Open Access. Powered by Scholars. Published by Universities.®

Risk Analysis Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Risk Analysis

Airport Security Investment Model, Joshua Daniel Bolton Dec 2017

Airport Security Investment Model, Joshua Daniel Bolton

Graduate Theses and Dissertations

In an increasingly mobile and diverse world, it is difficult to quantify the risk, or danger, associated with traveling. Airports have suffered greatly for being unable to define potential risks and protect against them. Intelligent adversary risk is a complicated high-level issue for many airports. Airports are targeted because of the large amount of people in a confined space and the social, economic, and psychological impact of terrorist attacks on the American people. In the months following September 11th, 2001, the airline industry in the United States lost $1.1 billion in revenue. The American people stayed grounded, for fear of …


Quantitative Analysis Of Regenerative Energy In Electric Rail Traction Systems, Mahmoud Saleh, Oindrilla Dutta, Yusef Esa, Ahmed Mohamed Oct 2017

Quantitative Analysis Of Regenerative Energy In Electric Rail Traction Systems, Mahmoud Saleh, Oindrilla Dutta, Yusef Esa, Ahmed Mohamed

Publications and Research

This paper aims at determining the influential factors affecting regenerative braking energy in DC rail transit systems. This has been achieved by quantitatively evaluating the dependence of regenerative energy on various parameters, such as vehicle dynamics, train scheduling, ground inclination and efficiency of the electrical devices. The recuperated power and energy have been presented by a mathematical model, comprising of a set of empirical forms, which allows for thorough analysis. A detailed simulation model of a typical DC-traction system has been developed to validate the developed empirical forms. The results verified the validity of the proposed mathematical model, and demonstrated …


Identification Of Reverse Engineering Candidates Utilizing Machine Learning And Aircraft Cannibalization Data, Marc Banghart Oct 2017

Identification Of Reverse Engineering Candidates Utilizing Machine Learning And Aircraft Cannibalization Data, Marc Banghart

International Journal of Aviation, Aeronautics, and Aerospace

As military aircraft continue to remain in service and age, cannibalization of parts is increasing. Proactive identification of parts that are at high risk for cannibalization will inform engineering processes such as reverse engineering, thus allowing potentially reducing lead time to develop new parts. The research objective was to develop a causal structure that can be used for prediction of when cannibalization actions may occur. Bayesian networks allow encoding of causality between various descriptive features given a data set. The method utilized a tabu search algorithm, identified the underlying causal structure and the associated node probabilities. The method is then …


Capturing Cognitive Fingerprints From Keystroke Dynamics, J. Morris Chang, Chi-Chen Fang, Kuan-Hsing Ho, Norene Kelly, Pei-Yuan Wu, Yixiao Ding, Chris Chu, Stephen B. Gilbert, Amed E. Kamal, Sun-Yuan Kung Jun 2017

Capturing Cognitive Fingerprints From Keystroke Dynamics, J. Morris Chang, Chi-Chen Fang, Kuan-Hsing Ho, Norene Kelly, Pei-Yuan Wu, Yixiao Ding, Chris Chu, Stephen B. Gilbert, Amed E. Kamal, Sun-Yuan Kung

Morris Chang

Conventional authentication systems identify a user only at the entry point. Keystroke dynamics can continuously authenticate users by their typing rhythms without extra devices. This article presents a new feature called cognitive typing rhythm (CTR) to continuously verify the identities of computer users. Two machine techniques, SVM and KRR, have been developed for the system. The best results from experiments conducted with 1,977 users show a false-rejection rate of 0.7 percent and a false-acceptance rate of 5.5 percent. CTR therefore constitutes a cognitive fingerprint for continuous. Its effectiveness has been verified through a large-scale dataset. This article is part of …