Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Embry-Riddle Aeronautical University

Conference

Discipline
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 235

Full-Text Articles in Physical Sciences and Mathematics

Localized Collocation Meshless Method For Modeling Transdermal Pharmacokinetics In Multiphase Skin Structures, Eduardo Divo Apr 2024

Localized Collocation Meshless Method For Modeling Transdermal Pharmacokinetics In Multiphase Skin Structures, Eduardo Divo

Math Department Colloquium Series

The human skin has a complicated structure with many multi-scale, biophysical effects impacting the propagation of skin-injected substances, such as partitioning, metabolic reactions, adsorption and elimination. An extended version of Fick’s second law governing the process of the compound diffusion in various skin layer is employed in the current work by considering the conservation of mass of the substance and the metabolic reaction of the substance in viable skin. Additionally, a model assuming linear coupling between the substance concentrations that are bound and unbound with blood was developed. Using such a model, a set of coupled partial differential equations are …


Resource Optimization For Air Mobility Under Emergency Situations, Yongxin (Jack) Liu Mar 2024

Resource Optimization For Air Mobility Under Emergency Situations, Yongxin (Jack) Liu

Math Department Colloquium Series

This project aims to improve air traffic management in emergencies. We first developed a GRU neural network to forecast weather-related airport capacity constraints using historical data, underscoring the value of real-time data analysis. We then optimized emergency evacuation air travel using Particle Swarm Optimization, demonstrating the ability to quickly aggregate evacuation flight resources cost-effectively. Finally, we provided a hybrid model combining a genetic algorithm with a neural network for evacuation planning, we show that neural network can be integrated accelerate genetic algorithms for efficient and performance assured system optimization.


Using Natural Language Processing To Identify Mental Health Indicators In Aviation Voluntary Safety Reports, Michael Sawyer, Katherine Berry, Amelia Kinsella, R Jordan Hinson, Edward Bynum Feb 2024

Using Natural Language Processing To Identify Mental Health Indicators In Aviation Voluntary Safety Reports, Michael Sawyer, Katherine Berry, Amelia Kinsella, R Jordan Hinson, Edward Bynum

National Training Aircraft Symposium (NTAS)

Voluntary Safety Reporting Programs (VSRPs) are a critical tool in the aviation industry for monitoring safety issues observed by the frontline workforce. While VSRPs primarily focus on operational safety, report narratives often describe factors such as fatigue, workload, culture, staffing, and health, directly or indirectly impacting mental health. These reports can provide individual and organizational insights into aviation personnel's physical and psychological well-being. This poster introduces the AVIation Analytic Neural network for Safety events (AVIAN-S) model as a potential tool to extract and monitor these insights. AVIAN-S is a novel machine-learning model that leverages natural language processing (NLP) to analyze …


Transfer Learning In The Era Of Foundational Models: Application To Diagnosis In Rheumatology, Prashant Shekhar Feb 2024

Transfer Learning In The Era Of Foundational Models: Application To Diagnosis In Rheumatology, Prashant Shekhar

Math Department Colloquium Series

Problems with current synovitis grading procedures

  • There has been a lack of reliability in grading these images in the medical community due to a lack of universally accepted diagnostic criteria [Momtazmanesh et al., 2022]
  • The human/machine variability creates an additional challenge in an efficient automated scoring system [Ranganath et al., 2022]
  • There is a lack of consistency between doctors in grading these images [Momtazmanesh et al., 2022]


Understanding Collective Performance: Human Factors And Team Science, Joseph Keebler Nov 2023

Understanding Collective Performance: Human Factors And Team Science, Joseph Keebler

Math Department Colloquium Series

This talk will focus on modern issues with team science. Joe will discuss a variety of projects he's been involved with aimed at improving teamwork in complex sociotechnical systems including military, aviation, and healthcare. He will discuss major theoretical facets of teamwork and provide evidence-based best practices that were utilized to improve teams in applied settings.


Modeling And Estimation Of A Continuous Flexible Structure Using The Theory Of Functional Connections, Riccardo Bevilacqua Oct 2023

Modeling And Estimation Of A Continuous Flexible Structure Using The Theory Of Functional Connections, Riccardo Bevilacqua

Math Department Colloquium Series

This talk presents a novel method for modeling and estimating the dynamics of a continuous structure based on a limited number of noisy measurements. The goal is reached using a Kalman filter in synergy with the recently developed mathematical framework known as the Theory of Functional Connections (TFC). The TFC allows to derive a functional expression capable of representing the entire space of the functions that satisfy a given set of linear and, in some cases, nonlinear constraints. The proposed approach exploits the possibilities offered by the TFC to derive an approximated dynamical model for the flexible system using the …


Privacy-Preserving Federated Learning, Dumindu Samaraweera Sep 2023

Privacy-Preserving Federated Learning, Dumindu Samaraweera

Math Department Colloquium Series

AI's applicability across diverse fields is hindered by data sensitivity, privacy concerns, and limited training data availability. Federated Learning (FL) addresses this challenge by enabling collaborative machine learning while preserving data privacy. FL allows clients to engage in model training with their local data, avoiding centralized storage. However, even with FL, security threats persist, jeopardizing model integrity and client data privacy. In this presentation, we will explore our latest findings in this area of research, safeguarding sensitive data from attacks through techniques like secure multiparty computation, homomorphic encryption, and differential privacy within the FL framework, enhancing data protection, and expanding …


A Low-Complexity Algorithm To Determine Spacecraft Trajectories, Sirani Perera Sep 2023

A Low-Complexity Algorithm To Determine Spacecraft Trajectories, Sirani Perera

Math Department Colloquium Series

The growing traffic within the Cislunar region has created a need for computationally effective methods to obtain the trajectories of spacecraft in the Cislunar region. By developing algorithms with low time and arithmetic complexities, we can effectively address these needs.

In this talk, we will present a mathematical model that uses interpolation and boundary conditions to obtain trajectories for satellites based on the principles of three-body dynamics. Following the model, we propose a low- complexity algorithm to generate satellite trajectories. Once the algorithm is proposed, we will apply it to the relevant periodic orbits in the Cislunar region. Finally, we …


Workforce Of The Future Begins With Aviation Stem, Lyndsay Digneo Jan 2023

Workforce Of The Future Begins With Aviation Stem, Lyndsay Digneo

National Training Aircraft Symposium (NTAS)

The United States has always been a world leader in aviation. This leadership position relies on the strength of the American STEM workforce and the quality of the nation’s educational, industrial, and government institutions. Therefore, it is imperative to nurture today’s students to become a well-trained STEM workforce in the future.

The Federal Aviation Administration (FAA) William J. Hughes Technical Center (WJHTC) recognizes that in pursuing its mission of aviation research, engineering, development, and test and evaluation, it is in a unique position to support aviation STEM activities for schools (K-12), post-secondary institutions, and community organizations. In 2016, the Technical …


A Bidirectional Deep Lstm Machine Learning Method For Flight Delay Modelling And Analysis, Desmond B. Bisandu, Irene Moulitsas Jan 2023

A Bidirectional Deep Lstm Machine Learning Method For Flight Delay Modelling And Analysis, Desmond B. Bisandu, Irene Moulitsas

National Training Aircraft Symposium (NTAS)

Flight delays can be prevented by providing a reference point from an accurate prediction model because predicting flight delays is a problem with a specific space. Only a few algorithms consider predicted classes' mutual correlation during flight delay classification or prediction modelling tasks. None of these existing methods works for all scenarios. Therefore, the need to investigate the performance of more models in solving the problem of flight delay is vast and rapidly increasing. This paper presents the development and evaluation of LSTM and BiLSTM models by comparing them for a flight delay prediction. The LSTM does the feature extraction …


Integrated Organizational Machine Learning For Aviation Flight Data, Michael J. Pritchard, Paul Thomas, Eric Webb, Jon Martin, Austin Walden Jan 2023

Integrated Organizational Machine Learning For Aviation Flight Data, Michael J. Pritchard, Paul Thomas, Eric Webb, Jon Martin, Austin Walden

National Training Aircraft Symposium (NTAS)

An increased availability of data and computing power has allowed organizations to apply machine learning techniques to various fleet monitoring activities. Additionally, our ability to acquire aircraft data has increased due to the miniaturization of small form factor computing machines. Aircraft data collection processes contain many data features in the form of multivariate time-series (continuous, discrete, categorical, etc.) which can be used to train machine learning models. Yet, three major challenges still face many flight organizations 1) integration and automation of data collection frameworks, 2) data cleanup and preparation, and 3) embedded machine learning framework. Data cleanup and preparation has …


Aircraft Energy Management: A Best Practice For Integrating Safety And Efficiency, Juan Merkt Jan 2023

Aircraft Energy Management: A Best Practice For Integrating Safety And Efficiency, Juan Merkt

National Training Aircraft Symposium (NTAS)

Aircraft Energy Management: A Best Practice for Integrating Safety and Efficiency

The airplane is the quintessential energy system, constantly transforming, transferring, distributing, storing, and exchanging various forms of energy as it moves through the air. By its very nature, flight warrants safe and efficient management of the airplane’s energy. Thus, poor aircraft energy management can lead to unsafe and/or inefficient operations. Unfortunately, energy principles associated with motion control and performance have not found their way into civilian flight training. As a result, energy management skills, founded on those guiding principles, are not adequately taught to new pilots. The energy-training gap …


Identification Of Fire-Retardant Chemical Treatments Via Instrumental Analysis, Caitlin Dillon Jul 2022

Identification Of Fire-Retardant Chemical Treatments Via Instrumental Analysis, Caitlin Dillon

Discovery Day - Prescott

Fiber trace evidence is one of the most common forms of evidence found at a crime scene; these evidentiary items often have unique flame retardant chemical compositions or volatile chemical signatures. The retardant compounds can be used as an additional piece of evidence to trace a fiber from a victim to a source sample. This analytical comparison will require the use of specialized equipment available at the Prescott campus of Embry-Riddle Aeronautical University. This equipment and instrumentation includes scanning electron microscopy with energy dispersive spectroscopy (SEM/EDS), Fourier-transform infrared spectroscopy (FTIR), and gas chromatography-mass spectroscopy (GC/MS), using both liquid and volatile …


Monitoring Environmental Trends In Levels Of Influenza Virus And Sars-Cov-2 In Prescott, Az, Jade Blackert, Daniella Cowles Jul 2022

Monitoring Environmental Trends In Levels Of Influenza Virus And Sars-Cov-2 In Prescott, Az, Jade Blackert, Daniella Cowles

Discovery Day - Prescott

Every year, the Centers for Disease Control and Prevention and state health agencies collect surveillance data for cases of influenza. During the flu season of 2019, SARSCoV- 2, which causes the symptoms known as COVID-19, caused a global pandemic. In turn, the surveillance and testing data showed a dramatic drop in influenza case numbers compared to previous years. Influenza is one of the deadliest viruses in human history, so it seems unlikely that this drastic change would occur due to the emergence of a similar virus. This research is designed to show that the prevalence of influenza in the community …


Creating Communities Of Practice To Promote Sustainability: A Framework For Organizational Change, Ryan J. Wallace, Haydee M. Cuevas, Sang-A Lee Apr 2022

Creating Communities Of Practice To Promote Sustainability: A Framework For Organizational Change, Ryan J. Wallace, Haydee M. Cuevas, Sang-A Lee

Sustainability Conference

Everything necessary for human survival depends on our ability to establish stewardship practices that preserve critical resources and foster conditions to ensure long-term protection of Earth’s natural environment for future generations. Sustainability practices rely upon individuals to adhere to conscientious principles to establish a reasonable balance between environmental, social, and economic influences. This presentation seeks to establish a candid dialogue about how to identify opportunities for sustainability, how to implement policies that reinforce sustainability practices, and encourage the formulation of a community of practice to reinforce accountability and continuous improvement of sustainability efforts.

Identifying sustainability practices requires a keen understanding …


Land Cover Classification And Change During Mine Reclamation In Northeast Florida Using Multispectral Imagery, Daniel Burow, Robert Brown, Alexis Caldwell, Patrick Hunter, Jett-Ramy Kaddour, Alexander Kingma, Justin Kozicki, Blake Neal, Abigail Neff, Rylan Randolph, Devon Tanner, Isaiah Vahos Apr 2022

Land Cover Classification And Change During Mine Reclamation In Northeast Florida Using Multispectral Imagery, Daniel Burow, Robert Brown, Alexis Caldwell, Patrick Hunter, Jett-Ramy Kaddour, Alexander Kingma, Justin Kozicki, Blake Neal, Abigail Neff, Rylan Randolph, Devon Tanner, Isaiah Vahos

Sustainability Conference

Titanium is commonly used in the aerospace industry because it is lightweight and durable in extreme temperatures. The Green Cove Springs Mine, near Green Cove Springs, Florida, was used for mining and processing titanium and other minerals from 1972 until 2009. Since then, the mine area is being reclaimed, or rehabilitated and restored to its natural state, as required by Florida Department of Environmental Protection regulations. In this study, we use high-resolution multispectral satellite and aerial imagery obtained from 2016 to 2022 to examine land cover (LC) changes at the Green Cove Springs Mine during this reclamation period. We use …


Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk Jan 2022

Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk

Annual ADFSL Conference on Digital Forensics, Security and Law

The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …


A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang Jan 2022

A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …


Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik Jan 2022

Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …


Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd Jan 2022

Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …


The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan Jan 2022

The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan

Annual ADFSL Conference on Digital Forensics, Security and Law

In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …


Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik Jan 2022

Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …


Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik Jan 2022

Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …


Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd Jan 2022

Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …


A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow Jan 2022

A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …


Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha Jan 2022

Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha

Annual ADFSL Conference on Digital Forensics, Security and Law

The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …


Coherent Captain Mills: The Search For Sterile Neutrinos, Ashley Elliott, Jeramy Gordon, Jonah Greenwood, Rachel Lake, Ryder Moreno, Emily Strawn, Kate Walker May 2020

Coherent Captain Mills: The Search For Sterile Neutrinos, Ashley Elliott, Jeramy Gordon, Jonah Greenwood, Rachel Lake, Ryder Moreno, Emily Strawn, Kate Walker

Discovery Day - Prescott

The observation of neutrino oscillations confirms that the active neutrinos (νe, νμ, ντ) are comprised of three mass eigenstates with Δm2 values between 10-3 to 10-5 eV2 . However, a persistent phenomenon has been observed at LSND, MiniBooNE and other shortbaseline experiments (SBE) where Δm2 ~ 1eV2 and is not compatible with the current mixing between mass eigenstates. However, a 4th neutrino, a sterile neutrino (νs) that doesn’t participate in weak interactions could explain the phenomena observed as SBE’s. An experiment has been constructed at TA-53 at Los Alamos National Laboratory to investigate this large Δm2 ~ 1eV2 and determine …


Supercritical Carbon Dioxide Based Heat Exchanger On The Martian, Sarah Guinn Apr 2020

Supercritical Carbon Dioxide Based Heat Exchanger On The Martian, Sarah Guinn

Discovery Day - Prescott

The use of supercritical carbon dioxide (sCO2) in power cycles has been fairly new in the last decade. Due to this, there is a lack in research for both terrestrial and extraterrestrial applications. The purpose of this project is to utilize sCO2 as a working fluid and design and optimize a Brayton Cycle based heat exchanger on the Martian surface. Due to the lack of water on Mars, this research will provide a stronger analysis of planetary based drycooling processes in low atmospheric pressure and colder temperatures. We have been conducting an in-depth analysis of the heat exchanger by modeling …


Gravitational Wave Calibration Error For Supernovae Core Collapse, Brad Ratto Apr 2020

Gravitational Wave Calibration Error For Supernovae Core Collapse, Brad Ratto

Discovery Day - Prescott

The existence of gravitational waves reveals yet another method in which information is transmitted across the cosmos, bringing with it further insight into the inner workings of our universe. In order to detect such phenomena, we use ground based Laser Interferometers to measure the microscopic deformations in space-time and explore a new frontier in gravitational astronomy. However, such instrumentation also induces distortions in the gravitational waves henceforth diminishing the ability to extract accurate physical information. Moreover, the ability to extract a coherent signal amongst the noise remains an issue that requires constant improvement. The aim of this study is to …


Studies Of Oval Tube And Fin Heat Exchangers, Phillip Nielsen Apr 2020

Studies Of Oval Tube And Fin Heat Exchangers, Phillip Nielsen

Discovery Day - Prescott

Heating Ventilation and air-conditioning (HVAC) is a system which changes the temperature of the surroundings for the purposes of cooling or heating. This system requires energy to maintain a temperature difference from the outside temperature. This is important since minimized power is one of the requirements for the system to achieve a better efficiency. Optimizing the flow over the evaporator coils is one way to increase the cooling efficiency. This will reduce the power required to have a sustainable system. Optimizing the flow to increase the energy transfer between the fins and the incoming air could result in a greater …