Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Law

Conference

Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 207

Full-Text Articles in Engineering

Supporting Text And Data Analysis Across Campus From The Academic Library, Amy Kirchhoff, Hejin Shin Phd Apr 2024

Supporting Text And Data Analysis Across Campus From The Academic Library, Amy Kirchhoff, Hejin Shin Phd

Digital Initiatives Symposium

The ability to comprehend and communicate with text-based data is essential to future success in academics and employment, as evidenced in a recent survey from Bloomberg Research Services which shows that nearly 97% of survey respondents now use data analytics in their companies and 58% consider data and text mining a business analytics tool (https://www.sas.com/content/dam/SAS/bp_de/doc/studie/ba-st-the-current-state-of-business-analytics-2317022.pdf). This has fueled a substantial growth in text analysis research (involving the use of technology to analyze un- and semi-structured text data for valuable insights, trends, and patterns) across disciplines and a corresponding demand on academic libraries to support text analysis pedagogy and text analysis …


Going Airborne: Kent State's Pioneering Leap Into Integrated Advanced Air Mobility, Jason T. Lorenzon Feb 2024

Going Airborne: Kent State's Pioneering Leap Into Integrated Advanced Air Mobility, Jason T. Lorenzon

National Training Aircraft Symposium (NTAS)

This proposal centers on the development of a Concept of Operations in Advanced Air Mobility (AAM). Kent State University's College of Aeronautics and Engineering is poised to pioneer the integration of drones and electric Vertical Takeoff and Landing (eVTOL) systems, bridging the gap between its campus and airport by transporting students and faculty the 3NM distance from campus to the airport and back by a UAV. Beyond a standard research initiative, this proposal signifies a groundbreaking effort to reshape the landscape of educational aeronautics and Advanced Air Mobility and Urban Air Mobility. Our overarching goal is to transcend conventional boundaries …


12th International Conference On Business, Technology And Innovation 2023, University For Business And Technology - Ubt Oct 2023

12th International Conference On Business, Technology And Innovation 2023, University For Business And Technology - Ubt

UBT International Conference

Welcome to IC – UBT 2023

UBT Annual International Conference is the 12th international interdisciplinary peer reviewed conference which publishes works of the scientists as well as practitioners in the area where UBT is active in Education, Research and Development. The UBT aims to implement an integrated strategy to establish itself as an internationally competitive, research-intensive university, committed to the transfer of knowledge and the provision of a world-class education to the most talented students from all background. The main perspective of the conference is to connect the scientists and practitioners from different disciplines in the same place and make …


Analyzing The Past Five Years Of Equinox Week* Programs Focused On Sustainable Development Goals Within A Collection Of Local And Global Initiatives To Support A Proposal For The Publication Of A Comprehensive Book, Abdoulaye Idrissa Nov 2022

Analyzing The Past Five Years Of Equinox Week* Programs Focused On Sustainable Development Goals Within A Collection Of Local And Global Initiatives To Support A Proposal For The Publication Of A Comprehensive Book, Abdoulaye Idrissa

Symposium of Student Scholars

Many undergraduate students are not familiar with the research process involved in a book publication proposal. Through this multidisciplinary collaborative research, the faculty intends to minimize this gap by engaging the students in such a process from the early phase of proposal preparation. The student will research and review the past five years of EQUINOX Week* programs focused on Sustainable Development Goals within a collection of local and global initiatives to support a proposal for the EQUINOX proceeding publication.

With an extensive set of qualitative and quantitative data gathered over a span of 5 years. The student will be …


11th International Conference On Business, Technology And Innovation 2022, University For Business And Technology - Ubt Oct 2022

11th International Conference On Business, Technology And Innovation 2022, University For Business And Technology - Ubt

UBT International Conference

Welcome to IC – UBT 2022

UBT Annual International Conference is the 11th international interdisciplinary peer reviewed conference which publishes works of the scientists as well as practitioners in the area where UBT is active in Education, Research and Development. The UBT aims to implement an integrated strategy to establish itself as an internationally competitive, research-intensive university, committed to the transfer of knowledge and the provision of a world-class education to the most talented students from all background. The main perspective of the conference is to connect the scientists and practitioners from different disciplines in the same place and make …


Project Khepri: Mining Asteroid Bennu For Water, Erika Frost, Gowtham Boyala, Adam Gremm, Ahmet Gungor, Amirhossein Taghipour, Massimo Biella, Jiawei "Jackson" Qiu, Athip Thirupathi Raj, Arjun Chhabra, Adam Gee, Saanjali Maharaj, Erin Richardson, Julia Empey, Haidar Ali Abdul-Nabi, Lindsay Richards, Ariyaan Talukder, Aaron Groh, Brie Miklaucic, Jd Carlson, Kristina Kim, Maverick Cue Aug 2022

Project Khepri: Mining Asteroid Bennu For Water, Erika Frost, Gowtham Boyala, Adam Gremm, Ahmet Gungor, Amirhossein Taghipour, Massimo Biella, Jiawei "Jackson" Qiu, Athip Thirupathi Raj, Arjun Chhabra, Adam Gee, Saanjali Maharaj, Erin Richardson, Julia Empey, Haidar Ali Abdul-Nabi, Lindsay Richards, Ariyaan Talukder, Aaron Groh, Brie Miklaucic, Jd Carlson, Kristina Kim, Maverick Cue

Undergraduate Student Research Internships Conference

Deep space asteroid mining presents the opportunity for the collection of critical resources required to establish a cis-lunar infrastructure. In specific, the Project Khepri team has focused on the collection of water from asteroid Bennu. This water has the potential to provide a source of clean-energy propellant as well as an essential consumable for humans or agriculture on crewed trips to the Moon or Mars. This would avoid the high costs of launching from Earth - making it a highly desirable element for the future of cis-lunar infrastructure. The OSIRIS-REx mission provided a complete survey of asteroid Bennu and is …


A Qualitative Look Into Repair Practices, Jumana Labib Aug 2022

A Qualitative Look Into Repair Practices, Jumana Labib

Undergraduate Student Research Internships Conference

This research poster is based on a working research paper which moves beyond the traditional scope of repair and examines the Right to Repair movement from a smaller, more personal lens by detailing the 6 categorical impediments as dubbed by Dr. Alissa Centivany (design, law, economic/business strategy, material asymmetry, informational asymmetry, and social impediments) have continuously inhibited repair and affected repair practices, which has consequently had larger implications (environmental, economic, social, etc.) on ourselves, our objects, and our world. The poster builds upon my research from last year (see "The Right to Repair: (Re)building a better future"), this time pulling …


Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk Jan 2022

Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk

Annual ADFSL Conference on Digital Forensics, Security and Law

The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …


A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang Jan 2022

A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …


Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik Jan 2022

Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …


Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd Jan 2022

Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …


The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan Jan 2022

The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan

Annual ADFSL Conference on Digital Forensics, Security and Law

In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …


Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik Jan 2022

Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …


Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik Jan 2022

Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …


Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd Jan 2022

Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …


A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow Jan 2022

A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …


Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha Jan 2022

Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha

Annual ADFSL Conference on Digital Forensics, Security and Law

The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …


10th International Conference On Business, Technology And Innovation 2021, University For Business And Technology - Ubt Oct 2021

10th International Conference On Business, Technology And Innovation 2021, University For Business And Technology - Ubt

UBT International Conference

Welcome to IC – UBT 2021

UBT Annual International Conference is the 10th international interdisciplinary peer reviewed conference which publishes works of the scientists as well as practitioners in the area where UBT is active in Education, Research and Development. The UBT aims to implement an integrated strategy to establish itself as an internationally competitive, research-intensive university, committed to the transfer of knowledge and the provision of a world-class education to the most talented students from all background. The main perspective of the conference is to connect the scientists and practitioners from different disciplines in the same place and make …


Effects Of Cloud Computing In The Workforce, Kevin Rossi Acosta Oct 2021

Effects Of Cloud Computing In The Workforce, Kevin Rossi Acosta

Cybersecurity Undergraduate Research Showcase

In recent years, the incorporation of cloud computing and cloud services has increased in many different types of organizations and companies. This paper will focus on the philosophical, economical, and political factors that cloud computing and cloud services have in the workforce and different organizations. Based on various scholarly articles and resources it was observed that organizations used cloud computing and cloud services to increase their overall productivity as well as decrease the overall cost of their operations, as well as the different policies that were created by lawmakers to control the realm of cloud computing. The results of this …


Diversifying Nuclear Technology: A Technical Analysis On Small Modular Reactors And Its Impact On Nuclear Energy Policy, Carolina Lugo Mejia, Marcos Lugo May 2021

Diversifying Nuclear Technology: A Technical Analysis On Small Modular Reactors And Its Impact On Nuclear Energy Policy, Carolina Lugo Mejia, Marcos Lugo

Helm's School of Government Conference - American Revival: Citizenship & Virtue

The energy policy debate in the United States has revolved around the diversification of energy sources while promoting advantageous economic profits. One drive for this has been the discussion of anthropogenic, environmental endangerment concerns (Vlassopoulous 2011, 104). However, despite the environmental concerns, the U.S. has for some time only relied on one type of energy source—fossil fuels. Fossil fuels are categorized as natural gas, coal, petroleum, and other gases responsible (U.S. Energy Administration 2019). Natural gas is responsible for 38.4%, coal for 23.4%, petroleum for 0.4%, and other gases for 0.3% of the U.S.’s electrical generation (U.S. Energy Administration 2019). …


9th International Conference On Business, Technology And Innovation 2020, University For Business And Technology - Ubt Oct 2020

9th International Conference On Business, Technology And Innovation 2020, University For Business And Technology - Ubt

UBT International Conference

Welcome to IC – UBT 2020

UBT Annual International Conference is the 9th international interdisciplinary peer reviewed conference which publishes works of the scientists as well as practitioners in the area where UBT is active in Education, Research and Development. The UBT aims to implement an integrated strategy to establish itself as an internationally competitive, research-intensive university, committed to the transfer of knowledge and the provision of a world-class education to the most talented students from all background. The main perspective of the conference is to connect the scientists and practitioners from different disciplines in the same place and make …


Supercavitation Capabilities On A Submarine, Adam Vu Mar 2020

Supercavitation Capabilities On A Submarine, Adam Vu

Georgia College Student Research Events

Submarines have shaped the way wars have been fought and have been influential in our understanding of fluid dynamics. In the past, supercavitation has been implemented to an idea that has been used to significantly increase the velocity of torpedoes in Chinese and Russian submarines. An example of this is the Russian VA-111 Shkval torpedo. The idea being that if your torpedo is expelling a gas out of the nose cone region, creating a boundary layer between the water and the torpedo, the torpedo will be facing much less resistance relative to when it was traveling in water alone. This …


The Future State Of Mobility, Jerome Quandt Mar 2020

The Future State Of Mobility, Jerome Quandt

Purdue Road School

Formed in 2018, the Illinois Autonomous Vehicles Association (ILAVA) is a privately funded non-for-profit organization focused on establishing thought leadership in the state of Illinois, by identifying and addressing the current and emerging opportunities related to the inevitable growth of CAV technologies throughout the transportation network. Through the deployment of scalable and sustainable business solutions, facilitating industry education and establishing thought leadership, ILAVA is creating an ecosystem that defines Illinois as #TheFutureStateofMobility.


Regulating 5g Installations, Bradley Pease Mar 2020

Regulating 5g Installations, Bradley Pease

Purdue Road School

In this session we will discuss regulation of the deployment of 5G small-cell equipment within local right-of-way.


Combating Intersection-Related Imposter Phenomenon In The Workplace Through Career Readiness, Simone Stewart Nov 2019

Combating Intersection-Related Imposter Phenomenon In The Workplace Through Career Readiness, Simone Stewart

Black Issues Conference

Research has determined that Impostor Phenomenon (IP) most likely occurs in members of minority groups, students, first generation professionals and persons for whom success came quickly. Other studies have shown that many professional women are One of the ways to combat IP is through the development of competencies needed in your career. Attend this workshop to learn how to develop strategies to approach career competency while on campus and throughout your career to keep you on top of your game!


Human Rights, Environmental Justice, Social Justice, Faith Values And Ethics: Building Stronger Partnerships For The Common Good By Understanding The Differences, Theresa Harris, Leanne M. Jablonski, Sarah Fortner, Malcolm Daniels Oct 2019

Human Rights, Environmental Justice, Social Justice, Faith Values And Ethics: Building Stronger Partnerships For The Common Good By Understanding The Differences, Theresa Harris, Leanne M. Jablonski, Sarah Fortner, Malcolm Daniels

Biennial Conference: The Social Practice of Human Rights

Partnerships between human rights practitioners, local communities, scientists, engineers, and health professionals have shown potential to address deeply rooted, systemic human rights concerns. These collaborations are essential for achieving the UN Sustainable Development Goals (SDGs), and for engaging the perspectives and expertise of all constituents. However, even when the individuals in these partnerships or the organizations they represent have common goals, their motivations, analyses, and solutions often come from different perspectives. Members of good will can inadvertently alienate one another when attempting to work together. The fields of human rights, social justice, environmental justice, and ethics have each developed their …


Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik May 2019

Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smartphones with Google's Android operating system are becoming more and more popular each year, and with this increased user base, comes increased opportunities to collect more of these users' private data. There have been several instances of malware being made available via the Google Play Store, which is one of the predominant means for users to download applications. One effective way of collecting users' private data is by using Android Spyware. In this paper, we conduct a forensic analysis of a malicious Android spyware application and present our findings. We also highlight what information the application accesses and what it …


Regulatory Design For Transport Security Regulations Of Nuclear And Other Radioactive Material, Marc R. Fialkoff Mar 2019

Regulatory Design For Transport Security Regulations Of Nuclear And Other Radioactive Material, Marc R. Fialkoff

Purdue Workshop on Nonproliferation: Technology and Approaches

A cornerstone within a nuclear security regime of a country is a legislative and regulatory framework that both regulates the individuals using radioactive and nuclear materials, but also regulates the regulators for their commitments under International Law. When drafting nuclear law and regulations, both technical and legal expertise is needed to ensure the regulation meets the technical requirements for security, but also is legally enforceable within a country’s jurisdiction. While the Primary Nuclear Law, or Enabling Act provides establishes the Competent Authority and responsibilities for nuclear security, regulatory development is where the proverbial, rubber meets the road for requirements. The …


Nanosat Tracking And Identification Techniques And Technologies, Mark A. Skinner Feb 2019

Nanosat Tracking And Identification Techniques And Technologies, Mark A. Skinner

Space Traffic Management Conference

Nanosats (and CubeSats, ‘Smallsats’, etc.) are of order 10 cm in size, and are at or near the limits of what can be tracked and characterized, using existing space surveillance assets. Additionally, given the CubeSat form-factor, they are often launched in large numbers (scores), and can be virtually identical. Thus are they difficult to track and to identify.

We have identified a number of technologies that future nanosat missions could employ that would enhance the trackability and/or identification of their satellites when on-orbit. Some of these technologies require active illumination of the satellite with electromagnetic energy, either in the radio …


Contents, Adfsl May 2018

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.