Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Engineering

Torque Vectoring To Maximize Straight-Line Efficiency In An All-Electric Vehicle With Independent Rear Motor Control, William Blake Brown Dec 2021

Torque Vectoring To Maximize Straight-Line Efficiency In An All-Electric Vehicle With Independent Rear Motor Control, William Blake Brown

Theses and Dissertations

BEVs are a critical pathway towards achieving energy independence and meeting greenhouse and pollutant gas reduction goals in the current and future transportation sector [1]. Automotive manufacturers are increasingly investing in the refinement of electric vehicles as they are becoming an increasingly popular response to the global need for reduced transportation emissions. Therefore, there is a desire to extract the most fuel economy from a vehicle as possible. Some areas that manufacturers spend much effort on include minimizing the vehicle’s mass, body drag coefficient, and drag within the powertrain. When these values are defined or unchangeable, interest is driven to …


Evaluating Testing Procedures For Openflow Controller Network Re-Provisioning Time, Steven J. Jensen Sep 2021

Evaluating Testing Procedures For Openflow Controller Network Re-Provisioning Time, Steven J. Jensen

Theses and Dissertations

Software-Defined Networking promises several advantages over traditional networking architectures, but has seen little adoption. Recently codified controller evaluation methodologies have seen little validation without strong statistical analysis of the results. The research developed an environment testing implementing a published Network Re-provisioning Time methodology to evaluate five OpenFlow controllers. The methodology is strong with required parameters but had issues with some edge cases. Further refinement and adding a convergence metric may close the gaps.


Optimal Defense Of High Value Airborne Assets, Isaac E. Weintraub Mar 2021

Optimal Defense Of High Value Airborne Assets, Isaac E. Weintraub

Theses and Dissertations

Optimal control theory and differential game theory is applied to the study of the defense of high value airborne assets, particularly in the case of a single threat such as an adversarial aircraft or missile. Rather than utilizing onboard defenses of the high value airborne asset, defense is proposed using a teamed unmanned combat air vehicle. The common scenario throughout this dissertation involves the defense of a high value airborne asset (evader) teamed with an unmanned combat vehicle (defender) against a single threat (pursuer). The unmanned combat air vehicle (defender), provides defense in one of two ways: kinetic or directed …


Using Motion Capture And Augmented Reality To Test Aar With Boom Occlusion, Vincent J. Bownes Mar 2021

Using Motion Capture And Augmented Reality To Test Aar With Boom Occlusion, Vincent J. Bownes

Theses and Dissertations

The operational capability of drones is limited by their inability to perform aerial refueling. This can be overcome by automating the process with a computer vision solution. Previous work has demonstrated the feasibility of automated aerial refueling (AAR) in simulation. To progress this technique to the real world, this thesis conducts experiments using real images of a physical aircraft replica and a motion capture system for truth data. It also compares the error between the real and virtual experiments to validate the fidelity of the simulation. Results indicate that the current technique is effective on real images and that the …


A General Framework For Characterizing And Evaluating Attacker Models For Cps Security Assessment, Christopher S. Deloglos, Christopher Deloglos Jan 2021

A General Framework For Characterizing And Evaluating Attacker Models For Cps Security Assessment, Christopher S. Deloglos, Christopher Deloglos

Theses and Dissertations

Characterizing the attacker’s perspective is essential to assessing the security posture and resilience of cyber-physical systems. The attacker’s perspective is most often achieved by cyber-security experts (e.g., red teams) who critically challenge and analyze the system from an adversarial stance. Unfortunately, the knowledge and experience of cyber-security experts can be inconsistent leading to situations where there are gaps in the security assessment of a given system. Structured security review processes (such as TAM, Mission Aware, STPA-SEC, and STPA-SafeSec) attempt to standardize the review processes to impart consistency across an organization or application domain. However, with most security review processes, the …


Learning-Based Predictive Control Approach For Real-Time Management Of Cyber-Physical Systems, Roja Eini Jan 2021

Learning-Based Predictive Control Approach For Real-Time Management Of Cyber-Physical Systems, Roja Eini

Theses and Dissertations

Cyber-physical systems (CPSs) are composed of heterogeneous, and networked hardware and software components tightly integrated with physical elements [72]. Large-scale CPSs are composed of complex components, subject to uncertainties [89], as though their design and development is a challenging task. Achieving reliability and real-time adaptation to changing environments are some of the challenges involved in large-scale CPSs development [51]. Addressing these challenges requires deep insights into control theory and machine learning. This research presents a learning-based control approach for CPSs management, considering their requirements, specifications, and constraints. Model-based control approaches, such as model predictive control (MPC), are proven to be …