Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Antenna arrays (3)
- Automation (3)
- Genetic algorithms (3)
- Android (2)
- Applications (2)
-
- Big data (2)
- Closed Loop Systems (2)
- Combat Vehicles (2)
- Communication and Radio Systems (2)
- Control (2)
- Crews (2)
- Cybersecurity (2)
- Cycles (2)
- Data mining (2)
- Degrees of Freedom (2)
- Electric Power (2)
- Enthalpy (2)
- Experimental Data (2)
- FPGA (2)
- Feedback (2)
- Hardware in the Loop (2)
- Hybrid Systems (2)
- Image fusion (2)
- Internet (2)
- Internet of Things (2)
- Machine vision (2)
- Malware (2)
- Motion (2)
- Multi-spectral (2)
- Qualitative study (2)
- Publication Year
Articles 1 - 30 of 59
Full-Text Articles in Engineering
Immersive Framework For Designing Trajectories Using Augmented Reality, Joseph Anderson, Leo Materne, Karis Cooks, Michelle Aros, Jaia Huggins, Jesika Geliga-Torres, Kamden Kuykendall, David Canales, Barbara Chaparro
Immersive Framework For Designing Trajectories Using Augmented Reality, Joseph Anderson, Leo Materne, Karis Cooks, Michelle Aros, Jaia Huggins, Jesika Geliga-Torres, Kamden Kuykendall, David Canales, Barbara Chaparro
Publications
The intuitive interaction capabilities of augmented reality make it ideal for solving complex 3D problems that require complex spatial representations, which is key for astrodynamics and space mission planning. By implementing common and complex orbital mechanics algorithms in augmented reality, a hands-on method for designing orbit solutions and spacecraft missions is created. This effort explores the aforementioned implementation with the Microsoft Hololens 2 as well as its applications in industry and academia. Furthermore, a human-centered design process and study are utilized to ensure the tool is user-friendly while maintaining accuracy and applicability to higher-fidelity problems.
Six-Degree-Of-Freedom Optimal Feedback Control Of Pinpoint Landing Using Deep Neural Networks, Omkar S. Mulekar, Hancheol Cho, Riccardo Bevilacqua
Six-Degree-Of-Freedom Optimal Feedback Control Of Pinpoint Landing Using Deep Neural Networks, Omkar S. Mulekar, Hancheol Cho, Riccardo Bevilacqua
Student Works
Machine learning regression techniques have shown success at feedback control to perform near-optimal pinpoint landings for low fidelity formulations (e.g. 3 degree-of-freedom). Trajectories from these low-fidelity landing formulations have been used in imitation learning techniques to train deep neural network policies to replicate these optimal landings in closed loop. This study details the development of a near-optimal, neural network feedback controller for a 6 degree-of-freedom pinpoint landing system. To model disturbances, the problem is cast as either a multi-phase optimal control problem or a triple single-phase optimal control problem to generate examples of optimal control through the presence of disturbances. …
Stability Of Deep Neural Networks For Feedback-Optimal Pinpoint Landings, Omkar S. Mulekar, Hancheol Cho, Riccardo Bevilacqua
Stability Of Deep Neural Networks For Feedback-Optimal Pinpoint Landings, Omkar S. Mulekar, Hancheol Cho, Riccardo Bevilacqua
Student Works
The ability to certify systems driven by neural networks is crucial for future rollouts of machine learning technologies in aerospace applications. In this study, the neural networks are used to represent a fuel-optimal feedback controller for two different 3-degree-of-freedom pinpoint landing problems. It is shown that the standard sum-ofsquares Lyapunov candidate is too restrictive to assess the stability of systems with fuel-optimal control profiles. Instead, a parametric Lyapunov candidate (i.e. a neural network) can be trained to sufficiently evaluate the closed-loop stability of fuel-optimal control profiles. Then, a stability-constrained imitation learning method is applied, which simultaneously trains a neural network …
Alternatives To Reducing Aviation Fuel-Burn With Technology: Fully Electric Autonomous Taxibot, Denzil Neo
Alternatives To Reducing Aviation Fuel-Burn With Technology: Fully Electric Autonomous Taxibot, Denzil Neo
Student Works
Aircraft taxiing operations in the aerodrome were identified to consume the most jet fuel apart from the cruise phase of the flight. This was also well supported by various research associating taxi operations at large, congested airports, with high jet fuel consumption, high carbon emissions, and noise pollution. Existing literature recognised the potential to address the environmental issues of aerodrome taxi operations by operating External or Onboard Aircraft Ground Propulsion Systems (AGPS). Designed to power aircraft with sources other than their main engines, external Aircraft Ground Power Systems (AGPS) have shown the potential to significantly cut jet fuel consumption and …
Certification Basis For A Fully Autonomous Uncrewed Passenger Carrying Urban Air Mobility Aircraft, Steve Price
Certification Basis For A Fully Autonomous Uncrewed Passenger Carrying Urban Air Mobility Aircraft, Steve Price
Student Works
The Urban Air Mobility campaign has set a goal to efficiently transport passengers and cargo in urban areas of operation with autonomous aircraft. This concept of operations will require aircraft to utilize technology that currently does not have clear regulatory requirements. This report contains a comprehensive analysis and creation of a certification basis for a fully autonomous uncrewed passenger carrying rotorcraft for use in Urban Air Mobility certified under Title 14 Code of Federal Regulations Part 27. Part 27 was first analyzed to determine the applicability of current regulations. The fully electric propulsion system and fully autonomous flight control system …
Height Information Aided 3d Real-Time Large-Scale Underground User Positioning, Houbing Song, Chengkai Tang, Cunle Zhang, Lingling Zhang, Yi Zhang
Height Information Aided 3d Real-Time Large-Scale Underground User Positioning, Houbing Song, Chengkai Tang, Cunle Zhang, Lingling Zhang, Yi Zhang
Publications
Due to the cost of inertial navigation and visual navigation equipment and lake of satellite navigation signals, they cannot be used in large‐scale underground mining environment. To solve this problem, this study proposes large‐scale underground 3D real‐time positioning method with seam height assistance. This method uses the ultrawide band positioning base station as the core and is combined with seam height information to build a factor graph confidence transfer model to realise3D positioning. The simulation results show that the proposed real‐time method is superior to the existing algorithms in positioning accuracy and can meet the needs of large‐scale underground users.
Helical Dielectric Elastomer Actuator, Daewon Kim
Helical Dielectric Elastomer Actuator, Daewon Kim
Publications
A helical dielectric elastomer actuator (HDEA) can include a first dielectric region comprising an elastomer defining a helix. In an example, a dielectric material can be deposited, and a compliant conductive material can be deposited, such as using an additive manufacturing approach, to provide an HDEA. In an example where the HDEA has multiple mechanical degrees of freedom, at least two compliant conductive regions can be located on a first surface of the first dielectric region and at least one compliant conductive region can be located on an opposite second surface of the first dielectric region. For such an example, …
Enterprise Architecture Transformation Process From A Federal Government Perspective, Tonia Canada, Leila Halawi
Enterprise Architecture Transformation Process From A Federal Government Perspective, Tonia Canada, Leila Halawi
Publications
The need for information technology organizations to transform enterprise architecture is driven by federal government mandates and information technology budget constraints. This qualitative case study aimed to identify factors that hinder federal government agencies from driving enterprise architecture transformation processes from a compliancy to a flexible process. Common themes in interviewee responses were identified, coded, and summarized. Critical recommendations for future best practices, including further research, were also presented.
Spatio-Temporal Data Mining For Aviation Delay Prediction, Kai Zhang, Houbing Song, Yushan Jiang, Dahai Liu
Spatio-Temporal Data Mining For Aviation Delay Prediction, Kai Zhang, Houbing Song, Yushan Jiang, Dahai Liu
Publications
To accommodate the unprecedented increase of commercial airlines over the next ten years, the Next Generation Air Transportation System (NextGen) has been implemented in the USA that records large-scale Air Traffic Management (ATM) data to make air travel safer, more efficient, and more economical. A key role of collaborative decision making for air traffic scheduling and airspace resource management is the accurate prediction of flight delay. There has been a lot of attempts to apply data-driven methods such as machine learning to forecast flight delay situation using air traffic data of departures and arrivals. However, most of them omit en-route …
Differential Privacy For Industrial Internet Of Things: Opportunities, Applications And Challenges, Bin Jiang, Houbing Song, Jianqiang Li, Guanghui Yue
Differential Privacy For Industrial Internet Of Things: Opportunities, Applications And Challenges, Bin Jiang, Houbing Song, Jianqiang Li, Guanghui Yue
Publications
The development of Internet of Things (IoT) brings new changes to various fields. Particularly, industrial Internet of Things (IIoT) is promoting a new round of industrial revolution. With more applications of IIoT, privacy protection issues are emerging. Specially, some common algorithms in IIoT technology such as deep models strongly rely on data collection, which leads to the risk of privacy disclosure. Recently, differential privacy has been used to protect user-terminal privacy in IIoT, so it is necessary to make in-depth research on this topic. In this paper, we conduct a comprehensive survey on the opportunities, applications and challenges of differential …
Reduced Multiplicative Complexity Discrete Cosine Transform (Dct) Circuitry, Sirani Kanchana Mututhanthrige Perera
Reduced Multiplicative Complexity Discrete Cosine Transform (Dct) Circuitry, Sirani Kanchana Mututhanthrige Perera
Publications
System and techniques for reduced multiplicative complexity discrete cosine transform (DCT) circuitry are described herein. An input data set can be received and, upon the input data set, a self-recursive DCT technique can be performed to produce a transformed data set. Here, the self-recursive DCT technique is based on a product of factors of a specified type of DCT technique. Recursive components of the technique are of the same DCT type as that of the DCT technique. The transformed data set can then be produced to a data consumer.
Enterprise Architecture Transformation Process From A Federal Government Perspective, Tonia Canada, Leila Halawi
Enterprise Architecture Transformation Process From A Federal Government Perspective, Tonia Canada, Leila Halawi
Publications
The need for information technology organizations to transform enterprise architecture is driven by federal government mandates and information technology budget constraints. This qualitative case study aimed to identify factors that hinder federal government agencies from driving enterprise architecture transformation processes from a compliancy to a flexible process. Common themes in interviewee responses were identified, coded, and summarized. Critical recommendations for future best practices, including further research, were also presented.
Finite-Time State Estimation For An Inverted Pendulum Under Input-Multiplicative Uncertainty, Sergey V. Drakunov, William Mackunis, Anu Kossery Jayaprakash, Krishna Bhavithavya Kidambi, Mahmut Reyhanoglu
Finite-Time State Estimation For An Inverted Pendulum Under Input-Multiplicative Uncertainty, Sergey V. Drakunov, William Mackunis, Anu Kossery Jayaprakash, Krishna Bhavithavya Kidambi, Mahmut Reyhanoglu
Publications
A sliding mode observer is presented, which is rigorously proven to achieve finite-time state estimation of a dual-parallel underactuated (i.e., single-input multi-output) cart inverted pendulum system in the presence of parametric uncertainty. A salient feature of the proposed sliding mode observer design is that a rigorous analysis is provided, which proves finite-time estimation of the complete system state in the presence of input-multiplicative parametric uncertainty. The performance of the proposed observer design is demonstrated through numerical case studies using both sliding mode control (SMC)- and linear quadratic regulator (LQR)-based closed-loop control systems. The main contribution presented here is the rigorous …
Zero-Bias Deep Learning For Accurate Identification Of Internet Of Things (Iot) Devices, Yongxin Liu, Houbing Song, Thomas Yang, Jian Wang, Jianqiang Li, Shuteng Niu, Zhong Ming
Zero-Bias Deep Learning For Accurate Identification Of Internet Of Things (Iot) Devices, Yongxin Liu, Houbing Song, Thomas Yang, Jian Wang, Jianqiang Li, Shuteng Niu, Zhong Ming
Publications
The Internet of Things (IoT) provides applications and services that would otherwise not be possible. However, the open nature of IoT makes it vulnerable to cybersecurity threats. Especially, identity spoofing attacks, where an adversary passively listens to the existing radio communications and then mimic the identity of legitimate devices to conduct malicious activities. Existing solutions employ cryptographic signatures to verify the trustworthiness of received information. In prevalent IoT, secret keys for cryptography can potentially be disclosed and disable the verification mechanism. Noncryptographic device verification is needed to ensure trustworthy IoT. In this article, we propose an enhanced deep learning framework …
System Level Model For Pumped Two-Phase Cooling Systems, Leitao Chen, Timothy Joseph Chainer, Pritish Ranjan Parida, Mark Delorman Schultz, Fanghao Yang
System Level Model For Pumped Two-Phase Cooling Systems, Leitao Chen, Timothy Joseph Chainer, Pritish Ranjan Parida, Mark Delorman Schultz, Fanghao Yang
Publications
Techniques are provided for system level modeling of two-phase cooling systems. In one example, a computer implemented method comprises determining, by a system operatively coupled to a processor, respective sets of steady state values for parameters at inlet-outlet junctions using a system model, wherein the determining is based on first user input specifying a cooling system design comprising a plurality of part objects, wherein adjacent part objects in a flow direction are connected at the inlet-outlet junctions. The computer-implemented method can also comprise generating, by the system, a graphical display that depicts the respective sets of parameter values at the …
W-Gun: Whale Optimization For Energy And Delay-Centric Green Underwater Networks, Rajkumar Singh Rathore, Houbing Song, Suman Sangwan, Sukriti Mazumdar, Omprakash Kaiwartya, Kabita Adhikari, Rupak Kharel
W-Gun: Whale Optimization For Energy And Delay-Centric Green Underwater Networks, Rajkumar Singh Rathore, Houbing Song, Suman Sangwan, Sukriti Mazumdar, Omprakash Kaiwartya, Kabita Adhikari, Rupak Kharel
Publications
Underwater sensor networks (UWSNs) have witnessed significant R&D attention in both academia and industry due to their growing application domains, such as border security, freight via sea or river, natural petroleum production and the fishing industry. Considering the deep underwater-oriented access constraints, energy-centric communication for the lifetime maximization of tiny sensor nodes in UWSNs is one of the key research themes in this domain. Existing literature on green UWSNs are majorly adapted from the existing techniques in traditional wireless sensor network relying on geolocation and the quality of service-centric underwater relay node selection, without paying much attention to the dynamic …
Piecing Together Summon Over Alma Documentation, James M. Day
Piecing Together Summon Over Alma Documentation, James M. Day
Publications
Ex Libris provides some useful documentation for “Alma-Summon Integration” but it is not complete. Most Alma documentation and online help pages assume you are using Primo. Sometimes the Alma configurations for Primo apply to Summon, but mostly they do not. The ELUNA Summon Product Working Group members using Summon over Alma started a project to identify existing documentation, consolidate it, and create supplemental documentation where necessary. We hope this will help Ex Libris provide better support for Summon over Alma.
Cache-Enabled In Cooperative Cognitive Radio Networks For Transmission Performance, Jiachen Yang, Houbing Song, Chaofan Ma, Jiabao Man, Huifang Xu, Gan Zheng
Cache-Enabled In Cooperative Cognitive Radio Networks For Transmission Performance, Jiachen Yang, Houbing Song, Chaofan Ma, Jiabao Man, Huifang Xu, Gan Zheng
Publications
The proliferation of mobile devices that support the acceleration of data services (especially smartphones) has resulted in a dramatic increase in mobile traffic. Mobile data also increased exponentially, already exceeding the throughput of the backhaul. To improve spectrum utilization and increase mobile network traffic, in combination with content caching, we study the cooperation between primary and secondary networks via content caching. We consider that the secondary base station assists the primary user by pre-caching some popular primary contents. Thus, the secondary base station can obtain more licensed bandwidth to serve its own user. We mainly focus on the time delay …
Coverage Guided Differential Adversarial Testing Of Deep Learning Systems, Jianmin Guo, Houbing Song, Yue Zhao, Yu Jiang
Coverage Guided Differential Adversarial Testing Of Deep Learning Systems, Jianmin Guo, Houbing Song, Yue Zhao, Yu Jiang
Publications
Deep learning is increasingly applied to safety-critical application domains such as autonomous cars and medical devices. It is of significant importance to ensure their reliability and robustness. In this paper, we propose DLFuzz, the coverage guided differential adversarial testing framework to guide deep learing systems exposing incorrect behaviors. DLFuzz keeps minutely mutating the input to maximize the neuron coverage and the prediction difference between the original input and the mutated input, without manual labeling effort or cross-referencing oracles from other systems with the same functionality. We also design multiple novel strategies for neuron selection to improve the neuron coverage. The …
Where We Are With Enterprise Architecture, Leila Halawi, Richard Mccarthy, James Farah
Where We Are With Enterprise Architecture, Leila Halawi, Richard Mccarthy, James Farah
Publications
Enterprise architecture has been continuously developing since the mid-1980s. Although there is now 35 years of research and use, there is still a lack consistent definitions and standards. This is apparent in the proliferation of so many different enterprise architecture frameworks. Despite the significant body of research, there is a need for standardization of terminology based upon a meta-analysis of the literature. Enterprise architecture programs require commitment throughout an organization to be effective and must be perceived to add value. This research offers an initial basis for researchers who need to expand and continue this research topic with an actual …
Security Of The Internet Of Things: Vulnerabilities, Attacks And Countermeasures, Ismail Butun, Houbing Song, Patrik Osterberg
Security Of The Internet Of Things: Vulnerabilities, Attacks And Countermeasures, Ismail Butun, Houbing Song, Patrik Osterberg
Publications
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium technologies and have wide range of applications in our surrounding environment. The reason behind the vast adoption of WSNs in various applications is that they have tremendously appealing features, e.g., low production cost, low installation cost, unattended network operation, autonomous and longtime operation. WSNs have started to merge with the Internet of Things (IoT) through the introduction of Internet access capability in sensor nodes and sensing ability in Internet-connected devices. Thereby, the IoT is providing access to huge amount of data, collected by the WSNs, over the Internet. Hence, …
Automated Dynamic Detection Of Self-Hiding Behaviors, Luke Baird
Automated Dynamic Detection Of Self-Hiding Behaviors, Luke Baird
Student Works
Certain Android applications, such as but not limited to malware, conceal their presence from the user, exhibiting a self-hiding behavior. Consequently, these apps put the user’s security and privacy at risk by performing tasks without the user’s awareness. Static analysis has been used to analyze apps for self-hiding behavior, but this approach is prone to false positives and suffers from code obfuscation. This research proposes a set of three tools utilizing a dynamic analysis method of detecting self-hiding behavior of an app in the home, installed, and running application lists on an Android emulator. Our approach proves both highly accurate …
Automated Dynamic Detection Of Self-Hiding Behavior In Android Apps, Luke Baird, Seth Rodgers
Automated Dynamic Detection Of Self-Hiding Behavior In Android Apps, Luke Baird, Seth Rodgers
Student Works
Android applications that conceal themselves from a user, defined as exhibiting a “self-hiding behavior,” pose a threat to the user’s privacy, as these applications can live on a device undetected by the user. Malicious applications can do this to execute without being found by the user. Three lists are analyzed in particular—the home, running, and installed lists—as they are directly related to the typical Android app life cycle. Additionally, self-hiding behavior in the device admin list is analyzed due to the potential for catastrophic actions to be taken by device admin malware. This research proposes four dynamic analysis tools that …
Guest Editorial Special Issue On Toward Securing Internet Of Connected Vehicles (Iov) From Virtual Vehicle Hijacking, Yue Cao, Houbing Song, Omprakash Kaiwartya, Sinem Coleri Ergen, Jaime Lloret, Naveed Ahmad
Guest Editorial Special Issue On Toward Securing Internet Of Connected Vehicles (Iov) From Virtual Vehicle Hijacking, Yue Cao, Houbing Song, Omprakash Kaiwartya, Sinem Coleri Ergen, Jaime Lloret, Naveed Ahmad
Publications
Today’s vehicles are no longer stand-alone transportation means, due to the advancements on vehicle-tovehicle (V2V) and vehicle-to-infrastructure (V2I) communications enabled to access the Internet via recent technologies in mobile communications, including WiFi, Bluetooth, 4G, and even 5G networks. The Internet of vehicles was aimed toward sustainable developments in transportation by enhancing safety and efficiency. The sensor-enabled intelligent automation of vehicles’ mechanical operations enhances safety in on-road traveling, and cooperative traffic information sharing in vehicular networks improves traveling efficiency.
Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv
Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv
Publications
With the continuous development of information technology, enterprises, universities and governments are constantly stepping up the construction of electronic personnel information management system. The information of hundreds of thousands or even millions of people’s information are collected and stored into the system. So much information provides the cornerstone for the development of big data, if such data is tampered with or leaked, it will cause irreparable serious damage. However, in recent years, electronic archives have exposed a series of problems such as information leakage, information tampering, and information loss, which has made the reform of personnel information management more and …
Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen
Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen
Publications
With the rapid development of Internet of Things, massive mobile intelligent terminals are ready to access edge servers for real-time data calculation and interaction. However, the risk of private data leakage follows simultaneously. As the administrator of all intelligent terminals in a region, the edge server needs to clarify the ability of the managed intelligent terminals to defend against malicious attacks. Therefore, the security level classification for mobile intelligent terminals before accessing the network is indispensable. In this paper, we firstly propose a safety assessment method to detect the weakness of mobile intelligent terminals. Secondly, we match the evaluation results …
Uncertainty Theory Based Reliability-Centric Cyber-Physical System Design, Houbing Song, Ya Jiang, Mingzhe Wang, Xun Jiao, Hui Kong, Rui Wang, Yongxin Liu, Jian Wang, Jiaguang Sun
Uncertainty Theory Based Reliability-Centric Cyber-Physical System Design, Houbing Song, Ya Jiang, Mingzhe Wang, Xun Jiao, Hui Kong, Rui Wang, Yongxin Liu, Jian Wang, Jiaguang Sun
Publications
Cyber-physical systems (CPSs) are built from, and depend upon, the seamless integration of software and hardware components. The most important challenge in CPS design and verification is to design CPS to be reliable in a variety of uncertainties, i.e., unanticipated and rapidly evolving environments and disturbances. The costs, delays and reliability of the designed CPS are highly dependent on software-hardware partitioning in the design. The key challenges in partitioning CPSs is that it is difficult to formalize reliability characterization in the same way as the uncertain cost and time delay.
In this paper, we propose a new CPS design paradigm …
Evaluation Of Suas Education And Training Tools, Brent Terwilliger, Scott Burgess, James Solti, Kristine Kiernan, Christian Janke, Andrew Shepherd
Evaluation Of Suas Education And Training Tools, Brent Terwilliger, Scott Burgess, James Solti, Kristine Kiernan, Christian Janke, Andrew Shepherd
Publications
The wide distribution and demographic composition of students seeking small unmanned aircraft system (sUAS) education presents a need to fully understand the capabilities, limitations, and dependencies of effective training tools. Concepts, practices, and technologies associated with modeling and simulation, immersive gaming, augmented and mixed-reality, and remote operation have demonstrated efficacy to support engaged student learning and objective satisfaction. Identification and comparison of key attributes critical to an aviation educational framework, such as competency-based training, enables educational designers to identify those tools with the highest potential to support successful learning. A series of factors, such as system performance, regulatory compliance, environmental …
Surgical And Medical Applications Of Drones: A Comprehensive Review, Brent Terwilliger, James C. Rosser Jr., Vudatha Vignesh, Brett C. Parker
Surgical And Medical Applications Of Drones: A Comprehensive Review, Brent Terwilliger, James C. Rosser Jr., Vudatha Vignesh, Brett C. Parker
Publications
Drones have the ability to gather real time data cost effectively, to deliver payloads and have initiated the rapid evolution of many industrial, commercial, and recreational applications. Unfortunately, there has been a slower expansion in the field of medicine. This article provides a comprehensive review of current and future drone applications in medicine, in hopes of empowering and inspiring more aggressive investigation.
Computer Program, System, And Method For Observation And Communication For Mobile Settings, Mobile Applications, And Wearable Mobile Devices, Jibo He, Barbara Chaparro
Computer Program, System, And Method For Observation And Communication For Mobile Settings, Mobile Applications, And Wearable Mobile Devices, Jibo He, Barbara Chaparro
Publications
A system including at least first and second wearable mobile devices and optionally one or more smartphones or other computing devices for allowing a wearable mobile device wearer, an on-site observer, and a remote observer to research and test usability of products in mobile settings, mobile applications, mobile devices, and wearable mobile devices, desktop usability settings, and other settings and devices. The devices nm a software application for generating first-person video and third-person video, transmitting the video to the other devices, marking the videos with time stamps, and allowing the remote observer to send messages and other information to the …