Open Access. Powered by Scholars. Published by Universities.®

Aviation Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Aviation

Validated Question Bank For Assessing Pilot Knowledge Of Aviation Weather Appendix: Weather Product Interpretation Questions, Robert Thomas, Cassandra Dommingo, John Kleber, Jackie Mcsorely, Amber Cole, Thomas Guinn, Elizabeth Blickensderfer Aug 2022

Validated Question Bank For Assessing Pilot Knowledge Of Aviation Weather Appendix: Weather Product Interpretation Questions, Robert Thomas, Cassandra Dommingo, John Kleber, Jackie Mcsorely, Amber Cole, Thomas Guinn, Elizabeth Blickensderfer

General Aviation Weather Display Interpretation

This appendix supplements the Thomas et al. (2022) paper titled “Validated Question Bank for Assessing Pilot Knowledge of Aviation Weather ” which validates a set of weather product interpretation questions that can be used to measure a pilot’s understanding of weather. The assessment consists of 15 weather product interpretation topics which can be administered as a single 65-question survey or, as in the Thomas et al. (2022) study, two assessments of 33 and 32 questions each separated by topic. The set of 65 questions can be found in this appendix along with a table which demonstrates how to separate the …


Pilot Development: An Empirical Mixed-Method Analysis, Jonathan Slottje, Jason Anderson, John M. Dickens, Adam D. Reiman Jun 2022

Pilot Development: An Empirical Mixed-Method Analysis, Jonathan Slottje, Jason Anderson, John M. Dickens, Adam D. Reiman

Faculty Publications

Purpose — Pilot upgrade training is critical to aircraft and passenger safety. This study aims to identify variances in the US Air Force C-130J pilot upgrade training based on geographic location and provide a model to enhance policy that will impact future pilot training efforts that lower cost and increase operator quality and proficiency.
Design/methodology/approach This research employed a mixed-method approach. First, the authors collected data and analyzed 90 C-130J pilots' aviation records and then contextualized this analysis with interviews of experts. Finally, the authors present a modified version of Six Sigma's define–measure–analyze–improve–control (DMAIC) that identifies and reduces the …


Transportation Service Level Impact On Aircraft Availability, Vincent Mclean, Adam D. Reiman Jun 2022

Transportation Service Level Impact On Aircraft Availability, Vincent Mclean, Adam D. Reiman

Faculty Publications

Purpose — Aircraft fail to meet mission capable rate goals due to a lack of supply of aircraft parts in inventory where the aircraft breaks. This triggers an order at the repair location. To maximize mission capable rate, the time from order to delivery needs to be minimized. The purpose of this research is to examine the case of three airfields for the order to delivery time of mission critical aircraft parts for a specific aircraft type. Design/methodology/approach — This research captured data from three information systems to assess the order fulfillment process. The data were analyzed to determine the …


Scheduling Aircraft Departures To Avoid Enroute Congestion, Johannes Martinez Mar 2022

Scheduling Aircraft Departures To Avoid Enroute Congestion, Johannes Martinez

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

When scheduled flights are forecast to overcrowd sections of enroute airspace, an air traffic control authority may need to delay departures. Mixed integer linear programming can be used to compute a schedule that resolves the congestion while bringing the sum of all delays to a minimum. Standard linear programming constraint formulations for such scheduling problems, however, have poor run times for instances of realistic size. A new constraint formulation based on cycles and paths through a route graph reduces run times in computational experiments. It shows particularly strong performance for schedules that approach the worst-case solution times in standard formulations.


Real Time Evaluation Of Boom And Drogue Occlusion With Aar, Xiaoyang Wu Mar 2022

Real Time Evaluation Of Boom And Drogue Occlusion With Aar, Xiaoyang Wu

Theses and Dissertations

In recent years, Unmanned Aerial Vehicles (UAV) have seen a rise in popularity. Various navigational algorithms have been developed as a solution to estimate a UAV’s pose relative to the refueler aircraft. The result can be used to safely automate aerial refueling (AAR) to improve UAVs’ time-on-station and ensure the success of military operations. This research aims to reach real-time performance using a GPU accelerated approach. It also conducts various experiments to quantify the effects of refueling boom/drogue occlusion and image exposure on the pose estimation pipeline in a lab setting.


Monocular Pose Estimation For Automated Aerial Refueling Via Perspective-N-Point, James C. Lynch Mar 2022

Monocular Pose Estimation For Automated Aerial Refueling Via Perspective-N-Point, James C. Lynch

Theses and Dissertations

Any Automated Aerial Refueling (AAR) solution requires the quick and precise estimation of the relative position and rotation of the two aircraft involved. This is currently accomplished using stereo vision techniques augmented by Iterative Closest Point (ICP), but requires post-processing to account for environmental factors such as boom occlusion. This paper proposes a monocular solution, combining a custom-trained single-shot object detection Convolutional Neural Network (CNN) and Perspective-n-Point (PnP) estimation to calculate a pose estimate with a single image. This solution is capable of pose estimation at contact point (22m) within 7cm of error and a rate of 10Hz, regardless of …


Examining Failures Of Kc-135s Using Survival Analysis, Vanessa I. R. Unseth Mar 2022

Examining Failures Of Kc-135s Using Survival Analysis, Vanessa I. R. Unseth

Theses and Dissertations

The United States Air Force manages an inventory of 396 KC-135 Stratotanker aircraft. With mission capability rates falling and total non-mission capability supply rates increasing, it is necessary to take a deeper look at recurrent failures. The study applies non-parametric and semi-parametric survival models to a dataset retrieved from LIMS-EV to look at the duration(s) until failure for the KC-135. Results of non-parametric models show cumulative failure rates increase as sorties or flight hours increase. In addition, semi-parametric models or Cox proportional hazards models with frailty confirm that locations or air bases are not associated with recurrent failures.


Ga Pilot Perceptions Of Speech Systems To Transcribe And Submit Pireps, Deborah S. Carstens Ph.D., Pmp, Michael S. Harwin, J.D., M.S., Tianhua Li, Ph.D., Brandon J. Pitts, Ph.D., Mel Futrell, M.A., Barrett Caldwell, Ph.D. Jan 2022

Ga Pilot Perceptions Of Speech Systems To Transcribe And Submit Pireps, Deborah S. Carstens Ph.D., Pmp, Michael S. Harwin, J.D., M.S., Tianhua Li, Ph.D., Brandon J. Pitts, Ph.D., Mel Futrell, M.A., Barrett Caldwell, Ph.D.

International Journal of Aviation, Aeronautics, and Aerospace

Flying into hazardous weather can be a cause of aviation incidents and accidents. Accidents involving general aviation (GA) pilots who are not instrument rated who fly into instrument meteorological conditions (IMC) are often fatal. Pilot weather reports (PIREPs) can increase the accuracy and timeliness of current and forecasted weather conditions. They are an essential tool used by pilots to avoid flying into hazardous weather as well as meteorologists to develop and update aviation forecasts. Thus, a large number of accurate PIREPs with the best source of current weather coming from pilots and air traffic controllers are needed. Pilots are often …


The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan Jan 2022

The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan

Annual ADFSL Conference on Digital Forensics, Security and Law

In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …


Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd Jan 2022

Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …


Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha Jan 2022

Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha

Annual ADFSL Conference on Digital Forensics, Security and Law

The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …


Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik Jan 2022

Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …


Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd Jan 2022

Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …


Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik Jan 2022

Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …


A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow Jan 2022

A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …


Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik Jan 2022

Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …


Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk Jan 2022

Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk

Annual ADFSL Conference on Digital Forensics, Security and Law

The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …


A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang Jan 2022

A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …