Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

2018

Journal

Discipline
Institution
Keyword
Publication

Articles 1 - 30 of 1783

Full-Text Articles in Physical Sciences and Mathematics

Forensic Analysis Of A Crash-Damaged Cheerson Cx-20 Auto Pathfinder Drone, Ian N. Mcateer, Peter Hannay, Muhammad I. Malik, Zubair Baig Dec 2018

Forensic Analysis Of A Crash-Damaged Cheerson Cx-20 Auto Pathfinder Drone, Ian N. Mcateer, Peter Hannay, Muhammad I. Malik, Zubair Baig

Journal of Digital Forensics, Security and Law

Long gone are the days when Unmanned Aerial Vehicles (UAVs) and drones (multirotor UAVs) were the exclusive domain of the military for surveillance or tactical strike purposes. For relatively little money mainly due to high-tech progression in microprocessor design, anyone can now purchase a drone with GNSS-tracking capabilities and can support a live high-resolution video feed to its flight controller. The global population of drones has sky- rocketed in recent years as this new technology has been embraced for both its recreational and commercial applications. However, the more nefarious members of society have also recognized the potential for using drones …


Masthead Dec 2018

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Cover Dec 2018

Cover

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Dec 2018

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Dec 2018

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Table Of Contents Dec 2018

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot Dec 2018

Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot

Journal of Digital Forensics, Security and Law

This paper is designed to expose vulnerabilities within the US electoral system, the use of cyberspace to exploit weaknesses within the information assurance strategies of the democratic and republican party organizations, and deficiencies within the social media communications and voting machine exploits. A brief history of discriminatory practices in voting rights and voting access will be set as the foundation for the argument that the system is vulnerable in the cyber age, and the need for reform at the local, state and national levels will be emphasized. The possibility of a foreign nation-state influencing the outcome of an election by …


Model Matematis Predator-Prey Tanaman Padi, Hama Penggerek Batang, Tikus, Dan Wereng Batang Coklat Di Karawang, Tesa Nur Padilah, Betha Nurina Sari, Hannie Hannie Dec 2018

Model Matematis Predator-Prey Tanaman Padi, Hama Penggerek Batang, Tikus, Dan Wereng Batang Coklat Di Karawang, Tesa Nur Padilah, Betha Nurina Sari, Hannie Hannie

PYTHAGORAS : Jurnal Matematika dan Pendidikan Matematika

Karawang merupakan salah satu pusat penanaman padi di Pulau Jawa. Keberhasilan panen dapat terganggu oleh adanya organisme pengganggu tumbuhan (OPT) sehingga dapat mengancam target swasembada beras. Hubungan antara tanaman padi dengan OPT dapat dibentuk menjadi suatu model matematis yaitu model predator-prey. Untuk itu, penelitian ini bertujuan untuk menganalisis model matematis predator-prey tanaman padi dan OPT. Predator (pemangsa) adalah makhluk hidup yang memakan mangsa (prey). Model predator-prey antara tanaman padi dengan OPT yang dibahas adalah model tiga predator yaitu hama penggerek batang, tikus, dan wereng batang coklat dengan prey yaitu padi. Pertumbuhan padi mengikuti …


Optimasi Perencanaan Produksi Bahan Bakar Minyak Dengan Fungsi Kendala Fuzzy Menggunakan Metode Goal Programming, Wiwiet Widyaningsih, Sri Andayani Dec 2018

Optimasi Perencanaan Produksi Bahan Bakar Minyak Dengan Fungsi Kendala Fuzzy Menggunakan Metode Goal Programming, Wiwiet Widyaningsih, Sri Andayani

PYTHAGORAS : Jurnal Matematika dan Pendidikan Matematika

Dalam perencanaan produksi PT. Pertamina (Persero) TBBM Boyolali, perusahaan tersebut hanya mendistribusikan BBM sesuai dengan permintaan SPBU tanpa melakukan perhitungan matematis apakah pendapatan yang diperoleh sudah optimal dengan semua faktor dan kendala yang ada, seperti harga setiap jenis BBM, jam kerja mesin pengisian BBM di New Gantry System (NGS), moda transport mobil tangki, dan tingkat keselamatan mobil tangki. Untuk itu, penelitian ini bertujuan untuk melakukan optimasi perencanaan produksi BBM menggunakan metode goal programming agar perusahaan dapat memperoleh pendapatan yang maksimal dengan memperhatikan faktor-faktor dan kendala yang ada. Metode goal programming merupakan perluasan dari linear programming yang dapat menyelesaikan optimasi dengan …


Alat Ukur Berat Badan, Tinggi Badan Dan Suhu Badan Di Posyandu Berbasis Android, Tri Hamdani Agung Cahyono, Eko Agus Suprayitno Dec 2018

Alat Ukur Berat Badan, Tinggi Badan Dan Suhu Badan Di Posyandu Berbasis Android, Tri Hamdani Agung Cahyono, Eko Agus Suprayitno

Elinvo (Electronics, Informatics, and Vocational Education)

Perkembangan ilmu pengetahuan dan teknologi semakin meningkat terutama di bidang elektronika. Hal tersebut menginspirasi peneliti untuk membuat alat yang bersifat ekonomis dan efisien, sehingga mempunyai fungsi utama yaitu untuk mempermudah suatu pekerjaan kader posyandu. Sistem Alat ukur berat badan, tinggi badan dan suhu badan di posyandu berbasis android merupakan pengembangan dari peneliti sebelumnya yang didukung dengan tampilan data angka yang muncul di android untuk mempermudah kader posyandu dalam melihat atau mengamati data angka pada bayi di posyandu. Perancangan alat terdiri dari arduino uno sebagai pengolah data, sensor load cell (berat), sensor ultrasonik (tinggi) dan sensor ds18b20 (suhu) kemudian data angka …


Video Moving Surveillance Yang Terintegrasi Youtube Menggunakan Raspberry Pi 3, Pipit Utami, Abdul Aziz Sidiq Tri Putra, Djoko Santoso, Nuryake Fajaryati, Bonita Destiana, Mohd Erfy Ismail Dec 2018

Video Moving Surveillance Yang Terintegrasi Youtube Menggunakan Raspberry Pi 3, Pipit Utami, Abdul Aziz Sidiq Tri Putra, Djoko Santoso, Nuryake Fajaryati, Bonita Destiana, Mohd Erfy Ismail

Elinvo (Electronics, Informatics, and Vocational Education)

Static CCTV facilities in class need to be optimized in classroom learning, especially in recording learning activities as implementation of learning in the 21st century and strategic steps to face the Industrial Revolution 4.0. Educators need to play a role in utilizing CCTV in learning. This article presents the development of YouTube Integrated Video Moving Surveillance devices using Raspberry Pi 3. The development stages consist of analysis, design, development and evaluation. The analysis shows that: (1) the limitations of CCTV motion are followed up with the addition of motorcycles; (2) limited access to video recording data is followed up by …


Perancangan Strategis Sistem Informasi Di Smk Diponegoro 1 Jakarta, Iwan Supriyantoko Dec 2018

Perancangan Strategis Sistem Informasi Di Smk Diponegoro 1 Jakarta, Iwan Supriyantoko

Elinvo (Electronics, Informatics, and Vocational Education)

SMK Diponegoro 1 Jakarta merupakan lembaga pendidikan pada Yayasan Al-Hidayah Jakarta yang berada di Jakarta Timur. Sebagai lembaga pendidikan yang tergolong lama, SMK Diponegoro 1 Jakarta berkembang dengan pesat, namum belum menerapkan Sistem Informasi dan Teknologi Informasi secara optimal dalam proses bisnisnya dan belum memiliki sebuah portofolio perencanaan strategis Sistem Informasi. Sehingga dipandang perlu dalam membuat sebuah sistem informasi strategis, guna memberikan unggulan dalam persaingan bisnisnya. Perencanaan strategis sistem informasi menjadi salah satu kunci dalam menerapkan sistem informasi dan teknologi informasi pada kegiatan bisnis. Perencanaan strategis yang tepat dapat mendukung rencana dan pengembangan bisnis organisasi. Bentuk perencanaan strategis yang akan …


Rancang Bangun Lampu Penerangan Jalan Umum (Pju) Menggunakan Solar Panel Berbasis Android (Aplikasi Di Jalan Parkiran Kampus 2 Umsida), Sugik Rizky Hikmawan, Eko Agus Suprayitno Dec 2018

Rancang Bangun Lampu Penerangan Jalan Umum (Pju) Menggunakan Solar Panel Berbasis Android (Aplikasi Di Jalan Parkiran Kampus 2 Umsida), Sugik Rizky Hikmawan, Eko Agus Suprayitno

Elinvo (Electronics, Informatics, and Vocational Education)

Data from the Directorate General of Electricity and Energy Development in 1997, the installed capacity of solar electricity in Indonesia reaches 0.88 MW from the available potential of 1.2 x 109 MW. Therefore, this research is made of solar street based lighting design (PJU) as alternative energy that cheap and economical. The work system on the street lighting lighting (PJU) is controlled by an Arduino microcontroller. And use solar panel as source of voltage and light sensor. The light sensor will work and read the intensity of sunlight. During the day the sensor provides input to the arduino so that …


Swot Analysis And Tows Matrix E-Government On Tana Tidung City Of Kalimantan Utara, Rudy Rudy, Abdul Muis Prasetia Dec 2018

Swot Analysis And Tows Matrix E-Government On Tana Tidung City Of Kalimantan Utara, Rudy Rudy, Abdul Muis Prasetia

Elinvo (Electronics, Informatics, and Vocational Education)

ABSTRAct

Information and Communication Technology (ICT) can improve the speed of information delivery, efficiency, global reach and transparency. One of the efforts to realize good corporate governance (GCG) governance in the era of regional autonomy is to use information and communication technology or popularly called e-Government. The implementation of e-Government the need for master plan information technology as a guide in the integration of information technology in Local Government, e-Government implementation is expected to help improve interaction between government, community and business, so as to encourage political and economic development. In this paper presents the determination of e-Government policy strategy …


Accounting For The Environmental Impacts Associated With Residual Products In A Comparative Life Cycle Assessment Of Systems With Multiple Products, Yasuhiro Fukushima, Satoshi Ohara Dec 2018

Accounting For The Environmental Impacts Associated With Residual Products In A Comparative Life Cycle Assessment Of Systems With Multiple Products, Yasuhiro Fukushima, Satoshi Ohara

Journal of Environmental Science and Sustainable Development

In many production systems, multiple products are interactively produced. Therefore, an innovative technology that leads to changes in parts of such systems may influence both the unit environmental impacts associated with the products, and the productivity of multiple products. To compare alternative technologies on a common basis, we often account for the avoided or supplemented emissions associated with the residual (i.e. surplus and supplemented) products produced from within the considered system boundary. In this study, using an example of an innovative technology envisioned for use in sugar mills, we first demonstrate how comparisons can be made when the systems vary …


The Impact Of The Implementation Of Temporary Import Procedure On Electronic Products: Input--Output Analysis, Dedi Abdul Hadi, Toru Matsumoto Dec 2018

The Impact Of The Implementation Of Temporary Import Procedure On Electronic Products: Input--Output Analysis, Dedi Abdul Hadi, Toru Matsumoto

Journal of Environmental Science and Sustainable Development

Currently, imported electronic products enter the Indonesian market using general import procedures, where the importer has to pay the import duty and taxes in full rate. In the absence of proper recycling systems, the electronic products that have reached their end of life and those are no longer used, end up in the landfills. Some researchers found hazardous materials inside the electronic products that could contaminate water, soil and air. Therefore, another strategy is needed to avoid negative effects on the environment. The Temporary import policy is one of the import procedures under Customs administration control, which states that goods …


Waste Reduction Through Integrated Waste Management Modeling At Mustika Residence (Tangerang), Hendro Putra Johannes Dec 2018

Waste Reduction Through Integrated Waste Management Modeling At Mustika Residence (Tangerang), Hendro Putra Johannes

Journal of Environmental Science and Sustainable Development

In Indonesia, there are classic issues about waste that are highlighted due to the country’s critical conditions. Uncontrolled population growth and regional development have led to massive waste production. One popular practice in waste management is located at integrated waste management site (TPST). This practice has been implemented successfully by TPST Mustika Iklhas, a small community operation in Tangerang. Though different from previous operations, its success is achieved by active community participation, far away from government intervention. This study looks at management practices in TPST Mustika Ikhlas. The method used to address real and complex problems is called system dynamics. …


The Welfare Of Elderly People In Rural West Java: Economy, Health And Vernacular Care, Kosuke Mizuno, Ekawati Sri Wahyuni, Taizo Wada, Kozo Matsubayashi Dec 2018

The Welfare Of Elderly People In Rural West Java: Economy, Health And Vernacular Care, Kosuke Mizuno, Ekawati Sri Wahyuni, Taizo Wada, Kozo Matsubayashi

Journal of Environmental Science and Sustainable Development

The universal health social security program in Indonesia began in 2014, and as of the present day, many people are now covered by it. However, many weaknesses in the system have been pointed out. Significantly, many people do not possess the necessary health cards to take advantage of the program due to the complicated process one must go through in order to obtain them. Even now, 60 million people have not joined the program. Many people do not rely solely on the universal social security program but may be supported primarily or additionally by the vernacular care system, whereby support …


When Lca Applies To Health Service Industry, Rr. Anggun Paramita Djati, Sherafina Reni Cahayanti, Ellyna Chairani, Raldi H. Koestoer, Djoko M. Hartono Dec 2018

When Lca Applies To Health Service Industry, Rr. Anggun Paramita Djati, Sherafina Reni Cahayanti, Ellyna Chairani, Raldi H. Koestoer, Djoko M. Hartono

Journal of Environmental Science and Sustainable Development

The health service industry involves activities that provide medical services (hospital), manufacture of medical equipment or drugs, and medical insurance services. Options of research methods to measure the impact of services on environmental aspects are available. One among which is life cycle analysis (LCA), the recently popular practice in Indonesia. This paper attempts to explore whether LCA could be fitted to the health service industry. A literature review would help in procuring related references from various publications accompanied by several research results and related studies. For describing the application of LCA in hospitals, several articles were collected, which were later …


Table Of Contents Dec 2018

Table Of Contents

Journal of the South Carolina Academy of Science

No abstract provided.


From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord Dec 2018

From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord

Journal of Cybersecurity Education, Research and Practice

Welcome to the Fall 2018 issue of the Journal of Cybersecurity Education, Research, and Practice (JCERP). On behalf of the editorial team, we thank you for taking the time to read this issue and strongly encourage you to submit an article for consideration in an upcoming edition.


Using A Game To Improve Phishing Awareness, Patrickson Weanquoi, Jaris Johnson, Jinghua Zhang Dec 2018

Using A Game To Improve Phishing Awareness, Patrickson Weanquoi, Jaris Johnson, Jinghua Zhang

Journal of Cybersecurity Education, Research and Practice

Cybersecurity education has become increasingly critical as we spend more of our everyday lives online. Research shows that college students are mostly unaware of the many online dangers. To teach students about cybersecurity using their preferred medium, gaming, we developed an educational 2D game called “Bird’s Life” that aims to teach college students, as well as general interest individuals, about phishing. Players will come to understand phishing attacks and how to avoid them in real-world scenarios through a fun gaming context. The game can be deployed to multiple platforms such as PC, web, and mobile devices. To measure the effect …


Using Case Studies To Teach Cybersecurity Courses, Yu Cai Dec 2018

Using Case Studies To Teach Cybersecurity Courses, Yu Cai

Journal of Cybersecurity Education, Research and Practice

This paper introduces a holistic and case-analysis teaching model by integrating case studies into cybersecurity courses. The proposed model starts by analyzing real-world cyber breaches. Students look into the details of these attacks and learn how these attacks took place from the beginning to the end. During the process of case analysis, a list of security topics reflecting different aspects of these breaches is introduced. Through guided in-class discussion and hands-on lab assignments, student learning in lecture will be reinforced. Overall, the entire cybersecurity course is driven by case studies. The proposed model is great for teaching cybersecurity. First, the …


An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf Dec 2018

An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf

Journal of Cybersecurity Education, Research and Practice

This work seeks to answer the question: Does faculty cybersecurity knowledge gained from teaching and research transfer to other IT units in the university? Specifically, do colleges and universities that excel in cybersecurity teaching and research have more secure websites? This work explores a unique setting where the knowledge of the source and recipient are both directly related and observable without outside intervention. Our study employed data from 591 U.S. colleges and universities, the National Centers of Academic Excellence (CAE) program, accepted paper data from the ACM Conference on Computer and Communications Security (CCS) and the IEEE Symposium on Security …


Find, Process, And Share: An Optimal Control In The Vidale-Wolfe Marketing Model, Michael C. Barg Dec 2018

Find, Process, And Share: An Optimal Control In The Vidale-Wolfe Marketing Model, Michael C. Barg

CODEE Journal

The Vidale-Wolfe marketing model is a first-order, linear, non-homogeneous ordinary differential equation (ODE) where the forcing term is proportional to advertising expenditure. With an initial response in sales as the initial condition, the solution of the initial value problem is straightforward for a first undergraduate ODE course. The model serves as an excellent example of many relevant topics for those students whose interests lie in economics, finance, or marketing. Its inclusion in the curriculum is particularly rewarding at an institution without a physics program. The model is not new, but it was novel to us when a group of students …


Constructions Of Noble Metal Nanocrystals With Specific Crystal Facets And High Surface Area, Qiao-Li Chen, Hui-Qi Li, Ya-Qi Jiang, Zhao-Xiong Xie Dec 2018

Constructions Of Noble Metal Nanocrystals With Specific Crystal Facets And High Surface Area, Qiao-Li Chen, Hui-Qi Li, Ya-Qi Jiang, Zhao-Xiong Xie

Journal of Electrochemistry

Noble metal nanocrystals (NCs) have widespread applications in catalysis. Their catalytic performances are strongly related to the surface structures while the atomic utilization efficiency of noble metal is considerably correlated with the surface area. Thus, advantages of both specific surface structure and large surface area are highly required to show off simultaneously so as to optimize the catalytic performance and decrease the usage of noble metal. However, it seems that the two advantages are incompatible with each other in one NC since it is difficult for small NCs to keep their specific facets, while NCs with specific surface structure usually …


Voltage Distribution Of Self-Humidifying Air-Cooled Pemfc, Kai-Feng Tan, Wei-Rong Chen, Ming Han, Xue-Xia Zhang Dec 2018

Voltage Distribution Of Self-Humidifying Air-Cooled Pemfc, Kai-Feng Tan, Wei-Rong Chen, Ming Han, Xue-Xia Zhang

Journal of Electrochemistry

In this work, the self-adaptive characteristics of self-humidifying air-cooled PEMFC stack was investigated. The performance and the unit-cell voltage distribution of the stack were measured and analyzed through the unit-cell I-V curve fitting. The operating conditions for this experimental study were set as follows: hydrogen pressure at the anode was 2 bar, the fan power used for the reactant oxygen feed and stack cooling was at 0.3 W, and the duration and time gap of water purged from hydrogen chamber were 1 s and 10 s, respectively. The experimental results showed that the self-humidifying air-cooled PEMFC stack used for this …


Special Issue In Honor Of Professor Baolian Yi On His 80th Birthday, Society Of Electrochemistry Chinese Dec 2018

Special Issue In Honor Of Professor Baolian Yi On His 80th Birthday, Society Of Electrochemistry Chinese

Journal of Electrochemistry

No abstract provided.


Progress Of Self-Humidifying Membrane Electrode Assembly For Low Temperature Proton Exchange Membrane Fuel Cell, Bin Chi, Yue-Kun Ye, Shi-Jie Jiang, Shi-Jun Liao Dec 2018

Progress Of Self-Humidifying Membrane Electrode Assembly For Low Temperature Proton Exchange Membrane Fuel Cell, Bin Chi, Yue-Kun Ye, Shi-Jie Jiang, Shi-Jun Liao

Journal of Electrochemistry

The self/non-humidification membrane electrode assembly(SH-MEA)is an important pathway towards the self- humidification fuel cell and plays a crucial role for the large scale commercialization of low temperature proton exchange membrane fuel cell (LT-PEMFC), because it not only can reduce the volume and complexity of fuel cell system, resulting in the decrease of the cost, but also can improve the output power density of the fuel cell system. Currently, the researches on the self-humidifying MEA of LT-PEMFC mainly focus on three aspects: the preparation of self-humidification proton exchange membrane, the construction of self-humidification catalyst layer, and the construction of composite self-humidifying …


A Review Of Proton Exchange Membrane Fuel Cell Catalyst Layer By Electrospinning, Yong Liu, Han Ding, De-Chun Si, Jie Peng, Jian-Bo Zhang Dec 2018

A Review Of Proton Exchange Membrane Fuel Cell Catalyst Layer By Electrospinning, Yong Liu, Han Ding, De-Chun Si, Jie Peng, Jian-Bo Zhang

Journal of Electrochemistry

The limitation of catalyst layer for proton exchange membrane fuel cell (PEMFC) in cost, durability and performance constitutes the bottleneck for the commercialization of fuel cell vehicles. Electrospun catalyst layer, with high catalyst utilization, increased triple phase boundary (TPB) and triple phase channel (TPC), has been developed by many researchers. This paper reviews the research progress in the electrospun catalyst layer for PEMFC, combined with the author’s work. Firstly, the development progress of catalyst layer is summarized, and the catalyst layer is classified and analyzed based on its fabrication method and structure character. Next, the fabrication process, physical property characterization, …