Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Engineering

Embry-Riddle Aeronautical University

Keyword
Publication Year
Publication
Publication Type
File Type

Articles 31 - 60 of 730

Full-Text Articles in Physical Sciences and Mathematics

An Evaluation Framework For Digital Image Forensics Tools, Zainab Khalid, Sana Qadir Oct 2022

An Evaluation Framework For Digital Image Forensics Tools, Zainab Khalid, Sana Qadir

Journal of Digital Forensics, Security and Law

The boom of digital cameras, photography, and social media has drastically changed how humans live their day-to-day, but this normalization is accompanied by malicious agents finding new ways to forge and tamper with images for unlawful monetary (or other) gains. Disinformation in the photographic media realm is an urgent threat. The availability of a myriad of image editing tools renders it almost impossible to differentiate between photo-realistic and original images. The tools available for image forensics require a standard framework against which they can be evaluated. Such a standard framework can aid in evaluating the suitability of an image forensics …


Machine Learning To Predict Warhead Fragmentation In-Flight Behavior From Static Data, Katharine Larsen Oct 2022

Machine Learning To Predict Warhead Fragmentation In-Flight Behavior From Static Data, Katharine Larsen

Doctoral Dissertations and Master's Theses

Accurate characterization of fragment fly-out properties from high-speed warhead detonations is essential for estimation of collateral damage and lethality for a given weapon. Real warhead dynamic detonation tests are rare, costly, and often unrealizable with current technology, leaving fragmentation experiments limited to static arena tests and numerical simulations. Stereoscopic imaging techniques can now provide static arena tests with time-dependent tracks of individual fragments, each with characteristics such as fragment IDs and their respective position vector. Simulation methods can account for the dynamic case but can exclude relevant dynamics experienced in real-life warhead detonations. This research leverages machine learning methodologies to …


A Data Driven Modeling Approach For Store Distributed Load And Trajectory Prediction, Nicholas Peters Oct 2022

A Data Driven Modeling Approach For Store Distributed Load And Trajectory Prediction, Nicholas Peters

Doctoral Dissertations and Master's Theses

The task of achieving successful store separation from aircraft and spacecraft has historically been and continues to be, a critical issue for the aerospace industry. Whether it be from store-on-store wake interactions, store-parent body interactions or free stream turbulence, a failed case of store separation poses a serious risk to aircraft operators. Cases of failed store separation do not simply imply missing an intended target, but also bring the risk of collision with, and destruction of, the parent body vehicle. Given this risk, numerous well-tested procedures have been developed to help analyze store separation within the safe confines of wind …


Supporting The Discovery, Reuse, And Validation Of Cybersecurity Requirements At The Early Stages Of The Software Development Lifecycle, Jessica Antonia Steinmann Oct 2022

Supporting The Discovery, Reuse, And Validation Of Cybersecurity Requirements At The Early Stages Of The Software Development Lifecycle, Jessica Antonia Steinmann

Doctoral Dissertations and Master's Theses

The focus of this research is to develop an approach that enhances the elicitation and specification of reusable cybersecurity requirements. Cybersecurity has become a global concern as cyber-attacks are projected to cost damages totaling more than $10.5 trillion dollars by 2025. Cybersecurity requirements are more challenging to elicit than other requirements because they are nonfunctional requirements that requires cybersecurity expertise and knowledge of the proposed system. The goal of this research is to generate cybersecurity requirements based on knowledge acquired from requirements elicitation and analysis activities, to provide cybersecurity specifications without requiring the specialized knowledge of a cybersecurity expert, and …


Rocket Measurements Of Electron Energy Spectra From Earth’S Photoelectron Production Layer, Aroh Barjatya, Shantanab Debchoudhury, Glyn A. Collinson, Alex Glocer, Dennis Chornay, Et Al. Aug 2022

Rocket Measurements Of Electron Energy Spectra From Earth’S Photoelectron Production Layer, Aroh Barjatya, Shantanab Debchoudhury, Glyn A. Collinson, Alex Glocer, Dennis Chornay, Et Al.

Publications

Photoelectrons are crucial to atmospheric physics. They heat the atmosphere, strengthen 28 planetary ambipolar electric fields, and enhance the outflow of ions to space. However, 29 there exist only a handful of measurements of their energy spectrum near the peak of 30 photoproduction. We present calibrated energy spectra of pristine photoelectrons at their 31 source by a prototype Dual Electrostatic Analyzer (DESA) instrument flown on July 11 32 2021 aboard the Dynamo-2 sounding rocket (NASA № 36.357). Photopeaks arising from 33 30.4nm He-II spectral line were observed throughout the flight above 120km. DESA also 34 successfully resolved the rarely observed …


Validated Question Bank For Assessing Pilot Knowledge Of Aviation Weather Appendix: Weather Product Interpretation Questions, Robert Thomas, Cassandra Dommingo, John Kleber, Jackie Mcsorely, Amber Cole, Thomas Guinn, Elizabeth Blickensderfer Aug 2022

Validated Question Bank For Assessing Pilot Knowledge Of Aviation Weather Appendix: Weather Product Interpretation Questions, Robert Thomas, Cassandra Dommingo, John Kleber, Jackie Mcsorely, Amber Cole, Thomas Guinn, Elizabeth Blickensderfer

General Aviation Weather Display Interpretation

This appendix supplements the Thomas et al. (2022) paper titled “Validated Question Bank for Assessing Pilot Knowledge of Aviation Weather ” which validates a set of weather product interpretation questions that can be used to measure a pilot’s understanding of weather. The assessment consists of 15 weather product interpretation topics which can be administered as a single 65-question survey or, as in the Thomas et al. (2022) study, two assessments of 33 and 32 questions each separated by topic. The set of 65 questions can be found in this appendix along with a table which demonstrates how to separate the …


Computational Models To Detect Radiation In Urban Environments: An Application Of Signal Processing Techniques And Neural Networks To Radiation Data Analysis, Jose Nicolas Gachancipa Jul 2022

Computational Models To Detect Radiation In Urban Environments: An Application Of Signal Processing Techniques And Neural Networks To Radiation Data Analysis, Jose Nicolas Gachancipa

Beyond: Undergraduate Research Journal

Radioactive sources, such as uranium-235, are nuclides that emit ionizing radiation, and which can be used to build nuclear weapons. In public areas, the presence of a radioactive nuclide can present a risk to the population, and therefore, it is imperative that threats are identified by radiological search and response teams in a timely and effective manner. In urban environments, such as densely populated cities, radioactive sources may be more difficult to detect, since background radiation produced by surrounding objects and structures (e.g., buildings, cars) can hinder the effective detection of unnatural radioactive material. This article presents a computational model …


Vertical Take-Off And Landing Control Via Dual-Quaternions And Sliding Mode, Joshua Sonderegger Apr 2022

Vertical Take-Off And Landing Control Via Dual-Quaternions And Sliding Mode, Joshua Sonderegger

Doctoral Dissertations and Master's Theses

The landing and reusability of space vehicles is one of the driving forces into renewed interest in space utilization. For missions to planetary surfaces, this soft landing has been most commonly accomplished with parachutes. However, in spite of their simplicity, they are susceptible to parachute drift. This parachute drift makes it very difficult to predict where the vehicle will land, especially in a dense and windy atmosphere such as Earth. Instead, recent focus has been put into developing a powered landing through gimbaled thrust. This gimbaled thrust output is dependent on robust path planning and controls algorithms. Being able to …


A Meshless Approach To Computational Pharmacokinetics, Anthony Matthew Khoury Apr 2022

A Meshless Approach To Computational Pharmacokinetics, Anthony Matthew Khoury

Doctoral Dissertations and Master's Theses

The meshless method is an incredibly powerful technique for solving a variety of problems with unparalleled accuracy and efficiency. The pharmacokinetic problem of transdermal drug delivery (TDDD) is one such topic and is of significant complexity. The locally collocated meshless method (LCMM) is developed in solution to this topic. First, the meshless method is formulated to model this transport phenomenon and is then validated against an analytical solution of a pharmacokinetic problem set, to demonstrate this accuracy and efficiency. The analytical solution provides a locus by which convergence behavior are evaluated, demonstrating the super convergence of the locally collocated meshless …


A Combined Approach For Private Indexing Mechanism, Pranita Maruti Desai Ms., Vijay Maruti Shelake Mr. Mar 2022

A Combined Approach For Private Indexing Mechanism, Pranita Maruti Desai Ms., Vijay Maruti Shelake Mr.

Journal of Digital Forensics, Security and Law

Private indexing is a set of approaches for analyzing research data that are similar or resemble similar ones. This is used in the database to keep track of the keys and their values. The main subject of this research is private indexing in record linkage to secure the data. Because unique personal identification numbers or social security numbers are not accessible in most countries or databases, data linkage is limited to attributes such as date of birth and names to distinguish between the number of records and the real-life entities they represent. For security reasons, the encryption of these identifiers …


Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk Jan 2022

Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk

Annual ADFSL Conference on Digital Forensics, Security and Law

The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …


A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang Jan 2022

A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …


Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik Jan 2022

Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …


Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd Jan 2022

Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …


The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan Jan 2022

The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan

Annual ADFSL Conference on Digital Forensics, Security and Law

In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …


Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik Jan 2022

Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …


Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik Jan 2022

Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …


Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd Jan 2022

Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …


A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow Jan 2022

A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …


Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha Jan 2022

Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha

Annual ADFSL Conference on Digital Forensics, Security and Law

The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …


Ga Pilot Perceptions Of Speech Systems To Transcribe And Submit Pireps, Deborah S. Carstens Ph.D., Pmp, Michael S. Harwin, J.D., M.S., Tianhua Li, Ph.D., Brandon J. Pitts, Ph.D., Mel Futrell, M.A., Barrett Caldwell, Ph.D. Jan 2022

Ga Pilot Perceptions Of Speech Systems To Transcribe And Submit Pireps, Deborah S. Carstens Ph.D., Pmp, Michael S. Harwin, J.D., M.S., Tianhua Li, Ph.D., Brandon J. Pitts, Ph.D., Mel Futrell, M.A., Barrett Caldwell, Ph.D.

International Journal of Aviation, Aeronautics, and Aerospace

Flying into hazardous weather can be a cause of aviation incidents and accidents. Accidents involving general aviation (GA) pilots who are not instrument rated who fly into instrument meteorological conditions (IMC) are often fatal. Pilot weather reports (PIREPs) can increase the accuracy and timeliness of current and forecasted weather conditions. They are an essential tool used by pilots to avoid flying into hazardous weather as well as meteorologists to develop and update aviation forecasts. Thus, a large number of accurate PIREPs with the best source of current weather coming from pilots and air traffic controllers are needed. Pilots are often …


Robotic Olfactory-Based Navigation With Mobile Robots, Lingxiao Wang Dec 2021

Robotic Olfactory-Based Navigation With Mobile Robots, Lingxiao Wang

Doctoral Dissertations and Master's Theses

Robotic odor source localization (OSL) is a technology that enables mobile robots or autonomous vehicles to find an odor source in unknown environments. It has been viewed as challenging due to the turbulent nature of airflows and the resulting odor plume characteristics. The key to correctly finding an odor source is designing an effective olfactory-based navigation algorithm, which guides the robot to detect emitted odor plumes as cues in finding the source. This dissertation proposes three kinds of olfactory-based navigation methods to improve search efficiency while maintaining a low computational cost, incorporating different machine learning and artificial intelligence methods.

A. …


Reduced-Order Dynamic Modeling And Robust Nonlinear Control Of Fluid Flow Velocity Fields, Anu Kossery Jayaprakash, William Mackunis, Vladimir Golubev, Oksana Stalnov Dec 2021

Reduced-Order Dynamic Modeling And Robust Nonlinear Control Of Fluid Flow Velocity Fields, Anu Kossery Jayaprakash, William Mackunis, Vladimir Golubev, Oksana Stalnov

Publications

A robust nonlinear control method is developed for fluid flow velocity tracking, which formally addresses the inherent challenges in practical implementation of closed-loop active flow control systems. A key challenge being addressed here is flow control design to compensate for model parameter variations that can arise from actuator perturbations. The control design is based on a detailed reduced-order model of the actuated flow dynamics, which is rigorously derived to incorporate the inherent time-varying uncertainty in the both the model parameters and the actuator dynamics. To the best of the authors’ knowledge, this is the first robust nonlinear closed-loop active flow …


Comprehensive Report On Extraterrestrial Resource Extraction, Robinson Raphael Dec 2021

Comprehensive Report On Extraterrestrial Resource Extraction, Robinson Raphael

Student Works

The prospect of asteroid mining provides a plethora of riches that include metals and water. As the number of discovered asteroids continues to grow, opportunities arise to commercialize these resources within Near-Earth Asteroids (NEAs). With urgent applications on Earth and in space, NEAs allow for a surge in sales. Planning forward, Astroider Aerospace Systems follows a mission split into four phases. Phase 1 develops a series of spacecraft using existing technologies, titled as Near-Earth Asteroid Miners and Near-Earth Asteroid Surveyors. Phase 2 first launches the surveyors to candidate NEAs, prospecting them for ores. To identify potential celestial bodies for this …


Don't Bite The Bait: Phishing Attack For Internet Banking (E-Banking), Ilker Kara Nov 2021

Don't Bite The Bait: Phishing Attack For Internet Banking (E-Banking), Ilker Kara

Journal of Digital Forensics, Security and Law

Phishing attacks are based on obtaining desired information from users quickly and easily with the help of misdirecting, panicking, curiosity, or excitement. Most of the phishing web sites are designed on internet banking(e-banking) and the attackers can acquire financial information of misled users with the tactics and discourses they develop. Despite the increase of prevention techniques against phishing attacks day by day, an effective solution could not be found for this issue due to the human factor. Because of this reason, real phishing attack studies are essential to study and analyze the attackers’ attack techniques and strategies. This study focused …


Aessa Young Professionals Forum Webinar “Technologies And Skills That Will Gearup The Aerospace Industry Post Pandemic” - A Global Perspective With An Emphasis On South Africa October 2021, Linda Vee Weiland Oct 2021

Aessa Young Professionals Forum Webinar “Technologies And Skills That Will Gearup The Aerospace Industry Post Pandemic” - A Global Perspective With An Emphasis On South Africa October 2021, Linda Vee Weiland

Publications

A webinar presentation for AeSSA Young Professionals.


An Economical Method For Securely Disintegrating Solid-State Drives Using Blenders, Brandon J. Hopkins Phd, Kevin A. Riggle Jul 2021

An Economical Method For Securely Disintegrating Solid-State Drives Using Blenders, Brandon J. Hopkins Phd, Kevin A. Riggle

Journal of Digital Forensics, Security and Law

Pulverizing solid-state drives (SSDs) down to particles no larger than 2 mm is required by the United States National Security Agency (NSA) to ensure the highest level of data security, but commercial disintegrators that achieve this standard are large, heavy, costly, and often difficult to access globally. Here, we present a portable, inexpensive, and accessible method of pulverizing SSDs using a household blender and other readily available materials. We verify this approach by pulverizing SSDs with a variety of household blenders for fixed periods of time and sieve the resulting powder to ensure appropriate particle size. Among the 6 household …


Windows Kernel Hijacking Is Not An Option: Memoryranger Comes To The Rescue Again, Igor Korkin Jun 2021

Windows Kernel Hijacking Is Not An Option: Memoryranger Comes To The Rescue Again, Igor Korkin

Journal of Digital Forensics, Security and Law

The security of a computer system depends on OS kernel protection. It is crucial to reveal and inspect new attacks on kernel data, as these are used by hackers. The purpose of this paper is to continue research into attacks on dynamically allocated data in the Windows OS kernel and demonstrate the capacity of MemoryRanger to prevent these attacks. This paper discusses three new hijacking attacks on kernel data, which are based on bypassing OS security mechanisms. The first two hijacking attacks result in illegal access to files open in exclusive access. The third attack escalates process privileges, without applying …


Adaptive-Optimal Control Of Spacecraft Near Asteroids, Madhur Tiwari Jun 2021

Adaptive-Optimal Control Of Spacecraft Near Asteroids, Madhur Tiwari

Doctoral Dissertations and Master's Theses

Spacecraft dynamics and control in the vicinity of an asteroid is a challenging and exciting problem. Currently, trajectory tracking near asteroid requires extensive knowledge about the asteroid and constant human intervention to successfully plan and execute proximity operation. This work aims to reduce human dependency of these missions from a guidance and controls perspective. In this work, adaptive control and model predictive control are implemented to generating and tracking obstacle avoidance trajectories in asteroid’s vicinity.

Specifically, direct adaptive control derived from simple adaptive control is designed with e modification to track user-generated trajectories in the presence of unknown system and …


Applying Human Factors Heuristic Evaluation Tools To Improve Aviation Weather Displays: A Mismatch, John Kleber, Paige Lawton, Beth Blickensderfer May 2021

Applying Human Factors Heuristic Evaluation Tools To Improve Aviation Weather Displays: A Mismatch, John Kleber, Paige Lawton, Beth Blickensderfer

General Aviation Weather Display Interpretation

The evaluation of current Heuristic Evaluation Tools for use in assessing Aviation Weather Displays.