Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 61

Full-Text Articles in Physical Sciences and Mathematics

Comment On Faa Rule Revision - Transport Category Aircraft, Paul F. Eschenfelder, Valter Battistoni Nov 2015

Comment On Faa Rule Revision - Transport Category Aircraft, Paul F. Eschenfelder, Valter Battistoni

Paul F. Eschenfelder

No abstract provided.


Enhancing Quality Assurance Using Virtual Design Engineering: Case Study Of Space Shuttle Challenger, Kouroush Jenab, Scot Paterson Oct 2015

Enhancing Quality Assurance Using Virtual Design Engineering: Case Study Of Space Shuttle Challenger, Kouroush Jenab, Scot Paterson

International Journal of Aviation, Aeronautics, and Aerospace

Virtual Design Engineering is an emerging method of increasing quality of systems. Including Virtual Design as a part of the traditional established Failure Mode, Effects, and Criticality Analysis process greatly enhances hazard and risk analysis while reducing overall costs. In this study these enhancements are explored and expanded upon to discover how overall system quality could be increased and all stakeholders could more accurately understand the hazards involved. Stakeholder misunderstanding or misapplication of hazards is of great importance to complex systems. An illustrative example of how these factors could have changed the outcome of a real-world engineering failure is provided.


Pattern Formation Of Elastic Waves And Energy Localization Due To Elastic Gratings, A. Berezovski, J. Engelbrecht, Mihhail Berezovski Oct 2015

Pattern Formation Of Elastic Waves And Energy Localization Due To Elastic Gratings, A. Berezovski, J. Engelbrecht, Mihhail Berezovski

Publications

Elastic wave propagation through diffraction gratings is studied numerically in the plane strain setting. The interaction of the waves with periodically ordered elastic inclusions leads to a self-imaging Talbot effect for the wavelength equal or close to the grating size. The energy localization is observed at the vicinity of inclusions in the case of elastic gratings. Such a localization is absent in the case of rigid gratings.


Examining Unmanned Aerial System Threats & Defenses: A Conceptual Analysis, Ryan J. Wallace, Jon M. Loffi Oct 2015

Examining Unmanned Aerial System Threats & Defenses: A Conceptual Analysis, Ryan J. Wallace, Jon M. Loffi

International Journal of Aviation, Aeronautics, and Aerospace

The integration of unmanned aerial systems (UAS) into the already complex global aviation system presents new and unique hazards. While many studies have addressed the potential safety concerns of UAS integration, little research has been dedicated to the potential security implications. This study sought to identify potential uses and adaptations of civil UAS systems as weapons of terrorism or crime and potential UAS defenses. Researchers examined 68 academic studies, unclassified government reports, and news articles using Conceptual Analysis to systematically capture and categorize various threats. Using the collected data, researchers developed a UAS threat model for categorically evaluating potential threats. …


Factors Affecting Dimensional Precision Of Consumer 3d Printing, David D. Hernandez Sep 2015

Factors Affecting Dimensional Precision Of Consumer 3d Printing, David D. Hernandez

International Journal of Aviation, Aeronautics, and Aerospace

This paper investigates the factors affecting dimensional precision of consumer-grade 3D printing, attempting to isolate and mitigate sources of error. The focus is on creating engineering prototypes of, tooling for, or finalized instances of mechanical devices. A specific fused deposition modeling printer – the Ultimaker 2 – is analyzed in terms of meeting precise physical dimensions, consistent shapes, and predictable surface finish. Extensive trial and error resulted in removal of several sources of bias, with square test articles exhibiting a lower-than-anticipated mean percentage error of -0.387% (SD = 0.559), a value comparable to other modern manufacturing techniques. A full …


Book Review: High G Flight - Physiological Effects And Countermeasures, Stefan Kleinke Aug 2015

Book Review: High G Flight - Physiological Effects And Countermeasures, Stefan Kleinke

International Journal of Aviation, Aeronautics, and Aerospace

This review provides insight on the content and a review of the quality of the recent release of High G Flight - Physiological Effects and Countermeasures from Ashgate Publications.

This review does not reflect the views of IJAAA or ERAU. This work was not peer reviewed.

High G Flight - Physiological Effects and Countermeasures


Aviation Bird Hazard In Nexrad Dual Polarization Weather Radar Confirmed By Visual Observations, Bradley M. Muller, Frederick R. Mosher, Christopher G. Herbster, Anthony T. Brickhouse Aug 2015

Aviation Bird Hazard In Nexrad Dual Polarization Weather Radar Confirmed By Visual Observations, Bradley M. Muller, Frederick R. Mosher, Christopher G. Herbster, Anthony T. Brickhouse

International Journal of Aviation, Aeronautics, and Aerospace

Birds represent a significant hazard to flying aircraft as illustrated by the “Miracle on the Hudson” encounter in 2009 between U.S. Airways Flight 1549 and a flock of Canada Geese, forcing the flight to ditch in the river. Birds are common in the skies over Florida during the spring migration season, and often appear in the National Weather Service’s (NWS) NEXRAD weather radar imagery as an easily recognizable signature known as a “roost ring.” This paper presents a NEXRAD roost ring case in central Florida in a rare instance where the signatures were confirmed by visual observations of the birds. …


Global Optimized Isothermal And Nonlinear Models Of Earth’S Standard Atmosphere, Nihad E. Daidzic, Ph.D., Aug 2015

Global Optimized Isothermal And Nonlinear Models Of Earth’S Standard Atmosphere, Nihad E. Daidzic, Ph.D.,

International Journal of Aviation, Aeronautics, and Aerospace

Both, a global isothermal temperature model and a nonlinear quadratic temperature model of the ISA was developed and presented here. Constrained optimization techniques in conjunction with the least-square-root approximations were used to design best-fit isothermal models for ISA pressure and density changes up to 47 geopotential km for NLPAM, and 86 orthometric km for ISOAM respectively. The mass of the dry atmosphere and the relevant fractional-mass scale heights have been computed utilizing the very accurate eight-point Gauss-Legendre numerical quadrature for both ISOAM and NLPAM. Both, the ISOAM and the NLPAM represent viable alternatives to ISA in many practical applications and …


Bio-Fuel Alternatives In South African Airways (Saa) Operations - Is It An Effective Response To Vulnerability Over Carbon Taxes And Penalty?, Daniel Kwasi Adjekum Jul 2015

Bio-Fuel Alternatives In South African Airways (Saa) Operations - Is It An Effective Response To Vulnerability Over Carbon Taxes And Penalty?, Daniel Kwasi Adjekum

International Journal of Aviation, Aeronautics, and Aerospace

The paper did a comparative analysis of the carbon emission and European Union Emission Trading Surcharges (EU ETS) of South African Airways (SAA) current fleet that used aviation jet A1 fuel and the same fleet if it had used a 25% bio-fuel ‘drop in’ for the European routes within the first quarter of the 2014 flying year (FY 14). Operational data in terms of the flight scheduled, aircraft type, total time enroute, route stage length, passenger estimates were obtained through SAA’s flight operations website. An independent t–test was conducted to compare means of the emissions. The mean carbon dioxide …


Design And Validation Of Hardware-In-The-Loop Testbed For Proximity Operations Payloads, Kristia K. Harris Jul 2015

Design And Validation Of Hardware-In-The-Loop Testbed For Proximity Operations Payloads, Kristia K. Harris

Doctoral Dissertations and Master's Theses

The research presented here is a new testbed design for CubeSat and payload testing and development. This research demonstrates a low-cost, hardware-in-the-loop testing apparatus for use with university CubeSat programs for testing throughout the different levels of the development process. The average university CubeSat program undergoes very little hardware-in-the-loop testing. Most of the focus is the targeted towards performance testing and environmental testing which occur after completion the development process. This research shows that, for minimal schedule and cost impact, testing can occur early in the development process. The testbed presented here demonstrates suitable accuracy to be used for advanced …


Direct Atmospheric Evidence For The Irreversible Formation Of Aqueous Secondary Organic Aerosol, Marwa M. El-Sayed, Yingqing Wang, Christopher J. Hennigan Jun 2015

Direct Atmospheric Evidence For The Irreversible Formation Of Aqueous Secondary Organic Aerosol, Marwa M. El-Sayed, Yingqing Wang, Christopher J. Hennigan

Publications

The reversible nature of aqueous secondary organic aerosol (aqSOA) formation was characterized for the first time through direct atmospheric measurements. Water-soluble organic carbon in the gas and particle phases (WSOCg and WSOCp) was measured simultaneously to quantify aqSOA formation in Baltimore, Maryland. During the nighttime, aqSOA formation was evident as WSOCg increasingly partitioned to the particle phase with increasing relative humidity (RH). To characterize the reversible/irreversible nature of this aqSOA, the WSOCp measurement was alternated through an unperturbed ambient channel and through a “dried” channel maintained at ~40% RH (with 7 s residence time) to mimic the natural drying particles …


Tracking Criminals On Facebook: A Case Study From A Digital Forensics Reu Program, Daniel Weiss, Gary Warner May 2015

Tracking Criminals On Facebook: A Case Study From A Digital Forensics Reu Program, Daniel Weiss, Gary Warner

Annual ADFSL Conference on Digital Forensics, Security and Law

The 2014 Digital Forensics Research Experience for Undergraduates (REU) Program at the University of Alabama at Birmingham (UAB) focused its summer efforts on tracking criminal forums and Facebook groups. The UAB-REU Facebook team was provided with a list of about 60 known criminal groups on Facebook, with a goal to track illegal information posted in these groups and ultimately store the information in a searchable database for use by digital forensic analysts. Over the course of about eight weeks, the UAB-REU Facebook team created a database with over 400 Facebook groups conducting criminal activity along with over 100,000 unique users …


Towards A Digital Forensics Competency-Based Program: Making Assessment Count, Rose Shumba May 2015

Towards A Digital Forensics Competency-Based Program: Making Assessment Count, Rose Shumba

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper describes an approach that UMUC has initiated to revise its graduate programs to a Competency-Based Education (CBE) curriculum. The approach, which is Learning Demonstration (LD) centric, includes the identification of learning goals and competences, identification and description of the LDs, mapping of the LDs to the competences, scripting the LDs, placing the LDs into the respective courses, validating the developed materials, and the development of the open learning resources. Programs in the Cybersecurity and Information Assurance Department, including the Digital Forensics and Cyber Investigations program, are being revised. An LD centric approach to curriculum development helps align programs …


Phishing Intelligence Using The Simple Set Comparison Tool, Jason Britt, Alan Sprague, Gary Warner May 2015

Phishing Intelligence Using The Simple Set Comparison Tool, Jason Britt, Alan Sprague, Gary Warner

Annual ADFSL Conference on Digital Forensics, Security and Law

Phishing websites, phish, attempt to deceive users into exposing their passwords, user IDs, and other sensitive information by imitating legitimate websites, such as banks, product vendors, and service providers. Phishing investigators need fast automated tools to analyze the volume of phishing attacks seen today. In this paper, we present the Simple Set Comparison tool. The Simple Set Comparison tool is a fast automated tool that groups phish by imitated brand allowing phishing investigators to quickly identify and focus on phish targeting a particular brand. The Simple Set Comparison tool is evaluated against a traditional clustering algorithm over a month's worth …


Identifying Common Characteristics Of Malicious Insiders, Nan Liang, David Biros May 2015

Identifying Common Characteristics Of Malicious Insiders, Nan Liang, David Biros

Annual ADFSL Conference on Digital Forensics, Security and Law

Malicious insiders account for large proportion of security breaches or other kinds of loss for organizations and have drawn attention of both academics and practitioners. Although methods and mechanism have been developed to monitor potential insider via electronic data monitoring, few studies focus on predicting potential malicious insiders. Based on the theory of planned behavior, certain cues should be observed or expressed when an individual performs as a malicious insider. Using text mining to analyze various media content of existing insider cases, we strive to develop a method to identify crucial and common indicators that an individual might be a …


Continuous Monitoring System Based On Systems' Environment, Eli Weintraub, Yuval Cohen May 2015

Continuous Monitoring System Based On Systems' Environment, Eli Weintraub, Yuval Cohen

Annual ADFSL Conference on Digital Forensics, Security and Law

We present a new framework (and its mechanisms) of a Continuous Monitoring System (CMS) having new improved capabilities, and discuss its requirements and implications. The CMS is based on the real-time actual configuration of the system and the environment rather than a theoretic or assumed configuration. Moreover, the CMS predicts organizational damages taking into account chains of impacts among systems' components generated by messaging among software components. In addition, the CMS takes into account all organizational effects of an attack. Its risk measurement takes into account the consequences of a threat, as defines in risk analysis standards. Loss prediction is …


Html5 Zero Configuration Covert Channels: Security Risks And Challenges, Jason Farina, Mark Scanlon, Stephen Kohlmann, Nhien-An Le-Khac, Tahar Kechadi May 2015

Html5 Zero Configuration Covert Channels: Security Risks And Challenges, Jason Farina, Mark Scanlon, Stephen Kohlmann, Nhien-An Le-Khac, Tahar Kechadi

Annual ADFSL Conference on Digital Forensics, Security and Law

In recent months there has been an increase in the popularity and public awareness of secure, cloudless file transfer systems. The aim of these services is to facilitate the secure transfer of files in a peer-to-peer (P2P) fashion over the Internet without the need for centralized authentication or storage. These services can take the form of client installed applications or entirely web browser based interfaces. Due to the P2P nature, there is generally no limit to the file sizes involved or to the volume of data transmitted - and where these limitations do exist they will be purely reliant on …


Measuring Hacking Ability Using A Conceptual Expertise Task, Justin S. Giboney, Jeffrey G. Proudfoot, Sanjay Goel, Joseph S. Valacich May 2015

Measuring Hacking Ability Using A Conceptual Expertise Task, Justin S. Giboney, Jeffrey G. Proudfoot, Sanjay Goel, Joseph S. Valacich

Annual ADFSL Conference on Digital Forensics, Security and Law

Hackers pose a continuous and unrelenting threat to organizations. Industry and academic researchers alike can benefit from a greater understanding of how hackers engage in criminal behavior. A limiting factor of hacker research is the inability to verify that self-proclaimed hackers participating in research actually possess their purported knowledge and skills. This paper presents current work in developing and validating a conceptual-expertise based tool that can be used to discriminate between novice and expert hackers. The implications of this work are promising since behavioral information systems researchers operating in the information security space will directly benefit from the validation of …


Invited Paper - A Profile Of Prolonged, Persistent Ssh Attack On A Kippo Based Honeynet, Craig Valli, Priya Rabadia, Andrew Woodard May 2015

Invited Paper - A Profile Of Prolonged, Persistent Ssh Attack On A Kippo Based Honeynet, Craig Valli, Priya Rabadia, Andrew Woodard

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper is an investigation focusing on activities detected by SSH honeypots that utilised kippo honeypot software. The honeypots were located across a variety of geographical locations and operational platforms. The honeynet has suffered prolonged, persistent and attack from a /24 network which appears to be of Chinese geographical origin. In addition to these attacks, other attackers have been successful in compromising real hosts in a wide range of other countries that were subsequently involved in attacking the honeypot machines in the honeynet.

Keywords: Cyber Security, SSH, Secure Shell, Honeypots, Kippo


Inivited Paper - Potential Changes To Ediscovery Rules In Federal Court: A Discussion Of The Process, Substantive Changes And Their Applicability And Impact On Virginia Practice, Joseph J. Schwerha, Susan L. Mitchell, John W. Bagby May 2015

Inivited Paper - Potential Changes To Ediscovery Rules In Federal Court: A Discussion Of The Process, Substantive Changes And Their Applicability And Impact On Virginia Practice, Joseph J. Schwerha, Susan L. Mitchell, John W. Bagby

Annual ADFSL Conference on Digital Forensics, Security and Law

The Federal Rules of Civil Procedure (FRCP) are subject to a unique process also once used in revising the Federal Rules of Evidence (FRE). Today, this process is followed in revisions of the FRCP, the Federal Rules of Criminal Procedure and the Federal Bankruptcy Rules. This unique rulemaking process differs significantly from traditional notice and comment rulemaking required for a majority of federal regulatory agencies under the Administrative Procedure Act (APA).1 Most notably, rule-making for the federal courts’ procedural matters remain unaffected by the invalidation of legislative veto. It is still widely, but wrongly believed, that the legislative veto was …


On The Network Performance Of Digital Evidence Acquisition Of Small Scale Devices Over Public Networks, Irvin Homem, Spyridon Dosis May 2015

On The Network Performance Of Digital Evidence Acquisition Of Small Scale Devices Over Public Networks, Irvin Homem, Spyridon Dosis

Annual ADFSL Conference on Digital Forensics, Security and Law

While cybercrime proliferates – becoming more complex and surreptitious on the Internet – the tools and techniques used in performing digital investigations are still largely lagging behind, effectively slowing down law enforcement agencies at large. Real-time remote acquisition of digital evidence over the Internet is still an elusive ideal in the combat against cybercrime. In this paper we briefly describe the architecture of a comprehensive proactive digital investigation system that is termed as the Live Evidence Information Aggregator (LEIA). This system aims at collecting digital evidence from potentially any device in real time over the Internet. Particular focus is made …


A Review Of Recent Case Law Related To Digital Forensics: The Current Issues, Kelly A. Cole, Shruti Gupta, Dheeraj Gurugubelli, Marcus K. Rogers May 2015

A Review Of Recent Case Law Related To Digital Forensics: The Current Issues, Kelly A. Cole, Shruti Gupta, Dheeraj Gurugubelli, Marcus K. Rogers

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital forensics is a new field without established models of investigation. This study uses thematic analysis to explore the different issues seen in the prosecution of digital forensic investigations. The study looks at 100 cases from different federal appellate courts to analyze the cause of the appeal. The issues are categorized into one of four categories, ‘search and seizure’, ‘data analysis’, ‘presentation’ and ‘legal issues’. The majority of the cases reviewed related to the search and seizure activity.

Keywords: Computer Investigation, Case Law, Digital Forensics, Legal Issues, and Courts


A New Cyber Forensic Philosophy For Digital Watermarks In The Context Of Copyright Laws, Vinod P. Bhattathiripad, Sneha Sudhakaran, Roshna K. Thalayaniyil May 2015

A New Cyber Forensic Philosophy For Digital Watermarks In The Context Of Copyright Laws, Vinod P. Bhattathiripad, Sneha Sudhakaran, Roshna K. Thalayaniyil

Annual ADFSL Conference on Digital Forensics, Security and Law

The objective of this paper is to propose a new cyber forensic philosophy for watermark in the context of copyright laws for the benefit of the forensic community and the judiciary worldwide. The paper first briefly introduces various types of watermarks, and then situates watermarks in the context of the ideaexpression dichotomy and the copyright laws. It then explains the forensic importance of watermarks and proposes a forensic philosophy for them in the context of copyright laws. Finally, the paper stresses the vital need to incorporate watermarks in the forensic tests to establish software copyright infringement and also urges the …


A Survey Of Software-Based String Matching Algorithms For Forensic Analysis, Yi-Ching Liao May 2015

A Survey Of Software-Based String Matching Algorithms For Forensic Analysis, Yi-Ching Liao

Annual ADFSL Conference on Digital Forensics, Security and Law

Employing a fast string matching algorithm is essential for minimizing the overhead of extracting structured files from a raw disk image. In this paper, we summarize the concept, implementation, and main features of ten software-based string matching algorithms, and evaluate their applicability for forensic analysis. We provide comparisons between the selected software-based string matching algorithms from the perspective of forensic analysis by conducting their performance evaluation for file carving. According to the experimental results, the Shift-Or algorithm (R. Baeza-Yates & Gonnet, 1992) and the Karp-Rabin algorithm (Karp & Rabin, 1987) have the minimized search time for identifying the locations of …


Investigating Forensics Values Of Windows Jump Lists Data, Ahmad Ghafarian May 2015

Investigating Forensics Values Of Windows Jump Lists Data, Ahmad Ghafarian

Annual ADFSL Conference on Digital Forensics, Security and Law

Starting with Windows 7, Microsoft introduced a new feature to the Windows Operating Systems called Jump Lists. Jump Lists stores information about user activities on the host machine. These activities may include links to the recently visited web pages, applications executed, or files processed. Computer forensics investigators may find traces of misuse in Jump Lists auto saved files. In this research, we investigate the forensics values of Jump Lists data. Specifically, we use several tools to view Jump Lists data on a virtual machine. We show that each tool reveal certain types of information about user’s activity on the host …


An Empirical Comparison Of Widely Adopted Hash Functions In Digital Forensics: Does The Programming Language And Operating System Make A Difference?, Satyendra Gurjar, Ibrahim Baggili, Frank Breitinger, Alice Fischer May 2015

An Empirical Comparison Of Widely Adopted Hash Functions In Digital Forensics: Does The Programming Language And Operating System Make A Difference?, Satyendra Gurjar, Ibrahim Baggili, Frank Breitinger, Alice Fischer

Annual ADFSL Conference on Digital Forensics, Security and Law

Hash functions are widespread in computer sciences and have a wide range of applications such as ensuring integrity in cryptographic protocols, structuring database entries (hash tables) or identifying known files in forensic investigations. Besides their cryptographic requirements, a fundamental property of hash functions is efficient and easy computation which is especially important in digital forensics due to the large amount of data that needs to be processed when working on cases. In this paper, we correlate the runtime efficiency of common hashing algorithms (MD5, SHA-family) and their implementation. Our empirical comparison focuses on C-OpenSSL, Python, Ruby, Java on Windows and …


Two Challenges Of Stealthy Hypervisors Detection: Time Cheating And Data Fluctuations, Igor Korkin May 2015

Two Challenges Of Stealthy Hypervisors Detection: Time Cheating And Data Fluctuations, Igor Korkin

Annual ADFSL Conference on Digital Forensics, Security and Law

Hardware virtualization technologies play a significant role in cyber security. On the one hand these technologies enhance security levels, by designing a trusted operating system. On the other hand these technologies can be taken up into modern malware which is rather hard to detect. None of the existing methods is able to efficiently detect a hypervisor in the face of countermeasures such as time cheating, temporary self-uninstalling, memory hiding etc. New hypervisor detection methods which will be described in this paper can detect a hypervisor under these countermeasures and even count several nested ones. These novel approaches rely on the …


Investigation Of Mountain Waves In The Mesosphere Over The Andes Mountains, Jaime Aguilar Guerrero May 2015

Investigation Of Mountain Waves In The Mesosphere Over The Andes Mountains, Jaime Aguilar Guerrero

Doctoral Dissertations and Master's Theses

An image processing algorithm has been developed to analyze data from a NIR All-Sky Imager of OH airglow emission (from about 87 km altitude), located in the Andes, with the purpose of investigating the atmospheric gravity waves generated when low level wind blows over the high mountains (referred to as Mountain Waves). These types of waves are a special case of atmospheric gravity waves, which carry significant momentum and exert strong forcing to the background upper atmosphere. The imager is located at the Andes Lidar Observatory (ALO) at Cerro Pachón, Chile (30°S, 71°W), which also houses a Na Doppler Lidar …


Numerical Model Derived Altimeter Correction Maps For Non-Standard Atmospheric Temperature And Pressure, Thomas A. Guinn, Frederick R. Mosher Apr 2015

Numerical Model Derived Altimeter Correction Maps For Non-Standard Atmospheric Temperature And Pressure, Thomas A. Guinn, Frederick R. Mosher

International Journal of Aviation, Aeronautics, and Aerospace

Altimeter corrections for non-standard temperature pose a challenge because accurate calculations require detailed knowledge of the temperature structure of the atmosphere between the surface and the aircraft. By applying basic hypsometric formulae to high resolution numerical model temperature and moisture output, detailed maps of current and forecasted corrected D-values are created. Corrected D-values provide the altitude difference between the true altitude and the indicated altitude from a pressure altimeter. Unlike standard D-values, the corrected D-value corrects for non-standard pressure in addition to non-standard temperature and is therefore useful for flights below class A airspace. Maps of corrected D-value may help …


Efficient General Computational Method For Estimation Of Standard Atmosphere Parameters, Nihad E. Daidzic Ph.D., Sc.D. Mar 2015

Efficient General Computational Method For Estimation Of Standard Atmosphere Parameters, Nihad E. Daidzic Ph.D., Sc.D.

International Journal of Aviation, Aeronautics, and Aerospace

Knowledge of standard air temperature, pressure, density, speed of sound, and viscosity as a function of altitude is essential information in aircraft design, performance testing, pressure altimeter calibration, and several other aeronautical engineering and aviation science applications. A new efficient computational method for rapid calculations of standard atmospheric parameters up to 86 orthometric km is presented. Additionally, mass and weight of each standard atmospheric layer were calculated using a numerical integration method. The sum of all fractional masses and weights represents the total mass and weight of Earth’s atmosphere. The results obtained here agree well with measurements and models of …