Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 35

Full-Text Articles in Engineering

An Assessment Of The Effects Of Desertification In Yobe State, Nigeria, Jibril Musa Phd Dec 2012

An Assessment Of The Effects Of Desertification In Yobe State, Nigeria, Jibril Musa Phd

Confluence Journal Environmental Studies (CJES), Kogi State University, Nigeria

Desertification is one of the most serious environmental and socio-economic problems of our time. Desertification describes circumstances of land degradation in arid, semi-arid and dry sub-humid regions resulting from the climatic variation and human activities. The fundamental goal of this thesis was to assess the effects of desertification in Yobe State, Nigeria. The present threat of desertification in the sahel has reached an alarming stage where crops cultivation and animal rearing/grazing are no more productive, soil has lost its nutrient/fertility, various infrastructure had given way because of windstorm from the neighbouring Niger Republic and sand dunes had taken over. The …


Using Remote Sensing Data To Improve Rice Production In Kutigi, Niger State, Nigeria, Jibril Musa Phd, M B. Yunusa Dec 2012

Using Remote Sensing Data To Improve Rice Production In Kutigi, Niger State, Nigeria, Jibril Musa Phd, M B. Yunusa

Confluence Journal Environmental Studies (CJES), Kogi State University, Nigeria

This research work looked in the used of Remote Sensing to improve Agricultural production in Kutigi, Niger State. The aim of the study is to use remote sensing to improve rice farming activities in Kutigi, Niger State. It is very important to identify such methods to improve Agricultural production because experts are always interested in new researches and findings to better the standard of living in any environment. In view of this, Remotely-sensed data could be used or employed to elevate most of these agricultural problems in Kutigi through the following objectives: Using Landsat imagery to assess the present landuse …


Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg Dec 2012

Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg

Jan Kallberg

La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los satélites forman parte …


The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther Nov 2012

The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther

Jan Kallberg

With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.


Review Of The Challenger Launch Decision: Risky Technology, Culture And Deviance At Nasa, Peter F. Meiksins Oct 2012

Review Of The Challenger Launch Decision: Risky Technology, Culture And Deviance At Nasa, Peter F. Meiksins

Peter Meiksins

Reviews the book "The Challenger Launch Decision: Risky Technology, Culture and Deviance at NASA," by Diane Vaughan.


Variations In Climatic Parameters And Food Crop Yields: Implications On Food Security In Benue State, Nigeria., Emmanuel Adamgbe, Fanan Ujoh Oct 2012

Variations In Climatic Parameters And Food Crop Yields: Implications On Food Security In Benue State, Nigeria., Emmanuel Adamgbe, Fanan Ujoh

Confluence Journal Environmental Studies (CJES), Kogi State University, Nigeria

Agricultural production in Nigeria like in other developing countries is highly vulnerable to variations in climatic parameters which may have inverse or direct effect on the performance of food crops. This paper examines the patterns and trends of the variations in the climatic parameters and the implications of such variations on efficient yield rates of some food crops in Benue State using data on climatic variables (rainfall, temperature, sunshine) and the yield of some crops per hectare for 25 years (1986-2010). Data on the climatic variables were collected from the Nigerian Meteorological Agency, AirForce Base, Makurdi while the data on …


Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg Oct 2012

Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg

Jan Kallberg

In releasing the United States Department of Defense’s (DoD) Sustaining U.S. Global Leadership: Priorities for 21st Century Defense and Defense Budget Priorities and Choices in January 2012, President Barack Obama and Secretary of Defense Leon Panetta offered a rationale for the administration’s reductions in defense spending. By stating that the shift in strategic direction is an effort to “put our fiscal house in order” and a response to the 2011 Budget Control Act, which requires DoD to reduce spending by $487 billion between fiscal years 2012 and 2021, the United States’ NATO partners in Europe were given considerable reason for …


An Exercise With The He’S Variation Iteration Method To A Fractional Bernoulli Equation Arising In A Transient Conduction With A Non-Linear Boundary Heat Flux, Jordan Hristov Oct 2012

An Exercise With The He’S Variation Iteration Method To A Fractional Bernoulli Equation Arising In A Transient Conduction With A Non-Linear Boundary Heat Flux, Jordan Hristov

Jordan Hristov

Surface temperature evolution of a body subjected to a nonlinear heat flux involving counteracting convection heating and radiation cooling has been solved by the variations iteration method (VIM) of He. The surface temperature equations comes as a combination of the time-fractional (half-time) subdiffusion model of the heat conduction and the boundary condition relating the temperature field gradient at the surface through the Riemann-Liouville fractional integral. The result of this equation is a Bernoulli-type ordinary fractional equation with a nonlinear term of 4th order. Two approaches in the identification of the general Lagrange multiplier and a consequent application of VIM have …


Minimization Of Collateral Damage In Airdrops And Airstrikes, Steven P. Dillenburger Sep 2012

Minimization Of Collateral Damage In Airdrops And Airstrikes, Steven P. Dillenburger

Theses and Dissertations

Collateral damage presents a significant risk during air drops and airstrikes, risking citizens' lives and property, straining the relationship between the United States Air Force and host nations. This dissertation presents a methodology to determine the optimal location for making supply airdrops in order to minimize collateral damage while maintaining a high likelihood of successful recovery. A series of non-linear optimization algorithms is presented along with their relative success in finding the optimal location in the airdrop problem. Additionally, we present a quick algorithm for accurately creating the Pareto frontier in the multi-objective airstrike problem. We demonstrate the effect of …


Financial Feasibility Analysis Of Ship Sale-Leaseback Base On Excel Model, Xi Lin Aug 2012

Financial Feasibility Analysis Of Ship Sale-Leaseback Base On Excel Model, Xi Lin

World Maritime University Dissertations

No abstract provided.


Research On Risk Management Of Ship Financial Leasing In Cimc Financial Leasing Company, Zhangcheng Shi Aug 2012

Research On Risk Management Of Ship Financial Leasing In Cimc Financial Leasing Company, Zhangcheng Shi

World Maritime University Dissertations

No abstract provided.


Risk Measurement Of Coal Freight Rates Based On Value-At-Risk, Zhenxing Pu Aug 2012

Risk Measurement Of Coal Freight Rates Based On Value-At-Risk, Zhenxing Pu

World Maritime University Dissertations

No abstract provided.


The Application Of Shipping Freight Derivatives For Evading Risk In The Capesize Shipping Market, Jiayi Zheng Aug 2012

The Application Of Shipping Freight Derivatives For Evading Risk In The Capesize Shipping Market, Jiayi Zheng

World Maritime University Dissertations

No abstract provided.


The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther Aug 2012

The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther

Jan Kallberg

With the prospect of sequestration looming, the United States may find itself increasingly rely ing on nuclear and cy ber deterrence as an affordable means of guaranteeing national sovereignty and preventing major conflict between the U.S. and potential adversaries in the Asia-Pacific. While earlier defense planning and acquisition were based on economic conditions that no longer ex ist, Congress’s options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense v oters” relative to “social welfare voters,” according to a number of recent public opinion surveys. The simple fact is China’s rise has …


Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg Jul 2012

Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg

Jan Kallberg

Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As …


Towards Managing And Understanding The Risk Of Underwater Terrorism, Richard J. Gay Jul 2012

Towards Managing And Understanding The Risk Of Underwater Terrorism, Richard J. Gay

Engineering Management & Systems Engineering Theses & Dissertations

This dissertation proposes a methodology to manage and understand the risk of underwater terrorism to critical infrastructures utilizing the parameters of the risk equation. Current methods frequently rely on statistical methods, which suffer from a lack of appropriate historical data to produce distributions and do not integrate epistemic uncertainty. Other methods rely on locating subject matter experts who can provide judgment and then undertaking an associated validation of these judgments.

Using experimentation, data from unclassified successful, or near successful, underwater attacks are analyzed and instantiated as a network graph with the key characteristics of the risk of terrorism represented as …


Integral-Balance Solution To The Stokes’ First Problem Of A Viscoelastic Generalized Second Grade Fluid, Jordan Hristov Jun 2012

Integral-Balance Solution To The Stokes’ First Problem Of A Viscoelastic Generalized Second Grade Fluid, Jordan Hristov

Jordan Hristov

Integral balance solution employing entire domain approximation and the penetration dept concept to the Stokes’ first problem of a viscoelastic generalized second grade fluid has been developed. The solution has been performed by a parabolic profile with an unspecified exponent allowing optimization through minimization of the norm over the domain of the penetration depth. The closed form solution explicitly defines two dimensionless similarity variables and , responsible for the viscous and the elastic responses of the fluid to the step jump at the boundary. The solution was developed with three forms of the governing equation through its two dimensional forms …


Thermal Impedance At The Interface Of Contacting Bodies: 1-D Example Solved By Semi-Derivatives, Jordan Hristov Jun 2012

Thermal Impedance At The Interface Of Contacting Bodies: 1-D Example Solved By Semi-Derivatives, Jordan Hristov

Jordan Hristov

Simple 1-D semi-infinite heat conduction problems enable to demonstrate the potential of the fractional calculus in determination of transient thermal impedances of two bodies with different initial temperatures contacting at the interface ( ) at . The approach is purely analytic and uses only semi-derivatives (half-time) and semi-integrals in the Riemann-Liouville sense. The example solved clearly reveals that the fractional calculus is more effective in calculation the thermal resistances than the entire domain solutions


Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham Jun 2012

Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Abstract – The shift towards cyber operations represents a shift not only for the defense establishments worldwide but also cyber security research and education. Traditionally cyber security research and education has been founded on information assurance, expressed in underlying subfields such as forensics, network security, and penetration testing. Cyber security research and education is connected to the homeland security agencies and defense through funding, mutual interest in the outcome of the research, and the potential job market for graduates. The future of cyber security is both defensive information assurance measures and active defense driven information operations that jointly and coordinately …


Emp And Geomagnetic Storm Protection Of Critical Infrastructure, George H. Baker Iii May 2012

Emp And Geomagnetic Storm Protection Of Critical Infrastructure, George H. Baker Iii

George H Baker

EMP and solar storm wide geographic coverage and ubiquitous system effects beg the question of “Where to begin?” with protection efforts. Thus, in addressing these “wide area electromagnetic (EM) effects,” we must be clever in deciding where to invest limited resources. Based on simple risk analysis, the electric power and communication infrastructures emerge as the highest priority for EM protection. Programs focused on these highest risk infrastructures will go a long way in lessoning societal impact. Given the national scope of the effects, such programs must be coordinated at the national level but implemented at local level. Because wide-area EM …


Dynamics Of Land Use/Land Cover Changes And Its Implication On Food Security In Anyigba, North Central, Nigeria, Tokula E. Arome, Sunday P. Ejaro (Phd) May 2012

Dynamics Of Land Use/Land Cover Changes And Its Implication On Food Security In Anyigba, North Central, Nigeria, Tokula E. Arome, Sunday P. Ejaro (Phd)

Confluence Journal Environmental Studies (CJES), Kogi State University, Nigeria

This study assessed land use/land cover changes and its effect on Agricultural land in Anyigba. The objectives were to identify and delineate different land use / land cover categories, assess the rate of change that occurred and examine the impact of land use/land cover change on food security using satellite remote sensing data collected at three different years (1987 Land sat TM, 2001 Land Sat TM and 2011 Land Sat ETM). The study utilized GIS software such as Idrisi Andes academic and ArcGIS 9.3. The study area covers approximately 31.8km2, and four major land use/cover classes were utilized (built up, …


Risk Quadruplet: Integrating Assessments Of Threat, Vulnerability, Consequence, And Perception For Homeland Security And Homeland Defense, Kara Norman Hill Apr 2012

Risk Quadruplet: Integrating Assessments Of Threat, Vulnerability, Consequence, And Perception For Homeland Security And Homeland Defense, Kara Norman Hill

Engineering Management & Systems Engineering Theses & Dissertations

Risk for homeland security and homeland defense is often considered to be a function of threat, vulnerability, and consequence. But what is that function? And are we defining and measuring these terms consistently? Threat, vulnerability, and consequence assessments are conducted, often separately, and data from one assessment could be drastically different from that of another due to inconsistent definitions of terms and measurements, differing data collection methods, or varying data sources. It has also long been a challenge to integrate these three disparate assessments to establish an overall picture of risk to a given asset. Further, many agencies conduct these …


Analysis Of Kc-46 Live-Fire Risk Mitigation Program Testing, Chad N. Chamberlain Mar 2012

Analysis Of Kc-46 Live-Fire Risk Mitigation Program Testing, Chad N. Chamberlain

Theses and Dissertations

Increased emphasis from the Director of Operational Test and Evaluation (DOT&E) over the past few years to include statistical rigor in all testing has brought an augmented look at testing across the Department of Defense. This thesis examines the methodology currently used in live fire testing, particularly in the case of risk mitigation of the KC-46 dry-bay fire test program. The thesis addresses gaps within the methodology and analyzes the results of a statistically rigorous test. The research furthers work on modeling the characterization of ballistic impact flash by validating concurrent models and characterizing the errors prone to these models …


Ballistic Flash Characterization: Penetration And Back-Face Flash, Michael J. Koslow Mar 2012

Ballistic Flash Characterization: Penetration And Back-Face Flash, Michael J. Koslow

Theses and Dissertations

The Air Force is extremely concerned with the safety of its people, especially those who are flying aircraft. Aircrew members flying combat missions are concerned with the chance that a fragment from an exploding threat device may penetrate into the airframe to possibly ignite a fire onboard the aircraft. One concern for vulnerability revolves around a flash that may occur when a projectile strikes and penetrates an aircraft's fuselage. When certain fired rounds strike the airframe, they break into fragments called spall. Spall and other fragmentation from an impact often gain enough thermal energy to oxidize the materials involved. This …


A Spatial Risk Analysis Of Oil Refineries Within The United States, Zachary L. Schiff Mar 2012

A Spatial Risk Analysis Of Oil Refineries Within The United States, Zachary L. Schiff

Theses and Dissertations

A risk analysis methodology is necessary to manage the potential effects of oil refinery outages to the increasingly connected, interdependent critical infrastructure of the United States. Following the terrorist attacks of 9/11, the lack of a critical infrastructure risk mitigation strategy was identified as an area for improvement. In both the 9/11 attacks and Hurricane Katrina, cascading failures occurred due to the interdependencies among infrastructures and their spatial relationships. Furthermore, the U.S. military is dependent on oil refining capability and a major shortage could potentially have devastating effects on mission accomplishment. As a result, a need has emerged to better …


Designer Satellite Collisions From Covert Cyber War, Jan Kallberg Feb 2012

Designer Satellite Collisions From Covert Cyber War, Jan Kallberg

Jan Kallberg

Outer space has enjoyed two decades of fairly peaceful development since the Cold War, but once again it is becoming more competitive and contested, with increased militarization. Therefore, it is important the United States maintain its space superiority to ensure it has the capabilities required by modern warfare for successful operations. Today is different from earlier periods of space development,1 because there is not a blatantly overt arms race in space,2 but instead a covert challenge to US interests in maintaining superiority, resilience, and capability. A finite number of states consider themselves geopolitical actors; however, as long as the United …


Agent Based Modeling And Simulation Framework For Supply Chain Risk Management, Tiffany J. Harper Feb 2012

Agent Based Modeling And Simulation Framework For Supply Chain Risk Management, Tiffany J. Harper

Theses and Dissertations

This research develops a flexible agent-based modeling and simulation (ABMS) framework for supply chain risk management with significant enhancements to standard ABMS methods and supply chain risk modeling. Our framework starts with the use of software agents to gather and process input data for use in our simulation model. For our simulation model, we extend an existing mathematical framework for discrete event simulation (DES) to ABMS and then implement the concepts of variable resolution modeling from the DES domain to ABMS and provide further guidelines for aggregation and disaggregation of supply chain models. Existing supply chain risk management research focuses …


Socio-Economic Effects Of Demolishing Squatter Settlements And Illegal Structures In Abuja Metropolis, Federal Capital Territory, Nigeria, Ishaku Iy Mallo Phd, Victor G. Obasanya Jan 2012

Socio-Economic Effects Of Demolishing Squatter Settlements And Illegal Structures In Abuja Metropolis, Federal Capital Territory, Nigeria, Ishaku Iy Mallo Phd, Victor G. Obasanya

Confluence Journal Environmental Studies (CJES), Kogi State University, Nigeria

Abuja the Federal Capital Territory and study area is located between latitudes 8o25’ and 9o25’ North of the Equator and longitudes 6o45’ and 7o45’ East of the Greenwich Meridian. The study was carried out in Abuja Phase 1, and it is aimed at highlighting various socioeconomic effects of demolition of illegal structures and informal or squatter settlements on the people within the study area. Data was collected through reconnaissance survey, personal interviews with respondents, and a well laid out questionnaire. The results indicate that the demolition exercise embarked upon by the authorities in the Federal Capital Territory was a response …


Rainfall Variability And Crop Zones Classification For The Federal Capital Territory, Nigeria, Shaibu M. Hassan Phd Jan 2012

Rainfall Variability And Crop Zones Classification For The Federal Capital Territory, Nigeria, Shaibu M. Hassan Phd

Confluence Journal Environmental Studies (CJES), Kogi State University, Nigeria

This study aims at analyzing agro-climatological parameters and establishing a link between some selected agro-climatological indices and sustainability of agricultural production in the Federal Capital Territory (FCT). Two sets of data, climatic and crop yield data were collected and subjected to various agro-climatological analyses. Agro-climatological analyses include the derivation of Onset, Cessation and Length of Rainy Season (LRS), Seasonality Index, Drought Index and Precipitation Periodicity Index. The statistical analyses include monthly and annual means, deviation from the mean, trend line. The result of moisture index in line with crops optimum moisture requirement was used to classify the Territory into agro-climatic …


Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman Jan 2012

Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman

Lawrence J. Trautman Sr.

In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …