Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Physical Sciences and Mathematics

Low Cost Magnetometer Calibration And Distributed Simultaneous Multipoint Ionospheric Measurements From A Sounding Rocket Platform, Joshua W. Milford Apr 2024

Low Cost Magnetometer Calibration And Distributed Simultaneous Multipoint Ionospheric Measurements From A Sounding Rocket Platform, Joshua W. Milford

Doctoral Dissertations and Master's Theses

Low-cost and low-size-weight-and-power (SWaP) magnetometers can provide greater accessibility for distributed simultaneous measurements in the ionosphere, either onboard sounding rockets or on CubeSats. The Space and Atmospheric Instrumentation Laboratory (SAIL) at Embry-Riddle Aeronautical University has launched a multitude of sounding rockets in recent history: one night-time mid-latitude rocket from Wallops Flight Facility in August 2022 and three mid-latitude rockets from White Sands Missile Range during the October 2023 annular solar eclipse. All rockets had a comprehensive suite of instruments for electrodynamics and neutral dynamics measurements. Among this suite was one science-grade three-axis fluxgate magnetometer (Billingsley TFM65VQS / TFM100G2) and up …


Spoken Language Processing And Modeling For Aviation Communications, Aaron Van De Brook Oct 2023

Spoken Language Processing And Modeling For Aviation Communications, Aaron Van De Brook

Doctoral Dissertations and Master's Theses

With recent advances in machine learning and deep learning technologies and the creation of larger aviation-specific corpora, applying natural language processing technologies, especially those based on transformer neural networks, to aviation communications is becoming increasingly feasible. Previous work has focused on machine learning applications to natural language processing, such as N-grams and word lattices. This thesis experiments with a process for pretraining transformer-based language models on aviation English corpora and compare the effectiveness and performance of language models transfer learned from pretrained checkpoints and those trained from their base weight initializations (trained from scratch). The results suggest that transformer language …


Thruster Communication For Subsurface Environments; Turning Waste Noise Into Useful Data, Stephen Cronin May 2021

Thruster Communication For Subsurface Environments; Turning Waste Noise Into Useful Data, Stephen Cronin

Doctoral Dissertations and Master's Theses

Acoustic communication serves as one of the primary means of wirelessly communicating underwater. Whereas much of the developments in the field of wireless communication have focused on radio frequency technology, water highly absorbs radio waves rendering the link not feasible for most all subsurface operations. While acoustic links have enabled new capabilities for systems operating in this challenging environment, it has yet to reach the commodity availability of radio systems, meaning that an entire class of small, low-cost systems have been unable to make use of these links. The systems in question are primarily autonomous underwater vehicles (AUVs), as they …


A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami May 2021

A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami

Doctoral Dissertations and Master's Theses

Social engineering attacks (SE-attacks) in enterprises are hastily growing and are becoming increasingly sophisticated. Generally, SE-attacks involve the psychological manipulation of employees into revealing confidential and valuable company data to cybercriminals. The ramifications could bring devastating financial and irreparable reputation loss to the companies. Because SE-attacks involve a human element, preventing these attacks can be tricky and challenging and has become a topic of interest for many researchers and security experts. While methods exist for detecting SE-attacks, our literature review of existing methods identified many crucial factors such as the national cultural, organizational, and personality traits of employees that enable …