Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Civil and Environmental Engineering (2311)
- Physical Sciences and Mathematics (2061)
- Electrical and Computer Engineering (1886)
- Computer Engineering (1614)
- Mechanical Engineering (1507)
-
- Social and Behavioral Sciences (981)
- Civil Engineering (970)
- Biomedical Engineering and Bioengineering (918)
- Materials Science and Engineering (866)
- Environmental Engineering (777)
- Computer Sciences (758)
- Chemical Engineering (682)
- Hydraulic Engineering (514)
- Science and Technology Studies (496)
- Operations Research, Systems Engineering and Industrial Engineering (482)
- Other Civil and Environmental Engineering (458)
- Education (437)
- Data Storage Systems (435)
- Aerospace Engineering (419)
- Life Sciences (405)
- Physics (365)
- Electrical and Electronics (356)
- Structural Engineering (333)
- Business (321)
- Medicine and Health Sciences (310)
- Arts and Humanities (295)
- Nanoscience and Nanotechnology (256)
- Other Mechanical Engineering (254)
- Transportation Engineering (253)
- Institution
-
- Purdue University (754)
- University of Wollongong (637)
- Engineering Conferences International (570)
- Brigham Young University (507)
- Western University (447)
-
- University of Nebraska - Lincoln (444)
- Selected Works (422)
- Missouri University of Science and Technology (402)
- TÜBİTAK (372)
- Utah State University (360)
- California Polytechnic State University, San Luis Obispo (356)
- University of Tennessee, Knoxville (219)
- Embry-Riddle Aeronautical University (206)
- Air Force Institute of Technology (193)
- University of Kentucky (193)
- University of Central Florida (168)
- Technological University Dublin (167)
- University of Arkansas, Fayetteville (158)
- Portland State University (156)
- Old Dominion University (155)
- Marquette University (148)
- Virginia Commonwealth University (146)
- University of South Florida (138)
- Michigan Technological University (130)
- University of Massachusetts Amherst (124)
- Wright State University (123)
- Universidad de La Salle (116)
- University of South Carolina (110)
- Georgia Southern University (104)
- University of Texas at El Paso (94)
- Keyword
-
- Applied sciences (362)
- Optimization (83)
- Simulation (78)
- Engineering (64)
- Stander Symposium project (55)
-
- Modeling (54)
- Energy (49)
- Georgia Southern University (46)
- Microstructure (45)
- Education (44)
- Pure sciences (43)
- Design (39)
- Concrete (35)
- Nanoparticles (34)
- Sustainability (33)
- Corrosion (32)
- Performance (32)
- Security (32)
- System (32)
- Climate change (31)
- Analysis (30)
- Machine learning (30)
- Numerical simulation (30)
- Control (29)
- Graphene (29)
- Steel (29)
- CFD (28)
- Model (28)
- Engineering education (27)
- Microfluidics (27)
- Publication
-
- Theses and Dissertations (557)
- Faculty of Engineering and Information Sciences - Papers: Part A (402)
- Turkish Journal of Electrical Engineering and Computer Sciences (372)
- International Congress on Environmental Modelling and Software (360)
- Electronic Theses and Dissertations (299)
-
- Canadian Society for Civil Engineering (277)
- Doctoral Dissertations (250)
- Cell Culture Engineering XV (245)
- Masters Theses (235)
- The 8th International Conference on Physical and Numerical Simulation of Materials Processing (200)
- Australian Institute for Innovative Materials - Papers (164)
- Electronic Thesis and Dissertation Repository (153)
- Open Access Dissertations (149)
- Nebraska Tractor Tests (136)
- Open Access Theses (132)
- The Summer Undergraduate Research Fellowship (SURF) Symposium (108)
- Faculty Publications (97)
- Master's Theses (94)
- College of Engineering News (93)
- Open Access Theses & Dissertations (93)
- Browse all Theses and Dissertations (92)
- USF Tampa Graduate Theses and Dissertations (88)
- Dissertations, Master's Theses and Master's Reports (82)
- Articles (80)
- Capstone Design Expo Posters (78)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (75)
- Graduate Theses and Dissertations (75)
- International Symposium on Hydraulic Structures (75)
- Journal of Marine Science and Technology (75)
- Ingeniería Civil (73)
- Publication Type
Articles 1 - 30 of 10833
Full-Text Articles in Engineering
Evolutionary View Planning For Optimized Uav Terrain Modeling In A Simulated Environment, Ronald A. Martin, Ivan Rojas, Kevin W. Franke, John Hedengren
Evolutionary View Planning For Optimized Uav Terrain Modeling In A Simulated Environment, Ronald A. Martin, Ivan Rojas, Kevin W. Franke, John Hedengren
Faculty Publications
This work demonstrates the use of genetic algorithms in optimized view planning for 3D reconstruction applications using small unmanned aerial vehicles (UAVs). The quality of UAV site models is currently highly dependent on manual pilot operations or grid-based automation solutions. When applied to 3D structures, these approaches can result in gaps in the total coverage or inconsistency in final model resolution. Genetic algorithms can effectively explore the search space to locate image positions that produce high quality models in terms of coverage and accuracy. A fitness function is defined, and optimization parameters are selected through semi-exhaustive search. A novel simulation …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Journal of Digital Forensics, Security and Law
With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
Journal of Digital Forensics, Security and Law
The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Journal of Digital Forensics, Security and Law
The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any application; name, description, publisher …
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
Journal of Digital Forensics, Security and Law
This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased …
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
Journal of Digital Forensics, Security and Law
The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
Journal of Digital Forensics, Security and Law
A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
Journal of Digital Forensics, Security and Law
Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …
14-03 Transportation System And Its Association With Human Health - A Review And Modeling Approach, Jun-Seok Oh, Valerian Kwigizile, Ali Hamzah Hussein Alzuhairi, Fnu Zahid
14-03 Transportation System And Its Association With Human Health - A Review And Modeling Approach, Jun-Seok Oh, Valerian Kwigizile, Ali Hamzah Hussein Alzuhairi, Fnu Zahid
Transportation Research Center Reports
Transportation systems constitute of infrastructure, commute modes, land use and other policies. The purpose of transportation is to provide easy access to goods and services. While attaining this purpose, impacts of transportation on human health and well-being have been ignored to some extent. Recently, studies have begun analyzing the impact of transportation systems on quality of life and health disparities. While many studies have discussed the impact of the transportation system on individual factors from health, a very limited number of studies have focused on the impact of multiple factors associated with multiple morbidity and mortality forms. The focus of …
15-13 Exploring Bicycle Route Choice Behavior With Space Syntax Analysis, Zhaocai Liu, Anthony Chen, Seungkyu Ryu
15-13 Exploring Bicycle Route Choice Behavior With Space Syntax Analysis, Zhaocai Liu, Anthony Chen, Seungkyu Ryu
Transportation Research Center Reports
Cycling provides an environmentally friendly alternative mode of transportation. It improves urban mobility, livability, and public health, and it also helps in reducing traffic congestion and emissions. Cycling is gaining popularity both as a recreational activity and a means of transportation. Therefore, to better serve and promote bicycle transportation, there is an acute need to understand the route choice behavior of cyclists.
This project explored the applicability of using space syntax theory to model cyclists’ route choice behavior. In addition, several bicycle-related attributes were also considered as influential factors affecting cyclists’ route choice. A multiple regression model was built and …
Florida Rural Small Business Energy Assistance Collaborative Cumulative Report Ending December 31, 2016, Florida Solar Energy Center, Janet Mcilvaine
Florida Rural Small Business Energy Assistance Collaborative Cumulative Report Ending December 31, 2016, Florida Solar Energy Center, Janet Mcilvaine
FSEC Energy Research Center®
The U.S. Department of Agriculture's (USDA) Rural Development initiative reaches out to communities across America with many programs (http://www.rd.usda.gov/programs-services/all-programs). USDA's Rural Energy for America Program (REAP) offers grants and loan guarantees for energy efficiency improvements and renewable energy systems to agriculture operations and qualifying rural small businesses. USDA has awarded the University of Central Florida a grant to provide a limited number of subsidized Energy Audits to eligible businesses in Florida in support of USDA Rural Development (USDA-RD) Grant and Loan programs for rural small businesses. The ultimate goal of the energy audits is to increase participation in REAP. Audits …
A Validated Tropical-Extratropical Flood Hazard Assessment For New York Harbor, Philip M. Orton, T. M. Hall, Stefan A. Talke, Alan F. Blumberg, Nickitas Georgas, S. Vinogradov
A Validated Tropical-Extratropical Flood Hazard Assessment For New York Harbor, Philip M. Orton, T. M. Hall, Stefan A. Talke, Alan F. Blumberg, Nickitas Georgas, S. Vinogradov
Civil and Environmental Engineering Faculty Publications and Presentations
Recent studies of flood risk at New York Harbor (NYH) have shown disparate results for the 100 year storm tide, providing an uncertain foundation for the flood mitigation response after Hurricane Sandy. Here we present a flood hazard assessment that improves confidence in our understanding of the region's present-day potential for flooding, by separately including the contribution of tropical cyclones (TCs) and extratropical cyclones (ETCs), and validating our modeling study at multiple stages against historical observations. The TC assessment is based on a climatology of 606 synthetic storms developed from a statistical-stochastic model of North Atlantic TCs. The ETC assessment …
Letter From The Editor
International Journal of Nuclear Security
No abstract provided.
Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene
Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene
International Journal of Nuclear Security
Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to plunge …
Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall
Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall
International Journal of Nuclear Security
This study highlights the core non-proliferation dilemmas we face and suggests an effective mechanism for reviving the spirit and the hope of the Non-Proliferation Treaty. An indispensable key to the treaty calls for a rethinking of what we believe should be referred to as its four pillars: disarmament, non-proliferation, peaceful uses of nuclear energy, and implementation of the 1995 Middle East Resolution. We seek to contribute to the renaissance of the non-proliferation regime by addressing seven dilemmas that arise from the way various Non-Proliferation Treaty participants pursue the goals of the four pillars undergirding the treaty. This study highlights …
Modern Advancements In Post-Detonation Nuclear Forensic Analysis, S. Adam Stratz, Jonathan A. Gill, John D. Auxier Ii, Howard L. Hall
Modern Advancements In Post-Detonation Nuclear Forensic Analysis, S. Adam Stratz, Jonathan A. Gill, John D. Auxier Ii, Howard L. Hall
International Journal of Nuclear Security
Deterring nuclear terrorism is a critical national asset to support the preclusion of non-state actors from initiating a nuclear attack on the United States. Successful attribution of a detonated nuclear weapon allows for timely responsive measures that prove essential in the period following a nuclear event. In conjunction with intelligence and law enforcement evidence, the technical nuclear forensics (TNF) post-detonation community supports this mission through the development and advancement of expertise to characterize weapon debris through a rapid, accurate, and detailed approach. Though the TNF field is young, numerous strides have been made in recent years toward a more robust …
Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame
Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame
International Journal of Nuclear Security
The potential for a relatively non-advanced nation to covertly acquire a significant quantity of weapons-grade plutonium using a gas-cooled, natural uranium-fueled reactor based on relatively primitive early published designed is evaluated in this article. The economic and technical issues that would influence the design decisions of a covert 239Pu production program are considered.
Several unconventional uranium acquisition approaches were explored. Methods for extracting uranium from enrichment tails, seawater, and coal ash sources were considered. The evaluation indicated that uranium extraction from coal ash or insitu leaching from underground deposits could be performed in economical manner that might be difficult …
Student Competition Cover
International Journal of Nuclear Security
No abstract provided.
Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed
Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed
International Journal of Nuclear Security
No abstract provided.
Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen
Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen
International Journal of Nuclear Security
No abstract provided.
Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan
Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan
International Journal of Nuclear Security
No abstract provided.
Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein
Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein
International Journal of Nuclear Security
No abstract provided.
Career: Advocating For Engineering Through Hidden Curricula: A Multi‐Institutional Mixed Method Approach, Idalis Villanueva
Career: Advocating For Engineering Through Hidden Curricula: A Multi‐Institutional Mixed Method Approach, Idalis Villanueva
Funded Research Records
No abstract provided.
Generation Of Vector Partially Coherent Optical Sources Using Phase-Only Spatial Light Modulators, Milo W. Hyde Iv, Santasri Bose-Pillai, David G. Voelz, Xifeng Xiao
Generation Of Vector Partially Coherent Optical Sources Using Phase-Only Spatial Light Modulators, Milo W. Hyde Iv, Santasri Bose-Pillai, David G. Voelz, Xifeng Xiao
Faculty Publications
A simple and flexible optical system for generating electromagnetic or vector partially coherent sources or beams is presented. The alternative design controls field amplitude (beam shape), coherence, and polarization using only spatial light modulators. This improvement makes the apparatus simpler to construct and significantly increases the flexibility of vector partially coherent source generators by allowing many different types of sources to be produced without changing the physical setup. The system’s layout and theoretical foundations are thoroughly discussed. The utility and flexibility of the proposed system are demonstrated by producing a vector Schell-model and non-Schell-model source. The experimental results are compared …
Phased Retrofits In Existing Homes In Florida Phase Ii: Shallow Plus Retrofits [Revised], Florida Solar Energy Center, Karen Sutherland
Phased Retrofits In Existing Homes In Florida Phase Ii: Shallow Plus Retrofits [Revised], Florida Solar Energy Center, Karen Sutherland
FSEC Energy Research Center®
The U.S. Department of Energy Building America team Partnership for Improved Residential Construction is collaborating with Florida Power & Light Company (FPL) to conduct a phased residential energy-efficiency retrofit program. This research seeks to determine the impacts on annual energy reductions from the installation of advanced residential technologies. Earlier project work involving the application of two levels of retrofit, shallow and deep, found average savings of 9% and 38%, respectively. Whole-house demand reduction among the deep retrofit homes averaged 39% during FPL's peak summer hour. These savings levels approach the Building America program goals of reducing whole-house energy use of …
Back-Flow Prevention Strategies For Stormwater Lines, Ron Evins
Back-Flow Prevention Strategies For Stormwater Lines, Ron Evins
September 29, 2016: Adaptive Structures and Innovative Solutions
No abstract provided.
Analog Active Filters: State Of The Art, P V Ananda Mohan
Analog Active Filters: State Of The Art, P V Ananda Mohan
Manipal Journal of Science and Technology
In this tutorial paper, the state of the art of analog filter design is reviewed. The various design methodologies for Active RC filter design using operational amplifiers (opamps), Operational Transconductance amplifier (OTA)-C based filters, switched-capacitor (SC) technique , current-mode devices such as current conveyors, Current-feedback amplifiers are presented. The various design considerations and analysis techniques are highlighted. In adition, some of the recent approaches for active filter design using transistors are also considered for completeness.
Stability And Interfacial Viscoelasticity Of Oil-Water Nanoemulsions Stabilized By Soy 2 Lecithin And Tween 20 For The Encapsulation Of Bioactive Carvacrol, Jerome J. Nash, Kendra Erk
Stability And Interfacial Viscoelasticity Of Oil-Water Nanoemulsions Stabilized By Soy 2 Lecithin And Tween 20 For The Encapsulation Of Bioactive Carvacrol, Jerome J. Nash, Kendra Erk
School of Materials Engineering Faculty Publications
The rheology of oil-in-water (O/W) droplet interfaces stabilized by food-grade emulsifiers (soy lecithin or Tween 20) under controlled aqueous conditions was investigated to elucidate its contribution in the kinetic stabilization of nanoemulsion-based delivery systems containing carvacrol, a naturally-derived antimicrobial compound. Dilational rheology of surfactant-laden O/W interfaces was measured using axisymmetric drop shape analysis. The kinetic stability of corresponding nanoemulsions (containing mixtures of carvacrol and medium-chain triglyceride (MCT) oil dispersed in water (pH 7)) was characterized using dynamic light scattering. Zwitterionic lecithin molecules adsorbed to the O/W interface for 24 h formed a notably viscoelastic layer, compared to nonionic Tween 20 …