Open Access. Powered by Scholars. Published by Universities.®

Aviation Safety and Security Commons

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 112

Full-Text Articles in Aviation Safety and Security

Igniting Passion:​ A Detailed Journey Through Rocketry Course Activities, Krish M. Patel, Hannah Caycedo, Joshua Gage, Josi Maness, Kevin Park, Mufeng Shen Apr 2024

Igniting Passion:​ A Detailed Journey Through Rocketry Course Activities, Krish M. Patel, Hannah Caycedo, Joshua Gage, Josi Maness, Kevin Park, Mufeng Shen

SACAD: John Heinrichs Scholarly and Creative Activity Days

This course is a semester-long adventure in rocketry, led by Dr. Paul Adams. It covers everything about building and flying rockets, starting from the basics to more advanced rocketry. Students learn how to build rockets and use equipment used I payload systems like and altimeter and a GPS. We also learned about the importance of safety involved with building and launching rockets.


Using Natural Language Processing To Identify Mental Health Indicators In Aviation Voluntary Safety Reports, Michael Sawyer, Katherine Berry, Amelia Kinsella, R Jordan Hinson, Edward Bynum Feb 2024

Using Natural Language Processing To Identify Mental Health Indicators In Aviation Voluntary Safety Reports, Michael Sawyer, Katherine Berry, Amelia Kinsella, R Jordan Hinson, Edward Bynum

National Training Aircraft Symposium (NTAS)

Voluntary Safety Reporting Programs (VSRPs) are a critical tool in the aviation industry for monitoring safety issues observed by the frontline workforce. While VSRPs primarily focus on operational safety, report narratives often describe factors such as fatigue, workload, culture, staffing, and health, directly or indirectly impacting mental health. These reports can provide individual and organizational insights into aviation personnel's physical and psychological well-being. This poster introduces the AVIation Analytic Neural network for Safety events (AVIAN-S) model as a potential tool to extract and monitor these insights. AVIAN-S is a novel machine-learning model that leverages natural language processing (NLP) to analyze …


Virtual Reality & Pilot Training: Existing Technologies, Challenges & Opportunities, Tim Marron M.S., Niall Dungan Bsc, Captain, Brian Mac Namee Phd, Anna Donnla O'Hagan Phd Jan 2024

Virtual Reality & Pilot Training: Existing Technologies, Challenges & Opportunities, Tim Marron M.S., Niall Dungan Bsc, Captain, Brian Mac Namee Phd, Anna Donnla O'Hagan Phd

Journal of Aviation/Aerospace Education & Research

The introduction of virtual reality (VR) to flying training has recently gained much attention, with numerous VR companies, such as Loft Dynamics and VRpilot, looking to enhance the training process. Such a considerable change to how pilots are trained is a subject that warrants careful consideration. Examining the effect that VR has on learning in other areas gives us an idea of how VR can be suitably applied to flying training. Some of the benefits offered by VR include increased safety, decreased costs, and increased environmental sustainability. Nevertheless, some challenges ahead for developers to consider are negative transfer of learning, …


Railroad Condition Monitoring Using Distributed Acoustic Sensing And Deep Learning Techniques, Md Arifur Rahman Jan 2024

Railroad Condition Monitoring Using Distributed Acoustic Sensing And Deep Learning Techniques, Md Arifur Rahman

Electronic Theses and Dissertations

Proper condition monitoring has been a major issue among railroad administrations since it might cause catastrophic dilemmas that lead to fatalities or damage to the infrastructure. Although various aspects of train safety have been conducted by scholars, in-motion monitoring detection of defect occurrence, cause, and severity is still a big concern. Hence extensive studies are still required to enhance the accuracy of inspection methods for railroad condition monitoring (CM). Distributed acoustic sensing (DAS) has been recognized as a promising method because of its sensing capabilities over long distances and for massive structures. As DAS produces large datasets, algorithms for precise …


The Evolution Of Ai On The Commercial Flight Deck: Finding Balance Between Efficiency And Safety While Maintaining The Integrity Of Operator Trust, Mark Miller, Sam Holley, Leila Halawi Jan 2023

The Evolution Of Ai On The Commercial Flight Deck: Finding Balance Between Efficiency And Safety While Maintaining The Integrity Of Operator Trust, Mark Miller, Sam Holley, Leila Halawi

Publications

As artificial intelligence (AI) seeks to improve modern society, the commercial aviation industry offers a significant opportunity. Although many parts of commercial aviation including maintenance, the ramp, and air traffic control show promise to integrate AI, the highly computerized digital flight deck (DFD) could be challenging. The researchers seek to understand what role AI could provide going forward by assessing AI evolution on the commercial flight deck over the past 50 years. A modified SHELL diagram is used to complete a Human Factors (HF) analysis of the early use for AI on the commercial flight deck through introduction of the …


Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk Jan 2022

Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk

Annual ADFSL Conference on Digital Forensics, Security and Law

The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …


A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang Jan 2022

A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …


Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik Jan 2022

Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …


Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd Jan 2022

Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …


The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan Jan 2022

The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan

Annual ADFSL Conference on Digital Forensics, Security and Law

In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …


Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik Jan 2022

Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …


Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik Jan 2022

Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …


Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd Jan 2022

Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …


A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow Jan 2022

A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …


Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha Jan 2022

Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha

Annual ADFSL Conference on Digital Forensics, Security and Law

The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …


Ga Pilot Perceptions Of Speech Systems To Transcribe And Submit Pireps, Deborah S. Carstens Ph.D., Pmp, Michael S. Harwin, J.D., M.S., Tianhua Li, Ph.D., Brandon J. Pitts, Ph.D., Mel Futrell, M.A., Barrett Caldwell, Ph.D. Jan 2022

Ga Pilot Perceptions Of Speech Systems To Transcribe And Submit Pireps, Deborah S. Carstens Ph.D., Pmp, Michael S. Harwin, J.D., M.S., Tianhua Li, Ph.D., Brandon J. Pitts, Ph.D., Mel Futrell, M.A., Barrett Caldwell, Ph.D.

International Journal of Aviation, Aeronautics, and Aerospace

Flying into hazardous weather can be a cause of aviation incidents and accidents. Accidents involving general aviation (GA) pilots who are not instrument rated who fly into instrument meteorological conditions (IMC) are often fatal. Pilot weather reports (PIREPs) can increase the accuracy and timeliness of current and forecasted weather conditions. They are an essential tool used by pilots to avoid flying into hazardous weather as well as meteorologists to develop and update aviation forecasts. Thus, a large number of accurate PIREPs with the best source of current weather coming from pilots and air traffic controllers are needed. Pilots are often …


Soarnet, Deep Learning Thermal Detection For Free Flight, Jake T. Tallman Jun 2021

Soarnet, Deep Learning Thermal Detection For Free Flight, Jake T. Tallman

Master's Theses

Thermals are regions of rising hot air formed on the ground through the warming of the surface by the sun. Thermals are commonly used by birds and glider pilots to extend flight duration, increase cross-country distance, and conserve energy. This kind of powerless flight using natural sources of lift is called soaring. Once a thermal is encountered, the pilot flies in circles to keep within the thermal, so gaining altitude before flying off to the next thermal and towards the destination. A single thermal can net a pilot thousands of feet of elevation gain, however estimating thermal locations is not …


Human Fatigue Predictions In Complex Aviation Crew Operational Impact Conditions, Suresh Rangan May 2021

Human Fatigue Predictions In Complex Aviation Crew Operational Impact Conditions, Suresh Rangan

Doctoral Dissertations

In this last decade, several regulatory frameworks across the world in all modes of transportation had brought fatigue and its risk management in operations to the forefront. Of all transportation modes air travel has been the safest means of transportation. Still as part of continuous improvement efforts, regulators are insisting the operators to adopt strong fatigue science and its foundational principles to reinforce safety risk assessment and management. Fatigue risk management is a data driven system that finds a realistic balance between safety and productivity in an organization. This work discusses the effects of mathematical modeling of fatigue and its …


The Shape Of Earth And Pressure Altimetry, Nihad E. Daidzic May 2020

The Shape Of Earth And Pressure Altimetry, Nihad E. Daidzic

Aviation Department Publications

FAA Safety Webinar (GL15100313) held online at 8:45 CST on Saturday, May 16, 2020.


Assessing If Motivation Impacts General Aviation Pilots’ Persistence In Varying Weather Conditions, Sabrina Woods Jan 2020

Assessing If Motivation Impacts General Aviation Pilots’ Persistence In Varying Weather Conditions, Sabrina Woods

Doctoral Dissertations and Master's Theses

Continued flight under visual flight rules into instrument meteorological conditions is the predominant cause for fatal accidents by percentage, for general aviation aircraft operations. It is possible that a pilot’s motivation or reason for flying will override other safer, more logical courses of action when a hazard presents itself. The decision appears to stem from a willingness to persist in a course of action despite factors that indicate an alternate and safer course is warranted. This research addresses what is currently presumed about the decision to continue flying under visual flight rules into instrument conditions and marries those ideas with …


A Proposed Taxonomy For General Aviation Pilot Weather Education And Training, John M. Lanicci, Thomas A. Guinn, Jayde M. King, Beth Blickensderfer, Robert Thomas, Yolanda Ortiz Jan 2020

A Proposed Taxonomy For General Aviation Pilot Weather Education And Training, John M. Lanicci, Thomas A. Guinn, Jayde M. King, Beth Blickensderfer, Robert Thomas, Yolanda Ortiz

Journal of Aviation/Aerospace Education & Research

As General Aviation (GA) safety continues to remain a focus of the aviation community, GA pilot weather education and training continues to be an active area of interest within the research community. This study introduces a taxonomy for organizing GA pilot weather education and training materials that was originally conceived as part of the FAA’s Weather Technology In the Cockpit research program. The taxonomy is built upon three main knowledge categories, or tiers:1) Weather Phenomena (which includes hazards); 2) Weather Hazard Products; and 3) Weather Hazard Product Sources and their Application. The concept behind the categorization is to link knowledge …


Editorial: Special Issue: Safety & Efficiency Of Civil Aviation: Selected Papers From The World Conferences Of The Air Transport Research Society And The World Conference On Transport Society - 2013, Paul Hooper, Ian Douglas, Chunyan Yu, Stefano Paleari May 2019

Editorial: Special Issue: Safety & Efficiency Of Civil Aviation: Selected Papers From The World Conferences Of The Air Transport Research Society And The World Conference On Transport Society - 2013, Paul Hooper, Ian Douglas, Chunyan Yu, Stefano Paleari

Chunyan Yu

The Air Transport Research Society (ATRS) is a Special Interest Group (SIG) of the World Conference on Transport Research Society (WCTRS). The ATRS annual World Conference was held at the University of Bergamo, Bergamo, Italy on 26-29 June 2013 and it attracted 266 papers from 37 countries. Also, the WCTRS triennial World Conference was held on 15- 18 July at Rio de Janeiro, Brazil, during which the ATRS organised several sessions devoted to air transport topics. This special issue of the Journal of Air Transport Studies has drawn upon all of this material to present four papers that promote improvements …


Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik May 2019

Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smartphones with Google's Android operating system are becoming more and more popular each year, and with this increased user base, comes increased opportunities to collect more of these users' private data. There have been several instances of malware being made available via the Google Play Store, which is one of the predominant means for users to download applications. One effective way of collecting users' private data is by using Android Spyware. In this paper, we conduct a forensic analysis of a malicious Android spyware application and present our findings. We also highlight what information the application accesses and what it …


Efficacy Of The Localized Aviation Mos Program In Ceiling Flight Category Forecasts, Douglas D. Boyd, Thomas A. Guinn, Thomas A. Guinn Mar 2019

Efficacy Of The Localized Aviation Mos Program In Ceiling Flight Category Forecasts, Douglas D. Boyd, Thomas A. Guinn, Thomas A. Guinn

Publications

(1) Background: Flying in instrument meteorological conditions (IMC) carries an elevated risk of fatal outcome for general aviation (GA) pilots. For the typical GA flight, aerodrome-specific forecasts (Terminal Aerodrome Forecast (TAF), Localized Aviation Model Output Statistics Program (LAMP)) assist the airman in pre-determining whether a flight can be safely undertaken. While LAMP forecasts are more prevalent at GA-frequented aerodromes, the Federal Aviation Administration (FAA) recommends that this tool be used as supplementary to the TAF only. Herein, the predictive accuracy of LAMP for ceiling flight categories of visual flight rules (VFR) and instrument flight rules (IFR) was determined. (2) Methods: …


Urban Flow And Small Unmanned Aerial System Operations In The Built Environment, Kevin A. Adkins Feb 2019

Urban Flow And Small Unmanned Aerial System Operations In The Built Environment, Kevin A. Adkins

Kevin A. Adkins, PhD

The Federal Aviation Administration (FAA) has put forth a set of regulations (Part 107) that govern small unmanned aerial system (sUAS) operations. These regulations restrict unmanned aircraft (UA) from flying over people and their operation to within visual line of sight (VLOS). However, as new applications for unmanned aerial systems (UAS) are discovered, their capabilities improve, and regulations evolve, there is an increasing desire to undertake urban operations, such as urban air mobility, package delivery, infrastructure inspection, and surveillance. This built environment poses new weather hazards that include enhanced wind shear and turbulence. The smaller physical dimensions, lower mass and …


Suas: Cybersecurity Threats, Vulnerabilities, And Exploits, Philip Craiger, Gary Kessler, William Rose Jan 2019

Suas: Cybersecurity Threats, Vulnerabilities, And Exploits, Philip Craiger, Gary Kessler, William Rose

J. Philip Craiger, Ph.D.

The FAA predicts that purchases of hobbyist small unmanned aerial systems (sUAS) will grow from 1.9 million in 2016 to 4.3 million by 2020, and commercial sUAS to increase from 600,000 in 2016 to 2.7 million by 2020. sUAS, often referred to as 'drones,' are comprised of aeronautical hardware, a CPU, RAM, onboard storage, radio frequency communications, sensors, a camera, and a controller used by the pilot-in-command (PIC). Some have argued that a sUAS is essentially a flying computer. As such, sUAS are sometimes susceptible to many of the types of attacks that are often used on PC-based computers attached …


Urban Flow And Small Unmanned Aerial System Operations In The Built Environment, Kevin A. Adkins Jan 2019

Urban Flow And Small Unmanned Aerial System Operations In The Built Environment, Kevin A. Adkins

International Journal of Aviation, Aeronautics, and Aerospace

The Federal Aviation Administration (FAA) has put forth a set of regulations (Part 107) that govern small unmanned aerial system (sUAS) operations. These regulations restrict unmanned aircraft (UA) from flying over people and their operation to within visual line of sight (VLOS). However, as new applications for unmanned aerial systems (UAS) are discovered, their capabilities improve, and regulations evolve, there is an increasing desire to undertake urban operations, such as urban air mobility, package delivery, infrastructure inspection, and surveillance. This built environment poses new weather hazards that include enhanced wind shear and turbulence. The smaller physical dimensions, lower mass and …


Quantitative Jeopardy Feud, Jonathan M. Gallimore Aug 2018

Quantitative Jeopardy Feud, Jonathan M. Gallimore

MSF 600 PR - Gallimore - Fall 2018

This activity - Quantitative Jeopardy Feud - is a method for using a game as a final exam.


Suas: Cybersecurity Threats, Vulnerabilities, And Exploits, Philip Craiger, Gary Kessler, William Rose Aug 2018

Suas: Cybersecurity Threats, Vulnerabilities, And Exploits, Philip Craiger, Gary Kessler, William Rose

National Training Aircraft Symposium (NTAS)

The FAA predicts that purchases of hobbyist small unmanned aerial systems (sUAS) will grow from 1.9 million in 2016 to 4.3 million by 2020, and commercial sUAS to increase from 600,000 in 2016 to 2.7 million by 2020. sUAS, often referred to as 'drones,' are comprised of aeronautical hardware, a CPU, RAM, onboard storage, radio frequency communications, sensors, a camera, and a controller used by the pilot-in-command (PIC). Some have argued that a sUAS is essentially a flying computer. As such, sUAS are sometimes susceptible to many of the types of attacks that are often used on PC-based computers attached …


High Dynamic Range Optical Devices And Applications., Elijah Robert Jensen Aug 2018

High Dynamic Range Optical Devices And Applications., Elijah Robert Jensen

Electronic Theses and Dissertations

Much of what we know about fundamental physical law and the universe derives from observations and measurements using optical methods. The passive use of the electromagnetic spectrum can be the best way of studying physical phenomenon in general with minimal disturbance of the system in the process. While for many applications ambient visible light is sufficient, light outside of the visible range may convey more information. The signals of interest are also often a small fraction of the background, and their changes occur on time scales so quickly that they are visually imperceptible. This thesis reports techniques and technologies developed …