Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 28 of 28

Full-Text Articles in Engineering

Designing Tomorrow's Reality: The Development And Validation Of An Augmented And Mixed Reality Heuristic Checklist, Jessyca Derby Oct 2023

Designing Tomorrow's Reality: The Development And Validation Of An Augmented And Mixed Reality Heuristic Checklist, Jessyca Derby

Doctoral Dissertations and Master's Theses

Augmented (AR) and Mixed Reality (MR) are new and currently developing technologies. They have been used and shown promise and popularity in the domains of education, training, enterprise, retail, consumer products, and more. However, there is a lack of consistency and standards in AR and MR devices and applications. Interactions and standards in one application may drastically differ from another. This may make it difficult for users, especially those new to these technologies, to learn and feel comfortable using the devices or applications. It may also hinder the usability of the applications as designers may not follow proven techniques to …


Towards Agile Academia: An Approach To Scientific Paper Writing Inspired By Software Engineering, Tyler Procko Oct 2023

Towards Agile Academia: An Approach To Scientific Paper Writing Inspired By Software Engineering, Tyler Procko

Doctoral Dissertations and Master's Theses

The construction of scientific papers is performed in service of the greater scientific community. This iterative process is, in effect, an academic economy, where all members benefit from well-written papers. However, many published scientific papers are poorly written; they often lack sufficient detail to allow replication, there is improper usage of citations or a lack of regard to relevant work, reporting is vague or without linked empirical data to allow verification, figures do not correspond to text or are non-sensical, literary elements, e.g., bulleted lists, are used ineffectively, formatting renders certain sections unreadable, and grammatical errors abound. The issues of …


Deep Cnn-Based Automated Optical Inspection For Aerospace Components, Shashi Bhushan Jha Jul 2023

Deep Cnn-Based Automated Optical Inspection For Aerospace Components, Shashi Bhushan Jha

Doctoral Dissertations and Master's Theses

ABSTRACT

The defect detection problem is of outmost importance in high-tech industries such as aerospace manufacturing and is widely employed using automated industrial quality control systems. In the aerospace manufacturing industry, composite materials are extensively applied as structural components in civilian and military aircraft. To ensure the quality of the product and high reliability, manual inspection and traditional automatic optical inspection have been employed to identify the defects throughout production and maintenance. These inspection techniques have several limitations such as tedious, time- consuming, inconsistent, subjective, labor intensive, expensive, etc. To make the operation effective and efficient, modern automated optical inspection …


Enhancing Cyberspace Monitoring In The United States Aviation Industry: A Multi-Layered Approach For Addressing Emerging Threats, Matthew Janson Apr 2023

Enhancing Cyberspace Monitoring In The United States Aviation Industry: A Multi-Layered Approach For Addressing Emerging Threats, Matthew Janson

Doctoral Dissertations and Master's Theses

This research project examined the cyberspace domain in the United States (U.S.) aviation industry from many different angles. The research involved learning about the U.S. aviation cyberspace environment, the landscape of cyber threats, new technologies like 5G and smart airports, cybersecurity frameworks and best practices, and the use of aviation cyberspace monitoring capabilities. The research looked at how vulnerable the aviation industry is from cyber-attacks, analyzed the possible effects of cyber-attacks on the industry, and suggests ways to improve the industry's cybersecurity posture. The project's main goal was to protect against possible cyber-attacks and make sure that the aviation industry …


Assessing High Dynamic Range Imagery Performance For Object Detection In Maritime Environments, Erasmo Landaeta Apr 2023

Assessing High Dynamic Range Imagery Performance For Object Detection In Maritime Environments, Erasmo Landaeta

Doctoral Dissertations and Master's Theses

The field of autonomous robotics has benefited from the implementation of convolutional neural networks in vision-based situational awareness. These strategies help identify surface obstacles and nearby vessels. This study proposes the introduction of high dynamic range cameras on autonomous surface vessels because these cameras capture images at different levels of exposure revealing more detail than fixed exposure cameras. To see if this introduction will be beneficial for autonomous vessels this research will create a dataset of labeled high dynamic range images and single exposure images, then train object detection networks with these datasets to compare the performance of these networks. …


The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman Apr 2023

The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman

Doctoral Dissertations and Master's Theses

This study provides a synopsis of the following topics: the prospective limiters levied on cyber-warfare by present–day international legislation; significant complexities and contentions brought up in the rendering & utilization of International Humanitarian Legislation against cyber-warfare; feasible repercussions of cyber-warfare on humanitarian causes. It is also to be contended and outlined in this research study that non–state actors can be held accountable for breaches of international humanitarian legislation committed using cyber–ordnance if sufficient resources and skill are made available. It details the factors that prosecutors and investigators must take into account when organizing investigations into major breaches of humanitarian legislation …


Neural Network Fusion Of Multi-Modal Sensor Data For Autonomous Surface Vessels, David J. Thompson Apr 2023

Neural Network Fusion Of Multi-Modal Sensor Data For Autonomous Surface Vessels, David J. Thompson

Doctoral Dissertations and Master's Theses

Autonomous surface vessels (ASV) can potentially improve the safety of vessels traditionally operated by humans. Despite advancements in autonomous on-road vehicles, many of these advancements have yet to be realized for ASVs. This is primarily due to lacking ASV sensing platforms and public datasets for ASV-based perception research. To that end, this dissertation demonstrates the design of a synchronized multi-modal sensing platform for ASVs utilizing GPS/INS, LiDAR, LWIR cameras, HDR camera, and high-resolution cameras. The sensing platform is designed to maximize the overlap of sensors for multi-modal research and provides accurate intrinsic and extrinsic calibration between each sensor. Furthermore, the …


Machine Learning And Artificial Intelligence Methods For Cybersecurity Data Within The Aviation Ecosystem, Anna Baron Garcia Oct 2022

Machine Learning And Artificial Intelligence Methods For Cybersecurity Data Within The Aviation Ecosystem, Anna Baron Garcia

Doctoral Dissertations and Master's Theses

Aviation cybersecurity research has proven to be a complex topic due to the intricate nature of the aviation ecosystem. Over the last two decades, research has been centered on isolated modules of the entire aviation systems, and it has lacked the state-of-the-art tools (e.g. ML/AI methods) that other cybersecurity disciplines have leveraged in their fields. Security research in aviation in the last two decades has mainly focused on: (i) reverse engineering avionics and software certification; (ii) communications due to the rising new technologies of Software Defined Radios (SDRs); (iii) networking cybersecurity concerns such as the inter and intra connections of …


Robotic Olfactory-Based Navigation With Mobile Robots, Lingxiao Wang Dec 2021

Robotic Olfactory-Based Navigation With Mobile Robots, Lingxiao Wang

Doctoral Dissertations and Master's Theses

Robotic odor source localization (OSL) is a technology that enables mobile robots or autonomous vehicles to find an odor source in unknown environments. It has been viewed as challenging due to the turbulent nature of airflows and the resulting odor plume characteristics. The key to correctly finding an odor source is designing an effective olfactory-based navigation algorithm, which guides the robot to detect emitted odor plumes as cues in finding the source. This dissertation proposes three kinds of olfactory-based navigation methods to improve search efficiency while maintaining a low computational cost, incorporating different machine learning and artificial intelligence methods.

A. …


Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang Dec 2021

Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang

Doctoral Dissertations and Master's Theses

Fueled by the advancement of 5G new radio (5G NR), rapid development has occurred in many fields. Compared with the conventional approaches, beamforming and network slicing enable 5G NR to have ten times decrease in latency, connection density, and experienced throughput than 4G long term evolution (4G LTE). These advantages pave the way for the evolution of Cyber-physical Systems (CPS) on a large scale. The reduction of consumption, the advancement of control engineering, and the simplification of Unmanned Aircraft System (UAS) enable the UAS networking deployment on a large scale to become feasible. The UAS networking can finish multiple complex …


Rf Fingerprinting Unmanned Aerial Vehicles, Norah Ondus Oct 2021

Rf Fingerprinting Unmanned Aerial Vehicles, Norah Ondus

Doctoral Dissertations and Master's Theses

As unmanned aerial vehicles (UAVs) continue to become more readily available, their use in civil, military, and commercial applications is growing significantly. From aerial surveillance to search-and-rescue to package delivery the use cases of UAVs are accelerating. This accelerating popularity gives rise to numerous attack possibilities for example impersonation attacks in drone-based delivery, in a UAV swarm, etc. In order to ensure drone security, in this project we propose an authentication system based on RF fingerprinting. Specifically, we extract and use the device-specific hardware impairments embedded in the transmitted RF signal to separate the identity of each UAV. To achieve …


Dynamic Task Allocation In Partially Defined Environments Using A* With Bounded Costs, James Hendrickson May 2021

Dynamic Task Allocation In Partially Defined Environments Using A* With Bounded Costs, James Hendrickson

Doctoral Dissertations and Master's Theses

The sector of maritime robotics has seen a boom in operations in areas such as surveying and mapping, clean-up, inspections, search and rescue, law enforcement, and national defense. As this sector has continued to grow, there has been an increased need for single unmanned systems to be able to undertake more complex and greater numbers of tasks. As the maritime domain can be particularly difficult for autonomous vehicles to operate in due to the partially defined nature of the environment, it is crucial that a method exists which is capable of dynamically accomplishing tasks within this operational domain. By considering …


A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami May 2021

A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami

Doctoral Dissertations and Master's Theses

Social engineering attacks (SE-attacks) in enterprises are hastily growing and are becoming increasingly sophisticated. Generally, SE-attacks involve the psychological manipulation of employees into revealing confidential and valuable company data to cybercriminals. The ramifications could bring devastating financial and irreparable reputation loss to the companies. Because SE-attacks involve a human element, preventing these attacks can be tricky and challenging and has become a topic of interest for many researchers and security experts. While methods exist for detecting SE-attacks, our literature review of existing methods identified many crucial factors such as the national cultural, organizational, and personality traits of employees that enable …


Data-Efficient Machine Learning With Focus On Transfer Learning, Shuteng Niu Apr 2021

Data-Efficient Machine Learning With Focus On Transfer Learning, Shuteng Niu

Doctoral Dissertations and Master's Theses

Machine learning (ML) has attracted a significant amount of attention from the artifi- cial intelligence community. ML has shown state-of-art performance in various fields, such as signal processing, healthcare system, and natural language processing (NLP). However, most conventional ML algorithms suffer from three significant difficulties: 1) insufficient high-quality training data, 2) costly training process, and 3) domain dis- crepancy. Therefore, it is important to develop solutions for these problems, so the future of ML will be more sustainable. Recently, a new concept, data-efficient ma- chine learning (DEML), has been proposed to deal with the current bottlenecks of ML. Moreover, transfer …


A Comprehensive Mapping And Real-World Evaluation Of Multi-Object Tracking On Automated Vehicles, Alexander Bassett Apr 2021

A Comprehensive Mapping And Real-World Evaluation Of Multi-Object Tracking On Automated Vehicles, Alexander Bassett

Doctoral Dissertations and Master's Theses

Multi-Object Tracking (MOT) is a field critical to Automated Vehicle (AV) perception systems. However, it is large, complex, spans research fields, and lacks resources for integration with real sensors and implementation on AVs. Factors such those make it difficult for new researchers and practitioners to enter the field.

This thesis presents two main contributions: 1) a comprehensive mapping for the field of Multi-Object Trackers (MOTs) with a specific focus towards Automated Vehicles (AVs) and 2) a real-world evaluation of an MOT developed and tuned using COTS (Commercial Off-The-Shelf) software toolsets. The first contribution aims to give a comprehensive overview of …


Towards A Federated Identity And Access Management Across Universities, Jameel Alsulami Apr 2021

Towards A Federated Identity And Access Management Across Universities, Jameel Alsulami

Doctoral Dissertations and Master's Theses

Many research projects are too complex to yield the efforts of a single investigator and require a coordinated effort from interdisciplinary research teams across universities and industries. The research data, documents, experimental testbeds, high-end computing equipment, etc. is a critical component of any large-scale project and hence the cooperation and resource sharing across universities become very important for timely and budget-friendly execution of these projects. However, it is extremely challenging to frequently and effectively access data and other resources across universities without creating new identities for the users. In this thesis, we propose Federated Identity Management (FIM) approach for facilitating …


Authentication Based On Blockchain, Norah Alilwit Dec 2020

Authentication Based On Blockchain, Norah Alilwit

Doctoral Dissertations and Master's Theses

Across past decade online services have enabled individuals and organizations to perform different types of transactions such as banking, government transactions etc. The online services have also enabled more developments of applications, at cheap cost with elastic and scalable, fault tolerant system. These online services are offered by services providers which are use authentication, authorization and accounting framework based on client-server model. Though this model has been used over decades, study shows it is vulnerable to different hacks and it is also inconvenient to use for the end users. In addition, the services provider has total control over user data …


Drones Detection Using Smart Sensors, Aishah Moafa Apr 2020

Drones Detection Using Smart Sensors, Aishah Moafa

Doctoral Dissertations and Master's Theses

Drones are modern and sophisticated technology that have been used in numerous fields. Nowadays, many countries use them in exploration, reconnaissance operations, and espionage in military operations. Drones also have many uses that are not limited to only daily life. For example, drones are used for home delivery, safety monitoring, and others. However, the use of drones is a double-edged sword. Drones can be used for positive purposes to improve the quality of human lives, but they can also be used for criminal purposes and other detrimental purposes. In fact, many countries have been attacked by terrorists using smart drones. …


Theoretical And Computational Analyses On Transition And Turbulence In Purely Oscillating Pipe Flow, Ali Ahmed Abdulrasool Mar 2020

Theoretical And Computational Analyses On Transition And Turbulence In Purely Oscillating Pipe Flow, Ali Ahmed Abdulrasool

Doctoral Dissertations and Master's Theses

The hydrodynamic instability of purely oscillating pipe flows is investigated in terms of the quasi-steady formulation assuming the temporal changes of the laminar base flow relative to disturbances are slow. A simple model equation is introduced to compare the exact solution of the current approach with those of the major theories dedicated for unsteady flows. The results of the analysis show that the quasi-steady assumption and the multiple scales method are more efficient and accurate than the formal Floquet theory in predicting the transient instabilities within a period in addition to the long-term growth or decay of disturbances. The most …


Computer Aided Drafting Virtual Reality Interface, David M. Roach Nov 2017

Computer Aided Drafting Virtual Reality Interface, David M. Roach

Doctoral Dissertations and Master's Theses

Computer Aided Drafting (CAD) is pervasive in engineering fields today. It has become indispensable for planning, creating, visualizing, troubleshooting, collaborating, and communicating designs before they exist in physical form. From the beginning, CAD was created to be used by means of a mouse, keyboard, and monitor. Along the way, other, more specialized interface devices were created specifically for CAD that allowed for easier and more intuitive navigation within a 3D space, but they were at best stopgap solutions. Virtual Reality (VR) allows users to navigate and interact with digital 3D objects and environments the same way they would in the …


Uav As A Service: Providing On-Demand Access And On-The-Fly Retasking Of Multi-Tenant Uavs Using Cloud Services, Justin Yapp May 2016

Uav As A Service: Providing On-Demand Access And On-The-Fly Retasking Of Multi-Tenant Uavs Using Cloud Services, Justin Yapp

Doctoral Dissertations and Master's Theses

As commercial roles for Unmanned Aerial Vehicles (UAVs) become more well-defined and demand for the services provided by them increases, UAVs rely more on new cloud computing services and co-operative coordination to provide mission planning, control, tracking and data processing. We present UAV as a Service (UAVaaS) framework, which brings features commonly found in traditional cloud services, such as Infrastructure, Platform, and Software as a Service, to the domain of UAVs. Our work aims to conceptualize and design UAVaaS for commercial applications. Specifically, a cloud-provided orchestration framework that allows multi-tenant UAVs to easily serve multiple heterogenous clients at once and …


Estimating Cell Capacity For Multi-Cell Electrical Energy System, Iman Ahari Hashemi Apr 2013

Estimating Cell Capacity For Multi-Cell Electrical Energy System, Iman Ahari Hashemi

Doctoral Dissertations and Master's Theses

A Multi-Cell Electrical Energy System is a set of batteries that are connected in series. The series batteries provide the required voltage necessary for the contraption. After using the energy that is provided by the batteries, some cells within the system tend to have a lower voltage than the other cells. Also, other factors, such as the number of times a battery has been charged or discharged, how long it has been within the system and many other factors, result in some cells having a lesser capacity compared to the other cells within the system. The outcome is that it …


Dynamics And Control Of Higher-Order Nonholonomic Systems, Jaime Rubio HerváS Jan 2013

Dynamics And Control Of Higher-Order Nonholonomic Systems, Jaime Rubio HerváS

Doctoral Dissertations and Master's Theses

A theoretical framework is established for the control of higher-order nonholonomic systems, defined as systems that satisfy higher-order nonintegrable constraints. A model for such systems is developed in terms of differential-algebraic equations defined on a higher-order tangent bundle. A number of control-theoretic properties such as nonintegrability, controllability, and stabilizability are presented. Higher-order nonholonomic systems are shown to be strongly accessible and, under certain conditions, small time locally controllable at any equilibrium. There are important examples of higher-order nonholonomic systems that are asymptotically stabilizable via smooth feedback, including space vehicles with multiple slosh modes and Prismatic-Prismatic-Revolute (PPR) robots moving open liquid …


Nonlinear Control For Dual Quaternion Systems, William D. Price Jan 2013

Nonlinear Control For Dual Quaternion Systems, William D. Price

Doctoral Dissertations and Master's Theses

The motion of rigid bodies includes three degrees of freedom (DOF) for rotation, generally referred to as roll, pitch and yaw, and 3 DOF for translation, generally described as motion along the x, y and z axis, for a total of 6 DOF. Many complex mechanical systems exhibit this type of motion, with constraints, such as complex humanoid robotic systems, multiple ground vehicles, unmanned aerial vehicles (UAVs), multiple spacecraft vehicles, and even quantum mechanical systems. These motions historically have been analyzed independently, with separate control algorithms being developed for rotation and translation. The goal of this research is to study …


A Computational Study Of Thermo-Fluid Dynamics Of Pulse Detonation Engines, Alberto Davila Urresti Apr 2005

A Computational Study Of Thermo-Fluid Dynamics Of Pulse Detonation Engines, Alberto Davila Urresti

Master's Theses - Daytona Beach

The purpose of this thesis is to use a transient Computational Fluid Dynamics computer code written in FORTRAN 90 for full reaction kinetics, to perform an analysis of the physical processes and chemical phenomena occurring on a single cycle of an ideal Pulse Detonation Engine (PDE) using a stoichiometric mixture of H2 and O2. A small zone of high pressure and temperature is used to initiate the detonation wave in the PDE. A simple case with no chemical reactions and the same PDE geometry and “computational spark” is also tested. The speed of the wave relative to …


The Effect Of Target Position And Tactual Recognition Field Size On Touch Bias And Accuracy, Elizabeth L. Brix Jul 2001

The Effect Of Target Position And Tactual Recognition Field Size On Touch Bias And Accuracy, Elizabeth L. Brix

Master's Theses - Daytona Beach

Past studies have shown that touchscreen display angles other than those that perpendicularly bisect the operator's line of sight cause the operator to touch slightly below the target. The amount of touch bias created from this misjudgment fluctuates according to the target's position on the screen. Additionally, the percentage of touches that activate a specific target varies according to the size of the tactual recognition field. Out of three square tactual recognition field sizes, this study sought to match these fields with the amount of touch bias occurring in each location (i.e., small amount of touch bias requires only a …


A Computer-Aided Software Engineering (Case) Approach To Business Process Reengineering (Bpr), Faiza I. Khan Oct 1995

A Computer-Aided Software Engineering (Case) Approach To Business Process Reengineering (Bpr), Faiza I. Khan

Master's Theses - Daytona Beach

This thesis addresses the problem of lack of procedures by which managers can identify business processes that would benefit from reengineering and which could be used to guide the BPR activity to its successful conclusion. The purpose of this study is to analyze various Software Engineering (SE) principles to determine whether they could be used to support Business Process Reengineering (BPR) activities either directly or with some modification, and if so, whether available Computer-Aided Software Engineering (CASE) tools might be applied to BPR in support of managers who wish to implement it. The principles of SE and BPR are discussed …


Investigation And Evaluation Of A Computer Program To Minimize Vfr Flight Planning Errors, Peter Joseph Mcalindon Dec 1989

Investigation And Evaluation Of A Computer Program To Minimize Vfr Flight Planning Errors, Peter Joseph Mcalindon

Master's Theses - Daytona Beach

The purpose of this study was to investigate the effect of computer aided flight planning on flight planning errors. Subjects were selected from the introductory flight courses at Embry-Riddle Aeronautical University. After the subjects completed a conventional VFR navigation log, they were asked to plan the return trip of the flight using a computer aided flight plan. It was initially expected that the computer aided flight plans would have fewer flight planning errors than those calculated using conventional methods. The results supported the hypothesis that flight planning errors are greatly reduced when computer aided flight planning techniques are used.