Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Embry-Riddle Aeronautical University

Conference

Discipline
Keyword
Publication Year
Publication
File Type

Articles 31 - 60 of 235

Full-Text Articles in Physical Sciences and Mathematics

Reverse Osmosis; Addressing Freshwater Shortage With Sustainable Desalination, Jessica Savage Jan 2020

Reverse Osmosis; Addressing Freshwater Shortage With Sustainable Desalination, Jessica Savage

Sustainability Conference

Water security is an imperative part of high-functioning societies. Currently, large populations of the globe live in water-impoverished or water-stressed areas. With climate change and growing global populations, projections show more people being impacted by issues of water shortage.

One solution to water security is the implementation of desalination, specifically with reverse osmosis systems. This presentation walks through the history, capabilities, future work, and explanations on how reverse osmosis systems work. With continued research on improving desalination, communities in both developed and developing nations around the world can work towards total water security.


Recovering From Industrial Overshoot: Thermal Removal Of Atmospheric Co2, Ted Von Hippel, Sandra Boetcher, Matthew Traum, Farshid Azadian Ph.D., William Mackunis Jan 2020

Recovering From Industrial Overshoot: Thermal Removal Of Atmospheric Co2, Ted Von Hippel, Sandra Boetcher, Matthew Traum, Farshid Azadian Ph.D., William Mackunis

Sustainability Conference

Humanity will soon overshoot a safe level of atmospheric CO2, if it hasn't done so already. Countries, industries, and the global economy need to dramatically and quickly alter their behavior and technology to avoid this dangerous overshoot, yet this appears unlikely. Direct Air Capture of CO2 represents an insurance policy for society - a way of removing excess atmospheric CO2. I will present an approach to this problem based on thermal physics that cools cubic kilometers of air to extract CO2 as it sublimates. I propose a combination of an efficient heat exchanger, radiative cooling, and refrigeration, all at industrial …


Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik May 2019

Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smartphones with Google's Android operating system are becoming more and more popular each year, and with this increased user base, comes increased opportunities to collect more of these users' private data. There have been several instances of malware being made available via the Google Play Store, which is one of the predominant means for users to download applications. One effective way of collecting users' private data is by using Android Spyware. In this paper, we conduct a forensic analysis of a malicious Android spyware application and present our findings. We also highlight what information the application accesses and what it …


Astria Ontology: Open, Standards-Based, Data-Aggregated Representation Of Space Objects, Jennie Wolfgang, Kathleen Krysher, Michael Slovenski, Unmil P. Karadkar, Shiva Iyer, Moriba K. Jah Feb 2019

Astria Ontology: Open, Standards-Based, Data-Aggregated Representation Of Space Objects, Jennie Wolfgang, Kathleen Krysher, Michael Slovenski, Unmil P. Karadkar, Shiva Iyer, Moriba K. Jah

Space Traffic Management Conference

The necessity for standards-based ontologies for long-term sustainability of space operations and safety of increasing space flights has been well-established [6, 7]. Current ontologies, such as DARPA’s OrbitOutlook [5], are not publicly available, complicating efforts for their broad adoption. Most sensor data is siloed in proprietary databases [2] and provided only to authorized users, further complicating efforts to create a holistic view of resident space objects (RSOs) in order to enhance space situational awareness (SSA).

The ASTRIA project is developing an open data model with the goal of aggregating data about RSOs, parts, space weather, and governing policies in order …


Nanosat Tracking And Identification Techniques And Technologies, Mark A. Skinner Feb 2019

Nanosat Tracking And Identification Techniques And Technologies, Mark A. Skinner

Space Traffic Management Conference

Nanosats (and CubeSats, ‘Smallsats’, etc.) are of order 10 cm in size, and are at or near the limits of what can be tracked and characterized, using existing space surveillance assets. Additionally, given the CubeSat form-factor, they are often launched in large numbers (scores), and can be virtually identical. Thus are they difficult to track and to identify.

We have identified a number of technologies that future nanosat missions could employ that would enhance the trackability and/or identification of their satellites when on-orbit. Some of these technologies require active illumination of the satellite with electromagnetic energy, either in the radio …


Expected And Achievable Accuracy In Estimating Parameters Of Standing Accretion Shock Instability (Sasi) Fluctuations From Neutrinos And Gravitational Wave Oscillations, Colter Richardson, Jonathan Westhouse Oct 2018

Expected And Achievable Accuracy In Estimating Parameters Of Standing Accretion Shock Instability (Sasi) Fluctuations From Neutrinos And Gravitational Wave Oscillations, Colter Richardson, Jonathan Westhouse

Undergraduate Research Symposium - Prescott

Core collapse supernovae are one of the most interesting sources of gravitational waves. When the progenitor star is particularly massive, hydrodynamic instability called standing accretion shock instability can develop and it is characterized by deterministic oscillations in the gravitational wave signal as well as in the neutrino luminosity with frequencies of 100hz. In this talk we will review current efforts to extract physical information from the SASI components of the gravitational wave and enhance the detectability of gravitational waves with such components both using laser interferometers and neutrino detectors.


Modeling And Detectability Of Gravitational Wave Waveform Memory From Core Collapse Supernovae, Pedro Jesus Quinonez, Emily Grimes Oct 2018

Modeling And Detectability Of Gravitational Wave Waveform Memory From Core Collapse Supernovae, Pedro Jesus Quinonez, Emily Grimes

Undergraduate Research Symposium - Prescott

Ever since the discovery of gravitational waves by LIGO, studying these waves have become of utmost importance. This is because gravitational waves have the potential to carry information that have remain unseen by physicist in the past. For example, take the case of a core collapse supernovae. Any information transferred through electromagnetic waves that attempts to escape the inner core of a dying star is blocked out by the intense radiation of its outer shell. For this reason, astronomers have been unable to truly study what goes in the core. However, this is not the case for gravitational waves, which …


Research In Optics For Gravitational Wave Detection, Britney Biltz, Noura Ibrahim, Brennan Moore Oct 2018

Research In Optics For Gravitational Wave Detection, Britney Biltz, Noura Ibrahim, Brennan Moore

Undergraduate Research Symposium - Prescott

B.Biltz uses a horizontal “Zollner style” pendulum to monitor changes in the local gravitational field. The pendulum is attracted to the moon and the Sun and so, as the Earth turns, the pendulum’s equilibrium point shifts within a 24-hour period. This is an experiment designed to test the limits of such a pendulum. This sort of system may be useful as a method of monitoring and correcting for gravity gradient noise in future gravitational wave detectors.

N.Ibrahim characterizes thermo-optic noise in high-performance mirror coatings of the type used in Advanced LIGO. To characterize thermo-optic noise, she measures the change in …


Discrete Information Object Analysis Of Primary Flight Display Clutter, Kenneth Ward Aug 2018

Discrete Information Object Analysis Of Primary Flight Display Clutter, Kenneth Ward

National Training Aircraft Symposium (NTAS)

Modern aircraft utilize digital display screens to provide critical flight and system status information to pilots. As computing power has increased, the number of data sources and information presented has also increased, with the goal of increasing situational awareness. However, the display can become cluttered with extraneous or irrelevant information, to the detriment of pilot cognitive workload. Pilot perceptions of clutter vary with flight experience, introducing unique considerations in the flight training environment, given the experience difference between instructors and students. Researchers have studied the problem, identifying both the number of visual objects and information density as predictors of perception …


Suas: Cybersecurity Threats, Vulnerabilities, And Exploits, Philip Craiger, Gary Kessler, William Rose Aug 2018

Suas: Cybersecurity Threats, Vulnerabilities, And Exploits, Philip Craiger, Gary Kessler, William Rose

National Training Aircraft Symposium (NTAS)

The FAA predicts that purchases of hobbyist small unmanned aerial systems (sUAS) will grow from 1.9 million in 2016 to 4.3 million by 2020, and commercial sUAS to increase from 600,000 in 2016 to 2.7 million by 2020. sUAS, often referred to as 'drones,' are comprised of aeronautical hardware, a CPU, RAM, onboard storage, radio frequency communications, sensors, a camera, and a controller used by the pilot-in-command (PIC). Some have argued that a sUAS is essentially a flying computer. As such, sUAS are sometimes susceptible to many of the types of attacks that are often used on PC-based computers attached …


Contents, Adfsl May 2018

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, Adfsl May 2018

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


A Survey Of Lawyers’ Cyber Security Practises In Western Australia, Craig Valli, Mike Johnstone, Rochelle Fleming May 2018

A Survey Of Lawyers’ Cyber Security Practises In Western Australia, Craig Valli, Mike Johnstone, Rochelle Fleming

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper reports on the results of a survey that is the initial phase of an action research project being conducted with the Law Society of Western Australia. The online survey forms a baseline for the expression of a targeted training regime aimed at improving the cyber security awareness and posture of the membership of the Society. The full complement of over 3000 members were given the opportunity to participate in the survey, with 122 members responding in this initial round. The survey was designed to elicit responses about information technology use and the awareness of good practices with respect …


Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth May 2018

Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth

Annual ADFSL Conference on Digital Forensics, Security and Law

Data Protection and Computer Forensics/Anti-Forensics has now become a critical area of concern for organizations. A key element to this is how data is sanitized at end of life. In this paper we explore Hybrid Solid State Hybrid Drives (SSHD) and the impact that various Computer Forensics and Data Recovery techniques have when performing data erasure upon a SSHD.


Knowledge Expiration In Security Awareness Training, Tianjian Zhang May 2018

Knowledge Expiration In Security Awareness Training, Tianjian Zhang

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle May 2018

Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of LSB image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. The “CounterSteg” software allows detailed analysis and comparison of both the original cover image and any modified image, using sophisticated bit- and color-channel visual depiction graphics. In certain cases, the steganographic software used for message transmission can be identified by the forensic analysis of LSB and other changes in the payload image. The paper demonstrates usage and typical …


Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba May 2018

Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba

Annual ADFSL Conference on Digital Forensics, Security and Law

Cloud computing has revolutionized the methods by which digital data is stored, processed, and transmitted. It is providing users with data storage and processing services, enabling access to resources through multiple devices. Although organizations continue to embrace the advantages of flexibility and scalability offered by cloud computing, insider threats are becoming a serious concern as cited by security researchers. Insiders can use authorized access to steal sensitive information, calling for the need for an investigation. This concept paper describes research in progress towards developing a Neo4j graph database tool to enhance client forensics. The tool, with a Python interface, allows …


Df 2.0: Designing An Automated, Privacy Preserving, And Efficient Digital Forensic Framework, Robin Verma, Jayaprakash Govindaraj, Gaurav Gupta May 2018

Df 2.0: Designing An Automated, Privacy Preserving, And Efficient Digital Forensic Framework, Robin Verma, Jayaprakash Govindaraj, Gaurav Gupta

Annual ADFSL Conference on Digital Forensics, Security and Law

The current state of digital forensic investigation is continuously challenged by the rapid technological changes, the increase in the use of digital devices (both the heterogeneity and the count), and the sheer volume of data that these devices could contain. Although it is not directly related to the performance of Digital Forensic Investigation process, preventing data privacy violations during the process is also a big challenge. The investigator gets full access to the forensic image including suspect's private data which may be sensitive at times as well as entirely unrelated to the given case under investigation. With a notion that …


Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta May 2018

Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta

Annual ADFSL Conference on Digital Forensics, Security and Law

Enterprises are facing an unprecedented risk of security incidents due to the influx of emerging technologies, like smartphones and wearables. Most of the current Mobile security systems are not maturing in pace with technological advances. They lack the ability to learn and adapt from the past knowledge base. In the case of a security incident, enterprises find themselves underprepared for the lack of evidence and data. The systems are not designed to be forensic ready. There is a need for automated security analysis and forensically ready solution, which can learn and continuously adapt to new challenges, improve efficiency and productivity …


Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D May 2018

Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D

Annual ADFSL Conference on Digital Forensics, Security and Law

Cyber-clever criminals who are aware of the consequence of using mobile phones during conducting crimes often stay away from their phones while involved in crimes. Some of them even change their handset and SIM card, subsequently. This article looks into how, intentional disassociation (and even unintentional non-use) of mobile phone in (non-cyber) crimes, can become evidential clues of the perpetrators’ involvement in criminal acts. With the help of a recent judicial episode, this article reveals how extremely careful and masterful handling of extensive and voluminous Call Details Records and tower dumps by a cyber-savvy investigating official can unearth evidential clues …


Forensic Analysis Of The Exfat Artifacts, Yves Vandermeer, An Lekhac, Tahar Kechadi, Joe Carthy May 2018

Forensic Analysis Of The Exfat Artifacts, Yves Vandermeer, An Lekhac, Tahar Kechadi, Joe Carthy

Annual ADFSL Conference on Digital Forensics, Security and Law

Although keeping some basic concepts inherited from FAT32, the exFAT file system introduces many differences, such as the new mapping scheme of directory entries. The combination of exFAT mapping scheme with the allocation of bitmap files and the use of FAT leads to new forensic possibilities. The recovery of deleted files, including fragmented ones and carving becomes more accurate compared with former forensic processes. Nowadays, the accurate and sound forensic analysis is more than ever needed, as there is a high risk of erroneous interpretation. Indeed, most of the related work in the literature on exFAT structure and forensics, is …


Live Gpu Forensics: The Process Of Recovering Video Frames From Nvidia Gpu, Yazeed M. Albabtain, Baijian Yang May 2018

Live Gpu Forensics: The Process Of Recovering Video Frames From Nvidia Gpu, Yazeed M. Albabtain, Baijian Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

The purpose of this research is to apply a graphics processing unit (GPU) forensics method to recover video artifacts from NVIDIA GPU. The tested video specs are 512 x 512 in resolution for video 1 and 800 x 600 in resolution for video 2. Both videos are mpeg4 video codec. A VLC player was used in the experiment. A special program has been developed using OpenCL to recover 1) patterns that are frames consist of pixel values and 2) dump data from the GPU global memory. The dump data that represent the video frame were located using simple steps. The …


Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac May 2018

Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac

Annual ADFSL Conference on Digital Forensics, Security and Law

Drones (also known as Unmanned Aerial Vehicles – UAVs) are a potential source of evidence in a digital investigation, partly due to their increasing popularity in our society. However, existing UAV/drone forensics generally rely on conventional digital forensic investigation guidelines such as those of ACPO and NIST, which may not be entirely fit-for-purpose. In this paper, we identify the challenges associated with UAV/drone forensics. We then explore and evaluate existing forensic guidelines, in terms of their effectiveness for UAV/drone forensic investigations. Next, we present our set of guidelines for UAV/drone investigations. Finally, we demonstrate how the proposed guidelines can be …


Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik May 2018

Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Significant number of mobile device users currently employ anti-forensics applications, also known as vault or locker applications, on their mobile devices in order to hide files such as photos. Because of this, investigators are required to spend a large portion of their time manually looking at the applications installed on the device. Currently, there is no automated method of detecting these anti-forensics applications on an Android device. This work presents the creation and testing of a vault application detection system to be used on Android devices. The main goal of this work is twofold: (i) Detecting and reporting the presence …


Hypervisor-Based Active Data Protection For Integrity And Confidentiality Of Dynamically Allocated Memory In Windows Kernel, Igor Korkin May 2018

Hypervisor-Based Active Data Protection For Integrity And Confidentiality Of Dynamically Allocated Memory In Windows Kernel, Igor Korkin

Annual ADFSL Conference on Digital Forensics, Security and Law

One of the main issues in the OS security is providing trusted code execution in an untrusted environment. During executing, kernel-mode drivers dynamically allocate memory to store and process their data: Windows core kernel structures, users’ private information, and sensitive data of third-party drivers. All this data can be tampered with by kernel-mode malware. Attacks on Windows-based computers can cause not just hiding a malware driver, process privilege escalation, and stealing private data but also failures of industrial CNC machines. Windows built-in security and existing approaches do not provide the integrity and confidentiality of the allocated memory of third-party drivers. …


Back Matter, Adfsl Feb 2018

Back Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, Adfsl Feb 2018

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Contents, Adfsl Feb 2018

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Effects Of Graphical Weather Information Versus Textual Weather Information On Situation Awareness In Meteorology, Stefan Melendez M.S.A., Andrew Dattel Ph.D., Christopher Herbster Ph.D., Debbie Schaum M.A., Andrey Babin Aug 2017

Effects Of Graphical Weather Information Versus Textual Weather Information On Situation Awareness In Meteorology, Stefan Melendez M.S.A., Andrew Dattel Ph.D., Christopher Herbster Ph.D., Debbie Schaum M.A., Andrey Babin

National Training Aircraft Symposium (NTAS)

Prior to a flight, pilots gather meteorological information in order to assess the weather conditions pertaining to their flight and to make decisions based on it. This information can come in various formats, such as text and graphical weather information. Research has shown that people have varying learning preferences and that most people prefer visual learning to verbal learning (i.e., graphical over text). It is hypothesized that this difference in learning preference can affect the way pilots interpret and apply the information they obtain prior to their flight. The researcher hypothesizes that graphical weather information has a greater, more positive …


Case Study: A New Method For Investigating Crimes Against Children, Hallstein Asheim Hansen, Stig Andersen, Stefan Axelsson, Svein Hopland May 2017

Case Study: A New Method For Investigating Crimes Against Children, Hallstein Asheim Hansen, Stig Andersen, Stefan Axelsson, Svein Hopland

Annual ADFSL Conference on Digital Forensics, Security and Law

Investigations of crimes against children are often complex, both in terms of the varied and large amount of digital technology encountered and the offensive nature of the crimes. Such cases are numerous, large, and prioritised, requiring digital forensics competence. Earlier digital forensics was considered and treated as a typical forensic science like fingerprint analysis, performed in a laboratory isolated from the investigative team. This decoupled way of working has proved to be both inefficient and error prone.

At the Digital Forensic Unit of Oslo Police District we have developed a new way of working that addresses many of the problems …