Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2016

PDF

Discipline
Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 10918

Full-Text Articles in Engineering

Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah Dec 2016

Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah

Journal of Digital Forensics, Security and Law

With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …


The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler Dec 2016

The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler

Journal of Digital Forensics, Security and Law

The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …


Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh Dec 2016

Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh

Journal of Digital Forensics, Security and Law

The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any application; name, description, publisher …


The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi Dec 2016

The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi

Journal of Digital Forensics, Security and Law

This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased …


A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi Dec 2016

A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi

Journal of Digital Forensics, Security and Law

The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …


The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler Dec 2016

The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler

Journal of Digital Forensics, Security and Law

A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.


A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun Dec 2016

A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun

Journal of Digital Forensics, Security and Law

Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …


14-03 Transportation System And Its Association With Human Health - A Review And Modeling Approach, Jun-Seok Oh, Valerian Kwigizile, Ali Hamzah Hussein Alzuhairi, Fnu Zahid Dec 2016

14-03 Transportation System And Its Association With Human Health - A Review And Modeling Approach, Jun-Seok Oh, Valerian Kwigizile, Ali Hamzah Hussein Alzuhairi, Fnu Zahid

Transportation Research Center Reports

Transportation systems constitute of infrastructure, commute modes, land use and other policies. The purpose of transportation is to provide easy access to goods and services. While attaining this purpose, impacts of transportation on human health and well-being have been ignored to some extent. Recently, studies have begun analyzing the impact of transportation systems on quality of life and health disparities. While many studies have discussed the impact of the transportation system on individual factors from health, a very limited number of studies have focused on the impact of multiple factors associated with multiple morbidity and mortality forms. The focus of …


15-13 Exploring Bicycle Route Choice Behavior With Space Syntax Analysis, Zhaocai Liu, Anthony Chen, Seungkyu Ryu Dec 2016

15-13 Exploring Bicycle Route Choice Behavior With Space Syntax Analysis, Zhaocai Liu, Anthony Chen, Seungkyu Ryu

Transportation Research Center Reports

Cycling provides an environmentally friendly alternative mode of transportation. It improves urban mobility, livability, and public health, and it also helps in reducing traffic congestion and emissions. Cycling is gaining popularity both as a recreational activity and a means of transportation. Therefore, to better serve and promote bicycle transportation, there is an acute need to understand the route choice behavior of cyclists.

This project explored the applicability of using space syntax theory to model cyclists’ route choice behavior. In addition, several bicycle-related attributes were also considered as influential factors affecting cyclists’ route choice. A multiple regression model was built and …


Florida Rural Small Business Energy Assistance Collaborative Cumulative Report Ending December 31, 2016, Florida Solar Energy Center, Janet Mcilvaine Dec 2016

Florida Rural Small Business Energy Assistance Collaborative Cumulative Report Ending December 31, 2016, Florida Solar Energy Center, Janet Mcilvaine

FSEC Energy Research Center®

The U.S. Department of Agriculture's (USDA) Rural Development initiative reaches out to communities across America with many programs (http://www.rd.usda.gov/programs-services/all-programs). USDA's Rural Energy for America Program (REAP) offers grants and loan guarantees for energy efficiency improvements and renewable energy systems to agriculture operations and qualifying rural small businesses. USDA has awarded the University of Central Florida a grant to provide a limited number of subsidized Energy Audits to eligible businesses in Florida in support of USDA Rural Development (USDA-RD) Grant and Loan programs for rural small businesses. The ultimate goal of the energy audits is to increase participation in REAP. Audits …


Table Of Contents Dec 2016

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene Dec 2016

Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene

International Journal of Nuclear Security

Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to plunge …


Student Competition Cover Dec 2016

Student Competition Cover

International Journal of Nuclear Security

No abstract provided.


Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen Dec 2016

Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen

International Journal of Nuclear Security

No abstract provided.


Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan Dec 2016

Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan

International Journal of Nuclear Security

No abstract provided.


Table Of Contents Dec 2016

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall Dec 2016

Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall

International Journal of Nuclear Security

This study highlights the core non-proliferation dilemmas we face and suggests an effective mechanism for reviving the spirit and the hope of the Non-Proliferation Treaty. An indispensable key to the treaty calls for a rethinking of what we believe should be referred to as its four pillars: disarmament, non-proliferation, peaceful uses of nuclear energy, and implementation of the 1995 Middle East Resolution. We seek to contribute to the renaissance of the non-proliferation regime by addressing seven dilemmas that arise from the way various Non-Proliferation Treaty participants pursue the goals of the four pillars undergirding the treaty. This study highlights …


Modern Advancements In Post-Detonation Nuclear Forensic Analysis, S. Adam Stratz, Jonathan A. Gill, John D. Auxier Ii, Howard L. Hall Dec 2016

Modern Advancements In Post-Detonation Nuclear Forensic Analysis, S. Adam Stratz, Jonathan A. Gill, John D. Auxier Ii, Howard L. Hall

International Journal of Nuclear Security

Deterring nuclear terrorism is a critical national asset to support the preclusion of non-state actors from initiating a nuclear attack on the United States. Successful attribution of a detonated nuclear weapon allows for timely responsive measures that prove essential in the period following a nuclear event. In conjunction with intelligence and law enforcement evidence, the technical nuclear forensics (TNF) post-detonation community supports this mission through the development and advancement of expertise to characterize weapon debris through a rapid, accurate, and detailed approach. Though the TNF field is young, numerous strides have been made in recent years toward a more robust …


Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame Dec 2016

Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame

International Journal of Nuclear Security

The potential for a relatively non-advanced nation to covertly acquire a significant quantity of weapons-grade plutonium using a gas-cooled, natural uranium-fueled reactor based on relatively primitive early published designed is evaluated in this article. The economic and technical issues that would influence the design decisions of a covert 239Pu production program are considered.

Several unconventional uranium acquisition approaches were explored. Methods for extracting uranium from enrichment tails, seawater, and coal ash sources were considered. The evaluation indicated that uranium extraction from coal ash or insitu leaching from underground deposits could be performed in economical manner that might be difficult …


Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein Dec 2016

Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein

International Journal of Nuclear Security

No abstract provided.


Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed Dec 2016

Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed

International Journal of Nuclear Security

No abstract provided.


A Validated Tropical-Extratropical Flood Hazard Assessment For New York Harbor, Philip M. Orton, T. M. Hall, Stefan A. Talke, Alan F. Blumberg, Nickitas Georgas, S. Vinogradov Dec 2016

A Validated Tropical-Extratropical Flood Hazard Assessment For New York Harbor, Philip M. Orton, T. M. Hall, Stefan A. Talke, Alan F. Blumberg, Nickitas Georgas, S. Vinogradov

Civil and Environmental Engineering Faculty Publications and Presentations

Recent studies of flood risk at New York Harbor (NYH) have shown disparate results for the 100 year storm tide, providing an uncertain foundation for the flood mitigation response after Hurricane Sandy. Here we present a flood hazard assessment that improves confidence in our understanding of the region's present-day potential for flooding, by separately including the contribution of tropical cyclones (TCs) and extratropical cyclones (ETCs), and validating our modeling study at multiple stages against historical observations. The TC assessment is based on a climatology of 606 synthetic storms developed from a statistical-stochastic model of North Atlantic TCs. The ETC assessment …


Letter From The Editor Dec 2016

Letter From The Editor

International Journal of Nuclear Security

No abstract provided.


Smart Connector Helmet & Automatic Gps Inovasi Alat Bantu Komunikasi Antar Pengemudi Dan Penunjuk Arah Berbasis Internet, Nur Hasanah Dec 2016

Smart Connector Helmet & Automatic Gps Inovasi Alat Bantu Komunikasi Antar Pengemudi Dan Penunjuk Arah Berbasis Internet, Nur Hasanah

Elinvo (Electronics, Informatics, and Vocational Education)

Perancangan smart connector helm dan automatic GPS bertujuan untuk membantu komunikasi antar pengemudi dan sebagai penunjuk arah yang berbasis internet. Alat bantu komunikasi ini terpasang di helm dan terkoneksi dengan smartphone. User dapat berkomunikasi antar Helm dengan Helm yang lain melalui jaringan wireless sinyal radio dari HT. Helm juga terhubung pada smartphone menggunakan bluetooth. Smartphone berfungsi sebagai penunjuk arah dengan adanya GPS dan aplikasi pendukung yang dibuat. Selain itu, pengemudi juga dapat menerima telfon dan mendengarkan musik dengan helm tanpa harus memegang smartphone. Metode perancangan menggunakan pendekatan water fall. Hasil rancangan diperoleh: (a) kerangka Helm yang …


Sistem Monitoring Pencemaran Polutan Kendaraan Via Gadget Berbasis Arduino, Adibatul Ardianto Dec 2016

Sistem Monitoring Pencemaran Polutan Kendaraan Via Gadget Berbasis Arduino, Adibatul Ardianto

Elinvo (Electronics, Informatics, and Vocational Education)

Sumber polusi udara salah satunya adalah gas buang kendaraan bermotor, gas yang dihasilkan dari pembakaran bahan bakar terjadi pada mesin kendaraan. Tingkat deteksi aplikasi dari sistem pembuangan kendaraan bermotor yang dibuat digunakan untuk mendeteksi jumlah kadar gas H2, gas EtOH dan gas CO dengan menggunakan sensor TGS2201. Data dari sensor diolah oleh arduino dan hasilnya ditampilkan pada PC melalui port serial, desain program aplikasi dengan menggunakan Bahasa C.


Single Propeller Drone (Singrone): Inovasi Rancang Bangun Drone Single Propeller Sebagai Wahana Pemetaan Lahan Berbasis Unmaned Aerial Vehicle (Uav), Mohammad Giffari Anta Pradana Dec 2016

Single Propeller Drone (Singrone): Inovasi Rancang Bangun Drone Single Propeller Sebagai Wahana Pemetaan Lahan Berbasis Unmaned Aerial Vehicle (Uav), Mohammad Giffari Anta Pradana

Elinvo (Electronics, Informatics, and Vocational Education)

Dewasa ini, teknologi sebagai faktor memberikan kontribusi yang signifikan dalam peningkatan
kualitas hidup manusia. Salah satu teknologi yang berkembang saat ini adalah drone. Drone adalah
pesawat tanpa awak yang dikendalikan dengan sebuah remote control , di lengkapi dengan GPS sebagai
navigasi, dan lock position. Pada umumnya drone digunakan untuk berbagai hal, seperti pemantauan lalu
lintas, pemetaan lahan, investigasi dan sebagainya. Namun penggunaan drone dengan menggunakan
banyak propeller merupakan salah satu masalah penggunaan drone. Semakin banyak propeller yang
digunakan, maka masa hidup drone di udara juga akan semakin berkurang. Hal ini diarenakan baterai
yang digunakan oleh wahana tersebut banyak digunakan untuk …


Rancang Bangun Pengukur Laju Detak Jantung Berbasis Plc Mikro, Dena Anugrah Dec 2016

Rancang Bangun Pengukur Laju Detak Jantung Berbasis Plc Mikro, Dena Anugrah

Elinvo (Electronics, Informatics, and Vocational Education)

Artikel ini bertujuan untuk melakukan rancang bangun pengukur laju detak jantung yang terdiri dari perangkat keras dan perangkat lunak. Kalibrasi dilakukan dengan menggunakan alat medis Automatic Blood Pressure Monitor. Alat yang dirancang dibuat menggunakan PLC mikro yang diprogram dengan perangkat lunak LDmicro. Teknologi optik LED inframerah dan fotodioda digunakan untuk mendeteksi aliran darah di dalam kulit jari. Dari hasil pengukuran didapat bahwa alat ini memiliki tingkat kesalahan 0,198%. Nilai ini masih di bawah nilai kesalahan yang masih bisa ditolelir yakni sebesar 0,6745%. Jadi dapat disimpulkan bahwa alat yang dirancang dapat digunakan untuk mengukur laju detak jantung dengan akurasi yang sesuai …


Smart Door Locks Based On Internet Of Things Concept With Mobile Backend As A Service, Muhammad Izzuddin Mahali Dec 2016

Smart Door Locks Based On Internet Of Things Concept With Mobile Backend As A Service, Muhammad Izzuddin Mahali

Elinvo (Electronics, Informatics, and Vocational Education)

Smart Door Locks System Based on Internet of Things Concept with Mobile Backend as s Service is the smart door locks development are supported by cloud computing technology as data storage. Methods of development that exist in this system is to combine technology (1) ESP8266 (2) Firebase and (3) Android Apps. Firebase is one of cloud-based services that are used to store data online. ESP8266 able to communicate with firebase well to process the read and write data directly using internet communication channels. Android application used to direct communication to the firebase for monitoring and controlling simultaneously to the system. …


Evolutionary View Planning For Optimized Uav Terrain Modeling In A Simulated Environment, Ronald A. Martin, Ivan Rojas, Kevin W. Franke, John Hedengren Dec 2016

Evolutionary View Planning For Optimized Uav Terrain Modeling In A Simulated Environment, Ronald A. Martin, Ivan Rojas, Kevin W. Franke, John Hedengren

Faculty Publications

This work demonstrates the use of genetic algorithms in optimized view planning for 3D reconstruction applications using small unmanned aerial vehicles (UAVs). The quality of UAV site models is currently highly dependent on manual pilot operations or grid-based automation solutions. When applied to 3D structures, these approaches can result in gaps in the total coverage or inconsistency in final model resolution. Genetic algorithms can effectively explore the search space to locate image positions that produce high quality models in terms of coverage and accuracy. A fitness function is defined, and optimization parameters are selected through semi-exhaustive search. A novel simulation …


Phased Retrofits In Existing Homes In Florida Phase Ii: Shallow Plus Retrofits [Revised], Florida Solar Energy Center, Karen Sutherland Dec 2016

Phased Retrofits In Existing Homes In Florida Phase Ii: Shallow Plus Retrofits [Revised], Florida Solar Energy Center, Karen Sutherland

FSEC Energy Research Center®

The U.S. Department of Energy Building America team Partnership for Improved Residential Construction is collaborating with Florida Power & Light Company (FPL) to conduct a phased residential energy-efficiency retrofit program. This research seeks to determine the impacts on annual energy reductions from the installation of advanced residential technologies. Earlier project work involving the application of two levels of retrofit, shallow and deep, found average savings of 9% and 38%, respectively. Whole-house demand reduction among the deep retrofit homes averaged 39% during FPL's peak summer hour. These savings levels approach the Building America program goals of reducing whole-house energy use of …