Open Access. Powered by Scholars. Published by Universities.®

PDF

Selected Works

Discipline
Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 161

Full-Text Articles in Systems Engineering

Challenges Of Erau’S First Suborbital Flight Aboard Blue Origin’S New Shepard M7 For The Cell Research Experiment In Microgravity (Crexim), Pedro Llanos, Kristina Andrijauskaite, Vijay V. Duraisamy, Francisco F. Pastrana, Erik Seedhouse, Sathya Gangadharan, Leonid Bunegin, Mariel Rico Jun 2019

Challenges Of Erau’S First Suborbital Flight Aboard Blue Origin’S New Shepard M7 For The Cell Research Experiment In Microgravity (Crexim), Pedro Llanos, Kristina Andrijauskaite, Vijay V. Duraisamy, Francisco F. Pastrana, Erik Seedhouse, Sathya Gangadharan, Leonid Bunegin, Mariel Rico

Pedro J. Llanos (www.AstronauticsLlanos.com)

Cell Research Experiment In Microgravity (CRExIM) was launched aboard Blue Origin’s New Shepard suborbital vehicle on Tuesday, December 12, 2017, from the West Texas Launch Site in Van Horn, Texas. One of the aims of this science experiment was to assess the effects of microgravity on murine T-cells during suborbital flight. These cells were placed in a NanoLab with a data logger that sensed the acceleration, temperature, and relative humidity during preflight, flight, and postflight operations. Some discrepancies in sensor measurement were noticed, and these errors were attributed partly to the difference in sampling rates and partly to the different …


Educating The Space Scientists At Embry-Riddle Through Design, Build And Fly Rocketry Experience, Pedro Llanos, Robert E. Haley, Sathya Gangadharan Jan 2019

Educating The Space Scientists At Embry-Riddle Through Design, Build And Fly Rocketry Experience, Pedro Llanos, Robert E. Haley, Sathya Gangadharan

Pedro J. Llanos (www.AstronauticsLlanos.com)

Practical experience for students in rockets and payloads is very valuable in the space industry, and it is something that would give them an advantage over other applicants. Students in Embry-Riddle Aeronautical University’s Payload and Integration class were given the opportunity to build a level 1 rocket and gain experience developing, testing, and integrating payloads into a rocket. The students were given the tasks to come up with an idea for a payload, design the payload to fit within the rocket for flight, and assemble and launch the rocket with the payload in the payload bay. The tasks required for …


Call For Abstracts - Resrb 2019, July 8-9, Wrocław, Poland, Wojciech M. Budzianowski Dec 2018

Call For Abstracts - Resrb 2019, July 8-9, Wrocław, Poland, Wojciech M. Budzianowski

Wojciech Budzianowski

No abstract provided.


Efficacy Of Virtual Models In A Production Systems Course, Lawrence Whitman, Barbara Chaparro Oct 2018

Efficacy Of Virtual Models In A Production Systems Course, Lawrence Whitman, Barbara Chaparro

Barbara S. Chaparro

Wichita State University has developed an integrated set of virtual reality models of an aircraft assembly line. These models are intended to provide students an ‘artifact’ of industrial and manufacturing engineering by providing a realistic environment for initial learning and application. By utilizing a virtual model of the line, students are able to view the process and interrogate the process details, make changes and observe the effects, and gain a better understanding of the concepts and their interrelationships. This paper presents the method used to assess if virtual models (computer models of a real factory) lead to: improved perception of …


Capturing Cognitive Fingerprints From Keystroke Dynamics, J. Morris Chang, Chi-Chen Fang, Kuan-Hsing Ho, Norene Kelly, Pei-Yuan Wu, Yixiao Ding, Chris Chu, Stephen B. Gilbert, Amed E. Kamal, Sun-Yuan Kung Jun 2017

Capturing Cognitive Fingerprints From Keystroke Dynamics, J. Morris Chang, Chi-Chen Fang, Kuan-Hsing Ho, Norene Kelly, Pei-Yuan Wu, Yixiao Ding, Chris Chu, Stephen B. Gilbert, Amed E. Kamal, Sun-Yuan Kung

Morris Chang

Conventional authentication systems identify a user only at the entry point. Keystroke dynamics can continuously authenticate users by their typing rhythms without extra devices. This article presents a new feature called cognitive typing rhythm (CTR) to continuously verify the identities of computer users. Two machine techniques, SVM and KRR, have been developed for the system. The best results from experiments conducted with 1,977 users show a false-rejection rate of 0.7 percent and a false-acceptance rate of 5.5 percent. CTR therefore constitutes a cognitive fingerprint for continuous. Its effectiveness has been verified through a large-scale dataset. This article is part of …


A Multiperiod Generalized Network Flow Model Of The U.S. Integrated Energy System: Part I—Model Description, Ana Quelhas, Esteban Gil, James D. Mccalley, Sarah M. Ryan Jun 2017

A Multiperiod Generalized Network Flow Model Of The U.S. Integrated Energy System: Part I—Model Description, Ana Quelhas, Esteban Gil, James D. Mccalley, Sarah M. Ryan

James McCalley

This paper is the first of a two-part paper presenting a multiperiod generalized network flow model of the integrated energy system in the United States. Part I describes the modeling approach used to evaluate the economic efficiencies of the system-wide energy flows, from the coal and natural gas suppliers to the electric load centers. Under the proposed problem formulation, fuel supply and electricity demand nodes are connected via a transportation network, and the model is solved for the most efficient allocation of quantities and corresponding prices. The methodology includes physical, economic, and environmental aspects that characterize the different networks. Part …


Swarm Engineering, S. Kazadi '90 Mar 2017

Swarm Engineering, S. Kazadi '90

Sanza Kazadi

Swarm engineering is the natural evolution of the use of swarm-based techniques in the accomplishment of high level tasks using a number of simple robots. In this approach, one seeks not to generate a class of behaviors designed to accomplish a given global goal, as is the approach typically found in mainstream robotics. Once the class of behaviors has been understood and decided upon, specific behaviors designed to accomplish this goal may be generated that will complete the desired task without any concern about whether or not the final goal will actually be completed. As long as the generated behaviors …


C.V. - Wojciech Budzianowski, Wojciech M. Budzianowski Jan 2017

C.V. - Wojciech Budzianowski, Wojciech M. Budzianowski

Wojciech Budzianowski

-


Renewable Energy And Sustainable Development (Resd) Group, Wojciech M. Budzianowski Jan 2017

Renewable Energy And Sustainable Development (Resd) Group, Wojciech M. Budzianowski

Wojciech Budzianowski

No abstract provided.


Systems Social Seience: A Design Inquiry Approach For Stabilization And Reconstruction Of Social Systems, Barry G. Silverman Aug 2016

Systems Social Seience: A Design Inquiry Approach For Stabilization And Reconstruction Of Social Systems, Barry G. Silverman

Barry G Silverman

This paper explores novel approaches under the design inquiry paradigm that promise to help organizations better understand and solve socio-technical dilemmas. Design inquiry is contrasted with scientific inquiry (Section 1). Section 2 presents a meso-scale model of models methodology for design inquiry that synthesizes systems science, agent modeling and simulation, knowledge management architectures, and domain theories and knowledge. The goal is to focus computational science on exploring underlying mechanisms (white box modeling) and to support reflective theorizing and discourse to explain social dilemmas and potential resolutions. Section 3 then describes an evolving agent modeling and simulation testbed while Section 4 …


Rich Socio-Cognitive Agents For Immersive Training Environments: Case Of Nonkin Village, Barry G. Silverman, David Pietrocola, Ben Nye, Nathan Weyer, Oleg Osin, Dan Johnson, Ransom Weaver Aug 2016

Rich Socio-Cognitive Agents For Immersive Training Environments: Case Of Nonkin Village, Barry G. Silverman, David Pietrocola, Ben Nye, Nathan Weyer, Oleg Osin, Dan Johnson, Ransom Weaver

Barry G Silverman

Demand is on the rise for scientifically based human-behavior models that can be quickly customized and inserted into immersive training environments to recreate a given society or culture. At the same time, there are no readily available science model-driven environments for this purpose (see survey in Sect. 2). In researching how to overcome this obstacle, we have created rich (complex) socio-cognitive agents that include a large number of social science models (cognitive, sociologic, economic, political, etc) needed to enhance the realism of immersive, artificial agent societies. We describe current efforts to apply model-driven development concepts and how to permit other …


Holistically Evaluating Agent Based Social System Models, Gnana K. Bharathy, Barry G. Silverman Aug 2016

Holistically Evaluating Agent Based Social System Models, Gnana K. Bharathy, Barry G. Silverman

Barry G Silverman

The philosophical perspectives on model evaluation can be broadly classified into reductionist/logical positivist and relativist/holistic. In this paper, we outline some of our past efforts in, and challenges faced during, evaluating models of social systems with cognitively detailed agents. Owing to richness in the model, we argue that the holistic approach and consequent continuous improvement are essential to evaluating complex social system models such as these. A social system built primarily of cognitively detailed agents can provide multiple levels of correspondence, both at observable and abstract aggregated levels. Such a system can also pose several challenges, including large feature spaces, …


A Systems Approach To Healthcare: Agent-Based Modeling, Community Mental Health, And Population Well-Being, Barry G. Silverman, Nancy Hanrahan, Gnana K. Bharathy, Kim Gordon, Dan Johnson Aug 2016

A Systems Approach To Healthcare: Agent-Based Modeling, Community Mental Health, And Population Well-Being, Barry G. Silverman, Nancy Hanrahan, Gnana K. Bharathy, Kim Gordon, Dan Johnson

Barry G Silverman

Purpose Explore whether agent-based modeling and simulation can help healthcare administrators discover interventions that increase population wellness and quality of care while, simultaneously, decreasing costs. Since important dynamics often lie in the social determinants outside the health facilities that provide services, this study thus models the problem at three levels (individuals, organizations, and society). Methods The study explores the utility of translating an existing (prize winning) software for modeling complex societal systems and agent's daily life activities (like a Sim City style of software), into a desired decision support system. A case study tests if the 3 levels of system …


Social Learning And Adoption Of New Behavior In A Virtual Agent Society, Benjamin D. Nye, Barry G. Silverman Jul 2016

Social Learning And Adoption Of New Behavior In A Virtual Agent Society, Benjamin D. Nye, Barry G. Silverman

Barry G Silverman

Social learning and adoption of new behavior govern the rise of a variety of behaviors: from actions as mundane as dance steps to those as dangerous as new ways to make IED detonators. However, agents in immersive virtual environments lack the ability to realistically simulate the spread of new behavior. To address this gap, a cognitive model was designed that represents the well-known socio-cognitive factors of attention, social influence, and motivation that influence learning and the adoption of a new behavior. To explore the effectiveness of this model, simulations modeled the spread of two competing memes in Hamariyah, an archetypal …


Social Learning And Adoption Of New Behavior In A Virtual Agent Society, Benjamin D. Nye, Barry G. Silverman Jul 2016

Social Learning And Adoption Of New Behavior In A Virtual Agent Society, Benjamin D. Nye, Barry G. Silverman

Barry G Silverman

Social learning and adoption of new behavior govern the rise of a variety of behaviors: from actions as mundane as dance steps to those as dangerous as new ways to make IED detonators. However, agents in immersive virtual environments lack the ability to realistically simulate the spread of new behavior. To address this gap, a cognitive model was designed that represents the well-known socio-cognitive factors of attention, social influence, and motivation that influence learning and the adoption of a new behavior. To explore the effectiveness of this model, simulations modeled the spread of two competing memes in Hamariyah, an archetypal …


Human-Robot Interaction: Proximity And Speed—Slowly Back Away From The Robot!, Keith R. Macarthur, Kimberly Stowers, Peter A. Hancock Jul 2016

Human-Robot Interaction: Proximity And Speed—Slowly Back Away From The Robot!, Keith R. Macarthur, Kimberly Stowers, Peter A. Hancock

Keith Reid MacArthur

This experiment was designed to evaluate the effects of proximity and speed of approach on trust in human-robot interaction (HRI). The experimental design used a 2 (Speed) × 2 (Proximity) mixed factorial design and trust levels were measured by self-report on the Human Robot Trust Scale and the Trust in Automation Scale. Data analyses indicate proximity [F(2, 146) = 6.842, p < 0.01, partial ŋ 2 = 0.086] and speed of approach [F(2, 146) = 2.885, p = 0.059, partial ŋ 2 = 0.038] are significant factors contributing to changes in trust levels.


Procesy Cieplne I Aparaty (Lab), Wojciech M. Budzianowski Jan 2016

Procesy Cieplne I Aparaty (Lab), Wojciech M. Budzianowski

Wojciech Budzianowski

-


Inżynieria Chemiczna Lab., Wojciech M. Budzianowski Jan 2016

Inżynieria Chemiczna Lab., Wojciech M. Budzianowski

Wojciech Budzianowski

-


Consequence Analysis Of Bleve Scenario In The Propane Tank: Acase Study At Bandar Abbas Gas Condensate Refinery Of Iran, Saeed Nazari, Najmeh Karami, Hojjat Moghadam, Parvin Nasiri Sep 2015

Consequence Analysis Of Bleve Scenario In The Propane Tank: Acase Study At Bandar Abbas Gas Condensate Refinery Of Iran, Saeed Nazari, Najmeh Karami, Hojjat Moghadam, Parvin Nasiri

Innovative Research Publications IRP India

The occurrence of incidents resulting from chemical releases requires preparatory measures. Despite special layers of protection in chemicalindustries to avoid such releases and subsequent consequences, human errors still occur and negatively contribute to failures in different activities include maintenance practices and operating control and so on. It is proven that one of the most devastating risk in the oil and gas companies is explosion, particularly BLEVE. Thus, the study of this phenomena and analysis of its consequences at various stages is necessary. Recent studies claimed that the predictionof damaging effectafter the explosion by mathematical models is necessary for its effective …


Global Sensitivity Analysis Applied To Model Inversion Problems: A Contribution To Rail Condition Monitoring, René Schenkendorf, Jörn Groos May 2015

Global Sensitivity Analysis Applied To Model Inversion Problems: A Contribution To Rail Condition Monitoring, René Schenkendorf, Jörn Groos

René Schenkendorf

Rising demands on railroad infrastructure operator by means of profitability and punctuality call for advanced concepts of Prognostics and Health Management. Condition based preventive maintenance aims at strengthening the rail mode of transport through an optimized scheduling of maintenance actions based on the actual and prognosticated infrastructure condition, respectively. When applying model-based algorithms within the framework of Prognostics and Health Management unknown model parameters have to be identified first. Which of these parameters should be known as precisely as possible can be figured out systematically by a sensitivity analysis. A comprehensive global sensitivity analysis, however, might be prohibitive by means …


First Order Approximation Of The Stability Regions Of Time Delay Systems, Rifat Sipahi, Silviu-Julian Niculescu Mar 2015

First Order Approximation Of The Stability Regions Of Time Delay Systems, Rifat Sipahi, Silviu-Julian Niculescu

Rifat Sipahi

No abstract provided.


Intelligent Items Traceability System – Rfid Vs Qr, Masoud Shakiba, Mandeep Singh Jit Singh, Mardina Abdullah Jan 2015

Intelligent Items Traceability System – Rfid Vs Qr, Masoud Shakiba, Mandeep Singh Jit Singh, Mardina Abdullah

Masoud Shakiba

Nowadays traceability systems are an inseparable part of international business and are essential in manufacturing and supply chain management systems. The advantages of the traceability system are more obvious for products that are exported and those imported from overseas. Traceability is highly important in food management and for products with short expiry. In recent years there have been several investigations and publications on traceability systems criteria especially in the food industry in the US, Europe and Southeast Asia.


Inżynieria Chemiczna Ćw., Wojciech M. Budzianowski Jan 2015

Inżynieria Chemiczna Ćw., Wojciech M. Budzianowski

Wojciech Budzianowski

-


Tematyka Prac Doktorskich, Wojciech M. Budzianowski Jan 2015

Tematyka Prac Doktorskich, Wojciech M. Budzianowski

Wojciech Budzianowski

No abstract provided.


Zespół Energii Odnawialnej I Zrównoważonego Rozwoju (Eozr), Wojciech M. Budzianowski Dec 2014

Zespół Energii Odnawialnej I Zrównoważonego Rozwoju (Eozr), Wojciech M. Budzianowski

Wojciech Budzianowski

No abstract provided.


A Bayesian Beta Kernel Model For Binary Classification And Online Learning Problems, Cameron A. Mackenzie, Theodore B. Trafalis, Kash Barker Dec 2014

A Bayesian Beta Kernel Model For Binary Classification And Online Learning Problems, Cameron A. Mackenzie, Theodore B. Trafalis, Kash Barker

Cameron A. MacKenzie

Recent advances in data mining have integrated kernel functions with Bayesian probabilistic analysis of Gaussian distributions. These machine-learning approaches can incorporate prior information with new data to calculate probabilistic rather than deterministic values for unknown parameters. This article extensively analyzes a specific Bayesian kernel model that uses a kernel function to calculate a posterior beta distribution that is conjugate to the prior beta distribution. Numerical testing of the beta kernel model on several benchmark datasets reveals that this model's accuracy is comparable with those of the support vector machine (SVM), relevance vector machine, naive Bayes, and logistic regression, and the …


Desert Rhex Technical Report: Jornada And White Sands Trip, Sonia Roberts, Jeff Duperret, Aaron M. Johnson, Scott Van Pelt, Ted Zobeck, Nick Lancaster, Daniel E. Koditschek Nov 2014

Desert Rhex Technical Report: Jornada And White Sands Trip, Sonia Roberts, Jeff Duperret, Aaron M. Johnson, Scott Van Pelt, Ted Zobeck, Nick Lancaster, Daniel E. Koditschek

Sonia F. Roberts

Researchers in a variety of fields, including aeolian science, biology, and environmental science, have already made use of stationary and mobile remote sensing equipment to increase their variety of data collection opportunities. However, due to mobility challenges, remote sensing opportunities relevant to desert environments and in particular dune fields have been limited to stationary equipment. We describe here an investigative trip to two well-studied experimental deserts in New Mexico with D-RHex, a mobile remote sensing platform oriented towards desert research. D-RHex is the latest iteration of the RHex family of robots, which are six-legged, biologically inspired, small (10kg) platforms with …


A New Fuzzy Logic Approach To Capacitated Dynamic Dial-A-Ride Problem, Maher Maalouf, Cameron A. Mackenzie, Sridhar Radakrishnan, Mary Court Nov 2014

A New Fuzzy Logic Approach To Capacitated Dynamic Dial-A-Ride Problem, Maher Maalouf, Cameron A. Mackenzie, Sridhar Radakrishnan, Mary Court

Cameron A. MacKenzie

Almost all Dial-a-Ride problems (DARP) described in the literature pertain to the design of optimal routes and schedules for n customers who specify pick-up and drop-off times. In this article we assume that the customer is mainly concerned with the drop-off time because it is the most important to the customer. Based on the drop-off time specified by the customer and the customer's location, a pick-up time is calculated and given to the customer by the dispatching office. We base our formulation on a dynamic fuzzy logic approach in which a new request is assigned to a vehicle. The fuzzy …


Outage Constrained Robust Secure Transmission For Miso Wiretap Channels, Shuai Ma, Mingyi Hong, Engin Song, Xiangfeng Wang, Dechun Sun Oct 2014

Outage Constrained Robust Secure Transmission For Miso Wiretap Channels, Shuai Ma, Mingyi Hong, Engin Song, Xiangfeng Wang, Dechun Sun

Mingyi Hong

In this paper, we consider the robust secure beam-former design for multiple-input-single-output wiretap channels. Assuming that the eavesdroppers' channels are only partially available at the transmitter, we seek to maximize the secrecy rate under the transmit power and the secrecy rate outage probability constraint. The outage probability constraint requires that the secrecy rate exceed certain thresholds with high probability. Therefore, including such constraint in the design naturally ensures the desired robustness. Unfortunately, the presence of the probabilistic constraints makes the problem nonconvex and, hence, difficult to solve. In this paper, we investigate the outage probability constrained secrecy rate maximization problem …


Base Station Activation And Linear Transceiver Design For Optimal Resource Management In Heterogeneous Networks, Wei-Cheng Liao, Mingyi Hong, Ya-Feng Liu, Zhi-Quan Luo Aug 2014

Base Station Activation And Linear Transceiver Design For Optimal Resource Management In Heterogeneous Networks, Wei-Cheng Liao, Mingyi Hong, Ya-Feng Liu, Zhi-Quan Luo

Mingyi Hong

In a densely deployed heterogeneous network (HetNet), the number of pico/micro base stations (BS) can be comparable with the number of the users. To reduce the operational overhead of the HetNet, proper identification of the set of serving BSs becomes an important design issue. In this work, we show that by jointly optimizing the transceivers and determining the active set of BSs, high system resource utilization can be achieved with only a small number of BSs. In particular, we provide formulations and efficient algorithms for such joint optimization problem, under the following two common design criteria: i) minimization of the …