268 research outputs found

    B-Plane Targeting with the Spacecraft Trajectory Optimization Suite

    Get PDF
    In interplanetary trajectory applications, it is common to design arrival trajectories based on B-plane target values. This targeting scheme, B-plane targeting, allows for specific target orbits to be obtained during mission design. A primary objective of this work was to implement B-plane targeting into the Spacecraft Trajectory Optimization Suite (STOpS). This work was based on the previous versions of STOpS done by Fitzgerald and Sheehan, however STOpS was redeveloped from MATLAB to python. This updated version of STOpS implements 3-dimensional computation, departure and arrival orbital phase modeling with patched conics, B-plane targeting, and a trajectory correction maneuver. The optimization process is done with three evolutionary algorithms implemented in an island model paradigm. The algorithms and the island model were successfully verified with known optimization functions before being used in the orbital optimization cases. While the algorithms and island model are not new to this work, they were altered in this redevelopment of STOpS to closer relate to literature. This enhanced literature relation allows for easier comprehension of the both the formulation of the schemes and the code itself. With a validated optimization scheme, STOpS is able to compute near-optimal trajectories for numerous historical missions. New mission types were also easily implemented and modeled with STOpS. A trajectory correction maneuver was shown to further optimize the trajectories end conditions, when convergence was reached. The result is a versatile optimization scheme that is highly customization to the invested user, while remaining simple for novice users

    Coupled Transformations of Graph Structures applied to Model Migration

    Get PDF
    Model-Driven Engineering (MDE) is a relatively new paradigm in software engineering that pursues the goal to master the increased complexity of modern software products. While software applications have been developed for a specific platform in the past, today they are targeting various platforms and devices from classical desktop PCs to smart phones. In addition, they interact with other applications. To easier cope with these new requirements, software applications are specified in MDE at a high abstraction level in so called models prior to their implementation. Afterward, model transformations are used to automate recurring development tasks as well as to generate software artifacts for different runtime environments. Thereby, software artifacts are not necessarily files containing program code, they can also cover configuration files as well as machine readable input for model checking tools. However, MDE does not only address software engineering problems, it also raises new challenges. One of these new challenges is connected to the specification of modeling languages, which are used to create models. The creation of a modeling language is a creative process that requires several iterations similar to the creation of models. New requirements as well as a better understanding of the application domain result in an evolution of modeling languages over time. Models developed in an earlier version of a modeling language often needs to be co-adopted (migrated) to language changes. This migration should be automated, as migrating models manually is time consuming and error-prone. While application modelers use ad-hoc solutions to migrate their models, there is still a lack of theory to ensure well-defined migration results. This work contributes to a formalization of modeling language evolution with corresponding model migration on the basis of algebraic graph transformations that have successfully been used earlier as theoretical foundations of model transformation. The goal of this research is to develop a theory that considers the problem of modeling language evolution with corresponding model migration on a conceptual level, independent of a specific modeling framework

    Integrating an Agent-Based Model into a Web-Enabled Annual Brome Land Management System

    Get PDF
    The natural fire cycle in the Great Basin area of Nevada has shortened from every 50 to 60 years to 3 to 5 years, putting many natural ecosystems and occupied lands in danger. The spreading phenomenon of the invasive annual brome will be investigated to quantify this fire risk. It is renowned for its invasive nature, flammability, and the detrimental effects it has on native annual and perennial grasses. Based on vegetation classifications and dispersal characteristics, the rules for an agent-based model will be used to simulate the future extents. Agent Analyst software in conjunction with ArcGIS will integrate simulation results into a web-enabled decision support system for land manager

    Software-Driven and Virtualized Architectures for Scalable 5G Networks

    Full text link
    In this dissertation, we argue that it is essential to rearchitect 4G cellular core networks–sitting between the Internet and the radio access network–to meet the scalability, performance, and flexibility requirements of 5G networks. Today, there is a growing consensus among operators and research community that software-defined networking (SDN), network function virtualization (NFV), and mobile edge computing (MEC) paradigms will be the key ingredients of the next-generation cellular networks. Motivated by these trends, we design and optimize three core network architectures, SoftMoW, SoftBox, and SkyCore, for different network scales, objectives, and conditions. SoftMoW provides global control over nationwide core networks with the ultimate goal of enabling new routing and mobility optimizations. SoftBox attempts to enhance policy enforcement in statewide core networks to enable low-latency, signaling-efficient, and customized services for mobile devices. Sky- Core is aimed at realizing a compact core network for citywide UAV-based radio networks that are going to serve first responders in the future. Network slicing techniques make it possible to deploy these solutions on the same infrastructure in parallel. To better support mobility and provide verifiable security, these architectures can use an addressing scheme that separates network locations and identities with self-certifying, flat and non-aggregatable address components. To benefit the proposed architectures, we designed a high-speed and memory-efficient router, called Caesar, for this type of addressing schemePHDComputer Science & EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttps://deepblue.lib.umich.edu/bitstream/2027.42/146130/1/moradi_1.pd

    Moving target defense for securing smart grid communications: Architectural design, implementation and evaluation

    Get PDF
    Supervisory Control And Data Acquisition (SCADA) communications are often subjected to various kinds of sophisticated cyber-attacks which can have a serious impact on the Critical Infrastructure such as the power grid. Most of the time, the success of the attack is based on the static characteristics of the system, thereby enabling an easier profiling of the target system(s) by the adversary and consequently exploiting their limited resources. In this thesis, a novel approach to mitigate such static vulnerabilities is proposed by implementing a Moving Target Defense (MTD) strategy in a power grid SCADA environment, which leverages the existing communication network with an end-to-end IP Hopping technique among the trusted peer devices. This offers a proactive L3 layer network defense, minimizing IP-specific threats and thwarting worm propagation, APTs, etc., which utilize the cyber kill chain for attacking the system through the SCADA network. The main contribution of this thesis is to show how MTD concepts provide proactive defense against targeted cyber-attacks, and a dynamic attack surface to adversaries without compromising the availability of a SCADA system. Specifically, the thesis presents a brief overview of the different type of MTD designs, the proposed MTD architecture and its implementation with IP hopping technique over a Control Center–Substation network link along with a 3-way handshake protocol for synchronization on the Iowa State’s Power Cyber testbed. The thesis further investigates the delay and throughput characteristics of the entire system with and without the MTD to choose the best hopping rate for the given link. It also includes additional contributions for making the testbed scenarios more realistic to real world scenarios with multi-hop, multi-path WAN. Using that and studying a specific attack model, the thesis analyses the best ranges of IP address for different hopping rate and different number of interfaces. Finally, the thesis describes two case studies to explore and identify potential weaknesses of the proposed mechanism, and also experimentally validate the proposed mitigation alterations to resolve the discovered vulnerabilities. As part of future work, we plan to extend this work by optimizing the MTD algorithm to be more resilient by incorporating other techniques like network port mutation to further increase the attack complexity and cost

    Schema Evolution in Process Management Systems

    Get PDF
    Continuously arising new trends in information technology and developments at the (e-business) market let companies crave for automated business process support. Process management systems offer the promising possibility to (electronically) define, control, and monitor business processes. However, if this technology shall be applicable in practice it must be possible to change running business processes even at runtime. Basically, such process changes can take place at two levels - the process type level and the process instance level. If a process type is modified a new version of the respective process type schema is created. Then, at minimum, the process instances running according to the old process type schema version must be able to finish without being disturbed. However, this simple versioning approach is only sufficient for short-running business processes. For long-running ones like, for example, car leasing contracts or medical treatment processes which may last from 3 up to 5 years, it must be possible to apply the process type changes to the collection of running process instances as well, but without causing inconsistencies or errors in the sequel. Apart from process schema evolution and change propagation a flexible process management system must also enable instance-specific (ad-hoc) changes, for example, if exceptional situations occur. If then a process type change takes place the challenging question arises how to adequately deal with the interplay of process type and process instance changes
    • …
    corecore