications for data analysis
and mining. Unfortunately, clustering ...
The dimensional scaling of microelectronics to increase the ability of central process unit (CPU) is facing fundamental and physical challenges. The integration of high-performance non-volatile memory as the local memory ...
The RSA cryptosystem has been the mainstay of modern cryptography since it was first
introduced in 1978. RSA serves as the basis for securing modern e-commerce–it functions as
the primary key exchange mechanism for the ...
Integrating and synchronizing the effects of functional components is an important military principle. This is true across all types of military operations. Currently, functional component planning is often separated into ...
In this thesis we investigate the maximal layers of random partial orders. Main contributions
are two-fold. In the first half we investigate the expected size of different maximal
layers of a random partial order. In ...
A goal of an agile organization is the ability to adapt its structure to constantly
changing operating environments so it can provide the multiple capabilities that enable
mission accomplishment. A challenge for the ...
From a national defense, as well as a civilian infrastructure perspective, a need exists to design and develop systems resilient to disruption. Systems able to survive and recover from disruption are referred to as resilient. ...
Models, created using different modeling techniques, usually serve different purposes and provide unique insights. While each modeling technique might be capable of answering specific questions, complex problems require ...
The scarcity of radio spectrum poses a significant challenge to the sustained growth
of wireless communications, since most of the useful radio spectrum is already allocated
for licensed users. However, recent spectrum ...
This dissertation describes the non-destructive optical characterization of
undoped/doped GaN and SiC bulk crystals and epitaxial layers. These materials have
applications for optoelectronic devices that are operational ...
This dissertation develops efficient algorithms, in theory and in implementation, for selecting, via simulation, the best design, or system, from a set of designs, where “best” is the design with the smallest probability ...
Internet of things (IoT) is being developed for a wide range of applications from home
automation and personal fitness, to smart cities. With the extensive growth in adaptation of
IoT devices, comes the uncoordinated and ...
Too often in the real world information from multiple sources such as humans, experts, agents, or classifiers need to be integrated to provide support for a decision making system. One popular approach in machine learning ...
Current military forces are developing, purchasing, and fielding tactical wideband radios capable of connecting wirelessly to each other to form a mobile ad-hoc network (MANET), an autonomous communications system where ...
For decades transportation legislation actions have demonstrated the desire to plan, design and operate multi-modal surface transportation systems (National Complete Streets Coalition [NCSC], 2009). The push for multi-modal ...
Recently cooperative communications has gained considerable attention in research due to multi-path fading mitigation ability through spatial diversity while providing flexibility. In cooperative communication protocols, ...
Analysis and recreation of brain dynamics has been identified as one of the greatest scientific challenge of this century. Detection of electrical impulses in the brain was the first step towards understanding how it ...
A consistent challenge to the widespread use public key cryptosystems, such as
RSA, is the computational difficulty of performing arithmetic operations with large
operands. There are many branches of mathematics and ...