"Bridging the capabilities of an R&D Lab with the agility of a Solo Founder."
This repository is the Engineering Portfolio of David Tom Foss. It contains Reference Implementations, Simulation Environments, and Technical Reports that demonstrate capability in delivering high-complexity architectures (AI Security, Neurotech, Autonomous Systems).
Propellant-Less Orbital Maneuvering System with Superconducting Magnet Control
David Tom Foss (2025)
Abstract: A revolutionary system enabling theoretically unlimited satellite lifetimes via HTS magnetic coils and PINNs.
DOI: 10.2139/ssrn.5675042 | Status: Published on SSRN
The portfolio is organized into 5 Strategic Clusters containing 16 Reference Implementations. Each module provides a standalone scientific simulation.
- Interplanetary Network Simulator: CCSDS Bundle Protocol modeling for high-latency Mars-Earth links.

- UAV Landing Control: Physics-Informed Neural Networks (PINNs) for autonomous landing in GPS-denied zones.

- Autonomous OSINT Platform: Entity Resolution using Force-Directed Graph Clustering.

- Maritime & Aero Tracker: ADS-B/VDES Surveillance Simulation using Friis Transmission Equation.

- Cyberdefense Runtime: Self-healing OS layer using Chaos Theory (Logistic Map) & GANs.

- ICS/SCADA Fingerprinter: Critical Infrastructure Protocol Discovery (Modbus/DNP3).

- Causal Knowledge Graph: Bayesian Belief Networks for Attack Path Analysis.

- Quantum Network Mapper: QKD Key Rate Simulation based on Optical Fiber Attenuation.

- Hardware Trust Anchor: TPM 2.0 PCR Measured Boot & Remote Attestation Simulator.

- WASM Polyglot Container: Lattice Cryptography (Ring-LWE) for Post-Quantum Security.

- Quantitative Risk Engine: Monte Carlo Value-at-Risk (VaR) with Cholesky Decomposition.

- Algorithmic Arbitrage: Latency Arbitrage Simulation using Geometric Brownian Motion.

- Synthetic Data Factory: LLM Curriculum Learning Pipeline Simulation.

- Psychoacoustic Profiler: EEG Spectral Analysis (Welch Method).

- Multisensory Projection: Hyperdimensional Computing (HDC) Stability Analysis.

- Bidirectional Comm: Near-Field Magnetic Induction (NFMI) Path Loss Physics.

We believe in "Don't trust, verify". This repository includes a rigorous verification suite.
Run the cinematic system intialization to verify module status:
make bootVerify all physics simulations and cryptographic assertions via included Unit Tests.
make checkThis triggers the unittest suites for the Risk Engine, OSINT Graph, and TPM Attestation modules.
We publish detailed Technical Reports (TRs) that bridge the gap between academic theory and codebase implementation.
| Report ID | Title | Domain | Status |
|---|---|---|---|
| TR-2025-01 | Sovereign AI: Recursive Reasoning Systems | AI/Legal | Published |
| TR-2025-02 | Autonomous Threat-Adaptive Cyberdefense | InfoSec | Published |
| TR-2025-03 | Neuroadaptive Audio Interfaces | BCI | Published |
Each sub-directory is a self-contained MVP. To replicate our results:
# Example: Running the UAV Simulation
git clone https://github.com/DT-Foss/foss-advanced-research.git
cd foss-advanced-research/03_Reference_Implementations/FH-SS_UAV_Simulation
pip install -r requirements.txt
python simulation.pyIf you use this research, please cite the specific Technical Report or the Lab itself:
authors:
- family-names: Foss
given-names: David Tom
title: "David Tom Foss // R&Doratory Technical Reports"
year: 2025
url: "https://github.com/DT-Foss/foss-advanced-research"See CITATION.cff for BibTeX/APA formats.
Β© 2025 David Tom Foss. Released under the MIT License.
Β© 2025 David Tom Foss // R&D
"Security through Obscurity is dead."
This architecture was originally developed as a proprietary IP asset (Patent Pending). However, in light of the accelerating capabilities of AI-driven cyber threats in 2025, David Tom Foss // R&D has transitioned to an Open Source / Reference Implementation strategy ("Publish Fast" vs "Patent Slow").
We believe that critical defense infrastructure must be:
- Transparent: Auditable by the global security community.
- Standardized: Establishing de-facto protocols rather than walled gardens.
- Resilient: Hardened by public scrutiny (Linus's Law).
This code is released under the MIT License to encourage rapid adoption and fork-based innovation.