Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Embry-Riddle Aeronautical University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 1679

Full-Text Articles in Physical Sciences and Mathematics

Coherent Captain Mills: The Search For Sterile Neutrinos, Ashley Elliott, Jeramy Gordon, Jonah Greenwood, Rachel Lake, Ryder Moreno, Emily Strawn, Kate Walker May 2020

Coherent Captain Mills: The Search For Sterile Neutrinos, Ashley Elliott, Jeramy Gordon, Jonah Greenwood, Rachel Lake, Ryder Moreno, Emily Strawn, Kate Walker

Discovery Day - Prescott

The observation of neutrino oscillations confirms that the active neutrinos (νe, νμ, ντ) are comprised of three mass eigenstates with Δm2 values between 10-3 to 10-5 eV2 . However, a persistent phenomenon has been observed at LSND, MiniBooNE and other shortbaseline experiments (SBE) where Δm2 ~ 1eV2 and is not compatible with the current mixing between mass eigenstates. However, a 4th neutrino, a sterile neutrino (νs) that doesn’t participate in weak interactions could explain the phenomena observed as SBE’s. An experiment has been constructed at TA-53 at Los Alamos National Laboratory to investigate this large Δm2 ~ 1eV2 and determine conclusively ...


Neusch Automated Filter System: A Custom-Designed Photo-Filter Switching Apparatus For Embry-Riddle’S 1 Meter Telescope, Tyler Neusch May 2020

Neusch Automated Filter System: A Custom-Designed Photo-Filter Switching Apparatus For Embry-Riddle’S 1 Meter Telescope, Tyler Neusch

Dissertations and Theses

The one-meter telescope on the roof of Embry-Riddle’s College of Arts and Sciences building in Daytona Beach, FL is an advanced piece of technology supporting education and public outreach. One part of this telescopic system is a custom-made Cassegrain Instrument Mount. This one-of-a-kind mount allows for multiple scientific instruments to be simultaneously mounted to the telescope. However, its mechanical layout prevents the use of a traditional device known as a filter wheel.

Filter wheels store multiple photo-filters each capable of filtering out all but certain wavelengths of light for use with a CCD camera. Therefore, a filter wheel allows ...


Supercritical Carbon Dioxide Based Heat Exchanger On The Martian, Sarah Guinn Apr 2020

Supercritical Carbon Dioxide Based Heat Exchanger On The Martian, Sarah Guinn

Discovery Day - Prescott

The use of supercritical carbon dioxide (sCO2) in power cycles has been fairly new in the last decade. Due to this, there is a lack in research for both terrestrial and extraterrestrial applications. The purpose of this project is to utilize sCO2 as a working fluid and design and optimize a Brayton Cycle based heat exchanger on the Martian surface. Due to the lack of water on Mars, this research will provide a stronger analysis of planetary based drycooling processes in low atmospheric pressure and colder temperatures. We have been conducting an in-depth analysis of the heat exchanger by modeling ...


Gravitational Wave Calibration Error For Supernovae Core Collapse, Brad Ratto Apr 2020

Gravitational Wave Calibration Error For Supernovae Core Collapse, Brad Ratto

Discovery Day - Prescott

The existence of gravitational waves reveals yet another method in which information is transmitted across the cosmos, bringing with it further insight into the inner workings of our universe. In order to detect such phenomena, we use ground based Laser Interferometers to measure the microscopic deformations in space-time and explore a new frontier in gravitational astronomy. However, such instrumentation also induces distortions in the gravitational waves henceforth diminishing the ability to extract accurate physical information. Moreover, the ability to extract a coherent signal amongst the noise remains an issue that requires constant improvement. The aim of this study is to ...


The Exotime Project: Signals In The O − C Diagrams Of The Rapidly Pulsating Subdwarfs Dw Lyn, V1636 Ori, Qq Vir, And V541 Hya, F. Mackebrandt, Terry D. Oswalt, Terry Oswalt, R. Silvotti, S. -L. Kim, D. Kilkenny, E. M. Green, R. Lutz, T. Nagel, J. L. Provencal, S. Benatti, L. Lanteri, A. Bonanno, A. Frasca, R. Janulis, M. Paparó, L. Molnár, R. Claudi, R. H. Østensen Apr 2020

The Exotime Project: Signals In The O − C Diagrams Of The Rapidly Pulsating Subdwarfs Dw Lyn, V1636 Ori, Qq Vir, And V541 Hya, F. Mackebrandt, Terry D. Oswalt, Terry Oswalt, R. Silvotti, S. -L. Kim, D. Kilkenny, E. M. Green, R. Lutz, T. Nagel, J. L. Provencal, S. Benatti, L. Lanteri, A. Bonanno, A. Frasca, R. Janulis, M. Paparó, L. Molnár, R. Claudi, R. H. Østensen

Publications

Aims. We aim to investigate variations in the arrival time of coherent stellar pulsations due to the light-travel time effect to test for the presence of sub-stellar companions. Those companions are the key to one possible formation scenario of apparently single sub-dwarf B stars. Methods. We made use of an extensive set of ground-based observations of the four large amplitude p-mode pulsators DW Lyn, V1636 Ori, QQ Vir, and V541 Hya. Observations of the TESS space telescope are available on two of the targets. The timing method compares the phase of sinusoidal fits to the full multi-epoch light curves with ...


Teaching Data Carving Using The Real World Problem Of Text Message Extraction From Unstructured Mobile Device Data Dumps, Gary D. Cantrell, Joan Runs Through Apr 2020

Teaching Data Carving Using The Real World Problem Of Text Message Extraction From Unstructured Mobile Device Data Dumps, Gary D. Cantrell, Joan Runs Through

Journal of Digital Forensics, Security and Law

Data carving is a technique used in data recovery to isolate and extract files based on file content without any file system guidance. It is an important part of data recovery and digital forensics, but it is also useful in teaching computer science students about file structure and binary encoding of information especially within a digital forensics program. This work demonstrates how the authors teach data carving using a real world problem they encounter in digital forensics evidence processing involving the extracting of text messages from unstructured small device binary extractions. The authors have used this problem for instruction in ...


Cyber-Security Risks Of Fedwire, Mark J. Bilger Apr 2020

Cyber-Security Risks Of Fedwire, Mark J. Bilger

Journal of Digital Forensics, Security and Law

This paper will review the risks associated with the Federal Reserve's Fedwire network as a key resource necessary for the efficient function of the American financial system. It will examine the business model of the Fedwire system of real-time interbank transfers, the network characteristics of Fedwire, and the possibility of a successful attack on Fedwire and its potential impact on the U.S. financial system.


Studies Of Oval Tube And Fin Heat Exchangers, Phillip Nielsen Apr 2020

Studies Of Oval Tube And Fin Heat Exchangers, Phillip Nielsen

Discovery Day - Prescott

Heating Ventilation and air-conditioning (HVAC) is a system which changes the temperature of the surroundings for the purposes of cooling or heating. This system requires energy to maintain a temperature difference from the outside temperature. This is important since minimized power is one of the requirements for the system to achieve a better efficiency. Optimizing the flow over the evaporator coils is one way to increase the cooling efficiency. This will reduce the power required to have a sustainable system. Optimizing the flow to increase the energy transfer between the fins and the incoming air could result in a greater ...


W-Gun: Whale Optimization For Energy And Delay-Centric Green Underwater Networks, Rajkumar Singh Rathore, Houbing Song, Suman Sangwan, Sukriti Mazumdar, Omprakash Kaiwartya, Kabita Adhikari, Rupak Kharel Mar 2020

W-Gun: Whale Optimization For Energy And Delay-Centric Green Underwater Networks, Rajkumar Singh Rathore, Houbing Song, Suman Sangwan, Sukriti Mazumdar, Omprakash Kaiwartya, Kabita Adhikari, Rupak Kharel

Publications

Underwater sensor networks (UWSNs) have witnessed significant R&D attention in both academia and industry due to their growing application domains, such as border security, freight via sea or river, natural petroleum production and the fishing industry. Considering the deep underwater-oriented access constraints, energy-centric communication for the lifetime maximization of tiny sensor nodes in UWSNs is one of the key research themes in this domain. Existing literature on green UWSNs are majorly adapted from the existing techniques in traditional wireless sensor network relying on geolocation and the quality of service-centric underwater relay node selection, without paying much attention to the ...


Cache-Enabled In Cooperative Cognitive Radio Networks For Transmission Performance, Jiachen Yang, Houbing Song, Chaofan Ma, Jiabao Man, Huifang Xu, Gan Zheng Feb 2020

Cache-Enabled In Cooperative Cognitive Radio Networks For Transmission Performance, Jiachen Yang, Houbing Song, Chaofan Ma, Jiabao Man, Huifang Xu, Gan Zheng

Publications

The proliferation of mobile devices that support the acceleration of data services (especially smartphones) has resulted in a dramatic increase in mobile traffic. Mobile data also increased exponentially, already exceeding the throughput of the backhaul. To improve spectrum utilization and increase mobile network traffic, in combination with content caching, we study the cooperation between primary and secondary networks via content caching. We consider that the secondary base station assists the primary user by pre-caching some popular primary contents. Thus, the secondary base station can obtain more licensed bandwidth to serve its own user. We mainly focus on the time delay ...


Reverse Osmosis; Addressing Freshwater Shortage With Sustainable Desalination, Jessica Savage Jan 2020

Reverse Osmosis; Addressing Freshwater Shortage With Sustainable Desalination, Jessica Savage

Sustainability Conference

Water security is an imperative part of high-functioning societies. Currently, large populations of the globe live in water-impoverished or water-stressed areas. With climate change and growing global populations, projections show more people being impacted by issues of water shortage.

One solution to water security is the implementation of desalination, specifically with reverse osmosis systems. This presentation walks through the history, capabilities, future work, and explanations on how reverse osmosis systems work. With continued research on improving desalination, communities in both developed and developing nations around the world can work towards total water security.


Recovering From Industrial Overshoot: Thermal Removal Of Atmospheric Co2, Ted Von Hippel, Sandra Boetcher, Matthew Traum, Farshid Azadian Ph.D., William Mackunis Jan 2020

Recovering From Industrial Overshoot: Thermal Removal Of Atmospheric Co2, Ted Von Hippel, Sandra Boetcher, Matthew Traum, Farshid Azadian Ph.D., William Mackunis

Sustainability Conference

Humanity will soon overshoot a safe level of atmospheric CO2, if it hasn't done so already. Countries, industries, and the global economy need to dramatically and quickly alter their behavior and technology to avoid this dangerous overshoot, yet this appears unlikely. Direct Air Capture of CO2 represents an insurance policy for society - a way of removing excess atmospheric CO2. I will present an approach to this problem based on thermal physics that cools cubic kilometers of air to extract CO2 as it sublimates. I propose a combination of an efficient heat exchanger, radiative cooling, and refrigeration, all at industrial ...


A Proposed Taxonomy For General Aviation Pilot Weather Education And Training, John M. Lanicci, Thomas A. Guinn, Jayde M. King, Beth Blickensderfer, Robert Thomas, Yolanda Ortiz Jan 2020

A Proposed Taxonomy For General Aviation Pilot Weather Education And Training, John M. Lanicci, Thomas A. Guinn, Jayde M. King, Beth Blickensderfer, Robert Thomas, Yolanda Ortiz

Journal of Aviation/Aerospace Education & Research

As General Aviation (GA) safety continues to remain a focus of the aviation community, GA pilot weather education and training continues to be an active area of interest within the research community. This study introduces a taxonomy for organizing GA pilot weather education and training materials that was originally conceived as part of the FAA’s Weather Technology In the Cockpit research program. The taxonomy is built upon three main knowledge categories, or tiers:1) Weather Phenomena (which includes hazards); 2) Weather Hazard Products; and 3) Weather Hazard Product Sources and their Application. The concept behind the categorization is to ...


Assessing If Motivation Impacts General Aviation Pilots’ Persistence In Varying Weather Conditions, Sabrina Woods Jan 2020

Assessing If Motivation Impacts General Aviation Pilots’ Persistence In Varying Weather Conditions, Sabrina Woods

Dissertations and Theses

Continued flight under visual flight rules into instrument meteorological conditions is the predominant cause for fatal accidents by percentage, for general aviation aircraft operations. It is possible that a pilot’s motivation or reason for flying will override other safer, more logical courses of action when a hazard presents itself. The decision appears to stem from a willingness to persist in a course of action despite factors that indicate an alternate and safer course is warranted. This research addresses what is currently presumed about the decision to continue flying under visual flight rules into instrument conditions and marries those ideas ...


Atmospheric And Ionospheric Responses To Acoustic And Gravity Waves Driven By Earthquakes And Tsunamis, Pavel A. Inchin Jan 2020

Atmospheric And Ionospheric Responses To Acoustic And Gravity Waves Driven By Earthquakes And Tsunamis, Pavel A. Inchin

Dissertations and Theses

Natural hazards (NHs) are causes for significant concern due to their potentially catastrophic impacts on society. The study of their effects on the upper atmosphere can provide significant insight into the coupled nature of geophysical processes, and drives important applications for radio communication and navigation, leading potentially to the development of NH early-warning systems. Although general concepts underlying their coupling mechanisms are well understood, recent computational capabilities, supported by high temporal and spatial density of observations, have reached the level where such processes can be modeled with unprecedented realism for detailed case studies. The studies provided in this thesis are ...


Astro2020 Apc White Paper. 2020 Vision: Towards A Sustainable Oir System, Sally Oey, Terry D. Oswalt, Tom Maccarone, Fred Walter, Charles Bailyn, Jay Gallagher, Todd Henry, Derek Buzasi, J. Allyn Smith, Rachael Beaton, Jim Webb, Brad Barlow, Misty Bentz, Leslie Hebb, Patrick Kelly, Jedidah Isler, Michael Meyer, John Salzer, Simone Scaringi Jan 2020

Astro2020 Apc White Paper. 2020 Vision: Towards A Sustainable Oir System, Sally Oey, Terry D. Oswalt, Tom Maccarone, Fred Walter, Charles Bailyn, Jay Gallagher, Todd Henry, Derek Buzasi, J. Allyn Smith, Rachael Beaton, Jim Webb, Brad Barlow, Misty Bentz, Leslie Hebb, Patrick Kelly, Jedidah Isler, Michael Meyer, John Salzer, Simone Scaringi

Publications

Open-access telescopes of all apertures are needed to operate a competitive and efficient national science program. While larger facilities contribute light-gathering power and angular resolution, smaller ones dominate for field of view, time-resolution, and especially, total available observing time, thereby enabling our entire, diversely-expert community. Smaller aperture telescopes therefore play a critical and indispensable role in advancing science. Thus, the divestment of NSF support for modest-aperture (1 – 4 m) public telescopes poses a serious threat to U.S. scientific leadership, which is compounded by the unknown consequences of the shift from observations driven by individual investigators to survey-driven science. Given ...


Coverage Guided Differential Adversarial Testing Of Deep Learning Systems, Jianmin Guo, Houbing Song, Yue Zhao, Yu Jiang Jan 2020

Coverage Guided Differential Adversarial Testing Of Deep Learning Systems, Jianmin Guo, Houbing Song, Yue Zhao, Yu Jiang

Publications

Deep learning is increasingly applied to safety-critical application domains such as autonomous cars and medical devices. It is of significant importance to ensure their reliability and robustness. In this paper, we propose DLFuzz, the coverage guided differential adversarial testing framework to guide deep learing systems exposing incorrect behaviors. DLFuzz keeps minutely mutating the input to maximize the neuron coverage and the prediction difference between the original input and the mutated input, without manual labeling effort or cross-referencing oracles from other systems with the same functionality. We also design multiple novel strategies for neuron selection to improve the neuron coverage. The ...


Development Of A Sensor Suite For Atmospheric Boundary Layer Measurement With A Small Multirotor Unmanned Aerial System, Kevin A. Adkins, Christopher J. Swinford, Peter D. Wambolt, Gordon Bease Jan 2020

Development Of A Sensor Suite For Atmospheric Boundary Layer Measurement With A Small Multirotor Unmanned Aerial System, Kevin A. Adkins, Christopher J. Swinford, Peter D. Wambolt, Gordon Bease

International Journal of Aviation, Aeronautics, and Aerospace

Small unmanned aerial systems (sUAS) are increasingly being used to conduct atmospheric research. Because of the dynamic nature and inhomogeneity of the atmospheric boundary layer (ABL), the ability of instrumented sUAS to make on-demand 3-dimensional high-resolution spatial measurements of atmospheric parameters makes them particularly suited to ABL investigations. Both fixed-wing and multirotor sUAS have been used for ABL investigations. Most investigations to date have included in-situ measurement of thermodynamic quantities such as temperature, pressure and humidity. When wind has been measured, a variety of strategies have been used. Two of the most popular techniques have been deducing wind from inertial ...


Front Matter Dec 2019

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Stellar Chromospheric Activity And Age Relation From Open Clusters In The Lamost Survey, Jiajun Zhang, Terry Oswalt, Jingkun Zhao, Xiangsong Fang, Gang Zhao, Xilong Liang, Xianhao Ye, Jing Zhong Dec 2019

Stellar Chromospheric Activity And Age Relation From Open Clusters In The Lamost Survey, Jiajun Zhang, Terry Oswalt, Jingkun Zhao, Xiangsong Fang, Gang Zhao, Xilong Liang, Xianhao Ye, Jing Zhong

Publications

No abstract provided.


Astrodynamics Of The Next Generation Space Weather Prediction Mission, Mark Herring Dec 2019

Astrodynamics Of The Next Generation Space Weather Prediction Mission, Mark Herring

Dissertations and Theses

Accurate prediction of the solar wind properties, interplanetary magnetic field direction and various space weather phenomena becomes ever more important as our dependence on Earth orbiting spacecraft increases. Different solar wind drivers can lead both to enhancements and losses of relativistic electrons in the outer radiation belts, thus posing a major risk to satellites. To further our understanding of the Sun’s impact on the near Earth space environment, as well as to provide predictive capabilities, a mission placing monitoring satellites in key orbits in the inner Solar System is being proposed. As part of that effort, the possibility of ...


Deepfuzzer: Accelerated Deep Greybox Fuzzing, Jie Liang, Yu Jiang, Mingzhe Wang, Houbing Song, Kim-Kwang Raymond Choo Dec 2019

Deepfuzzer: Accelerated Deep Greybox Fuzzing, Jie Liang, Yu Jiang, Mingzhe Wang, Houbing Song, Kim-Kwang Raymond Choo

Publications

Fuzzing is one of the most effective vulnerability detection techniques, widely used in practice. However, the performance of fuzzers may be limited by their inability to pass complicated checks, inappropriate mutation frequency, arbitrary mutation strategy, or the variability of the environment. In this paper, we present DeepFuzzer, an enhanced greybox fuzzer with qualified seed generation, balanced seed selection, and hybrid seed mutation. First, we use symbolic execution in a lightweight approach to generate qualified initial seeds which then guide the fuzzer through complex checks. Second, we apply a statistical seed selection algorithm to balance the mutation frequency between different seeds ...


How Airport Construction Will Evolve With The Increased Effects Of Climate Change, Xavier M. Ashley Nov 2019

How Airport Construction Will Evolve With The Increased Effects Of Climate Change, Xavier M. Ashley

Beyond: Undergraduate Research Journal

This report addressed the effects rising global temperatures resulting from climate change have had on flight operations in their entirety. The research objective was to discover what methods could enhance climate adaptation in airport construction, as higher mean-surface temperatures have an increasingly negative effect on aircraft performance. The findings would primarily be of interest to the Federal Aviation Administration (FAA) Primary Office presiding over the planning and development of airports. Overall, the report provided a comprehensive analysis of global warming’s effects on aviation, including the implications of degraded aircraft performance and sea-level rise for coastal airports. Additionally, it examined ...


Fast Forensic Triage Using Centralised Thumbnail Caches On Windows Operating Systems, Sean Mckeown, Gordon Russell, Petra Leimich Sep 2019

Fast Forensic Triage Using Centralised Thumbnail Caches On Windows Operating Systems, Sean Mckeown, Gordon Russell, Petra Leimich

Journal of Digital Forensics, Security and Law

A common investigative task is to identify known contraband images on a device, which typically involves calculating cryptographic hashes for all the files on a disk and checking these against a database of known contraband. However, modern drives are now so large that it can take several hours just to read this data from the disk, and can contribute to the large investigative backlogs suffered by many law enforcement bodies. Digital forensic triage techniques may thus be used to prioritise evidence and effect faster investigation turnarounds. This paper proposes a new forensic triage method for investigating disk evidence relating to ...


Improved Decay Tolerant Inference Of Previously Uninstalled Computer Applications, Oluwaseun Adegbehingbe, James Jones Sep 2019

Improved Decay Tolerant Inference Of Previously Uninstalled Computer Applications, Oluwaseun Adegbehingbe, James Jones

Journal of Digital Forensics, Security and Law

When an application is uninstalled from a computer system, the application’s deleted file contents are overwritten over time, depending on factors such as operating system, available unallocated disk space, user activity, etc. As this content decays, the ability to infer the application’s prior presence, based on the remaining digital artifacts, becomes more difficult. Prior research inferring previously installed applications by matching sectors from a hard disk of interest to a previously constructed catalog of labeled sector hashes showed promising results. This prior work used a white list approach to identify relevant artifacts, resulting in no irrelevant artifacts but ...


Memoryranger Prevents Highjacking File_Object Structures In Windows Kernel, Igor Korkin Sep 2019

Memoryranger Prevents Highjacking File_Object Structures In Windows Kernel, Igor Korkin

Journal of Digital Forensics, Security and Law

Windows OS kernel memory is one of the main targets of cyber-attacks. By launching such attacks, hackers are succeeding in process privilege escalation and tampering users’ data by accessing kernel-mode memory. This paper considers a new example of such an attack, which results in access to the files opened in an exclusive mode. Windows built-in security features prevent such a legal access, but attackers can circumvent them by patching dynamically allocated objects. The research shows that the newest Windows 10 x64 is vulnerable to this attack. The paper provides an example of using MemoryRanger, a hypervisor- based solution to prevent ...


Seeing And Understanding Data, Beverly Wood, Charlotte Bolch Aug 2019

Seeing And Understanding Data, Beverly Wood, Charlotte Bolch

Publications

Visual displays of data are commonly used today in media reports online or in print. For example, data visualizations are sometimes used as a marketing tool to convince people to purchase a certain product, or they are displayed in articles or magazines as a way to graphically display data to emphasize a certain point. In general, it is hard to imagine the majority of disciplines in science and mathematics not using data visualizations. However, before standard data visualization techniques were developed (and accepted by the community), mathematicians and scientists very rarely used graphical displays or pictures to represent empirical data.


Comparison Between Fluid Simulation With Test Particles And 1 Hybrid Simulation For The Kelvin-Helmholtz Instability, Xuanye Ma, Katariina Nykyri, Brandon L. Burkholder, Rachel C. Rice, Peter A. Delamere, Bishwa Neupane Aug 2019

Comparison Between Fluid Simulation With Test Particles And 1 Hybrid Simulation For The Kelvin-Helmholtz Instability, Xuanye Ma, Katariina Nykyri, Brandon L. Burkholder, Rachel C. Rice, Peter A. Delamere, Bishwa Neupane

Publications

A quantitative investigation of plasma transport rate via the Kelvin‐Helmholtz (KH) instability can improve our understanding of solar‐wind‐magnetosphere coupling processes. Simulation studies provide a broad range of transport rates by using different measurements based on different initial conditions and under different plasma descriptions, which makes cross literature comparison difficult. In this study, the KH instability under similar initial and boundary conditions (i.e., applicable to the Earth's magnetopause environment) is simulated by Hall magnetohydrodynamics with test particles and hybrid simulations. Both simulations give similar particle mixing rates. However, plasma is mainly transported through a few big ...


Blocks' Network: Redesign Architecture Based On Blockchain Technology, Moataz Hanif Aug 2019

Blocks' Network: Redesign Architecture Based On Blockchain Technology, Moataz Hanif

Dissertations and Theses

The Internet is a global network that uses communication protocols. It is considered the most important system reached by humanity, which no one can abandon. However, this technology has become a weapon that threatens the privacy of users, especially in the client-server model, where data is stored and managed privately. Additionally, users have no power over their data that store in a private server, which means users’ data may interrupt by government or might be sold via service provider for-profit purposes. Furthermore, blockchain is a technology that we can rely on to solve issues related to client-server model if appropriately ...


Feasibility Of Circular Orbits For Proximity Operations In Strongly Perturbed Environments Around Uniformly Rotating Asteroids, Nicholas Peter Liapis Aug 2019

Feasibility Of Circular Orbits For Proximity Operations In Strongly Perturbed Environments Around Uniformly Rotating Asteroids, Nicholas Peter Liapis

Dissertations and Theses

Asteroids have been mapped and observed since 1801 when an Italian astronomer Guiseppe Piazzi discovered Ceres (Serio, Manara, & Sicoli, 2002). Since then, asteroids have been growing in popularity throughout the scientific community because they are thought to hold the information we need to understand how the solar system developed and why life exists on earth, as well as potential precious resources. This research studies different types of orbits that have been performed to date around asteroids and how they can be reworked to require less control effort. Different types of missions that have been sent to asteroids are discussed, as ...