Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Engineering

Whatsapp Network Forensics: Decrypting And Understanding The Whatsapp Call Signaling Messages, Filip Karpisek, Ibrahim Baggili, Frank Breitinger Oct 2015

Whatsapp Network Forensics: Decrypting And Understanding The Whatsapp Call Signaling Messages, Filip Karpisek, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

WhatsApp is a widely adopted mobile messaging application with over 800 million users. Recently, a calling feature was added to the application and no comprehensive digital forensic analysis has been performed with regards to this feature at the time of writing this paper. In this work, we describe how we were able to decrypt the network traffic and obtain forensic artifacts that relate to this new calling feature which included the: a) WhatsApp phone numbers, b) WhatsApp server IPs, c) WhatsApp audio codec (Opus), d) WhatsApp call duration, and e) WhatsApp's call termination. We explain the methods and tools used …


Highly Selective Hydrogenation And Hydrogenolysis Using A Copper-Doped Porous Metal Oxide Catalyst, Laurene Petitjean, Raphael Gagne, Evan Beach, Dequan Xiao, Paul Anastas Oct 2015

Highly Selective Hydrogenation And Hydrogenolysis Using A Copper-Doped Porous Metal Oxide Catalyst, Laurene Petitjean, Raphael Gagne, Evan Beach, Dequan Xiao, Paul Anastas

Chemistry and Chemical Engineering Faculty Publications

A copper-doped porous metal oxide catalyst in combination with hydrogen shows selective and quantitative hydrogenolysis of benzyl ketones and aldehydes, and hydrogenation of alkenes. The approach provides an alternative to noble-metal catalysed reductions and stoichiometric Wolff-Kishner and Clemmensen methods.


Professor Frank Breitinger's Full Bibliography, Frank Breitinger Oct 2015

Professor Frank Breitinger's Full Bibliography, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

No abstract provided.


An Mas Based Energy Management System For A Stand-Alone Microgrid At High Altitude, Junhui Zhao, Bo Zhao, Meidong Xue, Xuesong Zhang, Caisheng Wang Apr 2015

An Mas Based Energy Management System For A Stand-Alone Microgrid At High Altitude, Junhui Zhao, Bo Zhao, Meidong Xue, Xuesong Zhang, Caisheng Wang

Electrical & Computer Engineering and Computer Science Faculty Publications

A multi-agent system based energy management system (EMS) is proposed in this paper for implementing a PV-small hydro hybrid microgrid (MG) at high altitude. Based on local information, the distributed generation (DG) sources in the MG are controlled via the EMS to achieve efficient and stable system operation. Virtual bidding is used to quickly establish the scheduling of system operation and capacity reserve. In addition, real-time power dispatches are carried out through model predictive control to balance load demand and power generation in the MG. The dynamic model and the energy management strategy of the MG have been simulated on …


Multiple-Choice Testing Using Immediate Feedback-Assessment Technique (If At®) Forms: Second-Chance Guessing Vs. Second-Chance Learning?, Jeremy D. Merrel, Pier F. Cirillo, Pauline M. Schwartz, Jeffrey Webb Jan 2015

Multiple-Choice Testing Using Immediate Feedback-Assessment Technique (If At®) Forms: Second-Chance Guessing Vs. Second-Chance Learning?, Jeremy D. Merrel, Pier F. Cirillo, Pauline M. Schwartz, Jeffrey Webb

Chemistry and Chemical Engineering Faculty Publications

Multiple choice testing is a common but often ineffective method for evaluating learning. A newer approach, however, using Immediate Feedback Assessment Technique (IF AT®, Epstein Educational Enterprise, Inc.) forms, offers several advantages. In particular, a student learns immediately if his or her answer is correct and, in the case of an incorrect answer, has an opportunity to provide a second response and receive partial credit for a correct second attempt. For a multiple choice question with five possible answers, the IF AT® form covers spaces labeled A through E with a thin opaque film; when the film is scratched away, …


Exploring The Use Of Faded Worked Examples As A Problem Solving Approach For Underprepared Students, Tiffany Hesser, Jess L. Gregory Jan 2015

Exploring The Use Of Faded Worked Examples As A Problem Solving Approach For Underprepared Students, Tiffany Hesser, Jess L. Gregory

Chemistry and Chemical Engineering Faculty Publications

It is not uncommon for students to find themselves underprepared when entering a post secondary institution. In additional to lower levels of academic achievement, underprepared students may not be aware that they lack the skills needed to be successful and effectively acquire and process information. Because of this, students that enter post-secondary institutions underprepared often require more support in and out of the college classroom.

In computational based classes, such as math, engineering, chemistry or physics, this support often includes an introduction to effective problem solving strategies. This study introduced faded worked examples as a problem solving approach to students …


An Empirical Comparison Of Widely Adopted Hash Functions In Digital Forensics: Does The Programming Language And Operating System Make A Difference?, Satyendra Gurjar, Ibrahim Baggili, Frank Breitinger, Alice E. Fischer Jan 2015

An Empirical Comparison Of Widely Adopted Hash Functions In Digital Forensics: Does The Programming Language And Operating System Make A Difference?, Satyendra Gurjar, Ibrahim Baggili, Frank Breitinger, Alice E. Fischer

Electrical & Computer Engineering and Computer Science Faculty Publications

Hash functions are widespread in computer sciences and have a wide range of applications such as ensuring integrity in cryptographic protocols, structuring database entries (hash tables) or identifying known files in forensic investigations. Besides their cryptographic requirements, a fundamental property of hash functions is efficient and easy computation which is especially important in digital forensics due to the large amount of data that needs to be processed when working on cases. In this paper, we correlate the runtime efficiency of common hashing algorithms (MD5, SHA-family) and their implementation. Our empirical comparison focuses on C-OpenSSL, Python, Ruby, Java on Windows and …


Network And Device Forensic Analysis Of Android Social-Messaging Applications, Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, Frank Breitinger Jan 2015

Network And Device Forensic Analysis Of Android Social-Messaging Applications, Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

In this research we forensically acquire and analyze the device-stored data and network traffic of 20 popular instant messaging applications for Android. We were able to reconstruct some or the entire message content from 16 of the 20 applications tested, which reflects poorly on the security and privacy measures employed by these applications but may be construed positively for evidence collection purposes by digital forensic practitioners. This work shows which features of these instant messaging applications leave evidentiary traces allowing for suspect data to be reconstructed or partially reconstructed, and whether network forensics or device forensics permits the reconstruction of …