
Jeremy StraubNorth Dakota State University | NDSU · Department of Computer Science
Jeremy Straub
Doctor of Philosophy
About
253
Publications
30,311
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,798
Citations
Introduction
Jeremy Straub is an Assistant Professor in the Department of Computer Science at the North Dakota State University. He holds a Ph.D. in Scientific Computing, an M.S. and an M.B.A. and two B.S degrees. Straub’s research spans the gauntlet between technology, commercialization and technology policy. It has recently focused on robotic command and control, aerospace command and 3D printing quality assurance. Straub is a member of Sigma Xi, the AAAS, the AIAA, SPIE and other technical societies.
Publications
Publications (253)
Intentionally deceptive online content represents a significant issue for society. Multiple techniques have been proposed to identify and combat its spread. To understand how to inform individuals most effectively about the potential biases of and other issues with content, this article studies factors that impact the perception of online content....
Online content is consumed by most Americans and is a primary source of their news information. It impacts millions’ perception of the world around them. Problematically, individuals who seek to deceive or manipulate the public can use targeted online content to do so and this content is readily consumed and believed by many. The use of labeling as...
Machine learning systems offer the key capability to learn about their operating environment from the data that they are supplied. They can learn via supervised and unsupervised training, from system results during operations, or both. However, while machine learning systems can identify solutions to problems and questions, in many cases they canno...
Deceptive online content represents a potentially severe threat to society. This content has shown to have the capability to manipulate individuals’ beliefs, voting and activities. It is a demonstrably effective way for foreign adversaries to create domestic strife in open societies. It is also, by virtue of the magnitude of content, very difficult...
Artificial intelligence techniques, such as particle swarm optimization, are used to solve problems throughout society. Optimization, in particular, seeks to identify the best possible decision within a search space. Problematically, particle swarm optimization will sometimes have particles that become trapped inside local minima, preventing them f...
Online content trustworthiness has become a topic of significant interest due to the growth of so-called ‘fake news’ and other deceptive online content. Deceptive content has been responsible for an armed standoff, caused mistrust surrounding elections and reduced the trust in media, generally. Modern society, though, depends on the ability to shar...
Americans are pervasively exposed to social media, news, and online content. Some of this content is designed to be deliberately deceptive and manipulative. However, it is interspersed amongst other content from friends and family, advertising, and legitimate news. Filtering content violates key societal values of freedom of expression and inquiry....
Intentionally deceptive online content seeks to manipulate individuals in their roles as voters, consumers, and participants in society at large. While this problem is pronounced, techniques to combat it may exist. To analyze the problem and potential solutions, we conducted three surveys relating to how news consumption decisions are made and the...
Quantum computing technology has demonstrated the potential to outperform classical computing systems in a variety of different areas. Worldwide, research within the past decade has included the development of quantum computing systems for key national security-related areas such as encryption, machine learning, and simulation. While some pursue qu...
Software‐based expert systems typically use an iterative algorithm for rule‐fact network processing. However, other approaches to expert system implementation also exist. This paper proposes simplified quantum principle expert systems and compares the computational efficiency and comparative efficacy of four types of expert systems: software‐based...
Fake news is prevalent in society. A variety of methods have been used in an attempt to mitigate the spread of misinformation and fake news ranging from using machine learning to detect fake news to paying fact checkers to manually fact check media to ensure its accuracy. In this paper, three studies were conducted at two universities with differen...
This paper considers the use of a post metadata-based approach to identifying intentionally deceptive online content. It presents the use of an inherently explainable artificial intelligence technique, which utilizes machine learning to train an expert system, for this purpose. It considers the role of three factors (textual context, speaker backgr...
This software is used to build, train and present data for evaluation by a gradient descent training expert system (GDES). A GDES uses a machine learning training method, gradient descent, in a manner similar to a neural network; however, instead of a multi-layer network of densely connected nodes, it uses a known-meaning rule-fact network. Thus, t...
The use of gradient descent training to optimize the performance of a rule-fact network expert system via updating the network’s rule weightings was previously demonstrated. Along with this, four training techniques were proposed: two used a single path for optimization and two use multiple paths. The performance of the single path techniques was p...
This paper presents two studies that use a machine learning expert system (MLES). One focuses on a system to advise to United States federal judges for regarding consistent federal criminal sentencing, based on both the federal sentencing guidelines and offender characteristics. The other study aims to develop a system that could prospectively assi...
Expert systems have been used to enable computers to make recommendations and decisions. This paper presents the use of a machine learning trained expert system (MLES) for phishing site detection and fake news detection. Both topics share a similar goal: to design a rule-fact network that allows a computer to make explainable decisions like domain...
A method is proposed for generating application domain agnostic data for training and evaluating machine learning systems. The proposed method randomly generates an expert system network based upon user specified parameters. This expert system serves as a generic model of an unspecified phenomena. The expert system is run to determine the ideal out...
Artificial intelligence systems, which are designed with a capability to learn from the data presented to them, are used throughout society. These systems are used to screen loan applicants, make sentencing recommendations for criminal defendants, scan social media posts for disallowed content and more. Because these systems do not assign meaning t...
Quantum computing is poised to dramatically change the computational landscape, worldwide. Quantum computers can solve complex problems that are, at least in some cases, beyond the ability of even advanced future classical-style computers. In addition to being able to solve these classical computer-unsolvable problems, quantum computers have demons...
So-called ‘fake news’—deceptive online content that attempts to manipulate readers—is a growing problem. A tool of intelligence agencies, scammers and marketers alike, it has been blamed for election interference, public confusion and other issues in the United States and beyond. This problem is made particularly pronounced as younger generations c...
Despite not having a clear meaning, public perception and awareness makes the term cyber Pearl Harbor an important part of the public discourse. This paper considers what the term has meant and proposes its decomposition based on three different aspects of the historical Pearl Harbor attack, allowing the lessons from Pearl Harbor to be applied to t...
Body area networks are growing in use and complexity, with many individuals carrying around several devices that have interconnection capabilities. Devices may offer internet connectivity, storage, media recording and playback, image or audio capture, and numerous other capabilities. Some may house recently captured data; others may house users’ ol...
Despite not having a clear meaning, public perception and awareness makes the term cyber Pearl Harbor an important part of the public discourse. This paper considers what the term has meant and proposes its decomposition based on three different aspects of the historical Pearl Harbor attack, allowing the lessons from Pearl Harbor to be applied to t...
Artificial intelligence systems, which are designed with a capability to learn from the data presented to them, are used throughout society. These systems are used to screen loan applicants, make sentencing recommendations for criminal defendants, scan social media posts for disallowed content and more. Because these systems don't assign meaning to...
Self-replicating robot systems (SRRSs) are a new prospective paradigm for robotic exploration. They can potentially facilitate lower mission costs and enhance mission capabilities by allowing some materials, which are needed for robotic system construction, to be collected in situ and used for robot fabrication. The use of a self-replicating robot...
Facial recognition is made more difficult by unusual facial positions and movement. However, for many applications, the ability to accurately recognize moving subjects with movement-distorted facial features is required. This dataset includes videos of multiple subjects, taken under multiple lighting brightness and temperature conditions, which can...
Mutual assured destruction is a key deterrent against the use of the most powerful weapons. The threat of it successfully prevented the deployment of a nuclear weapon during and since the United States versus Soviet Union Cold War. It has also prevented the escalation to total warfare scenarios (where countries fully deploy their arsenals and capab...
Developing cyber-physical systems such as CubeSats requires dynamic engagements of stakeholders, developers, tester, analysts, and project managers. With their different backgrounds, the technicality of analyzing functional and nonfunctional requirements may lead to miscommunication between groups. Thus, applying requirements modeling language (RML...
CubeSats are widely used by universities and research institutions all over the world. Their popularity is generally attributed to the use of low-cost components, free student labor and simple design. They have been shown to encourage Science, Technology, Engineering and Math (STEM) students to become involved in designing, implementing and testing...
Facial recognition, as well as other types of human recognition, have found uses in identification, security, and learning about behavior, among other uses. Because of the high cost of data collection for training purposes, logistical challenges and other impediments, mirroring images has frequently been used to increase the size of data sets. Howe...
Today more than ever, computer science students with actionable security skills are in high demand and this requirement is not expected to change in the near future [1]. Schools that provide traditional computer science education programs do a satisfactory job of exposing students to cybersecurity principles and some schools small labs that provide...
There are multiple technological ways to identify humans and verify claimed identities. The dataset presented herein facilitates work on hard and soft biometric human identification and identity verification. It is comprised of full-body images of multiple fully clothed males from a constrained age range. The images have been taken from multiple pe...
Facial and other human recognition techniques are being used for a growing number of applications, ranging from device security to surveillance video identification to forensics. Data sets are required to test recognitions algorithms. This data set facilitates the evaluation of the impact of multiple factors on algorithm performance. The data set i...
This paper presents a decentralized method for autonomously directing the movement of troops or battlefield robots from areas where their capabilities are being underutilized to areas where they are needed. This technique, which relies on limited message passing, does not require a centralized controller and is thus well suited to the battlefield e...
Journal of Cybersecurity and Privacy is critical to society at large, and its importance is growing daily. The rapid advancement in technology has caused a large-scale integration of computing, communication, and information technologies into virtually every aspect of our modern society[...]
Space missions frequently carry equipment that must be accurately pointed toward remote targets. Therefore, effective attitude control is a vital part of almost every class of spacecraft. The component that governs the spacecraft’s rotational motion and pointing is the attitude determination and control system (ADCS). Due to the potentially unpredi...
In the case of a medical emergency such as an out-of-hospital cardiac arrest, the chances of a person's survival decrease rapidly if they are not attended to immediately. Modern hospitals are well equipped to deal with such a situation; however, an ambulance may get stuck in traffic and it may take responders time to reach locations deep within a b...
Self-replicating robots represent a new area for prospective advancement in robotics. A self-replicating robot can identify when additional robots are needed to solve a problem or meet user needs, and create them in response to this identified need. This allows robotic systems to respond to changing (or non-predicted) mission needs. Being able to m...
The OpenOrbiter CubeSat Development Initiative is working to build a small spacecraft system using open source software and open hardware principles. Some important design considerations for the CubeSat are nonfunctional requirements. The key contribution of this work is presenting the design of a requirement engineering tool that can be used to sp...
The availability of low-cost, high-performance miniaturized electronics, and rocket ride-share capabilities and other factors, have generated a significant increase in the development of small spacecraft. Over a hundred entities and thousands of individuals are now working on numerous small satellites. However, these entities and individuals lack t...
The blackboard architecture has particular utility in applications where conclusions must be drawn in the absence of human involvement. Through properly crafted rules, this approach can determine what a collection of data may mean. This can be utilized by other onboard software to limit transmission to only relevant data or conclusions. Some applic...
This paper proposes a novel incremental modification to the Local Outlier Probabilities algorithm, which is commonly used for anomaly detection, to allow it to detect outliers nearly instantly in data streams. The proposed incremental algorithm’s strength is based on denying the insertion of incremental points into the data set. This precludes the...
This paper discusses the automation of quality assurance and produced part testing for additive manufacturing systems. The process of identifying defects, determining their impact and potentially taking corrective action is discussed. Algorithms for this purposes are presented. Examples of assessment are considered. The correction of both incidenta...
This article presents a multi-goal solver for problems that can be modeled using a Blackboard Architecture. The Blackboard Architecture can be used for data fusion, robotic control and other applications. It combines the rule-based problem analysis of an expert system with a mechanism for interacting with its operating environment. In this context,...
An architecture for distributed decision making and command / control, which is based on an extrapolation of the Blackboard architectural style, is presented. The proposed architecture utilizes boundary rules as connection / coordination points between multiple blackboards, allowing a distributed knowledge base to span multiple physical systems, wh...
This paper considers the efficacy of 3D scanning and printing technologies to produce duplicate keys. Duplication of keys, based on remote-sensed data represents a significant security threat, as it removes pathways to determining who illicitly gained access to a secured premises. Key to understanding the threat posed is the characterization of the...
Three-dimensional printing and scanning can be used to replicate keys. This is problematic due to the vast number of keyed locks installed and the effort required to convert these to a more resistant technology. This paper considers whether certain types of keys / locks may be more resistant to 3D scanning and printing. Data is collected and analyz...
Previous work has used visible light scanning to detect and characterize defects in 3D printed objects. This paper focuses on assessing the internal structures and external surfaces (that will be later hidden) of complex objects. These features make in-process defect detection far more important than it would be with an object that can be fully ass...
The illicit production of 3D printed keys based on remote-sensed imagery is problematic as it allows a would-be intruder to access a secured facility without the attack attempt being as obviously detectable as conventional techniques. This paper considers the problem from multiple perspectives. First, it looks at different attack types and consider...
Possession of a working 3D printed key can, for most practical purposes, convince observers that an illicit attempt to gain premises access is authorized. This paper seeks to assess three things. First, work has been performed to determine how easily the data for making models of keys can be obtained through manual measurement. It then presents wor...
This paper considers the efficacy of 3D scanning and printing technologies to produce duplicate keys. Duplication of keys, based on remote-sensed data represents a significant security threat, as it removes pathways to determining who illicitly gained access to a secured premises. Key to understanding the threat posed is the characterization of the...
This paper provides an overview of the capability of a 3D printer to successfully operate in-space to create structures and equipment useful in the field of scientific remote sensing. Applications of this printer involve oceanography, weather tracking, as well as space exploration sensing. The design for the 3D printer includes a parabolic array to...
Quality control is critical to manufacturing. Frequently, techniques are used to define object conformity bounds, based on historical quality data. This paper considers techniques for bespoke and small batch jobs that are not statistical model based. These techniques also serve jobs where 100% validation is needed due to the mission or safety criti...
Large spacecraft missions have both technical and financial needs. Technical needs drive the inclusion of numerous subsystems, which must be configured or deployed. Financial needs, for many spacecraft, are filled through generating public support, which is enhanced by being able to show the spacecraft in operation. This paper presents DeSCJOB, a s...
The illicit creation of 3D printed keys is problematic as it can allow intruders nearly undetectable access to secure facilities. Prior work has discussed how keys can be created using visible light sensing. This paper builds on this work by evaluating the utility of keys produced with laser scanning. The quality of the model produced using a struc...
This paper provides an overview of an aerial 3D printing technology, its development and its testing. This technology is potentially useful in its own right. In addition, this work advances the development of a related in-space 3D printing technology. A series of aerial 3D printing test missions, used to test the aerial printing technology, are dis...
This paper presents work on the development of Origami-style solar panels and their adaption and efficacy for use in Earth orbit. It focuses on the enabling capability of this technology for the generation and transmission of power. The proposed approach provides increased collection (solar panel) and transmission (microwave radiation) surface area...
This paper evaluates use of solar flux concentrator systems with photovoltaic cells, it provides analysis on overall economic feasibility based on cost/benefit considerations. Properties evaluated include launch volume/mass, efficiency once in a functioning configuration and service life. Production time will also be discussed considering research...