Embry-Riddle partners with private and public entities to assist in developing solutions to today's and tomorrow's aeronautical and aerospace problems. Here at the world's largest aviation-oriented university, our focus on applied research is unique.
Filter by



51-60 of 189 results

  • Improving Undergraduate Student Persistence, Performance, and Perspectives in Online STEM Courses via a Community of Inquiry and Decreasing Students' Cognitive Load

    PI Emily Faulconer

    CO-I Darryl Chamberlain

    CO-I Beverly Wood

    ​This project aims to serve the national interest in high-quality undergraduate STEM education by designing and studying a pilot program to improve online discussion forums in STEM courses. The goal of the project is to positively impact student persistence, performance, and perspectives in asynchronous online STEM courses.

    This project aims to serve the national interest in high-quality undergraduate STEM education by designing and studying a pilot program to improve online discussion forums in STEM courses. The overall goal of the project is to improve students’ performance and persistence in online STEM courses, while simultaneously improving their attitudes toward STEM itself. To achieve this goal, the project focuses on introducing practices that reduce extraneous cognitive load, while also improving educators’ instructional and social presence, and students’ social and cognitive presence. The project will study a specific practice: a faculty-student learning community that uses discussion forums and other online components to minimize non-relevant technical complexity. The project intends to produce guidelines for creating a productive online learning community that does not require additional effort that is unrelated to the intended learning. The project will provide professional development to support instructors’ implementation of the guidelines. It is anticipated that the guidelines may be transferable to other online STEM courses. The projects’ data about student retention, persistence, and attitudes toward STEM will provide a base for additional research on online STEM learning.

    The goal of the project is to positively impact student persistence, performance, and perspectives in asynchronous online STEM courses. It expects to do to by supporting learning communities in ways that mitigate the impacts of extraneous cognitive load. To this end, the project will design and test a pilot program for infusing the components of the Community of Inquiry framework into asynchronous course discussions, including a best practices redesign of the discussion prompts, rubrics, and instructions by subject matter experts and instructional designers. The pilot program will use existing institutional structures to support the redesign and to provide faculty with the related professional development. In a mixed-methods research study, information will be collected about students’ academic success (course grades, discussion transcript analysis), persistence (withdrawal rate), and perspectives (surveys on STEM attitudes, cognitive load, and community of inquiry). These data will be complemented by results from focus group interviews. The project intends to generate a Community of Inquiry – Cognitive Load framework for asynchronous online STEM courses that supports student outcomes by promoting social, teaching, and cognitive presences via the Community of Inquiry, while mitigating cognitive load that is disconnected from disciplinary learning. The framework may be transferrable and scalable to other asynchronous online STEM courses. By identifying reasons for persistence and retention in online STEM courses, the project expects to lay the foundation for further research on interventions that improve student outcomes in online STEM courses. The NSF IUSE:EHR Program supports research and development projects to improve the effectiveness of STEM education for all students. Through the Engaged Student Learning track, the program supports the creation, exploration, and implementation of promising practices and tools.

    NSF Award Search: Award Abstract #2044302

    Categories: Faculty-Staff

  • Identifying Cost-Effective Security Barrier Technologies for K-12 Schools: An Interdisciplinary Evaluation

    PI Thomas Foley

    CO-I Reginald Parker

    CO-I Michele Gazica

    CO-I Brooke Shannon

    CO-I Erin Bowen

    CO-I Muna Slewa

    CO-I Michael Brady

    CO-I Richard Rodriguez

    CO-I Perry Feder

    This study proposes to test and collect data on the effectiveness of commonly used physical security systems in delaying intruders. The purpose of this study is to support the design of better physical security systems for schools. The study will also gather data on parent and teacher perceptions of the quality of security in schools.

    We are all going to be okay, there are bad guys out there now, and now we have to wait for the good guys

    ~Kaitlin Roig, First Grade Teacher, Sandy Hook Elementary School[1]

    Statement of the Problem

    The tragic mass-murder at Sandy Hook Elementary School caused a massive increase in school security spending across the United States.[2] An unfortunate by-product of increased spending on security in schools has been an increase in poorly thought-out, and sometimes ridiculous,[3] physical security products being marketed to schools and school districts looking to improve security.[4] Too often school officials base security buying decisions on fear rather than sound security risk management principles and divert funds that could otherwise be spent on students.[5] School administrators, who lack knowledge of physical security design,[6] often rely on unqualified “security experts” or security product salespeople for guidance on which security products to use in their schools.[7] Previous studies of school security technologies have identified available school security products and ascertained school officials’ views of which technologies they need, but none have identified the most cost-effective and practical security technologies. [8] If school officials know the best security technologies to fix security vulnerabilities in their schools, they will be more receptive to adopting those security measures and earmarking funds for their purchase. They will also be less likely to make poor buying decisions based on emotion.[9]

    In addition, there is a substantial lack of scholarly research into school security technologies that included experienced security practitioners on the research team. This research proposal will be unique and far more applicable to the current public school environment because it will have three security practitioners in the research team, working alongside behavioral scientists and engineers. This scientist-practitioner approach to school safety is the best way to comprehensively and efficiently address these costly and potentially high-risk scenarios.

    After identifying the best technologies for each type of school, the research team will create a guidebook that educators, with little to no security knowledge, can reference before buying security products. This research will be brand neutral and will make no specific manufacturer recommendations, rather it will evaluate the best technologies for improving school security at the lowest cost.

    Review of Relevant Literature

    After the mass shooting at Sandy Elementary School, the State of Connecticut created two commissions to examine ways to improve school security. In June 2014, the School Safety Infrastructure Council issued its report, which recommends schools use an emergency response time analysis to guide physical security design in schools.[10] In March 2015, the Sandy Hook Advisory Commission issued its final report supporting the recommendations of the School Safety Infrastructure Council.[11] In April 2015, the Rand Corporation surveyed school safety experts and discovered:

    …a key distinction in thinking about safety is police response times—roughly under five minutes (i.e., urban districts) and over five minutes (i.e., suburban/rural districts)—since response times dictate how self-sufficient schools need to be in response to crisis situations such as cases of active shooters.

    Combining penetration time analysis with emergency response time analysis is a fundamental principle of physical security design—delaying an attacker long enough for a response force to arrive and stop the attack.[12] Although both reports recommend using an emergency response time analysis to guide school physical security design, neither report gives a practical model for performing this analysis nor offers delay time data for physical security barriers. Without knowing how long various security devices will delay an intruder, there is no easy way for school administrators to use emergency response time analysis data to pick the best products. Schools with long emergency response times need more robust physical security measures than schools with much shorter response times; and the present research proposes to address this issue.

    In A Comprehensive Report on School Safety Technology, researchers from Johns Hopkins University cataloged available physical security products for schools. Unfortunately, it did not show which products are the most feasible, affordable, and effective for K-12 schools throughout the United States. Our research team believes that a key problem with the Hopkins report is the lack of security practitioners on the research team to help filter-out security technologies that are inappropriate, impractical, or infeasible. For example, the Hopkins report discussed pneumatic vehicle barriers, which are an effective solution to protect high-risk terror targets from suicide vehicle attacks, but are expensive and unnecessary for schools.[13] The Hopkins report also discussed bullet resistant doors and door coverings, citing the death of a professor at Virginia Tech as an example of someone being shot and killed through a door.[14] We think this misses the key take-away of that incident. The professor was blocking the door with his body because he could not lock the classroom door, which is the primary reason he was shot.[15] In another classroom, students laid on the floor and blocked the door with their feet, the shooter fired several rounds through the door but no one was injured and the shooter never entered the room.[16] This report also addressed lock and window technologies, but it did not assess penetration delay. School safety research that takes into account both the science of security as well as the practical, day-to-day cost-benefit considerations of real schools, such as we propose, is essential and not yet conducted.

    In 1978, Sandia National Labs published a report titled, Barrier Technology Handbook, with penetration time test results against various barrier technologies used in nuclear facilities as guidance for physical security managers.[17] The Nuclear Regulatory Commission shared this report with all nuclear reactor operators as a reference to the latest available security technologies.[18] Later, in 1999, Sandia published another report, The Appropriate and Effective Use of Security Technologies in U.S. Schools: A Guide for Schools and Law Enforcement Agencies, which provided information on various security technologies and the suitable use of those technologies to counter specific security threats. The guide included information on the limits of each technology. This report mostly focused on video surveillance and metal detection technologies. It also briefly discussed access control approaches and duress alarms, but did not address doors, windows, or locks. Embry-Riddle Aeronautical University – Prescott is proposing research that will result in similar handbooks for K-12 schools but focusing on emergency response and penetration times in the school setting, taking into account cost considerations and emergency response times in real-world security technology application. Currently, school administrators have no guidance on which technologies are most cost-effective and practical for use in schools. Identifying Cost-Effective Security Barrier Technologies for K-12 Schools: An Interdisciplinary Evaluation will fill this void using a team of security practitioners, mechanical engineers, and industrial psychologists to identify the most feasible, cost-effective, and practical security technologies to delay intruders in K-12 schools. In addition, we have not found any scholarly research into school security technologies that included experienced security practitioners in the research team. Having three security practitioners on the research team will make this study unique.

    Another important aspect of our research is understanding various stakeholders’ perceptions of school safety, especially in regards to various technology. Many surveys have assessed actual school violence or school safety. In 2015, The National Center for Education Statistics identified Twenty-three indicators of school crime and safety.[19] Their only measure of students’ perceptions of safety was asking if students were afraid of being attacked at school. We feel that this measure can be expanded to capture more about their fear, including type of attack and responder times. In another study, researchers looked at how the intersection of school violence and school climate affect student, staff, and parental perceptions of safety.[20] Interestingly, this study showed that perceptions of safety were likely more related to school climate than actual violence. Several studies cover stakeholders’ perceptions of Safety Resource Officers (SROs), and findings suggest that SROs fail to make people feel safer.[21] In another study, researchers found that metal detectors, the only technology measured, did not affect risk perception but did lower fear of serious violence.[22] Our study will cover a broader range of perception variables and focus specifically on the types of technologies that not only increase actual safety but increase perceptions of safety.

    Another unique aspect of this research study is that researchers will not look at K-12 schools as a uniform group. The research will examine the appropriateness of security technologies based on the age ranges of students served by the school. In most school districts, schools are organized by the ages and developmental levels of students. Most school districts organize schools into elementary (K-6), junior high (7-9), and high schools (10-12), or elementary (k-5), middle schools (6-9), and high schools (10-12). Some early childhood education centers provide preschool through second grade education.[23]

    The students in each type of school differ in intellectual development, how they are taught, student behavior, and student dependence on adults. Because younger children cannot communicate “stranger danger”[24], schools with younger children face different security challenges than schools with older students. Jean Piaget, a pioneer of childhood development, developed a four-stage theory to describe cognitive growth through the lifespan: (1) sensorimotor (ages 0 to 2); (2) preoperations (ages 2 to 7); (3) concrete operations (ages 8 to 12); and (4) formal operations (ages 12 and over).[25] For K-12 schools, students will be in stages 2 to 4. Preoperational children (Stage 2) cannot grasp that a person’s core-self stays the same despite changes in external appearance, they believe everything is alive, and human beings make everything in nature.[26] Further, understanding and applying rules is difficult at this age because it requires abstract conceptualization, a skill that preoperational children do not have. In addition, information-processing functions evolve as children grow. Executive functions, inhibition, working memory, cognitive flexibility, and planning ability all develop as a child ages—all of which have implications for a child’s self-preservation responses during an emergency.[27] For example, young students are less able to assess a situation and make sound survival decisions, and they are physically less able to flee or defend themselves during an active-shooter event than older students. The implications of these differences for physical security design are that barriers and delay time become more important the younger the students.

    In elementary schools, students stay in one classroom most of the day only leaving the room for recess, lunch, physical education, and sometimes music class. This contrasts significantly with high schools where students are mobile, moving autonomously between classrooms every hour, driving themselves to and from school, and maybe free to leave campus during the lunch hour.

    Between elementary schools and high schools are junior high and middle schools. These schools serve as a transition from elementary school to high school. Students move between classrooms but several core classes may be held in the same classroom so they do not move often as high school students. These students eat lunch at school and are too young to drive so they are less mobile and independent than high school students. They are however, more mobile and independent than elementary school students. These differences matter for physical security design since security should provide protection while minimally interfering with peoples’ ability to go about their daily business. In addition, differences in students’ social, emotional, and intellectual development influences the origin of threats to schools. Threats to elementary schools are mostly external while they are mostly internal in junior high and high schools. Problems with interpersonal violence and drug use increase as students move on to junior high and high school.

    For these reasons, the research team will view the research results from three different perspectives: the needs of early childhood education schools, the needs of schools with early-adolescent students, and schools with mid- to late- adolescent students. The tested technologies may be useful in all schools, but the research team will discover the best technologies for each type of school. The team also recognizes the differences among rural, suburban, and urban schools as well as differences between schools in wealthy and low-income communities. Therefore, the team will also develop recommendations based on school location (e.g., rural versus urban) and cost (low-cost/high value versus high cost/high value).

    The results of this research will serve as the basis for the security buying guidebook mentioned earlier. This research will be brand neutral and will make no specific manufacturer recommendations, rather it will evaluate the best technologies for improving school security at the lowest cost.

    Purpose and Objectives

    Access control, such as locked or monitored doors, is the most common security measure used in American schools. During the 2013-2014 school year 95% of elementary schools, 95% of middle schools, and 89% of high schools report controlling access during the school day.[28] The percentage of schools using access control increased 18% percent over the 14-year period between 2000 and 2014.[29] This research will focus on doors, locks, and windows because access control is most common security measure used in K-12 schools.

    This study will be the first large interdisciplinary applied study of school security technologies to look at physical security barrier delay-times for use in schools. The study will be unique in that it will have three board certified security practitioners on a research team that also includes industrial psychologists and mechanical engineers.

    The research objectives are:

    ·       Conduct penetration testing to gather delay time data for commonly used doors in schools;

    ·       Penetration testing of common window glazing materials and smash resistant films for use in schools;

    ·       Test the effectiveness of door blocking devices marketed to schools;

    ·       Collect data on the type, condition, appropriateness and cost-effectiveness of security devices currently used in schools;

    ·       Examine teacher, staff, and parents’ (school populations) perceptions of security in their schools as well as perceived needs for additional security technologies.

    ·       Create a guidebook for school officials and law enforcement that will simplify using emergency response times to guide school security design

    ·       Disseminate the research findings to school administrators, security practitioners, and researchers through target audience appropriate means such as peer reviewed journals, trade magazines, guidebooks, and presentations to professional and academic conferences

    ·       Archive data for use by the research community

    The ultimate goal of this research is to create guidelines school administrators, law enforcement, and security practitioners can use when designing or upgrading security measures in schools. This guidebook will be key to adopting an approach to school security design that uses emergency response time analysis because it will provide data on how long these barrier devices will delay an intruder. The guidebook will also provide information on cost-effectiveness that will help school administrators determine security spending priorities and avoid wasteful spending.

    Project Design and Implementation

    Researchers from Embry-Riddle Aeronautical University – Prescott’s College of Security and Intelligence, College of Engineering, and Behavioral & Safety Sciences Department will evaluate security technologies for: feasibility, durability, effectiveness, practicality, and cost-effectiveness, and will assess how well students and staff can use or interact with those technologies. For example, during laboratory testing a particular door material may prove to be resilient against a forced entry attack, but because of the material’s mass, small children would not be able to open the doors making them impractical for use in elementary schools.

    The research team will test technologies based on the fundamental security principles of delay and mitigation. A good physical security design will delay an attacker long enough for a response force to arrive and neutralize the threat–mitigating loss during an attack. Delay is achieved by using physical barriers such as doors, windows, and locks. In this study, the research team will assess how long those technologies will delay an attacker from accessing a protected space rather than whether the device can stop bullets and prevent any injuries. Attack resilient materials can prevent, discourage, or delay burglars or vandals trying to enter a school building after hours—mitigating the risk of loss from theft or destruction. These materials can provide schools with security against multiple threats beyond that of an armed intruder.

    The research team has identified 23 school districts within the State of Arizona to study as part of this research. These 23 school districts have 447 schools, serve 299,295 K-12 students, and employ 32,107 faculty and staff. To ensure the study has broad scalability to schools nationwide the school districts are diverse in location, student demographics, and financial resources. The districts range from large urban school districts to small rural districts to schools on Native American reservations. We identified these school districts by considering several variables: number of students, location, racial and ethnic diversity, community size, and annual budget. For example, we chose school districts on Native American chosen based on distance from large urban areas, sources of income (i.e., casinos, mining, power generation etc.), and geographic size.

    This research will consist of four parts:

    1.     surveying teachers, staff, and parents' perceptions of security;

    2.     physically touring schools identify which security technologies are in use;

    3.     comparing parent and staff perceptions of security with those of security experts; and,

    4.     penetration testing of commonly used security barriers.

    Part I will survey teachers, staff, and administrators (school populations) to discover how they perceive security in their schools. The surveys will gather data about how school populations perceive threats and the need for security technologies to mitigate those threats in their schools. Researchers will analyze the collected data to see if there are differences in perceptions among various groupings such as rural versus urban, students versus staff, poorer districts versus wealthy districts, etc. Researchers will also use this data to determine school populations’ perceptions are in line with actual risks, and whether perceived need for security matches the capabilities of those security technologies. To evaluate security perceptions effectively, this study will use a multimodal research design to gather converging evidence in support of the school security guidebook design. This will include risk perception assessments; overall attitudes toward safety and security; and perceived and actual security vulnerabilities.

    Researchers will collect data using online or written surveys (for lower income areas that may lack Internet access) and the surveys will be available in the Spanish and Diné (Navajo) languages. Participation is voluntary and the surveys will not collect personally identifiable information as part of the research. Research survey forms will use unique identifier numbers to distinguish individual survey responses; however, the identifier numbers will not connect to participant’s identities. Participants will receive informed consent forms before engaging in the study.

    Part II of the research will involve having board certified security experts touring schools and conducting physical security surveys to inventory existing security technologies. During the physical security surveys, the security experts will identify threats and vulnerabilities at each school as well as what security technologies are best suited to mitigate any identified threats or vulnerabilities. Data gathered in Parts I and II of the project will be analyzed and compared to identify security issues at participating schools, perceptual disconnects between laypersons and security experts, and which security technologies will have the broadest application to most schools.

    Part III of the project will involve testing security barrier products. This part will involve, designing product testing protocols, buying materials, product testing, and analysis of test data. The research team will test: classroom doors, sidelight glazing materials, smash resistant window films, and aftermarket door blocking technologies. Researchers will test commonly used classroom doors (solid birch, 16-gauge and 18-gauge steel clad) against 5.56 mm, 9 mm, 357 Magnum munitions, and 12 gauge 00 Buckshot combined with brute-force entry to discover the assailant delay time of each door. The assailant delay time will be determined using the U.S. Army definition of “the time it takes to make a 96-square-inch (man-sized) opening with the least dimension greater than 6 inches in a construction assembly using a given set of tools.”[30] Researchers will also assess how door materials react to ballistic impacts to assess indirect safety issues such as material spalling that could cause injuries to room occupants. Data gathered during this testing will be used to identify the most cost-effective security barrier technologies for use in K-12 schools.

    Researchers will also test window glazing materials to discover the penetration delay times of those glazing materials both without and with smash resistant films applied to the glazing. The research team will use two criteria for penetration time. The first being the time needed to create a hole large enough to allow passage of a person’s arm. Many classrooms have sidelights or doors with windows making this test protocol necessary since an attacker could reach inside the classroom and unlock the door during an attack. The second penetration time criteria will be the same U.S. Army criteria used for the door testing: the time necessary to create a 96 square inch hole in the material. Video of all penetration tests will be recorded from two angles for later review and analysis.

    We understand these materials will not stop bullets and will not be testing for bullet resistance. Rather, we will test the resilience of these barrier technologies against ballistic and brute force to determine how long they will keep an intruder out of a protected area. This delay may reduce the number of casualties during a school shooting event.

    Capabilities and Competencies

    The research team is ideally positioned to conduct the research proposal outlined above. Professor Tom Foley is a faculty member in the College of Security & Intelligence, the first such College within the United States. He holds a Doctor of Jurisprudence and is board certified in security management (Certified Protection Professional) and physical security (Physical Security Professional). He has consulted for numerous schools in the Prescott and Phoenix areas, conducting physical security assessments, helping to create emergency response plans, and suggesting low- or no- cost methods to improve school safety. Professor Foley is widely recognized as a school security expert and has been interviewed by ABC15, CBS5, NBC, NPR, KTAR radio, and various print media. He organized a symposium on school shootings attended by school administrators, emergency planners, law enforcement officers, and private security professionals from throughout Arizona. He is a member of ASIS International, the Association of Threat Assessment Professionals, and the National Domestic Preparedness Coalition. He is a past member of the ASIS International School Safety and Security Council and a current member of the ASIS International/National Fire Protection Association Active Shooter Initiative. Professor Foley is also a member of Embry-Riddle’s Behavioral Intervention Team and Emergency Response Team.

    Dr. Erin Bowen is Director of the Robertson Safety Institute as well as Chair of the Behavioral & Safety Sciences Department at Embry-Riddle. She holds a Ph.D. in Industrial/Organizational Psychology, a doctoral minor in Research Methodology, and focuses her research on the cognitive/behavioral components of safety and evidence-based approaches to safety training. She also has extensive experience in human subjects research protection and Institutional Research Board protocols, and served as a member on the University IRB. In addition, Dr. Bowen has expertise in the design, implementation, and assessment of organizational training programs as well as the development and validation of survey and assessment instruments. Her expertise in aviation safety and psychology has been featured nationally on NBC’s “Meet the Press”, other local and national television and print media, as well as internationally on BBC Radio, CBC, and CTV, and other venues.

    Dr. Michele Gazica is an Assistant Professor in the Behavioral and Safety Sciences Department at Embry-Riddle Aeronautical University. She has extensive research experience in the areas of occupational health and safety as well as survey development and validation. Dr. Gazica has additional expertise in legal analysis, sophisticated data analysis, and test and measurement theory. Dr. Gazica received her PhD in Industrial/Organizational Psychology from the University of South Florida and her Juris Doctor from the University of Florida. Before choosing to pursue her PhD, she practiced law for seven years.

    Professor Reginald Parker is an assistant professor in the College of Security and Intelligence at Embry-Riddle Aeronautical University in Prescott, Arizona. Professor Parker has extensive security experience and is board certified in security management as a Certified Protection Professional (CPP). Professor Parker is also a certified Professional Project Manager (PMP) by the Project Management Institute and specializes in project scheduling and cost control to maintain budget and on time completion metrics of multimillion dollar programs. He teaches project management methods class at ERAU and prepares students for the PMP professional exam. He is a member of ASIS International, the Project Management Institute, FBI Infragard Program, and the Homeland Security Trusted Partners program.

    Brooke Shannon is an Assistant Professor of Intelligence and Security and Intelligence at Embry-Riddle Aeronautical University in Prescott, Arizona. She has a PhD in Information Science and Learning Technologies with a doctoral minor in Educational Leadership and Policy Analysis with research interests in content analysis and phenomenology. She has a Masters in Applied Behavioral Science and served as in the United States Air Force as a Behavioral Influences Analyst at the National Air and Space Intelligence Center.

    Michael Brady, MA, CPP, is the Director of Campus Safety & Security at Embry-Riddle Aeronautical University – Prescott. As a Certified Protection Professional (CPP) he is Board Certified in Security Management by ASIS International. Across his nearly 40 years in the protection field, Director Brady has served as an in-house security and safety professional, as a consultant, and as an executive in the contract guarding industry. He has been applying workplace violence prevention, mitigation, and response strategies since the late 1980s. Trained by both the Center for Personal Protection and Safety and the ALICE Institute, he has made many presentations on how to detect, prevent, and mitigate targeted violence in schools and the workplace.  Director Brady has taught security management courses as an adjunct instructor for Saint Mary’s University of Minnesota and University of South California – Santa Cruz. He is a member of ASIS International and the International Association of Campus Law Enforcement Administrators (IACLEA). Director Brady is also a member of Embry-Riddle – Prescott’s Behavioral Intervention Team and Emergency Operations Team.

    Dr. Muna Slewa is an assistant professor in the Mechanical Engineering Department at Embry-Riddle Aeronautical University – Prescott. Dr. Slewa holds two Ph.D. degrees and has over 10-years of university teaching experience. She has conducted research in large laboratories, including the Los Alamos National Lab. Dr. Slewa’s research expertise includes: microscopic analysis using Scanning Electron Microscopes, EBSD microscopes, and XRD refraction. Her research includes investigating phase change in A36 steel as a result of high-speed impact loading, plastic deformation of steel plates under high-impact loading, and she was a researcher on the Fischer Space Pen. Dr. Slewa is a member of the National Society of Leadership and Success.

    Kusay Rafo is the Owner and CEO of Rafail CAD & Engineering in Ontario, Canada. Mr. Rafo holds a master’s degree in mechanical engineering/welding/manufacturing engineering, and explosive welding. He is a licensed professional engineer and he serves as an executive member of the Canadian Welding Association. Mr. Rafo has experience in industrial structural engineering, custom machinery design failure analysis, high impact/explosive welding, and mechanical failure analysis. He is also experienced in welding metallurgy, metallography, and microstructure analysis using optical and scanning electron microscopes, as well as welding inspection non-destructive testing. Mr. Rafo has more than 10-years’ of experience teaching university level courses.

    Embry-Riddle Aeronautical University is a historic leader in aviation education that has evolved into a leader in engineering, security, and safety. Resources available at the Prescott, AZ campus include space and skill for test bed design, data analysis software, and security knowledge and expertise not typically available to public school systems interested in performing similar research.

    Management Plan and Organization

    This project has been funded by a grant from the National Institute of Justice (NIJ) in the amount of $770,000 and began on January 15, 2018 and will be completed on December 31, 2019. The research team consists of one principal investigator, seven co-investigators, three graduate research assistants, and three undergraduate assistants. Tom Foley is the principal investigator and Reg Parker will serve as the project manager. The behavioral science portion of the research will be conducted by Dr. Erin Bowen and Dr. Michelle Gazica with two graduate research assistants. Dr. Muna Slewa and Kusay Rafo will conduct the material testing and analysis portion of the project with help from the rest of the research team as needed. Kusay Rafo will create CAD drawings of testing layouts and testbeds in addition to providing his materials testing and failure analysis expertise to the team. The physical inspection and inventory of security devices currently in use will be conducted by Tom Foley, Reg Parker, Michael Brady, and one graduate research assistant with help from other members of the team. Dr. Brooke Shannon will code and archive data, assist in statistical analysis, and oversee the dissemination of the research results. The risk of project delay because of loss of a team member is mitigated by skill redundancies among the researchers.

    Potential Impact

    The potential impact of the proposed research is high. Not only is the project filling a significant gap in the research and practice literature for school safety and security, but it is doing so in a way that integrates scientific rigor with real-world practicality. The project design takes advantage of the significant resources of the College of Security & Intelligence, College of Engineering, and the Robertson Safety Institute at Embry-Riddle as leaders in the science and practice of security and safety.

    This research will provide a basis for emergency response time based on the physical security design in schools, which has the potential to create a more structured and rational approach to school security technology spending. Such an approach could lead to selecting more cost-effective security technologies and physical security designs that best meet the unique needs of each school regardless of location. This research will help rural schools to layer security barrier technologies to increase delay and compensate for longer police response times. It will also help urban schools avoid buying too many security barrier technologies relative to police response times. As a matter of public policy, creating better guidance on the proper application of security barrier technologies will reduce wasteful spending and increase security value per dollar spent and make for a safe environment for our nation’s school-going population.

    Physical security is an under researched area of school security. As described earlier in this proposal, the nature of attacks and victim population characteristics (ability to respond and avoid harm during an attack) differs significantly among elementary school, middle school, and high school students. This research is essential to give school administrators, teachers, and parents useful knowledge to retrofit existing school buildings with security features that will protect occupants until responders can arrive and stop the threat.

    This research project has substantial implications for current criminal justice policy and practice. It will change the current “one-size-fits-all” approach to K-12 physical security to a risk-based approach that considers the developmental levels of students, police response times, and most likely origin of threat (insider versus outsider). Current discussions and research regarding school security categorize schools into preschool, K-12, and college without considering that the educational system consists of preschools, elementary, middle, and high schools because of the intrinsically different developmental levels, capabilities, and behaviors of students. This research will challenge existing assumptions and create a framework for physical security design in rural and urban elementary, middle, and high schools. This research will also build on previous research by Sandia National Laboratories in 1999, which resulted in the first of what was hoped to be several guidebooks for use by schools and law enforcement.[31] This guidebook series was never completed because of funding issues but its continuation, as we propose here, is essential.

    Dissemination Strategy

    The scientist-practitioner approach employed by the research team will not only create a practical guidebook for broad distribution to school administrators, but the results will also be disseminated to the broader scholarly and security practitioner communities. The research team will share results through a combination of industry-based safety and security conferences and trade publications to invite open discussion on the results of the durability testing of the security products. The researcher will also present key findings at each phase of the research to relevant safety and security conferences and submit articles to leading education and security research journals. The practical guidebook in combination with the new systems-based models (tested using CFA and SEM) of stakeholder perception encompass a major addition to the school safety field.

    In addition, researchers will present to school districts throughout Arizona (where the research will be conducted) and beyond based on the level of interest. It is the research team’s primary goal to disseminate this knowledge as widely as possible and make freely available to school administrators. The guidebook will be available to schools for free download from the College of Security and Intelligence website. The guidebook will also be provided at no charge to various nonprofit school safety organizations such as Sandy Hook Promise and Coyote Crisis Cooperative, to distribute freely to their audiences as well.

    Results of this research will also be disseminated to the scholarly community through publication in scholarly journals and presentations at academic conferences. The results will also be communicated to security practitioners through articles in trade publications, white papers, and presentations to professional conferences such as the ASIS International Annual Seminar.

    Summary

    Embry-Riddle’s College of Security and Intelligence, Robertson Safety Institute, and College of Engineering are uniquely qualified to develop a revolutionary framework for school security that moves away from a one-size-fits-all approach to school security to a risk based approach that considers student ages and abilities, school location, local emergency response times, the time-delay created by various physical security barriers, and cost-effectiveness. Its research team consists of an impressive group of security practitioners, industrial psychologists, and engineering researchers. In partnership with rural, suburban, urban, and tribal schools throughout Arizona, Embry-Riddle will develop a guidebook of school security barriers for use by schools nationwide.




    [1] Lysiak, Matthew, Newtown: An American Tragedy.

    [2] Linskey, Annie, “Newtown Rampage Spurs $5 Billion School Security Spending.”

    [3] Halloran, Liz, “Bulletproof Whiteboards And The Marketing Of School Safety.”

    [4] “The School-Security Industry Is Cashing In Big on Public Fears of Mass Shootings | The Nation.”

    [5] Ibid.

    [6] Green, “The Appropriate and Effective Use of Security Technologies in US Schools. A Guide for Schools and Law Enforcement Agencies.,” 3.

    [7] Ibid.

    [8] Schwartz, Heather L. et al., “The Role of Technology in Improving K-12 School Safety”; Johns Hopkins University Applied Physics Laboratory, “A Comprehensive Report on School Safety Technology.”

    [9] Green, “The Appropriate and Effective Use of Security Technologies in US Schools. A Guide for Schools and Law Enforcement Agencies.,” 5–7.

    [10] Connecticut School Safety Infrastructure Council, “Report of the School Safety Infrastructure Council.”

    [11] Sandy Hook Advisory Commission, “Final Report of the Sandy Hook Advisory Commission.”

    [12] The American Institute of Architects, Security Planning and Design: A Guide for Architects and Building Design Professionals, 84.

    [13] Johns Hopkins University Applied Physics Laboratory, “A Comprehensive Report on School Safety Technology,” 3–25.

    [14] Ibid., 3–35.

    [15] “Report of the Virginia Tech Review Panel - Fullreport.pdf,” 91.

    [16] Ibid.

    [17] Not Available. 1978. “Barrier Technology Handbook”. United States.

    [18] Miller, James R., “NRC: The Barrier Technology Handbook - (Generic Letter 78-19).”

    [19] Zhang, Anlan, Musu-Gillette, Lauren, and Oudekerk, Barbara, “Indicators of School Crime and Safety: 2015.”

    [20] Skiba, Russell et al., “Beyond Guns, Drugs, and Gangs.”

    [21] Chrusciel, Margaret M. et al., “Law Enforcement Executive and Principal Perspectives on School Safety Measures: School Resource Officers.”

    [22] Skubak Tillyer, Marie, Fisher, Bonnie S., and Wilcox, Pamela, “The Effects of School Crime Prevention on Students’ Violent Victimization, Risk Perception, and Fear of Crime: A Multilevel Opportunity Prespective.”

    [23] Cox, Brandy, Territorial Early Childhood Education Center.

    [24] Ibid.

    [25] Belsky, Janet, Experiencing the Lifespan, 93.

    [26] Ibid.

    [27] Best, Miller, and Jones, “Executive Functions after Age 5”; Best, John R. and Miller, Patricia H., “A Developmental Perspective on Executive Function”; Downes, Michelle, Bathelt, Joe, and De Haan, Michelle, “Event-Related Potential Measures of Executive Functioning from Preschool to Adolescence”; Gathercole, Susan E. et al., “The Structure of Working Memory From 4 to 15 Years of Age”; Huizinga, Mariette, Dolan, Conor V., and van der Molen, Maurits W., “Age-Related Change in Executive Function: Developmental Trends and a Latent Variable Analysis.”

    [28] Ibid., at 103.

    [29] Ibid., at 104.

    [30] The American Institute of Architects, Security Planning and Design: A Guide for Architects and Building Design Professionals, 84.

    [31] Green, “The Appropriate and Effective Use of Security Technologies in US Schools. A Guide for Schools and Law Enforcement Agencies.,” v.

    Categories: Faculty-Staff

  • Representations of the Military in 20th Century Ethnic American Literature

    PI Kara Fontenot

    Building on existing literary and ethnic studies scholarship with respect to the construction of American identity, I am considering the political work of representations of the U.S military in ethnic American literature. Ethnic American texts that contain representations of the U.S. military are an essential yet understudied part of a politicized, nation-centered critical discourse that examines strategies for constructing and negotiating national identity, practices of inclusion and exclusion with regard to citizenship and relationships between individual, racial group, ethnic group and nation.



    The U.S. military has long been vital to the ways in which individuals’ and groups’ relationships to the U.S. nation-state have been imagined. For example, in his now tirelessly cited study of nationalism, Imagined Communities (1983), Benedict Anderson emphasizes the significance of military service for constructing an imagined affiliation for a diverse citizenry.He reminds us that wars fought for the nation provide a shared experience for citizens, whether they are wars against foreign enemies or even a domestic civil war.Anderson also asserts that memorials to soldiers killed in the service of the nation link the dead and the yet unborn in a shared collective, which secularizes a role religion played in the past, substituting the nation-state for the church. His history affirms that militarism has long been a tool of official nationalism and a venue for visual pageantry that reaffirms the power and glory of the nation-state. Anderson even figures “willingness to die for one’s country” as the traditional measure of one’s commitment to a nation, and, indeed, historically military service has been one of the paths to legal citizenship in the United States.

    In addition to considering the enormous weight of military service in the national imagination, we should consider the ways experiences of military force and military service have long characterized racial and ethnic minority life in the United States. U.S. military force has been deployed against every major ethnic minority group in the nation.In various, complex, historically specific situations, the U.S. military has served as a tool to kill, terrorize, oppress, imprison and seize land and/or property from Native Americans, Mexican Americans, African Americans and Asian Americans. Many literary representations of military service by ethnic Americans may be read as critiques of ideology in which ethnic minorities are nationalized yet simultaneously excluded from full citizenship in the nation.

    However, members of ethnic American groups historically excluded from full citizenship have proudly served in the U.S. military since the American Revolution, earlier in small numbers within integrated enlisted ranks, then in large segregated units during World War II, and last in disproportionately large numbers during the Vietnam War and other wars fought primarily by soldiers drafted or recruited from the American working-class. For many members of ethnic minority groups, U.S. military service has become an avenue for socio-economic mobility and a path to legal citizenship in the U.S. nation-state.Many literary representations of military service by ethnic Americans may be read as attempts to expand existing constructions of American identity by writing previously excluded groups into the national body.

    Literary representations of the U.S. military in Ethnic American literature are also part of an ongoing national discourse on whiteness, white privilege, citizenship and national identity. For example, in The Possessive Investment in Whiteness (2006) George Lipsitz argues that in the United States white privilege has been constructed and preserved legally, institutionally and socially, which has resulted in a conflation of American identity and white identity that historically has excluded ethnic minorities from full, equal citizenship in the U.S. nation-state. Certainly, in ethnic American literature, representations of soldiers nationalized by service in the U.S. military yet simultaneously excluded on the basis of ethnic or racial identity contribute to the national discourse on whiteness, white privilege, citizenship and national identity.

    These representations of military service are also part of an ongoing national discourse about class struggle. Anderson, Lipsitz and other scholars of nationalism, such as Etienne Balibar and Immanuel Wallerstein, agree that the exclusion of ethnic minorities from national identity on the basis of race is simultaneously a reflection of class struggle. In Race, Nation, Class: Ambiguous Identities (1988), Balibar and Wallerstein in suggest that imagination of a national community is constructed through both language and race, resulting in a notion of kinship that Balibar coins “fictive ethnicity.”  Balibar and Wallerstein point out that through this conception of shared identity, the “nation” as a historical construct is used to project present institutions and antagonisms into the past (often a mythical past).  For example, Wallerstein observes that the inclusiveness of national identity often expands and contracts according to the present need for labor for the lowest paid, least rewarding jobs. Certainly, in ethnic American literature, literary representations of disproportionately large numbers of ethnic soldiers drafted and recruited into the enlisted ranks of the U.S. military and their often racially-inflected experience of service contribute to the national discourse on the relationship between race and class struggle.

    It is no wonder, considering the complex history of ethnic Americans’ service in the U.S. military that representations of the U.S. military in ethnic American literature are also complex and embark on a wide variety of political projects. What is surprising is that no book-length examination of representations of the U.S. military in ethnic American literature has yet been published.

    An extensive search of the MLA Bibliography’s database of peer-reviewed journal articles, covering over 600 sources, produced only six articles giving critical attention to representations of the U.S. military in Ethnic American texts. Four of these were close readings of a single text, one was a thematic exploration of Black Rough Riders, and the most comprehensive was an article by Perry D. Luckett, “The Black Soldier in Vietnam War Literature and Film” (1990). Similarly, a search of book listings in the WorldCat database produced many historical descriptions of experiences of ethnic soldiers serving in the U.S. military, collections of oral narratives of ethnic soldiers, memoirs of ethnic experiences of war, an anthology of war-themed writings related to Chicano/a experiences of Vietnam, Aztlan and Vietnam, by George Mariscal, and novels and short-stories that feature the theme of war. However, the search uncovered no book-length critical study of representations of the U.S. military in Ethnic American literature.

    The multiple ethnic literary traditions represented in this project emerge out of incommensurable histories of different US ethnic groups, yet they are all characterized by attempts to grapple with constructions of US national identity through representations of the U.S. military. The comparative methodology of this project allows me to consider the complexity and variety of ways in which literary representations perform political work as the texts articulate individual and group relations to American identity and the US nation-state through representations of the US military, both as a national institution and as a site of individual identity construction.

    In the course of my research, I will attempt to answer the following questions: How do these texts represent U.S. military service as a performance of American-ness (national identity) that fails to mitigate the legal exclusion and social stigmatization of racial and ethnic identity? Conversely, how do these texts represent U.S. military service as a performance of Americanness (national identity) that does mitigate the legal exclusion and social stigmatization of racial and ethnic identity?  What is the relationship between genre and politics in first-person narratives of ethnic American U.S. military service? How do representations of the U.S. military in ethnic American literature rewrite national histories and contest existing representations of the nation?

    Categories: Faculty-Staff

  • Workplace Accident Survey

    PI Mark Friend

    Random employees of unspecified companies will be interviewed to ID cause(s) of accidents in which they were involved.  The goal is to determine if they could have been prevented by adjustments to the overall sysem.

    Individuals will be selected based on their availability and asked nine questions and possibly additional questions for clarification, depending on their responses to each.  The goal is to determine if adjustments in the employer system could have been made to have prevented hte accident.

    Categories: Faculty-Staff

  • Composite Wind Turbine Blade

    PI Sathya Gangadharan

    The world's primary energy needs are projected to grow by 56% between 2005 and 2030, by an average annual rate of 1.8% per year (International Energy Agency, 2012). Energy policy has confirmed the improvement of the environment sustainability of energy as a primary objective also though increasing use of renewable sources (Increasing Wind Energy's contribution to U.S. Electricity supply, 2008).

    Wind energy research is being followed in the world as an alternative to fulfill increasing electricity power demand, United State Department of Energy is aiming to expand the wind power in the U.S. Currently, 15.4 GW of power are installed and operational, with an expected growth the U.S. wind capacity will be at 310 GW by 2030, representing 20% of the nation's power needs (Increasing Wind Energy's contribution to U.S. Electricity supply, 2008).

    Research on composite wind turbine blade carried out in Embry-Riddle is described below:

    FLUID-STRUCTURE INTERACTION AND MULTIDISCIPLINARY DESIGN ANALYSIS OPTIMIZATION OF COMPOSITE WIND TURBINE BLADE Mission:

    To maximize aerodynamic efficiency and structural robustness while reducing blade mass and total cost.A multidisciplinary design analysis optimization (MDAO) process is defined for a composite wind turbine blade to optimize its aerodynamic and structural performance by developing a fluid-structural interaction (FSI) system. MDAO process is defined in conjunction with structural and aerodynamic performance of the blade which is divided into three steps and the design variables considered are related to the shape parameters, twist distributions, pitch angle, material and the relative thickness based on number of composite layers at different blade sections. Maximum allowable tip deformations, modal frequencies and allowable stresses are set as design constraints. Airfoil performance is predicted with 2D airfoils analysis, while 3D CFD analysis is performed by ANSYS CFX software. A parameterized finite element model of the blade created in ANSYS ACP composite prepost and used to define the composite layups of the blade. The results of the CFD and the structural analysis are used for the optimization process accompanied by the cost estimation to obtain a compromised solution between aerodynamic performance and structural robustness. For the MDAO process number of design of experiments (DOEs) is defined by G optimality method and a response surface is created. Sensitivity analysis is performed to observe the impact of input parameter on each output parameters for enhanced control of the MDAO process. Further, to improve aerodynamic performance of the blade, new design approach with modified Tip (winglet) and rotor section is studied and substantial improvement in power generated over high quality baseline wind turbine blade is presented.

    A BASELINE STUDY AND CALIBRATION FOR MULTIDISCIPLINARY DESIGN OPTIMIZATION OF HYBRID COMPOSITE WIND TURBINE BLADE

    Preliminary baseline finite element (FE) model calibrations and evaluations are developed to assist and guide multidisciplinary design optimization (MDO) of a large-scale hybrid composite wind turbine blade. The weight, displacement, and failure index are compared and used for calibration purposes. In addition, a cost estimation model is calibrated for labor hour, as well as labor cost, material cost and total cost. Stability of baseline wind turbine blade against harmonic resonance due to rotor rotation is validated by finite element analysis (FEA). A MDO process is proposed using the calibrated FE and cost estimation models. The MDO optimizes multiple objectives such as blade length, weight, manufacturing cost, and power production. For this analysis, the turbine blade is divided into regions and the sequence of hybrid laminate layup for each region is considered as design variables. Extreme wind condition for rotor rotation and rotor stop condition is considered as the applied load on the blade. The designed structural strength and stiffness are demonstrated to withstand the loads due to harmonic excitation from rotor rotation. A process of design procedure for obtaining an optimum hybrid composite laminate layup and an optimum blade length of a wind turbine blade structure is developed in this research.

    Categories: Faculty-Staff

  • Fuel Slosh

    PI Sathya Gangadharan

    2014 marks the eleventh year of Fuel Slosh studies that have been carried out at Embry-Riddle Aeronautical University. Initially funded by NASA Graduate Student Research Program (GSRP) along with Southwest Research Institute, the research was started by Keith Schlee, a graduate student, under the guidance of Dr. Sathya Gangadharan, professor at Embry-Riddle.

    The research involved extensive theoretical and computational analysis. A fuel slosh test rig was set up at the structures lab for the students and researchers to conduct various experiments and validate their results.This research has evolved from the study of fuel slosh to the effect of diaphragms and baffles on slosh behavior and to the use of smart materials in actively damping the slosh. Tests on effectiveness of damping have also been carried out at NASA's Spinning Slosh Test Rig (SSTR) located at the Southwest Research Institute (SwRI) in San Antonio, Texas. Research works are frequently published at but not limited to American Institute of Aeronautics and Astronautics (AIAA), American Society of Mechanical Engineers (ASME), NASA Technical Reports Server (NTRS) and so on.A gist of some of the research works in Fuel Slosh carried out at Embry-Riddle is described below from the previous to the current on-going research:(Note: Only selective research works are mentioned below, for complete list of fuel slosh research works contact Dr. Sathya Gangadharan)

    MODELING AND PARAMETER ESTIMATION OF SPACECRAFT FUEL SLOSH MODE

    Mission:The research is directed toward modeling fuel slosh on spinning spacecraft using simple pendulum analogs. The pendulum analog will model a spherical tank with no PMD's. An electric motor will induce the motion of the pendulum to simulate free surface slosh. Parameters describing the simple pendulum models will characterize the modal frequency of the free surface sloshing motion. The one degree of freedom model will help to understand fuel sloshing and serve as a stepping stone for future more complex simulations to predict the NTC accurately with less time and effort.

    A CFD APPROACH TO MODELING SPACECRAFT FUEL SLOSH

    Mission: By using a Computational Fluid Dynamics (CFD) solver such as Fluent, a model for this fuel slosh can be created. The accuracy of the model must be tested by comparing its results to an experimental test case. Such a model will allow for the variation of many different parameters such as fluid viscosity and gravitational field, yielding a deeper understanding of spacecraft slosh dynamics.

    MODELING OF FREE-SURFACE FUEL SLOSH IN MICROGRAVITY FOR OFF-AXIS SPACECRAFT PROPELLANT TANKS

    Mission: MATLAB SimMechanics fuel slosh model can be used to estimate slosh parameters and predict dynamic effects on dependent systems. Comparative flight data was acquired by spinning a mock spacecraft with partially filled propellant tanks in a microgravity environment. Empirical and simulated NTC's are compared to validate a SimMechanics fuel slosh model.

    A COMPUTATIONAL AND EXPERIMENTAL ANALYSIS OF SPACECRAFT PROPELLANT TANKS IMPLEMENTED WITH FLEXIBLE DIAPHRAGMS

    Mission:The main objective of this research is to validate computational modeling of fuel slosh scenarios so that it may become the primary means of testing fuel slosh scenarios during initial spacecraft design. By expanding on past research objectives, this research aims at complementing the pre-existing data with new data from added computational and experimental simulations. Additionally, this research aims at conducting an extensive study of the computational fuel slosh models used in this investigation. The current research investigation presents detailed results of the fluid behavior within the tank and initiates an even more extensive investigation of fluid behavior for future fuel slosh research studies at ERAU.

    AN INVESTIGATION OF BAFFLES AND ASPERITIES ON SLOSH BEHAVIOR IN PROPELLANT TANKS OF SPACECRAFT AND LAUNCH VEHICLES

    Mission:The focus of this research is to investigate the fuel slosh behavior in propellant tanks. Different types of baffles and hemispherical asperities are introduced inside the tank to characterize the slosh behavior of the fluid. The modeling and the analysis of slosh is done using the CFD solver ANSYS CFX for tanks with and without baffles and for tanks with hemispherical asperities. Physical models are fabricated for experimental testing using the fuel slosh test facility at Embry Riddle Aeronautical University. Using the single axis linear actuator and fuel tank set up in the test facility, experimental results are obtained with and without baffles. The experiment and CFD modeling results are compared.

    SLOSH DAMPING WITH FLOATING ELECTRO-ACTIVE MICRO-BAFFLES

    Mission: Embedding floating micro-baffles with an electro-active material such that the baffle can be manipulated when exposed to a magnetic field preserves the benefits of both floating and static baffle designs. Activated micro-baffles form a rigid layer at the free surface and provide a restriction of the fluid motion. Proposed micro-baffle design and magnetic activation source method along with proof-of-concept experiments comparing the scope of this research to previous PMD methods are presented. A computational fluid dynamics approach is outlined. Preliminary proof-of-concept testing indicates floating electro-active micro-baffles reduce the damping time of sloshing by up to 88% as compared to the same slosh condition with the absence of any PMDs.

    DEVELOPMENT OF A MAGNETOSTRICTIVE PROPELLANT MANAGEMENT DEVICE (MSPMD) FOR HYBRID ACTIVE SLOSH DAMPING IN SPACECRAFT APPLICATION

    Mission:To study the use of a hybrid Magnetostrictive membrane as a Magnetostrictive Propellant Management Device (MSPMD) to actively control the free surface effect and reduce fuel slosh.. The viability of merging existing diaphragm membrane aka Propellant management device (PMD) with a magnetostrictive inlay embedded with the Terfenol-D matrix / MR-Fluid allows us to actively control the membrane during in-flight conditions. Apart from the development, analysis on the control of the hybrid active membrane and the use of the same to dampen fuel slosh is also performed in order to establish the proof of concept. During the development process of the hybrid active membrane, the geometric dependency of the meta-smart structure is analyzed to optimize the membrane shape, size and material.

    Categories: Faculty-Staff

  • Teaching Innovation

    PI Aaron Glassman

    CO-I Rosalee Opengart

    This research will examine the role of cognitive predisposition in the ability of university students to operationalize innovation. Using Regulatory Focus Theory as a lens, different university curricula from schools teaching innovation will be compared to determine if there is a specific way in which innovation could be taught to allow the most number of students to operationalize the concept of innovation. Finally, innovation as a concept will be connected to entrepreneurship and creativity and the scope of the research widened for further study.

    Innovation and creativity are the lifeblood of organizations.  As such, businesses expect college graduates to exhibit the skills necessary to engage in these behaviors.  This research explores the concept of innovation, whether it is innate, or if the skill can be taught within the university setting, and how universities are addressing the need for, and teaching innovation.  A search of the word “innovation” within educational courses found that most courses are theoretically-oriented or are efforts to cultivate entrepreneurs and/or new inventions, though some appear more practical in nature. A review of colleges and universities offering courses in innovation found that approximately half the universities reviewed offered courses in innovation. This work contributes to the discussion of business education regarding innovation and the importance of aligning business education with organizational needs.   

    Categories: Faculty-Staff

  • Understanding the Coupled Dynamics of Particles and Wall Turbulence

    PI Ebenezer Gnanamanickam

    ​This work focuses on understanding the coupled interactions between large and heavy solid particles, on a particle bed, and a gaseous (air) carrier phase turbulent boundary layer developing over the bed.

    Part I – The incipient mobilization of particles by the carrier phase is currently predicted by various measures of the mean shear of the carrier phase velocity field. However, there is increasing evidence that particle mobilization is an inherently unsteady process better correlated with the unsteady carrier phase eddies. The proposed work seeks to systematically quantify and understand these unsteady aspects of particle mobilization, particularly as a function of the energy and scale size of the carrier phase eddies. The proposed approach is to introduce flow scales of controlled energy and scale size into a turbulent boundary layer developing over a particle bed, while methodically characterizing the subsequent initiation of particle mobilization. The properties of the particles, namely the diameter and density, will be varied. As the carrier phase is fixed (air), the proposed approach will then describe the processes of particle mobilization as a function of not only the carrier phase eddy energy and size but also the particle Reynolds and Stokes numbers.

    Part II – Once particles are mobilized, they form a saltating layer adjacent to the particle bed and become two-way coupled with the carrier phase flow. This interaction, thus far has been reported as modifications to the carrier phase turbulence statistics. However, the exact nature of this interaction has yet to be studied in any further detail. Specifically, the scale dependence or the energy transfer mechanism of this coupled interaction has yet to be described. To study this interaction, it is proposed to carry out careful measurements of the carrier phase turbulent boundary layer in the presence of a saltation layer.

    In addition, during the course of both parts of the proposed work, detailed, simultaneous measurements of both phases will be carried out, in a time-resolved manner, to describe the scale dependent characteristics of the underlying physics. This will involve establishing an instantaneous shear velocity that initiates particle mobilization as a function of particle properties as well as carrier phase eddy scale and energy. While studying the interactions during mobilization and after a saltating layer is formed, the goal will be to establish scale dependent energy transfer pathways between the carrier and particle phases. To this end, the primary measurement technique used to characterize the carrier phase will be particle image velocimetry (PIV), while the particle phase velocity fields will be measured using particle tracking velocimetry (PTV). These PIV/PTV measurements will use multiple cameras at multi-scale, providing a detailed description of both phases of the flow at high spatial and temporal resolution. Together these techniques will then provide unique multi-scale, multi-phase measurement sets that will capture the detailed interactions of the particle and carrier phase, leading to new insights into the physics of these interactions.

    Categories: Faculty-Staff

  • Understanding the Coupled Interactions Between Hair-Like Micromechanoreceptors and Wall Turbulence

    PI Ebenezer Gnanamanickam

    ​This research focuses on understanding the interactions between turbulent flows and long (high aspect ratio), flexible hair-like microstructures or micropillars inspired by those encountered in nature. Some examples include lateral line sensors in fish, airflow sensors in bats and hair cover of animals such as seals and bats.

    This research focuses on understanding the interactions between turbulent flows and long (high aspect ratio), flexible hair-like microstructures or micropillars inspired by those encountered in nature. Some examples include lateral line sensors in fish, airflow sensors in bats and hair cover of animals such as seals and bats. These structures perform several physiological functions such as balance and equilibrium sensors, flow sensors, flight control sensors, thermal regulators and water harvesters. Particularly, hair-cell sensors have such structures which in conjunction with the animal's nervous system forms a mechanoreceptive device i.e., they turn a force or displacement, in response to the flow energy, into a nervous system response. These structures that vibrate in response to the background flow are also important in energy harvesting systems. However, these interactions are poorly understood primarily due to the complexity of the underlying physics. Capturing this physics requires simultaneous, combined measurements of the micropillar motion and the flow velocities which are challenging. The proposed research will use advanced image-based flow diagnostic tools to measure in detail the interactions between arrays of these micropillars and the background flow. The planned outreach activities will target a group that is almost exclusively comprised of students who are under-represented in the sciences, while also being economically disadvantaged. The graduate student supported will be involved in outreach activities, inculcating a spirit of outreach into the next generation of engineers.

    The interactions between wall turbulence and these micropillars occur in the following manner. Flow structures of scales spanning several orders of magnitude, present within wall turbulence, excites the response of the micropillars. The deflection or vibratory response of the micropillars will then feedback and modify the non-linear, background turbulence, resulting in a non-linearly coupled system. In addition, this interaction occurring at the wall can affect the entire layer resulting in a multiscale interacting layer. Of particular interest are energy transfer pathways between the micropillars and the background turbulence. To describe this coupled interaction and the associated energy transfer mechanisms, advanced diagnostic tools such as multi-camera, multi-resolution, mosaicing particle image velocimetry will be used to capture the dynamics of the background flow while simultaneously tracking the motion of relevant micropillars using particle tracking techniques. Together these tools will provide unique multiscale measurements that will elucidate the coupled physics, advancing fields ranging from physiology to aerospace engineering to non-linear energy systems.

    Categories: Faculty-Staff

  • Aeroelastic Gust-Airfoil Interaction Numerical Studies

    PI Vladimir Golubev

    The project conducted in collaboration with WPAFB and Eglin AFB AFRL scientists over the past 8 years employs DOD HPC and ERAU computer facilities to conduct high-fidelity, low-Reynolds, aeroelastic gust-airfoil interaction studies to model unsteady responses and their control for small UAVs operating, e.g., in highly unsteady urban canyons.

    The focus is on modeling airfoil interactions with canonical upstream flow configurations including time-harmonic and sharp-edge gusts, vortices and synthetic turbulence with prescribed characteristics tailored to a specified unsteady flight-path environment. Note that this and other listed projects that include noise predictions and noise/flow control components are partially supported by Florida Center for Advanced Aero Propulsion (FCAAP) in these efforts

    Categories: Faculty-Staff

51-60 of 189 results