Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Embry-Riddle Aeronautical University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 17 of 17

Full-Text Articles in Other Computer Engineering

Julia Language Ephemeris And Physical Constants Reader For Solar System Bodies, Julia Mihaylov, Renee Spear Oct 2018

Julia Language Ephemeris And Physical Constants Reader For Solar System Bodies, Julia Mihaylov, Renee Spear

Undergraduate Research Symposium - Prescott

This presentation was the forerunner a second paper by the authors for the AAS/AIAA conference in January 2019, and is not available for download. For a description of the first presentation, see the authors' Discovery Day 2018 - Presentation.

Publicly released in 2012, the Julia language is a relatively new, open source dynamic language. One major benefit of Julia is its combined capabilities of both dynamic and static coding languages. It nearly matches the computational efficiency of static languages, such as FORTRAN or C, and exceeds that of dynamic languages, such as MATLAB or Python. Additionally, unlike Python, Julia was ...


Developing High Performance Grid Computing Systems On A Budget, Forrest Mobley Oct 2018

Developing High Performance Grid Computing Systems On A Budget, Forrest Mobley

Undergraduate Research Symposium - Prescott

High performance grid computing systems are essential for today’s engineering and research projects, as they make certain impossibilities possible, and save time and money as well. However, these supercomputers can cost upwards of a hundred million dollars and require large amounts of space and energy to keep, making them all but inaccessible to small engineering firms and universities. As most of these institutions do not require the massive level of computing power offered by these large grid computers, small scale versions are often built, with various setups. The purpose of this project was to set up a new small ...


Project Janus, Theodore J. Lilyeblade, Jacqueline Worley, Garrison Bybee Oct 2018

Project Janus, Theodore J. Lilyeblade, Jacqueline Worley, Garrison Bybee

Undergraduate Research Symposium - Prescott

The development goal of Project Janus is to design, fabricate, and program two robotic heads that can serve as animatronic chatbots. Each robotic head will be equipped with two USB webcams, a mono speaker within the robot’s mouth, and a pair of microphones. Additionally, each robotic head will feature a three degree of freedom neck, a one degree-of-freedom jaw, and a two degree-of-freedom gimbal for the eyes upon which the cameras will be mounted. The robotic heads will be interfaced to separate internet connected personal computers. Through these computers, they will make use of online speech recognition tools, online ...


Aviation Cybersecurity: An Overview, Gary C. Kessler, J. Philip Craiger Aug 2018

Aviation Cybersecurity: An Overview, Gary C. Kessler, J. Philip Craiger

National Training Aircraft Symposium (NTAS)

Information security—aka cybersecurity—is the most rapidly growing threat to critical infrastructures, including the aviation industry. Due to the plethora of digital devices, ubiquity of the Internet and other networks, and the rapid growth in the adoption of technology, everyone is an information system security manager. Every professional in the aviation and aeronautics industry use computers, mobile devices, tablets, GPS devices, and/or other hardware on a daily basis, as well as go online for a variety of reasons.

Attacks on information have been ongoing since the inception of the industry a hundred years ago, in such forms as ...


A Sketch-Based Rapid Modeling Method For Crime Scene Presentation, Pu Ren, Wuyang Shui, Jin Liu, Yachun Fan, Wenshuo Zhao, Mingquan Zhou Mar 2018

A Sketch-Based Rapid Modeling Method For Crime Scene Presentation, Pu Ren, Wuyang Shui, Jin Liu, Yachun Fan, Wenshuo Zhao, Mingquan Zhou

Journal of Digital Forensics, Security and Law

The reconstruction of crime scene plays an important role in digital forensic application. This article integrates computer graphics, sketch-based retrieval and virtual reality (VR) techniques to develop a low-cost and rapid 3D crime scene presentation approach, which can be used by investigators to analyze and simulate the criminal process. First, we constructed a collection of 3D models for indoor crime scenes using various popular techniques, including laser scanning, image-based modeling and geometric modeling. Second, to quickly obtain an object of interest from the 3D model database, a sketch-based retrieval method was proposed. Finally, a rapid modeling system that integrates our ...


A Data Hiding Scheme Based On Chaotic Map And Pixel Pairs, Sengul Dogan Sd Dec 2017

A Data Hiding Scheme Based On Chaotic Map And Pixel Pairs, Sengul Dogan Sd

Journal of Digital Forensics, Security and Law

Information security is one of the most common areas of study today. In the literature, there are many algorithms developed in the information security. The Least Significant Bit (LSB) method is the most known of these algorithms. LSB method is easy to apply however it is not effective on providing data privacy and robustness. In spite of all its disadvantages, LSB is the most frequently used algorithm in literature due to providing high visual quality. In this study, an effective data hiding scheme alternative to LSB, 2LSBs, 3LSBs and 4LSBs algorithms (known as xLSBs), is proposed. In this method, random ...


Simple Implementation Of An Elgamal Digital Signature And A Brute Force Attack On It, Valeriia Laryoshyna Oct 2017

Simple Implementation Of An Elgamal Digital Signature And A Brute Force Attack On It, Valeriia Laryoshyna

Student Works

This study is an attempt to show a basic mathematical usage of the concepts behind digital signatures and to provide a simple approach and understanding to cracking basic digital signatures. The approach takes on simple C programming of the ElGamal digital signature to identify some limits that can be encountered and provide considerations for making more complex code. Additionally, there is a literature review of the ElGamal digital signature and the brute force attack.

The research component of this project provides a list of possible ways to crack the basic implementations and classifies the different approaches that could be taken ...


Source Anonymization Of Digital Images: A Counter–Forensic Attack On Prnu Based Source Identification Techniques, Prithviraj Sengupta, Venkata Udaya Sameer, Ruchira Naskar, Ezhil Kalaimannan May 2017

Source Anonymization Of Digital Images: A Counter–Forensic Attack On Prnu Based Source Identification Techniques, Prithviraj Sengupta, Venkata Udaya Sameer, Ruchira Naskar, Ezhil Kalaimannan

Annual ADFSL Conference on Digital Forensics, Security and Law

A lot of photographers and human rights advocates need to hide their identity while sharing their images on the internet. Hence, source–anonymization of digital images has become a critical issue in the present digital age. The current literature contains a number of digital forensic techniques for “source–identification” of digital images, one of the most efficient of them being Photo–Response Non–Uniformity (PRNU) sensor noise pattern based source detection. PRNU noise pattern being unique to every digital camera, such techniques prove to be highly robust way of source–identification. In this paper, we propose a counter–forensic technique ...


An Accidental Discovery Of Iot Botnets And A Method For Investigating Them With A Custom Lua Dissector, Max Gannon, Gary Warner, Arsh Arora May 2017

An Accidental Discovery Of Iot Botnets And A Method For Investigating Them With A Custom Lua Dissector, Max Gannon, Gary Warner, Arsh Arora

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper presents a case study that occurred while observing peer-to-peer network communications on a botnet monitoring station and shares how tools were developed to discover what ultimately was identified as Mirai and many related IoT DDOS Botnets. The paper explains how researchers developed a customized protocol dissector in Wireshark using the Lua coding language, and how this enabled them to quickly identify new DDOS variants over a five month period of study.


A Usability Study For Electronic Flight Bag (Efb) Flight Planning Applications On Tablet Devices For Ab-Initio Pilots, Jeff Schwartzentruber Apr 2017

A Usability Study For Electronic Flight Bag (Efb) Flight Planning Applications On Tablet Devices For Ab-Initio Pilots, Jeff Schwartzentruber

International Journal of Aviation, Aeronautics, and Aerospace

The proliferation of mobile technology has prompted the use of tablet devices in the cockpit and during ground operations in general aviation. Due to the increase in affordable and reliable hardware (i.e. iPads etc.), the development of pilot-specific software has led to the creation of a commercial-of-the-shelf (COTS), electronic flight bag (EFB) market. EFBs have many advantages, such as reducing the space requirements for flight documents, enabling faster searching and indexing of files, providing useful tools for flight planning, and providing automatic updates. The increase in availability of mobile technology and flight applications has allowed general aviation enthusiast and ...


Space Data Integrator (Sdi) And Space Program Integrated Data And Estimated Risk (Spider): Proof-Of-Concept Software Solution For Integrating Launch And Reentry Vehicles Into The National Airspace System (Nas), Devin D. Dickens Nov 2015

Space Data Integrator (Sdi) And Space Program Integrated Data And Estimated Risk (Spider): Proof-Of-Concept Software Solution For Integrating Launch And Reentry Vehicles Into The National Airspace System (Nas), Devin D. Dickens

Space Traffic Management Conference

The Space Data Integrator (SDI) Project is the initial step to satisfy the Federal Aviation Administration (FAA) strategic initiative to integrate commercial space launch and reentry vehicles into the National Airspace System. The project addresses the needs for greater situational awareness and monitoring, and increased response capability during non-nominal and catastrophic incidents during space operations.

The initial phase of this project leverages current FAA systems, and provide an initial demonstration of capability that will provide for state data from a commercial reentry vehicle to be ingested into a the FAA Traffic Flow Management System, and displayed on Traffic Situation Displays ...


A Study Of Forensic Imaging In The Absence Of Write-Blockers, Gary C. Kessler, Gregory H. Carlton Jan 2014

A Study Of Forensic Imaging In The Absence Of Write-Blockers, Gary C. Kessler, Gregory H. Carlton

Security Studies & International Affairs - Daytona Beach

"Best practices in digital forensics demand the use of write-blockers when creating forensic images of digital media, and this has been a core tenet of computer forensics training for decades. The practice is so ingrained that the integrity of images created without a write-blocker are immediately suspect. This paper describes a research framework that compares forensic images acquired with and without utilizing write-blockers in order to understand the extent of the differences, if any, in the resultant forensic copies. We specifically address whether differences are superficial or evidentiary, and we discuss the impact of admitting evidence acquired without write blocking ...


A Knowledge-Based Clinical Toxicology Consultant For Diagnosing Multiple Exposures, Joel D. Schipper, Douglas D. Dankel Ii, A. Antonio Arroyo, Jay L. Schauben May 2013

A Knowledge-Based Clinical Toxicology Consultant For Diagnosing Multiple Exposures, Joel D. Schipper, Douglas D. Dankel Ii, A. Antonio Arroyo, Jay L. Schauben

Publications

Objective: This paper presents continued research toward the development of a knowledge-based system for the diagnosis of human toxic exposures. In particular, this research focuses on the challenging task of diagnosing exposures to multiple toxins. Although only 10% of toxic exposures in the United States involve multiple toxins, multiple exposures account for more than half of all toxin-related fatalities. Using simple medical mathematics, we seek to produce a practical decision support system capable of supplying useful information to aid in the diagnosis of complex cases involving multiple unknown substances.

Methods: The system is automatically trained using data mining techniques to ...


Technology Corner: Calculating The Number Of Android Lock Patterns: An Unfinished Study In Number Theory, Gary C. Kessler Jan 2013

Technology Corner: Calculating The Number Of Android Lock Patterns: An Unfinished Study In Number Theory, Gary C. Kessler

Security Studies & International Affairs - Daytona Beach

"Although one is unlikely to ever want to brute-force an Android lock pattern, many do wonder about the relative strength of the lock pattern versus a multi-digit personal identification number (PIN). It becomes obvious pretty quickly that there are many more lock patterns than the 10,000 possible four-digit PINs."--from the introduction.


Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler Jan 2009

Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler

Security Studies & International Affairs - Daytona Beach

"This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info."--from the article


The Other Information Warfare: A Mind Full Of Macedonia, Editor Mar 2001

The Other Information Warfare: A Mind Full Of Macedonia, Editor

International Bulletin of Political Psychology

This article highlights ongoing aspects of psychological warfare in Macedonia between government and rebel forces.


A Political Psychological Primer Of Virtual Reality Sequelae For Mental Health Professionals, Editor Oct 1997

A Political Psychological Primer Of Virtual Reality Sequelae For Mental Health Professionals, Editor

International Bulletin of Political Psychology

This paper describes a number of sequelae stemming from virtual reality (VR) and VR technology (VRT) based on theoretical and empirical research in the behavioral sciences, social sciences, humanities.