Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Engineering

End-To-End Direct Digital Synthesis Simulation And Mathematical Model To Minimize Quantization Effects Of Digital Signal Generation, Pranav R. Patel, Richard K. Martin Oct 2020

End-To-End Direct Digital Synthesis Simulation And Mathematical Model To Minimize Quantization Effects Of Digital Signal Generation, Pranav R. Patel, Richard K. Martin

Faculty Publications

Direct digital synthesis (DDS) architectures are becoming more prevalent as modern digital-to-analog converter (DAC) and programmable logic devices evolve to support higher bandwidths. The DDS architecture provides the benefit of digital control but at a cost of generating spurious content in the spectrum. The generated spurious content may cause intermodulation distortion preventing proper demodulation of the received signal. The distortion may also interfere with the neighboring frequency bands. This article presents the various DDS architectures and explores the DDS architecture which provides the most digital reconfigurability with the lowest spurious content. End-to-end analytical equations, numerical and mathematical models are developed …


Statistical Photo-Calibration Of Photo-Detectors For Radiometry Without Calibrated Light Sources Comprising An Arithmetic Unit To Determine A Gain And A Bias From Mean Values And Variance Values, Adrian M. Catarius, Nicholas Yielding, Stephen C. Cain, Michael D. Seal Jun 2020

Statistical Photo-Calibration Of Photo-Detectors For Radiometry Without Calibrated Light Sources Comprising An Arithmetic Unit To Determine A Gain And A Bias From Mean Values And Variance Values, Adrian M. Catarius, Nicholas Yielding, Stephen C. Cain, Michael D. Seal

AFIT Patents

Calibration of a radiometry system uses a readout circuit of a photo-detector to provide first and second measurements collected over first and second integration times, respectively, where the first and second measurements are related to a photonic input to the photo-detector by a gain and a bias. First mean and variance values are computed for a plurality of first measurements. Second mean and variance values are computed for a plurality of second measurements. The gain and bias are determined from the first and second mean values and the first and second variance values without the use of a calibrated source. …


Monte Carlo Tree Search Applied To A Modified Pursuit/Evasion Scotland Yard Game With Rendezvous Spaceflight Operation Applications, Joshua A. Daughtery Jun 2020

Monte Carlo Tree Search Applied To A Modified Pursuit/Evasion Scotland Yard Game With Rendezvous Spaceflight Operation Applications, Joshua A. Daughtery

Theses and Dissertations

This thesis takes the Scotland Yard board game and modifies its rules to mimic important aspects of space in order to facilitate the creation of artificial intelligence for space asset pursuit/evasion scenarios. Space has become a physical warfighting domain. To combat threats, an understanding of the tactics, techniques, and procedures must be captured and studied. Games and simulations are effective tools to capture data lacking historical context. Artificial intelligence and machine learning models can use simulations to develop proper defensive and offensive tactics, techniques, and procedures capable of protecting systems against potential threats. Monte Carlo Tree Search is a bandit-based …


Securing Photovoltaic (Pv) System Deployments With Data Diodes, Robert D. Larkin, Torrey J. Wagner, Barry E. Mullins Jun 2020

Securing Photovoltaic (Pv) System Deployments With Data Diodes, Robert D. Larkin, Torrey J. Wagner, Barry E. Mullins

Faculty Publications

A survey of a typical photovoltaic (PV) system with and without the cybersecurity protections of a data diode is explored. This survey includes a brief overview of Industrial Control Systems (ICS) and their relationship to the Internet of Things (IoT), Industrial Internet of Things (IIoT), and Industry 4.0 terminology. The cybersecurity features of eight data diodes are compared, and the cyber attack surface, attack scenarios, and mitigations of a typical PV system are discussed. After assessing cybersecurity, the economic considerations to purchase a data diode are considered. At 13.19 cents/kWh, the sale of 227,445 kWh is needed to fund one …


A Multi-Criteria Logistics Analysis Of Photovoltaic Modules For Remote Applications, Nathan Thomsen [*], Dimitri Papazoglou, Torrey J. Wagner, Andrew J. Hoisington, Steven J. Schuldt Jun 2020

A Multi-Criteria Logistics Analysis Of Photovoltaic Modules For Remote Applications, Nathan Thomsen [*], Dimitri Papazoglou, Torrey J. Wagner, Andrew J. Hoisington, Steven J. Schuldt

Faculty Publications

Reliable electrical power grids are frequently unavailable or inaccessible in remote locations, including developing nation communities, humanitarian relief camps, isolated construction sites, and military contingency bases. This often requires sites to rely on costly generators and continuous fuel supply. Renewable energy systems (RES) in the form of photovoltaic (PV) arrays and energy storage present a rapidly improving alternative to power these remote locations. Previous RES literature and PV optimization models focused on economics, reliability, and environmental concerns, neglecting the importance of logistics factors in remote installations. This paper proposes additional optimization variables applicable to remote PV systems and compares PV …


Near Real-Time Zigbee Device Discrimination Using Cb-Dna Features, Yousuke Z. Matsui Mar 2020

Near Real-Time Zigbee Device Discrimination Using Cb-Dna Features, Yousuke Z. Matsui

Theses and Dissertations

Currently, Low-Rate Wireless Personal Area Networks (LR-WPAN) based on the Institute of Electrical and Electronics Engineers (IEEE) 802.15.4 standard are at risk due to open-source tools which allow bad actors to exploit unauthorized network access through various cyberattacks by falsifying bit-level credentials. This research investigates implementing a Radio Frequency (RF) air monitor to perform Near RealTime (NRT) discrimination of Zigbee devices using the IEEE 802.15.4 standard. The air monitor employed a Multiple Discriminant Analysis/Euclidean Distance classifier to discriminate Zigbee devices based upon Constellation-Based Distinct Native Attribute (CB-DNA) fingerprints. Through the use of CB-DNA fingerprints, Physical Layer (PHY) characteristics unique to …


Characterization And Sensitivity Analysis Of 6 Meter Cassegrain Antenna, James L. Harris Mar 2020

Characterization And Sensitivity Analysis Of 6 Meter Cassegrain Antenna, James L. Harris

Theses and Dissertations

This paper will characterize a 6 meter in diameter cassegrain antenna. The cassegrain antenna is a special form of a dual reflector antenna which uses a main reflector following a parabolic curve and a sub reflector which follows a hyperbolic curve. Cassegrain style antennas have multiple parameters which can be tuned to achieve specific design goals. Performing a sensitivity analysis will establish relationships between design parameters, directivity, side lobe levels, and effects of strut geometry. The initial design parameters will be assumed based on typical values. Results from the sensitivity analysis will be used to provide a performance band for …


A Non-Destructive Evaluation Application Using Software Defined Radios And Bandwidth Expansion, Nicholas J. O'Brien Mar 2020

A Non-Destructive Evaluation Application Using Software Defined Radios And Bandwidth Expansion, Nicholas J. O'Brien

Theses and Dissertations

The development of low-complexity, lightweight and low-cost Non-Destructive Evaluation (NDE) equipment for microwave device testing is desirable from a maintenance efficiency and operational availability perspective. Current NDE equipment tends to be custom-designed, cumbersome and expensive. Software Defined Radio (SDR) technology, and a bandwidth expansion technique that exploits a priori transmit signal knowledge and auto-correlation provides a solution. This research investigated the reconstruction of simultaneous SDR receiver instantaneous bandwidth (sub-band) collections using single, dual and multiple SDR receivers. The adjacent sub-bands, collectively spanning a transmit signal bandwidth were auto-correlated with a replica transmit signal to restore frequency and phase offsets. The …


Improved Ground-Based Monocular Visual Odometry Estimation Using Inertially-Aided Convolutional Neural Networks, Josiah D. Watson Mar 2020

Improved Ground-Based Monocular Visual Odometry Estimation Using Inertially-Aided Convolutional Neural Networks, Josiah D. Watson

Theses and Dissertations

While Convolutional Neural Networks (CNNs) can estimate frame-to-frame (F2F) motion even with monocular images, additional inputs can improve Visual Odometry (VO) predictions. In this thesis, a FlowNetS-based [1] CNN architecture estimates VO using sequential images from the KITTI Odometry dataset [2]. For each of three output types (full six degrees of freedom (6-DoF), Cartesian translation, and transitional scale), a baseline network with only image pair input is compared with a nearly identical architecture that is also given an additional rotation estimate such as from an Inertial Navigation System (INS). The inertially-aided networks show an order of magnitude improvement over the …


Development Of A Drone-Mounted Wireless Attack Platform, Nathan V. Barker Mar 2020

Development Of A Drone-Mounted Wireless Attack Platform, Nathan V. Barker

Theses and Dissertations

The commercial drone market has grown rapidly due to the increasing utility and capabilities of drones. This new found popularity has made it possible for inexpensive drones capable of impressive carry capacities and flight times to reach the consumer market. These new features also offer an invaluable resource to wireless hackers. Capitalizing on their mobility, a wireless hacker can equip a drone with hacking tools to surpass physical security (e.g. fences) with relative ease and reach wireless networks. This research seeks to experimentally evaluate the ability of a drone-mounted wireless attack platform equipped with a directional antenna to conduct wireless …