Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Embry-Riddle Aeronautical University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 2221 - 2250 of 2768

Full-Text Articles in Engineering

Waves In Inhomogeneous Solids, Arkadi Berezovski, Mihhail Berezovski, Juri Engelbrecht Aug 2009

Waves In Inhomogeneous Solids, Arkadi Berezovski, Mihhail Berezovski, Juri Engelbrecht

Publications

The paper aims at presenting a numerical technique used in simulating the propagation of waves in inhomogeneous elastic solids. The basic governing equations are solved by means of a finite-volume scheme that is faithful, accurate, and conservative. Furthermore, this scheme is compatible with thermodynamics through the identification of the notions of numerical fluxes (a notion from numerics) and of excess quantities (a notion from irreversible thermodynamics). A selection of one-dimensional wave propagation problems is presented, the simulation of which exploits the designed numerical scheme. This selection of exemplary problems includes (i) waves in periodic media for weakly nonlinear waves with …


Aviation Safety Information Analysis And Sharing -- General Aviation (Asias -- Ga), Alan J. Stolzer Aug 2009

Aviation Safety Information Analysis And Sharing -- General Aviation (Asias -- Ga), Alan J. Stolzer

Publications

A presentation on the collaborative government and industry initiative on data sharing and analysis to proactively discover safety concerns before accidents or incidents occur, leading to timely mitigation and prevention.


Developing Abrasion Test Standards For Evaluating Lunar Construction Materials, Ryan L. Kobrick, David M. Klaus, Kenneth W. Street Jul 2009

Developing Abrasion Test Standards For Evaluating Lunar Construction Materials, Ryan L. Kobrick, David M. Klaus, Kenneth W. Street

Publications

Operational issues encountered by Apollo astronauts relating to lunar dust were catalogued, including material abrasion that resulted in scratches and wear on spacesuit components, ultimately impacting visibility, joint mobility and pressure retention. Standard methods are being developed to measure abrasive wear on candidate construction materials to be used for spacesuits, spacecraft, and robotics. Calibration tests were conducted using a standard diamond stylus scratch tip on the common spacecraft structure aluminum, Al 6061-T6. Custom tips were fabricated from terrestrial counterparts of lunar minerals for scratching Al 6061-T6 and comparing to standard diamond scratches. Considerations are offered for how to apply standards …


An Intelligible Software (Cfa) Approach For Fiber-Reinforced Laminate Failure Analysis Including A Piecewise Representation Of The Tsai-Wu Failure Criterion Using Excel And Matlab, Ryan C. Schmidt Jul 2009

An Intelligible Software (Cfa) Approach For Fiber-Reinforced Laminate Failure Analysis Including A Piecewise Representation Of The Tsai-Wu Failure Criterion Using Excel And Matlab, Ryan C. Schmidt

Master's Theses - Daytona Beach

Present generations rely heavily on the use of petroleum as their primary means of transportation. As the cost of petroleum continues to escalate, the need for lightweight structures for vehicle applications becomes more evident. The ability to engineer materials so that they possess desired application specific properties and characteristics has made tremendous progress in the past century. Consequently, the use of these composite materials for aircraft weight reduction has been investigated for decades.

The aerospace industry often uses composite materials to make a laminated composite structure where each constituent ply of the laminate has its own material properties. This anisotropic …


Magnetic Stabilization Of Nadir-Pointing Small Satellites, Chau Ton Jul 2009

Magnetic Stabilization Of Nadir-Pointing Small Satellites, Chau Ton

Master's Theses - Daytona Beach

Since magnetic control systems are relatively lightweight, require low power and are inexpensive, they are attractive for small, inexpensive satellites in low Earth orbits. In this thesis we present averaging-based feedback control laws that achieve three-axis stabilized nadir-pointing attitude. Two types of nonlinear feedback control laws are proposed: full-state feedback and passivity-based feedback. Full-state feedback uses the attitude and angular velocity measurements to regulate the spacecrafts dynamics. Passivity-based feedback uses the attitude measurement and doesn’t require the rate sensors. The control laws are tested using two magnetic field models: the tilted dipole model and the International Geomagnetic Reference Field (IGRF) …


Access Mars: Assessing Cave Capabilities Establishing Specific Solutions: Final Report, Abdul Mohsen Al Husseini, Luis Alvarez Sanchez, Konstantinos Antonakopoulos, Jeffrey (Johannes) Apeldoorn, Kenneth Lowell Ashford Jr., Kutay Deniz Atabay, Sara Langston, Et Al. Jul 2009

Access Mars: Assessing Cave Capabilities Establishing Specific Solutions: Final Report, Abdul Mohsen Al Husseini, Luis Alvarez Sanchez, Konstantinos Antonakopoulos, Jeffrey (Johannes) Apeldoorn, Kenneth Lowell Ashford Jr., Kutay Deniz Atabay, Sara Langston, Et Al.

Publications

The human race has evolved, grown and expanded through the exploration of Earth. After initial steps on the Moon, our next challenge is to explore the solar system. Mars shows potential for both scientific discovery and future human settlement, and so is a prime candidate for the next leap of human exploration. Such a bold endeavor will be a driver for an unprecedented worldwide cooperative effort and the catalyst for a new era of international, intercultural and interdisciplinary human relations. Scientific and technological progress will also accelerate as mankind is ushered into a new era of space exploration.

Currently proposed …


Cybercrime And The 2012 London Olympics, Denis Edgar-Nevill May 2009

Cybercrime And The 2012 London Olympics, Denis Edgar-Nevill

Annual ADFSL Conference on Digital Forensics, Security and Law

The London 2012 Olympics is just three years away and the clock is ticking to put in place plans get it right. The potential for cybercrime to cause harm during this event is very great; harm to national reputation, harm to the reputation to the Olympic movement, and harm to individuals competing, watching or officiating. This paper considers the need to address these risks by taking a look at what has happened in the past at sporting events and the rising wave of electronic security threats and fraud facilitated by computers at recent Olympics. The problems for law enforcement are …


Methodology For Investigating Individuals Online Social Networking Persona, Jonathan T. Rajewski May 2009

Methodology For Investigating Individuals Online Social Networking Persona, Jonathan T. Rajewski

Annual ADFSL Conference on Digital Forensics, Security and Law

When investigators from either the private or public sector review digital data surrounding a case for evidentiary value, they typically conduct a systematic categorization process to identify the relevant digital devices. Armed with the proper methodology to accomplish this task, investigators can quickly recognize the appropriate digital devices for forensic processing and review. This paper purposes a methodology for investigating an individual’s online social networking persona.

Keywords: Social Networking, Web 2.0, Internet Investigations, Online Social Networking Community


Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler May 2009

Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.

Keywords: Bluetooth hacking, mobile phone hacking, wireless hacking


Concerning File Slack, Stephen P. Larson May 2009

Concerning File Slack, Stephen P. Larson

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we discuss the phenomena known as file slack. File slack is created each time a file is created on a hard disk, and can contain private or confidential data. Unfortunately, the methods used by Microsoft Windows operating systems to organize and save files require file slack, and users have no control over what data is saved in file slack. This document will help create awareness about the security issue of file slack and discuss research results concerning file slack.

Keywords : Computer Forensics, File Slack, Ram Slack, Disk Slack


The Computer Fraud And Abuse Act And The Law Of Unintended Consequences, Milton Luoma, Vicki Luoma May 2009

The Computer Fraud And Abuse Act And The Law Of Unintended Consequences, Milton Luoma, Vicki Luoma

Annual ADFSL Conference on Digital Forensics, Security and Law

One of the most unanticipated results of the Computer Fraud and Abuse Act arose from the law of unintended consequences. The CFAA was originally enacted in 1984 to protect federal government computers from intrusions and damage caused by hackers, identity thieves, and other cyber criminals. The law was later amended to extend the scope of its application to financial institutions’, business’s and consumers’ computers. To aid in the pursuit of cyber criminals, one of the subsequent revisions to the law included provision “G” that gave the right to private parties to seek compensation for damages in a civil action for …


Why Are We Not Getting Better At Data Disposal?, Andy Jones May 2009

Why Are We Not Getting Better At Data Disposal?, Andy Jones

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper describes two sets of research, the first of which has been carried out over a period of four years into the levels and types of information that can be found on computer hard disks that are offered for sale on the second hand market. The second research project examined a number of second-hand hand held devices including PDAs, mobile (cell) phones and RIM Blackberry devices. The primary purpose of this research was to gain an understanding of the reasons for the failure to effectively remove potentially sensitive information from the disks and handheld devices. Other objectives included determining …


Don’T Touch That! And Other E-Discovery Issues, Linda Volonino May 2009

Don’T Touch That! And Other E-Discovery Issues, Linda Volonino

Annual ADFSL Conference on Digital Forensics, Security and Law

The ability to preserve and access electronically stored information (ESI) took on greater urgency when amendments to the Federal Rules of Civil Procedure went into effect in December 2006. These amendments, referred to as the electronic discovery (e-discovery) amendments, focus on the discovery phase of civil litigation, audits, or investigations. Discovery is the investigative phase of a legal case when opponents learn what evidence is available and how accessible it is. When ESI is the subject of discovery, it is called e-discovery. Recognizing that most business and personal records and communications are electronic, Judge Shira A. Scheindlin stated, "We used …


Analysis Of The ‘Db’ Windows Registry Data Structure, Damir Kahvedžić, Tahar Kechadi May 2009

Analysis Of The ‘Db’ Windows Registry Data Structure, Damir Kahvedžić, Tahar Kechadi

Annual ADFSL Conference on Digital Forensics, Security and Law

The Windows Registry stores a wide variety of data representing a host of different user properties, settings and program information. The data structures used by the registry are designed to be adaptable to store these differences in a simple format. In this paper we will highlight the existence of a rare data structure that is used to store a large amount of data within the registry hives. We analyse the manner in which this data structure stores its data and the implications that it may have on evidence retrieval and digital investigation. In particular, we reveal that the three of …


Correlating Orphaned Windows Registry Data Structures, Damir Kahvedžić, Tahar Kechadi May 2009

Correlating Orphaned Windows Registry Data Structures, Damir Kahvedžić, Tahar Kechadi

Annual ADFSL Conference on Digital Forensics, Security and Law

Recently, it has been shown that deleted entries of the Microsoft Windows registry (keys) may still reside in the system files once the entries have been deleted from the active database. Investigating the complete keys in context may be extremely important from both a Forensic Investigation point of view and a legal point of view where a lack of context can bring doubt to an argument. In this paper we formalise the registry behaviour and show how a retrieved value may not maintain a relation to the part of the registry it belonged to and hence lose that context. We …


Graduate Accounting Students' Perception Of It Forensics: A Multi-Dimensional Analysis, Grover S. Kearns May 2009

Graduate Accounting Students' Perception Of It Forensics: A Multi-Dimensional Analysis, Grover S. Kearns

Annual ADFSL Conference on Digital Forensics, Security and Law

Forensics and information technology (IT) have become increasingly important to accountants and auditors. Undergraduate accounting students are introduced to general IT topics but discussion of forensic knowledge is limited. A few schools have introduced an undergraduate major in forensic accounting. Some graduate schools offer accounting students an emphasis in forensic or fraud accounting that includes instruction in forensics and information technology. When students do not view the IT topics as being equally important to their careers as traditional accounting topics, these attitudes may reduce the quality of the course. In an effort to assess student attitudes, a survey of 46 …


Visualization Of Honeypot Data Using Graphviz And Afterglow, Craig Valli May 2009

Visualization Of Honeypot Data Using Graphviz And Afterglow, Craig Valli

Annual ADFSL Conference on Digital Forensics, Security and Law

This research in progress paper explores the use of Graphviz and Afterglow for the analysis of data emanating from a honeypot system. Honeypot systems gather a wide range of data that is often difficult to readily search for patterns and trends using conventional log file analysis techniques. The data from the honeypots has been statically extracted and processed through Afterglow scripts to produce inputs suitable for use by the DOT graph based tools contained within Graphviz. This paper explores some of the benefits and drawbacks of currently using this type of approach.

Keywords: honeypot, network forensics, visualization, Graphviz, Afterglow


Are Wireless Sensors Feasible For Aircraft?, Thomas Yang, Jianhua Liu, Ilteris Demirkiran May 2009

Are Wireless Sensors Feasible For Aircraft?, Thomas Yang, Jianhua Liu, Ilteris Demirkiran

Department of Electrical Engineering and Computer Science - Daytona Beach

Wireless communications is a preferred way of data transmission in many aerospace applications. Replacing some aircraft sensor wiring with wireless communications is a highly desirable but challenging transformation. The related sensors are referred to as aerospace wireless sensors (AWSs). This replacement can lower the weight of aircraft wiring, improve the overall safety of aircraft, simplify the design of aircraft structures, and lower the sensor installation and maintenance cost. The major concern for using AWSs is the potential negative effects on overall reliability and safety of aircraft. In this paper, the feasibility of using AWSs is discussed. In particular, the appropriate …


Gossamer Albatross, Steve Elliott Apr 2009

Gossamer Albatross, Steve Elliott

ERAU Prescott Aviation History Program

Steve Elliott was active in the hobby of hang gliding, and was invited to join the Gossamer Albatross team in 1979. He assisted in its development and testing, and was there in a Zodiac raft when it became the first human powered aircraft to cross the English Channel and win the £100,000 Kremer Prize.


A Technology Survey Of Emergency Recovery And Flight Termination Systems For Uas, Richard Stansbury, Wesley Tanis, Timothy Wilson Apr 2009

A Technology Survey Of Emergency Recovery And Flight Termination Systems For Uas, Richard Stansbury, Wesley Tanis, Timothy Wilson

Publications

For safe flight in the National Airspace System (NAS), either under the current interim rules or under anticipated longer-term regulatory guidelines facilitating unmanned aircraft system (UAS) access to the NAS, the UAS must incorporate technologies and flight procedures to ensure that neither people nor property in the air, on the ground, or on or in the water are endangered by the failure of an onboard component, by inappropriate unmanned aircraft (UA) response to pilot commands, or by inadvertent entry by the UA into prohibited airspace. The aircraft must be equipped with emergency recovery (ER) procedures and technologies that ensure that …


The Interaction Of Motivational Orientation And Social Context In A Flight Setting, Noelle D. Brunelle Apr 2009

The Interaction Of Motivational Orientation And Social Context In A Flight Setting, Noelle D. Brunelle

Master's Theses - Daytona Beach

The purpose of this study was to explore the effects of motivational orientation and social context on decisions made during flight. Cultural dimensions such as power distance, uncertainty avoidance and individualism have been found to correlate with aviation accident rates. Self-determination theory provides a schedule of social contexts and cues that support, control or thwart individual motivation, with the task-focused properties of intrinsic motivation and the external (group) focus of extrinsic motivation similar to descriptions of the cultural dimensions of individualism and collectivism. In addition, studies have demonstrated contextual cues may be used to prime cognitive goals, behaviors and strategies. …


A Sensitivity Analysis Of Scheduling Changes On Flight Training Resource Utilization Using Discrete Event Simulation, Melissa A. Findlay Apr 2009

A Sensitivity Analysis Of Scheduling Changes On Flight Training Resource Utilization Using Discrete Event Simulation, Melissa A. Findlay

Master's Theses - Daytona Beach

This study presented a scheduling model of the Flight Training Department at Embry Riddle Aeronautical University's Daytona Beach Campus built using ARENA 12.0. The purpose of the study was to determine if the Flight Training Department system was sensitive to changes in the resources available to students in Flight Training Device (FTD) course modules. Historical data from the Flight Training Department was used to build the model. As no significant difference was found between the actual real world system and the model for the number of active students and for the time it took students to complete the program, the …


The Effect Of Whole And Part-Task Training And Feedback During Simulated Instrument Flight Training, Christian Jon Rossi Apr 2009

The Effect Of Whole And Part-Task Training And Feedback During Simulated Instrument Flight Training, Christian Jon Rossi

Master's Theses - Daytona Beach

The most cost effective method for training novice pilot’s instrument flight procedures has not been well investigated. Part-task scenarios condition and a whole task scenarios condition, both with different levels of feedback were compared in a between group study of novice pilots learning a 737 instrument approach with Microsoft ESP flight simulator. The two different types of training methods were evaluated after a series of training exposures by comparing the ability to pass a series of training scenarios along with a final test. This standard was created by 737 pilots, FAA regulations, and 737 instructors. These training methods were also …


Safety Management Systems Update And Progress, Alan J. Stolzer Mar 2009

Safety Management Systems Update And Progress, Alan J. Stolzer

Publications

The Safety Management System (SMS) Day Panel Charge on March 18, 2009, delivered by Dr. Alan Stolzer, was intended to provide participants with references, tools, vocabulary, and encouragement to adopt academic and laboratory curricula that would prepare students for careers in the SMS environment.


Molecular Dynamics Study Of Crystal Plasticity During Nanoindentation In Ni Nanowires, V. Dupont, F. Sansoz Mar 2009

Molecular Dynamics Study Of Crystal Plasticity During Nanoindentation In Ni Nanowires, V. Dupont, F. Sansoz

Aerospace Engineering - Daytona Beach

Molecular dynamics simulations were performed to gain fundamental insight into crystal plasticity, and its size effects in nanowires deformed by spherical indentation. This work focused on-oriented single-crystal, defect-free Ni nanowires of cylindrical shape with diameters of 12 and 30 nm. The indentation of thin films was also comparatively studied to characterize the influence of free surfaces in the emission and absorption of lattice dislocations in single-crystal Ni. All of the simulations were conducted at 300 K by using a virtual spherical indenter of 18 nm in diameter with a displacement rate of1 ms1. No significant effect of sample size was …


On The Inside Of Spaceshipone, Dan Linehan Feb 2009

On The Inside Of Spaceshipone, Dan Linehan

ERAU Prescott Aviation History Program

Hear the inside story of the development, testing and flight of the world’s first privately built and piloted manned spacecraft by the author of “SpaceShip One” An Illustrated History”. Exciting photos, videos and animations will help explain how and why all this took place.


Joint Surveillance Target Attack Radar Systems (Joint Stars) --- The Early Days, George Cusimano Jan 2009

Joint Surveillance Target Attack Radar Systems (Joint Stars) --- The Early Days, George Cusimano

ERAU Prescott Aviation History Program

J-STARS is the airborne, battle management radar platform that was such a resounding success during Desert Storm I . Hear the exciting story of the challenges associated with its early development, from the Flight Test Engineer and Mission Commander who was involved from the very start.


The Effects Of Elasticity In The Foundation On The Flutter Of A Metallic High Aspect Ratio Wing, Horacio Esteban Sepic Kriskovich Jan 2009

The Effects Of Elasticity In The Foundation On The Flutter Of A Metallic High Aspect Ratio Wing, Horacio Esteban Sepic Kriskovich

Master's Theses - Daytona Beach

The goal of this thesis is to study the flutter characteristics of a metallic high-aspect ratio wing, with linearly varying chord across the semis-span, and a simulated elastic foundation. The general planform of the wing is similar to the one found in a High- Altitude Long-Endurance Uninhabited Aerial Surveillance Vehicle (HALE USAV).

The problem is studied using a simplified aerodynamic loading based on thin-airfoil theory, which is then combined with a Lagrangian formulation to solve the system as stationary. The wing has no control surfaces or external stores, and is modeled as a uniform beam with known mechanical properties, being …


Design, Implementation And Validation Of An Attitude Determination Subsystem For Nanosatellites, Mathieu Naslin Jan 2009

Design, Implementation And Validation Of An Attitude Determination Subsystem For Nanosatellites, Mathieu Naslin

Master's Theses - Daytona Beach

The purpose of this study is to design and analyze the accuracy of an attitude determination subsystem for a satellite of the CubeSat class by using low cost sensors. CubeSats are nanosatellites that complies a certain amount of layout criterions described by the California Polytechnic State University. A 3-axis attitude determination platform has been designed with emphasis on the use of low cost, off the shelf sensors. This platform features a sun sensor, a magnetometer and an earth sensor. The principles of observation and the description of the acquisition method are explained. The interfacing of the software package and real …


Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler Jan 2009

Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler

Security Studies & International Affairs - Daytona Beach

"This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info."--from the article