-
Analysis of Fleet Management and Network Design for On-Demand Urban Air Mobility Operations
Authors:
Sheng Li,
Maxim Egorov,
Mykel J. Kochenderfer
Abstract:
A significant challenge in estimating operational feasibility of Urban Air Mobility (UAM) missions lies in understanding how choices in design impact the performance of a complex system-of-systems. This work examines the ability of the UAM ecosystem and the operations within it to meet a variety of demand profiles that may emerge in the coming years. We perform a set of simulation driven feasibili…
▽ More
A significant challenge in estimating operational feasibility of Urban Air Mobility (UAM) missions lies in understanding how choices in design impact the performance of a complex system-of-systems. This work examines the ability of the UAM ecosystem and the operations within it to meet a variety of demand profiles that may emerge in the coming years. We perform a set of simulation driven feasibility and scalability analyses based on UAM operational models with the goal of estimating capacity and throughput for a given set of parameters that represent an operational UAM ecosystem. UAM ecosystem design guidelines, vehicle constraints, and effective operational policies can be drawn from our analysis. Results show that, while critical for enabling UAM, the performance of the UAM ecosystem is robust to variations in ground infrastructure and fleet design decisions, while being sensitive to decisions for fleet and traffic management policies. We show that so long as the ecosystem design parameters for ground infrastructure and fleet design fall within a sensible range, the performance of the UAM ecosystem is affected by the policies used to manage the UAM traffic.
△ Less
Submitted 7 August, 2020;
originally announced August 2020.
-
Optimizing Collision Avoidance in Dense Airspace using Deep Reinforcement Learning
Authors:
Sheng Li,
Maxim Egorov,
Mykel Kochenderfer
Abstract:
New methodologies will be needed to ensure the airspace remains safe and efficient as traffic densities rise to accommodate new unmanned operations. This paper explores how unmanned free-flight traffic may operate in dense airspace. We develop and analyze autonomous collision avoidance systems for aircraft operating in dense airspace where traditional collision avoidance systems fail. We propose a…
▽ More
New methodologies will be needed to ensure the airspace remains safe and efficient as traffic densities rise to accommodate new unmanned operations. This paper explores how unmanned free-flight traffic may operate in dense airspace. We develop and analyze autonomous collision avoidance systems for aircraft operating in dense airspace where traditional collision avoidance systems fail. We propose a metric for quantifying the decision burden on a collision avoidance system as well as a metric for measuring the impact of the collision avoidance system on airspace. We use deep reinforcement learning to compute corrections for an existing collision avoidance approach to account for dense airspace. The results show that a corrected collision avoidance system can operate more efficiently than traditional methods in dense airspace while maintaining high levels of safety.
△ Less
Submitted 20 December, 2019;
originally announced December 2019.
-
NuCypher KMS: Decentralized key management system
Authors:
Michael Egorov,
MacLane Wilkison,
David Nunez
Abstract:
NuCypher KMS is a decentralized Key Management System (KMS) that addresses the limitations of using consensus networks to securely store and manipulate private, encrypted data. It provides encryption and cryptographic access controls, performed by a decentralized network, leveraging proxy re-encryption. Unlike centralized KMS as a service solutions, it doesn't require trusting a service provider.…
▽ More
NuCypher KMS is a decentralized Key Management System (KMS) that addresses the limitations of using consensus networks to securely store and manipulate private, encrypted data. It provides encryption and cryptographic access controls, performed by a decentralized network, leveraging proxy re-encryption. Unlike centralized KMS as a service solutions, it doesn't require trusting a service provider. NuCypher KMS enables sharing of sensitive data for both decentralized and centralized applications, providing security infrastructure for applications from healthcare to identity management to decentralized content marketplaces. NuCypher KMS will be an essential part of decentralized applications, just as SSL/TLS is an essential part of every secure web application.
△ Less
Submitted 12 November, 2017; v1 submitted 19 July, 2017;
originally announced July 2017.
-
ZeroDB white paper
Authors:
Michael Egorov,
MacLane Wilkison
Abstract:
ZeroDB is an end-to-end encrypted database that enables clients to operate on (search, sort, query, and share) encrypted data without exposing encryption keys or cleartext data to the database server. The familiar client-server architecture is unchanged, but query logic and encryption keys are pushed client-side. Since the server has no insight into the nature of the data, the risk of data being e…
▽ More
ZeroDB is an end-to-end encrypted database that enables clients to operate on (search, sort, query, and share) encrypted data without exposing encryption keys or cleartext data to the database server. The familiar client-server architecture is unchanged, but query logic and encryption keys are pushed client-side. Since the server has no insight into the nature of the data, the risk of data being exposed via a server-side data breach is eliminated. Even if the server is successfully infiltrated, adversaries would not have access to the cleartext data and cannot derive anything useful out of disk or RAM snapshots.
ZeroDB provides end-to-end encryption while maintaining much of the functionality expected of a modern database, such as full-text search, sort, and range queries. Additionally, ZeroDB uses proxy re-encryption and/or delta key technology to enable secure, granular sharing of encrypted data without exposing keys to the server and without sharing the same encryption key between users of the database.
△ Less
Submitted 8 March, 2016; v1 submitted 23 February, 2016;
originally announced February 2016.