Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 38

Full-Text Articles in Physical Sciences and Mathematics

Vortex Structures Inside Spherical Mesoscopic Superconductor Plus Magnetic Dipole, A. Ludu Nov 2018

Vortex Structures Inside Spherical Mesoscopic Superconductor Plus Magnetic Dipole, A. Ludu

Publications

We investigate the existence of multivortex states in a superconducting mesoscopic sphere with a magnetic dipole placed at the center. We obtain analytic solutions for the order parameter inside the sphere through the linearized Ginzburg-Landau (GL) model, coupled with mixed boundary conditions, and under regularity conditions and decoupling coordinates approximation. The solutions of the linear GL equation are obtained in terms of Heun double confluent functions, in dipole coordinates symmetry. The analyticity of the solutions and the associated eigenproblem are discussed thoroughly. We minimize the free energy for the fully nonlinear GL system by using linear combinations of linear analytic …


Challenges For Flight Instructors Teaching Weather Information, Robert Thomas, Thomas A. Guinn Oct 2018

Challenges For Flight Instructors Teaching Weather Information, Robert Thomas, Thomas A. Guinn

Aviation Weather Training Research

  • Flight Instructors face a challenge when teaching/learning weather information
  • Multiple overlapping resources for aviation weather
  • AC takes longer timeframe to update –problem for quick updates of information


Assessing Ga Pilots' Preflight Weather Planning Mental Models, Yolanda Ortiz, Beth Blickensderfer, Thomas A. Guinn Oct 2018

Assessing Ga Pilots' Preflight Weather Planning Mental Models, Yolanda Ortiz, Beth Blickensderfer, Thomas A. Guinn

General Aviation Weather Display Interpretation

Purpose, To assess GA Pilots' ability to:

  • Obtain the Appropriate Weather Information
  • Interpret the Data
  • Apply the Information to a Given Flight Route


Interpreting Aviation Weather Products: Follow-Up Study With Aopa Members, Beth Blickensderfer, Thomas A. Guinn, Thomas Bob, Jayde King, Yolanda Ortiz, Nick Defilippis, Quirijn Berendschot, Jacqueline Mcsorley Oct 2018

Interpreting Aviation Weather Products: Follow-Up Study With Aopa Members, Beth Blickensderfer, Thomas A. Guinn, Thomas Bob, Jayde King, Yolanda Ortiz, Nick Defilippis, Quirijn Berendschot, Jacqueline Mcsorley

General Aviation Weather Display Interpretation

Purpose

  • Use the questions we developed in Phase I
  • Include pilots that are more representative of GA (age, flight hours/experience); Collaborate with AOPA
  • Examine: Knowledge about aviation weather products; Differences between levels of flight certificate and/or ratings


Aviation Weather Education: Challenges Using Current Faa Guidance, Thomas A. Guinn, Robert Thomas Oct 2018

Aviation Weather Education: Challenges Using Current Faa Guidance, Thomas A. Guinn, Robert Thomas

Aviation Weather Training Research

Observed Challenges

  • Incorrect product information
  • Guidance not keeping pace with new products
  • Multiple formats of same product
  • Potentially unnecessary information
  • Missing product information
  • Limited focus on interpretation


A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman Oct 2018

A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman

Journal of Digital Forensics, Security and Law

Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are …


Floating Active Baffles, System And Method Of Slosh Damping Comprising The Same, Dae Won Kim, Rudy L. Baum, Vijay Santhanam, Balaji Sivasubramanian, Sathya Gangadharan Sep 2018

Floating Active Baffles, System And Method Of Slosh Damping Comprising The Same, Dae Won Kim, Rudy L. Baum, Vijay Santhanam, Balaji Sivasubramanian, Sathya Gangadharan

Publications

This disclosure provides a system for damping slosh of a liquid within a tank, a baffle for use in the system, and a method of damping slosh using the system. The system includes a plurality of baffles. Each baffle has a body configured to substantially float upon the liquid. Each baffle also has an activation material received along at least a portion of the body. The activation material is magnetically reactive provided in a quantity sufficient to enable the body to be manipulated in the presence of a magnetic field (M). The system further includes an actuator configured to pro­vide …


Quantitative Jeopardy Feud, Jonathan M. Gallimore Aug 2018

Quantitative Jeopardy Feud, Jonathan M. Gallimore

MSF 600 PR - Gallimore - Fall 2018

This activity - Quantitative Jeopardy Feud - is a method for using a game as a final exam.


Suas: Cybersecurity Threats, Vulnerabilities, And Exploits, Philip Craiger, Gary Kessler, William Rose Aug 2018

Suas: Cybersecurity Threats, Vulnerabilities, And Exploits, Philip Craiger, Gary Kessler, William Rose

National Training Aircraft Symposium (NTAS)

The FAA predicts that purchases of hobbyist small unmanned aerial systems (sUAS) will grow from 1.9 million in 2016 to 4.3 million by 2020, and commercial sUAS to increase from 600,000 in 2016 to 2.7 million by 2020. sUAS, often referred to as 'drones,' are comprised of aeronautical hardware, a CPU, RAM, onboard storage, radio frequency communications, sensors, a camera, and a controller used by the pilot-in-command (PIC). Some have argued that a sUAS is essentially a flying computer. As such, sUAS are sometimes susceptible to many of the types of attacks that are often used on PC-based computers attached …


Full Field Computing For Elastic Pulse Dispersion In Inhomogeneous Bars, A. Berezovski, R. Kolman, M. Berezovski, D. Gabriel, V. Adamek Jul 2018

Full Field Computing For Elastic Pulse Dispersion In Inhomogeneous Bars, A. Berezovski, R. Kolman, M. Berezovski, D. Gabriel, V. Adamek

Publications

In the paper, the finite element method and the finite volume method are used in parallel for the simulation of a pulse propagation in periodically layered composites beyond the validity of homogenization methods. The direct numerical integration of a pulse propagation demonstrates dispersion effects and dynamic stress redistribution in physical space on example of a one-dimensional layered bar. Results of numerical simulations are compared with analytical solution constructed specifically for the considered problem. Analytical solution as well as numerical computations show the strong influence of the composition of constituents on the dispersion of a pulse in a heterogeneous bar and …


Book Review: Fundamentals Of International Aviation, Alan Bender Jun 2018

Book Review: Fundamentals Of International Aviation, Alan Bender

International Journal of Aviation, Aeronautics, and Aerospace

Not applicable.


Contents, Adfsl May 2018

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, Adfsl May 2018

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth May 2018

Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth

Annual ADFSL Conference on Digital Forensics, Security and Law

Data Protection and Computer Forensics/Anti-Forensics has now become a critical area of concern for organizations. A key element to this is how data is sanitized at end of life. In this paper we explore Hybrid Solid State Hybrid Drives (SSHD) and the impact that various Computer Forensics and Data Recovery techniques have when performing data erasure upon a SSHD.


Knowledge Expiration In Security Awareness Training, Tianjian Zhang May 2018

Knowledge Expiration In Security Awareness Training, Tianjian Zhang

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle May 2018

Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of LSB image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. The “CounterSteg” software allows detailed analysis and comparison of both the original cover image and any modified image, using sophisticated bit- and color-channel visual depiction graphics. In certain cases, the steganographic software used for message transmission can be identified by the forensic analysis of LSB and other changes in the payload image. The paper demonstrates usage and typical …


Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba May 2018

Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba

Annual ADFSL Conference on Digital Forensics, Security and Law

Cloud computing has revolutionized the methods by which digital data is stored, processed, and transmitted. It is providing users with data storage and processing services, enabling access to resources through multiple devices. Although organizations continue to embrace the advantages of flexibility and scalability offered by cloud computing, insider threats are becoming a serious concern as cited by security researchers. Insiders can use authorized access to steal sensitive information, calling for the need for an investigation. This concept paper describes research in progress towards developing a Neo4j graph database tool to enhance client forensics. The tool, with a Python interface, allows …


Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta May 2018

Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta

Annual ADFSL Conference on Digital Forensics, Security and Law

Enterprises are facing an unprecedented risk of security incidents due to the influx of emerging technologies, like smartphones and wearables. Most of the current Mobile security systems are not maturing in pace with technological advances. They lack the ability to learn and adapt from the past knowledge base. In the case of a security incident, enterprises find themselves underprepared for the lack of evidence and data. The systems are not designed to be forensic ready. There is a need for automated security analysis and forensically ready solution, which can learn and continuously adapt to new challenges, improve efficiency and productivity …


Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac May 2018

Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac

Annual ADFSL Conference on Digital Forensics, Security and Law

Drones (also known as Unmanned Aerial Vehicles – UAVs) are a potential source of evidence in a digital investigation, partly due to their increasing popularity in our society. However, existing UAV/drone forensics generally rely on conventional digital forensic investigation guidelines such as those of ACPO and NIST, which may not be entirely fit-for-purpose. In this paper, we identify the challenges associated with UAV/drone forensics. We then explore and evaluate existing forensic guidelines, in terms of their effectiveness for UAV/drone forensic investigations. Next, we present our set of guidelines for UAV/drone investigations. Finally, we demonstrate how the proposed guidelines can be …


Thermal Removal Of Carbon Dioxide From The Atmosphere: Energy Requirements And Scaling Issues, Ted Von Hippel May 2018

Thermal Removal Of Carbon Dioxide From The Atmosphere: Energy Requirements And Scaling Issues, Ted Von Hippel

Publications

I conduct a systems-level study of direct air capture of CO2 using techniques from thermal physics. This system relies on a combination of an efficient heat exchanger, radiative cooling, and refrigeration, all at industrial scale and operated in environments at low ambient temperatures. While technological developments will be required for such a system to operate efficiently, those developments rest on a long history of refrigeration expertise and technology, and they can be developed and tested at modest scale. I estimate that the energy required to remove CO2 via this approach is comparable to direct air capture by other techniques. The …


Algal Biofuel: The Future Of Green Jet Fuel In Air Transportation, Rajee Olaganathan Apr 2018

Algal Biofuel: The Future Of Green Jet Fuel In Air Transportation, Rajee Olaganathan

Publications

The aviation industry is one of the major contributors for the greenhouse gases. As air travel has become inevitable in this modern era, and fossil fuel usage is not sustainable, it is essential to produce renewable fuel and commercialize it to reduce the greenhouse gas emissions. In order to produce an alternate aviation biofuel a lot of industrial and academic collaborations have been developed worldwide. The main concern of this collaborative research is to produce aviation biofuel from renewable resources with low environmental impacts, and which is sustainable at an economically viable price. This mini-review briefly discusses the biotechnological approaches …


Global Formulation And Control Of A Class Of Nonholonomic Systems, Muhammad Rehan Apr 2018

Global Formulation And Control Of A Class Of Nonholonomic Systems, Muhammad Rehan

Doctoral Dissertations and Master's Theses

This thesis study motion of a class of non-holonomic systems using geometric mechanics, that provide us an efficient way to formulate and analyze the dynamics and their temporal evolution on the configuration manifold. The kinematics equations of the system, viewed as a rigid body, are constrained by the requirement that the system maintain contact with the surface. They describe the constrained translation of the point of contact on the surface. In this thesis, we have considered three different examples with nonholonomic constraint i-e knife edge or pizza cutter, a circular disk rolling without slipping, and rolling sphere. For each example, …


Automated Man-In-The-Middle Attack Against Wi‑Fi Networks, Martin Vondráček, Jan Pluskal, Ondřej Ryšavý Mar 2018

Automated Man-In-The-Middle Attack Against Wi‑Fi Networks, Martin Vondráček, Jan Pluskal, Ondřej Ryšavý

Journal of Digital Forensics, Security and Law

Currently used wireless communication technologies suffer security weaknesses that can be exploited allowing to eavesdrop or to spoof network communication. In this paper, we present a practical tool that can automate the attack on wireless security. The developed package called wifimitm provides functionality for the automation of MitM attacks in the wireless environment. The package combines several existing tools and attack strategies to bypass the wireless security mechanisms, such as WEP, WPA, and WPS. The presented tool can be integrated into a solution for automated penetration testing. Also, a popularization of the fact that such attacks can be easily automated …


Experimental Investigation Of A New Spiral Wingtip, Naseeb Ahmed Siddiqui, Mohamed Aldeeb, Waqar Asrar, Erwin Sulaeman Mar 2018

Experimental Investigation Of A New Spiral Wingtip, Naseeb Ahmed Siddiqui, Mohamed Aldeeb, Waqar Asrar, Erwin Sulaeman

International Journal of Aviation, Aeronautics, and Aerospace

Experiments on the relative merits and demerits of slotted wingtips mimicking a bird’s primary feathers have been performed. The real emargination length of feather tips, their flexibility and curved shapes during cruise are considered in the present study. The experiments were performed at a Reynolds number of 3.7 x 105 on a symmetric flat plate half wing of aspect ratio 3. Lift, drag and pitching moments were measured using a six component aerodynamic balance. Four different shapes inspired by bird primary feathers have been analysed. The rigid curved tip performed the best increasing the L/D ratio by 20%. This …


Numerical Simulation Of Energy Localization In Dynamic Materials, Arkadi Berezovski, Mihhail Berezovski Feb 2018

Numerical Simulation Of Energy Localization In Dynamic Materials, Arkadi Berezovski, Mihhail Berezovski

Publications

Dynamic materials are artificially constructed in such a way that they may vary their characteristic properties in space or in time, or both, by an appropriate arrangement or control. These controlled changes in time can be provided by the application of an external (non-mechanical) field, or through a phase transition. In principle, all materials change their properties with time, but very slowly and smoothly. Changes in properties of dynamic materials should be realized in a short or quasi-nil time lapse and over a sufficiently large material region. Wave propagation is a characteristic feature for dynamic materials because it is also …


Effect Of Anthropometric Variability On Middle-Market Aircraft Seating, Tara C. Sriram Feb 2018

Effect Of Anthropometric Variability On Middle-Market Aircraft Seating, Tara C. Sriram

International Journal of Aviation, Aeronautics, and Aerospace

A middle-of-market aircraft, or MoMA, is defined as an aircraft capable of flying 180-250 passengers without refueling for 2,300-5,800 miles(~2,000-5,000 nautical miles). As the name suggests, middle-of-market aircraft are positioned in between the market segments served by narrow body (single-aisle) and wide body (twin-aisle) aircraft. This paper presents the findings of a study on the effect of anthropomorphic variability on economy class seating on middle-market aircraft currently in service. The study found that among 130 middle-market LOPAs, the mean seat pitch was greater for US airlines than for Asian airlines. Furthermore, the sampled Asian airlines had a higher preference …


Back Matter, Adfsl Feb 2018

Back Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, Adfsl Feb 2018

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Contents, Adfsl Feb 2018

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Computer Program, System, And Method For Observation And Communication For Mobile Settings, Mobile Applications, And Wearable Mobile Devices, Jibo He, Barbara Chaparro Jan 2018

Computer Program, System, And Method For Observation And Communication For Mobile Settings, Mobile Applications, And Wearable Mobile Devices, Jibo He, Barbara Chaparro

Publications

A system including at least first and second wearable mobile devices and optionally one or more smartphones or other computing devices for allowing a wearable mobile device wearer, an on-site observer, and a remote observer to research and test usability of products in mobile settings, mobile applications, mobile devices, and wearable mobile devices, desktop usability settings, and other settings and devices. The devices nm a software application for generating first-person video and third-person video, transmitting the video to the other devices, marking the videos with time stamps, and allowing the remote observer to send messages and other information to the …