Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Embry-Riddle Aeronautical University

2019

Discipline
Keyword
Publication
Publication Type

Articles 1 - 30 of 79

Full-Text Articles in Physical Sciences and Mathematics

Front Matter Dec 2019

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


An Analysis Of The Atmospheric Propagation Of Underground-Explosion-Generated Infrasonic Waves Based On The Equations Of Fluid Dynamics: Ground Recordings, Roberto Sabatini, Jonathan B. Snively, Michael P. Hickey, J. L. Garrison Dec 2019

An Analysis Of The Atmospheric Propagation Of Underground-Explosion-Generated Infrasonic Waves Based On The Equations Of Fluid Dynamics: Ground Recordings, Roberto Sabatini, Jonathan B. Snively, Michael P. Hickey, J. L. Garrison

Publications

An investigation on the propagation of underground-explosion-generated infrasonic waves is carried out via numerical simulations of the equations of fluid dynamics. More specifically, the continuity, momentum, and energy conservation equations are solved along with the Herzfeld-Rice equations in order to take into account the effects of vibrational relaxation phenomena. The radiation of acoustic energy by the ground motion caused by underground explosions is initiated by enforcing the equality, at ground level, between the component of the air velocity normal to the Earth's surface and the normal velocity of the ground layer. The velocity of the ground layer is defined semi-empirically …


Bayesian Characterization Of Main-Sequence Binaries In The Old Open Cluster Ngc 188, Roger E. Cohen, Ted Von Hippel, Aaron M. Geller Dec 2019

Bayesian Characterization Of Main-Sequence Binaries In The Old Open Cluster Ngc 188, Roger E. Cohen, Ted Von Hippel, Aaron M. Geller

Publications

The binary fractions of open and globular clusters yield powerful constraints on their dynamical state and evolutionary history. We apply publicly available Bayesian analysis tools to a UBV RIJHKS photometric catalog of the open cluster NGC 188 to detect and characterize photometric binaries along the cluster main sequence. This technique has the advantage of self-consistently handling photometric errors, missing data in various bandpasses, and star-by-star prior constraints on cluster membership. Simulations are used to verify uncertainties and quantify selection biases in our analysis, illustrating that among binaries with mass ratios >0.5, we recover the binary fraction to better than …


Stellar Chromospheric Activity And Age Relation From Open Clusters In The Lamost Survey, Jiajun Zhang, Terry Oswalt, Jingkun Zhao, Xiangsong Fang, Gang Zhao, Xilong Liang, Xianhao Ye, Jing Zhong Dec 2019

Stellar Chromospheric Activity And Age Relation From Open Clusters In The Lamost Survey, Jiajun Zhang, Terry Oswalt, Jingkun Zhao, Xiangsong Fang, Gang Zhao, Xilong Liang, Xianhao Ye, Jing Zhong

Publications

No abstract provided.


Steve And The Picket Fence: Evidence Of Feedback-Unstable Magnetosphere-Ionosphere Interaction, Evgeny Mishin, Anatoly Streltsov Dec 2019

Steve And The Picket Fence: Evidence Of Feedback-Unstable Magnetosphere-Ionosphere Interaction, Evgeny Mishin, Anatoly Streltsov

Publications

This paper aims to extend the understanding of Strong Thermal Emission VelocityEnhancement (STEVE) and the Picket Fence related to strong subauroral ion drifts (SAID). Wenumerically demonstrated that precipitating energetic electrons are critical for the structuring of the PicketFence. It is created by feedback-unstable magnetosphere-ionosphere interactions driven by the SAIDelectric field when the Hall conductance created by energetic (≥1 keV) electrons exceeds the Pedersenconductance. We show that thermal excitation of the red-line emission in STEVE is inhibited by inelasticcollisions with molecular nitrogen. Suprathermal (≤500 eV) electrons coming from the turbulentplasmasphere appear to be the major source. We also show that the …


Multilayer Observations And Modeling Of Thunderstorm-Generated Gravity Waves Over The Midwestern United States, C. J. Heale, J. B. Snively, A. N. Bhatt, L. Hoffmann, C. C. Stephan Dec 2019

Multilayer Observations And Modeling Of Thunderstorm-Generated Gravity Waves Over The Midwestern United States, C. J. Heale, J. B. Snively, A. N. Bhatt, L. Hoffmann, C. C. Stephan

Publications

We present multilayer observations and numerical simulations of gravity waves (GWs) generated by a series of Mesoscale Convective Systems over the midwestern United States. Strong semiconcentric GWs were observed and modeled, which couple from their tropospheric sources to the thermosphere, displaying strong nonlinearity indicated by instability, breaking, and formation of turbulent vortices. GWs in the stratosphere display a large range of horizontal scales from 34–400 km; however, the smaller wavelength waves break rapidly in the mesosphere and lower thermosphere. Larger-scale (≥150 km) waves dominate in the thermosphere and display northwestward propagation at 200–300 km altitude, opposing the mean winds. Despite …


Thermodynamic Model Of Co2 Deposition In Cold Climates, Sandra K. S. Boetcher, Ted Von Hippel, Matthew J. Traum Dec 2019

Thermodynamic Model Of Co2 Deposition In Cold Climates, Sandra K. S. Boetcher, Ted Von Hippel, Matthew J. Traum

Publications

A thermodynamic model, borrowing ideas from psychrometric principles, of a cryogenic direct-air CO2-capture system utilizing a precooler is used to estimate the optimal CO2 removal fraction to minimize energy input per tonne of CO2. Energy costs to operate the system scale almost linearly with the temperature drop between the ingested air and the cryogenic desublimation temperature of CO2, driving siting to the coldest accessible locations. System performance in three Arctic/Antarctic regions where the proposed system can potentially be located is analyzed. Colder ambient temperatures provide colder system input air temperature yielding lower CO2 removal energy requirements. A case is also …


Deepfuzzer: Accelerated Deep Greybox Fuzzing, Jie Liang, Yu Jiang, Mingzhe Wang, Houbing Song, Kim-Kwang Raymond Choo Dec 2019

Deepfuzzer: Accelerated Deep Greybox Fuzzing, Jie Liang, Yu Jiang, Mingzhe Wang, Houbing Song, Kim-Kwang Raymond Choo

Publications

Fuzzing is one of the most effective vulnerability detection techniques, widely used in practice. However, the performance of fuzzers may be limited by their inability to pass complicated checks, inappropriate mutation frequency, arbitrary mutation strategy, or the variability of the environment. In this paper, we present DeepFuzzer, an enhanced greybox fuzzer with qualified seed generation, balanced seed selection, and hybrid seed mutation. First, we use symbolic execution in a lightweight approach to generate qualified initial seeds which then guide the fuzzer through complex checks. Second, we apply a statistical seed selection algorithm to balance the mutation frequency between different seeds. …


Titchmarsh–Weyl Theory For Vector-Valued Discrete Schrödinger Operators, Keshav R. Acharya Dec 2019

Titchmarsh–Weyl Theory For Vector-Valued Discrete Schrödinger Operators, Keshav R. Acharya

Publications

We develop the Titchmarsh–Weyl theory for vector-valued discrete Schrödinger operators. We show that the Weyl m functions associated with these operators are matrix valued Herglotz functions that map complex upper half plane to the Siegel upper half space. We discuss about the Weyl disk and Weyl circle corresponding to these operators by defining these functions on a bounded interval. We also discuss the geometric properties of Weyl disk and find the center and radius of the Weyl disk explicitly in terms of matrices.


Astrodynamics Of The Next Generation Space Weather Prediction Mission, Mark Herring Dec 2019

Astrodynamics Of The Next Generation Space Weather Prediction Mission, Mark Herring

Doctoral Dissertations and Master's Theses

Accurate prediction of the solar wind properties, interplanetary magnetic field direction and various space weather phenomena becomes ever more important as our dependence on Earth orbiting spacecraft increases. Different solar wind drivers can lead both to enhancements and losses of relativistic electrons in the outer radiation belts, thus posing a major risk to satellites. To further our understanding of the Sun’s impact on the near Earth space environment, as well as to provide predictive capabilities, a mission placing monitoring satellites in key orbits in the inner Solar System is being proposed. As part of that effort, the possibility of using …


How Airport Construction Will Evolve With The Increased Effects Of Climate Change, Xavier M. Ashley Nov 2019

How Airport Construction Will Evolve With The Increased Effects Of Climate Change, Xavier M. Ashley

Beyond: Undergraduate Research Journal

This report addressed the effects rising global temperatures resulting from climate change have had on flight operations in their entirety. The research objective was to discover what methods could enhance climate adaptation in airport construction, as higher mean-surface temperatures have an increasingly negative effect on aircraft performance. The findings would primarily be of interest to the Federal Aviation Administration (FAA) Primary Office presiding over the planning and development of airports. Overall, the report provided a comprehensive analysis of global warming’s effects on aviation, including the implications of degraded aircraft performance and sea-level rise for coastal airports. Additionally, it examined comparative …


An Explicit Finite Volume Numerical Scheme For 2d Elastic Wave Propagation, Mihhail Berezovski, Arkadi Berezovski Nov 2019

An Explicit Finite Volume Numerical Scheme For 2d Elastic Wave Propagation, Mihhail Berezovski, Arkadi Berezovski

Publications

The construction of the two-dimensional finite volume numerical scheme based on the representation of computational cells as thermodynamic systems is presented explicitly. The main advantage of the scheme is an accurate implementation of conditions at interfaces and boundaries. It is demonstrated that boundary conditions influence the wave motion even in the simple case of a homogeneous waveguide.


Fast Forensic Triage Using Centralised Thumbnail Caches On Windows Operating Systems, Sean Mckeown, Gordon Russell, Petra Leimich Sep 2019

Fast Forensic Triage Using Centralised Thumbnail Caches On Windows Operating Systems, Sean Mckeown, Gordon Russell, Petra Leimich

Journal of Digital Forensics, Security and Law

A common investigative task is to identify known contraband images on a device, which typically involves calculating cryptographic hashes for all the files on a disk and checking these against a database of known contraband. However, modern drives are now so large that it can take several hours just to read this data from the disk, and can contribute to the large investigative backlogs suffered by many law enforcement bodies. Digital forensic triage techniques may thus be used to prioritise evidence and effect faster investigation turnarounds. This paper proposes a new forensic triage method for investigating disk evidence relating to …


Memoryranger Prevents Highjacking File_Object Structures In Windows Kernel, Igor Korkin Sep 2019

Memoryranger Prevents Highjacking File_Object Structures In Windows Kernel, Igor Korkin

Journal of Digital Forensics, Security and Law

Windows OS kernel memory is one of the main targets of cyber-attacks. By launching such attacks, hackers are succeeding in process privilege escalation and tampering users’ data by accessing kernel-mode memory. This paper considers a new example of such an attack, which results in access to the files opened in an exclusive mode. Windows built-in security features prevent such a legal access, but attackers can circumvent them by patching dynamically allocated objects. The research shows that the newest Windows 10 x64 is vulnerable to this attack. The paper provides an example of using MemoryRanger, a hypervisor- based solution to prevent …


Improved Decay Tolerant Inference Of Previously Uninstalled Computer Applications, Oluwaseun Adegbehingbe, James Jones Sep 2019

Improved Decay Tolerant Inference Of Previously Uninstalled Computer Applications, Oluwaseun Adegbehingbe, James Jones

Journal of Digital Forensics, Security and Law

When an application is uninstalled from a computer system, the application’s deleted file contents are overwritten over time, depending on factors such as operating system, available unallocated disk space, user activity, etc. As this content decays, the ability to infer the application’s prior presence, based on the remaining digital artifacts, becomes more difficult. Prior research inferring previously installed applications by matching sectors from a hard disk of interest to a previously constructed catalog of labeled sector hashes showed promising results. This prior work used a white list approach to identify relevant artifacts, resulting in no irrelevant artifacts but incurring the …


Seeing And Understanding Data, Beverly Wood, Charlotte Bolch Aug 2019

Seeing And Understanding Data, Beverly Wood, Charlotte Bolch

Publications

Visual displays of data are commonly used today in media reports online or in print. For example, data visualizations are sometimes used as a marketing tool to convince people to purchase a certain product, or they are displayed in articles or magazines as a way to graphically display data to emphasize a certain point. In general, it is hard to imagine the majority of disciplines in science and mathematics not using data visualizations. However, before standard data visualization techniques were developed (and accepted by the community), mathematicians and scientists very rarely used graphical displays or pictures to represent empirical data.


Comparison Between Fluid Simulation With Test Particles And 1 Hybrid Simulation For The Kelvin-Helmholtz Instability, Xuanye Ma, Katariina Nykyri, Brandon L. Burkholder, Rachel C. Rice, Peter A. Delamere, Bishwa Neupane Aug 2019

Comparison Between Fluid Simulation With Test Particles And 1 Hybrid Simulation For The Kelvin-Helmholtz Instability, Xuanye Ma, Katariina Nykyri, Brandon L. Burkholder, Rachel C. Rice, Peter A. Delamere, Bishwa Neupane

Publications

A quantitative investigation of plasma transport rate via the Kelvin‐Helmholtz (KH) instability can improve our understanding of solar‐wind‐magnetosphere coupling processes. Simulation studies provide a broad range of transport rates by using different measurements based on different initial conditions and under different plasma descriptions, which makes cross literature comparison difficult. In this study, the KH instability under similar initial and boundary conditions (i.e., applicable to the Earth's magnetopause environment) is simulated by Hall magnetohydrodynamics with test particles and hybrid simulations. Both simulations give similar particle mixing rates. However, plasma is mainly transported through a few big magnetic islands caused by KH‐driven …


Blocks' Network: Redesign Architecture Based On Blockchain Technology, Moataz Hanif Aug 2019

Blocks' Network: Redesign Architecture Based On Blockchain Technology, Moataz Hanif

Doctoral Dissertations and Master's Theses

The Internet is a global network that uses communication protocols. It is considered the most important system reached by humanity, which no one can abandon. However, this technology has become a weapon that threatens the privacy of users, especially in the client-server model, where data is stored and managed privately. Additionally, users have no power over their data that store in a private server, which means users’ data may interrupt by government or might be sold via service provider for-profit purposes. Furthermore, blockchain is a technology that we can rely on to solve issues related to client-server model if appropriately …


Non-Linear Magnetosphere-Ionosphere Interactions At High Latitudes, Beket Tulegenov Aug 2019

Non-Linear Magnetosphere-Ionosphere Interactions At High Latitudes, Beket Tulegenov

Doctoral Dissertations and Master's Theses

Non-linear, 3D electromagnetic coupling between the ionosphere and magnetosphere is investigated in this dissertation. The study is based on a non-linear, 3D, reduced magnetohydrodynamic model describing interaction between dispersive Alfven waves and the nightside high-latitude ionosphere. Results are presented from a numerical study of small-scale, intense magnetic field-aligned currents observed in the vicinity of the discrete auroral arc by the Magnetosphere-Ionosphere Coupling in the Alfven Resonator (MICA) sounding rocket launched from Poker Flat, Alaska, on 19 February 2012. The goal of the MICA project was to investigate the hypothesis that such currents can be produced inside the ionospheric Alfven resonator …


Feasibility Of Circular Orbits For Proximity Operations In Strongly Perturbed Environments Around Uniformly Rotating Asteroids, Nicholas Peter Liapis Aug 2019

Feasibility Of Circular Orbits For Proximity Operations In Strongly Perturbed Environments Around Uniformly Rotating Asteroids, Nicholas Peter Liapis

Doctoral Dissertations and Master's Theses

Asteroids have been mapped and observed since 1801 when an Italian astronomer Guiseppe Piazzi discovered Ceres (Serio, Manara, & Sicoli, 2002). Since then, asteroids have been growing in popularity throughout the scientific community because they are thought to hold the information we need to understand how the solar system developed and why life exists on earth, as well as potential precious resources. This research studies different types of orbits that have been performed to date around asteroids and how they can be reworked to require less control effort. Different types of missions that have been sent to asteroids are discussed, …


Ice Spiral Patterns On The Ocean Surface, Andrei Ludu, Zhi Zong Jul 2019

Ice Spiral Patterns On The Ocean Surface, Andrei Ludu, Zhi Zong

Publications

We investigate a new two-dimensional compressible Navier-Stokes hydrodynamic model design to explain and study large scale ice swirls formation at the surface of the ocean. The linearized model generates a basis of Bessel solutions from where various types of spiral patterns can be generated and their evolution and stability in time analyzed. By restricting the nonlinear system of equations to its quadratic terms we obtain swirl solutions emphasizing logarithmic spiral geometry. The resulting solutions are analyzed and validated using three mathematical approaches: one predicting the formation of patterns as Townes solitary modes, another approach mapping the nonlinear system into a …


Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv Jul 2019

Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv

Publications

With the continuous development of information technology, enterprises, universities and governments are constantly stepping up the construction of electronic personnel information management system. The information of hundreds of thousands or even millions of people’s information are collected and stored into the system. So much information provides the cornerstone for the development of big data, if such data is tampered with or leaked, it will cause irreparable serious damage. However, in recent years, electronic archives have exposed a series of problems such as information leakage, information tampering, and information loss, which has made the reform of personnel information management more and …


Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen Jul 2019

Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen

Publications

With the rapid development of Internet of Things, massive mobile intelligent terminals are ready to access edge servers for real-time data calculation and interaction. However, the risk of private data leakage follows simultaneously. As the administrator of all intelligent terminals in a region, the edge server needs to clarify the ability of the managed intelligent terminals to defend against malicious attacks. Therefore, the security level classification for mobile intelligent terminals before accessing the network is indispensable. In this paper, we firstly propose a safety assessment method to detect the weakness of mobile intelligent terminals. Secondly, we match the evaluation results …


Preservation Of Our Astronomical Heritage: State Of The Profession White Paper For Astro2020, James Lattis, Wayne Osborn, Terry D. Oswalt, Jennifer Lynn Bartlett, Elizabeth Griffin, Thomas Hockey, Stephen Mccluskey, Alexei A. Pevtsov, Sara Schechner, Virginia Trimble Jul 2019

Preservation Of Our Astronomical Heritage: State Of The Profession White Paper For Astro2020, James Lattis, Wayne Osborn, Terry D. Oswalt, Jennifer Lynn Bartlett, Elizabeth Griffin, Thomas Hockey, Stephen Mccluskey, Alexei A. Pevtsov, Sara Schechner, Virginia Trimble

Publications

We argue that it is essential that the Astro2020 survey of the present state of American astronomy and the recommendations for the next decade address the issue of ensuring preservation of, and making more discoverable and accessible, the field’s rich legacy materials. These include both archived observations of scientific value and items of historical importance. Much of this heritage likely will be lost if action is not taken in the next decade. It is proposed that the decadal plan include recommendations on (1) compiling a list of historic sites and development of models for their preservation, (2) carrying out a …


Aviation Weather Products In General Aviation : Interpretability And Usability Research Trends, Jacqueline Mcsorley, Jayde King, Beth Blickensderfer Jul 2019

Aviation Weather Products In General Aviation : Interpretability And Usability Research Trends, Jacqueline Mcsorley, Jayde King, Beth Blickensderfer

General Aviation Weather Display Interpretation

  • Introduction
  • Current Study
  • Trends
  • Summary
  • Conclusion


Examining The Correlates Of Failed Drdos Attacks, Thomas Hyslip, Thomas Holt Jun 2019

Examining The Correlates Of Failed Drdos Attacks, Thomas Hyslip, Thomas Holt

Journal of Digital Forensics, Security and Law

Over the last decade, there has been a rise in cybercrime services offered on a feefor- service basis, enabling individuals to direct attacks against various targets. One of the recent services offered involves stresser or booter operators, who offer distributed reflected denial of service (DRDoS) attacks on an hourly or subscription basis. These attacks involve the use of malicious traffic reflected off of webservers to increase the volume of traffic, which is directed toward websites and servers rendering them unusable. Researchers have examined DRDoS attacks using realtime data, though few have considered the experience of their customers and the factors …


Front Matter Jun 2019

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Enhancing Forensic-Tool Security With Rust: Development Of A String Extraction Utility, Jens Getreu, Olaf Maennel Jun 2019

Enhancing Forensic-Tool Security With Rust: Development Of A String Extraction Utility, Jens Getreu, Olaf Maennel

Journal of Digital Forensics, Security and Law

The paper evaluates the suitability of the Rust ecosystem for forensic tool development. As a case study, a forensic tool named Stringsext is developed. Starting from analyzing the specefic requirements of forensic software in general and those of the present case study, all stages of the software development life-cycle are executed and evaluated. Stringsext is a re-implementation and enhancement of the GNU-strings tool, a widely used program in forensic investigations. Stringsext recognizes Cyrillic, CJKV East Asian characters and other scripts in all supported multi-byte-encodings while GNU-strings fails in finding these in UTF-16 and other encodings. During the case study it …


Df 2.0: An Automated, Privacy Preserving, And Efficient Digital Forensic Framework That Leverages Machine Learning For Evidence Prediction And Privacy Evaluation, Robin Verma, Jayaprakash Govindaraj Dr, Saheb Chhabra, Gaurav Gupta Jun 2019

Df 2.0: An Automated, Privacy Preserving, And Efficient Digital Forensic Framework That Leverages Machine Learning For Evidence Prediction And Privacy Evaluation, Robin Verma, Jayaprakash Govindaraj Dr, Saheb Chhabra, Gaurav Gupta

Journal of Digital Forensics, Security and Law

The current state of digital forensic investigation is continuously challenged by the rapid technological changes, the increase in the use of digital devices (both the heterogeneity and the count), and the sheer volume of data that these devices could contain. Although data privacy protection is not a performance measure, however, preventing privacy violations during the digital forensic investigation, is also a big challenge. With a perception that the completeness of investigation and the data privacy preservation are incompatible with each other, the researchers have provided solutions to address the above-stated challenges that either focus on the effectiveness of the investigation …


Forensic Cell Site Analysis: Mobile Network Operator Evidence Integrity Maintenance Research, John B. Minor Jun 2019

Forensic Cell Site Analysis: Mobile Network Operator Evidence Integrity Maintenance Research, John B. Minor

Journal of Digital Forensics, Security and Law

Mobile Network Operator (MNO) and Mobile Virtual Network Operator (MVNO) evidence have become an important evidentiary focus in the courtroom. This type of evidence is routinely produced as business records under U.S. Federal Rules of Evidence for use in the emerging discipline of Forensic Cell Site Analysis. The research was undertaken to determine if evidence produced by operators should be classified as digital evidence and, if so, what evidence handling methodologies are appropriate to ensure evidence integrity. This research project resulted in the creation of a method of determining if business records produced by MNO/MVNO organizations are digital evidence and …