Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2016

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 10611

Full-Text Articles in Engineering

A Validated Tropical-Extratropical Flood Hazard Assessment For New York Harbor, Philip M. Orton, T. M. Hall, Stefan A. Talke, Alan F. Blumberg, Nickitas Georgas, S. Vinogradov Dec 2016

A Validated Tropical-Extratropical Flood Hazard Assessment For New York Harbor, Philip M. Orton, T. M. Hall, Stefan A. Talke, Alan F. Blumberg, Nickitas Georgas, S. Vinogradov

Civil and Environmental Engineering Faculty Publications and Presentations

Recent studies of flood risk at New York Harbor (NYH) have shown disparate results for the 100 year storm tide, providing an uncertain foundation for the flood mitigation response after Hurricane Sandy. Here we present a flood hazard assessment that improves confidence in our understanding of the region's present-day potential for flooding, by separately including the contribution of tropical cyclones (TCs) and extratropical cyclones (ETCs), and validating our modeling study at multiple stages against historical observations. The TC assessment is based on a climatology of 606 synthetic storms developed from a statistical-stochastic model of North Atlantic TCs. The ETC ...


Letter From The Editor Dec 2016

Letter From The Editor

International Journal of Nuclear Security

No abstract provided.


Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene Dec 2016

Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene

International Journal of Nuclear Security

Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to ...


Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall Dec 2016

Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall

International Journal of Nuclear Security

This study highlights the core non-proliferation dilemmas we face and suggests an effective mechanism for reviving the spirit and the hope of the Non-Proliferation Treaty. An indispensable key to the treaty calls for a rethinking of what we believe should be referred to as its four pillars: disarmament, non-proliferation, peaceful uses of nuclear energy, and implementation of the 1995 Middle East Resolution. We seek to contribute to the renaissance of the non-proliferation regime by addressing seven dilemmas that arise from the way various Non-Proliferation Treaty participants pursue the goals of the four pillars undergirding the treaty. This study highlights core ...


Student Competition Cover Dec 2016

Student Competition Cover

International Journal of Nuclear Security

No abstract provided.


Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan Dec 2016

Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan

International Journal of Nuclear Security

No abstract provided.


Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein Dec 2016

Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein

International Journal of Nuclear Security

No abstract provided.


Source-Channel Coding For Coordination Over A Noisy Two-Node Network, Sarah A. Obead Dec 2016

Source-Channel Coding For Coordination Over A Noisy Two-Node Network, Sarah A. Obead

Theses

Recently, the concept of coordinating actions between distributed agents has emerged in the information theory literature. It was first introduced by Cuff in 2008 for the point-to-point case of coordination. However, Cuff’s work and the vast majo


Denoising Techniques Reveal Neural Correlates Of Modulation Masking Release In Auditory Cortex, Sahil Chaubal Dec 2016

Denoising Techniques Reveal Neural Correlates Of Modulation Masking Release In Auditory Cortex, Sahil Chaubal

Theses

Hearing aids allow hearing impaired (HI) individuals to regain auditory perception in quiet settings. However, despite advances in hearing aid technology, HI individuals do not perform as well in situations with background sound as normally hearing (NH


Heat Transfer In Silicon – Experiments And Simulation, Chihlin Huang Dec 2016

Heat Transfer In Silicon – Experiments And Simulation, Chihlin Huang

Theses

The purpose of this thesis is to study the heat transfer in silicon. Silicon is the key semiconductor material, and thermal processing is the traditional method that is used in semiconductor processing. In this research, we can predict the temperature


Electrical, Electronic And Optical Properties Of Mose2 And Wse2, Sushant Shashikant Rassay Dec 2016

Electrical, Electronic And Optical Properties Of Mose2 And Wse2, Sushant Shashikant Rassay

Theses

Transition-metal dichalcogenides (TMDC) crystals have emerged as a new class of semiconductors that display distinctive properties at monolayer thickness. Their electrical, electronic and optical properties are of particular interest and importance for


Novel Experimental Method For The Determination Of The Minimum Agitation Speed For Solids Suspension In Flat-Bottomed Stirred Tank Reactors, Shriarjun Shastry Dec 2016

Novel Experimental Method For The Determination Of The Minimum Agitation Speed For Solids Suspension In Flat-Bottomed Stirred Tank Reactors, Shriarjun Shastry

Theses

Knowledge of the minimum agitation speed, Njs, required to suspend finely divided solids in vessels stirred by an impeller is a critical parameter to properly operate industrial tanks in a large number of industrial operations. The most common


Real Time, Integrated, Paper Based Temperature Sensor For Lab On A Chip Device, Vignesh Shekhar Dec 2016

Real Time, Integrated, Paper Based Temperature Sensor For Lab On A Chip Device, Vignesh Shekhar

Theses

Temperature measurement and manipulation is a critical factor in a wide range of applications like Point Of Care Diagnostics (POC's), Polymerase Chain Reaction (PCR), Temperature Gradient Focusing (TGF) to cite few prominent examples. In the past decad


Electrical, Electronic And Optical Properties Of Mos2 & Ws2, Weitao Tang Dec 2016

Electrical, Electronic And Optical Properties Of Mos2 & Ws2, Weitao Tang

Theses

Two dimensional materials such as graphene, boron nitride and transition metal dichalcogenide (TMDCs) monolayers have arisen as a new class of materials with unique properties at monolayer thickness. Their electrical, electronic and optical properties


The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler Dec 2016

The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler

Journal of Digital Forensics, Security and Law

The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash ...


A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun Dec 2016

A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun

Journal of Digital Forensics, Security and Law

Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent ...


A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi Dec 2016

A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi

Journal of Digital Forensics, Security and Law

The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a ...


Eis Analysis Of Shear Enhanced Microfluidic Lab-On-A-Chip Device, Mehnaz Mursalat Dec 2016

Eis Analysis Of Shear Enhanced Microfluidic Lab-On-A-Chip Device, Mehnaz Mursalat

Theses

Electrochemical sensors and biosensors have received much attention owing to the feasibility demonstrated regarding instrumental simplicity, decent cost, and portability during the detection of a wide range of biological and pharmaceutical macromolecul


Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh Dec 2016

Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh

Journal of Digital Forensics, Security and Law

The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any ...


Performance Of Adhesive And Cementitious Anchorage Systems, Mirna Mendoza Dec 2016

Performance Of Adhesive And Cementitious Anchorage Systems, Mirna Mendoza

Masters Theses

Post-installed anchoring systems are used extensively in Massachusetts Department of Transportation (MassDOT) projects due their ease of attachment to existing structures. However, recommendations on materials from various manufacturers are currently lacking for certain situations such as long-term tension loading. The purpose of the investigation presented in this thesis was to provide guidance on the use of anchoring systems to MassDOT. This research project evaluated the behavior of adhesive and cementitious bonded anchoring systems per the Stress-versus-Time-to-Failure approach found in the provisional standard AASHTO TP-84 in order to provide recommendations pertaining to the test method. Supplemental short-term anchor pullout tests were ...


Modern Advancements In Post-Detonation Nuclear Forensic Analysis, S. Adam Stratz, Jonathan A. Gill, John D. Auxier Ii, Howard L. Hall Dec 2016

Modern Advancements In Post-Detonation Nuclear Forensic Analysis, S. Adam Stratz, Jonathan A. Gill, John D. Auxier Ii, Howard L. Hall

International Journal of Nuclear Security

Deterring nuclear terrorism is a critical national asset to support the preclusion of non-state actors from initiating a nuclear attack on the United States. Successful attribution of a detonated nuclear weapon allows for timely responsive measures that prove essential in the period following a nuclear event. In conjunction with intelligence and law enforcement evidence, the technical nuclear forensics (TNF) post-detonation community supports this mission through the development and advancement of expertise to characterize weapon debris through a rapid, accurate, and detailed approach. Though the TNF field is young, numerous strides have been made in recent years toward a more robust ...


Evolutionary View Planning For Optimized Uav Terrain Modeling In A Simulated Environment, Ronald A. Martin, Ivan Rojas, Kevin W. Franke, John Hedengren Dec 2016

Evolutionary View Planning For Optimized Uav Terrain Modeling In A Simulated Environment, Ronald A. Martin, Ivan Rojas, Kevin W. Franke, John Hedengren

All Faculty Publications

This work demonstrates the use of genetic algorithms in optimized view planning for 3D reconstruction applications using small unmanned aerial vehicles (UAVs). The quality of UAV site models is currently highly dependent on manual pilot operations or grid-based automation solutions. When applied to 3D structures, these approaches can result in gaps in the total coverage or inconsistency in final model resolution. Genetic algorithms can effectively explore the search space to locate image positions that produce high quality models in terms of coverage and accuracy. A fitness function is defined, and optimization parameters are selected through semi-exhaustive search. A novel simulation ...


Table Of Contents Dec 2016

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah Dec 2016

Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah

Journal of Digital Forensics, Security and Law

With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom ...


The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi Dec 2016

The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi

Journal of Digital Forensics, Security and Law

This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased in the UAE, as well ...


The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler Dec 2016

The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler

Journal of Digital Forensics, Security and Law

A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.


Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen Dec 2016

Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen

International Journal of Nuclear Security

No abstract provided.


Table Of Contents Dec 2016

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame Dec 2016

Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame

International Journal of Nuclear Security

The potential for a relatively non-advanced nation to covertly acquire a significant quantity of weapons-grade plutonium using a gas-cooled, natural uranium-fueled reactor based on relatively primitive early published designed is evaluated in this article. The economic and technical issues that would influence the design decisions of a covert 239Pu production program are considered.

Several unconventional uranium acquisition approaches were explored. Methods for extracting uranium from enrichment tails, seawater, and coal ash sources were considered. The evaluation indicated that uranium extraction from coal ash or insitu leaching from underground deposits could be performed in economical manner that might be difficult ...


Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed Dec 2016

Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed

International Journal of Nuclear Security

No abstract provided.