scispace - formally typeset
Search or ask a question
Author

Kendall E. Nygard

Other affiliations: University of North Dakota
Bio: Kendall E. Nygard is an academic researcher from North Dakota State University. The author has contributed to research in topics: Wireless sensor network & Smart grid. The author has an hindex of 23, co-authored 137 publications receiving 2292 citations. Previous affiliations of Kendall E. Nygard include University of North Dakota.


Papers
More filters
Proceedings Article
01 Jan 2003
TL;DR: This paper presents a technique to identify multiple black holes cooperating with each other and a solution to discover a safe route avoiding cooperative black hole attack.
Abstract: Mobile ad hoc networks (MANETs) are extensively used in military and civilian applications. The dynamic topology of MANETs allows nodes to join and leave the network at any point of time. This generic characteristic of MANET has rendered it vulnerable to security attacks. In this paper, we address the problem of coordinated attack by multiple black holes acting in group. We present a technique to identify multiple black holes cooperating with each other and a solution to discover a safe route avoiding cooperative black hole attack.

274 citations

Proceedings ArticleDOI
08 May 2002
TL;DR: In this paper, the complexity and coupling issues in cooperative decision and control of distributed autonomous unmanned aerial vehicle (UAV) teams are addressed, where team vehicles are allocated to sub-teams using the set partition theory.
Abstract: This paper addresses complexity and coupling issues in cooperative decision and control of distributed autonomous unmanned aerial vehicle (UAV) teams. In particular, the recent results obtained by the inhouse research team are presented. Hierarchical decomposition is implemented where team vehicles are allocated to sub-teams using the set partition theory. Results are presented for single assignment and multiple assignments using the network flow and auction algorithms. Simulation results are presented for wide area search munitions where complexity and coupling are incrementally addressed in the decision system, yielding a radically improved team performance.

174 citations

Journal ArticleDOI
TL;DR: A formal threat-driven approach, which explores explicit behaviors of security threats as the mediator between security goals and applications of security features, can make software design provably secured from anticipated security threats and, thus, reduce significant design-level vulnerabilities.
Abstract: Design-level vulnerabilities are a major source of security risks in software. To improve trustworthiness of software design, this paper presents a formal threat-driven approach, which explores explicit behaviors of security threats as the mediator between security goals and applications of security features. Security threats are potential attacks, i.e., misuses and anomalies that violate the security goals of systems' intended functions. Security threats suggest what, where, and how security features for threat mitigation should be applied. To specify the intended functions, security threats, and threat mitigations of a security design as a whole, we exploit aspect-oriented Petri nets as a unified formalism. Intended functions and security threats are modeled by Petri nets, whereas threat mitigations are modeled by Petri net-based aspects due to the incremental and crosscutting nature of security features. The unified formalism facilitates verifying correctness of security threats against intended functions and verifying absence of security threats from integrated functions and threat mitigations. As a result, our approach can make software design provably secured from anticipated security threats and, thus, reduce significant design-level vulnerabilities. We demonstrate our approach through a systematic case study on the threat-driven modeling and verification of a real-world shopping cart application.

163 citations

Proceedings ArticleDOI
01 May 1991
TL;DR: GIDEON, a genetic algorithm system to heuristically solve the vehicle routing problem with time windows, consists of two distinct modules: a global clustering module that assigns customers to vehicles by a process called genetic sectoring and a local route optimization module (SWITCH-OPT).
Abstract: Addresses the vehicle routing problem with time windows (VRPTW). The VRPTW involves routing a fleet of vehicles, of limited capacity and travel time, from a central depot to a set of geographically dispersed customers with known demands within specified time windows. The authors describe GIDEON, a genetic algorithm system to heuristically solve the VRPTW. GIDEON consists of two distinct modules: a global clustering module that assigns customers to vehicles by a process called genetic sectoring (GENSECT) and a local route optimization module (SWITCH-OPT). On a standard set of 56 VRPTW problems obtained from the literature, GIDEON did better than the alternate methods on 41 of them, with an average reduction of 3.9% in fleet size and 4.4% in distance traveled for the 56 problems. GIDEON took an average of 127 CPU seconds to solve a problem on the Solbourne 5/802 computer. >

145 citations

Proceedings ArticleDOI
25 Jun 2001
TL;DR: A weapon system consisting of a swarm of air vehicles whose mission is to search for, classify, attack, and perform battle damage assessment, is considered, and the periodic reapplication of the centralized optimization algorithm yields the benefit of cooperative feedback control.
Abstract: A weapon system consisting of a swarm of air vehicles whose mission is to search for, classify, attack, and perform battle damage assessment, is considered. It is assumed that the target field information is communicated to all the elements of the swarm as it becomes available. A network flow optimization problem is posed whose readily obtained solution yields the optimum resource allocation among the air vehicles in the swarm. Hence, the periodic reapplication of the centralized optimization algorithm yields the benefit of cooperative feedback control.

141 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis.
Abstract: Machine Learning is the study of methods for programming computers to learn. Computers are applied to a wide range of tasks, and for most of these it is relatively easy for programmers to design and implement the necessary software. However, there are many tasks for which this is difficult or impossible. These can be divided into four general categories. First, there are problems for which there exist no human experts. For example, in modern automated manufacturing facilities, there is a need to predict machine failures before they occur by analyzing sensor readings. Because the machines are new, there are no human experts who can be interviewed by a programmer to provide the knowledge necessary to build a computer system. A machine learning system can study recorded data and subsequent machine failures and learn prediction rules. Second, there are problems where human experts exist, but where they are unable to explain their expertise. This is the case in many perceptual tasks, such as speech recognition, hand-writing recognition, and natural language understanding. Virtually all humans exhibit expert-level abilities on these tasks, but none of them can describe the detailed steps that they follow as they perform them. Fortunately, humans can provide machines with examples of the inputs and correct outputs for these tasks, so machine learning algorithms can learn to map the inputs to the outputs. Third, there are problems where phenomena are changing rapidly. In finance, for example, people would like to predict the future behavior of the stock market, of consumer purchases, or of exchange rates. These behaviors change frequently, so that even if a programmer could construct a good predictive computer program, it would need to be rewritten frequently. A learning program can relieve the programmer of this burden by constantly modifying and tuning a set of learned prediction rules. Fourth, there are applications that need to be customized for each computer user separately. Consider, for example, a program to filter unwanted electronic mail messages. Different users will need different filters. It is unreasonable to expect each user to program his or her own rules, and it is infeasible to provide every user with a software engineer to keep the rules up-to-date. A machine learning system can learn which mail messages the user rejects and maintain the filtering rules automatically. Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis. Statistics focuses on understanding the phenomena that have generated the data, often with the goal of testing different hypotheses about those phenomena. Data mining seeks to find patterns in the data that are understandable by people. Psychological studies of human learning aspire to understand the mechanisms underlying the various learning behaviors exhibited by people (concept learning, skill acquisition, strategy change, etc.).

13,246 citations

01 Jan 2002

9,314 citations

Journal Article
TL;DR: AspectJ as mentioned in this paper is a simple and practical aspect-oriented extension to Java with just a few new constructs, AspectJ provides support for modular implementation of a range of crosscutting concerns.
Abstract: Aspect] is a simple and practical aspect-oriented extension to Java With just a few new constructs, AspectJ provides support for modular implementation of a range of crosscutting concerns. In AspectJ's dynamic join point model, join points are well-defined points in the execution of the program; pointcuts are collections of join points; advice are special method-like constructs that can be attached to pointcuts; and aspects are modular units of crosscutting implementation, comprising pointcuts, advice, and ordinary Java member declarations. AspectJ code is compiled into standard Java bytecode. Simple extensions to existing Java development environments make it possible to browse the crosscutting structure of aspects in the same kind of way as one browses the inheritance structure of classes. Several examples show that AspectJ is powerful, and that programs written using it are easy to understand.

2,947 citations

Journal ArticleDOI
TL;DR: In this paper, the authors survey the literature till 2011 on the enabling technologies for the Smart Grid and explore three major systems, namely the smart infrastructure system, the smart management system, and the smart protection system.
Abstract: The Smart Grid, regarded as the next generation power grid, uses two-way flows of electricity and information to create a widely distributed automated energy delivery network. In this article, we survey the literature till 2011 on the enabling technologies for the Smart Grid. We explore three major systems, namely the smart infrastructure system, the smart management system, and the smart protection system. We also propose possible future directions in each system. colorred{Specifically, for the smart infrastructure system, we explore the smart energy subsystem, the smart information subsystem, and the smart communication subsystem.} For the smart management system, we explore various management objectives, such as improving energy efficiency, profiling demand, maximizing utility, reducing cost, and controlling emission. We also explore various management methods to achieve these objectives. For the smart protection system, we explore various failure protection mechanisms which improve the reliability of the Smart Grid, and explore the security and privacy issues in the Smart Grid.

2,433 citations