Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 45

Full-Text Articles in Engineering

A Microscopic Simulation Laboratory For Evaluation Of Off-Street Parking Systems, Yun Yuan Dec 2018

A Microscopic Simulation Laboratory For Evaluation Of Off-Street Parking Systems, Yun Yuan

Theses and Dissertations

The parking industry produces an enormous amount of data every day that, properly analyzed, will change the way the industry operates. The collected data form patterns that, in most cases, would allow parking operators and property owners to better understand how to maximize revenue and decrease operating expenses and support the decisions such as how to set specific parking policies (e.g. electrical charging only parking space) to achieve the sustainable and eco-friendly parking.

However, there lacks an intelligent tool to assess the layout design and operational performance of parking lots to reduce the externalities and increase the revenue. To address …


Graphene-Based Materials Coated On Zeolite For The Removal Of Persistent Organic Pollutants From Water, Yan Zhang Dec 2018

Graphene-Based Materials Coated On Zeolite For The Removal Of Persistent Organic Pollutants From Water, Yan Zhang

Theses and Dissertations

Adsorption is a fast, low-cost and the most commonly implemented water treatment technology for the removal of multiple contaminations from ground water, drinking water or wastewater. Difficulties in removing persistent organic pollutants (POPs) to improve quality and safety of treated water sources require the exploration of novel and multifunctional materials. Graphene-based materials having unique structures, high specific surface areas and tailorable functional groups are promising candidates as adsorbents.

The main goal of this work is to fabricate a novel adsorbent made of GO/rGO attached on natural zeolite substrates for the removal of variably charged organic model compounds and POPs in …


Improving Detection Of Dim Targets: Optimization Of A Moment-Based Detection Algorithm, Shannon R. Young Dec 2018

Improving Detection Of Dim Targets: Optimization Of A Moment-Based Detection Algorithm, Shannon R. Young

Theses and Dissertations

Wide area motion imagery (WAMI) sensor technology is advancing rapidly. Increases in frame rates and detector array sizes have led to a dramatic increase in the volume of data that can be acquired. Without a corresponding increase in analytical manpower, much of these data remain underutilized. This creates a need for fast, automated, and robust methods for detecting dim, moving signals of interest. Current approaches fall into two categories: detect-before-track (DBT) and track-before-detect (TBD) methods. The DBT methods use thresholding to reduce the quantity of data to be processed, making real time implementation practical but at the cost of the …


Big Data And Sensor Network For Construction Material Testing, Yao Shi Nov 2018

Big Data And Sensor Network For Construction Material Testing, Yao Shi

Theses and Dissertations

Engineers and contractors need to have a precise understanding of the development progress of concrete strength in the natural environment, which helps to save project time and cost. However, current practice of concrete construction depends on published data, charts and curves from laboratory tests. The data would not show frequently changing environmental conditions in the real world, which can affect concrete quality significantly. The objective of this research is to design a reliable and accurate method to validate test data of the strength developments of concrete specimens in early stages. The approach includes the following tasks: (1) arrange sensors to …


Reconstruction Of The 3d Temperature And Species Concentration Spatial Distribution Of A Jet Engine Exhaust Plume Using An Infrared Fourier Transform Spectrometer Hyperspectral Imager, Mason D. Paulec Sep 2018

Reconstruction Of The 3d Temperature And Species Concentration Spatial Distribution Of A Jet Engine Exhaust Plume Using An Infrared Fourier Transform Spectrometer Hyperspectral Imager, Mason D. Paulec

Theses and Dissertations

The measurement of combustion byproducts is useful for determining pollution of any fuel burning application, efficiency of combustion, and determining detectability of aircraft exhausts. Both intrusive and non-intrusive techniques have been utilized to measure these quantities. For the majority of the non-intrusive techniques, the absorption and emission spectra of the gases are utilized for measurements. For this research, the use of the Telops Infrared Fourier Transform Spectrometer (IFTS) Hyperspectral Imager (HSI) was explored within the scope of combustion diagnostic methods, as an option for remote measurements of a jet turbine to determine concentration of species and temperature of the combustion …


Application Of Spectral Solution And Neural Network Techniques In Plasma Modeling For Electric Propulsion, Joseph R. Whitman Sep 2018

Application Of Spectral Solution And Neural Network Techniques In Plasma Modeling For Electric Propulsion, Joseph R. Whitman

Theses and Dissertations

A solver for Poisson's equation was developed using the Radix-2 FFT method first invented by Carl Friedrich Gauss. Its performance was characterized using simulated data and identical boundary conditions to those found in a Hall Effect Thruster. The characterization showed errors below machine-zero with noise-free data, and above 20% noise-to-signal strength, the error increased linearly with the noise. This solver can be implemented into AFRL's plasma simulator, the Thermophysics Universal Research Framework (TURF) and used to quickly and accurately compute the electric field based on charge distributions. The validity of a machine learning approach and data-based complex system modeling approach …


A Discrete-Event Simulation Approach For Modeling Human Body Glucose Metabolism, Buket Aydas Aug 2018

A Discrete-Event Simulation Approach For Modeling Human Body Glucose Metabolism, Buket Aydas

Theses and Dissertations

This dissertation describes CarbMetSim (Carbohydrate Metabolism Simulator), a discrete-event simulator that tracks the blood glucose level of a person in response to a timed sequence of diet and exercise activities. CarbMetSim implements broader aspects of carbohydrate metabolism in human beings with the objective of capturing the average impact of various diet/exercise activities on the blood glucose level. Key organs (stomach, intestine, portal vein, liver, kidney, muscles, adipose tissue, brain and heart) are implemented to the extent necessary to capture their impact on the production and consumption of glucose. Key metabolic pathways (glucose oxidation, glycolysis and gluconeogenesis) are accounted for by …


The Use Of Recommender Systems In Web Applications – The Troi Case, Donjeta Mulaj Jul 2018

The Use Of Recommender Systems In Web Applications – The Troi Case, Donjeta Mulaj

Theses and Dissertations

Avoiding digital marketing, surveys, reviews and online users behavior approaches on digital age are the key elements for a powerful businesses to fail, there are some systems that should preceded some artificial intelligence techniques. In this direction, the use of data mining for recommending relevant items as a new state of the art technique is increasing user satisfaction as well as the business revenues. And other related information gathering approaches in order to our systems thing and acts like humans. To do so there is a Recommender System that will be elaborated in this thesis. How people interact, how to …


Performanca E Makinave Kerkuese Duke Perdorur Cloud Shërbimet “Elasticsearch” Dhe “Algolia”, Besnik Korça Jul 2018

Performanca E Makinave Kerkuese Duke Perdorur Cloud Shërbimet “Elasticsearch” Dhe “Algolia”, Besnik Korça

Theses and Dissertations

Ueb Aplikacionet me data-set të mëdha në kohën e tanishme janë shumë më të përhapura. Kërkimet e të dhënave në data-set të tilla për shkak të performances bëhen duke përdorur makinat kërkuese. Provider të ndryshëm ofrojnë makina kërkuese si Software as a Service(SaaS) shërbime të cilat kanë për avantazh konfigurimin minimal që duhet bërë makinave kërkuese për t’i vënë në funksion. Nëpërmjet këtij punimi synohet që së pari të analizohen shërbimet cloud computing që ofrohen nga provider të ndryshem. Pastaj pasi që fokusi i makinave kërkuese ndodhet në “information retrieval” është bë analizimi i disa teknikave të “information retrieval”. Makinat …


New Approaches To Multi-Functional Soft Materials, Seyedali Banisadr May 2018

New Approaches To Multi-Functional Soft Materials, Seyedali Banisadr

Theses and Dissertations

Soft robotics is a relatively new, but fast-developing field of science and technology that utilizes soft materials such as polymers in their body structure. Despite significant progress in soft robotic devices, robots that can sense their environments are still very rare. Although some soft robots have exhibited sensing capabilities, they still have not demonstrated synergistic coupling of sensing and actuation. From our perspective, this type of coupling may take us one step closer to fabricate soft robots with autonomous feedback dynamics. In this work, we present new approaches to soft robotic devices, which are fabricated from responsive soft materials and …


Novel Solar Cells Based On Two-Dimensional Nanomaterials And Recycled Lead Components, Xiaoru Guo May 2018

Novel Solar Cells Based On Two-Dimensional Nanomaterials And Recycled Lead Components, Xiaoru Guo

Theses and Dissertations

To meet the rapidly growing demand for energy and reduce the use of dwindling fossil fuels, the efficient utilization of renewable energy is a constant pursuit globally. Because solar cells convert vastly available sunlight into electricity, developing high-performance and low-cost solar cells is a top strategy for future energy supply. Dye-sensitized solar cells (DSSCs) and perovskite solar cells (PSCs) are the most promising choices. In the meantime, highly concentrated sulfuric acids from retired lead-acid batteries become an environmental concern, and lead contamination in drinking water raises concerns in general public. This study addresses both above-mentioned problems by using two-dimensional (2D) …


Design And Implementation Of A Domain Specific Language For Deep Learning, Xiao Bing Huang May 2018

Design And Implementation Of A Domain Specific Language For Deep Learning, Xiao Bing Huang

Theses and Dissertations

\textit {Deep Learning} (DL) has found great success in well-diversified areas such as machine vision, speech recognition, big data analysis, and multimedia understanding recently. However, the existing state-of-the-art DL frameworks, e.g. Caffe2, Theano, TensorFlow, MxNet, Torch7, and CNTK, are programming libraries with fixed user interfaces, internal representations, and execution environments. Modifying the code of DL layers or data structure is very challenging without in-depth understanding of the underlying implementation. The optimization of the code and execution in these tools is often limited and relies on the specific DL computation graph manipulation and scheduling that lack systematic and universal strategies. Furthermore, …


Analysis Of Dynamic Mode Decomposition, Archana Muniraju May 2018

Analysis Of Dynamic Mode Decomposition, Archana Muniraju

Theses and Dissertations

In this master thesis, a study was conducted on a method known as Dynamic mode decomposition(DMD), an equation-free technique which does not require to know the underlying governing equations of the complex data. As a result of massive datasets from various resources, like experiments, simulation, historical records, etc. has led to an increasing demand for an efficient method for data mining and analysis techniques. The main goals of data mining are the description and prediction. Description involves finding patterns in the data and prediction involves predicting the system dynamics. An important aspect when analyzing an algorithm is testing. In this …


Stereo Vision: A Comparison Of Synthetic Imagery Vs. Real World Imagery For The Automated Aerial Refueling Problem, Nicholas J. Seydel Mar 2018

Stereo Vision: A Comparison Of Synthetic Imagery Vs. Real World Imagery For The Automated Aerial Refueling Problem, Nicholas J. Seydel

Theses and Dissertations

Missions using unmanned aerial vehicles have increased in the past decade. Currently, there is no way to refuel these aircraft. Accomplishing automated aerial refueling can be made possible using the stereo vision system on a tanker. Real world experiments for the automated aerial refueling problem are expensive and time consuming. Currently, simulations performed in a virtual world have shown promising results using computer vision. It is possible to use the virtual world as a substitute environment for the real world. This research compares the performance of stereo vision algorithms on synthetic and real world imagery.


Near Earth Space Object Detection Utilizing Parallax As Multi-Hypothesis Test Criterion, Joseph C. Tompkins Mar 2018

Near Earth Space Object Detection Utilizing Parallax As Multi-Hypothesis Test Criterion, Joseph C. Tompkins

Theses and Dissertations

The US Strategic Command (USSTRATCOM) operated Space Surveillance Network (SSN) is tasked with Space Situational Awareness (SSA) for the US military. This system is made up of Electro-Optic sensors such as the Space Surveillance Telescope (SST) and Ground-based Electro-Optical Deep Space Surveillance (GEODSS) as well as RADAR based sensors such as the Space Fence. While Lockheed Martin’s Space Fence is very adept at detecting & tracking objects in Low Earth Orbit (LEO) below 3000 Km in height [1], gaps remain in the tracking of Resident Space Objects (RSO’s) in Geosynchronous Orbits (GEO) due to limitations associated with the implementation of …


Analysis Of Temperature And Humidity Effects On Horizontal Photovoltaic Panels, Corey J. Booker Mar 2018

Analysis Of Temperature And Humidity Effects On Horizontal Photovoltaic Panels, Corey J. Booker

Theses and Dissertations

The United States Air Force seeks to address power grid vulnerability and bolster energy resilience through the use of renewable energy sources. Air Force Institute of Technology engineers designed and manufactured control systems to monitor power production from the most widely-used silicon-based solar cells at 38 testing locations around the globe spanning the majority of climate types. Researchers conducted multivariate regression analysis to establish a statistical relationship between photovoltaic power output, ambient temperature, and humidity pertaining to monocrystalline and polycrystalline photovoltaic panels. Formulated models first characterized power output globally, then by specific climate type with general inaccuracy. Location-specific models are …


Behavior Flexibility For Autonomous Unmanned Aerial Systems, Taylor B. Bodin Mar 2018

Behavior Flexibility For Autonomous Unmanned Aerial Systems, Taylor B. Bodin

Theses and Dissertations

Autonomous unmanned aerial systems (UAS) could supplement and eventually subsume a substantial portion of the mission set currently executed by remote pilots, making UAS more robust, responsive, and numerous than permitted by teleoperation alone. Unfortunately, the development of robust autonomous systems is difficult, costly, and time-consuming. Furthermore, the resulting systems often make little reuse of proven software components and offer limited adaptability for new tasks. This work presents a development platform for UAS which promotes behavioral flexibility. The platform incorporates the Unified Behavior Framework (a modular, extensible autonomy framework), the Robotic Operating System (a RSF), and PX4 (an open- source …


Modeling A Space-Based Quantum Link, Alexander W. Duchane Mar 2018

Modeling A Space-Based Quantum Link, Alexander W. Duchane

Theses and Dissertations

Quantum sources and single photon detectors have improved, allowing quantum algorithms for communication, encryption, computing, and sensing to transition from theory and small-scale laboratory experiments to field experiments. One such quantum algorithm, Quantum Key Distribution, uses optical pulses to generate shared random bit strings between two locations. These shared bit strings can be turned into encryption keys to be used as a one-time-pad or integrated with symmetric encryption techniques such as the Advanced Encryption Standard. This method of key generation and encryption is resistant to future advances in quantum computing which significantly degrade the effectiveness of current asymmetric key sharing …


Passive Radiolocation Of Ieee 802.11 Emitters Using Directional Antennae, Bradford E. Law Mar 2018

Passive Radiolocation Of Ieee 802.11 Emitters Using Directional Antennae, Bradford E. Law

Theses and Dissertations

Low-cost commodity hardware and cheaper, more capable consumer-grade drones make the threat of home-made, inexpensive drone-mounted wireless attack platforms (DWAPs) greater than ever. Fences and physical security do little to impede a drone from approaching private, commercial, or government wireless access points (WAPs) and conducting wireless attacks. At the same time, unmanned aerial vehicles (UAVs) present a valuable tool for network defenders conducting site surveys and emulating threats. These platforms present near-term dangers and opportunities for corporations and governments. Despite the vast leaps in technology these capabilities represent, UAVs are noisy and consequently difficult to conceal as they approach a …


Quantifying Permafrost Extent, Condition, And Degradation Rates At Department Of Defense Installations In The Arctic, Christopher A.J. Edlund Mar 2018

Quantifying Permafrost Extent, Condition, And Degradation Rates At Department Of Defense Installations In The Arctic, Christopher A.J. Edlund

Theses and Dissertations

The DoD is planning over $500M in military construction on Eielson Air Force Base (AFB) within the next three years. This construction program will expand the footprint of facilities and change parts of the storm water management scheme, which may have second order effects on the underlying permafrost layer. These changes in permafrost will drive engineering decision making at local and regional levels, and help shape the overall strategy for military readiness in the Arctic. Little site-specific knowledge exists on the human caused effects to permafrost at this location. In 2016, the permafrost degradation rates at Eielson AFB were modeled …


Wall-Modeled Large Eddy Simulation Of A Three-Dimensional Shock-Boundary Layer Interaction, Nicholas J. Marco Mar 2018

Wall-Modeled Large Eddy Simulation Of A Three-Dimensional Shock-Boundary Layer Interaction, Nicholas J. Marco

Theses and Dissertations

The direct simulation of turbulent flows is prohibitive at high Reynolds numbers; thus, methods such as RANS and LES are used. However, these methods still require a large number of cells near a solid boundary. To circumvent this issue, a Wall-Modeled Large Eddy Simulation (WM-LES) can be used. Of interest is how these wall models perform in comparison to a Wall-Resolved Large Eddy Simulation (WR-LES) and experimental results of a shock turbulent boundary layer interactions (STBLI) and specifically, whether equilibrium wall models are sufficient to resolve the oscillatory and hence non-equilibrium nature of these flows or whether a non-equilibrium model …


Estimating Defensive Cyber Operator Decision Confidence, Markus M. Borneman Mar 2018

Estimating Defensive Cyber Operator Decision Confidence, Markus M. Borneman

Theses and Dissertations

As technology continues to advance the domain of cyber defense, signature and heuristic detection mechanisms continue to require human operators to make judgements about the correctness of machine decisions. Human cyber defense operators rely on their experience, expertise, and understanding of network security, when conducting cyber-based investigations, in order to detect and respond to cyber alerts. Ever growing quantities of cyber alerts and network traffic, coupled with systemic manpower issues, mean no one has the time to review or change decisions made by operators. Since these cyber alert decisions ultimately do not get reviewed again, an inaccurate decision could cause …


Progressive Network Deployment, Performance, And Control With Software-Defined Networking, Daniel J. Casey Mar 2018

Progressive Network Deployment, Performance, And Control With Software-Defined Networking, Daniel J. Casey

Theses and Dissertations

The inflexible nature of traditional computer networks has led to tightly-integrated systems that are inherently difficult to manage and secure. New designs move low-level network control into software creating software-defined networks (SDN). Augmenting an existing network with these enhancements can be expensive and complex. This research investigates solutions to these problems. It is hypothesized that an add-on device, or "shim" could be used to make a traditional switch behave as an OpenFlow SDN switch while maintaining reasonable performance. A design prototype is found to cause approximately 1.5% reduction in throughput for one ow and less than double increase in latency, …


Assured Android Execution Environments, Brandon P. Froberg Mar 2018

Assured Android Execution Environments, Brandon P. Froberg

Theses and Dissertations

Current cybersecurity best practices, techniques, tactics and procedures are insufficient to ensure the protection of Android systems. Software tools leveraging formal methods use mathematical means to assure both a design and implementation for a system and these methods can be used to provide security assurances. The goal of this research is to determine methods of assuring isolation when executing Android software in a contained environment. Specifically, this research demonstrates security properties relevant to Android software containers can be formally captured and validated, and that an implementation can be formally verified to satisfy a corresponding specification. A three-stage methodology called "The …


Special Perturbations On The Jetson Tx1 And Tx2 Computers, Tyler M. Moore Mar 2018

Special Perturbations On The Jetson Tx1 And Tx2 Computers, Tyler M. Moore

Theses and Dissertations

Simplified General Perturbations Number 4 (SGP4) has been the traditional algorithm for performing Orbit Determination (OD) onboard orbiting spacecraft. However, the recent rise of high-performance computers with low Size, Weight, and Power (SWAP) factors has provided the opportunity to use Special Perturbations (SP), a more accurate algorithm to perform onboard OD. This research evaluates the most efficient way to implement SP on NVIDIA’s Jetson TX series of integrated Graphical Processing Units (GPUs). An initial serial version was implemented on the Jetson TX1 and TX2's Central Processing Units (CPUs). The runtimes of the initial version are the benchmark that the runtimes …


Mitigating The Effects Of Boom Occlusion On Automated Aerial Refueling Through Shadow Volumes, Zachary C. Paulson Mar 2018

Mitigating The Effects Of Boom Occlusion On Automated Aerial Refueling Through Shadow Volumes, Zachary C. Paulson

Theses and Dissertations

In flight refueling of Unmanned Aerial Vehicles (UAVs) is critical to the United States Air Force (USAF). However, the large communication latency between a ground-based operator and his/her remote UAV makes docking with a refueling tanker unsafe. This latency may be mitigated by leveraging a tanker-centric stereo vision system. The vision system observes and computes an approaching receiver's relative position and orientation offering a low-latency, high frequency docking solution. Unfortunately, the boom -- an articulated refueling arm responsible for physically pumping fuel into the receiver -- occludes large portions of the receiver especially as the receiver approaches and docks with …


Rss-Based Device-Free Passive Detection And Localization Using Home Automation Network Radio Frequencies, Tiffany M. Phan Mar 2018

Rss-Based Device-Free Passive Detection And Localization Using Home Automation Network Radio Frequencies, Tiffany M. Phan

Theses and Dissertations

This research provided a proof of concept for a device-free passive (DfP) system capable of detecting and localizing a target through exploitation of a home automation network’s radio frequency (RF) signals. The system was developed using Insteon devices with a 915 MHz center frequency. Without developer privileges, limitations of the Insteon technology like no intrinsic received signal strength (RSS) field and silent periods between messages were overcome by using software-defined radios to simulate Insteon devices capable of collecting and reporting RSS, and by creating a message generation script and implementing a calibrated filter threshold to reduce silent periods. Evaluation of …


Integrity Monitoring For Automated Aerial Refueling: A Stereo Vision Approach, Thomas R. Stuart Mar 2018

Integrity Monitoring For Automated Aerial Refueling: A Stereo Vision Approach, Thomas R. Stuart

Theses and Dissertations

Unmanned aerial vehicles (UAVs) increasingly require the capability to y autonomously in close formation including to facilitate automated aerial refueling (AAR). The availability of relative navigation measurements and navigation integrity are essential to autonomous relative navigation. Due to the potential non-availability of the global positioning system (GPS) during military operations, it is highly desirable that relative navigation can be accomplished without the use of GPS. This paper develops two algorithms designed to provide relative navigation measurements solely from a stereo image pair. These algorithms were developed and analyzed in the context of AAR using a stereo camera system modeling that …


Securing Critical Infrastructure: A Ransomware Study, Blaine M. Jeffries Mar 2018

Securing Critical Infrastructure: A Ransomware Study, Blaine M. Jeffries

Theses and Dissertations

This thesis reviews traditional ransomware attack trends in order to present a taxonomy for ransomware targeting industrial control systems. After reviewing a critical infrastructure ransomware attack methodology, a corresponding response and recovery plan is described. The plan emphasizes security through redundancy, specifically the incorporation of standby programmable logic controllers. This thesis goes on to describe a set of experiments conducted to test the viability of defending against a specialized ransomware attack with a redundant controller network. Results support that specific redundancy schemes are effective in recovering from a successful attack. Further experimentation is conducted to test the feasibility of industrial …


Variable Speed Simulation For Accelerated Industrial Control System Cyber Training, Luke M. Bradford Mar 2018

Variable Speed Simulation For Accelerated Industrial Control System Cyber Training, Luke M. Bradford

Theses and Dissertations

It is important for industrial control system operators to receive quality training to defend against cyber attacks. Hands-on training exercises with real-world control systems allow operators to learn various defensive techniques and see the real-world impact of changes made to a control system. Cyber attacks and operator actions can have unforeseen effects that take a significant amount of time to manifest and potentially cause physical harm to the system, making high-fidelity training exercises time-consuming and costly. This thesis presents a method for accelerating training exercises by simulating and predicting the effects of a cyber event on a partially-simulated control system. …