Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

Embry-Riddle Aeronautical University

Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 500

Full-Text Articles in Engineering

Optimization Of Human Interactions In The College Campus Model Via Simio Integration, Benjamin E. Chaback Apr 2024

Optimization Of Human Interactions In The College Campus Model Via Simio Integration, Benjamin E. Chaback

Doctoral Dissertations and Master's Theses

College campuses are a significant part of life in some cities. Many students each year attend university, pursuing additional knowledge from faculty members. Both staff and faculty members rely on these students to have successful jobs and to ensure the university functions. Yet recently, more and more students are attending, leading to overcrowding, lower admission rates, and difficulty getting into good programs. Previous work exists on qualitative student affairs and quantitative retention data, yet little on using simulations to model this problem. This work aimed to (a) Determine the ability to successfully model human interactions/people flow on a college campus, …


Low Cost Magnetometer Calibration And Distributed Simultaneous Multipoint Ionospheric Measurements From A Sounding Rocket Platform, Joshua W. Milford Apr 2024

Low Cost Magnetometer Calibration And Distributed Simultaneous Multipoint Ionospheric Measurements From A Sounding Rocket Platform, Joshua W. Milford

Doctoral Dissertations and Master's Theses

Low-cost and low-size-weight-and-power (SWaP) magnetometers can provide greater accessibility for distributed simultaneous measurements in the ionosphere, either onboard sounding rockets or on CubeSats. The Space and Atmospheric Instrumentation Laboratory (SAIL) at Embry-Riddle Aeronautical University has launched a multitude of sounding rockets in recent history: one night-time mid-latitude rocket from Wallops Flight Facility in August 2022 and three mid-latitude rockets from White Sands Missile Range during the October 2023 annular solar eclipse. All rockets had a comprehensive suite of instruments for electrodynamics and neutral dynamics measurements. Among this suite was one science-grade three-axis fluxgate magnetometer (Billingsley TFM65VQS / TFM100G2) and up …


Stereoscopic-Based Mass Properties Estimation For Warhead Fragments, Alessia Nocerino, Katharine Larsen, Riccardo Bevilacqua, Elisabetta L. Jerome Nov 2023

Stereoscopic-Based Mass Properties Estimation For Warhead Fragments, Alessia Nocerino, Katharine Larsen, Riccardo Bevilacqua, Elisabetta L. Jerome

Student Works

FRAGMENTATION characteristics such as spatial distribution, number of fragments, fragment velocity, and fragment mass can be used to characterize the lethality of a fragmenting weapon or any metal cased explosive [1,2]. However, most warhead tests and evaluations are limited to static arena testing, where fragment characteristics must be collected by hand. Recently, stereoscopic imaging techniques have been added to static arena tests. Using this method, position tracks can be collected for each fragment, and then velocity information can be found. This paper proposes a method to estimate the mass and moment of inertia using data collected by a stereoscopic imaging …


Spoken Language Processing And Modeling For Aviation Communications, Aaron Van De Brook Oct 2023

Spoken Language Processing And Modeling For Aviation Communications, Aaron Van De Brook

Doctoral Dissertations and Master's Theses

With recent advances in machine learning and deep learning technologies and the creation of larger aviation-specific corpora, applying natural language processing technologies, especially those based on transformer neural networks, to aviation communications is becoming increasingly feasible. Previous work has focused on machine learning applications to natural language processing, such as N-grams and word lattices. This thesis experiments with a process for pretraining transformer-based language models on aviation English corpora and compare the effectiveness and performance of language models transfer learned from pretrained checkpoints and those trained from their base weight initializations (trained from scratch). The results suggest that transformer language …


Additively Manufactured Engineered Fingerprint (Amef) Antenna And Related Detection, Eduardo Antonio Rojas, Noemi Miguelea-Gomez Jul 2023

Additively Manufactured Engineered Fingerprint (Amef) Antenna And Related Detection, Eduardo Antonio Rojas, Noemi Miguelea-Gomez

Publications

Antenna structures can include an additively manufactured engineered fingerprint (AMEF). AMEF antenna features facilitate individual or type classification of an unknown source antenna. As described herein, physical features can be included in an additively manufactured antenna to facili­tate source identification, such as without sacrificing antenna performance. In general, AMEF techniques can improve physical layer security, such as without dramatically increas­ing production cost or decreasing production throughput, as compared to other approaches.


Resilience Model For Teams Of Autonomous Unmanned Aerial Vehicles (Uav) Executing Surveillance Missions, Robert Koeneke Jul 2023

Resilience Model For Teams Of Autonomous Unmanned Aerial Vehicles (Uav) Executing Surveillance Missions, Robert Koeneke

Doctoral Dissertations and Master's Theses

Teams of low-cost Unmanned Aerial Vehicles (UAVs) have gained acceptance as an alternative for cooperatively searching and surveilling terrains. These UAVs are assembled with low-reliability components, so unit failures are possible. Losing UAVs to failures decreases the team's coverage efficiency and impacts communication, given that UAVs are also communication nodes. Such is the case of a Flying Ad Hoc Network (FANET), where the failure of a communication node may isolate segments of the network covering several nodes. The main goal of this study is to develop a resilience model that would allow us to analyze the effects of individual UAV …


Ads-B Communication Interference In Air Traffic Management, George Ray Jan 2023

Ads-B Communication Interference In Air Traffic Management, George Ray

International Journal of Aviation, Aeronautics, and Aerospace

Automated Dependent Surveillance Broadcast (ADS-B) provides position and state information about aircraft and is becoming an essential component in the global air traffic management system. ADS-B transponders broadcast this key information on a common frequency to both other aircraft and to secondary surveillance radar systems located at ground stations. Both the aircraft transponders and the ground stations work together to assist in managing the commercial airspace. Since the aircraft transponders all broadcast on the same frequency and are in close proximity there is an apparent risk of interference and the garbling of the communications needed to manage the airspace.

The …


On-Board Artificial Intelligence For Failure Detection And Safe Trajectory Generation, Eduardo Morillo Dec 2022

On-Board Artificial Intelligence For Failure Detection And Safe Trajectory Generation, Eduardo Morillo

Doctoral Dissertations and Master's Theses

The use of autonomous flight vehicles has recently increased due to their versatility and capability of carrying out different type of missions in a wide range of flight conditions. Adequate commanded trajectory generation and modification, as well as high-performance trajectory tracking control laws have been an essential focus of researchers given that integration into the National Air Space (NAS) is becoming a primary need. However, the operational safety of these systems can be easily affected if abnormal flight conditions are present, thereby compromising the nominal bounds of design of the system's flight envelop and trajectory following. This thesis focuses on …


A Design Flow For Additively Manufactured 3d Metasurface Antennas​, Justin Parkhurst Oct 2022

A Design Flow For Additively Manufactured 3d Metasurface Antennas​, Justin Parkhurst

Doctoral Dissertations and Master's Theses

Metasurface (MTS) antennas are complex arrays consisting of hundreds or thousands of individual elements that each exert their own influence on the performance of the antenna. Due to this, the process of designing and developing a MTS antenna can be intensive in terms of both the time to understand the how these antennas operate and time running calculations that achieve optimal performance. Through the use of automation for geometry creation in ANSYS HFSS, the work involved in making a MTS antenna can be greatly simplified. The overall objective of this thesis is to reduce the burden of constructing a MTS …


Advanced Manufacturing And Dielectric Material Characterization Techniques For High-Temperature Mm-Wave Antennas, Seng Loong Yu Oct 2022

Advanced Manufacturing And Dielectric Material Characterization Techniques For High-Temperature Mm-Wave Antennas, Seng Loong Yu

Doctoral Dissertations and Master's Theses

As traditional monitoring data sensors in high temperature environments such as gas turbine engines and aerospace applications are being replaced by wireless equivalents in recent years, there is a need for low-cost, low-time, and low-infrastructure alternatives to further push the state of the art. In this work, two aspects of high temperature materials in the above context are explored: (a) the development of advanced manufacturing techniques for high temperature materials that is lowcost, low-time, and low-infrastructure, and (b) the development of material characterization techniques that can be integrated with the manufacturing processes of high temperature materials. Additive manufacturing has been …


Hardware Security For Wireless Communications Systems Using Antenna-Based Radio Frequency Fingerprint Engineering, Noemi Miguelez Gomez Oct 2022

Hardware Security For Wireless Communications Systems Using Antenna-Based Radio Frequency Fingerprint Engineering, Noemi Miguelez Gomez

Doctoral Dissertations and Master's Theses

The design and application of novel physical-layer security techniques have been increasing in the last decades as means to enhance the security that more traditional techniques provide to wireless communications systems. Well-known hardware security techniques, such as radio frequency fingerprinting, use unintended manufacturing process variations and unique hardware structures in the semiconductors for applications such as identification and classification of the source of different transmitted signals, and detection of hardware modifications. The uniqueness of the features that two different modules present, even maintaining the same design, can be used for modules characterization at a lower cost and complexity than other …


Wireless Coupled Feed Structure For Additively Manufactured Conformal Antennas, Blake Roberts Oct 2022

Wireless Coupled Feed Structure For Additively Manufactured Conformal Antennas, Blake Roberts

Doctoral Dissertations and Master's Theses

Due to advancements in additive manufacturing, it is possible to create electromagnetic devices that can be conformally printed directly onto 3D surfaces using conductive inks and dielectric pastes. Instance, the traditional antenna radomes that had the purpose of protecting the antenna on its inside can now become the antenna itself. With the components on the surface of the structure, instead of inside if it, a direct feed line would require cutting through dielectric layers and creating a direct electrical connection, also called vertical interconnect access (VIA). Such interconnects are frequent sources of failures, especially in applications that are subject to …


Height Information Aided 3d Real-Time Large-Scale Underground User Positioning, Houbing Song, Chengkai Tang, Cunle Zhang, Lingling Zhang, Yi Zhang Sep 2022

Height Information Aided 3d Real-Time Large-Scale Underground User Positioning, Houbing Song, Chengkai Tang, Cunle Zhang, Lingling Zhang, Yi Zhang

Publications

Due to the cost of inertial navigation and visual navigation equipment and lake of satellite navigation signals, they cannot be used in large‐scale underground mining environment. To solve this problem, this study proposes large‐scale underground 3D real‐time positioning method with seam height assistance. This method uses the ultrawide band positioning base station as the core and is combined with seam height information to build a factor graph confidence transfer model to realise3D positioning. The simulation results show that the proposed real‐time method is superior to the existing algorithms in positioning accuracy and can meet the needs of large‐scale underground users.


Computational Models To Detect Radiation In Urban Environments: An Application Of Signal Processing Techniques And Neural Networks To Radiation Data Analysis, Jose Nicolas Gachancipa Jul 2022

Computational Models To Detect Radiation In Urban Environments: An Application Of Signal Processing Techniques And Neural Networks To Radiation Data Analysis, Jose Nicolas Gachancipa

Beyond: Undergraduate Research Journal

Radioactive sources, such as uranium-235, are nuclides that emit ionizing radiation, and which can be used to build nuclear weapons. In public areas, the presence of a radioactive nuclide can present a risk to the population, and therefore, it is imperative that threats are identified by radiological search and response teams in a timely and effective manner. In urban environments, such as densely populated cities, radioactive sources may be more difficult to detect, since background radiation produced by surrounding objects and structures (e.g., buildings, cars) can hinder the effective detection of unnatural radioactive material. This article presents a computational model …


Interactive Planetarium Project, Eric Babcock, Cody Park, Johann Van Hilst Jul 2022

Interactive Planetarium Project, Eric Babcock, Cody Park, Johann Van Hilst

Discovery Day - Prescott

The Interactive Planetarium Project will design and build the software framework for connectivity between the Digistar 6 planetarium projection software and the smartphones of all audience members in the Jim and Linda Lee Planetarium. The goal of this project is to make planetarium shows more participatory, add a feature to our planetarium shows that many other universities do not yet have, and create a framework for future students and faculty to build from. To demonstrate our technology, we will make a real-time competitive trivia game able to support 60 concurrent users (number of expected audience members in the planetarium).

The …


Z-Axis Meandering Patch Antenna And Fabrication Thereof, Eduardo Antonio Rojas, Carlos R. Mejias-Morillo May 2022

Z-Axis Meandering Patch Antenna And Fabrication Thereof, Eduardo Antonio Rojas, Carlos R. Mejias-Morillo

Publications

Apparatus and techniques described herein can include antenna configurations and related fabrication. For example, a Z-axis meandering antenna configuration can be fabri­cated, such as by forming a dielectric substrate extending in two dimensions and defining an undulating region extending out of a plane defined by the two dimensions; and forming at least one conductive region following a contour of the dielectric substrate including at least a portion of the undu­lating region. The at least one conductive region can follow the contour of the dielectric substrate, such as including a first conductive region on a first layer, and a second con­ductive …


Design, Development, And Calibration Of An Electric Field Probe For Use On Sounding Rockets, Anthony Oreo, Anthony Oreo Apr 2022

Design, Development, And Calibration Of An Electric Field Probe For Use On Sounding Rockets, Anthony Oreo, Anthony Oreo

Doctoral Dissertations and Master's Theses

Earth’s ionosphere is a dynamic environment that has yet to be fully understood. Interactions of high-energy particles from space with atmospheric plasma and the Earth’s natural magnetic field create many interesting interactions, many of which have direct impacts on the planet and human life. Understanding the dynamics of the upper atmosphere is a compelling endeavor, with much of the research being conducted through high-altitude sounding rockets. These rockets allow for in-situ measurements of the physical parameters of the upper atmosphere which in turn helps in the answering of important questions in space science. In order to quantify the force a …


Airspace Integration Of New Entrants And Safety Risk Management Models, Fadjimata Issoufou Anaroua Dec 2021

Airspace Integration Of New Entrants And Safety Risk Management Models, Fadjimata Issoufou Anaroua

Doctoral Dissertations and Master's Theses


In recent years, the demand for airspace access of Unmanned Aerial Systems (UAS) increased significantly and is continuously increasing for different altitude-types UAS. A similar evolution is expected from Commercial Space Operations (CSO) in the next years. These aviation/aerospace systems will need to be seamlessly integrated into the National Airspace System (NAS), at their operational altitude levels, and accounted for from all perspectives, including proactively addressing their safety hazards. This thesis captures the requirements for the new entrants’ integration, and then identifies and analyzes the safety risks added to the NAS operations by its new entrants, the future omnipresent UAS …


Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang Dec 2021

Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang

Doctoral Dissertations and Master's Theses

Fueled by the advancement of 5G new radio (5G NR), rapid development has occurred in many fields. Compared with the conventional approaches, beamforming and network slicing enable 5G NR to have ten times decrease in latency, connection density, and experienced throughput than 4G long term evolution (4G LTE). These advantages pave the way for the evolution of Cyber-physical Systems (CPS) on a large scale. The reduction of consumption, the advancement of control engineering, and the simplification of Unmanned Aircraft System (UAS) enable the UAS networking deployment on a large scale to become feasible. The UAS networking can finish multiple complex …


Improvement On Pdp Evaluation Performance Based On Neural Networks And Sgdk-Means Algorithm, Fan Deng, Houbing Song, Zhenhua Yu, Liyong Zhang, Xi Song, Min Zhang, Zhenyu Zhang, Yu Mei Nov 2021

Improvement On Pdp Evaluation Performance Based On Neural Networks And Sgdk-Means Algorithm, Fan Deng, Houbing Song, Zhenhua Yu, Liyong Zhang, Xi Song, Min Zhang, Zhenyu Zhang, Yu Mei

Publications

With the purpose of improving the PDP (policy decision point) evaluation performance, a novel and efficient evaluation engine, namely XDNNEngine, based on neural networks and an SGDK-means (stochastic gradient descent K-means) algorithm is proposed. We divide a policy set into different clusters, distinguish different rules based on their own features and label them for the training of neural networks by using the K-means algorithm and an asynchronous SGDK-means algorithm. Then, we utilize neural networks to search for the applicable rule. A quantitative neural network is introduced to reduce a server’s computational cost. By simulating the arrival of requests, XDNNEngine is …


Zero-Bias Deep Neural Network For Quickest Rf Signal Surveillance, Yongxin Liu, Jian Wang, Dahai Liu, Houbing Song, Yingjie Chen, Shuteng Niu Oct 2021

Zero-Bias Deep Neural Network For Quickest Rf Signal Surveillance, Yongxin Liu, Jian Wang, Dahai Liu, Houbing Song, Yingjie Chen, Shuteng Niu

Publications

The Internet of Things (IoT) is reshaping modern society by allowing a decent number of RF devices to connect and share information through RF channels. However, such an open nature also brings obstacles to surveillance. For alleviation, a surveillance oracle, or a cognitive communication entity needs to identify and confirm the appearance of known or unknown signal sources in real-time. In this paper, we provide a deep learning framework for RF signal surveillance. Specifically, we jointly integrate the Deep Neural Networks (DNNs) and Quickest Detection (QD) to form a sequential signal surveillance scheme. We first analyze the latent space characteristic …


Rf Fingerprinting Unmanned Aerial Vehicles, Norah Ondus Oct 2021

Rf Fingerprinting Unmanned Aerial Vehicles, Norah Ondus

Doctoral Dissertations and Master's Theses

As unmanned aerial vehicles (UAVs) continue to become more readily available, their use in civil, military, and commercial applications is growing significantly. From aerial surveillance to search-and-rescue to package delivery the use cases of UAVs are accelerating. This accelerating popularity gives rise to numerous attack possibilities for example impersonation attacks in drone-based delivery, in a UAV swarm, etc. In order to ensure drone security, in this project we propose an authentication system based on RF fingerprinting. Specifically, we extract and use the device-specific hardware impairments embedded in the transmitted RF signal to separate the identity of each UAV. To achieve …


Federated Variational Learning For Anomaly Detection In Multivariate Time Series, Kai Zhang, Houbing Song, Yushan Jiang, Lee Seversky, Chengtao M. Xu, Dahai Liu Aug 2021

Federated Variational Learning For Anomaly Detection In Multivariate Time Series, Kai Zhang, Houbing Song, Yushan Jiang, Lee Seversky, Chengtao M. Xu, Dahai Liu

Publications

Anomaly detection has been a challenging task given high-dimensional multivariate time series data generated by networked sensors and actuators in Cyber-Physical Systems (CPS). Besides the highly nonlinear, complex, and dynamic nature of such time series, the lack of labeled data impedes data exploitation in a supervised manner and thus prevents an accurate detection of abnormal phenomenons. On the other hand, the collected data at the edge of the network is often privacy sensitive and large in quantity, which may hinder the centralized training at the main server. To tackle these issues, we propose an unsupervised time series anomaly detection framework …


Learning To Detect: A Data-Driven Approach For Network Intrusion Detection, Zachary Tauscher, Yushan Jiang, Kai Zhang, Jian Wang, Houbing Song Aug 2021

Learning To Detect: A Data-Driven Approach For Network Intrusion Detection, Zachary Tauscher, Yushan Jiang, Kai Zhang, Jian Wang, Houbing Song

Publications

With massive data being generated daily and the ever-increasing interconnectivity of the world’s Internet infrastructures, a machine learning based intrusion detection system (IDS) has become a vital component to protect our economic and national security. In this paper, we perform a comprehensive study on NSL-KDD, a network traffic dataset, by visualizing patterns and employing different learning-based models to detect cyber attacks. Unlike previous shallow learning and deep learning models that use the single learning model approach for intrusion detection, we adopt a hierarchy strategy, in which the intrusion and normal behavior are classified firstly, and then the specific types of …


Multimedia Networks And Communications, Houbing Song Jul 2021

Multimedia Networks And Communications, Houbing Song

Publications

Sight and sound is a type of correspondence that joins distinctive substance structures like content, sound, pictures, liveliness, or video into a solitary show, rather than customary broad communications, like written word or sound chronicles. Famous instances of interactive media incorporate video web recordings, sound slideshows and animated videos. Multimedia can be recorded for playback on PCs, workstations, cell phones, and other electronic gadgets, either on request or progressively (streaming). In the early long stretches of sight and sound, the expression "rich media" was inseparable from intuitive mixed media. Over the long run. Improved degrees of intuitiveness are made conceivable …


Learning-To-Dispatch: Reinforcement Learning Based Flight Planning Under Emergency, Kai Zhang, Yupeng Yang, Chengtao Xu, Dahai Liu, Houbing Song Jul 2021

Learning-To-Dispatch: Reinforcement Learning Based Flight Planning Under Emergency, Kai Zhang, Yupeng Yang, Chengtao Xu, Dahai Liu, Houbing Song

Publications

The effectiveness of resource allocation under emergencies especially hurricane disasters is crucial. However, most researchers focus on emergency resource allocation in a ground transportation system. In this paper, we propose Learning-to- Dispatch (L2D), a reinforcement learning (RL) based air route dispatching system, that aims to add additional flights for hurricane evacuation while minimizing the airspace’s complexity and air traffic controller’s workload. Given a bipartite graph with weights that are learned from the historical flight data using RL in consideration of short- and long-term gains, we formulate the flight dispatch as an online maximum weight matching problem. Different from the conventional …


Real-Time Machine Learning For Quickest Detection, Yongxin Liu Jun 2021

Real-Time Machine Learning For Quickest Detection, Yongxin Liu

Doctoral Dissertations and Master's Theses

Safety-critical Cyber-Physical Systems (CPS) require real-time machine learning for control and decision making. One promising solution is to use deep learning to discover useful patterns for event detection from heterogeneous data. However, deep learning algorithms encounter challenges in CPS with assurability requirements: 1) Decision explainability, 2) Real-time and quickest event detection, and 3) Time-eficient incremental learning.

To address these obstacles, I developed a real-time Machine Learning Framework for Quickest Detection (MLQD). To be specific, I first propose the zero-bias neural network, which removes decision bias and preferabilities from regular neural networks and provides an interpretable decision process. Second, I discover …


Class-Incremental Learning For Wireless Device Identification In Iot, Yongxin Liu, Jian Wang, Jianqiang Li, Shuteng Niu, Houbing Song May 2021

Class-Incremental Learning For Wireless Device Identification In Iot, Yongxin Liu, Jian Wang, Jianqiang Li, Shuteng Niu, Houbing Song

Publications

Deep Learning (DL) has been utilized pervasively in the Internet of Things (IoT). One typical application of DL in IoT is device identification from wireless signals, namely Noncryptographic Device Identification (NDI). However, learning components in NDI systems have to evolve to adapt to operational variations, such a paradigm is termed as Incremental Learning (IL). Various IL algorithms have been proposed and many of them require dedicated space to store the increasing amount of historical data, and therefore, they are not suitable for IoT or mobile applications. However, conventional IL schemes can not provide satisfying performance when historical data are not …


Thruster Communication For Subsurface Environments; Turning Waste Noise Into Useful Data, Stephen Cronin May 2021

Thruster Communication For Subsurface Environments; Turning Waste Noise Into Useful Data, Stephen Cronin

Doctoral Dissertations and Master's Theses

Acoustic communication serves as one of the primary means of wirelessly communicating underwater. Whereas much of the developments in the field of wireless communication have focused on radio frequency technology, water highly absorbs radio waves rendering the link not feasible for most all subsurface operations. While acoustic links have enabled new capabilities for systems operating in this challenging environment, it has yet to reach the commodity availability of radio systems, meaning that an entire class of small, low-cost systems have been unable to make use of these links. The systems in question are primarily autonomous underwater vehicles (AUVs), as they …


A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami May 2021

A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami

Doctoral Dissertations and Master's Theses

Social engineering attacks (SE-attacks) in enterprises are hastily growing and are becoming increasingly sophisticated. Generally, SE-attacks involve the psychological manipulation of employees into revealing confidential and valuable company data to cybercriminals. The ramifications could bring devastating financial and irreparable reputation loss to the companies. Because SE-attacks involve a human element, preventing these attacks can be tricky and challenging and has become a topic of interest for many researchers and security experts. While methods exist for detecting SE-attacks, our literature review of existing methods identified many crucial factors such as the national cultural, organizational, and personality traits of employees that enable …