Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 25 of 25

Full-Text Articles in Engineering

The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson Dec 2017

The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson

International Journal of Nuclear Security

Planning for the future of nuclear security is a vital and complex task, requiring cooperation and contribution from many disciplines and industries. This diversity of expertise should include the medical sector, which faces many of the same challenges as the nuclear industry: controlling access to dangerous material, creating a strong security culture, cooperating with the wider world and engaging the public.

Medical physicists, of which the author is one, oversee all aspects of small-scale radiation use. This paper discusses three key areas increasingly important to both medical and nuclear uses of radioactive materials: public engagement, prevention of nuclear and radiological …


Assessing And Enhancing Nuclear Safety And Security Culture For Small Facilities That Handle Radioactive Material, Solymosi Máté Dec 2017

Assessing And Enhancing Nuclear Safety And Security Culture For Small Facilities That Handle Radioactive Material, Solymosi Máté

International Journal of Nuclear Security

The use of radioactive sources is expanding all over the world and abreast the necessity of the enhancement of its safe and secure application is increasing too. In the nuclear industry, the safety and security are top priorities since decades. They share the same goal, to protect humans from the negative affect of the ionizing radiation. The human component of them is a significant factor and technical solutions can protect us so far and thus the culture for safety and security become a major focus. On the other hand, there are still some contradiction between recommendations and international guidance of …


The Future Of Nuclear Security In Moroccan Territory After The Creation Of The New Moroccan Agency Of Nuclear And Radiological Safety And Security: Opportunities And Challenges, Amal Touarsi, Amina Kharchaf Dec 2017

The Future Of Nuclear Security In Moroccan Territory After The Creation Of The New Moroccan Agency Of Nuclear And Radiological Safety And Security: Opportunities And Challenges, Amal Touarsi, Amina Kharchaf

International Journal of Nuclear Security

Nowadays, a security regime for protecting nuclear and radiological material—providing an intelligent national regulatory institution and establishing national security laws—is necessary in order for a state to ensure security of nuclear and radiological materials used within its borders.

This paper focuses on discussing the opportunities and challenges facing the future of nuclear security after the creation of the new Moroccan Agency of Nuclear and Radiological Safety and Security.


Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele Dec 2017

Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele

Journal of International Technology and Information Management

This paper provides an overview of the current state of privacy and data protection policies and regulations in Nigeria. The paper contends that the extant legal regime in Nigeria is patently inadequate to effectively protect individuals against abuse resulting from the processing of their personal data. The view is based on the critical analysis of the current legal regime in Nigeria vis-à-vis the review of some vital data privacy issues. The paper makes some recommendations for the reform of the law.


Multiple Content Adaptive Intelligent Watermarking Schemes For The Protection Of Blocks Of A Document Image, Chetan Kr Mr., S Nirmala Dr. Dec 2017

Multiple Content Adaptive Intelligent Watermarking Schemes For The Protection Of Blocks Of A Document Image, Chetan Kr Mr., S Nirmala Dr.

Journal of Digital Forensics, Security and Law

Most of the documents contain different types of information such as white space, static information and dynamic information or mix of static and dynamic information. In this paper, multiple watermarking schemes are proposed for protection of the information content. The proposed approach comprises of three phases. In Phase-1, the edges of the source document image are extracted and the edge image is decomposed into blocks of uniform size. In Phase-2, GLCM features like energy, homogeneity, contrast and correlation are extracted from each block and the blocks are classified as no-information, static, dynamic and mix of static and dynamic information content …


Solar System Battery Backups For Reactor Coolant Pumps During Electricity Outages Resulting From Natural Disasters, Md. Shamsul Huda Sohel Nov 2017

Solar System Battery Backups For Reactor Coolant Pumps During Electricity Outages Resulting From Natural Disasters, Md. Shamsul Huda Sohel

International Journal of Nuclear Security

In a nuclear power plant, its coolant system is major safety equipment. Coolant system failure causes several accidents in nuclear history. There are so many causes for coolant system failure. One of them is lack of electric power for coolant pumps. In typically NPP there is backup system for power redundancy. In this article, focus on reactor coolant system and its backup power when main grid lines failure. Here discuss about solar backup power for batteries and increases a safety lines for reactor coolant pumps. So, our main goal is providing a battery backup from reliable natural source and ensuring …


How Law Enforcement Unmanned Aircraft Systems (Uas) Could Improve Tactical Response To Active Shooter Situations: The Case Of The 2017 Las Vegas Shooting, Ryan J. Wallace, Jon M. Loffi Oct 2017

How Law Enforcement Unmanned Aircraft Systems (Uas) Could Improve Tactical Response To Active Shooter Situations: The Case Of The 2017 Las Vegas Shooting, Ryan J. Wallace, Jon M. Loffi

International Journal of Aviation, Aeronautics, and Aerospace

Using a case study methodology, this paper assesses the unique tactical challenges faced by law enforcement officers responding to the October 1, 2017, Las Vegas active shooter incident. The authors assessed the tactical strengths of the assailant, Stephen Paddock, and challenges faced by law enforcement personnel. The authors present several proposed applications of unmanned aircraft systems that could have potentially mitigated the active shooter’s tactical advantages.


Patentability Of Living Matter Related To Biofuel Production In The U.S., Nathan K. Shrewsbury Sep 2017

Patentability Of Living Matter Related To Biofuel Production In The U.S., Nathan K. Shrewsbury

Oklahoma Journal of Law and Technology

No abstract provided.


Can Schools Use Nanotechnology To Prevent Cell Phones From Ringing, Sarah C. Boyer Sep 2017

Can Schools Use Nanotechnology To Prevent Cell Phones From Ringing, Sarah C. Boyer

Oklahoma Journal of Law and Technology

No abstract provided.


The Gmo/Ge Debate, Joanna K. Sax Sep 2017

The Gmo/Ge Debate, Joanna K. Sax

Texas A&M Law Review

We live longer and healthier lives because advances in science create easier and better ways to sustain and survive. Society has an intricate relationship with biotechnology. Vaccines save lives. Fluoridated water decreases dental issues. Antibiotics treat bacterial infections. Nuclear power is a form of clean energy. With any emerging technology, the benefits do not exist in a vacuum, thus, negative consequences result as well. Our widespread uses of antibiotics are creating antibiotic-resistant strains of bacteria. Our research into nuclear energy also facilitated the creation of nuclear bombs. Perhaps it is human nature to use scientific advances for good and for …


Nigeria's Power Sector Roadmap: Policy Perspectives And Prospects, Bandele A. G. Amoo, O. M. Adebayo, Derek Ibeagha Sep 2017

Nigeria's Power Sector Roadmap: Policy Perspectives And Prospects, Bandele A. G. Amoo, O. M. Adebayo, Derek Ibeagha

Bullion

Various strategies have been employed over the years by the Government to boost power in the country. These strategies have been hinged on policies, reforms and roadmaps, including the 2005 Electric Power Sector Reform Act, the Roadmap for Power Sector Reform 2010 and the current Roadmap for Change. A perfunctory look at previous reforms has resulted in significant progress, including unbundling and privatizing the long-standing government-owned monopoly in the power sector. This paper takes a comprehensive assessment of the Roadmap of Change comparing it to previous policies, isolating policy perspectives, prospects and challenges facing it. It also gleans lessons from …


Transforming The Insurance Sector In Nigeriain Using The Fss 2020 Platform, Chris O. Muo Sep 2017

Transforming The Insurance Sector In Nigeriain Using The Fss 2020 Platform, Chris O. Muo

Bullion

The National lnsurance Commission (NAICOM) is the statutory Regulatory body of insurance business created to ensure the effective administration, supervision and regulation of insurance business and regulate transactions between insurers and reinsurers within and outside Nigeria. FSS 2020 Insurance Sector, in collaboration with NAICOM aims to deepen the insurance market; ensure lnsurance credibility and protect policy holders; Embed governance and risk management framework for the lnsurance Companies; Enhance access to finance (financial inclusion) with business development support and new products; and risk-based capitalization of lnsurance Companies.


How To Enhance Interdisciplinary Competence—Interdisciplinary Problem-Based Learning Versus Interdisciplinary Project-Based Learning, Mirjam Brassler, Jan Dettmers Jul 2017

How To Enhance Interdisciplinary Competence—Interdisciplinary Problem-Based Learning Versus Interdisciplinary Project-Based Learning, Mirjam Brassler, Jan Dettmers

Interdisciplinary Journal of Problem-Based Learning

Interdisciplinary competence is important in academia for both employability and sustainable development. However, to date, there are no specific interdisciplinary education models and, naturally, no empirical studies to assess them. Since problem-based learning (PBL) and project-based learning (PjBL) are learning approaches that emphasize students’ collaboration, both pedagogies seem suitable to enhance students’ interdisciplinary competence. Based on the principle of constructive alignment and four instructional principles on interdisciplinary learning, this paper proposes that students profit more from interdisciplinary PBL (iPBL) than interdisciplinary PjBL (iPjBL). A pre-post study was conducted with a sample of 95 students participating in iPBL and 183 students …


2016 "Meeting Of The Minds" Research Symposium Abstracts May 2017

2016 "Meeting Of The Minds" Research Symposium Abstracts

OSR Journal of Student Research

No abstract provided.


Artificial Islands In The South China Sea, Aaron Holmes May 2017

Artificial Islands In The South China Sea, Aaron Holmes

OSR Journal of Student Research

The purpose of this study was to understand the value and implications of artificial islands constructed by the People's Republic of China (PRC) in the South China Sea. Qualitative analysis was used with the available literature, sources, and treaties of the topics concerned. The paper concludes that the PRC gains many benefits primarily within the realm of energy security and explores what effects they may


The Face That Launched A Thousand Ships: Helen Of Troy In The Poetry Of Atwood And Tufts, Alea Walstrom May 2017

The Face That Launched A Thousand Ships: Helen Of Troy In The Poetry Of Atwood And Tufts, Alea Walstrom

OSR Journal of Student Research

This paper considers the transformation of Greek myth over time, how character’s attributes change over time, and ultimately how contemporary poets employ these myths. The myth of focus in the paper is that of Helen of Troy and the depiction of her character throughout the many years and variations of the myth. Her character is then considered in the contemporary feminist poetry of Carol Tufts and Margaret Atwood.


Table Of Contents Mar 2017

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Mar 2017

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Special Issue Of Best Papers From The 11th International Conference On Systematic Approaches To Digital Forensic Engineering (Sadfe 2016) Mar 2017

Special Issue Of Best Papers From The 11th International Conference On Systematic Approaches To Digital Forensic Engineering (Sadfe 2016)

Journal of Digital Forensics, Security and Law

The SADFE series feature the different editions of the International Conference on Systematic Approaches to Digital Forensics Engineering. Now in its eleventh edition, SADFE has established itself as the premier conference for researchers and practitioners working in Systematic Approaches to Digital Forensics Engineering.

SADFE 2016, the eleventh international conference on Systematic Approaches to Digital Forensic Engineering was held in Kyoto, Japan, September 20 - 22, 2016.

Digital forensics engineering and the curation of digital collections in cultural institutions face pressing and overlapping challenges related to provenance, chain of custody, authenticity, integrity, and identity. The generation, analysis and sustainability of digital …


A Forensic Email Analysis Tool Using Dynamic Visualization, Johannes Stadlinger, Andreas Dewald Mar 2017

A Forensic Email Analysis Tool Using Dynamic Visualization, Johannes Stadlinger, Andreas Dewald

Journal of Digital Forensics, Security and Law

Communication between people counts to the most important information of today’s business. As a result, in case of forensic investigations in big companies, analysis of communication data in general and especially email, as the still most widely used business communication platform with an immense and still growing volume, is a typical task in digital forensics. One of the challenges is to identify the relevant communication partners and structures in the suspects surrounding as quickly as possible in order to react appropriately and identify further targets of evaluation. Due to the amount of emails in typical inboxes, reading through all the …


Find Me If You Can: Mobile Gps Mapping Applications Forensic Analysis & Snavp The Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, Frank Breitinger Mar 2017

Find Me If You Can: Mobile Gps Mapping Applications Forensic Analysis & Snavp The Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, Frank Breitinger

Journal of Digital Forensics, Security and Law

The use of smartphones as navigation devices has become more prevalent. The ubiquity of hand-held navigation devices such as Garmins or Toms Toms has been falling whereas the ownership of smartphones and their adoption as GPS devices is growing. This work provides a comprehensive study of the most popular smartphone mapping applications, namely Google Maps, Apple Maps, Waze, MapQuest, Bing, and Scout, on both Android and iOS. It details what data was found, where it was found, and how it was acquired for each application. Based on the findings, the work allowed for the construction of a tool capable of …


Compression Of Virtual-Machine Memory In Dynamic Malware Analysis, James E. Fowler Ph.D. Mar 2017

Compression Of Virtual-Machine Memory In Dynamic Malware Analysis, James E. Fowler Ph.D.

Journal of Digital Forensics, Security and Law

Lossless compression of memory dumps from virtual machines that run malware samples is considered with the goal of significantly reducing archival costs in dynamic-malware-analysis applications. Given that, in such dynamic-analysis scenarios, malware samples are typically run in virtual machines just long enough to activate any self-decryption or other detection- avoidance maneuvers, the virtual-machine memory typically changes little from that of the baseline state, with the difference being attributable in large degree to the loading of additional executables and libraries. Consequently, delta coding is proposed to compress the current virtual-machine memory dump by coding its differences with respect to a predicted …


Proceedings (Abstracts) From The 2nd Annual Student Research Symposium “Meeting Of The Minds” And The 27th Annual Csusb Student Research Competition Feb 2017

Proceedings (Abstracts) From The 2nd Annual Student Research Symposium “Meeting Of The Minds” And The 27th Annual Csusb Student Research Competition

OSR Journal of Student Research

No abstract provided.


Finding The Balance Between Price And Protection: Establishing A Surface-To-Air Fire Risk-Reduction Training Policy For Air-Carrier Pilots, Earl W. Burress Jr., Ph.D. Jan 2017

Finding The Balance Between Price And Protection: Establishing A Surface-To-Air Fire Risk-Reduction Training Policy For Air-Carrier Pilots, Earl W. Burress Jr., Ph.D.

Journal of Aviation/Aerospace Education & Research

Currently, U.S. air carriers do not provide equipment or training necessary to mitigate the risk posed by surface-to-air fire (SAFIRE) threats. These threats consist of self-guided weapons (infrared shoulder-fired surface-to-air missiles), manually-aimed threats (small arms, recoilless grenade launchers, rockets, and light anti-aircraft artillery), and hand-held lasers. Technological solutions to counter infrared shoulder-fired missiles have been explored, but were rejected due to prohibitive equipment and maintenance costs. A lower cost option, providing air-carrier pilots with SAFIRE risk-reduction training, has not been formally addressed by the air-carrier industry or the U.S. federal government. This effort will use a business concept, the Cost-Benefit …


Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian Jan 2017

Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian

Journal of International Technology and Information Management

The rapid growth of AI systems has implications on a wide variety of fields. It can prove to be a boon to disparate fields such as healthcare, education, global logistics and transportation, to name a few. However, these systems will also bring forth far-reaching changes in employment, economy and security. As AI systems gain acceptance and become more commonplace, certain critical questions arise: What are the legal and security ramifications of the use of these new technologies? Who can use them, and under what circumstances? What is the safety of these systems? Should their commercialization be regulated? What are the …