Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

Discipline
Institution
Keyword
Publication Year
Publication
File Type

Articles 14671 - 14700 of 16633

Full-Text Articles in Physical Sciences and Mathematics

Measuring Hurricane Storm Tide South Carolina, Paul Conrads, John M. Shelton, Andral Caldwell, Sara A. Brown Oct 2012

Measuring Hurricane Storm Tide South Carolina, Paul Conrads, John M. Shelton, Andral Caldwell, Sara A. Brown

S.C. Water Resources Conference

2012 S.C. Water Resources Conference - Exploring Opportunities for Collaborative Water Research, Policy and Management


Integrating Of Cyberinfrastructures To Provide Hydrologic Data For The Restoration Of The Everglades, Matt Petkewich, Paul Conrads, Pamela A. Telis, Heather Henkel Oct 2012

Integrating Of Cyberinfrastructures To Provide Hydrologic Data For The Restoration Of The Everglades, Matt Petkewich, Paul Conrads, Pamela A. Telis, Heather Henkel

S.C. Water Resources Conference

2012 S.C. Water Resources Conference - Exploring Opportunities for Collaborative Water Research, Policy and Management


Runoff Generation From Shallow Water Table Southeastern Forested Watersheds: Unusual Behavior Of Paired Watersheds Following Major Disturbance, Tom Williams, Anand Jayakaran, Bo Song, Carl Trettin, Herbert Segane Oct 2012

Runoff Generation From Shallow Water Table Southeastern Forested Watersheds: Unusual Behavior Of Paired Watersheds Following Major Disturbance, Tom Williams, Anand Jayakaran, Bo Song, Carl Trettin, Herbert Segane

S.C. Water Resources Conference

2012 S.C. Water Resources Conference - Exploring Opportunities for Collaborative Water Research, Policy and Management


Identifying Fecal Pollution Sources Through Antibiotic Resistance Analysis (Ara): Sand River, Aiken County, Sc, Ryan T. West, James R. Yates, S Michele Harmon Oct 2012

Identifying Fecal Pollution Sources Through Antibiotic Resistance Analysis (Ara): Sand River, Aiken County, Sc, Ryan T. West, James R. Yates, S Michele Harmon

S.C. Water Resources Conference

2012 S.C. Water Resources Conference - Exploring Opportunities for Collaborative Water Research, Policy and Management


Isolated Wetlands - The Groundwater Connection, Dan Tufford, Chenille Williams, Amy Keyworth, Rick Bolich, Warren Hankinson, Virginia Baker Oct 2012

Isolated Wetlands - The Groundwater Connection, Dan Tufford, Chenille Williams, Amy Keyworth, Rick Bolich, Warren Hankinson, Virginia Baker

S.C. Water Resources Conference

2012 S.C. Water Resources Conference - Exploring Opportunities for Collaborative Water Research, Policy and Management


A Local Correlation Score To Monitor Sensor Drift Of Real-Time Environmental Data, Ian Taylor, Julia L. Sharp, David L. White, Jason O. Hallstrom, Gene W. Eidson Oct 2012

A Local Correlation Score To Monitor Sensor Drift Of Real-Time Environmental Data, Ian Taylor, Julia L. Sharp, David L. White, Jason O. Hallstrom, Gene W. Eidson

S.C. Water Resources Conference

2012 S.C. Water Resources Conference - Exploring Opportunities for Collaborative Water Research, Policy and Management


Using Microbial Source Tracking Techniques To Identify Fecal Indicator Bacteria In The Horse Creek Watershed In Aiken, Sc, Pamela W. Steen, Paul Thomas, S Michele Harmon Oct 2012

Using Microbial Source Tracking Techniques To Identify Fecal Indicator Bacteria In The Horse Creek Watershed In Aiken, Sc, Pamela W. Steen, Paul Thomas, S Michele Harmon

S.C. Water Resources Conference

2012 S.C. Water Resources Conference - Exploring Opportunities for Collaborative Water Research, Policy and Management


Data Mining To Predict Climate And Groundwater Use Impacts On The Hydrology Of Central Florida, Edwin A. Roehl Jr, Andrew M. O'Reilly, Paul A. Conrads, Ruby C. Daamen Oct 2012

Data Mining To Predict Climate And Groundwater Use Impacts On The Hydrology Of Central Florida, Edwin A. Roehl Jr, Andrew M. O'Reilly, Paul A. Conrads, Ruby C. Daamen

S.C. Water Resources Conference

2012 S.C. Water Resources Conference - Exploring Opportunities for Collaborative Water Research, Policy and Management


Citizen Science: Data Collection In Storm Drain Marking Program, Chelsey Richardson Oct 2012

Citizen Science: Data Collection In Storm Drain Marking Program, Chelsey Richardson

S.C. Water Resources Conference

2012 S.C. Water Resources Conference - Exploring Opportunities for Collaborative Water Research, Policy and Management


Adventures In Library Salary Surveys, Scott L. Schaffer Aug 2012

Adventures In Library Salary Surveys, Scott L. Schaffer

UVM Libraries Conference Day

Salary surveys are an important tool for the library community and the administrators and boards responsible for the oversight of libraries. However, such assessments must be constructed and analyzed with great care. The Vermont Library Association Personnel Committee has conducted three salary surveys over the past several years, one focusing on academic libraries and two on public libraries. Significant issues have included confidentiality, participation rate, definitions, length and difficulty of questions, collection of data, and representativeness. Suggestions and lessons learned will be shared.


Bailey/Howe Reference Analytics: What Two Years Of Data Tell Us, Elizabeth Berman Aug 2012

Bailey/Howe Reference Analytics: What Two Years Of Data Tell Us, Elizabeth Berman

UVM Libraries Conference Day

Analyzing the last two academic years (2010-2011 and 2011-2012) of reference-desk statistics, this presentation will highlight trends at the Bailey/Howe Reference Desk, and offer scenarios for the future of reference services.


Digital Evidence Education In Schools Of Law, Aaron Alva, Barbara Endicott-Popovsky May 2012

Digital Evidence Education In Schools Of Law, Aaron Alva, Barbara Endicott-Popovsky

Annual ADFSL Conference on Digital Forensics, Security and Law

An examination of State of Connecticut v. Julie Amero provides insight into how a general lack of understanding of digital evidence can cause an innocent defendant to be wrongfully convicted. By contrast, the 101-page opinion in Lorraine v. Markel American Insurance Co. provides legal precedence and a detailed consideration for the admission of digital evidence. An analysis of both cases leads the authors to recommend additions to Law School curricula designed to raise the awareness of the legal community to ensure such travesties of justice, as in the Amero case, don’t occur in the future. Work underway at the University …


A Case Study Of The Challenges Of Cyber Forensics Analysis Of Digital Evidence In A Child Pornography Trial, Richard Boddington May 2012

A Case Study Of The Challenges Of Cyber Forensics Analysis Of Digital Evidence In A Child Pornography Trial, Richard Boddington

Annual ADFSL Conference on Digital Forensics, Security and Law

Perfunctory case analysis, lack of evidence validation, and an inability or unwillingness to present understandable analysis reports adversely affect the outcome course of legal trials reliant on digital evidence. These issues have serious consequences for defendants facing heavy penalties or imprisonment yet expect their defence counsel to have clear understanding of the evidence. Poorly reasoned, validated and presented digital evidence can result in conviction of the innocent as well as acquittal of the guilty. A possession of child pornography Case Study highlights the issues that appear to plague case analysis and presentation of digital evidence relied on in these odious …


After Five Years Of E-Discovery Missteps: Sanctions Or Safe Harbor?, Milton Luoma, Vicki Luoma May 2012

After Five Years Of E-Discovery Missteps: Sanctions Or Safe Harbor?, Milton Luoma, Vicki Luoma

Annual ADFSL Conference on Digital Forensics, Security and Law

In 2003 the Zubulake case became the catalyst of change in the world of e-discovery. In that case Judge Shira Scheindlin of the United States District Court for the Southern District of New York set guidelines for e-discovery that served as the basis for amending the Federal Rules of Civil Procedure (FRCP) in December 2006. The amendments incorporated a number of concepts that were described by Judge Scheindlin in the Zubulake case. ( Zubulake v. UBS Warburg LLC, 2003) Since the Zubulake case and the FRCP amendments, numerous cases have interpreted these rules changes, but one of the main points …


Multi-Parameter Sensitivity Analysis Of A Bayesian Network From A Digital Forensic Investigation, Richard E. Overill, Echo P. Zhang, Kam-Pui Chow May 2012

Multi-Parameter Sensitivity Analysis Of A Bayesian Network From A Digital Forensic Investigation, Richard E. Overill, Echo P. Zhang, Kam-Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

A multi-parameter sensitivity analysis of a Bayesian network (BN) used in the digital forensic investigation of the Yahoo! email case has been performed using the principle of ‘steepest gradient’ in the parameter space of the conditional probabilities. This procedure delivers a more reliable result for the dependence of the posterior probability of the BN on the values used to populate the conditional probability tables (CPTs) of the BN. As such, this work extends our previous studies using singleparameter sensitivity analyses of BNs, with the overall aim of more deeply understanding the indicative use of BNs within the digital forensic and …


Facilitating Forensics In The Mobile Millennium Through Proactive Enterprise Security, Andrew R. Scholnick May 2012

Facilitating Forensics In The Mobile Millennium Through Proactive Enterprise Security, Andrew R. Scholnick

Annual ADFSL Conference on Digital Forensics, Security and Law

This work explores the impact of the emerging mobile communication device paradigm on the security-conscious enterprise, with regard to providing insights for proactive Information Assurance and facilitation of eventual Forensic analysis. Attention is given to technology evolution in the areas of best practices, attack vectors, software and hardware performance, access and activity monitoring, and architectural models.

Keywords: Forensics, enterprise security, mobile communication, best practices, attack vectors.


Cloud Forensics Investigation: Tracing Infringing Sharing Of Copyrighted Content In Cloud, Yi-Jun He, Echo P. Zhang, Lucas C.K. Hui, Siu Ming Yiu, K.P. Chow May 2012

Cloud Forensics Investigation: Tracing Infringing Sharing Of Copyrighted Content In Cloud, Yi-Jun He, Echo P. Zhang, Lucas C.K. Hui, Siu Ming Yiu, K.P. Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Cloud Computing is becoming a significant technology trend nowadays, but its abrupt rise also creates a brand new front for cybercrime investigation with various challenges. One of the challenges is to track down infringing sharing of copyrighted content in cloud. To solve this problem, we study a typical type of content sharing technologies in cloud computing, analyze the challenges that the new technologies bring to forensics, formalize a procedure to get digital evidences and obtain analytical results based on the evidences to track down illegal uploader. Furthermore, we propose a reasoning model based on the probability distribution in a Bayesian …


Ipad2 Logical Acquisition: Automated Or Manual Examination?, Somaya Ali, Sumaya Alhosani, Farah Alzarooni, Ibrahim Baggili May 2012

Ipad2 Logical Acquisition: Automated Or Manual Examination?, Somaya Ali, Sumaya Alhosani, Farah Alzarooni, Ibrahim Baggili

Annual ADFSL Conference on Digital Forensics, Security and Law

Due to their usage increase worldwide, iPads are on the path of becoming key sources of digital evidence in criminal investigations. This research investigated the logical backup acquisition and examination of the iPad2 device using the Apple iTunes backup utility while manually examining the backup data (manual examination) and automatically parsing the backup data (Lantern software - automated examination). The results indicate that a manual examination of the logical backup structure from iTunes reveals more digital evidence, especially if installed application data is required for an investigation. However, the researchers note that if a quick triage is needed of an …


A Fuzzy Hashing Approach Based On Random Sequences And Hamming Distance, Frank Breitinger, Harald Baier May 2012

A Fuzzy Hashing Approach Based On Random Sequences And Hamming Distance, Frank Breitinger, Harald Baier

Annual ADFSL Conference on Digital Forensics, Security and Law

Hash functions are well-known methods in computer science to map arbitrary large input to bit strings of a fixed length that serve as unique input identifier/fingerprints. A key property of cryptographic hash functions is that even if only one bit of the input is changed the output behaves pseudo randomly and therefore similar files cannot be identified. However, in the area of computer forensics it is also necessary to find similar files (e.g. different versions of a file), wherefore we need a similarity preserving hash function also called fuzzy hash function. In this paper we present a new approach for …


The Xbox 360 And Steganography: How Criminals And Terrorists Could Be "Going Dark", Ashley Podhradsky, Rob D’Ovidio, Cindy Casey May 2012

The Xbox 360 And Steganography: How Criminals And Terrorists Could Be "Going Dark", Ashley Podhradsky, Rob D’Ovidio, Cindy Casey

Annual ADFSL Conference on Digital Forensics, Security and Law

Video game consoles have evolved from single-player embedded systems with rudimentary processing and graphics capabilities to multipurpose devices that provide users with parallel functionality to contemporary desktop and laptop computers. Besides offering video games with rich graphics and multiuser network play, today's gaming consoles give users the ability to communicate via email, video and text chat; transfer pictures, videos, and file;, and surf the World-Wide-Web. These communication capabilities have, unfortunately, been exploited by people to plan and commit a variety of criminal activities. In an attempt to cover the digital tracks of these unlawful undertakings, anti-forensic techniques, such as steganography, …


Double-Compressed Jpeg Detection In A Steganalysis System, Jennifer L. Davidson, Pooja Parajape May 2012

Double-Compressed Jpeg Detection In A Steganalysis System, Jennifer L. Davidson, Pooja Parajape

Annual ADFSL Conference on Digital Forensics, Security and Law

The detection of hidden messages in JPEG images is a growing concern. Current detection of JPEG stego images must include detection of double compression: a JPEG image is double compressed if it has been compressed with one quality factor, uncompressed, and then re-compressed with a different quality factor. When detection of double compression is not included, erroneous detection rates are very high. The main contribution of this paper is to present an efficient double-compression detection algorithm that has relatively lower dimensionality of features and relatively lower computational time for the detection part, than current comparative classifiers. We use a model-based …


Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser May 2012

Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser

Annual ADFSL Conference on Digital Forensics, Security and Law

The National Repository of Digital Forensics Information (NRDFI) is a knowledge repository for law enforcement digital forensics investigators (LEDFI). Over six years, the NRDFI has undertaken significant design revisions in order to more closely align the architecture of the system with theory addressing motivation to share knowledge and communication within ego-centric groups and communities of practice. These revisions have been met with minimal change in usage patterns by LEDFI community members, calling into question the applicability of relevant theory when the domain for knowledge sharing activities expands beyond the confines of an individual organization to a community of practice. When …


A Proposal For Incorporating Programming Blunder As Important Evidence In Abstraction-Filtration-Comparison Test, P. Vinod Bhattathiripad May 2012

A Proposal For Incorporating Programming Blunder As Important Evidence In Abstraction-Filtration-Comparison Test, P. Vinod Bhattathiripad

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper investigates an unexplored concept in Cyber Forensics, namely, a Programming Blunder. Programming Blunder is identified as a variable or a code segment or a field in a database table, which is hardly used or executed in the context of the application or the user’s functionality. Blunder genes can be found in many parts of any program. It is the contention of this paper that this phenomenon of blunders needs to be studied systematically from its very genetic origins to their surface realizations in contrast to bugs and flaws, especially in view of their importance in software copyright infringement …


Update On The State Of The Science Of Digital Evidence Examination, Fred Cohen May 2012

Update On The State Of The Science Of Digital Evidence Examination, Fred Cohen

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper updates previous work on the level of consensus in foundational elements of digital evidence examination. Significant consensus is found present only after definitions are made explicit, suggesting that, while there is a scientific agreement around some of the basic notions identified, the use of a common language is lacking.

Keywords: Digital forensics examination, terminology, scientific methodology, testability, validation, classification, scientific consensus


Underpinning Statistical Computing Knowledge And Skills For Students, Wing Kin, Ken Li May 2012

Underpinning Statistical Computing Knowledge And Skills For Students, Wing Kin, Ken Li

Practical Social and Industrial Research Symposium

No abstract provided.


General Post-Secondary Education In Support Of Sustainable Development In Hong Kong, Kin Man, Amazon Lee May 2012

General Post-Secondary Education In Support Of Sustainable Development In Hong Kong, Kin Man, Amazon Lee

Practical Social and Industrial Research Symposium

No abstract provided.


High & Low Resolution Techniques To Solve Protein Structures, Nathan Wright May 2012

High & Low Resolution Techniques To Solve Protein Structures, Nathan Wright

Science Enabled by Photon Sources: Local Research Interests in Virginia

Protein structure and dynamics form the platform on which almost all biomedical research is currently based, including hot topics like computer-aided drug design and established problems like creating a cure for cancer. Since most proteins are too small to visualize with even an electron microscope, biochemists must use either NMR spectroscopy or x-ray diffraction to determine what the structures look like. In my lab, we combine both techniques to describe fundamentally how normal and mutated proteins behave in muscle cells. We are specifically interested in the structural protein obscurin. This giant muscle protein helps to organize muscle cells, sense muscle …


Optical Techniques To Probe Internal Dynamics Of Soft Materials, Klebert Feitosa May 2012

Optical Techniques To Probe Internal Dynamics Of Soft Materials, Klebert Feitosa

Science Enabled by Photon Sources: Local Research Interests in Virginia

Like many other soft materials, foam displays complex fluid behavior. Under different circumstances it may behave like an elastic solid or a typical fluid depending on driving forces and the interactions between individual bubbles. To understand the inherent complexities of foam flow, an effective method to visualize its internal structure and dynamics is paramount. In this talk, I will introduce two techniques we have used in our lab to probe foam dynamics at the bubble level: optical tomography and confocal microscopy. The results show great promise to unveil the internal mechanisms that lead to the complex fluid behavior of foams.


X-Ray Fluorescence Microscopy: A Tool For Biology, Life Science & Nanomedicine, Stafan Vogt May 2012

X-Ray Fluorescence Microscopy: A Tool For Biology, Life Science & Nanomedicine, Stafan Vogt

Science Enabled by Photon Sources: Local Research Interests in Virginia

Trace elements, in particular metals, play a significant role in most known life forms. It is estimated that one-third of all known proteins contain metal cofactors, and the majority of these function as essential metalloenzymes catalyzing biochemical reactions. Trace metals are increasingly recognized as having a critical impact on human health both in their natural occurrence and via therapeutic drugs (e.g., environmental exposure to heavy metals, treatment with cisplatin-based drugs in chemotherapy, ...), and in diseases such as Alzheimer’s. Quantitative study of the distribution of trace elements on the cellular and subcellular level provide important information about functions and pathways …


Harvesting Heat Through Seebeck Spin Tunneling Effect, Costel Constantin May 2012

Harvesting Heat Through Seebeck Spin Tunneling Effect, Costel Constantin

Science Enabled by Photon Sources: Local Research Interests in Virginia

Harvesting the wasted heat released in the atmosphere by electronic devices has become an important issue in microelectronics as devices shrink toward nanoscale dimensions while achieving an increase in operating speed. Spintronic devices that make use of electrons’ spin as an information carrier offer a promising path to create novel efficient devices thus reducing this wasted heat. Thermoelectronics, on the other hand, explores the possibility of converting heat into electrical power. Spin caloritronics is an exciting new research field that takes advantage of both spintronics and thermoelectronics. In this talk, I will present the design of a spin caloritronic device …