Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Uas-Guided Electric And Magnetic Field Data Distribution Across Transmission Lines, Tanzim Jim Hassan, Jamison Jangula, Akshay Ram Ramchandra, Prashanth Rajagopalan, Prakash Ranganathan, Ryan Adams Feb 2024

Uas-Guided Electric And Magnetic Field Data Distribution Across Transmission Lines, Tanzim Jim Hassan, Jamison Jangula, Akshay Ram Ramchandra, Prashanth Rajagopalan, Prakash Ranganathan, Ryan Adams

Graduate Research Achievement Day Posters

This poster discusses an electric (E) and magnetic (H) field data gathering process across a series of High Voltage (HV) transmission lines. Data was collected from one DC and four AC Transmission (Tx) lines. Multiple DJI UAV (M2EA, M30, and M300) were used to collect E/H field measurements with an onboard set-up. These measurements included parameters such as E field in V/m, H field in mG, Battery voltage in V, Battery current A, Battery percentage in %, Battery Temperature in F, and latitude and longitude. The preliminary findings indicate that distance and sensor orientation affect E/H field distribution.


Machiavellianism And Security: Leveraging Queries At Llms For Black Hat Operations, Niroop Sugunaraj, Prakash Ranganathan Jan 2024

Machiavellianism And Security: Leveraging Queries At Llms For Black Hat Operations, Niroop Sugunaraj, Prakash Ranganathan

Electrical Engineering Posters and Presentations

Critical infrastructure like the power grid are at risk from increasing cyber threats due to the growth of distributed energy resources ( relying heavily on internet connectivity Compromised DER endpoints are susceptible to cyber attacks and it is important to first identify evolving cybersecurity issues in widely deployed architectures, communication protocols, and networks Information produced from artificial intelligence ( based co pilots are emerging threats that can offer convenient and detailed playbooks to compromise DERs through multiple attack vectors even for a non technical black hat community and should therefore be considered as a repository for unethical hackers