Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Engineering

Six-Degree-Of-Freedom Optimal Feedback Control Of Pinpoint Landing Using Deep Neural Networks, Omkar S. Mulekar, Hancheol Cho, Riccardo Bevilacqua Nov 2023

Six-Degree-Of-Freedom Optimal Feedback Control Of Pinpoint Landing Using Deep Neural Networks, Omkar S. Mulekar, Hancheol Cho, Riccardo Bevilacqua

Student Works

Machine learning regression techniques have shown success at feedback control to perform near-optimal pinpoint landings for low fidelity formulations (e.g. 3 degree-of-freedom). Trajectories from these low-fidelity landing formulations have been used in imitation learning techniques to train deep neural network policies to replicate these optimal landings in closed loop. This study details the development of a near-optimal, neural network feedback controller for a 6 degree-of-freedom pinpoint landing system. To model disturbances, the problem is cast as either a multi-phase optimal control problem or a triple single-phase optimal control problem to generate examples of optimal control through the presence of disturbances. …


Stability Of Deep Neural Networks For Feedback-Optimal Pinpoint Landings, Omkar S. Mulekar, Hancheol Cho, Riccardo Bevilacqua Oct 2023

Stability Of Deep Neural Networks For Feedback-Optimal Pinpoint Landings, Omkar S. Mulekar, Hancheol Cho, Riccardo Bevilacqua

Student Works

The ability to certify systems driven by neural networks is crucial for future rollouts of machine learning technologies in aerospace applications. In this study, the neural networks are used to represent a fuel-optimal feedback controller for two different 3-degree-of-freedom pinpoint landing problems. It is shown that the standard sum-ofsquares Lyapunov candidate is too restrictive to assess the stability of systems with fuel-optimal control profiles. Instead, a parametric Lyapunov candidate (i.e. a neural network) can be trained to sufficiently evaluate the closed-loop stability of fuel-optimal control profiles. Then, a stability-constrained imitation learning method is applied, which simultaneously trains a neural network …


Alternatives To Reducing Aviation Fuel-Burn With Technology: Fully Electric Autonomous Taxibot, Denzil Neo Jan 2023

Alternatives To Reducing Aviation Fuel-Burn With Technology: Fully Electric Autonomous Taxibot, Denzil Neo

Student Works

Aircraft taxiing operations in the aerodrome were identified to consume the most jet fuel apart from the cruise phase of the flight. This was also well supported by various research associating taxi operations at large, congested airports, with high jet fuel consumption, high carbon emissions, and noise pollution. Existing literature recognised the potential to address the environmental issues of aerodrome taxi operations by operating External or Onboard Aircraft Ground Propulsion Systems (AGPS). Designed to power aircraft with sources other than their main engines, external Aircraft Ground Power Systems (AGPS) have shown the potential to significantly cut jet fuel consumption and …


Certification Basis For A Fully Autonomous Uncrewed Passenger Carrying Urban Air Mobility Aircraft, Steve Price Dec 2022

Certification Basis For A Fully Autonomous Uncrewed Passenger Carrying Urban Air Mobility Aircraft, Steve Price

Student Works

The Urban Air Mobility campaign has set a goal to efficiently transport passengers and cargo in urban areas of operation with autonomous aircraft. This concept of operations will require aircraft to utilize technology that currently does not have clear regulatory requirements. This report contains a comprehensive analysis and creation of a certification basis for a fully autonomous uncrewed passenger carrying rotorcraft for use in Urban Air Mobility certified under Title 14 Code of Federal Regulations Part 27. Part 27 was first analyzed to determine the applicability of current regulations. The fully electric propulsion system and fully autonomous flight control system …


Automated Dynamic Detection Of Self-Hiding Behaviors, Luke Baird Nov 2019

Automated Dynamic Detection Of Self-Hiding Behaviors, Luke Baird

Student Works

Certain Android applications, such as but not limited to malware, conceal their presence from the user, exhibiting a self-hiding behavior. Consequently, these apps put the user’s security and privacy at risk by performing tasks without the user’s awareness. Static analysis has been used to analyze apps for self-hiding behavior, but this approach is prone to false positives and suffers from code obfuscation. This research proposes a set of three tools utilizing a dynamic analysis method of detecting self-hiding behavior of an app in the home, installed, and running application lists on an Android emulator. Our approach proves both highly accurate …


Automated Dynamic Detection Of Self-Hiding Behavior In Android Apps, Luke Baird, Seth Rodgers Oct 2019

Automated Dynamic Detection Of Self-Hiding Behavior In Android Apps, Luke Baird, Seth Rodgers

Student Works

Android applications that conceal themselves from a user, defined as exhibiting a “self-hiding behavior,” pose a threat to the user’s privacy, as these applications can live on a device undetected by the user. Malicious applications can do this to execute without being found by the user. Three lists are analyzed in particular—the home, running, and installed lists—as they are directly related to the typical Android app life cycle. Additionally, self-hiding behavior in the device admin list is analyzed due to the potential for catastrophic actions to be taken by device admin malware. This research proposes four dynamic analysis tools that …


Simple Implementation Of An Elgamal Digital Signature And A Brute Force Attack On It, Valeriia Laryoshyna Oct 2017

Simple Implementation Of An Elgamal Digital Signature And A Brute Force Attack On It, Valeriia Laryoshyna

Student Works

This study is an attempt to show a basic mathematical usage of the concepts behind digital signatures and to provide a simple approach and understanding to cracking basic digital signatures. The approach takes on simple C programming of the ElGamal digital signature to identify some limits that can be encountered and provide considerations for making more complex code. Additionally, there is a literature review of the ElGamal digital signature and the brute force attack.

The research component of this project provides a list of possible ways to crack the basic implementations and classifies the different approaches that could be taken …


Survey Of Branch Prediction, Pipelining, Memory Systems As Related To Computer Architecture, Kristina Landen Apr 2017

Survey Of Branch Prediction, Pipelining, Memory Systems As Related To Computer Architecture, Kristina Landen

Student Works

This paper is a survey of topics introduced in Computer Engineering Course CEC470: Computer Architecture (CEC470). The topics covered in this paper provide much more depth than what was provided in CEC470, in addition to exploring new concepts not touched on in the course. Topics presented include branch prediction, pipelining, registers, memory, and the operating system, as well as some general design considerations for computer architecture as a whole.

The design considerations explored include a discussion on different types of instruction types specific to the ARM Instruction Set Architecture, known as ARM and Thumb, as well as an exploration of …


Project Daedalus: An Additive Manufacturing Vending Machine, Paul A. Galarnyk, Roxanna Stein, Priscilla Mcdonald, Sky Comarsh White, Matthew Caixeiro, Alexander Seifans, Chris Hays, Benjamin Sallick, Katherine Mcbrayer, Skyler Singleton, Scott Wt Kent Sep 2016

Project Daedalus: An Additive Manufacturing Vending Machine, Paul A. Galarnyk, Roxanna Stein, Priscilla Mcdonald, Sky Comarsh White, Matthew Caixeiro, Alexander Seifans, Chris Hays, Benjamin Sallick, Katherine Mcbrayer, Skyler Singleton, Scott Wt Kent

Student Works

The project was a research endeavor focused on designing and building a vending machine for 3D-printed parts. It also had the secondary objective of catalyzing leadership qualities among its membership by emphasizing individual responsibility and forward thinking. The project began in the spring of 2015, when the topic of autonomous 3D-printing was chosen, funding was secured, and the majority of the leadership was brought on. Over the summer and into the fall semester the team developed project requirements and infrastructure, and gathered members from the parent organization. By December of 2015 most of the machine design had been completed, and …