169 research outputs found

    Impact detection techniques using fibre-optic sensors for aerospace & defence

    Get PDF
    Impact detection techniques are developed for application in the aerospace and defence industries. Optical fibre sensors hold great promise for structural health monitoring systems and methods of interrogating fibre Bragg gratings (FBG) are investigated given the need for dynamic strain capture and multiplexed sensors. An arrayed waveguide grating based interrogator is developed. The relationships between key performance indicators, such as strain range and linearity of response, and parameters such as the FBG length and spectral width are determined. It was found that the inclusion of a semiconductor optical amplifier could increase the signal-to-noise ratio by ~300% as the system moves to its least sensitive. An alternative interrogator is investigated utilising two wave mixing in erbium-doped fibre in order to create an adaptive system insensitive to quasistatic strain and temperature drifts. Dynamic strain sensing was demonstrated at 200 Hz which remained functional while undergoing a temperature shift of 8.5 °C. In addition, software techniques are investigated for locating impact events on a curved composite structure using both time-of-flight triangulation and neural networks. A feature characteristic of composite damage creation is identified in dynamic signals captured during impact. An algorithm is developed which successfully distinguishes between signals characteristic of a non-damaging impact with those from a damaging impact with a classification accuracy of 93 – 96%. Finally, a demonstrator system is produced to exhibit some of the techniques developed in this thesis

    Unmanned Aircraft Systems in the Cyber Domain

    Get PDF
    Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming, operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions. This second edition discusses state-of-the-art technology issues facing US UAS designers. It focuses on counter unmanned aircraft systems (C-UAS) – especially research designed to mitigate and terminate threats by SWARMS. Topics include high-altitude platforms (HAPS) for wireless communications; C-UAS and large scale threats; acoustic countermeasures against SWARMS and building an Identify Friend or Foe (IFF) acoustic library; updates to the legal / regulatory landscape; UAS proliferation along the Chinese New Silk Road Sea / Land routes; and ethics in this new age of autonomous systems and artificial intelligence (AI).https://newprairiepress.org/ebooks/1027/thumbnail.jp

    Counter Unmanned Aircraft Systems Technologies and Operations

    Get PDF
    As the quarter-century mark in the 21st Century nears, new aviation-related equipment has come to the forefront, both to help us and to haunt us. (Coutu, 2020) This is particularly the case with unmanned aerial vehicles (UAVs). These vehicles have grown in popularity and accessible to everyone. Of different shapes and sizes, they are widely available for purchase at relatively low prices. They have moved from the backyard recreation status to important tools for the military, intelligence agencies, and corporate organizations. New practical applications such as military equipment and weaponry are announced on a regular basis – globally. (Coutu, 2020) Every country seems to be announcing steps forward in this bludgeoning field. In our successful 2nd edition of Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets (Nichols, et al., 2019), the authors addressed three factors influencing UAS phenomena. First, unmanned aircraft technology has seen an economic explosion in production, sales, testing, specialized designs, and friendly / hostile usages of deployed UAS / UAVs / Drones. There is a huge global growing market and entrepreneurs know it. Second, hostile use of UAS is on the forefront of DoD defense and offensive planners. They are especially concerned with SWARM behavior. Movies like “Angel has Fallen,” where drones in a SWARM use facial recognition technology to kill USSS agents protecting POTUS, have built the lore of UAS and brought the problem forefront to DHS. Third, UAS technology was exploding. UAS and Counter- UAS developments in navigation, weapons, surveillance, data transfer, fuel cells, stealth, weight distribution, tactics, GPS / GNSS elements, SCADA protections, privacy invasions, terrorist uses, specialized software, and security protocols has exploded. (Nichols, et al., 2019) Our team has followed / tracked joint ventures between military and corporate entities and specialized labs to build UAS countermeasures. As authors, we felt compelled to address at least the edge of some of the new C-UAS developments. It was clear that we would be lucky if we could cover a few of – the more interesting and priority technology updates – all in the UNCLASSIFIED and OPEN sphere. Counter Unmanned Aircraft Systems: Technologies and Operations is the companion textbook to our 2nd edition. The civilian market is interesting and entrepreneurial, but the military and intelligence markets are of concern because the US does NOT lead the pack in C-UAS technologies. China does. China continues to execute its UAS proliferation along the New Silk Road Sea / Land routes (NSRL). It has maintained a 7% growth in military spending each year to support its buildup. (Nichols, et al., 2019) [Chapter 21]. They continue to innovate and have recently improved a solution for UAS flight endurance issues with the development of advanced hydrogen fuel cell. (Nichols, et al., 2019) Reed and Trubetskoy presented a terrifying map of countries in the Middle East with armed drones and their manufacturing origin. Guess who? China. (A.B. Tabriski & Justin, 2018, December) Our C-UAS textbook has as its primary mission to educate and train resources who will enter the UAS / C-UAS field and trust it will act as a call to arms for military and DHS planners.https://newprairiepress.org/ebooks/1031/thumbnail.jp

    Unmanned Vehicle Systems & Operations on Air, Sea, Land

    Get PDF
    Unmanned Vehicle Systems & Operations On Air, Sea, Land is our fourth textbook in a series covering the world of Unmanned Aircraft Systems (UAS) and Counter Unmanned Aircraft Systems (CUAS). (Nichols R. K., 2018) (Nichols R. K., et al., 2019) (Nichols R. , et al., 2020)The authors have expanded their purview beyond UAS / CUAS systems. Our title shows our concern for growth and unique cyber security unmanned vehicle technology and operations for unmanned vehicles in all theaters: Air, Sea and Land – especially maritime cybersecurity and China proliferation issues. Topics include: Information Advances, Remote ID, and Extreme Persistence ISR; Unmanned Aerial Vehicles & How They Can Augment Mesonet Weather Tower Data Collection; Tour de Drones for the Discerning Palate; Underwater Autonomous Navigation & other UUV Advances; Autonomous Maritime Asymmetric Systems; UUV Integrated Autonomous Missions & Drone Management; Principles of Naval Architecture Applied to UUV’s; Unmanned Logistics Operating Safely and Efficiently Across Multiple Domains; Chinese Advances in Stealth UAV Penetration Path Planning in Combat Environment; UAS, the Fourth Amendment and Privacy; UV & Disinformation / Misinformation Channels; Chinese UAS Proliferation along New Silk Road Sea / Land Routes; Automaton, AI, Law, Ethics, Crossing the Machine – Human Barrier and Maritime Cybersecurity.Unmanned Vehicle Systems are an integral part of the US national critical infrastructure The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. Unmanned Vehicle (UV) Systems & Operations On Air, Sea, Land discusses state-of-the-art technology / issues facing U.S. UV system researchers / designers / manufacturers / testers. We trust our newest look at Unmanned Vehicles in Air, Sea, and Land will enrich our students and readers understanding of the purview of this wonderful technology we call UV.https://newprairiepress.org/ebooks/1035/thumbnail.jp

    Development and validation of an electronic frailty index using routine primary care electronic health record data

    Get PDF
    Background: frailty is an especially problematic expression of population ageing. International guidelines recommend routine identification of frailty to provide evidence-based treatment, but currently available tools require additional resource. Objectives: to develop and validate an electronic frailty index (eFI) using routinely available primary care electronic health record data. Study design and setting: retrospective cohort study. Development and internal validation cohorts were established using a randomly split sample of the ResearchOne primary care database. External validation cohort established using THIN database. Participants: patients aged 65–95, registered with a ResearchOne or THIN practice on 14 October 2008. Predictors: we constructed the eFI using the cumulative deficit frailty model as our theoretical framework. The eFI score is calculated by the presence or absence of individual deficits as a proportion of the total possible. Categories of fit, mild, moderate and severe frailty were defined using population quartiles. Outcomes: outcomes were 1-, 3- and 5-year mortality, hospitalisation and nursing home admission. Statistical analysis: hazard ratios (HRs) were estimated using bivariate and multivariate Cox regression analyses. Discrimination was assessed using receiver operating characteristic (ROC) curves. Calibration was assessed using pseudo-R2 estimates. Results: we include data from a total of 931,541 patients. The eFI incorporates 36 deficits constructed using 2,171 CTV3 codes. One-year adjusted HR for mortality was 1.92 (95% CI 1.81–2.04) for mild frailty, 3.10 (95% CI 2.91–3.31) for moderate frailty and 4.52 (95% CI 4.16–4.91) for severe frailty. Corresponding estimates for hospitalisation were 1.93 (95% CI 1.86–2.01), 3.04 (95% CI 2.90–3.19) and 4.73 (95% CI 4.43–5.06) and for nursing home admission were 1.89 (95% CI 1.63–2.15), 3.19 (95% CI 2.73–3.73) and 4.76 (95% CI 3.92–5.77), with good to moderate discrimination but low calibration estimates. Conclusions: the eFI uses routine data to identify older people with mild, moderate and severe frailty, with robust predictive validity for outcomes of mortality, hospitalisation and nursing home admission. Routine implementation of the eFI could enable delivery of evidence-based interventions to improve outcomes for this vulnerable group

    Cyber-Human Systems, Space Technologies, and Threats

    Get PDF
    CYBER-HUMAN SYSTEMS, SPACE TECHNOLOGIES, AND THREATS is our eighth textbook in a series covering the world of UASs / CUAS/ UUVs / SPACE. Other textbooks in our series are Space Systems Emerging Technologies and Operations; Drone Delivery of CBNRECy – DEW Weapons: Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD); Disruptive Technologies with applications in Airline, Marine, Defense Industries; Unmanned Vehicle Systems & Operations On Air, Sea, Land; Counter Unmanned Aircraft Systems Technologies and Operations; Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets, 2nd edition; and Unmanned Aircraft Systems (UAS) in the Cyber Domain Protecting USA’s Advanced Air Assets, 1st edition. Our previous seven titles have received considerable global recognition in the field. (Nichols & Carter, 2022) (Nichols, et al., 2021) (Nichols R. K., et al., 2020) (Nichols R. , et al., 2020) (Nichols R. , et al., 2019) (Nichols R. K., 2018) (Nichols R. K., et al., 2022)https://newprairiepress.org/ebooks/1052/thumbnail.jp

    Space Systems: Emerging Technologies and Operations

    Get PDF
    SPACE SYSTEMS: EMERGING TECHNOLOGIES AND OPERATIONS is our seventh textbook in a series covering the world of UASs / CUAS/ UUVs. Other textbooks in our series are Drone Delivery of CBNRECy – DEW Weapons: Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD); Disruptive Technologies with applications in Airline, Marine, Defense Industries; Unmanned Vehicle Systems & Operations On Air, Sea, Land; Counter Unmanned Aircraft Systems Technologies and Operations; Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets, 2nd edition; and Unmanned Aircraft Systems (UAS) in the Cyber Domain Protecting USA\u27s Advanced Air Assets, 1st edition. Our previous six titles have received considerable global recognition in the field. (Nichols & Carter, 2022) (Nichols et al., 2021) (Nichols R. K. et al., 2020) (Nichols R. et al., 2020) (Nichols R. et al., 2019) (Nichols R. K., 2018) Our seventh title takes on a new purview of Space. Let\u27s think of Space as divided into four regions. These are Planets, solar systems, the great dark void (which fall into the purview of astronomers and astrophysics), and the Dreamer Region. The earth, from a measurement standpoint, is the baseline of Space. It is the purview of geographers, engineers, scientists, politicians, and romantics. Flying high above the earth are Satellites. Military and commercial organizations govern their purview. The lowest altitude at which air resistance is low enough to permit a single complete, unpowered orbit is approximately 80 miles (125 km) above the earth\u27s surface. Normal Low Earth Orbit (LEO) satellite launches range between 99 miles (160 km) to 155 miles (250 km). Satellites in higher orbits experience less drag and can remain in Space longer in service. Geosynchronous orbit is around 22,000 miles (35,000 km). However, orbits can be even higher. UASs (Drones) have a maximum altitude of about 33,000 ft (10 km) because rotating rotors become physically limiting. (Nichols R. et al., 2019) Recreational drones fly at or below 400 ft in controlled airspace (Class B, C, D, E) and are permitted with prior authorization by using a LAANC or DroneZone. Recreational drones are permitted to fly at or below 400 ft in Class G (uncontrolled) airspace. (FAA, 2022) However, between 400 ft and 33,000 ft is in the purview of DREAMERS. In the DREAMERS region, Space has its most interesting technological emergence. We see emerging technologies and operations that may have profound effects on humanity. This is the mission our book addresses. We look at the Dreamer Region from three perspectives:1) a Military view where intelligence, jamming, spoofing, advanced materials, and hypersonics are in play; 2) the Operational Dreamer Region; whichincludes Space-based platform vulnerabilities, trash, disaster recovery management, A.I., manufacturing, and extended reality; and 3) the Humanitarian Use of Space technologies; which includes precision agriculture wildlife tracking, fire risk zone identification, and improving the global food supply and cattle management. Here’s our book’s breakdown: SECTION 1 C4ISR and Emerging Space Technologies. C4ISR stands for Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance. Four chapters address the military: Current State of Space Operations; Satellite Killers and Hypersonic Drones; Space Electronic Warfare, Jamming, Spoofing, and ECD; and the challenges of Manufacturing in Space. SECTION 2: Space Challenges and Operations covers in five chapters a wide purview of challenges that result from operations in Space, such as Exploration of Key Infrastructure Vulnerabilities from Space-Based Platforms; Trash Collection and Tracking in Space; Leveraging Space for Disaster Risk Reduction and Management; Bio-threats to Agriculture and Solutions From Space; and rounding out the lineup is a chapter on Modelling, Simulation, and Extended Reality. SECTION 3: Humanitarian Use of Space Technologies is our DREAMERS section. It introduces effective use of Drones and Precision Agriculture; and Civilian Use of Space for Environmental, Wildlife Tracking, and Fire Risk Zone Identification. SECTION 3 is our Hope for Humanity and Positive Global Change. Just think if the technologies we discuss, when put into responsible hands, could increase food production by 1-2%. How many more millions of families could have food on their tables? State-of-the-Art research by a team of fifteen SMEs is incorporated into our book. We trust you will enjoy reading it as much as we have in its writing. There is hope for the future.https://newprairiepress.org/ebooks/1047/thumbnail.jp

    Plotting the motivation of student volunteers in sports-based outreach work in the North East of England

    Get PDF
    This paper examines the evolution of student volunteers’ motivation during their participation in a sports-based outreach project and how their experiences during the programme serve to influence their commitment and retention to it. The Sport Universities North East England (SUNEE) project is a university-led community outreach initiative that provides the region's student volunteers with vast opportunities to gain both experience and qualifications as sports coaches, mentors and leaders by working with a range of hard-to-reach groups. This work draws on qualitative data generated from semi-structured interviews (n = 40) and describes a sequence of motivational transitions undergone by student volunteers over the course of their involvement in the project. In order to illustrate this, the paper applies the socio-psychological framework of Self-Determination Theory (SDT) to not only index the type of motivations that compel students to volunteer on the SUNEE project, but to also track motivational adaptation and reveal the features occurring within the project, which serve to either facilitate volunteer motivation or retention (Deci & Ryan, 1985, 2000). By using the example of the SUNEE project, this research demonstrates how students’ motivation to volunteer changes from the extrinsic (i.e., instrumental reasons such as enhancing one's employability profile) to the intrinsic (i.e., enjoying the experience) motivations the longer the person has taken part in the project. The findings demonstrate the utility of the SDT as a framework with which to understand student motivation to volunteer within a university-led sports-based community outreach setting. The theoretical contributions of the study to the literature on student volunteering are outlined, and implications are drawn for practice and future research

    New 10Be exposure ages improve Holocene ice sheet thinning history near the grounding line of Pope Glacier, Antarctica

    Get PDF
    Evidence for the timing and pace of past grounding line retreat of the Thwaites Glacier system in the Amundsen Sea embayment (ASE) of Antarctica provides constraints for models that are used to predict the future trajectory of the West Antarctic Ice Sheet (WAIS). Existing cosmogenic nuclide surface exposure ages suggest that Pope Glacier, a former tributary of Thwaites Glacier, experienced rapid thinning in the early to mid-Holocene. There are relatively few exposure ages from the lower ice-free sections of Mt. Murphy (<300 m a.s.l.; metres above sea level) that are uncomplicated by either nuclide inheritance or scatter due to localised topographic complexities; this makes the trajectory for the latter stages of deglaciation uncertain. This paper presents 12 new 10Be exposure ages from erratic cobbles collected from the western flank of Mt. Murphy, within 160 m of the modern ice surface and 1 km from the present grounding line. The ages comprise two tightly clustered populations with mean deglaciation ages of 7.1 ± 0.1 and 6.4 ± 0.1 ka (1 SE). Linear regression analysis applied to the age–elevation array of all available exposure ages from Mt. Murphy indicates that the median rate of thinning of Pope Glacier was 0.27 m yr−1 between 8.1–6.3 ka, occurring 1.5 times faster than previously thought. Furthermore, this analysis better constrains the uncertainty (95 % confidence interval) in the timing of deglaciation at the base of the Mt. Murphy vertical profile (∼ 80 m above the modern ice surface), shifting it to earlier in the Holocene (from 5.2 ± 0.7 to 6.3 ± 0.4 ka). Taken together, the results presented here suggest that early- to mid-Holocene thinning of Pope Glacier occurred over a shorter interval than previously assumed and permit a longer duration over which subsequent late Holocene re-thickening could have occurred
    corecore