Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Aerospace Engineering (5)
- Navigation, Guidance, Control and Dynamics (4)
- Computer Sciences (3)
- Physical Sciences and Mathematics (3)
- Electrical and Computer Engineering (2)
-
- Aviation (1)
- Computer Engineering (1)
- Controls and Control Theory (1)
- Electrical and Electronics (1)
- Graphics and Human Computer Interfaces (1)
- Information Security (1)
- Management and Operations (1)
- Risk Analysis (1)
- Software Engineering (1)
- Systems Engineering and Multidisciplinary Design Optimization (1)
Articles 1 - 9 of 9
Full-Text Articles in Engineering
Optimal Defense Of High Value Airborne Assets, Isaac E. Weintraub
Optimal Defense Of High Value Airborne Assets, Isaac E. Weintraub
Theses and Dissertations
Optimal control theory and differential game theory is applied to the study of the defense of high value airborne assets, particularly in the case of a single threat such as an adversarial aircraft or missile. Rather than utilizing onboard defenses of the high value airborne asset, defense is proposed using a teamed unmanned combat air vehicle. The common scenario throughout this dissertation involves the defense of a high value airborne asset (evader) teamed with an unmanned combat vehicle (defender) against a single threat (pursuer). The unmanned combat air vehicle (defender), provides defense in one of two ways: kinetic or directed …
Design And Test Of An Autonomy Monitoring Service To Detect Divergent Behaviors On Unmanned Aerial Systems, Loay Y. Almannaei
Design And Test Of An Autonomy Monitoring Service To Detect Divergent Behaviors On Unmanned Aerial Systems, Loay Y. Almannaei
Theses and Dissertations
Operation of Unmanned Aerial Vehicles (UAV) support many critical missions in the United State Air Force (USAF). Monitoring abnormal behavior is one of many responsibilities of the operator during a mission. Some behaviors are hard to be detect by an operator, especially when flying one or more autonomous vehicles; as such, detections require a high level of attention and focus to flight parameters. In this research, a monitoring system and its algorithm are designed and tested for a target fixed-wing UAV. The Autonomy Monitoring Service (AMS) compares the real vehicle or simulated Vehicle with a similar simulated vehicle using Software …
Sliver: Simulation-Based Logic Bomb Identification/Verification For Unmanned Aerial Vehicles, Jake M. Magness
Sliver: Simulation-Based Logic Bomb Identification/Verification For Unmanned Aerial Vehicles, Jake M. Magness
Theses and Dissertations
This research introduces SLIVer, a Simulation-based Logic Bomb Identification/Verification methodology, for finding logic bombs hidden within Unmanned Aerial Vehicle (UAV) autopilot code without having access to the device source code. Effectiveness is demonstrated by executing a series of test missions within a high-fidelity software-in-the-loop (SITL) simulator. In the event that a logic bomb is not detected, this methodology defines safe operating areas for UAVs to ensure to a high degree of confidence the UAV operates normally on the defined flight plan. SLIVer uses preplanned flight paths as the baseline input space, greatly reducing the input space that must be searched …
Development Of A Drone-Mounted Wireless Attack Platform, Nathan V. Barker
Development Of A Drone-Mounted Wireless Attack Platform, Nathan V. Barker
Theses and Dissertations
The commercial drone market has grown rapidly due to the increasing utility and capabilities of drones. This new found popularity has made it possible for inexpensive drones capable of impressive carry capacities and flight times to reach the consumer market. These new features also offer an invaluable resource to wireless hackers. Capitalizing on their mobility, a wireless hacker can equip a drone with hacking tools to surpass physical security (e.g. fences) with relative ease and reach wireless networks. This research seeks to experimentally evaluate the ability of a drone-mounted wireless attack platform equipped with a directional antenna to conduct wireless …
Cyber-Attack Drone Payload Development And Geolocation Via Directional Antennae, Clint M. Bramlette
Cyber-Attack Drone Payload Development And Geolocation Via Directional Antennae, Clint M. Bramlette
Theses and Dissertations
The increasing capabilities of commercial drones have led to blossoming drone usage in private sector industries ranging from agriculture to mining to cinema. Commercial drones have made amazing improvements in flight time, flight distance, and payload weight. These same features also offer a unique and unprecedented commodity for wireless hackers -- the ability to gain ‘physical’ proximity to a target without personally having to be anywhere near it. This capability is called Remote Physical Proximity (RPP). By their nature, wireless devices are largely susceptible to sniffing and injection attacks, but only if the attacker can interact with the device via …
Product Development Process For Small Unmanned Aerial Systems, Jonathan D. Poole
Product Development Process For Small Unmanned Aerial Systems, Jonathan D. Poole
Theses and Dissertations
The DoD has recognized the need for persistent Intelligence, Surveillance and Reconnaissance (ISR) over the last two decades. Recent developments with commercial drones have changed the market structure; there is now a thriving and extensive market base for drone based remote sensing. This research provides system engineering methods to support the DoD use of this burgeoning market to meet operational ISR needs. The three contributions of this research are: a process to support Small Unmanned Aerial Systems (SUAS) design, tools to support the design process, and tools to support risk assessment and reduction for both design and operations. The process …
Stabilized Rpa Flight In Building Proximity Operations, Michael M. Kaniut
Stabilized Rpa Flight In Building Proximity Operations, Michael M. Kaniut
Theses and Dissertations
The thesis seeks a solution to the requirement for a highly reliable and capable Unmanned Air Vehicle (UAV) to support a wide array of missions and applications that require close proximity flight to structures. The scope of the project includes the drafting of a concept of operations (CONOPs) describing how the mission requirements might be met using the sensor, operators, and air vehicle described here in. The demonstration of the wall-following section of that CONOPs is performed by cart testing a custom algorithm and evaluating its ability to react to its environment. Finally, a flight test was performed to characterize …
Military Application Of Aerial Photogrammetry Mapping Assisted By Small Unmanned Air Vehicles, Kijun Lee
Military Application Of Aerial Photogrammetry Mapping Assisted By Small Unmanned Air Vehicles, Kijun Lee
Theses and Dissertations
This research investigated the practical military applications of the photogrammetric methods using remote sensing assisted by small unmanned aerial vehicles (SUAVs). The research explored the feasibility of UAV aerial mapping in terms of the specific military purposes, focusing on the geolocational and measurement accuracy of the digital models, and image processing time. The research method involved experimental flight tests using low-cost Commercial off-the-shelf (COTS) components, sensors and image processing tools to study key features of the method required in military like location accuracy, time estimation, and measurement capability. Based on the results of the data analysis, two military applications are …
Design And Test Of A Uav Swarm Architecture Over A Mesh Ad-Hoc Network, Timothy J. Allen
Design And Test Of A Uav Swarm Architecture Over A Mesh Ad-Hoc Network, Timothy J. Allen
Theses and Dissertations
The purpose of this research was to develop a testable swarm architecture such that the swarm of UAVs collaborate as a team rather than acting as several independent vehicles. Commercial-off-the-shelf (COTS) components were used as they were low-cost, readily available, and previously proven to work with at least two networked UAVs. Initial testing was performed via software-in-the-loop (SITL) demonstrating swarming of three simulated multirotor aircraft, then transitioned to real hardware. The architecture was then tested in an outdoor nylon netting enclosure. Command and control (C2) was provided by software implementing an enhanced version of Reynolds’ flocking rules via an onboard …