Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Engineering

A Security Approach For The Example Sodium Fast Reactor, Christian X. Young, Robert S. Bean Aug 2018

A Security Approach For The Example Sodium Fast Reactor, Christian X. Young, Robert S. Bean

The Summer Undergraduate Research Fellowship (SURF) Symposium

Increases in the spread of nuclear technology and the rise of non-state terrorism in the modern era has proved the need for effective security approaches to new nuclear facilities. Many documents about security approaches for nuclear plants are non-public material, however, making it difficult to teach others about the basics of security design. To alleviate this issue, we used available texts in the security realm to design a security approach for the Generation IV International Forum’s Example Sodium Fast Reactor. Our approach utilized infrared, microwave, fiber optic, and other advanced technologies to provide security for the special nuclear material present. …


Measuring The Effectiveness Of Photoresponsive Nanocomposite Coatings On Aircraft Windshields To Mitigate Laser Intensity, Ryan S. Phillips, Hubert K. Bilan, Zachary X. Widel, Randal J. Demik, Samantha J. Brain, Matthew Moy, Charles Crowder, Stanley L. Harriman, James T. O'Malley Iii, Joseph E. Burlas, Steven F. Emmert, Jason J. Keleher May 2015

Measuring The Effectiveness Of Photoresponsive Nanocomposite Coatings On Aircraft Windshields To Mitigate Laser Intensity, Ryan S. Phillips, Hubert K. Bilan, Zachary X. Widel, Randal J. Demik, Samantha J. Brain, Matthew Moy, Charles Crowder, Stanley L. Harriman, James T. O'Malley Iii, Joseph E. Burlas, Steven F. Emmert, Jason J. Keleher

Journal of Aviation Technology and Engineering

In 2004, pilots reported 46 laser illumination events to the Federal Aviation Administration (FAA), with the number increasing to approximately 3,600 in 2011. Since that time, the number of reported laser incidents has ranged from 3,500 to 4,000. Previous studies indicate the potential for flight crewmember distraction from bright laser light being introduced to the cockpit. Compositional variations of the photoresponsive nanocomposite coatings were applied to an aircraft windscreen using a modified liquid dispersion/heating curing process. The attenuating effects of the deposited films on laser light intensity were evaluated using an optical power meter and the resultant laser intensity data …


Cloud Enabled Attack Vectors, Ryan Jasper Apr 2015

Cloud Enabled Attack Vectors, Ryan Jasper

Purdue Polytechnic Directed Projects

The purpose of this directed project and related research was to demonstrate and catalog a new attack vector that utilizes cloud managed infrastructure. Cloud computing is a recent trend that is creating significant hype in the IT sector. Being that cloud computing is a new theme in the computing world, there are many security concerns that remain unknown and unexplored. The product of this directed project provides a documented taxonomy of the new attack vector and how to mitigate risk from this kind of attack.

The new attack vector creates efficiencies throughout the lifecycle of an attack and greatly reduces …


A Multi-Criteria Methodology For Measuring The Resilience Of Transportation Assets And Prioritizing Security Investments, Michelle S. Dojutrek, Samuel Labi, J Eric Dietz Jan 2014

A Multi-Criteria Methodology For Measuring The Resilience Of Transportation Assets And Prioritizing Security Investments, Michelle S. Dojutrek, Samuel Labi, J Eric Dietz

International Institute for Infrastructure Resilience and Reconstruction (I3R2) Conference

Transportation project prioritization uses performance measures that are related to the transportation asset, its operations, and its environment. However, in the state of practice, evaluation does not consider directly the likelihood of natural or man-made threats, the infrastructure resilience, or the consequences of the infrastructure damage in the event that the threat occurs. Thus, during the prioritization of investments, assets of low security do not receive the due attention they deserve. In defining security as the lack of risk of damage from threats due to inherent structure or functional resilience, this paper is based on the premise that the inclusion …


Privacy-Preserving Assessment Of Location Data Trustworthiness, Chenyun Dai, Fang-Yu Rao, Gabriel Ghinita, Elisa Bertino Jan 2011

Privacy-Preserving Assessment Of Location Data Trustworthiness, Chenyun Dai, Fang-Yu Rao, Gabriel Ghinita, Elisa Bertino

Cyber Center Publications

Assessing the trustworthiness of location data corresponding to individuals is essential in several applications, such as forensic science and epidemic control. To obtain accurate and trustworthy location data, analysts must often gather and correlate information from several independent sources, e.g., physical observation, witness testimony, surveillance footage, etc. However, such information may be fraudulent, its accuracy may be low, and its vol-
ume may be insufficient to ensure highly trustworthy data. On the other hand, recent advancements in mobile computing and positioning systems, e.g., GPS-enabled cell phones, highway sensors, etc., bring new and effective technological means to track the location of …


Prox-Rbac: A Proximity-Based Spatially Aware Rbac, Michael Kirkpatrick, Maria Luisa Damiani, Elisa Bertino Jan 2011

Prox-Rbac: A Proximity-Based Spatially Aware Rbac, Michael Kirkpatrick, Maria Luisa Damiani, Elisa Bertino

Cyber Center Publications

As mobile computing devices are becoming increasingly dominant in enterprise and government organizations, the need for fine-grained access control in these environments continues to grow. Specifically, advanced forms of access control can be deployed to ensure authorized users can access sensitive resources only when in trusted locations. One technique that has been proposed is to augment role-based access control (RBAC) with spatial constraints. In such a system, an authorized user must be in a designated location in order to exercise the privileges associated with a role. In this work, we extend spatially aware RBAC systems by defining the notion of …


Beyond K-Anonymity: A Decision Theoretic Framework For Assessing Privacy Risk, Guy Lebanon, Monica Scannapieco, Mohamed Fouad, Elisa Bertino Jan 2009

Beyond K-Anonymity: A Decision Theoretic Framework For Assessing Privacy Risk, Guy Lebanon, Monica Scannapieco, Mohamed Fouad, Elisa Bertino

Cyber Center Publications

An important issue any organization or individual has to face when managing data containing sensitive information, is the risk that can be incurred when releasing such data. Even though data may be sanitized before being released, it is still possible for an adversary to reconstruct the original data using additional information thus resulting in privacy violations. To date, however, a systematic approach to quantify such risks is not available. In this paper we develop a framework, based on statistical decision theory, that assesses the relationship between the disclosed data and the resulting privacy risk. We model the problem of deciding …


Pattern Recognized Surveillance System, Purdue Ect Team Jan 2007

Pattern Recognized Surveillance System, Purdue Ect Team

ECT Fact Sheets

The ultimate objective is to create a complete-decision maker which allows us to detect the new state and initiate appropriate actions taking and analyzing all historical and current information based upon adaptive reasoning. Computers have the ability to extract information from multiple sources and identify and track patterns of activity that are inconsistent with "normal" operations.


Emerging Video Surveillance And Monitoring Technologies, Purdue Ect Team Jan 2007

Emerging Video Surveillance And Monitoring Technologies, Purdue Ect Team

ECT Fact Sheets

The traditional video surveillance applications have some limitations; 1) one unit per one person in one place, 2) the limited area for surveillance due to the location of cameras 3) increasing operating cost, 4) hard reductions in theft and claim rates over the long term. Recently, video technology has grown by leaps and bounds throughout the last few years due to the steep development of Information Technology (IT). The newest video surveillance technologies seem to be taking two aspects: 1) Digital Video Surveillance (DVS) of a turn toward digital video servers using Internet access, and 2) Multi-modal User Interface (MUI).


Air Ventilation Protection System For Building Security, Purdue Ect Team Jan 2007

Air Ventilation Protection System For Building Security, Purdue Ect Team

ECT Fact Sheets

The new technology to solve the limitation of conventional Collective protection equipment (CPE) system has been developed as "Combined ESP/ESF/PCO and microfibrous media CPE application". This concept of this new technology is the combination of the both systems; 1) Microfibrous Material Technology, and 2) Photocataytic Oxidation Technology.


New Access Control Technologies: Biometric Identification, Purdue Ect Team Jan 2007

New Access Control Technologies: Biometric Identification, Purdue Ect Team

ECT Fact Sheets

Biometrics are computerized methods of recognizing people based on physical or behavioral characteristics. The main biometric technologies include face recognition, fingerprint, hand geometry, iris, palm prints, signature and voice. Biometric technologies can work in two modes – authentication (one-to-one matching) and identification (one-to-many) matching. However, only three biometrics are capable of the latter – face, finger and iris.


Acoustic Wave Sensors, Purdue Ect Team Jan 2007

Acoustic Wave Sensors, Purdue Ect Team

ECT Fact Sheets

Modern office buildings are generally considered safe and healthful working environments. However, energy conservation measures have minimized the infiltration of outside air and contributed to the buildup of indoor air contaminants. Three products manufactured by Microsensor Systems Inc. are introduced: HAZMATCAD, CW Sentry Plus, MiniCAD MKII.


Infrared Gas Sensor, Purdue Ect Team Jan 2007

Infrared Gas Sensor, Purdue Ect Team

ECT Fact Sheets

In recent years, the rapid development of monitoring and detecting technology of indoor air quality have been observed. We have seen the two major streams of detection technology introduced so far: Acoustic wave sensor and Infrared gas sensor. The use of a gas monitoring system in the case of that dangerous levels of gases are detected, can help to prevent an explosion or can help to prevent worker injury or exposure to toxic gases.