Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- NextGen (2)
- Accessing secured wireless networks (1)
- Aerodynamics; Biomimetic Wing Tips; Wind tunnel force balance (1)
- Aerospace and defense industry (1)
- Aerospace industry (1)
-
- Air Traffic Control (1)
- Aircraft seating (1)
- Anthropometry (1)
- Anti-slosh device (1)
- Aviation Biofuel (1)
- Aviation Meteorology (1)
- Aviation Weather (1)
- Aviation biofuel (1)
- Aviation security (1)
- Bacteria (1)
- Big Data (1)
- Big forensic data (1)
- Bio-Jet Fuel (1)
- Biofuel (1)
- Book Review; International Aviation (1)
- Carbon dioxide (1)
- Collaborative robot (1)
- Cybersecurity (1)
- Density Altitude (1)
- Detection method (1)
- Dictionary personalization (1)
- Distribution of fuel (1)
- Dynamic Materials (1)
- Economy class (1)
- Education (1)
- Publication
- Publication Type
Articles 1 - 30 of 38
Full-Text Articles in Physical Sciences and Mathematics
Vortex Structures Inside Spherical Mesoscopic Superconductor Plus Magnetic Dipole, A. Ludu
Vortex Structures Inside Spherical Mesoscopic Superconductor Plus Magnetic Dipole, A. Ludu
Publications
We investigate the existence of multivortex states in a superconducting mesoscopic sphere with a magnetic dipole placed at the center. We obtain analytic solutions for the order parameter inside the sphere through the linearized Ginzburg-Landau (GL) model, coupled with mixed boundary conditions, and under regularity conditions and decoupling coordinates approximation. The solutions of the linear GL equation are obtained in terms of Heun double confluent functions, in dipole coordinates symmetry. The analyticity of the solutions and the associated eigenproblem are discussed thoroughly. We minimize the free energy for the fully nonlinear GL system by using linear combinations of linear analytic …
Challenges For Flight Instructors Teaching Weather Information, Robert Thomas, Thomas A. Guinn
Challenges For Flight Instructors Teaching Weather Information, Robert Thomas, Thomas A. Guinn
Aviation Weather Training Research
- Flight Instructors face a challenge when teaching/learning weather information
- Multiple overlapping resources for aviation weather
- AC takes longer timeframe to update –problem for quick updates of information
Assessing Ga Pilots' Preflight Weather Planning Mental Models, Yolanda Ortiz, Beth Blickensderfer, Thomas A. Guinn
Assessing Ga Pilots' Preflight Weather Planning Mental Models, Yolanda Ortiz, Beth Blickensderfer, Thomas A. Guinn
General Aviation Weather Display Interpretation
Purpose, To assess GA Pilots' ability to:
- Obtain the Appropriate Weather Information
- Interpret the Data
- Apply the Information to a Given Flight Route
Interpreting Aviation Weather Products: Follow-Up Study With Aopa Members, Beth Blickensderfer, Thomas A. Guinn, Thomas Bob, Jayde King, Yolanda Ortiz, Nick Defilippis, Quirijn Berendschot, Jacqueline Mcsorley
Interpreting Aviation Weather Products: Follow-Up Study With Aopa Members, Beth Blickensderfer, Thomas A. Guinn, Thomas Bob, Jayde King, Yolanda Ortiz, Nick Defilippis, Quirijn Berendschot, Jacqueline Mcsorley
General Aviation Weather Display Interpretation
Purpose
- Use the questions we developed in Phase I
- Include pilots that are more representative of GA (age, flight hours/experience); Collaborate with AOPA
- Examine: Knowledge about aviation weather products; Differences between levels of flight certificate and/or ratings
Aviation Weather Education: Challenges Using Current Faa Guidance, Thomas A. Guinn, Robert Thomas
Aviation Weather Education: Challenges Using Current Faa Guidance, Thomas A. Guinn, Robert Thomas
Aviation Weather Training Research
Observed Challenges
- Incorrect product information
- Guidance not keeping pace with new products
- Multiple formats of same product
- Potentially unnecessary information
- Missing product information
- Limited focus on interpretation
A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman
A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman
Journal of Digital Forensics, Security and Law
Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are …
Floating Active Baffles, System And Method Of Slosh Damping Comprising The Same, Dae Won Kim, Rudy L. Baum, Vijay Santhanam, Balaji Sivasubramanian, Sathya Gangadharan
Floating Active Baffles, System And Method Of Slosh Damping Comprising The Same, Dae Won Kim, Rudy L. Baum, Vijay Santhanam, Balaji Sivasubramanian, Sathya Gangadharan
Publications
This disclosure provides a system for damping slosh of a liquid within a tank, a baffle for use in the system, and a method of damping slosh using the system. The system includes a plurality of baffles. Each baffle has a body configured to substantially float upon the liquid. Each baffle also has an activation material received along at least a portion of the body. The activation material is magnetically reactive provided in a quantity sufficient to enable the body to be manipulated in the presence of a magnetic field (M). The system further includes an actuator configured to provide …
Quantitative Jeopardy Feud, Jonathan M. Gallimore
Quantitative Jeopardy Feud, Jonathan M. Gallimore
MSF 600 PR - Gallimore - Fall 2018
This activity - Quantitative Jeopardy Feud - is a method for using a game as a final exam.
Suas: Cybersecurity Threats, Vulnerabilities, And Exploits, Philip Craiger, Gary Kessler, William Rose
Suas: Cybersecurity Threats, Vulnerabilities, And Exploits, Philip Craiger, Gary Kessler, William Rose
National Training Aircraft Symposium (NTAS)
The FAA predicts that purchases of hobbyist small unmanned aerial systems (sUAS) will grow from 1.9 million in 2016 to 4.3 million by 2020, and commercial sUAS to increase from 600,000 in 2016 to 2.7 million by 2020. sUAS, often referred to as 'drones,' are comprised of aeronautical hardware, a CPU, RAM, onboard storage, radio frequency communications, sensors, a camera, and a controller used by the pilot-in-command (PIC). Some have argued that a sUAS is essentially a flying computer. As such, sUAS are sometimes susceptible to many of the types of attacks that are often used on PC-based computers attached …
Full Field Computing For Elastic Pulse Dispersion In Inhomogeneous Bars, A. Berezovski, R. Kolman, M. Berezovski, D. Gabriel, V. Adamek
Full Field Computing For Elastic Pulse Dispersion In Inhomogeneous Bars, A. Berezovski, R. Kolman, M. Berezovski, D. Gabriel, V. Adamek
Publications
In the paper, the finite element method and the finite volume method are used in parallel for the simulation of a pulse propagation in periodically layered composites beyond the validity of homogenization methods. The direct numerical integration of a pulse propagation demonstrates dispersion effects and dynamic stress redistribution in physical space on example of a one-dimensional layered bar. Results of numerical simulations are compared with analytical solution constructed specifically for the considered problem. Analytical solution as well as numerical computations show the strong influence of the composition of constituents on the dispersion of a pulse in a heterogeneous bar and …
Book Review: Fundamentals Of International Aviation, Alan Bender
Book Review: Fundamentals Of International Aviation, Alan Bender
International Journal of Aviation, Aeronautics, and Aerospace
Not applicable.
Contents, Adfsl
Contents, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Front Matter, Adfsl
Front Matter, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth
Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth
Annual ADFSL Conference on Digital Forensics, Security and Law
Data Protection and Computer Forensics/Anti-Forensics has now become a critical area of concern for organizations. A key element to this is how data is sanitized at end of life. In this paper we explore Hybrid Solid State Hybrid Drives (SSHD) and the impact that various Computer Forensics and Data Recovery techniques have when performing data erasure upon a SSHD.
Knowledge Expiration In Security Awareness Training, Tianjian Zhang
Knowledge Expiration In Security Awareness Training, Tianjian Zhang
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle
Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle
Annual ADFSL Conference on Digital Forensics, Security and Law
In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of LSB image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. The “CounterSteg” software allows detailed analysis and comparison of both the original cover image and any modified image, using sophisticated bit- and color-channel visual depiction graphics. In certain cases, the steganographic software used for message transmission can be identified by the forensic analysis of LSB and other changes in the payload image. The paper demonstrates usage and typical …
Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba
Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba
Annual ADFSL Conference on Digital Forensics, Security and Law
Cloud computing has revolutionized the methods by which digital data is stored, processed, and transmitted. It is providing users with data storage and processing services, enabling access to resources through multiple devices. Although organizations continue to embrace the advantages of flexibility and scalability offered by cloud computing, insider threats are becoming a serious concern as cited by security researchers. Insiders can use authorized access to steal sensitive information, calling for the need for an investigation. This concept paper describes research in progress towards developing a Neo4j graph database tool to enhance client forensics. The tool, with a Python interface, allows …
Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta
Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta
Annual ADFSL Conference on Digital Forensics, Security and Law
Enterprises are facing an unprecedented risk of security incidents due to the influx of emerging technologies, like smartphones and wearables. Most of the current Mobile security systems are not maturing in pace with technological advances. They lack the ability to learn and adapt from the past knowledge base. In the case of a security incident, enterprises find themselves underprepared for the lack of evidence and data. The systems are not designed to be forensic ready. There is a need for automated security analysis and forensically ready solution, which can learn and continuously adapt to new challenges, improve efficiency and productivity …
Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac
Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac
Annual ADFSL Conference on Digital Forensics, Security and Law
Drones (also known as Unmanned Aerial Vehicles – UAVs) are a potential source of evidence in a digital investigation, partly due to their increasing popularity in our society. However, existing UAV/drone forensics generally rely on conventional digital forensic investigation guidelines such as those of ACPO and NIST, which may not be entirely fit-for-purpose. In this paper, we identify the challenges associated with UAV/drone forensics. We then explore and evaluate existing forensic guidelines, in terms of their effectiveness for UAV/drone forensic investigations. Next, we present our set of guidelines for UAV/drone investigations. Finally, we demonstrate how the proposed guidelines can be …
Thermal Removal Of Carbon Dioxide From The Atmosphere: Energy Requirements And Scaling Issues, Ted Von Hippel
Thermal Removal Of Carbon Dioxide From The Atmosphere: Energy Requirements And Scaling Issues, Ted Von Hippel
Publications
I conduct a systems-level study of direct air capture of CO2 using techniques from thermal physics. This system relies on a combination of an efficient heat exchanger, radiative cooling, and refrigeration, all at industrial scale and operated in environments at low ambient temperatures. While technological developments will be required for such a system to operate efficiently, those developments rest on a long history of refrigeration expertise and technology, and they can be developed and tested at modest scale. I estimate that the energy required to remove CO2 via this approach is comparable to direct air capture by other techniques. The …
Algal Biofuel: The Future Of Green Jet Fuel In Air Transportation, Rajee Olaganathan
Algal Biofuel: The Future Of Green Jet Fuel In Air Transportation, Rajee Olaganathan
Publications
The aviation industry is one of the major contributors for the greenhouse gases. As air travel has become inevitable in this modern era, and fossil fuel usage is not sustainable, it is essential to produce renewable fuel and commercialize it to reduce the greenhouse gas emissions. In order to produce an alternate aviation biofuel a lot of industrial and academic collaborations have been developed worldwide. The main concern of this collaborative research is to produce aviation biofuel from renewable resources with low environmental impacts, and which is sustainable at an economically viable price. This mini-review briefly discusses the biotechnological approaches …
Global Formulation And Control Of A Class Of Nonholonomic Systems, Muhammad Rehan
Global Formulation And Control Of A Class Of Nonholonomic Systems, Muhammad Rehan
Doctoral Dissertations and Master's Theses
This thesis study motion of a class of non-holonomic systems using geometric mechanics, that provide us an efficient way to formulate and analyze the dynamics and their temporal evolution on the configuration manifold. The kinematics equations of the system, viewed as a rigid body, are constrained by the requirement that the system maintain contact with the surface. They describe the constrained translation of the point of contact on the surface. In this thesis, we have considered three different examples with nonholonomic constraint i-e knife edge or pizza cutter, a circular disk rolling without slipping, and rolling sphere. For each example, …
Automated Man-In-The-Middle Attack Against Wi‑Fi Networks, Martin Vondráček, Jan Pluskal, Ondřej Ryšavý
Automated Man-In-The-Middle Attack Against Wi‑Fi Networks, Martin Vondráček, Jan Pluskal, Ondřej Ryšavý
Journal of Digital Forensics, Security and Law
Currently used wireless communication technologies suffer security weaknesses that can be exploited allowing to eavesdrop or to spoof network communication. In this paper, we present a practical tool that can automate the attack on wireless security. The developed package called wifimitm provides functionality for the automation of MitM attacks in the wireless environment. The package combines several existing tools and attack strategies to bypass the wireless security mechanisms, such as WEP, WPA, and WPS. The presented tool can be integrated into a solution for automated penetration testing. Also, a popularization of the fact that such attacks can be easily automated …
Experimental Investigation Of A New Spiral Wingtip, Naseeb Ahmed Siddiqui, Mohamed Aldeeb, Waqar Asrar, Erwin Sulaeman
Experimental Investigation Of A New Spiral Wingtip, Naseeb Ahmed Siddiqui, Mohamed Aldeeb, Waqar Asrar, Erwin Sulaeman
International Journal of Aviation, Aeronautics, and Aerospace
Experiments on the relative merits and demerits of slotted wingtips mimicking a bird’s primary feathers have been performed. The real emargination length of feather tips, their flexibility and curved shapes during cruise are considered in the present study. The experiments were performed at a Reynolds number of 3.7 x 105 on a symmetric flat plate half wing of aspect ratio 3. Lift, drag and pitching moments were measured using a six component aerodynamic balance. Four different shapes inspired by bird primary feathers have been analysed. The rigid curved tip performed the best increasing the L/D ratio by 20%. This …
Numerical Simulation Of Energy Localization In Dynamic Materials, Arkadi Berezovski, Mihhail Berezovski
Numerical Simulation Of Energy Localization In Dynamic Materials, Arkadi Berezovski, Mihhail Berezovski
Publications
Dynamic materials are artificially constructed in such a way that they may vary their characteristic properties in space or in time, or both, by an appropriate arrangement or control. These controlled changes in time can be provided by the application of an external (non-mechanical) field, or through a phase transition. In principle, all materials change their properties with time, but very slowly and smoothly. Changes in properties of dynamic materials should be realized in a short or quasi-nil time lapse and over a sufficiently large material region. Wave propagation is a characteristic feature for dynamic materials because it is also …
Effect Of Anthropometric Variability On Middle-Market Aircraft Seating, Tara C. Sriram
Effect Of Anthropometric Variability On Middle-Market Aircraft Seating, Tara C. Sriram
International Journal of Aviation, Aeronautics, and Aerospace
A middle-of-market aircraft, or MoMA, is defined as an aircraft capable of flying 180-250 passengers without refueling for 2,300-5,800 miles(~2,000-5,000 nautical miles). As the name suggests, middle-of-market aircraft are positioned in between the market segments served by narrow body (single-aisle) and wide body (twin-aisle) aircraft. This paper presents the findings of a study on the effect of anthropomorphic variability on economy class seating on middle-market aircraft currently in service. The study found that among 130 middle-market LOPAs, the mean seat pitch was greater for US airlines than for Asian airlines. Furthermore, the sampled Asian airlines had a higher preference …
Back Matter, Adfsl
Back Matter, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Front Matter, Adfsl
Front Matter, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Contents, Adfsl
Contents, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Computer Program, System, And Method For Observation And Communication For Mobile Settings, Mobile Applications, And Wearable Mobile Devices, Jibo He, Barbara Chaparro
Computer Program, System, And Method For Observation And Communication For Mobile Settings, Mobile Applications, And Wearable Mobile Devices, Jibo He, Barbara Chaparro
Publications
A system including at least first and second wearable mobile devices and optionally one or more smartphones or other computing devices for allowing a wearable mobile device wearer, an on-site observer, and a remote observer to research and test usability of products in mobile settings, mobile applications, mobile devices, and wearable mobile devices, desktop usability settings, and other settings and devices. The devices nm a software application for generating first-person video and third-person video, transmitting the video to the other devices, marking the videos with time stamps, and allowing the remote observer to send messages and other information to the …