887 research outputs found
Preliminary Electrical Designs for CTEx and AFIT Satellite Ground Station
This thesis outlines the design of the electrical components for the space-based ChromoTomography Experiment (CTEx). CTEx is the next step in the development of high-speed chromotomography at the Air Force Institute of Technology. The electrical design of the system is challenging due to the large amount of data that is acquired by the imager and the limited resources that is inherent with space-based systems. Additional complication to the design is the need to know the angle of a spinning prism that is in the field of view very precisely for each image. Without this precise measurement any scene that is reconstructed from the data will be blurry and incomprehensible. This thesis also outlines how the control software for the CTEx space system should be created. The software ow is a balance of complex real time target pointing angles and simplicity to allow the system to function as quick as possible. This thesis also discusses the preliminary design for an AFIT satellite ground station based upon the design of the United States Air Force Academy\u27s ground station. The AFIT ground station will be capable of commanding and controlling satellites produced by USAFA and satellites produced by a burgeoning small satellite program at AFIT
Introductory Computer Forensics
INTERPOL (International Police) built cybercrime programs to keep up with emerging cyber threats, and aims to coordinate and assist international operations for ?ghting crimes involving computers. Although signi?cant international efforts are being made in dealing with cybercrime and cyber-terrorism, ?nding effective, cooperative, and collaborative ways to deal with complicated cases that span multiple jurisdictions has proven dif?cult in practic
A Novel Path Planning Optimization Algorithm for Semi-Autonomous UAV in Bird Repellent Systems Based in Particle Swarm Optimization
Bird damage to fruit crops causes significant monetary losses to farmers annually. The
application of traditional bird repelling methods such as bird cannons and tree netting
became inefficient in the long run, keeping high maintenance and reduced mobility. Due to
their versatility, Unmanned Aerial Vehicles (UAVs) can be beneficial to solve this problem.
However, due to their low battery capacity that equals low flight duration, it is necessary to
evolve path planning optimization.
A path planning optimization algorithm of UAVs based on Particle Swarm Optimization
(PSO) is presented in this dissertation. This technique was used due to the need for an easy
implementation optimization algorithm to start the initial tests. The PSO algorithm is
simple and has few control parameters while maintaining a good performance. This path
planning optimization algorithm aims to manage the drone's distance and flight time,
applying optimization and randomness techniques to overcome the disadvantages of the
traditional systems. The proposed algorithm's performance was tested in three study cases:
two of them in simulation to test the variation of each parameter and one in the field to test
the influence on battery management and height influence. All cases were tested in the three
possible situations: same incidence rate, different rates, and different rates with no bird
damage to fruit crops.
The proposed algorithm presents promising results with an outstanding reduced average
error in the total distance for the path planning obtained and low execution time. However,
it is necessary to point out that the path planning optimization algorithm may have difficulty
finding a suitable solution if there is a bad ratio between the total distance for path planning
and points of interest. The field tests were also essential to understand the algorithm's
behavior of the path planning algorithm in the UAV, showing that there is less energy
discharged with fewer points of interest, but that do not correlates with the flight time. Also,
there is no association between the maximum horizontal speed and the flight time, which
means that the function to calculate the total distance for path planning needs to be
adjusted.Anualmente, os danos causados pelas aves em pomares criam perdas monetárias
significativas aos agricultores. A aplicação de métodos tradicionais de dispersão de aves,
como canhões repelentes de aves e redes nas árvores, torna-se ineficiente a longo prazo,
sendo ainda de alta manutenção e de mobilidade reduzida. Devido à sua versatilidade, os
Veículos Aéreos Não Tripulados (VANT) podem ser benéficos para resolver este problema.
No entanto, devido à baixa capacidade das suas baterias, que se traduz num baixo tempo de
voo, é necessário otimizar o planeamento dos caminhos.
Nesta dissertação, é apresentado um algoritmo de otimização para planeamento de
caminhos para VANT baseado no Particle Swarm Optimization (PSO). Para se iniciarem os
primeiros testes do algoritmo proposto, a técnica utilizada foi a supracitada devido à
necessidade de um algoritmo de otimização fácil de implementar. O algoritmo PSO é
simples e possuí poucos parâmetros de controlo, mantendo um bom desempenho. Este
algoritmo de otimização de planeamento de caminhos propõe-se a gerir a distância e o
tempo de voo do drone, aplicando técnicas de otimização e de aleatoriedade para superar a
sua desvantagem relativamente aos sistemas tradicionais. O desempenho do algoritmo de
planeamento de caminhos foi testado em três casos de estudo: dois deles em simulação para
testar a variação de cada parâmetro e outro em campo para testar a capacidade da bateria.
Todos os casos foram testados nas três situações possíveis: mesma taxa de incidência, taxas
diferentes e taxas diferentes sem danos de aves.
Os resultados apresentados pelo algoritmo proposto demonstram um erro médio muto
reduzido na distância total para o planeamento de caminhos obtido e baixo tempo de
execução. Porém, é necessário destacar que o algoritmo pode ter dificuldade em encontrar
uma solução adequada se houver uma má relação entre a distância total para o planeamento
de caminhos e os pontos de interesse. Os testes de campo também foram essenciais para
entender o comportamento do algoritmo na prática, mostrando que há menos energia
consumida com menos pontos de interesse, sendo que este parâmetro não se correlaciona
com o tempo de voo. Além disso, não há associação entre a velocidade horizontal máxima e
o tempo da missão, o que significa que a função de cálculo da distância total para o
planeamento de caminhos requer ser ajustada
Musings on privacy issues in health research involving disaggregate geographic data about individuals
This paper offers a state-of-the-art overview of the intertwined privacy, confidentiality, and security issues that are commonly encountered in health research involving disaggregate geographic data about individuals. Key definitions are provided, along with some examples of actual and potential security and confidentiality breaches and related incidents that captured mainstream media and public interest in recent months and years. The paper then goes on to present a brief survey of the research literature on location privacy/confidentiality concerns and on privacy-preserving solutions in conventional health research and beyond, touching on the emerging privacy issues associated with online consumer geoinformatics and location-based services. The 'missing ring' (in many treatments of the topic) of data security is also discussed. Personal information and privacy legislations in two countries, Canada and the UK, are covered, as well as some examples of recent research projects and events about the subject. Select highlights from a June 2009 URISA (Urban and Regional Information Systems Association) workshop entitled 'Protecting Privacy and Confidentiality of Geographic Data in Health Research' are then presented. The paper concludes by briefly charting the complexity of the domain and the many challenges associated with it, and proposing a novel, 'one stop shop' case-based reasoning framework to streamline the provision of clear and individualised guidance for the design and approval of new research projects (involving geographical identifiers about individuals), including crisp recommendations on which specific privacy-preserving solutions and approaches would be suitable in each case
Development of a Night Vision Goggle Heads Up Display For Paratrooper Guidance
This thesis provides the proof of concept for the development and implementation of a Global Positioning System (GPS) display via Night Vision Goggles (NVG) Heads-Up Display (HUD) for paratroopers. The system has been designed for soldiers who will be able to utilize the technology in the form of a processing system worn in an ammo pouch and displayed via NVG HUD as a tunnel in the sky. The tunnel in the sky display design is essentially a series of boxes displayed within the goggle\u27s HUD leading the paratrooper to the desired Landing Zone (LZ). The algorithm developed receives GPS and inertial sensor data (both position and attitude), and displays the guidance information in the paratrooper\u27s NVG HUD as the tunnel in the sky. The primary goal of the project is to provide a product which allows military personnel to reach a desired LZ in obscured visibility conditions such as darkness, clouds, smoke, and other unforeseen situations. This allows missions to be carried out around the clock, even in adverse visibility conditions which would normally halt operations
Airborne Doppler Wind Lidar Post Data Processing Software DAPS-LV
Systems, methods, and devices of the present invention enable post processing of airborne Doppler wind LIDAR data. In an embodiment, airborne Doppler wind LIDAR data software written in LabVIEW may be provided and may run two versions of different airborne wind profiling algorithms. A first algorithm may be the Airborne Wind Profiling Algorithm for Doppler Wind LIDAR ("APOLO") using airborne wind LIDAR data from two orthogonal directions to estimate wind parameters, and a second algorithm may be a five direction based method using pseudo inverse functions to estimate wind parameters. The various embodiments may enable wind profiles to be compared using different algorithms, may enable wind profile data for long haul color displays to be generated, may display long haul color displays, and/or may enable archiving of data at user-selectable altitudes over a long observation period for data distribution and population
An examination of the Asus WL-HDD 2.5 as a nepenthes malware collector
The Linksys WRT54g has been used as a host for network forensics tools for instance Snort for a long period of time. Whilst large corporations are already utilising network forensic tools, this paper demonstrates that it is quite feasible for a non-security specialist to track and capture malicious network traffic. This paper introduces the Asus Wireless Hard disk as a replacement for the popular Linksys WRT54g. Firstly, the Linksys router will be introduced detailing some of the research that was undertaken on the device over the years amongst the security community. It then briefly discusses malicious software and the impact this may have for a home user. The paper then outlines the trivial steps in setting up Nepenthes 0.1.7 (a malware collector) for the Asus WL-HDD 2.5 according to the Nepenthes and tests the feasibility of running the malware collector on the selected device. The paper then concludes on discussing the limitations of the device when attempting to execute Nepenthes
Secure portable execution and storage environments: A capability to improve security for remote working
Remote working is a practice that provides economic benefits to both the employing organisation and the individual. However, evidence suggests that organisations implementing remote working have limited appreciation of the security risks, particularly those impacting upon the confidentiality and integrity of information and also on the integrity and availability of the remote worker’s computing environment. Other research suggests that an organisation that does appreciate these risks may veto remote working, resulting in a loss of economic benefits. With the implementation of high speed broadband, remote working is forecast to grow and therefore it is appropriate that improved approaches to managing security risks are researched. This research explores the use of secure portable execution and storage environments (secure PESEs) to improve information security for the remote work categories of telework, and mobile and deployed working.
This thesis with publication makes an original contribution to improving remote work information security through the development of a body of knowledge (consisting of design models and design instantiations) and the assertion of a nascent design theory. The research was conducted using design science research (DSR), a paradigm where the research philosophies are grounded in design and construction.
Following an assessment of both the remote work information security issues and threats, and preparation of a set of functional requirements, a secure PESE concept was defined. The concept is represented by a set of attributes that encompass the security properties of preserving the confidentiality, integrity and availability of the computing environment and data. A computing environment that conforms to the concept is considered to be a secure PESE, the implementation of which consists of a highly portable device utilising secure storage and an up-loadable (on to a PC) secure execution environment. The secure storage and execution environment combine to address the information security risks in the remote work location.
A research gap was identified as no existing ‘secure PESE like’ device fully conformed to the concept, enabling a research problem and objectives to be defined. Novel secure storage and execution environments were developed and used to construct a secure PESE suitable for commercial remote work and a high assurance secure PESE suitable for security critical remote work. The commercial secure PESE was trialled with an existing telework team looking to improve security and the high assurance secure PESE was trialled within an organisation that had previously vetoed remote working due to the sensitivity of the data it processed.
An evaluation of the research findings found that the objectives had been satisfied. Using DSR evaluation frameworks it was determined that the body of knowledge had improved an area of study with sufficient evidence generated to assert a nascent design theory for secure PESEs.
The thesis highlights the limitations of the research while opportunities for future work are also identified. This thesis presents ten published papers coupled with additional doctoral research (that was not published) which postulates the research argument that ‘secure PESEs can be used to manage information security risks within the remote work environment’
Setup and Integration of a quadrotor used as a research demonstrator
Este trabajo final de carrera está enmarcado dentro de la realización de un
PROFEDI (Programa de Formació d’Estudiants en Departaments i Instituts)
dentro del grupo de investigación ICARUS de la UPC (Universitat Politècnica
de Catalunya).
El grupo ICARUS está localizado en el Parc Mediterrani de la Tecnologia de
Castelldefels (Barcelona). Actualmente tiene distintos proyectos en marcha
siendo el Sky-Eye el más importante. El proyecto Sky-Eye consiste en la
detección de hot spots y está subvencionado por la Generalitat de Catalunya.
Un PROFEDI consiste en la realización de un proyecto en un departamento de
la Universidad, en este caso de la Escola d’Enginyeria de Telecomunicacions i
Aeroespacial de Castelldefels en el departamento de Arquitectura de
Computadores. En él, el alumno investiga nuevos campos y ramas de sus
estudios y amplía así sus conocimientos.
Este PROFEDI consiste en la construcción de un quadrotor que será usado en
un futuro como demostrador docente por la universidad. El proyecto lo he
realizado junto con otro estudiante, Francesc Pera González. Inicialmente se
documentó un parte inicial de “Safety” en común, y posteriormente decidí
hacer todo el proceso de integración y “setup”.
En este TFC se detallarán qué segmentos integran el UAV, cómo
interaccionan entre ellos y la correcta integración de los sistemas que los
forman. Así mismo, se explicará la correcta instalación, configuración y edición
de todos los aspectos software necesarios para poder simular a través de la
“Ground Control Station” o poder volar el quadrotor siempre con las medidas
de seguridad necesarias.
El software usado en el proyecto es de acceso libre y ha sido creado por el
grupo Paparazzi de la ENAC (Ecole Nationale de l’Aviation Civile), los cuales
tienen una web [1] que nos sirvió de soporte durante todo el proyecto.
Tratándose de un demostrador docente donde la interacción con estudiantes
(a los cuales se les permitirá editar y configurar el vuelo del quadrotor) será
constante, el aspecto de la seguridad, es uno de los más importantes
Virtualisation and Thin Client : A Survey of Virtual Desktop environments
This survey examines some of the leading commercial Virtualisation and Thin Client technologies. Reference is made to a number of academic research sources and to prominent industry specialists and commentators. A basic virtualisation Laboratory model is assembled to demonstrate fundamental Thin Client operations and to clarify potential problem areas
- …