Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (52)
- Social and Behavioral Sciences (51)
- Electrical and Computer Engineering (45)
- Law (45)
- Computer Engineering (44)
-
- Computer Law (44)
- Computer Sciences (44)
- Forensic Science and Technology (44)
- Information Security (44)
- Legal Studies (44)
- Aviation (23)
- Aerospace Engineering (22)
- Aviation Safety and Security (6)
- Management and Operations (6)
- Mechanical Engineering (5)
- Applied Mathematics (4)
- Arts and Humanities (4)
- Engineering Science and Materials (4)
- History (4)
- Mechanics of Materials (4)
- Numerical Analysis and Computation (4)
- Other History (4)
- Partial Differential Equations (4)
- Aerodynamics and Fluid Mechanics (3)
- Psychology (3)
- Public Affairs, Public Policy and Public Administration (3)
- Risk Analysis (3)
- Aeronautical Vehicles (2)
- Business (2)
- Keyword
-
- Aviation (4)
- Aviation History (4)
- Digital forensics (4)
- Microstructured solids (3)
- Accident model (2)
-
- Case study (2)
- Digital evidence (2)
- Forensics (2)
- Remediation of contaminants (2)
- Risk analysis (2)
- Wave propagation (2)
- : Google Desktop (1)
- ADSL router forensics (1)
- Accident analysis (1)
- Aerospace (1)
- Airlines (1)
- Airport (1)
- Allen telescope (1)
- Artifacts (1)
- Asymptotic stability (1)
- Aviation research; Statistics; (1)
- Beamforming (1)
- Behavior (1)
- Biosand filters (1)
- Broadband router (1)
- Cardiovascular system (1)
- Case Example (1)
- Case Study (1)
- Charles Lindbergh (1)
- Communication technologies (1)
- Publication
-
- Journal of Digital Forensics, Security and Law (28)
- Doctoral Dissertations and Master's Theses (25)
- Annual ADFSL Conference on Digital Forensics, Security and Law (16)
- Publications (15)
- Master's Theses - Daytona Beach (8)
-
- ERAU Prescott Aviation History Program (4)
- Aeronautics, Graduate Studies - Worldwide (1)
- Aerospace Engineering - Daytona Beach (1)
- Department of Electrical Engineering and Computer Science - Daytona Beach (1)
- International Bulletin of Political Psychology (1)
- Paul F. Eschenfelder (1)
- Physical Sciences - Daytona Beach (1)
- Publication Type
Articles 31 - 60 of 102
Full-Text Articles in Engineering
Kindle Forensics: Acquisition & Analysis, Peter Hannay
Kindle Forensics: Acquisition & Analysis, Peter Hannay
Annual ADFSL Conference on Digital Forensics, Security and Law
The Amazon Kindle eBook reader supports a wide range of capabilities beyond reading books. This functionality includes an inbuilt cellular data connection known as Whispernet. The Kindle provides web browsing, an application framework, eBook delivery and other services over this connection. The historic data left by user interaction with this device may be of forensic interest. Analysis of the Amazon Kindle device has resulted in a method to reliably extract and interpret data from these devices in a forensically complete manner.
Keywords: forensics, digital forensics, kindle, mobile, embedded, ebook, ereader
Aacsb‐Accredited Schools’ Adoption Of Information Security Curriculum, Linda Lau, Cheryl Davis
Aacsb‐Accredited Schools’ Adoption Of Information Security Curriculum, Linda Lau, Cheryl Davis
Annual ADFSL Conference on Digital Forensics, Security and Law
The need to professionally and successfully conduct computer forensic investigations of incidents has never been greater. This has launched an increasing demand for a skilled computer security workforce (Locasto, et al., 2011). This paper examines the extent to which AACSB-accredited universities located in Virginia, Maryland and Washington, D.C. are working towards providing courses that will meet this demand. The authors conduct an online research of the information security courses and programs offered by the 27 AACSB-accredited business schools in the selected area.
The preliminary investigation revealed that eight of the 27 participating universities did not offer any courses in cybersecurity, …
Digital Forensics Investigation In A Collegiate Environment, Robert E. Johnston
Digital Forensics Investigation In A Collegiate Environment, Robert E. Johnston
Annual ADFSL Conference on Digital Forensics, Security and Law
Creating, building, managing a cost effective digital forensics lab including a team of qualified examiners can be a challenge for colleges [1] with multiple campuses in multiple towns, counties and states. Leaving such examination responsibilities to each of the campuses results in not only disparity in the results but more than likely excessive duplication of efforts as well as the potential for compromise of evidence. Centralizing the forensic efforts results in a team that is not subject to the political pressures of a campus and virtually eliminates the possibility of examiner favoritism. Learn what it takes to create a cost …
Backtrack In The Outback - A Preliminary Report On Cyber Security Evaluation Of Organisations In Western Australia, Craig Valli, Andrew Woodward, Peter Hannay
Backtrack In The Outback - A Preliminary Report On Cyber Security Evaluation Of Organisations In Western Australia, Craig Valli, Andrew Woodward, Peter Hannay
Annual ADFSL Conference on Digital Forensics, Security and Law
The authors were involved in extensive vulnerability assessment and penetration testing of over 15 large organisations across various industry sectors in the Perth CBD. The actual live testing involved a team of five people for approximately a four week period, and was black box testing. The scanning consisted of running network and web vulnerability tools, and in a few cases, exploiting vulnerability to establish validity of the tools. The tools were run in aggressive mode with no attempt made to deceive or avoid detection by IDS/IPS or firewalls. The aim of the testing was to determine firstly whether these organisations …
Creating Realistic Corpora For Security And Forensic Education, Kam Woods, Christopher A. Lee, Simson Garfinkel, David Dittrich, Adam Russell, Kris Kearton
Creating Realistic Corpora For Security And Forensic Education, Kam Woods, Christopher A. Lee, Simson Garfinkel, David Dittrich, Adam Russell, Kris Kearton
Annual ADFSL Conference on Digital Forensics, Security and Law
We present work on the design, implementation, distribution, and use of realistic forensic datasets to support digital forensics and security education. We describe in particular the “M57-Patents” scenario, a multi-modal corpus consisting of hard drive images, RAM images, network captures, and images from other devices typically found in forensics investigations such as USB drives and cellphones. Corpus creation has been performed as part of a scripted scenario; subsequently it is less “noisy” than real-world data but retains the complexity necessary to support a wide variety of forensic education activities. Realistic forensic corpora allow direct comparison of approaches and tools across …
Developing A Forensic Continuous Audit Model, Grover S. Kearns, Katherine J. Barker
Developing A Forensic Continuous Audit Model, Grover S. Kearns, Katherine J. Barker
Annual ADFSL Conference on Digital Forensics, Security and Law
Despite increased attention to internal controls and risk assessment, traditional audit approaches do not seem to be highly effective in uncovering the majority of frauds. Less than 20 percent of all occupational frauds are uncovered by auditors. Forensic accounting has recognized the need for automated approaches to fraud analysis yet research has not examined the benefits of forensic continuous auditing as a method to detect and deter corporate fraud. The purpose of this paper is to show how such an approach is possible. A model is presented that supports the acceptance of forensic continuous auditing by auditors and management as …
Development Of A Distributed Print‐Out Monitoring System For Efficient Forensic Investigation, Satoshi Kai, Tetsutaro Uehara
Development Of A Distributed Print‐Out Monitoring System For Efficient Forensic Investigation, Satoshi Kai, Tetsutaro Uehara
Annual ADFSL Conference on Digital Forensics, Security and Law
If information leakage occurs, an investigator is instructed to specify what documents were leaked and who leaked them. In the present work, a distributed print-out monitoring system—which consists of a virtual printer driver and print-out policy/log management servers—was developed. For easily matching the discovered (i.e., leaked) paper document with the print-out log, the virtual printer driver acquires full-text of printed-out documents by DDI hooking technique to check the content, transforms a spool file to a picture file and creates both a thumbnail and text log for forensic investigation afterwards. The log size is as only about 0.04 times bigger than …
Mac Os X Forensics: Password Discovery, David Primeaux, Robert Dahlberg, Kamnab Keo, Stephen Larson, B. Pennell, K. Sherman
Mac Os X Forensics: Password Discovery, David Primeaux, Robert Dahlberg, Kamnab Keo, Stephen Larson, B. Pennell, K. Sherman
Annual ADFSL Conference on Digital Forensics, Security and Law
OS X provides a password-rich environment in which passwords protect OS X resources and perhaps many other resources accessed through OS X. Every password an investigator discovers in an OS X environment has the potential for use in discovering other such passwords, and any discovered passwords may also be useful in other aspects of an investigation, not directly related to the OS X environment. This research advises the use of multiple attack vectors in approaching the password problem in an OS X system, including the more generally applicable non-OS X-specific techniques such as social engineering or well-known password cracking techniques …
Software Piracy Forensics: Impact And Implications Of Post‐Piracy Modifications, Vinod Bhattathiripad, S. Santhosh Baboo
Software Piracy Forensics: Impact And Implications Of Post‐Piracy Modifications, Vinod Bhattathiripad, S. Santhosh Baboo
Annual ADFSL Conference on Digital Forensics, Security and Law
Piracy is potentially possible at any stage of the lifetime of the software. In a post-piracy situation, however, the growth of the respective versions of the software (both the original and pirated) is expected to be in different directions as a result of expectedly different implementation strategies. This paper shows how such post-piracy modifications are of special interest to a cyber crime expert investigating software piracy and suggests that the present software piracy forensic (or software copyright infringement investigation) approaches require amendments to take in such modifications. For this purpose, the paper also presents a format that is jargon-free, so …
Understanding Issues In Cloud Forensics: Two Hypothetical Case Studies, Josiah Dykstra, Alan T. Sherman
Understanding Issues In Cloud Forensics: Two Hypothetical Case Studies, Josiah Dykstra, Alan T. Sherman
Annual ADFSL Conference on Digital Forensics, Security and Law
The inevitable vulnerabilities and criminal targeting of cloud environments demand an understanding of how digital forensic investigations of the cloud can be accomplished. We present two hypothetical case studies of cloud crimes; child pornography being hosted in the cloud, and a compromised cloudbased website. Our cases highlight shortcomings of current forensic practices and laws. We describe significant challenges with cloud forensics, including forensic acquisition, evidence preservation and chain of custody, and open problems for continued research.
Keywords: Cloud computing, cloud forensics, digital forensics, case studies
A Practitioners Guide To The Forensic Investigation Of Xbox 360 Gaming Consoles, Ashley L. Podhradsky, Rob D’Ovidio, Cindy Casey
A Practitioners Guide To The Forensic Investigation Of Xbox 360 Gaming Consoles, Ashley L. Podhradsky, Rob D’Ovidio, Cindy Casey
Annual ADFSL Conference on Digital Forensics, Security and Law
Given the ubiquitous nature of computing, individuals now have nearly 24-7 access to the internet. People are not just going online through traditional means with a PC anymore, they are now frequently using nontraditional devices such as cell phones, smart phones, and gaming consoles. Given the increased use of gaming consoles for online access, there is also an increased use of gaming consoles to commit criminal activity. The digital forensic community has been tasked with creating new approaches for forensically analyzing gaming consoles. In this research paper the authors demonstrate different tools, both commercial and open source, available to forensically …
Sampling: Making Electronic Discovery More Cost Effective, Milton Luoma, Vicki Luoma
Sampling: Making Electronic Discovery More Cost Effective, Milton Luoma, Vicki Luoma
Annual ADFSL Conference on Digital Forensics, Security and Law
With the huge volumes of electronic data subject to discovery in virtually every instance of litigation, time and costs of conducting discovery have become exceedingly important when litigants plan their discovery strategies. Rather than incurring the costs of having lawyers review every document produced in response to a discovery request in search of relevant evidence, a cost effective strategy for document review planning is to use statistical sampling of the database of documents to determine the likelihood of finding relevant evidence by reviewing additional documents. This paper reviews and discusses how sampling can be used to make document review more …
Digital Forensics And The Law, Karon N. Murff, Hugh E. Gardenier, Martha L. Gardenier
Digital Forensics And The Law, Karon N. Murff, Hugh E. Gardenier, Martha L. Gardenier
Annual ADFSL Conference on Digital Forensics, Security and Law
As computers and digital devices become more entrenched in our way of life, they become tools for both good and nefarious purposes. When the digital world collides with the legal world, a vast chasm is created. This paper will reflect how the legal community is failing to meet its obligation to provide adequate representation due to a lack of education about digital (computer) forensics. Whether in a civil litigation setting or a criminal setting, attorneys, prosecutors and judges have inadequate knowledge when it comes to the important questions they need to ask regarding digital evidence. Reliance on expert witnesses is …
Optimizing High Volume Traffic Surges Using Discrete Event Simulation, Claire L. Johnson
Optimizing High Volume Traffic Surges Using Discrete Event Simulation, Claire L. Johnson
Doctoral Dissertations and Master's Theses
The purpose of this applied research study is to determine the fidelity of a discrete event simulation tool called the Evacuation Simulation Prediction Tool (ESP) in predicting transit times during a high volume surge in traffic flow. The ESP tool was developed for the purpose of predicting and optimizing large-scale evacuations of counties or regions as an aide in emergency and disaster preparedness planning. The goal of the ESP model is to ascertain the balance of traffic flow capacity by managing the human factor events that impinge upon orderly highway travel without immobilizing the travel route. The objective of this …
Classification Of Marine Vessels In A Littoral Environment Using A Novel Training Database, Robert Andrew Lister
Classification Of Marine Vessels In A Littoral Environment Using A Novel Training Database, Robert Andrew Lister
Master's Theses - Daytona Beach
Research into object classification has led to the creation of hundreds of databases for use as training sets in object classification algorithms. Datasets made up of thousands of cars, people, boats, faces and everyday objects exist for general classification techniques. However, no commercially available database exists for use with detailed classification and categorization of marine vessels commonly found in littoral environments. This research seeks to fill this void and is the combination of a multi-stage research endeavor designed to provide the missing marine vessel ontology. The first of the two stages performed to date introduces a novel training database called …
Analysis Of Effects Of Financial Factors On Profitability Of Low-Cost And Legacy Carriers, Nicholas Joseph Kleoppel
Analysis Of Effects Of Financial Factors On Profitability Of Low-Cost And Legacy Carriers, Nicholas Joseph Kleoppel
Doctoral Dissertations and Master's Theses
Since airline deregulation in 1978, there have been over 180 bankruptcy filings by airlines. Legacy and Low-Cost carriers are unique in how they operate and how they generate revenue; both business models have advantages and disadvantages. However, the Low-Cost carriers have shown increases in revenue and have been growing at increasing rates over the Legacy carriers. This study analyzed financial factors from four airlines in each business model to reveal which financial factors can help determine profitability of an airline. This researcher found significant differences between Legacy and Low-Cost Passenger Revenues, Maintenance Expenses, and Depreciation and Amortization Expenses. Additionally, there …
Modelling And Hazard Analysis For Contaminated Sediments Using Stamp Model, Karim Hardy, Franck Guarnieri
Modelling And Hazard Analysis For Contaminated Sediments Using Stamp Model, Karim Hardy, Franck Guarnieri
Publications
Processes for remediation (removal of pollution or contaminants) of contaminated sediments have become very efficient. These technologies, which are particularly complex, call for a comprehensive approach to risk analysis which characterises all threats (to humans, equipment, local residents, the environment etc.). The STAMP accident model (Systems-Theoretic Accident Model and Processes) is an example of such a comprehensive approach, and it has been chosen to characterise the risks associated with Novosol®, an innovative remediation process. Risk analysis is carried out through the application of STPA (STamP-based Analysis). This article is organised into three sections. The first describes the Novosol® process for …
Supervisory Autonomous Control Of Homogeneous Teams Of Unmanned Ground Vehicles, With Application To The Multi-Autonomous Ground-Robotic International Challenge, Katrina L. Corley
Supervisory Autonomous Control Of Homogeneous Teams Of Unmanned Ground Vehicles, With Application To The Multi-Autonomous Ground-Robotic International Challenge, Katrina L. Corley
Master's Theses - Daytona Beach
There are many different proposed methods for Supervisory Control of semi-autonomous robots. There have also been numerous software simulations to determine how many robots can be successfully supervised by a single operator, a problem known as fan-out, but only a few studies have been conducted using actual robots. As evidenced by the MAGIC 2010 competition, there is increasing interest in amplifying human capacity by allowing one or a few operators to supervise a team of robotic agents. This interest provides motivation to perform a more in-depth evaluation of many autonomous/semiautonomous robots an operator can successfully supervise. The MAGIC competition allowed …
My Adventures In Helicopters!, Dwayne Williams
My Adventures In Helicopters!, Dwayne Williams
ERAU Prescott Aviation History Program
Hear the remarkable story of a lifetime flying helicopters, from a flight test pilot for Bell, Heritage Aviation Ltd. and MD helicopters.
Hydrostatic Pressure Testing Of A Square-Cross Section Stainless Steel Propellant Tank Manufactured Using Selective Laser Sintering, Spencer Fuller
Hydrostatic Pressure Testing Of A Square-Cross Section Stainless Steel Propellant Tank Manufactured Using Selective Laser Sintering, Spencer Fuller
Master's Theses - Daytona Beach
The purpose of this study was to determine if parts manufactured using metal selective laser sintering (SLS) exhibit the same isotropic material properties as conventionally made metal parts. This was accomplished by performing a hydrostatic pressure test (HPT) of a metal SLS manufactured propellant tank, constructed for a nano-satellite of the cubesat class. Strain measurements from twelve strain gage locations on the propellant tank were recorded. A finite element analysis (FEA) model, which assumes isotropic material properties, was generated and a FEA analysis was ran at several pressure loads. The tanks strain data at the corresponding pressure loads from the …
Neural Network Prediction Of Ultimate Compression After Impact Loads In Graphite-Epoxy Coupons From Ultrasonic C-Scan Images, Nikolas L. Geiselman
Neural Network Prediction Of Ultimate Compression After Impact Loads In Graphite-Epoxy Coupons From Ultrasonic C-Scan Images, Nikolas L. Geiselman
Master's Theses - Daytona Beach
The purpose of this project was to investigate how accurately an artificial neural network could predict the ultimate compressive loads of impact damaged 24-ply graphite-epoxy coupons from ultrasonic C-scan images. The 24-ply graphite-epoxy coupons were manufactured with bidirectional preimpregnated tape and cut into 21 coupons, 4 inches by 6 inches each. The coupons were impacted at known impact energies of 10, 12, 14, 16, 18, and 20 Joules in order to create barely visible impact damage (BVID). The coupons were then scanned with an ultrasonic C-scan system to create an image of the damaged area. Each coupon was then compressed …
Guidance, Navigation And Control Of A Fly-By-Wire Transport Category Airship Designed For Hover Cargo Delivery, Harshad H. Lalan
Guidance, Navigation And Control Of A Fly-By-Wire Transport Category Airship Designed For Hover Cargo Delivery, Harshad H. Lalan
Master's Theses - Daytona Beach
The purpose of this thesis is to develop fly-by-wire pilot controls for a transport category airship propelled with six thrust vectoring engines, and to develop control laws to maintain position, heading, and attitude during hover and cargo operations. Owing to the large body area, most airships require that they be pointed into the wind to maintain their position. This research aims at controlling an airship attitude and position during hover cargo delivery, irrespective of the wind direction.
Control laws were developed for two primary modes of the airship: Flight (High Speed Mode) and Hover (Cargo Delivery Mode). Different sets of …
Development Of Multidisciplinary Design Optimization Process For A Large Scale Hybrid Composite Wind Turbine Blade, Jin Woo Lee
Development Of Multidisciplinary Design Optimization Process For A Large Scale Hybrid Composite Wind Turbine Blade, Jin Woo Lee
Master's Theses - Daytona Beach
Development of a multidisciplinary design optimization (MDO) of a large scale hybrid composite wind turbine blade is performed. Multiple objectives are considered in the MDO process to maximize annual energy production and lifetime profit, minimize weight and power production rate. A wind turbine blade is divided into regions and the layup sequences for each region are considered as design variables. The scale of wind turbine blade is also considered to find the optimum size of a wind turbine blade. Applied loads due to extreme wind conditions for rotor rotation and rotor stop condition are considered for finite element analysis (FEA) …
Nurturing Systems Thinking: Developing A Framework Based On The Human Factors Analysis And Classification System (Hfacs) To Improve Systems Development Processes, Arjun Vijayanarayanan
Nurturing Systems Thinking: Developing A Framework Based On The Human Factors Analysis And Classification System (Hfacs) To Improve Systems Development Processes, Arjun Vijayanarayanan
Doctoral Dissertations and Master's Theses
Large systems engineering projects have an astonishingly high failure rate. The reasons hypothesized for such a high failure rate include the neglect of nonsalient system elements such as social and human or organizational aspects of systems. Social and human factors have long been known to be critical elements of systems that are frequently ignored (e.g., Goguen, 1994). Systems engineering processes can benefit and be improved by effective utilization of a framework that helps developers expand their attention and efforts beyond the salient aspects of the system and the development process. In the aviation field, the Human Factors Analysis and Classification …
The Effect Of Shift Turnover Strategy And Time Pressure On Aviation Maintenance Technician Performance, William R. Warren
The Effect Of Shift Turnover Strategy And Time Pressure On Aviation Maintenance Technician Performance, William R. Warren
Doctoral Dissertations and Master's Theses
Aviation maintenance technicians (AMTs) provide the technical and applied knowledge required to maintain airworthiness in aircraft. In commercial aviation, maintenance tasks are performed across multiple shifts. When AMTs share a maintenance task between shifts, the shift turnover strategy used may determine if information is effectively transferred between AMTs. Ineffective shift turnover strategies are a contributing factor in many aviation accidents and incidents. Additionally, time constraints on certain maintenance tasks may cause AMTs to commit error when performing a task. The present study examined the effect of shift turnover strategy (face-to-face or written) and time pressure on error capture, accuracy, and …
Addressing Water Quality Issues In Rural Cameroon With Household Biosand Filters, Laine Klopfensten, Laura Petrasky, Valerie Winton, Jeff Brown
Addressing Water Quality Issues In Rural Cameroon With Household Biosand Filters, Laine Klopfensten, Laura Petrasky, Valerie Winton, Jeff Brown
Publications
This paper describes an ongoing collaboration between the Hope College student chapter of Engineers Without Borders – USA and the rural community of Nkuv in the Northwest Province of Cameroon related to improving drinking water quality using Manz biosand filters. The collaboration began in 2006 and focused on developing a community-based construction and distribution model for household water treatment units. Results from microbiology testing of the constructed filters indicate that this water treatment method is effective for improving water quality in rural areas. The results also highlight the need for ongoing assessment and adapting community education programs to provide necessary …
Ultimate Compression After Impact Load Prediction In Graphite/Epoxy Coupons Using Neural Network And Multivariate Statistical Analyses, Alexandre David Grégoire
Ultimate Compression After Impact Load Prediction In Graphite/Epoxy Coupons Using Neural Network And Multivariate Statistical Analyses, Alexandre David Grégoire
Doctoral Dissertations and Master's Theses
The goal of this research was to accurately predict the ultimate compressive load of impact damaged graphite/epoxy coupons using a Kohonen self-organizing map (SOM) neural network and multivariate statistical regression analysis (MSRA). An optimized use of these data treatment tools allowed the generation of a simple, physically understandable equation that predicts the ultimate failure load of an impacted damaged coupon based uniquely on the acoustic emissions it emits at low proof loads. Acoustic emission (AE) data were collected using two 150 kHz resonant transducers which detected and recorded the AE activity given off during compression to failure of thirty-four impacted …
Effects Of Online Training On Aircrew Monitoring Behaviors: A Field Study, Brian A. Potter
Effects Of Online Training On Aircrew Monitoring Behaviors: A Field Study, Brian A. Potter
Doctoral Dissertations and Master's Theses
Data from aircraft accidents and line observation studies indicate that inadequate pilot monitoring is a growing safety concern. In the cockpit environment, pilots who fail to properly manage their workload commit more monitoring errors. Given the lack of training and educational programs available to pilots which emphasize improving their monitoring skills, more research is needed to assess the usefulness of types of training that can be used to improve pilots' monitoring. This research project sets out to determine if the potential exists to enhance pilots' monitoring skills through online training. For this study, 40 military helicopter pilots (participants) were divided …
Analysis Of Airport Security Screening Checkpoints Using Queuing Networks And Discrete Event Simulation: A Theoretical And Empirical Approach, Stephen Louis Dorton
Analysis Of Airport Security Screening Checkpoints Using Queuing Networks And Discrete Event Simulation: A Theoretical And Empirical Approach, Stephen Louis Dorton
Doctoral Dissertations and Master's Theses
This study utilized discrete event simulation (DES) and queuing networks to investigate the effects of baggage volume and alarm rate at the Security Screening Checkpoint (SSCP) of a small origin and destination airport. A Jackson queuing network was considered for a theoretical assessment to SSCP performance. A DES model using Arena version 12 was utilized for an empirical approach. Data was collected from both literature and by manual collection methods. Manual data was collected during the peak operating time of 6am-7am local time at the airport being modeled. The simulation model was verified and validated qualitatively and quantitatively by statistical …
Preliminary Design Of An Asteroid Hopping Mission, Michael D. Scheppa
Preliminary Design Of An Asteroid Hopping Mission, Michael D. Scheppa
Doctoral Dissertations and Master's Theses
In 2010, NASA announced that its new vision is to support private space launch operations. It is anticipated that this new direction will create the need for new and innovative ideas that push the current boundaries of space exploration and contain the promise of substantial gain, both in research and capital.
The purpose of the study is to plan and estimate the feasibility of a mission to visit a number of near Earth asteroids (NEAs). The mission would take place before the end of the 21st century, and would only use commercially available technology. Throughout the mission design process, while …