Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

2013

Conference

Institution
Keyword
Publication
File Type

Articles 1 - 30 of 97

Full-Text Articles in Social and Behavioral Sciences

Caver Quest 3d Virtual Cave Simulation Of Snowy River In Fort Stanton Cave, Ronald J. Lipinski, Pete Lindsley Nov 2013

Caver Quest 3d Virtual Cave Simulation Of Snowy River In Fort Stanton Cave, Ronald J. Lipinski, Pete Lindsley

National Cave and Karst Management Symposium 2013

Virtual worlds, or 3D simulations through which an avatar can travel, is becoming a common means to display products or provide training in new environments. This paper describes the steps in producing the 3D virtual simulation of Snowy River in Fort Stanton Cave, New Mexico. A traditional cave survey and map with cross sections was used to produce a 3D meshed surface of the cave walls using the Blender software package. Photographs were taken of the walls, ceiling, and floor and merged together. The merged montage was applied to the 3D mesh walls as a “texture”. Unity3D was used to …


Wrap Up & Where To From Here, Kathleen Draper, Hugh Mclaughlin, Erich J. Knight Mr., Amanda Ravenhill Oct 2013

Wrap Up & Where To From Here, Kathleen Draper, Hugh Mclaughlin, Erich J. Knight Mr., Amanda Ravenhill

USBI Biochar Conferences

Symposium Track Chairs will provide high level summaries of the information covered in each of the tracks: Feedstock & Production; Benefits & Uses; Policy & Community and Sales, Scale & Marketing.

To conclude the symposium and leverage all of the great new ideas and information in everyone's minds, we will capture key take aways as a community and then invite suggestions and discussion about next steps in the biochar movement.


Manure Management & Biochar, Matthew W. Smith, John Miedema, Mike Mcgolden Oct 2013

Manure Management & Biochar, Matthew W. Smith, John Miedema, Mike Mcgolden

USBI Biochar Conferences

Co-location synergies: Biomethane & Biochar Production: John Medeima, BioLogical Carbon

Biochar Filters Impact on Anaerobic Digestion: Matthew Smith, WSU

http://youtu.be/RILS6wS3qWk

The Benefits of a Manure-based Biochar: Mike McGolden

http://youtu.be/t1hVgolalRI

Biochar has been in existence for thousands of years. However, it has only been in the past decade that there has been a resurgence in the thirst for knowledge about biochar and research into how it is made and its impact on the environment.

This resurgence has brought about a tremendous amount of research and a rapid growth in education among the general population about biochar – especially in the past …


Wednesday Morning Plenary, Doris Hamill, Tom Miles Oct 2013

Wednesday Morning Plenary, Doris Hamill, Tom Miles

USBI Biochar Conferences

Tom Miles will kick off the "Where to From Here" conversation that is critical to understanding next steps for the biochar industry in North America.

http://www.youtube.com/watch?v=NCIu8QEQUkk

Doris Hamill will describe the K-12 biochar educational package she and her team launched at NASA, where it has taken off and where it may land. She will also share details about her project for using biochar in the redevelopment project on the Hampton Roads campus.

http://www.youtube.com/watch?v=yx_7w1-bJ8A


Biochar Community Development, Ronal G. Larson, Jim Long, Scott Graves Oct 2013

Biochar Community Development, Ronal G. Larson, Jim Long, Scott Graves

USBI Biochar Conferences

Growing a Biochar Learning Network in a Rural Community: Jim Long

The presentation will review what we are learning about the effectiveness of our several-year, voluntary journey to introduce biochar to residents using a variety of techniques including:

  • Orientations with members of our Umpqua Bio-Alternatives Cooperative and its Biochar Study Group;
  • Articles published in newsletters and on web pages produced by related groups;
  • Exhibits at farmers' markets, county weed days, and Earth Day;
  • Live demonstrations with farmers, community gardeners, Grange members, school students, and Job Corps youth;
  • Exhibits, demonstrations, and discussions during our annual fall Biochar Exposition with members of …


Pre-Soil Techniques, Nigel Gale, Dale Hendricks, Doug Clayton Oct 2013

Pre-Soil Techniques, Nigel Gale, Dale Hendricks, Doug Clayton

USBI Biochar Conferences

Rescuing biochar: Pre - application techniques to enhance plant responses to biochar additions: Nigel Gale, U of Toronto

A growing body of literature indicates variable responses of different plant species to biochar, including positive, neutral, and negative, suggesting that it is important to investigate the nature and mechanism of species-specific responses to biochar additions. Neutral or negative plant responses to additions of biochars have commonly been reported in prior studies, and are likely the result of a combination of changes in soil properties (e.g. pH, surface area, and nutrient and water retention) and the production of volatile organic compounds from …


Labeling Biochar Products, Kelpie Wilson, David Yarrow, Renel Anderson Oct 2013

Labeling Biochar Products, Kelpie Wilson, David Yarrow, Renel Anderson

USBI Biochar Conferences

Making Claims for Biochar: Kelpie Wilson

Cool Foods: David Yarrow, KAW Valley Biochar

OMRI Certification: Renel Anderson, Black Owl Biochar


Novel Uses Of Biochar, Hans-Peter Schmidt Oct 2013

Novel Uses Of Biochar, Hans-Peter Schmidt

USBI Biochar Conferences

Cascading Uses of Biochar - Hans-Peter Schmidt, Ithaka Institute

In addition to the use of biochar as a soil amendment, there are an increasing number of ways to incorporate biochar into different eco- and industrial systems. Thus feeding biochar to livestock has numerous benefits not only for the animals, but it also helps reduce greenhouse gas emissions and improves nutrient retention in animal manure. The use of biochar in building materials is just beginning to be studied but shows promise in the ability to insulate, decontaminate air, provide odor and humidity control. Biochar as pillow filling to induce perfectly reposing …


Ethics & Sustainability, Gloria Flora, John Bonitz, Karen Ribeiro Oct 2013

Ethics & Sustainability, Gloria Flora, John Bonitz, Karen Ribeiro

USBI Biochar Conferences

Biochar and the Sustainability Imperative. Now marks a critical time: as biochar comes of age and markets begin to develop, this young industry is attracting naysayers, doubters and get-rich-quick-schemers. Ethical biochar production and use is of paramount importance as we continue to lay the groundwork for biochar as a model for carbon neutral/negative business, landscape restoration and truly green technology. Shortcuts, poor quality product and unsustainable use of biomass could bring biochar to its knees before it gains the traction necessary to fulfill its promises. This discussion will explore opportunities and pitfalls in feedstocks sustainability, production integrity and ethics in …


Remediation/Pollution Control, Makoto Ogawa, Seok-Young Oh, Josh Kearns Oct 2013

Remediation/Pollution Control, Makoto Ogawa, Seok-Young Oh, Josh Kearns

USBI Biochar Conferences

Sorptive Treatment of Metals and Nitro Explosives in Water Using Biochar -

Seok-Young Oh1*,

Biochar, a solid byproduct of a pyrolysis process was investigated as a sorbent to remove toxic metals and nitro explosives from natural water and wastewater. It was hypothesized that biochar can sorb dissolved metals and nitro explosives due to its high surface area and strong sorption affinity of aromatic organic compounds. Using a tube furnace under N2, various types biochar were synthesized by changing biomass (poultry litter, sludge, fallen leaves, corn stalk, rice straw, and coffee grounds) and temperature (250, 400, …


Farmer Workshop, Rachel Hestrin, David Yarrow, Christian Pulver, Thea Whitman Oct 2013

Farmer Workshop, Rachel Hestrin, David Yarrow, Christian Pulver, Thea Whitman

USBI Biochar Conferences

Sunday afternoon October 13, 2013 from 1:00 to 4pm, at the New England Small Farm Institute in Belchertown MA (275 Jackson Street)

Join fellow farmers and gardeners in an interactive, educational, and highly stimulating presentation/workshop about what biochar is (and is not) along with details about how and why biochar can help you achieve your growing goals. Learn about the many benefits of soil conditioning with biochar, application techniques and amounts, carbon stability, and other practical advice. Rachel Hestrin from Cornell University will deliver a hands on technical presentation and field expert David Yarrow will review his extensive SARE grant …


Data Analysis Using Regression Modeling: Visual Display And Setup Of Simple And Complex Statistical Models, Emil N. Coman, Maria A. Coman, Eugen Iordache, Russell Barbour, Lisa Dierker Sep 2013

Data Analysis Using Regression Modeling: Visual Display And Setup Of Simple And Complex Statistical Models, Emil N. Coman, Maria A. Coman, Eugen Iordache, Russell Barbour, Lisa Dierker

Yale Day of Data

We present visual modeling solutions for testing simple and more advanced statistical hypotheses in any research field. All models can be directly specified in analytical software like Mplus or R.

Data analysis in any substantive field can be easily accomplished by translating statistical tests in the intuitive language of regression-based path diagrams with observed and unobserved variables. All models we presented can be directly specified and estimated in analytical software.

Students can particularly benefit from being taught the simple regression modeling setup of the path analytical method, as it empowers them to apply the techniques to any data to test …


Online Instruction Made Easy: Getting Started With The Guide On The Side, Erica Defrain Aug 2013

Online Instruction Made Easy: Getting Started With The Guide On The Side, Erica Defrain

UVM Libraries Conference Day

Come learn about a great new tool for easily creating effective and engaging online tutorials built around the theory of active learning. The Guide on the Side was created by librarians at the University of Arizona and released as an open source download in 2012. We hope to soon have it installed for all to use at the UVM Libraries!


Why I Love Grasshopper Sparrows, Michele Patenaude Aug 2013

Why I Love Grasshopper Sparrows, Michele Patenaude

UVM Libraries Conference Day

Since 2001, Michele (a library circulation supervisor in her day job) has conducted a summer breeding-bird survey of Grasshopper Sparrows at Camp Johnson in Colchester, VT. Named Grasshopper Sparrows because their breeding call sounds like a grasshopper, this little brown bird is endemic to certain types of scrubby grasslands which are becoming more scarce in the Northeast. The Grasshopper Sparrow is also declining and the species is not on the list of Vermont Endangered Birds. Come to this presentation and learn about the bird, how Michele surveys them, why they are endangered, and why Michele loves these quiet, little brown …


A Forensic Study Of The Effectiveness Of Selected Anti-Virus Products Against Ssdt Hooking Rootkits, Sami Al-Shaheri, Dale Lindskog, Pavol Zavarsky, Ron Ruhl Jun 2013

A Forensic Study Of The Effectiveness Of Selected Anti-Virus Products Against Ssdt Hooking Rootkits, Sami Al-Shaheri, Dale Lindskog, Pavol Zavarsky, Ron Ruhl

Annual ADFSL Conference on Digital Forensics, Security and Law

For Microsoft Windows Operating Systems, both anti-virus products and kernel rootkits often hook the System Service Dispatch Table (SSDT). This research paper investigates the interaction between these two in terms of the SSDT. To investigate these matters, we extracted digital evidence from volatile memory, and studied that evidence using the Volatility framework. Due to the diversity in detection techniques used by the anti-virus products, and the diversity of infection techniques used by rootkits, our investigation produced diverse results, results that helped us to understand several SSDT hooking strategies, and the interaction between the selected anti-virus products and the rootkit samples. …


An Ontology-Based Forensic Analysis Tool, Mohammed Alzaabi, Andy Jones, Thomas A. Martin Jun 2013

An Ontology-Based Forensic Analysis Tool, Mohammed Alzaabi, Andy Jones, Thomas A. Martin

Annual ADFSL Conference on Digital Forensics, Security and Law

The analysis of forensic investigation results has generally been identified as the most complex phase of a digital forensic investigation. This phase becomes more complicated and time consuming as the storage capacity of digital devices is increasing, while at the same time the prices of those devices are decreasing. Although there are some tools and techniques that assist the investigator in the analysis of digital evidence, they do not adequately address some of the serious challenges, particularly with the time and effort required to conduct such tasks. In this paper, we consider the use of semantic web technologies and in …


First Glance: An Introductory Analysis Of Network Forensics Of Tor, Raymond Hansen Jun 2013

First Glance: An Introductory Analysis Of Network Forensics Of Tor, Raymond Hansen

Annual ADFSL Conference on Digital Forensics, Security and Law

The Tor network is a low-latency overlay network for TCP flows that is designed to provide privacy and anonymity to its users. It is currently in use by many as a means to avoid censorship of both information to be shared and information to be retrieved. This paper details the architecture of the Tor network as a platform for evaluating the current state of forensic analysis of the Tor network. Specific attempts to block access to the Tor network are examined to identify (a) the processes utilized to identify Tor nodes, and (b) the resulting exposure of potentially inculpatory evidence. …


A Thematic Review Of User Compliance With Information Security Policies Literature, David Sikolia Jun 2013

A Thematic Review Of User Compliance With Information Security Policies Literature, David Sikolia

Annual ADFSL Conference on Digital Forensics, Security and Law

The adoption of computer and internet technology has greatly improved the way businesses operate. However the risk to the confidentiality, integrity and availability of organizational data and systems has greatly increased too. Information security is an ever present concern for all organizations. Financial estimates of the impact of security breaches to information and technology resources range from hundreds of billions to over one trillion dollars each year worldwide (D'Arcy et al., 2011b). Organizations have therefore developed a combination of technical, administrative, and physical controls to reduce this risk (D'Arcy et al., 2011a). Administrative measures include the development of information security …


Journey Into Windows 8 Recovery Artifacts, W. K. Johnson Jun 2013

Journey Into Windows 8 Recovery Artifacts, W. K. Johnson

Annual ADFSL Conference on Digital Forensics, Security and Law

One of the most difficult processes of digital forensics is to understand how new technology interacts with current technology and how digital forensic analysts can utilize current Digital Forensics technologies and processes to recover and find information hidden. Microsoft has released their new operating system Windows 8, with this new release Microsoft has added some features to the operating system that will present some interesting complications to digital forensics. Since the initial release of the Windows 8 Release Candidates there have been some research released that focus primarily on the new user created artifacts and a few artifacts that have …


An Image Forensic Scheme With Robust And Fragile Watermarking For Business Documents, Sai Ho Kwok Jun 2013

An Image Forensic Scheme With Robust And Fragile Watermarking For Business Documents, Sai Ho Kwok

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper proposes an image forensic scheme with both robust and fragile watermarking techniques for business documents. Through a dual watermarking approach, the proposed scheme can achieve image forensics objectives of (a) identification of source; (b) authentication of documents; and (c) locating the tempered areas of documents due to attacks. An example is presented to prove the concepts of the proposed scheme.

Keywords: Image Forensics, Fragile and Robust Watermarking, Business Document.


Significance Of Semantic Reconciliation In Digital Forensics, Nickson M. Karie, H. S. Venter Jun 2013

Significance Of Semantic Reconciliation In Digital Forensics, Nickson M. Karie, H. S. Venter

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital forensics (DF) is a growing field that is gaining popularity among many computer professionals, law enforcement agencies and other stakeholders who must always cooperate in this profession. Unfortunately, this has created an environment replete with semantic disparities within the domain that needs to be resolved and/or eliminated. For the purpose of this study, semantic disparity refers to disagreements about the meaning, interpretation, descriptions and the intended use of the same or related data and terminologies. If semantic disparity is not detected and resolved, it may lead to misunderstandings. Even worse, since the people involved may not be from the …


System-Generated Digital Forensic Evidence In Graphic Design Applications, Enos Mabuto, Hein Venter Jun 2013

System-Generated Digital Forensic Evidence In Graphic Design Applications, Enos Mabuto, Hein Venter

Annual ADFSL Conference on Digital Forensics, Security and Law

Graphic design applications are often used for the editing and design of digital art. The same applications can be used for creating counterfeit documents such as identity documents (IDs), driver’s licences, passports, etc. However, the use of any graphic design application leaves behind traces of digital information that can be used during a digital forensic investigation. Current digital forensic tools examine a system to find digital evidence, but they do not examine a system specifically for the creating of counterfeit documents created through the use of graphic design applications. The paper in hand reviews the system-generated digital forensic evidence gathered …


Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz Jun 2013

Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz

Annual ADFSL Conference on Digital Forensics, Security and Law

Money launderers hide traces of their transactions with the involvement of entities that participate in sophisticated schemes. Money laundering detection requires unraveling concealed connections among multiple but seemingly unrelated human money laundering networks, ties among actors of those schemes, and amounts of funds transferred among those entities. The link among small networks, either financial or social, is the primary factor that facilitates money laundering. Hence, the analysis of relations among money laundering networks is required to present the full structure of complex schemes. We propose a framework that uses sequence matching, case-based analysis, social network analysis, and complex event processing …


Identifying Peer-To-Peer Traffic On Shared Wireless Networks, Simon Piel, Ej Jung Jun 2013

Identifying Peer-To-Peer Traffic On Shared Wireless Networks, Simon Piel, Ej Jung

Annual ADFSL Conference on Digital Forensics, Security and Law

Tracing contraband downloads leads investigators to an IP address, and in turn Internet Service Providers (ISP) can provide a physical location using this IP address. However, most homes and offices share this IP address among many computers using wireless networks. In other words, there needs to be another investigation to find out which computer was responsible for contraband downloads. To make matters worse, these shared wireless networks often have vulnerabilities in access control such as using WEP or using weak passwords. In such cases, any computer in range, not necessarily at the given physical address, could be responsible. We use …


On Resolving The Cloud Forensics Conundrum, John Bagby Jun 2013

On Resolving The Cloud Forensics Conundrum, John Bagby

Annual ADFSL Conference on Digital Forensics, Security and Law

The “cloud” is idiom for an ill-defined set of online services. The cloud simultaneously offers IT savings and promises advances in functionality (e.g., ubiquity). However, the cloud also imposes poorly understood burdens on security and it may provoke injustice. Thus, the cloud presents a durable and seemingly irreconcilable conundrum for the digital forensics communit(ies). First, cloud proponents make efficiency promises for cloud services (SaaS, IaaS, PaaS). These translate well into the digital forensics domain. Indeed, the cloud may enable crowd sourcing of investigatory data vastly lowering costs of dispute resolution. For example, cloud-based litigation war rooms may reduce electronic discovery …


Cybercrime And Punishment: An Analysis Of The Deontological And Utilitarian Functions Of Punishment In The Information Age, Karim Jetha Jun 2013

Cybercrime And Punishment: An Analysis Of The Deontological And Utilitarian Functions Of Punishment In The Information Age, Karim Jetha

Annual ADFSL Conference on Digital Forensics, Security and Law

This conceptual piece analyzes the role of criminal punishment and the nature of cyber crime to investigate whether the current punishment schemes are appropriate given the deontological and utilitarian goals of punishment: retribution, deterrence, incapacitation, and rehabilitation. The research has implications for policymaking in cybercriminal law.

Keywords: cybercrime, criminal law, punishment, retribution, deterrence, information economics


The Development Of Computer Forensic Legal System In China, Yonghao Mai, K. P. Chow, Rongsheng Xu, Gang Zhou, Fei Xu, Jun Zhang Jun 2013

The Development Of Computer Forensic Legal System In China, Yonghao Mai, K. P. Chow, Rongsheng Xu, Gang Zhou, Fei Xu, Jun Zhang

Annual ADFSL Conference on Digital Forensics, Security and Law

The computer forensic discipline was established around 2000 in China, which was further developed along with Chinese judicial appraisal system in 2005. The new criminal and civil procedure laws of the People’s Republic of China was enacted on 1 Jan 2013. The new laws specified electronic data is legal evidence and has great impact on the current practice on handling electronic evidence. This paper introduces the electronic data and electronic evidence examination procedure in mainland China, the general concept of computer forensic legal system, the management of computer judicial experts, the management of computer judicial expertise institutions.

Keywords: China legal …


Session 4-2-A: Taking The Disorder Out Of Gambling Disorder, Denise F. Quirk, Colin M. Hodgen May 2013

Session 4-2-A: Taking The Disorder Out Of Gambling Disorder, Denise F. Quirk, Colin M. Hodgen

International Conference on Gambling & Risk Taking

DSM‐5 Gambling Disorder

A. Persistent and recurrent problematic gambling behavior leading to clinically significant impairment or distress, as indicated by four (or more) of the following in a 12‐month period:

A. Persistent and recurrent maladaptive gambling behavior as indicated by five (or more) of the following:


Session 4-2-C: Dissociating The Roles Of Delay And Probability Discounting In Gambling Behavior, Will Shead, Emad Talisman May 2013

Session 4-2-C: Dissociating The Roles Of Delay And Probability Discounting In Gambling Behavior, Will Shead, Emad Talisman

International Conference on Gambling & Risk Taking

Now or Later?

How would you like a gift?

Now vs. 1 week

Rewards now are worth more than later

- Delayed rewards are discounted


Session 4-1-D: The Experience Of Lotto 6/49 And The Capacity To Trust: Elements For An Anthropology Of Gambling, Jocelyn Gadbois May 2013

Session 4-1-D: The Experience Of Lotto 6/49 And The Capacity To Trust: Elements For An Anthropology Of Gambling, Jocelyn Gadbois

International Conference on Gambling & Risk Taking

Anthropologists study Lotto 6/49 as an experience.

Lévy-Bruhl tries to compare the magical beliefs of serious gamblers with the magical beliefs of individuals he refers to as the ‘‘primitives’’ (1924).

After that, Henslin studied the superstitions of St.Louis taxi drivers who play craps during their work breaks and compared them to Skinner’s pigeon (1967).

I wanted in my thesis to help anthropology to reconstruct lost knowledge regarding gambling and beliefs about magic in capitalist society.