2,242 research outputs found

    Unmanned Aircraft Systems in the Cyber Domain

    Get PDF
    Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming, operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions. This second edition discusses state-of-the-art technology issues facing US UAS designers. It focuses on counter unmanned aircraft systems (C-UAS) – especially research designed to mitigate and terminate threats by SWARMS. Topics include high-altitude platforms (HAPS) for wireless communications; C-UAS and large scale threats; acoustic countermeasures against SWARMS and building an Identify Friend or Foe (IFF) acoustic library; updates to the legal / regulatory landscape; UAS proliferation along the Chinese New Silk Road Sea / Land routes; and ethics in this new age of autonomous systems and artificial intelligence (AI).https://newprairiepress.org/ebooks/1027/thumbnail.jp

    Privacy Please: A Privacy Curriculum Taxonomy (PCT) For The Era Of Personal Intelligence

    Get PDF
    This paper extends forward thinking by information ethics and business education scholars to introduce a Privacy Curriculum Taxonomy (PCT) that repurposes business curricula around the emerging personal information privacy paradigm. The seminal challenge confronting business education leaders is to respond to the ontological paradigm shift from a physical society driven by material and monetary processes, towards a digital society driven by information supply and the growing demand for information privacy. The PCT is advanced as an initial framework for engaging business curriculum planners in the considerations required to repurpose existing disciplines around digital society information and privacy processes. After a current literature review, the PCT is developed using a foundational set of information assurance principles. The PCT is business discipline specific, to catalyze incubation and further development within and across functional areas

    Interactive Planning and Sensing for Aircraft in Uncertain Environments with Spatiotemporally Evolving Threats

    Get PDF
    Autonomous aerial, terrestrial, and marine vehicles provide a platform for several applications including cargo transport, information gathering, surveillance, reconnaissance, and search-and-rescue. To enable such applications, two main technical problems are commonly addressed.On the one hand, the motion-planning problem addresses optimal motion to a destination: an application example is the delivery of a package in the shortest time with least fuel. Solutions to this problem often assume that all relevant information about the environment is available, possibly with some uncertainty. On the other hand, the information gathering problem addresses the maximization of some metric of information about the environment: application examples include such as surveillance and environmental monitoring. Solutions to the motion-planning problem in vehicular autonomy assume that information about the environment is available from three sources: (1) the vehicle’s own onboard sensors, (2) stationary sensor installations (e.g. ground radar stations), and (3) other information gathering vehicles, i.e., mobile sensors, especially with the recent emphasis on collaborative teams of autonomous vehicles with heterogeneous capabilities. Each source typically processes the raw sensor data via estimation algorithms. These estimates are then available to a decision making system such as a motion- planning algorithm. The motion-planner may use some or all of the estimates provided. There is an underlying assumption of “separation� between the motion-planning algorithm and the information about environment. This separation is common in linear feedback control systems, where estimation algorithms are designed independent of control laws, and control laws are designed with the assumption that the estimated state is the true state. In the case of motion-planning, there is no reason to believe that such a separation between the motion-planning algorithm and the sources of estimated environment information will lead to optimal motion plans, even if the motion planner and the estimators are themselves optimal. The goal of this dissertation is to investigate whether the removal of this separation, via interactive motion-planning and sensing, can significantly improve the optimality of motion- planning. The major contribution of this work is interactive planning and sensing. We consider the problem of planning the path of a vehicle, which we refer to as the actor, to traverse a threat field with minimum threat exposure. The threat field is an unknown, time- variant, and strictly positive scalar field defined on a compact 2D spatial domain – the actor’s workspace. The threat field is estimated by a network of mobile sensors that can measure the threat field pointwise. All measurements are noisy. The objective is to determine a path for the actor to reach a desired goal with minimum risk, which is a measure sensitive not only to the threat exposure itself, but also to the uncertainty therein. A novelty of this problem setup is that the actor can communicate with the sensor network and request that the sensors position themselves in a procedure we call sensor reconfiguration such that the actor’s risk is minimized. This work continues with a foundation in motion planning in time-varying fields where waiting is a control input. Waiting is examined in the context of finding an optimal path with considerations for the cost of exposure to a threat field, the cost of movement, and the cost of waiting. For example, an application where waiting may be beneficial in motion-planning is the delivery of a package where adverse weather may pose a risk to the safety of a UAV and its cargo. In such scenarios, an optimal plan may include “waiting until the storm passes.� Results on computational efficiency and optimality of considering waiting in path- planning algorithms are presented. In addition, the relationship of waiting in a time- varying field represented with varying levels of resolution, or multiresolution is studied. Interactive planning and sensing is further developed for the case of time-varying environments. This proposed extension allows for the evaluation of different mission windows, finite sensor network reconfiguration durations, finite planning durations, and varying number of available sensors. Finally, the proposed method considers the effect of waiting in the path planner under the interactive planning and sensing for time-varying fields framework. Future work considers various extensions of the proposed interactive planning and sensing framework including: generalizing the environment using Gaussian processes, sensor reconfiguration costs, multiresolution implementations, nonlinear parameters, decentralized sensor networks and an application to aerial payload delivery by parafoil

    Exploring Natural User Abstractions For Shared Perceptual Manipulator Task Modeling & Recovery

    Get PDF
    State-of-the-art domestic robot assistants are essentially autonomous mobile manipulators capable of exerting human-scale precision grasps. To maximize utility and economy, non-technical end-users would need to be nearly as efficient as trained roboticists in control and collaboration of manipulation task behaviors. However, it remains a significant challenge given that many WIMP-style tools require superficial proficiency in robotics, 3D graphics, and computer science for rapid task modeling and recovery. But research on robot-centric collaboration has garnered momentum in recent years; robots are now planning in partially observable environments that maintain geometries and semantic maps, presenting opportunities for non-experts to cooperatively control task behavior with autonomous-planning agents exploiting the knowledge. However, as autonomous systems are not immune to errors under perceptual difficulty, a human-in-the-loop is needed to bias autonomous-planning towards recovery conditions that resume the task and avoid similar errors. In this work, we explore interactive techniques allowing non-technical users to model task behaviors and perceive cooperatively with a service robot under robot-centric collaboration. We evaluate stylus and touch modalities that users can intuitively and effectively convey natural abstractions of high-level tasks, semantic revisions, and geometries about the world. Experiments are conducted with \u27pick-and-place\u27 tasks in an ideal \u27Blocks World\u27 environment using a Kinova JACO six degree-of-freedom manipulator. Possibilities for the architecture and interface are demonstrated with the following features; (1) Semantic \u27Object\u27 and \u27Location\u27 grounding that describe function and ambiguous geometries (2) Task specification with an unordered list of goal predicates, and (3) Guiding task recovery with implied scene geometries and trajectory via symmetry cues and configuration space abstraction. Empirical results from four user studies show our interface was much preferred than the control condition, demonstrating high learnability and ease-of-use that enable our non-technical participants to model complex tasks, provide effective recovery assistance, and teleoperative control

    A functional requirement model of e-learning system in secondary school in Dhi-Qar province, Iraq

    Get PDF
    Recently, the modern technology simplifies the learning programs and support communication among students, teachers, parents, and the managements of schools in educational institutions. With this development, the existing electronic learning requirements do not meet all students’ or the educational institution’s needs, due to the varying students’ needs, goals, backgrounds, knowledge levels, and learning capabilities. Furthermore, prior literature also reveals some disadvantages of current online environment systems, including lack of interaction among users and difficulty of supporting co-operative work. On the other hand, the unstable environment and the insecure situation that Iraq currently faces prompts parents to avoid sending their children to school. In addition to that, in some parts of Dhi-Qar, there are three schools running in one building, operating at different times and there is a dearth of learning materials. With regard to requirement model, there is a lack of requirement model to develop the e-learning system specifically for the secondary school. In accordance to that, this study seeks to propose a functional requirement model of e-learning system to link the stakeholders or actors of the educational process in online environment. Data were collected through interviews and questionnaires. The user requirements were obtained from literature review and interview with users. They were translated into a prototype, which was designed using an open source platform, Moodle. Finally, acceptance and usability evaluation were conducted, using questionnaires. The results reveal that the participants are satisfied with the proposed requirements, and these requirements meet all the stakeholders’ needs. Therefore, the model proposed in this study can be used for particular education institutions and other conflict areas to complement the existing traditional classrooms

    Faculty Publications and Creative Works 2003

    Get PDF
    Faculty Publications & Creative Works is an annual compendium of scholarly and creative activities of University of New Mexico faculty during the noted calendar year. It serves to illustrate the robust and active intellectual pursuits conducted by the faculty in support of teaching and research at UNM

    Embedding Intelligence. Designerly reflections on AI-infused products

    Get PDF
    Artificial intelligence is more-or-less covertly entering our lives and houses, embedded into products and services that are acquiring novel roles and agency on users. Products such as virtual assistants represent the first wave of materializa- tion of artificial intelligence in the domestic realm and beyond. They are new interlocutors in an emerging redefined relationship between humans and computers. They are agents, with miscommunicated or unclear proper- ties, performing actions to reach human-set goals. They embed capabilities that industrial products never had. They can learn users’ preferences and accordingly adapt their responses, but they are also powerful means to shape people’s behavior and build new practices and habits. Nevertheless, the way these products are used is not fully exploiting their potential, and frequently they entail poor user experiences, relegating their role to gadgets or toys. Furthermore, AI-infused products need vast amounts of personal data to work accurately, and the gathering and processing of this data are often obscure to end-users. As well, how, whether, and when it is preferable to implement AI in products and services is still an open debate. This condition raises critical ethical issues about their usage and may dramatically impact users’ trust and, ultimately, the quality of user experience. The design discipline and the Human-Computer Interaction (HCI) field are just beginning to explore the wicked relationship between Design and AI, looking for a definition of its borders, still blurred and ever-changing. The book approaches this issue from a human-centered standpoint, proposing designerly reflections on AI-infused products. It addresses one main guiding question: what are the design implications of embedding intelligence into everyday objects

    Microrobots for wafer scale microfactory: design fabrication integration and control.

    Get PDF
    Future assembly technologies will involve higher automation levels, in order to satisfy increased micro scale or nano scale precision requirements. Traditionally, assembly using a top-down robotic approach has been well-studied and applied to micro-electronics and MEMS industries, but less so in nanotechnology. With the bloom of nanotechnology ever since the 1990s, newly designed products with new materials, coatings and nanoparticles are gradually entering everyone’s life, while the industry has grown into a billion-dollar volume worldwide. Traditionally, nanotechnology products are assembled using bottom-up methods, such as self-assembly, rather than with top-down robotic assembly. This is due to considerations of volume handling of large quantities of components, and the high cost associated to top-down manipulation with the required precision. However, the bottom-up manufacturing methods have certain limitations, such as components need to have pre-define shapes and surface coatings, and the number of assembly components is limited to very few. For example, in the case of self-assembly of nano-cubes with origami design, post-assembly manipulation of cubes in large quantities and cost-efficiency is still challenging. In this thesis, we envision a new paradigm for nano scale assembly, realized with the help of a wafer-scale microfactory containing large numbers of MEMS microrobots. These robots will work together to enhance the throughput of the factory, while their cost will be reduced when compared to conventional nano positioners. To fulfill the microfactory vision, numerous challenges related to design, power, control and nanoscale task completion by these microrobots must be overcome. In this work, we study three types of microrobots for the microfactory: a world’s first laser-driven micrometer-size locomotor called ChevBot,a stationary millimeter-size robotic arm, called Solid Articulated Four Axes Microrobot (sAFAM), and a light-powered centimeter-size crawler microrobot called SolarPede. The ChevBot can perform autonomous navigation and positioning on a dry surface with the guidance of a laser beam. The sAFAM has been designed to perform nano positioning in four degrees of freedom, and nanoscale tasks such as indentation, and manipulation. And the SolarPede serves as a mobile workspace or transporter in the microfactory environment

    Feedback Linearization Techniques for Collaborative Nonholonomic Robots

    Get PDF
    Collaborative robots performing tasks together have significant advantages over a single robot. Applications can be found in the fields of underwater robotics, air traffic control, intelligent highways, mines and ores detection and tele-surgery. Collaborative wheeled mobile robots can be modeled by a nonlinear system having nonholonomic constraints. Due to these constraints, the collaborative robots arc not stabilizable at a point by continuous time-invariant feedback control laws. Therefore, linear control is ineffective, even locally, and innovative design techniques are needed. One possible design technique is feedback control and the principal interest of this thesis is to evaluate the best feedback control technique. Feedback linearization is one of the possible feedback control techniques. Feedback linearization is a method of transforming a nonlinear system into a linear system using feedback transformation. It differs from conventional Taylor series linearization since it is achieved using exact coordinates transformation rather than by linear approximations of the system. Linearization of the collaborative robots system using Taylor series results in a linear system which is uncontrollable and is thus unsuitable. On the other hand, the feedback linearized control strategies result in a stable system. Feedback linearized control strategies can he designed based on state or input, while both state and input linearization can be achieved using static or dynamic feedback. In this thesis, a kinematic model of the collaborative nonholonomic robots is derived, based on the leader-follower formation. The objective of the kinematic model is to facilitate the design of feedback control strategies that can stabilize the system and Minimize the error between the desired and actual trajectory. The leader-follower formation is used in this research since the collaborative robots are assumed to have communication capabilities only. The kinematic model for the leader-follower formation is simulated using MATLAB/Simulink. A comparative assessment of various feedback control strategies is evaluated. The leader robot model is tested using five feedback control strategies for different trajectories. These feedback control strategies are derived using cascaded system theory, stable tracking method based on linearization of corresponding error model, approximation linearization, nonlinear control design and full state linearization via dynamic feedback. For posture stabilization of the leader robot, time-varying and full state dynamic feedback linearized control strategies are used. For the follower robots using separation bearing and separation-separation formation, the feedback linearized control strategies are derived using input-output via static feedback. Based on the simulation results for the leader robot, it is found that the full state dynamic feedback linearized control strategy improves system performance and minimizes the mean of error more rapidly than the other four feedback control strategies. In addition to stabilizing the system, the full state dynamic feedback linearized control strategy achieves posture stabilization. For the follower robots, the input-output via static feedback linearization control strategies minimize the error between the desired and actual formation. Furthermore, the input-output linearized control strategies allow dynamical change of the formation at run-time and minimize the disturbance of formation change. Thus, for a given feasible trajectory, the full state feedback linearized strategy for the leader robot and input-output feedback linearized strategies for the follower robots are found to be more efficient in stabilizing the system

    Counter Unmanned Aircraft Systems Technologies and Operations

    Get PDF
    As the quarter-century mark in the 21st Century nears, new aviation-related equipment has come to the forefront, both to help us and to haunt us. (Coutu, 2020) This is particularly the case with unmanned aerial vehicles (UAVs). These vehicles have grown in popularity and accessible to everyone. Of different shapes and sizes, they are widely available for purchase at relatively low prices. They have moved from the backyard recreation status to important tools for the military, intelligence agencies, and corporate organizations. New practical applications such as military equipment and weaponry are announced on a regular basis – globally. (Coutu, 2020) Every country seems to be announcing steps forward in this bludgeoning field. In our successful 2nd edition of Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets (Nichols, et al., 2019), the authors addressed three factors influencing UAS phenomena. First, unmanned aircraft technology has seen an economic explosion in production, sales, testing, specialized designs, and friendly / hostile usages of deployed UAS / UAVs / Drones. There is a huge global growing market and entrepreneurs know it. Second, hostile use of UAS is on the forefront of DoD defense and offensive planners. They are especially concerned with SWARM behavior. Movies like “Angel has Fallen,” where drones in a SWARM use facial recognition technology to kill USSS agents protecting POTUS, have built the lore of UAS and brought the problem forefront to DHS. Third, UAS technology was exploding. UAS and Counter- UAS developments in navigation, weapons, surveillance, data transfer, fuel cells, stealth, weight distribution, tactics, GPS / GNSS elements, SCADA protections, privacy invasions, terrorist uses, specialized software, and security protocols has exploded. (Nichols, et al., 2019) Our team has followed / tracked joint ventures between military and corporate entities and specialized labs to build UAS countermeasures. As authors, we felt compelled to address at least the edge of some of the new C-UAS developments. It was clear that we would be lucky if we could cover a few of – the more interesting and priority technology updates – all in the UNCLASSIFIED and OPEN sphere. Counter Unmanned Aircraft Systems: Technologies and Operations is the companion textbook to our 2nd edition. The civilian market is interesting and entrepreneurial, but the military and intelligence markets are of concern because the US does NOT lead the pack in C-UAS technologies. China does. China continues to execute its UAS proliferation along the New Silk Road Sea / Land routes (NSRL). It has maintained a 7% growth in military spending each year to support its buildup. (Nichols, et al., 2019) [Chapter 21]. They continue to innovate and have recently improved a solution for UAS flight endurance issues with the development of advanced hydrogen fuel cell. (Nichols, et al., 2019) Reed and Trubetskoy presented a terrifying map of countries in the Middle East with armed drones and their manufacturing origin. Guess who? China. (A.B. Tabriski & Justin, 2018, December) Our C-UAS textbook has as its primary mission to educate and train resources who will enter the UAS / C-UAS field and trust it will act as a call to arms for military and DHS planners.https://newprairiepress.org/ebooks/1031/thumbnail.jp
    • …
    corecore