Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Embry-Riddle Aeronautical University

Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 849

Full-Text Articles in Physical Sciences and Mathematics

Using Natural Language Processing To Identify Mental Health Indicators In Aviation Voluntary Safety Reports, Michael Sawyer, Katherine Berry, Amelia Kinsella, R Jordan Hinson, Edward Bynum Feb 2024

Using Natural Language Processing To Identify Mental Health Indicators In Aviation Voluntary Safety Reports, Michael Sawyer, Katherine Berry, Amelia Kinsella, R Jordan Hinson, Edward Bynum

National Training Aircraft Symposium (NTAS)

Voluntary Safety Reporting Programs (VSRPs) are a critical tool in the aviation industry for monitoring safety issues observed by the frontline workforce. While VSRPs primarily focus on operational safety, report narratives often describe factors such as fatigue, workload, culture, staffing, and health, directly or indirectly impacting mental health. These reports can provide individual and organizational insights into aviation personnel's physical and psychological well-being. This poster introduces the AVIation Analytic Neural network for Safety events (AVIAN-S) model as a potential tool to extract and monitor these insights. AVIAN-S is a novel machine-learning model that leverages natural language processing (NLP) to analyze …


Virtual Reality & Pilot Training: Existing Technologies, Challenges & Opportunities, Tim Marron M.S., Niall Dungan Bsc, Captain, Brian Mac Namee Phd, Anna Donnla O'Hagan Phd Jan 2024

Virtual Reality & Pilot Training: Existing Technologies, Challenges & Opportunities, Tim Marron M.S., Niall Dungan Bsc, Captain, Brian Mac Namee Phd, Anna Donnla O'Hagan Phd

Journal of Aviation/Aerospace Education & Research

The introduction of virtual reality (VR) to flying training has recently gained much attention, with numerous VR companies, such as Loft Dynamics and VRpilot, looking to enhance the training process. Such a considerable change to how pilots are trained is a subject that warrants careful consideration. Examining the effect that VR has on learning in other areas gives us an idea of how VR can be suitably applied to flying training. Some of the benefits offered by VR include increased safety, decreased costs, and increased environmental sustainability. Nevertheless, some challenges ahead for developers to consider are negative transfer of learning, …


Spoken Language Processing And Modeling For Aviation Communications, Aaron Van De Brook Oct 2023

Spoken Language Processing And Modeling For Aviation Communications, Aaron Van De Brook

Doctoral Dissertations and Master's Theses

With recent advances in machine learning and deep learning technologies and the creation of larger aviation-specific corpora, applying natural language processing technologies, especially those based on transformer neural networks, to aviation communications is becoming increasingly feasible. Previous work has focused on machine learning applications to natural language processing, such as N-grams and word lattices. This thesis experiments with a process for pretraining transformer-based language models on aviation English corpora and compare the effectiveness and performance of language models transfer learned from pretrained checkpoints and those trained from their base weight initializations (trained from scratch). The results suggest that transformer language …


Online Aircraft System Identification Using A Novel Parameter Informed Reinforcement Learning Method, Nathan Schaff Oct 2023

Online Aircraft System Identification Using A Novel Parameter Informed Reinforcement Learning Method, Nathan Schaff

Doctoral Dissertations and Master's Theses

This thesis presents the development and analysis of a novel method for training reinforcement learning neural networks for online aircraft system identification of multiple similar linear systems, such as all fixed wing aircraft. This approach, termed Parameter Informed Reinforcement Learning (PIRL), dictates that reinforcement learning neural networks should be trained using input and output trajectory/history data as is convention; however, the PIRL method also includes any known and relevant aircraft parameters, such as airspeed, altitude, center of gravity location and/or others. Through this, the PIRL Agent is better suited to identify novel/test-set aircraft.

First, the PIRL method is applied to …


A System For The Detection Of Adversarial Attacks In Computer Vision Via Performance Metrics, Sarah Reynolds Oct 2023

A System For The Detection Of Adversarial Attacks In Computer Vision Via Performance Metrics, Sarah Reynolds

Doctoral Dissertations and Master's Theses

Adversarial attacks, or attacks committed by an adversary to hijack a system, are prevalent in the deep learning tasks of computer vision and are one of the greatest threats to these models' safe and accurate use. These attacks force the trained model to misclassify an image, using pixel-level changes undetectable to the human eye. Various defenses against these attacks exist and are detailed in this work. The work of previous researchers has established that when adversarial attacks occur, different node patterns in a Deep Neural Network (DNN) are activated within the model. Additionally, it is known that CPU and GPU …


An Ml Based Digital Forensics Software For Triage Analysis Through Face Recognition, Gaurav Gogia, Parag H. Rughani Jul 2023

An Ml Based Digital Forensics Software For Triage Analysis Through Face Recognition, Gaurav Gogia, Parag H. Rughani

Journal of Digital Forensics, Security and Law

Since the past few years, the complexity and heterogeneity of digital crimes has increased exponentially, which has made the digital evidence & digital forensics paramount for both criminal investigation and civil litigation cases. Some of the routine digital forensic analysis tasks are cumbersome and can increase the number of pending cases especially when there is a shortage of domain experts. While the work is not very complex, the sheer scale can be taxing. With the current scenarios and future predictions, crimes are only going to become more complex and the precedent of collecting and examining digital evidence is only going …


Defining Safe Training Datasets For Machine Learning Models Using Ontologies, Lynn C. Vonder Haar Apr 2023

Defining Safe Training Datasets For Machine Learning Models Using Ontologies, Lynn C. Vonder Haar

Doctoral Dissertations and Master's Theses

Machine Learning (ML) models have been gaining popularity in recent years in a wide variety of domains, including safety-critical domains. While ML models have shown high accuracy in their predictions, they are still considered black boxes, meaning that developers and users do not know how the models make their decisions. While this is simply a nuisance in some domains, in safetycritical domains, this makes ML models difficult to trust. To fully utilize ML models in safetycritical domains, there needs to be a method to improve trust in their safety and accuracy without human experts checking each decision. This research proposes …


Stellar Atmosphere Models For Select Veritas Stellar Intensity Interferometry Targets, Jackson Ladd Sackrider, Jason P. Aufdenberg, Katelyn Sonnen Mar 2023

Stellar Atmosphere Models For Select Veritas Stellar Intensity Interferometry Targets, Jackson Ladd Sackrider, Jason P. Aufdenberg, Katelyn Sonnen

Beyond: Undergraduate Research Journal

Since 2020 the Very Energetic Radiation Imaging Telescope Array System (VERITAS) has observed 48 stellar targets using the technique of Stellar Intensity Interferometry (SII). Angular diameter measurements by VERITAS SII (VSII) in a waveband near 400 nm complement existing angular diameter measurements in the near-infrared. VSII observations will test fundamental predictions of stellar atmosphere models and should be more sensitive to limb darkening and gravity darkening effects than measurements in the near-IR, however, the magnitude of this difference has not been systematically explored in the literature. In order to investigate the synthetic interferometric (as well as spectroscopic) appearance of stars …


Workforce Of The Future Begins With Aviation Stem, Lyndsay Digneo Jan 2023

Workforce Of The Future Begins With Aviation Stem, Lyndsay Digneo

National Training Aircraft Symposium (NTAS)

The United States has always been a world leader in aviation. This leadership position relies on the strength of the American STEM workforce and the quality of the nation’s educational, industrial, and government institutions. Therefore, it is imperative to nurture today’s students to become a well-trained STEM workforce in the future.

The Federal Aviation Administration (FAA) William J. Hughes Technical Center (WJHTC) recognizes that in pursuing its mission of aviation research, engineering, development, and test and evaluation, it is in a unique position to support aviation STEM activities for schools (K-12), post-secondary institutions, and community organizations. In 2016, the Technical …


A Bidirectional Deep Lstm Machine Learning Method For Flight Delay Modelling And Analysis, Desmond B. Bisandu, Irene Moulitsas Jan 2023

A Bidirectional Deep Lstm Machine Learning Method For Flight Delay Modelling And Analysis, Desmond B. Bisandu, Irene Moulitsas

National Training Aircraft Symposium (NTAS)

Flight delays can be prevented by providing a reference point from an accurate prediction model because predicting flight delays is a problem with a specific space. Only a few algorithms consider predicted classes' mutual correlation during flight delay classification or prediction modelling tasks. None of these existing methods works for all scenarios. Therefore, the need to investigate the performance of more models in solving the problem of flight delay is vast and rapidly increasing. This paper presents the development and evaluation of LSTM and BiLSTM models by comparing them for a flight delay prediction. The LSTM does the feature extraction …


Integrated Organizational Machine Learning For Aviation Flight Data, Michael J. Pritchard, Paul Thomas, Eric Webb, Jon Martin, Austin Walden Jan 2023

Integrated Organizational Machine Learning For Aviation Flight Data, Michael J. Pritchard, Paul Thomas, Eric Webb, Jon Martin, Austin Walden

National Training Aircraft Symposium (NTAS)

An increased availability of data and computing power has allowed organizations to apply machine learning techniques to various fleet monitoring activities. Additionally, our ability to acquire aircraft data has increased due to the miniaturization of small form factor computing machines. Aircraft data collection processes contain many data features in the form of multivariate time-series (continuous, discrete, categorical, etc.) which can be used to train machine learning models. Yet, three major challenges still face many flight organizations 1) integration and automation of data collection frameworks, 2) data cleanup and preparation, and 3) embedded machine learning framework. Data cleanup and preparation has …


The Evolution Of Ai On The Commercial Flight Deck: Finding Balance Between Efficiency And Safety While Maintaining The Integrity Of Operator Trust, Mark Miller, Sam Holley, Leila Halawi Jan 2023

The Evolution Of Ai On The Commercial Flight Deck: Finding Balance Between Efficiency And Safety While Maintaining The Integrity Of Operator Trust, Mark Miller, Sam Holley, Leila Halawi

Publications

As artificial intelligence (AI) seeks to improve modern society, the commercial aviation industry offers a significant opportunity. Although many parts of commercial aviation including maintenance, the ramp, and air traffic control show promise to integrate AI, the highly computerized digital flight deck (DFD) could be challenging. The researchers seek to understand what role AI could provide going forward by assessing AI evolution on the commercial flight deck over the past 50 years. A modified SHELL diagram is used to complete a Human Factors (HF) analysis of the early use for AI on the commercial flight deck through introduction of the …


Directional Speaker Poster, Eugene Ng, Bryan Wong, Ruhaan Das Jan 2023

Directional Speaker Poster, Eugene Ng, Bryan Wong, Ruhaan Das

Student Works

Changi Airport is set to expand with a new terminal, Terminal 5. Currently, many of the airport's processes are manual, requiring a high dependence on staff. This proposal aims to incorporate automation and AI for a smoother passenger experience.


A Deep Bilstm Machine Learning Method For Flight Delay Prediction Classification, Desmond B. Bisandu Phd, Irene Moulitsas Phd Jan 2023

A Deep Bilstm Machine Learning Method For Flight Delay Prediction Classification, Desmond B. Bisandu Phd, Irene Moulitsas Phd

Journal of Aviation/Aerospace Education & Research

This paper proposes a classification approach for flight delays using Bidirectional Long Short-Term Memory (BiLSTM) and Long Short-Term Memory (LSTM) models. Flight delays are a major issue in the airline industry, causing inconvenience to passengers and financial losses to airlines. The BiLSTM and LSTM models, powerful deep learning techniques, have shown promising results in a classification task. In this study, we collected a dataset from the United States (US) Bureau of Transportation Statistics (BTS) of flight on-time performance information and used it to train and test the BiLSTM and LSTM models. We set three criteria for selecting highly important features …


An Evaluation Framework For Digital Image Forensics Tools, Zainab Khalid, Sana Qadir Oct 2022

An Evaluation Framework For Digital Image Forensics Tools, Zainab Khalid, Sana Qadir

Journal of Digital Forensics, Security and Law

The boom of digital cameras, photography, and social media has drastically changed how humans live their day-to-day, but this normalization is accompanied by malicious agents finding new ways to forge and tamper with images for unlawful monetary (or other) gains. Disinformation in the photographic media realm is an urgent threat. The availability of a myriad of image editing tools renders it almost impossible to differentiate between photo-realistic and original images. The tools available for image forensics require a standard framework against which they can be evaluated. Such a standard framework can aid in evaluating the suitability of an image forensics …


A Study Of The Data Remaining On Second-Hand Mobile Devices In The Uk, Olga Angelopoulou, Andy Jones, Graeme Horsman, Seyedali Pourmoafi Oct 2022

A Study Of The Data Remaining On Second-Hand Mobile Devices In The Uk, Olga Angelopoulou, Andy Jones, Graeme Horsman, Seyedali Pourmoafi

Journal of Digital Forensics, Security and Law

This study was carried out intending to identify the level and type of information that remained on portable devices that were purchased from the second-hand market in the UK over the last few years. The sample for this study consisted of 100 second hand mobile phones and tablets. The aim of the study was to determine the proportion of devices that still contained data and the type of data that they contained. Where data was identified, the study attempted to determine the level of personal identifiable information that is associated with the previous owner. The research showed that when sensitive …


Machine Learning To Predict Warhead Fragmentation In-Flight Behavior From Static Data, Katharine Larsen Oct 2022

Machine Learning To Predict Warhead Fragmentation In-Flight Behavior From Static Data, Katharine Larsen

Doctoral Dissertations and Master's Theses

Accurate characterization of fragment fly-out properties from high-speed warhead detonations is essential for estimation of collateral damage and lethality for a given weapon. Real warhead dynamic detonation tests are rare, costly, and often unrealizable with current technology, leaving fragmentation experiments limited to static arena tests and numerical simulations. Stereoscopic imaging techniques can now provide static arena tests with time-dependent tracks of individual fragments, each with characteristics such as fragment IDs and their respective position vector. Simulation methods can account for the dynamic case but can exclude relevant dynamics experienced in real-life warhead detonations. This research leverages machine learning methodologies to …


Supporting The Discovery, Reuse, And Validation Of Cybersecurity Requirements At The Early Stages Of The Software Development Lifecycle, Jessica Antonia Steinmann Oct 2022

Supporting The Discovery, Reuse, And Validation Of Cybersecurity Requirements At The Early Stages Of The Software Development Lifecycle, Jessica Antonia Steinmann

Doctoral Dissertations and Master's Theses

The focus of this research is to develop an approach that enhances the elicitation and specification of reusable cybersecurity requirements. Cybersecurity has become a global concern as cyber-attacks are projected to cost damages totaling more than $10.5 trillion dollars by 2025. Cybersecurity requirements are more challenging to elicit than other requirements because they are nonfunctional requirements that requires cybersecurity expertise and knowledge of the proposed system. The goal of this research is to generate cybersecurity requirements based on knowledge acquired from requirements elicitation and analysis activities, to provide cybersecurity specifications without requiring the specialized knowledge of a cybersecurity expert, and …


Evaluating The Variable Stride Algorithm In The Identification Of Diabetic Retinopathy, Ying Zheng, Brian Danaher, Matthew Brown Aug 2022

Evaluating The Variable Stride Algorithm In The Identification Of Diabetic Retinopathy, Ying Zheng, Brian Danaher, Matthew Brown

Beyond: Undergraduate Research Journal

An experiment was performed to investigate a modified pooling method for use in convolutional neural networks for image recognition. This algorithm–Variable Stride–allows the user to segment an image and change the amount of subsampling in each region. This control allows for the user to maintain a higher amount of data retention in more important regions of the image, while more aggressively subsampling the less important regions to increase training speed. Three Variable Stride methods were compared to the preexisting pooling algorithms, Maximum Pool and Average Pool, in three different network configurations tasked with classifying Diabetic Retinopathy images between its early …


Computational Models To Detect Radiation In Urban Environments: An Application Of Signal Processing Techniques And Neural Networks To Radiation Data Analysis, Jose Nicolas Gachancipa Jul 2022

Computational Models To Detect Radiation In Urban Environments: An Application Of Signal Processing Techniques And Neural Networks To Radiation Data Analysis, Jose Nicolas Gachancipa

Beyond: Undergraduate Research Journal

Radioactive sources, such as uranium-235, are nuclides that emit ionizing radiation, and which can be used to build nuclear weapons. In public areas, the presence of a radioactive nuclide can present a risk to the population, and therefore, it is imperative that threats are identified by radiological search and response teams in a timely and effective manner. In urban environments, such as densely populated cities, radioactive sources may be more difficult to detect, since background radiation produced by surrounding objects and structures (e.g., buildings, cars) can hinder the effective detection of unnatural radioactive material. This article presents a computational model …


A Nature-Inspired Approach For Scenario-Based Validation Of Autonomous Systems, Quentin Goss, Mustafa Akbas Jul 2022

A Nature-Inspired Approach For Scenario-Based Validation Of Autonomous Systems, Quentin Goss, Mustafa Akbas

Beyond: Undergraduate Research Journal

Scenario-based approaches are cost and time effective solutions to autonomous cyber-physical system testing to identify bugs before costly methods such as physical testing in a controlled or uncontrolled environment. Every bug in an autonomous cyber-physical system is a potential safety risk. This paper presents a scenario-based method for finding bugs and estimating boundaries of the bug profile. The method utilizes a nature-inspired approach adapting low discrepancy sampling with local search. Extensive simulations demonstrate the performance of the approach with various adaptations.


Assessment Of 3d Mesh Watermarking Techniques, Neha Sharma, Jeebananda Panda Jul 2022

Assessment Of 3d Mesh Watermarking Techniques, Neha Sharma, Jeebananda Panda

Journal of Digital Forensics, Security and Law

With the increasing usage of three-dimensional meshes in Computer-Aided Design (CAD), medical imaging, and entertainment fields like virtual reality, etc., the authentication problems and awareness of intellectual property protection have risen since the last decade. Numerous watermarking schemes have been suggested to protect ownership and prevent the threat of data piracy. This paper begins with the potential difficulties that arose when dealing with three-dimension entities in comparison to two-dimensional entities and also lists possible algorithms suggested hitherto and their comprehensive analysis. Attacks, also play a crucial role in deciding a watermarking algorithm so an attack based analysis is also presented …


To License Or Not To License Reexamined: An Updated Report On Licensing Of Digital Examiners Under State Private Investigator Statutes, Thomas Lonardo, Alan Rea, Doug White Jul 2022

To License Or Not To License Reexamined: An Updated Report On Licensing Of Digital Examiners Under State Private Investigator Statutes, Thomas Lonardo, Alan Rea, Doug White

Journal of Digital Forensics, Security and Law

In this update to the 2015 study, the authors examine US state statutes and regulations relating to licensing and enforcement of Digital Examiner functions under each state’s private investigator/detective statute. As with the prior studies, the authors find that very few state statutes explicitly distinguish between Private Investigators (PI) and Digital Examiners (DE), and when they do, they either explicitly require a license or exempt them from the licensing statute. As noted in the previous 2015 study there is a minor trend in which some states are moving to exempt DE from PI licensing requirements. We examine this trend as …


A Meshless Approach To Computational Pharmacokinetics, Anthony Matthew Khoury Apr 2022

A Meshless Approach To Computational Pharmacokinetics, Anthony Matthew Khoury

Doctoral Dissertations and Master's Theses

The meshless method is an incredibly powerful technique for solving a variety of problems with unparalleled accuracy and efficiency. The pharmacokinetic problem of transdermal drug delivery (TDDD) is one such topic and is of significant complexity. The locally collocated meshless method (LCMM) is developed in solution to this topic. First, the meshless method is formulated to model this transport phenomenon and is then validated against an analytical solution of a pharmacokinetic problem set, to demonstrate this accuracy and efficiency. The analytical solution provides a locus by which convergence behavior are evaluated, demonstrating the super convergence of the locally collocated meshless …


Proposed L-Shape Pattern On Ufs Acm For Risk Analysis, Abhishek Asthana, Padma Lochan Pradhan Dr Mar 2022

Proposed L-Shape Pattern On Ufs Acm For Risk Analysis, Abhishek Asthana, Padma Lochan Pradhan Dr

Journal of Digital Forensics, Security and Law

At this cloud age, there is tremendous growth in business, services, resources, and cloud technology. This growth comes with a risk of unsafe, unordered, and uncertainty due to unauthorized access and theft of confidential propriety data. Our objective is to model around Read, Write and Execute to resolve these unordered, unsafe, and uncertain issues. We will develop a L-Shape pattern model matching UFS ACM to minimize the accessibilities based on RIGHT & ROLE of the resources and maximize the quality of services for safety and high availability. The preventive, detective, corrective (PDC) services are the major roles for all levels …


A Combined Approach For Private Indexing Mechanism, Pranita Maruti Desai Ms., Vijay Maruti Shelake Mr. Mar 2022

A Combined Approach For Private Indexing Mechanism, Pranita Maruti Desai Ms., Vijay Maruti Shelake Mr.

Journal of Digital Forensics, Security and Law

Private indexing is a set of approaches for analyzing research data that are similar or resemble similar ones. This is used in the database to keep track of the keys and their values. The main subject of this research is private indexing in record linkage to secure the data. Because unique personal identification numbers or social security numbers are not accessible in most countries or databases, data linkage is limited to attributes such as date of birth and names to distinguish between the number of records and the real-life entities they represent. For security reasons, the encryption of these identifiers …


A Critical Comparison Of Brave Browser And Google Chrome Forensic Artefacts, Stuart Berham, Sarah Morris Mar 2022

A Critical Comparison Of Brave Browser And Google Chrome Forensic Artefacts, Stuart Berham, Sarah Morris

Journal of Digital Forensics, Security and Law

Digital forensic practitioners are tasked with the identification, recovery and analysis of Internet browser artefacts which may have been used in the pursuit of committing a civil or criminal offence. This research paper critically compares the most downloaded browser, Google Chrome, against an increasingly popular Chromium browser known as Brave, said to offer privacy-by-default. With increasing forensic caseloads, data complexity, and requirements for method validation to satisfy ISO 17025 accreditation, recognising the similarities and differences between the browsers, developed on the same underlying technology is essential. The paper describes a series of conducted experiments and subsequent analysis to identify artefacts …


The Data Analytics And The Science Revolution, Leila Halawi, Amal Clarke, Kelly George Feb 2022

The Data Analytics And The Science Revolution, Leila Halawi, Amal Clarke, Kelly George

Publications

This text highlights the difference between analytics and data science, using predictive analytic techniques to analyze different historical data, including aviation data and concrete data, interpreting the predictive models, and highlighting the steps to deploy the models and the steps ahead. The book combines the conceptual perspective and a hands-on approach to predictive analytics using SAS VIYA, an analytic and data management platform. The authors use SAS VIYA to focus on analytics to solve problems, highlight how analytics is applied in the airline and business environment, and compare several different modeling techniques. They decipher complex algorithms to demonstrate how they …


Digital Evidence In Appeals Of Criminal Cases Before The U.S. Courts Of Appeal: A Review Of Decisions And Examination Of The Legal Landscape From 2016 – 2020, Martin Novak Jan 2022

Digital Evidence In Appeals Of Criminal Cases Before The U.S. Courts Of Appeal: A Review Of Decisions And Examination Of The Legal Landscape From 2016 – 2020, Martin Novak

Journal of Digital Forensics, Security and Law

This study is a follow-up to Digital Evidence in Criminal Cases before the U.S. Courts of Appeal: Trends and Issues for Consideration – 2010 to 2015. The current study examines appeals of criminal cases before the United States Courts of Appeal from January 2016 through August 2020, where one or more appeal claims were related to digital evidence. The purpose of this research was to determine if the legal landscape has changed since 2015; examine the most relevant legal issues related to digital evidence; and analyze how precedential cases may have affected digital forensics as evidence.


Technical Behaviours Of Child Sexual Exploitation Material Offenders, Chad Steel, Emily Newman, Suzanne O'Rourke, Ethel Quayle Jan 2022

Technical Behaviours Of Child Sexual Exploitation Material Offenders, Chad Steel, Emily Newman, Suzanne O'Rourke, Ethel Quayle

Journal of Digital Forensics, Security and Law

An exploration of the technological behaviours of previously convicted child sexual exploitation material (CSEM) offenders provides a foundation for future applied research into deterrence, investigation, and treatment efforts. This study evaluates the technology choices and transitions of individuals previously convicted of CSEM offenses. Based on their inclusion in two sex offender registries, anonymous survey results (n=78) were collected from English-speaking adults within the United States. CSEM offenders chose technologies based on both utility and perceived risk; peer-to-peer and web-browsers were the most common gateway technologies and showed substantial sustained usage; a substantial minority of users never stored CSEM and only …