Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Autonomous (2)
- Navigation (2)
- 3d (1)
- Access control (1)
- Arm (1)
-
- Assembly (1)
- Autonomous UAV Control (1)
- Binary Arithmetic (1)
- Bootstrap (1)
- CSS3 (1)
- Centralized (1)
- Cloud computing (1)
- Computer Architecture (1)
- Computer Engineering (1)
- Computer Organization (1)
- Computer Science (1)
- Confidentiality (1)
- Control (1)
- Cooperative (1)
- CubeSat (1)
- Cybersecurity (1)
- Digital Communications (1)
- Digital Media (1)
- Embedded system (1)
- Engineering analytics (1)
- Fusion (1)
- Games console (1)
- Global Positioning System (GPS) (1)
- Governance (1)
- Gps-denied (1)
- Publication
- Publication Type
- File Type
Articles 1 - 14 of 14
Full-Text Articles in Systems Architecture
An Analysis Of Conus Based Deployment Of Pseudolites For Positioning, Navigation And Timing (Pnt) Systems, Justin H. Deifel, Albert J. Pena
An Analysis Of Conus Based Deployment Of Pseudolites For Positioning, Navigation And Timing (Pnt) Systems, Justin H. Deifel, Albert J. Pena
Theses and Dissertations
The Global Positioning System (GPS) developed and operated by the United States Air Force (USAF) provides a way for users to determine position, navigation and timing (PNT). GPS provides an extraordinary capability that has become instrumental in all aspects of our day to day lives. As new technologies such as automated vehicles and unmanned aircraft continue to be developed, a reliable back up to GPS is required to ensure the PNT data generated in these systems is accurate. This research studies a potential architecture for deploying a nationwide network of ground based pseudolites that would act to supplement and backup …
Enabling Distributed Scientific Computing On The Campus, Derek J. Weitzel
Enabling Distributed Scientific Computing On The Campus, Derek J. Weitzel
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Campus research computing has evolved from many small decentralized resources, such as individual desktops, to fewer, larger centralized resources, such as clusters. This change has been necessitated by the increasing size of researcher's workloads, but this change has harmed the researcher's user experience. We propose to improve the user experience on the computational resources by creating an overlay cluster they are able to control. This overlay should transparently scale to national cyberinfrastructure as the user's demands increase.
We explore methods for improving the user experience when submitting jobs on a campus grid. To this end, we created a remote submission …
Design And Implementation Of Digital Information Security For Physical Documents, Pengcheng Wang
Design And Implementation Of Digital Information Security For Physical Documents, Pengcheng Wang
Masters Theses
The objective of this thesis is to improve the security for physical paper documents. Providing information security has been difficult in environments that rely on physical paper documents to implement business processes. Our work presents the design of a digital information security system for paper documents, called "CryptoPaper", that uses 2-dimensional codes to represent data and its security properties on paper. A special scanner system is designed for "CryptoPaper" which uses image recognition techniques and cloud-based access control to display plaintext of encrypted and encoded data to authorized users.
Cooperative 3-D Map Generation Using Multiple Uavs, Andrew Erik Lawson
Cooperative 3-D Map Generation Using Multiple Uavs, Andrew Erik Lawson
University Scholar Projects
This report aims to demonstrate the feasibility of building a global 3-D map from multiple UAV robots in a GPS-denied, indoor environment. Presented are the design of each robot and the reasoning behind choosing its hardware and software components, the process in which a single robot obtains a individual 3-D map entirely onboard, and lastly how the mapping concept is extended to multiple robotic agents to form a global 3-D map using a centralized server. In the latter section, this report focuses on two algorithms, Online Mapping and Map Fusion, developed to facilitate the cooperative approach. A limited selection …
Design, Programming, And User-Experience, Kaila G. Manca
Design, Programming, And User-Experience, Kaila G. Manca
Honors Scholar Theses
This thesis is a culmination of my individualized major in Human-Computer Interaction. As such, it showcases my knowledge of design, computer engineering, user-experience research, and puts into practice my background in psychology, com- munications, and neuroscience.
I provided full-service design and development for a web application to be used by the Digital Media and Design Department and their students.This process involved several iterations of user-experience research, testing, concepting, branding and strategy, ideation, and design. It lead to two products.
The first product is full-scale development and optimization of the web appli- cation.The web application adheres to best practices. It was …
Measuring Centralities For Transportation Networks Beyond Structures, Yew-Yih Cheng, Lee Ka Wei, Roy, Ee-Peng Lim, Feida Zhu
Measuring Centralities For Transportation Networks Beyond Structures, Yew-Yih Cheng, Lee Ka Wei, Roy, Ee-Peng Lim, Feida Zhu
Research Collection School Of Computing and Information Systems
In an urban city, its transportation network supports efficient flow of people between different parts of the city. Failures in the network can cause major disruptions to commuter and business activities which can result in both significant economic and time losses. In this paper, we investigate the use of centrality measures to determine critical nodes in a transportation network so as to improve the design of the network as well as to devise plans for coping with the network failures. Most centrality measures in social network analysis research unfortunately consider only topological structure of the network and are oblivious of …
Autonomous Navigation And Control Of Unmanned Aerial Systems In The National Airspace, Michael Hlas, Jeremy Straub, Eunjin Kim
Autonomous Navigation And Control Of Unmanned Aerial Systems In The National Airspace, Michael Hlas, Jeremy Straub, Eunjin Kim
Jeremy Straub
Pilotless aircraft known as Unmanned Aerial Vehicles (UAVs) have been used extensively for military and intelligence purposes. This includes situations where the mission area is too dangerous for a pilot to fly, the length of the mission is longer than a pilot could stay awake or aircraft are used as cruise missiles that crash into their target. With the decreasing cost and miniaturization of computers, it has become possible to build UAVs that are small and inexpensive making them accessible to businesses, law enforcement, hobbyists and the general public.
Crowdsourced Earthquake Early Warning, Sarah Minson, Benjamin Brooks, Craig Glennie, Jessica Murray, John Langbein, Susan Owen, Thomas Heaton, Robert Iannucci, Darren Hauser
Crowdsourced Earthquake Early Warning, Sarah Minson, Benjamin Brooks, Craig Glennie, Jessica Murray, John Langbein, Susan Owen, Thomas Heaton, Robert Iannucci, Darren Hauser
Robert A Iannucci
Earthquake early warning (EEW) can reduce harm to people and infrastructure from earthquakes and tsunamis, but it has not been implemented in most high earthquake-risk regions because of prohibitive cost. Common consumer devices such as smartphones contain low-cost versions of the sensors used in EEW. Although less accurate than scientific-grade instruments, these sensors are globally ubiquitous. Through controlled tests of consumer devices, simulation of an Mw (moment magnitude) 7 earthquake on California’s Hayward fault, and real data from the Mw 9 Tohoku-oki earthquake, we demonstrate that EEW could be achieved via crowdsourcing.
Update On The Development Of A 1-U Cubesat At The University Of North Dakota, Jeremy Straub, Ronald Marsh
Update On The Development Of A 1-U Cubesat At The University Of North Dakota, Jeremy Straub, Ronald Marsh
Jeremy Straub
An overview of the progress on the development of the OpenOrbiter CubeSat is presented. This covers, at a high level, the work that has been performed during the past year and foundational work that occurred prior to this. This poster also discusses future plans for the Open Prototype for Educational NanoSats (OPEN) framework and the OpenOrbiter Small Spacecraft Development Initiative. Particular focus is given to the ongoing work to prepare for an orbital launch, which the program has been down-selected for through the NASA ELaNa CubeSat Launch Initiative program.
In addition to this discussion of the program’s origins, goals and …
Introduction To Mips Assembly Language Programming, Charles W. Kann
Introduction To Mips Assembly Language Programming, Charles W. Kann
Open Educational Resources
This book was written to introduce students to assembly language programming in MIPS. As with all assembly language programming texts, it covers basic operators and instructions, subprogram calling, loading and storing memory, program control, and the conversion of the assembly language program into machine code.
However this book was not written simply as a book on assembly language programming. The larger purpose of this text is to show how concepts in Higher Level Languages (HLL), such as Java or C/C++, are represented in assembly. By showing how program constructs from these HLL map into assembly, the concepts will be easier …
Resilient And Trustworthy Dynamic Data-Driven Application Systems (Dddas) Services For Crisis Management Environments, Youakim Badr, Salim Hariti, Youssif Al-Nashif, Erik Blasch
Resilient And Trustworthy Dynamic Data-Driven Application Systems (Dddas) Services For Crisis Management Environments, Youakim Badr, Salim Hariti, Youssif Al-Nashif, Erik Blasch
Electrical & Computer Engineering Faculty Publications
Future crisis management systems needresilient and trustworthy infrastructures to quickly develop reliable applications and processes, andensure end-to-end security, trust, and privacy. Due to the multiplicity and diversity of involved actors, volumes of data, and heterogeneity of shared information;crisis management systems tend to be highly vulnerable and subjectto unforeseen incidents. As a result, the dependability of crisis management systems can be at risk. This paper presents a cloud-based resilient and trustworthy infrastructure (known as rDaaS) to quickly develop secure crisis management systems. The rDaaS integrates the Dynamic Data-Driven Application Systems (DDDAS) paradigm into a service-oriented architecture over cloud technology and provides …
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Publications and Research
There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …
Engineering Analytics: Research Into The Governance Structure Needed To Integrate The Dominant Design Methodologies, Teddy Steven Cotter
Engineering Analytics: Research Into The Governance Structure Needed To Integrate The Dominant Design Methodologies, Teddy Steven Cotter
Engineering Management & Systems Engineering Faculty Publications
In the ASEM-IAC 2014, Cotter (2014) explored the current state of engineering design, identified the dominate approaches to engineering design, discussed potential contributions from the new field of data analytics to engineering design, and proposed an Engineering Analytics framework that integrates the dominate engineering design approaches and data analytics within a human-intelligence/machine-intelligence (HI-MI) design architecture. This paper reports research applying ontological engineering to integrate the dominate engineering design methodologies into a systemic engineering design decision governance architecture.
Forensic Analysis Of A Sony Playstation 4: A First Look, Matthew Davies, Huw Read, Konstantinos Xynos, Iain Sutherland
Forensic Analysis Of A Sony Playstation 4: A First Look, Matthew Davies, Huw Read, Konstantinos Xynos, Iain Sutherland
Research outputs 2014 to 2021
The primary function of a games console is that of an entertainment system. However the latest iteration of these consoles has added a number of new interactive features that may prove of value to the digital investigator. This paper highlights the value of these consoles, in particular Sony's latest version of their PlayStation. This console provides a number of features including web browsing, downloading of material and chat functionality; all communication features that will be of interest to forensic investigators. In this paper we undertake an initial investigation of the PlayStation 4 games console. This paper identifies potential information sources …