Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

PDF

Institution
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 501

Full-Text Articles in Law

Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia Dec 2023

Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia

Journal of Nonprofit Innovation

Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.

Imagine Doris, who is …


Enhanced Privacy-Enabled Face Recognition Using Κ-Identity Optimization, Ryan Karl Dec 2023

Enhanced Privacy-Enabled Face Recognition Using Κ-Identity Optimization, Ryan Karl

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Facial recognition is becoming more and more prevalent in the daily lives of the common person. Law enforcement utilizes facial recognition to find and track suspects. The newest smartphones have the ability to unlock using the user's face. Some door locks utilize facial recognition to allow correct users to enter restricted spaces. The list of applications that use facial recognition will only increase as hardware becomes more cost-effective and more computationally powerful. As this technology becomes more prevalent in our lives, it is important to understand and protect the data provided to these companies. Any data transmitted should be encrypted …


Rebuilding Grid Governance, Joel B. Eisen, Heather E. Payne May 2023

Rebuilding Grid Governance, Joel B. Eisen, Heather E. Payne

BYU Law Review

As climate change sharpens the focus on our electricity systems, there is widespread agreement that the institutions that govern our electric grid must change to realize a clean energy future in the timescale necessary. Scholars are actively debating how grid governance needs to change, but in this Article we demonstrate that current proposals are insufficient because they do not contemplate “rebuilding.” This Article defines “rebuilding” as ending entities tasked with grid governance and creating new ones to take their place. We propose what no one else has: an overarching framework for rebuilding any grid governance institutions.

This Article discusses when …


A Socio-Economic Analysis Of Automated Container Terminal (Act) Concept In Indonesia : Case Study : New Priok Container Terminal One, Febri Triana Hartami Siagian Oct 2022

A Socio-Economic Analysis Of Automated Container Terminal (Act) Concept In Indonesia : Case Study : New Priok Container Terminal One, Febri Triana Hartami Siagian

World Maritime University Dissertations

No abstract provided.


Project Khepri: Mining Asteroid Bennu For Water, Erika Frost, Gowtham Boyala, Adam Gremm, Ahmet Gungor, Amirhossein Taghipour, Massimo Biella, Jiawei "Jackson" Qiu, Athip Thirupathi Raj, Arjun Chhabra, Adam Gee, Saanjali Maharaj, Erin Richardson, Julia Empey, Haidar Ali Abdul-Nabi, Lindsay Richards, Ariyaan Talukder, Aaron Groh, Brie Miklaucic, Jd Carlson, Kristina Kim, Maverick Cue Aug 2022

Project Khepri: Mining Asteroid Bennu For Water, Erika Frost, Gowtham Boyala, Adam Gremm, Ahmet Gungor, Amirhossein Taghipour, Massimo Biella, Jiawei "Jackson" Qiu, Athip Thirupathi Raj, Arjun Chhabra, Adam Gee, Saanjali Maharaj, Erin Richardson, Julia Empey, Haidar Ali Abdul-Nabi, Lindsay Richards, Ariyaan Talukder, Aaron Groh, Brie Miklaucic, Jd Carlson, Kristina Kim, Maverick Cue

Undergraduate Student Research Internships Conference

Deep space asteroid mining presents the opportunity for the collection of critical resources required to establish a cis-lunar infrastructure. In specific, the Project Khepri team has focused on the collection of water from asteroid Bennu. This water has the potential to provide a source of clean-energy propellant as well as an essential consumable for humans or agriculture on crewed trips to the Moon or Mars. This would avoid the high costs of launching from Earth - making it a highly desirable element for the future of cis-lunar infrastructure. The OSIRIS-REx mission provided a complete survey of asteroid Bennu and is …


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis Jan 2022

Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis

Dickinson Law Review (2017-Present)

For nearly as long as there have been photographs and videos, people have been editing and manipulating them to make them appear to be something they are not. Usually edited or manipulated photographs are relatively easy to detect, but those days are numbered. Technology has no morality; as it advances, so do the ways it can be misused. The lack of morality is no clearer than with deepfake technology.

People create deepfakes by inputting data sets, most often pictures or videos into a computer. A series of neural networks attempt to mimic the original data set until they are nearly …


Path Towards Energy Sustainability: Amultidimensional Analysis Of Energypoverty In Philippine Households, Anna Katrina R. Ignacio, Maria Sofia Lei P. Puncia, Arlene B. Inocencio, Marites Tiongco, Mitzie Irene P. Conchada, Alellie B. Sobreviñas, Rens Adrian T. Calub Nov 2021

Path Towards Energy Sustainability: Amultidimensional Analysis Of Energypoverty In Philippine Households, Anna Katrina R. Ignacio, Maria Sofia Lei P. Puncia, Arlene B. Inocencio, Marites Tiongco, Mitzie Irene P. Conchada, Alellie B. Sobreviñas, Rens Adrian T. Calub

Angelo King Institute for Economic and Business Studies (AKI)

Measuring energy poverty to meet one’s basic needs is vital for household assessments concerning accessibility of energy, affordability of energy prices, usage of energy resources, and sufficiency of energy consumption. In this Policy Brief, we have listed recommendations and rationale to improve the energy conditions of Philippine households.


Who Will Be Liable For Medical Malpractice In The Future? How The Use Of Artificial Intelligence In Medicine Will Shape Medical Tort Law, Scott J. Schweikart Mar 2021

Who Will Be Liable For Medical Malpractice In The Future? How The Use Of Artificial Intelligence In Medicine Will Shape Medical Tort Law, Scott J. Schweikart

Minnesota Journal of Law, Science & Technology

No abstract provided.


Rethinking Grid Governance For The Climate Change Era, Shelley Welton Jan 2021

Rethinking Grid Governance For The Climate Change Era, Shelley Welton

All Faculty Scholarship

The electricity sector is often appropriately called the linchpin of efforts to respond to climate change. Over the next few decades, the U.S. electricity sector will need to double in size to accommodate electric vehicles, at the same time that it transforms to run entirely on clean energy. To drive this transformation, states are increasingly adopting 100% clean energy targets. But fossil fuel corporations are pushing back, seeking to maintain their structural domination of the U.S. energy sector. This article calls attention to one central but under-scrutinized way that these companies impede the clean energy transition: Incumbent fossil fuel companies …


The Bounds Of Energy Law, Shelley Welton Jan 2021

The Bounds Of Energy Law, Shelley Welton

All Faculty Scholarship

U.S. energy law was born of fossil fuels. Consequently, our energy law has long centered on the material and legal puzzles that bringing fossil fuels to market presents. Eliminating these same carbon-producing energy sources, however, has emerged as perhaps the most pressing material transformation needed in the twenty-first century—and one that energy law scholarship has rightfully embraced. Yet in our admirable quest to aid in this transformation, energy law scholars are largely writing into the field bequeathed to us, proposing changes that tweak, but do not fundamentally challenge, last century’s tools for managing the extraction, transport, and delivery of fossil …


Backing Up Into Advocacy: The Case Of Smartphone Driver Distraction, Robert Rosenberger May 2020

Backing Up Into Advocacy: The Case Of Smartphone Driver Distraction, Robert Rosenberger

The Journal of Sociotechnical Critique

For the last decade, I’ve been studying the topic of the driving impairment of smartphones. While this began as an exclusively academic project, it has increasingly compelled public engagement. One example of this came in an opinion piece I wrote in 2018 in response to a new traffic law. I take the opportunity here to fill out the academic backstory of this particular op-ed, reflect on how this larger project has evolved to include an unanticipated public-facing edge, and abstract some lessons about public writing.


Efficient Privacy-Aware Imagery Data Analysis, Yifan Tian Nov 2019

Efficient Privacy-Aware Imagery Data Analysis, Yifan Tian

Doctoral Dissertations and Master's Theses

The widespread use of smartphones and camera-coupled Internet of Thing (IoT) devices triggers an explosive growth of imagery data. To extract and process the rich contents contained in imagery data, various image analysis techniques have been investigated and applied to a spectrum of application scenarios. In recent years, breakthroughs in deep learning have powered a new revolution for image analysis in terms of effectiveness with high resource consumption. Given the fact that most smartphones and IoT devices have limited computational capability and battery life, they are not ready for the processing of computational intensive analytics over imagery data collected by …


Energy Demand Response For High-Performance Computing Systems, Kishwar Ahmed Mar 2018

Energy Demand Response For High-Performance Computing Systems, Kishwar Ahmed

FIU Electronic Theses and Dissertations

The growing computational demand of scientific applications has greatly motivated the development of large-scale high-performance computing (HPC) systems in the past decade. To accommodate the increasing demand of applications, HPC systems have been going through dramatic architectural changes (e.g., introduction of many-core and multi-core systems, rapid growth of complex interconnection network for efficient communication between thousands of nodes), as well as significant increase in size (e.g., modern supercomputers consist of hundreds of thousands of nodes). With such changes in architecture and size, the energy consumption by these systems has increased significantly. With the advent of exascale supercomputers in the next …


Inventing Around Edison’S Lamp Patent: The Role Of Patents In Stimulating Downstream Development And Competition, Ron D. Katznelson, John Howells Feb 2018

Inventing Around Edison’S Lamp Patent: The Role Of Patents In Stimulating Downstream Development And Competition, Ron D. Katznelson, John Howells

Ron D. Katznelson

We provide the first detailed empirical study of inventing around patent claims. The enforcement of Edison’s incandescent lamp patent in 1891-1894 stimulated a surge of patenting. Most of these later patents disclosed inventions around the Edison patent. Some of these patents introduced important new technology in their own right and became prior art for new fields, indicating that invention around patents contributes to dynamic efficiency. Contrary to widespread contemporary understanding, the Edison lamp patent did not suppress technological advance in electric lighting. The market position of General Electric (“GE”), the Edison patent-owner, weakened through the period of this patent’s enforcement.


Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick Jan 2018

Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick

All Faculty Scholarship

Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.

This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews and analysis of …


The Quiet Undoing: How Regional Electricity Market Reforms Threaten State Clean Energygoals, Danny Cullenward, Shelley Welton Jan 2018

The Quiet Undoing: How Regional Electricity Market Reforms Threaten State Clean Energygoals, Danny Cullenward, Shelley Welton

All Faculty Scholarship

In a series of largely unnoticed but extremely consequential moves, two regional electricity market operators are pursuing reforms to make it more difficult for states to achieve their clean energy goals. The federal energy regulator, FERC, has already approved one such reform and ordered a second market operator to go farther in punishing state-supported clean energy resources than it had initially proposed. This disturbing trend highlights a shift in energy governance that threatens to destabilize the field’s delicate cooperative federalist model. Over the past several decades, states have increasingly ceded control over energy dispatch and grid planning to private market …


Multiple Content Adaptive Intelligent Watermarking Schemes For The Protection Of Blocks Of A Document Image, Chetan Kr Mr., S Nirmala Dr. Dec 2017

Multiple Content Adaptive Intelligent Watermarking Schemes For The Protection Of Blocks Of A Document Image, Chetan Kr Mr., S Nirmala Dr.

Journal of Digital Forensics, Security and Law

Most of the documents contain different types of information such as white space, static information and dynamic information or mix of static and dynamic information. In this paper, multiple watermarking schemes are proposed for protection of the information content. The proposed approach comprises of three phases. In Phase-1, the edges of the source document image are extracted and the edge image is decomposed into blocks of uniform size. In Phase-2, GLCM features like energy, homogeneity, contrast and correlation are extracted from each block and the blocks are classified as no-information, static, dynamic and mix of static and dynamic information content …


Nigeria's Power Sector Roadmap: Policy Perspectives And Prospects, Bandele A. G. Amoo, O. M. Adebayo, Derek Ibeagha Sep 2017

Nigeria's Power Sector Roadmap: Policy Perspectives And Prospects, Bandele A. G. Amoo, O. M. Adebayo, Derek Ibeagha

Bullion

Various strategies have been employed over the years by the Government to boost power in the country. These strategies have been hinged on policies, reforms and roadmaps, including the 2005 Electric Power Sector Reform Act, the Roadmap for Power Sector Reform 2010 and the current Roadmap for Change. A perfunctory look at previous reforms has resulted in significant progress, including unbundling and privatizing the long-standing government-owned monopoly in the power sector. This paper takes a comprehensive assessment of the Roadmap of Change comparing it to previous policies, isolating policy perspectives, prospects and challenges facing it. It also gleans lessons from …


A Forensic Email Analysis Tool Using Dynamic Visualization, Johannes Stadlinger, Andreas Dewald Mar 2017

A Forensic Email Analysis Tool Using Dynamic Visualization, Johannes Stadlinger, Andreas Dewald

Journal of Digital Forensics, Security and Law

Communication between people counts to the most important information of today’s business. As a result, in case of forensic investigations in big companies, analysis of communication data in general and especially email, as the still most widely used business communication platform with an immense and still growing volume, is a typical task in digital forensics. One of the challenges is to identify the relevant communication partners and structures in the suspects surrounding as quickly as possible in order to react appropriately and identify further targets of evaluation. Due to the amount of emails in typical inboxes, reading through all the …


Find Me If You Can: Mobile Gps Mapping Applications Forensic Analysis & Snavp The Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, Frank Breitinger Mar 2017

Find Me If You Can: Mobile Gps Mapping Applications Forensic Analysis & Snavp The Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, Frank Breitinger

Journal of Digital Forensics, Security and Law

The use of smartphones as navigation devices has become more prevalent. The ubiquity of hand-held navigation devices such as Garmins or Toms Toms has been falling whereas the ownership of smartphones and their adoption as GPS devices is growing. This work provides a comprehensive study of the most popular smartphone mapping applications, namely Google Maps, Apple Maps, Waze, MapQuest, Bing, and Scout, on both Android and iOS. It details what data was found, where it was found, and how it was acquired for each application. Based on the findings, the work allowed for the construction of a tool capable of …


Compression Of Virtual-Machine Memory In Dynamic Malware Analysis, James E. Fowler Ph.D. Mar 2017

Compression Of Virtual-Machine Memory In Dynamic Malware Analysis, James E. Fowler Ph.D.

Journal of Digital Forensics, Security and Law

Lossless compression of memory dumps from virtual machines that run malware samples is considered with the goal of significantly reducing archival costs in dynamic-malware-analysis applications. Given that, in such dynamic-analysis scenarios, malware samples are typically run in virtual machines just long enough to activate any self-decryption or other detection- avoidance maneuvers, the virtual-machine memory typically changes little from that of the baseline state, with the difference being attributable in large degree to the loading of additional executables and libraries. Consequently, delta coding is proposed to compress the current virtual-machine memory dump by coding its differences with respect to a predicted …


Table Of Contents Mar 2017

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Mar 2017

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Special Issue Of Best Papers From The 11th International Conference On Systematic Approaches To Digital Forensic Engineering (Sadfe 2016) Mar 2017

Special Issue Of Best Papers From The 11th International Conference On Systematic Approaches To Digital Forensic Engineering (Sadfe 2016)

Journal of Digital Forensics, Security and Law

The SADFE series feature the different editions of the International Conference on Systematic Approaches to Digital Forensics Engineering. Now in its eleventh edition, SADFE has established itself as the premier conference for researchers and practitioners working in Systematic Approaches to Digital Forensics Engineering.

SADFE 2016, the eleventh international conference on Systematic Approaches to Digital Forensic Engineering was held in Kyoto, Japan, September 20 - 22, 2016.

Digital forensics engineering and the curation of digital collections in cultural institutions face pressing and overlapping challenges related to provenance, chain of custody, authenticity, integrity, and identity. The generation, analysis and sustainability of digital …


Public Energy, Shelley Welton Jan 2017

Public Energy, Shelley Welton

All Faculty Scholarship

Many scholars and policy makers celebrate cities as loci for addressing climate change. In addition to being significant sources of carbon pollution, cities prove to be dynamic sites of experimentation and ambition on climate policy. However, as U.S. cities set climate change goals far above those of their federal and state counterparts, they are butting up against the limits of their existing legal authority, most notably with regard to control over energy supplies. In response, many U.S. cities are exercising their legal rights to reclaim public ownership or control over private electric utilities as a method of achieving their climate …


Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey Jan 2017

Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey

All Faculty Scholarship

This Chapter proposes an alternative approach to the IANA transition that migrates the existing core contractual requirements imposed by the US government to the existing IANA functions customers. It also advances modest internal accountability revisions that could be undertaken within ICANN’s existing structure. Specifically, it advocates that the Independent Review Tribunal charged with reviewing certain ICANN board of directors-related decisions be selected by a multi-stakeholder committee rather than being subject to approval by ICANN and expanding the grounds for review to cover all of the rubrics recommended by ICANN’s “Improving Institutional Confidence” process in 2008-2009, including fairness, fidelity to the …


Grid Modernization And Energy Poverty, Shelley Welton Jan 2017

Grid Modernization And Energy Poverty, Shelley Welton

All Faculty Scholarship

Grid modernization holds the alluring promise of rationalizing electricity pricing, saving consumers money, and improving environmental quality all at the same time. Yet, we have seen only limited and patchwork regulatory initiatives towards significant grid modernization in the United States. Outside of a few leading states, state energy regulators appear loath to embrace full-throated versions of the project. This article argues that the under-discussed problem of energy poverty in the United States is a critical contributing factor in the gap between grid modernization’s possibilities and our regulatory reality. Only by explicitly understanding how the issues of grid modernization and energy …


Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah Dec 2016

Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah

Journal of Digital Forensics, Security and Law

With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …


The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler Dec 2016

The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler

Journal of Digital Forensics, Security and Law

The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …