Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2016

Physical Sciences and Mathematics

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 2072

Full-Text Articles in Engineering

Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah Dec 2016

Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah

Journal of Digital Forensics, Security and Law

With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …


The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler Dec 2016

The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler

Journal of Digital Forensics, Security and Law

The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …


Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh Dec 2016

Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh

Journal of Digital Forensics, Security and Law

The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any application; name, description, publisher …


The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi Dec 2016

The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi

Journal of Digital Forensics, Security and Law

This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased …


A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi Dec 2016

A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi

Journal of Digital Forensics, Security and Law

The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …


The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler Dec 2016

The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler

Journal of Digital Forensics, Security and Law

A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.


A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun Dec 2016

A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun

Journal of Digital Forensics, Security and Law

Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …


Table Of Contents Dec 2016

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene Dec 2016

Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene

International Journal of Nuclear Security

Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to plunge …


Student Competition Cover Dec 2016

Student Competition Cover

International Journal of Nuclear Security

No abstract provided.


Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen Dec 2016

Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen

International Journal of Nuclear Security

No abstract provided.


Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan Dec 2016

Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan

International Journal of Nuclear Security

No abstract provided.


Table Of Contents Dec 2016

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall Dec 2016

Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall

International Journal of Nuclear Security

This study highlights the core non-proliferation dilemmas we face and suggests an effective mechanism for reviving the spirit and the hope of the Non-Proliferation Treaty. An indispensable key to the treaty calls for a rethinking of what we believe should be referred to as its four pillars: disarmament, non-proliferation, peaceful uses of nuclear energy, and implementation of the 1995 Middle East Resolution. We seek to contribute to the renaissance of the non-proliferation regime by addressing seven dilemmas that arise from the way various Non-Proliferation Treaty participants pursue the goals of the four pillars undergirding the treaty. This study highlights …


Modern Advancements In Post-Detonation Nuclear Forensic Analysis, S. Adam Stratz, Jonathan A. Gill, John D. Auxier Ii, Howard L. Hall Dec 2016

Modern Advancements In Post-Detonation Nuclear Forensic Analysis, S. Adam Stratz, Jonathan A. Gill, John D. Auxier Ii, Howard L. Hall

International Journal of Nuclear Security

Deterring nuclear terrorism is a critical national asset to support the preclusion of non-state actors from initiating a nuclear attack on the United States. Successful attribution of a detonated nuclear weapon allows for timely responsive measures that prove essential in the period following a nuclear event. In conjunction with intelligence and law enforcement evidence, the technical nuclear forensics (TNF) post-detonation community supports this mission through the development and advancement of expertise to characterize weapon debris through a rapid, accurate, and detailed approach. Though the TNF field is young, numerous strides have been made in recent years toward a more robust …


Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame Dec 2016

Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame

International Journal of Nuclear Security

The potential for a relatively non-advanced nation to covertly acquire a significant quantity of weapons-grade plutonium using a gas-cooled, natural uranium-fueled reactor based on relatively primitive early published designed is evaluated in this article. The economic and technical issues that would influence the design decisions of a covert 239Pu production program are considered.

Several unconventional uranium acquisition approaches were explored. Methods for extracting uranium from enrichment tails, seawater, and coal ash sources were considered. The evaluation indicated that uranium extraction from coal ash or insitu leaching from underground deposits could be performed in economical manner that might be difficult …


Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein Dec 2016

Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein

International Journal of Nuclear Security

No abstract provided.


Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed Dec 2016

Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed

International Journal of Nuclear Security

No abstract provided.


Letter From The Editor Dec 2016

Letter From The Editor

International Journal of Nuclear Security

No abstract provided.


Generation Of Vector Partially Coherent Optical Sources Using Phase-Only Spatial Light Modulators, Milo W. Hyde Iv, Santasri Bose-Pillai, David G. Voelz, Xifeng Xiao Dec 2016

Generation Of Vector Partially Coherent Optical Sources Using Phase-Only Spatial Light Modulators, Milo W. Hyde Iv, Santasri Bose-Pillai, David G. Voelz, Xifeng Xiao

Faculty Publications

A simple and flexible optical system for generating electromagnetic or vector partially coherent sources or beams is presented. The alternative design controls field amplitude (beam shape), coherence, and polarization using only spatial light modulators. This improvement makes the apparatus simpler to construct and significantly increases the flexibility of vector partially coherent source generators by allowing many different types of sources to be produced without changing the physical setup. The system’s layout and theoretical foundations are thoroughly discussed. The utility and flexibility of the proposed system are demonstrated by producing a vector Schell-model and non-Schell-model source. The experimental results are compared …


Back-Flow Prevention Strategies For Stormwater Lines, Ron Evins Dec 2016

Back-Flow Prevention Strategies For Stormwater Lines, Ron Evins

September 29, 2016: Adaptive Structures and Innovative Solutions

No abstract provided.


Lithium-Sulfur (Selenium) Batteries: Interface Issues And Solving Strategies, Nian-Wu Li, Ya-Xia Yin, Yu-Guo Guo Dec 2016

Lithium-Sulfur (Selenium) Batteries: Interface Issues And Solving Strategies, Nian-Wu Li, Ya-Xia Yin, Yu-Guo Guo

Journal of Electrochemistry

The stable interface is still a challenge for lithium-sulfur (selenium) batteries because of the low conductivity of sulfur (selenium), dissolution of polysulfide (polyselenide), volume expansion of sulfur (selenium), and lithium dendrite growth. This review describers some recent developments in lithium-sulfur (selenium) batteries and highlights our efforts in this field. The possible strategies for building stable interface in the lithium-sulfur (selenium) batteries including nano-restriction effect, chemical bonding, interface adsorption, surface coating, electrolyte optimization, and Lithium anode treatment have been discussed.


Syntheses Of Ag@Pd@Pt Nanoparticles With Tunable Shell Thickness For Electrochemical Oxidation Of Formic Acid, Xiao-Dong Lin, Du-Hong Chen, Zhong-Qun Tian Dec 2016

Syntheses Of Ag@Pd@Pt Nanoparticles With Tunable Shell Thickness For Electrochemical Oxidation Of Formic Acid, Xiao-Dong Lin, Du-Hong Chen, Zhong-Qun Tian

Journal of Electrochemistry

In an effort to lower cost of a catalyst, the silver (Ag) core with palladium (Pd) layer then platinum (Pt) island (Ag@Pd@Pt) nanoparticles were synthesized and the electrocatalytic activity of Ag@Pd@Pt nanoparticles on formic acid was compared with that of Au@Pd@Pt nanoparticles reported previously. The results showed that the existence of a small amount of Pt could significantly improve the activity of the catalyst. When the surface coverage of Pt approached 0.5 monolayers, the activity of Ag@Pd@Pt nanoparticles reached the maximum. Though the onset potential of the electro-oxidation was slightly more positive (about 50 mV), the overall electrocatalytic activity of …


Intrinsic Interfacial Property Between High-Voltage Lini0.5Mn1.5O4 Cathode And Electrolyte, Li Li, Jing-Jing Xu, Shao-Jie Han, Wei Lu, Li-Wei Chen Dec 2016

Intrinsic Interfacial Property Between High-Voltage Lini0.5Mn1.5O4 Cathode And Electrolyte, Li Li, Jing-Jing Xu, Shao-Jie Han, Wei Lu, Li-Wei Chen

Journal of Electrochemistry

To obtain high energy density, developing high-voltage cathode materials is an effective approach. The cathode/electrolyte interface stability is the key factor for the cycle performance and safety performance of high-voltage lithium ion batteries. It is, therefore, of significant importance to study the stability of cathode/electrolyte interface. However, many reports have shown that at the cathode/electrolyte interface the cathodes were prepared by coating the mixture of active materials with a conductive additive and a binder on an Al current collector. The introduction of additives will interfere the surface morphology and component analyses, resulting in difficulty to acquire the intrinsic information at …


Lithium Plating Identification From Degradation Behaviors Of Lithium-Ion Cells, Jian-Bo Zhang, Lai-Suo Su, Xin-Yu Li, Hao Ge, Ya-Kun Zhang, Zhe Li Dec 2016

Lithium Plating Identification From Degradation Behaviors Of Lithium-Ion Cells, Jian-Bo Zhang, Lai-Suo Su, Xin-Yu Li, Hao Ge, Ya-Kun Zhang, Zhe Li

Journal of Electrochemistry

Lithium plating has huge impact on the lifetime and safety of lithium-ion cells. It is, therefore, necessary to identify lithium plating. In this study, the accelerated stress tests of lithium-ion cells were conducted under different conditions with multi-stress loads. Based on the different effects of the two major aging mechanisms, namely, SEI (Solid Electrolyte Interface) layer growth and lithium plating, on the degradation behaviors, two lithium plating identification methods of resistance-capacity plot and Arrhenius plot were employed. The experimental results revealed that the two identification methods are highly consistent with each other. Furthermore, the origins of capacity loss were distinguished …


Stm Investigation Of Oxygen Reduction Reaction On Solid Interface In Fuel Cell, Zhen-Feng Cai, Bing Sun, Wen-Jie Jiang, Ting Chen, Dong Wang, Li-Jun Wan Dec 2016

Stm Investigation Of Oxygen Reduction Reaction On Solid Interface In Fuel Cell, Zhen-Feng Cai, Bing Sun, Wen-Jie Jiang, Ting Chen, Dong Wang, Li-Jun Wan

Journal of Electrochemistry

An electrocatalyst for oxygen reduction reaction (ORR) is an important component for fuel cells. An investigation at interfacial electrochemical reactions toward ORR at a molecular scale benefits mechanistic understanding as well as rational design of catalysts. Scanning tunneling microscopy (STM) has been proven to be a powerful tool to monitor chemical reactions and to provide in-situ information about the interfacial electrochemical reactions at a molecular level. This review summarizes the recent STM studies in monitoring the interface processes such as morphological changes, molecular changes, reaction intermediates, and oxidation products. The prospects of future development in this field are outlined.


A Study On The Oxidation Of Hydrogen Peroxide At Au(111) And Au(100) Electrodes, Yong-Li Zheng, Jie Wei, Yan-Xia Chen Dec 2016

A Study On The Oxidation Of Hydrogen Peroxide At Au(111) And Au(100) Electrodes, Yong-Li Zheng, Jie Wei, Yan-Xia Chen

Journal of Electrochemistry

The oxidation reactions of hydrogen peroxide (H2O2) at Au(111) and Au(100) electrodes in 0.1 mol·L-1 HClO4 were investigated by using rotating disk electrode system. It was found that H2O2 could be readily oxidized to O2 at both Au(100) and Au(111) surfaces with the onset potential close to its equilibrium potential. In contrast, the onset overpotential for H2O2 reduction was above 0.4 V, while the onset overpotential for H2O2 oxidation at Au(100) was ca. 0.1 V more negative than that at Au(111), this is probably …


Hydrogen Evolution Properties On Individual Mos2 Nanosheets, Yu Gao, Juan Zhou, Yu-Wen Liu, Sheng-Li Chen Dec 2016

Hydrogen Evolution Properties On Individual Mos2 Nanosheets, Yu Gao, Juan Zhou, Yu-Wen Liu, Sheng-Li Chen

Journal of Electrochemistry

Molybdenum disulfide (MoS2) has been acknowledged to play important roles in hydrogen evolution reaction (HER) for hydrogen energy technology. Both computational and experimental results have suggested that the promising catalytic activity of MoS2 for the HER could be attributed to the sulfur edges of two-dimensional nanosheets, while their basal planes were catalytically inert. In order to verify this conclusion, we prepared single MoS2 sheet electrodes which were made of individual MoS2 sheets attached on the self-assembly monolayers (SAM) of SH(CH2)15COOH at Au ultramicroelectrodes (Au/SAM/MoS2). The single MoS2 sheet …


Electrochemical Behaviors And Determinations Of Terbutaline Sulfate At Poly Eriochrome Black T Modified Electrode, Yan-Jie Zheng, Hong Yao, Shao-Huang Weng, Hua-Ping Peng, Shi-Wen Gong, Li Huang, Qiang Dai, Xin-Hua Lin Dec 2016

Electrochemical Behaviors And Determinations Of Terbutaline Sulfate At Poly Eriochrome Black T Modified Electrode, Yan-Jie Zheng, Hong Yao, Shao-Huang Weng, Hua-Ping Peng, Shi-Wen Gong, Li Huang, Qiang Dai, Xin-Hua Lin

Journal of Electrochemistry

The poly eriochrome black T modified electrode was prepared by electropolymerization. This modified electrode was characterized by scanning electron microscopy(SEM), electrochemical impedance spectroscopy(EIS) and cyclic voltammetry (CV). The electrochemical behaviors of terbutaline sulfate were studied by CV, while the recoveries were measured by differential pulse voltammetry (DPV). The modified electrode shows excellent electrocatalytic characteristics for terbutaline sulfate. In pH 7.0 phosphate buffer solution, the oxidation peak currents obtained by DPV were linear to the terbutaline sulfate concentrations over the range of 1.2x10-7~2.0x10-6 mol•L-1. The detection limit was estimated to be 1.5x10-8 mol•L-1 and …


Chitosan/Nonahydrate Gel Derived Fe-N-Doped Porous Carbon Sheet As High-Efficient Orr Electrocatalyst, Fan-Lu Meng, Xin-Bo Zhang, Jun-Min Yan Dec 2016

Chitosan/Nonahydrate Gel Derived Fe-N-Doped Porous Carbon Sheet As High-Efficient Orr Electrocatalyst, Fan-Lu Meng, Xin-Bo Zhang, Jun-Min Yan

Journal of Electrochemistry

The chitosan/nonahydrate gel was used as a precursor to realize the uniform mixture of N-polymer and metal salt. After lyophilization treatment, the gel went through heat treatment and acid etch. Accordingly, the Fe-N-doped porous carbon sheet with homogenous composition and microstructure was prepared. Compared with the commercial Pt/C catalyst, the Fe-N-doped porous carbon sheet exhibited more positive onset potential and half-wave potential, higher current density, and especially, excellent durability. The power density of 318 mW·cm-2 was obtained in alkaline fuel cell with the Fe-N-doped porous carbon sheet as a cathode catalyst, which is higher than 267 mW·cm-2 with …