Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

Embry-Riddle Aeronautical University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 24 of 24

Full-Text Articles in Computer and Systems Architecture

Immersive Framework For Designing Trajectories Using Augmented Reality, Joseph Anderson, Leo Materne, Karis Cooks, Michelle Aros, Jaia Huggins, Jesika Geliga-Torres, Kamden Kuykendall, David Canales, Barbara Chaparro Jan 2024

Immersive Framework For Designing Trajectories Using Augmented Reality, Joseph Anderson, Leo Materne, Karis Cooks, Michelle Aros, Jaia Huggins, Jesika Geliga-Torres, Kamden Kuykendall, David Canales, Barbara Chaparro

Publications

The intuitive interaction capabilities of augmented reality make it ideal for solving complex 3D problems that require complex spatial representations, which is key for astrodynamics and space mission planning. By implementing common and complex orbital mechanics algorithms in augmented reality, a hands-on method for designing orbit solutions and spacecraft missions is created. This effort explores the aforementioned implementation with the Microsoft Hololens 2 as well as its applications in industry and academia. Furthermore, a human-centered design process and study are utilized to ensure the tool is user-friendly while maintaining accuracy and applicability to higher-fidelity problems.


Enhancing Cyberspace Monitoring In The United States Aviation Industry: A Multi-Layered Approach For Addressing Emerging Threats, Matthew Janson Apr 2023

Enhancing Cyberspace Monitoring In The United States Aviation Industry: A Multi-Layered Approach For Addressing Emerging Threats, Matthew Janson

Doctoral Dissertations and Master's Theses

This research project examined the cyberspace domain in the United States (U.S.) aviation industry from many different angles. The research involved learning about the U.S. aviation cyberspace environment, the landscape of cyber threats, new technologies like 5G and smart airports, cybersecurity frameworks and best practices, and the use of aviation cyberspace monitoring capabilities. The research looked at how vulnerable the aviation industry is from cyber-attacks, analyzed the possible effects of cyber-attacks on the industry, and suggests ways to improve the industry's cybersecurity posture. The project's main goal was to protect against possible cyber-attacks and make sure that the aviation industry …


Height Information Aided 3d Real-Time Large-Scale Underground User Positioning, Houbing Song, Chengkai Tang, Cunle Zhang, Lingling Zhang, Yi Zhang Sep 2022

Height Information Aided 3d Real-Time Large-Scale Underground User Positioning, Houbing Song, Chengkai Tang, Cunle Zhang, Lingling Zhang, Yi Zhang

Publications

Due to the cost of inertial navigation and visual navigation equipment and lake of satellite navigation signals, they cannot be used in large‐scale underground mining environment. To solve this problem, this study proposes large‐scale underground 3D real‐time positioning method with seam height assistance. This method uses the ultrawide band positioning base station as the core and is combined with seam height information to build a factor graph confidence transfer model to realise3D positioning. The simulation results show that the proposed real‐time method is superior to the existing algorithms in positioning accuracy and can meet the needs of large‐scale underground users.


Windows Kernel Hijacking Is Not An Option: Memoryranger Comes To The Rescue Again, Igor Korkin Jun 2021

Windows Kernel Hijacking Is Not An Option: Memoryranger Comes To The Rescue Again, Igor Korkin

Journal of Digital Forensics, Security and Law

The security of a computer system depends on OS kernel protection. It is crucial to reveal and inspect new attacks on kernel data, as these are used by hackers. The purpose of this paper is to continue research into attacks on dynamically allocated data in the Windows OS kernel and demonstrate the capacity of MemoryRanger to prevent these attacks. This paper discusses three new hijacking attacks on kernel data, which are based on bypassing OS security mechanisms. The first two hijacking attacks result in illegal access to files open in exclusive access. The third attack escalates process privileges, without applying …


Enterprise Architecture Transformation Process From A Federal Government Perspective, Tonia Canada, Leila Halawi Mar 2021

Enterprise Architecture Transformation Process From A Federal Government Perspective, Tonia Canada, Leila Halawi

Publications

The need for information technology organizations to transform enterprise architecture is driven by federal government mandates and information technology budget constraints. This qualitative case study aimed to identify factors that hinder federal government agencies from driving enterprise architecture transformation processes from a compliancy to a flexible process. Common themes in interviewee responses were identified, coded, and summarized. Critical recommendations for future best practices, including further research, were also presented.


Spatio-Temporal Data Mining For Aviation Delay Prediction, Kai Zhang, Houbing Song, Yushan Jiang, Dahai Liu Mar 2021

Spatio-Temporal Data Mining For Aviation Delay Prediction, Kai Zhang, Houbing Song, Yushan Jiang, Dahai Liu

Publications

To accommodate the unprecedented increase of commercial airlines over the next ten years, the Next Generation Air Transportation System (NextGen) has been implemented in the USA that records large-scale Air Traffic Management (ATM) data to make air travel safer, more efficient, and more economical. A key role of collaborative decision making for air traffic scheduling and airspace resource management is the accurate prediction of flight delay. There has been a lot of attempts to apply data-driven methods such as machine learning to forecast flight delay situation using air traffic data of departures and arrivals. However, most of them omit en-route …


Enterprise Architecture Transformation Process From A Federal Government Perspective, Tonia Canada, Leila Halawi Nov 2020

Enterprise Architecture Transformation Process From A Federal Government Perspective, Tonia Canada, Leila Halawi

Publications

The need for information technology organizations to transform enterprise architecture is driven by federal government mandates and information technology budget constraints. This qualitative case study aimed to identify factors that hinder federal government agencies from driving enterprise architecture transformation processes from a compliancy to a flexible process. Common themes in interviewee responses were identified, coded, and summarized. Critical recommendations for future best practices, including further research, were also presented.


Validation Framework For Autonomous Aerial Vehicles, Mustafa Akbas Ph.D. Mar 2020

Validation Framework For Autonomous Aerial Vehicles, Mustafa Akbas Ph.D.

National Training Aircraft Symposium (NTAS)

Autonomous aerial vehicles (AAV) have the potential to have market disruptions for various industries such as ground delivery and aerial transportation. Hence, the USAF has called for increased level of autonomy and rapid progress is being made in artificial intelligence (AI) engines, complex and non-deterministic system components, which are at the core of the autonomous aerial platforms. Traditional testing and validation methods fall short of satisfying the requirement of testing such complex systems. Therefore, to achieve highly or fully autonomous capabilities, a major leap forward in the validation is required. Otherwise, the full capabilities of autonomy will not be realized. …


Where We Are With Enterprise Architecture, Leila Halawi, Richard Mccarthy, James Farah Dec 2019

Where We Are With Enterprise Architecture, Leila Halawi, Richard Mccarthy, James Farah

Publications

Enterprise architecture has been continuously developing since the mid-1980s. Although there is now 35 years of research and use, there is still a lack consistent definitions and standards. This is apparent in the proliferation of so many different enterprise architecture frameworks. Despite the significant body of research, there is a need for standardization of terminology based upon a meta-analysis of the literature. Enterprise architecture programs require commitment throughout an organization to be effective and must be perceived to add value. This research offers an initial basis for researchers who need to expand and continue this research topic with an actual …


Big Five Technologies In Aeronautical Engineering Education: Scoping Review, Ruth Martinez-Lopez Jan 2019

Big Five Technologies In Aeronautical Engineering Education: Scoping Review, Ruth Martinez-Lopez

International Journal of Aviation, Aeronautics, and Aerospace

The constant demands that technology creates in aerospace engineering also influence education. The identification of the technologies with practical application in aerospace engineering is of current interest to decision makers in both universities and industry. A social network approach enhances this scoping review of the research literature to identify the main topics using the Big Five technologies in aerospace engineering education. The conceptual structure of the dataset (n=447) was analyzed from different approaches: at macro-level, a comparative of the digital technology identified by cluster analysis with the number of co-words established in 3 and 8 and, a keyword central structure …


A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman Oct 2018

A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman

Journal of Digital Forensics, Security and Law

Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are …


Developing High Performance Grid Computing Systems On A Budget, Forrest Mobley Oct 2018

Developing High Performance Grid Computing Systems On A Budget, Forrest Mobley

Undergraduate Research Symposium - Prescott

High performance grid computing systems are essential for today’s engineering and research projects, as they make certain impossibilities possible, and save time and money as well. However, these supercomputers can cost upwards of a hundred million dollars and require large amounts of space and energy to keep, making them all but inaccessible to small engineering firms and universities. As most of these institutions do not require the massive level of computing power offered by these large grid computers, small scale versions are often built, with various setups. The purpose of this project was to set up a new small scale …


Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta May 2018

Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta

Annual ADFSL Conference on Digital Forensics, Security and Law

Enterprises are facing an unprecedented risk of security incidents due to the influx of emerging technologies, like smartphones and wearables. Most of the current Mobile security systems are not maturing in pace with technological advances. They lack the ability to learn and adapt from the past knowledge base. In the case of a security incident, enterprises find themselves underprepared for the lack of evidence and data. The systems are not designed to be forensic ready. There is a need for automated security analysis and forensically ready solution, which can learn and continuously adapt to new challenges, improve efficiency and productivity …


Information Systems Continuance: Faculty Perceptions Of Canvas, Leila Halawi, Richard V. Mccarthy, James Farah Jan 2018

Information Systems Continuance: Faculty Perceptions Of Canvas, Leila Halawi, Richard V. Mccarthy, James Farah

Publications

This research in process proposes a study of the theoretical background, motivation, and methods to examine factors that predict faculty perceived usefulness, ease of use, satisfaction and learning facilitation of the Canvas learning management system. We propose utilizing a model to predict continuance intention of use in an online class using Canvas and describe the methodology that will be used to test this model. The focus of this research is on continuance usage as it is the variable that enhances the teaching and learning experience with factors that are helpful in understanding the phenomenon.


Survey Of Branch Prediction, Pipelining, Memory Systems As Related To Computer Architecture, Kristina Landen Apr 2017

Survey Of Branch Prediction, Pipelining, Memory Systems As Related To Computer Architecture, Kristina Landen

Student Works

This paper is a survey of topics introduced in Computer Engineering Course CEC470: Computer Architecture (CEC470). The topics covered in this paper provide much more depth than what was provided in CEC470, in addition to exploring new concepts not touched on in the course. Topics presented include branch prediction, pipelining, registers, memory, and the operating system, as well as some general design considerations for computer architecture as a whole.

The design considerations explored include a discussion on different types of instruction types specific to the ARM Instruction Set Architecture, known as ARM and Thumb, as well as an exploration of …


Image And Information Fusion Experiments With A Software-Defined Multi-Spectral Imaging System For Aviation And Marine Sensor Networks, Sam B. Siewert, Matthew Demi Vis, Ryan Claus, Ramnarayan Krishnamurthy, Surjith B. Singh, Akshay K. Singh, Shivasankar Gunasekaran Jan 2017

Image And Information Fusion Experiments With A Software-Defined Multi-Spectral Imaging System For Aviation And Marine Sensor Networks, Sam B. Siewert, Matthew Demi Vis, Ryan Claus, Ramnarayan Krishnamurthy, Surjith B. Singh, Akshay K. Singh, Shivasankar Gunasekaran

Publications

The availability of Internet, line-of-sight and satellite identification and surveillance information as well as low-power, low-cost embedded systems-on-a-chip and a wide range of visible to long-wave infrared cameras prompted Embry Riddle Aeronautical University to collaborate with the University of Alaska Arctic Domain Awareness Center (ADAC) in summer 2016 to prototype a camera system we call the SDMSI (Software-Defined Multi-spectral Imager). The concept for the camera system from the start has been to build a sensor node that is drop-in-place for simple roof, marine, pole-mount, or buoy-mounts. After several years of component testing, the integrated SDMSI is now being tested, first …


Software Defined Multi-Spectral Imaging For Arctic Sensor Networks, Sam B. Siewert, Matthew Demi Vis, Ryan Claus, Vivek Angoth, Karthikeyan Mani, Kenrick Mock, Surjith B. Singh, Saurav Srivistava, Chris Wagner Apr 2016

Software Defined Multi-Spectral Imaging For Arctic Sensor Networks, Sam B. Siewert, Matthew Demi Vis, Ryan Claus, Vivek Angoth, Karthikeyan Mani, Kenrick Mock, Surjith B. Singh, Saurav Srivistava, Chris Wagner

Publications

Availability of off-the-shelf infrared sensors combined with high definition visible cameras has made possible the construction of a Software Defined Multi-Spectral Imager (SDMSI) combining long-wave, near-infrared and visible imaging. The SDMSI requires a real-time embedded processor to fuse images and to create real-time depth maps for opportunistic uplink in sensor networks. Researchers at Embry Riddle Aeronautical University working with University of Alaska Anchorage at the Arctic Domain Awareness Center and the University of Colorado Boulder have built several versions of a low-cost drop-in-place SDMSI to test alternatives for power efficient image fusion. The SDMSI is intended for use in field …


The Design Of A Racing Simulator: A Three-Phase User Testing Approach, Jakob E. Rouleau, Eric J. Wach Apr 2016

The Design Of A Racing Simulator: A Three-Phase User Testing Approach, Jakob E. Rouleau, Eric J. Wach

Human Factors and Applied Psychology Student Conference

No abstract provided.


Measuring Security: A Challenge For The Generation, Janusz Zalewski, Steven Drager, William Mckeever, Andrew J. Kornecki Jan 2014

Measuring Security: A Challenge For The Generation, Janusz Zalewski, Steven Drager, William Mckeever, Andrew J. Kornecki

Department of Electrical Engineering and Computer Science - Daytona Beach

This paper presents an approach to measuring computer security understood as a system property, in the category of similar properties, such as safety, reliability, dependability, resilience, etc. First, a historical discussion of measurements is presented, beginning with views of Hermann von Helmholtz in his 19th century work “Zählen und Messen”. Then, contemporary approaches related to the principles of measuring software properties are discussed, with emphasis on statistical, physical and software models. A distinction between metrics and measures is made to clarify the concepts. A brief overview of inadequacies of methods and techniques to evaluate computer security is presented, followed by …


Keeping The Skies Safe, Massood Towhidnejad, Andrew J. Kornecki Jan 2014

Keeping The Skies Safe, Massood Towhidnejad, Andrew J. Kornecki

Department of Electrical Engineering and Computer Science - Daytona Beach

Professors Massood Towhidnejad and Andrew Kornecki shine a light on how their lab is helping government and the aviation industry to enhance the safety and security of software-intensive systems.


Scan Loss Pattern Synthesis For Adaptive Array Ground Stations, William C. Barott, Mary Ann Ingram, Paul G. Steffes Jul 2010

Scan Loss Pattern Synthesis For Adaptive Array Ground Stations, William C. Barott, Mary Ann Ingram, Paul G. Steffes

Publications

We present several techniques for maximizing the contact time between low Earth orbiting satellites (LEOs) and a ground station (GS). The GS comprises an adaptive array of electronically steered space-fed lenses (SFLs). Each SFL is manufactured as a low-cost printed circuit with the result that it exhibits scanning loss. By differently orienting the boresights of the SFLs in the adaptive array, the SFL's scanning losses can be made to optimally complement the path loss of the LEO, thereby reducing the cost of the GS while maximizing the download capacity of the satellite link. The optimization, implemented with a genetic algorithm …


Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler Jan 2009

Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler

Security Studies & International Affairs - Daytona Beach

"This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info."--from the article


Analyzing The Impact Of A Virtual Machine On A Host Machine, Greg Dorn, Chris Marberry, Scott Conrad, Philip Craiger Jan 2009

Analyzing The Impact Of A Virtual Machine On A Host Machine, Greg Dorn, Chris Marberry, Scott Conrad, Philip Craiger

Publications

As virtualization becomes more prevalent in the enterprise and in personal computing, there is a great need to understand the technology as well as its ramifications for recovering digital evidence. This paper focuses on trace evidence related to the installation and execution of virtual machines (VMs) on a host machine. It provides useful information regarding the types and locations of files installed by VM applications, the processes created by running VMs and the structure and identity of VMs, ancillary files and associated artifacts.


The Development Of Speech Research Tools On Mit's Lisp Machine-Based Workstations, D. Scott Cyphers, Robert H. Kassel, David H. Kaufman, Hong C. Leung, Mark A. Randolph, Stephanie Seneff, John E. Unverferth Iii, Timothy Wilson, Victor W. Zue Jan 1986

The Development Of Speech Research Tools On Mit's Lisp Machine-Based Workstations, D. Scott Cyphers, Robert H. Kassel, David H. Kaufman, Hong C. Leung, Mark A. Randolph, Stephanie Seneff, John E. Unverferth Iii, Timothy Wilson, Victor W. Zue

Publications

In recent years, a number of useful speech- and language-related research tools have been under development at MIT. These tools are aids for efficiently analyzing the acoustic characteristics of speech and the phonological properties of a language. They are playing a valuable role in our own research, as well as in research conducted elsewhere. This paper describes several of the systems being developed for use on our Lisp Machine workstations.