Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Embry-Riddle Aeronautical University

2012

Discipline
Keyword
Publication
Publication Type

Articles 31 - 60 of 114

Full-Text Articles in Engineering

An Experimental Investigation Of Glare And Restructured Fiber Metal Laminates, Adelina Vanessa Benedict Jun 2012

An Experimental Investigation Of Glare And Restructured Fiber Metal Laminates, Adelina Vanessa Benedict

Doctoral Dissertations and Master's Theses

Fiber Metal Laminates (FMLs) are a group of materials fabricated by bonding glass/epoxy layers within metal layers. This class of materials can provide good mechanical properties, as well as weight savings. An FML known as Glass Laminate Aluminum Reinforced Epoxy (GLARE) was studied. An experimental investigation comprising of microscopy and tensile testing was carried out using different grades of GLARE. Microscopy revealed the construction details of GLARE, while tensile testing provided means of measuring and analyzing its stress-strain responses. Next, different metal surface pretreatment methods were explored. These included sandblasting, Phosphoric Acid Anodizing (PAA), and AC-130 Sol-Gel treatment. Woven S-2 …


Digital Evidence Education In Schools Of Law, Aaron Alva, Barbara Endicott-Popovsky May 2012

Digital Evidence Education In Schools Of Law, Aaron Alva, Barbara Endicott-Popovsky

Annual ADFSL Conference on Digital Forensics, Security and Law

An examination of State of Connecticut v. Julie Amero provides insight into how a general lack of understanding of digital evidence can cause an innocent defendant to be wrongfully convicted. By contrast, the 101-page opinion in Lorraine v. Markel American Insurance Co. provides legal precedence and a detailed consideration for the admission of digital evidence. An analysis of both cases leads the authors to recommend additions to Law School curricula designed to raise the awareness of the legal community to ensure such travesties of justice, as in the Amero case, don’t occur in the future. Work underway at the University …


A Case Study Of The Challenges Of Cyber Forensics Analysis Of Digital Evidence In A Child Pornography Trial, Richard Boddington May 2012

A Case Study Of The Challenges Of Cyber Forensics Analysis Of Digital Evidence In A Child Pornography Trial, Richard Boddington

Annual ADFSL Conference on Digital Forensics, Security and Law

Perfunctory case analysis, lack of evidence validation, and an inability or unwillingness to present understandable analysis reports adversely affect the outcome course of legal trials reliant on digital evidence. These issues have serious consequences for defendants facing heavy penalties or imprisonment yet expect their defence counsel to have clear understanding of the evidence. Poorly reasoned, validated and presented digital evidence can result in conviction of the innocent as well as acquittal of the guilty. A possession of child pornography Case Study highlights the issues that appear to plague case analysis and presentation of digital evidence relied on in these odious …


After Five Years Of E-Discovery Missteps: Sanctions Or Safe Harbor?, Milton Luoma, Vicki Luoma May 2012

After Five Years Of E-Discovery Missteps: Sanctions Or Safe Harbor?, Milton Luoma, Vicki Luoma

Annual ADFSL Conference on Digital Forensics, Security and Law

In 2003 the Zubulake case became the catalyst of change in the world of e-discovery. In that case Judge Shira Scheindlin of the United States District Court for the Southern District of New York set guidelines for e-discovery that served as the basis for amending the Federal Rules of Civil Procedure (FRCP) in December 2006. The amendments incorporated a number of concepts that were described by Judge Scheindlin in the Zubulake case. ( Zubulake v. UBS Warburg LLC, 2003) Since the Zubulake case and the FRCP amendments, numerous cases have interpreted these rules changes, but one of the main points …


Multi-Parameter Sensitivity Analysis Of A Bayesian Network From A Digital Forensic Investigation, Richard E. Overill, Echo P. Zhang, Kam-Pui Chow May 2012

Multi-Parameter Sensitivity Analysis Of A Bayesian Network From A Digital Forensic Investigation, Richard E. Overill, Echo P. Zhang, Kam-Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

A multi-parameter sensitivity analysis of a Bayesian network (BN) used in the digital forensic investigation of the Yahoo! email case has been performed using the principle of ‘steepest gradient’ in the parameter space of the conditional probabilities. This procedure delivers a more reliable result for the dependence of the posterior probability of the BN on the values used to populate the conditional probability tables (CPTs) of the BN. As such, this work extends our previous studies using singleparameter sensitivity analyses of BNs, with the overall aim of more deeply understanding the indicative use of BNs within the digital forensic and …


Facilitating Forensics In The Mobile Millennium Through Proactive Enterprise Security, Andrew R. Scholnick May 2012

Facilitating Forensics In The Mobile Millennium Through Proactive Enterprise Security, Andrew R. Scholnick

Annual ADFSL Conference on Digital Forensics, Security and Law

This work explores the impact of the emerging mobile communication device paradigm on the security-conscious enterprise, with regard to providing insights for proactive Information Assurance and facilitation of eventual Forensic analysis. Attention is given to technology evolution in the areas of best practices, attack vectors, software and hardware performance, access and activity monitoring, and architectural models.

Keywords: Forensics, enterprise security, mobile communication, best practices, attack vectors.


Cloud Forensics Investigation: Tracing Infringing Sharing Of Copyrighted Content In Cloud, Yi-Jun He, Echo P. Zhang, Lucas C.K. Hui, Siu Ming Yiu, K.P. Chow May 2012

Cloud Forensics Investigation: Tracing Infringing Sharing Of Copyrighted Content In Cloud, Yi-Jun He, Echo P. Zhang, Lucas C.K. Hui, Siu Ming Yiu, K.P. Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Cloud Computing is becoming a significant technology trend nowadays, but its abrupt rise also creates a brand new front for cybercrime investigation with various challenges. One of the challenges is to track down infringing sharing of copyrighted content in cloud. To solve this problem, we study a typical type of content sharing technologies in cloud computing, analyze the challenges that the new technologies bring to forensics, formalize a procedure to get digital evidences and obtain analytical results based on the evidences to track down illegal uploader. Furthermore, we propose a reasoning model based on the probability distribution in a Bayesian …


Ipad2 Logical Acquisition: Automated Or Manual Examination?, Somaya Ali, Sumaya Alhosani, Farah Alzarooni, Ibrahim Baggili May 2012

Ipad2 Logical Acquisition: Automated Or Manual Examination?, Somaya Ali, Sumaya Alhosani, Farah Alzarooni, Ibrahim Baggili

Annual ADFSL Conference on Digital Forensics, Security and Law

Due to their usage increase worldwide, iPads are on the path of becoming key sources of digital evidence in criminal investigations. This research investigated the logical backup acquisition and examination of the iPad2 device using the Apple iTunes backup utility while manually examining the backup data (manual examination) and automatically parsing the backup data (Lantern software - automated examination). The results indicate that a manual examination of the logical backup structure from iTunes reveals more digital evidence, especially if installed application data is required for an investigation. However, the researchers note that if a quick triage is needed of an …


A Fuzzy Hashing Approach Based On Random Sequences And Hamming Distance, Frank Breitinger, Harald Baier May 2012

A Fuzzy Hashing Approach Based On Random Sequences And Hamming Distance, Frank Breitinger, Harald Baier

Annual ADFSL Conference on Digital Forensics, Security and Law

Hash functions are well-known methods in computer science to map arbitrary large input to bit strings of a fixed length that serve as unique input identifier/fingerprints. A key property of cryptographic hash functions is that even if only one bit of the input is changed the output behaves pseudo randomly and therefore similar files cannot be identified. However, in the area of computer forensics it is also necessary to find similar files (e.g. different versions of a file), wherefore we need a similarity preserving hash function also called fuzzy hash function. In this paper we present a new approach for …


The Xbox 360 And Steganography: How Criminals And Terrorists Could Be "Going Dark", Ashley Podhradsky, Rob D’Ovidio, Cindy Casey May 2012

The Xbox 360 And Steganography: How Criminals And Terrorists Could Be "Going Dark", Ashley Podhradsky, Rob D’Ovidio, Cindy Casey

Annual ADFSL Conference on Digital Forensics, Security and Law

Video game consoles have evolved from single-player embedded systems with rudimentary processing and graphics capabilities to multipurpose devices that provide users with parallel functionality to contemporary desktop and laptop computers. Besides offering video games with rich graphics and multiuser network play, today's gaming consoles give users the ability to communicate via email, video and text chat; transfer pictures, videos, and file;, and surf the World-Wide-Web. These communication capabilities have, unfortunately, been exploited by people to plan and commit a variety of criminal activities. In an attempt to cover the digital tracks of these unlawful undertakings, anti-forensic techniques, such as steganography, …


Double-Compressed Jpeg Detection In A Steganalysis System, Jennifer L. Davidson, Pooja Parajape May 2012

Double-Compressed Jpeg Detection In A Steganalysis System, Jennifer L. Davidson, Pooja Parajape

Annual ADFSL Conference on Digital Forensics, Security and Law

The detection of hidden messages in JPEG images is a growing concern. Current detection of JPEG stego images must include detection of double compression: a JPEG image is double compressed if it has been compressed with one quality factor, uncompressed, and then re-compressed with a different quality factor. When detection of double compression is not included, erroneous detection rates are very high. The main contribution of this paper is to present an efficient double-compression detection algorithm that has relatively lower dimensionality of features and relatively lower computational time for the detection part, than current comparative classifiers. We use a model-based …


Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser May 2012

Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser

Annual ADFSL Conference on Digital Forensics, Security and Law

The National Repository of Digital Forensics Information (NRDFI) is a knowledge repository for law enforcement digital forensics investigators (LEDFI). Over six years, the NRDFI has undertaken significant design revisions in order to more closely align the architecture of the system with theory addressing motivation to share knowledge and communication within ego-centric groups and communities of practice. These revisions have been met with minimal change in usage patterns by LEDFI community members, calling into question the applicability of relevant theory when the domain for knowledge sharing activities expands beyond the confines of an individual organization to a community of practice. When …


A Proposal For Incorporating Programming Blunder As Important Evidence In Abstraction-Filtration-Comparison Test, P. Vinod Bhattathiripad May 2012

A Proposal For Incorporating Programming Blunder As Important Evidence In Abstraction-Filtration-Comparison Test, P. Vinod Bhattathiripad

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper investigates an unexplored concept in Cyber Forensics, namely, a Programming Blunder. Programming Blunder is identified as a variable or a code segment or a field in a database table, which is hardly used or executed in the context of the application or the user’s functionality. Blunder genes can be found in many parts of any program. It is the contention of this paper that this phenomenon of blunders needs to be studied systematically from its very genetic origins to their surface realizations in contrast to bugs and flaws, especially in view of their importance in software copyright infringement …


Update On The State Of The Science Of Digital Evidence Examination, Fred Cohen May 2012

Update On The State Of The Science Of Digital Evidence Examination, Fred Cohen

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper updates previous work on the level of consensus in foundational elements of digital evidence examination. Significant consensus is found present only after definitions are made explicit, suggesting that, while there is a scientific agreement around some of the basic notions identified, the use of a common language is lacking.

Keywords: Digital forensics examination, terminology, scientific methodology, testability, validation, classification, scientific consensus


Spacecraft And Propulsion Technician Error, Daniel Clyde Schultz May 2012

Spacecraft And Propulsion Technician Error, Daniel Clyde Schultz

Doctoral Dissertations and Master's Theses

Commercial aviation and commercial space similarly launch, fly, and land passenger vehicles. Unlike aviation, the U.S. government has not established maintenance policies for commercial space. This study conducted a mixed methods review of 610 U.S. space launches from 1984 through 2011, which included 31 failures. An analysis of the failure causal factors showed that human error accounted for 76% of those failures, which included workmanship error accounting for 29% of the failures. With the imminent future of commercial space travel, the increased potential for the loss of human life demands that changes be made to the standardized procedures, training, and …


Even Moderate Visual Impairments Degrade Drivers' Ability To See Pedestrians At Night, Joanne M. Wood, Richard A. Tyrell, Alex Chaparro, Ralph P. Marszalek, Trent P. Carberry, Byoung Sun Chu May 2012

Even Moderate Visual Impairments Degrade Drivers' Ability To See Pedestrians At Night, Joanne M. Wood, Richard A. Tyrell, Alex Chaparro, Ralph P. Marszalek, Trent P. Carberry, Byoung Sun Chu

Publications

PURPOSE. To determine the effect of moderate levels of refractive blur and simulated cataracts on nighttime pedestrian conspicuity in the presence and absence of headlamp glare.

METHODS. The ability to recognize pedestrians at night was measured in 28 young adults (M ¼ 27.6 years) under three visual conditions: normal vision, refractive blur, and simulated cataracts; mean acuity was 20/40 or better in all conditions. Pedestrian recognition distances were recorded while participants drove an instrumented vehicle along a closed road course at night. Pedestrians wore one of three clothing conditions and oncoming headlamps were present for 16 participants and absent for …


The Effect Of Cockpit Noise On The Temporary Threshold Shift Of Cessna 172sp Flight Instructors, Andrew Robert Bellini May 2012

The Effect Of Cockpit Noise On The Temporary Threshold Shift Of Cessna 172sp Flight Instructors, Andrew Robert Bellini

Doctoral Dissertations and Master's Theses

The purpose of this thesis was to study the temporary threshold shift of general aviation flight instructors resulting from their working environment. Exposure to noise before a temporary threshold shift completely recovers can cause a permanent threshold shift with no possibility of recovery, resulting in permanent hearing loss. A result showing minimal to no temporary threshold shift would indicate that hearing personal protective equipment is working properly. This study used sound-level measurements, and audiometric testing, together with survey data to determine whether or not flight instructors were at risk for potential hearing impairment due to temporary threshold shift. Independent t …


The Engineering Process For The Design Of A Motorcycle Chassis And Suspension, Derek J. Noce May 2012

The Engineering Process For The Design Of A Motorcycle Chassis And Suspension, Derek J. Noce

Doctoral Dissertations and Master's Theses

The thesis objective is to define and establish an engineering process for the design of a modern motorcycle chassis and suspension. The engineering process focuses on the interdisciplinary fields of engineering dealing with design and structural optimization. Specialized software, such as Motorcycle Kinematics, MATLAB, CATIA, HEEDS Professional, and NASTRAN are utilized. Motorcycle Kinematics is used to set up the preliminary motorcycle geometry, and MATLAB is a used to analyze the kinematics and stability of the motorcycle based on this geometry. CATIA (Computer Aided Three-Dimensional Interactive Application) is used to graphically illustrate the geometry of the motorcycle in three dimensional space. …


The History Of Air Traffic Control, Rose Marie Kern Apr 2012

The History Of Air Traffic Control, Rose Marie Kern

ERAU Prescott Aviation History Program

Did you know that the United States Aviation program began as a subdivision of the Federal Bureau of Lighthouses? Hear the fascinating story of the steps taken to bring organization to to the wild, new and exciting world of aviation at the beginning of the 20th Century. Kern will also discuss how various branches of the ATC came into being as well as some future plans of the FAA.


Asteroid Retrieval Feasibility Study, John Brophy, Fred Culick, Louis Friedman, Pedro Llanos, Et Al. Apr 2012

Asteroid Retrieval Feasibility Study, John Brophy, Fred Culick, Louis Friedman, Pedro Llanos, Et Al.

Publications

This report describes the results of a study sponsored by the Keck Institute for Space Studies (KISS) to investigate the feasibility of identifying, robotically capturing, and returning an entire Near-Earth Asteroid (NEA) to the vicinity of the Earth by the middle of the next decade. The KISS study was performed by people from Ames Research Center, Glenn Research Center, Goddard Space Flight Center, Jet Propulsion Laboratory, Johnson Space Center, Langley Research Center, the California Institute of Technology, Carnegie Mellon, Harvard University, the Naval Postgraduate School, University of California at Los Angeles, University of California at Santa Cruz, University of Southern …


Teaching Higher On Bloom's Taxonomy: Experience In Introduction To Graphical Communications Course, Lulu Sun, Christopher Grant Apr 2012

Teaching Higher On Bloom's Taxonomy: Experience In Introduction To Graphical Communications Course, Lulu Sun, Christopher Grant

Publications

Introduction to Graphical Communications is designed to familiarize the student with the basic principles of engineering drawing, to improve three dimensional visualization skills, and to teach the fundamentals of a computer aided design program. Much of the instruction is focused on knowledge and comprehension, low levels of Bloom's taxonomy. However, the students' ability to use this knowledge and comprehension to explore real engineering design is unknown. This paper includes the implementation of Bloom's taxonomy in the Introduction to Graphical Communications course, and shows how students are moved up Bloom's taxonomy by including a group final project into the course. Students …


Naturalistic Study Examining The Data/Frame Model Of Sensemaking By Assessing Experts In Complex, Time-Pressured Aviation Domains, Katherine P. Kaste Apr 2012

Naturalistic Study Examining The Data/Frame Model Of Sensemaking By Assessing Experts In Complex, Time-Pressured Aviation Domains, Katherine P. Kaste

Doctoral Dissertations and Master's Theses

Research on expert chess players, radiologists and landmine detection personnel suggests a use of cognitive frameworks, alternatively referred to as schemas, templates, scripts, frames and models, to effectively perceive, interpret, understand, recall, and anticipate information. These experts may use cognitive frameworks to capture past experience in ways that support rapid pattern recognition, adaptive responses and proactivity. The proposed research approach assumes that experienced pilots will similarly rely on cognitive frameworks to handle information and make sense of complex, fast-moving situations experienced in their information-dense environments. Predictions from Klein et al.'s (2006) Data/Frame Model of Sensemaking were used to evaluate event-based …


The Development Of A Force Balance For Testing Micro Aerial Vehicles, Michael Christopher King Apr 2012

The Development Of A Force Balance For Testing Micro Aerial Vehicles, Michael Christopher King

Doctoral Dissertations and Master's Theses

The purpose of this work was to create a six degree of freedom balance that could produce meaningful data for micro aerial vehicles. Research was conducted to investigate the common balance configurations, and the strengths and weaknesses of each configuration were used to select the most appropriate design. The limitations of available fabrication facilities, the desired level of performance and the end user of the balance were all considered to finalize the design. The balance and data acquisition system were fabricated over a period of several months, and unforeseen design issues were handled forthwith. Rigorous calibration and testing processes were …


High-Fidelity Modeling Of Airfoil Interaction With Upstream Turbulence, Jacob Brodnick Apr 2012

High-Fidelity Modeling Of Airfoil Interaction With Upstream Turbulence, Jacob Brodnick

Doctoral Dissertations and Master's Theses

To supplement past research on low speed unsteady airfoil responses to upstream disturbances, this work proposes and investigates a method to generate a turbulent momentum source to be convected downstream and interact with an SD7003 airfoil in a high-fidelity numerical simulation. A perturbation velocity field is generated from a summation of Fourier harmonics and applied to the forcing function in the momentum terms of the Navier Stokes Equations. The result is a three-dimensional, divergence-free, convected turbulent gust with applied statistical parameters. A parametric study has been done in 2D and 3D comparing the resultant flow fields and airfoil interactions for …


Low-Cost Flight Test Telemetry Systems, Mario Noriega Fogliani Apr 2012

Low-Cost Flight Test Telemetry Systems, Mario Noriega Fogliani

Doctoral Dissertations and Master's Theses

A traditional Flight Test Telemetry system is based on a peer-to-peer architecture where a system of antennae enables a signal to be transmitted between an aircraft and a receiving ground station. Said system generally requires costly infrastructures on the ground and complex antennae components to be installed on the aircraft. Newer approaches may use satellite communications, but the available spectrum is being encroached by commercial wireless networks such as mobile broadband. Given the very fast growth that the mobile broadband technology is experiencing, it might be feasible to utilize this ever-expanding new infrastructure as a low-cost alternative to conventional flight …


An Evaluation Of Rta Symbols To Improve Pilot Situation Awareness, Erik D. Schmidt Apr 2012

An Evaluation Of Rta Symbols To Improve Pilot Situation Awareness, Erik D. Schmidt

Doctoral Dissertations and Master's Theses

The purpose of this study was to evaluate different types of temporal guidance symbol sets in 4]Dimensional displays. Different displays were evaluated using situation awareness (SA) as a dependent measure. Participants were a mixture of non]pilots and pilots with an average flight time of 155 hours. All 24 participants were randomly assigned to their experimental condition. Objective SA data was collected during the experiment. After the experiment, each participant completed a subjective questionnaire. No significance was found between the pilots and non-pilots. No significance was found between types of displays. And, no interaction was found between groups.


Design And Optimization Of A Deflagration To Detonation Transition (Ddt) Section, Francisco X. Romo Apr 2012

Design And Optimization Of A Deflagration To Detonation Transition (Ddt) Section, Francisco X. Romo

Doctoral Dissertations and Master's Theses

Throughout the previous century, hydrocarbon-fueled engines have used and optimized the `traditional' combustion process called deflagration (subsonic combustion). An alternative form of combustion, detonation (supersonic combustion), can increase the thermal efficiency of the process by anywhere from 20 - 50%. Even though several authors have studied detonation waves since the 1890's and a plethora of papers and books have been published, it was not until 2008 that the first detonation-powered flight took place. It lasted for 10 seconds at 100 ft. altitude. Achieving detonation presents its own challenges: some fuels are not prone to detonate, severe vibrations caused by the …


Analysis Of The Effects Of Hypoxia On Cognitive Processing Ability, Meaghan Catherine Hart Apr 2012

Analysis Of The Effects Of Hypoxia On Cognitive Processing Ability, Meaghan Catherine Hart

Doctoral Dissertations and Master's Theses

This one way repeated measures analysis with five levels of oxygen saturation used the Embry Riddle Aeronautical University Normobaric High Altitude Lab (HAL) to determine the cognitive reduction in spatial orientation and mental math ability experienced by individuals at progressively increasing levels of hypoxia, measured in blood oxygen saturation, when exposed to the FAA legal altitude of 15,000 feet. Each of the eleven participants in the study ( N = 11) were exposed to both a normoxic normobaric (nominal PO2 = 21%) environment in a conference room and hypoxic normobaric environment (PO2 = 12.21%) in the Embry Riddle Aeronautical University …


Assessing Color Discrimination, Joshua R. Maxwell Apr 2012

Assessing Color Discrimination, Joshua R. Maxwell

Doctoral Dissertations and Master's Theses

The purpose of this study was to evaluate human color vision discriminability within individuals that have color normal vision and those that have color deficient vision. Combinations of 15 colors were used from a list of colors recommended for computer displays in Air Traffic Control settings, a population with some mildly color vision deficient individuals. After a match to sample test was designed to assess the limits of human color vision discrimination based on color saturation and hue, standard color diagnostic tests were used to categorize college students as having normal or deficient color vision. The results argue that color …


Useful Field Of View Predicts Driving In The Presence Of Distracters, Joanne M. Wood, Alex Chaparro, Philippe Lacherez, Louise Hickson Apr 2012

Useful Field Of View Predicts Driving In The Presence Of Distracters, Joanne M. Wood, Alex Chaparro, Philippe Lacherez, Louise Hickson

Publications

Purpose. The Useful Field of View (UFOV®) test has been shown to be highly effective in predicting crash risk among older adults. An important question which we examined in this study is whether this association is due to the ability of the UFOV to predict difficulties in attention-demanding driving situations that involve either visual or auditory distracters.

Methods. Participants included 92 community-living adults (mean age 73.6 +- 5.4 years; range 65– 88 years) who completed all three subtests of the UFOV involving assessment of visual processing speed (subtest 1), divided attention (subtest 2), and selective attention (subtest 3); driving safety …