Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 92

Full-Text Articles in Engineering

Adaptive Virtual Impedance Droop Control Based On Consensus Control Of Reactive Current, Zhilin Lu, Qing Wei, Yiyi Zhang, Junhui Zhao, Emad Manla Jul 2018

Adaptive Virtual Impedance Droop Control Based On Consensus Control Of Reactive Current, Zhilin Lu, Qing Wei, Yiyi Zhang, Junhui Zhao, Emad Manla

Electrical & Computer Engineering and Computer Science Faculty Publications

It is difficult to achieve accurate distribution of reactive power based on conventional droop control due to the line impedance mismatch in an islanded microgrid. An adaptive virtual impendence method based on consensus control of reactive current is proposed in this paper. A distributed control structure without the central controller has been established. In this structure, each distributed generation unit (DG) is an independent agent, one-way communication is used between the adjacent DGs, and the reactive power sharing is equivalent to a problem of reactive power current consensus. It has been proven that the system is asymptotically stable under the …


Experience Constructing The Artifact Genome Project (Agp): Managing The Domain's Knowledge One Artifact At A Time, Cinthya Grajeda, Laura Sanchez, Ibrahim Baggili, Devon R. Clark, Frank Breitinger Jul 2018

Experience Constructing The Artifact Genome Project (Agp): Managing The Domain's Knowledge One Artifact At A Time, Cinthya Grajeda, Laura Sanchez, Ibrahim Baggili, Devon R. Clark, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

While various tools have been created to assist the digital forensics community with acquiring, processing, and organizing evidence and indicating the existence of artifacts, very few attempts have been made to establish a centralized system for archiving artifacts. The Artifact Genome Project (AGP) has aimed to create the largest vetted and freely available digital forensics repository for Curated Forensic Artifacts (CuFAs). This paper details the experience of building, implementing, and maintaining such a system by sharing design decisions, lessons learned, and future work. We also discuss the impact of AGP in both the professional and academic realms of digital forensics. …


An Overview Of The Usage Of Default Passwords, Brandon Knierem, Xiaolu Zhang, Philip Levine, Frank Breitinger, Ibrahim Baggili Jan 2018

An Overview Of The Usage Of Default Passwords, Brandon Knierem, Xiaolu Zhang, Philip Levine, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

The recent Mirai botnet attack demonstrated the danger of using default passwords and showed it is still a major problem. In this study we investigated several common applications and their password policies. Specifically, we analyzed if these applications: (1) have default passwords or (2) allow the user to set a weak password (i.e., they do not properly enforce a password policy). Our study shows that default passwords are still a significant problem: 61% of applications inspected initially used a default or blank password. When changing the password, 58% allowed a blank password, 35% allowed a weak password of 1 character.


If I Had A Million Cryptos: Cryptowallet Application Analysis And A Trojan Proof-Of-Concept, Trevor Haigh, Frank Breitinger, Ibrahim Baggili Jan 2018

If I Had A Million Cryptos: Cryptowallet Application Analysis And A Trojan Proof-Of-Concept, Trevor Haigh, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Cryptocurrencies have gained wide adoption by enthusiasts and investors. In this work, we examine seven different Android cryptowallet applications for forensic artifacts, but we also assess their security against tampering and reverse engineering. Some of the biggest benefits of cryptocurrency is its security and relative anonymity. For this reason it is vital that wallet applications share the same properties. Our work, however, indicates that this is not the case. Five of the seven applications we tested do not implement basic security measures against reverse engineering. Three of the applications stored sensitive information, like wallet private keys, insecurely and one was …


A Hierarchical Approach For Creating Electrically Conductive Network Structure In Polyurethane Nanocomposites Using A Hybrid Of Graphene Nanoplatelets, Carbon Black And Multi-Walled Carbon Nanotubes, Pashupati Pokharel, Dequan Xiao, Folarin Erogbogbo, Ozgur Keles, Dai Soo Lee Oct 2017

A Hierarchical Approach For Creating Electrically Conductive Network Structure In Polyurethane Nanocomposites Using A Hybrid Of Graphene Nanoplatelets, Carbon Black And Multi-Walled Carbon Nanotubes, Pashupati Pokharel, Dequan Xiao, Folarin Erogbogbo, Ozgur Keles, Dai Soo Lee

Chemistry and Chemical Engineering Faculty Publications

Hierarchical organization of carbon nanomaterials is the best strategy to combine desirable factors and synergistically impart mechanical and electrical properties to polymers. Here, we investigate the relaxation behavior of carbon nanofillers filled polyurethane (PU) with special reference to particle size and aspect ratio, filler morphology, filler loading to understand the conductive network formation of fillers in the PU matrix. Typically, an addition of 2 wt% hybrid fillers of graphene nanoplatelets (GNPs), conductive carbon black (CB) and multiwalled carbon nanotubes (MWCNTs) in PU at 1:1:2 mass ratio (GCM112-PU2) showed lowest surface resistivity ~106.8 ohm/sq along with highest improved mechanical properties. …


Forensic State Acquisition From Internet Of Things (Fsaiot): A General Framework And Practical Approach For Iot Forensics Through Iot Device State Acquisition, Christopher S. Meffert, Devon R. Clark, Ibrahim Baggili, Frank Breitinger Aug 2017

Forensic State Acquisition From Internet Of Things (Fsaiot): A General Framework And Practical Approach For Iot Forensics Through Iot Device State Acquisition, Christopher S. Meffert, Devon R. Clark, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

IoT device forensics is a difficult problem given that manufactured IoT devices are not standardized, many store little to no historical data, and are always connected; making them extremely volatile. The goal of this paper was to address these challenges by presenting a primary account for a general framework and practical approach we term Forensic State Acquisition from Internet of Things (FSAIoT). We argue that by leveraging the acquisition of the state of IoT devices (e.g. if an IoT lock is open or locked), it becomes possible to paint a clear picture of events that have occurred. To this end, …


Breaking Into The Vault: Privacy, Security And Forensic Analysis Of Android Vault Applications, Xiaolu Zhang, Ibrahim Baggili, Frank Breitinger Aug 2017

Breaking Into The Vault: Privacy, Security And Forensic Analysis Of Android Vault Applications, Xiaolu Zhang, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

In this work we share the first account for the forensic analysis, security and privacy of Android vault applications. Vaults are designed to be privacy enhancing as they allow users to hide personal data but may also be misused to hide incriminating files. Our work has already helped law enforcement in the state of Connecticut to reconstruct 66 incriminating images and 18 videos in a single criminal case. We present case studies and results from analyzing 18 Android vault applications (accounting for nearly 220 million downloads from the Google Play store) by reverse engineering them and examining the forensic artifacts …


Application Of Gis To Prioritize Brownfield Sites For Green Building Construction Based On Leed Criteria, Can B. Aktas, Paul Bartholomew, Sabrina Church Mar 2017

Application Of Gis To Prioritize Brownfield Sites For Green Building Construction Based On Leed Criteria, Can B. Aktas, Paul Bartholomew, Sabrina Church

Civil Engineering Faculty Publications

Although there are many initiatives to create incentives for investors and developers to invest in and redevelop brownfield sites, efficient prioritization of brownfields by taking into account environmental, economic, and social constraints remains a challenge. This study introduces a method to screen numerous brownfields over large geographic areas by using geographic information systems (GIS) and to assess and prioritize such sites for green building suitability based on leadership in energy and environmental design (LEED) criteria. A case study was completed for the greater Bridgeport, Connecticut region. With 279 brownfield sites, the city has among the highest number of brownfields in …


Leveraging The Srtp Protocol For Over-The-Network Memory Acquisition Of A Ge Fanuc Series 90-30, George Denton, Filip Karpisek, Frank Breitinger, Ibrahim Baggili Jan 2017

Leveraging The Srtp Protocol For Over-The-Network Memory Acquisition Of A Ge Fanuc Series 90-30, George Denton, Filip Karpisek, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Programmable Logic Controllers (PLCs) are common components implemented across many industries such as manufacturing, water management, travel, aerospace and hospitals to name a few. Given their broad deployment in critical systems, they became and still are a common target for cyber attacks; the most prominent one being Stuxnet. Often PLCs (especially older ones) are only protected by an outer line of defense (e.g., a firewall) but once an attacker gains access to the system or the network, there might not be any other defense layers. In this scenario, a forensic investigator should not rely on the existing software as it …


Availability Of Datasets For Digital Forensics–And What Is Missing, Cinthya Grajeda, Frank Breitinger, Ibrahim Baggili Jan 2017

Availability Of Datasets For Digital Forensics–And What Is Missing, Cinthya Grajeda, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

This paper targets two main goals. First, we want to provide an overview of available datasets that can be used by researchers and where to find them. Second, we want to stress the importance of sharing datasets to allow researchers to replicate results and improve the state of the art. To answer the first goal, we analyzed 715 peer-reviewed research articles from 2010 to 2015 with focus and relevance to digital forensics to see what datasets are available and focused on three major aspects: (1) the origin of the dataset (e.g., real world vs. synthetic), (2) if datasets were released …


Drop (Drone Open Source Parser) Your Drone: Forensic Analysis Of The Dji Phantom Iii, Devon R. Clark, Christopher S. Meffert, Ibrahim Baggili, Frank Breitinger Jan 2017

Drop (Drone Open Source Parser) Your Drone: Forensic Analysis Of The Dji Phantom Iii, Devon R. Clark, Christopher S. Meffert, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

The DJI Phantom III drone has already been used for malicious activities (to drop bombs, remote surveillance and plane watching) in 2016 and 2017. At the time of writing, DJI was the drone manufacturer with the largest market share. Our work presents the primary thorough forensic analysis of the DJI Phantom III drone, and the primary account for proprietary file structures stored by the examined drone. It also presents the forensically sound open source tool DRone Open source Parser (DROP) that parses proprietary DAT files extracted from the drone's nonvolatile internal storage. These DAT files are encrypted and encoded. The …


An Unexpected Restructuring Of Combustion Soot Aggregates By Subnanometer Coatings Of Polycyclic Aromatic Hydrocarbons, Chao Chen, Xiaolong Fan, Tasneem Shaltout, Chong Qiu, Yan Ma, Andrew Goldman, Alexei F. Khalizov Oct 2016

An Unexpected Restructuring Of Combustion Soot Aggregates By Subnanometer Coatings Of Polycyclic Aromatic Hydrocarbons, Chao Chen, Xiaolong Fan, Tasneem Shaltout, Chong Qiu, Yan Ma, Andrew Goldman, Alexei F. Khalizov

Chemistry and Chemical Engineering Faculty Publications

We investigated the effect of thin polycyclic aromatic hydrocarbon (PAH) coatings on the structure of soot aggregates. Soot aerosol from an inverted diffusion burner was size classified, thermally denuded, coated with six different PAHs, and then characterized using scanning electron microscopy, light scattering, and mass-mobility measurements. Contrary to our expectation, significant restructuring was observed in the presence of subnanometer layers of pyrene, fluoranthene, and phenanthrene. These PAHs remained in subcooled liquid state in thin films, whereby the liquid layer acted as a lubricant, reducing the force required to initiate the restructuring. Thin layers of PAH of higher melting temperatures (perylene, …


Cufa: A More Formal Definition For Digital Forensic Artifacts, Vikram S. Harichandran, Daniel Walnycky, Ibrahim Baggili, Frank Breitinger Aug 2016

Cufa: A More Formal Definition For Digital Forensic Artifacts, Vikram S. Harichandran, Daniel Walnycky, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

The term “artifact” currently does not have a formal definition within the domain of cyber/ digital forensics, resulting in a lack of standardized reporting, linguistic understanding between professionals, and efficiency. In this paper we propose a new definition based on a survey we conducted, literature usage, prior definitions of the word itself, and similarities with archival science. This definition includes required fields that all artifacts must have and encompasses the notion of curation. Thus, we propose using a new term e curated forensic artifact (CuFA) e to address items which have been cleared for entry into a CuFA database (one …


Deleting Collected Digital Evidence By Exploiting A Widely Adopted Hardware Write Blocker, Christopher S. Meffert, Ibrahim Baggili, Frank Breitinger Aug 2016

Deleting Collected Digital Evidence By Exploiting A Widely Adopted Hardware Write Blocker, Christopher S. Meffert, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

In this primary work we call for the importance of integrating security testing into the process of testing digital forensic tools. We postulate that digital forensic tools are increasing in features (such as network imaging), becoming networkable, and are being proposed as forensic cloud services. This raises the need for testing the security of these tools, especially since digital evidence integrity is of paramount importance. At the time of conducting this work, little to no published anti-forensic research had focused on attacks against the forensic tools/process.We used the TD3, a popular, validated, touch screen disk duplicator and hardware write blocker …


Anti-Forensics: Furthering Digital Forensic Science Through A New Extended, Granular Taxonomy, Kevin Conlan, Ibrahim Baggili, Frank Breitinger Aug 2016

Anti-Forensics: Furthering Digital Forensic Science Through A New Extended, Granular Taxonomy, Kevin Conlan, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

Anti-forensic tools, techniques and methods are becoming a formidable obstacle for the digital forensic community. Thus, new research initiatives and strategies must be formulated to address this growing problem. In this work we first collect and categorize 308 antidigital forensic tools to survey the field. We then devise an extended anti-forensic taxonomy to the one proposed by Rogers (2006) in order to create a more comprehensive taxonomy and facilitate linguistic standardization. Our work also takes into consideration anti-forensic activity which utilizes tools that were not originally designed for antiforensic purposes, but can still be used with malicious intent. This category …


Analysis Of A Parallel Machine Scheduling Problem With Sequence Dependent Setup Times And Job Availability Intervals, Ridvan Gedik, Chase Rainwater, Heather Nachtmann, Edward A. Pohl Jun 2016

Analysis Of A Parallel Machine Scheduling Problem With Sequence Dependent Setup Times And Job Availability Intervals, Ridvan Gedik, Chase Rainwater, Heather Nachtmann, Edward A. Pohl

Mechanical and Industrial Engineering Faculty Publications

In this study, we propose constraint programming (CP) model and logic-based Benders algorithms in order to make the best decisions for scheduling non-identical jobs with availability intervals and sequence dependent setup times on unrelated parallel machines in a fixed planning horizon. In this problem, each job has a profit, cost and must be assigned to at most one machine in such a way that total profit is maximized. In addition, the total cost has to be less than or equal to a budget level. Computational tests are performed on a real-life case study prepared in collaboration with the U.S. Army …


Development And Implementation Of Problem-Based Chemistry Experiments For Engineering Students In A Multi-Disciplinary Course, Tiffany Hesser, Stephanie R. Bunyea Jun 2016

Development And Implementation Of Problem-Based Chemistry Experiments For Engineering Students In A Multi-Disciplinary Course, Tiffany Hesser, Stephanie R. Bunyea

Chemistry and Chemical Engineering Faculty Publications

This paper will describe the implementation and continuing development of five problem based laboratory experiments in a general chemistry course designed specifically for multiple disciplines of engineering students at the University of New Haven. The Problem Based Laboratory Experiments (PBLE) were developed to provide students with the opportunity to perform and develop experimental procedures working in interdisciplinary teams, while achieving a greater understanding of the role of chemistry in engineering fields. In each PBLE, students first complete a traditional chemistry experiment to gain an understanding of the chemical concepts and to become familiar with executing a written procedure with a …


Rapid Android Parser For Investigating Dex Files (Rapid), Xiaolu Zhang, Frank Breitinger, Ibrahim Baggili Jun 2016

Rapid Android Parser For Investigating Dex Files (Rapid), Xiaolu Zhang, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Android malware is a well-known challenging problem and many researchers/vendors/practitioners have tried to address this issue through application analysis techniques. In order to analyze Android applications, tools decompress APK files and extract relevant data from the Dalvik EXecutable (DEX) files. To acquire the data, investigators either use decompiled intermediate code generated by existing tools, e.g., Baksmali or Dex2jar or write their own parsers/dissemblers. Thus, they either need additional time because of decompiling the application into an intermediate representation and then parsing text files, or they reinvent the wheel by implementing their own parsers. In this article, we present Rapid Android …


A Method And A Case Study For The Selection Of The Best Available Tool For Mobile Device Forensics Using Decision Analysis, Shahzad Saleem, Oliver Popov, Ibrahim Baggili Mar 2016

A Method And A Case Study For The Selection Of The Best Available Tool For Mobile Device Forensics Using Decision Analysis, Shahzad Saleem, Oliver Popov, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

The omnipresence of mobile devices (or small scale digital devices - SSDD) and more importantly the utility of their associated applications for our daily activities, which range from financial transactions to learning, and from entertainment to distributed social presence, create an abundance of digital evidence for each individual. Some of the evidence may be a result of illegal activities that need to be identified, understood and eventually prevented in the future. There are numerous tools for acquiring and analyzing digital evidence extracted from mobile devices. The diversity of SSDDs, types of evidence generated and the number of tools used to …


A Cyber Forensics Needs Analysis Survey: Revisiting The Domain's Needs A Decade Later, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili, Andrew Marrington Mar 2016

A Cyber Forensics Needs Analysis Survey: Revisiting The Domain's Needs A Decade Later, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili, Andrew Marrington

Electrical & Computer Engineering and Computer Science Faculty Publications

The number of successful cyber attacks continues to increase, threatening financial and personal security worldwide. Cyber/digital forensics is undergoing a paradigm shift in which evidence is frequently massive in size, demands live acquisition, and may be insufficient to convict a criminal residing in another legal jurisdiction. This paper presents the findings of the first broad needs analysis survey in cyber forensics in nearly a decade, aimed at obtaining an updated consensus of professional attitudes in order to optimize resource allocation and to prioritize problems and possible solutions more efficiently. Results from the 99 respondents gave compelling testimony that the following …


Bytewise Approximate Matching: The Good, The Bad, And The Unknown, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili Jan 2016

Bytewise Approximate Matching: The Good, The Bad, And The Unknown, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Hash functions are established and well-known in digital forensics, where they are commonly used for proving integrity and file identification (i.e., hash all files on a seized device and compare the fingerprints against a reference database). However, with respect to the latter operation, an active adversary can easily overcome this approach because traditional hashes are designed to be sensitive to altering an input; output will significantly change if a single bit is flipped. Therefore, researchers developed approximate matching, which is a rather new, less prominent area but was conceived as a more robust counterpart to traditional hashing. Since the conception …


Towards Syntactic Approximate Matching-A Pre-Processing Experiment, Doowon Jeong, Frank Breitinger, Hari Kang, Sangjin Lee Jan 2016

Towards Syntactic Approximate Matching-A Pre-Processing Experiment, Doowon Jeong, Frank Breitinger, Hari Kang, Sangjin Lee

Electrical & Computer Engineering and Computer Science Faculty Publications

Over the past few years, the popularity of approximate matching algorithms (a.k.a. fuzzy hashing) has increased. Especially within the area of bytewise approximate matching, several algorithms were published, tested, and improved. It has been shown that these algorithms are powerful, however they are sometimes too precise for real world investigations. That is, even very small commonalities (e.g., in the header of a file) can cause a match. While this is a desired property, it may also lead to unwanted results. In this paper, we show that by using simple pre-processing, we significantly can influence the outcome. Although our test set …


Find Me If You Can: Mobile Gps Mapping Applications Forensic Analysis & Snavp The Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, Frank Breitinger Jan 2016

Find Me If You Can: Mobile Gps Mapping Applications Forensic Analysis & Snavp The Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

The use of smartphones as navigation devices has become more prevalent. The ubiquity of hand-held navigation devices such as Garmins or Toms Toms has been falling whereas the ownership of smartphones and their adoption as GPS devices is growing. This work provides a comprehensive study of the most popular smartphone mapping applications, namely Google Maps, Apple Maps, Waze, MapQuest, Bing, and Scout, on both Android and iOS. It details what data was found, where it was found, and how it was acquired for each application. Based on the findings, the work allowed for the construction of a tool capable of …


Exploring Deviant Hacker Networks (Dhn) On Social Media Platforms, Samer Al-Kateeb, Kevin Conlan, Nitin Agarwal, Ibrahim Baggili, Frank Breitinger Jan 2016

Exploring Deviant Hacker Networks (Dhn) On Social Media Platforms, Samer Al-Kateeb, Kevin Conlan, Nitin Agarwal, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

Online Social Networks (OSNs) have grown exponentially over the past decade. The initial use of social media for benign purposes (e.g., to socialize with friends, browse pictures and photographs, and communicate with family members overseas) has now transitioned to include malicious activities (e.g., cybercrime, cyberterrorism, and cyberwarfare). These nefarious uses of OSNs poses a signi_cant threat to society, and thus requires research attention. In this exploratory work, we study activities of one deviant groups: hacker groups on social media, which we term Deviant Hacker Networks (DHN). We investigated the connection between different DHNs on Twitter: how they are connected, identified …


Whatsapp Network Forensics: Decrypting And Understanding The Whatsapp Call Signaling Messages, Filip Karpisek, Ibrahim Baggili, Frank Breitinger Oct 2015

Whatsapp Network Forensics: Decrypting And Understanding The Whatsapp Call Signaling Messages, Filip Karpisek, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

WhatsApp is a widely adopted mobile messaging application with over 800 million users. Recently, a calling feature was added to the application and no comprehensive digital forensic analysis has been performed with regards to this feature at the time of writing this paper. In this work, we describe how we were able to decrypt the network traffic and obtain forensic artifacts that relate to this new calling feature which included the: a) WhatsApp phone numbers, b) WhatsApp server IPs, c) WhatsApp audio codec (Opus), d) WhatsApp call duration, and e) WhatsApp's call termination. We explain the methods and tools used …


Highly Selective Hydrogenation And Hydrogenolysis Using A Copper-Doped Porous Metal Oxide Catalyst, Laurene Petitjean, Raphael Gagne, Evan Beach, Dequan Xiao, Paul Anastas Oct 2015

Highly Selective Hydrogenation And Hydrogenolysis Using A Copper-Doped Porous Metal Oxide Catalyst, Laurene Petitjean, Raphael Gagne, Evan Beach, Dequan Xiao, Paul Anastas

Chemistry and Chemical Engineering Faculty Publications

A copper-doped porous metal oxide catalyst in combination with hydrogen shows selective and quantitative hydrogenolysis of benzyl ketones and aldehydes, and hydrogenation of alkenes. The approach provides an alternative to noble-metal catalysed reductions and stoichiometric Wolff-Kishner and Clemmensen methods.


Professor Frank Breitinger's Full Bibliography, Frank Breitinger Oct 2015

Professor Frank Breitinger's Full Bibliography, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

No abstract provided.


An Mas Based Energy Management System For A Stand-Alone Microgrid At High Altitude, Junhui Zhao, Bo Zhao, Meidong Xue, Xuesong Zhang, Caisheng Wang Apr 2015

An Mas Based Energy Management System For A Stand-Alone Microgrid At High Altitude, Junhui Zhao, Bo Zhao, Meidong Xue, Xuesong Zhang, Caisheng Wang

Electrical & Computer Engineering and Computer Science Faculty Publications

A multi-agent system based energy management system (EMS) is proposed in this paper for implementing a PV-small hydro hybrid microgrid (MG) at high altitude. Based on local information, the distributed generation (DG) sources in the MG are controlled via the EMS to achieve efficient and stable system operation. Virtual bidding is used to quickly establish the scheduling of system operation and capacity reserve. In addition, real-time power dispatches are carried out through model predictive control to balance load demand and power generation in the MG. The dynamic model and the energy management strategy of the MG have been simulated on …


Multiple-Choice Testing Using Immediate Feedback-Assessment Technique (If At®) Forms: Second-Chance Guessing Vs. Second-Chance Learning?, Jeremy D. Merrel, Pier F. Cirillo, Pauline M. Schwartz, Jeffrey Webb Jan 2015

Multiple-Choice Testing Using Immediate Feedback-Assessment Technique (If At®) Forms: Second-Chance Guessing Vs. Second-Chance Learning?, Jeremy D. Merrel, Pier F. Cirillo, Pauline M. Schwartz, Jeffrey Webb

Chemistry and Chemical Engineering Faculty Publications

Multiple choice testing is a common but often ineffective method for evaluating learning. A newer approach, however, using Immediate Feedback Assessment Technique (IF AT®, Epstein Educational Enterprise, Inc.) forms, offers several advantages. In particular, a student learns immediately if his or her answer is correct and, in the case of an incorrect answer, has an opportunity to provide a second response and receive partial credit for a correct second attempt. For a multiple choice question with five possible answers, the IF AT® form covers spaces labeled A through E with a thin opaque film; when the film is scratched away, …


Exploring The Use Of Faded Worked Examples As A Problem Solving Approach For Underprepared Students, Tiffany Hesser, Jess L. Gregory Jan 2015

Exploring The Use Of Faded Worked Examples As A Problem Solving Approach For Underprepared Students, Tiffany Hesser, Jess L. Gregory

Chemistry and Chemical Engineering Faculty Publications

It is not uncommon for students to find themselves underprepared when entering a post secondary institution. In additional to lower levels of academic achievement, underprepared students may not be aware that they lack the skills needed to be successful and effectively acquire and process information. Because of this, students that enter post-secondary institutions underprepared often require more support in and out of the college classroom.

In computational based classes, such as math, engineering, chemistry or physics, this support often includes an introduction to effective problem solving strategies. This study introduced faded worked examples as a problem solving approach to students …