Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 20 of 20

Full-Text Articles in Engineering

Validated Question Bank For Assessing Pilot Knowledge Of Aviation Weather Appendix: Weather Product Interpretation Questions, Robert Thomas, Cassandra Dommingo, John Kleber, Jackie Mcsorely, Amber Cole, Thomas Guinn, Elizabeth Blickensderfer Aug 2022

Validated Question Bank For Assessing Pilot Knowledge Of Aviation Weather Appendix: Weather Product Interpretation Questions, Robert Thomas, Cassandra Dommingo, John Kleber, Jackie Mcsorely, Amber Cole, Thomas Guinn, Elizabeth Blickensderfer

General Aviation Weather Display Interpretation

This appendix supplements the Thomas et al. (2022) paper titled “Validated Question Bank for Assessing Pilot Knowledge of Aviation Weather ” which validates a set of weather product interpretation questions that can be used to measure a pilot’s understanding of weather. The assessment consists of 15 weather product interpretation topics which can be administered as a single 65-question survey or, as in the Thomas et al. (2022) study, two assessments of 33 and 32 questions each separated by topic. The set of 65 questions can be found in this appendix along with a table which demonstrates how to separate the …


Predicting The Impact Of Covid-19 On Air Transportation Volumes, Dothang Truong Jun 2022

Predicting The Impact Of Covid-19 On Air Transportation Volumes, Dothang Truong

Publications

COVID-19 has significant impacts on air transportation. This paper aims to predict domestic and international transportation volumes during the pandemic. Daily trips by distance are novel variables in the prediction. Additionally, COVID-19 severity, vaccination, and economic index are other predictors. Artificial Neural Networks and Monte Carlo simulations were used to develop and validate the predictive models using data from various sources in 2021. The findings confirm the importance of daily trips by distance and vaccination as significant predictors. Airlines can use the models to predict air transportation volumes and formulate appropriate strategies to meet the air travel demand and improve …


Let's Get Serious About It: Plastic-Free Campus Initiative, Geoffrey Kain, Camdyn Doucette, Regan Bossie Apr 2022

Let's Get Serious About It: Plastic-Free Campus Initiative, Geoffrey Kain, Camdyn Doucette, Regan Bossie

Sustainability Conference

On February 23, 2022, the UN agreed to start negotiating a world-first global treaty on plastic waste--since nearly 200 nations unanimously agreed to move toward a legally binding plastics treaty by 2024. In 2019 the UN Environmental Programme report highlighted that "our world is drowning in plastic." As with the climate change crisis (to which plastics production and disposal are also linked), the data resoundingly illustrate the imminent systemic threat that disposable plastics pose to the world's seas, freshwater sources, soils, food supply, air, and species. Nevertheless, plastics production is predicted to rise dramatically over the next 20 years, with …


Intention To Complain About Unmanned Aircraft System Noise: A Structural Equation Analysis, Robert Brents Feb 2022

Intention To Complain About Unmanned Aircraft System Noise: A Structural Equation Analysis, Robert Brents

Doctoral Dissertations and Master's Theses

Aircraft noise has a long and documented history as a source of public annoyance and a driver of noise complaints. The impending large-scale use of unmanned aircraft systems (UAS)s could expose a broader cross-section of the public to a new type of aircraft noise. Recent research notes some reactions to UAS noise, but no rigorous analyses of public intention to complain about UAS noise have been found.

Due to the potential proliferation of UASs and their attendant noise, understanding public reaction could advise both government and industry. Governments at all levels could apply the results to inform policies related to …


Assessing Unstabilized Approaches: A Phenomenology Study Of The Risk Perceptions And Decision-Making Thought Process Of General Aviation Pilots., Shlok Misra, Jorge L. D. Albelo Ph.D., Victor Fraticelli Rivera Jan 2022

Assessing Unstabilized Approaches: A Phenomenology Study Of The Risk Perceptions And Decision-Making Thought Process Of General Aviation Pilots., Shlok Misra, Jorge L. D. Albelo Ph.D., Victor Fraticelli Rivera

Publications

The Federal Aviation Administration emphasized the need to focus on and develop human factors training as early as 1993 in official Human Factors Policy Order 9550.8. The purpose of this study was to conduct a detailed qualitative phenomenological analysis of the risk perceptions and decision-making model of collegiate aviation pilots for unstabilized approaches. The study focused on understanding how collegiate aviation pilots perceive unstable approaches, the risk associated with unstable approaches, and the factors that trigger pilots to execute a go-around. The International Air Transportation Association warns that continuing an unstabilized approach can lead to runway excursions, hard landings causing …


Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk Jan 2022

Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk

Annual ADFSL Conference on Digital Forensics, Security and Law

The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …


A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang Jan 2022

A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …


Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik Jan 2022

Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …


Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd Jan 2022

Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …


The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan Jan 2022

The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan

Annual ADFSL Conference on Digital Forensics, Security and Law

In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …


Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik Jan 2022

Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …


Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik Jan 2022

Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …


Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd Jan 2022

Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …


A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow Jan 2022

A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …


Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha Jan 2022

Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha

Annual ADFSL Conference on Digital Forensics, Security and Law

The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …


Uas For Public Safety: Active Threat Recognition, Joseph Cerreta, Tray Denney, Scott S. Burgess, Anthony Galante, David Thirtyacre, Gloria A. Wilson, Patrick Sherman Jan 2022

Uas For Public Safety: Active Threat Recognition, Joseph Cerreta, Tray Denney, Scott S. Burgess, Anthony Galante, David Thirtyacre, Gloria A. Wilson, Patrick Sherman

International Journal of Aviation, Aeronautics, and Aerospace

The Center for Homeland Defense and Security identified an increase of active threat events, such as mass shootings, annually since 1999. Literature suggests that 90% of shootings were over before law enforcement arrived at the scene and the first responder response was limited to “surround and contain” until Special Weapons and Tactics Teams (SWAT) arrived on the scene. Using Unmanned Aircraft Systems (UAS) to detect which individual was the threat and type of weapon used can provide useful information to increase the speed of the response for first-on-scene rather than waiting for SWAT if the type of weapon was known. …


The Persistence Of Safety Silence: How Flight Deck Microcultures Influence The Efficacy Of Crew Resource Management, Kimberly Perkins, Sourojit Ghosh, Julie Vera, Cecilia Aragon, Adam Hyland Jan 2022

The Persistence Of Safety Silence: How Flight Deck Microcultures Influence The Efficacy Of Crew Resource Management, Kimberly Perkins, Sourojit Ghosh, Julie Vera, Cecilia Aragon, Adam Hyland

International Journal of Aviation, Aeronautics, and Aerospace

The majority of First Officers and Captains feel that Captains establish the tone of the flight deck microculture. However, the majority of these pilots also report that as First Officers, they have hesitated to share safety-pertinent data and/or experience being silenced after sharing safety data due to a psychologically unsafe flight deck. Utilizing direct feedback from industry pilots, we explore ways that Captains can create a more inclusive microculture that elicits safety voice. The safety system designed to enhance crew collaboration, Crew Resource Management, fails to adequately establish tools for designing a psychologically safe flight deck. We conclude that Crew …


Fatigue In Aircraft Maintenance Technician Schools, Natalie Zimmermann, Peng Hao Wang, Keegan Pullen Jan 2022

Fatigue In Aircraft Maintenance Technician Schools, Natalie Zimmermann, Peng Hao Wang, Keegan Pullen

International Journal of Aviation, Aeronautics, and Aerospace

Fatigue has long been identified as a human factor in aviation. Subsequently, a series of studies have highlighted fatigue-related elements within the context of the aviation industry, focusing on the flight deck – with some extension to flight students – and aviation maintenance activities. However, the latter has not been as deeply examined as its flight crew-centered counterpart. Similarly – if not more significantly – fatigue experienced by aircraft maintenance technician (AMT) students is scarcely explored, especially in comparison to the research conducted to understand fatigue in flight schools. AMT students are subject to comparable, but not the same, experiences …


Investigation Of Pilots' Visual Entropy And Eye Fixations For Simulated Flights Consisted Of Multiple Take-Offs And Landings, Salem M. Naeeri Ph.D., Ziho Kang Ph.D., Ricardo Palma Fraga M.S. Jan 2022

Investigation Of Pilots' Visual Entropy And Eye Fixations For Simulated Flights Consisted Of Multiple Take-Offs And Landings, Salem M. Naeeri Ph.D., Ziho Kang Ph.D., Ricardo Palma Fraga M.S.

Journal of Aviation/Aerospace Education & Research

Eye movement characteristics might provide insights on pilots' mental fatigue during prolonged flight. The visual entropy, eye fixation numbers, and eye fixation durations of ten novice pilots and ten expert pilots were analyzed for a four-hour simulated flight task consisting of four consecutive flight legs. Each flight leg lasted approximately one hour and contained five flight phases: takeoff, climb, cruise, descend, and landing. The pilots maneuvered the simulated B-52 aircraft following instrument flight rules (IFR) in a moderate-fidelity Microsoft Flight Simulator environment. Our results indicate that experts’ eye movement characteristics were significantly different from those of novices. In detail, novices' …


“You’Ll Never Really Be One Of Us”: Women’S Underrepresentation In The Aviation Workforce, Rebecca K. Lutte Ph.D., Shannon M. Morrison Ph.D. Jan 2022

“You’Ll Never Really Be One Of Us”: Women’S Underrepresentation In The Aviation Workforce, Rebecca K. Lutte Ph.D., Shannon M. Morrison Ph.D.

Journal of Aviation/Aerospace Education & Research

Women are underrepresented in many aviation occupations despite outreach and recruitment efforts from multiple organizations. Attracting women into aviation is a necessity not only to address workforce demand but also to achieve the benefits of a more diverse workforce to include enhanced profitability, safety, and innovation. To address the gender gap, the research presented here attempts to inform recruitment/retention strategies by identifying both the positive and negative factors that influence a woman’s decision to pursue a career in aviation and the decision to persist. Additionally, factors such as participation in youth outreach programs, role of mentors, influencers who support or …