Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Engineering

Airspace Integration Of New Entrants And Safety Risk Management Models, Fadjimata Issoufou Anaroua Dec 2021

Airspace Integration Of New Entrants And Safety Risk Management Models, Fadjimata Issoufou Anaroua

Doctoral Dissertations and Master's Theses


In recent years, the demand for airspace access of Unmanned Aerial Systems (UAS) increased significantly and is continuously increasing for different altitude-types UAS. A similar evolution is expected from Commercial Space Operations (CSO) in the next years. These aviation/aerospace systems will need to be seamlessly integrated into the National Airspace System (NAS), at their operational altitude levels, and accounted for from all perspectives, including proactively addressing their safety hazards. This thesis captures the requirements for the new entrants’ integration, and then identifies and analyzes the safety risks added to the NAS operations by its new entrants, the future omnipresent UAS …


Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang Dec 2021

Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang

Doctoral Dissertations and Master's Theses

Fueled by the advancement of 5G new radio (5G NR), rapid development has occurred in many fields. Compared with the conventional approaches, beamforming and network slicing enable 5G NR to have ten times decrease in latency, connection density, and experienced throughput than 4G long term evolution (4G LTE). These advantages pave the way for the evolution of Cyber-physical Systems (CPS) on a large scale. The reduction of consumption, the advancement of control engineering, and the simplification of Unmanned Aircraft System (UAS) enable the UAS networking deployment on a large scale to become feasible. The UAS networking can finish multiple complex …


Rf Fingerprinting Unmanned Aerial Vehicles, Norah Ondus Oct 2021

Rf Fingerprinting Unmanned Aerial Vehicles, Norah Ondus

Doctoral Dissertations and Master's Theses

As unmanned aerial vehicles (UAVs) continue to become more readily available, their use in civil, military, and commercial applications is growing significantly. From aerial surveillance to search-and-rescue to package delivery the use cases of UAVs are accelerating. This accelerating popularity gives rise to numerous attack possibilities for example impersonation attacks in drone-based delivery, in a UAV swarm, etc. In order to ensure drone security, in this project we propose an authentication system based on RF fingerprinting. Specifically, we extract and use the device-specific hardware impairments embedded in the transmitted RF signal to separate the identity of each UAV. To achieve …


Real-Time Machine Learning For Quickest Detection, Yongxin Liu Jun 2021

Real-Time Machine Learning For Quickest Detection, Yongxin Liu

Doctoral Dissertations and Master's Theses

Safety-critical Cyber-Physical Systems (CPS) require real-time machine learning for control and decision making. One promising solution is to use deep learning to discover useful patterns for event detection from heterogeneous data. However, deep learning algorithms encounter challenges in CPS with assurability requirements: 1) Decision explainability, 2) Real-time and quickest event detection, and 3) Time-eficient incremental learning.

To address these obstacles, I developed a real-time Machine Learning Framework for Quickest Detection (MLQD). To be specific, I first propose the zero-bias neural network, which removes decision bias and preferabilities from regular neural networks and provides an interpretable decision process. Second, I discover …


A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami May 2021

A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami

Doctoral Dissertations and Master's Theses

Social engineering attacks (SE-attacks) in enterprises are hastily growing and are becoming increasingly sophisticated. Generally, SE-attacks involve the psychological manipulation of employees into revealing confidential and valuable company data to cybercriminals. The ramifications could bring devastating financial and irreparable reputation loss to the companies. Because SE-attacks involve a human element, preventing these attacks can be tricky and challenging and has become a topic of interest for many researchers and security experts. While methods exist for detecting SE-attacks, our literature review of existing methods identified many crucial factors such as the national cultural, organizational, and personality traits of employees that enable …


Thruster Communication For Subsurface Environments; Turning Waste Noise Into Useful Data, Stephen Cronin May 2021

Thruster Communication For Subsurface Environments; Turning Waste Noise Into Useful Data, Stephen Cronin

Doctoral Dissertations and Master's Theses

Acoustic communication serves as one of the primary means of wirelessly communicating underwater. Whereas much of the developments in the field of wireless communication have focused on radio frequency technology, water highly absorbs radio waves rendering the link not feasible for most all subsurface operations. While acoustic links have enabled new capabilities for systems operating in this challenging environment, it has yet to reach the commodity availability of radio systems, meaning that an entire class of small, low-cost systems have been unable to make use of these links. The systems in question are primarily autonomous underwater vehicles (AUVs), as they …


Data-Efficient Machine Learning With Focus On Transfer Learning, Shuteng Niu Apr 2021

Data-Efficient Machine Learning With Focus On Transfer Learning, Shuteng Niu

Doctoral Dissertations and Master's Theses

Machine learning (ML) has attracted a significant amount of attention from the artificial intelligence community. ML has shown state-of-art performance in various fields, such as signal processing, healthcare system, and natural language processing (NLP). However, most conventional ML algorithms suffer from three significant difficulties: 1) insufficient high-quality training data, 2) costly training process, and 3) domain discrepancy. Therefore, it is important to develop solutions for these problems, so the future of ML will be more sustainable. Recently, a new concept, data-efficient ma- chine learning (DEML), has been proposed to deal with the current bottlenecks of ML. Moreover, transfer learning (TL) …