Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Aerial refueling (1)
- Attacker Model Ontology (1)
- Attacker Modeling (1)
- Augmented reality (1)
- Automotive (1)
-
- Bev (1)
- Computer vision (1)
- Cyber-Physical Systems (1)
- Cyber-physical Systems (1)
- Differential game (1)
- Drive cycle (1)
- Epa (1)
- Fuel economy (1)
- Hev (1)
- Integration Framework (1)
- Learning-based Control (1)
- Machine Learning (1)
- Model Predictive Control (1)
- Model-based Control (1)
- Motion capture (1)
- Network controller (1)
- Optimal control theory (1)
- Optimization (1)
- Security Review Process (1)
- Smart Building Management System (1)
- Torque vectoring (1)
- UAV (1)
- Unmanned aerial vehicles (1)
- Vehicle (1)
Articles 1 - 6 of 6
Full-Text Articles in Engineering
Torque Vectoring To Maximize Straight-Line Efficiency In An All-Electric Vehicle With Independent Rear Motor Control, William Blake Brown
Torque Vectoring To Maximize Straight-Line Efficiency In An All-Electric Vehicle With Independent Rear Motor Control, William Blake Brown
Theses and Dissertations
BEVs are a critical pathway towards achieving energy independence and meeting greenhouse and pollutant gas reduction goals in the current and future transportation sector [1]. Automotive manufacturers are increasingly investing in the refinement of electric vehicles as they are becoming an increasingly popular response to the global need for reduced transportation emissions. Therefore, there is a desire to extract the most fuel economy from a vehicle as possible. Some areas that manufacturers spend much effort on include minimizing the vehicle’s mass, body drag coefficient, and drag within the powertrain. When these values are defined or unchangeable, interest is driven to …
Evaluating Testing Procedures For Openflow Controller Network Re-Provisioning Time, Steven J. Jensen
Evaluating Testing Procedures For Openflow Controller Network Re-Provisioning Time, Steven J. Jensen
Theses and Dissertations
Software-Defined Networking promises several advantages over traditional networking architectures, but has seen little adoption. Recently codified controller evaluation methodologies have seen little validation without strong statistical analysis of the results. The research developed an environment testing implementing a published Network Re-provisioning Time methodology to evaluate five OpenFlow controllers. The methodology is strong with required parameters but had issues with some edge cases. Further refinement and adding a convergence metric may close the gaps.
Optimal Defense Of High Value Airborne Assets, Isaac E. Weintraub
Optimal Defense Of High Value Airborne Assets, Isaac E. Weintraub
Theses and Dissertations
Optimal control theory and differential game theory is applied to the study of the defense of high value airborne assets, particularly in the case of a single threat such as an adversarial aircraft or missile. Rather than utilizing onboard defenses of the high value airborne asset, defense is proposed using a teamed unmanned combat air vehicle. The common scenario throughout this dissertation involves the defense of a high value airborne asset (evader) teamed with an unmanned combat vehicle (defender) against a single threat (pursuer). The unmanned combat air vehicle (defender), provides defense in one of two ways: kinetic or directed …
Using Motion Capture And Augmented Reality To Test Aar With Boom Occlusion, Vincent J. Bownes
Using Motion Capture And Augmented Reality To Test Aar With Boom Occlusion, Vincent J. Bownes
Theses and Dissertations
The operational capability of drones is limited by their inability to perform aerial refueling. This can be overcome by automating the process with a computer vision solution. Previous work has demonstrated the feasibility of automated aerial refueling (AAR) in simulation. To progress this technique to the real world, this thesis conducts experiments using real images of a physical aircraft replica and a motion capture system for truth data. It also compares the error between the real and virtual experiments to validate the fidelity of the simulation. Results indicate that the current technique is effective on real images and that the …
A General Framework For Characterizing And Evaluating Attacker Models For Cps Security Assessment, Christopher S. Deloglos, Christopher Deloglos
A General Framework For Characterizing And Evaluating Attacker Models For Cps Security Assessment, Christopher S. Deloglos, Christopher Deloglos
Theses and Dissertations
Characterizing the attacker’s perspective is essential to assessing the security posture and resilience of cyber-physical systems. The attacker’s perspective is most often achieved by cyber-security experts (e.g., red teams) who critically challenge and analyze the system from an adversarial stance. Unfortunately, the knowledge and experience of cyber-security experts can be inconsistent leading to situations where there are gaps in the security assessment of a given system. Structured security review processes (such as TAM, Mission Aware, STPA-SEC, and STPA-SafeSec) attempt to standardize the review processes to impart consistency across an organization or application domain. However, with most security review processes, the …
Learning-Based Predictive Control Approach For Real-Time Management Of Cyber-Physical Systems, Roja Eini
Learning-Based Predictive Control Approach For Real-Time Management Of Cyber-Physical Systems, Roja Eini
Theses and Dissertations
Cyber-physical systems (CPSs) are composed of heterogeneous, and networked hardware and software components tightly integrated with physical elements [72]. Large-scale CPSs are composed of complex components, subject to uncertainties [89], as though their design and development is a challenging task. Achieving reliability and real-time adaptation to changing environments are some of the challenges involved in large-scale CPSs development [51]. Addressing these challenges requires deep insights into control theory and machine learning. This research presents a learning-based control approach for CPSs management, considering their requirements, specifications, and constraints. Model-based control approaches, such as model predictive control (MPC), are proven to be …