Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Engineering

Combating Intersection-Related Imposter Phenomenon In The Workplace Through Career Readiness, Simone Stewart Nov 2019

Combating Intersection-Related Imposter Phenomenon In The Workplace Through Career Readiness, Simone Stewart

Black Issues Conference

Research has determined that Impostor Phenomenon (IP) most likely occurs in members of minority groups, students, first generation professionals and persons for whom success came quickly. Other studies have shown that many professional women are One of the ways to combat IP is through the development of competencies needed in your career. Attend this workshop to learn how to develop strategies to approach career competency while on campus and throughout your career to keep you on top of your game!


Human Rights, Environmental Justice, Social Justice, Faith Values And Ethics: Building Stronger Partnerships For The Common Good By Understanding The Differences, Theresa Harris, Leanne M. Jablonski, Sarah Fortner, Malcolm Daniels Oct 2019

Human Rights, Environmental Justice, Social Justice, Faith Values And Ethics: Building Stronger Partnerships For The Common Good By Understanding The Differences, Theresa Harris, Leanne M. Jablonski, Sarah Fortner, Malcolm Daniels

Biennial Conference: The Social Practice of Human Rights

Partnerships between human rights practitioners, local communities, scientists, engineers, and health professionals have shown potential to address deeply rooted, systemic human rights concerns. These collaborations are essential for achieving the UN Sustainable Development Goals (SDGs), and for engaging the perspectives and expertise of all constituents. However, even when the individuals in these partnerships or the organizations they represent have common goals, their motivations, analyses, and solutions often come from different perspectives. Members of good will can inadvertently alienate one another when attempting to work together. The fields of human rights, social justice, environmental justice, and ethics have each developed their …


Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik May 2019

Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smartphones with Google's Android operating system are becoming more and more popular each year, and with this increased user base, comes increased opportunities to collect more of these users' private data. There have been several instances of malware being made available via the Google Play Store, which is one of the predominant means for users to download applications. One effective way of collecting users' private data is by using Android Spyware. In this paper, we conduct a forensic analysis of a malicious Android spyware application and present our findings. We also highlight what information the application accesses and what it …


Regulatory Design For Transport Security Regulations Of Nuclear And Other Radioactive Material, Marc R. Fialkoff Mar 2019

Regulatory Design For Transport Security Regulations Of Nuclear And Other Radioactive Material, Marc R. Fialkoff

Purdue Workshop on Nonproliferation: Technology and Approaches

A cornerstone within a nuclear security regime of a country is a legislative and regulatory framework that both regulates the individuals using radioactive and nuclear materials, but also regulates the regulators for their commitments under International Law. When drafting nuclear law and regulations, both technical and legal expertise is needed to ensure the regulation meets the technical requirements for security, but also is legally enforceable within a country’s jurisdiction. While the Primary Nuclear Law, or Enabling Act provides establishes the Competent Authority and responsibilities for nuclear security, regulatory development is where the proverbial, rubber meets the road for requirements. The …


Nanosat Tracking And Identification Techniques And Technologies, Mark A. Skinner Feb 2019

Nanosat Tracking And Identification Techniques And Technologies, Mark A. Skinner

Space Traffic Management Conference

Nanosats (and CubeSats, ‘Smallsats’, etc.) are of order 10 cm in size, and are at or near the limits of what can be tracked and characterized, using existing space surveillance assets. Additionally, given the CubeSat form-factor, they are often launched in large numbers (scores), and can be virtually identical. Thus are they difficult to track and to identify.

We have identified a number of technologies that future nanosat missions could employ that would enhance the trackability and/or identification of their satellites when on-orbit. Some of these technologies require active illumination of the satellite with electromagnetic energy, either in the radio …