Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- ADAMS modeling (1)
- Actuators (1)
- Computational electrodynamics (1)
- Haptics (1)
- Magnetic field (1)
-
- Metamaterials (1)
- Nanophotonics (1)
- Negative refraction (1)
- Nondestructive testing (1)
- Numerical simulation (1)
- ORBCOMM (1)
- Pattern recognition (1)
- Plasmonics (1)
- Remote sensing (1)
- Soil moisture content (1)
- Solidification (1)
- Support vector machine (SVM) (1)
- Thermoelectrics (1)
- Touch (1)
- VHF (1)
- Virtual reality (1)
- Publication
-
- Annual ADFSL Conference on Digital Forensics, Security and Law (5)
- The Summer Undergraduate Research Fellowship (SURF) Symposium (3)
- The 8th International Conference on Physical and Numerical Simulation of Materials Processing (2)
- Annual Symposium on Biomathematics and Ecology Education and Research (1)
- Georgia State Undergraduate Research Conference (1)
Articles 1 - 12 of 12
Full-Text Articles in Physical Sciences and Mathematics
Designing Laboratories For Small Scale Digital Device Forensics, Richard P. Mislan, Tim Wedge
Designing Laboratories For Small Scale Digital Device Forensics, Richard P. Mislan, Tim Wedge
Annual ADFSL Conference on Digital Forensics, Security and Law
The ubiquity of small scale digital devices (SSDD), the public’s ever increasing societal dependence on SSDD, and the continual presence of SSDD at all types of crime scenes, including non-technical and violent crimes, demand a formalized curriculum for the education and training of future cyber forensic examiners. This paper presents the various SSDD forensics labs currently in use and under development for future use at the Purdue University Cyber Forensics Laboratory. The primary objective of each module is to provide specific real-world cases for the learning, comprehension, and understanding of hands-on investigative techniques and methodologies. The purpose of this paper …
Network Forensic Investigation Of Internal Misuse/Crime In Saudi Arabia: A Hacking Case, Abdulrazaq Al-Murjan, Konstantinos Xynos
Network Forensic Investigation Of Internal Misuse/Crime In Saudi Arabia: A Hacking Case, Abdulrazaq Al-Murjan, Konstantinos Xynos
Annual ADFSL Conference on Digital Forensics, Security and Law
There are ad-hoc guidelines and a limited policy on computer incident response that does not include computer forensic preparation procedures (e.g. logging incidents). In addition, these guidelines do not consider the requirement of Islamic law for admissible evidence at an organisational level in Saudi Arabia. Network forensic investigation might breach the Saudi law if they follow ad-hoc or international digital forensic standards such as Association of Chief Police Officers (ACPO) guidelines. This might put the organisation in a costly situation when a malicious employee sues an Islamic court. This is because the law of Saudi Arabia is complying with Islamic …
Paper Session Ii: Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota
Paper Session Ii: Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota
Annual ADFSL Conference on Digital Forensics, Security and Law
With the proliferation of digital based evidence, the need for the timely identification, analysis and interpretation of digital evidence is becoming more crucial. In many investigations critical information is required while at the scene or within a short period of time - measured in hours as opposed to days. The traditional cyber forensics approach of seizing a system(s)/media, transporting it to the lab, making a forensic image(s), and then searching the entire system for potential evidence, is no longer appropriate in some circumstances. In cases such as child abductions, pedophiles, missing or exploited persons, time is of the essence. In …
Robust Feedback Control Based On Low Order Models With Uncertainty Estimation For A Class Of Biomedical Problems, Hector Puebla, Miguel A. Gutierrez-Limon, Eliseo Hernandez-Martinez, Alejandra Velasco-Perez
Robust Feedback Control Based On Low Order Models With Uncertainty Estimation For A Class Of Biomedical Problems, Hector Puebla, Miguel A. Gutierrez-Limon, Eliseo Hernandez-Martinez, Alejandra Velasco-Perez
Annual Symposium on Biomathematics and Ecology Education and Research
No abstract provided.
Nondestructive Testing And Structural Health Monitoring Based On Adams And Svm Techniques, Gang Jiang, Yi Ming Deng, Ji Tai Niu
Nondestructive Testing And Structural Health Monitoring Based On Adams And Svm Techniques, Gang Jiang, Yi Ming Deng, Ji Tai Niu
The 8th International Conference on Physical and Numerical Simulation of Materials Processing
No abstract provided.
Thermoelectric Magnetohydrodynamic Effects In Solidification Processes, Andrew Kao, Koulis Pericleous, Peter Lee, Biao Cai, Jianrong Gao
Thermoelectric Magnetohydrodynamic Effects In Solidification Processes, Andrew Kao, Koulis Pericleous, Peter Lee, Biao Cai, Jianrong Gao
The 8th International Conference on Physical and Numerical Simulation of Materials Processing
No abstract provided.
Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier
Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier
Annual ADFSL Conference on Digital Forensics, Security and Law
Many people do all of their banking online, we and our children communicate with peers through computer systems, and there are many jobs that require near continuous interaction with computer systems. Criminals, however, are also “connected”, and our online interaction provides them a conduit into our information like never before. Our credit card numbers and other fiscal information are at risk, our children's personal information is exposed to the world, and our professional reputations are on the line.
The discipline of Digital Forensics in law enforcement agencies around the nation and world has grown to match the increased risk and …
Designing A Data Warehouse For Cyber Crimes, Il-Yeol Song, John D. Maguire, Ki Jung Lee, Namyoun Choi, Xiaohua Hu, Peter Chen
Designing A Data Warehouse For Cyber Crimes, Il-Yeol Song, John D. Maguire, Ki Jung Lee, Namyoun Choi, Xiaohua Hu, Peter Chen
Annual ADFSL Conference on Digital Forensics, Security and Law
One of the greatest challenges facing modern society is the rising tide of cyber crimes. These crimes, since they rarely fit the model of conventional crimes, are difficult to investigate, hard to analyze, and difficult to prosecute. Collecting data in a unified framework is a mandatory step that will assist the investigator in sorting through the mountains of data. In this paper, we explore designing a dimensional model for a data warehouse that can be used in analyzing cyber crime data. We also present some interesting queries and the types of cyber crime analyses that can be performed based on …
Experimental Testing And Validation Of P-Band Bi-Static Remote Sensing Of Soil Moisture In 137-138mhz Range, Xiangyu Qu, Yao-Cheng Lin, James L. Garrison
Experimental Testing And Validation Of P-Band Bi-Static Remote Sensing Of Soil Moisture In 137-138mhz Range, Xiangyu Qu, Yao-Cheng Lin, James L. Garrison
The Summer Undergraduate Research Fellowship (SURF) Symposium
Remote sensing using readily available communication signal transmitted by ORBCOMM satellites at very high frequency (VHF) range (137-138MHz) is a promising method for detecting the root zone soil moisture content. The radio wave reflectivity of soil is strongly correlated to soil moisture content. Therefore, if we were able to measure the reflectivity, we might be able to estimate the soil moisture content. In this preliminary study, we analyze direct signal data from the satellites to investigate and verify communication channels in frequency range of interest and their characteristics (bandwidth, pattern, etc.). The analysis of direct signal data is also used …
Photonicstd-2d: Modeling Light Scattering In Periodic Multilayer Photonic Structures, Alexey Bondarev, Shaimaa Azzam, Zhaxylyk Kudyshev, Alexander V. Kildishev
Photonicstd-2d: Modeling Light Scattering In Periodic Multilayer Photonic Structures, Alexey Bondarev, Shaimaa Azzam, Zhaxylyk Kudyshev, Alexander V. Kildishev
The Summer Undergraduate Research Fellowship (SURF) Symposium
Efficient modeling of electromagnetic processes in optical and plasmonic metamaterials is important for enabling new and exciting ways to manipulate light for advanced applications. In this work, we put together a tool for numerical simulation of propagation of normally incident light through a nanostructured multilayer composite material. The user builds a unit cell of a given material layer-by-layer starting from a substrate up to a superstrate, splitting each layer further into segments. The segments are defined by width and material -- dielectric, metal or active medium. Simulations are performed with the finite difference time domain (FDTD) method. A database of …
Haptic Foot Feedback For Kicking Training In Virtual Reality, Hank Huang, Hong Tan
Haptic Foot Feedback For Kicking Training In Virtual Reality, Hank Huang, Hong Tan
The Summer Undergraduate Research Fellowship (SURF) Symposium
As means to further supplement athletic performances increases, virtual reality is becoming helpful to sports in terms of cognitive training such as reaction, mentality, and game strategies. With the aid of haptic feedback, interaction with virtual objects increases by another dimension, in addition to the presence of visual and auditory feedback. This research presents an integrated system of a virtual reality environment, motion tracking system, and a haptic unit designed for the dorsal foot. The prototype simulates a scenario of virtual kicking and returns haptic response upon collision between the user’s foot and virtual object. The overall system was evaluated …
Triad Computing, Madison Hanberry
Triad Computing, Madison Hanberry
Georgia State Undergraduate Research Conference
No abstract provided.