Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 20 of 20

Full-Text Articles in Physical Sciences and Mathematics

Robotic Olfactory-Based Navigation With Mobile Robots, Lingxiao Wang Dec 2021

Robotic Olfactory-Based Navigation With Mobile Robots, Lingxiao Wang

Doctoral Dissertations and Master's Theses

Robotic odor source localization (OSL) is a technology that enables mobile robots or autonomous vehicles to find an odor source in unknown environments. It has been viewed as challenging due to the turbulent nature of airflows and the resulting odor plume characteristics. The key to correctly finding an odor source is designing an effective olfactory-based navigation algorithm, which guides the robot to detect emitted odor plumes as cues in finding the source. This dissertation proposes three kinds of olfactory-based navigation methods to improve search efficiency while maintaining a low computational cost, incorporating different machine learning and artificial intelligence methods.

A. …


Reduced-Order Dynamic Modeling And Robust Nonlinear Control Of Fluid Flow Velocity Fields, Anu Kossery Jayaprakash, William Mackunis, Vladimir Golubev, Oksana Stalnov Dec 2021

Reduced-Order Dynamic Modeling And Robust Nonlinear Control Of Fluid Flow Velocity Fields, Anu Kossery Jayaprakash, William Mackunis, Vladimir Golubev, Oksana Stalnov

Publications

A robust nonlinear control method is developed for fluid flow velocity tracking, which formally addresses the inherent challenges in practical implementation of closed-loop active flow control systems. A key challenge being addressed here is flow control design to compensate for model parameter variations that can arise from actuator perturbations. The control design is based on a detailed reduced-order model of the actuated flow dynamics, which is rigorously derived to incorporate the inherent time-varying uncertainty in the both the model parameters and the actuator dynamics. To the best of the authors’ knowledge, this is the first robust nonlinear closed-loop active flow …


Comprehensive Report On Extraterrestrial Resource Extraction, Robinson Raphael Dec 2021

Comprehensive Report On Extraterrestrial Resource Extraction, Robinson Raphael

Student Works

The prospect of asteroid mining provides a plethora of riches that include metals and water. As the number of discovered asteroids continues to grow, opportunities arise to commercialize these resources within Near-Earth Asteroids (NEAs). With urgent applications on Earth and in space, NEAs allow for a surge in sales. Planning forward, Astroider Aerospace Systems follows a mission split into four phases. Phase 1 develops a series of spacecraft using existing technologies, titled as Near-Earth Asteroid Miners and Near-Earth Asteroid Surveyors. Phase 2 first launches the surveyors to candidate NEAs, prospecting them for ores. To identify potential celestial bodies for this …


Don't Bite The Bait: Phishing Attack For Internet Banking (E-Banking), Ilker Kara Nov 2021

Don't Bite The Bait: Phishing Attack For Internet Banking (E-Banking), Ilker Kara

Journal of Digital Forensics, Security and Law

Phishing attacks are based on obtaining desired information from users quickly and easily with the help of misdirecting, panicking, curiosity, or excitement. Most of the phishing web sites are designed on internet banking(e-banking) and the attackers can acquire financial information of misled users with the tactics and discourses they develop. Despite the increase of prevention techniques against phishing attacks day by day, an effective solution could not be found for this issue due to the human factor. Because of this reason, real phishing attack studies are essential to study and analyze the attackers’ attack techniques and strategies. This study focused …


Aessa Young Professionals Forum Webinar “Technologies And Skills That Will Gearup The Aerospace Industry Post Pandemic” - A Global Perspective With An Emphasis On South Africa October 2021, Linda Vee Weiland Oct 2021

Aessa Young Professionals Forum Webinar “Technologies And Skills That Will Gearup The Aerospace Industry Post Pandemic” - A Global Perspective With An Emphasis On South Africa October 2021, Linda Vee Weiland

Publications

A webinar presentation for AeSSA Young Professionals.


An Economical Method For Securely Disintegrating Solid-State Drives Using Blenders, Brandon J. Hopkins Phd, Kevin A. Riggle Jul 2021

An Economical Method For Securely Disintegrating Solid-State Drives Using Blenders, Brandon J. Hopkins Phd, Kevin A. Riggle

Journal of Digital Forensics, Security and Law

Pulverizing solid-state drives (SSDs) down to particles no larger than 2 mm is required by the United States National Security Agency (NSA) to ensure the highest level of data security, but commercial disintegrators that achieve this standard are large, heavy, costly, and often difficult to access globally. Here, we present a portable, inexpensive, and accessible method of pulverizing SSDs using a household blender and other readily available materials. We verify this approach by pulverizing SSDs with a variety of household blenders for fixed periods of time and sieve the resulting powder to ensure appropriate particle size. Among the 6 household …


Windows Kernel Hijacking Is Not An Option: Memoryranger Comes To The Rescue Again, Igor Korkin Jun 2021

Windows Kernel Hijacking Is Not An Option: Memoryranger Comes To The Rescue Again, Igor Korkin

Journal of Digital Forensics, Security and Law

The security of a computer system depends on OS kernel protection. It is crucial to reveal and inspect new attacks on kernel data, as these are used by hackers. The purpose of this paper is to continue research into attacks on dynamically allocated data in the Windows OS kernel and demonstrate the capacity of MemoryRanger to prevent these attacks. This paper discusses three new hijacking attacks on kernel data, which are based on bypassing OS security mechanisms. The first two hijacking attacks result in illegal access to files open in exclusive access. The third attack escalates process privileges, without applying …


Adaptive-Optimal Control Of Spacecraft Near Asteroids, Madhur Tiwari Jun 2021

Adaptive-Optimal Control Of Spacecraft Near Asteroids, Madhur Tiwari

Doctoral Dissertations and Master's Theses

Spacecraft dynamics and control in the vicinity of an asteroid is a challenging and exciting problem. Currently, trajectory tracking near asteroid requires extensive knowledge about the asteroid and constant human intervention to successfully plan and execute proximity operation. This work aims to reduce human dependency of these missions from a guidance and controls perspective. In this work, adaptive control and model predictive control are implemented to generating and tracking obstacle avoidance trajectories in asteroid’s vicinity.

Specifically, direct adaptive control derived from simple adaptive control is designed with e modification to track user-generated trajectories in the presence of unknown system and …


Applying Human Factors Heuristic Evaluation Tools To Improve Aviation Weather Displays: A Mismatch, John Kleber, Paige Lawton, Beth Blickensderfer May 2021

Applying Human Factors Heuristic Evaluation Tools To Improve Aviation Weather Displays: A Mismatch, John Kleber, Paige Lawton, Beth Blickensderfer

General Aviation Weather Display Interpretation

The evaluation of current Heuristic Evaluation Tools for use in assessing Aviation Weather Displays.


Thruster Communication For Subsurface Environments; Turning Waste Noise Into Useful Data, Stephen Cronin May 2021

Thruster Communication For Subsurface Environments; Turning Waste Noise Into Useful Data, Stephen Cronin

Doctoral Dissertations and Master's Theses

Acoustic communication serves as one of the primary means of wirelessly communicating underwater. Whereas much of the developments in the field of wireless communication have focused on radio frequency technology, water highly absorbs radio waves rendering the link not feasible for most all subsurface operations. While acoustic links have enabled new capabilities for systems operating in this challenging environment, it has yet to reach the commodity availability of radio systems, meaning that an entire class of small, low-cost systems have been unable to make use of these links. The systems in question are primarily autonomous underwater vehicles (AUVs), as they …


Dynamic Task Allocation In Partially Defined Environments Using A* With Bounded Costs, James Hendrickson May 2021

Dynamic Task Allocation In Partially Defined Environments Using A* With Bounded Costs, James Hendrickson

Doctoral Dissertations and Master's Theses

The sector of maritime robotics has seen a boom in operations in areas such as surveying and mapping, clean-up, inspections, search and rescue, law enforcement, and national defense. As this sector has continued to grow, there has been an increased need for single unmanned systems to be able to undertake more complex and greater numbers of tasks. As the maritime domain can be particularly difficult for autonomous vehicles to operate in due to the partially defined nature of the environment, it is crucial that a method exists which is capable of dynamically accomplishing tasks within this operational domain. By considering …


A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami May 2021

A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami

Doctoral Dissertations and Master's Theses

Social engineering attacks (SE-attacks) in enterprises are hastily growing and are becoming increasingly sophisticated. Generally, SE-attacks involve the psychological manipulation of employees into revealing confidential and valuable company data to cybercriminals. The ramifications could bring devastating financial and irreparable reputation loss to the companies. Because SE-attacks involve a human element, preventing these attacks can be tricky and challenging and has become a topic of interest for many researchers and security experts. While methods exist for detecting SE-attacks, our literature review of existing methods identified many crucial factors such as the national cultural, organizational, and personality traits of employees that enable …


Cross Domain Iw Threats To Sof Maritime Missions: Implications For U.S. Sof, Gary C. Kessler, Diane M. Zorri May 2021

Cross Domain Iw Threats To Sof Maritime Missions: Implications For U.S. Sof, Gary C. Kessler, Diane M. Zorri

Publications

As cyber vulnerabilities proliferate with the expansion of connected devices, wherein security is often forsaken for ease of use, Special Operations Forces (SOF) cannot escape the obvious, massive risk that they are assuming by incorporating emerging technologies into their toolkits. This is especially true in the maritime sector where SOF operates nearshore in littoral zones. As SOF—in support to the U.S. Navy— increasingly operate in these contested maritime environments, they will gradually encounter more hostile actors looking to exploit digital vulnerabilities. As such, this monograph comes at a perfect time as the world becomes more interconnected but also more vulnerable.


A Comprehensive Mapping And Real-World Evaluation Of Multi-Object Tracking On Automated Vehicles, Alexander Bassett Apr 2021

A Comprehensive Mapping And Real-World Evaluation Of Multi-Object Tracking On Automated Vehicles, Alexander Bassett

Doctoral Dissertations and Master's Theses

Multi-Object Tracking (MOT) is a field critical to Automated Vehicle (AV) perception systems. However, it is large, complex, spans research fields, and lacks resources for integration with real sensors and implementation on AVs. Factors such those make it difficult for new researchers and practitioners to enter the field.

This thesis presents two main contributions: 1) a comprehensive mapping for the field of Multi-Object Trackers (MOTs) with a specific focus towards Automated Vehicles (AVs) and 2) a real-world evaluation of an MOT developed and tuned using COTS (Commercial Off-The-Shelf) software toolsets. The first contribution aims to give a comprehensive overview of …


Reduced Multiplicative Complexity Discrete Cosine Transform (Dct) Circuitry, Sirani Kanchana Mututhanthrige Perera Jan 2021

Reduced Multiplicative Complexity Discrete Cosine Transform (Dct) Circuitry, Sirani Kanchana Mututhanthrige Perera

Publications

System and techniques for reduced multiplicative complex­ity discrete cosine transform (DCT) circuitry are described herein. An input data set can be received and, upon the input data set, a self-recursive DCT technique can be performed to produce a transformed data set. Here, the self-recursive DCT technique is based on a product of factors of a specified type of DCT technique. Recursive components of the technique are of the same DCT type as that of the DCT technique. The transformed data set can then be produced to a data con­sumer.


Aviation Human-In-The-Loop Simulation: Best Practices For Subjective Performance Measurement, John Kleber, Beth Blickensderfer Jan 2021

Aviation Human-In-The-Loop Simulation: Best Practices For Subjective Performance Measurement, John Kleber, Beth Blickensderfer

Aviation Weather Training Research

Subjective performance measurements are a useful tool for researchers and instructors to evaluate tasks that are difficult to quantify with objective data pulled from a simulator or the physiological data of pilots. Subjective performance measurements are non-intrusive measures typically conducted by human raters. Some recommendations for utilizing subjective measures include reducing the workload of the human raters, concealing the aim of the experiment from participants, utilizing multiple raters to evaluate each participant, providing raters with proper training, developing error-resistant rater forms and, including both subjective and objective measures when possible.


Integrating The First Person View And The Third Person View Using A Connected Vr-Mr System For Pilot Training, Chang-Geun Oh, Kwanghee Lee, Myunghoon Oh Jan 2021

Integrating The First Person View And The Third Person View Using A Connected Vr-Mr System For Pilot Training, Chang-Geun Oh, Kwanghee Lee, Myunghoon Oh

Journal of Aviation/Aerospace Education & Research

Virtual reality (VR)-based flight simulator provides pilots the enhanced reality from the first-person view. Mixed reality (MR) technology generates effective 3D graphics. The users who wear the MR headset can walk around the 3D graphics to see all its 360 degrees of vertical and horizontal aspects maintaining the consciousness of real space. A VR flight simulator and an MR application were connected to create the capability of both first-person view and third-person view for a comprehensive pilot training system. This system provided users the capability to monitor the aircraft progress along the planned path from the third-person view as well …


A Mathematical Analysis Of The Wind Triangle Problem And An Inquiry Of True Airspeed Calculations In Supersonic Flight, Leonard T. Huang, Lisa I. Cummings Jan 2021

A Mathematical Analysis Of The Wind Triangle Problem And An Inquiry Of True Airspeed Calculations In Supersonic Flight, Leonard T. Huang, Lisa I. Cummings

International Journal of Aviation, Aeronautics, and Aerospace

In the first half of this paper, we present a fresh perspective toward the Wind Triangle Problem in aerial navigation by deriving necessary and sufficient conditions, which we call "go/no-go conditions", for the existence/non-existence of a solution of the problem. Although our derivation is based on simple trigonometry and basic properties of quadratic functions, it is mathematically rigorous. We also offer examples to demonstrate how easy it is to check these conditions graphically. In the second half of this paper, we use function theory to re-examine another problem in aerial navigation, namely, that of computing true airspeed — even in …


A Model For Inhalation Of Infectious Aerosol Contaminants In An Aircraft Passenger Cabin, Bert A. Silich Jan 2021

A Model For Inhalation Of Infectious Aerosol Contaminants In An Aircraft Passenger Cabin, Bert A. Silich

International Journal of Aviation, Aeronautics, and Aerospace

Aerosol contamination of an aircraft cabin by infectious passengers is a concern of passengers, aircrew and the aviation industry. This may be especially important during a pandemic, such as COVID-19, where the full extent of aerosol transmission is not well understood. A statistical method to determine the number of infectious passengers on board along with a mathematical model estimating the contaminant concentration of aerosols in the cabin and the number of inhaled infectious particles by passengers is presented. An example is used to demonstrated how the results can be estimated during normal operations and emergency conditions with malfunctions of the …


Co2 Reduction Measures In The Aviation Industry: Current Measures And Outlook, Florian Mathys, P. Wild, J. Wang Jan 2021

Co2 Reduction Measures In The Aviation Industry: Current Measures And Outlook, Florian Mathys, P. Wild, J. Wang

International Journal of Aviation, Aeronautics, and Aerospace

This article gives a holistic overview of the current CO2 reduction measures and analyses the effectiveness of measures that are feasible for implementation in the future. To achieve the objectives of the Paris Agreement, the aviation industry needs to implement reduction measures because of its forecasted growth and contribution to global warming. The focus is set on CO2 reduction measures, categorized in technology, operations, infrastructure/air traffic management (ATM), and market-based measures. The most promising long-term technologies to reduce CO2 emissions are hydrogen-powered aircrafts and sustainable aviation fuels (SAF). In terms of operations, CO2 emissions can be …