Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Physical Sciences and Mathematics

A Comparison Of Laboratory And Vulnerability Evaluation Methods For The Testing Security Equipment, Benjamin Beard, David J. Brooks Sep 2014

A Comparison Of Laboratory And Vulnerability Evaluation Methods For The Testing Security Equipment, Benjamin Beard, David J. Brooks

David J Brooks Dr.

A facility wide security system cannot be tested without causing disruption or creating vulnerabilities within the system. To overcome this issue, individual components or equipment may be evaluated to a priori performance standard. The two common approaches to security equipment evaluations are vulnerability attacks and laboratory testing. Laboratory testing of security equipment can reduce the costs and time associated with evaluations, as well as limiting the subjectivity of the tests. Vulnerability attacks will produce more realistic evaluation results of the whole security system; nevertheless, the data obtained is dependent on the physical attributes and skill of the attackers. This study …


Assessing Vulnerabilities Of Biometric Readers Using An Applied Defeat Evaluation Methodology, David Brooks Sep 2014

Assessing Vulnerabilities Of Biometric Readers Using An Applied Defeat Evaluation Methodology, David Brooks

David J Brooks Dr.

Access control systems using biometric identification readers are becoming common within critical infrastructure and other high security applications. There is a perception that biometric, due to their ability to identify and validate the user, are more secure. However, biometric systems are vulnerable to many categories of attack vectors and there has been restricted research into such defeat vulnerabilities. This study expands on a past article (Brooks, 2009) that presented a defeat evaluation methodology applied to high-security biometric readers. The defeat methodology is represented, but applied to both fingerprint and back-of-hand biometric readers. Defeat evaluation included both physical and technical integrity …


Detector Prototype Evaluation At Spallation Neutron Sources, Robert W. Pattie Jr. Jul 2014

Detector Prototype Evaluation At Spallation Neutron Sources, Robert W. Pattie Jr.

Robert W. Pattie Jr.

No abstract provided.


Evaluation Of Encapsulating Coatings On The Performance Of Polypyrrole Actuators, Sina Naficy, Nicholas Stoboi, Philip G. Whitten, Geoffrey M. Spinks, Gordon G. Wallace Mar 2014

Evaluation Of Encapsulating Coatings On The Performance Of Polypyrrole Actuators, Sina Naficy, Nicholas Stoboi, Philip G. Whitten, Geoffrey M. Spinks, Gordon G. Wallace

Gordon Wallace

Conjugated polymer actuators are electroactive materials capable of generating force and movement in response to an applied external voltage. Many potential biomedical and industrial applications require these actuators to operate in a liquid environment. However, immersion of uncoated conducting polymer actuators in non-electrolyte liquids greatly reduces their operating lifetime. Here, we demonstrate the use of spray coating as an effective and simple method to encapsulate polypyrrole (PPy) tri-layer bending actuators. Poly(styrene-b-isobutylene-b-styrene) (SIBS) was used as an encapsulating, compliant spray coating on PPy actuators. A significant enhancement in actuator lifetime in both air and water was observed by encapsulating the actuators. …